jackkuo commited on
Commit
44e9854
·
verified ·
1 Parent(s): 6e9e4c6

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf +0 -0
  2. -dFAT4oBgHgl3EQfqB3j/content/tmp_files/2301.08645v1.pdf.txt +255 -0
  3. -dFAT4oBgHgl3EQfqB3j/content/tmp_files/load_file.txt +98 -0
  4. .gitattributes +55 -0
  5. 09E0T4oBgHgl3EQfdQDB/content/2301.02375v1.pdf +3 -0
  6. 09E0T4oBgHgl3EQfdQDB/vector_store/index.faiss +3 -0
  7. 09E0T4oBgHgl3EQfdQDB/vector_store/index.pkl +3 -0
  8. 09FIT4oBgHgl3EQf3Sv5/content/tmp_files/2301.11381v1.pdf.txt +1541 -0
  9. 09FIT4oBgHgl3EQf3Sv5/content/tmp_files/load_file.txt +0 -0
  10. 1dE0T4oBgHgl3EQfdgBe/vector_store/index.faiss +3 -0
  11. 1dFRT4oBgHgl3EQfmDfL/content/tmp_files/2301.13600v1.pdf.txt +2199 -0
  12. 1dFRT4oBgHgl3EQfmDfL/content/tmp_files/load_file.txt +0 -0
  13. 1tE2T4oBgHgl3EQfNQaE/content/tmp_files/2301.03735v1.pdf.txt +2223 -0
  14. 1tE2T4oBgHgl3EQfNQaE/content/tmp_files/load_file.txt +0 -0
  15. 69E1T4oBgHgl3EQfnASE/vector_store/index.faiss +3 -0
  16. 6NFKT4oBgHgl3EQf_C4s/vector_store/index.faiss +3 -0
  17. 7tE1T4oBgHgl3EQf7QXS/content/tmp_files/2301.03533v1.pdf.txt +889 -0
  18. 7tE1T4oBgHgl3EQf7QXS/content/tmp_files/load_file.txt +0 -0
  19. 89E5T4oBgHgl3EQfQw7M/content/tmp_files/2301.05516v1.pdf.txt +4257 -0
  20. 89E5T4oBgHgl3EQfQw7M/content/tmp_files/load_file.txt +0 -0
  21. 8dE1T4oBgHgl3EQfUAND/content/tmp_files/2301.03084v1.pdf.txt +1494 -0
  22. 8dE1T4oBgHgl3EQfUAND/content/tmp_files/load_file.txt +0 -0
  23. 9dE3T4oBgHgl3EQfrApq/content/2301.04656v1.pdf +3 -0
  24. 9dE3T4oBgHgl3EQfrApq/vector_store/index.pkl +3 -0
  25. C9AzT4oBgHgl3EQfwf5z/content/2301.01723v1.pdf +3 -0
  26. C9AzT4oBgHgl3EQfwf5z/vector_store/index.faiss +3 -0
  27. C9AzT4oBgHgl3EQfwf5z/vector_store/index.pkl +3 -0
  28. DNFQT4oBgHgl3EQfPTY7/content/2301.13278v1.pdf +3 -0
  29. DNFQT4oBgHgl3EQfPTY7/vector_store/index.faiss +3 -0
  30. DtAzT4oBgHgl3EQfwv4v/vector_store/index.pkl +3 -0
  31. DtE4T4oBgHgl3EQf6Q5X/content/tmp_files/2301.05330v1.pdf.txt +932 -0
  32. DtE4T4oBgHgl3EQf6Q5X/content/tmp_files/load_file.txt +0 -0
  33. E9AyT4oBgHgl3EQfSfeg/content/2301.00088v1.pdf +3 -0
  34. EdE0T4oBgHgl3EQfywKq/content/2301.02664v1.pdf +3 -0
  35. EdE0T4oBgHgl3EQfywKq/vector_store/index.faiss +3 -0
  36. EdE0T4oBgHgl3EQfywKq/vector_store/index.pkl +3 -0
  37. EdE1T4oBgHgl3EQf-gYV/content/2301.03568v1.pdf +3 -0
  38. EdE1T4oBgHgl3EQf-gYV/vector_store/index.pkl +3 -0
  39. EtE3T4oBgHgl3EQfVQrm/content/tmp_files/2301.04459v1.pdf.txt +0 -0
  40. EtE3T4oBgHgl3EQfVQrm/content/tmp_files/load_file.txt +0 -0
  41. I9AzT4oBgHgl3EQfx_6k/content/2301.01747v1.pdf +3 -0
  42. INAzT4oBgHgl3EQfxv6_/vector_store/index.faiss +3 -0
  43. INAzT4oBgHgl3EQfxv6_/vector_store/index.pkl +3 -0
  44. IdE4T4oBgHgl3EQfIQyU/content/tmp_files/2301.04911v1.pdf.txt +2480 -0
  45. IdE4T4oBgHgl3EQfIQyU/content/tmp_files/load_file.txt +0 -0
  46. KdE2T4oBgHgl3EQfAgZ0/content/2301.03592v1.pdf +3 -0
  47. KdE2T4oBgHgl3EQfAgZ0/vector_store/index.faiss +3 -0
  48. KdE3T4oBgHgl3EQfXwqt/content/tmp_files/2301.04482v1.pdf.txt +1531 -0
  49. KdE3T4oBgHgl3EQfXwqt/content/tmp_files/load_file.txt +0 -0
  50. LdE3T4oBgHgl3EQfvwu2/content/tmp_files/2301.04697v1.pdf.txt +2052 -0
-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf ADDED
Binary file (98.1 kB). View file
 
-dFAT4oBgHgl3EQfqB3j/content/tmp_files/2301.08645v1.pdf.txt ADDED
@@ -0,0 +1,255 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.08645v1 [gr-qc] 20 Jan 2023
2
+ Complex scalar field in κ-Minkowski spacetime
3
+ Andrea Bevilacqua1, ∗
4
+ 1National Centre for Nuclear Research, Pasteura 7, 02-093 Warszawa, Poland
5
+ It is often expected that one cannot treat spacetime as a continuous manifold as the Planck
6
+ scale is approached, because of to possible effects due to a quantum theory of gravity. There
7
+ have been several proposals to model such a deviation from the classical behaviour, one of
8
+ which is noncommutativity of spacetime coordinates. In this context, the non-commutativity
9
+ scale is seen as an observer-independent length scale. Of course, such a scale impose a modi-
10
+ fication of ordinary relativistic symmetries, which now need to be deformed to accommodate
11
+ this fundamental scale. The κ-Poincar´e algebra is an example of this deformation. In what
12
+ follows I will briefly describe a construction of a κ-deformed complex scalar field theory,
13
+ while at the same time shedding light on the behaviour of discrete and continuous symme-
14
+ tries in this formalism. This in turn will open the way to the study of the application of
15
+ this formalism to actual physical processes. I will then conclude with some comments and
16
+ prospects for the future.
17
+ I.
18
+ FROM NON-COMMUTATIVE SPACETIME TO THE ACTION
19
+ We will present a brief preview of the works in Refs. [1], [2]. For a more detailed introduction
20
+ to the framework and the formalism, see for example Ref. [3]. The starting point is k-Minkowski
21
+ spacetime, whose coordinates satisfy the an(3) Lie algebra defined as [ˆx0, ˆxi] = iˆxi/κ.
22
+ Notice
23
+ that one recovers canonical Minkowski spacetime in the formal limit κ → ∞. To have a more
24
+ physical understanding of the above commutator, notice that 1/κ has dimensions of length, and it
25
+ is sometimes identified with the Plank length. In order to build fields in this spacetime, we need to
26
+ define plane waves first. To do so, one can proceed as follows. First pick an explicit representation
27
+ of the an(3) Lie algebra in terms of matrices (it turns out that the lowest dimensional one has
28
+ dimension 5). Then, one can define a plane wave as an element ˆek of the relative AN(3) Lie group,
29
+ i.e. for example1 ˆek = exp(ikiˆxi) exp(ik0ˆx0). Notice that, since the elements of the matrices ˆxµ
30
+ ∗ andrea.bevilacqua@ncbj.gov.pl
31
+ 1 A different choice on the ordering results in a change of coordinates in momentum space.
32
+
33
+ 2
34
+ are dimensionful, so are the parameters kµ. Written explicitly, one has
35
+ ˆek =
36
+
37
+
38
+
39
+
40
+
41
+
42
+
43
+
44
+
45
+
46
+
47
+ ¯p4
48
+ κ
49
+ k
50
+ κ
51
+ p0
52
+ κ
53
+ p
54
+ κ
55
+ 1
56
+ p
57
+ κ
58
+ ¯p0
59
+ κ
60
+ − k
61
+ κ
62
+ p4
63
+ κ
64
+
65
+
66
+
67
+
68
+
69
+
70
+
71
+
72
+
73
+
74
+
75
+ (1)
76
+ where2
77
+ p0 = κ sinh k0
78
+ κ + k2
79
+ 2κek0/κ
80
+ pi = kiek0/κ
81
+ p4 = κ cosh k0
82
+ κ − k2
83
+ 2κek0/κ.
84
+ (2)
85
+ Both kµ and pA(k) (A = 0, 1, 2, 3, 4) are two different coordinates of momentum space. Notice that
86
+ the pA are not independent, since −p0 + p2 + p2
87
+ 4 = κ2 (notice also that p+ = p0 + p4 > 0). It is
88
+ therefore clear that momentum space is curved. This is reflected in a deformed sum of momenta,
89
+ which is defined through the group property ˆekˆel =: ˆek⊕l. At the same time, inverse momenta
90
+ are defined in terms of group inverses ˆe−1
91
+ k
92
+ =: ˆeS(k), and S(k) is called the antipode of k. In order
93
+ to simplify the treatment of integrals and derivatives, we can use a3 Weyl map W to send group
94
+ elements ˆek into canonical plane waves ep := exp(ipµ(k)xµ). The group law is preserved thanks
95
+ to the ⋆ product defined by W(ˆek⊕l) = ep(k)⊕q(l) =: ep(k) ⋆ eq(l). In general, the ⋆ product is not
96
+ commutative. Because of this, we choose the following action for a κ-deformed complex scalar
97
+ field.
98
+ S = 1
99
+ 2
100
+
101
+ R4 d4x[(∂µφ)† ⋆ (∂µφ) + (∂µφ) ⋆ (∂µφ)† − m2(φ† ⋆ φ + φ ⋆ φ†)].
102
+ (3)
103
+ To obtain the equations of motion one usually integrates by parts, but in this deformed context
104
+ derivatives do not satisfy the Leibniz rule. In fact, if they did, one could get the following contra-
105
+ diction.
106
+ i(p ⊕ q)µep⊕q = ∂µ(ep ⋆ eq) = (∂µep) ⋆ eq + ep ⋆ ∂µeq = i(p + q)ep⊕q.
107
+ (4)
108
+ Hence one has to use the appropriate deformations for the Leibniz rules. After some computations,
109
+ one can verify that the equations of motion satisfied by the field are the canonical Klein-Gordon
110
+ equations, and the field which satisfies them can be written as
111
+ φ(x) =
112
+
113
+ d3p
114
+ �2ωp
115
+ ξ(p)ape−i(ωpt−px) +
116
+
117
+ d3p∗
118
+
119
+ 2|ω∗p|
120
+ ξ(p)b†
121
+ p∗ei(S(ωp)t−S(p)x).
122
+ (5)
123
+ 2 The explicit expression of ¯p4 and ¯p0 in terms of kµ is not relevant for the present discussion.
124
+ 3 There are several equivalent ways in which a suitable Weyl map can be chosen, see Ref.
125
+ [1] for more details.
126
+
127
+ 3
128
+ The action of the discrete transformations C, P, T can be defined in the usual way in the deformed
129
+ context, i.e. Tφ(t, x)T −1 = φ(−t, x), Pφ(t, x)P −1 = φ(t, −x), and Cφ(t, x)C−1 = φ†(t, x). Notice
130
+ that this is due to the presence of the antipode in the on-shell field. Furthermore, the action is
131
+ manifestly invariant under both CPT and κ-deformed Lorentz transformations.
132
+ II.
133
+ CHARGES AND FEATURES OF THE MODEL
134
+ We now need to compute the charges for our model. There are two main ways to do so. The
135
+ first is by direct computation using the Noether theorem. However, the fact that derivatives do
136
+ not follow the Leibniz rule makes this job a prohibitively difficult one, except for the case of
137
+ translation charges. The second way is to use the covariant phase-space formalism. Although very
138
+ direct, this second method needs to be carefully defined in the deformed context.
139
+ We chose a
140
+ hybrid approach, namely we derived the translation charges from the Noether theorem, and then
141
+ we built a covariant phase space approach which was able to reproduce the translation charges,
142
+ allowing then to compute the remaining charges. Given a symplectic form Ω, and a symmetry in
143
+ spacetime described by the vector field ξ, the charge Qξ can be defined by −δξ⌟ Ω = δQξ. In this
144
+ context δξ is a vector field in phase space describing the variation δξA of any physical quantity
145
+ A in phase space under the action of the symmetry ξ in spacetime, δ is the exterior derivative in
146
+ phase space, and ⌟ represents a contraction. The translation charges computed directly from the
147
+ Noether theorem are the following4:
148
+ Pµ =
149
+
150
+ d3p α(p)[−S(p)µa†
151
+ pap + pµb†
152
+ p∗bp∗].
153
+ (6)
154
+ The quantity α(p) is a function of momenta whose explicit expression does not concern us in this
155
+ context. To reproduce Eq. (6) in the covariant phase space formalism, we need to assume the
156
+ following deformation of the canonical contraction rule between vector fields and forms5:
157
+ δv⌟ (A ∧ B) = (δvA)B + A(S(δv)B),
158
+ (7)
159
+ where S(δv) can be appropriately defined [2].
160
+ Using this definition, one can compute all the
161
+ remaining charges, and the creation/annihilation operators algebra (which turns out to be the
162
+ canonical one). For example, the boost charge Ni is
163
+ Ni=− 1
164
+ 2
165
+ � d3p α
166
+
167
+ S(ωp)
168
+
169
+ ∂a†
170
+ p
171
+ ∂S(p)i ap −a†
172
+ p
173
+ ∂ap
174
+ ∂S(p)i
175
+
176
+ +ωp
177
+
178
+ bp
179
+ ∂b†
180
+ p
181
+ ∂pi − ∂bp
182
+ ∂pi b†
183
+ p
184
+ ��
185
+ .
186
+ (8)
187
+ 4 There is also a fifth charge P4, see [1] for further details.
188
+ 5 Recall that the canonical relation is δv⌟ (A ∧ B) = (δvA)B − A(δvB).
189
+
190
+ 4
191
+ One can then verify that the charges satisfy the usual non-deformed Poincar´e algebra. However,
192
+ due to the effects of κ-deformation, one can also verify that, e.g, [Ni, C] ̸= 0, meaning that CPT
193
+ symmetry is subtly violated. More explicitly, using the definition
194
+ C =
195
+
196
+ d3p (b†
197
+ pap + a†
198
+ pbp),
199
+ (9)
200
+ one can show that [Ni, C] is given by
201
+ i
202
+ 2
203
+
204
+ d3p
205
+
206
+ S(ωp)
207
+
208
+ ∂ap
209
+ ∂S(p)i b†
210
+ p − ap
211
+ ∂b†
212
+ p
213
+ ∂S(p)i +
214
+ ∂a†
215
+ p
216
+ ∂S(p)i bp − a†
217
+ p
218
+ ∂bp
219
+ ∂S(p)i
220
+
221
+ +
222
+ + ωp
223
+
224
+ ∂b†
225
+ p
226
+ ∂pi ap − b†
227
+ p
228
+ ∂ap
229
+ ∂pi + ∂bp
230
+ ∂pi a†
231
+ p − bp
232
+ ∂a†
233
+ p
234
+ ∂pi
235
+ � �
236
+ .
237
+ (10)
238
+ Notice that in the limit κ → ∞ one recovers the canonical result [Ni, C] = 0.
239
+ III.
240
+ COMMENTS AND CONCLUSIONS
241
+ The fact that [Ni, C] ̸= 0 has several important physical consequences. The most apparent one
242
+ is a difference in the decay time between particles and antiparticles. Furthermore, we now have a
243
+ well defined theory which will allow us to study in details the propagator and the n-point functions
244
+ in general. From this point of view, it will be interesting to tackle the loops in this deformed
245
+ context. Finally, what has been done for the case of the complex scalar field will be extended to
246
+ fields of higher spins, in order to expand the discussion to more realistic phenomena.
247
+ ACKNOWLEDGMENTS
248
+ Parts of these works were supported by funds provided by the Polish National Science Center,
249
+ the project number 2019/33/B/ST2/00050.
250
+ [1] M. Arzano, A. Bevilacqua, J. Kowalski-Glikman, G. Rosati, and J. Unger, Phys. Rev. D 103, 106015
251
+ (2021)
252
+ [2] A. Bevilacqua, J. Kowalski-Glikman, and W. Wislicki, Phys. Rev. D 105, 105004 (2022)
253
+ [3] M. Arzano, and J. Kowalski-Glikman, Deformations of Spacetime Symmetries: Gravity, Group-Valued
254
+ Momenta, and Non-Commutative Fields, Lecture Notes in Physics, Springer, 2021.
255
+
-dFAT4oBgHgl3EQfqB3j/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,98 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf,len=97
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
3
+ page_content='08645v1 [gr-qc] 20 Jan 2023 Complex scalar field in κ-Minkowski spacetime Andrea Bevilacqua1, ∗ 1National Centre for Nuclear Research, Pasteura 7, 02-093 Warszawa, Poland It is often expected that one cannot treat spacetime as a continuous manifold as the Planck scale is approached, because of to possible effects due to a quantum theory of gravity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
4
+ page_content=' There have been several proposals to model such a deviation from the classical behaviour, one of which is noncommutativity of spacetime coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
5
+ page_content=' In this context, the non-commutativity scale is seen as an observer-independent length scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
6
+ page_content=' Of course, such a scale impose a modi- fication of ordinary relativistic symmetries, which now need to be deformed to accommodate this fundamental scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
7
+ page_content=' The κ-Poincar´e algebra is an example of this deformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
8
+ page_content=' In what follows I will briefly describe a construction of a κ-deformed complex scalar field theory, while at the same time shedding light on the behaviour of discrete and continuous symme- tries in this formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
9
+ page_content=' This in turn will open the way to the study of the application of this formalism to actual physical processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
10
+ page_content=' I will then conclude with some comments and prospects for the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
11
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
12
+ page_content=' FROM NON-COMMUTATIVE SPACETIME TO THE ACTION We will present a brief preview of the works in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
13
+ page_content=' [1], [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
14
+ page_content=' For a more detailed introduction to the framework and the formalism, see for example Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
15
+ page_content=' [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
16
+ page_content=' The starting point is k-Minkowski spacetime, whose coordinates satisfy the an(3) Lie algebra defined as [ˆx0, ˆxi] = iˆxi/κ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
17
+ page_content=' Notice that one recovers canonical Minkowski spacetime in the formal limit κ → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
18
+ page_content=' To have a more physical understanding of the above commutator, notice that 1/κ has dimensions of length, and it is sometimes identified with the Plank length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
19
+ page_content=' In order to build fields in this spacetime, we need to define plane waves first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
20
+ page_content=' To do so, one can proceed as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
21
+ page_content=' First pick an explicit representation of the an(3) Lie algebra in terms of matrices (it turns out that the lowest dimensional one has dimension 5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
22
+ page_content=' Then, one can define a plane wave as an element ˆek of the relative AN(3) Lie group, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
23
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
24
+ page_content=' for example1 ˆek = exp(ikiˆxi) exp(ik0ˆx0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
25
+ page_content=' Notice that, since the elements of the matrices ˆxµ ∗ andrea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
26
+ page_content='bevilacqua@ncbj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
27
+ page_content='gov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
28
+ page_content='pl 1 A different choice on the ordering results in a change of coordinates in momentum space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
29
+ page_content=' 2 are dimensionful, so are the parameters kµ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
30
+ page_content=' Written explicitly, one has ˆek = \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed ¯p4 κ k κ p0 κ p κ 1 p κ ¯p0 κ − k κ p4 κ \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 (1) where2 p0 = κ sinh k0 κ + k2 2κek0/κ pi = kiek0/κ p4 = κ cosh k0 κ − k2 2κek0/κ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
31
+ page_content=' (2) Both kµ and pA(k) (A = 0, 1, 2, 3, 4) are two different coordinates of momentum space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
32
+ page_content=' Notice that the pA are not independent, since −p0 + p2 + p2 4 = κ2 (notice also that p+ = p0 + p4 > 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
33
+ page_content=' It is therefore clear that momentum space is curved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
34
+ page_content=' This is reflected in a deformed sum of momenta, which is defined through the group property ˆekˆel =: ˆek⊕l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
35
+ page_content=' At the same time, inverse momenta are defined in terms of group inverses ˆe−1 k =: ˆeS(k), and S(k) is called the antipode of k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
36
+ page_content=' In order to simplify the treatment of integrals and derivatives, we can use a3 Weyl map W to send group elements ˆek into canonical plane waves ep := exp(ipµ(k)xµ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
37
+ page_content=' The group law is preserved thanks to the ⋆ product defined by W(ˆek⊕l) = ep(k)⊕q(l) =: ep(k) ⋆ eq(l).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
38
+ page_content=' In general, the ⋆ product is not commutative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
39
+ page_content=' Because of this, we choose the following action for a κ-deformed complex scalar field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
40
+ page_content=' S = 1 2 � R4 d4x[(∂µφ)† ⋆ (∂µφ) + (∂µφ) ⋆ (∂µφ)† − m2(φ† ⋆ φ + φ ⋆ φ†)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
41
+ page_content=' (3) To obtain the equations of motion one usually integrates by parts, but in this deformed context derivatives do not satisfy the Leibniz rule.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
42
+ page_content=' In fact, if they did, one could get the following contra- diction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
43
+ page_content=' i(p ⊕ q)µep⊕q = ∂µ(ep ⋆ eq) = (∂µep) ⋆ eq + ep ⋆ ∂µeq = i(p + q)ep⊕q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
44
+ page_content=' (4) Hence one has to use the appropriate deformations for the Leibniz rules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
45
+ page_content=' After some computations, one can verify that the equations of motion satisfied by the field are the canonical Klein-Gordon equations, and the field which satisfies them can be written as φ(x) = � d3p �2ωp ξ(p)ape−i(ωpt−px) + � d3p∗ � 2|ω∗p| ξ(p)b† p∗ei(S(ωp)t−S(p)x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
46
+ page_content=' (5) 2 The explicit expression of ¯p4 and ¯p0 in terms of kµ is not relevant for the present discussion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
47
+ page_content=' 3 There are several equivalent ways in which a suitable Weyl map can be chosen, see Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
48
+ page_content=' [1] for more details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
49
+ page_content=' 3 The action of the discrete transformations C, P, T can be defined in the usual way in the deformed context, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
50
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
51
+ page_content=' Tφ(t, x)T −1 = φ(−t, x), Pφ(t, x)P −1 = φ(t, −x), and Cφ(t, x)C−1 = φ†(t, x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
52
+ page_content=' Notice that this is due to the presence of the antipode in the on-shell field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
53
+ page_content=' Furthermore, the action is manifestly invariant under both CPT and κ-deformed Lorentz transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
54
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
55
+ page_content=' CHARGES AND FEATURES OF THE MODEL We now need to compute the charges for our model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
56
+ page_content=' There are two main ways to do so.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
57
+ page_content=' The first is by direct computation using the Noether theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
58
+ page_content=' However, the fact that derivatives do not follow the Leibniz rule makes this job a prohibitively difficult one, except for the case of translation charges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
59
+ page_content=' The second way is to use the covariant phase-space formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
60
+ page_content=' Although very direct, this second method needs to be carefully defined in the deformed context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
61
+ page_content=' We chose a hybrid approach, namely we derived the translation charges from the Noether theorem, and then we built a covariant phase space approach which was able to reproduce the translation charges, allowing then to compute the remaining charges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
62
+ page_content=' Given a symplectic form Ω, and a symmetry in spacetime described by the vector field ξ, the charge Qξ can be defined by −δξ⌟ Ω = δQξ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
63
+ page_content=' In this context δξ is a vector field in phase space describing the variation δξA of any physical quantity A in phase space under the action of the symmetry ξ in spacetime, δ is the exterior derivative in phase space, and ⌟ represents a contraction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
64
+ page_content=' The translation charges computed directly from the Noether theorem are the following4: Pµ = � d3p α(p)[−S(p)µa† pap + pµb† p∗bp∗].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
65
+ page_content=' (6) The quantity α(p) is a function of momenta whose explicit expression does not concern us in this context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
66
+ page_content=' To reproduce Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
67
+ page_content=' (6) in the covariant phase space formalism, we need to assume the following deformation of the canonical contraction rule between vector fields and forms5: δv⌟ (A ∧ B) = (δvA)B + A(S(δv)B), (7) where S(δv) can be appropriately defined [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
68
+ page_content=' Using this definition, one can compute all the remaining charges, and the creation/annihilation operators algebra (which turns out to be the canonical one).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
69
+ page_content=' For example, the boost charge Ni is Ni=− 1 2 � d3p α � S(ωp) � ∂a† p ∂S(p)i ap −a† p ∂ap ∂S(p)i � +ωp � bp ∂b† p ∂pi − ∂bp ∂pi b† p �� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
70
+ page_content=' (8) 4 There is also a fifth charge P4, see [1] for further details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
71
+ page_content=' 5 Recall that the canonical relation is δv⌟ (A ∧ B) = (δvA)B − A(δvB).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
72
+ page_content=' 4 One can then verify that the charges satisfy the usual non-deformed Poincar´e algebra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
73
+ page_content=' However, due to the effects of κ-deformation, one can also verify that, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
74
+ page_content='g, [Ni, C] ̸= 0, meaning that CPT symmetry is subtly violated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
75
+ page_content=' More explicitly, using the definition C = � d3p (b† pap + a† pbp), (9) one can show that [Ni, C] is given by i 2 � d3p � S(ωp) � ∂ap ∂S(p)i b† p − ap ∂b† p ∂S(p)i + ∂a† p ∂S(p)i bp − a† p ∂bp ∂S(p)i � + + ωp � ∂b† p ∂pi ap − b† p ∂ap ∂pi + ∂bp ∂pi a† p − bp ∂a† p ∂pi � � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
76
+ page_content=' (10) Notice that in the limit κ → ∞ one recovers the canonical result [Ni, C] = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
77
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
78
+ page_content=' COMMENTS AND CONCLUSIONS The fact that [Ni, C] ̸= 0 has several important physical consequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
79
+ page_content=' The most apparent one is a difference in the decay time between particles and antiparticles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
80
+ page_content=' Furthermore, we now have a well defined theory which will allow us to study in details the propagator and the n-point functions in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
81
+ page_content=' From this point of view, it will be interesting to tackle the loops in this deformed context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
82
+ page_content=' Finally, what has been done for the case of the complex scalar field will be extended to fields of higher spins, in order to expand the discussion to more realistic phenomena.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
83
+ page_content=' ACKNOWLEDGMENTS Parts of these works were supported by funds provided by the Polish National Science Center, the project number 2019/33/B/ST2/00050.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
84
+ page_content=' [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
85
+ page_content=' Arzano, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
86
+ page_content=' Bevilacqua, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
87
+ page_content=' Kowalski-Glikman, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
88
+ page_content=' Rosati, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
89
+ page_content=' Unger, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
90
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
91
+ page_content=' D 103, 106015 (2021) [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
92
+ page_content=' Bevilacqua, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
93
+ page_content=' Kowalski-Glikman, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
94
+ page_content=' Wislicki, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
95
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
96
+ page_content=' D 105, 105004 (2022) [3] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
97
+ page_content=' Arzano, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
98
+ page_content=' Kowalski-Glikman, Deformations of Spacetime Symmetries: Gravity, Group-Valued Momenta, and Non-Commutative Fields, Lecture Notes in Physics, Springer, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-dFAT4oBgHgl3EQfqB3j/content/2301.08645v1.pdf'}
.gitattributes CHANGED
@@ -5256,3 +5256,58 @@ rdAyT4oBgHgl3EQfZvcN/content/2301.00227v1.pdf filter=lfs diff=lfs merge=lfs -tex
5256
  XtAzT4oBgHgl3EQfYvw0/content/2301.01339v1.pdf filter=lfs diff=lfs merge=lfs -text
5257
  INAzT4oBgHgl3EQfxv6_/content/2301.01744v1.pdf filter=lfs diff=lfs merge=lfs -text
5258
  6NFKT4oBgHgl3EQf_C4s/content/2301.11960v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5256
  XtAzT4oBgHgl3EQfYvw0/content/2301.01339v1.pdf filter=lfs diff=lfs merge=lfs -text
5257
  INAzT4oBgHgl3EQfxv6_/content/2301.01744v1.pdf filter=lfs diff=lfs merge=lfs -text
5258
  6NFKT4oBgHgl3EQf_C4s/content/2301.11960v1.pdf filter=lfs diff=lfs merge=lfs -text
5259
+ UdE3T4oBgHgl3EQfEgk6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5260
+ q9FST4oBgHgl3EQfPDjc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5261
+ utE3T4oBgHgl3EQfNwlp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5262
+ OdAzT4oBgHgl3EQfzf5C/content/2301.01769v1.pdf filter=lfs diff=lfs merge=lfs -text
5263
+ cNFKT4oBgHgl3EQfpi4R/content/2301.11870v1.pdf filter=lfs diff=lfs merge=lfs -text
5264
+ DNFQT4oBgHgl3EQfPTY7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5265
+ YdFRT4oBgHgl3EQfOje2/content/2301.13514v1.pdf filter=lfs diff=lfs merge=lfs -text
5266
+ 6NFKT4oBgHgl3EQf_C4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5267
+ RNAzT4oBgHgl3EQfXPwH/content/2301.01313v1.pdf filter=lfs diff=lfs merge=lfs -text
5268
+ gdE2T4oBgHgl3EQfyQgz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5269
+ YNE2T4oBgHgl3EQfEAby/content/2301.03632v1.pdf filter=lfs diff=lfs merge=lfs -text
5270
+ XtAzT4oBgHgl3EQfYvw0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5271
+ DNFQT4oBgHgl3EQfPTY7/content/2301.13278v1.pdf filter=lfs diff=lfs merge=lfs -text
5272
+ E9AyT4oBgHgl3EQfSfeg/content/2301.00088v1.pdf filter=lfs diff=lfs merge=lfs -text
5273
+ PNAyT4oBgHgl3EQfg_jD/content/2301.00370v1.pdf filter=lfs diff=lfs merge=lfs -text
5274
+ EdE0T4oBgHgl3EQfywKq/content/2301.02664v1.pdf filter=lfs diff=lfs merge=lfs -text
5275
+ EdE0T4oBgHgl3EQfywKq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5276
+ W9AzT4oBgHgl3EQfYfyH/content/2301.01336v1.pdf filter=lfs diff=lfs merge=lfs -text
5277
+ utE3T4oBgHgl3EQfNwlp/content/2301.04386v1.pdf filter=lfs diff=lfs merge=lfs -text
5278
+ 69E1T4oBgHgl3EQfnASE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5279
+ wtFLT4oBgHgl3EQflS8f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5280
+ PNAyT4oBgHgl3EQfg_jD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5281
+ W9AzT4oBgHgl3EQfYfyH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5282
+ 1dE0T4oBgHgl3EQfdgBe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5283
+ rdAyT4oBgHgl3EQfZvcN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5284
+ KdE2T4oBgHgl3EQfAgZ0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5285
+ VtE5T4oBgHgl3EQfBg7N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5286
+ wtFLT4oBgHgl3EQflS8f/content/2301.12118v1.pdf filter=lfs diff=lfs merge=lfs -text
5287
+ bNE5T4oBgHgl3EQfEA7m/content/2301.05411v1.pdf filter=lfs diff=lfs merge=lfs -text
5288
+ qtAzT4oBgHgl3EQf5_4s/content/2301.01867v1.pdf filter=lfs diff=lfs merge=lfs -text
5289
+ YtFPT4oBgHgl3EQftzUO/content/2301.13153v1.pdf filter=lfs diff=lfs merge=lfs -text
5290
+ I9AzT4oBgHgl3EQfx_6k/content/2301.01747v1.pdf filter=lfs diff=lfs merge=lfs -text
5291
+ YtFPT4oBgHgl3EQftzUO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5292
+ C9AzT4oBgHgl3EQfwf5z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5293
+ r9AyT4oBgHgl3EQfmfgv/content/2301.00470v1.pdf filter=lfs diff=lfs merge=lfs -text
5294
+ yNAzT4oBgHgl3EQfQvuD/content/2301.01204v1.pdf filter=lfs diff=lfs merge=lfs -text
5295
+ YNE3T4oBgHgl3EQf1wsI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5296
+ KdE2T4oBgHgl3EQfAgZ0/content/2301.03592v1.pdf filter=lfs diff=lfs merge=lfs -text
5297
+ LtE1T4oBgHgl3EQftAUX/content/2301.03371v1.pdf filter=lfs diff=lfs merge=lfs -text
5298
+ C9AzT4oBgHgl3EQfwf5z/content/2301.01723v1.pdf filter=lfs diff=lfs merge=lfs -text
5299
+ 9dE3T4oBgHgl3EQfrApq/content/2301.04656v1.pdf filter=lfs diff=lfs merge=lfs -text
5300
+ YNE2T4oBgHgl3EQfEAby/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5301
+ 09E0T4oBgHgl3EQfdQDB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5302
+ bNE5T4oBgHgl3EQfEA7m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5303
+ 09E0T4oBgHgl3EQfdQDB/content/2301.02375v1.pdf filter=lfs diff=lfs merge=lfs -text
5304
+ ndE_T4oBgHgl3EQf7xw1/content/2301.08371v1.pdf filter=lfs diff=lfs merge=lfs -text
5305
+ EdE1T4oBgHgl3EQf-gYV/content/2301.03568v1.pdf filter=lfs diff=lfs merge=lfs -text
5306
+ YdFRT4oBgHgl3EQfOje2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5307
+ WNE0T4oBgHgl3EQfmAF1/content/2301.02493v1.pdf filter=lfs diff=lfs merge=lfs -text
5308
+ RNAzT4oBgHgl3EQfXPwH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5309
+ NNFJT4oBgHgl3EQfzi34/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5310
+ NNFJT4oBgHgl3EQfzi34/content/2301.11644v1.pdf filter=lfs diff=lfs merge=lfs -text
5311
+ ndE_T4oBgHgl3EQf7xw1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5312
+ INAzT4oBgHgl3EQfxv6_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5313
+ OdAzT4oBgHgl3EQfzf5C/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
09E0T4oBgHgl3EQfdQDB/content/2301.02375v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:40e9e2adf53efa7ac46436443030a3589fe71121eb96d9e5bd64440b83376e91
3
+ size 3410635
09E0T4oBgHgl3EQfdQDB/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:60f5dde875d8e73594f3493beb7ab9e5982101703182b4f6fadb8db3f63d25cc
3
+ size 3670061
09E0T4oBgHgl3EQfdQDB/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bfc79d34800cd1e9b0f86e5739b604db3489858dcadd6135f5f63b00c0f11e2e
3
+ size 147910
09FIT4oBgHgl3EQf3Sv5/content/tmp_files/2301.11381v1.pdf.txt ADDED
@@ -0,0 +1,1541 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Imaging anisotropic waveguide exciton polaritons in tin sulfide
2
+
3
+ Yilong Luan1,2, Hamidreza Zobeiri3, Xinwei Wang3, Eli Sutter4,5, Peter Sutter6*, Zhe Fei1,2*
4
+
5
+ 1Department of Physics and Astronomy, Iowa State University, Ames, Iowa 50011, USA
6
+ 2Ames Laboratory, U. S. Department of Energy, Iowa State University, Ames, Iowa 50011, USA
7
+ 3Department of Mechanical Engineering, Iowa State University, Ames, IA 50011, USA
8
+ 4Department of Mechanical and Materials Engineering, University of Nebraska-Lincoln, Lincoln, NE
9
+ 68588, USA
10
+ 5Nebraska Center for Materials and Nanoscience, University of Nebraska-Lincoln, Lincoln, NE 68588,
11
+ USA.
12
+ 6Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588,
13
+ USA
14
+
15
+ *Corresponding to: (P.S.) psutter@unl.edu, (Z.F.) zfei@iastate.edu.
16
+
17
+ Abstract
18
+ In recent years, novel materials supporting in-plane anisotropic polaritons have attracted a lot of
19
+ research interest due to their capability of shaping nanoscale field distributions and controlling
20
+ nanophotonic energy flows. Here we report a nano-optical imaging study of waveguide exciton polaritons
21
+ (EPs) in tin sulfide (SnS) in the near-infrared (IR) region using the scattering-type scanning near-field
22
+ optical microscopy (s-SNOM). With s-SNOM, we mapped in real space the propagative EPs in SnS, which
23
+ show sensitive dependence on the excitation energy and sample thickness. Moreover, we found that both
24
+ the polariton wavelength and propagation length are anisotropic in the sample plane. In particular, in a
25
+ narrow spectral range from 1.32 to 1.44 eV, the EPs demonstrate quasi-one-dimensional propagation, which
26
+ is rarely seen in natural polaritonic materials. Further analysis indicates that the observed polariton
27
+ anisotropy is originated from the different optical bandgaps and exciton binding energies along the two
28
+ principal crystal axes of SnS.
29
+
30
+ Key Words: Tin sulfide, waveguide, exciton polaritons, s-SNOM, anisotropy, quasi-one-dimensional
31
+
32
+ Main text
33
+ In-plane anisotropic polaritons1,2 were first studied in metasurfaces3-5 where nanostructuring of the
34
+ polaritonic media or substrates breaks the symmetry, thus enabling polaritonic anisotropy. Later, several
35
+ natural materials were predicted and/or experimentally confirmed to support in-plane anisotropic
36
+ polaritons.6-10 For example, anisotropic plasmon polaritons and hybrid plasmon-phonon polaritons were
37
+ observed in black phosphorus carbides with far-field infrared (IR) spectroscopy.8 Anisotropic phonon
38
+ polaritons with hyperbolic wavefronts were imaged in MoO3,9-11 which can be conveniently tailored by
39
+ controlling the sample thickness and by stack- and twist-engineering.12-18 Compared to nano-engineered
40
+ anisotropic metasurfaces, natural materials with intrinsic anisotropic polaritons are generally more
41
+ convenient for applications and can avoid potential material quality degradation due to complex nano-
42
+ fabrications. Despite these advantages, natural materials supporting in-plane anisotropic polaritons are rare
43
+ and are so far mainly studied in the mid-IR range. New materials enabling anisotropic polaritons in other
44
+ technologically important spectral regions (e.g., near-IR and visible) are desired.
45
+ In this Letter, we report the experimental discovery of strongly-anisotropic exciton polaritons (EPs)
46
+ in tin sulfide (SnS) in the technologically-important near-IR region. SnS is a post-transition-metal
47
+ monochalcogenide and a van der Waals (vdW) layered semiconductor with an orthorhombic structure,
48
+ analogous to that of black phosphorous.6-7 As sketched in Figure 1b, the two in-plane axes of SnS, namely
49
+ the a and b axes, are along the zigzag and armchair directions, respectively. SnS has been widely studied
50
+ due to its unique anisotropic optoelectronic properties19-23 and potential applications related to
51
+ photodetection and solar energy harvesting.24-27 In particular, the energies of excitons or optical bandgaps
52
+
53
+ along the a and b axes of SnS are about Ea ≈ 1.39 eV and Eb ≈ 1.66 eV respectively,22,23 which directly
54
+ impact the polaritonic responses. Note that EPs have previously been studied in other vdW semiconductors
55
+ (e.g. WSe2, MoSe2, etc.) with imaging28-32 and spectroscopic methods,33-37 where the EPs are isotropic in the
56
+ sample plane. The samples studied here are SnS microcrystals supported on mica wafers (Figure S1a). As
57
+ introduced in detail in the earlier work,19 these microcrystals have a wrap-around layered core-shell
58
+ structure: the thick SnS core is coated with a thin crystalline shell (thickness ≈ 3 nm) of layered tin disulfide
59
+ (SnS2). A detailed characterization of the wrap-around core-shell structures and their synthesis process were
60
+ reported in the earlier work.19 Note that the thin SnS shell is isotropic in the sample plane38,39, so the
61
+ observed anisotropic properties of EPs are solely due to the SnS core. The SnS2 shell mainly serves as a
62
+ protection layer of the SnS core and the waveguide EPs. Detailed discussions about the effect of the SnS2
63
+ shell are given in the Supporting Information.
64
+
65
+ To excite and probe EPs in SnS, we employed a scattering-type scanning near-field optical
66
+ microscope (s-SNOM) that was built based on an atomic force microscope (AFM). As illustrated in Figure
67
+ 1a, the sharp metalized tip in s-SNOM excited by a p-polarized laser beam generates strong evanescent
68
+ fields underneath the tip. These evanescent fields with a wide range of wavevectors40 can effectively excite
69
+ transverse-magnetic (TM) polaritons inside the sample.29 The excitation source used in the study is a
70
+ broadband (1.24-1.77 eV) Ti:sapphire laser that covers the bandgap and exciton energies of SnS (see
71
+ discussions below). We used a parabolic mirror to focus the laser beam at the tip apex, and the scattered
72
+ photons off the tip/sample system are collected by the same parabolic mirror and then counted by a
73
+ photodetector. More introductions about the nano-optical setup are in Supporting Information.
74
+
75
+ In Figure 1c, we plot the AFM topography image of a typical SnS microcrystal coated with a thin
76
+ SnS2 shell.19 The lateral sizes of the crystal are approximately 6-8 m, and the thickness is about 100 nm
77
+ including the SnS2 shell. Here the crystal has a total of eight edges, among which the four short edges are
78
+ along the a or b axes.19 We were able to determine the crystal axes of the sample by examining the shape
79
+ of the crystal and by Raman spectroscopy (see Supporting Information). Figure 1d plots the near-field
80
+ amplitude (s) images taken simultaneously with the topography image (Figure 1c) at the excitation energy
81
+ of E = 1.38 eV. Here, the in-plane wavevector of the laser (kin) is along the b axis of SnS. From Figure 1d,
82
+ one can see many interference fringes and oscillations inside the sample. We focus on a string of one-
83
+ dimensional (1D) oscillations extending from the left edge to the crystal center along the b axis (marked
84
+ with a white arrow). According to previous studies,29,30 these oscillations are generated due to the
85
+ interference between two major beam paths as sketched in Figure 1a. In the first path (P1), the excitation
86
+ photons are scattered back directly by the tip apex. In the second path (P2), the excitation photons are first
87
+ transferred into waveguide EPs by the s-SNOM tip. These EPs then propagate toward the sample edge and
88
+ get scattered into photons. Photons collected through the two beam paths are coherent with each other, so
89
+ they can generate interference. When scanning the tip perpendicular to the sample edge, the distance
90
+ between the tip and the sample edge varies, so a string of bright and dark spots forms due to constructive
91
+ and destructive interferences, respectively. As sketched in Figure 1a, the left short edge of the crystal is
92
+ responsible for the generation of the 1D interference oscillations along the direction of the white arrow in
93
+ Figure 1d. Other edges can also scatter EPs into photons and generate interference patterns. For example,
94
+ the four long edges that are about 43º relative to the b axis are responsible for the bight fringes parallel to
95
+ these edges (see Figure S2b). There are other possible interference mechanisms (e.g., edge excitation of
96
+ polaritons), but they are not responsible for the fringes/oscillations observed in our samples. Detailed
97
+ discussions of different interference mechanisms are given in Section 3 of the Supporting Information.
98
+ From Fig. 1d,f, we also seen fringes on the substrate side, which are generated due to the excitation and
99
+ scattering of photons at the air/mica interface as confirmed by dispersion analysis (see Figure S10).
100
+ Figure 1e,f plot the AFM and corresponding s-SNOM imaging data of the same crystal as those in
101
+ Figure 1c,d but rotated 90º relative to the surface normal (c axis). Here the in-plane wavevector of the
102
+ excitation laser is along the a axis (kin // a). Interestingly, we found no interference oscillations in the interior
103
+ of the crystal as those seen in Figure 1d, indicating that no waveguide EPs are propagating along the a axis.
104
+ To further explore the anisotropic polaritonic responses, we performed energy-dependent s-SNOM imaging.
105
+ The results are shown in Figure 2, where we plot the s-SNOM imaging data with kin along both the b axis
106
+
107
+ (Figure 2a-e) and a axis (Figure 2f-j) at various excitation energies. Again, we focus on the 1D oscillations
108
+ at the crystal center (along the direction of the white arrows) that evolve systematically with E. For kin // b,
109
+ the oscillations are clearly seen for photon energies from 1.29 to 1.48 eV, and their periods decrease with
110
+ increasing energy. In the case of kin // a, the interference oscillations appear only at energies below 1.32 eV,
111
+ and there are no clear 1D oscillations from 1.38 to 1.48 eV.
112
+
113
+ The s-SNOM imaging data shown in Figures 1 and 2 provide direct evidence of in-plane anisotropic
114
+ EPs of SnS in the near-IR region. To support the experimental data, we performed finite-element
115
+ simulations of the waveguide EPs using Comsol Multiphysics. In the model, we placed a vertically
116
+ polarized excitation dipole (pz) right above the sample surface. The optical constants of SnS and SnS2 were
117
+ obtained from the literature.22,23,38,39 A detailed description of the Comsol model is given in Supporting
118
+ Information. The simulation results are shown in Figure 2k-o and Figure S5, where we plot the real-space
119
+ images of polariton field amplitude (|Ez|) and polariton field (Ez) of EPs respectively. Here the EPs are
120
+ launched by a vertically polarized dipole (pz) located at the center of the image. At E = 1.29 eV (Figure 2k),
121
+ the dipole-launched anisotropic EPs propagate at all directions with elliptic wavefronts. As E increases to
122
+ 1.32 eV (Figure 2l), the EPs show a faster decay along the a axis while keeping a relatively long propagation
123
+ distance along the b axis. The propagation along the a axis is even shorter at higher energies E ≥ 1.38 eV
124
+ (Figure 2m-o). As a result, the EPs appear to be quasi-1D along the b axis. The polaritonic simulations are
125
+ consistent with s-SNOM imaging data in Figures 1 and 2.
126
+
127
+ With the s-SNOM imaging data and Comsol simulation results, we were able to perform a
128
+ quantitative analysis of the dispersion and propagation properties of the anisotropic EPs. In Figure 3a,c, we
129
+ plot the line profiles extracted across the 1D interference oscillations in the energy-dependent s-SNOM
130
+ images (Figure 2). We then performed Fourier transforms (FTs) of these profiles to accurately obtain the
131
+ periods () of the interference oscillations that are linked to the polariton wavelength (p) in the following
132
+ relationship:29,30
133
+
134
+ 0/ ≡ k/k0 ≈ 0/p – cos . (1)
135
+
136
+ Here, λ0 is the excitation photon wavelength, k0 = 2π/λ0 is the free-space photon wavevector, kρ = 2π/ρ is
137
+ the inverse period of the interference oscillations, and  ≈ 30º is the incidence angle of the laser beam
138
+ relative to the sample plane (see Figure 1a). The FT profiles for kin // b and kin // a are shown respectively
139
+ in Figures 3b and 3d, where the peaks (marked with blue arrows) correspond to k. We then determined the
140
+ polariton wavevector (kp = 2π/p) using Eq. (1) for every given excitation energy, based on which we obtain
141
+ the energy-momentum dispersion relations of the EPs.
142
+
143
+ The experimental dispersion data points of EPs obtained through FT analysis (Figure 3b,d) are
144
+ plotted in Figure 4a,b as black squares, which are sitting on the theoretical dispersion colormaps. In the
145
+ colormaps, we plot the imaginary part of the reflection coefficients Im(rp) that represents the photonic
146
+ density of states (see Supporting Information). Here the TM waveguide modes are visualized as bright
147
+ curves (marked with blue dashed curves).29 In addition to the dispersion relations, the Im(rp) colormaps also
148
+ reveal the mode broadening (k) that corresponds to the damping (see discussions in the following
149
+ paragraph). This method of dispersion calculation has been widely used in the studies of polaritons in a
150
+ variety of materials.29,30,40,41 In the dispersion diagrams, we also plot the dispersion data points extracted
151
+ from Comsol simulations (Figure 2k-o and Figure S5). The dispersion relations of the EPs from
152
+ experimental data, Comsol simulations, and the Im(rp) colormaps are consistent with each other, which
153
+ validates our experimental and theoretical approaches. From the dispersion diagrams, we can examine the
154
+ light-exciton interactions close to the exciton energies Ea and Eb (marked with white dashed lines in Figure
155
+ 4a,b). The waveguide mode along the b axis exhibits a clear back-bending behavior that is a signature
156
+ behavior of light-exciton interactions.28,29 By fitting the dispersion with the coupled oscillator model, we
157
+ were able to determine the Rabi splitting energy (~160 meV), which is larger than the average polariton
158
+ linewidth (~105 meV) (see Supporting Information). Therefore, the EPs along the b axis are in the strong
159
+ coupling regime. The mode coupling is much weaker along the a axis, likely due to the small exciton
160
+
161
+ binding energy. According to literature,22 excitons along the b axis are robust with a binding energy of ~
162
+ 50 meV. The binding energy of excitons along the a axis, on the other hand, is much smaller and Ea is close
163
+ to the fundamental bandgap.22 The light-exciton coupling is much stronger at lower temperatures (e.g., T =
164
+ 27 K) with more prominent mode bending features close to the exciton energies (Figure S8).
165
+
166
+ In addition to the polariton dispersion, we also extracted the propagation lengths (Lep) of the EPs
167
+ (Lep ≡ 1/[2Im(kep)]). The extraction was done by fitting the decay trend of the polariton oscillations from
168
+ both the s-SNOM data (Figure 2a-j) and Comsol simulations (Figure 2k-o and Figure S5). A detailed
169
+ description of the fitting procedures is given in the Supporting Information. As shown in Figure 4c,d, Lep
170
+ along both the a and b axes are over 3 m at E = 1.29 eV. With increasing E, Lep drops systematically along
171
+ both directions, but the drop along the a axis is much faster. As E approaches Ea ≈ 1.39 eV, Lep along the a
172
+ axis drops below 1 m and becomes unmeasurable. Lep along the b axis, on the other hand, is as high as 2.5
173
+ m at E = 1.38 eV, where quasi-1D EPs were observed (Figure 1d,f). Lep drops to 1 m or below along the
174
+ b axis when E gets close to Eb ≈ 1.66 eV. The energy dependence of Lep is fully consistent with the mode
175
+ broadening behaviors shown in the theoretical dispersion colormaps in Figure 4. The larger the polariton
176
+ width (k), the smaller the propagation length.
177
+
178
+ Finally, we explored the dependence of EPs on the thicknesses of SnS crystals. In Figure 5a, we
179
+ plot the nano-optical images of SnS microcrystals with various thicknesses (d) taken at an excitation energy
180
+ of E = 1.38 eV. Due to the strong damping of EPs along the a axis, we only show in Figure 5 the data
181
+ images with the excitation along the b axis (kin // b). We focus on the 1D interference oscillations (Figures
182
+ 1 and 2), which evolve systematically with varying thicknesses. Figure 5b plots the line profiles taken
183
+ directly across the 1D oscillations in Figure 5a. Using Fourier transform and Eq. (1), we extracted the
184
+ polariton wavelengths p at different sample thicknesses, which are plotted in Figure 5c. Here one can see
185
+ that p decreases systematically with increasing d, which is expected since the crystal thickness determines
186
+ both the out-of-plane (kz ~ 1/d) and in-plane wavevectors of the waveguide mode.42 For samples with
187
+ thicknesses over 150 nm, p drops below 300 nm that is 3 times smaller than the photon wavelength 0 =
188
+ 900 nm. The mode confinement is comparable to if not better than waveguide EPs in other materials.29-32
189
+
190
+ In summary, we have performed a comprehensive nano-optical study of SnS microcrystals using
191
+ s-SNOM. We found through near-field imaging that SnS supports waveguide EPs in near-IR, which are
192
+ sensitively dependent on both the excitation energy and sample thickness. More interestingly, both the
193
+ dispersion and transport properties of the EPs are strongly anisotropic in the sample plane. In particular, in
194
+ the energy range from 1.35 to 1.55 eV, the EPs show quasi-1D propagation along the b axis, which has not
195
+ been reported in other natural polaritonic materials. Future studies with a pump-probe s-SNOM setup31,32
196
+ are expected for the exploration of the ultrafast dynamics of anisotropic EPs in SnS. It is also interesting to
197
+ study TE waveguide EPs of SnS that could be seen in atomically thin crystals, where active tunability of
198
+ EPs is possible with electrical gating.
199
+
200
+ The anisotropic EPs discovered here in SnS are promising for a variety of applications. One
201
+ potential application is low-pass waveguide filters for planar photonic circuits. The cut-off energies of the
202
+ filters can be chosen by selecting the direction of signals propagating through the waveguide (i.e., along a
203
+ or b axes), Another possible application is selective nanophotonic interconnection. A concept device is
204
+ sketched in Figure S13, where the signal source is connecting two devices through an SnS interconnector.
205
+ The two ports for the two devices are along the a and b axes, respectively. When the incident photonic
206
+ signal (e.g., on or off signals) is at energies of E ≤ 1.29 eV, EPs can propagate along all directions in SnS,
207
+ so both devices can receive the signal. When the incident photonic signal is at energies of 1.38 eV ≤ E ≤
208
+ 1.48 eV, EPs propagate only along the b axis, so device 2 will not receive the signal. Therefore, the signal
209
+ interconnection can be controlled selectively by choosing different energies of the incident signals. Such a
210
+ directional control of the flow of nanophotonic energy and signals cannot be easily realized in isotropic
211
+ polaritonic materials without complicated nano-fabrications. With the potential controllability or tunability
212
+ by chemical doping or electrical gating, SnS-based polaritonic devices could play an important role in future
213
+ planar optics43 in the technologically important near-IR region.
214
+
215
+
216
+ Supporting Information
217
+ Nano-optics setup; Determination of the crystal axes of SnS; Interference mechanisms; COMSOL
218
+ simulations; Dispersion calculations; Low-temperature dispersion of EPs in SnS; Effect of the SnS2 shell
219
+ on waveguide EPs; Photonic mode at the air/mica interface; Extraction of the propagation lengths of EPs;
220
+ Coupling strength of EPs
221
+
222
+ Corresponding Authors
223
+ Peter Sutter, Email: psutter@unl.edu,
224
+ Zhe Fei, Email: zfei@iastate.edu.
225
+
226
+ Notes
227
+ The authors declare no competing interests.
228
+
229
+ Acknowledgments
230
+
231
+ This work is supported by the National Science Foundation under Grant No. DMR-1945560. The
232
+ nano-optics setup used in the work is supported in part by Ames Laboratory. Ames Laboratory is operated
233
+ for the U.S. Department of Energy by Iowa State University under Grant No. DE-AC02-07CH11358.
234
+ Materials synthesis, electron microscopy, and complementary cathodoluminescence spectroscopy by E.S.
235
+ and P.S. were supported by the National Science Foundation, Division of Materials Research, Solid State
236
+ and Materials Chemistry Program under Grant No. DMR-1904843. H.Z. and X.W. are grateful for the
237
+ support from National Science Foundation under Grant No. CBET-1930866 and CMMI-203246.
238
+
239
+ References
240
+ (1) Ma, W.; Shabbir, B.; Ou, Q.; Dong, Y.; Chen, H.; Li, P.; Zhang, X.; Lu, Y.; Bao, Q. Anisotropic
241
+ polaritons in van der Waals materials. InfoMat. 2020, 2, 777-790.
242
+ (2) Wang, C.; Zhang, G.; Huang, S.; Xie, Y.; Yan, H. The Optical Properties and Plasmonics of Anisotropic
243
+ 2D Materials. Adv. Optical Mater. 2020, 8, 1900996.
244
+ (3) Li, P.; Dolado, I.; Alfaro-Mozaz, F. J.; Casanova, F.; Hueso, L. E.; Liu, S.; Edgar, J. H.; Nikitin, A. Y.;
245
+ Vélez, S.; Hillenbrand, R. Infrared hyperbolic metasurface based on nanostructured van der Waals
246
+ materials. Science 2018, 359, 892-896.
247
+ (4) Chevrier, K.; Benoit, J. M.; Symonds, C.; Saikin, S. K.; Yuen-Zhou, J.; Bellessa, J. Anisotropy and
248
+ Controllable Band Structure in Suprawavelength Polaritonic Metasurfaces. Phys. Rev. Lett. 2019, 122,
249
+ 173902.
250
+ (5) High, A. A.; Devlin, R. C.; Dibos, A.; Polking, M.; Wild, D. S.; Perczel, J.; de Leon N. P.; Lukin, M.
251
+ D.; Park, H. Visible-frequency hyperbolic metasurface. Nature 2015, 522, 192-196.
252
+ (6) Correas-Serrano, D; Gomez-Diaz, J; Melcon, A. A.; Alù, A. Black phosphorus plasmonics: anisotropic
253
+ elliptical propagation and nonlocality-induced canalization. J. Optics 2016, 18, 104006.
254
+ (7) Lee, I.-H.; Martin-Moreno, L.; Mohr, D. A.; Khaliji, K.; Low, T.; Oh, S. H. Anisotropic acoustic
255
+ plasmons in black phosphorus. ACS Photon. 2018, 5, 2208-2216.
256
+ (8) Huang, X.; Cai, Y.; Feng, X.; Tan. W. C.; Hansan, D. M. N.; Chen, L.; Chen, N.; Wang, L.; Huang, L.;
257
+ Duffin, T. J.; Nijhuis, C. A.; Zhang, Y.-W.; Lee, C.; Ang, K.-W. Black Phosphorus Carbide as a
258
+ Tunable Anisotropic Plasmonic Metasurface. ACS Photon. 2018, 5, 3116-3123.
259
+ (9) Ma, W.; Alonso-González, P; Li, S.; Nikitin, A. Y.; Yuan, J.; Martín-Sánchez, J.; Taboada-Gutiérrez,
260
+ J.; Amenabar, I.; Li, P.; Vélez, S.; Tollan, C.; Dai, Z.; Zhang, Y.; Sriram, S.; Kalantar-Zadeh, K.; Lee,
261
+ S.-T.; Hillenbrand, R.; Bao, Q. In-plane anisotropic and ultra-low-loss polaritons in a natural van der
262
+ Waals crystal. Nature 2018, 562, 557-562.
263
+ (10)
264
+ Zheng, Z.; Chen, J.; Wang, Y.; Wang, X.; Chen, X.; Liu, P.; Xu, J.; Xie, W.; Chen, H.; Deng, S.;
265
+ Xu, N. Highly Confined and Tunable Hyperbolic Phonon Polaritons in Van Der Waals Semiconducting
266
+ Transition Metal Oxides. Adv. Mater. 2018, 30, 1705318.
267
+
268
+ (11)
269
+ Zheng Z.; Xu N.; Oscurato S. L.; Tamagnone, M.; Sun, F.; Jiang, Y.; Ke, Y.; Chen, J.; Huang, W.;
270
+ Wilson, W. L. Ambrosio, A.; Deng, S.; Chen, H. A mid-infrared biaxial hyperbolic van der Waals
271
+ crystal. Sci. Adv. 2019, 5, eaav8690.
272
+ (12)
273
+ Duan, J.; G. Álvarez-Pérez, View ProfileK. V. Voronin, I. Prieto, J. Taboada-Gutiérrez, V. S.
274
+ Volkov, J. Martín-Sánchez, A. Y. Nikitin, and P. Alonso-González. Enabling propagation of
275
+ anisotropic polaritons along forbidden directions via a topological transition. Sci. Adv. 2021, 7,
276
+ eabf2690.
277
+ (13)
278
+ Zhang, Q.; Ou, Q.; Hu, G.; Liu, J.; Dai, Z.; Fuhrer, M. S.; Bao, Q.; Qiu, C.-W. Hybridized
279
+ Hyperbolic Surface Phonon Polaritons at α‑MoO3 and Polar Dielectric Interfaces. Nano Lett. 2021, 21,
280
+ 3112-3119.
281
+ (14)
282
+ Hu, G.; Krasnok, A.; Mazor, Y.; Qiu, C.-W.; Alù, A. Moire Hyperbolic Metasurfaces. Nano Lett.
283
+ 2020, 20, 3217−3224.
284
+ (15)
285
+ Hu, G.; Ou, Q.; Si. G.; Wu, Y.; Wu, J.; Dai, Z.; Krasnok, A.; Mazor, Y.; Zhang, Q.; Bao, Q.; Qiu,
286
+ C.-W.; Alù, A. Topological polaritons and photonic magic angles in twisted α-MoO3 bilayers. Nature
287
+ 2020, 582, 209−213.
288
+ (16)
289
+ Zheng, Z.; Su, F.; Huang, W.; Jiang, J.; Zhan, R.; Ke, Y.; Chen, H.; Deng S. Phonon Polaritons in
290
+ Twisted Double-Layers of Hyperbolic van der Waals Crystals. Nano Lett. 2020, 20, 5301−5308.
291
+ (17)
292
+ Duan, J.; Capote-Robayna, N.; Taboada-Gutierrez, J.; Álvarez-Pérez, G.; Prieto, I.; Martín-Sanchez,
293
+ J.; Nikitin, A. Y.; Alonso-González, P. Twisted Nano-Optics: Manipulating Light at the Nanoscale with
294
+ Twisted Phonon Polaritonic Slabs. Nano Lett. 2020, 20, 5323−5329.
295
+ (18)
296
+ Chen, M.; Lin, X.; Dinh, T. H.; Zheng, Z.; Shen, J.; Ma, Q.; Chen, H.; Jarillo-Herrero, P.; Dai, S.
297
+ Configurable phonon polaritons in twisted α-MoO3. Nat. Mater. 2020, 19, 1−5.
298
+ (19)
299
+ Sutter, P.; Wang, J.; Sutter, E. Wrap-Around Core–Shell Heterostructures of Layered Crystals. Adv.
300
+ Mater. 2019, 31, 1902166.
301
+ (20)
302
+ Lin. S.; Carvalho, C.; Yan, S.; Li, R.; Kim, S.; Rodin, A.; Carvalho, L.; Chan, E. M.; Wang, X.;
303
+ Castro Neto, A. H.; Yao, J. Accessing valley degree of freedom in bulk Tin(II) sulfide at room
304
+ temperature. Nat. Commun. 2018, 9, 1455.
305
+ (21)
306
+ Banai, R. E.; Burton, L. A.; Choi, S. G.; Hofherr, F.; Sorgenfrei, T.; Walsh, A.; To, B.; Gröll, A.;
307
+ Brownson, J. R. S. Ellipsometric characterization and density-functional theory analysis of anisotropic
308
+ optical properties of single-crystal α-SnS. J. Appl. Phys. 2014, 116, 013511.
309
+ (22)
310
+ Nguyen, H. T.; Le, Y. L.; Nguyen, T. M. H.; Kim, T. J.; Nguyen, X. A.; Kim, B.; Kim, K.; Lee,
311
+ W.; Cho, S.; Kim, Y. D. Temperature dependence of the dielectric function and critical points of α‑SnS
312
+ from 27 to 350 K. Sci. Rep. 2020, 10, 18396.
313
+ (23)
314
+ Le, V. L.; Cuong, D. D.; Nguyen, H. T.; Nguyen, X. A.; Kim, B.; Kim, K.; Lee, W.; Hong, S. C.;
315
+ Kim, T. J.; Kim, Y. D. Anisotropic behavior of excitons in single-crystal α-SnS. AIP Adv. 2020, 10,
316
+ 105003.
317
+ (24)
318
+ Noguchi, H.; Setiyadi, A.; Tanamura, H.; Nagatomo, T.; Omoto. Characteriztion of vacuum-
319
+ evaporated tin sulfide film for solar cell materials. Sol. Energy Mater. Sol. Cells 1994, 35, 325-331.
320
+ (25)
321
+ Steinmann, V.; Jaramillo, R.; Hartman, K.; Chakraborty, R.; Brandt, R. E.; Poindexter, J. R.; Lee,
322
+ Y. S.; Sun, L.; Polizzotti, A.; Park, H. H.; Gordon, R. G.; Buonassisi, T. 3.88% Efficient Tin Sulfide
323
+ Solar Cells using Congruent Thermal Evaporation. Adv. Mater. 2014, 26, 7488-7492.
324
+ (26)
325
+ Deng, Z.; Cao, D.; He, J. Lin, S.; Lindsay, S. M. Liu, Y. Solution Synthesis of Ultrathin Single-
326
+ Crystalline SnS Nanoribbons for Photodetectors via Phase Transition and Surface Processing. ACS
327
+ Nano 2012, 6, 6197-6207.
328
+ (27)
329
+ Krishnamurthi, V.; Khan, H.; Ahmed, T.; Zavabeti, A.; Tawfik, S. A.; Jain, S. K.; Spencer, M. J.
330
+ S.; Balendhran, S.; Crozier, K. B.; Li, Z.; Fu, L.; Mohiuddin, M.; Low, M. X.; Shabbir, B.; Boes, A.;
331
+ Mitchell, A.; McConville, C. F.; Li, Y.; Kalantar-Zadeh, K.; Mahmood, N.; Walia, S. Liquid-Metal
332
+ Synthesized Ultrathin SnS Layers for High-Performance Broadband Photodetectors. Adv. Mater. 2020,
333
+ 32, 2004247.
334
+ (28)
335
+ Hu, F.; Fei, Z. Recent progress on exciton polaritons in layered transition-metal dichalcogenides,
336
+ Adv. Optical Mater. 2019, 1901003.
337
+
338
+ (29)
339
+ Hu, F.; Luan, Y.; Scott, M. E.; Yan, J.; Mandrus, D. G.; Xu, X.; Fei, Z. Imaging exciton-polariton
340
+ transport in MoSe2 waveguides, Nat. Photon. 2017, 11, 356-360.
341
+ (30)
342
+ Hu, F.; Luan, Y.; Speltz, J.; Zhong, D.; Liu, C. H.; Yan, J.; Mandrus, D. G.; Xu, X.; Fei, Z. "Imaging
343
+ propagative exciton polaritons in atomically-thin WSe2 waveguides", Phys. Rev. B 2019, 100,
344
+ 121301(R).
345
+ (31)
346
+ Mrejen, M.; Yadgarov, L.; Levanon, A.; Suchowski, H. Transient exciton-polariton dynamics in
347
+ WSe2 by ultrafast near-field imaging. Sci. Adv. 2019, 5, eaat9618.
348
+ (32)
349
+ Sternbach, A. J.; Latini, S.; Chae, S.; Hübener, H.; Giovannini, U. D.; Shao, Y.; Xiong, L.; Sun, Z.;
350
+ Shi, N.; Kissin, P.; Ni, G.-X.; Rhodes, D.; Kim, B.; Yu, N.; Millis, A. J.; Fogler, M. M.; Schuck, P. J.;
351
+ Lipson, M.; Zhu, X.-Y.; Hone, J.; Averitt, R. D.; Rubio, A.; Basov, D. N. Femtosecond exciton
352
+ dynamics in WSe2 optical waveguides. Nat. Commun. 2020, 11, 3567.
353
+ (33)
354
+ Liu, X.; Galfsky, T.; Sun, Z.; Xia, F.; Lin, E.-C.; Lee, Y.-H.; Kéna-Cohen, S.; Menon, V. M. Nat.
355
+ Photonics Strong light–matter coupling in two-dimensional atomic crystals. 2015, 9, 30-34.
356
+ (34)
357
+ Dufferwiel, S.; Schwarz, S.; Withers, F.; Trichet, A. A. P.; Sich, M.; Pozo-Zamudio, O. D.; Clark,
358
+ C.; Nalitov, A.; Solnyshkov, D. D.; Malpuech, G.; Novoselov, K. S.; Smith, J. M.; Skolnick, M. S.;
359
+ Krizhanovskii, D. N.; Tartakovskii, A. I. Exciton–polaritons in van der Waals heterostructures
360
+ embedded in tunable microcavities. Nat. Commun. 2015, 6, 8579.
361
+ (35)
362
+ Lundt, N.; Klembt, S.; Cherotchenko, E.; Betzold, S.; Iff, O.; Nalitov, A. V.; Klaas, M.; Dietrich,
363
+ C. P.; Kavokin, A. V.; Höfling, S.; Schneider, C. Room-temperature Tamm-plasmon exciton-polaritons
364
+ with a WSe2 monolayer. Nat. Commun. 2016, 7, 13328.
365
+ (36)
366
+ Flatten, L.C.; He, Z.; Coles, D. M.; Trichet, A. A. P.; Powell, A. W.; Taylor, R. A.; Warner, J. H.;
367
+ Smith, J. M. Room-temperature exciton polaritons with two-dimensional WS2. Sci. Rep. 2016, 6, 33134.
368
+ (37)
369
+ Wang, Q.; Sun, L.; Zhang, B.; Chen, C.; Shen, X.; Lu, W. Direct observation of strong light-exciton
370
+ coupling in thin WS2 flakes. Opt. Express 2016, 24, 7151-7157.
371
+ (38)
372
+ Bertrand, Y.; Leveque, G.; Raisin, C.; Levy, F. Optical properties of SnSe2 and SnS2. J. Phys. C:
373
+ Solid State Phys. 1979, 12, 2907-2916.
374
+ (39)
375
+ Lucovsky, G. Mikkelsen, J. C. Jr. Liang, W. Y.; White, R. M.; Martin, R. M. Optical phonon
376
+ anisotropies in the layer crystals SnS2 and SnSe2. Phys. Rev. B 1976, 14, 1663-1669.
377
+ (40)
378
+ Fei, Z.; Andreev, G. O.; Bao, W.; Zhang, L. M.; McLeod, A. S.; Wang, C.; Stewart, M. K.; Zhao,
379
+ Z.; Dominguez, G.; Thiemens, M.; Fogler, M. M.; Tauber, M. J.; Castro-Neto, A. H.; Lau, C. N.;
380
+ Keilmann, F.; Basov, D. N. Infrared Nanoscopy of Dirac Plasmons at the Graphene-SiO2 interface
381
+ Nano Lett. 2011, 11, 4701-4705.
382
+ (41)
383
+ Dai, S.; Fei, Z.; Ma, Q.; Rodin, A. S.; Wagner, M.; McLeod, A. S.; Liu, M.; Gannett, W.; Regan,
384
+ W.; Watanabe, K.; Taniguchi, T.; Thiemens, M.; Dominguez, G.; Castro Neto, A. H.; Zettl, A.;
385
+ Keilmann, F.; Jarillo-Herrero, P.; Fogler, M. M.; Basov, D. N. Tunable phonon polaritons in atomically
386
+ thin van der Waals crystals of boron nitride. Science 2014, 343, 1125-1129.
387
+ (42)
388
+ Hunsperger, R. G. Integrated Optics. 6th ed.; Springer, New York, NY, 2009.
389
+ (43)
390
+ Genevet, P., Capasso, F., Aieta, F., Khorasaninejad & Devlin, R. Recent advances in planar optics:
391
+ from plasmonic to dielectric metasurfaces. Optica 2017, 4, 139-152.
392
+
393
+
394
+
395
+ Figure captions
396
+
397
+
398
+
399
+ Figure 1. (a) Illustration of the experimental setup and the two beam paths (labeled as ‘P1’ and ‘P2’)
400
+ responsible for the formation of the observed interference oscillations. (b) Sketch the crystal structure of
401
+ SnS. The Sn and S atoms are in silver and yellow, respectively. (c)-(f) The AFM topography and the
402
+ simultaneously-taken nano-IR images of an SnS microcrystal (thickness = 100 nm) with in-plane
403
+ wavevector (k//) of the excitation laser along the b (c,d) and a (e,f) axes, respectively. The red arrows in (c)
404
+ and (e) mark the direction of k//. The white arrow in (d) marks the 1D oscillations discussed in the main
405
+ text.
406
+
407
+
408
+ Figure 2. (a)-(e) Energy-dependent imaging data of EPs in SnS with the in-plane laser wavevector kin along
409
+ the b axis. (f)-(j) Energy-dependent imaging data of EPs in SnS with kin along the a axis. Here the sample
410
+
411
+ a
412
+ focusing
413
+ cantilever
414
+ c
415
+ AFM
416
+ d
417
+ s-SNOM, 1.38 eV
418
+ mirror
419
+ mica
420
+ Kin
421
+ Ra
422
+ tip
423
+ kin // b
424
+ sample
425
+ sample
426
+ EP
427
+ d (nm)
428
+ s (a.u.)
429
+ 100
430
+ 13.0
431
+ mica
432
+ 2um
433
+ 2μm
434
+ AFM
435
+ s-SNOM, 1.38 eV
436
+ b
437
+ e
438
+ f
439
+ mica
440
+ -10
441
+ 10.5
442
+ Kin//a
443
+ sample
444
+ a
445
+ SnS crystal
446
+ 2μum
447
+ 2uma
448
+ ki. Il b, E=1.29 eV
449
+ b
450
+ C
451
+ k, II b, E=1.38 eV
452
+ d
453
+ kn // b, E=1.32 eV
454
+ k. I/ b, E=1.44 eV
455
+ e
456
+ k.// b, E=1.48 eV
457
+ s (a.u.)
458
+ 2um
459
+ max
460
+ f
461
+ k.// a, E=1.29eV
462
+ g
463
+ k, // a, E=1.32 eV
464
+ h
465
+ kn // a, E=1.38 eV
466
+ kin // a, E=1.44 eV
467
+ 1
468
+ kn // a, E=1.48 eV
469
+ 2um
470
+ k
471
+ [E], E=1.29 eV
472
+ [E,], E=1.32 eV
473
+ w
474
+ IEzl, E=1.38 eV
475
+ n
476
+ IE21, E=1.44 eV
477
+ [Ez, E=1.48 eV
478
+ [E2]
479
+ (a.u.)
480
+ 4umis the 100-nm-thick SnS microcrystal shown in Figure 1. (k)-(o) Simulated polariton field amplitude (|Ez|)
481
+ maps of waveguide EPs in 100-nm-thick SnS at various energies. The EPs are excited by a point dipole (pz)
482
+ located at the center of the image right above the sample surface.
483
+
484
+
485
+ Figure 3. Real-space line profiles along the direction of the 1D interference oscillations in Figure 2 and
486
+ their Fourier-transformed (FT) profiles with the in-plane laser wavevector kin along both the b axis (a,b)
487
+ and the a axis (c,d), respectively. The unit for the horizontal axes of the FT profiles is k0 = 2π/λ0.
488
+
489
+
490
+ Figure 4. (a),(b) Dispersion diagrams of the EPs along the b and a axes, respectively. The colormaps plot
491
+ the imaginary part of the reflection coefficient Im(rp) that represents the photonic density of states. The blue
492
+ dashed curves mark the dispersion of the waveguide EPs. (c),(d) The propagation lengths of EPs along both
493
+ b axis and the a axis, respectively. The red curves are drawn to guide the eye. The data points in all panels
494
+ were obtained from s-SNOM imaging data (squares) and Comsol simulations (triangles).
495
+
496
+
497
+ a
498
+ profiles (kin ll b )
499
+ b
500
+ FT (kin Il b )
501
+ profiles (kin Il a )
502
+ d
503
+ FT (kin ll α)
504
+ 1.53eV
505
+ .53ev
506
+ 1.50eV
507
+ 1.50eV
508
+ 44ev
509
+ 'n:
510
+ 'n'
511
+ .41ev
512
+ 41eV
513
+ a
514
+ 1.38eV
515
+ 1.38eV
516
+ s
517
+ 1.35eV
518
+ 1.32eV
519
+ 29eV
520
+ 0
521
+ 2
522
+ 4
523
+ 1
524
+ 2
525
+ 3
526
+ 0
527
+ 2
528
+ 4
529
+ 1
530
+ 2
531
+ 3
532
+ x (μm)
533
+ k (ko)
534
+ x (μm)
535
+ k (ko)a
536
+ kin Il b
537
+ b
538
+ kin Il a
539
+ c
540
+ kin // b
541
+ 1.8
542
+ 1.8
543
+ 6
544
+
545
+ Data
546
+ Data
547
+ Simulation
548
+ 5
549
+ Simulation
550
+ 1.7
551
+ 1.7
552
+ (un)
553
+ 4
554
+ 3
555
+ Eb
556
+ 2
557
+ 1.6
558
+ 1.6
559
+ (eV)
560
+ (eV)
561
+ 0
562
+
563
+ 1.5
564
+ W1.5
565
+ d
566
+ kin /l α
567
+
568
+ Data
569
+
570
+ Simulation
571
+ 1.4
572
+ 1.4
573
+ 4
574
+ Im(rp)
575
+ xew
576
+ 3
577
+ 1.3
578
+ 1.3
579
+ 2
580
+ AH
581
+ 0
582
+ 1.2
583
+ 1.2
584
+ 0
585
+ 1.5
586
+ 2.5
587
+ 1.3
588
+ 1.4
589
+ 2
590
+ 2.5
591
+ 3
592
+ 1.5
593
+ 2
594
+ 3
595
+ 1.5
596
+ k (ko)
597
+ k (ko)
598
+ E(eV)
599
+ Figure 5. (a) Nano-optical images of SnS microcrystals with various thicknesses. Here the excitation
600
+ energy E = 1.38 eV and the in-plane wavevector is along the b axis. (b) Line profiles taken perpendicular
601
+ to the interference oscillations in (a). (c) Extracted polariton wavelength p versus the thickness of SnS
602
+ crystals.
603
+
604
+ Supporting Information for
605
+
606
+ Imaging anisotropic waveguide exciton polaritons in tin sulfide
607
+
608
+ Yilong Luan1,2, Hamidreza Zobeiri3, Xinwei Wang3, Eli Sutter4,5, Peter Sutter6*, Zhe Fei1,2*
609
+
610
+ 1Department of Physics and Astronomy, Iowa State University, Ames, Iowa 50011, USA
611
+ 2Ames Laboratory, U. S. Department of Energy, Iowa State University, Ames, Iowa 50011, USA
612
+ 3Department of Mechanical Engineering, Iowa State University, Ames, IA 50011, USA
613
+ 4Department of Mechanical and Materials Engineering, University of Nebraska-Lincoln, Lincoln, NE
614
+ 68588, USA
615
+ 5Nebraska Center for Materials and Nanoscience, University of Nebraska-Lincoln, Lincoln, NE 68588,
616
+ USA.
617
+ 6Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588,
618
+ USA
619
+
620
+ *Corresponding to: (P.S.) psutter@unl.edu, (Z.F.) zfei@iastate.edu.
621
+
622
+
623
+
624
+ List of contents:
625
+
626
+ 1. Nano-optics setup
627
+
628
+ 2. Determination of the crystal axes of SnS
629
+
630
+ 3. Interference mechanisms
631
+
632
+ 4. COMSOL simulations
633
+
634
+ 5. Dispersion calculations
635
+
636
+ 6. Low-temperature dispersion of EPs in SnS
637
+
638
+
639
+ a
640
+ d = 160 nm
641
+ b
642
+ c
643
+ 700
644
+
645
+ Data
646
+ Simulation
647
+ d = 140 nm
648
+ 600
649
+ Theory
650
+ s (a.u.)
651
+ max
652
+ 台贝
653
+ d = 120 nm
654
+ 500
655
+ ('n'e)
656
+ = 120 nm
657
+ (nm)
658
+ d = 100 nm
659
+ 400
660
+ d = 100 nm
661
+ 0
662
+ d = 91 nm
663
+ 300
664
+ d = 91 nm
665
+ E = 1.38 eV
666
+ 1
667
+ 1
668
+ 1
669
+ 200
670
+ a
671
+ 2 μm
672
+ 0
673
+ 1
674
+ 2
675
+ 3
676
+ 4
677
+ 5
678
+ 80
679
+ 100
680
+ 120
681
+ 140
682
+ 160
683
+ 180
684
+ kin // B
685
+ x (μum)
686
+ d (nm)7. Effect of the SnS2 shell on waveguide EPs
687
+
688
+ 8. Photonic mode at the air/mica interface
689
+
690
+ 9. Extraction of the propagation lengths of EPs
691
+
692
+ 10. Coupling strength of EPs
693
+
694
+
695
+ References for the Supporting Information
696
+
697
+ Supporting Figures: Figures S1-S13
698
+
699
+
700
+
701
+
702
+
703
+ 1. Nano-optics setup
704
+ To image the propagative waveguide EPs in SnS, we applied the s-SNOM from Neaspec GmbH
705
+ The s-SNOM was built based on a tapping-mode Atomic Force Microscope (AFM). The AFM tips used in
706
+ the study were Pt/Ir-coated silicon tips (Arrow NCPT from Nanoandmore GmbH) with a tapping frequency
707
+ of ~270 kHz. The tapping amplitude of the tip was set to be about 50 nm. For optical excitations, we used
708
+ a Ti:sapphire laser (Spectra-Physics, Tsunami) operating at the continuous-wave mode with a photon
709
+ energy tunable from 1.3 to 1.8 eV that covers the exciton and bandgap energies of SnS. The main observable
710
+ of the s-SNOM is the complex near-field scattering signal that is modulated due to the tip tapping.
711
+ Demodulating the signal at the nth harmonics (n ≥ 2) of the tapping frequency can effectively suppress the
712
+ background signal (n = 2 in the current work). In addition, the pseudo-heterodyne interferometric detection
713
+ method is used to extract both the amplitude (s) and phase () of the near-field scattering signal. In the
714
+ current work, we mainly discuss the amplitude part of the signal that is sufficient for describing propagative
715
+ EPs. All s-SNOM measurements were performed at ambient conditions.
716
+
717
+ 2. Determination of the crystal axes of SnS
718
+ As introduced in the main text, our samples are SnS microcrystals coated with a thin shell of SnS2.
719
+ In Figure S1a, we show an optical photo of the sample, where tens of microcrystals are sitting on the mica
720
+ substrate. Prior to the s-SNOM imaging measurements, we first determined the in-plane crystal axes (i.e.,
721
+ a and b axes) of SnS. The most convenient way to determine the crystal orientation is by inspecting the
722
+ crystal shape.1,2 As shown in Figure S1b, the crystal is slightly elongated along the b axis. As a result, the
723
+ crystal corner angles are 85º and 95º, respectively. Therefore, by measuring the corner angle, we can
724
+ determine the crystal axes. Alternatively, we also applied polarization-dependent Raman spectroscopy to
725
+ confirm the crystal axes. Here the incident laser beam is polarization-controlled, and the detector collects
726
+ photons from all polarizations. Due to the strong anisotropy of SnS, Raman spectra show sensitive
727
+ dependence on the polarization direction of the incident laser.1 In Figure S1c, we plot the Raman spectra of
728
+ a SnS microcrystal with laser polarization along the a and b axes. When polarization is parallel with the a
729
+ axis (the black curve in Figure S1c), there are two outstanding peaks at 159 cm-1 (B3g) and 188 cm-1 (Ag),
730
+ respectively. When polarization parallel with b axis (the red curve in Figure S1c), one more prominent peak
731
+ at around 93 cm-1 (Ag) emerges in addition to the two peaks at 159 cm-1 and 188 cm-1. The Raman peak at
732
+ 93 cm-1 was used to distinguish the a and b axes of SnS.1
733
+
734
+ 3. Interference mechanisms
735
+
736
+ As discussed in the main text, the real-space fringes or oscillations of EPs observed in our s-SNOM
737
+ imaging data were formed due to the interference between tip-back-scattered photons and edge-scattered
738
+
739
+ EPs (termed as “Mechanism I”). In the main text, we focus on the discussions of the string of 1D oscillations
740
+ at the center of the SnS microcrystal. The optical paths responsible for the formation of these interference
741
+ oscillations are sketched in Figure 1a of the main text and Figure S2a. In this case, the incident laser beam
742
+ is perpendicular to the short edge (labeled as edge I in Figure S2a) and has an incident angle of  ≈ 30º
743
+ relative to the sample plane. Upon tip illumination, part of the laser beam is scattered directly by the tip to
744
+ the detector (labeled as path P1). The tip also excites in-plane EPs and propagate perpendicular to the short
745
+ edge along the a axis (e.g., edge I in Figure S2a). When reaching edge I, the EPs are scattered to be photons
746
+ (labeled as path P2) that are collected by the detector. The photons collected from the two paths interfere
747
+ with each other and thus generating the 1D interference oscillations at the crystal center. In addition to these
748
+ 1D oscillations, there are also interference fringes parallel to the relatively long edges (e.g., edge II in Figure
749
+ S2b) that are about 43º relative to the b axis. The general mechanism for the fringe formation is similar to
750
+ those of the 1D oscillations. The main difference is that the EPs responsible for the fringe formation parallel
751
+ to edge II are propagating along a direction off the two principal crystal axes (i.e., a and b axes). With
752
+ careful boundary-condition analysis, we found that the propagation direction of the EPs has an angle of 
753
+ ≈ 20º relative to the b axis to form interference fringes parallel to edge II (see Figure S2b).
754
+
755
+ In addition to “mechanism I” discussed above and in the main text, there are also other possible
756
+ interference mechanisms. One possible mechanism (termed as “mechanism II”) is related to edge excitation
757
+ of EPs followed by tip scattering, and the other involves tip excitation of EPs followed by edge reflection
758
+ and tip scattering (termed as “mechanism III”). As discussed below, both mechanisms II and III are not
759
+ responsible for the interference oscillations/fringes in the current work.
760
+
761
+ Mechanism II (edge excitation → tip scattering) requires that the focused laser spot (radius ~ 1 m)
762
+ is at the sample edge, which is only possible when the tip is very close to the sample edge because the laser
763
+ is always focused on the tip apex. Therefore, for interference fringes or oscillations 1 m away from the
764
+ sample edge, edge excitation has little contributions. In addition, edge excitation followed by tip scattering
765
+ is exactly the reverse process of tip excitation followed by edge scattering, so the distance of the optical
766
+ paths and hence the interference fringes are expected to be the same in the two cases. Finally, the s-SNOM
767
+ tip is in principle more efficient in polariton excitation than the sample edge due to its metallicity.
768
+ Considering the above three factors, we believe Mechanism II is not responsible for the interference fringes
769
+ or oscillations observed in our work.
770
+
771
+ Mechanism III (tip excitation → edge reflection → tip scattering) plays important role when
772
+ polaritons or plasmons are highly confined (confinement factor kp/k0 >> 1), which is typical for plasmons
773
+ and polaritons in the mid-infrared region (e.g., graphene plasmons).3,4 Here, highly confined polaritons or
774
+ plasmons are efficiently reflected at the sample edge due to the large impedance mismatch. In the case of
775
+ polaritons or plasmons in the near infrared or visible range (e.g., metal plasmons or exciton polaritons), the
776
+ confinement is weaker. As a result, only a small portion of polaritons or plasmons can be reflected. Take
777
+ EPs of SnS for example, the confinement factor kp/k0 is in the range of 1.6-2.5 (see Figure 4a in the main
778
+ text), therefore the polariton reflectance at the sample edge R ≈ |(kp – k0)/( kp + k0)|2 is in the range of 5% to
779
+ 18%. Moreover, additional geometric and intrinsic damping during the round-trip propagation (from the tip
780
+ to the edge and back to the tip) further weakens the reflected EPs. Therefore, Mechanism III also does not
781
+ play an important role in the fringes/oscillations observed in SnS.
782
+
783
+ 4. COMSOL simulations
784
+ To support the experimental study, we performed finite-element simulations of waveguide EPs in
785
+ SnS with COMSOL Multiphysics. To excite EPs, we placed a z-polarized point dipole (pz) right above the
786
+ sample surface. We used two types of models to simulate the SnS microcrystal sample. The first one is a
787
+ realistic model, where the sample was set to be a four-layer heterostructure (SnS2/SnS/SnS2/mica). Due to
788
+ the ultra-thin SnS2 shell layer (thickness ~ 3 nm), the realistic model requires ultra-fine messing, so it is
789
+ time-consuming and not suitable for the simulations of large samples. The second one is an effective model,
790
+ where the SnS layer is set to be in a homogeneous dielectric environment. The effective permittivity (eff)
791
+ of the homogeneous dielectric environment can be considered as an average value of air, SnS2, and mica.
792
+
793
+ We treated eff as a fitting parameter that was determined by comparing the two models. As shown in Figure
794
+ S3, the simulated polariton field (out-of-plane Ez field) maps of the two models are consistent with each
795
+ other when using eff = 2.2 for the 100-nm-thick microcrystal sample. The consistency is also checked at all
796
+ other excitation energies. Due to the simplicity of the effective model, the simulations are much more
797
+ efficient. Moreover, we can simulate very large samples with a size of tens of microns, which is necessary
798
+ for the extraction of the propagation lengths of EPs. The main simulation results in this work were produced
799
+ with the effective model. The permittivity of SnS along the a and b axes (plotted in Figure S4) used in the
800
+ Comsol simulations and dispersion calculations is from previous literature.5,6 The c-axis permittivity of SnS
801
+ is adopted from Ref. 7. In Figure S4, we also mark the optical bandgap or exciton energies (blue arrows),
802
+ which are 1.66 eV and 1.39 eV along the b and a axes, respectively. The permittivity of SnS2 is set to be
803
+ about 10 in the ab plane and 6 along the c axis in our spectral range.8,9 The permittivity of mica is set to be
804
+ 2.5 according to Ref. 10.
805
+ In Figure 2k-o and Figure S5a-e, we plot respectively the polariton field amplitude (|Ez|) and
806
+ polariton field (Ez) maps at various excitation energies. Based on these field maps, we were able to
807
+ determine the polariton wavelength and propagation length, which match well the experimental results (see
808
+ Figure 4, Figure S6 and Figure S7). To better visualize the anisotropy of the EP modes, we performed 2D
809
+ Fourier transform of the Ez field maps in Figure S5a-e to generate the isofrequency contours. The results
810
+ are shown in Figure S5f-j, where one can see that the EP mode has a clear elliptic shape at E = 1.29 eV and
811
+ E = 1.32 eV. As E increases to 1.38 eV and above, the top part of the ellipses (i.e., corresponding to the
812
+ mode along the a axis) becomes strongly weakened due to the high damping, so EPs prefer propagating
813
+ along the b axis.
814
+
815
+ 5. Dispersion calculations
816
+ In Figure 4 of the main text, we plot the dispersion diagrams of SnS along both the a and b axes,
817
+ where the data points obtained from s-SNOM experiments and Comsol simulations are overlaid on the
818
+ theoretical dispersion colormaps. In the energy-momentum dispersion colormaps, we plot the imaginary
819
+ part of the p-polarization reflection coefficient Im(rp), which represents the photonic density of states. The
820
+ bright curves shown in the dispersion colormaps correspond to transverse magnetic (TM) waveguide
821
+ modes.11 The transverse-electric waveguide modes, on the other hand, can be revealed when plotting the
822
+ imaginary part of the s-polarization reflection coefficient Im(rs).12 In the transfer-matrix calculations, we
823
+ considered the entire SnS2/SnS/SnS2/Mica heterostructure. Take the microcrystal sample in Figs. 1 and 2
824
+ in the main text for example, the crystal thickness is ~100 nm. Considering a 3-nm-thick SnS2 shell at the
825
+ top and bottom,1 the SnS core has a thickness of ~94 nm.
826
+
827
+ 6. Low-temperature dispersion of EPs in SnS
828
+
829
+ To explore theoretically the low-temperature behavior of waveguide EPs in SnS, we plot in Figure
830
+ S8a,b the calculated polariton dispersion of the 100-nm-thick SnS microcrystal at T = 27 K. The low-
831
+ temperature permittivity of SnS is from Refs. 5 and 6. For comparison, we plot in Figure S8c,d the
832
+ dispersion diagrams of EPs at T = 300 K (replotted from Figure 4 in the main text). Compared to room-
833
+ temperature dispersion color plots, the waveguide polariton mode at T = 27 K (Figure S8) is sharper due to
834
+ the smaller damping at the lower temperature. Besides, the exciton energies slightly increase at the lower
835
+ temperature. Similar temperature dependence of exciton energies has also been seen in other van der Waals
836
+ semiconductors.13,14 Furthermore, the light-exciton coupling is much stronger at T = 27 K with more
837
+ prominent mode bending features close to the exciton energies.
838
+
839
+ 7. Effect of the SnS2 shell on waveguide EPs
840
+
841
+ As discussed in the main text, the SnS microcrystals studied in this work are coated with a thin
842
+ SnS2 shell that has a thickness of ~ 3 nm at the top and bottom surfaces.1 Here we wish to evaluate the
843
+ effect of the thin SnS2 shell on the waveguide EPs. In Figure S9, we plot the calculated dispersion diagrams
844
+ of waveguide EPs along the two principal axes of SnS with (Figure S9a,c) and without (Figure S9b,d)
845
+ consideration of the SnS2 shell. From Figure S9, one can see that the SnS2 shell has a very limited effect on
846
+
847
+ the EPs. Close examination indicates that the SnS2 shell only induces a slight (~3-4%) decrease of polariton
848
+ wavelengths of EPs propagating along both the a and b axes. The polaritonic anisotropy along the a and b
849
+ axes, on the other hand, is solely due to the SnS core.
850
+
851
+ 8. Photonic mode at the air/mica interface
852
+
853
+ The fringes are also seen on the mica substrate (Figures 1,2 and Figure S10a), which are generated
854
+ due to the interference of photonic modes propagating at or close to the surface of the mica substrate. The
855
+ interference mechanism for the substrate fringes is sketched in Figure S10b. To verify that, we performed
856
+ a dispersion analysis of the substrate mode. In Figure S10c, we show the excitation-energy-dependent fringe
857
+ profiles extracted along the blue dashed line in Figure S10a. With Fourier transform (Figure S10d), we
858
+ were able to determine the fringe period, which can be converted directly into the mode wavevector of the
859
+ substrate ks using the following equation:
860
+
861
+ 0/ ≡ ks/k0 ≈ 0/s + cos ≡ ks/k0 + cos . (S1)
862
+
863
+ Note the difference between Eq. S1 with Eq. 1 in the manuscript (‘+’ sign instead of ‘-’ sign). Following
864
+ the Fourier transform, we obtained the dispersion data points, which match well the theoretical dispersion
865
+ colormap (Figure S10e). From the dispersion diagram, one can see that the wavevector of the substrate
866
+ mode is roughly proportional to the free-space photon wavevector k0 indicating their photonic nature (note
867
+ that the k axis in the dispersion diagram is normalized to k0). The mode wavevector is between k0 to nk0,
868
+ where n ≈ 1.6 is the refractive index of mica. Therefore, we believe the substrate mode measured here
869
+ corresponds to in-plane photons at the air/mica interface.
870
+
871
+ 9. Extraction of the propagation lengths of EPs
872
+
873
+ In this section, we describe the extraction processes of the propagation lengths Lep ≡ 1/(2q2), where
874
+ q2 is the imaginary component of the polariton wavevector q = q1 + iq2. We extracted Lep from both the
875
+ experimental data and COMSOL simulations. The experimental Lep was extracted from the polariton fringe
876
+ profiles shown in Figure 3a,c in the main text. We first subtracted the baseline signal of the sample to obtain
877
+ the pure EP fringe oscillations. The baseline signal comes mainly from the background signal of the sample
878
+ without the generation of the propagative EPs. Detailed introductions about baseline subtraction can be
879
+ found in Ref. 12. The baseline-corrected fringe profiles are plotted as black curves in Figs. S6a and S7a,
880
+ which show clear decay with distance. We then performed envelop fitting of the profiles with a radial
881
+ exponential decay function x-1/2exp(-x/2Lep), which is expected for radially propagating 2D waves. Note
882
+ that not all experimental profiles can be fitted due to the high damping. As shown in Figs. S6a, the profile
883
+ at E = 1.54 eV cannot be fitted for kin // b. In the case of kin // a (Figure S7a), the profiles at E ≥ 1.38 eV
884
+ cannot be fitted. Similar fitting procedures were also applied to extract Lep from the simulated EP
885
+ oscillations (see Figs. S6b and S7b).
886
+
887
+ 10. Coupling strength of EPs
888
+
889
+ In this section, we estimate the coupling strength of EPs propagating along the b axis of SnS. The
890
+ criterion for strong coupling is that the Rabi splitting energy R ≈ 2hg is larger than the average EP
891
+ linewidth (ex + ph)/2, where hg is the coupling energy, ex and ph are the linewidths (full width at half
892
+ maximum) of exciton and waveguide photon mode.15 To determine the Rabi splitting energy, we fit the
893
+ dispersion relationship of the EP mode along the b axis of SnS using the equation below:15,16
894
+ 2
895
+ 2
896
+ 1
897
+ (
898
+ )
899
+ 4(
900
+ )
901
+ 2
902
+ 2
903
+ ph
904
+ ex
905
+ ph
906
+ ex
907
+ E
908
+ E
909
+ E
910
+ E
911
+ E
912
+ hg
913
+
914
+ +
915
+
916
+
917
+
918
+ +
919
+ . (S2)
920
+ Note that the fitting is mainly based on the bottom-branch of the EP mode that was verified experimentally.
921
+ Similar approach has been adopted in Ref. 16. The fitting result is shown in Figure S11, where the fitting
922
+ curves with Eq. S2 match well the dispersion relation of EPs revealed by the colormap. Note that the
923
+ dispersion colormap is a replot of Figure 4a without normalization of the k axis to k0. Through the fit, we
924
+
925
+ obtain the Rabi splitting energy to be about 160 meV, which is comparable to or even bigger than those
926
+ reported in other materials. The exciton linewidth of SnS along the b axis is about 140 meV at room
927
+ temperature by fitting the dielectric function from previous literature (see Figure S12a,b).5 The linewidth
928
+ of the bare waveguide photon mode is estimated to be 70 meV at the exciton energy (see Figure S12c), so
929
+ the average polariton linewidth is about 105 meV, which is smaller than the Rabi splitting energy. Therefore,
930
+ we conclude that the EPs of SnS along the b axis is in the strong coupling regime.
931
+
932
+ References for the Supporting Information
933
+ (44)
934
+ Sutter, P.; Wang, J.; Sutter, E. Wrap-Around Core–Shell Heterostructures of Layered Crystals. Adv.
935
+ Mater. 2019, 31, 1902166.
936
+ (45)
937
+ Lin. S.; Carvalho, C.; Yan, S.; Li, R.; Kim, S.; Rodin, A.; Carvalho, L.; Chan, E. M.; Wang, X.;
938
+ Castro Neto, A. H.; Yao, J. Accessing valley degree of freedom in bulk Tin(II) sulfide at room
939
+ temperature. Nat. Commun. 2018, 9, 1455.
940
+ (46)
941
+ Fei, Z.; Rodin, A. S.; Andreev, G. O.; Bao, W.; McLeod, A. S.; Wagner, M.; Zhang, L. M.; Zhao,
942
+ Z.; Thiemens, M.; Dominguez, G.; Fogler, M. M.; Castro Neto, A. H.; Lau, C. N.; Keilmann, F.; Basov,
943
+ D. N. Gate-tuning of graphene plasmons revealed by infrared nano-imaging. Nature 2012, 487, 82−85.
944
+ (47)
945
+ Chen, J.; Badioli, M.; González, P. A.; Thongrattanasiri, S.; Huth, F.; Osmond, J.; Spasenović, M.;
946
+ Centeno, A.; Pesquera, A.; Godignon, P.; Elorza, A. Z.; Camara, N.; García de Abajo, F. J.; Hillenbrand,
947
+ R.; Koppens, F. H. L. Optical nano-imaging of gate-tunable graphene plasmons. Nature 2012, 487,
948
+ 77−80.
949
+ (48)
950
+ Nguyen, H. T.; Le, Y. L.; Nguyen, T. M. H.; Kim, T. J.; Nguyen, X. A.; Kim, B.; Kim, K.; Lee,
951
+ W.; Cho, S.; Kim, Y. D. Temperature dependence of the dielectric function and critical points of α‑SnS
952
+ from 27 to 350 K. Sci. Rep. 2020, 10, 18396.
953
+ (49)
954
+ Le, V. L.; Cuong, D. D.; Nguyen, H. T.; Nguyen, X. A.; Kim, B.; Kim, K.; Lee, W.; Hong, S. C.;
955
+ Kim, T. J.; Kim, Y. D. Anisotropic behavior of excitons in single-crystal α-SnS. AIP Adv. 2020, 10,
956
+ 105003.
957
+ (50)
958
+ Banai, R. E.; Burton, L. A.; Choi, S. G.; Hofherr, F.; Sorgenfrei, T.; Walsh, A.; To, B.; Gröll, A.;
959
+ Brownson, J. R. S. Ellipsometric characterization and density-functional theory analysis of anisotropic
960
+ optical properties of single-crystal α-SnS. J. Appl. Phys. 2014, 116, 013511.
961
+ (51)
962
+ Bertrand, Y.; Leveque, G.; Raisin, C.; Levy, F. Optical properties of SnSe2 and SnS2. J. Phys. C:
963
+ Solid State Phys. 1979, 12, 2907-2916.
964
+ (52)
965
+ Lucovsky, G. Mikkelsen, J. C. Jr. Liang, W. Y.; White, R. M.; Martin, R. M. Optical phonon
966
+ anisotropies in the layer crystals SnS2 and SnSe2. Phys. Rev. B 1976, 14, 1663-1669.
967
+ (53)
968
+ Nitsche, R. & Fritz, T. Precise determination of the complex optical constant of mica. Appl. Opt.
969
+ 43, 3263-3270 (2004).
970
+ (54)
971
+ Hu, F.; Luan, Y.; Scott, M. E.; Yan, J.; Mandrus, D. G.; Xu, X.; Fei, Z. Imaging exciton-polariton
972
+ transport in MoSe2 waveguides, Nat. Photon. 2017, 11, 356-360.
973
+ (55)
974
+ Hu, F.; Luan, Y.; Speltz, J.; Zhong, D.; Liu, C. H.; Yan, J.; Mandrus, D. G.; Xu, X.; Fei, Z. "Imaging
975
+ propagative exciton polaritons in atomically-thin WSe2 waveguides", Phys. Rev. B 100, 121301(R)
976
+ (2019).
977
+ (56)
978
+ Liu, X.; Bao, W.; Li, Q.; Ropp, C.; Wang, Y.; Zhang, X. Control of Coherently Coupled Exciton
979
+ Polaritons in Monolayer Tungsten Disulphide. Phys. Rev. Lett. 2017, 119, 027403.
980
+ (57)
981
+ Christopher, J. W.; Goldberg, B. B.; Swan, A. K. Long tailed trions in monolayer MoS2:
982
+ Temperature dependent asymmetry and resulting red-shift of trion photoluminescence spectra. Sci. Rep.
983
+ 2017, 7, 14062.
984
+ (58)
985
+ Hu, F.; Fei, Z.; Recent progress on exciton polaritons in layered transition‐metal dichalcogenides.
986
+ Adv. Opt. Mater. 2020, 8, 1901003.
987
+ (59)
988
+ Dovzhenko, D.; Lednev, M.; Mochalov, K.; Vaskan, I.; Samokhvalov, P.; Rakovich, Y.; Nabiev, I.
989
+ Strong excitonphoton coupling with colloidal quantum dots in a tunable microcavity. Appl. Phys. Lett.
990
+ 2021, 119, 011102.
991
+
992
+
993
+
994
+
995
+
996
+
997
+ Supporting Figures
998
+
999
+
1000
+ Figure S1. (a) A large-area optical photo of SnS microcrystals on a mica substrate. (b) The AFM image of
1001
+ an SnS microcrystal. The marked angle of the crystal corner is 85º. (c) Polarization-dependent Raman
1002
+ spectra of SnS along both the a and b axes. Detailed discussions are given in Section 2 of the Supporting
1003
+ Information.
1004
+
1005
+
1006
+ Figure S2. Illustrations of the formation mechanism of 1D interference oscillations at the crystal center (a)
1007
+ and interference fringes parallel to the long edges (b). Detailed discussions are given in Section 3 of the
1008
+ Supporting Information.
1009
+
1010
+
1011
+ Figure S3. The simulated polariton field (Ez field) maps with the realistic model (a) and the effective model
1012
+ (b). Detailed discussions are given in Section 4 of the Supporting Information.
1013
+
1014
+
1015
+ a
1016
+ b
1017
+ C
1018
+ 50
1019
+ mica
1020
+ Raman intensity (a.u.)
1021
+ aaxis
1022
+ baxis
1023
+ 40
1024
+ 30
1025
+ SnS
1026
+ 850
1027
+ 20
1028
+ 10
1029
+ 50μm
1030
+ 12μm
1031
+ 0
1032
+ 50
1033
+ 100
1034
+ 150
1035
+ 200
1036
+ 250
1037
+ 300
1038
+ Ramanshift(cm)a
1039
+ b
1040
+ Laser
1041
+ Laser
1042
+ P1
1043
+ tip
1044
+ EPs
1045
+ tp
1046
+ EPs
1047
+ edge I
1048
+ edge II6
1049
+ Ez (a.u.)
1050
+ 800nm
1051
+ Figure S4. The real part (red) and the imaginary part (black) of the permittivity along b axis (a) and a axis
1052
+ (b). The blue arrow marks the optical bandgap or exciton energy.
1053
+
1054
+
1055
+ Figure S5. (a-e) Simulated out-of-plane field (Ez) maps of waveguide EPs in 100-nm-thick SnS at various
1056
+ energies. The EPs are excited by a point dipole (pz) located at the center of the image right above the sample
1057
+ surface. (f-j) Energy-dependent isofrequency contour maps of waveguide EPs generated by the Fourier
1058
+ transform of the Ez maps in (a-e). Detailed discussions are given in Section 4 of the Supporting Information.
1059
+
1060
+
1061
+
1062
+
1063
+ a
1064
+ b axis
1065
+ 25
1066
+ b
1067
+ 25
1068
+ aaxis
1069
+ 20
1070
+ 20
1071
+ 15
1072
+ 15
1073
+ 3
1074
+ 3
1075
+ 10
1076
+ 10
1077
+ 5
1078
+ 5
1079
+ 0
1080
+ 0
1081
+ 1.0
1082
+ 1.2
1083
+ 1.4
1084
+ 1.6
1085
+ 1.8
1086
+ 2.0
1087
+ 1.0
1088
+ 1.2
1089
+ 1.4
1090
+ 1.6
1091
+ 1.8
1092
+ 2.0
1093
+ E (eV)
1094
+ E (eV)a
1095
+ Ez, E=1.29 eV
1096
+ b
1097
+ Ez,E=1.32eV
1098
+ c
1099
+ Ez, E=1.38 eV
1100
+ p
1101
+ Ez, E=1.44 eV
1102
+ e
1103
+ Ez, E=1.48 eV
1104
+ Ez
1105
+ (a.u.)
1106
+ 4μm
1107
+ 2DFFT,E=1.29eV
1108
+ g
1109
+ 2DFFT.E=1.32eVh
1110
+ 2DFFT,E=1.38eV
1111
+ -
1112
+ 2D FFT, E=1.44 eV
1113
+ 2D FFT, E=1.48 eV
1114
+ 3
1115
+ FT
1116
+ ky (105 cm-1)
1117
+ (a.u.)
1118
+ max
1119
+ 0
1120
+ a
1121
+ ta
1122
+ ta
1123
+ Aa
1124
+ 4a
1125
+ min
1126
+ 3
1127
+ -3
1128
+ 0
1129
+ 3
1130
+ -3
1131
+ 0
1132
+ 3
1133
+ -3
1134
+ 0
1135
+ 3
1136
+ -3
1137
+ 0
1138
+ 3
1139
+ -3
1140
+ 0
1141
+ 3
1142
+ kx (105 cm-1)
1143
+ kx (105 cm-1)
1144
+ kx (105 cm-1)
1145
+ kx (105 cm-1)
1146
+ kx (105 cm-1)
1147
+ Figure S6. Fitting of the propagation length (Lep) of EPs along the b-axis based on the experimental data
1148
+ (a) and Comsol simulations (b).
1149
+
1150
+
1151
+
1152
+
1153
+ Figure S7. Fitting of the propagation length (Lep) of EPs along the a-axis based on the experimental data
1154
+ (a) and Comsol simulations (b).
1155
+
1156
+
1157
+
1158
+ a
1159
+ Experimental, kin // b
1160
+ b
1161
+ Simulation,ki // b
1162
+ E=1.29eV,Lep=4.5um
1163
+ E=1.29eV.Len=5um
1164
+ E=1.32eV, Lep=4um
1165
+ E=1.32eV.Len=4um
1166
+ E=1.35eV,Lep=3.2um
1167
+ E=1.35eV,Lep=3.5um
1168
+ E=1.38eV,Lep=2.9um
1169
+ E=1.38eV,Lep=3.2um
1170
+ 'n'
1171
+ E=1.41eV,Lep=2.2um
1172
+ a
1173
+ S
1174
+ E
1175
+ E=1.44eV, Lep=2um
1176
+ T Z1Zz E=1.44eV Lep=2.1um
1177
+ E=1.48eV,Len=1.3um
1178
+ E=1.48eV, Lep=1.5um
1179
+ E=1.51eV,Lep=1.0um
1180
+ AZ z= =151eV Lep=0.8um
1181
+ E=1.54eV
1182
+ E=1.54eV, Lep=0.4um
1183
+ 0
1184
+ 2
1185
+ 4
1186
+ 0
1187
+ 2
1188
+ 4
1189
+ x (μm)
1190
+ x (μm)a
1191
+ Experimental, kin // a
1192
+ b
1193
+ Simulation, k// a
1194
+ E=1.29eV,Lep=3.2um
1195
+ E=1.29eV,Lep=3.5um
1196
+ E=1.32eV,L
1197
+ -ep=1.7um
1198
+ =1.32eV,Lep=2.2um
1199
+ E=1.35eV.L
1200
+ :1.1um
1201
+ E=1.35eV,Lep=1.4um
1202
+ E=1.38eV
1203
+ E=1.38eV.Len=1um
1204
+ (a.u.)
1205
+ E=1.41eV
1206
+ _E=1.41eV,Lep=0.75um
1207
+ S
1208
+ EN
1209
+ E=1.44eV
1210
+ E=1.44eV, Lep=0.5um
1211
+ E=1.48eV
1212
+ E=1.48eV,Lep=0.45um
1213
+ E=1.51eV
1214
+ E=1.51eV,Lep=0.35um
1215
+ E=1.54eV
1216
+ E=1.54eV,Lep=0.2um
1217
+ 0
1218
+ 2
1219
+ 4
1220
+ 0
1221
+ 2
1222
+ 4
1223
+ x (μm)
1224
+ x (μm)
1225
+ Figure S8. The dispersion colormaps of SnS along the two principal axes at T = 27 K (a,b) and T = 300 K
1226
+ (c,d). Detailed discussions are given in Section 6 of the Supporting Information.
1227
+
1228
+
1229
+ Figure S9. The calculated dispersion colormaps of waveguide EPs along the two principal axes of SnS
1230
+ with (a,c) and without (b,d) consideration of the thin SnS2 shell.
1231
+
1232
+
1233
+
1234
+
1235
+ a
1236
+ kin // b, T = 27 K
1237
+ b
1238
+ kin /l a, T = 27 K
1239
+ c
1240
+ kin Il b, T = 300K
1241
+ d
1242
+ kin // a, T= 300K
1243
+ 1.8
1244
+ 1.8
1245
+ 1.8
1246
+ 1.8
1247
+ 1.7
1248
+ 1.7
1249
+ 1.7
1250
+ 1.7
1251
+ Eb
1252
+ Eb
1253
+ 1.6
1254
+ 1.6
1255
+ 1.6
1256
+ 1.6
1257
+ E
1258
+ E
1259
+ E
1260
+ E
1261
+ 1.4
1262
+ 1.4
1263
+ 1.4
1264
+ 1.4
1265
+ Im(p)
1266
+ max
1267
+ Ea
1268
+ Ea
1269
+ 1.3
1270
+ 1.3
1271
+ 1.3
1272
+ 1.3
1273
+ 0
1274
+ 1.2
1275
+ 1.2
1276
+ 1.2
1277
+ 1.2
1278
+ 1.5
1279
+ 2
1280
+ 2.5
1281
+ 3
1282
+ 3.5
1283
+ 1.5
1284
+ 2
1285
+ 2.5
1286
+ 3
1287
+ 3.5
1288
+ 1.5
1289
+ 2
1290
+ 2.5
1291
+ 3
1292
+ 3.5
1293
+ 1.5
1294
+ 2
1295
+ 2.5
1296
+ 3
1297
+ 3.5
1298
+ k (ko)
1299
+ k (ko)
1300
+ k (ko)
1301
+ k (ko)a
1302
+ kin /l b, with SnS
1303
+ b
1304
+ kin /l b, w/o SnS
1305
+ c
1306
+ kin /l a, withSnS
1307
+ d
1308
+ kin /l a, w/o SnS
1309
+ 1.8
1310
+ 1.8
1311
+ 1.8
1312
+ 1.8
1313
+ 1.7
1314
+ 1.7
1315
+ 1.7
1316
+ 1.7
1317
+ Eb
1318
+ Eb
1319
+ 1.6
1320
+ 1.6
1321
+ 1.6
1322
+ 1.6
1323
+ E
1324
+ E
1325
+ E
1326
+ E
1327
+ 1.4
1328
+ 1.4
1329
+ 1.4
1330
+ 1.4
1331
+ Im(rp)
1332
+ max
1333
+ Ea
1334
+ 1.3
1335
+ 1.3
1336
+ 1.3
1337
+ 1.3
1338
+ 0
1339
+ 1.2
1340
+ 1.2
1341
+ 1.2
1342
+ 1.2
1343
+ 1.5
1344
+ 2
1345
+ 2.5
1346
+ 3
1347
+ 3.5
1348
+ 1.5
1349
+ 2
1350
+ 2.5
1351
+ 3
1352
+ 3.5
1353
+ 1.5
1354
+ 2
1355
+ 2.5
1356
+ 3
1357
+ 3.5
1358
+ 1.5
1359
+ 2
1360
+ 2.5
1361
+ 3
1362
+ 3.5
1363
+ k (ko)
1364
+ k (ko)
1365
+ k (ko)
1366
+ k (ko)
1367
+ Figure S10. (a) Nano-optical imaging data of the SnS crystal on mica substrate at E = 1.38 eV. (b)
1368
+ Illustration of the interference mechanism for the formation of fringes on the substrate. (c) Fringe profiles
1369
+ at various excitation energies taken along the blue dashed line shown in (a). (d) Fourier transform of the
1370
+ energy-dependent fringe profiles shown in (c). (e) Experimental and theoretical dispersion diagram of the
1371
+ substrate photon mode of mica. The two vertical dashed lines mark the photon dispersion in air (k = k0) and
1372
+ in bulk mica (k=1.6k0). Detailed discussions are given in Section 8 of the Supporting Information.
1373
+
1374
+
1375
+
1376
+ Figure S11. (a) Fitting the dispersion relation of the EP mode along the b axis of SnS. The white dotted
1377
+ curves were produced with Eq. S2. (b) Calculated dispersion relation of the bare waveguide photon mode
1378
+ without coupling with excitons along the b axis of SnS. Detailed discussions are given in Section 10 of the
1379
+ Supporting Information.
1380
+
1381
+
1382
+
1383
+
1384
+ (a)
1385
+ s-SNOM, 1.38 eV
1386
+ (c)
1387
+ substrate mode profiles
1388
+ (d)
1389
+ Fouriertransform
1390
+ (e)
1391
+ substrate mode dispersion
1392
+ 1.8
1393
+ Ik=1.6ko
1394
+ mica
1395
+ 1.53 eV
1396
+ 1.53eV
1397
+ 1.50 eV
1398
+ 1.50eV
1399
+ 1.7
1400
+ 1.47 eV
1401
+ 1.47 eV
1402
+ 1.6
1403
+ 1.44 eV
1404
+ 1.44 eV
1405
+ (Cn
1406
+ (a.u.)
1407
+ (eV)
1408
+
1409
+ 200nm
1410
+ 1.41eV
1411
+ 1.41 eV
1412
+
1413
+ 1.5
1414
+ (b)
1415
+ S
1416
+ 1.38eV
1417
+ 1.38eV
1418
+ E
1419
+ P2
1420
+ 1.35 eV
1421
+ 1.35eV
1422
+ 1.4
1423
+ 1.32 eV
1424
+ 口口口
1425
+ 1.32 eV
1426
+ substrate
1427
+ 1.29eV
1428
+ 1.3
1429
+ Sns
1430
+ 1.29 eV
1431
+ photons
1432
+ mica
1433
+ 1.2
1434
+ 0.0
1435
+ 0.5
1436
+ 1.0
1437
+ 1.5
1438
+ 0
1439
+ 1
1440
+ 2
1441
+ 3
1442
+ 4
1443
+ 5
1444
+ 0.5
1445
+ 1.5
1446
+ 2.5
1447
+ 3.5
1448
+ x (um)
1449
+ k (10° cm)
1450
+ k (ko)a
1451
+ 2
1452
+ b
1453
+ 2
1454
+ 1.8
1455
+ 1.8
1456
+ 日1.4
1457
+ 日1.4
1458
+ 1.2
1459
+ 1.2
1460
+ 1
1461
+ 0.5
1462
+ 1
1463
+ 1.5
1464
+ 2
1465
+ 2.5
1466
+ 3
1467
+ 0.5
1468
+ 1
1469
+ 1.5
1470
+ 2
1471
+ 2.5
1472
+ 3
1473
+ k(105cm-1)
1474
+ (105cm-1)a
1475
+ b
1476
+ 200
1477
+ c
1478
+ 2.0
1479
+ 0
1480
+ T = 27K
1481
+ T=100K
1482
+ exciton linewidth (meV)
1483
+ T=200K
1484
+ T=300K
1485
+ 150
1486
+ 1.5
1487
+ (cn'e) ()ul
1488
+ 6
1489
+ 100
1490
+ 1.0
1491
+ 50
1492
+ 0.5
1493
+ 2
1494
+ 0
1495
+ 0
1496
+ 0.0
1497
+ 1.4
1498
+ 1.5
1499
+ 1.6
1500
+ 1.7
1501
+ 1.8
1502
+ 1.9
1503
+ 0
1504
+ 50
1505
+ 100
1506
+ 150
1507
+ 200
1508
+ 250
1509
+ 300
1510
+ 1.2
1511
+ 1.4
1512
+ 1.6
1513
+ 1.8
1514
+ 2.0
1515
+ E (eV)
1516
+ T (K)
1517
+ E (eV)Figure S12. (a) Fitting the exciton linewidth from the b-axis permittivity of SnS from Ref. 5. (b)
1518
+ Temperature-dependent linewidth of excitons along the b axis of SnS based on the fitting in (a). (c) Line
1519
+ profile of the photonic mode taken along the vertical dashed line in Figure S11b. Detailed discussions are
1520
+ given in Section 10 of the Supporting Information.
1521
+
1522
+
1523
+ Figure S13. Illustration of a selective nanophotonic interconnector based on anisotropic EPs in SnS. When
1524
+ the incident photonic signal is at energies of E ≤ 1.29 eV, both devices 1 and 2 can receive the signal. When
1525
+ the incident photonic signal is at energies of E ≥ 1.38 eV, only device 1 can receive the signal.
1526
+
1527
+
1528
+
1529
+
1530
+
1531
+
1532
+
1533
+
1534
+
1535
+
1536
+
1537
+ to device
1538
+ Incident signal
1539
+ Sns
1540
+ interconnector
1541
+ s
09FIT4oBgHgl3EQf3Sv5/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dE0T4oBgHgl3EQfdgBe/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:578a38fed8de70238324b171903852fe60f11badc513317493b4297419225b0b
3
+ size 1179693
1dFRT4oBgHgl3EQfmDfL/content/tmp_files/2301.13600v1.pdf.txt ADDED
@@ -0,0 +1,2199 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13600v1 [cs.GT] 31 Jan 2023
2
+ CONSTRAINED PHI-EQUILIBRIA
3
+ ARXIV PREPRINT
4
+ Martino Bernasconi
5
+ Politecnico di Milano
6
+ martino.bernasconideluca@polimi.it
7
+ Matteo Castiglioni
8
+ Politecnico di Milano
9
+ matteo.castiglioni@polimi.it
10
+ Alberto Marchesi
11
+ Politecnico di Milano
12
+ alberto.marchesi@polimi.it
13
+ Francesco Trov`o
14
+ Politecnico di Milano
15
+ francesco1.trovo@polimi.it
16
+ Nicola Gatti
17
+ Politecnico di Milano
18
+ nicola.gatti@polimi.it
19
+ February 1, 2023
20
+ ABSTRACT
21
+ The computational study of equilibria involving constraints on players’ strategies has been largely
22
+ neglected. However, in real-world applications, players are usually subject to constraints ruling
23
+ out the feasibility of some of their strategies, such as, e.g., safety requirements and budget caps.
24
+ Computational studies on constrained versions of the Nash equilibrium have lead to some results
25
+ under very stringent assumptions, while finding constrained versions of the correlated equilibrium
26
+ (CE) is still unexplored. In this paper, we introduce and computationally characterize constrained
27
+ Phi-equilibria—a more general notion than constrained CEs—in normal-form games. We show
28
+ that computing such equilibria is in general computationally intractable, and also that the set of the
29
+ equilibria may not be convex, providing a sharp divide with unconstrained CEs. Nevertheless, we
30
+ provide a polynomial-time algorithm for computing a constrained (approximate) Phi-equilibrium
31
+ maximizing a given linear function, when either the number of constraints or that of players’ actions
32
+ is fixed. Moreover, in the special case in which a player’s constraints do not depend on other players’
33
+ strategies, we show that an exact, function-maximizing equilibrium can be computed in polynomial
34
+ time, while one (approximate) equilibrium can be found with an efficient decentralized no-regret
35
+ learning algorithm.
36
+ 1
37
+ Introduction
38
+ Over the last years, equilibrium computation problems have received a terrific attention from AI and ML re-
39
+ search (Brown and Sandholm, 2019; Bakhtin et al., 2022), as game-theoretical equilibrium notions provide a prin-
40
+ cipled framework to deal with multi-player decision-making problems. Most of the works on equilibrium computation
41
+ problems focus on classical solution concepts—such as the well-known Nash equilibrium (NE) (Nash, 1951) and cor-
42
+ related equilibrium (CE) (Aumann, 1974)—, thus neglecting the presence of constraints entirely. However, in most
43
+ of the real-world applications, the players are usually subject to constraints that rule out the feasibility of some of
44
+ their strategies, such as, e.g., safety requirements and budget caps. Thus, addressing equilibrium notions involving
45
+ constraints is a crucial step needed for the operationalization of game-theoretic concepts into real-world settings.
46
+ The study of equilibrium notions involving constraints was initiated by Arrow and Debreu (1954), who define the
47
+ concept of generalized NE (GNE). The GNE can be interpreted as an NE of a game where players’ strategies are
48
+ subject to some constraints, which must be satisfied at the equilibrium and also determine which are the feasible
49
+ players’ deviations. However, given that computing a GNE is clearly PPAD-hard (Daskalakis et al., 2009), all the
50
+ works dealing with the computation of GNEs (see, e.g., (Facchinei and Kanzow, 2010)) provide efficient algorithms
51
+ only in specific settings that require very stringent assumptions.
52
+ Most of the computationally challenges in finding GNEs are inherited from the NE. In settings in which constrained are
53
+ not involved, the computational issues of NEs are usually circumvented by considering weaker equilibrium notions.
54
+
55
+ ARXIV PREPRINT - FEBRUARY 1, 2023
56
+ Among them, those that have received most of the attention in the literature are the CE and its variations, which
57
+ have been shown to be efficiently computable in several settings of interest (Papadimitriou and Roughgarden, 2008;
58
+ Celli et al., 2020). Surprisingly, with the only exception of (Chen et al., 2022) (see Section 1.2 for a detailed discussion
59
+ on it), no work has considered the problem of computing CEs in constrained settings. Thus, investigating whether the
60
+ CE retains its nice computational properties when adding constraints on players’ strategies is an open interesting
61
+ question.
62
+ 1.1
63
+ Original Contributions
64
+ In this paper, we introduce and computationally characterize constrained Phi-equilibria, starting, as it is customary,
65
+ from the setting of normal-form games. Our equilibria include the constrained versions of the classical CE and all of its
66
+ variations as special cases, by generalizing the notion of Phi-equilibria introduced by Greenwald and Jafari (2003) to
67
+ constrained settings. In particular, constrained Phi-equilibria are defined as Phi-equilibria, but in games where players
68
+ are subject to some constraints. Such constraints must be satisfied at the equilibrium, and, additionally, players are
69
+ only allowed to undertake safe deviations, namely those that are feasible according to the constraints. Crucially, the
70
+ set of safe deviations of a player does not only depend on the strategy of that player, but also on those of the others.
71
+ We start by showing that one of the most appealing computational properties of Phi-equilibria, namely that the set
72
+ of the equilibria of a game is convex, is lost when moving to their constrained version. This raises considerable
73
+ computational challenges in computing constrained Phi-equilibria. Indeed, we formally prove a strong intractability
74
+ result: for any factor α > 0, it is not possible, unless P = NP, to find in polynomial time a constrained (approximate)
75
+ Phi-equilibrium which achieves a multiplicative approximation α of the optimal value of a given linear function. Then,
76
+ in the rest of the paper, we show several ways in which such a negative result can be circumvented.
77
+ We prove that a constrained approximate Phi-equilibrium which maximizes a given linear function can be found in
78
+ polynomial time, when either the number of constraints or that of players’ actions is fixed. Our results are based on a
79
+ general algorithm that employs a non-standard “Lagrangification” of the constraints defining the set of safe deviations
80
+ of a player. Moreover, the algorithm needs a way of dealing with the non-convexity of the set of the equilibria, which
81
+ we provide in the form of a clever discretization of the space of the Lagrange multipliers.
82
+ Finally, we focus on the special case in which the constraints defining the safe deviations of a player do not depend
83
+ on the the strategies of the other players, but only on the strategy of that player. This includes constrained Phi-
84
+ equilibria identifying a particular constrained version of the coarse CE by Moulin and Vial (1978a), in which the
85
+ players’ strategies are subject to marginal cost constraints. These arise in several real-world applications in which
86
+ the players have bounded resources, such as, e.g., budget-constrained bidding in auctions. In such a special case, we
87
+ prove that a constrained (exact) Phi-equilibrium maximizing a given linear function can be computed in polynomial
88
+ time, and we provide an efficient decentralized no-regret learning algorithm for finding one constrained (approximate)
89
+ Phi-equilibrium.
90
+ 1.2
91
+ Related Works
92
+ GNEs
93
+ Rosen (1965) initiated the study of the computational properties of GNEs. After that, several other works
94
+ addressed the problem of computing GNEs by mainly exploiting techniques based on quasi-variational inequalities
95
+ (see (Facchinei and Kanzow, 2010) for a survey). More recently, some works (Kanzow and Steck, 2016; Bueno et al.,
96
+ 2019; Jordan et al., 2022; Goktas and Greenwald, 2022) also studied the convergence of iterative optimization algo-
97
+ rithms to GNEs. In order to provide efficient algorithms, all these works need to introduce very stringent assumptions,
98
+ which are even stronger than those required for the efficient computation of NEs.
99
+ Constrained Markov Games
100
+ Equilibrium notions involving constraints have also been addressed in the literature
101
+ on Markov games, with (Altman and Shwartz, 2000; Alvarez-Mena and Hern´andez-Lerma, 2006) being the first works
102
+ introducing GNEs in such a field. More recently, Hakami and Dehghan (2015) defined a notion of constrained CE in
103
+ Markov games. However, the incentive constraints in their notion of equilibrium only predicate on “pure” deviations,
104
+ which, in presence of constraints, may lead to empty sets of safe deviations. Very recently, Chen et al. (2022) gener-
105
+ alize the work of Hakami and Dehghan (2015) by considering “mixed” deviations. However, their algorithm provides
106
+ rather weak convergence guarantees, as it only ensures that the returned solution satisfies incentive constraints in ex-
107
+ pectation. Indeed, as we show in Proposition 3.1, the set of constrained equilibria may not be convex (it is easy to see
108
+ that Example 1 also applies to the setting studied by Chen et al. (2022)), and, thus, the fact that incentive constraints are
109
+ only satisfied in expectation does not necessarily imply that the “true” incentive constraints defining the equilibrium
110
+ are satisfied. We refer the reader to Appendix A for additional details on these aspects.
111
+ 2
112
+
113
+ ARXIV PREPRINT - FEBRUARY 1, 2023
114
+ 2
115
+ Preliminaries
116
+ In this section, we introduce all the preliminary definitions and results that are needed in the rest of the paper.
117
+ 2.1
118
+ Cost-constrained Normal-form Games
119
+ In a normal-form game, there is a finite set N := {1, . . . , n} of n players. Each player i ∈ N has a finite set Ai of
120
+ actions available, with s := |Ai| for i ∈ N being the number of players’ actions.1 We denote by a ∈ A :=×i∈N Ai
121
+ an action profile specifying an action ai for each player i ∈ N. Moreover, for i ∈ N, we let a−i ∈ A−i :=
122
+ ×j̸=i∈N Ai be an action profile of all players other than i, while (a, a−i) is the action profile obtained by adding
123
+ a ∈ Ai to a−i. Finally, we let ui : A → [0, 1] be the utility function of player i ∈ N, with ui(a) being the utility
124
+ perceived by that player when the action profile a ∈ A is played.
125
+ We extend classical normal-form games by considering the case in which each player i ∈ N has mi cost functions,
126
+ namely ci,j : A → [−1, 1] for j ∈ [mi].2 Each player i ∈ N is subject to mi constraints, which require that all player
127
+ i’s costs are less than or equal to zero.3 For ease of notation, we assume w.l.o.g. that all players have the same number
128
+ of constraints, namely m := mi for all i ∈ N. Moreover, we encode the costs of player i ∈ N by a vector-valued
129
+ function ci : A → [−1, 1]m such that, for every a ∈ A, the j-th component of the vector ci(a) is ci,j(a).
130
+ Correlated Strategies
131
+ In this paper, we deal with solution concepts defined by correlated strategies. A correlated
132
+ strategy z ∈ ∆A is a probability distribution defined over the set of actions profiles, with z[a] denoting the probability
133
+ assigned to a ∈ A.4 With an abuse of notation, for every player i ∈ N, we let ui(z) be player i’s expected utility
134
+ when the action profile played by the players is drawn from z ∈ ∆A. In particular, it holds ui(z) := �
135
+ a∈A ui(a)z[a].
136
+ Similarly, we let ci(z) := �
137
+ a∈A ci(a)z[a] be the vector of player i’s expected costs, so that player i’s constraints
138
+ can be compactly written as ci(z) ⪯ 0. Finally, we define S ⊆ ∆A as the set of safe correlated strategies, which are
139
+ those satisfying the cost constraints of all players. Formally:
140
+ S := {z ∈ ∆A | ci(z) ⪯ 0
141
+ ∀i ∈ N} .
142
+ In the following, we assume w.l.o.g. that S ̸= ∅.
143
+ 2.2
144
+ Constrained Phi-equilibria
145
+ We generalize the notion of Phi-equilibria (Greenwald and Jafari, 2003) to cost-constrained normal-form games. Such
146
+ equilibria are defined as correlated strategies z ∈ ∆A that are robust against a given set Φ of players’ deviations, in
147
+ the sense that, if a mediator draws an action profile a ∈ A according to z and recommends to play action ai to each
148
+ player i ∈ N, then no player has an incentive to deviate from their recommendation by selecting a deviation in Φ.
149
+ For every i ∈ N, we let Φi be the set of player i’s deviations, i.e., linear transformations φi : Ai → ∆Ai that prescribe
150
+ a probability distribution over player i’s actions for every possible action recommendation. For ease of notation, we
151
+ encode a deviation φi by means of its matrix representation. Formally, an entry φi[b, a] of the matrix represents the
152
+ probability assigned to action a ∈ Ai by φi(b). We denote the set of all the possible deviations by Φ := {Φi}i∈N .
153
+ Given a correlated strategy z ∈ ∆A and a deviation φi ∈ Φi, we define φi ⋄ z as the modification of z induced by φi,
154
+ which is a linear transformation that can be expressed as follows in terms of matrix representation:
155
+ (φi ⋄ z)[ai, a−i] :=
156
+
157
+ b∈Ai
158
+ φi[b, ai]z[b, a−i],
159
+ for every ai ∈ Ai and a−i ∈ A−i. Moreover, given a set Φi of deviations of player i ∈ N, in the following we denote
160
+ by ΦS
161
+ i (z) := {φi ∈ Φi | φi ⋄ z ∈ S} the set of safe deviations for player i at a given correlated strategy z ∈ ∆A.
162
+ We are now ready to provide our definition of constrained Phi-equilibria in cost-constrained normal-form games.
163
+ Definition 2.1 (Constrained ǫ-Phi-equilibria). Given a set Φ := {Φi}i∈N of deviations and an ǫ > 0, a constrained
164
+ ǫ-Phi-equilibrium is a safe correlated strategy z ∈ S such that, for all i ∈ N, the following holds:
165
+ ui(z) ≥ ui(φi ⋄ z) − ǫ
166
+ ∀φi ∈ ΦS
167
+ i (z).
168
+ 1For ease of presentation, in this paper we assume that all the players have the same number of actions. All the results can be
169
+ easily generalized to the case of different numbers of actions.
170
+ 2In this paper, given some x ∈ N>0, we let [x] := {1, . . . , x} be the set of the first x natural numbers.
171
+ 3Since z ∈ ∆A, we can assume w.l.o.g. that all the constraints are of the form ≤ 0, as any constraint can always be cast in such
172
+ a form by suitably manipulating the cost function ci,j.
173
+ 4In this paper, given a finite set X, we denote by ∆X the set of all the probability distributions defined over the elements of X.
174
+ 3
175
+
176
+ ARXIV PREPRINT - FEBRUARY 1, 2023
177
+ A constrained Phi-equilibrium is defined for ǫ = 0.
178
+ 2.3
179
+ Computing Constrained Phi-equilibria
180
+ In the following, we formally introduce the computational problem that we study in the rest of the paper.
181
+ We denote by I := (Γ, Φ) an instance of the problem, where the tuple Γ := (N, A, {ui}i∈N , {ci,j}i∈N,j∈[m]) is a
182
+ cost-constrained normal-form game and Φ := {Φi}i∈N is a set of deviations. Moreover, we let |I| be the size (in
183
+ terms of number of bits) of the instance I. We assume that the number n of players is fixed, so that |I| does not grow
184
+ exponentially in n.5 We also make the following assumption on how the sets of deviations are represented:
185
+ Assumption 1. For every i ∈ N, the set Φi is a polytope encoded by a finite of linear inequalities.6
186
+ Let us remark that, in games without constraints, this assumption is met by all the sets Φ which determine the classical
187
+ notions of Phi-equilibria (Greenwald and Jafari, 2003).
188
+ Next, we formally define our computational problem:
189
+ Definition 2.2 (APXCPE(α, ǫ)). For any α, ǫ > 0, we define APXCPE(α, ǫ) as the problem of finding, given an
190
+ instance I := (Γ, Φ) and a linear function ℓ : ∆A → R as input, a constrained ǫ-Phi-equilibrium z ∈ ∆A such that
191
+ ℓ(z) ≥ αℓ(z′) for all constrained Phi-equilibria z′ ∈ ∆A.
192
+ Intuitively, APXCPE(α, ǫ) asks to compute a constrained ǫ-Phi-equilibrium whose value for the linear function ℓ is at
193
+ least a fraction α of the maximum value which can be achieved by an (exact) constrained Phi-equilibrium.
194
+ In order to ensure that an instance of our problem is well defined, we make the following “Slater-like” assumption on
195
+ how the players’ cost constraints are defined.
196
+ Assumption 2. For every correlated strategy z ∈ ∆A, player i ∈ N, and index j ∈ [m], there exists φ◦
197
+ i ∈ ΦS
198
+ i (z):
199
+ ci,j(φ◦
200
+ i ⋄ z) ≤ −ρ,
201
+ where ρ > 0 and 1/ρ is O(poly(|I|)), with poly(|I|) being a polynomial function of the instance size |I|.
202
+ In Assumption 2, the condition ρ > 0 is required to guarantee the existence of a constrained Phi-equilibrium (see
203
+ Theorem 2.1) and that the sets ΦS
204
+ i (z) are non-empty (otherwise our solution concept would be ill defined). Moreover,
205
+ the second condition on ρ in Assumption 2 is equivalent to requiring that our algorithms run in time polynomial in 1
206
+ ρ.
207
+ Assumption 2 also allows us to prove the existence of our equilibria, by showing that the constrained Nash equilibria
208
+ introduced by Altman and Shwartz (2000), which always exist under Assumption 2, are also constrained Phi-equilibria.
209
+ Theorem 2.1. Given a cost-constrained normal-form game Γ and a set Φ of deviations, if Assumption 2 is satisfied,
210
+ then Γ admits a constrained Phi-equilibrium.
211
+ 2.4
212
+ Relation with Unconstrained Phi-equilibria
213
+ We conclude the section by discussing the relation between our constrained Phi-equilibria and classical equilibrium
214
+ concepts for unconstrained games.
215
+ Correlated Equilibrium
216
+ When there are no constraints, the correlated equilibrium (CE) (Aumann, 1974) is a spe-
217
+ cial case of Phi-equilibrium. As shown by Greenwald and Jafari (2003), the CE is obtained when the sets Φi contain
218
+ all the possible deviations. Formally, the CE is defined by the set ΦALL := {Φi,ALL} of deviations such that:
219
+ Φi,ALL :=
220
+
221
+ φi
222
+ ���
223
+
224
+ a∈Ai
225
+ φi[b, a] = 1
226
+ ∀b ∈ Ai
227
+
228
+ .
229
+ 5Notice that the size of the representation of a normal-form game is O(sn), and, thus, exponential in n. Any algorithm that
230
+ runs in time polynomial in such instance size is not computationally appealing, as even its input has size exponential in n. For this
231
+ reason, we focus on the case in which n is fixed, and, thus, the instance size does not grow exponentially with n.
232
+ 6Notice that, since each φi ∈ Φi is represented as a matrix, a linear inequality is expressed as �
233
+ b,a∈Ai M[b, a]φi[b, a] ≤ d,
234
+ for some matrix M and scalar d.
235
+ 4
236
+
237
+ ARXIV PREPRINT - FEBRUARY 1, 2023
238
+ Coarse Correlated Equilibrium
239
+ The coarse correlated equilibrium (CCE) (Moulin and Vial, 1978b) is a special
240
+ (unconstrained) Phi-equilibrium whose set of deviations is ΦCCE := {Φi,CCE}i∈N such that:
241
+ Φi,CCE :=
242
+
243
+ φi
244
+ ��� ∃h ∈ ∆Ai : φi[b, a] = h[a] ∀b, a ∈ Ai
245
+
246
+ .
247
+ Intuitively, such sets contain all the possible deviations that prescribe the same probability distribution independently
248
+ of the received action recommendation.
249
+ Thus, our constrained Phi-equilibria include the generalization of CEs and CCEs to cost-constrained games.
250
+ Our definition of constrained Phi-equilibrium needs to employ “mixed” deviations that map action recommendations
251
+ to probability distributions over actions. This is necessary in presence of constraints. Instead, without them, one
252
+ can simply consider “pure” deviations that map recommendations to actions deterministically Greenwald and Jafari
253
+ (2003).
254
+ 3
255
+ Challenges of Constrained Phi-equilibria
256
+ In this section, we show that, in cost-constrained normal-form games, Phi-equilibria loose the nice computational
257
+ properties that they exhibit in unconstrained settings. This is crucially determined by the fact that the set of constrained
258
+ Phi-equilibria may not be convex in general.
259
+ Proposition 3.1. Given any instance I := (Γ, Φ), the set of constrained Phi-equilibria may not be convex.
260
+ Proposition 3.1 is proved by the following example.
261
+ Example 1. Let ΦALL be the set of all the possible deviations in a two-player game in which each player has two
262
+ actions, namely A1 = A2 = {a0, a1}. The first player’s utility is such that u1(a, a′) = 0 for all a ∈ A1 and a′ ∈ A2,
263
+ while the second player’s utility is such that u2(a0, a1) = 1, and 0 otherwise. Both players share the same single
264
+ cost constraint (m = 1). Their cost functions are defined as ci(a0, a1) = 1, ci(a0, a0) = − 1
265
+ 2, and ci(a1, a) = −1
266
+ for all a ∈ A2. Notice that the instance defined above satisfies Assumption 2 for ρ = 1/2. It is easy to see that the
267
+ correlated strategy z1 ∈ ∆A such that z1[a0, a0] = 2
268
+ 3 and z1[a0, a1] = 1
269
+ 3 is a constrained Phi-equilibrium. Moreover,
270
+ the “pure” correlated strategy z2 ∈ ∆A such that z2[a1, a0] = 1 is also a constrained Phi-equilibrium. However, the
271
+ combination z3 = 1
272
+ 2(z1 + z2) is not a constrained Phi-equilibrium. Indeed, the second player has an incentive to
273
+ deviate by using a deviation φ2 such that φ2[a0, a1] = 1 and φ2[a1, a1] = 1. Such a deviation prescribes to play action
274
+ a1 when a0 is recommended, and to play action a1 when the recommendation is a1. Straightforward calculations show
275
+ that, for every a ∈ A1:
276
+ (φ2 ⋄ z3)[a, a′] =
277
+ � 1
278
+ 2
279
+ if
280
+ a′ = a1
281
+ 0
282
+ otherwise,
283
+ and u2(φ2 ⋄ z3) = 1
284
+ 2 > u2(z3) = 1
285
+ 6. Moreover, the deviation is safe, since φ2 ∈ ΦS
286
+ 2 (z3) as c2(φ2 ⋄ z3) = 0.
287
+ In order to formally asses the computational challenges of computing constrained Phi-equilibria, we prove the follow-
288
+ ing strong inapproximability result:
289
+ Theorem 3.1 (Hardness). For any constant α > 0, the problem APXCPE(α, (α/s)2) is NP-hard, where s is the
290
+ number of players’ actions in the instance given as input.
291
+ Intuitively, Theorem 3.1 states that, for every multiplicative approximation factor α > 0, it is not possible to find
292
+ a constrained ǫ-Phi-equilibrium having value of ℓ at least a fraction α of its optimal value in time polynomial in 1
293
+ ǫ.
294
+ Moreover, as a byproduct of Theorem 3.1, we also get the inapproximability up to within any factor of the problem of
295
+ computing an optimal constrained (exact) Phi-equilibrium.
296
+ Notice that the hardness result in Theorem 3.1 cannot hold for values of ǫ that are independent from the instance size.
297
+ Indeed, as we prove in Corollary 4.3 in Section 4, problem APXCPE(1, ǫ) can be solved in quasi-polynomial time
298
+ in the instance size whenever ǫ > 0 is a given constant. Thus, any NP-hardness result for APXCPE(α, ǫ) would
299
+ contradict the exponential-time hypothesis.7
300
+ 4
301
+ Computing Optimal Constrained ǫ-Phi-equilibria Efficiently
302
+ In this section, we show how to circumvent the negative result established by Theorem 3.1. In particular, we prove
303
+ that, when the number of cost constraints is fixed, problem APXCPE(1, ǫ) can be solved in time polynomial in the
304
+ 7The exponential-time hypothesis conjectures that solving 3SAT requires at least exponential time.
305
+ 5
306
+
307
+ ARXIV PREPRINT - FEBRUARY 1, 2023
308
+ instance size and 1
309
+ ǫ for ǫ > 0 (Corollary 4.2). Moreover, we also prove that, in general, for any constant ǫ > 0 problem
310
+ APXCPE(1, ǫ) admits a quasi-polynomial-time algorithm, whose running time becomes polynomial when the number
311
+ of players’ actions is fixed (Corollary 4.3).
312
+ First, in Section 4.1, we provide a general algorithm that is at the core of the two main results of this section. Then, in
313
+ Section 4.1, we show how the algorithm can be suitably instantiated in order to prove each result. In the rest of this
314
+ section, unless stated otherwise, we always assume that an ǫ > 0 has been fixed, and that I := (Γ, Φ) and ℓ : ∆A → R
315
+ are the inputs of a given instance of problem APXCPE(1, ǫ).
316
+ 4.1
317
+ General Algorithm
318
+ The main technical tool that we employ in order to design our algorithm is a “Lagrangification” of the constraints
319
+ defining the sets ΦS
320
+ i (z) of safe deviations. First, we prove the following preliminary result, which shows that strong
321
+ duality holds for the problem maxφi∈ΦS
322
+ i (z) ui(φi ⋄ z) of finding the best safe deviation for player i ∈ N at z ∈ ∆A.
323
+ Lemma 4.1. For every z ∈ ∆A and i ∈ N, it holds
324
+ max
325
+ φi∈ΦS
326
+ i (z) ui(φi ⋄ z) = sup
327
+ φi∈Φi
328
+ inf
329
+ ηi∈Rm
330
+ +
331
+
332
+ ui(φi ⋄ z) − η⊤
333
+ i ci(φi ⋄ z)
334
+
335
+ =
336
+ inf
337
+ ηi∈Rm
338
+ +
339
+ sup
340
+ φi∈Φi
341
+
342
+ ui(φi ⋄ z) − η⊤
343
+ i ci(φi ⋄ z)
344
+
345
+ .
346
+ Then, by exploiting Lemma 4.1, we can prove that, under Assumption 2, strong duality continues to hold even when
347
+ restricting the Lagrange multipliers ηi to have ℓ1-norm less than or equal to 1/ρ. Formally:
348
+ Lemma 4.2. Let D :=
349
+
350
+ η ∈ Rm
351
+ + | ||η||1 ≤ 1/ρ
352
+
353
+ . Then, for every z ∈ ∆A and i ∈ N, it holds:
354
+ max
355
+ φi∈ΦS
356
+ i (z) ui(φi ⋄ z) = max
357
+ φi∈Φi min
358
+ ηi∈D
359
+
360
+ ui(φi ⋄ z) − η⊤
361
+ i ci(φi ⋄ z)
362
+
363
+ = min
364
+ ηi∈D max
365
+ φi∈Φi
366
+
367
+ ui(φi ⋄ z) − η⊤
368
+ i ci(φi ⋄ z)
369
+
370
+ .
371
+ Lemma 4.2 allows us to write player i’s incentive constraints in the definition of constrained ǫ-Phi-equilibria as
372
+ ui(z) ≥ min
373
+ ηi∈D max
374
+ φi∈Φi
375
+
376
+ ui(φi ⋄ z) − η⊤
377
+ i ci(φi ⋄ z)
378
+
379
+ − ǫ.
380
+ (1)
381
+ This crucially allows us to show the following result: solving problem APXCPE(1, ǫ) is equivalent to computing
382
+ max(η1,...,ηn)∈Dn Fǫ(η1, . . . , ηn), where Fǫ(η1, . . . , ηn) is the optimal value of a suitable maximization problem
383
+ parameterized by tuples of Lagrange multipliers ηi ∈ D, one per player i ∈ N. Such a problem asks to compute a safe
384
+ correlated strategy maximizing the linear function ℓ subject to players’ incentive constraints that are re-formulated by
385
+ means of Lemma 4.2. Formally, we define Fǫ(η1, . . . , ηn) as the maximum of ℓ(z) over those z ∈ S that additionally
386
+ satisfy the following constraint for every i ∈ N:
387
+ ui(z) ≥ max
388
+ φi∈Φi
389
+
390
+ ui(φi ⋄ z) − η⊤
391
+ i ci(φi ⋄ z)
392
+
393
+ − ǫ.
394
+ (2)
395
+ Notice that the min operator that appears in the right-hand side of Constraints (1) is dropped by adding the outer
396
+ maximization over the tuples (η1, . . . , ηn) ∈ Dn, as the maximum of ℓ is always achieved when the right-hand side
397
+ of such constraints is as small as possible.
398
+ Next, we show that Fǫ(η1, . . . , ηn) can be computed in polynomial time by means of the ellipsoid algorithm.
399
+ Lemma 4.3. For every tuple (η1, . . . , ηn) ∈ Dn, the value of Fǫ(η1, . . . , ηn) can be computed in time polynomial in
400
+ the instance size |I| and 1
401
+ ǫ.
402
+ Proof. We show that Fǫ(η1, . . . , ηn) can be solved in polynomial time by means of the ellipsoid algorithm. Let us
403
+ notice that Constraints (2) can be equivalently encoded by a set of linear inequalities, one for each player i ∈ N
404
+ and deviation φi ∈ vert(Φi), where vert(Φi) denotes the set of vertexes of the polytope Φi (recall Assumption 1).
405
+ Thus, solving Fǫ(η1, . . . , ηn) is equivalent to solving an LP with a (possibly) exponential number of constraints, but
406
+ polynomially-many variables. Such an LP can be solved in polynomial time by means of the ellipsoid algorithm,
407
+ provided that a polynomial-time separation oracle for the linearized version of Constraints (2) is available. Such an
408
+ oracle can be implemented by solving the maximization in the right-hand side of Constraints (2) for a correlated
409
+ strategy z ∈ ∆A given as input. Formally, the separation oracle solves the following problem for each player i ∈ N:
410
+ φ⋆
411
+ i ∈ arg max
412
+ φi∈Φi
413
+
414
+ ui(φi ⋄ z) − η⊤
415
+ i ci(φi ⋄ z)
416
+
417
+ ,
418
+ 6
419
+
420
+ ARXIV PREPRINT - FEBRUARY 1, 2023
421
+ which can be done efficiently thanks to Assumption 1. Then, if the separation oracle finds any φ⋆
422
+ i such that:
423
+ ui(z) ≥ ui(φ⋆
424
+ i ⋄ z) − η⊤
425
+ i ci(φ⋆
426
+ i ⋄ z),
427
+ it outputs the above inequality as a separating hyperplane to be used in the ellipsoid algorithm.
428
+ Lemma 4.3 is not enough to complete our algorithm, since we need an efficient way of optimizing Fǫ(η1, . . . , ηn)
429
+ over all the tuples of Lagrange multipliers. This problem is non-trivial, since Fǫ(η1, . . . , ηn) is non-concave in ηi.
430
+ Nevertheless, we show that, by restricting the domain D of the Lagrange multipliers to a suitably-defined finite “small”
431
+ subset, we can still find a constrained ǫ-Phi-equilibrium whose value of ℓ is at least as large as that of any constrained
432
+ (exact) Phi-equilibrium. This is enough to solve APXCPE(1, ǫ). In particular, we need a finite subset of “good”
433
+ Lagrange multipliers, in the sense of the following definition.
434
+ Definition 4.1. Given any δ > 0, a set ˜D ⊆ D is δ-optimal if, for every z ∈ ∆A and i ∈ N, the following holds:
435
+ min
436
+ ηi∈ ˜
437
+ D
438
+ max
439
+ φi∈Φi
440
+
441
+ ui(φi ⋄ z) − η⊤
442
+ i ci(φi ⋄ z)
443
+
444
+
445
+ max
446
+ φi∈ΦS
447
+ i (z) ui(φi ⋄ z) + δ.
448
+ Intuitively, thanks to Lemma 4.2, if we optimize the Lagrange multipliers over a δ-optimal set ˜D ⊆ D, instead of
449
+ optimizing them over D, then we are allowing the players to violate incentive constraints by at most δ.
450
+ In the following, we assume that a finite δ-optimal set ˜D ⊆ D is available. In Section 4.2, se show how to design two
451
+ particular δ-optimal sets that allow to prove our main results. For ease of presentation, we let
452
+ L ˜
453
+ D,ǫ :=
454
+ max
455
+ (η1,...,ηn)∈ ˜
456
+ Dn Fǫ(η1, . . . , ηn)
457
+ be the optimal value of Fǫ(η1, . . . , ηn) when the Lagrange multipliers are constrained to be in a δ-optimal set ˜D ⊆ D.
458
+ Next, we show that, given any δ-optimal set ˜D with δ ≤ ǫ, the value of L ˜
459
+ D,ǫ is at least that achieved by constrained
460
+ (exact) Phi-equilibria, namely LD,0. Formally:
461
+ Lemma 4.4. Given any 0 < δ ≤ ǫ and a δ-optimal set ˜D ⊆ D, the following holds: L ˜
462
+ D,ǫ ≥ LD,0.
463
+ Intuitively, Lemma 4.4 is proved by noticing that, provided that δ ≤ ǫ, the incentive constraints violation introduced
464
+ by using ˜D instead of D is at most ǫ. Moreover, the set of feasible correlated strategies can only expand by allowing
465
+ incentive constraints to be violated, and, thus, the value of the objective ℓ can only increase.
466
+ Lemma 4.4 suggests a way of solving APXCPE(1, ǫ). Indeed, given a finite δ-optimal set ˜D ⊆ D with δ ≤ ǫ, by
467
+ enumerating over all the tuples of Lagrange multipliers ηi ∈ ˜D, one per player i ∈ N, we can find the desired
468
+ constrained ǫ-Phi-equilibrium. The following theorem shows that this procedure gives an algorithm for APXCPE(1, ǫ)
469
+ that runs in time polynomial in the instance size, | ˜D|, and 1
470
+ ǫ.
471
+ Theorem 4.1. Given a finite δ-optimal set ˜D ⊆ D with δ ≤ ǫ, there exists an algorithm that solves APXCPE(1, ǫ)
472
+ and runs in time polynomial in the instance size |I|, the number | ˜D| of elements in ˜D, and 1
473
+ ǫ for every ǫ > 0.
474
+ Proof. The algorithm works by enumerating over all the possible tuples of Lagrange multipliers ηi ∈ ˜D, one per
475
+ player i ∈ N. These are polynomially many in the size | ˜D| when the number of players n is fixed. For every tuple
476
+ (η1, . . . , ηn) ∈ ˜Dn, the algorithm solves Fǫ(η1, . . . , ηn), which can be done in time polynomial in |I| and 1
477
+ ǫ thanks
478
+ to Lemma 4.3. Finally, the algorithm returns the correlated strategy z ∈ ∆A with the highest value of ℓ among those
479
+ computed while solving Fǫ(η1, . . . , ηn). It is easy to see that the returned solution solves problem APXCPE(1, ǫ) by
480
+ applying Lemma 4.4. This concludes the proof.
481
+ 4.2
482
+ Instantiating the General Algorithm
483
+ Next, we show how to build δ-optimal sets ˜D that, when they are plugged in the algorithm in Theorem 4.1, allow us
484
+ to derive our results. In particular, we consider the set:
485
+ Dτ :=
486
+
487
+ η ∈ D
488
+ ��� ηj = kτ, k ∈ {0, . . . , ⌊1/τρ⌋} ∀j ∈ [m]
489
+
490
+ ,
491
+ which is a discretization of D with a regular lattice of step τ ∈ R+ (notice that ηj is the j-th component of η).
492
+ By a simple stars and bars combinatorial argument, we have that |Dτ| =
493
+ �⌊1/τρ⌋+m
494
+ m
495
+
496
+ . Thus, since it holds that
497
+ 7
498
+
499
+ ARXIV PREPRINT - FEBRUARY 1, 2023
500
+ |Dτ| = O((1/τρ)m), if the number of constraints m is fixed, |Dτ| is bounded by a polynomial in 1/τρ. Moreover,
501
+ simple combinatorial arguments show that |Dτ| ≤ (1 + m)⌊1/τρ⌋.8 Thus, it also holds that |Dτ| = O(m
502
+ 1/τρ). Notice
503
+ that the two bounds on |Dτ| are non-comparable, and, thus, they give rise to two distinct results, as we show in the
504
+ following.
505
+ By using the first bound on |Dτ|, we can show that the set Dτ is δ-optimal for δ = mτ. Formally:
506
+ Lemma 4.5. For any τ > 0, the set Dτ is (τm)-optimal.
507
+ Thus, whenever the number m of cost constraints is fixed, Lemma 4.5, together with Theorem 4.1, allows us to provide
508
+ a polynomial-time algorithm. Indeed, it is sufficient to apply Theorem 4.1 for the (τm)-optimal set Dτ with τ := ǫ/m
509
+ to obtain the following first main result:
510
+ Corollary 4.2. There exists an algorithm that solves problem APXCPE(1, ǫ) in time polynomial in |I| and 1
511
+ ǫ for every
512
+ ǫ > 0, when the number m of cost constraints is fixed.
513
+ On the other hand, by using the second bound on |Dτ|, we can show that Dτ is δ-optimal for δ depending logarithmi-
514
+ cally on the number of players’ actions. Formally:
515
+ Lemma 4.6. For any τ > 0, the set Dτ is δ-optimal for δ = 2
516
+
517
+ 2τ log s/ρ, where s is the number of players’ actions.
518
+ Lemma 4.6 (together with Theorem 4.1) immediately gives us a quasi-polynomial-time for solving APXCPE(1, ǫ) for
519
+ a given constant ǫ > 0. Moreover, its running time becomes polynomial when the number of players’ actions is fixed.
520
+ Corollary 4.3. For any constant ǫ > 0, there exists an algorithm that solves APXCPE(1, ǫ) in time O(|I|log s).
521
+ Moreover, when the number s of players’ actions is fixed, the algorithm runs in time polynomial in |I|.
522
+ Notice that it is in general not possible to design an algorithm that runs in time polynomial in 1
523
+ ǫ, since this would
524
+ contradict the hardness result in Theorem 3.1.
525
+ 5
526
+ A Special Case: Deviation-dependent Costs
527
+ We complete our computational study of constrained Phi-equilibria by considering a special case in which player i’s
528
+ costs associated to a deviation φi only depend on φi and not on the (overall) modified correlated strategy φi ⋄ z.
529
+ We consider instances satisfying the following assumption.
530
+ Assumption 3. For every player i ∈ N and player i’s deviation φi ∈ Φi, there exists a function ˜ci : Φi → [−1, 1]m
531
+ such that ˜ci(φi) := ci(φi ⋄ z) for every z ∈ ∆A.
532
+ Notice that, whenever Assumption 3 holds, the set ΦS
533
+ i (z) of safe deviations does not depend on z. Thus, in the rest of
534
+ this section, we write w.l.o.g. ΦS
535
+ i rather than ΦS
536
+ i (z).
537
+ A positive effect of Assumption 3 is that it recovers the convexity of the set of constrained Phi-equilibria, rendering
538
+ them more akin to unconstrained ones. Formally:
539
+ Proposition 5.1. For instances I := (Γ, Φ) satisfying Assumption 3, the set of constrained ǫ-Phi-equilibria is convex.
540
+ Proposition 5.1 suggests that constrained Phi-equilibria are much more computationally appealing under Assumption 3
541
+ than in general, as we indeed show in the rest of this section.
542
+ First, in Section 5.1, we show that APXCPE(1, 0) admits a polynomial-time algorithm under Assumption 3. Then, in
543
+ Section 5.2, we design a no-regret learning algorithm that efficiently computes one constrained ǫ-Phi equilibrium with
544
+ ǫ = O(1/
545
+
546
+ T) as the number of rounds T grows. Finally, in Section 5.3, we provide a natural example of constrained
547
+ Phi-equilibria satisfying Assumption 3.
548
+ 5.1
549
+ A Poly-time Algorithm for Optimal Equilibria
550
+ We prove that, whenever Assumption 3 holds, the problem of computing an (exact) Phi-equilibrium maximizing a
551
+ given linear function can be solved in polynomial time. This is done by formulating the problem as an LP with
552
+ polynomially-many variables and exponentially-many constraints, which can be solved by means of the ellipsoid
553
+ method, similarly to how we compute Fǫ(η1, . . . ηn) in Section 4 (see the proof of Lemma 4.3). Formally:
554
+ Theorem 5.1. Restricted to instances I := (Γ, Φ) which satisfy Assumption 3, APXCPE(1, 0) admits a polynomial-
555
+ time algorithm.
556
+ 8See Appendix D for a formal proof.
557
+ 8
558
+
559
+ ARXIV PREPRINT - FEBRUARY 1, 2023
560
+ 5.2
561
+ An Efficient No-regret Learning Algorithm
562
+ Next, we show how Assumption 3 allows us to find a constrained ǫ-Phi-equilibrium by means of a polynomial-time
563
+ decentralized no-regret learning algorithm. Our algorithm is based on the Phi-regret minimization framework intro-
564
+ duced by Greenwald and Jafari (2003), which needs to be extended in order to be able to work with polytopal sets ΦS
565
+ i
566
+ of safe deviations, rather than finite sets of “pure” deviations.
567
+ Algorithm 1 Learning a Constrained ǫ-Phi-equilibria
568
+ Require: Regret minimizers Ri for the sets ΦS
569
+ i , for i ∈ N
570
+ 1: Initialize the regret minimizers Ri
571
+ 2: for t = 1, . . . , T do
572
+ 3:
573
+ for each player i ∈ N do
574
+ 4:
575
+ φi,t ← Ri.RECOMMEND()
576
+ 5:
577
+ Play according to a distribution xi,t ∈ ∆Ai s.t.
578
+ xi,t[a] =
579
+
580
+ b∈Ai
581
+ φi,t[b, a]xi,t[b]
582
+ ∀a ∈ Ai
583
+ 6:
584
+ end for
585
+ 7:
586
+ zt ← ⊗i∈N xi,t
587
+ 8:
588
+ Ri.OBSERVE(φi �→ ui(φi ⋄ zt))
589
+ 9: end for
590
+ 10: return ¯zT := 1
591
+ T
592
+ �T
593
+ t=1 zt
594
+ Algorithm 1 outlines our no-regret algorithm. It instantiates a regret minimizer Ri for the polytope ΦS
595
+ i for each i ∈ N.
596
+ Ri is an object that, at each round t ∈ [T ], recommends a safe deviation φi,t ∈ ΦS
597
+ i to player i (Line 4 of Algorithm 1),
598
+ and, then, observes a function φi �→ ui(φi ⋄ zt) that specifies the utility that would have been obtained by selecting
599
+ any safe deviation φi ∈ ΦS
600
+ i at round t (Line 8 of Algorithm 1). Ri guarantees that the regret RT
601
+ i cumulated by player
602
+ i over [T ] grows sublinearly, i.e., RT
603
+ i = o(T ), where:
604
+ RT
605
+ i := max
606
+ φi∈Φi
607
+ T
608
+
609
+ t=1
610
+ ui(φi ⋄ zt) −
611
+ T
612
+
613
+ t=1
614
+ ui(φi,t ⋄ zt),
615
+ which is how much player i loses by selecting φi,t at each t rather than choosing the same best-in-hindsight deviation
616
+ at all rounds. Notice that, by taking inspiration from the Phi-regret framework (Greenwald and Jafari, 2003), given
617
+ a recommended deviation φi,t, player i actually plays according to a probability distribution xi,t ∈ ∆Ai, which
618
+ is a stationary distribution of the matrix representing φi,t. This is crucial in order to implement the algorithm in a
619
+ decentralized fashion and to provide convergence guarantees to constrained ǫ-Phi-equilibria (see Theorem 5.2). All the
620
+ distributions xi,t jointly determine a correlated strategy zt ∈ ∆A at each round t ∈ [T ], defined as zt := ⊗i∈N xi,t,
621
+ where ⊗ denotes the product among distributions; formally, zt[a] := �
622
+ i∈N xi,t[ai] for all a ∈ A.
623
+ Algorithm 1 provides the following guarantees:
624
+ Theorem 5.2. Given an instance I := (Γ, Φ) satisfying Assumption 3, after T ∈ N>0 rounds, Algorithm 1 returns a
625
+ correlated strategy ¯zT ∈ ∆A that is a constrained ǫT -Phi-equilibrium with ǫT = O(1/
626
+
627
+ T). Moreover, each round of
628
+ Algorithm 1 runs in polynomial time.
629
+ Let us remark that the crucial property which allows us to design Algorithm 1 is that the sets ΦS
630
+ i of safe deviations do
631
+ not depend on players other than i. Finally, from Theorem 5.2, the following result follows:
632
+ Corollary 5.3. In instances I := (Γ, Φ) satisfying Assumption 3, a constrained ǫ-Phi-equilibrium can be computed
633
+ in time polynomial in the instance size and 1
634
+ ǫ by means of a decentralized learning algorithm.
635
+ 5.3
636
+ Marginally-constrained CCE
637
+ We conclude the section by introducing a particular (natural) notion of constrained ǫ-Phi-equilibrium for which As-
638
+ sumption 3 is satisfied. This is a constrained version of the classical CCE in cost-constrained normal-form games
639
+ where a player’s costs only depend on the action of that player. We call it marginally-constrained ǫ-CCE. Formally,
640
+ such an equilibrium is defined for games in which, for every player i ∈ N, it holds ci(a) = ci(a′) for all a, a′ ∈ A
641
+ such that ai = a′
642
+ i, and for the set ΦCCE of CCE deviations that we have previously introduced in Section 2.4. Next,
643
+ we prove that, with the definition above, Assumption 3 is satisfied.
644
+ 9
645
+
646
+ ARXIV PREPRINT - FEBRUARY 1, 2023
647
+ Theorem 5.4. For instances I := (Γ, ΦCCE) such that ci(a) = ci(a′) for every player i ∈ N and action profiles
648
+ a, a′ ∈ A : ai = a′
649
+ i, Assumption 3 holds.
650
+ Thanks to Theorem 5.4, we readily obtain the two following corollaries of Theorems 5.1 and 5.1.
651
+ Corollary 5.5. The problem of computing a marginally-constrained (exact) CCE that maximizes a linear function
652
+ ℓ : ∆A → R can be solved in polynomial time.
653
+ Corollary 5.6. A marginally-constrained ǫ-CCE can be computed in time polynomial in the instance size and 1
654
+ ǫ by
655
+ means of a decentralized learning algorithm.
656
+ 6
657
+ Discussion and Open Problems
658
+ The main positive results that we provide in this paper (Corollaries 4.2 and 4.3) show that a constrained ǫ-Phi equilib-
659
+ rium maximizing a given linear function can be computed in time polynomial in the instance size and 1
660
+ ǫ, when either
661
+ the number of constraints or that of players’ actions is fixed. Clearly, this implies that, under the same assumptions,
662
+ a constrained ǫ-Phi-equilibrium can be found efficiently. Moreover, in Section 5, we designed an efficient no-regret
663
+ learning algorithm that finds a constrained ǫ-Phi-equilibrium in settings enjoying special properties (Corollary 5.3).
664
+ However, the problem of efficiently computing a constrained ǫ-Phi-equilibrium remains open in general. Formally:
665
+ Definition 6.1 (Open Problem). Given any instance I := (Γ, Φ), find a constrained ǫ-Phi-equilibrium in time polyno-
666
+ mial in the instance size and 1
667
+ ǫ.
668
+ Solving the problem above is non-trivial. Proposition 3.1 in Section 3 proves that the set of constrained ǫ-Phi-equilibria
669
+ is non-convex, and, thus, solving the problem in Definition 6.1 is out of scope for most of the known equilibrium
670
+ computation techniques. On the other hand, it is unlikely that such a problem is NP-hard. Indeed, a constrained
671
+ ǫ-Phi-equilibrium always exists and, given any z ∈ ∆A, it is possible to verify whether z is an equilibrium or not
672
+ in polynomial time. Formally, such a problem is said to belong to the TFNP complexity class, and, thus, standard
673
+ arguments show that, if the problem is NP-hard, then NP = coNP (Megiddo and Papadimitriou, 1991). Thus, one
674
+ should try to reduce the problem in Definition 6.1 to problems in TFNP, such as that of computing a Nash equilibrium.
675
+ However, while the problem in Definition 6.1 shares some properties with that of computing a Nash equilibrium, such
676
+ as the non-convexity of the set of the equilibria, the former is fundamentally different from the latter, since it exhibits
677
+ correlation among the players. Thus, a reduction from such a problem to that of computing Nash equilibria would
678
+ require a gadget to break the correlation among the players, and doing that is highly non-trivial as cost constraints are
679
+ expressed by linear functions.
680
+ 10
681
+
682
+ ARXIV PREPRINT - FEBRUARY 1, 2023
683
+ References
684
+ Eitan Altman and Adam Shwartz. 2000. Constrained markov games: Nash equilibria. In Advances in dynamic games
685
+ and applications. Springer, 213–221.
686
+ Jorge Alvarez-Mena and On´esimo Hern´andez-Lerma. 2006. Existence of Nash equilibria for constrained stochastic
687
+ games. Mathematical Methods of Operations Research 63, 2 (2006), 261–285.
688
+ Kenneth J Arrow and Gerard Debreu. 1954. Existence of an equilibrium for a competitive economy. Econometrica:
689
+ Journal of the Econometric Society (1954), 265–290.
690
+ Robert J Aumann. 1974. Subjectivity and correlation in randomized strategies. Journal of mathematical Economics 1,
691
+ 1 (1974), 67–96.
692
+ A Bakhtin, N Brown, E Dinan, G Farina, C Flaherty, D Fried, A Goff, J Gray, H Hu, AP Jacob, et al. 2022. Human-
693
+ level play in the game of Diplomacy by combining language models with strategic reasoning. Science (New York,
694
+ NY) (2022), eade9097–eade9097.
695
+ Noam Brown and Tuomas Sandholm. 2019. Superhuman AI for multiplayer poker. Science 365, 6456 (2019), 885–
696
+ 890.
697
+ Luis Felipe Bueno, Gabriel Haeser, and Frank Navarro Rojas. 2019. Optimality conditions and constraint qualifications
698
+ for generalized Nash equilibrium problems and their practical implications. SIAM Journal on Optimization 29, 1
699
+ (2019), 31–54.
700
+ Andrea Celli, Alberto Marchesi, Gabriele Farina, and Nicola Gatti. 2020. No-regret learning dynamics for extensive-
701
+ form correlated equilibrium. Advances in Neural Information Processing Systems 33 (2020), 7722–7732.
702
+ Ziyi Chen, Shaocong Ma, and Yi Zhou. 2022. Finding Correlated Equilibrium of Constrained Markov Game: A
703
+ Primal-Dual Approach. In Advances in Neural Information Processing Systems.
704
+ Constantinos Daskalakis, Paul W Goldberg, and Christos H Papadimitriou. 2009. The complexity of computing a
705
+ Nash equilibrium. SIAM J. Comput. 39, 1 (2009), 195–259.
706
+ Ivar Ekeland and Roger Temam. 1999. Convex analysis and variational problems. SIAM.
707
+ Francisco Facchinei and Christian Kanzow. 2010. Generalized Nash equilibrium problems. Annals of Operations
708
+ Research 175, 1 (2010), 177–211.
709
+ Denizalp Goktas and Amy Greenwald. 2022. Exploitability Minimization in Games and Beyond. Advances in Neural
710
+ Information Processing Systems (2022).
711
+ Amy Greenwald and Amir Jafari. 2003. A general class of no-regret learning algorithms and game-theoretic equilibria.
712
+ In Learning theory and kernel machines. Springer, 2–12.
713
+ Vesal Hakami and Mehdi Dehghan. 2015. Learning stationary correlated equilibria in constrained general-sum stochas-
714
+ tic games. IEEE Transactions on Cybernetics 46, 7 (2015), 1640–1654.
715
+ Johan H˚astad. 1999. Clique is hard to approximate within n1−ǫ. Acta Mathematica 182, 1 (1999), 105–142.
716
+ Elad Hazan et al. 2016. Introduction to online convex optimization. Foundations and Trends® in Optimization 2, 3-4
717
+ (2016), 157–325.
718
+ Michael I Jordan, Tianyi Lin, and Manolis Zampetakis. 2022. First-Order Algorithms for Nonlinear Generalized Nash
719
+ Equilibrium Problems. arXiv preprint arXiv:2204.03132 (2022).
720
+ Christian Kanzow and Daniel Steck. 2016. Augmented Lagrangian methods for the solution of generalized Nash
721
+ equilibrium problems. SIAM Journal on Optimization 26, 4 (2016), 2034–2058.
722
+ Nimrod Megiddo and Christos H Papadimitriou. 1991. On total functions, existence theorems and computational
723
+ complexity. Theoretical Computer Science 81, 2 (1991), 317–324.
724
+ H. Moulin and J-P Vial. 1978a. Strategically zero-sum games: the class of games whose completely mixed equilibria
725
+ cannot be improved upon. INT J GAME THEORY 7, 3 (1978), 201–221.
726
+ Herv´e Moulin and J-P Vial. 1978b.
727
+ Strategically zero-sum games: the class of games whose completely mixed
728
+ equilibria cannot be improved upon. International Journal of Game Theory 7, 3 (1978), 201–221.
729
+ John Nash. 1951. Non-cooperative games. Annals of mathematics (1951), 286–295.
730
+ Christos H Papadimitriou and Tim Roughgarden. 2008. Computing correlated equilibria in multi-player games. Jour-
731
+ nal of the ACM (JACM) 55, 3 (2008), 1–29.
732
+ J Ben Rosen. 1965. Existence and uniqueness of equilibrium points for concave n-person games. Econometrica:
733
+ Journal of the Econometric Society (1965), 520–534.
734
+ David Zuckerman. 2007. Linear Degree Extractors and the Inapproximability of Max Clique and Chromatic Number.
735
+ Theory of Computing 3, 6 (2007), 103–128.
736
+ 11
737
+
738
+ ARXIV PREPRINT - FEBRUARY 1, 2023
739
+ A
740
+ On the Weaknesses of the Guarantees of the Algorithm of Chen et al. (2022)
741
+ The Algorithm of Chen et al. (2022) finds a distribution µ over correlated strategies ∆A such that:
742
+ Ez∼µ
743
+
744
+ max
745
+ φi∈ΦS
746
+ i (z) ui(φi ⋄ z) − ui(z)
747
+
748
+ ≤ 0.
749
+ (3)
750
+ However, here we claim that this solution concept inherits some weaknesses from the non-convexity of the equilibria
751
+ set that we proved in Theorem 5.1. Indeed, consider the same instance of Theorem 5.1 and consider the uniform
752
+ distribution µ over {z1, z2}. In Theorem 5.1 we proved that maxφi∈ΦS
753
+ i (z1) ui(φi ⋄z1)−ui(z1) ≤ 0 for all i ∈ {1, 2}
754
+ and maxφi∈ΦS
755
+ i (z2) ui(φi ⋄ z2) − ui(z2) ≤ 0 for all i ∈ {1, 2} and thus Equation (3) holds over the distribution µ.
756
+ However we show that the expected correlated strategy z3 derived from distribution µ, i.e., z3 = Ez∼µ[z] = 1
757
+ 2z1 +
758
+ 1
759
+ 2z2, it is not a feasible equilibrium, or an approximate one.
760
+ Indeed, in Theorem 5.1, we proved that maxφ2∈ΦS
761
+ 2 (z3) u2(φ2 ⋄z3)−u2(z3) ≥ 1
762
+ 3, showing that the average correlated
763
+ strategies returned by their Algorithm is not an equilibrium nor close to it.
764
+ This comes from the peculiar fact about Constrained Phi-equilibria that exhibit non-convex set of solutions, which is
765
+ in striking contrast with the unconstrained case. Indeed the guarantees of Equilibria (3) would imply that Ez∼µ[z] is
766
+ a equilibrium in the unconstrained case in which the set of equilibria is convex.
767
+ B
768
+ Proofs Omitted from Section 2
769
+ Theorem 2.1. Given a cost-constrained normal-form game Γ and a set Φ of deviations, if Assumption 2 is satisfied,
770
+ then Γ admits a constrained Phi-equilibrium.
771
+ Proof. With assumption 2 Altman and Shwartz (2000, Theorem 2.1) proves the existence of a constrained Nash equi-
772
+ librium. In our setting this is equivalent to a product distribution z = ⊗i∈[N]xi so that it is a Constrained Phi-
773
+ equilibrium for any set of deviations Φi.9 This is easily seen by observing that a Constrained Nash Equilibria is
774
+ defined as:
775
+
776
+ a∈A
777
+ ui
778
+
779
+  �
780
+ j∈[N]
781
+ xj(aj)
782
+
783
+  ≥
784
+
785
+ a∈A
786
+ ui
787
+
788
+ ˜xi(aj)
789
+
790
+ j∈[N]\{i}
791
+ xi(ai)
792
+
793
+
794
+ for all ˜xi ∈ ∆(Ai) s.t. xi ⊗ x−i ∈ S.
795
+ On the other hand it easily seen that for all φi ∈ Φi(z) there exists some ˜xi ∈ ∆(Ai) such that
796
+ φi ⋄
797
+
798
+ ⊗j∈[N]xj
799
+
800
+ = ˜xi ⊗ x−i
801
+ and ˜xi ⊗ x−i ∈ S.
802
+ This is proved by the following calculations:
803
+ φi ⋄
804
+
805
+ ⊗j∈[N]xj
806
+
807
+ [ai, a−i] :=
808
+
809
+ b∈Ai
810
+ φi[b, ai]xi(b)x−i(a−i)
811
+ (4)
812
+ = ˜xi(ai) ⊗ x−i(a−i),
813
+ (5)
814
+ where ˜xi(ai) := �
815
+ b∈Ai φi[b, ai]xi(b) and ˜xi ∈ ∆(Ai) since, by definition, �
816
+ ai∈Ai φi[b, ai] = 1 for all b ∈ Ai.
817
+ This proves that a Constrained Nash Equilibrium is a Phi-Constrained Equilibrium for all Φ.
818
+ C
819
+ Proofs Omitted from Section 3
820
+ Theorem 3.1 (Hardness). For any constant α > 0, the problem APXCPE(α, (α/s)2) is NP-hard, where s is the
821
+ number of players’ actions in the instance given as input.
822
+ 9As common in the normal form game literature, for any distribution x ∈ ∆(X) and y ∈ ∆(Y ), x ⊗ y ∈ ∆(X × Y ) is the
823
+ product distribution defined as (x ⊗ y)[a, b] = x[a]y[b] for a ∈ X and b ∈ Y .
824
+ 12
825
+
826
+ ARXIV PREPRINT - FEBRUARY 1, 2023
827
+ Proof. We reduce from GAP-INDEPENDENT-SET, which is a promise problem that formally reads as follows:
828
+ given an δ > 0 and a graph G = (V, E), with set of nodes V and set of edges E, determine whether G admits
829
+ an independent set of size at least |V |1−δ or all the independent sets of G have size smaller than |V |δ.
830
+ GAP-
831
+ INDEPENDENT-SET is NP-hard for every δ > 0 (H˚astad, 1999; Zuckerman, 2007).
832
+ Let ℓ = |V | and α > 0 be the desired approximation factor. Given an instance of GAP-INDEPENDENT-SET,
833
+ we build an instance such that if there exists an independent set of size ℓ1−δ, then there exists a Constrained Phi-
834
+ equilibrium with social welfare 1. Otherwise, if all the independent sets have size at most ℓδ, all the Constrained
835
+ ǫ-Phi-equilibria have social welfare at most α/2. We can use any δ > 0, since we simply need ℓδ < ℓ1−δ. Moreover,
836
+ we take ǫ =
837
+ α2
838
+ 128ℓ2 . As we will see, ℓ will be smaller than the number of action of the players, satisfying the condition
839
+ in the statement.
840
+ Construction.
841
+ The first player has a set of actions A1 that includes actions a0, a1, a2 and an action av for each
842
+ v ∈ V . Moreover, the first player has an action aF .10 The second player has a set of actions A2 that includes actions
843
+ av and ¯av for each v ∈ V . Moreover, the second player has an action aF . Let γ = η = α/8. The utility of the first
844
+ agent is as follows:
845
+ • u1(a0, a) = γ + 1
846
+ 2η for all a ∈ A2 \ {aF},
847
+ • u1(a1, av) = γ + η and u1(a2, av) = γ for all v ∈ V .
848
+ • u1(a1, ¯av) = γ and u1(a2, ¯av) = γ + η for all v ∈ V .
849
+ • u1(av, av) = u1(av, ¯av) = γ for all v ∈ V
850
+ • u1(av, av′) = γ and u1(av, ¯av′) = γ +
851
+ ℓ−ℓ1−δ
852
+ ℓ−ℓ1−δ−1η for all v′ ̸= v.
853
+ • u1(aF , a) = 0 for each a ∈ A2.
854
+ • u1(a, aF ) = 0 for each a ∈ A1.
855
+ The utility of the second agent is u2(a0, a) = 1 for each a ∈ A2 \ {aF} and 0 otherwise.
856
+ There is a cost function cv for each v ∈ V , which is common to both the agents. For each v ∈ V , the cost function cv
857
+ is such that
858
+ • cv(av, av′) = −1 for each v′ ̸= v, (v, v′) ∈ E,
859
+ • cv(av, av′) = 0 for each v′ ̸= v, (v, v′) /∈ E,
860
+ • cv(av, av) = 1 for each v ∈ V .
861
+ • cv(aF , a) = − 1
862
+ 4ℓ2 for each a ∈ A2.
863
+ • cv(a, aF ) = − 1
864
+ 4ℓ2 for each a ∈ A1.
865
+ • For every other action profile the cost is 0.
866
+ We dropped the player index from the cost functions c as they are equal to both players.
867
+ Moreover, we set of deviations Φi = Φi,ALL for both players i ∈ {1, 2}.
868
+ Notice that the instance satisfies Assumption 2. Indeed, the deviation φi such that φi[a, aF ] = 1 for all a ∈ Ai for
869
+ i ∈ {1, 2}, that deviates deterministically to aF is always strictly feasible for both player 1 and player 2. Moreover, its
870
+ cost is polynomial in the instance size.
871
+ Completeness.
872
+ We show that if there exists an independent set of size ℓ1−δ, then the social welfare of an optimal
873
+ Constrained Phi-equilibria is at least 1. Let V ∗ be an independent set of size ℓ1−δ. We build a Constrained Phi-
874
+ equilibria z with social welfare at least 1. Consider the correlated strategy such that z[a0, av] =
875
+ 1
876
+ 2ℓ1−δ for all v ∈ V ∗,
877
+ while z[a0, ¯av] =
878
+ 1
879
+ 2(ℓ−ℓ1−δ) for all v /∈ V ∗. All the other action profiles have probability 0.
880
+ 10This action is needed only to satisfy the strictly feasibility assumption.
881
+ 13
882
+
883
+ ARXIV PREPRINT - FEBRUARY 1, 2023
884
+ It is easy to see that the correlated strategy has social welfare at least 1 since player 1 always plays action a0 and
885
+ u2(a0, a) = 1 for all a ∈ A2. Moreover, it is easy to verify that it is safe since cv(a0, a) ≤ 0 for each a ∈ A2. Hence,
886
+ to show that z is an Constrained Phi-equilibria we only need to prove that it satisfies the incentive constraints. The
887
+ incentive constraints of the second player are satisfied since they obtain the maximum possible utility, i.e., 1.
888
+ Consider now a possible deviation of the first player φ1 ∈ Φ1. As a first step, we compute the expected utility of a
889
+ strategy φ1. Let us define the following quantities:
890
+ • T 1 = �
891
+ v∈V ∗ φ1[a0, av]
892
+ ��
893
+ z[a0, av] + z[a0, ¯av] + �
894
+ v′̸=v z[a0, av′]
895
+
896
+ γ +
897
+
898
+ γ +
899
+ ℓ−ℓ1−δ
900
+ ℓ−ℓ1−δ−1η
901
+ � �
902
+ v′̸=v z[a0, ¯av]
903
+
904
+ • T 2 = �
905
+ v /∈V ∗ φ1[a0, av]
906
+ ��
907
+ z[a0, av] + z[a0, ¯av] + �
908
+ v′̸=v z[a0, av′]
909
+
910
+ γ +
911
+
912
+ γ +
913
+ ℓ−ℓ1−δ
914
+ ℓ−ℓ1−δ−1η
915
+ � �
916
+ v′̸=v z[a0, ¯av]
917
+
918
+ • T 3 =
919
+
920
+ γ + η
921
+ 2
922
+
923
+ φ1[a0, a0] + γ+η
924
+ 2 (φ1[a0, a1] + φ1[a0, a2]) + γ
925
+ 2(φ1[a0, a1] + φ1[a0, a2])
926
+ We bound each component individually.
927
+ T 1 =
928
+
929
+ v∈V ∗
930
+ φ1[a0, av]
931
+
932
+
933
+
934
+ z[a0, av] + z[a0, ¯av] +
935
+
936
+ v′̸=v
937
+ z[a0, av′]
938
+
939
+  γ +
940
+
941
+ γ + η
942
+ ℓ − ℓ1−δ
943
+ ℓ − ℓ1−δ − 1
944
+ � �
945
+ v′̸=v
946
+ z[a0, ¯av]
947
+
948
+
949
+ =
950
+
951
+ v∈V ∗
952
+ φ1[a0, av]
953
+ �1
954
+ 2γ + 1
955
+ 2
956
+
957
+ γ + η
958
+ ℓ − ℓ1−δ
959
+ ℓ − ℓ1−δ − 1
960
+ ��
961
+ =
962
+
963
+ v∈V ∗
964
+ φ1[a0, av]
965
+
966
+ γ + η
967
+ 2
968
+ ℓ − ℓ1−δ
969
+ ℓ − ℓ1−δ − 1
970
+
971
+
972
+
973
+ v∈V ∗
974
+ φ1[a0, av](γ + η),
975
+ where in the last inequality we use
976
+ ℓ−ℓ1−δ
977
+ ℓ−ℓ1−δ−1 ≤ 2 for ℓ large enough. while
978
+ T 2 =
979
+
980
+ v /∈V ∗
981
+ φ1[a0, av]
982
+
983
+
984
+
985
+ z[a0, av] + z[a0, ¯av] +
986
+
987
+ v′̸=v
988
+ z[a0, av′]
989
+
990
+  γ +
991
+
992
+ γ + η
993
+ ℓ − ℓ1−δ
994
+ ℓ − ℓ1−δ − 1
995
+ � �
996
+ v′̸=v
997
+ z[a0, ¯av]
998
+
999
+
1000
+ =
1001
+
1002
+ v /∈V ∗
1003
+ φ1[a0, av]
1004
+ ��1
1005
+ 2 +
1006
+ 1
1007
+ 2(ℓ − ℓ1−δ)
1008
+
1009
+ γ +
1010
+ �1
1011
+ 2 −
1012
+ 1
1013
+ 2(ℓ − ℓ1−δ)
1014
+ � �
1015
+ γ + η
1016
+ ℓ − ℓ1−δ
1017
+ ℓ − ℓ1−δ − 1
1018
+ ��
1019
+ =
1020
+
1021
+ v /∈V ∗
1022
+ φ1[a0, av]
1023
+
1024
+ γ + η
1025
+ 2
1026
+
1027
+ ℓ − ℓ1−δ
1028
+ ℓ − ℓ1−δ − 1 −
1029
+ 1
1030
+ ℓ − ℓ1−δ − 1
1031
+ ��
1032
+ =
1033
+
1034
+ v /∈V ∗
1035
+ φ1[a0, av]
1036
+
1037
+ γ + η
1038
+ 2
1039
+
1040
+ .
1041
+ Finally,
1042
+ T 3 = [a0, a0]
1043
+
1044
+ γ + η
1045
+ 2
1046
+
1047
+ + γ + η
1048
+ 2
1049
+ ([a0, a1] + [a0, a2]) + γ
1050
+ 2 ([a0, a1] + [a0, a2])
1051
+ =
1052
+
1053
+ γ + η
1054
+ 2
1055
+
1056
+ ([a0, a0] + φ1[a0, a1] + φ1[a0, a2])
1057
+ Finally, the utility of a deviation φ1 is
1058
+
1059
+ a1∈A1,a2∈A2
1060
+
1061
+ a∈A1
1062
+ φ1[a1, a]z[a1, a2]u1(a, a2)
1063
+ =
1064
+
1065
+ a∈A1,a2∈A2
1066
+ φ1[a0, a]z[a0, a2]u1(a, a2)
1067
+ = T 1 + T 2 + T 3
1068
+ ≤ (γ + η)
1069
+
1070
+ v∈V ∗
1071
+ φ1[a0, av] +
1072
+
1073
+ γ + η
1074
+ 2
1075
+ � �
1076
+ v /∈V ∗
1077
+ φ1[a0, av] +
1078
+
1079
+ γ + η
1080
+ 2
1081
+
1082
+ (φ[a0, a0] + φ1[a0, a1] + φ1[a0, a2])
1083
+ 14
1084
+
1085
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1086
+ = η
1087
+ 2
1088
+
1089
+ v∈V ∗
1090
+ φ1[a0, av] +
1091
+
1092
+ γ + η
1093
+ 2
1094
+
1095
+ (1 − φ1[a0, aF])
1096
+ Now, we show that no deviation φ1 ∈ Φ1 is both safe and increases player 1 utility. In particular, we show that if a
1097
+ strategy φ1 increases the utility than it is not safe. Indeed, if φ1 increases the utility, then
1098
+
1099
+ a1∈A1,
1100
+ a2∈A2
1101
+
1102
+ a∈A1
1103
+ φ1[a1, a]z[a1, a2]u1(a, a2) > γ + η
1104
+ 2
1105
+ This implies that
1106
+ η
1107
+ 2
1108
+
1109
+ v∈V ∗
1110
+ φ1[a0, av] +
1111
+
1112
+ γ + η
1113
+ 2
1114
+
1115
+ (1 − φ1[a0, aF ]) > γ + η
1116
+ 2
1117
+ and
1118
+
1119
+ v∈V ∗
1120
+ φ1[a0, av] > 1
1121
+ 2φ1[a0, aF ]
1122
+ (6)
1123
+ Next, we show that any φ1 that increases the utility (and hence that satisfies Eq (6)) is not a feasible deviation. First,
1124
+ notice that equation (6) implies that there is a ¯v ∈ V ∗ such that
1125
+ φ1[a0, a¯v] > 1
1126
+ 2ℓφ1[a0, aF ].
1127
+ (7)
1128
+ Then, we show that the deviation φ1 violates the constraint c¯v. In particular,
1129
+
1130
+ a1∈A1,a2∈A2
1131
+
1132
+ a∈A1
1133
+ φ1[a1, a]z[a1, a2]cv(a, a2) = φ1[a0, a¯v]z[a0, a¯v]1 − 1
1134
+ 4ℓ2 φ1[a0, aF ] −
1135
+
1136
+ v∈V ∗:(v,¯v)∈E
1137
+ φ1[a0, a¯v]z[a0, av]1
1138
+ = φ1[a0, a¯v]z[a0, a¯v] − 1
1139
+ 4ℓ2 φ1[a0, aF ]
1140
+ =
1141
+ 1
1142
+ 2ℓ1− 1
1143
+ ℓ φ1[a0, a¯v] − 1
1144
+ 4ℓ2 φ1[a0, aF ]
1145
+ > φ1[a0, a¯v]
1146
+
1147
+ 1
1148
+ 2ℓ1− 1
1149
+ ℓ − 1
1150
+ 2ℓ
1151
+
1152
+ ≥ 0,
1153
+ where the second inequality holds since V ∗ is an independent set, and the second-to-last inequality by Equation (7).
1154
+ Hence, there is no deviation φ1 that increases players 1 utility and that is safe. This concludes the first part of the
1155
+ proof.
1156
+ Soundness. We show that if there exists a Constrained w-Phi-equilibria with social welfare α/2, then there exists an
1157
+ independent set of size strictly larger than ℓδ, reaching a contradiction. Suppose by contradiction that there exists a
1158
+ Constrained ǫ-Phi-equilibrium z with social welfare strictly greater than α/2. Thus,
1159
+
1160
+ a′∈A2\{aF }
1161
+ z[a0, a′] · 1 +
1162
+
1163
+ a∈A1,a′∈A2
1164
+ (γ + η) ≥
1165
+
1166
+ a∈A1,a′∈A2
1167
+ z[a, a′](u1(a, a′) + u2(a, a′)) ≥ α/2,
1168
+ where the first inequality comes from u2(a0, a′) = 1 for each a′ ∈ A2 \ {aF } and 0 otherwise, and u1(a, a′) ≤ γ + η
1169
+ for each a ∈ A1 and a′ ∈ A2. This implies
1170
+
1171
+ a′∈A2
1172
+ z[a0, a′] ≥ α/4.
1173
+ (8)
1174
+ Then, we show that z assigns similar probabilities on the set of action profiles {a0, av}v∈V and {a0, ¯av}v∈V Given
1175
+ an a ∈ A1, let φa ∈ Φ1 be a deviation of the first player such that φa[a0, a] = 1 and φa[a′, a′] = 1 for each a′ ̸= a0.
1176
+ Since z is an Constrained ǫ-Phi-equilibrium there is no feasible deviation φa that increases the utility of player 1 by
1177
+ more than ǫ. This implies that
1178
+ �����
1179
+
1180
+ v∈V
1181
+ z[a0, av] −
1182
+
1183
+ v∈V
1184
+ z[a0, ¯av]
1185
+ ����� ≤ 2ǫ
1186
+ η .
1187
+ (9)
1188
+ 15
1189
+
1190
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1191
+ Indeed, if
1192
+
1193
+ v∈V
1194
+ z[a0, av] >
1195
+
1196
+ v∈V
1197
+ z[a0, ¯av] + 2ǫ
1198
+ η ,
1199
+ (10)
1200
+ then the deviation φa1 has utility at least
1201
+
1202
+ v∈V
1203
+ z[a0, av]φa1[a0, a1](γ + η) + z[a0, ¯av]φa1[a0, a1]γ +
1204
+
1205
+ a∈A1\{a0}
1206
+
1207
+ a′∈A2
1208
+ z[a, a′]φa1[a, a]ui(a, a′)
1209
+ = η
1210
+
1211
+ v∈V
1212
+ z[a0, av] + γ
1213
+
1214
+ v∈V
1215
+ (z[a0, av] + z[a0, ¯av]) +
1216
+
1217
+ a∈A1\{a0}
1218
+
1219
+ a′∈A2
1220
+ z[a, a′]φa1[a, a]ui(a, a′)
1221
+ > η
1222
+ 2
1223
+
1224
+
1225
+ η +
1226
+
1227
+ v∈V
1228
+ (z[a0, av] + z[a0, ¯av])
1229
+
1230
+ + γ
1231
+
1232
+ v∈V
1233
+ (z[a0, av] + z[a0, ¯av])
1234
+ +
1235
+
1236
+ a∈A1\{a0}
1237
+
1238
+ a′∈A2
1239
+ z[a, a′]φa1[a, a]ui(a, a′)
1240
+ ≥ ǫ +
1241
+ �η
1242
+ 2 + γ
1243
+ � �
1244
+ v∈V
1245
+ (z[a0, av] + z[a0, ¯av]) +
1246
+
1247
+ a∈A1\{a0}
1248
+
1249
+ a′∈A2
1250
+ z[a, a′]φa1[a, a]ui(a, a′)
1251
+ ≥ u1(z) + ǫ,
1252
+ where the first inequality comes from adding �
1253
+ v∈V z[a0, av] to both sides of Equation (10). Moreover, φa1 is feasible
1254
+ since for each constraint c¯v, ¯v ∈ V , it has cost
1255
+
1256
+ v∈V
1257
+ (z[a0, av]φa1[a0, a1]c¯v(a1, av) + z[a0, ¯av]φa1[a0, a1]c¯v(a1, av))
1258
+ +
1259
+
1260
+ a∈A1\{a0}
1261
+
1262
+ a′∈A2
1263
+ z[a, a′]φa1[a, a]c¯v(a, a′)
1264
+ =
1265
+
1266
+ v∈V
1267
+ (z[a0, av]φa1[a0, a1]c¯v(a0, av) + z[a0, ¯av]φa1[a0, a1]c¯v(a0, ¯av))
1268
+ +
1269
+
1270
+ a∈A1\{a0}
1271
+
1272
+ a′∈A2
1273
+ z[a, a′]φa1[a, a]c¯v(a, a′)
1274
+ = c¯v(z) ≤ 0.
1275
+ A similar argument shows that if �
1276
+ v∈V z[a0, av] < �
1277
+ v∈V z[a0, ¯av] − 2ǫ
1278
+ η then the deviation φa2 is safe and increases
1279
+ the utility. As a consequence of Equation (9), it holds
1280
+ 2
1281
+
1282
+ v∈V
1283
+ z[a0, ¯av] ≥
1284
+
1285
+ v∈V
1286
+ (z[a0, av] + z[a0, ¯av]) − ǫ
1287
+ η =
1288
+
1289
+ a∈A2\{aF }
1290
+ z[a0, a] − 2ǫ
1291
+ η ,
1292
+ (11)
1293
+ where the first inequality comes from adding �
1294
+ v∈V z[a0, ¯av] to both sides of �
1295
+ v∈V z[a0, ¯av]| ≥ �
1296
+ v∈V z[a0, av]− 2ǫ
1297
+ η
1298
+ The next step is to show that it is if there is no safe deviation φav, v ∈ V , that increases the utility, then there exists
1299
+ an independent set of size larger than ℓδ. Since z is an Constrained ǫ-Phi-equilibrium, for each av, v ∈ V one of the
1300
+ following two conditions holds: i) φav /∈ ΦS
1301
+ 1 (z) or ii) u1(φav ⋄ z) ≤ u1(z) + ǫ. Let V 1 ⊆ V be the set of vertexes
1302
+ v such that φav is not safe, i.e., φav /∈ ΦS
1303
+ 1 (z), and V 2 = V \ V 1 be the set of v such that φav does not increase the
1304
+ utility by more than ǫ and are not in V 1, i.e., u1(φav ⋄ z) ≤ u1(z) and φav ∈ ΦS
1305
+ 1 (z). We show that |V 2| ≤ ℓ − ℓ1−δ.
1306
+ Indeed, for each v ∈ V 2, deviation φav does not increase the utility and hence it holds:
1307
+ γ
1308
+
1309
+ a∈A2\{aF }
1310
+ z[a0, a] + η
1311
+ ℓ − ℓ1−δ
1312
+ ℓ − ℓ1−δ − 1
1313
+
1314
+ v′̸=v
1315
+ z[a0, ¯av′] +
1316
+
1317
+ a∈A1\{a0}
1318
+
1319
+ a′∈A2
1320
+ z[a, a′]φa1[a, a]ui(a, a′)
1321
+ =
1322
+ � �
1323
+ v′∈V
1324
+ z[a0, a] + z[a0, ¯av]
1325
+
1326
+ φ[a0, av]γ +
1327
+
1328
+ v′̸=v
1329
+ φ[a0, av]z[a0, ¯av′]
1330
+
1331
+ γ + η
1332
+ ℓ − ℓ1−δ
1333
+ ℓ − ℓ1−δ − 1
1334
+
1335
+ +
1336
+
1337
+ a∈A1\{a0}
1338
+
1339
+ a′∈A2
1340
+ z[a, a′]φa1[a, a]ui(a, a′)
1341
+ 16
1342
+
1343
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1344
+ ≤ u1(z) + ǫ
1345
+ =
1346
+
1347
+ γ + η
1348
+ 2
1349
+
1350
+
1351
+ a∈A2\{aF }
1352
+ z[a0, a] +
1353
+
1354
+ a∈A1\{a0}
1355
+
1356
+ a′∈A2
1357
+ z[a, a′]ui(a, a′) + ǫ,
1358
+ where the inequality holds since the lhs is the utility of the deviation φav.
1359
+ This implies
1360
+ ��
1361
+ v′
1362
+ z[a0, ¯av′] − z[a0, ¯av]
1363
+
1364
+ η
1365
+ ℓ − ℓ1−δ
1366
+ ℓ − ℓ1−δ − 1 ≤ η
1367
+ 2
1368
+
1369
+ a∈A2\{aF }
1370
+ z[a0, a] + ǫ ≤ η
1371
+
1372
+ v∈V
1373
+ z[a0, ¯av] + 2ǫ,
1374
+ where the last inequality holds by Equation (11). Hence,
1375
+ z[a0, ¯av]
1376
+ ℓ − ℓ1−δ
1377
+ ℓ − ℓ1−δ − 1 ≥
1378
+
1379
+ ℓ − ℓ1−δ
1380
+ ℓ − ℓ1−δ − 1 − 1
1381
+ � �
1382
+ v′
1383
+ z[a0, ¯av′] − 2ǫ/η,
1384
+ and
1385
+ ¯z[a0, av] ≥
1386
+ 1
1387
+ ℓ − ℓ1−δ
1388
+
1389
+ v′
1390
+ z[a0, ¯av′] − 2ǫ/η.
1391
+ (12)
1392
+ Suppose that |V 2| > ℓ − ℓ1−δ, and hence Equation (12) is satisfied by at least |V 2| ≥ ℓ − ℓ1−δ + 1 vertexes. We need
1393
+ the following inequality.
1394
+ 1
1395
+
1396
+
1397
+ v′
1398
+ z[a0, ¯av′] ≥ 1
1399
+
1400
+
1401
+ a∈A2\{aF }
1402
+ z[a0, a] − 2ǫ
1403
+ ℓη ≥ α
1404
+ 4ℓ − 2ǫ
1405
+ ℓη = α
1406
+ 4ℓ − α
1407
+ 8ℓ3 ≥ α
1408
+ 8ℓ = 2ℓ
1409
+ η
1410
+ � α2
1411
+ 16ℓ2
1412
+
1413
+ = 2ℓ
1414
+ η ǫ
1415
+ (13)
1416
+ where the first inequality comes from Equation (11), and the second one by Equation (8). Then, summing over the
1417
+ |V 2| inequalities we get
1418
+
1419
+ v∈V 2
1420
+ ¯z[a0, av] ≥ (ℓ − ℓ1−δ + 1)
1421
+
1422
+ 1
1423
+ ℓ − ℓ1−δ
1424
+
1425
+ v′
1426
+ z[a0, ¯av′] − 2ǫ/η
1427
+
1428
+
1429
+
1430
+ v′
1431
+ z[a0, ¯av′] + 1
1432
+
1433
+
1434
+ v′
1435
+ z[a0, ¯av′] − 2ℓ ǫ
1436
+ η
1437
+ >
1438
+
1439
+ v′
1440
+ z[a0, ¯av′],
1441
+ where the last inequality follows from equation (13). Hence, we reach a contradiction and |V 2| ≤ ℓ − ℓ1−δ.
1442
+ To conclude the proof, we show that V 1 is an independent set. Since |V 1| ≥ |V | − |V 2| = ℓ1−δ we reach a
1443
+ contradiction. Let v and v′ be two nodes in V 1 and w.l.o.g. let z[a0, av] ≥ z[a0, av′]. We show that (v, v′) /∈ E.
1444
+ Since v′ ∈ V 1, φav is not a safe deviation for player 1 with respect to constraint cv′. if (v, v′) ∈ E, then
1445
+
1446
+ a1∈A1,a2∈A2
1447
+
1448
+ a∈ A1
1449
+ φ[a1, a]z[a1, a2]cv(a, a2)
1450
+ = z[a0, a′
1451
+ v] −
1452
+
1453
+ v′′:(v′′,v′)∈E
1454
+ z[a0, av′′] − 1
1455
+ 4ℓz[a0, aF]cv(a, a2)
1456
+ +
1457
+
1458
+ a1∈A1\{a0},a2∈A2
1459
+
1460
+ a∈A1
1461
+ φ[a1, a]z[a1, a2]cv(a, a2)
1462
+ ≤ z[a0, a′
1463
+ v] − z[a0, av] − 1
1464
+ 4ℓz[a0, aF ]cv(a, a2)+
1465
+ +
1466
+
1467
+ a1∈A1\{a0},a2∈A2
1468
+
1469
+ a∈A1
1470
+ φ[a1, a]z[a1, a2]cv(a, a2)
1471
+ ≤ − 1
1472
+ 4ℓz[a0, aF ]cv(a, a2) +
1473
+
1474
+ a1∈A1\{a0},a2∈A2
1475
+
1476
+ a∈A1
1477
+ φ[a1, a]z[a1, a2]cv(a, a2)
1478
+ 17
1479
+
1480
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1481
+ = cv(z) ≤ 0.
1482
+ Hence, (v, v′) /∈ E. Since V 1 is an independent set of size at least ℓ1−δ we reach a contradiction. This concludes the
1483
+ proof.
1484
+ D
1485
+ Proofs Omitted from Section 4
1486
+ Lemma 4.1. For every z ∈ ∆A and i ∈ N, it holds
1487
+ max
1488
+ φi∈ΦS
1489
+ i (z) ui(φi ⋄ z) = sup
1490
+ φi∈Φi
1491
+ inf
1492
+ ηi∈Rm
1493
+ +
1494
+
1495
+ ui(φi ⋄ z) − η⊤
1496
+ i ci(φi ⋄ z)
1497
+
1498
+ =
1499
+ inf
1500
+ ηi∈Rm
1501
+ +
1502
+ sup
1503
+ φi∈Φi
1504
+
1505
+ ui(φi ⋄ z) − η⊤
1506
+ i ci(φi ⋄ z)
1507
+
1508
+ .
1509
+ Proof. First, it is easy to see that
1510
+ sup
1511
+ φi∈ΦS
1512
+ i (z)
1513
+ ui(φi ⋄ z) = sup
1514
+ φi∈Φi
1515
+ inf
1516
+ ηi∈Rm
1517
+ +
1518
+
1519
+ ui(φi ⋄ z) − η⊤
1520
+ i ci(φi ⋄ z)
1521
+
1522
+ .
1523
+ Indeed, for every φi /∈ ΦS
1524
+ i (z), it holds that the vector ci(φi ⋄ z) has at least one positive component, and, thus, the
1525
+ vector of Lagrange multipliers ηi can be selected so that ui(φi ⋄ z) − η⊤
1526
+ i ci(φi ⋄ z) goes to −∞. This implies that
1527
+ the supremum over Φi cannot be attained in ΦS
1528
+ i (z). On the other hand, for every φi ∈ ΦS
1529
+ i (z), all the components of
1530
+ ci(φi ⋄ z) are negative, and, thus, the inf is achieved by ηi = 0. This proves the first equality.
1531
+ Then, the second equality directly follows from the generalization of the max-min theorem for unbounded domains
1532
+ (see (Ekeland and Temam, 1999, Proposition 2.3)), which allows us to swap the sup and the inf.
1533
+ Lemma D.1. For any two real-valued functions f(x) and g(x) with g(x) ≤ c then min(f(x), g(x)) ≤ min(f(x), c).
1534
+ Proof. We can identify three sets I1, I2 and I3 defined as follows:
1535
+ I1 := {x s.t. f(x) ≥ c}
1536
+ I2 := {x s.t. g(x) ≤ f(x) ≤ c}
1537
+ I3 := {x s.t. f(x) ≤ g(x) ≤ c}.
1538
+ Then for all x ∈ I1 we have that min(f(x), c) = c ≥ min(f(x), g(x)) = g(x), while for all x ∈ I2 we have
1539
+ that min(f(x), c) = f(x) ≥ min(f(x), g(x)) = g(x). Finally for all x ∈ I3 we have min(f(x), c) = f(x) =
1540
+ min(f(x), g(x)) = f(x). In all three sets we have that min(f(x), c) ≥ min(f(x), g(x)).
1541
+ Lemma D.2. For all ηi ∈ Dc it holds that
1542
+ sup
1543
+ φi∈Φi
1544
+
1545
+ ui(φi ⋄ z) − η⊤
1546
+ i ci(φi ⋄ z)
1547
+
1548
+ ≥ 1
1549
+ Proof. Thanks to Assumption 2 we have that for all z ∈ ∆(A) we have that there exists ˜φi ∈ ΦS
1550
+ i (z) such that
1551
+ ci(˜φi ⋄ z) ⪯ −ρ1. Then, for all ηi ∈ Dc we have:
1552
+ η⊤
1553
+ i ci(˜φi ⋄ z) ≤ −ρ∥ηi∥1 ≤ −1.
1554
+ This easily concludes the proof of the statement
1555
+ sup
1556
+ φi∈Φi
1557
+
1558
+ ui(φi ⋄ z) − η⊤
1559
+ i ci(φi ⋄ z)
1560
+
1561
+ ≥ ui(˜φi ⋄ z) − η⊤
1562
+ i ci(˜φi ⋄ z) ≥ 1,
1563
+ as ui is positive.
1564
+ Lemma D.3. For all ηi ∈ D we have
1565
+ inf
1566
+ ηi∈D sup
1567
+ φi∈Φi
1568
+
1569
+ ui(φi ⋄ z) − η⊤
1570
+ i ci(φi ⋄ z)
1571
+
1572
+ ≤ 1
1573
+ 18
1574
+
1575
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1576
+ Proof. Since ui ≤ 1 we have that
1577
+ inf
1578
+ ηi∈D sup
1579
+ φi∈Φi
1580
+
1581
+ ui(φi ⋄ z) − η⊤
1582
+ i ci(φi ⋄ z)
1583
+
1584
+ ≤ 1 − sup
1585
+ ηi∈D
1586
+ inf
1587
+ φi∈Φi η⊤
1588
+ i ci(φi ⋄ z).
1589
+ Next we claim that sup
1590
+ ηi∈D
1591
+ inf
1592
+ φi∈Φi η⊤
1593
+ i ci(φi ⋄ z) ≥ 0. This follows from the fact that for all negative components of
1594
+ ci(φi ⋄ z) then the corresponding components of ηi will be 0. This concludes the statement.
1595
+ Lemma 4.2. Let D :=
1596
+
1597
+ η ∈ Rm
1598
+ + | ||η||1 ≤ 1/ρ
1599
+
1600
+ . Then, for every z ∈ ∆A and i ∈ N, it holds:
1601
+ max
1602
+ φi∈ΦS
1603
+ i (z) ui(φi ⋄ z) = max
1604
+ φi∈Φi min
1605
+ ηi∈D
1606
+
1607
+ ui(φi ⋄ z) − η⊤
1608
+ i ci(φi ⋄ z)
1609
+
1610
+ = min
1611
+ ηi∈D max
1612
+ φi∈Φi
1613
+
1614
+ ui(φi ⋄ z) − η⊤
1615
+ i ci(φi ⋄ z)
1616
+
1617
+ .
1618
+ Proof. In Lemma 4.1 we already showed that:
1619
+ sup
1620
+ φi∈ΦS
1621
+ i (z)
1622
+ ui(φi ⋄ z) = sup
1623
+ φi∈Φi
1624
+ inf
1625
+ ηi∈Rm
1626
+ +
1627
+
1628
+ ui(φi ⋄ z) − η⊤
1629
+ i ci(φi ⋄ z)
1630
+
1631
+ =
1632
+ inf
1633
+ ηi∈Rm
1634
+ +
1635
+ sup
1636
+ φi∈Φi
1637
+
1638
+ ui(φi ⋄ z) − η⊤
1639
+ i ci(φi ⋄ z)
1640
+
1641
+ .
1642
+ Note that to prove the statement it is enough to prove that:
1643
+ inf
1644
+ ηi∈Rm
1645
+ +
1646
+ sup
1647
+ φi∈Φi
1648
+
1649
+ ui(φi ⋄ z) − η⊤
1650
+ i ci(φi ⋄ z)
1651
+
1652
+ = inf
1653
+ ηi∈D sup
1654
+ φi∈Φi
1655
+
1656
+ ui(φi ⋄ z) − η⊤
1657
+ i ci(φi ⋄ z)
1658
+
1659
+ and more specifically that:
1660
+ inf
1661
+ ηi∈Rm
1662
+ +
1663
+ sup
1664
+ φi∈Φi
1665
+
1666
+ ui(φi ⋄ z) − η⊤
1667
+ i ci(φi ⋄ z)
1668
+
1669
+ ≥ inf
1670
+ ηi∈D sup
1671
+ φi∈Φi
1672
+
1673
+ ui(φi ⋄ z) − η⊤
1674
+ i ci(φi ⋄ z)
1675
+
1676
+ since the reverse inequality holds trivially. We can show this by the following inequalities:
1677
+ inf
1678
+ ηi∈Rm
1679
+ +
1680
+ sup
1681
+ φi∈Φi
1682
+
1683
+ ui(φi ⋄ z) − η⊤
1684
+ i ci(φi ⋄ z)
1685
+
1686
+ = min
1687
+
1688
+ inf
1689
+ ηi∈D sup
1690
+ φi∈Φi
1691
+
1692
+ ui(φi ⋄ z) − η⊤
1693
+ i ci(φi ⋄ z)
1694
+
1695
+ , inf
1696
+ ηi∈Dc sup
1697
+ φi∈Φi
1698
+
1699
+ ui(φi ⋄ z) − η⊤
1700
+ i ci(φi ⋄ z)
1701
+
1702
+
1703
+ ≥ min
1704
+
1705
+ inf
1706
+ ηi∈D sup
1707
+ φi∈Φi
1708
+
1709
+ ui(φi ⋄ z) − η⊤
1710
+ i ci(φi ⋄ z)
1711
+
1712
+ , 1
1713
+
1714
+ = inf
1715
+ ηi∈D sup
1716
+ φi∈Φi
1717
+
1718
+ ui(φi ⋄ z) − η⊤
1719
+ i ci(φi ⋄ z)
1720
+
1721
+ ,
1722
+ where the first inequality hold thanks to Lemma D.1 and Lemma D.2, while that last equation follows from Lemma D.3.
1723
+ Lemma 4.4. Given any 0 < δ ≤ ǫ and a δ-optimal set ˜D ⊆ D, the following holds: L ˜
1724
+ D,ǫ ≥ LD,0.
1725
+ Proof. By definition we have that: L ¯
1726
+ D,ǫ = ℓ(˜z⋆), where ˜z⋆ is a solution to the problem
1727
+ P1 :=
1728
+
1729
+
1730
+
1731
+
1732
+
1733
+
1734
+
1735
+
1736
+
1737
+ ˜z⋆ ∈ arg max
1738
+ z∈S
1739
+ ℓ(z) s.t.
1740
+ ǫ + ui(˜z⋆) ≥ max
1741
+ φi∈Φi
1742
+
1743
+ ui(φi ⋄ ˜z⋆) − ˜η⋆,⊤
1744
+ i
1745
+ ci(φi ⋄ ˜z⋆)
1746
+
1747
+ ˜η⋆
1748
+ i ∈ arg inf
1749
+ ηi∈ ¯
1750
+ D sup
1751
+ φi∈Φi
1752
+
1753
+ ui(φi ⋄ ˜z⋆) − η⊤
1754
+ i ci(φi ⋄ ˜z⋆)
1755
+
1756
+ On the other hand, call z⋆ the optimal Constrained Phi-equilibrium. This is a solution to the problem:
1757
+ P2 :=
1758
+
1759
+
1760
+
1761
+
1762
+
1763
+
1764
+
1765
+
1766
+
1767
+ z⋆ ∈ arg max
1768
+ z∈S
1769
+ ℓ(z) s.t.
1770
+ ui(z⋆) ≥ max
1771
+ φi∈Φi
1772
+
1773
+ ui(φi ⋄ z⋆) − η⋆,⊤
1774
+ i
1775
+ ci(φi ⋄ z⋆)
1776
+
1777
+ η⋆
1778
+ i ∈ arg inf
1779
+ ηi∈D sup
1780
+ φi∈Φi
1781
+
1782
+ ui(φi ⋄ z⋆) − η⊤
1783
+ i ci(φi ⋄ z⋆)
1784
+
1785
+ 19
1786
+
1787
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1788
+ which has value LD,0 = ℓ(z⋆).
1789
+ Moreover, thanks to Lemma 4.2 and since ¯D is δ-optimal we have that:
1790
+ max
1791
+ φi∈Φi
1792
+
1793
+ ui(φi ⋄ ˜z⋆) − ˜η⋆,⊤
1794
+ i
1795
+ ci(φi ⋄ ˜z⋆)
1796
+
1797
+ ≤ max
1798
+ φi∈Φi
1799
+
1800
+ ui(φi ⋄ z⋆) − η⋆,⊤
1801
+ i
1802
+ ci(φi ⋄ z⋆)
1803
+
1804
+ + δ
1805
+ which implies that feasible correlated strategies of problem P2 are feasible correlated strategies of problem P1, and
1806
+ thus problem P1 as long as δ ≥ ǫ. Thus problem P1 is the problem of maximizing the same objective function over a
1807
+ larger set then problem P2 and thus L ¯
1808
+ D,ǫ ≥ LD,0.
1809
+ Lemma 4.5. For any τ > 0, the set Dτ is (τm)-optimal.
1810
+ Proof. By Lemma 4.2, we know that for each player there exists an η⋆
1811
+ i ∈ D such that maxφ∈ΦS
1812
+ i (z) ui(φi ⋄ z) =
1813
+ max
1814
+ φi∈Φi
1815
+
1816
+ ui(φi ⋄ z) − η⋆,⊤
1817
+ i
1818
+ ci(φi ⋄ z)
1819
+
1820
+ . By construction of Dǫ there exists a ¯ηi ∈ Dǫ such that ||¯ηi − η⋆
1821
+ i ||∞ ≤ ǫ. Thus
1822
+ max
1823
+ φ∈ΦS
1824
+ i (z) ui(φi ⋄ z) = max
1825
+ φi∈Φi
1826
+
1827
+ ui(φi ⋄ z) − η⋆,⊤
1828
+ i
1829
+ ci(φi ⋄ z)
1830
+
1831
+ ≤ max
1832
+ φi∈Φi
1833
+
1834
+ ui(φi ⋄ z) − ¯η⊤
1835
+ i ci(φi ⋄ z)
1836
+
1837
+ + mǫ,
1838
+ where the last inequality comes the fact that:
1839
+ |(η⋆
1840
+ i − ¯ηi)⊤ci(φi ⋄ z)| ≤ ∥ci(φi ⋄ z)∥1∥η⋆
1841
+ i − ¯ηi∥∞ ≤ mǫ
1842
+ as ci ∈ [−1, 1]m.
1843
+ Lemma 4.6. For any τ > 0, the set Dτ is δ-optimal for δ = 2
1844
+
1845
+ 2τ log s/ρ, where s is the number of players’ actions.
1846
+ Proof. The proof exploits a probability interpretation of the Lagrange multipliers. Let η⋆ be the optimal multipliers,
1847
+ i.e., , η⋆ ∈ argminη∈D maxφi∈Φi
1848
+
1849
+ ui(φi ⋄ z) − η⊤ci(φi ⋄ z)
1850
+
1851
+ . Now consider a basis Γ = { 1
1852
+ ρej}j∈[m] ∪ {0} for D.
1853
+ By Carathoedory’s theorem there exists a distribution γ ∈ ∆(Γ) such that η⋆ = �
1854
+ η∈Γ γηη. Assume that ǫ and ρ are
1855
+ such that 1/ǫρ is an integer and take 1/ρǫ samples from the distribution γ and call ˜η the resulting empirical mean.
1856
+ First, we argue that ˜η ∈ Dǫ. Indeed ˜ηj =
1857
+ kj
1858
+ 1/ρǫ
1859
+ 1
1860
+ ρ = ǫ
1861
+
1862
+ kj
1863
+ 1/ρǫ
1864
+ 1
1865
+ ρǫ
1866
+
1867
+ = ǫkj where kj ∈ N and thus we have that ˜η ∈ Dǫ.11
1868
+ Now we show that with high probability ˜η ∈ Dǫ is close (in terms of utilities) to the optimal multiplier η⋆. First
1869
+ observe that:
1870
+ η⋆,⊤
1871
+ i
1872
+ ci(φi ⋄ z) :=
1873
+
1874
+ ai∈Ai,bi∈Ai
1875
+
1876
+ φi[b, ai]
1877
+
1878
+ a−i∈A−i
1879
+ η⋆,⊤ci(ai, a−i)z[b, a−i]
1880
+
1881
+
1882
+ (14a)
1883
+
1884
+
1885
+ ai∈Ai,bi∈Ai
1886
+
1887
+ φi[b, ai]
1888
+
1889
+ δai,b +
1890
+
1891
+ a−i∈A−i
1892
+ ˜η⊤ci(ai, a−i)z[b, a−i]
1893
+
1894
+
1895
+
1896
+
1897
+ (14b)
1898
+ =
1899
+
1900
+ ai∈Ai,bi∈Ai
1901
+
1902
+ φi[b, ai]
1903
+
1904
+ a−i∈A−i
1905
+ ˜η⊤ci(ai, a−i)z[b, a−i]
1906
+
1907
+  +
1908
+
1909
+ ai∈Ai,bi∈Ai
1910
+ φi[b, ai]δai,b
1911
+ (14c)
1912
+ = ˜η⊤
1913
+ i ci(φi ⋄ z) +
1914
+
1915
+ ai∈Ai,bi∈Ai
1916
+ φi[b, ai]δai,b
1917
+ (14d)
1918
+ where the inequality comes from applying the Hoeffeding’s inequality to every ai, b ∈ Ai:
1919
+ ������
1920
+
1921
+ a−i∈A−i
1922
+ (˜η − η⋆)⊤ ci(ai, a−i)z[b, a−i]
1923
+ ������
1924
+ ≤ δai,b
1925
+ 11If ǫ if not such that 1/ρǫ ∈ N then the one can take ⌈1/ρǫ⌉ samples from γ ∈ ∆(Γ) and then the statement hold for a slightly
1926
+ smaller ǫ′ < ǫ defined as ǫ′ :=
1927
+ 1
1928
+ ⌈1/ρǫ⌉
1929
+ 1
1930
+ ρ.
1931
+ 20
1932
+
1933
+ ARXIV PREPRINT - FEBRUARY 1, 2023
1934
+ where
1935
+ δai,b
1936
+ =
1937
+ 2
1938
+ ρ
1939
+
1940
+ 2
1941
+ 1/ρǫ log
1942
+
1943
+ 2
1944
+ pai,b
1945
+ � �
1946
+
1947
+ a−i∈A−i z[b, a−i]
1948
+
1949
+ since
1950
+ the
1951
+ range
1952
+ of
1953
+ the
1954
+ each
1955
+ sample
1956
+ is
1957
+ 1
1958
+ ρ
1959
+ ��
1960
+ a−i∈A−i z[b, a−i]
1961
+
1962
+ .
1963
+ Moreover, for Hoeffeding’s inequality, for every ai, b ∈ Ai the above inequality holds with probability at least
1964
+ 1 − pai,b and thus holds for all the ai, b ∈ Ai simultaneously, with probability at least p := �
1965
+ ai,b∈Ai pai,b.
1966
+ If then we take pai,b :=
1967
+ 1
1968
+ 2|Ai|2 for all ai, b ∈ Ai, then we have that p = 1/2 > 0 and δ := δai,b =
1969
+ 2
1970
+ ρ
1971
+
1972
+ 2
1973
+ 1/ρǫ log (|Ai|)
1974
+
1975
+
1976
+ a−i∈A−i z[b, a−i]
1977
+
1978
+ Now the following holds with probability at lest 1/2:
1979
+ ������
1980
+
1981
+ a−i∈A−i
1982
+ (˜η − η⋆)⊤ ci(ai, a−i)z[b, a−i]
1983
+ ������
1984
+ ≤ δ
1985
+
1986
+
1987
+
1988
+ a−i∈A−i
1989
+ z[b, a−i]
1990
+
1991
+  ,
1992
+ ∀ai, b ∈ Ai
1993
+ The proof is concluded by observing plugging this definition of δ
1994
+ =
1995
+ δai,b in Equation (14) yields
1996
+
1997
+ ai∈Ai,bi∈Ai φi[b, ai]δai,b = δ, and we can conclude that:
1998
+ η⋆,⊤
1999
+ i
2000
+ ci(φi ⋄ z) ≤ ˜η⊤
2001
+ i ci(φi ⋄ z) + δ.
2002
+ This holds with positive probability, and thus shows the existence of such ˜η ∈ Dǫ for which the above inequality holds
2003
+ and thus Dǫ is
2004
+
2005
+ 2
2006
+
2007
+
2008
+ ρ log(|Ai|)
2009
+
2010
+ -optimal.
2011
+ E
2012
+ Proofs Omitted from Section 5
2013
+ Proposition 5.1. For instances I := (Γ, Φ) satisfying Assumption 3, the set of constrained ǫ-Phi-equilibria is convex.
2014
+ Proof. Let z′ and z′′ be Constrained ǫ-Phi-equilibria that is for all i ∈ [N]:
2015
+ ǫ + ui(z′) ≥ ui(φ′
2016
+ i ⋄ z′)
2017
+ for φ′ ∈ arg max
2018
+ φi∈ΦS
2019
+ i
2020
+ ui(φi ⋄ z′). Equivalently it holds for all i ∈ [N] that:
2021
+ ǫ + ui(z′′) ≥ ui(φ′′
2022
+ i ⋄ z′′)
2023
+ where φ′′ ∈ arg max
2024
+ φi∈ΦS
2025
+ i
2026
+ ui(φi ⋄ z′′). For any z := αz′ + (1 − α)z′′ we have that:
2027
+ ǫ + ui(z) = α (ǫ + ui(z′)) + (1 − α) (ǫ + ui(z′′))
2028
+ ≥ αui(φ′
2029
+ i ⋄ z′) + (1 − α)ui(φ′′
2030
+ i ⋄ z′′)
2031
+ ≥ max
2032
+ φi∈ΦS
2033
+ i
2034
+ ui(φi ⋄ z),
2035
+ where the inequality holds for the linearity of ui, the first inequality as both z′ and z′′ are Constrained ǫ-Phi-equilibria
2036
+ and the last inequality holds since the max is a convex operator.
2037
+ Theorem 5.1. Restricted to instances I := (Γ, Φ) which satisfy Assumption 3, APXCPE(1, 0) admits a polynomial-
2038
+ time algorithm.
2039
+ Proof. APXCPE(1, 0) amounts to solving the following problem:
2040
+ max
2041
+ z∈S ℓ(z)
2042
+ s.t.
2043
+ (15a)
2044
+ ui(z) ≥ max
2045
+ φi∈ΦS
2046
+ i
2047
+ ui(φi ��� z)
2048
+ ∀i ∈ N,
2049
+ (15b)
2050
+ which can be written as an LP with (possibly) exponentially-many constraints, by writing a constraint for each vertex
2051
+ of ΦS
2052
+ i . We can find an exact solution to such an LP in polynomial time by means of the ellipsoid algorithm that uses
2053
+ suitable separation oracle. Such an oracle solves the following optimization problem for every i ∈ N:
2054
+ φ⋆
2055
+ i ∈ arg max
2056
+ φi∈ΦS
2057
+ i
2058
+ ui(φi ⋄ z).
2059
+ 21
2060
+
2061
+ ARXIV PREPRINT - FEBRUARY 1, 2023
2062
+ Then, the oracle returns as a separating hyperplane the incentive constraint corresponding to a φ⋆
2063
+ i (if any) such that
2064
+ ui(z) ≥ ui(φ⋆
2065
+ i ⋄ z). Since all the steps of the separation oracle can be implemented in polynomial time, the ellipsoid
2066
+ algorithm runs in polynomial time, concluding the proof.
2067
+ Theorem 5.2. Given an instance I := (Γ, Φ) satisfying Assumption 3, after T ∈ N>0 rounds, Algorithm 1 returns a
2068
+ correlated strategy ¯zT ∈ ∆A that is a constrained ǫT -Phi-equilibrium with ǫT = O(1/
2069
+
2070
+ T). Moreover, each round of
2071
+ Algorithm 1 runs in polynomial time.
2072
+ Proof. Any regret minimizer Ri for ΦS
2073
+ i guarantees that, for every φi ∈ ΦS
2074
+ i :
2075
+ T
2076
+
2077
+ t=1
2078
+ ui(φi ⋄ zt) −
2079
+ T
2080
+
2081
+ t=1
2082
+ ui(φi,t ⋄ zt) ≤ ǫi,T T,
2083
+ (16)
2084
+ where ǫi,T = o(T ). Since xi,t[a] = �
2085
+ b∈Ai φi,t[b, a]xi,t[b] for all a ∈ Ai, for every t ∈ [T ] and a = (ai, a−i) ∈ A:
2086
+ (φi,t ⋄ zt)[ai, a−i] =
2087
+
2088
+ b∈Ai
2089
+ φi,t[b, ai]z[b, a−i]
2090
+ =
2091
+
2092
+ b∈Ai
2093
+ φi,t[b, ai]
2094
+
2095
+ xi,t[b] ⊗ x−i,t[a−i]
2096
+
2097
+ =
2098
+ � �
2099
+ b∈Ai
2100
+ φi,t[b, ai]xi,t[b]
2101
+
2102
+ ⊗ x−i,t[a−i]
2103
+ = xi,t[ai] ⊗ x−i,t[a−i]
2104
+ = zt[ai, a−i],
2105
+ Plugging the equation above into Equation (16), we get:
2106
+ T
2107
+
2108
+ t=1
2109
+ ui(φi ⋄ zt) −
2110
+ T
2111
+
2112
+ t=1
2113
+ ui(zt) ≤ ǫi,T T.
2114
+ Now, since ¯zT := �T
2115
+ t=1 zt and ui(z) is linear in z, we can conclude that, for every i ∈ N and φi ∈ ΦS
2116
+ i :
2117
+ ui(zT ) ≥ ui(φi ⋄ ¯zT ) − ǫi,T ,
2118
+ and, thus, by letting ǫT := maxi∈N ǫi,T we get that ¯zT satisfies the incentivize constrained for being a constrained
2119
+ ǫT -Phi-equilibrium. We are left to verify that ¯zT ∈ S, namely ci(¯zT ) ≤ 0 for all i ∈ N. This readily proved as:
2120
+ ci(¯zT ) = 1
2121
+ T
2122
+ T
2123
+
2124
+ t=1
2125
+ ci(zt)
2126
+ = 1
2127
+ T
2128
+ T
2129
+
2130
+ t=1
2131
+ ci(φi,t ⋄ zt)
2132
+ = 1
2133
+ T
2134
+ T
2135
+
2136
+ t=1
2137
+ ˜ci(φi,t)
2138
+ ≤ 0,
2139
+ where the first equality holds since ci is linear, the second equality holds thanks to zt = φi,t ⋄ zt, the third one by
2140
+ Assumption 3, while the inequality holds since φi,t ∈ ΦS
2141
+ i . This concludes the proof of the first part of the statement.
2142
+ In conclusion, Algorithm 1 runs in polynomial time as finding xi,t[a] = �
2143
+ b∈Ai φi,t[b, ai]xi,t[b] for all a ∈ Ai is
2144
+ equivalent to finding a stationary distribution of a Markov Chain, which can be done in polynomial time. Moreover,
2145
+ we can implement the regret minimizers Ri over the polytopes ΦS
2146
+ i so that their operations run in polynomial time,
2147
+ such as, e.g., online gradient descent; see (Hazan et al., 2016).
2148
+ Theorem 5.4. For instances I := (Γ, ΦCCE) such that ci(a) = ci(a′) for every player i ∈ N and action profiles
2149
+ a, a′ ∈ A : ai = a′
2150
+ i, Assumption 3 holds.
2151
+ 22
2152
+
2153
+ ARXIV PREPRINT - FEBRUARY 1, 2023
2154
+ Proof. Since the costs ci(a) of player i ∈ N only depends on player i’s action ai and not on the actions of other
2155
+ players, it is possible to show that there exists ˜ci : ΦCCE → [−1, 1]m such that the following holds for every z ∈ ∆A:
2156
+ ˜ci(φi) := ci(φi ⋄ z).
2157
+ Indeed, for every φi ∈ ΦCCE, by definition of ΦCCE there exists a probability distribution h ∈ ∆Ai : φi[b, a] = h[a]
2158
+ for all b, a ∈ Ai. Then, for every ai ∈ Ai and a−i ∈ A−i, we can write:
2159
+ (φi ⋄ z)[ai, a−i] =
2160
+
2161
+ b∈Ai
2162
+ φi[b, ai]z[b, a−i]
2163
+ =
2164
+
2165
+ b∈Ai
2166
+ h[ai]z[b, a−i]
2167
+ = h[ai]
2168
+
2169
+ b∈Ai
2170
+ z[b, a−i].
2171
+ Moreover, it holds:
2172
+ ci(φi ⋄ z)[ai, a−i] =
2173
+
2174
+ a∈A
2175
+ ci(a)(φi ⋄ z)[ai, a−i]
2176
+ =
2177
+
2178
+ a∈A
2179
+ ci(a)h[ai]
2180
+
2181
+ b∈Ai
2182
+ z[b, a−i]
2183
+ =
2184
+
2185
+ ai∈Ai
2186
+ ci(ai, ·)h[ai]
2187
+
2188
+ a−i∈A−i
2189
+
2190
+ b∈Ai
2191
+ z[b, a−i]
2192
+ =
2193
+
2194
+ ai∈Ai
2195
+ ci(ai, ·)h[ai],
2196
+ which only depends on φi, as desired. Notice that, in the equations above, for every a ∈ Ai we let ci(a, ·) be the
2197
+ (unique) value of ci(a) for all a ∈ A : ai = a.
2198
+ 23
2199
+
1dFRT4oBgHgl3EQfmDfL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1tE2T4oBgHgl3EQfNQaE/content/tmp_files/2301.03735v1.pdf.txt ADDED
@@ -0,0 +1,2223 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03735v1 [math.RA] 10 Jan 2023
2
+ Multipliers and weak multipliers of algebras
3
+ Yuji Kobayashi and Sin-Ei Takahasi
4
+ Laboratory of Mathematics and Games
5
+ (https://math-game-labo.com)
6
+ 2020 MSC Numbers: Primary 43A22; Secondary 17A99, 46J10.
7
+ Keywords: (weak) multiplier, (non)associative algebra, Jordan algebra, zeropotent algebra,
8
+ annihilator, nihil decomposition, matrix representation.
9
+ Abstract
10
+ We study general properties of multipliers and weak multipliers of
11
+ algebras.
12
+ We apply the results to determine the (weak) multipliers of
13
+ associative algebras and zeropotent algebras of dimension 3 over an alge-
14
+ braically closed field.
15
+ 1
16
+ Introduction
17
+ Multipliers of algebras, in particular, multipliers of Banach algebras, have been
18
+ discussed in analysis. In this paper we will discuss them in a purely algebraic
19
+ manner.
20
+ Let B be a Banach algebra. A mapping T : B → B is called a multiplier of
21
+ B, if it satisfies the condition (I) xT (y) = T (xy) = T (x)y (x, y ∈ B). Let M(B)
22
+ denote the collection of all multipliers of B, and let B(B) be the collection of all
23
+ bounded linear operators on B. Then M(B) forms an algebra and B(B) forms
24
+ a Banach algebra. B is called without order if it has no nonzero left or right
25
+ annihilator.
26
+ If B is without order, then M(B) forms a commutative closed
27
+ subalgebra of B(B) (see [2], Proposition 1.4.11). In 1953, Wendel [7] proved
28
+ an important result that the multiplier algebra of L1(G) on a locally compact
29
+ abelian group G is isometrically isomorphic to the measure algebra on G. The
30
+ general theory of multipliers of Banach algebras has been developed by Johnson
31
+ [1]. A good reference to the theory of multipliers of Banach algebra is given in
32
+ Larsen [5].
33
+ When B is without order, T is a multiplier if it satisfies the condition (II)
34
+ xT (y) = T (x)y (x, y ∈ B). Many researchers had been unaware of difference
35
+ between conditions (I) and (II) until Zivari-Kazempour [8] (see also [9]) recently
36
+ clearly stated the difference. We call a mapping T satisfying (II) a weak mul-
37
+ tiplier and denote the set of weak multipliers of B by M ′(B). Then, M(B)
38
+ is in general a proper subset of M ′(B). Furthermore, (weak) multipliers can
39
+ 1
40
+
41
+ be defined for an algebra A not necessarily associative, and they are not lin-
42
+ ear mappings in general. We denote the spaces of linear multipliers and linear
43
+ weak multipliers of A by LM(A) and LM ′(A) respectively. M(A) and LM(A)
44
+ are subalgebras of the algebra AA consisting of all mappings from A to itself.
45
+ Meanwhile, M ′(A) and LM ′(A) are closed under the operation ◦ defined by
46
+ T ◦ S = T S + ST , and they form a Jordan algebra.
47
+ In Sections 2 - 5 we study general properties of (weak) multipliers. In par-
48
+ ticular, in sections 3 and 4 we give a decomposition theorem (Theorem 3.1), and
49
+ a matrix equation (Theorem 4.2) for (weak) multipliers. They play an essential
50
+ role to analyze (weak) multipliers.
51
+ Complete classifications of associative algebras and zeropotent algebras of
52
+ dimension 3 over an algebraically closed field of characteristic not equal to 2
53
+ were given in Kobayashi et al, [3] and [4]. In Sections 6 and 7 we completely
54
+ determine the (linear) (weak) multipliers of those algebras.
55
+ 2
56
+ Multipliers and weak multipliers
57
+ Let K be a field and A be a (not necessarily associative) algebra over K. The
58
+ set AA of all mappings from A to A forms an associative algebra over K in the
59
+ usual manner. Let L(A) denotes the subalgebra of AA of all linear mappings
60
+ from A to A.
61
+ A mapping T : A → A is a weak multiplier of A, if
62
+ xT (y) = T (x)y
63
+ (1)
64
+ holds for any x, y ∈ A, and T is a multiplier, if
65
+ xT (y) = T (xy) = T (x)y
66
+ (2)
67
+ for any x, y ∈ A. Let M(A) (resp. M ′(A)) denote the set of all multipliers
68
+ (resp. weak multipliers) of A. Define
69
+ LM(A)
70
+ def
71
+ = M(A) ∩ L(A) and LM ′(A)
72
+ def
73
+ = M ′(A) ∩ L(A).
74
+ Proposition 2.1. M(A) (resp. LM(A)) is a unital subalgebra of AA (resp.
75
+ L(A)), and M ′(A) (resp. LM ′(A)) is a Jordan subalgebra of AA (resp. L(A)).
76
+ Proof. First, the zero mapping is a multiplier because all the three terms in (2)
77
+ are zero. Secondly, the identity mapping is also a multiplier because the three
78
+ terms in (2) are xy. Let T, U ∈ M(A). Then we have
79
+ x(T +U)(y) = xT (y)+xU(y) = T (xy)+U(xy) = T (x)y+U(x)y = (T +U)(x)y
80
+ (3)
81
+ and
82
+ x(T U)(y) = xT (U(y)) = T (xU(y)) = T U(xy) = T (U(x)y) = (T U)(x)y
83
+ (4)
84
+ 2
85
+
86
+ for any x, y ∈ A. Hence, T + U, T U ∈ M(A). Finally let k ∈ K, then
87
+ x(kT )(y) = kxT (y) = kT (xy) = kT (x)y = (kT )(x)y,
88
+ (5)
89
+ and so kT ∈ M(A).
90
+ Therefore, M(A) is a unital subalgebra of AA, and
91
+ LM(A) = M(A) ∩ L(A) is a unital subalgebra of L(A).
92
+ Next, let T, U ∈ M ′(A). Then, the equalities in (3) and (5) hold removing
93
+ the center terms T (xy) + U(xy) and kT (xy) respectively. Hence, M ′(A) is a
94
+ subspace of AA. Moreover, we have
95
+ x(T U)(y) = xT (U(y)) = T (x)U(y) = U(T (x))y = UT (x)y
96
+ and similarly x(UT )(y) = T U(x)y for any x, y ∈ A. Hence,
97
+ x(T U + UT )(y) = (T U + UT )(x)y.
98
+ It follows that T U + UT ∈ M ′(A).1
99
+ The opposite Aop of A is the algebra with the same elements and the addition
100
+ as A, but the multiplication ∗ in it is reversed, that is, x∗y = yx for all x, y ∈ A.
101
+ Proposition 2.2. A and Aop have the same multipliers and weak multiplies,
102
+ that is,
103
+ M(Aop) = M(A) and M ′(Aop) = M ′(A).
104
+ Proof. Let T ∈ AA. Then, T ∈ M ′(A), if and only if
105
+ x ∗ T (y) = T (y)x = yT (x) = T (x) ∗ y
106
+ for any x, y ∈ A, if and only if T ∈ M ′(Aop). Further, T ∈ M(A), if and only if
107
+ x ∗ T (y) = T (y)x = T (yx) = T (x ∗ y) = yT (x) = T (x) ∗ y
108
+ for any x, y ∈ A, if and only if T ∈ M(Aop).
109
+ Let Annl(A) (resp. Annr(A)) be the left (resp. right) annihilator of A and
110
+ let A0 be their intersection, that is,
111
+ Annl(A) = {a ∈ A | ax = 0 for all x ∈ A},
112
+ Annr(A) = {a ∈ A | xa = 0 for all x ∈ A}
113
+ and
114
+ A0 = Annl(A) ∩ Annr(A).
115
+ They are all subspaces of A, and when A is an associative algebra, they are
116
+ two-sided ideals. For a subset X of A, ⟨X⟩ denotes the subspace of A generated
117
+ by X.
118
+ 1In general, for an associative algebra A over a field K of characteristic ̸= 2, the Jordan
119
+ product ◦ on A is defined by x ◦ y = (xy + yx)/2 for x, y ∈ A.
120
+ 3
121
+
122
+ Proposition 2.3. A weak multiplier T of A such that ⟨T (A)⟩ ∩ A0 = {0} is a
123
+ linear mapping.
124
+ Proof. Let x, y, z ∈ A and a, b ∈ K, and let T be a weak multiplier. We have
125
+ T (ax + by)z = (ax + by)T (z) = axT (z) + byT (z) = aT (x)z + bT (y)z
126
+ = (aT (x) + bT (y))z.
127
+ Because z is arbitrary, we have w = T (ax + by) − aT (x) − bT (y) ∈ Annl(A).
128
+ Similarly, we can show w ∈ Annr(A), and so w ∈ A0. Hence, if ⟨T (A)⟩ ∩ A0 =
129
+ {0}, then w = 0 because w ∈ ⟨T (A)⟩. Since a, b, x, y are arbitrary, T is a linear
130
+ mapping.
131
+ Corollary 2.4. If A0 = {0}, then any weak multiplier is a linear mapping over
132
+ K, that is, M ′(A) = LM ′(A) and M(A) = LM(A).
133
+ Proposition 2.5. If T is a weak multiplier, then T (Annl(A)) ⊆ Annl(A),
134
+ T (Annr(A)) ⊆ Annr(A) and T (A0) ⊆ A0 .
135
+ Proof. Let x ∈ Annl(A), then for any y ∈ A we have
136
+ 0 = xT (y) = T (x)y.
137
+ Hence, T (x) ∈ Annl(A). The other cases are similar.
138
+ In this paper we denote the subset {xy | x, y ∈ A} of A by A2, though usually
139
+ A2 denotes the subspace of A generated by this set.
140
+ Proposition 2.6. Any mapping T : A → A such that T (A) ⊆ A0 is a weak
141
+ multiplier. Such a mapping T is a multiplier if and only if T (A2) = {0}. In
142
+ particular, if A is the zero algebra, every mapping T is a weak multiplier, and
143
+ it is a multiplier if only if T (0) = 0.
144
+ Proof. If T (A) ⊆ A0, the both sides are 0 in (1) and T is a weak multiplier.
145
+ This T is a multiplier, if only if the term T (xy) in the middle of (2) is 0 for all
146
+ x, y ∈ A, that is, T (A2) = {0}. If A is the zero algebra, then A = A0 and A2
147
+ = {0}. Hence, any T is a weak multiplier and it is a multiplier if and only if
148
+ T (0) = 0.
149
+ 3
150
+ Nihil decomposition
151
+ Let A1 be a subspace of A such that
152
+ A = A1 ⊕ A0.
153
+ (6)
154
+ Here, A1 is not unique, but choosing an appropriate A1 will become important
155
+ later. When A1 is fixed, any mapping T ∈ AA is uniquely decomposed as
156
+ T = T1 + T0
157
+ (7)
158
+ 4
159
+
160
+ with T1(A) ⊆ A1 and T0(A) ⊆ A0. We call (6) and (7) a nihil decompositions
161
+ of A and T respectively. Let π : A → A1 be the projection and µ : A1 → A be
162
+ the embedding, that is, π(x1 + x0) = µ(x1) = x1 for x1 ∈ A1 and x0 ∈ A0.
163
+ Let M1(A) (resp.
164
+ M0(A)) denote the set of all multipliers T of A with
165
+ T (A) ⊆ A1 (resp. T (A) ⊆ A0). Similarly, the sets M ′
166
+ 1(A) and M ′
167
+ 0(A) of weak
168
+ multipliers of A are defined. Also, set
169
+ LMi(A) = Mi(A) ∩ L(A) and LM ′
170
+ i(A) = M ′
171
+ i(A) ∩ L(A)
172
+ for i = 0, 1. By Proposition 2.3 we see
173
+ M ′
174
+ 1(A) = LM ′
175
+ 1(A) and M1(A) = LM1(A),
176
+ and by Proposition 2.6 we have
177
+ M ′
178
+ 0(A) = AA
179
+ 0 , M0(A) = {T ∈ AA
180
+ 0 | T (A2) = {0}}.
181
+ (8)
182
+ Theorem 3.1. Let A = A1 ⊕ A0 and T = T1 + T0 be nihil decompositions of A
183
+ and T ∈ AA respectively.
184
+ (i) T is a weak multiplier, if and only if T1 is a weak multiplier. If T is a
185
+ weak multiplier, T1 is a linear mapping satisfying T1(A0) = {0}.
186
+ (ii) If T1 is a multiplier and T0(A2) = {0}, then T is a multiplier. If A1 is
187
+ a subalgebra of A, the converse is also true.
188
+ Suppose that A1 is a subalgebra of A, and let Φ be a mapping sending R ∈
189
+ (A1)A1 to µ ◦ R ◦ π ∈ AA. Then,
190
+ (iii) Φ gives an algebra isomorphism from M(A1) onto M1(A) and a Jordan
191
+ isomorphism from M ′(A1) onto M ′
192
+ 1(A).
193
+ Proof. Let x, y ∈ A.
194
+ (i) If T is a weak multiplier, then
195
+ xT1(y) = x(T (y) − T0(y)) = xT (y) = T (x)y = T1(x)y.
196
+ Thus, T1 is also a weak multiplier. Moreover, T1 is a linear mapping by Propo-
197
+ sition 2.3 and T1(A0) ⊆ A1 ∩ A0 = {0} by Proposition 2.5. Conversely, if T1 is
198
+ a weak multiplier, then
199
+ xT (y) = xT1(y) = T1(x)y = T (x)y,
200
+ and so T is a weak multiplier.
201
+ (ii) If T1 is a multiplier and T0(A2) = 0, then T is a multiplier because
202
+ xT (y) = xT1(y) = T1(xy) = T (xy) − T0(xy) = T (xy) = T1(x)y = T (x)y.
203
+ Next suppose that A1 is a subalgebra. If T is a multiplier, then for any
204
+ x, y ∈ A we have
205
+ T1(xy) + T0(xy) = T (xy) = xT (y) = x1T1(y),
206
+ (9)
207
+ 5
208
+
209
+ where x = x1 + x0 with x1 ∈ A1 and x0 ∈ A0. Here, x1T1(y) ∈ A1 because A1
210
+ is a subalgebra, and thus, we have T0(xy) = x1T1(y) − T1(xy) ∈ A0 ∩ A1 = {0}.
211
+ Since x, y are arbitrary, we get T0(A2) = {0}. Moreover, T1 is a multiplier
212
+ because T1(xy) = x1T1(y) = xT1(y) by (9) and similarly T1(xy) = T1(x)y. The
213
+ converse is already proved above.
214
+ (iii) Let S ∈ (A1)A1 and x = x1 + x0, y = y1 + y0 ∈ A with x1, y1 ∈ A1 and
215
+ x0, y0 ∈ A0. Then, π(x) = µ(x1) = x1, π(y) = µ(y1) = y1 and
216
+ Φ(S)(x) = µ(S(π(x))) = µ(S(x1)) = S(x1).
217
+ Thus, if S ∈ M ′(A1), we have
218
+ xΦ(S)(y) = xS(y1) = x1S(y1) = S(x1)y1 = Φ(S)(x)y1 = Φ(S)(x)y.
219
+ Hence, Φ(S) ∈ M ′
220
+ 1(A). Moreover, if S ∈ M(A1), then because π is a homomor-
221
+ phism, we have
222
+ Φ(S)(xy) = S(π(xy)) = S(x1y1) = x1S(y1) = xΦ(S)(y),
223
+ and hence Φ(S) ∈ M1(A). Conversely, let T ∈ M ′
224
+ 1(A), then because T is a
225
+ linear mapping satisfying T (A0) = {0}, there is a linear mapping S ∈ L(A1) on
226
+ A1 such that Φ(S) = T , that is, S(x1) = T (x) = T (x1). We have
227
+ x1S(y1) = x1T (y1) = T (x1)y1 = S(x1)y1,
228
+ and hence S ∈ M ′(A1). Therefore, Φ is a linear isomorphism from M ′(A1)
229
+ to M ′
230
+ 1(A).
231
+ Similarly, Φ gives a linear isomorphism from M(A1) to M1(A).
232
+ Moreover, for T, U ∈ M ′(A1), we have
233
+ Φ(T U) = µ ◦ T ◦ U ◦ π = µ ◦ T ◦ π ◦ µ ◦ U ◦ π = Φ(T )Φ(U).
234
+ Thus, Φ gives an isomorphism of algebras from M(A1) to M1(A) and a Jordan
235
+ isomorphism from M ′(A1) to M ′
236
+ 1(A).
237
+ Theorem 3.1 implies
238
+ M ′(A) = M ′
239
+ 1(A) ⊕ M ′
240
+ 0(A), M1(A) ⊕ M0(A) ⊆ M(A),
241
+ where M ′
242
+ 0(A) and M0(A) are given as (8). Moreover, if A1 is a subalgebra, we
243
+ have
244
+ M ′(A) ∼= M ′(A1)⊕(A0)A, M(A) ∼= M(A1)⊕{T ∈ (A0)A | T (A2) = {0}}. (10)
245
+ Corollary 3.2. Any weak multiplier T is written as
246
+ T = T1 + R
247
+ (11)
248
+ with T1 ∈ LM ′
249
+ 1(A) and R ∈ (A0)A, and it is a multiplier if and only if
250
+ R(x1y1) = x1T1(y1) − T1(x1y1)
251
+ (12)
252
+ for any x1, y1 ∈ A1.
253
+ 6
254
+
255
+ Proof. As stated above T is written as (11). Let x = x1 + x0, y = y1 + y0 ∈ A
256
+ with x1, y1 ∈ A1 and x0, y0 ∈ A0 be arbitrary, then we have
257
+ xT (y) = x1(T1(y) + R(y)) = x1T1(y) = x1T1(y1)
258
+ (13)
259
+ because R(A) ⊆ A0 and T1(A0) = {0}. The last term in (13) is also equal
260
+ to T1(x1)y1 = T (x)y. Hence, T is a multiplier, if and only if it is equal to
261
+ T (xy) = T (x1y1) = T1(x1y1) + R(x1y1), if and only if (12) holds.
262
+ 4
263
+ Linear multipliers and matrix equation
264
+ In this section, A is a finite dimensional algebra over K. We drive a matrix
265
+ equation for a linear mapping on A to be a (weak) multiplier. Suppose that A
266
+ is n-dimensional with basis E = {e1, e2, . . . , en}.
267
+ Lemma 4.1. A linear mapping T : A → A is a weak multiplier if and only if
268
+ eiT (ej) = T (ei)ej,
269
+ (14)
270
+ and it is a multiplier if and only if
271
+ T (eiej) = eiT (ej) = T (ei)ej,
272
+ (15)
273
+ for all ei, ej ∈ E.
274
+ Proof. The necessity of the conditions (14) and (15) is obvious. Let x = x1e1 +
275
+ x2e2+· · ·+xnen, y = y1e1+y2e2+· · ·+ynen ∈ A with x1, x2, . . . , xn, y1, y2, . . . , yn ∈
276
+ K. If T satisfies (14), then we have
277
+ xT (y)
278
+ =
279
+ (
280
+
281
+ i
282
+ xiei)T (
283
+
284
+ j
285
+ yjej) = (
286
+
287
+ i
288
+ xiei)(
289
+
290
+ j
291
+ yjT (ej)) =
292
+
293
+ i,j
294
+ xiyjeiT (ej)
295
+ =
296
+
297
+ i,j
298
+ xiyjT (ei)ej = (
299
+
300
+ i
301
+ xiT (ei))(
302
+
303
+ j
304
+ yjej) = T (x)y.
305
+ Hence, T is a weak multiplier. Moreover, if T satisfies (15), it is a multiplier in
306
+ a similar way
307
+ Let A (we use the bold character) be the multiplication table of A on E. A
308
+ is a matrix whose elements are from A defined by
309
+ A = EtE,
310
+ (16)
311
+ where E = (e1, e2, . . . , en) (we again use the bold face E) is the row vector
312
+ consisting the basis elements. For a linear mapping T on A and a matrix B
313
+ over A, T (B) denotes the matrix obtained by applying T component-wise, that
314
+ is, the (i, j)-element of T (B) is T (bij) for the (i, j)-element bij of B.2 We use
315
+ the same character T for the representation matrix of T on E, that is,
316
+ T (E) = ET.
317
+ (17)
318
+ .
319
+ 2This is called a broadcasting (cf. [6]).
320
+ 7
321
+
322
+ Theorem 4.2. A linear mapping T is a weak multiplier of A if and only if
323
+ AT = T tA,
324
+ (18)
325
+ and T is a multiplier if and only if
326
+ T (A) = AT = T tA.
327
+ (19)
328
+ Proof. By (16) and (17) we have
329
+ (e1, e2, . . . , en)t(T (e1), T (e2), . . . , T (en)) = EtT (E) = EtET = AT
330
+ (20)
331
+ and
332
+ (T (e1), T (e2), . . . , T (e2))t(e1, e2, . . . , en) = T (E)tE = T tEtE = T tA.
333
+ (21)
334
+ By Lemma 4.1, T is a weak multiplier, if and only if (20) and (21) are equal,
335
+ if and only if (18) holds. Moreover, T is multiplier if and only if, the leftmost
336
+ sides of (20) and (21) are equal to (T (eiej))i,j=1,2,...,n = T (A), if and only if
337
+ (19) holds.
338
+ The multiplication table of the opposite algebra Aop of A is At. So, the alge-
339
+ bras with multiplication tables transposed to each other have the same (weak)
340
+ multipliers.
341
+ 5
342
+ Associative algebras
343
+ In this section A is an associative algebra over K.
344
+ Proposition 5.1. If A0 = {0}, then we have
345
+ M(A) = M ′(A) = LM(A) = LM ′(A).
346
+ Proof. Let T ∈ M ′(A), then we have
347
+ T (xy)z = xyT (z) = xT (y)z and zT (xy) = T (z)xy = zT (x)y
348
+ for any x, y, z ∈ A. It follows that
349
+ T (xy) − xT (y) ∈ Annl(A) ∩ Annr(A) = A0 = {0}.
350
+ Hence, T (xy) = xT (y) and we see T ∈ M(A).
351
+ Moreover, T ∈ LM(A) by
352
+ Proposition 2.3.
353
+ Let a ∈ A. If xay = axy (resp. xay = xya) for any x, y ∈ A, a is called a
354
+ left (resp. right) central element, and a is called a central element if ax = xa
355
+ for any x ∈ A. Let Zl(A), (resp. Zr(A), Z(A)) denotes the set of all left central
356
+ (resp. right central, central) elements.
357
+ 8
358
+
359
+ Lemma 5.2. Zl(A) (resp. Zr(A), Z(A)) are subalgebra of A containing Annl(A)
360
+ (resp. Annr(A), A0).
361
+ Proof. Straightforward.
362
+ For a ∈ A, la (resp. ra) denotes the left (resp. right) multiplication by a,
363
+ that is,
364
+ la(x) = ax,
365
+ ra(x) = xa
366
+ for x ∈ A. They are linear mappings.
367
+ Lemma 5.3. For a ∈ A the following statements are equivalent.
368
+ (i) la (resp. ra) is a multiplier,
369
+ (ii) la (resp. ra) is a weak multiplier,
370
+ (iii) a is left (resp. right) central.
371
+ Proof. If la is a weak multiplier, then
372
+ xay = xla(y) = la(x)y = axy
373
+ for any x, y ∈ A. Hence, a is left central. Because la(x)y = axy = la(xy) and
374
+ xla(y) = xay for any x, y ∈ A, la is a multiplier if a is left central. The other
375
+ case is similar, and we see that the three statements are equivalent.
376
+ Lemma 5.4. Suppose that A has a right (resp. left) identity. Then, a left (resp.
377
+ right) central element is central, and Annl(A) = {0} (resp. Annr(A) = {0}).
378
+ Proof. Easy.
379
+ Because Annl(A) ⊆ Zl and Annr(A) ⊆ Zr by Lemma 5.2, we can make the
380
+ quotient algebras ¯Zl(A) = Zl(A)/Annl(A) and ¯Zr(A) = Zr(A)/Annr(A).
381
+ Theorem 5.5. Suppose that A has a left (resp. right) identity e. Then, any
382
+ multiplier is a left (resp. right) multiplication by a left (resp. right) central
383
+ element and is a linear multiplier. The mapping φ : Zl(A) → M(A) sending
384
+ a ∈ Zl(A) to la induces an isomorphism ¯φ : Zl(A) → M(A) of algebras. In
385
+ particular, if A is unital, M(A) is isomorphic to Z(A).
386
+ Proof. Suppose that A has a left identity e. Let T ∈ M ′(A) and set a = T (e).
387
+ Then we have
388
+ T (x) = eT (x) = T (e)x = ax
389
+ for any x ∈ A. Hence, T = la, where a ∈ Zl(A) and T is a linear multiplier
390
+ by Lemma 5.3. Therefore, M ′(A) = LM(A) and φ is surjective. Moreover,
391
+ for a ∈ Zl(A), φ(a) = 0, if and only if ax = 0 for any x ∈ A, if and only
392
+ if a ∈ Annl(A). Thus we have Ker(φ) = Annl(A), and φ induces the desired
393
+ isomorphism. Similarly, if A has a right identity, M(A) is isomorphic to Zr(A).
394
+ Finally, if A has the identity, then Annl(A) = Annr(A) = {0} and hence M(A)
395
+ is isomorphic to Z(A).
396
+ 9
397
+
398
+ 6
399
+ 3-dimensional associative algebras
400
+ Over an algebraically closed field K of characteristic not equal to 2, we have,
401
+ up to isomorphism, 24 families of associative algebras of dimension 3. They are
402
+ 5 unital algebras U0, U1, U2, U3, U4 defined on basis E = {e, f, g} by
403
+ �e
404
+ f
405
+ g
406
+ f
407
+ 0
408
+ 0
409
+ g
410
+ 0
411
+ 0
412
+
413
+ ,
414
+ �e
415
+ f
416
+ g
417
+ f
418
+ 0
419
+ f
420
+ g
421
+ −f
422
+ e
423
+
424
+ ,
425
+ �e
426
+ 0
427
+ 0
428
+ 0
429
+ f
430
+ 0
431
+ 0
432
+ 0
433
+ g
434
+
435
+ ,
436
+ �e
437
+ 0
438
+ 0
439
+ 0
440
+ f
441
+ g
442
+ 0
443
+ g
444
+ 0
445
+
446
+ ,
447
+ �e
448
+ f
449
+ g
450
+ f
451
+ g
452
+ 0
453
+ g
454
+ 0
455
+ 0
456
+
457
+ ,
458
+ 5 curled algebras C0, C1, C2, C3, C4 defined by
459
+ �0
460
+ 0
461
+ 0
462
+ 0
463
+ 0
464
+ 0
465
+ 0
466
+ 0
467
+ 0
468
+
469
+ ,
470
+ �0
471
+ 0
472
+ 0
473
+ 0
474
+ 0
475
+ e
476
+ 0
477
+ −e
478
+ 0
479
+
480
+ ,
481
+ �0
482
+ 0
483
+ 0
484
+ e
485
+ f
486
+ 0
487
+ 0
488
+ g
489
+ 0
490
+
491
+ ,
492
+ �0
493
+ 0
494
+ 0
495
+ 0
496
+ 0
497
+ 0
498
+ e
499
+ f
500
+ g
501
+
502
+ ,
503
+ �0
504
+ 0
505
+ e
506
+ 0
507
+ 0
508
+ f
509
+ 0
510
+ 0
511
+ g
512
+
513
+ ,
514
+ non-unital 4 straight algebras S1, S2, S3, S4 defined by
515
+ �f
516
+ g
517
+ 0
518
+ g
519
+ 0
520
+ 0
521
+ 0
522
+ 0
523
+ 0
524
+
525
+ ,
526
+ �e
527
+ 0
528
+ 0
529
+ 0
530
+ g
531
+ 0
532
+ 0
533
+ 0
534
+ 0
535
+
536
+ ,
537
+ �e
538
+ 0
539
+ 0
540
+ 0
541
+ f
542
+ 0
543
+ 0
544
+ 0
545
+ 0
546
+
547
+ ,
548
+ �e
549
+ f
550
+ 0
551
+ f
552
+ 0
553
+ 0
554
+ 0
555
+ 0
556
+ 0
557
+
558
+ ,
559
+ and non-unital 10 families of waved algebras W1, W2, W4, W5, W6, W7, W8,
560
+ W9, W10 and
561
+
562
+ W3(k)
563
+
564
+ k∈H defined by
565
+ �0
566
+ 0
567
+ 0
568
+ 0
569
+ 0
570
+ 0
571
+ 0
572
+ 0
573
+ e
574
+
575
+ ,
576
+ �0
577
+ 0
578
+ 0
579
+ 0
580
+ 0
581
+ 0
582
+ 0
583
+ e
584
+ 0
585
+
586
+ ,
587
+ �e
588
+ 0
589
+ 0
590
+ 0
591
+ 0
592
+ 0
593
+ 0
594
+ 0
595
+ 0
596
+
597
+ ,
598
+ �0
599
+ 0
600
+ 0
601
+ 0
602
+ 0
603
+ 0
604
+ 0
605
+ f
606
+ g
607
+
608
+ ,
609
+ �0
610
+ 0
611
+ 0
612
+ 0
613
+ 0
614
+ f
615
+ 0
616
+ 0
617
+ g
618
+
619
+ ,
620
+ �e
621
+ 0
622
+ 0
623
+ 0
624
+ 0
625
+ 0
626
+ 0
627
+ f
628
+ g
629
+
630
+ ,
631
+ �e
632
+ 0
633
+ 0
634
+ 0
635
+ 0
636
+ f
637
+ 0
638
+ 0
639
+ g
640
+
641
+ ,
642
+ �0
643
+ e
644
+ 0
645
+ e
646
+ f
647
+ 0
648
+ 0
649
+ g
650
+ 0
651
+
652
+ ,
653
+ �0
654
+ e
655
+ 0
656
+ e
657
+ f
658
+ g
659
+ 0
660
+ 0
661
+ 0
662
+
663
+ and
664
+ �0
665
+ 0
666
+ 0
667
+ 0
668
+ e
669
+ 0
670
+ 0
671
+ ke
672
+ e
673
+
674
+ ,
675
+ respectively, where H is a subset of K such that K = H∪−H and H∩−H = {0}
676
+ (see [3] for details). We determine the (weak) multipliers of them below.
677
+ (0) A = C0 is the zero algebra, so by Proposition 2.6, we have
678
+ M ′(A) = AA, M(A) = {T ∈ AA | T (0) = 0}
679
+ and
680
+ LM(A) = LM ′(A) = L(A).
681
+ (i) The unital algebras U0, U2, U3, U4 are commutative, so for such A we have
682
+ M(A) = LM(A) = M ′(A) = LM ′(A) = {lx|x ∈ A} ∼= A
683
+ by Theorem 5.5. For A = U1, we have
684
+ M(A) = LM(A) = M ′(A) = LM ′(A) ∼= Z(A) = Ke.
685
+ (ii) For A = C1, We have A0 = Annl(A) = Annr(A) = Ke, and a nihil decompo-
686
+ sition A = A1 ⊕ A0 with A1 = Kf + Kg. Let T1 ∈ M ′
687
+ 1(A), then by Theorem 3.1, T1
688
+ is a linear mapping such that T1(Ke) = {0}. Let
689
+ T1 =
690
+
691
+
692
+ 0
693
+ 0
694
+ 0
695
+ 0
696
+ q
697
+ r
698
+ 0
699
+ t
700
+ u
701
+
702
+
703
+ (22)
704
+ 10
705
+
706
+ with q, r, t, u ∈ K be the representation matrix of T1 on E. By Theorem 4.2, T1 is a
707
+ weak multiplier, if and only if
708
+
709
+
710
+ 0
711
+ 0
712
+ 0
713
+ 0
714
+ te
715
+ ue
716
+ 0
717
+ −qe
718
+ −re
719
+
720
+  = AT1 = T t
721
+ 1A =
722
+
723
+
724
+ 0
725
+ 0
726
+ 0
727
+ 0
728
+ −te
729
+ qe
730
+ 0
731
+ −ue
732
+ re
733
+
734
+  ,
735
+ if and only if r = t = 0 and q = u. Hence, M ′
736
+ 1(A) = {Tq
737
+ �� q ∈ K}, where Tq =
738
+
739
+
740
+ 0
741
+ 0
742
+ 0
743
+ 0
744
+ q
745
+ 0
746
+ 0
747
+ 0
748
+ q
749
+
750
+ . By Theorem 3.1 we see
751
+ M ′(A) = {Tq
752
+ �� q ∈ K} ⊕ (Ke)A,
753
+ and
754
+ LM ′(A) =
755
+
756
+
757
+
758
+
759
+
760
+ a
761
+ b
762
+ c
763
+ 0
764
+ q
765
+ 0
766
+ 0
767
+ 0
768
+ q
769
+
770
+
771
+ ��� a, b, c, q ∈ K
772
+
773
+
774
+  .
775
+ By the multiplication table of A, we have αβ = (xv − yz)e
776
+ for α = xf + yg, β =
777
+ zf + vg ∈ A1 with x, y, z, v ∈ K. By Corollary 3.2, T ∈ M ′(A) is given by T = Tq + R
778
+ with R ∈ (Ke)A and this T is a multiplier, if and only if
779
+ R((xv − yz)e)
780
+ =
781
+ R(αβ) = αTq(β) − Tq(αβ)
782
+ =
783
+ α(qβ) − Tq((xv − yz)e) = q(xv − yz)e
784
+ for any α and β, if and only if R(xe) = qxe for all x ∈ K. Let Sq =
785
+
786
+
787
+ q
788
+ 0
789
+ 0
790
+ 0
791
+ q
792
+ 0
793
+ 0
794
+ 0
795
+ q
796
+
797
+  be
798
+ the scalar multiplication by q ∈ K. Then, we see (T − Sq)(A) ⊆ A0 = Ke and
799
+ (T − Sq)(xe) = Tq(xe) + R(xe) − Sq(xe) = 0 + qxe − qxe = 0,
800
+ for any x ∈ K, that is, (T − Sq)(Ke) = {0}. Thus, we have
801
+ M(A) = {Sq
802
+ �� q ∈ K} ⊕ {R ∈ (Ke)A | R(Ke) = {0}},
803
+ and
804
+ LM(A) =
805
+
806
+
807
+
808
+
809
+
810
+ a
811
+ b
812
+ c
813
+ 0
814
+ a
815
+ 0
816
+ 0
817
+ 0
818
+ a
819
+
820
+
821
+ ��� a, b, c ∈ K
822
+
823
+
824
+  .
825
+ (iii) A = C2: Because Annl(A) = Ke and Annr(A) = Kg, we see A0 = {0}.
826
+ Hence, any weak multiplier T is a linear multiplier by Proposition 5.1. By Theorem
827
+ 4.2,
828
+ T =
829
+
830
+
831
+ a
832
+ b
833
+ c
834
+ p
835
+ q
836
+ r
837
+ s
838
+ t
839
+ u
840
+
841
+
842
+ (23)
843
+ is a (weak) multiplier, if and only if
844
+
845
+
846
+ 0
847
+ 0
848
+ 0
849
+ ae + pf
850
+ be + qf
851
+ ce + rf
852
+ pg
853
+ qg
854
+ rg
855
+
856
+  = AT = T tA =
857
+
858
+
859
+ pe
860
+ pf + sg
861
+ 0
862
+ qe
863
+ qf + tg
864
+ 0
865
+ re
866
+ rf + ug
867
+ 0
868
+
869
+  ,
870
+ 11
871
+
872
+ if and only if b = c = p = r = s = t = 0 and a = q = u, that is, T is the scalar
873
+ multiplication Sa by a. Consequently,
874
+ M(A) = M ′(A) = LM(A) = LM ′(A) = {Sa
875
+ �� a ∈ K} ∼= K.
876
+ (iv) C3 and C4 are opposed to each other, and have the same (weak) multipliers
877
+ by Proposition 2.2.
878
+ Let A = C3, then, A has a left identity g, Zl(A) = A and
879
+ Annl(A) = Ke + Kf. Hence, by Theorem 5.4,
880
+ M(A) = M ′(A) = LM(A) = LM ′(A) = A/(Ke + Kg) = {Sa
881
+ �� a ∈ K}.
882
+ (v) A = S1: We have A0 = Annl(A) = Annr(A) = Kg, and A = A1 ⊕ A0 with
883
+ A1 = Ke + Kf. Then, T1 ∈ M ′
884
+ 1(A) is a linear mapping with T (Kg) = {0}. Let
885
+ T1 =
886
+
887
+
888
+ a
889
+ b
890
+ 0
891
+ p
892
+ q
893
+ 0
894
+ 0
895
+ 0
896
+ 0
897
+
898
+
899
+ (24)
900
+ be its representation on E. T1 is a weak multiplier, if and only if
901
+
902
+
903
+ af + pg
904
+ bf + qg
905
+ 0
906
+ ag
907
+ bg
908
+ 0
909
+ 0
910
+ 0
911
+ 0
912
+
913
+  = AT1 = T t
914
+ 1A =
915
+
916
+
917
+ af + pg
918
+ ag
919
+ 0
920
+ bf + qg
921
+ bg
922
+ 0
923
+ 0
924
+ 0
925
+ 0
926
+
927
+  ,
928
+ if and only if b = 0 and a = q. Hence,
929
+ M ′(A) = {T a,p
930
+ 1
931
+ | a, p ∈ K} ⊕ (Kg)A,
932
+ where T a,p
933
+ 1
934
+ =
935
+
936
+
937
+ a
938
+ 0
939
+ 0
940
+ p
941
+ a
942
+ 0
943
+ 0
944
+ 0
945
+ 0
946
+
947
+ . So, T ∈ M ′(A) is written as T = T a,p
948
+ 1
949
+ +R with R ∈ (Kg)A,
950
+ and this T is multiplier, if and only if
951
+ R(xzf + (xv + yz)g)
952
+ =
953
+ R(αβ) = αT a,p
954
+ 1
955
+ (β) − T a,p
956
+ 1
957
+ (αβ)
958
+ =
959
+ α(aze + (pz + av)f) − T a,p
960
+ 1
961
+ (xzf + (xv + yz)g)
962
+ =
963
+ axzf + (pxz + axv + ayz)g − axzf
964
+ =
965
+ (pxz + a(xv + yz))g
966
+ for any α = xe + yf, β = ze + vf ∈ A1 with x, y, z, v ∈ K, if and only if R(xf + yg) =
967
+ (px + ay)g for all x, y ∈ K. Let T a,p =
968
+
969
+
970
+ a
971
+ 0
972
+ 0
973
+ p
974
+ a
975
+ 0
976
+ 0
977
+ p
978
+ a
979
+
980
+ , then (T − T a,p)(A) ⊆ Kg, and
981
+ (T − T a,p)(xf + yg)
982
+ =
983
+ (T a,p
984
+ 1
985
+ + R − T a,p) (xf + yg)
986
+ =
987
+ axf + (px + ay)g − (axf + pxg + ayg) = 0.
988
+ for any x, y ∈ K. Thus, (T − T a,p)(Kf + Kg) = {0}, and hence
989
+ M(A) = {T a,p | a, p ∈ K} ⊕ {R ∈ (Kg)A | R(Kf + Kg) = {0}}.
990
+ Taking the intersections of M ′(A) and M(A) with L(A), we obtain
991
+ LM ′(A) =
992
+
993
+
994
+
995
+
996
+
997
+ a
998
+ 0
999
+ 0
1000
+ p
1001
+ a
1002
+ 0
1003
+ s
1004
+ t
1005
+ u
1006
+
1007
+
1008
+ ��� a, p, s, t, u ∈ K
1009
+
1010
+
1011
+
1012
+ 12
1013
+
1014
+ and
1015
+ LM(A) =
1016
+
1017
+
1018
+
1019
+
1020
+
1021
+ a
1022
+ 0
1023
+ 0
1024
+ p
1025
+ a
1026
+ 0
1027
+ s
1028
+ p
1029
+ a
1030
+
1031
+
1032
+ ��� a, p, s ∈ K
1033
+
1034
+
1035
+  .
1036
+ (vi) A = S2: We have A0 = Annl(A) = Annr(A) = Kg, and A = A1 ⊕ A0 with
1037
+ A1 = Ke + Kf. Let a linear mapping T1 ∈ M ′
1038
+ 1(A) be represented as (24), then T1 is
1039
+ a weak multiplier, if and only if
1040
+
1041
+
1042
+ ae
1043
+ be
1044
+ 0
1045
+ pg
1046
+ qg
1047
+ 0
1048
+ 0
1049
+ 0
1050
+ 0
1051
+
1052
+  = AT = T tA =
1053
+
1054
+
1055
+ ae
1056
+ pg
1057
+ 0
1058
+ be
1059
+ qg
1060
+ 0
1061
+ 0
1062
+ 0
1063
+ 0
1064
+
1065
+  ,
1066
+ if and only if b = p = 0. Hence,
1067
+ M ′(A) = {T a,q
1068
+ 1
1069
+ �� a, q ∈ K} ⊕ (Kg)A,
1070
+ where T a,q
1071
+ 1
1072
+ =
1073
+
1074
+
1075
+ a
1076
+ 0
1077
+ 0
1078
+ 0
1079
+ q
1080
+ 0
1081
+ 0
1082
+ 0
1083
+ 0
1084
+
1085
+ , and
1086
+ LM ′(A) =
1087
+
1088
+
1089
+
1090
+
1091
+
1092
+ a
1093
+ 0
1094
+ 0
1095
+ 0
1096
+ q
1097
+ 0
1098
+ s
1099
+ t
1100
+ u
1101
+
1102
+
1103
+ ��� a, q, s, t, u ∈ K
1104
+
1105
+
1106
+  .
1107
+ By Corollary 3.2, a weak multiplier T written as T = T a,q
1108
+ 1
1109
+ + R for a, q ∈ K and
1110
+ R ∈ (Kg)A is multiplier, if and only if
1111
+ R(xze + yvg)
1112
+ =
1113
+ R(αβ) = αT a,q
1114
+ 1
1115
+ (β) − T a,q
1116
+ 1
1117
+ (xze + yvg)
1118
+ =
1119
+ (xe + yf)(aze + qvf) − axze
1120
+ =
1121
+ yqvg,
1122
+ for any α = xe + yf, β = ze + vf ∈ A1 with x, y, z, v ∈ K, if only if R(xe + yg) =
1123
+ qyg for all x, y ∈ K.
1124
+ Let T a,q =
1125
+
1126
+
1127
+ a
1128
+ 0
1129
+ 0
1130
+ 0
1131
+ q
1132
+ 0
1133
+ 0
1134
+ 0
1135
+ q
1136
+
1137
+ , then T a,q ∈ M(A) and we have
1138
+ (T − T a,q)(xe + yg) = 0 for any x, y ∈ K in the same way as (v) above.
1139
+ Hence,
1140
+ (T − T a,q)(Ke + Kg) = {0}, and we have
1141
+ M(A) = {T a,p | a, p ∈ K} ⊕ {R ∈ (Kg)A | R(Ke + Kg) = {0}}
1142
+ and
1143
+ LM(A) =
1144
+
1145
+
1146
+
1147
+
1148
+
1149
+ a
1150
+ 0
1151
+ 0
1152
+ 0
1153
+ p
1154
+ 0
1155
+ 0
1156
+ t
1157
+ 0
1158
+
1159
+
1160
+ ��� a, p, t ∈ K
1161
+
1162
+
1163
+  .
1164
+ (vii) A = S3: We have A0 = Kg and A = A1 ⊕ A0 with A1 = Ke + Kf. Since
1165
+ A1 is a subalgebra of A, by Theorem 3.1 we obtain the equalities (10) in Section 3.
1166
+ Because A1 is a commutative unital algebra,
1167
+ M(A1) = M ′(A1) = A1 =
1168
+ ��
1169
+ a
1170
+ 0
1171
+ 0
1172
+ b
1173
+ � ��� a, b ∈ K
1174
+
1175
+ by Theorem 5.5. Hence,
1176
+ M ′(A) = A1 ⊕ (Kg)A and M(A) = A1 ⊕ {T ∈ (Kg)A | T (Ke + Kf) = 0}.
1177
+ 13
1178
+
1179
+ Intersecting with L(A) we have
1180
+ LM ′(A) =
1181
+
1182
+
1183
+
1184
+
1185
+
1186
+ a
1187
+ 0
1188
+ 0
1189
+ 0
1190
+ b
1191
+ 0
1192
+ s
1193
+ t
1194
+ u
1195
+
1196
+
1197
+ ��� a, b, s, t, u ∈ K
1198
+
1199
+
1200
+  and LM(A) =
1201
+
1202
+
1203
+
1204
+
1205
+
1206
+ a
1207
+ 0
1208
+ 0
1209
+ 0
1210
+ b
1211
+ 0
1212
+ 0
1213
+ 0
1214
+ u
1215
+
1216
+
1217
+ ��� a, b, u ∈ K
1218
+
1219
+
1220
+  .
1221
+ (viii) A = S4: We have A = A1 ⊕ A0 with A0 = Kg and A1 = Ke + Kf. Because
1222
+ A1 is a commutative unital subalgebra of A, similarly to above we have
1223
+ M ′(A) = A1 ⊕ (Kg)A =
1224
+ ��a
1225
+ 0
1226
+ b
1227
+ a
1228
+ � ��� a, b ∈ K
1229
+
1230
+ ⊕ (Kg)A,
1231
+ M(A)
1232
+ =
1233
+ A1 ⊕
1234
+
1235
+ T ∈ (Kg)A | T (A2) = 0
1236
+
1237
+ =
1238
+ ��a
1239
+ 0
1240
+ b
1241
+ a
1242
+ � ��� a, b ∈ K
1243
+
1244
+ ⊕ {T ∈ (Kg)A | T (Ke + Kf) = 0},
1245
+ LM ′(A) =
1246
+
1247
+
1248
+
1249
+
1250
+
1251
+ a
1252
+ 0
1253
+ 0
1254
+ b
1255
+ a
1256
+ 0
1257
+ s
1258
+ t
1259
+ u
1260
+
1261
+
1262
+ ��� a, b, s, t, u ∈ K
1263
+
1264
+
1265
+  and LM(A) =
1266
+
1267
+
1268
+
1269
+
1270
+
1271
+ a
1272
+ 0
1273
+ 0
1274
+ b
1275
+ a
1276
+ 0
1277
+ 0
1278
+ 0
1279
+ u
1280
+
1281
+
1282
+ ��� a, b, u ∈ K
1283
+
1284
+
1285
+  .
1286
+ (ix) A = W1 : We have A = A1 ⊕ A0 with A0 = Ke + Kf and A1 = Kg. Let
1287
+ T1 ∈ M ′
1288
+ 1(A), then T1 is a linear mapping with T1(A0) = {0}. So T1 is determined by
1289
+ T1(g) = ag with a ∈ K. Let denote this T1 by T a
1290
+ 1 . We have
1291
+ M ′(A) = {T a
1292
+ 1 | a ∈ K} ⊕ (Ke + Kf)A.
1293
+ A weak multiplier T = T a
1294
+ 1 + R with R ∈ (Ke + Kf)A is a multiplier, if and only if
1295
+ R(xye) = R((xg)(yg)) = xgT a
1296
+ 1 (yg) − T a
1297
+ 1 (xye) = axye
1298
+ for all x, y ∈ K, if and only if R(xe) = axe for any x ∈ K. Let Ta =
1299
+
1300
+
1301
+ a
1302
+ 0
1303
+ 0
1304
+ 0
1305
+ 0
1306
+ 0
1307
+ 0
1308
+ 0
1309
+ a
1310
+
1311
+ .
1312
+ Then, (T − Ta)(Ke) = {0} and it follows that
1313
+ M(A) = {Ta
1314
+ �� a ∈ K} ⊕ {R ∈ (Ke + Kf)A �� R(Ke) = {0}}.
1315
+ Also we have
1316
+ LM ′(A) =
1317
+
1318
+
1319
+
1320
+
1321
+
1322
+ a
1323
+ b
1324
+ c
1325
+ p
1326
+ q
1327
+ r
1328
+ 0
1329
+ 0
1330
+ u
1331
+
1332
+
1333
+ ��� a, b, c, p, q, r, u ∈ K
1334
+
1335
+
1336
+
1337
+ and
1338
+ LM(A) =
1339
+
1340
+
1341
+
1342
+
1343
+
1344
+ a
1345
+ b
1346
+ c
1347
+ 0
1348
+ q
1349
+ r
1350
+ 0
1351
+ 0
1352
+ a
1353
+
1354
+
1355
+ ��� a, b, c, q, r ∈ K
1356
+
1357
+
1358
+  .
1359
+ (x) A = W2
1360
+ 3: We have A = A1 ⊕ A0 with A0 = Ke and A1 = Kf + Kg.
1361
+ T ∈ M ′
1362
+ 1(A) is a linear mapping with T (Ke) = {0}. Let T be represented as (22), then
1363
+ T is a weak multiplier if and only if
1364
+
1365
+
1366
+ 0
1367
+ 0
1368
+ 0
1369
+ 0
1370
+ 0
1371
+ 0
1372
+ 0
1373
+ qe
1374
+ re
1375
+
1376
+  = AT = T tA =
1377
+
1378
+
1379
+ 0
1380
+ 0
1381
+ 0
1382
+ 0
1383
+ te
1384
+ 0
1385
+ 0
1386
+ ue
1387
+ 0
1388
+
1389
+  ,
1390
+ 3This is the algebra taken up in [8]
1391
+ 14
1392
+
1393
+ if and only if r = t = 0, q = u. Hence,
1394
+ M ′(A) = {Tq | q ∈ K} ⊕ (Ke)A,
1395
+ where Tq =
1396
+
1397
+
1398
+ 0
1399
+ 0
1400
+ 0
1401
+ 0
1402
+ q
1403
+ 0
1404
+ 0
1405
+ 0
1406
+ q
1407
+
1408
+ . So,
1409
+ LM ′(A) =
1410
+
1411
+
1412
+
1413
+
1414
+
1415
+ a
1416
+ b
1417
+ c
1418
+ 0
1419
+ q
1420
+ 0
1421
+ 0
1422
+ 0
1423
+ q
1424
+
1425
+
1426
+ ��� a, b, c, q ∈ K
1427
+
1428
+
1429
+  .
1430
+ A weak multiplier T = Tq + R with R ∈ (Ke)A is a multiplier, if and only if
1431
+ R(yze) = R(αβ) = αTq(β) − Tq(yze) = α(qβ) = qyze
1432
+ for any α = xf +yg, β = zf +vg ∈ A1 with x, y, z, v ∈ K, if and only if R(xe) = qxe for
1433
+ all x ∈ K. Let Sa be the scalar multiplication by a ∈ K. Then, (T − Sa)(Ke) = {0},
1434
+ and hence,
1435
+ M(A) = {Sa | a ∈ K} ⊕ {R ∈ (Ke)A | R(Ke) = {0}}
1436
+ and
1437
+ LM(A) =
1438
+
1439
+
1440
+
1441
+
1442
+
1443
+ a
1444
+ b
1445
+ c
1446
+ 0
1447
+ a
1448
+ 0
1449
+ 0
1450
+ 0
1451
+ a
1452
+
1453
+
1454
+ ��� a, b, c ∈ K
1455
+
1456
+
1457
+  .
1458
+ (xi) A = W4: We have A = A1 ⊕ A0 with A0 = Kf + Kg and A1 = Ke. Because
1459
+ A1 is a subalgbra isomorphic to the base field K, for T a
1460
+ 1 ∈ M(A1) with a ∈ K given
1461
+ by T a
1462
+ 1 (e) = ae, we see
1463
+ M ′(A) = {T a
1464
+ 1 | a ∈ K} ⊕ (fK + gK)A
1465
+ and
1466
+ M(A) = {T a
1467
+ 1 | a ∈ K} ⊕ {R ∈ (fK + gK)A | R(Ke) = 0}
1468
+ by Theorem 3.1. Taking the intersection with L(A) we have
1469
+ LM ′(A) =
1470
+
1471
+
1472
+
1473
+
1474
+
1475
+ a
1476
+ 0
1477
+ 0
1478
+ p
1479
+ q
1480
+ r
1481
+ s
1482
+ t
1483
+ u
1484
+
1485
+
1486
+ ��� a, p, q, r, s, t, u ∈ K
1487
+
1488
+
1489
+
1490
+ and
1491
+ LM(A) =
1492
+
1493
+
1494
+
1495
+
1496
+
1497
+ a
1498
+ 0
1499
+ 0
1500
+ 0
1501
+ q
1502
+ r
1503
+ 0
1504
+ t
1505
+ u
1506
+
1507
+
1508
+ ��� a, q, r, t, u ∈ K
1509
+
1510
+
1511
+  .
1512
+ (xii) W5 and W6 are opposed. Let A = W5, then A = A1 ⊕ A0 with A0 = Ke and
1513
+ A1 = Kf + Kg. Since A1 is a subalgebra of A, we have the equalities (10). Because
1514
+ A1 has a left identity g, we have
1515
+ M(A1) = LM(A1) = M ′(A1) = LM ′(A1) ∼= (A1)/Kf ∼= Kg
1516
+ by Theorem 5.5. So, any element in M(A1) is a scalar multiplication Sq
1517
+ 1 in A1 by
1518
+ q ∈ K. By Theorem 3.1 we have
1519
+ M ′(A) = {Sq
1520
+ 1 | q ∈ K} ⊕ (Ke)A,
1521
+ 15
1522
+
1523
+ M(A) = {Sq
1524
+ 1 | q ∈ K} ⊕ {R ∈ (Ke)A | R(Kf + Kg) = 0},
1525
+ LM ′(A) =
1526
+
1527
+
1528
+
1529
+
1530
+
1531
+ a
1532
+ b
1533
+ c
1534
+ 0
1535
+ q
1536
+ 0
1537
+ 0
1538
+ 0
1539
+ q
1540
+
1541
+
1542
+ ��� a, b, c, q ∈ K
1543
+
1544
+
1545
+  and LM(A) =
1546
+
1547
+
1548
+
1549
+
1550
+
1551
+ a
1552
+ 0
1553
+ 0
1554
+ 0
1555
+ q
1556
+ 0
1557
+ 0
1558
+ 0
1559
+ q
1560
+
1561
+
1562
+ ��� a, q ∈ K
1563
+
1564
+
1565
+  .
1566
+ (xiii) W7 and W8 are opposed. Let A = W7. We see A0 = Annr(A) = {0}. Hence,
1567
+ any weak multiplier is a linear multiplier by Proposition 5.1, and T represented as (23)
1568
+ is a weak multiplier, if and if
1569
+
1570
+
1571
+ ae
1572
+ be
1573
+ ce
1574
+ 0
1575
+ 0
1576
+ 0
1577
+ pf + sg
1578
+ qf + tg
1579
+ rf + ug
1580
+
1581
+  = AT = T tA =
1582
+
1583
+
1584
+ ae
1585
+ sf
1586
+ sg
1587
+ be
1588
+ tf
1589
+ tg
1590
+ ce
1591
+ uf
1592
+ ug
1593
+
1594
+  ,
1595
+ if and only if b = c = p = r = s = t = 0, q = u. Therefore,
1596
+ M(A) = LM(A) = M ′(A) = LM ′(A) = LM ′(A) =
1597
+
1598
+
1599
+
1600
+
1601
+
1602
+ a
1603
+ 0
1604
+ 0
1605
+ 0
1606
+ q
1607
+ 0
1608
+ 0
1609
+ 0
1610
+ q
1611
+
1612
+
1613
+ ��� a, q ∈ K
1614
+
1615
+
1616
+  .
1617
+ (xiv) W9 and W10 are opposed. Let A = W9. Then, because A0 = Annl(A) = {0},
1618
+ any weak multiplier is a linear multiplier and a linear mapping T represented as (23)
1619
+ is a weak multiplier if and only if
1620
+
1621
+
1622
+ pe
1623
+ qe
1624
+ re
1625
+ ae + pf
1626
+ be + qf
1627
+ ce + rf
1628
+ pg
1629
+ qg
1630
+ rg
1631
+
1632
+  = AT = T tA =
1633
+
1634
+
1635
+ pe
1636
+ ae + pf + sg
1637
+ 0
1638
+ qe
1639
+ be + qf + tg
1640
+ 0
1641
+ re
1642
+ ce + rf + ug
1643
+ 0
1644
+
1645
+
1646
+ c = p = r = s = t = 0, a = q = u. Therefore,
1647
+ LM(A) = M(A) = LM ′(A) = M ′(A) =
1648
+
1649
+
1650
+
1651
+
1652
+
1653
+ a
1654
+ b
1655
+ 0
1656
+ 0
1657
+ a
1658
+ 0
1659
+ 0
1660
+ 0
1661
+ a
1662
+
1663
+
1664
+ ��� a, b ∈ K
1665
+
1666
+
1667
+  .
1668
+ (xv) A = W3(k). We have A = A1 ⊕ A0 with A0 = Ke and A1 = Kf + Kg.
1669
+ T ∈ M ′
1670
+ 1(A) is a linear mapping with T (Ke) = {0}. Let T be represented as (22), then
1671
+ T is a weak multiplier if and only if
1672
+
1673
+
1674
+ 0
1675
+ 0
1676
+ 0
1677
+ 0
1678
+ qe
1679
+ re
1680
+ 0
1681
+ (kq + t)e
1682
+ (kr + u)e
1683
+
1684
+  = AT = T tA =
1685
+
1686
+
1687
+ 0
1688
+ 0
1689
+ 0
1690
+ 0
1691
+ (q + kt)e
1692
+ te
1693
+ 0
1694
+ (r + ku)e
1695
+ ue
1696
+
1697
+  .
1698
+ If k = 0, then the above holds if and only if r = t, and otherwise it holds if and only
1699
+ if r = t = 0, q = u. Thus,
1700
+ M ′(A) = {T q,r,u
1701
+ 1
1702
+ �� q, r, u ∈ K}⊕(Ke)A, LM ′(A) =
1703
+
1704
+
1705
+
1706
+
1707
+
1708
+ a
1709
+ b
1710
+ c
1711
+ 0
1712
+ q
1713
+ r
1714
+ 0
1715
+ r
1716
+ u
1717
+
1718
+
1719
+ ��� a, b, c, q, r, u ∈ K
1720
+
1721
+
1722
+
1723
+ if k = 0, and
1724
+ M ′(A) = {T q
1725
+ 1
1726
+ �� q ∈ K} ⊕ (Ke)A, LM ′(A) =
1727
+
1728
+
1729
+
1730
+
1731
+
1732
+ a
1733
+ b
1734
+ c
1735
+ 0
1736
+ q
1737
+ 0
1738
+ 0
1739
+ 0
1740
+ q
1741
+
1742
+
1743
+ ��� a, b, c, q ∈ K
1744
+
1745
+
1746
+
1747
+ 16
1748
+
1749
+ if k ̸= 0, where
1750
+ T q,r,u
1751
+ 1
1752
+ =
1753
+
1754
+
1755
+ 0
1756
+ 0
1757
+ 0
1758
+ 0
1759
+ q
1760
+ r
1761
+ 0
1762
+ r
1763
+ u
1764
+
1765
+  and T q
1766
+ 1 =
1767
+
1768
+
1769
+ 0
1770
+ 0
1771
+ 0
1772
+ 0
1773
+ q
1774
+ 0
1775
+ 0
1776
+ 0
1777
+ q
1778
+
1779
+ .
1780
+ When k = 0, T = T q,r,u
1781
+ 1
1782
+ + R with R ∈ (Ke)A is multiplier, if and only if
1783
+ R((xz + yv)e)
1784
+ =
1785
+ R(αβ) = αT q,r,u
1786
+ 1
1787
+ (β) − T q,r,u
1788
+ 1
1789
+ ((xz + yv)e)
1790
+ =
1791
+ α((qz + rv)f + (rz + uv)g) = (qxz + r(xv + yz) + uyv)e
1792
+ for any α = xf + yg, β = zf + vg ∈ A1 with x, y, z, v ∈ K, if and only if q = u, r = 0
1793
+ and R(xe) = qxe for all x ∈ K. While, when k ̸= 0, T = T q
1794
+ 1 + R with R ∈ (Ke)A is a
1795
+ multiplier, if and only if
1796
+ R((xz + y(kz + v))e)
1797
+ =
1798
+ R(αβ) = αT q
1799
+ 1 (β) − T q
1800
+ 1 (xue + y(kz + v)e)
1801
+ =
1802
+ α(qβ) = q(xz + y(kz + v))e
1803
+ for any α, β, if and only if R(xe) = qxe for any x ∈ K.
1804
+ In the both cases, with
1805
+ the scalar multiplication Sa by a ∈ K, we have (T − Sa)(Ke) = {0}. Therefore, for
1806
+ arbitrary k (either k is zero or nonzero) we see
1807
+ M(A) = {Sa
1808
+ �� a ∈ K} ⊕ {R ∈ (Ke)A | R(Ke) = {0}}
1809
+ and
1810
+ LM(A) =
1811
+
1812
+
1813
+
1814
+
1815
+
1816
+ a
1817
+ b
1818
+ c
1819
+ 0
1820
+ a
1821
+ 0
1822
+ 0
1823
+ 0
1824
+ a
1825
+
1826
+
1827
+ ��� a, b, c ∈ K
1828
+
1829
+
1830
+  .
1831
+ 7
1832
+ 3-dimensional zeropotent algebras
1833
+ A is a zeropotent algebra if x2 = 0 for all x ∈ A. The zeropotent algebra A over K is
1834
+ anti-commutative, that is, xy = −yx for all x, y ∈ A. Thus we see
1835
+ A0 = Annl(A) = Annr(A).
1836
+ Let A be a zeropotent algebras of dimension 3 over K with char(K) ̸= 2. Let
1837
+ E = {e, f, g} be a basis of A. Because A is anti-commutative, the multiplication table
1838
+ A of A on E is given as
1839
+ A =
1840
+
1841
+
1842
+ 0
1843
+ α
1844
+ −β
1845
+ −α
1846
+ 0
1847
+ γ
1848
+ β
1849
+ −γ
1850
+ 0
1851
+
1852
+  ,
1853
+ where
1854
+
1855
+
1856
+
1857
+
1858
+
1859
+ γ = fg = a11e + a12f + a13g
1860
+ β = ge = a21e + a22f + a23g
1861
+ α = ef = a31e + a32f + a33g
1862
+ for aij ∈ K. We call A =
1863
+
1864
+
1865
+ a11
1866
+ a12
1867
+ a13
1868
+ a21
1869
+ a22
1870
+ a23
1871
+ a31
1872
+ a32
1873
+ a33.
1874
+
1875
+  the structural matrix of A (we use the
1876
+ same symbol A for the algebra and its structural matrix).
1877
+ Lemma 7.1. If rank(A) ≥ 2, then A0 = {0}.
1878
+ 17
1879
+
1880
+ Proof. If rank(A) ≥ 2, at least two of fg, ge, ef are linearly independent. Suppose
1881
+ that α = ef and β = ge are linearly independent (the other cases are similar). If
1882
+ x = ae + bf + cg with a, b.c ∈ K is in Annl(A), then xe = −bα + cβ, xf = aα − cγ
1883
+ and xg = −aβ + bγ are all zero. It follows that a = b = c = 0. Hence, we have
1884
+ Annl(A) = {0} and A0 = Annl(A) = {0}.
1885
+ Theorem 7.2. Let A be a zeropotent algebra A of dimension 3 with rank(A) ≥ 2 over
1886
+ K. Then, any weak multiplier of A is the scalar multiplication Sa for some a ∈ K,
1887
+ that is,
1888
+ M(A) = M ′(A) = LM(A) = LM ′(A) = {Sa | a ∈ K}.
1889
+ Proof. By Lemma 7.1 and Corollary 2.4, any weak multiplier T is a linear mapping.
1890
+ Let T ∈ L(A) be represented as (23). By Theorem 4.2, T is a weak multiplier, if and
1891
+ only if AT = T tA, if and only if
1892
+
1893
+
1894
+ pα − sβ
1895
+ qα − tβ
1896
+ rα − uβ
1897
+ −aα + sγ
1898
+ −bα + tγ
1899
+ −cα + uγ
1900
+ aβ − pγ
1901
+ bβ − qγ
1902
+ cβ − rγ
1903
+
1904
+  =
1905
+
1906
+
1907
+ −pα + sβ
1908
+ aα − sγ
1909
+ −aβ + pγ
1910
+ −qα + tβ
1911
+ bα − tγ
1912
+ −bβ + qγ
1913
+ −rα + uβ
1914
+ cα − uγ
1915
+ −cβ + rγ
1916
+
1917
+
1918
+ (25)
1919
+ holds. Suppose that α = ef, β = ge are linearly independent (the other cases are
1920
+ similar). Then, because pα − sβ = −pα + sβ by comparing the (1,1)-elements of two
1921
+ matrices in (25), we have p = s = 0. Comparing (1,2)-elements and (1,3)-elements,
1922
+ we have qα − tβ = aα − sγ = aα and rα − uβ = −aβ + pγ = −aβ respectively. It
1923
+ follows that a = q = u and r = t = 0. Comparing (2,2)-elements and (3,3)-elements,
1924
+ we see b = c = 0. Consequently, (23) holds if and only if
1925
+ b = c = p = r = s = t =
1926
+ 0 and a = q = u, that is, T = Sa.
1927
+ In [4] we classify the zeropotent algebras of dimension 3 over an algebraically
1928
+ field K of characteristic not equal to 2. Up to isomorphism, we have 10 families of
1929
+ zeropotent algebras. They are
1930
+ Z0, Z1, Z2, Z3, {Z4(a)}a∈H, Z5, Z6, {Z7(a)}a∈H, Z8 and Z9
1931
+ defined by the structural matrices
1932
+
1933
+
1934
+ 0
1935
+ 0
1936
+ 0
1937
+ 0
1938
+ 0
1939
+ 0
1940
+ 0
1941
+ 0
1942
+ 0
1943
+
1944
+  ,
1945
+
1946
+
1947
+ 0
1948
+ 0
1949
+ 0
1950
+ 0
1951
+ 0
1952
+ 0
1953
+ 0
1954
+ 0
1955
+ 1
1956
+
1957
+  ,
1958
+
1959
+
1960
+ 0
1961
+ 0
1962
+ 1
1963
+ 0
1964
+ 0
1965
+ 0
1966
+ 0
1967
+ 0
1968
+ 1
1969
+
1970
+  ,
1971
+
1972
+
1973
+ 0
1974
+ 1
1975
+ 0
1976
+ −1
1977
+ 0
1978
+ 0
1979
+ 0
1980
+ 0
1981
+ 0
1982
+
1983
+  ,
1984
+
1985
+
1986
+ 0
1987
+ 0
1988
+ 0
1989
+ 0
1990
+ 1
1991
+ a
1992
+ 0
1993
+ 0
1994
+ 1
1995
+
1996
+  ,
1997
+
1998
+
1999
+ 0
2000
+ 1
2001
+ 0
2002
+ 0
2003
+ 0
2004
+ 0
2005
+ 0
2006
+ 0
2007
+ 1
2008
+
2009
+  ,
2010
+
2011
+
2012
+ 0
2013
+ 1
2014
+ 1
2015
+ 0
2016
+ 0
2017
+ 1
2018
+ 0
2019
+ 0
2020
+ 1
2021
+
2022
+  ,
2023
+
2024
+
2025
+ 1
2026
+ a
2027
+ 0
2028
+ 0
2029
+ 1
2030
+ 0
2031
+ 0
2032
+ 0
2033
+ 1
2034
+
2035
+  ,
2036
+
2037
+
2038
+ 1
2039
+ 2
2040
+ 2
2041
+ 0
2042
+ 1
2043
+ 2
2044
+ 0
2045
+ 0
2046
+ 1
2047
+
2048
+  and
2049
+
2050
+
2051
+ 1
2052
+ 3
2053
+ 3
2054
+ 0
2055
+ 1
2056
+ 3
2057
+ 0
2058
+ 0
2059
+ 1
2060
+
2061
+  ,
2062
+ respectively.
2063
+ Z0 is the zero algebra, and Z1 is isomorphic to the 3-dimensional associative algebra
2064
+ C1, and their (weak) multipliers are already determined in Section 6. The algebras Z3
2065
+ to Z9 have rank greater or equal to 2, which are covered by Theorem 7.2.
2066
+ Thus, only A = Z2 is left to be analyzed. The multiplication table A of A is
2067
+
2068
+
2069
+ 0
2070
+ g
2071
+ 0
2072
+ −g
2073
+ 0
2074
+ g
2075
+ 0
2076
+ −g
2077
+ 0
2078
+
2079
+ . We see A0 = Annl(A) = Annr(A) = K(e + g), and we have the nihil
2080
+ decomposition A = A0 ⊕ A1 with A1 = Ke + Kf. A weak multiplier T ∈ M ′
2081
+ 1(A) is a
2082
+ linear mapping represented by
2083
+
2084
+
2085
+ a
2086
+ b
2087
+ c
2088
+ p
2089
+ q
2090
+ r
2091
+ 0
2092
+ 0
2093
+ 0
2094
+
2095
+  satisfying
2096
+ 18
2097
+
2098
+
2099
+
2100
+ pg
2101
+ qg
2102
+ rg
2103
+ −ag
2104
+ −bg
2105
+ −cg
2106
+ −pg
2107
+ −qg
2108
+ −rg
2109
+
2110
+  = AT = T tA =
2111
+
2112
+
2113
+ −pg
2114
+ ag
2115
+ pg
2116
+ −qg
2117
+ bg
2118
+ qg
2119
+ −rg
2120
+ cg
2121
+ rg
2122
+
2123
+  .
2124
+ Hence, a = −c = q and b = p = r = 0. Let Ta be this linear mapping, then by
2125
+ Theorem 3.1 we have
2126
+ M ′(A) = {Ta | a ∈ K} ⊕ (K(f + g))A
2127
+ and
2128
+ LM ′(A) =
2129
+
2130
+
2131
+
2132
+
2133
+
2134
+ a + s
2135
+ t
2136
+ −a + u
2137
+ 0
2138
+ a
2139
+ 0
2140
+ s
2141
+ t
2142
+ u
2143
+
2144
+
2145
+ ��� a, s, t, u ∈ K
2146
+
2147
+
2148
+  .
2149
+ By Corollary 3.2, a weak multiplier T = Ta+R with R ∈ (K(e+g))A is a multiplier
2150
+ if and only if for any ζ = xe + yf and η = ze + vf with x, y, z, v ∈ K,
2151
+ R((xv − yz)g)
2152
+ =
2153
+ R(ζη) = ζTa(η) − Ta((xv − yz)g)
2154
+ =
2155
+ ζ(aη) + a(xv − yz)e = a(xv − yz)(e + g)
2156
+ holds. It follows that R(xg) = ax(e + g) for all x ∈ K. Let Sa be the scalar multi-
2157
+ plication by a, then (T − Sa)(A) ⊆ K(e + g) and (T − Sa)(Kg) = {0}. Hence, we
2158
+ obtain
2159
+ M(A) = {Sa | a ∈ K} ⊕ {R ∈ (K(e + g))A | R(Kg) = 0},
2160
+ and
2161
+ LM(A) =
2162
+
2163
+
2164
+
2165
+
2166
+
2167
+ a + s
2168
+ t
2169
+ 0
2170
+ 0
2171
+ a
2172
+ 0
2173
+ s
2174
+ t
2175
+ a
2176
+
2177
+
2178
+ ��� a, s, t ∈ K
2179
+
2180
+
2181
+  =
2182
+
2183
+
2184
+
2185
+
2186
+
2187
+ a
2188
+ b
2189
+ 0
2190
+ 0
2191
+ c
2192
+ 0
2193
+ a − c
2194
+ b
2195
+ c
2196
+
2197
+
2198
+ ��� a, b, c ∈ K
2199
+
2200
+
2201
+  .
2202
+ References
2203
+ [1] B. E. Johnson, An introduction to the theory of centralizers, Proc. London Math.
2204
+ Soc., 14 (1964), 299–320.
2205
+ [2] E. Kaniuth, A Course in commutative Banach algebras, Springer, 2008.
2206
+ [3] Y. Kobayashi, K. Shirayanagi, M. Tsukada and S.-E. Takahasi, A complete clas-
2207
+ sification of three-dimensional algebras over R and C , Asian-European J. Math.,
2208
+ 14 (2021) 2150131.
2209
+ [4] Y. Kobayashi, K. Shirayanagi, M. Tsukada and S.-E. Takahasi, Classification of
2210
+ three dimensional zeropotent algebras over an algebraically closed field, Commu-
2211
+ nication in Algebra, vol. 45, 2017, 5037—5052.
2212
+ [5] R. Larsen, An introduction to the theory of multipliers, Berlin, New York,
2213
+ Springer–Verlag, 1971.
2214
+ [6] T. Tsukada and et al,, Linear algebra with Python, Theory and Applications, to
2215
+ be published in Springer.
2216
+ [7] J. G. Wendel, Left Centralizers and Isomorphisms on group algebras, Pacific J.
2217
+ Math., 2 (1952), 251–261.
2218
+ [8] A. Zivari-Kazempour, Almost multipliers of Frechet algebras, The J. Anal., 28(4)
2219
+ (2020), 1075-1084
2220
+ [9] A. Zivari-Kazempour, Approximate θ-multipliers on Banach algebras, Surv. Math.
2221
+ Appl., 77 (2022), 79–88.
2222
+ 19
2223
+
1tE2T4oBgHgl3EQfNQaE/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
69E1T4oBgHgl3EQfnASE/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e3994f04f9eba4ba72e6ef5c0d9f4e4a2ccda13c7b7e2da07ff103ba5f96f350
3
+ size 3211309
6NFKT4oBgHgl3EQf_C4s/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:30658742d8b6d16bc3311299727d777fb4bbba8007252f784a62a51ee0a9fc95
3
+ size 2031661
7tE1T4oBgHgl3EQf7QXS/content/tmp_files/2301.03533v1.pdf.txt ADDED
@@ -0,0 +1,889 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03533v1 [hep-th] 9 Jan 2023
2
+ FIAN/TD/16/2022
3
+ Unfolded Point Particle as a Field in Minkowski Space
4
+ A.A. Tarusov1,2 and M.A. Vasiliev1,2
5
+ 1 I.E. Tamm Department of Theoretical Physics, Lebedev Physical Institute,
6
+ Leninsky prospect 53, 119991, Moscow, Russia
7
+ 2 Moscow Institute of Physics and Technology, Institutsky pereulok 9, 141701,
8
+ Dolgoprudny, Moscow region, Russia
9
+ Abstract
10
+ Point-particle dynamics is reformulated as a field theory. This is achieved by using
11
+ the unfolded dynamics approach that makes it possible to give dynamical interpretation
12
+ to the concept of physical dimension which is 1 for a point particle in the d-dimensional
13
+ space-time. The main idea for the description of a k-dimensional on-shell system in
14
+ the d-dimensional space is to keep the evolution along d − k dimensions off-shell or,
15
+ alternatively, restrict it in a specific way respecting the compatibility conditions of the
16
+ resulting unfolded system. The developed approach gives some hints how a non-linear
17
+ realization of the symmetry G of a larger-dimensional space in a lower-dimensional
18
+ system can emerge from a geometrical realization on the fields in an appropriate G-
19
+ invariant space.
20
+ For the example of a relativistic point particle considered in this
21
+ paper, G is the Poincar´e group. The proposed general scheme is illustrated by simple
22
+ examples that reproduce conventional results.
23
+ 1
24
+
25
+ Table of contents
26
+ 1
27
+ Introduction
28
+ 3
29
+ 2
30
+ Unfolding
31
+ 3
32
+ 3
33
+ Free particle
34
+ 6
35
+ 4
36
+ Off-shell system
37
+ 8
38
+ 4.1
39
+ General setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
+ 8
41
+ 4.2
42
+ Covariant constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
+ 10
44
+ 5
45
+ Examples of on-shell systems
46
+ 11
47
+ 5.1
48
+ Lorentz force in a constant field . . . . . . . . . . . . . . . . . . . . . . . . .
49
+ 12
50
+ 5.2
51
+ Gravitational interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
52
+ 12
53
+ 5.3
54
+ Interaction with higher spins . . . . . . . . . . . . . . . . . . . . . . . . . . .
55
+ 14
56
+ 6
57
+ Conclusion
58
+ 14
59
+ 2
60
+
61
+ 1
62
+ Introduction
63
+ Among different approaches to relativistic theories, one can distinguish between the
64
+ world-line particle approach and the field-theoretic one. In this article, we unify these ap-
65
+ proaches within the unfolded formulation of dynamical systems [1, 2], which will allow us to
66
+ ascribe a dynamical sense to physical dimensions of a system [3, 4].
67
+ An example of this phenomenon was given in [5], where, following Fronsdal’s prescription
68
+ [6], an infinite system of massless fields of all spins in four-dimensional space has been
69
+ described by a single field in the ten-dimensional space (Analogous results were achieved in
70
+ the particle approach somewhat earlier in [7]).
71
+ In this approach space-time geometry in which the dynamical equations are formulated is
72
+ determined by the symmetry acting on the space, while the physical dimension is associated
73
+ with the set of initial data, that determine the evolution of the system [3]. In the papers
74
+ [5, 3, 7] (see also [8]) this idea was realized for the symmetry acting linearly on the fields in
75
+ both the four- and ten-dimensional space.
76
+ The description of the dynamics of point particles elaborated in this article assumes a
77
+ non-linear realization of the Lorentz symmetry on the dynamic variables of the point particle
78
+ as a consequence of the Einstein constraint on the velocity four-vector
79
+ unun = 1 .
80
+ (By selecting any un, that obeys this constraint, the Lorentz symmetry gets spontaneously
81
+ broken.) The application of the unfolded formalism in this case differs significantly from the
82
+ linear case. It requires the introduction of additional fields which encode unconstrained or
83
+ specific evolution along ”extra” dimensions of space-time as is explained in this paper.
84
+ The paper is organised as follows: Section 2 recalls the unfolded formalism used in the
85
+ paper, illustrated by the well-known scalar field example. Section 3 details the application
86
+ of that formalism to the case of a free point particle. In Section 4 an off-shell formulation
87
+ of the unfolded particle dynamics is presented both in terms of component fields and in
88
+ terms of generating functions.
89
+ In Section 5 it is explained how an external force to the
90
+ equations of motion can be introduced and a number of simple examples of the on-shell
91
+ systems is considered.
92
+ Section 6 contains brief conclusions with some emphasize on the
93
+ further applications and open problems.
94
+ 2
95
+ Unfolding
96
+ The possibility of decreasing the order of a differential equation by introducing new
97
+ variables and transitioning to an equivalent system of differential equations is well known.
98
+ Extension of this approach to partial differential equations is based on the jet formalism [9].
99
+ Also it was elaborated in the framework of BV-BRST formalism e.g. in [10, 11, 12, 13].
100
+ Unfolded dynamics approach [1, 2] (see also [14]), that is most appropriate for the gauge
101
+ theories in the framework of gravity, is a generalization of the first-order formulation of a
102
+ system via replacing a partial derivative by de Rham derivative d := ξn
103
+
104
+ ∂xn and dynamical
105
+ 3
106
+
107
+ variables by space-time differential forms W(x), which allows one to rewrite the system of
108
+ equations in the form
109
+ dW Ω(ξn, x) = GΩ(W(ξn, x)) ,
110
+ (2.1)
111
+ where ξn is the anticommuting differential used as a placeholder for dxn, and GΩ(W(ξ, x))
112
+ is some function of W containing only exterior products of the differential forms W(ξ, x) at
113
+ the same x (no space-time derivatives in GΩ(W(ξ, x)); wedge products are implicit). The
114
+ functions GΩ(W(ξ, x)) cannot be arbitrary, as the de Rham derivative is nilpotent and thus
115
+ the compatibility condition dGΩ = 0 must hold. This demands
116
+ GΛ(W)∂GΩ(W)
117
+ ∂W Λ
118
+ = 0 .
119
+ (2.2)
120
+ This constraint allows one to show that system (2.1) is manifestly invariant under the fol-
121
+ lowing gauge transformations:
122
+ δgaugeW Ω(ξn, x) = dǫΩ(ξn, x) + ǫΛ(ξn, x)∂GΩ(W(ξn, x))
123
+ ∂W Λ(ξn, x)
124
+ ,
125
+ (2.3)
126
+ where
127
+ deg ǫΛ(ξn, x) = deg W Λ(ξn, x) − 1 ,
128
+ with deg ω being a differential form degree of ω.
129
+ Generally speaking, gauge invariance only takes place in so-called universal systems [15,
130
+ 16], in which the compatibility conditions hold as a consequence of the system itself without
131
+ taking into account the number of space-time dimensions, i.e. the fact that d+1-forms vanish
132
+ in d-dimensional space. Indeed, for non-universal systems partial derivative ∂GΩ
133
+ ∂W Λ might have
134
+ no sense, leading to a non-zero derivative of zero represented by a d + 1-form.
135
+ In other terms, the fact that GΛ(ξn, x) is a function of W Ω(ξn, x) can be written as
136
+ GΛ =
137
+
138
+
139
+ n=1
140
+ f Λ
141
+ Ω1,...ΩnW Ω1...W Ωn ,
142
+ f Λ
143
+ Ω1,...Ωk,Ωk+1,...Ωn = (−1)degΩkdegΩk+1f Λ
144
+ Ω1,...Ωk+1,Ωk,...Ωn .
145
+ (2.4)
146
+ (From now on we omit arguments of GΛ and W Ω if it does not lead to misunderstandings.)
147
+ Compatibility condition (2.2) then yields generalized Jacobi identities on the structure con-
148
+ stants f
149
+ m
150
+
151
+ n=0
152
+ (n + 1)f Λ
153
+ [Ω1,...Ωm−nf Φ
154
+ Λ,Ωm−n+1,...Ωm} = 0 ,
155
+ (2.5)
156
+ where [} indicates an appropriate (anti)symmetrisation of indices. From this point of view,
157
+ the universality of a system means that the generalized Jacobi identities hold true regardless
158
+ of the dimension d. The underlying mathematical structure is called the strong homotopy
159
+ L∞ algebra [17].
160
+ For universal systems it is also possible to introduce a Q-differential (homological vector
161
+ field) of the form [16]
162
+ Q = GΩ
163
+
164
+ ∂W Ω ,
165
+ (2.6)
166
+ 4
167
+
168
+ which turns out to be nilpotent,
169
+ Q2 = 0 ,
170
+ as a consequence of compatibility conditions (2.2). In these terms, any universal unfolded
171
+ system can be rewritten as
172
+ dF(W) = QF(W) ,
173
+ where F(W) is an arbitrary function.
174
+ This way of describing the system as a so-called
175
+ Q-manifold relates the de Rham derivation on the world-sheet with coordinates xn to the
176
+ derivation Q on the target space with coordinates W Λ.
177
+ Unfolded formalism allows for a natural way of description of background geometry via
178
+ Maurer–Cartan equations which have the unfolded form. Indeed, let g be a Lie algebra.
179
+ Setting W = w and G = 1
180
+ 2[w , w] for a one-form w ∈ g, one observes that equation (2.1)
181
+ yields the zero-curvature condition
182
+ dw + 1
183
+ 2[w , w] = 0 .
184
+ (2.7)
185
+ For g being Poincar´e algebra with the one-form gauge fields (connection) en and wnm, the
186
+ unfolded system (2.7) yields the coordinate-independent description of Minkowski space in
187
+ the form
188
+ Rn = 0 ,
189
+ Rnm = 0 .
190
+ (2.8)
191
+ Consider a system of equations
192
+ DCA(x) = 0 ,
193
+ where the fields CA(x) in Minkowski space are valued in a Poincar´e-module V while D is
194
+ the exteriour covariant derivative in V with the flat connection w = enPn +ωnmLnm obeying
195
+ (2.7): D = d + w. (For instance, Lorentz transformations act on the tensor indices.) This
196
+ system is invariant under the following gauge transformations:
197
+ δCA = −εA
198
+ BCB,
199
+ (2.9)
200
+ δw(x) = Dε(x).
201
+ (2.10)
202
+ From here it follows that for a fixed w = w0 the gauge symmetry parameters are restricted
203
+ by the condition
204
+ D0ε(x) = 0 ,
205
+ D0 = d + w0.
206
+ (2.11)
207
+ Since D2
208
+ 0 = 0, in the topologically trivial case the zero-form parameter εBA, can be recon-
209
+ structed from any point hence generating global symmetries of the system.
210
+ Minkowski space in Cartesian coordinates is described by the connection
211
+ en = dxn ,
212
+ ωnm = 0 ,
213
+ (2.12)
214
+ in which case (2.11) yields
215
+ ∂nεn − εn
216
+ men
217
+ m = 0 ,
218
+ ∂nεnm = 0 ,
219
+ (2.13)
220
+ which can be solved as εnm = −εmn = const, εn = εnmxm + ǫn, where ǫn is x-independent.
221
+ This obviously forms the Poincar´e transformations.
222
+ 5
223
+
224
+ 3
225
+ Free particle
226
+ The classical point particle is conventionally described by generalized coordinates qi(s)
227
+ depending on the evolution parameter s. In this paper, we also use the generalized coor-
228
+ dinates qi = qi(x) which, however, will be treated as space-time fields, i.e., functions of all
229
+ space-time coordinates xn. Let us, for simplicity, work with Cartesian coordinates xn of a
230
+ flat Minkowski space, which will allow us to omit the Lorentz connection dependent terms.
231
+ We start with a first-step equation
232
+ Dqi(x) = ejqi
233
+ j(x) ,
234
+ (3.1)
235
+ where qij(x) is an arbitrary (for now) matrix and D is the Lorentz covariant derivative. In
236
+ Cartesian coordinates this yields
237
+ dqi(x) = ejqi
238
+ j(x).
239
+ (3.2)
240
+ At j = 0 one arrives at a differential equation with respect to time t = x0 with an
241
+ arbitrary right hand side.
242
+ However, in contrast with classical dynamics, other values of
243
+ j also produce non-trivial equations, which means that the equations of motion involve
244
+ all space-time variables. This unusual modification makes sense when treating generalized
245
+ coordinates as embedding functions from our laboratory system to some other. In this case
246
+ the space sector of the right hand side is just a Jacobian of that transformation.
247
+ It is
248
+ convenient to assume that the dimensions of the original and target spaces are the same,
249
+ thus the space sector of our matrix has to be non-degenerate. Apart from the dependence
250
+ on ”extra” variables, this is similar to the description of a classical particle in terms of the
251
+ transformation from a chosen reference frame to the one in which the particle is at rest.
252
+ The analysis does not stop here though, since qij must satisfy the compatibility condition
253
+ ejDqi
254
+ j(x) = 0 .
255
+ (3.3)
256
+ The general solution to this condition has the form of a one-form with tensor coefficients that
257
+ are symmetric in lower indices, which solves (3.3) due to anticommutativity of the one-forms
258
+ en, eiej = −ejei,
259
+ Dqi
260
+ j(x) = ekqi
261
+ jk(x) ,
262
+ qi
263
+ jk(x) = qi
264
+ kj(x) .
265
+ (3.4)
266
+ Equation (3.4) also produces the compatibility condition which has the analogous form
267
+ Dqi
268
+ jk(x) = elqi
269
+ (jkl)(x) .
270
+ (3.5)
271
+ The process can be continued resulting in the infinite set of equations
272
+ Dqi
273
+ (j1...jn)(x) = ekqi
274
+ (j1...jnk)(x) .
275
+ (3.6)
276
+ This system provides an example of an off-shell unfolded system that does not describe
277
+ any non-trivial equations of motion. It is fully analogous to that described in [18] for the
278
+ scalar field case. (Supersymmetric extensions of the off-shell unfolded systems were recently
279
+ 6
280
+
281
+ considered in [19].) Every equation expresses the compatibility of the previous one, but
282
+ involves a new object that requires its own compatibility condition. To get nontrivial dy-
283
+ namics, however, one has to introduce additional conditions on the coefficients qi(j1...jnk)
284
+ describing higher derivatives of the field qi. Imposing constraints on the fields qi(j1...jnk) is
285
+ equivalent to imposing some differential equations on the fields qi.
286
+ The equations (3.6) admit a more compact form using auxiliary variables yi, so that the
287
+ right hand side of the equations results from differentiation of the generating functions with
288
+ respect to yi,
289
+ Dqi
290
+ (j1...jn)(x, y) = ek d
291
+ dykqi
292
+ (j1...jn)(x, y) ,
293
+ (3.7)
294
+ where qi(x, y) is the generating function
295
+ qi(x, y) =
296
+
297
+
298
+ n=0
299
+ 1
300
+ n!qi
301
+ j1,...jn(x)yj1...yjn ,
302
+ (3.8)
303
+ with the original field qi(x) recovered at y = 0.
304
+ To describe a free relativistic particle this way we introduce a time-like “velocity 4-vector”
305
+ V i(x) as a new variable, imposing the equations
306
+ Dqi(x) = ejVj(x)V i(x),
307
+ (3.9)
308
+ DV i(x) = 0,
309
+ (3.10)
310
+ V i(x)Vi(x) = 1.
311
+ (3.11)
312
+ Let us show that this system indeed describes a free relativistic particle. In Cartesian
313
+ coordinates the system takes the form
314
+ ej ∂
315
+ ∂xj qi(x) = ejVj(x)V i(x),
316
+ (3.12)
317
+ ej ∂
318
+ ∂xj V i(x) = 0.
319
+ (3.13)
320
+ Here the second equation implies that V i is a constant while the first one contains a one-form
321
+ κ = eiVi ,
322
+ (3.14)
323
+ which, in a sense, serves as a projector on the world line of the particle.
324
+ There is some freedom in the parametrization of the world line. For example, to take
325
+ time x0 as the evolution parameter, one has to reduce dxn to dx0 (equivalently, en → dxnδ0
326
+ n).
327
+ This reproduces the familiar equations of motion. Indeed, after such a reduction, the velocity
328
+ vector produces a factor of V0, which is just a relativistic gamma-factor γ = (1 − v2
329
+ c2 )−1/2.
330
+ This is not surprising, since the differentiation on the left hand side is over laboratory time,
331
+ ˙qi(x) = γV i(x),
332
+ (3.15)
333
+ ˙V i(x) = 0.
334
+ (3.16)
335
+ 7
336
+
337
+ Thus, equations (3.9)-(3.11) indeed describe propagation of a free point particle with the
338
+ 4-velocity V i(x).
339
+ Since our unfolded system can be easily extended to include the Lorentz connection by
340
+ appending (2.7), it inherits the full Poincar´e symmetries as outlined at the end of Section
341
+ 2.
342
+ The unfolded formalism allows us to straightforwardly derive the symmetries of the
343
+ system. In this case (2.3) generates the background Poincar´e transformation as well as a
344
+ transformation of qi
345
+ δqi = 0ǫj ∂ekVkV i
346
+ ∂ej
347
+ = 0ǫjVjV i .
348
+ (3.17)
349
+ Note that in this formalism nontrivial particle dynamics is only along the direction asso-
350
+ ciated with κ. In other (transversal) directions the dynamics is trivial with no dependence
351
+ on the other coordinates.
352
+ 4
353
+ Off-shell system
354
+ 4.1
355
+ General setup
356
+ The world-line one-form κ (3.14) makes it possible to formulate the off-shell unfolded
357
+ system of a specific form distinguishing between the directions along κ and transversal ones.
358
+ The evolution of the system in the transversal directions is necessary for consistency. Indeed,
359
+ the naive system
360
+ Dqi(x) = κV i(x) ,
361
+ DV i(x) = κF i(x) ,
362
+ (4.1)
363
+ is inconsistent for arbitrary F i because now κ is not closed
364
+ Dκ = −eiDVi = −eiκFi .
365
+ (4.2)
366
+ While the classical behavior of the system is defined by the terms aligned with V i, to
367
+ achieve compatibility in all directions one has to adjust the evolution along the transversal
368
+ directions appropriately.
369
+ To achieve this it is convenient to introduce the transversal one-forms
370
+ ηi := ei − κV i
371
+ V 2 ,
372
+ V iηi = 0 ,
373
+ (4.3)
374
+ where an additional normalization is introduced, since the condition (3.11) is relaxed, as it
375
+ is not necessarily true off-shell. (Still we assume that V 2(x) := V i(x)Vi(x) ̸= 0.) The system
376
+ then takes the form
377
+ Dqi = κV i(x) + ηjHi
378
+ j(x),
379
+ (4.4)
380
+ DV i = κF i(x) + ηjGi
381
+ j(x).
382
+ (4.5)
383
+ Since ηi is V i-transversal, this system is invariant under the “gauge” transformations
384
+ H
385
+ ′i
386
+ j(x) = Hi
387
+ j(x) + φi(x)Vj(x),
388
+ (4.6)
389
+ G
390
+ ′i
391
+ j(x) = Gi
392
+ j(x) + ψi(x)Vj(x) ,
393
+ (4.7)
394
+ 8
395
+
396
+ with arbitrary functions φi(x), ψi(x), that can be gauge fixed by demanding
397
+ Hi
398
+ jV j = 0 ,
399
+ Gi
400
+ jV j = 0 .
401
+ (4.8)
402
+ Firstly, let us note that the system is indeed off-shell as long as the condition V iVi = 1
403
+ is not enforced. Indeed, the left hand sides contain d2 components of first derivatives of
404
+ qi(x) (or V i(x) for the second equation). On the right hand side, the Hij (Gij) contain
405
+ d(d−1) components due to the transversality condition while the V i (F i) span the d leftover
406
+ components.
407
+ To check the compatibility conditions of this system, one has to act by D on the both
408
+ sides of the equations then solving them with respect to Gij and Hij. We analyze the system
409
+ in an arbitrary torsion free geometry with Dei = 0, which yields
410
+ Dκ = −eiκFi − eiηjGij,
411
+ (4.9)
412
+ Dηi = 1
413
+ V 4
414
+
415
+ (ekκFkV i + ekηjGkjV i + κηjGi
416
+ j)V 2 − 2κV iVkηjGk
417
+ j
418
+
419
+ .
420
+ (4.10)
421
+ The compatibility of (4.4) yields using DDAi = RikAk = elejRik,ljAk .
422
+ DDqi = (Dκ)V i(x) − κDV i(x) + D(ηj)Hi
423
+ j(x) − ηjDHi
424
+ j(x) =
425
+ = −V iejκFj − V iekηjGkj − κηjGi
426
+ j + 1
427
+ V 2κηlGj
428
+ lHi
429
+ j − ηjDHi
430
+ j = elejRi
431
+ k,ljqk .
432
+ (4.11)
433
+ Expanding the last equation in the basis two-forms κηi and ηiηj, we obtain
434
+ (4.12)
435
+ ηjDHi
436
+ j = −V iηjκFj − 1
437
+ V 2V iκV kηjGkj − V iηkηjGkj − κηjGi
438
+ j
439
+ + 1
440
+ V 2κηlGj
441
+ lHi
442
+ j − 2
443
+ V 2κV lηjRi
444
+ k,ljqk − ηlηjRi
445
+ k,ljqk ,
446
+ which is equivalent to
447
+ (4.13)
448
+ DHi
449
+ j = κ(−FjV i + Gi
450
+ j + 1
451
+ V 2V iV kGkj − 1
452
+ V 2Gk
453
+ jHi
454
+ k + 2
455
+ V 2V lRi
456
+ k,ljqk)
457
+ + ηkGkjV i + ηlRi
458
+ k,ljqk + ηkAi
459
+ jk + κVjBi + VjηkCi
460
+ k,
461
+ where the last three terms with arbitrary Bi, Cik and symmetric Aijk = Aikj parameterize
462
+ the general solution of the homogeneous equation ηjDHij = 0. Just as for Hij itself, the
463
+ transversality condition can be imposed on Aijk and Cik,
464
+ Ai
465
+ jkV k = 0 ,
466
+ Ci
467
+ kV k = 0 .
468
+ (4.14)
469
+ Analogously for equation (4.5), with the only difference that we now impose the unfolded
470
+ equations on the field F i,
471
+ DF i = κJi + ηjKi
472
+ j
473
+ (4.15)
474
+ 9
475
+
476
+ again demanding KijV j = 0. Then the compatibility condition for V i yields
477
+ DDV i = (Dκ)F i(x) − κ(DF i) + (Dηj)Gi
478
+ j − ηj(DGi
479
+ j) =
480
+ = −ejκFjF i − elηjGljF i − κηjKi
481
+ j + 1
482
+ V 2κηkGj
483
+ kGi
484
+ j − ηjDGi
485
+ j = elejRi
486
+ k,ljV k ,
487
+ (4.16)
488
+ or, equivalently,
489
+ (4.17)
490
+ ηjDGi
491
+ j = ηjκ(−FjF i + Ki
492
+ j + 1
493
+ V 2F iV kGkj − 1
494
+ V 2Gk
495
+ jGi
496
+ k + 2
497
+ V 2V lRi
498
+ k,ljV k)
499
+ + ηjηk(GkjF i + Ri
500
+ l,kjV l).
501
+ The solution again consists of the inhomogeneous part and the terms parameterizing a
502
+ general solution of the homogeneous equation,
503
+ (4.18)
504
+ DGi
505
+ j = κ(−FjF i + Ki
506
+ j + 1
507
+ V 2F iV kGkj − 1
508
+ V 2Gk
509
+ jGi
510
+ k + 2
511
+ V 2V lRi
512
+ k,ljV k)
513
+ + ηk(GkjF i + Ri
514
+ l,kjV l) + ηlMi
515
+ jl + κVjNi + VjηkLi
516
+ k
517
+ with Mijl = Milj. Once again, Mijl and Lik obey the transversality conditions
518
+ Mi
519
+ jkV k = 0 ,
520
+ Li
521
+ kV k = 0 .
522
+ (4.19)
523
+ In its turn, consistency of equations (4.13) and (4.18) imposes differential constraints
524
+ on the yet unconstrained coefficients A, B, C and M, N, L in terms of new unconstrained
525
+ variables. This process continues indefinitely leading eventually to a totally consistent infinite
526
+ set of equations on the infinite set of variables. Since the analysis of all these conditions in
527
+ terms of component fields like H, G, A, B, C, M, N, L quickly gets complicated we now revisit
528
+ them in a more compact form of generating functions.
529
+ 4.2
530
+ Covariant constraints
531
+ Though the description of a point particle considered in Section 4.1 is clear in principle
532
+ it is algebraically involved and not instructive. It can be simplified at least in Minkowski
533
+ background by imposing appropriate constraints in terms of generating functions of Section
534
+ 3. To this end, we introduce auxiliary variables yi as in (3.7), rewriting the system (4.4),
535
+ (4.5) as
536
+ Dqi(x, y) = ej d
537
+ dyj qi(x, y),
538
+ (4.20)
539
+ DV i(x, y) = ej d
540
+ dyj V i(x, y).
541
+ (4.21)
542
+ 10
543
+
544
+ These equations are clearly consistent, as derivatives commute while the vielbein one-forms
545
+ anticommute. They do not describe any dynamics, imposing no conditions on qi(x, 0) and
546
+ V i(x, 0). The results of Section 4.1 can be reproduced by imposing the following conditions:
547
+ V i(x, y) d
548
+ dyiqj(x, y) = V 2(x, y)V j(x, y) .
549
+ (4.22)
550
+ One has to check that this constraint is compatible with (4.20), (4.21), i.e. its differenti-
551
+ ation does not produce new constraints, giving zero by virtue of (4.22). Indeed,
552
+ D
553
+
554
+ V i(x, y) d
555
+ dyiqj(x, y)−V 2(x, y)V j(x, y)
556
+
557
+ = ek d
558
+ dyk
559
+
560
+ V i(x, y) d
561
+ dyiqj(x, y)−V 2(x, y)V j(x, y)
562
+
563
+ = 0,
564
+ (4.23)
565
+ (In the sequel, the arguments of the generating functions qi(x, y), V i(x, y) are implicit.)
566
+ Let us now show that supplemented with constraint (4.22) equations (4.20), (4.21) repro-
567
+ duce the equations from the previous section. By virtue of (4.22), and since ei = κV i
568
+ V 2 + ηi,
569
+ Eq. (4.20) yields
570
+ Dqi = κV i + ηj d
571
+ dyj qi .
572
+ (4.24)
573
+ Equation (4.4) is reproduced with ηj d
574
+ dyj qi|y=0= ηjHij. To fix an obvious freedom up to a
575
+ function φiVj in a way preserving trasversality one can set
576
+ Hi
577
+ j =
578
+ � d
579
+ dyj qi − 1
580
+ V 2VjV k d
581
+ dykqi����
582
+ y=0 .
583
+ Analogously, (4.21) yields equation (4.5) with
584
+ V j d
585
+ dyj V i���
586
+ y=0 = F i ,
587
+ (4.25)
588
+ � d
589
+ dyj V i − 1
590
+ V 2VjV k d
591
+ dyk V i����
592
+ y=0 = Gi
593
+ j .
594
+ (4.26)
595
+ Let us note that the second derivative of the generating function has d2(d+1)
596
+ 2
597
+ independent
598
+ components, of which, keeping in mind the transversality conditions, d2(d+1)
599
+ 2
600
+ −d2 are encoded
601
+ in Aijk, d2 − d in Cik and d more in Bi. That means that the system (4.20)-(4.22) indeed
602
+ concisely reproduces the off-shell formulation of Section 4.1 in all orders.
603
+ 5
604
+ Examples of on-shell systems
605
+ To put the system on-shell one has to set the field F i, that determines the evolution of
606
+ V i along itself, to some function F i(q, V ). Restriction of some combination of derivatives
607
+ parameterized by F i then would impose some partial differential equations on qi giving rise
608
+ to the equations of motion. Generally, a non-zero force F i(q, V ) would demand some higher
609
+ 11
610
+
611
+ components of additional fields associated with the higher components in yj of qi(x, y) and
612
+ V i(x, y) (descendants) to be nonzero. There are two somewhat opposite options.
613
+ One is that all these descendants are kept non-zero and arbitrary in the sense that they
614
+ parameterize a general solution to the compatibility conditions. Another one is that these
615
+ descendants give as simple as possible specific solution to the compatibility conditions. In the
616
+ former case the system turns out to be off-shell in all directions transversal to the trajectory.
617
+ In the latter, the evolution along transversal directions has a specific form compatible with
618
+ F i(q, V ) ̸= 0 in the full unfolded system. Postponing a general analysis of this issue for the
619
+ future publication here we consider a few simple examples of the second kind.
620
+ 5.1
621
+ Lorentz force in a constant field
622
+ A particular choice of F i(q, V ) linear in V , F i(q, V ) = F ij(q)V j, Fij = −Fji, replicates
623
+ the Lorentz force.
624
+ As a toy example consider a particular solution to the compatibility
625
+ conditions of (4.4), (4.5) in flat space, that easily puts the system on-shell. Namely, let
626
+ F ij(q) be a constant field, i.e. dF ij = 0. Antisymmetry of Fij allows us to impose condition
627
+ (3.11) and write down the following on-shell system:
628
+ dqi(x) = κV i + ηi = ei,
629
+ (5.1)
630
+ dV i(x) = κV jF i
631
+ j + ηjF i
632
+ j = ejF i
633
+ j,
634
+ (5.2)
635
+ which is obviously consistent without introducing higher components in yj of qi(x, y) and
636
+ V i(x, y).
637
+ Note that the free particle case considered in Section 3 is reproduced at F i = 0 and
638
+ also corresponds to the specific (trivial) choice of the descendants associated with higher
639
+ components in yj of qi(x, y) and V i(x, y).
640
+ 5.2
641
+ Gravitational interaction
642
+ Within the exterior algebra formalism underlying the unfolded dynamics approach, the
643
+ gravitational background is naturally taken into account by using appropriate covariant
644
+ derivatives of the Cartan formulation of gravity. To introduce it in the metric formalism, i.e.
645
+ with Christoffel symbols, one has to distinguish between laboratory Lorentz indices denoted
646
+ by Latin letters and the underlined world sheet indices. For instance, V i = eiiV i, where the
647
+ vielbein eii relates laboratory and world indices. Let us start with the Cartan formulation.
648
+ The on-shell covariant condition (4.5) for V i with zero force reads as
649
+ ∂kV i = −ωk
650
+ i
651
+ jV j + ηk
652
+ jGi
653
+ j .
654
+ (5.3)
655
+ On-shell, it is possible to impose the condition (3.11), compatibility with which then implies
656
+ the anticipated antisymmetry of ω,
657
+ ωk
658
+ i
659
+ j = −ωk
660
+ j
661
+ i .
662
+ (5.4)
663
+ 12
664
+
665
+ Here the higher-order compatibility with Gij = 0 is easily achieved for the case of flat
666
+ (zero-curvature) gravitational fields while the general case demands some Gij ̸= 0.
667
+ It is not difficult to see that the condition (5.3), after applying the frame postulate
668
+ ∂kel
669
+ i − Γi
670
+ klei
671
+ i + ωk
672
+ i
673
+ jel
674
+ j = 0 ,
675
+ (5.5)
676
+ can be equivalently rewritten, leaving out the derivatives of the vielbein, i.e only in terms of
677
+ V i and the Christoffel symbols.
678
+ ∂kV i = (∂kei
679
+ i)V i + ei
680
+ i∂kV i = −ωk
681
+ i
682
+ jei
683
+ jV i + ηk
684
+ jGi
685
+ j =⇒ ∂kV i = Γi
686
+ klV l + ηk
687
+ jGi
688
+ j .
689
+ (5.6)
690
+ From here it is possible to use the metric formalism in the equations for V i
691
+ dV i = κV k∂kV i + ηk∂kV i = κΓi
692
+ klV kV l + ηjGi
693
+ j ,
694
+ (5.7)
695
+ where
696
+ ∂k = ek
697
+ k∂k .
698
+ (5.8)
699
+ After the vielbein reduction on V : P(ei) = κV i, one gets the expected geodesic equation.
700
+ The example above of the link between spin-connection and Christoffel symbols realizes
701
+ the transition between worldsheet and fiber indices. This highlights the difference between
702
+ the usual dynamics formulated in terms of xi, ˙xk and our unfolded system formulated in
703
+ terms of qi, V i.
704
+ The relation between the two formalisms can be uplifted to the action level. As noted in
705
+ Section 3, after an appropriate reduction of the vielbein, Dqi becomes dqi
706
+ dτ ((3.15), (3.16)),
707
+ where τ is the natural evolution parameter. Using that qi(x) are embedding functions for
708
+ the coordinates xi, let us write an action, quadratic in dqi
709
+ dτ using the metric gij in the target
710
+ space (not necessarily corresponding to Minkowski’s space) and adding the gauge parameters
711
+ α for reparametrization invariance by α′dτ ′ = αdτ,
712
+ S = 1
713
+ 2
714
+
715
+ dτα
716
+ � 1
717
+ α2gij
718
+ dqi
719
+
720
+ dqj
721
+ dτ + m2�
722
+ .
723
+ (5.9)
724
+ In terms of xi, we obtain the regular action
725
+ S = 1
726
+ 2
727
+
728
+ dτα
729
+ � 1
730
+ α2gij
731
+ dqi
732
+ dxk
733
+ dqj
734
+ dxl
735
+ dxk
736
+
737
+ dxl
738
+ dτ + m2�
739
+ = 1
740
+ 2
741
+
742
+ dτα
743
+ � 1
744
+ α2 ˜gkl
745
+ dxk
746
+
747
+ dxl
748
+ dτ + m2�
749
+ .
750
+ (5.10)
751
+ Here ˜gkl is the induced metric from the target space. As usual, Euler-Lagrange equations
752
+ for α are algebraic
753
+ α = 1
754
+ m
755
+
756
+ ˜gkl
757
+ dxk
758
+
759
+ dxl
760
+ dτ ,
761
+ (5.11)
762
+ which allows us to substitute them back into the action to arrive at the conventional result
763
+ S = m
764
+
765
+
766
+
767
+ ˜gkl
768
+ dxk
769
+
770
+ dxl
771
+ dτ .
772
+ (5.12)
773
+ 13
774
+
775
+ 5.3
776
+ Interaction with higher spins
777
+ Note that the condition (5.3) allows a direct generalization onto higher-spin interactions
778
+ via introducing an appropriate higher-spin connection ωn1,...ns−1,m = dxkωkn1,...ns−1,m [20],
779
+ dV i = −ωn1,...ns−1,
780
+ iV n1...V ns−1 + ηjGi
781
+ j .
782
+ (5.13)
783
+ In this case, the compatibility with the constraint (3.11) demands ω(n1,...ns−1,m) = 0, which
784
+ means that, in agreement with the general higher-spin theory [20], ωn1,...ns−1,m is described
785
+ by the Young diagram n1 ... ns−1
786
+ m
787
+ .
788
+ Note that the force associated with the field of an arbitrary spin can also be written in
789
+ terms of generalized Christoffel symbols [21] (see also [22, 23]).
790
+ 6
791
+ Conclusion
792
+ In this paper, we suggest an approach to the description of a relativistic classical point
793
+ particle as a field on which relativistic symmetries act geometrically. This is achieved by
794
+ rewriting equations in the unfolded formalism that supports manifest invariance under dif-
795
+ feomorphisms and the Lorentz group. The point particle is represented as a field obeying
796
+ unfolded equations.
797
+ A mechanism of projectors specifying the evolution parameter in a
798
+ covariant way is introduced.
799
+ The proposed approach can be useful for different types of theories including the double
800
+ field theory, [24, 25] where, as we hope, it can be used to provide an alternative way of
801
+ enforcing the section constraint (see, e.g., [26].) More generally, the description of lower-
802
+ dimensional objects within a proper extension of the proposed approach is of great interest,
803
+ in particular, for the description of branes in superstring theory as well as string theory
804
+ itself: it would be interesting to reformulate the string theory as a 2d theory described from
805
+ the start in terms of fields in the target space. It would also be interesting to analyze the
806
+ relation of the suggested mechanism with the models with non-linearly realized symmetries
807
+ [27, 28].
808
+ It should be stressed that in the presence of extra dimensions the unfolded dynamics
809
+ solely along the parameters associated with the particle trajectory does not allow for com-
810
+ patible unfolded equations demanding an evolution along the transverse directions respecting
811
+ appropriate compatibility conditions. This raises a number of questions for the future study
812
+ such as, for instance, whether any solutions of the compatibility conditions can be associated
813
+ with an evolution along a one-dimensional trajectory and, if not, what are the sufficient con-
814
+ ditions for this to be true? A related interesting problem is to obtain the on-shell conditions
815
+ from the variational principle along the lines of [29].
816
+ 14
817
+
818
+ Acknowledgement
819
+ We are grateful to Ruslan Metsaev for the correspondence. This work was supported by
820
+ the Russian Basic Research Foundation Grant No 20-02-00208.
821
+ References
822
+ [1] M. A. Vasiliev, Phys. Lett. B 209 (1988) 491.
823
+ [2] M. A. Vasiliev, Annals Phys. 190 (1989) 59.
824
+ [3] M. Vasiliev, [arXiv:hep-th/0111119 [hep-th]].
825
+ [4] M. Vasiliev, Lect. Notes Phys. 892 (2015), 227-264 [arXiv:1404.1948 [hep-th]].
826
+ [5] M. Vasiliev, Phys. Rev. D 66 (2002), 066006 [arXiv:hep-th/0106149 [hep-th]].
827
+ [6] C. Fronsdal, “Massless Particles, Ortosymplectic Symmetry and Another Type of
828
+ Kaluza-Klein Theory”, Preprint UCLA/85/TEP/10, in Essays on Supersymmetry, Rei-
829
+ del, 1986 (Mathematical Physics Studies, v.8).
830
+ [7] I.
831
+ Bandos,
832
+ J.
833
+ Lukierski
834
+ and
835
+ D.
836
+ Sorokin,
837
+ Phys.Rev.
838
+ D61
839
+ (2000)
840
+ 045002,
841
+ [hep-th/9904109].
842
+ [8] I. Bandos, X. Bekaert, J. de Azcarraga, D. Sorokin and M. Tsulaia, JHEP 05 (2005),
843
+ 031 [arXiv:hep-th/0501113 [hep-th]].
844
+ [9] Vinogradov, A.M. Geometry of nonlinear differential equations. J Math Sci 17,
845
+ 1624–1649 (1981). https://doi.org/10.1007/BF01084594 .
846
+ [10] I. A. Batalin and G. A. Vilkovisky, Phys. Lett. B 69 (1977), 309-312.
847
+ [11] G. Barnich, M. Grigoriev, A. Semikhatov and I. Tipunin, Commun. Math. Phys. 260
848
+ (2005), 147-181 [arXiv:hep-th/0406192 [hep-th]].
849
+ [12] G. Barnich and M. Grigoriev, JHEP 01 (2011), 122 [arXiv:1009.0190 [hep-th]].
850
+ [13] M. Grigoriev, JHEP 12 (2012), 048 [arXiv:1204.1793 [hep-th]].
851
+ [14] N. Boulanger, C. Iazeolla and P. Sundell, JHEP 07 (2009), 013 [arXiv:0812.3615 [hep-
852
+ th]].
853
+ [15] X. Bekaert, S. Cnockaert, C. Iazeolla and M. A. Vasiliev, hep-th/0503128.
854
+ [16] M. A. Vasiliev, Int. J. Geom. Meth. Mod. Phys. 3 (2006) 37 [hep-th/0504090].
855
+ [17] T.
856
+ Lada
857
+ and
858
+ J.
859
+ Stasheff,
860
+ Int.
861
+ J.
862
+ Theor.
863
+ Phys.
864
+ 32
865
+ (1993),
866
+ 1087-1104
867
+ [arXiv:hep-th/9209099 [hep-th]].
868
+ [18] O. Shaynkman and M. A. Vasiliev,
869
+ Theor. Math. Phys. 123 (2000),
870
+ 683-700
871
+ [arXiv:hep-th/0003123 [hep-th]].
872
+ [19] N. G. Misuna, [arXiv:2201.01674 [hep-th]].
873
+ [20] M. A. Vasiliev, Yad. Fiz. 32 (1980) 855 [Sov. J. Nucl. Phys. 32 (1980) 439].
874
+ 15
875
+
876
+ [21] B. de Wit and D. Z. Freedman, Phys. Rev. D 21, 358 (1980).
877
+ [22] A. Y. Segal, [arXiv:hep-th/0008105 [hep-th]].
878
+ [23] I. Bars and C. Deliduman, Phys. Rev. D 64 (2001), 045004 [arXiv:hep-th/0103042
879
+ [hep-th]].
880
+ [24] W. Siegel, Phys. Rev. D 48, 2826-2837 (1993).
881
+ [25] W. Siegel, Phys. Rev. D 47, 5453-5459 (1993).
882
+ [26] O. Hohm, E. T. Musaev and H. Samtleben, JHEP 10 (2017), 086 [arXiv:1707.06693
883
+ [hep-th]].
884
+ [27] E. Ivanov and V. Ogievetsky, Teor. Mat. Fiz. 25 (1975), 164-177.
885
+ [28] E. Ivanov and A. Kapustnikov, J. Phys. A 11 (1978), 2375-2384.
886
+ [29] A. A. Tarusov and M. A. Vasiliev, Phys. Lett. B 825 (2022), 136882 [arXiv:2111.12691
887
+ [hep-th]].
888
+ 16
889
+
7tE1T4oBgHgl3EQf7QXS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
89E5T4oBgHgl3EQfQw7M/content/tmp_files/2301.05516v1.pdf.txt ADDED
@@ -0,0 +1,4257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05516v1 [math.PR] 13 Jan 2023
2
+ CLT for real β-Ensembles at High Temperature∗
3
+ Charlie Dworaczek Guera†, Ronan Memin‡
4
+ Abstract
5
+ We establish a central limit theorem for the fluctuations of the empirical measure in the beta-
6
+ ensemble of dimension N at a temperature proportional to N and with convex, smooth potential.
7
+ The space of test functions for which the CLT holds includes C1, vanishing functions at infinity. It is
8
+ obtained by the inversion of an operator which is a pertubation of a Sturm-Liouville operator. The
9
+ method that we use is based on a change of variables introduced in [BFG15] and in [Shc14].
10
+ Contents
11
+ 1
12
+ Introduction and main result
13
+ 1
14
+ 2
15
+ Regularity of the equilibrium measure and Hilbert transform
16
+ 6
17
+ 3
18
+ Concentration inequality, proof of Theorem 1.5
19
+ 9
20
+ 4
21
+ Localization of the edge of a configuration
22
+ 14
23
+ 5
24
+ Laplace transform for smooth test functions, proof of Theorem 1.3
25
+ 17
26
+ 6
27
+ Inversion of L
28
+ 22
29
+ 7
30
+ Regularity of the inverse of L and completion of the proof of Theorem 1.3
31
+ 26
32
+ A Appendix: proof of Theorem 6.2
33
+ 29
34
+ 1
35
+ Introduction and main result
36
+ The beta-ensemble of dimension N ⩾ 1 with parameter β > 0 and potential V is the probability measure
37
+ on RN given by
38
+ dPβ,V
39
+ N (x1, . . . , xN) =
40
+ 1
41
+ ZN(V, β)
42
+
43
+ i<j
44
+ |xi − xj|βe−�N
45
+ i=1 V (xi)dx1 . . . dxN .
46
+ (1)
47
+ The potential V has to be chosen so that the partition function
48
+ ZN(V, β) =
49
+ ˆ
50
+ RN
51
+
52
+ i<j
53
+ |xi − xj|βe−�N
54
+ i=1 V (xi)dx1 . . . dxN
55
+ ∗This project has received funding from the European Research Council (ERC) under the European Union Horizon 2020
56
+ research and innovation program (grant agreement No. 884584).
57
+ †Université de Lyon, ENSL, CNRS, France
58
+ email: charlie.dworaczek@ens-lyon.fr
59
+ ‡Université de Lyon, ENSL, CNRS, France
60
+ email: ronan.memin@ens-lyon.fr
61
+ 1
62
+
63
+ is finite. This is the case for example if for some β′ > max(1, β),
64
+ lim inf
65
+ |x|→∞
66
+ V (x)
67
+ Nβ′ ln |x| > 1 ,
68
+ (2)
69
+ see [AGZ10, equation (2.6.2)]. The parameter β, which is allowed to depend on N, is the so-called inverse
70
+ temperature.
71
+ Under the special choice V (x) = x2
72
+ 2 , the measure (1) can be seen as the joint law of the (unordered)
73
+ eigenvalues of certain matrix models:
74
+ • For β = 1 (resp. β = 2), it is the law of the eigenvalues of the Gaussian Orthogonal Ensemble
75
+ (resp. Gaussian Unitary Ensemble), [AGZ10][Theorem 2.5.2].
76
+ • For general β > 0, potentially depending on N, it is the law of the spectrum of certain tri-diagonal
77
+ random matrices as shown by Dumitriu and Edelman in [DE02].
78
+ We consider here the high temperature regime where β scales as 1/N, and write β = 2P
79
+ N for some
80
+ P > 0. The corresponding measure is therefore
81
+ dPV,P
82
+ N (x1, . . . , xN) =
83
+ 1
84
+ ZV,P
85
+ N
86
+
87
+ i<j
88
+ |xi − xj|
89
+ 2P
90
+ N e−�N
91
+ i=1 V (xi)dx1 . . . dxN ,
92
+ (3)
93
+ with partition function
94
+ ZV,P
95
+ N
96
+ =
97
+ ˆ
98
+ RN
99
+
100
+ i<j
101
+ |xi − xj|
102
+ 2P
103
+ N e−�N
104
+ i=1 V (xi)dx1 . . . dxN .
105
+ (4)
106
+ It was shown in [GZ19] that under PV,P
107
+ N , the sequence of empirical measures
108
+ ˆµN = 1
109
+ N
110
+ N
111
+
112
+ i=1
113
+ δxi
114
+ satisfies a large deviation principle at speed N with strictly convex, good rate function. As a consequence,
115
+ ˆµN converges almost surely in distribution towards a deterministic measure µV
116
+ P as N goes to infinity,
117
+ meaning that almost surely, for every bounded continuous f : R → R,
118
+ ˆ
119
+ R
120
+ fdˆµN −→
121
+ N→∞
122
+ ˆ
123
+ R
124
+ fdµV
125
+ P .
126
+ The limiting measure µV
127
+ P can be seen to have a density ρV
128
+ P which satisfies for almost every x ∈ R
129
+ V (x) − 2P
130
+ ˆ
131
+ R
132
+ ln |x − y|ρV
133
+ P (y)dy + ln ρV
134
+ P (x) = λV
135
+ P ,
136
+ (5)
137
+ where λV
138
+ P is constant (see [GM22, Lemma 3.2] for example).
139
+ The β-ensemble in the regime βN −→
140
+ N→∞ 2P > 0 has drawn a lot of attention from the random matrix
141
+ and statistical physics communities lately. The limiting density was first described in the case of the
142
+ quadratic potential in [ABG12], as a crossover between the Wigner semicircle law (fixed β > 0 case) and
143
+ the Gaussian density (case β = 0). The fluctuations of the eigenvalues in the bulk and at the edge of a
144
+ configuration were studied for example in [BGP15],[NT18],[NT20],[Pak18], [Lam21]. These fluctuations
145
+ were shown to be described by Poisson statistics in this regime. Recently, Spohn uncovered in [Spo20]
146
+ a link between the study of the Classical Toda chain and the β-ensemble in this regime, the result was
147
+ later extended to more general potentials in [GM22]. It is explained in [Spo21][Section 6] how the central
148
+ 2
149
+
150
+ limit theorem for the empirical measure in the high temperature β ensemble is linked with the currents
151
+ of the Toda chain.
152
+ The Central Limit Theorem for the fluctuations of the linear statistics of beta-ensembles was first
153
+ established by [Joh98] for β = 2 polynomial potential, then generalized and further developed in the
154
+ regime where β is fixed in [Shc13], [BG13a], [BG13b], [BLS18]. Also an optimal local law was found
155
+ in this regime in [BMP22]. The CLT was obtained in the high-temperature regime βN → 2P > 0 by
156
+ Nakano and Trinh in [NT18, Theorem 4.9] for quadratic V , relying on the tridiagonal representation for
157
+ the beta-ensemble with quadratic potential in [DE02]. In [HL21], the authors prove the CLT in the case
158
+ of the circular beta-ensemble at high temperature with general potential, using a normal approximation
159
+ method involving the spectral analysis of an operator associated to the limiting covariance structure.
160
+ Their method allowed them to derive a Berry-Esseen bound, i.e. a speed of convergence of the fluctuations
161
+ towards a Gaussian variable.
162
+ In this paper, we adapt part of the arguments of [HL21] to our setup. More precisely, we show that
163
+ for a class of regular, convex potentials V satisfying a growth condition of the type
164
+ lim
165
+ |x|→∞
166
+ V ′′(x)
167
+ V ′(x)2 = 0 ,
168
+ denoting νN = ˆµN − µV
169
+ P and considering test functions f belonging to the range of a certain integro-
170
+ differential operator, the scaled fluctuations of ˆµN, defined by
171
+
172
+ NνN(f) :=
173
+
174
+ N
175
+ �ˆ
176
+ R
177
+ fdµN −
178
+ ˆ
179
+ R
180
+ fdµV
181
+ P
182
+
183
+ ,
184
+ converge in law towards centered Gaussian law with variance depending on f.
185
+ When considering the fixed temperature regime, i.e. β fixed, one has to renormalize the xi’s by
186
+
187
+ N.
188
+ It is shown in [AGZ10][Theorem 2.6.1] that the measure
189
+ 1
190
+ N
191
+ N
192
+
193
+ i=1
194
+ δxi/
195
+
196
+ N
197
+ satisfies a large deviation principle, and the limiting measure is characterized in [AGZ10][Lemma 2.6.2]
198
+ by an equation similar to (5). In fact, the term ln ρV
199
+ P in the left-hand side of (5) is the only difference in
200
+ the equation characterizing the limiting measure in the fixed β case. We point out the very similar char-
201
+ acterization of the equilibrium measure corresponding to the minimization problem arising in [BGK16].
202
+ There again, the limiting measure is compactly supported. The term ln ρV
203
+ P is of prime importance because
204
+ its presence implies that the support of ρV
205
+ P is the whole real line. It leads to technicalities to deal with
206
+ the behavior at infinity of most of the associated objects, namely dealing with weighted Lebesgue spaces
207
+ L2(ρV
208
+ P ) and the corresponding Sobolev spaces Hk(ρV
209
+ P ).
210
+ Our strategy is based on a change of variables in the partition function ZV,P
211
+ N
212
+ (4), used for the beta-
213
+ ensemble at fixed temperature introduced in [BFG15] and [Shc14], and used in [Gui19] and in [BGK16]
214
+ to derive the loop equations and in [BLS18] to derive a CLT in the β-ensemble with β fixed. The outline
215
+ of the argument goes as follows: Take φ : R → R smooth, vanishing fast enough at infinity, and do the
216
+ change of variables in ZV,P
217
+ N
218
+ , xi = yi +
219
+ t
220
+
221
+ N φ(yi), 1 ⩽ i ⩽ N, to get
222
+ ZP,V
223
+ N
224
+ =
225
+ ˆ
226
+ RN
227
+
228
+ i<j
229
+ ����yi − yj +
230
+ t
231
+
232
+ N
233
+ (φ(yi) − φ(yj))
234
+ ����
235
+ 2P/N
236
+ e−�N
237
+ i=1 V �
238
+ yi+
239
+ t
240
+
241
+ N φ(yi)� N
242
+
243
+ i=1
244
+
245
+ 1 +
246
+ t
247
+
248
+ N
249
+ φ′(yi)
250
+
251
+ dNy .
252
+ Expanding the different terms in this integral, one gets
253
+ ZP,V
254
+ N
255
+ =
256
+ ˆ
257
+ RN
258
+
259
+ i<j
260
+ |yi − yj|
261
+ 2P
262
+ N e−�N
263
+ i=1 V (yi)e
264
+ t
265
+
266
+ N
267
+
268
+ 2P
269
+ N
270
+
271
+ i<j
272
+ φ(yi)−φ(yj )
273
+ yi−yj
274
+ +�N
275
+ i=1(φ′(yi)−V ′(yi)φ(yi))
276
+
277
+ e
278
+ t2
279
+ 2 σ2
280
+ N (φ)dNy ,
281
+ 3
282
+
283
+ where the term σ2
284
+ N(φ) converges towards a limiting variance σ2(φ) depending on φ, P and V . After
285
+ dividing both parts of the equation by ZP,V
286
+ N
287
+ , and because of equation (5) characterizing µV
288
+ P , one can
289
+ deduce from the last equation the convergence of the Laplace transform
290
+ E
291
+
292
+ et
293
+
294
+ N(νN (Ξφ)+error term)�
295
+ −→
296
+ N→∞ e
297
+ t2
298
+ 2 σ2(φ) ,
299
+ (6)
300
+ where Ξ is a linear operator acting on test functions and defined by
301
+ (Ξφ)(x) = 2P
302
+ ˆ
303
+ R
304
+ φ(x) − φ(y)
305
+ x − y
306
+ dµV
307
+ P (y) + φ′(x) − V ′(x)φ(x) .
308
+ (7)
309
+ Once the error term is taken care of, (6) shows the central limit theorem for test functions of the form
310
+ Ξφ. Following [HL21], the operator L given by
311
+ Lφ = Ξφ′
312
+ (8)
313
+ can be analyzed using Hilbert space techniques. In particular, the operator L, seen as an unbounded
314
+ operator of the Hilbert space
315
+ H =
316
+
317
+ u ∈ L2(ρV
318
+ P )
319
+ ��� u′ ∈ L2(ρV
320
+ P ),
321
+ ˆ
322
+ R
323
+ uρV
324
+ P dx = 0
325
+
326
+ ,
327
+ ⟨u, v⟩H = ⟨u′, v′⟩L2(ρV
328
+ P ) ,
329
+ can be decomposed as
330
+ −L = A + 2PW ,
331
+ where A is a positive Sturm-Liouville operator and W is positive and self-adjoint. Such a writing allows
332
+ us to show that −L is invertible, see Theorem 6.7.
333
+ We now state the assumptions we make on the potential V .
334
+ Assumptions 1.1. The potential V satisfies:
335
+ i) V ∈ C3(R), goes to infinity at infinity and is convex.
336
+ ii) For all polynomial Q ∈ R[X] and α > 0, Q
337
+
338
+ V ′(x)
339
+
340
+ e−V (x) =
341
+ o
342
+ |x|→∞(x−α) .
343
+ iii) |V ′(x)|
344
+ −→
345
+ |x|→+∞ +∞ and x �→
346
+ 1
347
+ V ′(x)2 is integrable at infinity. Furthermore, for any sequence xN
348
+ such that |xN| goes to infinity, and for all real a < b, we have, as N goes to infinity,
349
+ 1
350
+ V ′(xN)2
351
+ sup
352
+ a⩽x⩽b
353
+ |V ′′(xN + x)| −→
354
+ N→∞ 0 .
355
+ iv) V ′′(x)
356
+ V ′(x) =
357
+ O
358
+ |x|→∞(1) and V (3)(x)
359
+ V ′(x)
360
+ =
361
+ O
362
+ |x|→∞(1).
363
+ The convexity assumption in i) will guarantee the Poincaré inequality, stated in Proposition 2.4 for the
364
+ equilibrium measure µV
365
+ P . Because i) implies that V goes to infinity faster than linearly, we will see that
366
+ it also ensures exponential decay at infinity of ρV
367
+ P . Recalling the sufficient condition for PV,P
368
+ N
369
+ of equation
370
+ (2) to be defined, this first assumption implies that there exists α > 0 such that lim inf|x|→∞
371
+ V (x)
372
+ |x|
373
+ > α.
374
+ This guarantees in particular that the beta-ensemble (3) is well-defined for all N ⩾ 1 and P ⩾ 0.
375
+ The second assumption ensures that any power of V ′ and V ′′ is in L2(ρV
376
+ P ) and ρV
377
+ P , which behaves
378
+ like e−V up to a sub-exponential factor, belongs to the Sobolev space H2(R) ⊂ C1(R). Indeed, for k ⩽ 2,
379
+ using iv), ρV
380
+ P
381
+ (k) behaves at infinity like (V ′)kρV
382
+ P as shown in (2.2) which is in L2(R) by assumption ii).
383
+ Assumption iii) will be used to localize the minimum/maximum point of a typical configuration
384
+ (x1, . . . , xN) following the law PV,P
385
+ N : this will be done in Corollary 4.2, which comes as a consequence of
386
+ 4
387
+
388
+ [Lam21][Theorem 3.4]. More precisely, Corollary 4.2 establishes that for sequences (α+
389
+ N)N, (α−
390
+ N)N going
391
+ to infinity, the random variables
392
+ α+
393
+ N
394
+
395
+ max
396
+ 1⩽j⩽N xj − E+
397
+ N
398
+
399
+ and
400
+ α−
401
+ N
402
+
403
+ max
404
+ 1⩽j⩽N xj − E−
405
+ N
406
+
407
+ converge in distribution. For large N, the scalars E+
408
+ N and E−
409
+ N can thus be seen as the edges of a typical
410
+ configuration. Furthermore,
411
+ V (E±
412
+ N) ∼ ln N .
413
+ (9)
414
+ We refer to Section 4 for detailed statements. We will need another technical assumption to ensure that
415
+ Taylor remainders arising in the proof of Theorem 5.2 are negligible. This final step in the proof of
416
+ Theorem 1.3 consists in lifting the result of Proposition 5.1 from compactly supported functions to more
417
+ general functions. We use Assumption iv) to ensure that L−1 is regular enough ie that for sufficiently
418
+ smooth functions f,
419
+
420
+ L−1f
421
+ �′
422
+ ∈ H2(R).
423
+ Assumption 1.2. With the notations of Theorem 4.1, we have
424
+ sup
425
+ d(x,IN)⩽1
426
+ ���V (3)(x)
427
+ ��� = o(N 1/2) ,
428
+ where IN =
429
+
430
+ E−
431
+ N − 2; E+
432
+ N + 2
433
+
434
+ .
435
+ In view of the asymptotics (9), Assumption 1.2 is reasonable, at least in the cases where V is of the
436
+ form |x|a + R(x) for a = 2 or a > 3 (we choose a so that V is three times differentiable), and with
437
+ R ∈ C3(R), convex, small enough (see the comment following Theorem 1.3) or V = cosh, for example.
438
+ On the other hand a scaled potential like ex2 doesn’t satisfy assumptions iii) ans iv)..
439
+ We are now able to state the main result, ie the central limit theorem for functions belonging to the
440
+ image of the operator L introduced in (8).
441
+ Theorem 1.3. Assume that V satisfies Assumptions 1.1 and Assumption 1.2. Then for φ verifying the
442
+ following conditions:
443
+ • φ ∈ C1(R)
444
+ • φ(x) = O(1/x) and φ′(x) = O(1/x2) at infinity
445
+
446
+ ˆ
447
+ R
448
+ φ(x)dµV
449
+ P (x) = 0
450
+ we have the convergence in law
451
+
452
+ NνN(φ) → N
453
+
454
+ 0, (σV
455
+ P )2(φ)
456
+
457
+ (10)
458
+ where the limiting variance (σV
459
+ P )2(φ) is given by
460
+ (σV
461
+ P )2(φ) =
462
+ ˆ
463
+ R
464
+
465
+
466
+ L−1φ
467
+ �′′(x)2 + V ′′(x)
468
+
469
+ L−1φ
470
+ �′(x)2
471
+
472
+ dµV
473
+ P (x)
474
+ + P
475
+ ¨
476
+ R2
477
+ ��
478
+ L−1φ
479
+ �′(x) −
480
+
481
+ L−1φ
482
+ �′(y)
483
+ x − y
484
+ �2
485
+ dµV
486
+ P (x)dµV
487
+ P (y) .
488
+ (11)
489
+ 5
490
+
491
+ Remark 1.4. Since νN(φ + c) = νN(φ) for all constant c ∈ R, the assumption
492
+ ˆ
493
+ R
494
+ φ(x)dµV
495
+ P = 0 can be
496
+ dropped by replacing φ by φ −
497
+ ˆ
498
+ R
499
+ φ(x)dµV
500
+ P in the expression of the limiting variance.
501
+ As a tool to deal with the error term of equation (6), we establish a concentration inequality for the
502
+ empirical measure. This inequality is stated in terms of the following distance over the set of probability
503
+ distributions P(R).
504
+ For µ, µ′ ∈ P(R) we define the distance
505
+ d(µ, µ′) =
506
+ sup
507
+ ∥f∥Lip⩽1
508
+ ∥f∥1/2⩽1
509
+ �����
510
+ ˆ
511
+ fdµ −
512
+ ˆ
513
+ fdµ′
514
+ ����
515
+
516
+ ,
517
+ (12)
518
+ where ∥f∥Lip denotes the Lipschitz constant of f, and ∥f∥2
519
+ 1/2 =
520
+ ˆ
521
+ R
522
+ |t| |F[f](t)|2 dt, where F denotes the
523
+ Fourier transform on L2(R) which takes the following expression F[f](t) =
524
+ ˆ
525
+ R
526
+ f(x)e−itxdx for
527
+ f ∈ L1(R) ∩ L2(R).
528
+ We then have
529
+ Theorem 1.5. There exists K ∈ R (depending on P and on V ), such that for any N ⩾ 1 and r > 0,
530
+ PV,P
531
+ N
532
+
533
+ d(ˆµN, µV
534
+ P ) > r
535
+
536
+ ⩽ e−Nr2 P π2
537
+ 2
538
+ +5P ln N+K .
539
+ (13)
540
+ This result is the analog of [HL21, Theorem 1.4].
541
+ The paper is organized as follows. In Section 2 we discuss the regularity of the equilibrium
542
+ density ρV
543
+ P under Assumption 1.1. In Section 3 we prove Theorem 1.5. Section 4 is dedicated to the
544
+ localization of the edge of a typical configuration, mentioned in the discussion preceding the statement of
545
+ Assumption 1.2. We next prove in Section 5 the convergence of the Laplace transform of
546
+
547
+ NνN(Lφ) for
548
+ general functions φ which establishes Theorem 1.3 for functions of the form Lφ. Section 6 is dedicated to
549
+ the diagonalization and inversion of L given by (8). In Section 7, we show regularity properties of L−1 to
550
+ establish Theorem 1.3. We detail in Appendix A elements of proof for the spectral theory of Schrödinger
551
+ operators, used in Section 6.
552
+ Acknowledgments The authors wish to thank Alice Guionnet and Karol Kozlowski for their helpful
553
+ suggestions. We also thank Arnaud Debussche for pointing out the link with Schrödinger operators theory
554
+ and Gautier Lambert for pointing out [Lam21]. We would also like to thank Jeanne Boursier, Corentin
555
+ Le Bihan and Jules Pitcho for their intuition about the regularity of the inverse operator.
556
+ 2
557
+ Regularity of the equilibrium measure and Hilbert transform
558
+ In this section, we discuss the regularity properties of the equilibrium density ρV
559
+ P , namely its decay at
560
+ infinity and its smoothness, and give formulas for its two first derivatives.
561
+ The Hilbert transform, whose definition we recall, plays a central role in the analysis of the equilibrium
562
+ measure. It is first defined on the Schwartz class through ∀φ ∈ S(R), ∀x ∈ R,
563
+ H[φ](x) :=
564
+
565
+ R
566
+ φ(t)
567
+ t − xdt = lim
568
+ ε↓0
569
+ ˆ
570
+ |t−x|>ε
571
+ φ(t)
572
+ t − xdt =
573
+ ˆ +∞
574
+ 0
575
+ φ(x + t) − φ(x − t)
576
+ t
577
+ dt,
578
+ (14)
579
+ where
580
+
581
+ denotes the Cauchy principal value integral, and then extended to L2(R) thanks to property ii)
582
+ of Lemma 2.1: ∥f∥L2(dx) = 1
583
+ π ∥H[f]∥L2(dx). The last expression in (14) is a definition where the integral
584
+ converges in the classical sense.
585
+ 6
586
+
587
+ We also recall the definition of the logarithmic potential U f of a density of probability f : R → R,
588
+ given for x ∈ R by
589
+ U f(x) = −
590
+ ˆ
591
+ R
592
+ ln |x − y|f(y)dy .
593
+ (15)
594
+ Because we assume f ∈ L1(R) to be nonnegative, U f takes values in [−∞, +∞). If f integrates the
595
+ function ln, i.e
596
+ ´
597
+ R ln |x|f(x)dx < +∞, then U f takes real values.
598
+ Additionally, one can check that the logarithmic potential and the Hilbert transform of f are linked
599
+ through the distributional identity
600
+
601
+ U f�′ = H[f].
602
+ We recall in the next lemma some properties of the Hilbert transform that we will use in the rest of
603
+ the paper.
604
+ Lemma 2.1 (Properties of the Hilbert transform).
605
+ i) Fourier transform: For all φ ∈ L2(R), F
606
+
607
+ H[φ]
608
+
609
+ (ω) = iπsgn(ω)F[φ](ω) for all ω ∈ R.
610
+ ii) As a consequence, 1
611
+ π H is an isometry of L2(R), and H satisfies on L2(R) the identity H2 = −π2I.
612
+ iii) Derivative: For any f ∈ H1(R), H[f] is also H1(R) and H[f]′ = H[f ′].
613
+ iv) For all p > 1, the Hilbert transform can be extended as a bounded operator H : Lp(R) → Lp(R).
614
+ v) Skew-self adjointness: For any f, g ∈ L2(R), ⟨H[f], g⟩L2(R) = −⟨f, H[g]⟩L2(R).
615
+ Proof. We refer to [Kin09] for the proofs of these properties.
616
+ As a consequence of [GZ19], ˆµN converges almost surely under PV,P
617
+ N
618
+ towards the unique minimizer of
619
+ the energy-functional EV
620
+ P , defined for µ ∈ P(R) by
621
+ EV
622
+ P (µ) =
623
+
624
+
625
+
626
+ ˆ
627
+ R
628
+
629
+ V + ln
630
+ �dµ
631
+ dx
632
+ ��
633
+ dµ − P
634
+ ¨
635
+ R2 ln
636
+ ��x − y
637
+ ��dµ(x)dµ(y) if µ ≪ dx
638
+ +∞ otherwise
639
+ .
640
+ (16)
641
+ (Here we wrote µ ≪ dx for "µ is absolutely continuous with respect to Lebesgue measure")
642
+ Consequently, following [GM22, Lemma 3.2], the density ρV
643
+ P of µV
644
+ P satisfies equation (5), which we
645
+ rewrite here for convenience.
646
+ V (x) − 2P
647
+ ˆ
648
+ R
649
+ ln |x − y|ρV
650
+ P (y)dy + ln ρV
651
+ P (x) = λV
652
+ P ,
653
+ (17)
654
+ where λV
655
+ P is a constant (depending on V and P). Using this equation, we show in the next lemma that
656
+ ρV
657
+ P decays exponentially and is twice continuously differentiable.
658
+ We now drop the superscript of ρV
659
+ P and µV
660
+ P and denote it ρP and µP for convenience.
661
+ Lemma 2.2. Under Assumption 1.1,
662
+ • The support of µP is R and there exists a constant CV
663
+ P such that for all x ∈ R,
664
+ ρP (x) ⩽ CV
665
+ P (1 + |x|)2P e−V (x) .
666
+ • The density ρP is in C2(R) and we have
667
+ ρ′
668
+ P = −
669
+
670
+ V ′ + 2PH[ρP ]
671
+
672
+ ρP
673
+ (18)
674
+ and
675
+ ρ′′
676
+ P =
677
+
678
+ − 2PH[ρP ]′ − V ′′ + V ′2 + 4P 2H[ρP ]2 + 4PV ′H[ρP ]
679
+
680
+ ρP .
681
+ (19)
682
+ 7
683
+
684
+ Proof. For the first point, [GM22, Lemma 3.2] establishes that the support of µP is the whole real axis,
685
+ and that under the first condition of 1.1, we have the bound, valid for all x ∈ R
686
+ ρP (x) ⩽
687
+ KV
688
+ P
689
+ (1 + |x|)2 ,
690
+ (20)
691
+ with KV
692
+ P a positive constant. Using (17) and the fact that
693
+ ln |x − y| ⩽ ln
694
+
695
+ 1 + |x|
696
+
697
+ + ln
698
+
699
+ 1 + |y|
700
+
701
+ ,
702
+ we see that for all x ∈ R,
703
+ ρP (x) ⩽ CV
704
+ P exp
705
+
706
+ − V (x) + 2P ln(1 + |x|)
707
+
708
+ ,
709
+ (21)
710
+ with
711
+ CV
712
+ P = exp
713
+
714
+ 2P
715
+ ˆ
716
+ R
717
+ ln(1 + |y|)ρP (y)dy + λV
718
+ P
719
+
720
+ which is indeed finite by (20).
721
+ For the second point, we use that
722
+
723
+ U ρP �′ = H[ρP ] weakly and equation (17) to conclude on the
724
+ distributional identity
725
+ ρ′
726
+ P =
727
+
728
+ − V ′ − 2PH[ρP ]
729
+
730
+ ρP .
731
+ By the second point of Assumption 1.1, V ′(x)e−V (x)+2P ln(1+|x|) = o(x−1) as |x| → ∞, thus by (21),
732
+ V ′ρP ∈ L2(R). Also since ρP is L2(R) and bounded, we deduce, by using that H
733
+
734
+ L2(R)
735
+
736
+ = L2(R), that
737
+ H[ρP ]ρP ∈ L2(R). Adding up these terms we get ρP ∈ H1(R). Because H[ρP ]′ = H[ρ′
738
+ P ] in a weak sense
739
+ by Lemma 2.1, H[ρP ] ∈ H1(R). By the classical fact that H1(R) is contained in the set of 1/2-Hölder
740
+ functions C1/2(R), we have H[ρP ] ∈ C1/2(R) and so U ρP ∈ C1,1/2(R), the set of functions in C1(R) with
741
+ derivative of class 1/2-Hölder.
742
+ Using the fact that V is continuously differentiable, the previous equation for the weak derivative of ρP
743
+ then ensures that ρP ∈ C1(R) and equation (18) holds in the strong sense.
744
+ Differentiating (in a weak sense) equation (18) we obtain
745
+ ρ′′
746
+ P =
747
+
748
+ − 2PH[ρP ]′ − V ′′ + V ′2 + 4P 2H[ρP ]2 + 4PV ′H[ρP ]
749
+
750
+ ρP .
751
+ The three first terms belong to L2(R) for the same reasons as before. By equation (21), ρP ∈ L4(R) and
752
+ by lemma 1.1, so is H[ρP ], thus using the boundedness of ρP we see that ρP H[ρP ]2 ∈ L2(R). For the last
753
+ term, we use that V ′ρP and H[ρP ] belong to L4(R) to ensure by Cauchy-Schwarz inequality that it is in
754
+ L2(R). Finally, we can conclude that ρP ∈ H2(R) and so that H[ρP ] ∈ H2(R) with H[ρP ]′′ = H[ρ′′
755
+ P ] (in a
756
+ weak sense). As before, we conclude that ρP ∈ C2(R) and that equation (19) holds in a strong sense.
757
+ We next show that the Hilbert transform of ρP is continuous and decays at infinity.
758
+ Lemma 2.3. Let u ∈ L2(R) such that
759
+ ´
760
+ R u(t)dt exists and f : t �→ tu(t) ∈ H1(R) then
761
+ H[u](x)
762
+
763
+ |x|→∞
764
+
765
+ ´
766
+ R u(t)dt
767
+ x
768
+ .
769
+ Moreover if
770
+ ˆ
771
+ R
772
+ u(t)dt = 0,
773
+ ´
774
+ R f(t)dt exists and g : t �→ t2u(t) ∈ H1(R), then
775
+ H[u](x)
776
+
777
+ |x|→∞
778
+
779
+ ´
780
+ R tu(t)dt
781
+ x2
782
+ .
783
+ As a consequence, we obtain that H[ρP ](x)
784
+
785
+ |x|→∞ x−1 and the logarithmic potential U ρP is Lipschitz
786
+ bounded, with bounded derivative H[ρP ].
787
+ 8
788
+
789
+ Proof. Let u ∈ L2(R), such that
790
+ ´
791
+ R u(t)dt exists and f : t �→ tu(t) ∈ H1(R). Then
792
+ xH[u](x) +
793
+ ˆ
794
+ R
795
+ u(t)dt =
796
+ ˆ
797
+ R
798
+ �xu(x + t) − xu(x − t)
799
+ 2t
800
+ + u(x + t)
801
+ 2
802
+ + u(x − t)
803
+ 2
804
+
805
+ dt = H[f](x).
806
+ Since f ∈ H1(R), so is H[f], proving that it goes to zero at infinity. Hence
807
+ H[u](x)
808
+
809
+ |x|→∞
810
+
811
+ ´
812
+ R u(t)dt
813
+ x
814
+ Moreover if
815
+ ˆ
816
+ R
817
+ u(t)dt = 0,
818
+ ´
819
+ R f(t)dt exists and g : t �→ t2u(t) ∈ H1(R), then by the same argument:
820
+ x2H[u](x) = xH[f](x) = H[g](x) −
821
+ ˆ
822
+ R
823
+ f(t)dt
824
+ where g(t) = t2u(t). We deduce that H[u](x)
825
+
826
+ |x|→∞
827
+
828
+ ´
829
+ R tu(t)dt
830
+ x2
831
+ since H[g] goes to zero at infinity.
832
+ We conclude this section by stating the Poincaré inequality for the measure µP under the assumption
833
+ that V is convex.
834
+ Proposition 2.4. The measure µP satisfies the following Poincaré inequality: There exists a constant
835
+ C such that for all f ∈ C∞
836
+ c (R),
837
+ VarµP (f) ⩽ C
838
+ ˆ
839
+ R
840
+ |f ′|2dµP .
841
+ (22)
842
+ This fact comes as a direct consequence of [BBCG08][Corollary 1.9], which states that if the probability
843
+ measure µ has a log-concave density on R, then it satisfies (22) for f smooth enough (actually the result
844
+ is true in Rd, replacing f ′ by ∇f). Indeed, by convexity of V and concavity of x �→ ´
845
+ R ln |x − y|ρP (y)dy,
846
+ equation (17) implies that ln ρP is concave.
847
+ Remark 2.5. We will apply later inequality (22) to more general functions than C∞
848
+ c (R), namely functions
849
+ of the weighted Sobolev space H1(ρP ), defined in Section 6; which can be seen as the completion of C∞
850
+ c (R)
851
+ with respect to the norm ∥u∥L2(ρP ) + ∥u′∥L2(ρP ).
852
+ 3
853
+ Concentration inequality, proof of Theorem 1.5
854
+ We prove in this section the concentration Theorem 1.5. Its proof is a direct adaptation of Theorem 1.4
855
+ of [HL21], which shows the analogous estimate in the circular setup. It is inspired by [MMS14] and based
856
+ on a comparison between a configuration xN = (x1, . . . , xN) sampled with PV,P
857
+ N
858
+ and a regularized version
859
+ yN = (y1, . . . , yN), which we describe here.
860
+ Definition 3.1. Let xN = (x1, . . . , xN) ∈ RN, and suppose (up to reordering) that x1 ⩽ x2 . . . ⩽ xN.
861
+ We define yN ∈ RN by:
862
+ y1 := x1, and for 0 ⩽ k ⩽ N − 1, yk+1 := yk + max{xk+1 − xk, N −3}.
863
+ Note that the configuration yN given by the previous definition satisfies yk+1 − yk ⩾ N −3, and yN is
864
+ close to xN in the sense that
865
+ N
866
+
867
+ k=1
868
+ |xk − yk| ⩽
869
+ 1
870
+ 2N .
871
+ (23)
872
+ Indeed, by construction we have |xk − yk| = yk − xk ⩽ (k − 1)N −3, and we get the bound by summing
873
+ these inequalities.
874
+ 9
875
+
876
+ The key point of the proof of Theorem 1.5 is comparing the empirical measure ˆµN = 1
877
+ N
878
+ �N
879
+ i=1 δxi, where
880
+ xN follows PV,P
881
+ N , to the regularized measure
882
+ �µN := λN −5 ∗ 1
883
+ N
884
+ N
885
+
886
+ i=1
887
+ δyi,
888
+ (24)
889
+ ie the convolution of λN −5 and the empirical measure, where λN −5 is the uniform measure on [0, N −5].
890
+ The interest of introducing the measure �µN is that it is close to ˆµN, while having a finite energy EV
891
+ P (�µN),
892
+ given by (16). Finally, notice that the empirical measure doesn’t change when reordering x1, . . . , xN, and
893
+ thus we do not lose in generality for our purposes in assuming that x1 ⩽ . . . ⩽ xN in definition 3.1.
894
+ We now introduce a distance on P(R) which is well-suited to our context.
895
+ Definition 3.2. For µ, µ′ ∈ P(R) we define the distance (possibly infinite) D(µ, µ′) by
896
+ D(µ, µ′) :=
897
+
898
+
899
+ ˆ
900
+ ln |x − y|d(µ − µ′)(x)d(µ − µ′)(y)
901
+ �1/2
902
+ (25)
903
+ =
904
+ �ˆ +∞
905
+ 0
906
+ 1
907
+ t
908
+ ��F[µ − µ′]
909
+ ��2dt
910
+ �1/2
911
+ .
912
+ (26)
913
+ where the Fourier transform of a signed measure ν is defined by F[ν](x) :=
914
+ ´
915
+ e−itxd(µ − µ′)(x)
916
+ Let f : R ��� R with finite 1/2 norm ∥f∥1/2 :=
917
+ �´
918
+ R |t| |F[f](t)|2 dt
919
+ �1/2
920
+ . By Plancherel theorem and
921
+ Hölder inequality, for any µ, µ′ ∈ P(R), setting ν = µ − µ′,
922
+ ����
923
+ ˆ
924
+ R
925
+ fdµ −
926
+ ˆ
927
+ R
928
+ fdµ′
929
+ ����
930
+ 2
931
+ =
932
+ �����
933
+ 1
934
+
935
+ ˆ
936
+ R
937
+ |t|1/2F[f](t)F[ν](t)
938
+ |t|1/2 dt
939
+ �����
940
+ 2
941
+
942
+ 1
943
+ 2π2 ∥f∥2
944
+ 1/2D2(µ, µ′).
945
+ Therefore the metric d defined in (12) is dominated by D:
946
+ d(µ, µ′) ⩽
947
+ 1
948
+
949
+ 2π D(µ, µ′).
950
+ (27)
951
+ The following lemma shows how the distance D is related to the energy-functional EV
952
+ P defined in (16),
953
+ we will write EP for simplicity.
954
+ Lemma 3.3. We have for any absolutely continuous µ ∈ P(R) with finite energy EV
955
+ P (µ),
956
+ EP (µ) − EP (µP ) = PD2(µ, µP ) +
957
+ ˆ
958
+ ln
959
+ � dµ
960
+ dµP
961
+
962
+ dµ .
963
+ (28)
964
+ Proof of Lemma 3.3. Subtracting EP (µ) − EP (µP ) we find
965
+ EP (µ) − EP (µP ) =
966
+ ˆ
967
+ V d(µ − µP ) +
968
+ ˆ
969
+ ln dµ
970
+ dx dµ −
971
+ ˆ
972
+ ln ρP dµP − P
973
+ ¨
974
+ ln |x − y|dµ(x)dµ(y)
975
+ + P
976
+ ¨
977
+ ln |x − y|dµP (x)dµP (y) .
978
+ (29)
979
+ Now, if ν is a signed measure of mass zero, integrating (17) we get
980
+ ˆ
981
+ V (x)dν(x) − 2P
982
+ ¨
983
+ ln |x − y|dν(x)dµP (y) +
984
+ ˆ
985
+ ln(ρP )(x)dν(x) = 0 .
986
+ 10
987
+
988
+ We take ν = µ − µP , and get
989
+ ˆ
990
+ V (x)d(µ − µP )(x) = 2P
991
+ ¨
992
+ ln |x − y|dµ(x)dµP (y) − 2P
993
+ ¨
994
+ ln |x − y|dµP (x)dµP (y)
995
+
996
+ ˆ
997
+ ln(ρP )(x)dµ(x) +
998
+ ˆ
999
+ ln(ρP )(x)dµP (x) .
1000
+ Plugging this last identity in (29), we find
1001
+ EP (µ) − EP (µP ) = −P
1002
+ ¨
1003
+ ln |x − y|dν(x)dν(y) +
1004
+ ˆ
1005
+ ln
1006
+ � dµ
1007
+ dµP
1008
+
1009
+ (x)dµ(x)
1010
+ which establishes the result.
1011
+ Proof of Theorem 1.5. We first give a lower bound for the partition function ZV,P
1012
+ N
1013
+ (4) of PV,P
1014
+ N . We rewrite
1015
+ it as
1016
+ ZV,P
1017
+ N
1018
+ =
1019
+ ˆ
1020
+ RN exp
1021
+
1022
+ 2P
1023
+ N
1024
+
1025
+ i<j
1026
+ ln |xi − xj| −
1027
+ N
1028
+
1029
+ i=1
1030
+
1031
+ V (xi) + ln ρP (xi)
1032
+ ��
1033
+ dρP (x1) . . . dρP (xN) ,
1034
+ and apply Jensen inequality to obtain:
1035
+ ln ZV,P
1036
+ N
1037
+
1038
+ ˆ
1039
+ RN
1040
+
1041
+ 2P
1042
+ N
1043
+
1044
+ i<j
1045
+ ln |xi − xj| −
1046
+ N
1047
+
1048
+ i=1
1049
+
1050
+ V (xi) + ln ρP (xi)
1051
+ ��
1052
+ dρP (x1) . . . dρP (xN)
1053
+ ⩾ P(N − 1)
1054
+ ¨
1055
+ ln |x − y|dρP (x)dρP (y) − N
1056
+ ˆ
1057
+ R
1058
+
1059
+ V + ln ρP
1060
+
1061
+ dρP
1062
+ ⩾ −NEV
1063
+ P
1064
+
1065
+ µP
1066
+
1067
+ − P
1068
+ ¨
1069
+ ln |x − y|dρP (x)dρP (y).
1070
+ Using this estimate and the fact that for 1 ⩽ i, j ⩽ N we have |xi −xj| ⩽ |yi−yj|, with yN = (y1, . . . , yN)
1071
+ of definition 3.1, we deduce the bound on the density of probability
1072
+ dPV,P
1073
+ N
1074
+ dx
1075
+ (x1, . . . , xN) ⩽ e
1076
+ NEP (µP )+P
1077
+ ˜
1078
+ ln |x−y|dµP (x)dµP (y)+ P
1079
+ N
1080
+
1081
+ i̸=j ln |yi−yj|−�N
1082
+ i=1 V (xi) .
1083
+ (30)
1084
+ Recalling (24), we now show the following estimate
1085
+
1086
+ i̸=j
1087
+ ln |yi − yj| ⩽ 2N + N 2
1088
+ ¨
1089
+ ln |x − y|d�µN(x)d�µN(y) + 3N ln N + 3
1090
+ 2N .
1091
+ (31)
1092
+ Let i ̸= j and u, v ∈ [0, N −5]. Since for x ̸= 0 and |h| ⩽ |x|
1093
+ 2 , we have
1094
+ �� ln |x + h| − ln |x|
1095
+ �� ⩽ 2|h|
1096
+ |x| , we deduce
1097
+ �� ln |yi − yj + u − v| − ln |yi − yj|
1098
+ �� ⩽ 2|u − v|
1099
+ |yi − yj| ⩽ 2N −5
1100
+ N −3 =
1101
+ 2
1102
+ N 2 .
1103
+ Thus, summing over i ̸= j and integrating with respect to u and v, we get
1104
+
1105
+ i̸=j
1106
+ ln |yi − yj| ⩽ 2 +
1107
+
1108
+ i̸=j
1109
+ ¨
1110
+ ln |yi − yj + u − v|dλN −5(u)dλN −5(v)
1111
+ = 2 + N 2
1112
+ ¨
1113
+ ln |x − y|d�µN(x)d�µN(y) − N
1114
+ ¨
1115
+ ln |u − v|dλN −5(u)dλN −5(v) .
1116
+ 11
1117
+
1118
+ The last integral is equal to − 3
1119
+ 2 − 5 ln N, so we deduce (31). We now combine (30) and (31). Recall (16)
1120
+ and set
1121
+ cN = P
1122
+ �¨
1123
+ ln |x − y|dµP (x)dµP (y) + 3/2 + 2/N
1124
+
1125
+ .
1126
+ We get
1127
+ dPV,P
1128
+ N
1129
+ dx
1130
+ (x1, . . . , xN) ⩽ ecN+5P ln N exp
1131
+
1132
+ N
1133
+
1134
+ EP (µP ) − EP (�µN) +
1135
+ ˆ �
1136
+ V + ln d�µN
1137
+ dx
1138
+
1139
+ d�µN
1140
+
1141
+
1142
+ N
1143
+
1144
+ i=1
1145
+ V (xi)
1146
+
1147
+ = ecN+5P ln N exp
1148
+
1149
+ −NPD2(�µN, µP ) + N
1150
+ ˆ
1151
+ (V + ln ρP ) d�µN −
1152
+ N
1153
+
1154
+ i=1
1155
+ V (xi)
1156
+
1157
+ where we used equation (28) in the last equality. Using again equation (17) we then see that the density
1158
+ dPV,P
1159
+ N
1160
+ dx (x1, . . . , xN) is bounded by
1161
+ ecN+5P ln N exp
1162
+
1163
+ −NPD2(�µN, µP ) + 2PN
1164
+ ¨
1165
+ ln |x − y|d(�µN − ˆµN)(x)dµP (y)
1166
+ � N
1167
+
1168
+ i=1
1169
+ ρP (xi) .
1170
+ Recalling (15),
1171
+ ˜
1172
+ ln |x − y|d(�µN − ˆµN)(x)dµP (y) = −
1173
+ ´
1174
+ U ρP d(�µN − ˆµN). As a consequence of the bound
1175
+ on the density
1176
+ dPV,P
1177
+ N
1178
+ dx (x1, . . . , xN) we established, we have for all r > 0
1179
+ PV,P
1180
+ N
1181
+
1182
+ D2(�µN, µP ) > r
1183
+
1184
+ ⩽ e−NP r+cN+5P ln N
1185
+ ˆ
1186
+ RN exp
1187
+
1188
+ −2PN
1189
+ ˆ
1190
+ U ρP d(�µN − ˆµN)
1191
+ � N
1192
+
1193
+ i=1
1194
+ ρP (xi)dxi . (32)
1195
+ Next, we show that −N ´ U ρP d(�µN − ˆµN) is bounded.
1196
+ By Lemma 2.3, U ρP is differentiable with bounded derivative H[ρP ] on R. As a consequence,
1197
+ ����N
1198
+ ˆ
1199
+ U ρP d(�µN − ˆµN)
1200
+ ���� ⩽
1201
+ N
1202
+
1203
+ i=1
1204
+ ˆ
1205
+ |U ρP (yi + u) − U ρP (xi)| dλN −5(u)
1206
+ ⩽ ∥H[ρP ]∥∞
1207
+ � N
1208
+
1209
+ i=1
1210
+ |yi − xi| + N
1211
+ ˆ
1212
+ udλN −5(u)
1213
+
1214
+ ⩽ ∥H[ρP ]∥∞
1215
+ � 1
1216
+ 2N + N −4/2
1217
+
1218
+ ,
1219
+ where we used (23) in the last inequality. Therefore, we deduce from (32)
1220
+ PV,P
1221
+ N
1222
+
1223
+ D2(�µN, µP ) > r
1224
+
1225
+ ⩽ e−NP r+cN+5P ln N+2P ∥H[ρP ]∥∞ = e−NP r+5P ln N+KN
1226
+ (33)
1227
+ with KN := cN + 2P∥H [ρP ] ∥∞. Since cN is bounded, so is KN.
1228
+ Finally, let f be a Lipschitz bounded function with ∥f∥Lip ⩽ 1, then, we have (as we did for U ρP )
1229
+ ����
1230
+ ˆ
1231
+ fdˆµN −
1232
+ ˆ
1233
+ fd�µN
1234
+ ���� ⩽ N −2 .
1235
+ Thus,
1236
+ d(ˆµN, µP ) ⩽ d(ˆµN, �µN) + d(�µN, µP ) ⩽ N −2 +
1237
+ 1
1238
+
1239
+ 2π D(�µN, µP ) ,
1240
+ and for any N such that r − N −2 ⩾ r/2 (in particular r − N −2 > 0) we get
1241
+ PV,P
1242
+ N
1243
+ (d(ˆµN, µP ) > r) ⩽ PV,P
1244
+ N
1245
+ � 1
1246
+ 2π2 D2(�µN, µP ) > (r − N −2)2
1247
+
1248
+ ⩽ PV,P
1249
+ N
1250
+ � 1
1251
+ 2π2 D2(�µN, µP ) > r2/4
1252
+
1253
+ ,
1254
+ and the last term is bounded by e−Nr2 P π2
1255
+ 2
1256
+ +5P ln N+K for some K large enough, which concludes the
1257
+ proof.
1258
+ 12
1259
+
1260
+ As a consequence of Theorem 1.5, we are able to control the quantities
1261
+ ζN(φ) :=
1262
+ ¨
1263
+ R2
1264
+ φ(x) − φ(y)
1265
+ x − y
1266
+ d(ˆµN − µP )(x)d(ˆµN − µP )(y)
1267
+ (34)
1268
+ for a certain class of test functions φ.
1269
+ Corollary 3.4. There exists C, K > 0 such that for all φ ∈ C2(R)∩H2(R) with bounded second derivative,
1270
+ we have for ε > 0 and N large enough,
1271
+ PV,P
1272
+ N
1273
+ �√
1274
+ N|ζN(φ)| ⩽ N −1/2+ε�
1275
+ ⩾ 1 − exp
1276
+
1277
+
1278
+ PN ε
1279
+ 2CN2(φ) + 5P ln N + K
1280
+
1281
+ with N2(φ) = ∥φ′∥L2(dx) + ∥φ′′∥L2(dx).
1282
+ Proof. We follow the proof given in [Gui19][Cor. 4.16] and adapt it to our setting. Let us denote by
1283
+
1284
+ ζN(φ) the quantity
1285
+ ¨
1286
+ R2
1287
+ φ(x) − φ(y)
1288
+ x − y
1289
+ d(�µN − µP )(x)d(�µN − µP )(y) .
1290
+ We have the almost sure inequality, by a Taylor estimate
1291
+ |ζN(φ) − �
1292
+ ζN(φ)| ⩽ 2N −2∥φ′′∥∞ .
1293
+ (35)
1294
+ Thus, for any δ > 0,
1295
+ PV,P
1296
+ N
1297
+ (|ζN(φ)| > δ) ⩽ PV,P
1298
+ N
1299
+
1300
+ |ζN(φ) − �
1301
+ ζN(φ)| > δ/2
1302
+
1303
+ + PV,P
1304
+ N
1305
+
1306
+ |�
1307
+ ζN(φ)| > δ/2
1308
+
1309
+ ⩽ PV,P
1310
+ N
1311
+
1312
+ 2N −2∥φ′′∥∞ > δ/2
1313
+
1314
+ + PV,P
1315
+ N
1316
+
1317
+ |�
1318
+ ζN(φ)| > δ/2
1319
+
1320
+ ,
1321
+ where the first term of the right-hand side is either 0 or 1. With δ = N −1+ε, ε > 0, it is zero for N large
1322
+ enough. For such a choice of δ, and for N large enough,
1323
+ PV,P
1324
+ N
1325
+
1326
+ |ζN(φ)| > N −1+ε�
1327
+ ⩽ PV,P
1328
+ N
1329
+
1330
+ |�
1331
+ ζN(φ)| > 1
1332
+ 2N −1+ε
1333
+
1334
+ .
1335
+ We next show that, for some C > 0 independent of φ, we have
1336
+ |�
1337
+ ζN(φ)| ⩽ CD2(�µN, µP )N2(φ) .
1338
+ (36)
1339
+ We begin by showing this inequality for ψ ∈ S(R). By using the inverse Fourier transform we have
1340
+ �ζN(ψ) = 1
1341
+
1342
+ ¨ ´
1343
+ dtF[ψ](t)e−itx −
1344
+ ´
1345
+ dtF[ψ](t)e−ity
1346
+ x − y
1347
+ d
1348
+
1349
+ �µN − µP
1350
+
1351
+ (x)d
1352
+
1353
+ �µN − µP
1354
+
1355
+ (y)
1356
+ = −1
1357
+
1358
+ ˆ
1359
+ dtitF[ψ](t)
1360
+ ¨
1361
+ e−ity e−it(x−y) − 1
1362
+ −it(x − y) d
1363
+
1364
+ �µN − µP
1365
+
1366
+ (x)d
1367
+
1368
+ �µN − µP
1369
+
1370
+ (y)
1371
+ = −1
1372
+
1373
+ ˆ
1374
+ dtitF[ψ](t)
1375
+ ¨
1376
+ e−ity
1377
+ ˆ 1
1378
+ 0
1379
+ dαe−iαt(x−y)d
1380
+
1381
+ �µN − µP
1382
+
1383
+ (x)d
1384
+
1385
+ �µN − µP
1386
+
1387
+ (y)
1388
+ = −1
1389
+
1390
+ ˆ
1391
+ dtitF[ψ](t)
1392
+ ˆ 1
1393
+ 0
1394
+
1395
+ ˆ
1396
+ e−iαtxd
1397
+
1398
+ �µN − µP
1399
+
1400
+ (x)
1401
+ ˆ
1402
+ e−i(1−α)tyd
1403
+
1404
+ �µN − µP
1405
+
1406
+ (y)
1407
+ 13
1408
+
1409
+ We then apply in order the triangular inequality, Cauchy-Schwarz inequality, a change of variable and
1410
+ the fact that |F [�µN − µP ]|2 is an even function.
1411
+ |�ζN(ψ)| ⩽ 1
1412
+
1413
+ ˆ
1414
+ R
1415
+ dt |tF[ψ](t)|
1416
+ ˆ 1
1417
+ 0
1418
+ dα |F [�µN − µP ] (αt)| .
1419
+ ��F [�µN − µP ]
1420
+
1421
+ (1 − α)t
1422
+ ���
1423
+ ⩽ 1
1424
+
1425
+ ˆ
1426
+ R
1427
+ dt |tF[ψ](t)|
1428
+ � ˆ 1
1429
+ 0
1430
+ dα |F [�µN − µP ] (αt)|2 � 1
1431
+ 2 � ˆ 1
1432
+ 0
1433
+
1434
+ ��F [�µN − µP ]
1435
+
1436
+ (1 − α)t
1437
+ ���2 � 1
1438
+ 2
1439
+ ⩽ 1
1440
+
1441
+ ˆ
1442
+ R
1443
+ dt |tF[ψ](t)|
1444
+ ˆ 1
1445
+ 0
1446
+ dα |F [�µN − µP ] (αt)|2
1447
+ ⩽ 1
1448
+
1449
+ ˆ +∞
1450
+ 0
1451
+ dt |tF[ψ](t)|
1452
+ ˆ 1
1453
+ 0
1454
+ tdα
1455
+ tα |F [�µN − µP ] (αt)|2 + 1
1456
+
1457
+ ˆ 0
1458
+ −∞
1459
+ dt |tF[φ](t)|
1460
+ ˆ 1
1461
+ 0
1462
+ −tdα
1463
+ −tα |F [�µN − µP ] (αt)|2
1464
+ ⩽ 1
1465
+
1466
+ ˆ
1467
+ R
1468
+ dt |tF[ψ](t)| D2(�µN, µP )
1469
+ ⩽ 1
1470
+
1471
+ � ˆ
1472
+ R
1473
+ dt |tF[ψ](t)|2 (1 + t2)
1474
+ � 1
1475
+ 2 � ˆ
1476
+ R
1477
+ dt
1478
+ 1 + t2
1479
+ � 1
1480
+ 2 D2(�µN, µP )
1481
+
1482
+ 1
1483
+ 2√π D2(�µN, µP )N2(ψ)
1484
+ By density of S(R) in L2(R), and since �ζN :
1485
+
1486
+ H2(R), N2
1487
+
1488
+ → R is continuous, the inequality still holds
1489
+ for φ. Thus, using equation (33),
1490
+ PV,P
1491
+ N
1492
+
1493
+ |�
1494
+ ζN(φ)| > 1
1495
+ 2N −1+ε
1496
+
1497
+ ⩽ PV,P
1498
+ N
1499
+
1500
+ D2(�µN, µP ) >
1501
+ N −1+ε
1502
+ 2CN2(φ)
1503
+
1504
+ ⩽ exp
1505
+
1506
+ −P
1507
+ N ε
1508
+ 2CN2(φ) + 5P ln N + K
1509
+
1510
+ ,
1511
+ which concludes the proof.
1512
+ 4
1513
+ Localization of the edge of a configuration
1514
+ In [Lam21][Theorem 1.8, Theorem 3.4], Lambert was able to control the edge (i.e the minimum and the
1515
+ maximum) of a typical configuration (x1, . . . , xN) distributed according to PV,P
1516
+ N , by showing that the
1517
+ random measure
1518
+ ΞN :=
1519
+ N
1520
+
1521
+ j=1
1522
+ δϕ−1
1523
+ N (xj)
1524
+ converges in distribution towards a Poisson point process for a function ϕN which takes the form
1525
+ ϕN(x) := EN + α−1
1526
+ N x .
1527
+ Before being more precise on the construction of (EN)N and (αN)N, we explain, following [Lam21], how
1528
+ one can use this convergence to localize the edge of a typical configuration (x1, . . . , xN). Let us assume for
1529
+ a moment that ΞN converges towards a Poisson point process with intensity θ(x) = e−x, with EN → +∞.
1530
+ In particular, the random variable
1531
+ ΞN(t, +∞)
1532
+ converges in distribution towards a Poisson random variable with mean
1533
+ ´ +∞
1534
+ t
1535
+ e−xdx. Combined with the
1536
+ equalities
1537
+ PV,P
1538
+ N
1539
+
1540
+ ΞN(t, +∞) = 0
1541
+
1542
+ = PV,P
1543
+ N
1544
+
1545
+ ∀ 1 ⩽ j ⩽ N, ϕ−1
1546
+ N (xj) = αN(xj − EN) ⩽ t
1547
+
1548
+ = PV,P
1549
+ N
1550
+
1551
+ αN
1552
+
1553
+ max
1554
+ 1⩽j⩽N xj − EN
1555
+
1556
+ ⩽ t
1557
+
1558
+ ,
1559
+ 14
1560
+
1561
+ we deduce that for all t ∈ R
1562
+ PV,P
1563
+ N
1564
+
1565
+ αN
1566
+
1567
+ max
1568
+ 1⩽j⩽N xj − EN
1569
+
1570
+ ⩽ t
1571
+
1572
+ −→
1573
+ N→∞ exp(−e−t) .
1574
+ Therefore, the random variable
1575
+ αN
1576
+
1577
+ max
1578
+ 1⩽j⩽N xj − EN
1579
+
1580
+ converges in distribution to the Gumbel law, showing that the maximum of a configuration is of order
1581
+ EN. Furthermore, as will be clear from the construction of αN and EN, αN is positive, and goes to
1582
+ infinity as N goes to infinity.
1583
+ Replacing in the previous analysis θ(x) = ex and EN → −∞, we would have deduced in the same
1584
+ fashion that
1585
+ αN
1586
+
1587
+ min
1588
+ 1⩽j⩽N xj − EN
1589
+
1590
+ converges in law.
1591
+ With the above notations, we can apply [Lam21][Theorem 3.4] to our context.
1592
+ Theorem 4.1. Let v = ±. There exists (Ev
1593
+ N)N, (αv
1594
+ N)N sequences of real numbers with |Ev
1595
+ N| → +∞,
1596
+ αv
1597
+ N > 0 for large enough N, satisfying V ′(Ev
1598
+ N) = αv
1599
+ Nv, such that:
1600
+ a) Ne−V (Ev
1601
+ N)+2P ln |Ev
1602
+ N|+λP
1603
+ V
1604
+ αv
1605
+ N
1606
+ −→
1607
+ N→∞ 1 (recall λV
1608
+ P is defined through equation (5)),
1609
+ b)
1610
+ ln(αv
1611
+ N)
1612
+ N
1613
+ −→
1614
+ N→∞ 0 and αv
1615
+ N|Ev
1616
+ N| −→
1617
+ N→∞ +∞ ,
1618
+ c) For all compact K ⊂ R,
1619
+ (αv
1620
+ N)−2 sup
1621
+ x∈K
1622
+ |V ′′(ϕN(x))| −→
1623
+ N→∞ 0 .
1624
+ As a consequence, the random measure ΞN converges in distribution as N → ∞ to a Poisson point process
1625
+ with intensity θ(x) = e−vx.
1626
+ Proof. We prove it in the case v = +, the case where v = − being similar. We show that there exists a
1627
+ sequence (E+
1628
+ N)N going to +∞ satisfying f(E+
1629
+ N) = − ln N, where we defined the function f by
1630
+ f(x) = −V (x) + 2P ln |x| + λV
1631
+ P − ln |V ′(x)| .
1632
+ (we will then have α+
1633
+ N = V ′(E+
1634
+ N) > 0. In the case v = −1 we would have looked for a sequence E−
1635
+ N going
1636
+ to −∞ and α−
1637
+ N = −V ′(E−
1638
+ N))
1639
+ As a consequence of Assumptions 1.1,ii), one shows that ln |V ′| is negligible with respect to V at infinity.
1640
+ Therefore, because ln |x|
1641
+ V (x)
1642
+ −→
1643
+ |x|→∞ 0,
1644
+ f(x) = −V (x) + o(V (x))
1645
+ at infinity (in particular, f(x)
1646
+ −→
1647
+ x→+∞ −∞). We deduce that for 0 < ε < 1 fixed, there exists A > 0 such
1648
+ that for all x > A,
1649
+ −(1 + ε)V (x) < f(x) < −(1 − ε)V (x) ,
1650
+ (37)
1651
+ and because f(x)
1652
+ −→
1653
+ x→+∞ −∞ there exists (E+
1654
+ N)N going to infinity such that for all N ⩾ 1, f(E+
1655
+ N) = − ln N.
1656
+ Setting x = E+
1657
+ N in (37), we obtain that −V (E+
1658
+ N) ∼ f(E+
1659
+ N) = − ln N. By convexity of V and the fact that
1660
+ it goes to infinity at infinity, V is increasing on some [M, +∞[, where M ⩾ 0. Thus −(1±ε)V (x) = − ln N
1661
+ 15
1662
+
1663
+ iff x = V −1
1664
+ � ln N
1665
+ 1 ± ε
1666
+
1667
+ , where V −1 denotes
1668
+
1669
+ V|[M,+∞[
1670
+ �−1. We conclude by (37) that such an E+
1671
+ N must
1672
+ satisfy
1673
+ V −1
1674
+ � ln N
1675
+ 1 + ε
1676
+
1677
+ ⩽ E+
1678
+ N ⩽ V −1
1679
+ � ln N
1680
+ 1 − ε
1681
+
1682
+ .
1683
+ (38)
1684
+ By convexity of V and the fact that it goes to infinity at infinity, (α+
1685
+ N)N is non-decreasing and goes to
1686
+ infinity. It is thus positive for N large enough, ensuring that αN|E+
1687
+ N| −→
1688
+ N→∞ +∞. Property c) of the
1689
+ theorem follows from Assumptions 1.1, point ii). It remains to show that ln(α+
1690
+ N)
1691
+ N
1692
+ = ln |V ′(E+
1693
+ N)|
1694
+ N
1695
+ −→
1696
+ N→∞ 0.
1697
+ By construction, we have
1698
+ ln |V ′(E+
1699
+ N)|
1700
+ N
1701
+ =
1702
+ ln
1703
+
1704
+ Ne−V (E+
1705
+ N)+2P ln N+λP
1706
+
1707
+ N
1708
+ = −V (E+
1709
+ N)
1710
+ N
1711
+ + o(1) .
1712
+ Using that V (E+
1713
+ N) ∼ ln N, we can conclude that ln |V ′(E+
1714
+ N)| = o(N) which concludes the proof.
1715
+ By the discussion preceding Theorem 4.1, we deduce
1716
+ Corollary 4.2 (Edge of a configuration). Let E±
1717
+ N, α±
1718
+ N := |V ′(E±
1719
+ N)| be the sequences of Theorem 4.1
1720
+ associated with v = ±1. Then, both random variables
1721
+ α+
1722
+ N
1723
+
1724
+ max
1725
+ 1⩽j⩽N xj − E+
1726
+ N
1727
+
1728
+ and
1729
+ α−
1730
+ N
1731
+
1732
+ min
1733
+ 1⩽j⩽N xj − E−
1734
+ N
1735
+
1736
+ converge to a Gumbel law, whose distribution function is given for t ⩾ 0 by G([0, t]) = exp(e−t). Further-
1737
+ more, V (E±
1738
+ N) ∼ ln N and α±
1739
+ N −→
1740
+ N→∞ ±∞.
1741
+ Remark 4.3. Note that[Lam21][Theorem 3.4] applies for V of class C2 outside of a compact set, allowing
1742
+ to take V (x) = |x|a for a ⩾ 1. Furthermore, if V (x) = |x|a + R(x) for a ⩾ 1, R ∈ C2(R) and convex
1743
+ and where R(x), R′(x) and R′′(x) are negligible respectively with respect to xa, xa−1 and xa−2, we find
1744
+
1745
+ N ∼ ±(ln N)1/a.
1746
+ If V (x) = cosh(x), we find E+
1747
+ N ∼ −E−
1748
+ N ∼ arg cosh(ln N) ∼ ln ln N.
1749
+ The next lemma will be convenient in the proof of Theorem 5.2 when dealing with error terms.
1750
+ Lemma 4.4. With the notations of Corollary 4.2, we have
1751
+ µP ([E−
1752
+ N, E+
1753
+ N]c) = o(N −1/2) .
1754
+ Proof. Let 0 < δ < 1, to be specified later. We have
1755
+ ˆ +∞
1756
+ E+
1757
+ N
1758
+ ρP dx =
1759
+ ˆ +∞
1760
+ E+
1761
+ N
1762
+ (ρP )δ(ρP )1−δdx ⩽
1763
+ ˆ
1764
+ R
1765
+ (ρP )δdx
1766
+ sup
1767
+ [E+
1768
+ N,+∞[
1769
+ (ρP )1−δ .
1770
+ By the first inequality of Lemma 2.2, the integral is finite. Also from the same inequality, we have for
1771
+ some constant C′ and x big enough ρP (x) ⩽ C′e− 3
1772
+ 4 V (x). Because V is increasing in a neighborhood of
1773
+ +∞, we get for N large enough
1774
+ sup
1775
+ [E+
1776
+ N,+∞[
1777
+ (ρP )1−δ ⩽ C′1−δe−(1−δ) 3
1778
+ 4 V (E+
1779
+ N) .
1780
+ 16
1781
+
1782
+ Taking δ > 0 such that 1
1783
+ 2 − (1 − δ) 3
1784
+ 4 =: −γ < 0 and using that V (E+
1785
+ N) = ln N + o(ln N) (established in
1786
+ the proof of Theorem 4.1),
1787
+
1788
+ N
1789
+ ˆ +∞
1790
+ E+
1791
+ N
1792
+ ρP dx ⩽ Ke−γ ln N+(1−δ) 3
1793
+ 4 o(ln N) ,
1794
+ and the right-hand side goes to zero as N goes to infinity. We deal with the integral
1795
+ ´ E−
1796
+ N
1797
+ −∞ ρP dx in the
1798
+ same way.
1799
+ Remark 4.5. We could improve the proof to show that µP ([E−
1800
+ N, E+
1801
+ N]c) ∼ 1
1802
+ N but showing that it is o(N
1803
+ 1
1804
+ 2 )
1805
+ is sufficient for what we need and requires less carefulness.
1806
+ 5
1807
+ Laplace transform for smooth test functions, proof of Theo-
1808
+ rem 1.3
1809
+ Section 3 allows us to justify in Proposition 5.1 the heuristics we gave in equation (6) for φ having
1810
+ compact support. We will then extend in Theorem 5.2 this result to a more general set of functions, by
1811
+ an approximation by compactly supported functions, using Corollary 4.2.
1812
+ Proposition 5.1. For φ ∈ C1(R, R) with compact support, we have for any real t, as N goes to infinity,
1813
+ EV,P
1814
+ N
1815
+
1816
+ et
1817
+
1818
+ NνN (Ξφ)�
1819
+ → exp
1820
+ �t2
1821
+ 2 qP (φ)
1822
+
1823
+ ,
1824
+ (39)
1825
+ where Ξφ is given by equation (7), and qP (φ) is given by
1826
+ qP (φ) :=
1827
+ ˆ
1828
+ R
1829
+
1830
+ φ′(x)2 + V ′′(x)φ(x)2
1831
+
1832
+ dµP (x) + P
1833
+ ¨
1834
+ R2
1835
+ �φ(x) − φ(y)
1836
+ x − y
1837
+ �2
1838
+ dµP (x)dµP (y) .
1839
+ (40)
1840
+ Proof. Let φ ∈ C1
1841
+ c(R, R), and let t ∈ R. We perform in equation (4) the change of variables
1842
+ xi = yi +
1843
+ t
1844
+
1845
+ N φ(yi), 1 ⩽ i ⩽ N, which is a diffeomorphism for N big enough. We thus have
1846
+ ZV,P
1847
+ N
1848
+ =
1849
+ ˆ
1850
+
1851
+ 1⩽i<j⩽N
1852
+ ����yi − yj +
1853
+ t
1854
+
1855
+ N
1856
+
1857
+ φ(yi) − φ(yj)
1858
+ �����
1859
+ 2P/N
1860
+ .e−�N
1861
+ i=1 V �
1862
+ yi+
1863
+ t
1864
+
1865
+ N φ(yi)�
1866
+ .
1867
+ N
1868
+
1869
+ i=1
1870
+
1871
+ 1 +
1872
+ t
1873
+
1874
+ N
1875
+ φ′(yi)
1876
+
1877
+ dNy,
1878
+ (41)
1879
+ and we develop separately the different terms of this integral. The first term can be written as:
1880
+
1881
+ i<j
1882
+ |yi − yj|2P/N �
1883
+ i<j
1884
+ ����1 +
1885
+ t
1886
+
1887
+ N
1888
+ φ(yi) − φ(yj)
1889
+ yi − yj
1890
+ ����
1891
+ 2P/N
1892
+ ,
1893
+ The second product above, setting ∆φi,j := φ(yi)−φ(yj)
1894
+ yi−yj
1895
+ and using Taylor-Lagrange theorem, equals
1896
+ exp
1897
+ �2P
1898
+ N
1899
+
1900
+ i<j
1901
+ ln
1902
+ ����1 +
1903
+ t
1904
+
1905
+ N
1906
+ φ(yi) − φ(yj)
1907
+ yi − yj
1908
+ ����
1909
+
1910
+ = exp
1911
+ �2P
1912
+ N
1913
+
1914
+ i<j
1915
+
1916
+ t
1917
+
1918
+ N
1919
+ ∆φi,j − t2
1920
+ 2N (∆φi,j)2 + RN,1(i, j)
1921
+ � �
1922
+ ,
1923
+ where we noticed that 1 +
1924
+ t
1925
+
1926
+ N ∆φi,j ⩾ 1 −
1927
+ t
1928
+
1929
+ N ∥φ′∥∞ > 0 if N is big enough, and where
1930
+ |RN,1(i, j)| ⩽
1931
+ |t|3
1932
+ 3N 3/2 ∥φ′∥3
1933
+ ∞.
1934
+ 17
1935
+
1936
+ Again by Taylor-Lagrange theorem, the second term in (41) equals
1937
+ exp
1938
+
1939
+
1940
+ N
1941
+
1942
+ i=1
1943
+
1944
+ V (yi) +
1945
+ t
1946
+
1947
+ N
1948
+ V ′(yi)φ(yi) + t2
1949
+ 2N V ′′(yi)φ(yi)2 + RN,2(i)
1950
+ � �
1951
+ where RN,2(i) =
1952
+ t3
1953
+ 6N 3/2 V (3) �
1954
+ yi + tθi
1955
+
1956
+ N φ(yi)
1957
+
1958
+ φ(yi)3 for some θi ∈ [0, 1], thus for N large enough
1959
+ |RN,2(i)| ⩽
1960
+ |t|3
1961
+ 6N 3/2 ∥φ∥3
1962
+
1963
+ sup
1964
+ d(x,supp φ)⩽1
1965
+ |V (3)(x)|.
1966
+ The last term reads
1967
+ N
1968
+
1969
+ i=1
1970
+
1971
+ 1 +
1972
+ t
1973
+
1974
+ N
1975
+ φ′(yi)
1976
+
1977
+ = exp
1978
+ � N
1979
+
1980
+ i=1
1981
+
1982
+ t
1983
+
1984
+ N
1985
+ φ′(yi) − t2
1986
+ 2N φ′(yi)2 + RN,3(i)
1987
+ � �
1988
+ ,
1989
+ with |RN,3(i)| ⩽
1990
+ t3
1991
+ 3N 3/2 ∥φ′∥3
1992
+ ∞. Dividing both sides of equation (41) by ZV,P
1993
+ N
1994
+ we get
1995
+ EV,P
1996
+ N
1997
+
1998
+ exp
1999
+
2000
+ t
2001
+
2002
+ N
2003
+
2004
+ P
2005
+ ¨
2006
+ R2
2007
+ φ(x) − φ(y)
2008
+ x − y
2009
+ dˆµN(x)dˆµN(y) +
2010
+ ˆ
2011
+ R
2012
+ (φ′ − V ′φ)dˆµN
2013
+ ��
2014
+ × exp {KN(t, φ)}
2015
+ × exp
2016
+
2017
+ t2
2018
+ 2
2019
+
2020
+ −P
2021
+ ¨
2022
+ R2
2023
+ �φ(x) − φ(y)
2024
+ x − y
2025
+ �2
2026
+ dˆµN(x)dˆµN(y) −
2027
+ ˆ
2028
+ R
2029
+ (V ′′φ2 + φ′2)dˆµN
2030
+ �� �
2031
+ = 1,
2032
+ with |KN(t, φ)| ⩽ c(t,φ)
2033
+
2034
+ N
2035
+ where c(t, φ) ⩾ 0 is independent of N. This bound shows that taking the limit
2036
+ N → ∞ we can get rid of KN:
2037
+ lim
2038
+ N→∞ EV,P
2039
+ N
2040
+
2041
+ exp
2042
+
2043
+ t
2044
+
2045
+ N
2046
+
2047
+ P
2048
+ ¨
2049
+ R2
2050
+ φ(x) − φ(y)
2051
+ x − y
2052
+ dˆµN(x)dˆµN(y) +
2053
+ ˆ
2054
+ R
2055
+ (φ′ − V ′φ)dˆµN
2056
+ ��
2057
+ × exp
2058
+
2059
+ t2
2060
+ 2
2061
+
2062
+ −P
2063
+ ¨
2064
+ R2
2065
+ �φ(x) − φ(y)
2066
+ x − y
2067
+ �2
2068
+ dˆµN(x)dˆµN(y) −
2069
+ ˆ
2070
+ R
2071
+ (V ′′φ2 + φ′2)dˆµN
2072
+ �� �
2073
+ = 1.
2074
+ Using Fubini’s theorem (the function (x, y) �→ φ(x)−φ(y)
2075
+ x−y
2076
+ being bounded continuous on R2), the first line
2077
+ in the expectation value can be rewritten as et
2078
+
2079
+ NΛN with
2080
+ ΛN := 2P
2081
+ ¨
2082
+ R2
2083
+ φ(x) − φ(y)
2084
+ x − y
2085
+ dµP (x)d(ˆµN − µP )(y) +
2086
+ ˆ
2087
+ R
2088
+ (φ′ − V ′φ)d(ˆµN − µP ) + PζN(φ)
2089
+ (42)
2090
+ where we used equation (5) and ζN(φ) is given by (34). Let F : P(R) → R be defined by
2091
+ F(µ) = −P
2092
+ ¨
2093
+ R2
2094
+ �φ(x) − φ(y)
2095
+ x − y
2096
+ �2
2097
+ dµ(x)dµ(y) −
2098
+ ˆ
2099
+ R
2100
+ (V ′′φ2 + φ′2)dµ .
2101
+ (43)
2102
+ It is continuous for the topology of weak convergence since all the functions in the integrals are bounded
2103
+ continuous. So far we have established that
2104
+ lim
2105
+ N→∞ EV,P
2106
+ N
2107
+
2108
+ et
2109
+
2110
+ NΛN+ t2
2111
+ 2 F (ˆµN )�
2112
+ = 1,
2113
+ with ΛN given by (42). We now replace in the latter equation the term F(ˆµN) by its limiting expression,
2114
+ F(µP ). Fix a metric that is compatible with the weak convergence of probability measures on R. For
2115
+ example,
2116
+ dLip(µ, ν) = sup
2117
+ ����
2118
+ ˆ
2119
+ fdµ −
2120
+ ˆ
2121
+ fdν
2122
+ ���� ,
2123
+ (44)
2124
+ 18
2125
+
2126
+ where the supremum runs over f : R → R bounded and Lipschitz with ∥f∥∞ ⩽ 1 and Lipschitz constant
2127
+ |f|Lip ⩽ 1. By the large deviations principle for (ˆµN)N under the probability (3) established by [GZ19,
2128
+ Theorem 1.1], for all δ > 0 the event {dLip(ˆµN, µP ) > δ} has (for N big enough) probability smaller than
2129
+ e−Ncδ where cδ > 0. Hence,
2130
+ lim
2131
+ N→∞ EV,P
2132
+ N
2133
+
2134
+ et
2135
+
2136
+ NΛN + t2
2137
+ 2 F (ˆµN)�
2138
+ = lim
2139
+ N→∞ EV,P
2140
+ N
2141
+
2142
+ 1{dLip(ˆµN ,µP )⩽δ}et
2143
+
2144
+ NΛN + t2
2145
+ 2 F (ˆµN)�
2146
+ .
2147
+ By continuity of F there is some ε(δ) which goes to 0 as δ → 0 such that, for dLip(ν, µP ) ⩽ δ, we have
2148
+ |F(ν) − F(µP )| ⩽ ε(δ). Taking the (decreasing) limit as δ goes to zero we deduce
2149
+ lim
2150
+ N→∞ EV,P
2151
+ N
2152
+
2153
+ et
2154
+
2155
+ NΛN + t2
2156
+ 2 F (ˆµN )�
2157
+ = lim
2158
+ δ→0 lim
2159
+ N→∞ EV,P
2160
+ N
2161
+
2162
+ 1{dLip(ˆµN ,µP )⩽δ}et
2163
+
2164
+ NΛN �
2165
+ e
2166
+ t2
2167
+ 2 F (µP ).
2168
+ But the same large deviations argument shows that
2169
+ lim
2170
+ δ→0 lim
2171
+ N→∞ EV,P
2172
+ N
2173
+
2174
+ 1{dLip(ˆµN ,µP )⩽δ}et
2175
+
2176
+ NΛN �
2177
+ = lim
2178
+ N→∞ EV,P
2179
+ N
2180
+
2181
+ et
2182
+
2183
+ NΛN �
2184
+ .
2185
+ Thus, we have shown that
2186
+ lim
2187
+ N→∞ EV,P
2188
+ N
2189
+
2190
+ et
2191
+
2192
+ N�
2193
+ 2P
2194
+ ˜
2195
+ R2
2196
+ φ(x)−φ(y)
2197
+ x−y
2198
+ dµP (x)d(ˆµN−µP )(y)+
2199
+ ´
2200
+ R(φ′−V ′φ)d(ˆµN−µP )+P ζN (φ)��
2201
+ = e− t2
2202
+ 2 F (µP ) ,
2203
+ (45)
2204
+ Which establishes that
2205
+
2206
+ NΛN =
2207
+
2208
+ N
2209
+
2210
+ νN(Ξφ) + PζN(φ)
2211
+
2212
+ converges in law towards a centered Gaussian
2213
+ random variable with announced variance. We finally get rid of the remaining term ζN(φ), using Corollary
2214
+ 3.4: taking ε = 1/4 for example, we see in particular that
2215
+
2216
+ NζN(φ) converges in probability towards
2217
+ zero. The conclusion follows from Slutsky’s lemma.
2218
+ We now extend the result of Proposition 5.1 to a more general set of functions. With the notations
2219
+ of Proposition 5.1, we have
2220
+ Theorem 5.2. Let φ ∈ H2(R) ∩ C2(R) such that φ′′ is bounded. Additionally, suppose that V (3)φ2,
2221
+ V ′′φφ′, V ′′φ2 and V ′φ are bounded. Then, recalling (40) we have the convergence in distribution as N
2222
+ goes to infinity
2223
+
2224
+ NνN(Ξφ) → N(0, qP (φ)) .
2225
+ Proof. For N ⩾ 1, let E−
2226
+ N, E+
2227
+ N be given by Corollary 4.2. Let χN : R → [0, 1] be C2 with compact support
2228
+ such that
2229
+ χN(x) = 1 for x ∈ [E−
2230
+ N − 1, E+
2231
+ N + 1] and χN(x) = 0 for x ∈ [E−
2232
+ N − 2, E+
2233
+ N + 2]c
2234
+ and such that, denoting φN = φχN, supN ∥φ′
2235
+ N∥∞ + ∥φ′
2236
+ N∥L2(R), supN ∥φ′′
2237
+ N∥∞ + ∥φ′′
2238
+ N∥L2(R) < +∞ (we
2239
+ assumed φ ∈ H2(R), in particular φ′ is bounded and such a χN exists). The point of cutting φ outside
2240
+ the set [E−
2241
+ N −1, E+
2242
+ N +1] is that with high probability, the empirical measure ˆµN doesn’t see the difference
2243
+ between φ and φN.
2244
+ The support of φN is then contained in [E−
2245
+ N −2, E+
2246
+ N+2], and we now argue that the proof of Proposition
2247
+ 5.1 can be adapted so that
2248
+
2249
+ NνN(ΞφN) → N(0, qP (φ)) .
2250
+ (46)
2251
+ Similarly as in Proposition 5.1, we perform in ZV,P
2252
+ N
2253
+ the change of variables xi = yi +
2254
+ t
2255
+
2256
+ N φN(yi),
2257
+ 1 ⩽ i ⩽ N, which is the same as before, but with φ replaced by φN. First, with IN := [E−
2258
+ N − 2, E+
2259
+ N + 2],
2260
+ the error term
2261
+ KN(t, φN) ⩽ 2
2262
+ t3
2263
+ 3N 1/2 ∥φ′
2264
+ N∥3
2265
+ ∞ +
2266
+ t3
2267
+ 6N 1/2 ∥φN∥∞
2268
+ sup
2269
+ d(x,IN)⩽1
2270
+ |V (3)(x)|
2271
+ 19
2272
+
2273
+ of the proof of Proposition 5.1 is still going to zero, because of our choice of χN and Assumption 1.2. As
2274
+ previously, we then have
2275
+ lim
2276
+ N→∞ EV,P
2277
+ N
2278
+
2279
+ et
2280
+
2281
+ NΛN (φN)+ t2
2282
+ 2 FN(ˆµN )�
2283
+ = 1
2284
+ (47)
2285
+ with
2286
+ ΛN(φN) := 2P
2287
+ ¨
2288
+ R2
2289
+ φN(x) − φN(y)
2290
+ x − y
2291
+ dµP (x)d(ˆµN − µP )(y) +
2292
+ ˆ
2293
+ R
2294
+ (φ′
2295
+ N − V ′φN)d(ˆµN − µP ) + PζN(φN) ,
2296
+ where ζN is given by (34), and
2297
+ FN(ˆµN) = −P
2298
+ ¨
2299
+ R2
2300
+ �φN(x) − φN(y)
2301
+ x − y
2302
+ �2
2303
+ dˆµN(x)dˆµN(y) −
2304
+ ˆ
2305
+ R
2306
+ (V ′′φ2
2307
+ N + φ′2
2308
+ N)dˆµN .
2309
+ Taking again the distance dLip defined in (44), one can check that for µ, ν probability measures over R,
2310
+ |FN(µ) − FN(ν)| ⩽ CNdLip(µ, ν) ,
2311
+ where CN is a term depending on the norms ∥φ′
2312
+ N∥∞, ∥φ′′
2313
+ N∥∞, ∥V ′′φ2
2314
+ N∥∞ and ∥(V ′′φ2
2315
+ N)′∥∞. The choice
2316
+ of χN and the fact that φ is chosen so that V (3)φ2 and V ′′φφ′ are bounded guarantee that ∥(V ′′φ2
2317
+ N)′∥∞
2318
+ is bounded in N. The other norms are easily bounded by hypothesis. Therefore CN can be seen to be
2319
+ uniformly bounded in N, and we find some C ⩾ 0 independent of N such that
2320
+ |FN(µ) − FN(ν)| ⩽ CdLip(µ, ν) .
2321
+ As in proposition 5.1, we use the large deviation principle for (ˆµN) to deduce
2322
+ lim
2323
+ N→+∞ EV,P
2324
+ N
2325
+
2326
+ et
2327
+
2328
+ NΛN (φN)+ t2
2329
+ 2 FN(ˆµN )�
2330
+ =
2331
+ lim
2332
+ N→+∞ EV,P
2333
+ N
2334
+
2335
+ et
2336
+
2337
+ NΛN (φN)�
2338
+ e
2339
+ t2
2340
+ 2 FN (µP ) .
2341
+ By dominated convergence, FN(µP ) converges to F(µP ), the function F being given by (43). This shows
2342
+ the convergence as N goes to infinity
2343
+ lim
2344
+ N→+∞ EV,P
2345
+ N
2346
+
2347
+ et
2348
+
2349
+ NΛN (φN)�
2350
+ = e− t2
2351
+ 2 F (µP ) ,
2352
+ and
2353
+
2354
+ N
2355
+
2356
+ νN(ΞφN)+PζN(φN)
2357
+
2358
+ converges towards a centered Gaussian variable with variance −F(µP ) =
2359
+ qP (φ). Because supN ∥φ′
2360
+ N∥L2(dx) + ∥φ′′
2361
+ N∥L2(dx) is finite, we can apply again Corollary 3.4 to deduce the
2362
+ convergence in law (46).
2363
+ We now have the ingredients to conclude, by showing that the characteristic function
2364
+ EV,P
2365
+ N
2366
+
2367
+ eit
2368
+
2369
+ NνN (Ξφ)�
2370
+ = EV,P
2371
+ N
2372
+
2373
+ eit
2374
+
2375
+ N
2376
+ ´
2377
+ ΞφdˆµN�
2378
+ e−it
2379
+
2380
+ N
2381
+ ´
2382
+ ΞφdµP
2383
+ converges to the characteristic of a Gaussian variable with appropriate variance. By Corollary 4.2, the
2384
+ probability under PV,P
2385
+ N
2386
+ of the event EN =
2387
+
2388
+ x1, . . . , xN ∈ [E−
2389
+ N − 1, E+
2390
+ N + 1]
2391
+
2392
+ converges to 1. Along with
2393
+ the convergence (46), we deduce
2394
+ e− t2
2395
+ 2 qP (φ) = lim
2396
+ N EV,P
2397
+ N
2398
+
2399
+ eit
2400
+
2401
+ N
2402
+ ´
2403
+ ΞφNdˆµN �
2404
+ e−it
2405
+
2406
+ N
2407
+ ´
2408
+ ΞφNdµP = lim
2409
+ N EV,P
2410
+ N
2411
+
2412
+ 1ENeit
2413
+
2414
+ N
2415
+ ´
2416
+ ΞφNdˆµN�
2417
+ e−it
2418
+
2419
+ N
2420
+ ´
2421
+ ΞφNdµP ,
2422
+ Where we used
2423
+ ���EV,P
2424
+ N
2425
+
2426
+ 1Ec
2427
+ Neit
2428
+
2429
+ N
2430
+ ´
2431
+ ΞφNdˆµN �
2432
+ e−it
2433
+
2434
+ N
2435
+ ´
2436
+ ΞφNdµP
2437
+ ��� ⩽ PV,P
2438
+ N (Ec
2439
+ N) −−−−−→
2440
+ N→+∞ 0 .
2441
+ 20
2442
+
2443
+ Using that φN = φ on JN = [E−
2444
+ N − 1, E+
2445
+ N + 1],
2446
+ ˆ
2447
+ ΞφNdµP = 2P
2448
+ ¨ φN(x) − φN(y)
2449
+ x − y
2450
+ dµP (x)dµP (y) +
2451
+ ˆ
2452
+ (φ′
2453
+ N − V ′φN)dµP
2454
+ = 2P
2455
+ ¨
2456
+ J2
2457
+ N
2458
+ φ(x) − φ(y)
2459
+ x − y
2460
+ dµP (x)dµP (y) + 2P
2461
+ ¨
2462
+ (J2
2463
+ N)c
2464
+ φN(x) − φN(y)
2465
+ x − y
2466
+ dµP (x)dµP (y)
2467
+ +
2468
+ ˆ
2469
+ JN
2470
+ (φ′ − V ′φ)dµP +
2471
+ ˆ
2472
+ Jc
2473
+ N
2474
+ (φχ′
2475
+ N + φ′χN − V ′φχN)dµP .
2476
+ By boundedness of (∥φ′
2477
+ N∥∞)N, the second term is bounded by
2478
+ CP
2479
+ ¨
2480
+ (J2
2481
+ N)c dµP dµP ⩽ 2CP µP (Jc
2482
+ N) = o(N −1/2) ,
2483
+ where we used the union bound and Lemma 4.4. By the same estimate and the fact that χN can be
2484
+ chosen so that (∥χ′
2485
+ N∥∞)N is bounded, and because φ′, V ′φ are bounded, the last term is also o(N −1/2).
2486
+ By the previous arguments, we also conclude that
2487
+ 2P
2488
+ ¨
2489
+ (J2
2490
+ N)c
2491
+ φ(x) − φ(y)
2492
+ x − y
2493
+ dµP (x)dµP (y) +
2494
+ ˆ
2495
+ Jc
2496
+ N
2497
+ (φ′ − V ′φ)dµP = o(N −1/2) ,
2498
+ thus
2499
+ ˆ
2500
+ ΞφNdµP =
2501
+ ˆ
2502
+ ΞφdµP + o(N −1/2) ,
2503
+ and so far we have
2504
+ e− t2
2505
+ 2 qP (φ) = lim
2506
+ N EV,P
2507
+ N
2508
+
2509
+ 1ENeit
2510
+
2511
+ N
2512
+ ´
2513
+ ΞφNdˆµN�
2514
+ e−it
2515
+
2516
+ N
2517
+ ´
2518
+ ΞφdµP .
2519
+ Finally, on EN, using φN = φ and that ˆµN is supported in JN,
2520
+ ˆ
2521
+ ΞφNdˆµN = 2P
2522
+ ¨
2523
+ J2
2524
+ N
2525
+ φ(x) − φ(y)
2526
+ x − y
2527
+ dµP (x)dˆµN(y) + 2P
2528
+ ¨
2529
+ (J2
2530
+ N)c
2531
+ φN(x) − φN(y)
2532
+ x − y
2533
+ dµP (x)dˆµN(y) +
2534
+ ˆ
2535
+ JN
2536
+ (φ′ − V ′φ)dˆµN
2537
+ = 2P
2538
+ ¨ φ(x) − φ(y)
2539
+ x − y
2540
+ dµP (x)dˆµN(y) +
2541
+ ˆ
2542
+ (φ′ − V ′φ)dˆµN + o(N −1/2) ,
2543
+ Where in the second line we used, using Lemma 4.4 again, that
2544
+ ¨
2545
+ (J2
2546
+ N)c
2547
+ φN(x) − φN(y)
2548
+ x − y
2549
+ dµP (x)dˆµN(y) =
2550
+ ¨
2551
+ JN×Jc
2552
+ N
2553
+ φN(x) − φN(y)
2554
+ x − y
2555
+ dµP (x)dˆµN(y) = o(N −1/2) ,
2556
+ and the same estimate holds for φN replaced by φ. Therefore,
2557
+ e− t2
2558
+ 2 qP (φ) = lim
2559
+ N EV,P
2560
+ N
2561
+
2562
+ 1ENeit
2563
+
2564
+ N
2565
+ ´
2566
+ ΞφdˆµN�
2567
+ e−it
2568
+
2569
+ N
2570
+ ´
2571
+ ΞφdµP .
2572
+ This establishes that
2573
+ lim
2574
+ N EV,P
2575
+ N
2576
+
2577
+ eit
2578
+
2579
+ N
2580
+ ´
2581
+ ΞφdˆνN�
2582
+ = e− t2
2583
+ 2 qP (φ) ,
2584
+ which concludes the proof.
2585
+ Remark 5.3. Taking φ such that φ′ satisfies the conditions of Theorem 5.2, we then have
2586
+ (48)
2587
+ EV,P
2588
+ N
2589
+
2590
+ et
2591
+
2592
+ NνN (Lφ)�
2593
+ −→
2594
+ N→∞ exp
2595
+ �t2
2596
+ 2 qP (φ′)
2597
+
2598
+ ,
2599
+ 21
2600
+
2601
+ where the operator L is defined as Lφ := Ξφ′, ie
2602
+ Lφ = 2P
2603
+ ˆ
2604
+ R
2605
+ φ′(x) − φ′(y)
2606
+ x − y
2607
+ dµP (y) + φ′′(x) − V ′(x)φ′(x) .
2608
+ (49)
2609
+ Note that qV
2610
+ P (φ′) =
2611
+
2612
+ σV
2613
+ P
2614
+ �2(Lφ) where σV
2615
+ P is defined in (11). By Theorem 7.1, the class of functions in
2616
+ L−1(T ) where
2617
+ T :=
2618
+
2619
+ f ∈ C1(R), f = O(1/x), f ′ = O(1/x2),
2620
+ ˆ
2621
+ R
2622
+ fρP = 0
2623
+
2624
+ satisfies (48). This proves Theorem 1.3.
2625
+ 6
2626
+ Inversion of L
2627
+ This section is dedicated to the definition of L given by (8) and its domain and then we focus on its
2628
+ inversion. We rely heavily on results of Appendix A: the diagonalization of the operator A by the use of
2629
+ the theory of Schrödinger operators.
2630
+ Let P > 0 be fixed. We introduce the operators A and W, acting on sufficiently smooth functions of
2631
+ L2(ρP ), by
2632
+ Aφ = −
2633
+
2634
+ φ′ρP
2635
+ �′
2636
+ ρP
2637
+ = −
2638
+
2639
+ φ′′ + ρ′
2640
+ P
2641
+ ρP
2642
+ φ′
2643
+
2644
+ and
2645
+ Wφ = −H
2646
+
2647
+ φ′ρP
2648
+
2649
+ .
2650
+ (50)
2651
+ We first show the following decomposition of L.
2652
+ Lemma 6.1. For φ twice differentiable we have the following pointwise identity
2653
+ −Lφ = Aφ + 2PWφ .
2654
+ (51)
2655
+ Proof. We write for x ∈ R
2656
+ 2P
2657
+ ˆ
2658
+ R
2659
+ φ′(x) − φ′(y)
2660
+ x − y
2661
+ ρP (y)dy = −2Pφ′(x)H[ρP ](x) + 2PH[φ′ρP ](x) .
2662
+ (52)
2663
+ Then,
2664
+ Lφ = φ′′ − V ′φ′ − 2Pφ′H[ρP ] + 2PH
2665
+
2666
+ φ′ρP
2667
+
2668
+ .
2669
+ By (18) we have −V ′ − 2PH[ρP ] = ρ′
2670
+ P
2671
+ ρP , which concludes the proof.
2672
+ In order to state the next theorem, whose proof we detail in the Appendix, we introduce the following
2673
+ Sobolev-type spaces. Let
2674
+ H2
2675
+ V ′(R) :=
2676
+
2677
+ u ∈ H2(R), uV ′ ∈ L2(R)
2678
+
2679
+ .
2680
+ We now define
2681
+ H2
2682
+ V ′(ρP ) := ρ−1/2
2683
+ P
2684
+ H2
2685
+ V ′(R)
2686
+ and its homogeneous counterpart
2687
+ H2
2688
+ V ′,0(ρP ) :=
2689
+
2690
+ u ∈ H2
2691
+ V ′(ρP ),
2692
+ ˆ
2693
+ R
2694
+ uρP dx = 0
2695
+
2696
+ .
2697
+ Finally, we let L2
2698
+ 0(ρP ) be the subset of L2(ρP ) of zero mean functions with respect to ρP .
2699
+ We detail the proof of the following theorem in Appendix A which is based on Schrödinger operators
2700
+ theory.
2701
+ 22
2702
+
2703
+ Theorem 6.2 (Diagonalization of A in L2
2704
+ 0(ρP )). There exists a sequence 0 < λ1 < λ2 < . . . going to
2705
+ infinity, and a complete orthonormal set (φn)n⩾1 of L2
2706
+ 0(ρP ) of associated eigenfunctions for A, meaning
2707
+ that
2708
+ • span{φn, n ⩾ 1} is dense in L2
2709
+ 0(ρP ),
2710
+ • For all i, j, ⟨φi, φj⟩L2(ρP ) = ��i,j,
2711
+ • For all n ⩾ 1, Aφn = λnφn.
2712
+ Furthermore, each φn is in H2
2713
+ V ′,0(ρP ), A : H2
2714
+ V ′,0(ρP ) → L2
2715
+ 0(ρP ) is bijective, and we have the writing, for
2716
+ u ∈ L2
2717
+ 0(ρP )
2718
+ A−1u =
2719
+
2720
+ n⩾1
2721
+ λ−1
2722
+ n ⟨u, φn⟩L2(ρP ) φn .
2723
+ We see the operators A and W as unbounded operators on the space
2724
+ H =
2725
+
2726
+ u ∈ H1(ρP ) |
2727
+ ˆ
2728
+ R
2729
+ uρP dx = 0
2730
+
2731
+ endowed with the inner product ⟨u, v⟩H = ⟨u′, v′⟩L2(ρP ). This defines an inner product on H and makes
2732
+ it a complete space: it can be seen that H1(ρP ) is the completion of C∞
2733
+ c (R) with respect to the inner
2734
+ product ⟨u, v⟩L2(ρP ) +⟨u′, v′⟩L2(ρP ). The space H is then the kernel of the bounded (with respect to ∥·∥H)
2735
+ linear form, ⟨�1, ·⟩L2(ρP ) on H1(ρP ), and both inner products are equivalent on H because of the Poincaré
2736
+ inequality, Proposition 2.4. The use of H is motivated by the fact that both A and W are self-adjoint
2737
+ positive on this space as we show in Lemma 6.4.
2738
+ In the next proposition, we deduce from Theorem 6.2 the diagonalization of A in H.
2739
+ Proposition 6.3 (Diagonalization of A in H). With the same eigenvalues 0 < λ1 < λ2 < . . . as in
2740
+ Theorem 6.2, there exists a complete orthonormal set (ψn)n⩾1 of H formed by eigenfunctions of A.
2741
+ Proof. With (φn)n⩾1 of Theorem 6.2,
2742
+ δi,j = ⟨φi, φj⟩L2(ρP ) = 1
2743
+ λj
2744
+ ⟨φi, Aφj⟩L2(ρP )
2745
+ = 1
2746
+ λj
2747
+ ⟨φ′
2748
+ i, φ′
2749
+ j⟩L2(ρP )
2750
+ = 1
2751
+ λj
2752
+ ⟨φi, φj⟩H.
2753
+ With ψn =
2754
+ 1
2755
+ √λn φn, (ψn)n⩾1 is then orthonormal with respect to the inner product of H. To show that
2756
+ span{ψn, n ⩾ 1} is dense in H, let u ∈ H be such that for all j ⩾ 1, ⟨u, φj⟩H = 0. In the last series of
2757
+ equalities, replace φi by u: we see that u is orthogonal to each φj in L2(ρP ), thus u is a constant as
2758
+ shown in the proof of Lemma A.10, and because u ∈ H it has zero mean against ρP . This shows that
2759
+ u = 0.
2760
+ We set for what follows D(A) =
2761
+
2762
+ u ∈ H2
2763
+ V ′,0(ρP ) | Au ∈ H
2764
+
2765
+ and D(W) = {u ∈ H | Wu ∈ H}.
2766
+ Lemma 6.4. The following properties hold:
2767
+ • The operator W : D(W) → H is positive: for all φ ∈ D(W),
2768
+ ⟨Wφ, φ⟩H = 1
2769
+ 2∥φ′ρP ∥2
2770
+ 1/2 ⩾ 0 ,
2771
+ with equality only for φ = 0, where the 1/2-norm of u is given by
2772
+ ∥u∥2
2773
+ 1/2 =
2774
+ ˆ
2775
+ R
2776
+ |x|. |F[u](x)|2 dx .
2777
+ 23
2778
+
2779
+ • Both A and W are self-adjoint for the inner product of H.
2780
+ Proof. To prove the first point, let φ ∈ D(W). Then,
2781
+ 2π ⟨Wφ, φ⟩H = −2π ⟨H[φ′ρP ]′, φ′ρP ⟩L2(dx) = −
2782
+
2783
+ ixF
2784
+
2785
+ H[φ′ρP ]
2786
+
2787
+ , F[φ′ρP ]
2788
+
2789
+ L2(dx)
2790
+ = π ⟨ | x | F[φ′ρP ], F[φ′ρP ]⟩L2(dx) = π∥φ′ρP ∥2
2791
+ 1/2 ⩾ 0 ,
2792
+ and because φ is in H, this last quantity is zero if and only if φ vanishes.
2793
+ For the second point, let u, v ∈ D(W). Using Plancherel’s isometry and i) of Lemma 2.1,
2794
+ ⟨Wu, v⟩H = ⟨(Wu)′, v′ρP ⟩L2(dx) = 1
2795
+ 2 ⟨ | x | F[u′ρP ], F[v′ρP ]⟩L2(dx) ,
2796
+ and this last expression is symmetric in (u, v).
2797
+ The proof of the self-adjointness of A follows from
2798
+ integration by partss.
2799
+ Definition 6.5 (Quadratic form associated to −L). We define for all u, v ∈ H ∩ C∞
2800
+ c (R) the quadratic
2801
+ form associated to −L by
2802
+ q−L(u, v) = ⟨Au, Av⟩L2(ρP ) + 2P ⟨F[u′ρP ], F[v′ρP ]⟩L2(|x|dx)
2803
+ Note that for all u, v ∈ H ∩ C∞
2804
+ c (R), q−L(u, v) = ⟨−Lu, v⟩H and that whenever u ∈ D(A) ∩ D(W),
2805
+ q−L(u, u) = ⟨Au, u⟩H + 2P ⟨Wu, u⟩H ⩾ λ1(A)∥u∥2
2806
+ H
2807
+ (53)
2808
+ by Proposition 6.3 and Lemma 6.4. After extending the q−L to its form domain Q(L) which is equal
2809
+ to
2810
+
2811
+ u ∈ H, Au ∈ L2(ρP ), F[u′ρP ] ∈ L2(|x|dx)
2812
+
2813
+ = H2
2814
+ V ′,0(ρP ). The equality comes from the fact that
2815
+ A−1�
2816
+ L2
2817
+ 0(ρP )
2818
+
2819
+ = H2
2820
+ V ′,0(ρP ), that H ⊂ H2
2821
+ V ′,0(ρP ) and that F[u′ρP ] ∈ L2(x2dx) whenever u ∈ H2
2822
+ V ′,0(ρP ),
2823
+ indeed u′ρP ∈ H1(R) because (u′ρP )′ = −ρP Au ∈ L2(R). We now define D(L) the domain of definition
2824
+ of −L by:
2825
+ D(L) :=
2826
+
2827
+ u ∈ Q(L), v �→ q−L(u, v) can be extended to a continuous linear form on H
2828
+
2829
+ Proposition 6.6. D(L) = D(A) ∩ D(W).
2830
+ Proof. Let u ∈ D(L), by Riesz’s theorem there exists fu ∈ H, such that q−L(u, v) = ⟨fu, v⟩H for all v ∈ H,
2831
+ we set −Lu := fu, it is called the Friedrichs extension of −L. Then for all v ∈ H ∩ C∞
2832
+ c (R), by integration
2833
+ by part we get:
2834
+ ⟨−Lu, v⟩H = q−L(u, v) = ⟨u, Av⟩H + 2P ⟨u, Wv⟩H ,
2835
+ hence we deduce the distributionnal identity −Lu = Au + 2PWu. Since u ∈ H2
2836
+ V ′,0(ρP ), Wu ∈ H1(ρP )
2837
+ implying that Au ∈ H and then that Wu ∈ H.
2838
+ We are now ready to state the main theorem of this section, that is the inversion of L on D(L).
2839
+ Theorem 6.7 (Inversion of L). −L : D(L) −→ H is bijective. Furthermore, (−L)−1 is continuous from
2840
+ (H, ∥.∥H) to (D(L), q−L).
2841
+ Proof. Let f ∈ H, since ⟨f, .⟩H is a linear form on Q(L) = H2
2842
+ V ′,0(ρP ) which is, by (53), continuous with
2843
+ respect to q−L, one can applies Riesz’s theorem so there exists a unique uf ∈ H2
2844
+ V ′,0(R), such that for all
2845
+ v ∈ H, ⟨f, v⟩H = q−L(uf, v). Since, uf is clearly in D(L) by definition of the Friedrichs extension of −L,
2846
+ we have −Lu = f.
2847
+ Remark 6.8. We can diagonalize L by the same argument we used in Appendix A to diagonalize A in
2848
+ L2
2849
+ 0(ρP ).
2850
+ 24
2851
+
2852
+ We now state a result that could allow one to extract more regularity for L−1 by the help of an
2853
+ explicit form that uses Fredholm determinant theory for Hilbert-Schmidt operators, the reader can refer
2854
+ to [GGK12].
2855
+ Definition 6.9 (Fredholm determinant). Let U be a self-adjoint Hilbert-Schmidt operator, we denote the
2856
+ Fredholm determinant by det(I + U).
2857
+ Theorem 6.10 (Determinant formula for L−1). For all u ∈ H, such that x �→
2858
+ 1
2859
+ ρP (x)
2860
+ ˆ +∞
2861
+ x
2862
+ u(t)ρP (t)dt
2863
+ is integrable at +∞, we have:
2864
+ L−1u = A−1u − ρ−1/2
2865
+ P
2866
+ R
2867
+
2868
+ ρ1/2
2869
+ P A−1u
2870
+
2871
+ (54)
2872
+ where R is the kernel operator defined for all v ∈ L2(R) by:
2873
+ R[v](x) =
2874
+ ˆ
2875
+ R
2876
+ R(x, y)v(y)dy
2877
+ where
2878
+ R(x, y) =
2879
+ 1
2880
+ det(I + K)
2881
+
2882
+ n⩾0
2883
+ 1
2884
+ n!
2885
+ ˆ
2886
+ Rn det
2887
+ n+1
2888
+ � K(x, y)
2889
+ K(x, λb)
2890
+ K(λa, y)
2891
+ K(λa, λb)
2892
+
2893
+ a,b=1...n
2894
+ dλ1 . . . dλn
2895
+ where K is the kernel operator defined for all w ∈ L2(ρP ) by:
2896
+ K[v](x) =
2897
+ ˆ
2898
+ R
2899
+ K(x, y)w(y)dy
2900
+ (55)
2901
+ with
2902
+ K(x, y) = −2PρP(x)ρP (y) ln
2903
+ ���1 − y
2904
+ x
2905
+ ���.
2906
+ (56)
2907
+ Proof. Let f ∈ H, there exists a unique u ∈ D(A) such that Au = f. Since (u′ρP )′ = ρP Au ∈ L2(R),
2908
+ hence u′ρP ∈ H1(R) so u′(x)ρP (x)
2909
+ −→
2910
+ |x|→+∞ 0 −(u′ρP )′
2911
+ ρP
2912
+ = f hence
2913
+ (A−1f)′(x)ρP (x) = u′(x)ρP (x) =
2914
+ ˆ +∞
2915
+ x
2916
+ f(t)ρP (t)dt.
2917
+ (57)
2918
+ Using the fact that
2919
+ ´
2920
+ R u(x)ρP (x)dx = 0, integrating again we get:
2921
+ u(x) = −
2922
+ ˆ +∞
2923
+ x
2924
+ ds
2925
+ ρP (s)
2926
+ ˆ +∞
2927
+ s
2928
+ f(t)ρP (t)dt + C
2929
+ where C =
2930
+ ˆ
2931
+ R
2932
+ ρP (x)dx
2933
+ ˆ +∞
2934
+ x
2935
+ ds
2936
+ ρP (s)
2937
+ ˆ +∞
2938
+ s
2939
+ f(t)ρP (t)dt. Now let g ∈ H, there exists a unique v ∈ D(L),
2940
+ such that −Lv = Av + 2PWv = g and then v + 2PWA−1v = A−1g. using (57), we get:
2941
+ WA−1v(x) =
2942
+
2943
+ R
2944
+ ds
2945
+ s − x
2946
+ ˆ +∞
2947
+ s
2948
+ dtv(t)ρP (t)
2949
+ By Sokhotski-Plejmel formula, we have:
2950
+
2951
+ R
2952
+ ds
2953
+ s − x
2954
+ ˆ +∞
2955
+ s
2956
+ dtv(t)ρP (t) =
2957
+ lim
2958
+ M→+∞ lim
2959
+ ε→0
2960
+ ˆ M
2961
+ −M
2962
+ ds
2963
+ 2
2964
+
2965
+ 1
2966
+ x − s + iε +
2967
+ 1
2968
+ x − s − iε
2969
+ � ˆ +∞
2970
+ s
2971
+ dtv(t)ρP (t)
2972
+ 25
2973
+
2974
+ We then proceed to an integration by part:
2975
+
2976
+ R
2977
+ ds
2978
+ s − x
2979
+ ˆ +∞
2980
+ s
2981
+ dtv(t)ρP (t) =
2982
+ lim
2983
+ M→+∞ lim
2984
+ ε→0
2985
+
2986
+ − ln
2987
+
2988
+ (x − s)2 + ε2�
2989
+ 2
2990
+ ˆ +∞
2991
+ s
2992
+ dtv(t)ρP (t)
2993
+ �M
2994
+ −M
2995
+
2996
+ ˆ
2997
+ R
2998
+ ds ln |x − s|v(s)ρP (s)
2999
+ To conclude that WA−1v(x) = −
3000
+ ´
3001
+ R ds ln |x − s|v(s)ρP (s), we just need to show that
3002
+ ln(x)
3003
+ ˆ +∞
3004
+ x
3005
+ dtv(t)ρP (t) −→
3006
+ |x|→∞ 0
3007
+ which can be seen by Cauchy-Schwarz inequality:
3008
+ ��� ln(x)
3009
+ ˆ +∞
3010
+ x
3011
+ dtv(t)ρP (t)
3012
+ ��� ⩽ | ln(x)|∥v∥L2(ρP ).ρP (x)1/4� ˆ
3013
+ R
3014
+ ρP (t)1/2dt
3015
+ �1/2
3016
+ .
3017
+ In this inequality, we used that ρP is decreasing in a neighborhood of +∞, hence
3018
+ ln |x|
3019
+ ˆ +∞
3020
+ s
3021
+ dtv(t)ρP (t)
3022
+ −→
3023
+ x→+∞ 0
3024
+ the exact same argument allows us to conclude when x goes to −∞. Using the fact that
3025
+ ´
3026
+ R v(t)ρP (t)dt = 0,
3027
+ we obtain the following equality:
3028
+ v − 2P
3029
+ ˆ
3030
+ R
3031
+ ds ln |x − s|v(s)ρP (s) = A−1g := h.
3032
+ Now setting ˜v(t) = ρ1/2
3033
+ P (t)v(t) and ˜h = ρ1/2
3034
+ P (t)h(t), we obtain ˜v + K[˜v] = ˜h where K is defined in
3035
+ (55). Since its kernel (defined in (56)) belongs to L2(R2), K is Hilbert-Schmidt. Hence by Fredholm
3036
+ determinant theory:
3037
+ ˜v = ˜h − R[˜h]
3038
+ or L−1g = A−1g − ρ−1/2
3039
+ P
3040
+ R
3041
+
3042
+ ρ1/2
3043
+ P A−1g
3044
+
3045
+ as expected.
3046
+ 7
3047
+ Regularity of the inverse of L and completion of the proof of
3048
+ Theorem 1.3
3049
+ Since we have proven the central limit theorem for functions of the type Lφ with φ regular enough and
3050
+ satisfying vanishing asymptotic conditions at infinity, we exhibit a class of functions f for which L−1f is
3051
+ regular enough to satisfy conditions of Theorem 5.2. We define T the subset of H defined by
3052
+ T :=
3053
+
3054
+ f ∈ C1(R), f(x) =
3055
+ O
3056
+ |x|→∞(x−1), f ′(x) =
3057
+ O
3058
+ |x|→∞(x−2),
3059
+ ˆ
3060
+ R
3061
+ fρP = 0
3062
+
3063
+ Theorem 7.1. For all f ∈ T , there exists a unique u ∈ C3(R) such that u′ ∈ H2(R) with u(3) bounded
3064
+ wich verifies:
3065
+ • u′(x) =
3066
+ O
3067
+ |x|→∞
3068
+
3069
+ 1
3070
+ xV ′(x)
3071
+
3072
+ • u′′(x) =
3073
+ O
3074
+ |x|→∞
3075
+
3076
+ 1
3077
+ xV ′(x)
3078
+
3079
+ 26
3080
+
3081
+ • u(3)(x) =
3082
+ O
3083
+ |x|→∞
3084
+ � 1
3085
+ x
3086
+
3087
+ such that f = Lu.
3088
+ Proof. Let f ∈ T ⊂ H, then since −L is bijective from D(L) → H, there exists a unique u ∈ D(L) such
3089
+ that −Lu = f ie:
3090
+ −u′′ − ρ′
3091
+ P
3092
+ ρP
3093
+ u′ − 2PH[u′ρP ] = f
3094
+ (58)
3095
+ Hence we have
3096
+ −(u′ρP )′ = ρP
3097
+
3098
+ f + 2PH[u′ρP ]
3099
+
3100
+ .
3101
+ (59)
3102
+ Since u ∈ D(L) ⊂ {u ∈ H2
3103
+ V ′,0(R), Au ∈ H}, the functions u′ρP and its derivatives (u′ρP )′ = −ρP Au and
3104
+ (u′ρP )′′ = −ρ′
3105
+ P
3106
+ ρP
3107
+ ρ1/2
3108
+ P .
3109
+
3110
+ ρ1/2
3111
+ P Au
3112
+
3113
+ − ρP
3114
+
3115
+ Au
3116
+ �′
3117
+ are in L2(dx). In particular u′ρP goes to zero at infinity, and
3118
+ H[u′ρP ] ∈ H2(R) ⊂ C1(R). So we can integrate (59) on [x, +∞[ , since by Lemma 2.3, the right-hand
3119
+ side behaves like a
3120
+ O
3121
+ |x|→∞
3122
+ �ρP (x)
3123
+ x
3124
+
3125
+ , to get the following expression
3126
+ u′(x)ρP (x) =
3127
+ ˆ +∞
3128
+ x
3129
+ ρP (t)
3130
+ ρ′
3131
+ P (t)(f + 2PH[u′ρP ]).ρ′
3132
+ P (t)dt
3133
+ (60)
3134
+ From this expression, we can see that u′ ∈ C2(R) so we just have to check the integrability condition at
3135
+ infinity and the fact that u(3) is bounded. After proceeding to an integration by parts, which is permitted
3136
+ by the previous argument, we obtain:
3137
+ u′(x) = −ρP (x)
3138
+ ρ′
3139
+ P (x)
3140
+
3141
+ f(x) + 2PH[u′ρP ](x)
3142
+
3143
+
3144
+ 1
3145
+ ρP (x)
3146
+ ˆ +∞
3147
+ x
3148
+
3149
+ ρP (t)
3150
+ ρ′
3151
+ P (t)(f + 2PH[u′ρP ])
3152
+ �′
3153
+ ρP (t)dt
3154
+ (61)
3155
+ and we define R1(x) :=
3156
+ 1
3157
+ ρP (x)
3158
+ ˆ +∞
3159
+ x
3160
+
3161
+ ρP (t)
3162
+ ρ′
3163
+ P (t)(f + 2PH[u′ρP ])
3164
+ �′
3165
+ ρP (t)dt, we will need to show that R1 is
3166
+ a remainder of order O
3167
+
3168
+ 1
3169
+ xV ′(x)2
3170
+
3171
+ at infinity. In this case we will have u′(x) = O
3172
+
3173
+ 1
3174
+ xV ′(x)
3175
+
3176
+ which will
3177
+ be useful for the following. If we reinject (61) in (58), we find:
3178
+ u′′ = −(f + 2PH[u′ρP ]) − ρ′
3179
+ P
3180
+ ρP
3181
+
3182
+ − ρP
3183
+ ρ′
3184
+ P
3185
+
3186
+ f + 2PH[u′ρP ]
3187
+
3188
+ − R1
3189
+
3190
+ = ρ′
3191
+ P
3192
+ ρP
3193
+ R1
3194
+ (62)
3195
+ Hence
3196
+ u′′(x) = ρ′
3197
+ P
3198
+ ρ2
3199
+ P
3200
+ (x)
3201
+ ˆ +∞
3202
+ x
3203
+ ρP (t)dt
3204
+
3205
+ �ρP
3206
+ ρ′
3207
+ P
3208
+ �′
3209
+ (t)
3210
+
3211
+ ��
3212
+
3213
+ =
3214
+ O
3215
+ t→+∞
3216
+
3217
+ V ′′(t)
3218
+ V ′(t)2
3219
+
3220
+
3221
+ f + 2PH[u′ρP ]
3222
+
3223
+ (t)
3224
+
3225
+ ��
3226
+
3227
+ =
3228
+ O
3229
+ t→+∞
3230
+
3231
+ 1
3232
+ t
3233
+
3234
+ +
3235
+ ρP
3236
+ ρ′
3237
+ P
3238
+ (t)
3239
+ � �� �
3240
+ =
3241
+ O
3242
+ t→+∞
3243
+
3244
+ 1
3245
+ V ′(t)
3246
+
3247
+
3248
+ f ′ − 2PH[ρP Au]
3249
+
3250
+ (t)
3251
+
3252
+ ��
3253
+
3254
+ =
3255
+ O
3256
+ t→+∞
3257
+
3258
+ 1
3259
+ t2
3260
+
3261
+
3262
+ .
3263
+ The fact that H[ρP Au](t) =
3264
+ O
3265
+ t→+∞(t−2) comes again from lemma 2.3. Finally we have that,
3266
+ u(3)(x) =
3267
+ �ρ′
3268
+ P
3269
+ ρ2
3270
+ P
3271
+ �′
3272
+ (x)ρP (x)R1(x) −
3273
+ �ρ′
3274
+ P
3275
+ ρ2
3276
+ P
3277
+
3278
+ (x)
3279
+
3280
+ ρP
3281
+ ρ′
3282
+ P
3283
+ (f + 2PH[u′ρP ])
3284
+ �′
3285
+ (x)ρP (x)
3286
+ =
3287
+ � ρ′′
3288
+ P
3289
+ ρP
3290
+ − 2ρ′2
3291
+ P
3292
+ ρ2
3293
+ P
3294
+
3295
+ (x)
3296
+
3297
+ ��
3298
+
3299
+ =
3300
+ O
3301
+ x→+∞
3302
+
3303
+ V ′(x)2
3304
+
3305
+ R1(x) −
3306
+ �ρ′
3307
+ P
3308
+ ρP
3309
+
3310
+ (x)
3311
+
3312
+ ρP
3313
+ ρ′
3314
+ P
3315
+ (f + 2PH[u′ρP ])
3316
+ �′
3317
+ (x)
3318
+
3319
+ ��
3320
+
3321
+ =
3322
+ O
3323
+ x→+∞
3324
+
3325
+ V ′′(x)
3326
+ xV ′(x) +x−2
3327
+
3328
+ 27
3329
+
3330
+ The second term is
3331
+ O
3332
+ x→+∞
3333
+ �1
3334
+ x
3335
+
3336
+ by the assumption that V ′′
3337
+ V ′ (x) =
3338
+ O
3339
+ |x|→∞(1). Hence, we just have to check
3340
+ that R1(x) =
3341
+ O
3342
+ x→+∞
3343
+
3344
+ 1
3345
+ xV ′(x)2
3346
+
3347
+ to establish that u′, u′′, u(3) are in L2(R). By a comparison argument,
3348
+ we control R1 by controlling
3349
+ I1(x) :=
3350
+ ˆ +∞
3351
+ x
3352
+ ρP (t)
3353
+ tV ′(t)dt
3354
+ By integration by parts:
3355
+ I1(x) := −
3356
+ ρP (x)
3357
+ xV ′(x)
3358
+ ρP
3359
+ ρ′
3360
+ P
3361
+ (x)
3362
+
3363
+ ��
3364
+
3365
+ =
3366
+ O
3367
+ x→+∞
3368
+
3369
+ ρP (x)
3370
+ xV ′(x)2
3371
+
3372
+
3373
+ ˆ +∞
3374
+ x
3375
+ ρP (t)
3376
+ � 1
3377
+ tV ′
3378
+ ρP
3379
+ ρ′
3380
+ P
3381
+ �′
3382
+ (t)dt
3383
+ =
3384
+ O
3385
+ x→+∞
3386
+ � ρP (x)
3387
+ xV ′(x)2
3388
+
3389
+
3390
+ ˆ +∞
3391
+ x
3392
+ ρP (t)dt
3393
+
3394
+
3395
+ 1
3396
+ t2V ′(t)
3397
+ ρP
3398
+ ρ′
3399
+ P
3400
+ (t) − V ′′(t)
3401
+ tV ′(t)2
3402
+ ρP
3403
+ ρ′
3404
+ P
3405
+ +
3406
+ 1
3407
+ tV ′(t)
3408
+ �ρP
3409
+ ρ′
3410
+ P
3411
+ �′
3412
+ (t)
3413
+
3414
+ (63)
3415
+ By the same argument as before, the last integral is of the form
3416
+ ˆ +∞
3417
+ x
3418
+ O
3419
+ t→+∞
3420
+ � ρP (t)
3421
+ tV ′(t)2
3422
+
3423
+ dt so if
3424
+ I2(x) :=
3425
+ ˆ +∞
3426
+ x
3427
+ ρP (t)
3428
+ tV ′(t)2 dt =
3429
+ O
3430
+ x→+∞
3431
+ � ρP (x)
3432
+ xV ′(x)2
3433
+
3434
+ then so is I1. By integration by parts, we obtain:
3435
+ I2(x) = ρP (x)
3436
+ 1
3437
+ xV ′(x)2
3438
+ ρP
3439
+ ρ′
3440
+ P
3441
+ (x) −
3442
+ ˆ +∞
3443
+ x
3444
+ ρP (t)dt
3445
+ ��ρP
3446
+ ρ′
3447
+ P
3448
+ �′
3449
+ (t)
3450
+ 1
3451
+ tV ′(t)2 − ρP
3452
+ ρ′
3453
+ P
3454
+ (t)
3455
+
3456
+ 1
3457
+ t2V ′(t)2 + 2V ′′(t)
3458
+ tV ′(t)3
3459
+ ��
3460
+ =
3461
+ O
3462
+ x→+∞
3463
+ � ρP (x)
3464
+ xV ′(x)2
3465
+
3466
+ +
3467
+ ˆ +∞
3468
+ x
3469
+ O
3470
+ t→+∞
3471
+ � ρP (t)
3472
+ tV ′(t)3
3473
+
3474
+ dt
3475
+ The last integral is a
3476
+ O
3477
+ x→+∞
3478
+ � ρP (x)
3479
+ xV ′(x)2
3480
+
3481
+ because, again, by integration by part:
3482
+ ˆ +∞
3483
+ x
3484
+ ρP (t)
3485
+ tV ′(t)3 dt = ρP (x)
3486
+ 1
3487
+ xV ′(x)3
3488
+ ρP
3489
+ ρ′
3490
+ P
3491
+ (x) −
3492
+ ˆ +∞
3493
+ x
3494
+ O
3495
+ t→+∞
3496
+ � ρP (t)
3497
+ tV ′(t)4
3498
+
3499
+ and finally
3500
+ ˆ +∞
3501
+ x
3502
+ ρP (t)
3503
+ tV ′(t)4 dt ⩽
3504
+ ρP (x)
3505
+ xV ′(x)2
3506
+ ˆ +∞
3507
+ x
3508
+ dt
3509
+ V ′(t)2 =
3510
+ O
3511
+ x→+∞
3512
+ � ρP (x)
3513
+ xV ′(x)2
3514
+
3515
+ In the final step, we used the fact that x �→
3516
+ ρP (x)
3517
+ xV ′(x) is decreasing in a neighborhood of +∞ (which
3518
+ can be checked by differentiating) and that x �→
3519
+ 1
3520
+ V ′(x)2 is integrable at ∞ by assumption iii). Hence
3521
+ R1(x) =
3522
+ O
3523
+ x→+∞
3524
+
3525
+ 1
3526
+ xV ′(x)2
3527
+
3528
+ (the exact same result can be shown at −∞), which leads to the fact
3529
+ u′(x) =
3530
+ O
3531
+ |x|→+∞
3532
+
3533
+ 1
3534
+ xV ′(x)
3535
+
3536
+ ,
3537
+ u′′(x) =
3538
+ O
3539
+ |x|→+∞
3540
+
3541
+ 1
3542
+ xV ′(x)
3543
+
3544
+ and
3545
+ u(3)(x) =
3546
+ O
3547
+ |x|→+∞
3548
+ �1
3549
+ x
3550
+
3551
+ (64)
3552
+ which establishes that these functions are in L2 in a neighborhood of ∞. Since we already showed that
3553
+ u ∈ C3(R) ⊂ H3
3554
+ loc(R), it establishes that u ∈ H3(R) ∩ C3(R) with u(3) bounded. To complete the proof
3555
+ we just have to show that (u′)2V (3), u′u′′V ′′, (u′)2V ′′ and u′V ′ are bounded which is easily checked by
3556
+ (64) and Assumption 1.1 iv).
3557
+ 28
3558
+
3559
+ A
3560
+ Appendix: proof of Theorem 6.2
3561
+ In order to analyze A, we let, for u ∈ L2(dx),
3562
+ Su := ρ1/2
3563
+ P Aρ−1/2
3564
+ P
3565
+ u .
3566
+ Note that u ∈
3567
+
3568
+ L2(dx), ∥.∥L2(dx)
3569
+
3570
+ �→ ρ−1/2
3571
+ P
3572
+ u ∈
3573
+
3574
+ L2(ρP ), ∥.∥L2(ρP )
3575
+
3576
+ is an isometry. It turns out that it will
3577
+ be easier to study first the operator S in order to get the spectal properties of A.
3578
+ Proposition A.1. The operator S is a Schrödinger operator: it admits the following expression for all
3579
+ u ∈ C2
3580
+ c (R): Su = −u′′ + wP u with
3581
+ wP = 1
3582
+ 2
3583
+ �1
3584
+ 2V ′2 − V ′′ + 2PV ′H[ρP ] − 2PH[ρ′
3585
+ P ] + 2P 2H[ρP ]2
3586
+
3587
+ = 1
3588
+ 2
3589
+
3590
+ (ln ρP )′′ + 1
3591
+ 2(ln ρP )′2�
3592
+ .
3593
+ Furthermore, wP is continuous and we have wP (x) ∼
3594
+
3595
+ V ′(x)2
3596
+ 4
3597
+ −→
3598
+ |x|→∞ +∞.
3599
+ Proof. We compute directly
3600
+
3601
+ ρP
3602
+
3603
+ ρ−1/2
3604
+ P
3605
+ u
3606
+ �′�′
3607
+ ρP
3608
+ =
3609
+
3610
+ ρ−1/2
3611
+ P
3612
+ u
3613
+ �′′ + ρ′
3614
+ P
3615
+ ρP
3616
+
3617
+ ρ−1/2
3618
+ P
3619
+ u
3620
+ �′
3621
+ =
3622
+
3623
+ ρ−1/2
3624
+ P
3625
+ u′ − 1
3626
+ 2ρ−3/2
3627
+ P
3628
+ ρ′
3629
+ P u
3630
+ �′ + ρ′
3631
+ P ρ−3/2
3632
+ P
3633
+ u′ − 1
3634
+ 2ρ−5/2
3635
+ P
3636
+
3637
+ ρ′
3638
+ P
3639
+ �2u
3640
+ = ρ−1/2
3641
+ P
3642
+ u′′ + 1
3643
+ 4ρ−5/2
3644
+ P
3645
+
3646
+ ρ′
3647
+ P
3648
+ �2u − 1
3649
+ 2ρ−3/2
3650
+ P
3651
+ ρ′′
3652
+ P u
3653
+ = ρ−1/2
3654
+ P
3655
+
3656
+ u′′ + 1
3657
+ 4ρ−2
3658
+ P
3659
+
3660
+ ρ′
3661
+ P
3662
+ �2u − 1
3663
+ 2ρ−1
3664
+ P ρ′′
3665
+ P u
3666
+
3667
+ = ρ−1/2
3668
+ P
3669
+
3670
+ u′′ − 1
3671
+ 2
3672
+ ��ρ′′
3673
+ P
3674
+ ρP
3675
+
3676
+ − 1
3677
+ 2
3678
+ �ρ′
3679
+ P
3680
+ ρP
3681
+ �2�
3682
+ u
3683
+
3684
+ = ρ−1/2
3685
+ P
3686
+
3687
+ u′′ − 1
3688
+ 2
3689
+
3690
+ (ln ρP )′′ + 1
3691
+ 2(ln ρP )′2�
3692
+ u
3693
+
3694
+ = ρ−1/2
3695
+ P
3696
+
3697
+ u′′ − wP u
3698
+
3699
+ .
3700
+ Now, using Lemma 2.2, we have
3701
+ wP = 1
3702
+ 2
3703
+ �1
3704
+ 2V ′2 − V ′′ + 2PV ′H[ρP ] − 2PH[ρ′
3705
+ P ] + 2P 2H[ρP ]2
3706
+
3707
+ .
3708
+ Notice that H[ρ′
3709
+ P ] and H[ρP ] are bounded since they belong to H1(R), as we showed in Lemma 2.2 that
3710
+ ρP is H2(R). Along with Assumption 1.1iii) and Lemma 2.3, we deduce wP (x) ∼
3711
+
3712
+ 1
3713
+ 4V ′2(x).
3714
+ Remark A.2. Note that the function wP need not be positive on R. In fact, neglecting the terms involving
3715
+ the Hilbert transforms of ρP and ρ′
3716
+ P , wP would only be positive outside of a compact set. However, using
3717
+ the positivity of A, which will be shown further in the article, we can show that the operator −u′′ + wP u
3718
+ is itself positive on L2(dx). It can also be checked that, by integration by partss, S is symmetric on C2
3719
+ c(R)
3720
+ with the inner product of L2(dx).
3721
+ We now introduce an extension of S by defining its associated bilinear form.
3722
+ Definition A.3 (Quadratic form associated to S).
3723
+ Let α ⩾ 0 such that wP + α ⩾ 1. We define the quadratic form associated to S + αI, defined for all
3724
+ u ∈ C2
3725
+ c(R) by
3726
+ qα(u, u) :=
3727
+ ˆ
3728
+ R
3729
+ u′2dx +
3730
+ ˆ
3731
+ R
3732
+ u2(wP + α)dx
3733
+ 29
3734
+
3735
+ This quadratic form can be extended to a larger domain denoted by Q(S+αI), called the form domain
3736
+ of the operator S + αI. By the theory of Schrödinger operators, it is well-known (see [Dav96][Theorem
3737
+ 8.2.1]) that such a domain is given by
3738
+ Q(S + αI) =
3739
+
3740
+ u ∈ H1(R), u(wP + α)1/2 ∈ L2(R)
3741
+
3742
+ =
3743
+
3744
+ u ∈ H1(R), uV ′ ∈ L2(R)
3745
+
3746
+ =: H1
3747
+ V ′(R) .
3748
+ The space H1
3749
+ V ′(R) can be seen to be the completion under the norm qα of C∞
3750
+ c . Now that the quadratic
3751
+ form associated to S + αI has been extended to its form domain, it is possible to go back to the operator
3752
+ and extend it by its Friedrichs extension.
3753
+ Theorem A.4 (Friedrichs extension of S + αI).
3754
+ There exists an extension (S + αI)F of the operator S + αI, called the Friedrichs extension of S + αI
3755
+ defined on H2
3756
+ V ′(R) :=
3757
+
3758
+ u ∈ H2(R), uV ′ ∈ L2(R)
3759
+
3760
+ .
3761
+ Proof. We denote
3762
+ D
3763
+
3764
+ (S + αI)F
3765
+
3766
+ =
3767
+
3768
+ v ∈ H1
3769
+ V ′(R), u ∈ H1
3770
+ V ′(R) �−→ qα(u, v) can be extended to a continuous linear form on L2(R)
3771
+
3772
+ If v ∈ D
3773
+
3774
+ (S + αI)F
3775
+
3776
+ , by Riesz’s theorem there exists a unique fv ∈ L2(R) such that qα(u, v) =
3777
+ ⟨u, fv⟩L2(dx) holds for all u ∈ L2(R) and we can set (S + αI)F v := fv. Note that it is indeed a way
3778
+ of extending S + αI since for all u, v ∈ C2
3779
+ c(R), qα(u, v) = ⟨u, (S + αI)v⟩L2(dx).
3780
+ We want to show that D
3781
+
3782
+ (S+αI)F
3783
+
3784
+ = H2
3785
+ V ′(R). Let f ∈ D
3786
+
3787
+ (S+αI)F
3788
+
3789
+ and g := (S+αI)F f ∈ L2(R).
3790
+ By definition of qα, for all u ∈ C2
3791
+ c(R):
3792
+ ˆ
3793
+ R
3794
+ gudx =
3795
+ ˆ
3796
+ R
3797
+ f ′u′dx +
3798
+ ˆ
3799
+ R
3800
+ (wP + α)fudx = −
3801
+ ˆ
3802
+ R
3803
+ fu′′dx +
3804
+ ˆ
3805
+ R
3806
+ (wP + α)fudx
3807
+ Therefore in the sense of distributions, we get −f ′′ = g − (wP + α)f which is a function in L2(R), hence
3808
+ f ∈ H2
3809
+ V ′(R). Conversely, if f ∈ H2
3810
+ V ′(R), it is possible to extend u �→ qα(f, u) to a continuous linear form
3811
+ on L2(R) by
3812
+ u �→ −
3813
+ ˆ
3814
+ R
3815
+ uf ′′dx +
3816
+ ˆ
3817
+ R
3818
+ uf(wP + α)dx
3819
+ which concludes the fact that D
3820
+
3821
+ (S + αI)F
3822
+
3823
+ = H2
3824
+ V ′(R).
3825
+ In the following, we will deal only with (S + αI)F : H2
3826
+ V ′(R) −→ L2(R) and denote it (S + αI).
3827
+ Remark A.5. Note that in the previous proof, the application of Riesz’s theorem doesn’t allow to say that
3828
+ (S + αI) : v ∈
3829
+
3830
+ H2
3831
+ V ′(R), ∥.∥qα
3832
+
3833
+ �→ fv ∈
3834
+
3835
+ L2(R), ∥.∥L2(dx)
3836
+
3837
+ , where ∥.∥qα stands for the norm associated
3838
+ to the bilinear positive definite form qα, is continuous. It can be seen by the fact that
3839
+ v ∈
3840
+
3841
+ D(S + αI), ∥.∥qα
3842
+
3843
+ �→ q(., v) ∈
3844
+
3845
+ L2(R)′, ∥.∥L2(dx)′
3846
+
3847
+ , where L2(R)′ stands for the topological dual of
3848
+ L2(R) equipped with its usual norm, is not continuous. Indeed the ∥.∥qα norm doesn’t control the second
3849
+ derivative of v and hence doesn’t provide any module of continuity for the L2(R)-extended linear form
3850
+ q(., v).
3851
+ Theorem A.6 (Inversion of S + αI).
3852
+ For every f ∈ L2(R), there exists a unique u ∈ H2
3853
+ V ′(R) such that (S + αI)u = f. Furthermore, the map
3854
+ (S + αI)−1 is continuous from
3855
+
3856
+ L2(R), ∥.∥L2(dx)
3857
+
3858
+ to
3859
+
3860
+ H2
3861
+ V ′(R), ∥.∥qα
3862
+
3863
+ .
3864
+ 30
3865
+
3866
+ Proof. Let f ∈ L2(R), the map u �−→ ⟨u, f⟩L2(dx) is continuous on
3867
+
3868
+ H1
3869
+ V ′(R), ∥.∥qα
3870
+
3871
+ which is a Hilbert
3872
+ space. Therefore by Riesz’s theorem, there exists a unique vf ∈ H1
3873
+ V ′(R) such that for all u ∈ H1
3874
+ V ′(R),
3875
+ ⟨f, u⟩L2(dx) = qα(vf, u) from which we deduce that, in the sense of distributions, f = −v′′
3876
+ f + (wP + α)vf
3877
+ which implies that vf ∈ H2
3878
+ V ′(R). Since vf ∈ D
3879
+
3880
+ S + αI
3881
+
3882
+ , we have then for all u ∈ L2(R), ⟨f, u⟩L2(dx) =
3883
+ qα(vf, u) = ⟨(S + α)vf, u⟩L2(dx), hence (S + αI)vf = f. Finally, by Riesz’s theorem, f ∈ L2(R) �→ vf ∈
3884
+ H1
3885
+ V ′(R) is continuous hence so is (S + αI)−1.
3886
+ Remark A.7. It would be tempting to use Banach’s isomorphism theorem to say that since (S + αI)−1
3887
+ is bijective and continuous, so must be S + αI. But since
3888
+
3889
+ H2
3890
+ V ′(R), ∥.∥qα
3891
+
3892
+ is not a Banach space (it’s not
3893
+ closed in H1
3894
+ V ′(R)) we can’t apply it.
3895
+ We are now able to diagonalize the resolvent of S.
3896
+ Theorem A.8 (Diagonalization of (S + αI)−1).
3897
+ There exists a complete orthonormal set (ψn)n⩾0 of L2(dx) (meaning that
3898
+ span{ψn, n ⩾ 0}
3899
+ ∥.∥L2(dx) = L2(dx)
3900
+ and ⟨ψi, ψj⟩L2(dx) = δi,j), where each ψn ∈ H2
3901
+ V ′ and
3902
+
3903
+ µn(α)
3904
+
3905
+ n⩾0 ∈ [0, 1]N with µn(α) −→
3906
+ N→∞ 0 such that
3907
+ (S + αI)−1ψn = µn(α)ψn for all n ⩾ 0. We also have
3908
+ ���
3909
+ ���
3910
+ ���
3911
+
3912
+ S + αI
3913
+ �−1���
3914
+ ���
3915
+ ���
3916
+ L
3917
+
3918
+ L2(dx)
3919
+ � ⩽ 1.
3920
+ Proof. By Proposition A.1, wP + α is continuous and goes to infinity at infinity. By Rellich criterion
3921
+ [RS78][see Theorem XIII.65], the unit ball of H2
3922
+ V ′(R), ie the set
3923
+
3924
+ u ∈ H2
3925
+ V ′(R),
3926
+ ˆ
3927
+ R
3928
+ u′2 +
3929
+ ˆ
3930
+ R
3931
+ (wP + α)u2 ⩽ 1
3932
+
3933
+ considered as a subset of L2(R) is relatively compact in
3934
+
3935
+ L2(dx), ∥.∥L2(dx)
3936
+
3937
+ . Hence, we can conclude
3938
+ that the injection ι :
3939
+
3940
+ H2
3941
+ V ′(R), ∥.∥qα
3942
+
3943
+ −→
3944
+
3945
+ L2(dx), ∥.∥L2(dx)
3946
+
3947
+ is a compact operator. Since (S + αI)−1 :
3948
+
3949
+ L2(dx), ∥.∥L2(dx)
3950
+
3951
+ −→
3952
+
3953
+ H2
3954
+ V ′(R), ∥.∥qα
3955
+
3956
+ is continuous then (S+αI)−1 is compact from
3957
+
3958
+ L2(dx), ∥.∥L2(dx)
3959
+
3960
+ to itself. The fact that (S + αI)−1 is self-adjoint and positive allows us to apply the spectral theorem
3961
+ to obtain
3962
+
3963
+ µn(α)
3964
+
3965
+ n⩾0 positive eigenvalues verifying µn(α) −→
3966
+ N→∞ 0 by compactness and a Hilbertian basis
3967
+ (ψn)n⩾0 ∈ L2(R)N, such that for all n ⩾ 0, (S + αI)−1ψn = µn(α)ψn. It is then easy to see that for
3968
+ all n, ψn ∈ H2
3969
+ V ′(R) since they belong to the range of (S + αI)−1. Finally, since for all φ ∈ L2(R),
3970
+ ⟨(S + αI)φ, φ⟩L2(dx) ⩾ ∥φ∥2
3971
+ L2(dx), the spectrum of (S + αI)−1 is contained in [0, 1].
3972
+ It allows us to
3973
+ conclude that
3974
+ ������(S + αI)−1������
3975
+ L2(dx) ⩽ 1.
3976
+ It is now straightforward to see how to extend A = ρ−1/2
3977
+ P
3978
+ Sρ1/2
3979
+ P
3980
+ on H2
3981
+ V ′(ρP ) := ρ−1/2
3982
+ P
3983
+ H2
3984
+ V ′(R) equipped
3985
+ with the norm ∥.∥qα,ρP to
3986
+
3987
+ L2(ρP ), ∥.∥L2(ρP )
3988
+
3989
+ . The norm ∥.∥qα,ρP is defined for all u ∈ H2(ρP ) by
3990
+ ∥u∥qα,ρP =
3991
+ ˆ
3992
+ R
3993
+ u′2ρP dx +
3994
+ ˆ
3995
+ R
3996
+ u2(wP + α)ρP dx .
3997
+ It is easy to see that (A + αI)−1 is continuous. We stress the fact that H2
3998
+ V ′(ρP ) ̸=
3999
+
4000
+ u ∈ H2(ρP ), uV ′ ∈
4001
+ L2(ρP )
4002
+
4003
+ . Indeed if u ∈ H2
4004
+ V ′(R), even though uρ−1/2
4005
+ P
4006
+ and its derivative belong to L2(ρP ), (ρ−1/2
4007
+ P
4008
+ u)′′ /∈
4009
+ L2(ρP ). The reader can check that for such a function to be in L2(ρP ), it would be necessary to have
4010
+ that u2V ′4 ∈ L2(dx) which is not the case.
4011
+ Remark A.9. The kernel of A is generated by the function �1. Indeed if φ ∈ H2
4012
+ V ′(ρP ) is in the kernel of
4013
+ A then
4014
+ 31
4015
+
4016
+ 0 = −
4017
+
4018
+ φ′ρP
4019
+ �′
4020
+ ρP
4021
+ ⇒ ∃c ∈ R, φ′ = c
4022
+ ρP
4023
+ But since φ′ is in L2(ρP ) then c = 0 which implies that φ is constant. We must restrict A to the orthogonal
4024
+ of KerA with respect to the inner product of L2(ρP ), ie
4025
+ H2
4026
+ V ′,0(ρP ) :=
4027
+
4028
+ u ∈ H2
4029
+ V ′(ρP ) |
4030
+ ˆ
4031
+ R
4032
+ uρP = 0
4033
+
4034
+ .
4035
+ Doing so makes A injective.
4036
+ Before inverting A, we need the following lemma:
4037
+ Lemma A.10. The following equality holds
4038
+ (A + αI)
4039
+
4040
+ H2
4041
+ V ′,0(ρP )
4042
+
4043
+ = L2
4044
+ 0(ρP ) :=
4045
+
4046
+ u ∈ L2(ρP ),
4047
+ ˆ
4048
+ R
4049
+ uρPdx = 0
4050
+
4051
+ Proof. Let φ = �c for c ∈ R, (A + αI)φ = �
4052
+ αc then (A + αI)(R.�1) = R�1. Hence since A + αI is self-adjoint
4053
+ with respect to the inner product of L2(ρP ) and that R�1 is stable by A + αI, then (A + αI)
4054
+
4055
+ (R.�1)⊥ ∩
4056
+ H2
4057
+ V ′(ρP )
4058
+
4059
+ ⊂ (R.�1)⊥. For the converse, let u ∈ (R.�1)⊥, since A + αI is bijective, there exists v ∈ H2
4060
+ V ′(ρP )
4061
+ such that u = (A + αI)v. For all w ∈ R.�1,
4062
+ 0 = ⟨u, w⟩L2(ρP ) = ⟨(A + αI)v, w⟩L2(ρP ) = ⟨v, (A + αI)w⟩L2(ρP )
4063
+ Hence v ∈
4064
+
4065
+ (A + αI)(R�1)
4066
+ �⊥ = R�1⊥ and so (R.�1)⊥ ⊂ (A + αI)
4067
+
4068
+ (R.�1)⊥�
4069
+ .
4070
+ It is easy to see that L2
4071
+ 0(ρP ) is a closed subset of L2(ρP ) as it is the kernel of the linear form
4072
+ φ ∈ L2(ρP ) �→
4073
+
4074
+ φ,�1
4075
+
4076
+ L2(ρP ), making it a Hilbert space.
4077
+ Proposition A.11 (Diagonalization and invertibility of A). There exists a complete orthonormal set of
4078
+
4079
+ L2
4080
+ 0(ρP ), ⟨., .⟩L2(ρP )
4081
+
4082
+ , (φn)n∈N ∈ H2
4083
+ V ′,0(ρP )N such that Aφn = λnφn (meaning that
4084
+ span{φn, n ⩾ 0}
4085
+ ∥.∥L2(ρP ) = L2
4086
+ 0(ρP )
4087
+ and ⟨φi, φj⟩L2(ρP ) = δi,j). Furthermore, A : H2
4088
+ V ′,0(ρP ) −→ L2
4089
+ 0(ρP ) :=
4090
+
4091
+ u ∈ L2(ρP ),
4092
+ ´
4093
+ R uρPdx = 0
4094
+
4095
+ is
4096
+ bijective, A−1 is continuous when considered as an operator of L2
4097
+ 0(ρP ).
4098
+ Proof. Since (S + αI)−1 considered as an operator of L2(dx), is compact so is (A + αI)−1 on L2(ρP )
4099
+ and since A is self-adjoint, by the spectral theorem, (A + αI)−1 is diagonalizable. With the notations of
4100
+ Theorem A.8, (A+αI)−1 has eigenvalues
4101
+
4102
+ µn(α)
4103
+
4104
+ n⩾0 and corresponding eigenfunctions φn = ρ−1/2
4105
+ P
4106
+ ψn ∈
4107
+ H2
4108
+ V ′(ρP ). Hence for all n ∈ N, Aφn = λnφn with λn :=
4109
+
4110
+ 1
4111
+ µn(α) − α
4112
+
4113
+ . Now,
4114
+ λn∥φn∥L2(ρP ) =
4115
+ ˆ
4116
+ R
4117
+ (Aφn)φnρP dx = −
4118
+ ˆ
4119
+ R
4120
+ (ρP φ′
4121
+ n)′φn =
4122
+ ˆ
4123
+ R
4124
+ φ′2
4125
+ n ρP ⩾ 0 .
4126
+ Furthermore, the kernel of A is R.�1, thus the spectrum of A restricted to H2
4127
+ V ′,0(ρP ) is positive. But
4128
+ since (A + αI)−1 is a compact operator of L2(ρP ) and that (A + αI) maps R.�1⊥ to R.�1⊥ with respect
4129
+ to the inner product of L2(ρP ) (see lemma A.10), then
4130
+
4131
+ A + αI
4132
+ �−1 is compact as an operator from
4133
+ L2
4134
+ 0(ρP ) to itself. By Fredholm alternative, for every λ ∈ R λ ̸= 0, either (A + αI)−1 − λI is bijective
4135
+ 32
4136
+
4137
+ either λ ∈ Sp
4138
+
4139
+ (A + αI)−1�
4140
+ . These conditions are equivalent to: either A + (α − 1
4141
+ λ)I is bijective as an
4142
+ operator from H2
4143
+ V ′,0(ρP ) to L2
4144
+ 0(ρP ), either −α + 1
4145
+ λ ∈ Sp
4146
+
4147
+ A
4148
+
4149
+ . If we set λ = 1
4150
+ α then either A is bijective
4151
+ either 0 ∈ Sp(A), since the latter is wrong then A : H2
4152
+ V ′,0(ρP ) → L2
4153
+ 0(ρP ) is bijective. The spectrum of
4154
+ A is
4155
+
4156
+ 1
4157
+ µn(α) − α
4158
+
4159
+ n⩾0
4160
+ ⊂ (λ1, +∞) ⊂ (0, +∞), where λ1 is the smallest eigenvalue. Hence, we deduce
4161
+ ������A−1������
4162
+ L(L2(ρP )) ⩽ λ−1
4163
+ 1 .
4164
+ References
4165
+ [ABG12]
4166
+ R. Allez, J.P. Bouchaud, and A. Guionnet. Invariant beta ensembles and the gauss-wigner
4167
+ crossover. Physical Review Letters, Aug. 2012.
4168
+ [AGZ10]
4169
+ G. W. Anderson, A. Guionnet, and O. Zeitouni. An introduction to random matrices, volume
4170
+ 118 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge,
4171
+ 2010.
4172
+ [BBCG08] D. Bakry, F. Barthe, P. Cattiaux, and A. Guillin. A simple proof of the Poincaré inequality
4173
+ for a large class of probability measures including the log-concave case. Electron. Commun.
4174
+ Probab., 13:60–66, 2008.
4175
+ [BFG15]
4176
+ F. Bekerman, A. Figalli, and A. Guionnet. Transport maps for β-matrix models and univer-
4177
+ sality. Communications in mathematical physics, 338(2):589–619, 2015.
4178
+ [BG13a]
4179
+ G. Borot and A. Guionnet. Asymptotic expansion of β matrix models in the one-cut regime.
4180
+ Comm. Math. Phys., 317(2):447–483, 2013.
4181
+ [BG13b]
4182
+ G. Borot and A. Guionnet. Asymptotic expansion of beta matrix models in the several-cut
4183
+ regime. arxiv 1303.1045, 2013.
4184
+ [BGK16]
4185
+ G. Borot, A. Guionnet, and K. K. Kozlowski. Asymptotic expansion of a partition function
4186
+ related to the sinh-model. Mathematical Physics Studies. Springer, [Cham], 2016.
4187
+ [BGP15]
4188
+ F. Benaych-Georges and S. Péché. Poisson statistics for matrix ensembles at large tempera-
4189
+ ture. Journal of Statistical Physics, 161(3):633–656, 2015.
4190
+ [BLS18]
4191
+ Florent Bekerman, Thomas Leblé, and Sylvia Serfaty. Clt for fluctuations of β-ensembles with
4192
+ general potential. Electronic Journal of Probability, 23:1–31, 2018.
4193
+ [BMP22]
4194
+ P. Bourgade, K. Mody, and M. Pain. Optimal local law and central limit theorem for β-
4195
+ ensembles. Communications in Mathematical Physics, 390(3):1017–1079, 2022.
4196
+ [Dav96]
4197
+ E. B. Davies. Spectral theory and differential operators, volume 42. Cambridge University
4198
+ Press, 1996.
4199
+ [DE02]
4200
+ I. Dumitriu and A. Edelman. Matrix models for beta ensembles. J. Math. Phys., 43:5830–5847,
4201
+ 2002.
4202
+ [GGK12]
4203
+ I. Gohberg, S. Goldberg, and N. Krupnik. Traces and determinants of linear operators, volume
4204
+ 116. Birkhäuser, 2012.
4205
+ [GM22]
4206
+ A. Guionnet and R. Memin. Large deviations for gibbs ensembles of the classical toda chain.
4207
+ Electron. J. Probab., 27:1–29, 2022.
4208
+ [Gui19]
4209
+ A. Guionnet.
4210
+ Asymptotics of random matrices and related models:
4211
+ the uses of Dyson-
4212
+ Schwinger equations, volume 130. American Mathematical Soc., 2019.
4213
+ 33
4214
+
4215
+ [GZ19]
4216
+ D. García-Zelada. A large deviation principle for empirical measures on Polish spaces: ap-
4217
+ plication to singular Gibbs measures on manifolds. Ann. Inst. Henri Poincaré Probab. Stat.,
4218
+ 55(3):1377–1401, 2019.
4219
+ [HL21]
4220
+ A. Hardy and G. Lambert. Clt for circular beta-ensembles at high temperature. Journal of
4221
+ Functional Analysis, 280(7):108869, 2021.
4222
+ [Joh98]
4223
+ K. Johansson. On fluctuations of eigenvalues of random Hermitian matrices. Duke Math. J.,
4224
+ 91:151–204, 1998.
4225
+ [Kin09]
4226
+ F. W. King. Hilbert Transforms: Volume 1 (Encyclopedia of Mathematics and its Applica-
4227
+ tions). 1 edition, 2009.
4228
+ [Lam21]
4229
+ G. Lambert. Poisson statistics for gibbs measures at high temperature. 57(1):326–350, 2021.
4230
+ [MMS14]
4231
+ M. Maïda and É. Maurel-Segala. Free transport-entropy inequalities for non-convex potentials
4232
+ and application to concentration for random matrices. Probability Theory and Related Fields,
4233
+ 159(1):329–356, 2014.
4234
+ [NT18]
4235
+ F. Nakano and K. D. Trinh. Gaussian beta ensembles at high temperature: eigenvalue fluc-
4236
+ tuations and bulk statistics. J.Stat.Phys, 173:295–321, 2018.
4237
+ [NT20]
4238
+ F. Nakano and K. D. Trinh. Poisson statistics for beta ensembles on the real line at high
4239
+ temperature. J. Stat. Phys., 179(2):632–649, 2020.
4240
+ [Pak18]
4241
+ C. Pakzad. Poisson statistics at the edge of gaussian beta-ensembles at high temperature.
4242
+ arXiv preprint arXiv:1804.08214, 2018.
4243
+ [RS78]
4244
+ M. Reed and B. Simon. Methods of modern mathematical physics, vol. 4, 1978.
4245
+ [Shc13]
4246
+ M. Shcherbina. Fluctuations of linear eigenvalue statistics of β matrix models in the multi-cut
4247
+ regime. J. Stat. Phys., 151(6):1004–1034, 2013.
4248
+ [Shc14]
4249
+ M. Shcherbina. Change of variables as a method to study general β-models: bulk universality.
4250
+ Journal of Mathematical Physics, 55(4):043504, 2014.
4251
+ [Spo20]
4252
+ H. Spohn. Generalized Gibbs Ensembles of the Classical Toda Chain. J. Stat. Phys., 180(1-
4253
+ 6):4–22, 2020.
4254
+ [Spo21]
4255
+ H. Spohn. Hydrodynamic equations for the toda lattice. ArXiv 2101.06528, 2021.
4256
+ 34
4257
+
89E5T4oBgHgl3EQfQw7M/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dE1T4oBgHgl3EQfUAND/content/tmp_files/2301.03084v1.pdf.txt ADDED
@@ -0,0 +1,1494 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dynamic Binary Search Trees: Improved Lower
2
+ Bounds for the Greedy-Future Algorithm
3
+ Yaniv Sadeh � �
4
+ Tel Aviv University, Israel
5
+ Haim Kaplan � �
6
+ Tel Aviv University, Israel
7
+ Abstract
8
+ Binary search trees (BSTs) are one of the most basic and widely used data structures. The best
9
+ static tree for serving a sequence of queries (searches) can be computed by dynamic programming.
10
+ In contrast, when the BSTs are allowed to be dynamic (i.e. change by rotations between searches),
11
+ we still do not know how to compute the optimal algorithm (OPT) for a given sequence. One of the
12
+ candidate algorithms whose serving cost is suspected to be optimal up-to a (multiplicative) constant
13
+ factor is known by the name Greedy Future (GF). In an equivalent geometric way of representing
14
+ queries on BSTs, GF is in fact equivalent to another algorithm called Geometric Greedy (GG). Most
15
+ of the results on GF are obtained using the geometric model and the study of GG. Despite this
16
+ intensive recent fruitful research, the best lower bound we have on the competitive ratio of GF is 4
17
+ 3.
18
+ Furthermore, it has been conjectured that the additive gap between the cost of GF and OPT is only
19
+ linear in the number of queries. In this paper we prove a lower bound of 2 on the competitive ratio
20
+ of GF, and we prove that the additive gap between the cost of GF and OPT can be Ω(m · log log n)
21
+ where n is the number of items in the tree and m is the number of queries.
22
+ 2012 ACM Subject Classification Theory of computation → Online algorithms; Theory of compu-
23
+ tation → Sorting and searching
24
+ Keywords and phrases Binary Search Trees, Greedy Future, Geometric Greedy, Lower Bounds,
25
+ Dynamic Optimality Conjecture
26
+ Digital Object Identifier 10.4230/LIPIcs.STACS.2023.39
27
+ Funding The work of the authors is partially supported by Israel Science Foundation (ISF) grant
28
+ number 1595-19, German Science Foundation (GIF) grant number 1367 and the Blavatnik research
29
+ fund at Tel Aviv University.
30
+ © Yaniv Sadeh and Haim Kaplan;
31
+ licensed under Creative Commons License CC-BY 4.0
32
+ 40th International Symposium on Theoretical Aspects of Computer Science (STACS 2023).
33
+ Editors: Petra Berenbrink, Mamadou Moustapha Kanté, Patricia Bouyer, and Anuj Dawar; Article No. 39;
34
+ pp. 39:1–39:22
35
+ Leibniz International Proceedings in Informatics
36
+ Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
37
+ arXiv:2301.03084v1 [cs.DS] 8 Jan 2023
38
+
39
+ 39:2
40
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
41
+ 1
42
+ Introduction
43
+ Binary search trees (BSTs) are one of the most basic and widely used data-structures. They
44
+ are used to store a sorted set of keys from a totally ordered universe. Traversing BSTs is
45
+ usually done by using a single pointer, initially pointing to the root, and moving to the left or
46
+ right child according to the order of the searched key and the key of the item at the current
47
+ node. Therefore, we typically define the cost1 of a search to be the length of the search path.
48
+ The data structure itself may be static, or change dynamically throughout time, in response
49
+ to insertions and deletions of items, and possibly even restructured during queries.
50
+ Static BSTs are well understood. One can guarantee that the longest path from the root
51
+ to a leaf is of length O(log n) if the number of keys is n, by using a balanced tree. If the access
52
+ sequence is known in advance (in fact only the frequency of accesses of each key matters)
53
+ then an O(n2) time algorithm computing the optimal static tree for the particular set of
54
+ frequencies was given by Knuth [13]. It is also notable that the lower bound on the cost when
55
+ the known frequencies are ⃗f = [f1, f2, . . . , fn] and the number of queries is m, is Ω(m · H(⃗f))
56
+ where H(⃗f) = �n
57
+ i=1 fi log 1
58
+ fi is the entropy function. A simple way with O(n log n) running
59
+ time to construct a near-optimal static (centroid) tree whose cost is O(m · H(⃗f)), has been
60
+ described by Mehlhorn [17]. The running time has been improved to O(n) by Fredman [10].
61
+ In contrast to the static case, the dynamic case is less understood. One can, of course,
62
+ serve the sequence with a static tree. But, for many sequences we must change the structure
63
+ of the tree as we make the searches in order to be efficient. For example, the requested items
64
+ may be different in different parts of the sequence so a different set of items has to be placed
65
+ near the root during different parts of the sequence. Restructuring is done by rotations that
66
+ maintain the symmetric order. When rotations are allowed, the cost is defined to be the size
67
+ of the subtree that contains the search path and all edges which we rotate.
68
+ Here, we assume that the set of values stored in the tree does not change (no insertions
69
+ or deletions), yet restructuring the tree is allowed to speed up future searches. One famous
70
+ dynamic algorithm for doing this is the Splay algorithm of Sleator and Tarjan [20]. After
71
+ each query, the splay algorithm moves the queried item to the root of the tree, according to
72
+ three simple rules called zig-zag, zig-zig and zig. The splay algorithm is efficient in the sense
73
+ that it is able to exploit the structure of many families of sequences. In particular splay is
74
+ proven to be as good as the static optimum (up to a constant factor), which also implies that
75
+ the cost of splay on any given sequence is at most O(log n) times the (dynamic) optimum
76
+ cost. Sleator and Tarjan conjectured that splay is in fact dynamically-optimal, meaning that
77
+ its cost is like the cost of an optimal algorithm that knows the whole sequence of queries
78
+ in advance, up to some constant factor. However, this dynamic-optimality conjecture of
79
+ splay is still open. In fact, it is open whether there is any dynamically-optimal online binary
80
+ search tree algorithm. The best competitive ratio achievable to date is O(log log n), and
81
+ it is obtained by Tango [8], Multi-splay [21] and Chain-splay [11] trees, and a geometric
82
+ divide-and-conquer approach of [1].
83
+ While seeking for (better) guaranteed competitiveness, other dynamic algorithms were
84
+ considered. A promising candidate was independently proposed by Lucas [16] and Munro [18],
85
+ which is now commonly referred to as Greedy Future, henceforth: GF in short. As its name
86
+ suggests, GF is a greedy algorithm that rearranges the nodes on the path from the root to
87
+ the current queried item as a treap whose priorities are according to the future accesses2
88
+ 1 Our cost model is formally defined in Definition 1, in Section 2.
89
+ 2 Each item in a treap has two keys: value and priority. The treap is a binary search tree with respect to
90
+
91
+ Y. Sadeh and H. Kaplan
92
+ 39:3
93
+ (as this paper deals with analyzing GF, we detail it formally in Algorithm 1). Note that
94
+ unlike splay, GF, by definition, is required to know the future in order to restructure the tree.
95
+ Surprisingly however, Demaine et al. [7] showed that one can simulate GF without knowing
96
+ the future by a hierarchy of split-trees while losing only a constant factor in performance.
97
+ Additionally, [7] presented a geometric view of an algorithm serving queries by a dynamic
98
+ binary search tree using a two dimensional grid on which we mark the sequence as well
99
+ as the items accessed by the algorithm. In this presentation there is yet another natural
100
+ promising candidate for dynamic optimality, which is commonly known as Geometric Greedy
101
+ and sometimes simply Greedy, which we shall refer to as GG. [7] showed that GG is in fact
102
+ the same algorithm as GF.
103
+ The geometric view proved useful to obtain new results regarding GG and hence GF.
104
+ Fox [9] proved that an access-lemma that is analogues to the so called access-lemma of splay
105
+ trees holds for GG. From this follows that most of the nice properties that hold for splay also
106
+ hold for GF. In particular, it follows that GF is O(log n) competitive. Chalermsook et al. [3]
107
+ analyzed upper bounds on the cost of GG for access patterns which are permutations, and in
108
+ particular found that for highly structured permutations, which they called k-decomposable,
109
+ the cost is n · 2α(n)O(k) where α(n) is the inverse-Ackermann function. Chalermsook et
110
+ al. [5] study special access patterns that belong to a broader family of pattern-avoiding
111
+ permutations. See [4] for a survey of currently known properties of greedy and splay.
112
+ Our Contributions:
113
+ 1. It is known that GF is not exactly optimal, but it is conjectured, like splay, to be
114
+ optimal up to a constant factor. In fact, it has been even more strongly conjectured
115
+ by Demaine et al. [7] to be optimal up to an additive O(m) term, and possibly even
116
+ exactly m. Kozma [14] refuted the second part and gave a specific sequence for which
117
+ this additive gap is m + 1. In this paper we refute the linear gap conjecture and show a
118
+ family of sequences for which the additive gap is at least Ω(m log log n).
119
+ 2. The largest lower bound on the competitive ratio of GF is 4
120
+ 3 by Demaine et al. [7]. They
121
+ show a family of sequences on which after an initial query, the optimum pays 1.5 on
122
+ average per query while GF pays 2.3 We describe a technique that allows us to improve
123
+ this lower bound to 2. We note that the best known lower bound on the competitive
124
+ ratio of splay is 2 (see [15, Section 2.5]). In both cases, the construction requires a rather
125
+ large number of items (large n).
126
+ 3. Based on the multiplicative lower bound described above we show the following two
127
+ interesting properties of GF: (1) There are sequences X such that the cost of GF on the
128
+ reverse sequence is twice larger than the cost of GF on X. (2) There are sequences X
129
+ such that we can remove some queries from them and get a subsequence X′, such that
130
+ the cost of GF on X′ is twice larger than the cost of GF on X.
131
+ 4. Based on the additive lower bound described above, the two properties of GF in the
132
+ previous bullet also hold if we replace the (multiplicative) relation of “costs twice more”
133
+ by the (additive) relation “costs Ω(m log log n) more”.
134
+ We study subsequences and reversal (contributions 3-4) since any dynamically-optimal
135
+ the values of the items and a heap with respect to their priorities. That is, the priority of an item is
136
+ no larger than the priorities of its children. In our case, the priorities are deterministically defined by
137
+ future requests in a way that we define precisely in Algorithm 1.
138
+ 3 Reddmann [19] found an example in which the cost ratio between GF and the optimum is 26
139
+ 17 ≈ 1.53.
140
+ But this is for one particular sequence of a fixed length so it does not rule out any competitive ratio if
141
+ we allow an additive constant.
142
+ STACS 2023
143
+
144
+ 39:4
145
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
146
+ algorithm A must have a “nice” behavior in these cases. Concretely, A must satisfy the
147
+ approximately-monotone property (Definition 8) which states that there is a fixed constant c
148
+ such that the cost of A on any subsequence of any sequence is never more than c times the
149
+ cost on the whole sequence. As for reversal, the optimum can process a sequence and its
150
+ reversal with similar costs up to a difference of n, thus any dynamically-optimal algorithm
151
+ must be able to do so with costs that differ by at most a constant factor. We discuss this
152
+ motivation in more detail in Section 3 (right after stating Theorem 7).
153
+ Our contributions are all based on the same technique, which is quite simple. We enforce
154
+ GF to maintain a static tree and only query the leaves of this tree. Although being dynamic
155
+ in general, there are some access-patterns that cause GF not to change the tree. By studying
156
+ these patterns, we can study GF on a static tree, and the analysis of its cost simplifies to the
157
+ weighted-average of the depth of the queries (weighted by frequency). To lower-bound the
158
+ gap between GF and OPT, we analyze the average cost that can be saved by promoting the
159
+ items in the leaves to locations closer to the root. Note that any other item can be placed
160
+ further away from the root since it is never queried by the sequence.
161
+ 2
162
+ Model
163
+ In this section we describe the model which we use, and define our notations. First, we note
164
+ that throughout the paper lg x is used to denote the base two logarithm of x.
165
+ We consider a totally ordered universe of (fixed size) n items. For simplicity, one may
166
+ think of the values {1, . . . , n}. The items are organized in some initial BST which we denote
167
+ by T0. Then, a sequence of queries, denoted by X = [x1, x2, . . . , xm], is given, one query at
168
+ a time. We reserve m to denote the length of the sequence. The tree before serving xt is
169
+ denoted by Tt−1. An algorithm has to find the queried value xt, by traversing Tt−1 from
170
+ its root. After finding xt, the algorithm is allowed to re-structure Tt−1 to get Tt. We define
171
+ the cost of the algorithm at time t to be the total number of nodes that were touched at
172
+ time t, both on the path to xt and for restructuring. The cost of an algorithm for the whole
173
+ sequence is simply the sum of its costs over all times. We define it formally below.
174
+ ▶ Definition 1 (Cost). Let X be a sequence of queries, and let T0 be an initial tree. Let A
175
+ be an algorithm that serves X and let Tt be the tree that A has after serving xt. Let Pt be
176
+ the set of nodes on the path from the root to xt in Tt−1 and let Ut be the set of nodes of the
177
+ minimal subtree that contains all the edges that were rotated by A to transform Tt−1 to Tt.
178
+ Then the cost of A for serving X at time t is |Pt ∪ Ut|, and the cost of A for serving X is
179
+ the sum of costs over t = 1, . . . , m. We denote the cost of A to serve X starting with T0 by
180
+ cost(A, X, T0). We denote the average cost per query by ˆc(A, X, T0) = cost(A,X,T0)
181
+ m
182
+ . When T0
183
+ is clear from the context, or immaterial, we write cost(A, X) and ˆc(A, X).
184
+ ▶ Definition 2 (Depth). Let T be a tree. The depth of a node v ∈ T, denoted by d(v), is the
185
+ number of edges in the path from the root to v (in particular d(root) = 0). Note that the
186
+ cost of querying v (without restructuring) is d(v) + 1. We also define the depth of the tree,
187
+ denoted by d(T), as the maximum depth of a node in T, that is d(T) = maxv∈T d(v).
188
+ ▶ Definition 3 (Competitiveness). We say that an algorithm A is (α, β)-competitive for initial
189
+ tree T0 if for any sequence of queries X, it holds that cost(A, X, T0) ≤ α·cost(OPT, X, T0)+β
190
+ where OPT is a best algorithm to serve X given T0 (with full knowledge of X). When we
191
+ do not specify T0 we mean that the relation holds for all initial trees. We refer to α as the
192
+ multiplicative term and to β as the additive term. For ease of language, we regard the
193
+ multiplicative term as the competitive ratio, and also write “the competitive ratio of” instead
194
+
195
+ Y. Sadeh and H. Kaplan
196
+ 39:5
197
+ of “the multiplicative term of the competitiveness of”. In such cases, we assume that the
198
+ additive term is o(m). It is easiest to think of β = O(n) while assuming that m = ω(n).
199
+ To conclude this section, we give a precise description of the GF algorithm, in Algorithm 1.
200
+ We emphasize that its implementation is complex and probably would not be good in practice.
201
+ However, its main benefit is its theoretical value, as a candidate for dynamic optimality.
202
+ Should it be proven to be dynamically-optimal, then we would get a better understanding
203
+ of the problem and also a stepping-stone to analyze simpler algorithms, such as splay, in
204
+ comparison to GF rather than against some “vague” optimum that depends on the sequence.
205
+ Algorithm 1 GreedyFuture (GF) Algorithm
206
+ Input: A sequence of queries X ∈ [n]m and an initial BST T0. We restructure Tt−1
207
+ to Tt after serving the request xt with Tt−1 for t = 1, . . . , m.
208
+ Function Restructure(query value v, current tree Tt−1, future accesses X′):
209
+ Let v1 < v2 < . . . < vk be the nodes on the path from the root of Tt−1 to the
210
+ queried value v (including v and the root). We also define v0 = −∞ and
211
+ vk+1 = +∞. Denote the subtrees hanging off this path by R0, . . . , Rk.
212
+ For each i = 1, . . . , k, let τ(vi) be the index of the first appearance of a query of a
213
+ value x ∈ (vi−1, vi+1) in X′. Restructure the nodes v1, . . . , vk as a treap:
214
+ maintain a BST ordering, while the heap’s priorities are set to be the τ values,
215
+ where the root’s τ is smallest. Tie-break arbitrarily, e.g. in favor of smaller
216
+ values, or smaller depth prior to restructuring. Then, hang the subtrees
217
+ R0, . . . , Rk unchanged at their appropriate locations. The resulting tree is Tt.
218
+ 3
219
+ Stable Sequences and Lower Bounds
220
+ In this section we properly define the family of stable sequences (Definition 11) for which
221
+ the tree maintained by GF is never changed (i.e. the access path of the current query is a
222
+ treap with respect to the suffix of the sequence). To prove our lower bounds we use such
223
+ sequences in which only the items at the leaves of GF are requested, and the internal nodes
224
+ cause some extra cost that OPT avoids. We use a natural way to represent such sequences
225
+ as trees, and use this representation to prove the following lower bounds, which are the main
226
+ results of this section.
227
+ ▶ Theorem 4. If GF is (c, d)-competitive where the additive term d is sublinear in the length
228
+ of the sequence, i.e. d = o(m), then c ≥ 2.
229
+ ▶ Theorem 5. For every n ≥ 2 there exist sequences X ∈ [n]m such that cost(GF, X) =
230
+ cost(OPT, X) + Ω(m · lg lg n). Among these sequences, there exists a sequence whose length
231
+ is m = nΘ(
232
+ lg lg n
233
+ lg lg lg n ). (There exist other longer sequences too.)
234
+ Theorems 4 and 5 enable us to prove the following two theorems, proven in Appendix A.2.
235
+ ▶ Theorem 6. For any ϵ > 0 there exists a sequence X with a subsequence (not necessarily
236
+ consecutive) X′ ⊆ X such that cost(GF, X′) ≥ (2 − ϵ) · cost(GF, X).
237
+ There exists a sequence Y with a subsequence (not necessarily consecutive) Y ′ ⊆ Y such
238
+ that cost(GF, Y ′) − cost(GF, Y ) = Ω(m · lg lg n).
239
+ STACS 2023
240
+
241
+ 39:6
242
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
243
+ ▶ Theorem 7. Let S be a sequence, we define rev(S) to be the sequence S in reverse. For
244
+ any ϵ > 0 there exists a sequence X such that cost(GF, rev(X)) ≥ (2 − ϵ) · cost(GF, X).
245
+ There exists a sequence Y such that cost(GF, rev(Y )) − cost(GF, Y ) = Ω(m · lg lg n).
246
+ The motivation for studying subsequences (Theorem 6) is the fact that OPT always saves
247
+ costs when queries are removed from its sequence. Formally, if X′ ⊆ X, then cost(OPT, X′) ≤
248
+ cost(OPT, X). Indeed, OPT can serve X′ by simulating a run on X. More generally, this
249
+ relation of costs when comparing a sequence to a subsequence of it, is an important property
250
+ which even has a name:
251
+ ▶ Definition 8 (Approximate-monotonicity [12, 15]). An algorithm A is approximately-
252
+ monotone with a constant c if for any sequence X, subsequence X′ ⊆ X, and initial tree T,
253
+ it holds that cost(A, X′, T) ≤ c · cost(A, X, T).
254
+ ▶ Corollary 9. If GF is approximately-monotone with a constant c, then c ≥ 2.
255
+ As noted, OPT is approximately-monotone with c = 1 (strictly monotone). The reason
256
+ that approximate-monotonicity is of interest, in particular for GF, is because it is one of two
257
+ properties that together are necessary and sufficient for any dynamically-optimal algorithm.
258
+ The complementing property, which GF is known to satisfy, is simulation-embedding:
259
+ ▶ Definition 10 (Simulation-Embedding [15]). An algorithm A has the simulation-embedding
260
+ property with a constant c if for any algorithm B and any sequence X, there exists a
261
+ supersequence Y ⊇ X such that cost(A, Y ) ≤ c · cost(B, X). (X is a subsequence of Y , not
262
+ necessarily of consecutive queries.)
263
+ An algorithm A which is approximately-monotone with a constant c1 and has the
264
+ simulation-embedding property with a constant c2 is dynamically-optimal with a constant
265
+ c1 · c2. Indeed, for any sequence X, there is some supersequence Y (X) ⊇ X such that
266
+ cost(A, X) ≤ c1 · cost(A, Y (X)) ≤ c1 · c2 · cost(OPT, X). Harmon [12] proved that GG, and
267
+ hence GF, has the simulation-embedding property, hence GF is dynamically-optimal if and
268
+ only if it is approximately-monotone. An alternative indirect proof was given by [6], proving
269
+ that GG is O(1)-competitive versus the move-to-root algorithm, therefore inheriting the
270
+ property from move-to-root.
271
+ The motivation for studying reversal (Theorem 7) is that OPT is oblivious to reversing
272
+ the sequence of queries, up to an additive difference of n. Indeed, to serve a sequence X in
273
+ reverse, we can pay n to restructure the initial tree T0 to the final tree Tm, and then “reverse
274
+ the arrow of time”: when serving query xt, also modify the tree from Tt to Tt−1 where Ti is
275
+ the tree that OPT would get by the end of processing the i-th query of X, in order. This
276
+ means that any dynamically-optimal algorithm must be able to serve a sequence of requests
277
+ and its reverse with the same cost up to a constant factor. Theorem 7 does not disprove
278
+ dynamic-optimality for GF, but gives some insight of how reversal affects GF.
279
+ 3.1
280
+ Maintaining a Static Tree for GF
281
+ In this section we describe the basic “tool” which we use to fix a tree structure for GF despite
282
+ its dynamic nature. That is, we describe a class of sequences which we call mixed-stable
283
+ sequences such that GF never restructures its tree when serving a sequence in this class.
284
+ For the sake of simplicity, we assume that the initial tree is structured as we need it to be.
285
+ Appendix A.1 explains how to enforce a specific “initial” tree given an arbitrary initial tree,
286
+ and also argues why this minor issue does not affect the competitive ratio of GF.
287
+
288
+ Y. Sadeh and H. Kaplan
289
+ 39:7
290
+ As noted, our objective is to produce a sequence that “tricks” GF into having unnecessary
291
+ nodes in the core of the tree, such that the requested values are only at the leaves. As
292
+ an example, consider the classic sequence of queries X = [1, 3, 1, 3, . . .] with an initial tree
293
+ containing 2 at the root, 1 as a left child of the root and 3 as a right child of the root.
294
+ Because of the alternating pattern, GF never re-structures the tree, and the cost per query
295
+ is 2 rather than 1.5 on average (e.g. when 1 is in the root, and 3 is its right child).
296
+ ▶ Definition 11 (Stable Nodes and Sequences). Let T be a full binary search tree, and let X
297
+ be a sequence of queries over the items in the leaves of T. We define the stability of nodes as
298
+ follows, see also Figure 1.
299
+ We say that an inner node v in T is strongly-stable if it has two children, and the
300
+ subsequence of X consisting only of the items in the subtree of v, alternates between accesses
301
+ to the left and right subtrees of v.
302
+ We say that an inner node v with a left child u in T is weakly-stable with a left-bias if
303
+ both v and u have two children, and the subsequence of X consisting only of the items in the
304
+ subtree of v, repeats the following 3-cycle. First it accesses the left-subtree of u, then the
305
+ right subtree of u, and finally right subtree of v. (It is left-biased because 2
306
+ 3 of the accesses
307
+ are to the left of v). Symmetrically, we say that v is weakly-stable with a right-bias if v has
308
+ two children, its right child u has two children, and the restriction of X to accesses in the
309
+ subtree of v repeats a 3-cycle consisting of an access to the right subtree of u, the left subtree
310
+ of u, and the left subtree of v. Notice that u is a strongly-stable node by definition, and we
311
+ refer to it as the favored-child of v.
312
+ We regard the sequence X as being induced by the tree T with stability “attached” to its
313
+ inner nodes. We assume that every node is stable, and refer to X as a mixed-stable sequence
314
+ and to T as a mixed-stable tree. We distinguish two special cases: If all inner nodes are
315
+ strongly-stable then we refer to X and T as strongly-stable, and if exactly half of the inner
316
+ nodes of T are weakly-stable then we refer to X and T as weakly-stable (recall that each
317
+ weakly-stable node has a strongly-stable favored-child).
318
+ Figure 1 Node and sequence stability (Definition 11). First, consider the repeated sequence
319
+ 421, i.e. X = 421421421 . . .. Then v is a weakly-stable right-biased node because its visits pattern
320
+ is a repetition of right(u), left(u), left(v). u is a strongly-stable node because its visits pattern
321
+ is right(u), left(u). w is not stable at all, because its visits pattern is always left(w). Second,
322
+ consider the repetition of the access pattern 12141314. One can verify that all three inner nodes
323
+ are strongly-stable. Hence, this is a strongly-stable sequence. Third, note that no weakly-stable
324
+ sequence corresponds to the figure, because it requires an even number of inner nodes, but if we
325
+ make w a leaf (removing 2, 3), then the repeated access pattern of 4w1 is a weakly-stable sequence.
326
+ To motivate Definition 11 a little, note that the sequence X = [1, 3, 1, 3, . . .] is a strongly-
327
+ stable sequence that corresponds to a tree over the items {1, 2, 3} where 2 is in the root.
328
+ X yields a lower-bound of 4
329
+ 3 on the competitive ratio of GF. Similarly, the sequence X′ =
330
+ [5, 3, 1, 5, 3, 1, . . .] is a weakly-stable sequence that corresponds to the tree over {1, 2, 3, 4, 5}
331
+ with 2 at the root and 4 its right-child. X′ yields a lower-bound of 8
332
+ 5 on the competitive ratio
333
+ of GF, which is already an improvement over the best known lower bound, see also Figure 2.
334
+ The distinction between strongly-stable and weakly-stable nodes is that GF may modify
335
+ STACS 2023
336
+
337
+ 39:8
338
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
339
+ (a) X = [1, 3, 1, 3, . . .]
340
+ (b) X′ = [5, 3, 1, 5, 3, 1, . . .]
341
+ Figure 2 Examples of the simplest strongly-stable (a) and weakly-stable (b) sequences. Their
342
+ corresponding trees are the left tree in each pair while the right tree in each pair is an optimized static
343
+ tree to serve the same sequence. Queried nodes are colored in blue. One can verify that ˆc(X, GF) = 2
344
+ and ˆc(X′, GF) = 8
345
+ 3 while based on the optimized tree, ˆc(X, OPT) ≤ 3
346
+ 2 and ˆc(X′, OPT) ≤ 5
347
+ 3.
348
+ the structure of the tree when a weakly-stable node is considered, but only temporarily and
349
+ without affecting the cost. In our example with X′, after querying 5, GF may put 4 in the
350
+ root instead of 2, but following the query of 3 this change will be reverted.
351
+ Motivated by the power of stable sequences over small trees, we proceed to a more general
352
+ analysis of stable sequences.
353
+ ▶ Definition 12 (Atomic Sequence). A tree T, along with stability type (weak/strong) for
354
+ each node, and a subtree of each node to be accessed initially, induce a stable sequence. This
355
+ sequence is unique up to its length, which can be extended indefinitely. We define the “atomic
356
+ unit” of this sequence as the shortest sequence X such that any repetition of X is also a
357
+ stable sequence that corresponds to T.
358
+ Throughout the paper we work with whole multiples of the atomic sequence. Moreover,
359
+ unless stated otherwise, we work with the atomic sequence itself (a single repetition).
360
+ ▶ Lemma 13. Let X be a mixed-stable sequence with respect to a tree T. Then every leaf u
361
+ is visited once every 2a(u) · 3b(u) queries where a(u) and b(u) are non-negative integers. In
362
+ particular, the atomic length of X is 2maxleaf u a(u) · 3maxleaf u b(u) (the lcm). Moreover, if X
363
+ is strongly-stable then ∀u : b(u) = 0, and if X is weakly-stable then ∀u : a(u) = 0.
364
+ Proof. Consider a leaf u. Define the frequency of visiting an ancestor w of u to be the
365
+ frequency of accessing a leaf in the subtree of w. If w is a strongly-stable ancestor then the
366
+ frequency of visiting a child of w is 1
367
+ 2 of the frequency of visiting w. If w is weakly-stable, v
368
+ is its favored-child, and x is a child of v then the frequency of visiting x is 1
369
+ 3 of the frequency
370
+ of visiting w. Similarly if w is weakly-stable, v is its non-favored-child then the frequency
371
+ of visiting v is 1
372
+ 3 of the frequency of visiting w. It follows that u is visited exactly once
373
+ every 2a(u) · 3b(u) queries where a(u) is the number of strongly-stable nodes that are not
374
+ favored-children (there are no such nodes if X is weakly-stable), and b(u) is the number of
375
+ weakly-stable nodes (no such nodes if X is strongly-stable), on the path to u. Finally, since
376
+ every leaf u is visited with a specific period, the whole sequence has a period which is the
377
+ lcm of all periods.
378
+
379
+ ▶ Lemma 14. Let X be a mixed-stable sequence with respect to a tree T. If GF serves
380
+ X with T as initial tree, and breaks ties in favor of nodes of smaller-depth, then it never
381
+ restructures T.
382
+ Proof. The proof is by induction on the size of the tree. If T has a single node, then it is
383
+ trivial. Otherwise, the root r is an inner-node, and we prove that it always remains the root.
384
+
385
+ Y. Sadeh and H. Kaplan
386
+ 39:9
387
+ It then follows, by restricting the access sequence to values within each subtree, that the rest
388
+ of the tree remains fixed as well. We use the notations of τ(v) and vi as in Algorithm 1.
389
+ First, consider the case that r is a strongly-stable node (Definition 11). Given an access
390
+ to some value x in the left subtree of r, by definition, the next access would be to a value
391
+ in the right subtree of r, hence τ(r) < τ(vi) for any vi ̸= r on the path from r to x, and
392
+ therefore GF will keep r in the root. The same argument holds if x is in the right subtree of
393
+ r, and the next access is in the left subtree.
394
+ Next, consider the case that r is a weakly-stable node. Without loss of generality, assume
395
+ that it is left-biased, and denote its favored-child (left child) by u. Denote the left and right
396
+ subtrees of u by A and B respectively, and the right subtree of r by C. The access pattern
397
+ of subtrees is ABC(ABC . . .).
398
+ If the current access was to some x ∈ A, both r and u have been touched. The next
399
+ access queries in B, so τ(u) = τ(r) < τ(vi) for any vi ̸= u, r on the access path to x.
400
+ Since GF tie-breaks in favor of smaller-depth, it will keep r in the root.4
401
+ If the current access was to some x ∈ B, then both r and u have been touched. The next
402
+ access touches C, so τ(r) < τ(vi) for any vi ̸= r on the access path to x, including u,
403
+ thus r must remain the root.
404
+ If the current access was to some x ∈ C, since the next access touches A, τ(r) < τ(vi) for
405
+ any vi ̸= r on the access path to x, thus r must remain the root. In this case u was not
406
+ touched, but nonetheless it remains the left child of r.
407
+
408
+ ▶ Lemma 15. If X is a mixed-stable sequence, the frequency of accessing x ∈ X is in the
409
+ range of [
410
+ 1
411
+ 3d(x) ,
412
+ 1
413
+ 3d(x)/2 ]. In particular, if X is strongly-stable then the frequency equals
414
+ 1
415
+ 2d(x) .
416
+ Proof. The frequency of visiting a node depends on the path to it.
417
+ The frequency is
418
+ multiplied by 1
419
+ 2 when passing through a strongly-stable node, and multiplied by either 1
420
+ 3 or
421
+ 2
422
+ 3 when passing through a weakly-stable node. Every factor of 2
423
+ 3 is followed by 1
424
+ 2, due to
425
+ the strongly-stable favored-child of the weakly-stable node. Thus the frequency is bounded
426
+ between
427
+ 1
428
+ 3d(x) and
429
+ 1
430
+ 2d(x)/2 ·
431
+ � 2
432
+ 3
433
+ �d(x)/2 =
434
+ 1
435
+ 3d(x)/2 .
436
+
437
+ ▶ Corollary 16. Let X be a strongly-stable sequence, then: ˆc(GF, X) = �
438
+ x∈X
439
+ d(x)+1
440
+ 2d(x) .
441
+ 3.2
442
+ Promotions and Recursive Trees
443
+ The way in which we show our lower bounds relies on the fact that serving the leaves of a
444
+ static tree is sub-optimal, since a trivial static optimization is to move the leaves closer to
445
+ the root. We refer to this operation as a promotion of the leaf that we move. We emphasize
446
+ that for the purpose of our result, we analyze the improvement one gets from promotions,
447
+ but the actual OPT, which is dynamic, may be able to reduce the cost further.
448
+ ▶ Definition 17 (Promotion). Consider trees T and T ′. We say that a node x was promoted
449
+ in T ′ by h (with respect to T), if dT (x) − dT ′(x) = h. Given a mixed-stable sequence X, the
450
+ average promotion of T to T ′ is the weighted average promotion in T ′ of the nodes of T,
451
+ weighted by the query frequencies of the nodes.
452
+ 4 This is the reason we defined this kind of access pattern as weakly-stable, because the stability can be
453
+ chosen, but is not forced. We emphasize that putting u as a parent of r will not make the next access
454
+ cheaper as both u and r will be touched anyway, and then r will be reinstated as the root.
455
+ STACS 2023
456
+
457
+ 39:10
458
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
459
+ By definition, static optimization of a tree T to T ′ for a mixed-stable sequence X, implies
460
+ a cost improvement for OPT which is at least the average promotion of T to T ′, per query.
461
+ Intuitively, promoting leaves that are closer to the root contributes more to the average
462
+ promotion than promoting deeper leaves since the access frequencies decrease exponentially
463
+ with depth. That being said, our promotion scheme will be relatively uniform, promoting
464
+ most leaves by roughly the same amount, as in the following example.
465
+ ▶ Example 18. To clarify promotions, consider Figure 3. There, we can safely promote every
466
+ node by one, except for one of the deepest nodes. Therefore, we immediately conclude that for
467
+ the corresponding strongly-stable sequence X, we have: ˆc(GF, X) ≥ ˆc(OPT, X) + (1 −
468
+ 1
469
+ 2n ).
470
+ (a) Before promotions.
471
+ (b) After promotions.
472
+ Figure 3 (a) A tree which induces a strongly-stable sequence X, only blue nodes are queried.
473
+ The frequency of querying an odd number v = 2i − 1 in this tree is
474
+ 1
475
+ 2i except for v = 2n + 1 which
476
+ has the same frequency as v = 2n − 1. (b) An improved static tree, in which each node except for
477
+ one has been promoted one step closer to the root. The cost of serving X over this tree is cheaper
478
+ by almost 1 per query.
479
+ We define our trees using recursive structures.
480
+ ▶ Definition 19. A recursive tree, Tr, of depth r is defined by a specific full binary tree T
481
+ (independent of r) such that at least one of its leaves is an actual leaf, and some of its leaves
482
+ are roots of recursive trees, Tr−1, of depth r − 1. We refer to the inner nodes of T as the
483
+ trunk of Tr, and define T0 to be a single node. See Figure 4 for two examples.5
484
+ Figure 4 Two recursive trees of depth r. Each of the trees T and F is a full binary tree with
485
+ at least one actual leaf (in blue), and some hanging subtrees. At the bottom of the recursion (for
486
+ r = 0), the subtrees are nodes. Note that: (a) Expanding T for r = n results in the tree in Figure 3;
487
+ (b) The pattern F is important for Theorem 4.
488
+ 5 The name of the pattern F in Figure 4, stands for Fibonacci: One can verify that for r ≥ 2, the number
489
+ of leaves at depth 1 ≤ d ≤ r − 1 is the (d − 1)th Fibonnaci number Fd−1 (we define F0 = 0). Moreover,
490
+ this can be used to prove the nice equation: �∞
491
+ d=0
492
+ Fd
493
+ 2d = 2.
494
+
495
+ 2n- 1
496
+ 2n + 12n - 1
497
+ 2n :
498
+ 2n + 1Y. Sadeh and H. Kaplan
499
+ 39:11
500
+ 3.3
501
+ Multiplicative Lower Bound for GF
502
+ In this section we prove Theorem 4. We do it by describing a concrete weakly-stable sequence,
503
+ whose average cost per query is 6 while an average promotion of 3 is possible, resulting in an
504
+ optimal cost of at most 3. We start by stating a purely mathematical lemma that will be
505
+ used in the analysis.
506
+ ▶ Lemma 20. Let br be a sequence defined by an initial value b0 and the relation br =
507
+ α · br−1 + β + γ · r
508
+ 2r for some constants α, β, γ where α ̸= 1
509
+ 2, 1. Then br =
510
+ β
511
+ 1−α(1 − αr) + αr ·
512
+ b0 +
513
+ 2αγ
514
+ (2α−1)2 ·(αr − 1
515
+ 2r )−
516
+ γ
517
+ (2α−1) · r
518
+ 2r . In particular, when γ = 0 then br =
519
+ β
520
+ 1−α(1−αr)+αr ·b0.
521
+ Proof Sketch. Either use induction, or “guess” that a geometric sequence yr with a multiplier
522
+ of α satisfies yr = p · r
523
+ 2r + q · 1
524
+ 2r + s + br, and determine the fixed coefficients p, q, s.
525
+
526
+ ▶ Lemma 21. Let X be a weakly-stable sequence implied by the recursive tree Fr in Figure 4,
527
+ where the root is a weakly-stable node with a right-bias. Then for any ϵ > 0, there is a
528
+ sufficiently large recursive depth r such that (1) ˆc(GF, X) > 6 − ϵ, (2) a static optimization
529
+ of the tree saves an average cost of at least 3 − ϵ, and (3) regardless of r, ˆc(OPT, X) < 3.
530
+ Proof. Let cr denote the average cost of serving X with Fr.
531
+ Then c0 = 1 and cr =
532
+ 1
533
+ 3(cr−1 + 1) + 1
534
+ 3 · 3 + 1
535
+ 3(cr−1 + 2) =
536
+ 2
537
+ 3cr−1 + 2, which yields by Lemma 20 that cr =
538
+ 2
539
+ 1−2/3(1 − (2/3)r) + (2/3)r · 1 = 6 · (1 − (2/3)r) + (2/3)r. To analyze the average promotion,
540
+ we re-structure Fr to a new static structure F ′
541
+ r as follows, see Figure 5. The leaf is moved
542
+ to the root, whose children are the recursive subtrees, optimized themselves by the same
543
+ logic. The old root is moved to be a right child of the maximal value in the new left subtree,
544
+ and the old right-child (of the old-root) is moved to be a left child of the minimal value in
545
+ the new right subtree. F ′
546
+ r maintains the order of values as was in Fr. The demotions of the
547
+ old root and its right child do not affect the cost, because X does not query these values.
548
+ Denote by pr the average promotion of Fr to F ′
549
+ r. Then p0 = 0 since nothing is promoted for
550
+ a singleton, and pr = 1
551
+ 3pr−1 + 1
552
+ 3 · 2 + 1
553
+ 3(pr−1 + 1) = 2
554
+ 3pr−1 + 1. Again by Lemma 20 we get
555
+ that pr =
556
+ 1
557
+ 1−2/3(1 − (2/3)r) + (2/3)r · 0 = 3 · (1 − (2/3)r). Observe that for r → ∞ we get
558
+ that cr → 6 and pr → 3, thus parts (1) and (2) of the claim follow. For part (3), observe
559
+ that cr − pr = 6 · (1 − (2/3)r) + (2/3)r − 3 · (1 − (2/3)r) = 3 − 2 · (2/3)r < 3.
560
+
561
+ (a) F-tree pattern.
562
+ (b) Promotion scheme.
563
+ Figure 5 The F-tree pattern and its promotion scheme in Lemma 21.
564
+ Only the top-level
565
+ promotions are presented in (b), but more promotions are done recursively within each subtree.
566
+ ▶ Theorem 4. If GF is (c, d)-competitive where the additive term d is sublinear in the length
567
+ of the sequence, i.e. d = o(m), then c ≥ 2.
568
+ Proof. Assume by contradiction that GF is (2 − δ, f(m))-competitive for some δ > 0
569
+ and a function f(m) = o(m). Let X′ be a sequence that consists of s repetitions of the
570
+ atomic weakly-stable sequence that corresponds to the recursive tree Fr. It follows that
571
+ ˆc(GF, X′) ≤ (2 − δ) · ˆc(OPT, X′) + f(|X′|)
572
+ |X′| . By Lemma 21, we can choose r large enough such
573
+ STACS 2023
574
+
575
+ Fr:
576
+ Fr-139:12
577
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
578
+ that ˆc(GF, X′) > 6 − δ, and regardless of r, ˆc(OPT, X′) < 3. Then, since f is sub-linear, we
579
+ can choose the number of repetitions s to be large enough such that f(|X′|)
580
+ |X′|
581
+ < 2δ. But then
582
+ we also get that ˆc(GF, X′) < (2 − δ) · 3 + 2δ = 6 − δ, which is a contradiction.
583
+
584
+ By Analyzing mixed-stable sequences we proved a lower bound of 2 on the competitve
585
+ ratio of GF. Theorem 22 gives an upper bound.
586
+ ▶ Theorem 22. Let X be a mixed-stable sequence and let T be the tree that corresponds to
587
+ it. Then cost(GF, X, T) < c · cost(OPT, X, T) for c = 5
588
+ 2. If X is strongly-stable, then c = 2.
589
+ We defer the proof of Theorem 22 to Appendix A.2. The upper-bound in Theorem 22 is
590
+ clearly not tight, since in the proof of Theorem 22 we neglected a term using the inequality
591
+ ˆc(GF, X) ≤
592
+ 2
593
+ α · ˆc(OPT, X) − 1
594
+ α
595
+
596
+ 1 − n−1
597
+ 2m
598
+
599
+ <
600
+ 2
601
+ α · ˆc(OPT, X), for a constant α. The lack
602
+ of tightness is more prominent when ˆc(OPT, X) is small, like in the sequence studied in
603
+ Lemma 21 (for Theorem 4). We suspect that the lower bound in Theorem 4 is tight, and
604
+ more strongly, that the F-tree pattern is the best pattern to use. This is based on studying
605
+ several other recursive patterns, including those in Figure 4 and Figure 6: None was stronger,
606
+ and it also seems that patterns with large costs do not “compensate” with large enough
607
+ promotions.
608
+ As a closing remark to the multiplicative results, we note that by the static optimality
609
+ theorem for GG [9], competitive analysis against a static algorithm (i.e. an algorithm that
610
+ does not change its initial tree) cannot show a super-constant lower bound. Concretely,
611
+ the theorem states that cost(GF, X) ≡ cost(GG, X) = O(m + �n
612
+ i=1 ni lg m
613
+ ni ) and one can
614
+ verify that the actual constants are 5m + 6 �n
615
+ i=1 ni lg m
616
+ ni . This bound can be re-written as
617
+ 5m + 6m · H2(X) where H2(X) = �n
618
+ i=1
619
+ ni
620
+ m lg m
621
+ ni is the base-2 entropy of the frequencies of
622
+ the values in X. By [17], cost(OPT s, X) ≥ m · H2(X)
623
+ lg 3
624
+ where OPT s is the static optimum,
625
+ and therefore cost(GF, X) ≤ (5 + 6 lg 3) · cost(OPT s, X). Thus, no static argument can show
626
+ a lower bound larger than ≈ 11.59.
627
+ 3.4
628
+ Additive Lower Bounds for GF
629
+ In this section we move on to analyze the additive gap between GF and OPT. For this,
630
+ we construct and analyze more elaborate patterns of recursively-defined trees, in order to
631
+ get a large average promotion when optimizing the structure of the trees. The analysis is
632
+ more involved since we cannot simply assume that the depth of the recurrence, r, approaches
633
+ infinity. Here n is a function of r and the difference of cost can be meaningful in terms of n
634
+ only if n is finite.
635
+ ▶ Definition 23. For k ≥ 2, and r ≥ 0 we define a (k, r)-tree Tr as follows. The tree is
636
+ recursive of depth r (as in Definition 19), such that its trunk is composed of a root and a
637
+ left-chain of length k − 1 that starts in the right-child of the root. The left child of the deepest
638
+ node of the trunk is an actual leaf, and the rest of the leaves are Tr−1 subtrees. T0 is a single
639
+ node. See Figure 6. When k is clear from the context, we also refer to the tree as Tr.
640
+ Observe that the tree Fr that was used to prove Theorem 4 is in fact a (k, r)-tree with
641
+ k = 2. When we conclude the analysis, we will get the two ends of a “tradeoff” such that
642
+ on the one end we have a relatively high cost ratio, and on the other a relatively high cost
643
+ difference. Moreover, we will show that the higher the difference of costs on a sequence
644
+ induced by (k, r)-tree, the closer the cost ratio is to 1 (comparing GF to OPT).
645
+ ▶ Lemma 24. The depth of a (k, r)-tree is k · r, and its left-most node is at depth r.
646
+
647
+ Y. Sadeh and H. Kaplan
648
+ 39:13
649
+ (a) (k, r)-tree pattern.
650
+ (b) Promotion scheme. The main gain is due to the first step.
651
+ Figure 6 (a) The recursive pattern of a (k, r)-tree, Tr. The trunk of the tree has k nodes: the
652
+ root, and a chain of k − 1 nodes leading to an actual leaf. The rest of the leaves are (k, r − 1)-trees.
653
+ (b) The promotion scheme used later in Lemma 26, exemplified for k = 4 (see also Figure 5 for the
654
+ degenerate case of k = 2). The main gain is from the first step of promoting the actual leaf to the
655
+ root, and its sibling subtree (marked with +) one step upwards. Additional gain is achieved by
656
+ promoting the left-most node of each hanging right subtree to the trunk at the expense of demoting
657
+ trunk nodes. More promotions are done recursively within each subtree. The nodes marked 0, 1, 2
658
+ are indeed consecutive, and also: 2 < x and x + 1 = w < y = z − 1.
659
+ Proof. Trivial by induction: For r = 0, the deepest node is the root, at depth 0. For r ≥ 1,
660
+ observe that the deepest node belongs to the deepest subtree Tr−1, which is rooted at depth
661
+ k since the path to it includes k trunk nodes. Similarly, the depth of the left-most node is
662
+ increased by 1 per recursive level of the tree.
663
+
664
+ ▶ Lemma 25. Let Tr be a (k, r)-tree. Then |Tr| = (2 +
665
+ 2
666
+ k−1)kr − (1 +
667
+ 2
668
+ k−1) where |Tr| is the
669
+ number of nodes in Tr. In rougher terms, |Tr| = Θ(kr).
670
+ Proof. Denote nr = |Tr|. By definition, n0 = 1 and nr = (k + 1) + k · nr−1. Hence, by
671
+ Lemma 20 (with γ = 0): nr = k+1
672
+ 1−k(1 − kr) + kr = (2 +
673
+ 2
674
+ k−1)kr − (1 +
675
+ 2
676
+ k−1).
677
+
678
+ ▶ Lemma 26. Let X be any mixed-stable sequence corresponding to a (k, r)-tree Tr. Denote
679
+ the average weighted promotion possible in Tr by pr, where weighting is according to the
680
+ frequency of querying each leaf. Then pr > k · (1 − αr) for α = 1 − 1
681
+ 3k . In particular, if X is
682
+ a strongly-stable sequence, then pr = (k + 1) · (1 − αr) + δ for α = 1 −
683
+ 1
684
+ 2k and 0 ≤ δ < αr.
685
+ Proof. We can promote by k every explicit leaf in every Tr′ for all recursive levels 1 ≤ r′ ≤ r,
686
+ from its location to the root of Tr′. Only nodes that are T0 leaves do not contribute an explicit
687
+ promotion of at least k, therefore pr > k · (1 − f) where f is the sum of query-frequencies of
688
+ all T0 leaves (the inequality is strict due to unaccounted subtree promotions). To conclude,
689
+ we argue that f ≤ (1 −
690
+ 1
691
+ 3k )r. The frequency of accessing the explicit leaf of Tr is at least
692
+ 1
693
+ 3k by Lemma 15, hence with frequency of at most 1 −
694
+ 1
695
+ 3k we query a value in some Tr−1
696
+ subtree. Similarly, within the chosen subtree there is again a relative frequency of at most
697
+ 1 −
698
+ 1
699
+ 3k to query within some Tr−2 subtree. Overall, since there are r levels of recursion, we
700
+ conclude that f ≤ (1 −
701
+ 1
702
+ 3k )r.
703
+ Proving the second part of the claim required a more careful analysis. We define the
704
+ following method of promotion, depicted in Figure 6. In the (k, r)-tree we promote the
705
+ (only) explicit leaf to the root, and promote its sibling subtree by 1. Then we apply similar
706
+ promotions recursively within every (k, r − 1)-subtree. Finally, we promote the left-most
707
+ node within each (k, r − 1)-subtree that hangs as a right-subtree from the trunk to the parent
708
+ of this subtree. Denote the total average (weighted) promotion by pr. Note that it does not
709
+ matter if we promote the left-most nodes of the right subtrees before or after the recursive
710
+ promotions, because the total order on the items guarantees that there is only one value
711
+ STACS 2023
712
+
713
+ nodes
714
+ Tr-039:14
715
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
716
+ that can be put instead of every demoted trunk node, and the recursive promotions within a
717
+ specific subtree do not change the depth of its leftmost leaf.
718
+ The promotion of the explicit leaf of Tr saves a cost of k weighted by a factor (query
719
+ frequency) of
720
+ 1
721
+ 2k . The promotion of the sibling subtree saves 1 weighted by a factor of
722
+ 1
723
+ 2k .
724
+ The recursive promotions are pr−1 weighted by �k
725
+ i=1
726
+ 1
727
+ 2i (for all the k subtrees), and finally
728
+ the last promotions are technically negligible (as seen in the analysis below), but for the
729
+ sake of completeness we consider them in the analysis as well: promoting the left-most node
730
+ from each subtree saves (r − 1) + 1 = r since the leaf that we promote last is at depth r − 1
731
+ within the recursive subtree, and this promotion is weighted by
732
+ 1
733
+ 2r · �k−1
734
+ i=2
735
+ 1
736
+ 2i (factor of
737
+ 1
738
+ 2r
739
+ follows from Lemma 24). We get that: pr = k+1
740
+ 2k + pr−1 ·
741
+
742
+ 1 −
743
+ 1
744
+ 2k
745
+
746
+ + r
747
+ 2r · 1
748
+ 2
749
+
750
+ 1 −
751
+ 1
752
+ 2k−2
753
+
754
+ . Then
755
+ by Lemma 20, with α = 1 −
756
+ 1
757
+ 2k and γ = 1
758
+ 2(1 −
759
+ 1
760
+ 2k−2 ), we get:
761
+ pr = (k + 1) · (1 − αr) + δ
762
+ ,
763
+ δ ≡ αr · p0 +
764
+ 2αγ
765
+ (2α − 1)2 ·
766
+
767
+ αr − 1
768
+ 2r
769
+
770
+
771
+ γ
772
+ (2α − 1) · r
773
+ 2r
774
+ It remains to show that 0 ≤ δ < αr. It is simple to see that δ = 0 for k = 2, because then
775
+ γ = 0 and p0 = 0 is the average weighted promotion in a tree with a single node. For k ≥ 3,
776
+ by the definition of α and γ we have that
777
+ 2αγ
778
+ (2α−1)2 = (2k−1)(2k−4)
779
+ (2k−2)2
780
+ = 1 −
781
+ 1
782
+ 2k−4+ 4
783
+ 2k ∈ ( 3
784
+ 4, 1) and
785
+ γ
786
+ 2α−1 = 1
787
+ 2 −
788
+ 1
789
+ 2k−2 ∈ [ 1
790
+ 3, 1
791
+ 2). Substituting these bounds and p0 = 0 into the formula for δ gives
792
+ δ < αr. Moreover, δ is positive since δ > 3
793
+ 4(αr − 1
794
+ 2r )− 1
795
+ 2 · r
796
+ 2r = 3
797
+ 4(α− 1
798
+ 2)·�r−1
799
+ i=0 αi ·
800
+ � 1
801
+ 2
802
+ �r−1−i−
803
+ r
804
+ 2r+1 = 3(α− 1
805
+ 2 )
806
+ 2r+1
807
+ · �r−1
808
+ i=0 (2α)i −
809
+ r
810
+ 2r+1 > 3(α− 1
811
+ 2 )
812
+ 2r+1
813
+ · r −
814
+ r
815
+ 2r+1 = (3( 1
816
+ 2 − 1
817
+ 2k ) − 1) ·
818
+ r
819
+ 2r+1 > 0 for k ≥ 3.
820
+ Note that indeed the gain from promoting the left-most node of each subtree is negligible,
821
+ since the effect is merely having γ ̸= 0, which only contributes 0 ≤ δ < αr < 1.
822
+
823
+ ▶ Corollary 27. The average cost-per-query of GF on a strongly-stable sequence induced
824
+ by a (k, r)-tree is larger than the optimal cost by at least (k + 1) ·
825
+
826
+ 1 −
827
+
828
+ 1 −
829
+ 1
830
+ 2k
831
+ �r�
832
+ . On any
833
+ mixed-stable sequence, the difference is at least k ·
834
+
835
+ 1 −
836
+
837
+ 1 −
838
+ 1
839
+ 3k
840
+ �r�
841
+ .
842
+ We are ready to prove Theorem 5.
843
+ ▶ Theorem 5. For every n ≥ 2 there exist sequences X ∈ [n]m such that cost(GF, X) =
844
+ cost(OPT, X) + Ω(m · lg lg n). Among these sequences, there exists a sequence whose length
845
+ is m = nΘ(
846
+ lg lg n
847
+ lg lg lg n ). (There exist other longer sequences too.)
848
+ Proof. Let X be the strongly-stable sequence induced by a (k, r)-tree Tr, and for simplicity
849
+ assume that the initial tree is Tr.6 By Lemma 25, n = (2+
850
+ 2
851
+ k−1)kr−(1+
852
+ 2
853
+ k−1) therefore lg lg n =
854
+ lg r + lg lg k + O(1).7 By Corollary 27, ˆc(GF, X) − ˆc(OPT, X) ≥ ∆ ≡ (k + 1) · (1 − (1 − 1
855
+ 2k )r).
856
+ By choosing r = 2k we get that ∆ = (k + 1) · (1 − (1 −
857
+ 1
858
+ 2k )2k) ≈ (1 − 1
859
+ e) · (k + 1).8 We
860
+ also get that lg lg n = k + lg lg k + O(1), therefore ∆ ≈ (1 − 1
861
+ e) lg lg n and we conclude that
862
+ ˆc(GF, X) − ˆc(OPT, X) ≥ Ω(lg lg n).
863
+ By Lemma 13 the length of the atomic strongly-stable sequence of Tr is m = 2d(Tr), hence
864
+ m = 2rk by Lemma 24. By Lemma 25, n+(1+2/(k−1))
865
+ 2+2/(k−1)
866
+ = kr = 2r lg k. Together we get that
867
+ m = 2rk = 2(r lg k)·(k/ lg k) =
868
+
869
+ n+(1+2/(k−1))
870
+ 2+2/(k−1)
871
+ �(k/ lg k)
872
+ = nΘ(
873
+ lg lg n
874
+ lg lg lg n ).
875
+
876
+ 6 We remove this assumption in Remark 35.
877
+ 7 k ≥ 2 ⇒ kr ≤ n < 4kr ⇒ lg n = r lg k + c for c ∈ [0, 2), and so lg lg n = lg r + lg lg k + O(1).
878
+ 8 The approximation is off by less than 10% for k ≥ 2. (60% and 20% for k = 0, 1 respectively.)
879
+
880
+ Y. Sadeh and H. Kaplan
881
+ 39:15
882
+ ▶ Remark 28. In the proof of Theorem 5, the sequence X does not have to be strongly-
883
+ stable, and any mixed-stable sequence X induced by a (k, r)-tree Tr works as well. Indeed,
884
+ Corollary 27 guarantees that ˆc(GF, X)−ˆc(OPT, X) ≥ ∆ for ∆ = k·
885
+
886
+ 1−
887
+
888
+ 1− 1
889
+ 3k
890
+ �r�
891
+ , and then
892
+ by choosing r = 3k we get that ∆ = Θ(k), and k = Θ(lg lg n), and m = 2Θ(rk) = nΘ(
893
+ lg lg n
894
+ lg lg lg n ).
895
+ ▶ Remark 29. The choice of r = 2k in the proof of Theorem 5 maximizes our lower
896
+ bound on the additive gap cost(GF, X) − cost(OPT, X) (up to constants) for our (k, r)-
897
+ trees. Indeed, revisiting the proof, we have that ∆ and n are both functions of k and r,
898
+ and we need to choose r and k to maximize ∆ as a function of n. Note that ∆ = O(k)
899
+ regardless of r, and lg lg(n) = lg r + lg lg k + O(1). To simplify and eliminate a parameter
900
+ we define r = 2k · f(k) for some monotone function f. Now we get simplified relations:
901
+ ∆ = (k+1)·(1−(1− 1
902
+ 2k )2kf(k)) ≈ (k+1)·(1−e−f(k)) and lg lg n = k+lg f(k)+lg lg k+O(1).
903
+ Consider the following two cases.
904
+ If f(k) = Ω(1): then ∃c ∈ R such that ∀k ≥ 1 : lg f(k) ≥ c, and therefore lg lg n = Ω(k),
905
+ written differently k = O(lg lg n), which yields ∆ = O(k) = O(lg lg n).
906
+ If f(k) = o(1): Being o(1) means that limk→∞ f(k) = 0, so for sufficiently large values
907
+ of k we can use the approximation ex ≈ 1 + x (that holds for small x) to get: ∆ ≈
908
+ (k + 1) · f(k) =
909
+ k+1
910
+ 1/f(k). If
911
+ 1
912
+ f(k) grows faster than (k + 1), we get ∆ = O(1) which does
913
+ not even grow with n. Therefore
914
+ 1
915
+ f(k) is increasing, but at a sub-linear rate. Recall that
916
+ lg lg n = k − lg
917
+ 1
918
+ f(k) + lg k + O(1). Since
919
+ 1
920
+ f(k) is sub-linear, we get that k = Θ(lg lg n),
921
+ which yields ∆ = O(k) = O(lg lg n).
922
+ ▶ Corollary 30. GF is not (1, O(m))-competitive. If the multiplicative term is 1, then the
923
+ additive term is at least Ω(m · lg lg n).
924
+ We have yet to analyze the cost of OPT on a strongly-stable sequence X corresponding to
925
+ a (k, r)-tree that produces the gap of Ω(m·lg lg n) in Theorem 5. Allegedly, if the cost is cheap,
926
+ say linear, we would get a large competitive ratio as well. However, by Theorem 22 we expect
927
+ a competitive ratio of at most 2, and therefore we can conclude without further analysis,
928
+ that cost(OPT, X) = Ω(m · lg lg n). In fact, we prove that cost(OPT, X) = Θ(m ·
929
+ lg n
930
+ lg lg lg n).
931
+ It follows that the competitive ratio deteriorates when the additive gap increases.
932
+ ▶ Lemma 31. Define the constants α ≡ 1 −
933
+ 1
934
+ 2k and β ≡ �k
935
+ j=1
936
+ j
937
+ 2j + k+1
938
+ 2k . Let X be a
939
+ strongly-stable sequence induced by a (k, r)-tree. Then ˆc(GF, X) = 2k · β · (1 − αr) + αr. In
940
+ asymptotic terms: ˆc(GF, X) = Θ(2k · (1 − αr)).
941
+ Proof. We write a recurrence for the average cost, cr, of GF on the strongly-stable sequence
942
+ induced by Tr. We have c0 = 1, and
943
+ cr+1 = 1 + k
944
+ 2k
945
+ +
946
+ k
947
+
948
+ j=1
949
+ j + cr
950
+ 2j
951
+ =
952
+
953
+ 1 − 1
954
+ 2k
955
+
956
+ cr +
957
+ k
958
+
959
+ j=1
960
+ j
961
+ 2j + 1 + k
962
+ 2k
963
+ ≡ α · cr + β
964
+ ( 1+k
965
+ 2k
966
+ is due to the actual leaf, and the summation is the contribution of all the Tr subtrees.)
967
+ By Lemma 20 (with γ = 0), cr =
968
+ β
969
+ 1−α(1 − αr) + αr · c0 = 2k · β(1 − αr) + αr. Since
970
+ α = 1 −
971
+ 1
972
+ 2k ∈ [ 3
973
+ 4, 1) clearly αr < 1. Furthermore, β = Θ(1). To see this note that β only
974
+ depends on k. Denote β = β(k) and observe that: β(k+1)−β(k) =
975
+ � k+1
976
+ 2k+1 + k+2
977
+ 2k+1
978
+
979
+ − k+1
980
+ 2k =
981
+ 1
982
+ 2k+1 .
983
+ Therefore, β(k) = β(2) + �k
984
+ i=3
985
+
986
+ β(i) − β(i − 1)
987
+
988
+ =
989
+
990
+ 1
991
+ 2 + 2
992
+ 4 + 3
993
+ 4
994
+
995
+ + �k
996
+ i=3
997
+ 1
998
+ 2i = 2 −
999
+ 1
1000
+ 2k , and
1001
+ β(k) ∈ [ 7
1002
+ 4, 2) ⇒ β = Θ(1). Because 2k · (1 − αr) ≥ 2k · (1 − α) = 1 > αr, we conclude that
1003
+ cr = Θ(2k · (1 − αr)).
1004
+
1005
+ STACS 2023
1006
+
1007
+ 39:16
1008
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
1009
+ ▶ Lemma 32. Let X be a sequence from the family of sequences in Theorem 5, then
1010
+ cost(OPT, X) = Θ(m ·
1011
+ lg n
1012
+ lg lg lg n).
1013
+ Proof. Let X be a strongly-stable sequence induced by querying a (k, r)-tree. We know that
1014
+ 1
1015
+ 2ˆc(GF, X) < ˆc(OPT, X) ≤ ˆc(GF, X) where the lower-bound is by Theorem 22. Therefore,
1016
+ ˆc(OPT, X) = Θ(2k · (1 − αr)) by Lemma 31. By Lemma 25, lg n = r · lg k + O(1), or r =
1017
+ lg n−O(1)
1018
+ lg k
1019
+ . When we substitute r = 2k as in the proof of Theorem 5, we get that (1−αr) = Θ(1)
1020
+ and 2k = r = lg n−O(1)
1021
+ lg k
1022
+ = Θ(
1023
+ lg n
1024
+ lg lg lg n). Therefore, cost(OPT, X) = Θ(m ·
1025
+ lg n
1026
+ lg lg lg n).
1027
+
1028
+ As a concluding remark, we recall that the Fr-tree is a (k, r)-tree for k = 2. If we
1029
+ substitute k = 2 in the formula of Lemma 31 we get that α = 3
1030
+ 4, β = 7
1031
+ 4, and ˆc(GF, X) =
1032
+ 7 · (1 − (3/4)r) + (3/4)r. By Lemma 26, the average promotion is 3 · (1 − (3/4)r) (for k = 2,
1033
+ we have δ = 0). These values are the strongly-stable analogues of Lemma 21, and can be
1034
+ used to show a weaker lower bound of 7
1035
+ 4, on the competitive ratio of GF.
1036
+ 4
1037
+ Conclusions and Open Questions
1038
+ In this paper we gave improved lower bounds on the competitiveness of the Greedy Future
1039
+ (GF) algorithm for serving a sequence of queries by a dynamic binary search tree (BST). In
1040
+ contrast to many of the previous results on GF that are obtained using the geometric-view by
1041
+ studying the equivalent Geometric Greedy (GG) algorithm, we used the standard “tree-view”
1042
+ and the treap-based definition of GF. We showed that the competitive ratio of GF is at
1043
+ least 2, and that there are sequences X ∈ [n]m for which the cost difference (additive gap)
1044
+ between GF and OPT is Ω(m · lg lg n). These lower bounds enabled us to show that if GF
1045
+ is approximately-monotone (Definition 8) with some constant c then c ≥ 2. Also, the lower
1046
+ bounds show that the cost of GF on a sequence compared to its cost on its reverse, may
1047
+ differ by a factor as close as we like to 2, or by a difference of Ω(m · lg lg n). In contrast, the
1048
+ cost of OPT on a sequence compared to its reverse may differ by at most n.
1049
+ Our results give new insights on the “tradeoff” between the additive term and the
1050
+ multiplicative term in the competitiveness of GF, showing that the multiplicative term is
1051
+ typically larger when the total cost of the algorithm on the sequence is smaller. Indeed, our
1052
+ best multiplicative term is achieved for a sequence whose average cost per query is 6. This
1053
+ tradeoff is not surprising since a fixed difference implies a larger ratio when the quantities are
1054
+ small. It may be interesting to figure out if this tradeoff hints of some underlying property
1055
+ of GF, or is just an artifact of our technique that requires high costs on average per query in
1056
+ order to increase the additive gap between GF and OPT.
1057
+ Clearly, these improved lower bounds still don’t settle the deeper question of whether GF
1058
+ (and GG) is dynamically-optimal. Our techniques focused on a smaller family of sequences
1059
+ which we named mixed-stable sequences, whereas “most” sequences are not stable. While
1060
+ it is possible that an improved lower bound (larger than 2) can be found by a more clever
1061
+ pattern of mixed-stable sequences, it seems more likely to be found by analyzing sequences
1062
+ for which the tree maintained by GF is not static. In addition, we note that GF was not
1063
+ investigated too deeply directly, as most of the work has been done in the geometric view
1064
+ with respect to its counterpart GG. Therefore, studying other problems in tree-view may give
1065
+ complementing insights. One such problem is the deque conjecture, which has been partially
1066
+ settled for GG, in the case when deletions are only allowed on the minimum item [2].
1067
+
1068
+ Y. Sadeh and H. Kaplan
1069
+ 39:17
1070
+ References
1071
+ 1
1072
+ Parinya Chalermsook, Julia Chuzhoy, and Thatchaphol Saranurak. Pinning down the Strong
1073
+ Wilber 1 Bound for Binary Search Trees. In Approximation, Randomization, and Combinatorial
1074
+ Optimization. Algorithms and Techniques (APPROX/RANDOM), pages 33:1–33:21, 2020.
1075
+ 2
1076
+ Parinya Chalermsook, Mayank Goswami, László Kozma, Kurt Mehlhorn, and Thatchaphol
1077
+ Saranurak. Greedy is an almost optimal deque. In 14th International Conference on Algorithms
1078
+ and Data Structures (WADS), pages 152–165, 2015.
1079
+ 3
1080
+ Parinya Chalermsook, Mayank Goswami, László Kozma, Kurt Mehlhorn, and Thatchaphol
1081
+ Saranurak. Pattern-avoiding access in binary search trees. In IEEE 56th Annual Symposium
1082
+ on Foundations of Computer Science (FOCS), pages 410–423, 2015.
1083
+ 4
1084
+ Parinya Chalermsook, Mayank Goswami, László Kozma, Kurt Mehlhorn, and Thatchaphol
1085
+ Saranurak. The landscape of bounds for binary search trees. arXiv, abs/1603.04892, 2016.
1086
+ 5
1087
+ Parinya Chalermsook, Manoj Gupta, Wanchote Jiamjitrak, Nidia Obscura Acosta, Akash
1088
+ Pareek, and Sorrachai Yingchareonthawornchai. Improved pattern-avoidance bounds for greedy
1089
+ BSTs via matrix decomposition. In ACM-SIAM Symposium on Discrete Algorithms (SODA),
1090
+ 2023.
1091
+ 6
1092
+ Parinya Chalermsook and Wanchote Po Jiamjitrak.
1093
+ New binary search tree bounds via
1094
+ geometric inversions. In 28th Annual European Symposium on Algorithms (ESA), pages
1095
+ 28:1–28:16, 2020.
1096
+ 7
1097
+ Erik D. Demaine, Dion Harmon, John Iacono, Daniel Kane, and Mihai Pătraşcu. The geometry
1098
+ of binary search trees. In 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA),
1099
+ page 496–505, 2009.
1100
+ 8
1101
+ Erik D. Demaine, Dion Harmon, John Iacono, and Mihai Pătraşcu.
1102
+ Dynamic optimal-
1103
+ ity—almost. SIAM Journal on Computing, 37(1):240–251, 2007.
1104
+ 9
1105
+ Kyle Fox. Upper bounds for maximally greedy binary search trees. In 12th International
1106
+ Conference on Algorithms and Data Structures (WADS), page 411–422, 2011.
1107
+ 10
1108
+ Michael L. Fredman. Two applications of a probabilistic search technique: Sorting X+Y and
1109
+ building balanced search trees. In 7th Annual ACM Symposium on Theory of Computing
1110
+ (STOC), page 240–244, 1975.
1111
+ 11
1112
+ George F. Georgakopoulos.
1113
+ Chain-splay trees, or, how to achieve and prove loglogN-
1114
+ competitiveness by splaying. Information Processing Letters, 106(1):37–43, 2008.
1115
+ 12
1116
+ Dion Harmon. New Bounds on Optimal Binary Search Trees. PhD thesis, Massachusetts
1117
+ Institute of Technology, 2006.
1118
+ 13
1119
+ Donald E. Knuth. Optimum binary search trees. Acta Informatica, 1:14–25, 1989.
1120
+ 14
1121
+ László Kozma. Binary search trees, rectangles and patterns. PhD thesis, Saarland University,
1122
+ 2016.
1123
+ 15
1124
+ Caleb Levy and Robert Tarjan. New Paths from Splay to Dynamic Optimality. PhD thesis,
1125
+ Princeton, 2019.
1126
+ 16
1127
+ Joan M. Lucas. Canonical forms for competitive binary search tree algorithms. In Tech. Rep.
1128
+ DCS-TR-250. Rutgers University, 1988.
1129
+ 17
1130
+ Kurt Mehlhorn. Nearly optimal binary search trees. Acta Informatica, 5:287–295, 1975.
1131
+ 18
1132
+ J. Ian Munro. On the competitiveness of linear search. In 8th Annual European Symposium
1133
+ on Algorithms (ESA), page 338–345. Springer-Verlag, 2000.
1134
+ 19
1135
+ Hauke Reddmann.
1136
+ On the geometric equivalent of instance optimal binary search tree
1137
+ algorithms. Master’s thesis, Universität Hamburg, 2021.
1138
+ 20
1139
+ Daniel Dominic Sleator and Robert Endre Tarjan. Self-adjusting binary search trees. Journal
1140
+ of ACM, 32(3):652–686, 1985.
1141
+ 21
1142
+ Chengwen Chris Wang, Jonathan Derryberry, and Daniel Dominic Sleator. O(log log n)-
1143
+ competitive dynamic binary search trees. In 17th Annual ACM-SIAM Symposium on Discrete
1144
+ Algorithm (SODA), page 374–383, 2006.
1145
+ 22
1146
+ Robert Wilber. Lower bounds for accessing binary search trees with rotations. SIAM Journal
1147
+ on Computing, 18(1):56–67, 1989.
1148
+ STACS 2023
1149
+
1150
+ 39:18
1151
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
1152
+ A
1153
+ Appendix: Deferred Proofs and Discussions
1154
+ A.1
1155
+ Enforcing a Stable Tree for GF
1156
+ We describe how to restructure any initial tree, to a desired tree, when GF is considered.
1157
+ The initial tree cannot simply be re-organized since GF updates the tree in a specific way
1158
+ following each query. Moreover, when we are given a sequence X and add a prefix P to it,
1159
+ denote the concatenation by P ◦ X, even if P enforces the desired tree when served alone,
1160
+ serving P ◦X may give a different tree following P when X starts. The reason for this is that
1161
+ GF restructures the tree while serving P according to future queries, therefore the existence
1162
+ of X may affect its decisions while serving P. Nevertheless, the idea is to restructure the
1163
+ tree top-down from the root, such that we “propagate” stability, as in Definition 11, over the
1164
+ nodes that have already been fixed in their correct places. See Figure 7 for an example.
1165
+ Figure 7 Example of enforcing a tree as detailed in Theorem 33. Consider the mixed-stable
1166
+ sequence X = [11, 7, 1, 13, 9, 3, 11, 7, 5, 15, 9, 1, 11, 7, 3, 17, 9, 5]. Its desired tree T is the right-most
1167
+ tree in the figure. Nodes 6, 4, 16 are weakly-stable biased towards their starred-edge (leading to
1168
+ 10, 2, 14 respectively), all other internal nodes are strongly-stable. Left-to-right: Initially, there are
1169
+ no stabilized nodes (left). The first step queries only Y1 = [A] as if it was a leaf. Duplicated six times
1170
+ and substituted for the pattern of a weakly-stable node, we get Z1 = [10, 10, 6, 6, 10, 6], stabilizing
1171
+ {6, 10}. In the second step, the next nodes that are stabilized are {2, 4, 8, 12}. The weakly-stable
1172
+ sequence of the subtrees is Y2 = [C, B, A]. Duplicated six times, and substituted 2, 2, 4, 4, 2, 4 for
1173
+ A, 8, . . . , 8 for B and 12, . . . , 12 for C, we get: Z2 = [12, 8, 2, 12, 8, 2, 12, 8, 4, 12, 8, 4, 12, 8, 2, 12, 8, 4].
1174
+ Next Y3 = [F, D, A, G, E, B, F, D, C, G, E, A, F, D, B, G, E, C], and Z3 is the result of duplication
1175
+ and substitution. Since A−F are leaves, only the substitution of G requires the non-trivial pattern
1176
+ (14, 14, 16, 16, 14, 16). This stabilizes the nodes {14, 16} and is the last step of this example. In total,
1177
+ the enforcing sequence is Z1 ◦ Z2 ◦ Z3 (◦ for concatenation). In general, there may be more steps,
1178
+ each stabilizes at least one more node until all inner nodes are stable.
1179
+ ▶ Theorem 33. Let X be a mixed-stable sequence that corresponds to a tree T.9 There is a
1180
+ sequence S(X) such that when GF serves the concatenation S(X) followed by X, then when
1181
+ it finishes serving S(X) its current tree is T regardless of the initial tree T0. We refer to S(X)
1182
+ as the enforcing sequence of X. Additionally, if X is the atomic sequence corresponding to T
1183
+ (Definition 12), then |S(X)| < 3n · |X|. If X is strongly-stable or weakly-stable (and atomic),
1184
+ then |S(X)| < 2|X| and |S(X)| < 3|X| respectively.
1185
+ Proof. We construct S(X) in steps. Initially, the tree of GF (which is the initial tree T0) and
1186
+ the desired mixed-stable tree T may be completely different. Each step of the construction
1187
+ adds a sequence of queries to S(X) that extends a rooted and connected subtree that belongs
1188
+ 9 The type of stability of each node of T can be deduced from X.
1189
+
1190
+ Y. Sadeh and H. Kaplan
1191
+ 39:19
1192
+ both to T and to the current tree of GF and will not change subsequently. We regard nodes
1193
+ that already joined this subtree as stabilized. Once all inner nodes have been stabilized then
1194
+ S(X) is complete and the tree of GF is exactly T. Every stabilized node remains stable
1195
+ with respect to the continuation of the sequence as in Definition 11. See Figure 7 for an
1196
+ illustration. We first describe how to stabilize the desired root (of T), r, which is the base
1197
+ of the construction. We emphasize that stabilizing a weakly-stable node also stabilizes its
1198
+ favored-child (Definition 11). We split into three cases.
1199
+ 1. If there is only a single node, then it is r which is also already the root. We do nothing.
1200
+ 2. If r is strongly-stable in T: We query [r, r] to make it the root. The second query
1201
+ guarantees that r is placed at the root after the first query.
1202
+ 3. If r is weakly-stable in T: Let z be r’s favored-child. We add the queries [z, z, r, r, z, r]
1203
+ to S(X). This stabilizes r and z, and by the end of these six queries, r is the root and
1204
+ z is its child. To see why this happens, consider how GF works: The second query to
1205
+ z guarantees that it is placed at the root after the first query. The third query touches
1206
+ both z (the root) and r (queried), and due to the fourth and fifth queries places r at
1207
+ the root and z as its child. The purpose of the sixth query is to ensure that z does not
1208
+ become the root due to future queries when the fifth query is processed.
1209
+ Assume that we already have a tree with a connected subtree of stabilized internal nodes.
1210
+ The subtrees that hang off the stable nodes are not empty since stable nodes are internal
1211
+ nodes. If each of these subtrees is a leaf then we are done and S(X) is complete. Otherwise,
1212
+ we stabilize the root of every subtree that is not a leaf as we describe next. Recall that if the
1213
+ root of a subtree is weakly-stable, we also stabilize its favored-child.
1214
+ For convenience, denote the index of the current step by ℓ. We regard each unstabilized
1215
+ subtree as a leaf, and generate an atomic mixed-stable sequence over the current stabilized
1216
+ connected subtree, according to the stability types of the inner nodes. Denote this sequence
1217
+ by Yℓ. Note that Yℓ is a sequence of the leaves that correspond to the unstabilized subtrees.
1218
+ We derive from Yℓ the stabilizing sequence, Zℓ, for the new nodes, by repeating Yℓ six times,
1219
+ and replacing each leaf in Yℓ
1220
+ 6 by an appropriate node from the subtree that it represents.
1221
+ This replacement is done as follows. If the root r of the subtree is a leaf or a strongly-stable
1222
+ node then we simply access r. If r is weakly-stable and its favored-child is z then we
1223
+ replace each query of the leaf (subtree) by the next query of the sequence z, z, r, r, z, r, while
1224
+ cyclically repeating it. Since Yℓ was repeated six times, the sequence z, z, r, r, z, r repeats
1225
+ an integral number of times in Zℓ. Because Zℓ is based on the mixed-stable sequence Yℓ,
1226
+ the already stabilized nodes remain stable. Only the subtrees hanging off them are affected.
1227
+ The restriction of Zℓ to each hanging subtree is either z, z, r, r, z, r or r, r, r, r, r, r so by an
1228
+ argument analogous to the one in the base case the root of each hanging subtree is stabilized,
1229
+ as well as each favored-child of a weakly-stable root.
1230
+ We repeat stabilizing steps until all the inner nodes of T have been stabilized. If the last
1231
+ step is d, then S(X) = Z1 ◦ Z2 ◦ . . . ◦ Zd where ◦ denotes concatenation. We emphasize that
1232
+ when GF serves S(X) ◦ X, by the end of serving S(X) its tree is indeed T, because we can
1233
+ think of X as just another step of the stabilization process, in which all the subtrees are leaves.
1234
+ It remains to analyze the length of S(X). The length of any Yi is at most that of X.
1235
+ Every step stabilizes at least one inner node, hence there are at most n−1
1236
+ 2
1237
+ steps (the rest
1238
+ n+1
1239
+ 2
1240
+ nodes are leaves), so we get that |S(X)| = 6 �d
1241
+ i=1 |Yi| ≤ 6 · n−1
1242
+ 2
1243
+ · |X| < 3n · |X|.
1244
+ For the refined analysis of the length of S(X) in case X is strongly-stable, or weakly-stable,
1245
+ we investigate the relation between |Yi| and |Yi+1|. For convenience we define Yd+1 = X.
1246
+ By Lemma 13, |Yi| = 2ai · 3bi, where ai = maxleaf u a(u) and bi = maxleaf u b(u). Observe
1247
+ that when we extend the stability from a node v which is a leaf of the stabilized subtree at
1248
+ STACS 2023
1249
+
1250
+ 39:20
1251
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
1252
+ step i, one or two levels deeper, then we have for every new stabilized leaf descendant u of
1253
+ v that either a(u) = a(v) + 1 and b(u) = b(v), or a(u) = a(v) and b(u) = b(v) + 1. However,
1254
+ the lcm of the preiods of all leaves of Yi+1 may be affected by two different branches, thus
1255
+ allowing any of the combinations of ai ≤ ai+1 ≤ ai + 1 and bi ≤ bi+1 ≤ bi + 1. So we get
1256
+ that |Yi| divides |Yi+1| and |Yi| ≤ |Yi+1| ≤ 6|Yi|. In the general case of mixed-stability it
1257
+ could be that the length grows initially six-fold (starting from the second step, two differ-
1258
+ ent branches might each increase a and b, respectively) while the second half of the steps
1259
+ satisfies |Yd/2+1| = |Yd/2+2| = . . . = |X| (another branch that “mixes” the increase in a and
1260
+ b “catches up” with the lcm), so |S(X)| = Θ(n · |X|) is possible. As an example, revisit
1261
+ Figure 7: there we have |Y1| = 1, |Y2| = 3, |Y3| = 18 and |Y4| = |X| = 18. However, when
1262
+ X is strongly-stable, we have |Yi+1| = 2|Yi| for every i because bi = 0 (Lemma 13), and
1263
+ ai+1 = ai + 1 for every i. Therefore, |S(X)| = 6 �d
1264
+ i=1 |Yi| = 6 �d
1265
+ i=1
1266
+ |X|
1267
+ 2i < 6|X|. We can
1268
+ optimize further by noting that we can define Zi to be only twice longer than Yi (no need for
1269
+ six repetitions). So in fact we can define S(X) for strongly-stable X such that |S(X)| < 2|X|.
1270
+ If X is weakly-stable, similarly |Yi+1| = 3|Yi| because for every i we have ai = 0 (Lemma 13)
1271
+ and bi+1 = bi + 1, therefore |S(X)| = 6 �d
1272
+ i=1 |Yi| = 6 �d
1273
+ i=1
1274
+ |X|
1275
+ 3i < 3|X|.
1276
+
1277
+ ▶ Theorem 34. For any tree T there is a sequence S(T) such that for any suffix of queries
1278
+ Y , when GF serves S(T) ◦ Y , its tree when is it done with the last query of S(T) is T.
1279
+ Proof. We rely on the ideas from the proof of Theorem 33. To generate an oblivious enforcing
1280
+ prefix, we concatenate several enforcing sequences, each enforcing higher nodes in the tree.
1281
+ Define T [1] ≡ T and T [i+1] is the tree T [i] stripped of all of its leaves, until the final tree T [h]
1282
+ contains only the root. For each tree T [i], denote by Xi its corresponding strongly-stable
1283
+ sequence Xi, and by S1 the enforcing sequence of X1. Note that if T [i] is not full, we relax
1284
+ the definition of the corresponding strongly-stable sequence and instead of querying a missing
1285
+ leaf we query its unary parent. This modification works as-well because we can imagine that
1286
+ the query proceeds to the missing leaf, which would anyway remain below the parent. We
1287
+ claim that S(T) ≡ S1 ◦ X2 ◦ . . . ◦ Xh satisfies the theorem. Indeed, S1 enforces the desired
1288
+ tree, and in particular the position of the leaves. Following S1, all the nodes except for the
1289
+ leaves are touched again, so these leaves can never become parents, regardless of the suffix Y .
1290
+ The argument holds similarly for the following steps, and since the structure of T is already
1291
+ in place, it suffices to use Xi instead of their enforcing sequences.
1292
+
1293
+ Adding a prefix to our sequence may affect the competitive ratio. However, once we fixed
1294
+ the stable tree, we can repeat the corresponding stable sequence to “amplify” the original
1295
+ competitive ratio making the effect of the prefix negligible. One difficulty raised by repetitions
1296
+ is when we care about the length of the sequence in our claim. This is the case in Theorem 5
1297
+ where we claim the existence of a sequence of length nΘ(
1298
+ lg lg n
1299
+ lg lg lg n ). In the proof of this theorem
1300
+ we assumed for simplicity that we can choose the initial tree. The following remark shows
1301
+ that indeed we can start with an arbitrary initial tree without weakening the theorem.
1302
+ ▶ Remark 35. Let X be an atomic mixed-stable sequence used to prove Theorem 5. Consider
1303
+ the sequence Z = S(X) ◦ Xn, where S(X) is the prefix (guaranteed by Theorem 33) that is
1304
+ enforcing the desired “initial” tree T, Xn are n repetitions of X, and ◦ represents concaten-
1305
+ ation. By Theorem 33, n|X| ≤ |Z| < 4n|X| therefore we have: |Z| = Θ(n|X|) = nΘ(
1306
+ lg lg n
1307
+ lg lg lg n )
1308
+ (the second equality is by Theorem 5). Since after processing S(X) the tree of GF is fixed:
1309
+ cost(GF, Z, T0)−cost(OPT, Z, T0) ≥ n·(cost(GF, X, T)−cost(OPT, X, T)). By the proof of
1310
+ Theorem 5 and Remark 28: cost(GF, X, T) − cost(OPT, X, T) = Ω(|X| · lg lg n), and putting
1311
+ everything together we get that: cost(GF, Z, T0) − cost(OPT, Z, T0) = Ω(|Z| · lg lg n). Note
1312
+
1313
+ Y. Sadeh and H. Kaplan
1314
+ 39:21
1315
+ that if X is strongly-stable, or weakly-stable, then it suffices to define Z = S(X) ◦ X without
1316
+ repetitions and we get that |Z| = Θ(|X|), and the rest of the arguments remain the same.
1317
+ A.2
1318
+ Omitted Proofs
1319
+ In this subsection we restate and prove Lemmas and Theorems that were omitted from the
1320
+ main text. For convenience, we restate the claims in their original numbering.
1321
+ The proof of Theorem 22 makes use of Wilber’s first bound [22]. We use the original
1322
+ presentation of this bound which is a bit tighter than later simplified versions such as [14].
1323
+ ▶ Definition 36 (Wilber’s First Bound [22]). Let X be a sequence of queries, and let T be a
1324
+ static reference tree such that every query of X is in a leaf of T. An alternation at an inner
1325
+ node u of T is defined to be two queries closest in time such that one accesses either the left
1326
+ or right subtree of u and the other accesses the other subtree of u. Define ALT(u) to be the
1327
+ number of alternations at node u. Then: cost(OPT, X) ≥ m + 1
1328
+ 2
1329
+
1330
+ inner u∈T ALT(u).
1331
+ ▶ Theorem 22. Let X be a mixed-stable sequence and let T be the tree that corresponds to
1332
+ it. Then cost(GF, X, T) < c · cost(OPT, X, T) for c = 5
1333
+ 2. If X is strongly-stable, then c = 2.
1334
+ Proof. We use the tree that corresponds to the mixed-stable sequence as the reference tree
1335
+ for Wilber’s first bound. Arithmetic manipulations will yield an expression that we can tie
1336
+ to the cost of GF, according to the claim.
1337
+ Let X be a mixed-stable sequence, with a corresponding tree T. Let S be the set of
1338
+ values that are in the leaves of T, and let U be the set of inner nodes, |U| = n−1
1339
+ 2 . We also
1340
+ denote by A(i) the set of proper ancestors of i. By the definition of the cost of a static tree,
1341
+ we know that ˆc(GF, X) = �
1342
+ i∈S (d(i) + 1) · f(i) where d(i) is the depth of i and f(i) is the
1343
+ frequency of accessing i. We extend f(u) to refer to the frequency of visiting any node u.
1344
+ Note that f(u) = �
1345
+ i∈S∧u∈A(i) f(i) and that �
1346
+ i∈S f(i) = 1.
1347
+ Now consider Wilber’s bound for X, with T as the reference tree. We can use T as the
1348
+ reference tree since X only accesses leaves of T, by definition. We also denote αu ≡ ALT (u)+1
1349
+ f(u)·m
1350
+ (ALT(u) is defined in Defintion 36, and note that 0 ≤ ALT(u) ≤ f(u) · m − 1). We have
1351
+ αu ∈ (0, 1], where αu = 1 corresponds to fully alternating accesses to the subtree rooted
1352
+ at u. The lower bound is cost(OPT, X) ≥ m + 1
1353
+ 2
1354
+
1355
+ u∈U (ALT(u) + 1) − |U|
1356
+ 2 = m
1357
+ 2 + m
1358
+ 2 (1 +
1359
+
1360
+ u∈U αu · f(u)) − n−1
1361
+ 4
1362
+ =
1363
+ � m
1364
+ 2 − n−1
1365
+ 4
1366
+
1367
+ + m
1368
+ 2
1369
+
1370
+ i∈S (1 + �
1371
+ u∈A(i) αu)f(i). Let α ≤ minu∈U αu,
1372
+ we get that ˆc(OPT, X) ≥
1373
+ � 1
1374
+ 2 − n−1
1375
+ 4m
1376
+
1377
+ + α
1378
+ 2
1379
+
1380
+ i∈S (d(i) + 1) · f(i) = α
1381
+ 2 ˆc(GF, X) +
1382
+ � 1
1383
+ 2 − n−1
1384
+ 4m
1385
+
1386
+ where the equality holds since GF maintains a static tree. Thus ˆc(GF, X) ≤ 2
1387
+ α · ˆc(OPT, X)−
1388
+ 1
1389
+ α
1390
+
1391
+ 1 − n−1
1392
+ 2m
1393
+
1394
+ < 2
1395
+ α · ˆc(OPT, X).
1396
+ In order to choose a suitable α, recall that a strongly-stable node u has a coefficient of
1397
+ αu = 1, which means that for strongly-stable sequences, in which all inner nodes are stable,
1398
+ we can pick α = 1 and conclude that ˆc(GF, X) < 2 · ˆc(OPT, X). If u is a weakly-stable node,
1399
+ then its coefficient is αu = 2
1400
+ 3. So for a mixed-stable sequence we can naively pick α = 2
1401
+ 3,
1402
+ resulting in ˆc(GF, X) < 3 · ˆc(OPT, X).
1403
+ In order to improve from 3 to 5
1404
+ 2, we observe that by definition, every weakly-stable node has
1405
+ a strongly-stable child. Let u be a weakly-stable node and let w be its (strongly-stable) favored-
1406
+ child (recall Definition 11). Since ALT(u) = ALT(w) (by definition of the access pattern in u),
1407
+ we can present Wilber’s bound differently, summing (ALT(u)+1)·(1+β)+(ALT(w)+1)·(1−β)
1408
+ instead of (ALT(u)+1)+(ALT(w)+1). We get modified coefficients α′
1409
+ u = (ALT (u)+1)·(1+β)
1410
+ m·f(u)
1411
+ =
1412
+ αu · (1 + β) = 2(1+β)
1413
+ 3
1414
+ and similarly α′
1415
+ w = αw(1 − β) = (1 − β). Choosing β = 1
1416
+ 5 balances the
1417
+ coefficients: α′
1418
+ u = α′
1419
+ w = 4
1420
+ 5. Now we can choose α = 4
1421
+ 5, and get ˆc(GF, X) < 5
1422
+ 2 · ˆc(OPT, X)
1423
+ for mixed-stable sequences.
1424
+
1425
+ STACS 2023
1426
+
1427
+ 39:22
1428
+ Dynamic BSTs: Improved Lower Bounds for Greedy-Future
1429
+ ▶ Theorem 6. For any ϵ > 0 there exists a sequence X with a subsequence (not necessarily
1430
+ consecutive) X′ ⊆ X such that cost(GF, X′) ≥ (2 − ϵ) · cost(GF, X).
1431
+ There exists a sequence Y with a subsequence (not necessarily consecutive) Y ′ ⊆ Y such
1432
+ that cost(GF, Y ′) − cost(GF, Y ) = Ω(m · lg lg n).
1433
+ Proof. Denote the initial tree by T0. Let Z be the weakly-stable sequence used for proving
1434
+ Theorem 4. Let TP be the tree that corresponds to Z and TQ the optimized tree, in which
1435
+ the leaves are promoted as in Lemma 21. Let P and Q be the sequences that enforce TP
1436
+ and TQ by Theorem 34, respectively. Note that ϵ determines Z, P and Q since it tells us
1437
+ how close to a ratio of 2 we need to get.
1438
+ Revisit Figure 5 to see the (recursive) structures of TP (on the left) and TQ (on the right,
1439
+ post-promotions). Observe that TP remains static when GF serves Z with it, by definition.
1440
+ Moreover, TQ remains static when GF serves Z with it. Indeed, let r be the root of TQ. Z
1441
+ queries the item in r every third access and the other accesses are alternating between its left
1442
+ and right subtrees, hence r remains the root of TQ. The rest of TQ remains static recursively.
1443
+ Define X = P ◦ Q ◦ Zk for a large k, and X′ = P ◦ Zk ⊂ X (◦ for concatena-
1444
+ tion). Since GF does not change TP and TQ while serving Z we get that cost(GF,X′)
1445
+ cost(GF,X) =
1446
+ cost(GF,P,T0)+k·cost(GF,Z,TP )
1447
+ cost(GF,P ◦Q,T0)+k·cost(GF,Z,TQ). This ratio approaches cost(GF,Z,TP )
1448
+ cost(GF,Z,TQ) for large enough k, and
1449
+ since Tp and TQ are exactly the trees used in the proof of Lemma 21, we conclude that we can
1450
+ make the resulting ratio as close to 2 as we like (choosing Z, P, Q according to the desired ϵ).
1451
+ The proof for Y and Y ′ is similar. We define Z to be the strongly-stable sequence used
1452
+ in Theorem 5, and define the appropriate tree-enforcing sequences P and Q by Theorem 34.
1453
+ Revisit Figure 6 to see the (recursive) structures of TP (on the left) and TQ (on the right,
1454
+ post-promotions). We set Y = P ◦ Q ◦ Zk and Y ′ = P ◦ Zk. The main difference is in the
1455
+ argument of why GF does not change TQ when serving Z (TP is static by definition). For this,
1456
+ observe that the root of TQ, denote it r, is the left-most leaf in the right subtree of TP . This
1457
+ means that the access pattern at r is alternating between its left subtree and its right subtree
1458
+ including itself, thus again we conclude that r remains at the root of TQ, and the rest of TQ
1459
+ remains static recursively. Therefore, cost(GF, Y ′) − cost(GF, Y ) ≥ k ·
1460
+
1461
+ cost(GF, Z, TP ) −
1462
+ cost(GF, Z, TQ)) − cost(GF, P ◦ Q, T0) = Ω(m · lg lg n) for large enough k.
1463
+
1464
+ ▶ Theorem 7. Let S be a sequence, we define rev(S) to be the sequence S in reverse. For
1465
+ any ϵ > 0 there exists a sequence X such that cost(GF, rev(X)) ≥ (2 − ϵ) · cost(GF, X).
1466
+ There exists a sequence Y such that cost(GF, rev(Y )) − cost(GF, Y ) = Ω(m · lg lg n).
1467
+ Proof. The proof is similar to that of Theorem 6, and we define Z, T0, P, TP , Q and TQ the
1468
+ same way. Here we define X = Q ◦ (rev(Z))k+1 ◦ rev(P) and Y = Q ◦ (rev(Z))k+1 ◦ rev(P),
1469
+ for a large k. Recall that Z is different between X (by Theorem 4) and Y (by Theorem 5).
1470
+ We claim that TQ remains static when GF serves rev(Z) over it, rather than Z, by the
1471
+ same argument as in the proof of Theorem 6, because the interleaving pattern in the root
1472
+ is preserved under reversal. Moreover, cost(GF, rev(Z), TQ) = cost(GF, Z, TQ) because the
1473
+ cost on a static tree depends only on the access frequencies. Putting everything together, we
1474
+ get:
1475
+ cost(GF,rev(X))
1476
+ cost(GF,X)
1477
+ =
1478
+ cost(GF,P,T0)+k·cost(GF,Z,TP )+cost(GF,Z◦rev(Q),TP )
1479
+ cost(GF,Q,T0)+k·cost(GF,rev(Z),TQ)+cost(GF,rev(Z)◦rev(P ),TQ). Note that
1480
+ the suffix contains one repetition of Z so that the rest of it (rev(P) or rev(Q)) does not
1481
+ affect the restructuring decisions of GF during the earlier repetitions of Z. The limit of this
1482
+ ratio for large k is cost(GF,Z,TP )
1483
+ cost(GF,Z,TQ). We finish the argument as in the proof of Theorem 6.
1484
+ In the case of Y , we get that cost(GF, Y ′) − cost(GF, Y ) ��� k ·
1485
+
1486
+ cost(GF, Z, TP ) −
1487
+ cost(GF, Z, TQ)) −
1488
+
1489
+ cost(GF, Q, T0) + cost(GF, rev(Z) ◦ rev(P), TQ)
1490
+
1491
+ = Ω(m · lg lg n) for
1492
+ large enough k.
1493
+
1494
+
8dE1T4oBgHgl3EQfUAND/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9dE3T4oBgHgl3EQfrApq/content/2301.04656v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c76c92754fd97ce725448660803db600374581abb016b3d309d03918ea16cdbf
3
+ size 1517122
9dE3T4oBgHgl3EQfrApq/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:48c100d5c6e87de7ddf3ea30373eac3e2a8ce6f1809b89cdc9ab3837e8401080
3
+ size 310941
C9AzT4oBgHgl3EQfwf5z/content/2301.01723v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d35d04c175d951b09f3155f464d27d8593050fd996fa909d27938a06e4b837c2
3
+ size 355392
C9AzT4oBgHgl3EQfwf5z/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7e5930e77fdda57923306cf394b85d1c3da067256635baaf08488ec895bf49c8
3
+ size 1835053
C9AzT4oBgHgl3EQfwf5z/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:af2310ebff51ecf8eb971698ccd9f76b3fcc0e5600e97fb7400ebc7d74c7c2ae
3
+ size 72803
DNFQT4oBgHgl3EQfPTY7/content/2301.13278v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:37b5e45135b05e850a6d4159f20974022a6cbcc3fabd5f070f478d98c83a79a1
3
+ size 1840835
DNFQT4oBgHgl3EQfPTY7/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:feccce4e544ba265c02f061ac539f712192edc061adaba856cbae92be195aa18
3
+ size 4849709
DtAzT4oBgHgl3EQfwv4v/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:296d87fbde1e0094363136bb4463f6993428932369272fea3d84f3ee962c8f38
3
+ size 235954
DtE4T4oBgHgl3EQf6Q5X/content/tmp_files/2301.05330v1.pdf.txt ADDED
@@ -0,0 +1,932 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Strain-induced Landau levels of Majorana fermions in an anisotropically interacting
2
+ Kitaev model on a honeycomb lattice
3
+ Takuto Yamada1 and Sei-ichiro Suga1
4
+ 1Graduate School of Engineering, University of Hyogo, Himeji 671-2280, Japan
5
+ (Dated: January 16, 2023)
6
+ The low-energy states of an anisotropically interacting Kitaev model on a honeycomb lattice
7
+ under triaxial strain are investigated. A numerical calculation shows that quantized states appear
8
+ in the low-energy region and their energy is proportional to the square root of the quantum number.
9
+ Furthermore, the quantized state at zero energy appears only on one sublattice. The obtained results
10
+ are characteristic of the Landau levels of Dirac fermions with time-reversal symmetry, indicating
11
+ the emergence of the strain-induced Landau levels of Majorana fermions, which is also determined
12
+ in the anisotropic Kitaev model by an analytical calculation.
13
+ I.
14
+ INTRODUCTION
15
+ The Kitaev model is an S = 1/2 quantum spin model
16
+ that has bond-dependent Ising-type interactions on a
17
+ honeycomb lattice1, called Kitaev interactions. A Ma-
18
+ jorana representation of the spin operators has shown
19
+ that this model is described by noninteracting itiner-
20
+ ant Majorana fermions coupled with Z2 gauge fluxes1.
21
+ In the ground state, the model is equivalent to the
22
+ noninteracting itinerant Majorana fermions on a hon-
23
+ eycomb lattice.
24
+ Therefore, the low-lying dispersion is
25
+ described by the type of Dirac fermions.
26
+ Fascinating
27
+ properties related with Majorana fermions have been
28
+ revealed by intensive theoretical studies.
29
+ Since Majo-
30
+ rana fermions are charge-neutral particles acting as their
31
+ own antiparticles, they are difficult to interact directly
32
+ to electromagnetic fields. Materials exhibiting Kitaev in-
33
+ teractions, called Kitaev candidate materials have been
34
+ found, including A2IrO3 (A = Na, Ir)2–10, α-RuCl310–18,
35
+ and H3LiIr2O619.
36
+ The behavior caused by Majorana
37
+ fermions in these materials has been studied using various
38
+ methods20–24. In their results, half-integer thermal quan-
39
+ tum Hall effect can be a conclusive evidence for the emer-
40
+ gent Majorana fermions. This phenomenon has been first
41
+ pointed out theoretically1 and then observed experimen-
42
+ tally in α-RuCl325,26.
43
+ Strain fields can induce an artificial vector potential,
44
+ which has opposite signs at two Dirac points due to time-
45
+ reversal symmetry27. Experiments on artificial graphene
46
+ have revealed a strong pseudomagnetic field in the range
47
+ of 10 T–100 T and the presence of Landau levels28–32.
48
+ The strain-induced pseudomagnetic field can interact di-
49
+ rectly with itinerant Majorana fermions. Indeed, numer-
50
+ ical calculations have shown the emergence of Landau
51
+ levels of itinerant Majorana fermions in the isotropically
52
+ interacting Kitaev model under triaxial strain33. Thus,
53
+ the phenomena related to the strain-induced Landau lev-
54
+ els in the Kitaev candidate materials can be a hallmark
55
+ of itinerant Majorana fermions.
56
+ According to the ab-initio calculations for the Kitaev
57
+ candidate materials, the Kitaev interactions include a
58
+ spatial anisotropy6,7,15.
59
+ So far, the Landau levels of
60
+ itinerant Majorana fermions and the related phenom-
61
+ ena have been investigated for the strained Kitaev model
62
+ with isotropic interactions33,34, while whether these Lan-
63
+ dau levels could emerge in the anisotropically interact-
64
+ ing strained Kitaev model is still unclear. Here, in the
65
+ present study, we explore the low-energy properties of
66
+ the anisotropically interacting Kitaev model on a hon-
67
+ eycomb lattice under triaxial strain.
68
+ We focus on the
69
+ parameter region where the itinerant Majorana fermions
70
+ exhibit a gapless dispersion relation in the absence of a
71
+ strain field. Through a numerical calculation, we demon-
72
+ strate that the strain-induced Landau levels of Majorana
73
+ fermions emerge also in the anisotropically interacting
74
+ Kitaev system, which is confirmed also by an analytical
75
+ calculation.
76
+ The rest of the paper is organized as follows.
77
+ Sec-
78
+ tion II outlines the deformation of the Kitaev model for
79
+ the numerical calculation using a singular-value decom-
80
+ position method. We then determine the Z2 gauge-flux
81
+ sector of the ground state. Section III presents the nu-
82
+ merical results for the local density of states (LDOS) of
83
+ the itinerant Majorana fermions; we show the presence
84
+ of the Landau levels typical of massless Dirac fermions
85
+ with time-reversal symmetry in the low-energy region of
86
+ the considered model, indicating the emergence of the
87
+ strain-induced Landau levels of Majorana fermions in the
88
+ anisotropically interacting Kitaev model. Section IV dis-
89
+ cusses the low-energy states of the system based on the
90
+ analytical calculation, illustrating results consistent with
91
+ the numerical outcomes. Finally, the study is summa-
92
+ rized in Sec. V.
93
+ II.
94
+ MODEL AND METHOD
95
+ A.
96
+ Formulation for numerical calculations
97
+ The Hamiltonian is described by
98
+ H = −
99
+
100
+ ⟨jk⟩x
101
+ Jx
102
+ jkσx
103
+ j σx
104
+ k −
105
+
106
+ ⟨jk⟩y
107
+ Jy
108
+ jkσy
109
+ j σy
110
+ k −
111
+
112
+ ⟨jk⟩z
113
+ Jz
114
+ jkσz
115
+ j σz
116
+ k, (1)
117
+ where σα
118
+ j (α = x, y, z) is an α component of the Pauli
119
+ matrix at the j site and Jα
120
+ jk is the coupling constant be-
121
+ tween the nearest-neighbor atoms on the α bond in the
122
+ arXiv:2301.05330v1 [cond-mat.str-el] 12 Jan 2023
123
+
124
+ 2
125
+ C
126
+ C
127
+ C
128
+ rz
129
+ ry
130
+ rx
131
+ Jz
132
+ Jy
133
+ Jx
134
+ A
135
+ B
136
+ R = 3
137
+ R = 2
138
+ R = 1
139
+ Jz
140
+ Jy
141
+ Jx
142
+ (a)
143
+ (b)
144
+ FIG. 1: (Color online) (a) Unstrained honeycomb flakes ex-
145
+ pressed by R: R = 1 is a central hexagon (a cross denotes its
146
+ center.), R = 2 consists of a central hexagon and six surround-
147
+ ing hexagons, R = 3 consists of the R = 2 and twelve sur-
148
+ rounding hexagons, and so on. Thus, R honeycomb flake in-
149
+ cludes 2N = 6R2 spins. The A and B sublattices are shown in
150
+ black and white, respectively. (b) Central hexagon of the un-
151
+ strained honeycomb lattice. The coupling constants, Jx, Jy,
152
+ and Jz, on the X, Y , and Z bonds are represented in blue, red,
153
+ and green, respectively. The vectors connect correspondingly
154
+ the nearest-neighbor sites along these bonds. Triaxial strain
155
+ C is represented schematically using three brown arrows.
156
+ honeycomb lattice. We use a zigzag-terminated honey-
157
+ comb lattice with an open boundary condition. The size
158
+ of the honeycomb flakes is expressed by R [Fig. 1(a)]33,
159
+ and it includes 2N = 6R2 spins, where N is the number of
160
+ the unit cells. The triaxial strain originates at the center
161
+ of the central hexagon marked by an cross in Fig. 1(a).
162
+ In the unstrained honeycomb lattice, the coupling con-
163
+ stants are independent of the site: Jα
164
+ jk = Jα(> 0). When
165
+ a weak triaxial strain is applied as schematically shown
166
+ in Fig. 1(b), the coupling constant Jα
167
+ jk becomes33,35–37
168
+
169
+ jk ≈ Jα [1 − β (1 − |rj − rk|/a0)], where β is the mag-
170
+ netoelastic coupling and a0 is the unstrained bond length.
171
+ The position vector of an atom is given by rj = r0
172
+ j + uj,
173
+ where r0
174
+ j = (x0
175
+ j, y0
176
+ j ) is the position vector in the un-
177
+ strained lattice and uj is the displacement vector; they
178
+ are expressed respectively as r0
179
+ j = |r0
180
+ j |(cos θ0
181
+ j, sin θ0
182
+ j) and
183
+ uj = (C/a0) |r0
184
+ j |2(cos 3θ0
185
+ j, sin 3θ0
186
+ j) using the polar coordi-
187
+ nate, where C is the triaxial strain strength. Jα
188
+ jk must be
189
+ positive on the whole nearest-neighbor bonds. According
190
+ to our numerical calculation, this condition is satisfied for
191
+ CR ⪅ 0.3. We thus set CR = 0.2 in the following nu-
192
+ merical calculation. In the honeycomb flakes possessing
193
+ the same constant CR, a scaling holds concerning the
194
+ honeycomb flake shapes for different R values38.
195
+ To
196
+ diagonalize
197
+ the
198
+ Hamiltonian,
199
+ four
200
+ Majorana
201
+ fermions, cj and bα
202
+ j , are set at each site1, satisfying
203
+ {cj, ck} = 2δjk, {cj, bα
204
+ k} = 0, and {bα
205
+ j , bβ
206
+ k} = 2δαβδjk.
207
+ To project the enlarged Hilbert space into the physi-
208
+ cal Hilbert space, the constraint cjbx
209
+ j by
210
+ j bz
211
+ j = 1 is im-
212
+ posed.
213
+ In this procedure, the spin operator is repre-
214
+ sented as σα
215
+ j
216
+ = icjbα
217
+ j and the Hamiltonian reads as
218
+ Hu = i �
219
+ α∈{x,y,z}
220
+
221
+ ⟨jk⟩α Jα
222
+ jkuα
223
+ jkcjck, where uα
224
+ jk = ibα
225
+ j bα
226
+ k
227
+ is a bond operator with an eigenvalue of ±1 and satisfies
228
+ [Hu, uα
229
+ jk] = 0. Thus, uα
230
+ jk is identified with a static Z2
231
+ gauge field between the nearest-neighbor j and k sites on
232
+ the α bond. We then introduce a relevant gauge-flux op-
233
+ erator defined as a product of the six Z2 gauge fields sur-
234
+ rounding a hexagon1. The gauge-flux operator commutes
235
+ with Hu and its eigenvalue becomes ±1. Therefor, the
236
+ system can be mapped to itinerant Majorana fermions
237
+ coupled with the Z2 gauge fluxes on the hexagonal pla-
238
+ quettes. For every configurations of the Z2 gauge fluxes,
239
+ the Hamiltonian Hu can be expressed as33
240
+ Hu = i
241
+ 2
242
+
243
+ ¯cT
244
+ A ¯cT
245
+ B
246
+ � �
247
+ 0
248
+ M
249
+ −M T
250
+ 0
251
+ � �
252
+ ¯cA
253
+ ¯cB
254
+
255
+ ,
256
+ (2)
257
+ where Mjk = Jα
258
+ jkuα
259
+ jk and ¯cA(B) is an N-component vec-
260
+ tor representing the itinerant Majorana fermions on the
261
+ A(B) sublattice. We call the Z2 gauge-flux having −1
262
+ ‘flux’. When at least two of the three coupling constants
263
+ are equal in the unstrained system, the Lieb’s theorem39
264
+ states that the exact ground state is in the sector where
265
+ all the Z2 gauge fluxes take unity (the flux-free sector)1.
266
+ The sector where the n gauge fluxes become −1 is called
267
+ the n-flux sector.
268
+ By using a singular-value decomposition method, we
269
+ calculate the eigenvalues ϵm,n (m = 1, 2, · · · , N) and the
270
+ eigenvectors for a given n-flux configuration n; then we
271
+ obtain the LDOS, ρj,A(B)(E), of the itinerant Majorana
272
+ fermions on the A(B) sublattice in the j-th unit cell. The
273
+ magnetoelastic coupling is set as β = 1 for simplicity.
274
+ The coupling constants in the unstrained lattice satisfy
275
+ Jx + Jy + Jz = 1, forming the triangle in the parameter
276
+ space expressed by Jx, Jy, and Jz [left panel of Fig.
277
+ 3(a)]1, while the central downward triangle enlarged in
278
+ the right panel represents the gapless phase.
279
+ B.
280
+ One-flux gap and ground-state sector
281
+ In the strained honeycomb lattice, the translational
282
+ invariance is broken, and hence the Lieb’s theorem can-
283
+ not be adopted.
284
+ Thus, we must confirm whether the
285
+ ground state is in the flux-free sector for the given R
286
+ with CR = 0.2. The ground-state energy for a n-flux
287
+ configuration, n, is given by EGS,n = − �
288
+ m ϵm,n. In the
289
+ open boundary system, the one-flux state is possible and
290
+ can be a candidate competing with the flux-free state38.
291
+ We calculate the one-flux gap ∆1 = EGS,1 − EGS,0 for
292
+ all the one-flux configurations at various R up to 90 for
293
+ the given Jx, Jy, and Jz. Figure 2 depicts the typical
294
+ behavior of the minimum one-flux gap ∆min
295
+ 1
296
+ for a given
297
+ R. For R ≥ 35, ∆min
298
+ 1
299
+ is well described by the follow-
300
+ ing polynomial: ∆min
301
+ 1
302
+ = aR−4 + bR−2 + c, where a, b,
303
+ and c are the constants. The extrapolated c values for
304
+ R → ∞ are 1.61 × 10−3, 4.44 × 10−4, and 3.73 × 10−4 in
305
+ Figs. 2(a)-2(c), respectively. We perform the same cal-
306
+ culations for the given coupling constants used in Figs.
307
+ 3(b)-3(g), finding that all the extrapolated c values for
308
+ R → ∞ positive. Thus, we can deduce that the ground
309
+ state of the anisotropically interacting Kitaev model for
310
+ CR = 0.2 is in the flux-free sector. In the following nu-
311
+
312
+ 3
313
+ 0.000
314
+ 0.005
315
+ 0.010
316
+ ∆min
317
+ 1
318
+ (a) Jx = 1/3, Jy = 1/3, Jz = 1/3
319
+ ∆min
320
+ 1
321
+ |R→∞ = 1.61 × 10−3
322
+ R ≥ 35
323
+ R < 35
324
+ 0.0000
325
+ 0.0005
326
+ 0.0010
327
+ 0.0015
328
+ 0.0020
329
+ ∆min
330
+ 1
331
+ (b) Jx = 7/24, Jy = 7/24, Jz = 5/12
332
+ ∆min
333
+ 1
334
+ |R→∞ = 4.44 × 10−4
335
+ R ≥ 35
336
+ R < 35
337
+ 0
338
+ 1
339
+ 202
340
+ 1
341
+ 252
342
+ 1
343
+ 302
344
+ 1
345
+ 352
346
+ 1
347
+ 502
348
+ 1
349
+ 802
350
+ 1/R2
351
+ 0.00000
352
+ 0.00025
353
+ 0.00050
354
+ 0.00075
355
+ 0.00100
356
+ ∆min
357
+ 1
358
+ (c) Jx = 11/48, Jy = 17/48, Jz = 5/12
359
+ ∆min
360
+ 1
361
+ |R→∞ = 3.73 × 10−4
362
+ R ≥ 35
363
+ R < 35
364
+ FIG. 2: (Color online) (a) Minimum one-flux gap (∆min
365
+ 1
366
+ ) for
367
+ a given R. The dashed lines reprsent the polynomial, ∆min
368
+ 1
369
+ =
370
+ aR−4 + bR−2 + c, that well describes ∆min
371
+ 1
372
+ for R ≥ 35 for
373
+ the constants a, b, and c having the following values: (a)
374
+ −2.95 × 103, 1.04 × 101, 1.61 × 10−3; (b) 6.56 × 101, 2.81 ×
375
+ 10−1, 4.44 × 10−4; (c) −6.77 × 101, 2.42 × 10−1, 3.73 × 10−4.
376
+ merical calculations, we set R = 60 (2N = 21600) and
377
+ C = 1/300.
378
+ III.
379
+ NUMERICAL RESULTS
380
+ Figures 3(b)-3(g) illustrate the LDOS, ρj,A(E) and
381
+ ρj,B(E), at the site in the central hexagon of the sys-
382
+ tem. The left and right panels show the results for the
383
+ A and B sublattices, respectively. We also evaluate the
384
+ integral value: Ij,A(B)(E) =
385
+ � E
386
+ 0 ρj,A(B)(E′)dE′. Figure
387
+ 3(b) displays the results for the isotropic interactions that
388
+ are plotted using the small open circle in the right panel
389
+ of Fig. 3(a). The coupling constants of the top, middle,
390
+ and bottom panels in Fig. 3(c)-3(g) correspond to the
391
+ black dots from close to the center toward the edge along
392
+ the lines A-E [right panel of Fig. 3(a)], respectively.
393
+ We find that Ij,A(B)(E) forms plateaus.
394
+ We mea-
395
+ sure them in units of the lowest-energy plateau in the
396
+ A sublattice, finding that the pronounced plateaus are
397
+ described as 2n + 1 (n = 0, 1, 2, · · · ) on the A sublattice
398
+ and 2n (n = 0, 1, 2, · · · ) on the B sublattice from the
399
+ low energy in turn. At or in the vicinity of the bound-
400
+ ary between pronounced neighboring plateaus, ρj,A/B(E)
401
+ reaches a peak, as indicated by the vertical dashed lines
402
+ in Figs.
403
+ 3(b)-3(g).
404
+ The peak at E = 0 generally ap-
405
+ pears only on the A sublattice, and it is called the sub-
406
+ lattice polarization40. We then plot the peak energies,
407
+ En (n = 0, 1, 2, · · · ), on the A sublattice (Fig. 4), whose
408
+ coupling constants correspond to the black dots along the
409
+ lines A-E [right panel of Fig. 3(a)]. As shown in Fig. 4,
410
+ En satisfies the relation En ∝ √n. These results are char-
411
+ acteristic of the Landau levels of massless Dirac fermions
412
+ with time-reversal symmetry29,36,37,41; thus, the itinerant
413
+ Majorana fermions under triaxial strain are quantized to
414
+ the Landau levels.
415
+ Figure 3(c)-3(g) indicate that as the system leaves the
416
+ isotropically interacting point, the Landau levels of Ma-
417
+ jorana fermions are smeared at the higher energies and
418
+ their number is reduces at the lower energies. Within the
419
+ shaded areas on the lines A-E in the right panel in Fig.
420
+ 3(a), at least three Landau levels of Majorana fermions
421
+ from n = 0 appear on the A sublattice, confirming the
422
+ relation En ∝ √n. From the permutation of Jx, Jy, and
423
+ Jz, there are six equivalent regions in the phase diagram
424
+ shown in Fig. 3(a). We apply our results to the five ad-
425
+ ditional regions and summarize the results in the right
426
+ panel of Fig. 3(a). In the shaded area, the Landau lev-
427
+ els of Majorana fermions emerge. In the outer unshaded
428
+ area, instead, one or two peaks appear at and next to
429
+ E = 0 in ρj,A(E), and the sublattice polarization is sat-
430
+ isfied.
431
+ We perform the same calculations for R = 40,
432
+ 45, and 50 while keeping CR = 0.2. As R increases, the
433
+ region where the Landau levels of Majorana fermions ap-
434
+ pear expands toward the boundary between gapless and
435
+ gapped phases. We, therefore, expect the Landau levels
436
+ of Majorana fermions to emerge in the whole unstrained
437
+ gapless phase, when the system becomes large enough.
438
+ IV.
439
+ EFFECTIVE LOW-ENERGY THEORY
440
+ A.
441
+ Formulation, eigenenergy, and sublattice
442
+ polarization
443
+ We now discuss the low-energy states of the itiner-
444
+ ant Majorana fermions on the triaxially strained honey-
445
+ comb lattice through an analytical calculation. Following
446
+ Refs.40,42, we adopt the effects of weak triaxial strain as
447
+ Jα(r) = Jα �
448
+ 1 + τ
449
+
450
+ r · rα/3a02��
451
+ , where rz = a0(0, 1),
452
+ rx = a0(−
453
+
454
+ 3/2, −1/2), and ry = a0(
455
+
456
+ 3/2, −1/2) are
457
+ vectors that connect the unstrained nearest-neighbor
458
+ sites, as shown in Fig. 1(b), and τ controls the strain
459
+ strength. Also in the effective low-energy theory, the cou-
460
+ pling constants in the unstrained lattice satisfy Jx+Jy +
461
+ Jz = 1. The strain effect is considered around the Dirac
462
+ points, K and K′, of the isotropically interacting system
463
+ in the unstrained honeycomb lattice. Therefore, this for-
464
+ mulation is effective for a system with weakly anisotropic
465
+
466
+ 4
467
+ A B C D E
468
+ (a) Phase diagram
469
+ (c) A
470
+ (d) B
471
+ (e) C
472
+ (f) D
473
+ (g) E
474
+ (b) Isotropic point
475
+ FIG. 3: (Color online) (a) Phase diagram of the unstrained Kitaev model on the plane Jx +Jy +Jz = 1, where Jα (α = x, y, z)
476
+ are the coupling constants of the unstrained system with Jα ≥ 0. In the left panel, the inner triangle represents the gapless
477
+ phase and the three outer triangles are gapped phases.
478
+ A gapless phase is enlarged in the right panel, where over three
479
+ Landau levels of Majorana fermions appear in the inner shaded region and the sublattice polarization is satisfied for R = 60
480
+ and C = 1/300. In the outer unshaded area, one or two peaks appear at and next to E = 0 in ρj,A(E), and the sublattice
481
+ polarization is satisfied. (b)-(g) Local density of states, ρj,A/B(E), at the central hexagon of the system and the integral values,
482
+ Ij,A/B(E) =
483
+ � E
484
+ 0 ρj,A/B(E′)dE′, for R = 60 and C = 1/300; (b) ρj,A/B(E) and Ij,A/B(E) for the isotropic interactions plotted
485
+ using the small open circle in the right panel of (a); (c)-(g) the coupling constants of the top, middle, and bottom panels
486
+ correspond to the black dots from close to the center toward the edge along the lines A-E [right panel of (a)], respectively.
487
+ Kitaev interactions.
488
+ The pseudovector potential, Aξ = (ξAξ
489
+ x, ξAξ
490
+ y), induced
491
+ by triaxial strain is given as
492
+
493
+ x = vξ
494
+ x
495
+ −1 ��
496
+ Jz − 1
497
+ 2Jx − 1
498
+ 2Jy
499
+
500
+ + (Jx − Jy)
501
+
502
+ 4
503
+
504
+ 3a0
505
+ +
506
+
507
+ Jz + 1
508
+ 4Jx + 1
509
+ 4Jy
510
+ � yτ
511
+ 3a0
512
+
513
+ ,
514
+ (3)
515
+
516
+ 5
517
+ (a) A
518
+ (b) B
519
+ (c) C
520
+ (d) D
521
+ (e) E
522
+ FIG. 4: (Color online) Peak energies, En (n = 0, 1, 2, · · · ), of ρj,A(E) as functions of √n. The coupling constants in (a)-(e)
523
+ correspond to those in Figs. 3(c)-3(g), respectively.
524
+
525
+ y = vξ
526
+ y
527
+ −1
528
+
529
+ 3
530
+ 2
531
+
532
+ (Jx − Jy) − (Jx + Jy)
533
+
534
+ 2
535
+
536
+ 3a0
537
+ − (Jx − Jy) yτ
538
+ 6a0
539
+
540
+ ,
541
+ (4)
542
+ where ξ = ±1 for K/K′ and
543
+
544
+ x =
545
+
546
+ 3a0
547
+ 4ℏ
548
+ �√
549
+ 3 (Jx + Jy) + iξ (Jx − Jy)
550
+
551
+ ≡ |vx|eiξφx,
552
+
553
+ y =
554
+
555
+ 3a0
556
+ 4ℏ
557
+ � 1
558
+
559
+ 3 (3Jz + 1) − iξ (Jx − Jy)
560
+
561
+ ≡ |vy|eiξφy.
562
+ The pseudomagnetic field, Bξ = (0, 0, ξBξ
563
+ z), is given as
564
+
565
+ z = cos φx∂xAξ
566
+ y−cos φy∂yAξ
567
+ x. The Hamiltonian around
568
+ K and K′ reads
569
+ Hξ = ξ
570
+
571
+ |vxvy|
572
+
573
+ 0
574
+ Πξ
575
+ x
576
+ ∗ − iΠξ
577
+ y
578
+
579
+ Πξ
580
+ x + iΠξ
581
+ y
582
+ 0
583
+
584
+ ,
585
+ (5)
586
+ where Πξ
587
+ x
588
+ =
589
+
590
+ |vx/vy|
591
+
592
+ eiξφxpx + ξAξ
593
+ x
594
+
595
+ and Πξ
596
+ y
597
+ =
598
+
599
+ |vy/vx|
600
+
601
+ eiξφypy + ξAξ
602
+ y
603
+
604
+ . By defining the annihilation
605
+ operators as
606
+ aK =
607
+ lB
608
+
609
+ 2ℏ
610
+
611
+ ΠK
612
+ x
613
+ ∗ − iΠK
614
+ y
615
+ ∗�
616
+ , aK′ =
617
+ lB
618
+
619
+ 2ℏ
620
+
621
+ ΠK′
622
+ x
623
+ + iΠK′
624
+ y
625
+
626
+ (6)
627
+ with lB
628
+ 2
629
+ = ℏ/|Bξ
630
+ z|, the eigenenergy is obtained as
631
+ En =
632
+
633
+ 2
634
+
635
+ 2ℏ/lB
636
+ � �
637
+ |vxvy|√n, (n = 0, 1, 2, · · · ).
638
+ The
639
+ n = 0 eigenenstates are |Ψ+
640
+ 0 ⟩ = (0, |ψ0⟩)T for K and
641
+ |Ψ−
642
+ 0 ⟩ = (|ψ0⟩, 0)T for K′. Since the components of the
643
+ two-dimensional spinor in the sublattice basis are ex-
644
+ changed in K and K′, the eigenstates at n = 0 are
645
+ nonzero only on the A sublattice (sublattice polariza-
646
+ tion), while they are nonzero on both the A and B sub-
647
+ lattices at n ̸= 0. These eigenenergy and eigenstate fea-
648
+ tures agree with the numerical results, providing the evi-
649
+ dence of the emergence of the Landau levels of Majorana
650
+ fermions.
651
+ B.
652
+ Numerical results in terms of the effective
653
+ low-energy theory
654
+ FIG. 5: (Color online) Peak energy, E1, of ρj,A(E) as a func-
655
+ tion of
656
+
657
+ C at the isotropically interacting system obtained in
658
+ the numerical calculation. R =40, 50, and 60 are set. Corre-
659
+ sponding C is obtained for the fixed CR =1/25, 2/25, 3/25,
660
+ 4/25, 5/25, 6/25, and 7/25, respectively.
661
+ Let us discuss the numerical results in terms of the
662
+ effective low-energy theory.
663
+ As the system leaves the
664
+ isotropically interacting point in the numerical calcula-
665
+ tion, the Landau levels of Majorana fermions are smeared
666
+ at the higher energies and their number is reduced at the
667
+ lower energies, as shown in Figs. 3(c)-3(g). When the
668
+ anisotropy of the interactions becomes strong, the Dirac
669
+ points deviate considerably from those of the isotropi-
670
+ cally interacting unstrained system. This situation is op-
671
+
672
+ 6
673
+ TABLE I: Parameters a and b to fit the coefficient (E1) of En ∝ √n using a linear regression, E1 = a
674
+
675
+ 8C +b. The coefficients
676
+ (E1) are obtained by the numerical calculation for R =40, 50, and 60 at the fixed CR =1/25, 2/25, 3/25, 4/25, 5/25, 6/25,
677
+ and 7/25, respectively. The coupling constants are for the isotropically interacting system and for the system closest to the
678
+ isotropically interacting point on each line A-E in Fig. 3(a). The third line (below the results for a) denotes the ratios of a to
679
+ 0.99951 at the isotropic point are denoted.
680
+ (Jx, Jy, Jz)
681
+ ( 1
682
+ 3, 1
683
+ 3, 1
684
+ 3)
685
+ A ( 31
686
+ 96, 31
687
+ 96, 17
688
+ 48) B ( 121
689
+ 384, 127
690
+ 384, 17
691
+ 48) C ( 59
692
+ 192, 65
693
+ 192, 17
694
+ 48)
695
+ D ( 115
696
+ 384, 133
697
+ 384, 17
698
+ 48)
699
+ E ( 7
700
+ 24, 17
701
+ 48, 17
702
+ 48)
703
+ a
704
+ 0.99951
705
+ 0.99966
706
+ 1.00109
707
+ 1.00420
708
+ 1.00720
709
+ 1.00989
710
+ Ration of a to 0.99951
711
+ 1
712
+ 1.00015
713
+ 1.00016
714
+ 1.00047
715
+ 1.00769
716
+ 1.01039
717
+ b
718
+ 9.03667 × 10−5 1.48732 × 10−4 2.51854 × 10−5 −2.13822 × 10−4 −3.83096 × 10−4 −4.69701 × 10−4
719
+ posed to the condition for the effective low-energy the-
720
+ ory to hold. Thus, as the system leaves the isotropically
721
+ interacting point, the higher-order terms of Aξ become
722
+ relevant, reducing the number of the Landau levels of
723
+ Majorana fermions.
724
+ We next investigate the relation between the control
725
+ parameters of the strain strength, C and τ, in the numer-
726
+ ical and analytical calculations. To this end, we evaluate
727
+ the coefficient of En ∝ √n obtained in the numerical cal-
728
+ culation for R =40, 50, and 60 at the seven values of the
729
+ fixed CR within CR < 0.3. Figure 5 illustrates the coef-
730
+ ficient (E1) as a function of
731
+
732
+ C in the isotropically inter-
733
+ acting system. The data follows the line E1 = a
734
+
735
+ 8C + b
736
+ with a ≈ 0.99951 and b ≈ 9.03667×10−5, indicating that
737
+ the relation, En =
738
+
739
+ 8Cn, is deduced within our numer-
740
+ ical accuracy. The coefficient E1 in the system closest
741
+ to the isotropically interacting point on each line A-E is
742
+ evaluated in the same way. The evaluated a and b are
743
+ summarized in Table I, indicating that a ≈ 1.0 and b ≈ 0,
744
+ and thus En ≈
745
+
746
+ 8Cn.
747
+ The coefficient of En ∝ √n in the effective low-energy
748
+ theory,
749
+
750
+ 2
751
+
752
+ 2ℏ/lB
753
+ � �
754
+ |vxvy|, is given by using τ and one
755
+ of the three coupling constants, leading to the expression
756
+ for En as
757
+ En =
758
+
759
+ (Jz − 1)2 +
760
+
761
+ Jz + 1
762
+ 3
763
+ �2� 1
764
+ 2 �
765
+ 3τn
766
+ 2 .
767
+ (7)
768
+ The eigenenergy in the isotropically interacting system
769
+ is obtained as En = 2
770
+
771
+ τn/3.
772
+ Comparing En in the
773
+ numerical and analytical calculations for the isotropi-
774
+ cally interacting system, the relation, τ = 6C, is de-
775
+ rived. This relation is consistent with that derived by
776
+ comparing the pseudomagnetic field in the numerical43
777
+ and analytical42 calculations for the isotropically inter-
778
+ acting system, where |Bξ
779
+ z| = 4Cℏ/a02 and 2ℏτ/(3a02),
780
+ respectively. Since Jz’s in the anisotropically interacting
781
+ system in Table I are the same, their coefficients of √τ
782
+ take the same value,
783
+
784
+ 1025/768, according to Eq. (7).
785
+ The ratio of this coefficient to that in the isotropically
786
+ interacting system is 1.00049. This ratio is close to that
787
+ denoted in Table I. Therefore, the relation τ = 6C is
788
+ approximately satisfied in the anisotropically interacting
789
+ systems denoted in Table I.
790
+ V.
791
+ SUMMARY
792
+ We have investigated the low-energy states of an
793
+ anisotropically interacting Kitaev model under triaxial
794
+ strain. Based on the numerical results, we argue that the
795
+ Landau levels of Majorana fermions emerge in the wide
796
+ gapless region around the isotropically interacting point
797
+ in the phase diagram of the unstraind system. The emer-
798
+ gence of the strain-induced Landau levels of Majorana
799
+ fermions in the anisotropically interacting Kitaev system
800
+ is confirmed also by an analytical calculation. When uni-
801
+ axial strain is applied, the same features (i.e., En ∝ √n
802
+ and sublattice polarization) are expected to appear. To
803
+ observe the features of the strain-induced Landau lev-
804
+ els of Majorana fermions, scanning tunneling microscopy
805
+ (STM) is promising. According to the STM theory for
806
+ the Kitaev model, the differential conductance through
807
+ a single site provides direct information on the LDOS
808
+ of Majorana fermions at low temperatures44.
809
+ In fact,
810
+ the two features of the strain-induced Landau levels (i.e.,
811
+ En ∝ √n and sublattice polarization) have been observed
812
+ in artificial graphene under simulated triaxial strain eval-
813
+ uated pseudomagnetic fields up to 60 T29. The fabrica-
814
+ tion of the α-RuCl3 thin films has been studied actively
815
+ in recent years. This situation favors experiments for in-
816
+ vestigating whether the strain-induced Landau levels of
817
+ Majorana fermions emerge in Kitaev candidate materials
818
+ such as α-RuCl3. We hope that our results contribute to
819
+ such studies.
820
+ Acknowledgments
821
+ We would like to thank T. Suzuki and R. Taniguchi for
822
+ valuable discussions. This work was supported by JSPS
823
+ KAKENHI (Grant No. 19K03721) from MEXT, Japan.
824
+ 1 A. Kitaev, Ann. Phys. 321, 2 (2006).
825
+ 2 J. Chaloupka, G. Jackeli, and G. Khaliullin, Phys. Rev.
826
+
827
+ 7
828
+ Lett. 105, 027204 (2010).
829
+ 3 Y. Singh, S. Manni, J. Reuther, T. Berlijn, R. Thomale,
830
+ W. Ku, S. Trebst, and P. Gegenwart, Phys. Rev. Lett. 108,
831
+ 127203 (2012).
832
+ 4 R. Comin, G. Levy, B. Ludbrook, Z.-H. Zhu, C. N. Veen-
833
+ stra, J. A. Rosen, Y. Singh, P. Gegenwart, D. Stricker,
834
+ J. N. Hancock, D. van der Marel, I. S. Elfimov, and A.
835
+ Damascelli, Phys. Rev. Lett. 109, 266406 (2012).
836
+ 5 K. Foyevtsova, H. O. Jeschke, I. I. Mazin, D. I. Khomskii,
837
+ and R. Valent´ı, Phys. Rev. B 88, 035107 (2013).
838
+ 6 Y. Yamaji, Y. Nomura, M. Kurita, R. Arita, and M.
839
+ Imada, Phys. Rev. Lett. 113, 107201 (2014).
840
+ 7 Y. Sizyuk, C. Price, P. W¨olfle, and N. B. Perkins, Phys.
841
+ Rev. B 90, 155126 (2014).
842
+ 8 V. M. Katukuri, S. Nishimoto, V. Yushankhai, A. Stoy-
843
+ anova, H. Kandpal, S. Choi, R. Coldea, I. Rousochatzakis,
844
+ L. Hozoi, and J. van den Brink, New J. Phys. 16, 013056
845
+ (2014).
846
+ 9 S.-H. Chun, J.-W. Kim, J. Kim, H. Zheng, C. C. Stoumpos,
847
+ C. D. Malliakas, J. F. Mitchell, K. Mehlawat, Y. Singh,
848
+ Y. Choi, T. Gog, A. Al-Zein, M. M. Sala, M. Krisch, J.
849
+ Chaloupka, G. Jackeli, G. Khaliullin, and B. J. Kim, Na-
850
+ ture Physics 11, 462 (2015).
851
+ 10 S. M. Winter, Y. Li, H. O. Jeschke, and R. Valent´ı, Phys.
852
+ Rev. B 93, 214431 (2016).
853
+ 11 K. W. Plumb, J. P. Clancy, L. J. Sandilands, V. V.
854
+ Shankar, Y. F. Hu, K. S. Burch, H.-Y. Kee, and Y.-J.
855
+ Kim, Phys. Rev. B 90, 041112(R) (2014).
856
+ 12 Y. Kubota, H. Tanaka, T. Ono, Y. Narumi, and K. Kindo,
857
+ Phys. Rev. B 91, 094422 (2015).
858
+ 13 M. Majumder, M. Schmidt, H. Rosner, A. A. Tsirlin, H.
859
+ Yasuoka,and M. Baenitz, Phys. Rev. B 91, 180401(R)
860
+ (2015).
861
+ 14 L. J. Sandilands, Y. Tian, A. A. Reijnders, H.-S. Kim, K.
862
+ W. Plumb, Y.-J. Kim, H.-Y. Kee, and K. S. Burch, Phys.
863
+ Rev. B 93, 075144 (2016).
864
+ 15 H.-S. Kim, and H.-Y. Kee, Phys. Rev. B 93, 155143 (2016).
865
+ 16 R. Yadav, N. A. Bogdanov, V. M. Katukuri, S. Nishimoto,
866
+ J. van den Brink, and L. Hozoi, Sci. Rep. 6, 37925 (2016)
867
+ 17 S. Sinn, C.-H. Kim, B.-H. Kim, K.-D. Lee, C.-J. Won, J.-S.
868
+ Oh, M. Han, Y.-J. Chang, N. Hur, Hi. Sato, B.-G. Park,
869
+ C. Kim, H.-D. Kim, and T.-W. Noh, Sci. Rep. 6, 39544
870
+ (2016).
871
+ 18 W. Wang, Z.-Y. Dong, S.-L. Yu, and J.-X. Li, Phys. Rev.
872
+ B 96, 115103 (2017).
873
+ 19 K. Kitagawa, T. Takayama, Y. Matsumoto, A. Kato, R.
874
+ Takano, Y. Kishimoto, S. Bette, R. Dinnebier, G. Jackeli,
875
+ and H. Takagi, Nature 554, 341 (2018).
876
+ 20 M. Hermanns, I. Kimchi, and J. Knolle, Annu. Rev. Con-
877
+ dens. Matter. Phys. 9, 17 (2018).
878
+ 21 J. Knolle and and R. Moessner, Annu. Rev. Condens. Mat-
879
+ ter. Phys. 10, 451 (2019).
880
+ 22 H. Takagi, T. Takayama, G. Jackeli, G. Khaliullin, and S.
881
+ E. Nagler, Nat. Rev. Phys. 1, 264 (2019).
882
+ 23 Y. Motome and J. Nasu, J. Phys. Soc. Jpn. 89, 1 (2020).
883
+ 24 S. Trebst and C. Hickey, Phys. Rep. 950, 012002 (2022).
884
+ 25 Y. Kasahara, T. Ohnishi, Y. Mizukami, O. Tanaka, Sixiao
885
+ Ma, K. Sugii, N. Kurita, H. Tanaka, J. Nasu, Y. Motome,
886
+ T. Shibauchi, and Y. Matsuda, Nature 559, 227 (2018)
887
+ 26 Y. Kasahara, K. Sugii, T. Ohnishi, M. Shimozawa, M. Ya-
888
+ mashita, N. Kurita, H. Tanaka, J. Nasu, Y. Motome, T.
889
+ Shibauchi, and Y. Matsuda, Phys. Rev. Lett. 120, 217205
890
+ (2018).
891
+ 27 M. A. H. Vozmediano, M. I. Katsnelson, and F. Guinea,
892
+ Phys. Rep. 496, 109 (2010).
893
+ 28 N. Levy, S. A. Burke, K. L. Meaker, M. Panlasigui, A.
894
+ Zettl, F. Guinea, A. H. C. Neto, M. F. Crommie, Science
895
+ 329, 544 (2010).
896
+ 29 K. K. Gomes, W. Mar, W. Ko, F. Guinea, and H. C.
897
+ Manoharan, Nature 483, 306 (2012).
898
+ 30 M. C. Rechtsman, J. M. Zeuner, A. Tuennermann, S.
899
+ Nolte, M. Segev, A. Szameit, Nat. Photonics 7, 153 (2013).
900
+ 31 Y. Liu, J. N. B. Rodrigues, Y. Z. Luo, L. Li, A. Carvalho,
901
+ M. Yang, E. Laksono, J. Lu, Y. Bao, H. Xu, S. J. R. Tan,
902
+ Z. Qiu, C. H. Sow, Y. P. Feng, A. H. C. Neto, S. Adam, J.
903
+ Lu, K. P. Loh,Nat. Nanotechnol. 13, 828 (2018).
904
+ 32 P. Nigge, A. C. Qu, ´E. Lantagne-Hurtubise, E. M˚arsell, S.
905
+ Link, G. Tom, M. Zonno, M. Michiardi, M. Schneider, S.
906
+ Zhdanovich, G. Levy, U. Starke, C. Guti´errez, D. Bonn, S.
907
+ A. Burke, M. Franz, A. Damascelli, Sci. Adv. 5, eaaw5593
908
+ (2019).
909
+ 33 S. Rachel, L. Fritz, and M. Vojta, Phys. Rev. Lett. 116,
910
+ 167201 (2016).
911
+ 34 B. Perreault, S. Rachel, F. J. Burnell, and J. Knolle, Phys.
912
+ Rev. B 95, 184429 (2017).
913
+ 35 F. Guinea, M. I. Katsnelson, and A. K. Geim, Nat. Phys.
914
+ 6, 30 (2010).
915
+ 36 M. Neek-Amal, L. Covaci, Kh. Shakouri, and F. M.
916
+ Peeters, Phys. Rev. B 88, 115428 (2013).
917
+ 37 M. Settnes, S. R. Power, and A.-P. Jauho, Phys. Rev. B
918
+ 93, 035456 (2016).
919
+ 38 M. Fremling and L. Fritz, Phys. Rev. B 105, 085147
920
+ (2022).
921
+ 39 E. Lieb, Phys. Rev. Lett. 73, 2158 (1994).
922
+ 40 C. Poli, J. Arkinstall, and H. Schomerus, Phys. Rev. B 90,
923
+ 155418 (2014).
924
+ 41 J. W. F. Venderbos and L. Fu, Phys. Rev. B 93, 195126
925
+ (2016).
926
+ 42 G. Salerno, T. Ozawa, H. M. Price, and I. Carusotto, Phys.
927
+ Rev. B 95, 245418 (2017).
928
+ 43 M. Settnes, S. R. Power, and A.-P. Jauho, Phys. Rev. B
929
+ 93, 035456 (2016).
930
+ 44 M. Udagawa, S. Takayoshi, and T. Oka, Phys. Rev. Lett.
931
+ 126, 127201 (2021).
932
+
DtE4T4oBgHgl3EQf6Q5X/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9AyT4oBgHgl3EQfSfeg/content/2301.00088v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9528208f019c8979a05d3e9d8d627fcbc5030efe3230287dc5a44d4d400c78fb
3
+ size 2587314
EdE0T4oBgHgl3EQfywKq/content/2301.02664v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b5bdab1f9d4e20c987d7efb50b8d186aa9a65138d4baf12e4951e56534995a2b
3
+ size 332458
EdE0T4oBgHgl3EQfywKq/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4cd11b62fd4bda40b4068b2d2d200c56a0923aa5773f85895841ee7c97c210e4
3
+ size 1900589
EdE0T4oBgHgl3EQfywKq/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3ca651c6f39d86a78233f94455d192c8437c692e157912787ec631c68b34cff3
3
+ size 72983
EdE1T4oBgHgl3EQf-gYV/content/2301.03568v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d6a55a142812e9eab9e4b29b5890c61d6e07eefa57a5a4facd6b234853c8062d
3
+ size 954409
EdE1T4oBgHgl3EQf-gYV/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:732d452c9fde683dedc11ca489ef965162718d7e468b432985d9950bca65833a
3
+ size 185115
EtE3T4oBgHgl3EQfVQrm/content/tmp_files/2301.04459v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtE3T4oBgHgl3EQfVQrm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
I9AzT4oBgHgl3EQfx_6k/content/2301.01747v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:104b5e16fb32c7c3e0b0c17792927bab9486d6745ee902ff4ac9556a6d935a6b
3
+ size 39827982
INAzT4oBgHgl3EQfxv6_/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5d25f10ab2957a5acba0b4b65c3f873f3acefd5831e6b86ceaac04e584d7069e
3
+ size 17236013
INAzT4oBgHgl3EQfxv6_/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7b3a768fa53be07e8a4e9dd6a028b6741f18d9352c3f133e008be0f7f9c7c8ac
3
+ size 652592
IdE4T4oBgHgl3EQfIQyU/content/tmp_files/2301.04911v1.pdf.txt ADDED
@@ -0,0 +1,2480 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04911v1 [math.AP] 12 Jan 2023
2
+ Multi-bubble nodal solutions to slightly subcritical
3
+ elliptic problems with Hardy terms in symmetric
4
+ domains
5
+ Thomas Bartsch∗, Qianqiao Guo†
6
+ Abstract We consider the slightly subcritical elliptic problem with Hardy term
7
+
8
+
9
+
10
+
11
+
12
+ −∆u − µ u
13
+ |x|2 = |u|2∗−2−εu
14
+ in Ω ⊂ RN,
15
+ u = 0
16
+ on ∂Ω,
17
+ where 0 ∈ Ω and Ω is invariant under the subgroup SO(2) × {±EN−2} ⊂ O(N); here En denots the n × n
18
+ identity matrix. If µ = µ0εα with µ0 > 0 fixed and α > N−4
19
+ N−2 the existence of nodal solutions that blow up,
20
+ as ε → 0+, positively at the origin and negatively at a different point in a general bounded domain has been
21
+ proved in [5]. Solutions with more than two blow-up points have not been found so far. In the present paper
22
+ we obtain the existence of nodal solutions with a positive blow-up point at the origin and k = 2 or k = 3
23
+ negative blow-up points placed symmetrically in Ω ∩ (R2 × {0}) around the origin provided a certain function
24
+ fk : R+ ×R+ ×I → R has stable critical points; here I = {t > 0 : (t, 0, . . . , 0) ∈ Ω}. If Ω = B(0, 1) ⊂ RN is the
25
+ unit ball centered at the origin we obtain two solutions for k = 2 and N ≥ 7, or k = 3 and N large. The result
26
+ is optimal in the sense that for Ω = B(0, 1) there cannot exist solutions with a positive blow-up point at the
27
+ origin and four negative blow-up points placed on the vertices of a square centered at the origin. Surprisingly
28
+ there do exist solutions on Ω = B(0, 1) with a positive blow-up point at the origin and four blow-up points
29
+ on the vertices of a square with alternating positive and negative signs. The results of our paper show that
30
+ the structure of the set of blow-up solutions of the above problem offers fascinating features and is not well
31
+ understood.
32
+ 2010 Mathematics Subject Classification: 35B44, 35B33, 35J60.
33
+ Key words: Hardy term; Critical exponent; Slightly subcritical problems; Nodal solutions; Multi-bubble
34
+ solutions.
35
+ ∗Mathematisches Institut, Justus-Liebig-Universit¨at Giessen, Arndtstr. 2, 35392 Giessen, Germany
36
+ †School of Mathematics and Statistics, Northwestern Polytechnical University, 710129 Xi’an, China
37
+ 1
38
+
39
+ 2
40
+ T. Bartsch, Q. Guo
41
+ 1
42
+ Introduction
43
+ The paper is concerned with the semilinear singular problem
44
+ (1.1)
45
+
46
+
47
+
48
+
49
+
50
+ −∆u − µ u
51
+ |x|2 = |u|2∗−2−εu
52
+ in Ω,
53
+ u = 0
54
+ on ∂Ω,
55
+ where Ω ⊂ RN, N ≥ 7, is a smooth bounded domain with 0 ∈ Ω; 2∗ :=
56
+ 2N
57
+ N−2 is the critical Sobolev exponent.
58
+ In [5], we obtained the existence of two-bubble nodal solutions to problem (1.1) that blow up positively at the
59
+ origin and negatively at a different point in a general bounded domain, as ε → 0+ and µ = µ0εα with µ0 > 0
60
+ and α > N−4
61
+ N−2. The location of the negative blow-up point is determined by the geometry of the domain.
62
+ The existence of nodal bubble tower solutions has been proved in [6]. These are superpositions of positive
63
+ and negative bubbles with different scalings, all blowing up at the origin. It seems to be a difficult and open
64
+ problem whether solutions with a blow-up point at the origin and more than one blow-up point outside the
65
+ origin exist in a general domain. In the present paper we investigate this problem in symmetric domains, in
66
+ particular for the model case of the ball Ω = B(0, 1).
67
+ In the case of a ball it is natural to place one blow-up point, say positive, at the origin and k blow-up
68
+ points, say negative, at the vertices of a regular k-gon with center at the origin. We shall prove that solutions
69
+ of this shape exist for 2 ≤ k ≤ 3 but, somewhat surprisingly, not for k = 4. On the other hand, we prove the
70
+ existence of solutions with four blow-up points, two positive and two negative ones, at the vertices of a square,
71
+ centered symmetrically around the positive blow-up point at the origin. Our results show that the existence
72
+ of solutions of (1.1) with three or more blow-up points is interesting and far from being understood.
73
+ When µ = 0 the blow-up phenomenon for positive and for nodal solutions to problem (1.1) has been
74
+ studied extensively, see for instance [2–4, 7, 9, 14, 19, 22, 24, 26, 28–31] and the references therein.
75
+ However
76
+ for µ ̸= 0, few results are known about the existence of positive or nodal solutions with multiple bubbles to
77
+ problem (1.1). Positive solutions have been obtained in [12]. Related results, though for different equations,
78
+ can be found in [16,17,27]. We also want to mention the papers [10,11,15,18,21,23,25,32,33,35] dealing with
79
+ the critical exponent, i.e. ε = 0.
80
+ An important role will be played by the limit problem
81
+ (1.2)
82
+
83
+
84
+
85
+
86
+
87
+ −∆u − µ u
88
+ |x|2 = |u|2∗−2u
89
+ in RN,
90
+ u → 0
91
+ as |x| → ∞
92
+ which has been investigated in [13,35]. Positive solutions of (1.2) in the range 0 ≤ µ < µ := (N−2)2
93
+ 4
94
+ are given
95
+ by
96
+ Vµ,σ(x) = Cµ
97
+
98
+ σ
99
+ σ2|x|β1 + |x|β2
100
+ � N−2
101
+ 2
102
+
103
+ Nodal solutions to problems with Hardy terms
104
+ 3
105
+ with σ > 0, β1 := (√µ − √µ − µ)/√µ, β2 := (√µ + √µ − µ)/√µ, and Cµ :=
106
+
107
+ 4N(µ−µ)
108
+ N−2
109
+ � N−2
110
+ 4 . These solutions
111
+ minimize
112
+ Sµ :=
113
+ min
114
+ u∈D1,2(RN )\{0}
115
+
116
+ RN(|∇u|2 − µ u2
117
+ |x|2 )dx
118
+ (
119
+
120
+ RN |u|2∗dx)2/2∗
121
+ ,
122
+ and there holds
123
+
124
+ RN
125
+
126
+ |∇Vµ,σ|2 − µ|Vµ,σ|2
127
+ |x|2
128
+
129
+ dx =
130
+
131
+ RN |Vµ,σ|2∗dx = S
132
+ N
133
+ 2
134
+ µ .
135
+ In the range 0 < µ < µ these are all positive solutions of (1.2). In the case µ = 0 these are all solutions with
136
+ maximum at x = 0. Of course, if µ = 0 also translates of Vµ,σ are solutions of
137
+ (1.3)
138
+
139
+
140
+
141
+ −∆u = |u|2∗−2u
142
+ in RN,
143
+ u → 0
144
+ as |x| → ∞.
145
+ We will write
146
+ Uδ,ξ(x) = C0
147
+
148
+ δ
149
+ δ2 + |x − ξ|2
150
+ � N−2
151
+ 2
152
+ for the solutions of (1.3) where δ > 0, ξ ∈ RN and C0 := (N(N − 2))
153
+ N−2
154
+ 4 .
155
+ These are the well known
156
+ Aubin-Talenti instantons (see [1,34]).
157
+ Now we state our main results. We consider domains satisfying the condition
158
+ (A1) Ω ⊂ RN is a bounded domain with 0 ∈ Ω, and it is invariant under the subgroup SO(2) × {±EN−2} ⊂
159
+ O(N).
160
+ We use the notation x = (x′, x′′) ∈ Ω ⊂ R2 × RN−2 and write A(x′, x′′) = (Ax′, x′′) for A ∈ SO(2). For k ∈ N
161
+ let Rk =
162
+
163
+ cos 2π
164
+ k
165
+ − sin 2π
166
+ k
167
+ sin 2π
168
+ k
169
+ cos 2π
170
+ k
171
+
172
+  ∈ SO(2), and set I = {t > 0 : (t, 0, . . . , 0) ∈ Ω} ⊂ R.
173
+ Our first results are concerned with the existence of nodal solutions with k +1 bubbles, one being positive
174
+ and k being negative. Let G(x, y) =
175
+ 1
176
+ |x−y|N−2 − H(x, y) be the Green function (up to a coefficient involving
177
+ the volume of the unit ball) for the Dirichlet Laplace operator in Ω with regular part H. For k = 2, 3 we define
178
+ the function fk : R+ × R+ × I → R by
179
+ fk(λ0, λ1, t) := b1
180
+
181
+ H(0, 0)λN−2
182
+ 0
183
+ + kH(ξ(t), ξ(t))λN−2
184
+ 1
185
+ + 2kG(ξ(t), 0)λ
186
+ N−2
187
+ 2
188
+ 0
189
+ λ
190
+ N−2
191
+ 2
192
+ 1
193
+ − 2
194
+ �k
195
+ 2
196
+
197
+ G(ξ(t), Rkξ(t))λN−2
198
+ 1
199
+
200
+ − b2
201
+ N − 2
202
+ 2
203
+ ln
204
+
205
+ λ0λk
206
+ 1
207
+
208
+ .
209
+ where ξ(t) = (t, 0, . . . , 0) and
210
+ b1 = 1
211
+ 2C0
212
+
213
+ RN U 2∗−1
214
+ 1,0
215
+ and
216
+ b2 = 1
217
+ 2∗
218
+
219
+ RN U 2∗
220
+ 1,0.
221
+ Finally we call a critical point of fk stable if it is isolated and has nontrivial local degree. This is the case, for
222
+ instance, if it is non-degenerate or an isolated local maximum or minimum.
223
+
224
+ 4
225
+ T. Bartsch, Q. Guo
226
+ Theorem 1.1. Suppose Ω satisfies (A1), and suppose (λ0, λ1, t) ∈ R+ × R+ × I is a stable critical point of
227
+ fk, k = 2 or k = 3. Let µ0 > 0 and α > N−4
228
+ N−2 be fixed. Then there exists ε0 > 0 such that for every ε ∈ (0, ε0)
229
+ problem (1.1) with µ = µε = µ0εα has a pair of solutions ±uε satisfying
230
+ (1.4)
231
+ uε(x) = Vµε,σε(x) −
232
+ k
233
+
234
+ i=1
235
+ Uδε,Ri
236
+ kξ(tε)(x) + o(1)
237
+ = Cµε
238
+
239
+ σε
240
+ (σε)2|x|β1 + |x|β2
241
+ � N−2
242
+ 2
243
+ − C0
244
+ k
245
+
246
+ i=1
247
+
248
+ δε
249
+ (δε)2 + |x − Ri
250
+ kξ(tε)|2
251
+ � N−2
252
+ 2
253
+ + o(1),
254
+ where
255
+ σε =
256
+
257
+ λ0 + o(1)
258
+
259
+ ε
260
+ 1
261
+ N−2 , δε =
262
+
263
+ λ1 + o(1)
264
+
265
+ ε
266
+ 1
267
+ N−2 , ξ(tε) = (tε, 0, . . . , 0) = (t + o(1), 0, . . . , 0)
268
+ as ε → 0.
269
+ These solutions satisfy the following symmetries:
270
+ (1.5)
271
+ uε(x′, x′′) = uε(x′, −x′′) = uε(Rkx′, x′′)
272
+ for (x′, x′′) ∈ Ω ⊂ R2 × RN−2.
273
+ As Proposition 1.4 below shows, for k = 4 a family uε as in Theorem 1.1 need not exist even in the case
274
+ of the ball. It is a challenging problem to find critical points of fk for general domains satisfying (A1). We
275
+ consider the special case where Ω = B(0, 1) ⊂ RN is the unit ball.
276
+ Theorem 1.2. If Ω = B(0, 1) ⊂ RN, k = 2 and N ≥ 7, or k = 3 and N is large enough, then fk has two stable
277
+ critical points, one is a local minimum, the other a mountain pass point with Morse index 1. As a consequence,
278
+ problem (1.1) has two families of solutions ±u1
279
+ ε, ±u2
280
+ ε as in Theorem 1.1. They have the additional symmetry
281
+ uε(x′, x′′) = uε(x′, Ax′′)
282
+ for all A ∈ SO(N − 2).
283
+ Remark 1.3. a) In the proof of the case k = 3 we provide an explicit inequality for N, so that the solutions
284
+ as in Theorem 1.2 exist if this inequality holds. Numerical computations show that this inequality is not
285
+ satisfied for N = 7. We do not know the optimal value for N such that Theorem 1.2 is true for k = 3; see also
286
+ Remark 4.2.
287
+ b) We conjecture that Theorem 1.2 holds for other domains satisying (A1), for instance for Ω = B2(0, 1)×
288
+ Ω′ ⊂ R2 × RN−2 with Ω′ = −Ω′ ⊂ RN−2 a bounded symmetric neighborhood of 0. Our proof of Theorem 1.2
289
+ uses the explicit knowledge of the Green function for the ball, hence it does not extend immmediately to other
290
+ domains.
291
+ The next result shows that Theorem 1.2 is optimal.
292
+ Proposition 1.4. For Ω = B(0, 1) ⊂ RN, N ≥ 7 and k = 4 there does not exist a family of solutions ±uε as
293
+ in Theorem 1.1.
294
+ Remark 1.5. a) We conjecture that Proposition 1.4 can be generalized to k ≥ 4.
295
+
296
+ Nodal solutions to problems with Hardy terms
297
+ 5
298
+ b) We cannot exclude the existence of solutions with a positive bubble at the origin and k = 4 negative
299
+ bubbles placed somewhere in the ball and with possibly different blow-up parameters δ. However, we can show
300
+ that there do not exist solutions with four negative bubbles at the vertices of a square centered at the origin
301
+ even if one allows different blow-up speeds, i.e. if one replaces the δε in (1.4) by δi,ε, i = 1, . . . , 4. In fact,
302
+ it is not difficult to prove that the blow-up parameters δi,ε have to be independent of i if the vertices are at
303
+ Ri
304
+ 4ξ(tε), i = 1, . . . , 4.
305
+ Considering Proposition 1.4 the following existence results of nodal solutions with five bubbles, three
306
+ being positive and two being negative, is somewhat surprising.
307
+ Theorem 1.6. Let Ω = B(0, 1) ⊂ RN, N ≥ 7, µ0 > 0 and α > N−4
308
+ N−2 be fixed. Then there exists ε0 > 0 such
309
+ that for any ε ∈ (0, ε0), there exist a pair of 5-bubble solutions ±uε to problem (1.1) with µ = µε = µ0εα of
310
+ the shape
311
+ uε(x) = Vµε,σε(x) +
312
+ 4
313
+
314
+ i=1
315
+ (−1)iUδi,ε,Ri
316
+ 4ξ(tε)(x) + o(1)
317
+ = Cµε
318
+
319
+ σε
320
+ (σε)2|x|β1 + |x|β2
321
+ � N−2
322
+ 2
323
+ + C0
324
+ 4
325
+
326
+ i=1
327
+ (−1)i
328
+
329
+ δi,ε
330
+ (δi,ε)2 + |x − Ri
331
+ 4ξ(tε)|2
332
+ � N−2
333
+ 2
334
+ + o(1),
335
+ where σε =
336
+
337
+ λ0 + o(1)
338
+
339
+ ε
340
+ 1
341
+ N−2 , δ1,ε = δ3,ε =
342
+
343
+ λ1 + o(1)
344
+
345
+ ε
346
+ 1
347
+ N−2 , δ2,ε = δ4,ε =
348
+
349
+ λ2 + o(1)
350
+
351
+ ε
352
+ 1
353
+ N−2 , ξ(tε) =
354
+ (tε, 0, . . . , 0) = (t + o(1), 0 . . . , 0) as ε → 0, for some λ0, λ1, λ2 > 0, t ∈ (0, 1).
355
+ These solutions satisfy
356
+ the symmetries:
357
+ (1.6)
358
+ uε(x′, x′′) = uε(x′, Ax′′) = −uε(R4x′, x′′)
359
+ for (x′, x′′) ∈ B(0, 1) ⊂ R2 × RN−2, A ∈ SO(N − 2).
360
+ Remark 1.7. a) The parameters (λ0, λ1, λ2, t) ∈ R+ × R+ × R+ × (0, 1) in Theorem 1.6 are obtained as a
361
+ critical point of a suitable limit function f5. We conjecture that there exists a second solution in Theorem 1.6
362
+ but the computations for finding a second critical point of f5 are intimidating.
363
+ b) It seems that for k = 2 in Theorem 1.2, it is still possible to obtain the information on the nodal sets
364
+ of the solutions as in [4]. For k = 3 in Theorem 1.2 and for Theorem 1.6, it is an interesting problem to study
365
+ the profile of the nodal sets of the solutions.
366
+ c) As stated in [5], the assumption α > N−4
367
+ N−2 is essential in our theorems.
368
+ The paper is organized as follows. In Section 2, we collect some notations and preliminary results. Section 3
369
+ is devoted to the method of finite dimensional reduction. Section 4 contains the proof of Theorems 1.1 and
370
+ 1.2. Proposition 1.4 is proved in Section 5, and finally Theorem 1.6 is proved in Section 6.
371
+
372
+ 6
373
+ T. Bartsch, Q. Guo
374
+ 2
375
+ Notations and preliminary results
376
+ Throughout this paper, positive constants will be denoted by C, c. By Hardy’s inequality the norm
377
+ ∥u∥µ :=
378
+ ��
379
+
380
+ (|∇u|2 − µ u2
381
+ |x|2 )dx
382
+ � 1
383
+ 2
384
+ is equivalent to the norm ∥u∥0 =
385
+ ��
386
+ Ω |∇u|2dx
387
+ �1/2 on H1
388
+ 0(Ω) provided 0 ≤ µ < µ. This inequality is of course
389
+ satisfied for µ = µ0εα with α > 0 and ε > 0 small. We write Hµ(Ω) for the Hilbert space consisting of the
390
+ H1
391
+ 0(Ω) functions with the inner product
392
+ (u, v)µ :=
393
+
394
+
395
+
396
+ ∇u∇v − µ uv
397
+ |x|2
398
+
399
+ dx.
400
+ As in [5, 16] let ι∗
401
+ µ : L2N/(N+2)(Ω) → Hµ(Ω) be the adjoint operator of the inclusion ιµ : Hµ(Ω) →
402
+ L2N/(N−2)(Ω), that is,
403
+ ι∗
404
+ µ(u) = v
405
+ ⇐⇒
406
+ (v, φ)µ =
407
+
408
+
409
+ u(x)φ(x)dx,
410
+ for all φ ∈ Hµ(Ω).
411
+ There exists c > 0 such that
412
+ ∥ι∗
413
+ µ(u)∥µ ≤ c∥u∥2N/(N+2).
414
+ Then problem (1.1) is equivalent to the fixed point problem
415
+ u = ι∗
416
+ µ(fε(u)),
417
+ u ∈ Hµ(Ω),
418
+ where fε(s) = |s|2∗−2−εs.
419
+ The following proposition is from [5, Proposition 3.1].
420
+ Proposition 2.1. Let 0 < µ < µ, and let Λi, i = 1, 2, . . . , be the eigenvalues of
421
+
422
+
423
+
424
+
425
+
426
+ −∆u − µ u
427
+ |x|2 = Λ|Vσ|2∗−2u
428
+ in RN,
429
+ |u| → 0
430
+ as |x| → +∞
431
+ in increasing order. Then Λ1 = 1 with eigenfunction Vσ, Λ2 = 2∗ − 1 with eigenfunction ∂Vσ
432
+ ∂σ .
433
+ Our main results will be proved using variational and singular limit methods applied to the energy func-
434
+ tional
435
+ Jε(u) := 1
436
+ 2
437
+
438
+
439
+
440
+ |∇u|2 − µ u2
441
+ |x|2
442
+
443
+ dx −
444
+ 1
445
+ 2∗ − ε
446
+
447
+
448
+ |u|2∗−εdx
449
+ defined on Hµ(Ω).
450
+ Let us also recall that the Green’s function of the Dirichlet Laplacian G(x, y) =
451
+ 1
452
+ |x−y|N−2 − H(x, y) and
453
+ its regular part H are symmetric: G(x, y) = G(y, x) and H(x, y) = H(y, x). If Ω is invariant under some
454
+ A ∈ O(N) then G(Ax, Ay) = G(x, y), and the same holds for H.
455
+
456
+ Nodal solutions to problems with Hardy terms
457
+ 7
458
+ 3
459
+ The finite dimensional reduction
460
+ First we recall some notation from [5].
461
+ Fix µ0 > 0, α >
462
+ N−4
463
+ N−2 and an integer k ≥ 0.
464
+ For λ =
465
+ (λ0, λ1, . . . , λk) ∈ Rk+1
466
+ +
467
+ and ξ = (ξ1, ξ2, . . . , ξk) ∈ Ωk we define
468
+ Wε,λ,ξ :=
469
+ k
470
+
471
+ i=1
472
+ Ker
473
+
474
+ −∆ − (2∗ − 1)U 2∗−2
475
+ δi,ξi
476
+
477
+ + Ker
478
+
479
+ −∆ − µε
480
+ |x|2 − (2∗ − 1)V 2∗−2
481
+ µε,σε
482
+
483
+ ⊂ H1(RN)
484
+ where δi = λiε
485
+ 1
486
+ N−2 , µε = µ0εα, σε = λ0ε
487
+ 1
488
+ N−2 . By Proposition 2.1 and [8] we know that
489
+ Wε,λ,ξ = span
490
+
491
+ Ψj
492
+ i, Ψ0
493
+ i , Ψ0, i = 1, 2, . . . , k, j = 1, 2, . . ., N
494
+
495
+ ,
496
+ where for i = 1, 2, . . . , k and j = 1, 2, . . . , N:
497
+ Ψj
498
+ i := ∂Uδi,ξi
499
+ ∂ξi,j
500
+ ,
501
+ Ψ0
502
+ i := ∂Uδi,ξi
503
+ ∂δi
504
+ ,
505
+ Ψ0 := ∂Vµε,σε
506
+ ∂σ
507
+ with ξi,j the j-th component of ξi. For η ∈ (0, 1) we define
508
+ Oη :=
509
+
510
+ (λ, ξ) ∈ Rk+1
511
+ +
512
+ × Ωk : λi ∈ (η, η−1) for i = 0, . . . , k, dist(ξi, ∂Ω) > η,
513
+ |ξi| > η, |ξi1 − ξi2| > η, for i, i1, i2 = 1, . . . , k, i1 ̸= i2
514
+
515
+ .
516
+ The projection P : H1(RN) → H1
517
+ 0(Ω) is defined by ∆Pu = ∆u in Ω and Pu = 0 on ∂Ω. We also need
518
+ the spaces
519
+ Kε,λ,ξ := PWε,λ,ξ
520
+ and
521
+ K⊥
522
+ ε,λ,ξ := {φ ∈ Hµ(Ω) : (φ, PΨ)µε = 0, for all Ψ ∈ Wε,λ,ξ},
523
+ as well as the (·, ·)µε-orthogonal projections
524
+ Πε,λ,ξ : Hµε(Ω) → Kε,λ,ξ
525
+ and
526
+ Π⊥
527
+ ε,λ,ξ := Id − Πε,λ,ξ : Hµε(Ω) → K⊥
528
+ ε,λ,ξ.
529
+ Then solving problem (1.1) is equivalent to finding η > 0, ε > 0, (λ, ξ) ∈ Oη and φε,λ,ξ ∈ K⊥
530
+ ε,λ,ξ such that:
531
+ (3.1)
532
+ Π⊥
533
+ ε,λ,ξ
534
+
535
+ Vε,λ,ξ + φε,λ,ξ − ι∗
536
+ µ(fε(Vε,λ,ξ + φε,λ,ξ))
537
+
538
+ = 0,
539
+ and
540
+ Πε,λ,ξ
541
+
542
+ Vε,λ,ξ + φε,λ,ξ − ι∗
543
+ µ(fε(Vε,λ,ξ + φε,λ,ξ))
544
+
545
+ = 0,
546
+ where in the case of Theorem 1.2
547
+ (3.2)
548
+ Vε,λ,ξ = −
549
+ k
550
+
551
+ i=1
552
+ PUδi,ξi + PVµε,σε
553
+
554
+ 8
555
+ T. Bartsch, Q. Guo
556
+ with k = 2, 3, and in the case of Theorem 1.6
557
+ (3.3)
558
+ Vε,λ,ξ =
559
+ k
560
+
561
+ i=1
562
+ (−1)iPUδi,ξi + PVµε,σε
563
+ with k = 4.
564
+ The following two propositions have been proved in [5].
565
+ Proposition 3.1. For every η > 0 there exist ε0 > 0 and c0 > 0 with the following property. For every
566
+ (λ, ξ) ∈ Oη and for every ε ∈ (0, ε0) there exists a unique solution φε,λ,ξ ∈ K⊥
567
+ ε,λ,ξ of equation (3.1) satisfying
568
+ ∥φε,λ,ξ∥µε ≤ c0
569
+
570
+ ε
571
+ N+2
572
+ 2(N−2) + ε
573
+ 1+2α
574
+ 4
575
+
576
+ .
577
+ The map Φε : Oη → K⊥
578
+ ε,λ,ξ defined by Φε(λ, ξ) := φε,λ,ξ is C1.
579
+ Now we can define the reduced functional
580
+ Iε : Oη → R,
581
+ Iε(λ, ξ) := Jε(Vε,λ,ξ + φε,λ,ξ).
582
+ Proposition 3.2. If (λ, ξ) ∈ Oη is a critical point of Iε then Vε,λ,ξ + φε,λ,ξ is a solution to problem (1.1) for
583
+ ε > 0 small.
584
+ So far everything works on a general bounded domain.
585
+ Now we will use the invariance of Iε under
586
+ certain symmetries for further reductions. For A ∈ O(N), ξ = (ξ1, . . . , ξk) ∈ (RN)k and u ∈ Lp(RN) we set
587
+ Aξ := (Aξ1, . . . , Aξk) and A ∗ u := u ◦ A−1. This induces isometric actions of O(N) on (RN)k as well as on
588
+ Lp(RN) and, if AΩ = Ω, on Lp(Ω) and on Hµ(Ω) such that ιµ and ι∗
589
+ µ are equivariant. Moreover we have
590
+ Uδ,Aξ = A ∗ Uδ,ξ
591
+ and
592
+ Wε,λ,Aξ = {A ∗ u : u ∈ Wε,λ,ξ},
593
+ and analogously for Kε,λ,ξ, Πε,λ,ξ, Vε,λ,ξ.
594
+ As a consequence, the uniqueness statement in Proposition 3.1
595
+ implies
596
+ (3.4)
597
+ φε,λ,Aξ = A ∗ φε,λ,ξ,
598
+ hence Iε is invariant with respect to the action A ∗ (λ, ξ) = (λ, Aξ) of O(N) on Oη:
599
+ Iε(λ, Aξ) = Iε(λ, ξ).
600
+ Now we apply the principle of symmetric criticality using the matrix AN :=
601
+
602
+ E2
603
+ 0
604
+ 0
605
+ −EN−2
606
+
607
+  ∈ O(N). By
608
+ assumption AN(Ω) = Ω, hence AN acts on Oη as above leaving Iε invariant. The principle of symmetric
609
+ criticality implies that critical points of Iε constrained to the fixed point set
610
+ OAN
611
+ η
612
+ = {(λ, ξ) ∈ Oη : ANξ = ξ} = {(λ, ξ) ∈ Oη : ξi = (ξ′
613
+ i, 0) ∈ R2 × RN−2, i = 1, . . . , k}
614
+
615
+ Nodal solutions to problems with Hardy terms
616
+ 9
617
+ are critical points of Iε. We also need the invariance of Iε with respect to permutations of the blow-up points.
618
+ Here we need to distinguish between the cases where Vε,λ,ξ is of the form (3.2) or of the form (3.3). Let Sk
619
+ denote the group of permutations of {1, . . ., k}. For π ∈ Sk and (λ, ξ) ∈ Rk+1 × (RN)k we define
620
+ π ∗ (λ0, λ1, . . . , λk) := (λ0, λπ(1), . . . , λπ(k))
621
+ and
622
+ π ∗ (ξ1, . . . , ξk) := (ξπ(1), . . . , ξπ(k)).
623
+ In the case when Vε,λ,ξ is of the form (3.2) it is obvious that
624
+ Iε(π ∗ λ, π ∗ ξ) = Iε(λ, ξ)
625
+ for all π ∈ Sk, (λ, ξ) ∈ Oη.
626
+ It follows that Iε is invariant under the map
627
+ τ : OAN
628
+ η
629
+ → OAN
630
+ η
631
+ ,
632
+ τ(λ0, λ1, . . . , λk, ξ1, . . . , ξk) := (λ0, λk, λ1, . . . , λk−1, Rkξk, Rkξ1, . . . , Rkξk−1),
633
+ which induces an action of Z/kZ on OAN
634
+ η
635
+ ; here Rk(ξ′, ξ′′) := (Rkξ′, ξ′′) where Rk ∈ SO(2) is the rotation from
636
+ Theorem 1.2. Therefore critical points of Iε constrained to the fixed point set of the above map, i.e. to
637
+ OAN,τ
638
+ η
639
+ = {(λ, ξ) ∈ OAN
640
+ η
641
+ : λi = · · · = λ1, ξi = Ri−1
642
+ k
643
+ ξ1, i = 2, . . . , k},
644
+ are critical points of Iε.
645
+ In conclusion, for the proofs of Theorems 1.1 and 1.2 it remains to find critical points of Iε constrained
646
+ to OAN ,τ for ε > 0 small.
647
+ The additional symmetry of the solutions stated in Theorem 1.2, and also in
648
+ Theorem 1.6, is obtained as follows. Since the ball is invariant under the action of A ∈ SO(N − 2) defined by
649
+ A(x′, x′′) := (x′, Ax′′) and since A ∗ (λ, ξ) = (λ, Aξ) = (λ, ξ) for (λ, ξ) ∈ OAN
650
+ η
651
+ it follows from (3.4) that
652
+ A ∗ φε,λ,ξ = φε,λ,Aξ = φε,λ,ξ
653
+ for all A ∈ SO(N − 2),
654
+ hence uε = Vε,λ,ξ + φε,λ,ξ satisfies A ∗ uε = uε, i.e. uε(x′, Ax′′) = uε(x′, x′′), for all A ∈ SO(N − 2).
655
+ In Theorem 1.6 Vε,λ,ξ is of the form (3.3) with k = 4. Here Iε is invariant under the map
656
+ �τ(λ1, λ2, λ3, λ4, λ0, ξ1, ξ2, ξ3, ξ4) = (λ3, λ4, λ1, λ2, R4ξ4, R4ξ1, R4ξ2, R4ξ3),
657
+ so, applying the principle of symmetric criticality once more, a critical point of Iε constrained to the set
658
+ OAN ,�τ
659
+ η
660
+ = {(λ, ξ) ∈ OAN
661
+ η
662
+ : λ1 = λ3, λ2 = λ4, ξi = Ri−1
663
+ k
664
+ ξ1, i = 2, 3, 4}
665
+ is an unconstrained critical point of Iε. This can of course be generalized to any even integer k ≥ 4.
666
+ 4
667
+ Proof of Theorems 1.1 and 1.2
668
+ In this section we consider Vε,λ,ξ = −
669
+ k�
670
+ i=1
671
+ PUδi,ξi + PVµε,σε for k = 2 and k = 3. The reduced energy is
672
+ expanded as follows; see [5, Proposition 5.1].
673
+
674
+ 10
675
+ T. Bartsch, Q. Guo
676
+ Lemma 4.1. For ε → 0+ there holds
677
+ Iε(λ, ξ) = a1 + a2ε − a3εα − a4ε ln ε + ψ(λ, ξ)ε + o(ε)
678
+ C1-uniformly with respect to (λ, ξ) in compact sets of Oη. The constants are given by
679
+ a1 = 1
680
+ N (k + 1)S
681
+ N
682
+ 2
683
+ 0 , a2 = (k + 1)
684
+ 2∗
685
+
686
+ RN U 2∗
687
+ 1,0 ln U1,0 − k + 1
688
+ (2∗)2 S
689
+ N
690
+ 2
691
+ 0 , a3 = 1
692
+ 2S
693
+ N−2
694
+ 2
695
+ 0
696
+ Sµ0, a4 = k + 1
697
+ 2 · 2∗
698
+
699
+ RN U 2∗
700
+ 1,0,
701
+ where S > 0 is defined by Sµ = S0 − Sµ + O(µ2); see [5, Lemma A.10]. The function ψ : Oη → R is given by
702
+ ψ(λ, ξ) = b1
703
+
704
+ H(0, 0)λN−2
705
+ 0
706
+ +
707
+ k
708
+
709
+ i=1
710
+ H(ξi, ξi)λN−2
711
+ i
712
+ + 2
713
+ k
714
+
715
+ i=1
716
+ G(ξi, 0)λ
717
+ N−2
718
+ 2
719
+ i
720
+ λ
721
+ N−2
722
+ 2
723
+ 0
724
+ − 2
725
+ k
726
+
727
+ i,j=1,i<j
728
+ G(ξi, ξj)λ
729
+ N−2
730
+ 2
731
+ i
732
+ λ
733
+ N−2
734
+ 2
735
+ j
736
+
737
+ − b2
738
+ N − 2
739
+ 2
740
+ ln(λ1λ2 . . . λkλ0),
741
+ with
742
+ b1 = 1
743
+ 2C0
744
+
745
+ RN U 2∗−1
746
+ 1,0
747
+ ,
748
+ b2 = 1
749
+ 2∗
750
+
751
+ RN U 2∗
752
+ 1,0.
753
+ It is well known that a stable critical point (λ, ξ) of ψ implies the existence of a critical point (λε, ξε) of
754
+ Iε for ε > 0 small, and that (λε, ξε) → (λ, ξ) as ε → 0. This applies in particular if (λ, ξ) is an isolated critical
755
+ point of ψ with nontrivial local degree.
756
+ Proof of Theorem 1.1. Since the symmetries of Iε carry over to ψ, for the existence of solutions uε as stated
757
+ in Theorem 1.1 it is sufficient to find stable critical points of ψ constrained to
758
+ OAN ,τ
759
+ η
760
+ = {(λ, ξ) ∈ OAN
761
+ η
762
+ : λi = λ1, ξi = Ri−1
763
+ k
764
+ ξ1, i = 2, . . . , k},
765
+ where k = 2, 3. Observe that Iε and ψ are also invariant with respect to the action of A ∈ SO(2) given by
766
+ (x′, 0) �→ (Ax′, 0) acting on the ξi. Therefore in the case k = 2, setting ξ1 = (t, 0, . . . , 0) for 0 < t < 1 and
767
+ ξ2 = R2ξ1 = −ξ1, it is sufficient to find stable critical points of the function f2 : R+ × R+ × (0, 1) → R defined
768
+ by
769
+ f2(λ0, λ1, t) = ψ(λ0, λ1, λ1, ξ1, −ξ1)
770
+ = b1
771
+
772
+ H(0, 0)λN−2
773
+ 0
774
+ + 2H(ξ1, ξ1)λN−2
775
+ 1
776
+ + 4G(ξ1, 0)λ
777
+ N−2
778
+ 2
779
+ 1
780
+ λ
781
+ N−2
782
+ 2
783
+ 0
784
+ − 2G(ξ1, −ξ1)λN−2
785
+ 1
786
+
787
+ − b2
788
+ N − 2
789
+ 2
790
+ ln
791
+
792
+ λ2
793
+ 1λ0
794
+
795
+ .
796
+ This proves Theorem 1.1 in the case k = 2. For k = 3 we set ξ1 = (t, 0, . . . , 0) for 0 < t < 1, ξ2 = R3ξ1 =
797
+
798
+ − t
799
+ 2,
800
+
801
+ 3t
802
+ 2 , 0, . . . , 0
803
+
804
+ , ξ3 = R3ξ2 =
805
+
806
+ − t
807
+ 2, −
808
+
809
+ 3t
810
+ 2 , 0, . . . , 0
811
+
812
+ . As above it is sufficient to find stable critical points
813
+ of the function f3 : R+ × R+ × (0, 1) → R defined by
814
+ f3(λ0, λ1, t) = ψ(λ0, λ1, λ1, λ1, ξ1, ξ2, ξ3)
815
+ = b1
816
+
817
+ H(0, 0)λN−2
818
+ 0
819
+ + 3H(ξ1, ξ1)λN−2
820
+ 1
821
+ + 6G(ξ1, 0)λ
822
+ N−2
823
+ 2
824
+ 0
825
+ λ
826
+ N−2
827
+ 2
828
+ 1
829
+ − 6G(ξ1, ξ2)λN−2
830
+ 1
831
+
832
+ − b2 ln
833
+
834
+ λ3
835
+ 1λ0
836
+ � N−2
837
+ 2
838
+ .
839
+
840
+ Nodal solutions to problems with Hardy terms
841
+ 11
842
+ Here we used that G(ξ1, 0) = G(ξ2, 0) = G(ξ3, 0) and G(ξ1, ξ2) = G(ξ1, ξ3) = G(ξ2, ξ3), as well as H(ξ1, ξ1) =
843
+ H(ξ2, ξ2) = H(ξ3, ξ3). This proves Theorem 1.1 also in the case k = 3.
844
+
845
+ Proof of Theorem 1.2. Here we need to find stable critical points of f2 and f3 if G is the Green function of
846
+ the Dirichlet Laplace operator in the unit ball in RN. Our proof uses the explicit knowledge of G. In the case
847
+ k = 2 the proof of [4, Lemma 3.1] applies almost verbatim and shows that f2 has two isolated critical points:
848
+ a local saddle point with Morse index 1, hence with local degree −1, and an isolated local minimum, hence
849
+ with local degree 1. These are stable critical points, giving rise to critical points of Iε for ε > 0 small.
850
+ In the case k = 3 we set
851
+ γ1(t) := H(ξ1, ξ1) − 2G(ξ1, ξ2) =
852
+ 1
853
+ (1 − t2)N−2 −
854
+ 2
855
+ (
856
+
857
+ 3t)N−2 +
858
+ 2
859
+ (t4 + t2 + 1)
860
+ N−2
861
+ 2
862
+ and
863
+ (4.1)
864
+ τ1(t) := G(ξ1, 0) =
865
+ 1
866
+ tN−2 − 1
867
+ so that
868
+ f3(λ0, λ1, t) = b1
869
+
870
+ H(0, 0)λN−2
871
+ 0
872
+ + 3γ1(t)λN−2
873
+ 1
874
+ + 6τ1(t)λ
875
+ N−2
876
+ 2
877
+ 0
878
+ λ
879
+ N−2
880
+ 2
881
+ 1
882
+
883
+ − b2
884
+ N − 2
885
+ 2
886
+ ln
887
+
888
+ λ3
889
+ 1λ0
890
+
891
+ .
892
+ One easily checks that γ′
893
+ 1(t) > 0, γ1(t) → −∞ as t → 0+, and γ1( 1
894
+ 2) > 0. Thus there exists t∗ ∈ (0, 1
895
+ 2) such
896
+ that
897
+ γ1(t∗) = 0
898
+ and
899
+ γ1(t) > 0 for all t ∈ (t∗, 1).
900
+ A direct computation shows that for t ∈ (t∗, 1) there exist unique λ0(t), λ1(t) such that
901
+ ∂f3(λ0(t), λ1(t), t)
902
+ ∂λ0
903
+ = 0
904
+ and
905
+ ∂f3(λ0(t), λ1(t), t)
906
+ ∂λ1
907
+ = 0.
908
+ In fact one obtains
909
+ (4.2)
910
+ λ0(t)
911
+ N−2
912
+ 2
913
+ = α(ξ1, ξ2)λ1(t)
914
+ N−2
915
+ 2
916
+ and
917
+ λ1(t)
918
+ N−2
919
+ 2
920
+ =
921
+
922
+ 1
923
+ β(ξ1, ξ2) · b2
924
+ 2b1
925
+ ,
926
+ where
927
+ α(x, y) = −2G(x, 0) +
928
+
929
+ 4G2(x, 0) + 4H(0, 0)(H(x, x) − 2G(x, y))
930
+ 2H(0, 0)
931
+ and
932
+ β(x, y) = H(x, x) − 2G(x, y) + G(x, 0)α(x, y).
933
+
934
+ 12
935
+ T. Bartsch, Q. Guo
936
+ Moreover, continuing the computation one obtains
937
+ ∂2f3(λ0(t), λ1(t), t)
938
+ ∂λ2
939
+ 1
940
+ =
941
+ 3(N − 2)b1
942
+
943
+ (N − 3)γ1(t)λN−4
944
+ 1
945
+ + N − 4
946
+ 2
947
+ τ1(t)λ
948
+ N−6
949
+ 2
950
+ 0
951
+ λ
952
+ N−2
953
+ 2
954
+ 1
955
+
956
+ + 3(N − 2)b2
957
+ 2λ2
958
+ 1
959
+ =
960
+ 3(N − 2)b1
961
+
962
+ (N − 2)γ1(t)λN−4
963
+ 1
964
+ + N − 2
965
+ 2
966
+ τ1(t)λ
967
+ N−6
968
+ 2
969
+ 0
970
+ λ
971
+ N−2
972
+ 2
973
+ 1
974
+
975
+ ,
976
+ ∂2f3(λ0(t), λ1(t), t)
977
+ ∂λ2
978
+ 0
979
+ =
980
+ (N − 2)b1
981
+
982
+ (N − 3)H(0, 0)λN−4
983
+ 0
984
+ + 3(N − 4)
985
+ 2
986
+ τ1(t)λ
987
+ N−2
988
+ 2
989
+ 0
990
+ λ
991
+ N−6
992
+ 2
993
+ 1
994
+
995
+ +(N − 2)b2
996
+ 2λ2
997
+ 0
998
+ =
999
+ (N − 2)b1
1000
+
1001
+ (N − 2)H(0, 0)λN−4
1002
+ 0
1003
+ + 3(N − 2)
1004
+ 2
1005
+ τ1(t)λ
1006
+ N−2
1007
+ 2
1008
+ 0
1009
+ λ
1010
+ N−6
1011
+ 2
1012
+ 1
1013
+
1014
+ ,
1015
+ ∂2f3(λ0(t), λ1(t), t)
1016
+ ∂λ0∂λ1
1017
+ =
1018
+ 3(N − 2)2
1019
+ 2
1020
+ b1τ1(t)λ
1021
+ N−4
1022
+ 2
1023
+ 0
1024
+ λ
1025
+ N−4
1026
+ 2
1027
+ 1
1028
+ .
1029
+ It follows that the Hessian matrix D2
1030
+ λ0,λ1f3(λ0(t), λ1(t), t) is positive definite, hence nondegenerate. Therefore
1031
+ it is sufficient to find stable critical points of the function
1032
+ ν1(t) := f3 (λ0(t), λ1(t), t) = 2b2 − b2
1033
+ N − 2
1034
+ 2
1035
+ ln
1036
+
1037
+ λ3
1038
+ 1(t)λ0(t)
1039
+
1040
+ .
1041
+ As in [4, (3.4)] one sees that
1042
+ (4.3)
1043
+ lim
1044
+ t→(t∗)+ ν1(t) = −∞
1045
+ and
1046
+ lim
1047
+ t→1− ν1(t) = +∞.
1048
+ Now we prove ν′
1049
+ 1( 1
1050
+ 2) < 0 for N large. Set
1051
+ α(t) := α(ξ1, ξ2) = −τ1(t) +
1052
+
1053
+ τ 2
1054
+ 1 (t) + γ1(t),
1055
+ where we used H(0, 0) = 1. We obtain
1056
+ ν′
1057
+ 1(t) = ∂f3(λ0(t), λ1(t), t)
1058
+ ∂t
1059
+ = 3b1
1060
+
1061
+ γ′
1062
+ 1(t) + 2α(t)τ ′
1063
+ 1(t)
1064
+
1065
+ λN−2
1066
+ 1
1067
+ .
1068
+ Then setting ι1(t) := γ′
1069
+ 1(t) + 2α(t)τ ′
1070
+ 1(t), it is enough to show ι1
1071
+ � 1
1072
+ 2
1073
+
1074
+ < 0 for N large. In fact, since γ1( 1
1075
+ 2 )
1076
+ τ 2
1077
+ 1 ( 1
1078
+ 2 ) < 1
1079
+ for N large we see as in [4, (3.9)] that
1080
+ ι1( 1
1081
+ 2) ≤ γ′
1082
+ 1( 1
1083
+ 2) + 4γ1( 1
1084
+ 2)
1085
+ 5τ1( 1
1086
+ 2) τ ′
1087
+ 1( 1
1088
+ 2).
1089
+ A direct computation gives for N large the inequalites
1090
+ γ′
1091
+ 1( 1
1092
+ 2) = (N − 2)
1093
+
1094
+ ( 4
1095
+ 3)N−1 + 4( 2
1096
+
1097
+ 3)N−2 −
1098
+ 3
1099
+ 2
1100
+ ( 1
1101
+ 16 + 1
1102
+ 4 + 1)
1103
+ N
1104
+ 2
1105
+
1106
+ < 11(N − 2)
1107
+ 10
1108
+ ( 4
1109
+ 3)N−1
1110
+ and
1111
+ τ ′
1112
+ 1( 1
1113
+ 2) = −(N − 2)2N−1
1114
+ and
1115
+ γ1( 1
1116
+ 2)
1117
+ τ1( 1
1118
+ 2) =
1119
+ ( 4
1120
+ 3)N−2 − 2( 2
1121
+
1122
+ 3)N−2 +
1123
+ 2
1124
+ ( 1
1125
+ 16 + 1
1126
+ 4 +1)
1127
+ N−2
1128
+ 2
1129
+ 2N−2 − 1
1130
+ > 11
1131
+ 12 · ( 4
1132
+ 3)N−2
1133
+ 2N−2
1134
+
1135
+ Nodal solutions to problems with Hardy terms
1136
+ 13
1137
+ which yield ι1( 1
1138
+ 2) < 0, hence ν′
1139
+ 1( 1
1140
+ 2) < 0 for N large enough. This together with (4.3) implies that ν1 has a
1141
+ local maximum t1 ∈ (t∗, 1
1142
+ 2) and a local minimum t2 ∈ ( 1
1143
+ 2, ∞). These are nondegenerate because ν1 is analytic.
1144
+ In conclusion, f3 has two critical points: (λ0(t1), λ1(t1), t1) with Morse index 1 and (λ0(t2), λ1(t2), t2) with
1145
+ Morse index 0. This concludes the proof of Theorem 1.2.
1146
+
1147
+ Remark 4.2. a) For k = 3, N = 7, numerical computations show that one cannot find t0 ∈ (t∗, 1) such that
1148
+ ν′
1149
+ 1(t0) = 0. Therefore it is necessary to assume N large here.
1150
+ b) For k = 4, the idea above cannot give the existence of nodal solutions with five bubbles, one positive
1151
+ at the origin and four negative as in Theorem 1.1. This is the content of Proposition 1.4.
1152
+ 5
1153
+ Proof of Proposition 1.4
1154
+ It follows from Lemma 4.1 that Iε does not have critical points for ε > 0 small if ψ does not have
1155
+ critical points. This also holds if we constrain Iε and ψ to OAN,τ
1156
+ η
1157
+ . Setting ξ1 = (t, 0, . . . , 0) for 0 < t < 1,
1158
+ ξ2 = R4ξ1 = (0, t, 0, . . . , 0), ξ3 = R4ξ2 = (−t, 0, . . . , 0), and ξ4 = R4ξ3 = (0, −t, . . . , 0) we need to consider the
1159
+ function
1160
+ f4(λ0, λ1, t) := ψ(λ0, λ1, λ1, λ1, λ1, ξ1, ξ2, ξ3, ξ4)
1161
+ = b1
1162
+
1163
+ H(0, 0)λN−2
1164
+ 0
1165
+ + 4H(ξ1, ξ1)λN−2
1166
+ 1
1167
+ + 8G(ξ1, 0)λ
1168
+ N−2
1169
+ 2
1170
+ 0
1171
+ λ
1172
+ N−2
1173
+ 2
1174
+ 1
1175
+ − 8G(ξ1, ξ2)λN−2
1176
+ 1
1177
+ − 4G(ξ1, ξ3)λN−2
1178
+ 1
1179
+
1180
+ − b2
1181
+ N − 2
1182
+ 2
1183
+ ln(λ4
1184
+ 1λ0),
1185
+ where we use
1186
+ H(ξ1, ξ1) = H(ξ2, ξ2) = H(ξ3, ξ3) = H(ξ4, ξ4)
1187
+ and
1188
+ G(ξ1, 0) = G(ξ2, 0) = G(ξ3, 0) = G(ξ4, 0)
1189
+ as well as
1190
+ G(ξ1, ξ2) = G(ξ2, ξ3) = G(ξ3, ξ4) = G(ξ4, ξ1),
1191
+ G(ξ1, ξ3) = G(ξ2, ξ4).
1192
+ Proposition 1.4 follows if we can prove that f4 does not have critical points. Let τ1(t) be as in (4.1) and define
1193
+ γ2(t)
1194
+ :=
1195
+ H(ξ1, ξ1) − 2G(ξ1, ξ2) − G(ξ1, ξ3)
1196
+ =
1197
+ 1
1198
+ (1 − t2)N−2 −
1199
+ 2
1200
+ (
1201
+
1202
+ 2t)N−2 +
1203
+ 2
1204
+ (t4 + 1)
1205
+ N−2
1206
+ 2
1207
+
1208
+ 1
1209
+ (2t)N−2 +
1210
+ 1
1211
+ (t2 + 1)N−2
1212
+ so that
1213
+ f4(λ0, λ1, t) = b1
1214
+
1215
+ H(0, 0)λN−2
1216
+ 0
1217
+ + 4γ2(t)λN−2
1218
+ 1
1219
+ + 8τ1(t)λ
1220
+ N−2
1221
+ 2
1222
+ 0
1223
+ λ
1224
+ N−2
1225
+ 2
1226
+ 1
1227
+
1228
+ − b2
1229
+ N − 2
1230
+ 2
1231
+ ln
1232
+
1233
+ λ4
1234
+ 1λ0
1235
+
1236
+ .
1237
+ A direct computation shows that
1238
+ γ′
1239
+ 2(t) = (N − 2)
1240
+
1241
+ 2t
1242
+ (1 − t2)N−1 +
1243
+ 2
1244
+ (
1245
+
1246
+ 2)N−2tN−1 −
1247
+ 4t3
1248
+ (t4 + 1)
1249
+ N
1250
+ 2 +
1251
+ 1
1252
+ 2N−2tN−1 −
1253
+ 2t
1254
+ (t2 + 1)N−1
1255
+
1256
+ > 0.
1257
+
1258
+ 14
1259
+ T. Bartsch, Q. Guo
1260
+ Clearly γ2(t) → −∞ as t → 0+, and γ2
1261
+
1262
+ 1
1263
+
1264
+ 2
1265
+
1266
+ > 0. Then there exists t∗ ∈ (0,
1267
+ 1
1268
+
1269
+ 2) such that
1270
+ (5.1)
1271
+ γ2(t∗) = 0
1272
+ and
1273
+ γ2(t) > 0 for all t ∈ (t∗, 1).
1274
+ Notice that
1275
+ λ
1276
+ N−2
1277
+ 2
1278
+ 0
1279
+ = α1(ξ1, ξ2, ξ3)λ
1280
+ N−2
1281
+ 2
1282
+ 1
1283
+ ,
1284
+ λ
1285
+ N−2
1286
+ 2
1287
+ 1
1288
+ =
1289
+
1290
+ 1
1291
+ β1(ξ1, ξ2, ξ3) · b2
1292
+ 2b1
1293
+ ,
1294
+ H(ξ1, ξ1) �� 2G(ξ1, ξ2) − G(ξ1, ξ3) > 0,
1295
+ where
1296
+ α1(x, y, z) = −3G(x, 0) +
1297
+
1298
+ 9G2(x, 0) + 4H(0, 0)(H(x, x) − 2G(x, y) − G(x, z))
1299
+ 2H(0, 0)
1300
+ ,
1301
+ and
1302
+ β1(x, y, z) = H(x, x) − 2G(x, y) − G(x, z) + G(x, 0)α1(x, y, z).
1303
+ Setting α1(t) := α1(ξ1, ξ2, ξ3) =
1304
+ −3τ1(t)+√
1305
+ 9τ 2
1306
+ 1 (t)+4γ2(t)
1307
+ 2
1308
+ and ι2(t) := γ′
1309
+ 2(t) + 2α1(t)τ ′
1310
+ 1(t), a similar argument as
1311
+ above shows that problem (1.1) admits a solution with 5 bubbles, one positive at the origin and 4 negative as
1312
+ in Theorem 1.1 only if ι2(t) has a zero in (t∗, 1). The following claim implies that this is not the case.
1313
+ Claim: If N ≥ 7 then ι2(t) > 0 for any t ∈ (t∗, 1).
1314
+ We first show that t∗ >
1315
+
1316
+ 6−
1317
+
1318
+ 2
1319
+ 2
1320
+ , where t∗ is from (5.1). In order to see this, it is enough to prove γ2
1321
+ � √
1322
+ 6−
1323
+
1324
+ 2
1325
+ 2
1326
+
1327
+ <
1328
+ 0. Since 22/5 · 2(
1329
+
1330
+ 6−
1331
+
1332
+ 2
1333
+ 2
1334
+ )2 < 1 < (
1335
+
1336
+ 6−
1337
+
1338
+ 2
1339
+ 2
1340
+ )4 + 1, we have
1341
+ 1
1342
+ (
1343
+
1344
+ 2 ·
1345
+
1346
+ 6−
1347
+
1348
+ 2
1349
+ 2
1350
+ )N−2 >
1351
+ 2
1352
+ ((
1353
+
1354
+ 6−
1355
+
1356
+ 2
1357
+ 2
1358
+ )4 + 1)
1359
+ N−2
1360
+ 2
1361
+ ,
1362
+ for all N ≥ 7.
1363
+ On the other hand, it is easy to see that
1364
+ 1
1365
+ (1 − (
1366
+
1367
+ 6−
1368
+
1369
+ 2
1370
+ 2
1371
+ )2)N−2 =
1372
+ 1
1373
+ (
1374
+
1375
+ 2(
1376
+
1377
+ 6−
1378
+
1379
+ 2
1380
+ 2
1381
+ ))N−2
1382
+ and
1383
+ 1
1384
+ (2(
1385
+
1386
+ 6−
1387
+
1388
+ 2
1389
+ 2
1390
+ ))N−2 >
1391
+ 1
1392
+ ((
1393
+
1394
+ 6−
1395
+
1396
+ 2
1397
+ 2
1398
+ )2 + 1)N−2 .
1399
+ It follows that γ2(
1400
+
1401
+ 6−
1402
+
1403
+ 2
1404
+ 2
1405
+ ) < 0.
1406
+ Now we prove ι2(t) > 0 for t ∈ (t∗, 1) ⊂ (
1407
+
1408
+ 6−
1409
+
1410
+ 2
1411
+ 2
1412
+ , 1). It is easy to see that
1413
+ γ′
1414
+ 2(t) ≥ (N − 2) ·
1415
+ 2t
1416
+ (1 − t2)N−1
1417
+ and
1418
+ γ2(t) ≤
1419
+ 1
1420
+ (1 − t2)N−2
1421
+ for all t ∈
1422
+ �√
1423
+ 6 −
1424
+
1425
+ 2
1426
+ 2
1427
+ , 1
1428
+
1429
+ .
1430
+ Then we have for all t ∈ (t∗, 1) and N ≥ 7:
1431
+ ι2(t)
1432
+ N − 2
1433
+
1434
+ 2t
1435
+ (1 − t2)N−1 − 3
1436
+
1437
+ 1
1438
+ tN−2 − 1
1439
+
1440
+ ·
1441
+ 1
1442
+ tN−1
1443
+
1444
+
1445
+
1446
+
1447
+
1448
+
1449
+ �1 +
1450
+ 4 ·
1451
+ 1
1452
+ (1−t2)N−2
1453
+ 9(
1454
+ 1
1455
+ tN−2 − 1)2 − 1
1456
+
1457
+
1458
+
1459
+
1460
+ 2t
1461
+ (1 − t2)N−1 −
1462
+ 3
1463
+ t2N−3 ·
1464
+ ��
1465
+ 1 + 4
1466
+ 9(
1467
+ t2
1468
+ 1 − t2 )N−2 ·
1469
+ 1
1470
+ (1 − tN−2)2 − 1
1471
+
1472
+ .
1473
+ Setting T :=
1474
+ t2
1475
+ 1−t2 it is enough to prove that
1476
+ 2
1477
+ 3 · T N−1 + 1 >
1478
+
1479
+ 1 + 4
1480
+ 9 · T N−2 ·
1481
+ 1
1482
+ (1 − tN−2)2
1483
+
1484
+ Nodal solutions to problems with Hardy terms
1485
+ 15
1486
+ which is equivalent to
1487
+ (5.2)
1488
+ (T N + 3T ) · (1 − tN−2)2 > 1.
1489
+ It is obvious that if t ∈ [ 1
1490
+
1491
+ 2, 4
1492
+ 5), then
1493
+ (5.3)
1494
+ 3T · (1 − tN−2)2 ≥ 3(1 − t5)2 > 1,
1495
+ and if t ∈ [ 4
1496
+ 5, 1), then
1497
+ (5.4)
1498
+ T N · (1 − tN−2)2 ≥ T N · (1 − t)2 =
1499
+ t4
1500
+ (1 + t)2 · T N−2 > ( 4
1501
+ 5)4
1502
+ 4
1503
+ (
1504
+ ( 4
1505
+ 5)2
1506
+ 1 − ( 4
1507
+ 5)2 )5 > 1.
1508
+ Now we are left to prove (5.2) for t ∈
1509
+
1510
+ t∗,
1511
+ 1
1512
+
1513
+ 2
1514
+
1515
+ . First of all, if t ∈
1516
+ � √
1517
+ 6−
1518
+
1519
+ 2
1520
+ 2
1521
+ ,
1522
+ 1
1523
+
1524
+ 2
1525
+
1526
+ , then T ∈
1527
+ � √
1528
+ 3−1
1529
+ 2
1530
+ , 1
1531
+
1532
+ . Setting
1533
+ f(T ) := 3T
1534
+
1535
+ 1 − tN−2�2 = 3T
1536
+
1537
+ 1 −
1538
+
1539
+ T
1540
+ 1 + T
1541
+ � N−2
1542
+ 2 �2
1543
+ ,
1544
+ a direct computation shows that
1545
+ f ′(T )
1546
+ =
1547
+
1548
+ 1 −
1549
+
1550
+ T
1551
+ 1 + T
1552
+ � N−2
1553
+ 2 � �
1554
+ 3 − 3
1555
+
1556
+ T
1557
+ 1 + T
1558
+ � N−2
1559
+ 2
1560
+ − 3(N − 2)
1561
+
1562
+ T
1563
+ 1 + T
1564
+ � N−2
1565
+ 2
1566
+ 1
1567
+ 1 + T
1568
+
1569
+
1570
+
1571
+ 1 −
1572
+ �1
1573
+ 2
1574
+ � N−2
1575
+ 2 � �
1576
+ 3 − 3
1577
+ �1
1578
+ 2
1579
+ � N−2
1580
+ 2
1581
+ − 3(N − 2)
1582
+ �1
1583
+ 2
1584
+ � N−2
1585
+ 2
1586
+ 1
1587
+ 1 +
1588
+
1589
+ 3−1
1590
+ 2
1591
+
1592
+
1593
+
1594
+ 1 −
1595
+ �1
1596
+ 2
1597
+ � N−2
1598
+ 2 � �
1599
+ 3 − 3
1600
+ �1
1601
+ 2
1602
+ � 5
1603
+ 2
1604
+ − 15
1605
+ �1
1606
+ 2
1607
+ � 5
1608
+ 2
1609
+ 1
1610
+ 1 +
1611
+
1612
+ 3−1
1613
+ 2
1614
+
1615
+ > 0,
1616
+ where in the second inequality we use the fact that 3 − 3( 1
1617
+ 2)
1618
+ N−2
1619
+ 2
1620
+ − 3(N − 2)( 1
1621
+ 2)
1622
+ N−2
1623
+ 2
1624
+ 1
1625
+ 1+
1626
+
1627
+ 3−1
1628
+ 2
1629
+ is increasing in N.
1630
+ Now we conclude that
1631
+ f(T ) > 3 ·
1632
+
1633
+ 3 − 1
1634
+ 2
1635
+
1636
+ 1 −
1637
+
1638
+
1639
+ 3−1
1640
+ 2
1641
+ 1 +
1642
+
1643
+ 3−1
1644
+ 2
1645
+ � 5
1646
+ 2 
1647
+
1648
+ 2
1649
+ > 1
1650
+ for all N ≥ 7.
1651
+ (5.5)
1652
+ The claim, hence Proposition 1.4, follows combining (5.2), (5.3), (5.4), and (5.5).
1653
+ 6
1654
+ Proof of Theorem 1.6
1655
+ In this section we consider solutions of the form Vε,λ,ξ =
1656
+ k�
1657
+ i=1
1658
+ (−1)iPUδi,ξi + PVσ.
1659
+ Then the reduced
1660
+ function in Lemma 4.1 becomes
1661
+ �ψ(λ, ξ) = b1
1662
+
1663
+ H(0, 0)λN−2
1664
+ 0
1665
+ +
1666
+ k
1667
+
1668
+ i=1
1669
+ H(ξi, ξi)λN−2
1670
+ i
1671
+ + 2
1672
+ k
1673
+
1674
+ i=1
1675
+ (−1)i−1G(ξi, 0)λ
1676
+ N−2
1677
+ 2
1678
+ 0
1679
+ λ
1680
+ N−2
1681
+ 2
1682
+ i
1683
+ +2
1684
+ k
1685
+
1686
+ i,j=1,i<j
1687
+ (−1)i+j−1G(ξi, ξj)λ
1688
+ N−2
1689
+ 2
1690
+ i
1691
+ λ
1692
+ N−2
1693
+ 2
1694
+ j
1695
+
1696
+  − b2
1697
+ N − 2
1698
+ 2
1699
+ ln(λ0λ1λ2 . . . λk),
1700
+
1701
+ 16
1702
+ T. Bartsch, Q. Guo
1703
+ where b1, b2 are as in Lemma 4.1.
1704
+ Proof of Theorem 1.6. Let k = 4. Using the symmetry again we set ξ1 = (t, 0, . . . , 0) for 0 < t < 1,
1705
+ ξ2 = R4ξ1 = (0, t, 0, . . ., 0), ξ3 = R4ξ2 = (−t, 0, . . ., 0), and ξ4 = R4ξ3 = (0, −t, . . . , 0). As in the proof of
1706
+ Theorem 1.2, it is sufficient to find stable critical points of �ψ constrained to OAN ,�τ
1707
+ η
1708
+ . Since
1709
+ H(ξ1, ξ1) = H(ξ2, ξ2) = H(ξ3, ξ3) = H(ξ4, ξ4),
1710
+ G(ξ1, 0) = G(ξ2, 0) = G(ξ3, 0) = G(ξ4, 0),
1711
+ and
1712
+ G(ξ1, ξ2) = G(ξ2, ξ3) = G(ξ3, ξ4) = G(ξ4, ξ1),
1713
+ G(ξ1, ξ3) = G(ξ2, ξ4),
1714
+ we need to find a critical point of the function
1715
+ f5(λ0, λ1, λ2, t) := �ψ(λ0, λ1, λ2, λ1, λ2, ξ1, ξ2, ξ3, ξ4)
1716
+ = b1
1717
+
1718
+ H(0, 0)λN−2
1719
+ 0
1720
+ + 2H(ξ1, ξ1)(λN−2
1721
+ 1
1722
+ + λN−2
1723
+ 2
1724
+ ) + 4G(ξ1, 0)λ
1725
+ N−2
1726
+ 2
1727
+ 0
1728
+
1729
+ λ
1730
+ N−2
1731
+ 2
1732
+ 1
1733
+ − λ
1734
+ N−2
1735
+ 2
1736
+ 2
1737
+
1738
+ + 8G(ξ1, ξ2)λ
1739
+ N−2
1740
+ 2
1741
+ 1
1742
+ λ
1743
+ N−2
1744
+ 2
1745
+ 2
1746
+ − 2G(ξ1, ξ3)λN−2
1747
+ 1
1748
+ − 2G(ξ1, ξ3)λN−2
1749
+ 2
1750
+
1751
+ − b2
1752
+ N − 2
1753
+ 2
1754
+ ln
1755
+
1756
+ λ0λ2
1757
+ 1λ2
1758
+ 2
1759
+
1760
+ .
1761
+ Claim 1: There exist t∗
1762
+ 1 ∈ (0, 1
1763
+ 2) and t∗
1764
+ 2 ∈ ( 1
1765
+ 2, 1) such that for t ∈ (0, t∗
1766
+ 1) ∪ (t∗
1767
+ 2, 1) the equation
1768
+ (6.1)
1769
+ ∇λ0,λ1,λ2f5(λ0, λ1, λ2, t) = 0
1770
+ has a unique solution (λ0(t), λ1(t), λ2(t), t).
1771
+ Observe that (6.1) is equivalent to the equations
1772
+ (6.2)
1773
+ H(0, 0)λN−2
1774
+ 0
1775
+ + 2G(ξ1, 0)λ
1776
+ N−2
1777
+ 2
1778
+ 0
1779
+
1780
+ λ
1781
+ N−2
1782
+ 2
1783
+ 1
1784
+ − λ
1785
+ N−2
1786
+ 2
1787
+ 2
1788
+
1789
+ = b2
1790
+ 2b1
1791
+ and
1792
+ (6.3)
1793
+ (H(ξ1, ξ1) − G(ξ1, ξ3))λN−2
1794
+ 1
1795
+ + G(ξ1, 0)λ
1796
+ N−2
1797
+ 2
1798
+ 0
1799
+ λ
1800
+ N−2
1801
+ 2
1802
+ 1
1803
+ + 2G(ξ1, ξ2)λ
1804
+ N−2
1805
+ 2
1806
+ 1
1807
+ λ
1808
+ N−2
1809
+ 2
1810
+ 2
1811
+ = b2
1812
+ 2b1
1813
+ ,
1814
+ and
1815
+ (6.4)
1816
+ (H(ξ1, ξ1) − G(ξ1, ξ3))λN−2
1817
+ 2
1818
+ − G(ξ1, 0)λ
1819
+ N−2
1820
+ 2
1821
+ 0
1822
+ λ
1823
+ N−2
1824
+ 2
1825
+ 2
1826
+ + 2G(ξ1, ξ2)λ
1827
+ N−2
1828
+ 2
1829
+ 1
1830
+ λ
1831
+ N−2
1832
+ 2
1833
+ 2
1834
+ = b2
1835
+ 2b1
1836
+ .
1837
+ From (6.3) and (6.4) we deduce
1838
+ (6.5)
1839
+ λ
1840
+ N−2
1841
+ 2
1842
+ 2
1843
+ − λ
1844
+ N−2
1845
+ 2
1846
+ 1
1847
+ =
1848
+ G(ξ1, 0)
1849
+ H(ξ1, ξ1) − G(ξ1, ξ3)λ
1850
+ N−2
1851
+ 2
1852
+ 0
1853
+ ,
1854
+ which combined with (6.2) implies:
1855
+ (6.6)
1856
+ λN−2
1857
+ 0
1858
+ =
1859
+ H(ξ1, ξ1) − G(ξ1, ξ3)
1860
+ H(ξ1, ξ1) − G(ξ1, ξ3) − 2G2(ξ1, 0) · b2
1861
+ 2b1
1862
+ .
1863
+
1864
+ Nodal solutions to problems with Hardy terms
1865
+ 17
1866
+ As a consequence of (6.5) we get
1867
+ λN−2
1868
+ 1
1869
+ + λN−2
1870
+ 2
1871
+ − 2λ
1872
+ N−2
1873
+ 2
1874
+ 1
1875
+ λ
1876
+ N−2
1877
+ 2
1878
+ 2
1879
+ = λN−2
1880
+ 0
1881
+ ·
1882
+
1883
+ G(ξ1, 0)
1884
+ H(ξ1, ξ1) − G(ξ1, ξ3)
1885
+ �2
1886
+ hence using (6.3) and (6.4) we deduce:
1887
+ (6.7)
1888
+ λ
1889
+ N−2
1890
+ 2
1891
+ 1
1892
+ λ
1893
+ N−2
1894
+ 2
1895
+ 2
1896
+ =
1897
+ 1
1898
+ H(ξ1, ξ1) − G(ξ1, ξ3) + 2G(ξ1, ξ2) · b2
1899
+ 2b1
1900
+ and
1901
+ (6.8)
1902
+ λN−2
1903
+ 1
1904
+ + λN−2
1905
+ 2
1906
+ =
1907
+ 1
1908
+ H(ξ1, ξ1) − G(ξ1, ξ3) + 2G(ξ1, ξ2) · b2
1909
+ b1
1910
+ + λN−2
1911
+ 0
1912
+ ·
1913
+
1914
+ G(ξ1, 0)
1915
+ H(ξ1, ξ1) − G(ξ1, ξ3)
1916
+ �2
1917
+ .
1918
+ Let τ1(t) = G(ξ1, 0) be as in (4.1) and set
1919
+ γ3(t) := H(ξ1, ξ1) − G(ξ1, ξ3) =
1920
+ 1
1921
+ (1 − t2)N−2 −
1922
+ 1
1923
+ (2t)N−2 +
1924
+ 1
1925
+ (t2 + 1)N−2
1926
+ and
1927
+ γ4(t) := G(ξ1, ξ2) =
1928
+ 1
1929
+ (
1930
+
1931
+ 2t)N−2 −
1932
+ 1
1933
+ (t4 + 1)
1934
+ N−2
1935
+ 2
1936
+ so that
1937
+ f5(λ0, λ1, λ2, t) = b1
1938
+
1939
+ H(0, 0)λN−2
1940
+ 0
1941
+ + 2γ2(t)
1942
+
1943
+ λN−2
1944
+ 1
1945
+ + λN−2
1946
+ 2
1947
+
1948
+ + 8γ4(t)λ
1949
+ N−2
1950
+ 2
1951
+ 1
1952
+ λ
1953
+ N−2
1954
+ 2
1955
+ 2
1956
+ + 4τ1(t)λ
1957
+ N−2
1958
+ 2
1959
+ 0
1960
+
1961
+ λ
1962
+ N−2
1963
+ 2
1964
+ 1
1965
+ − λ
1966
+ N−2
1967
+ 2
1968
+ 2
1969
+ � �
1970
+ − b2
1971
+ N − 2
1972
+ 2
1973
+ ln
1974
+
1975
+ λ4
1976
+ 1λ0
1977
+
1978
+ .
1979
+ A direct computation shows that γ′
1980
+ 3(t) > 0, γ3(t) → −∞ as t → 0+, γ3(t) → +∞ as t → 1−, and
1981
+ γ3( 1
1982
+ 2) > 0. Thus there exists t∗
1983
+ 1 ∈ (0, 1
1984
+ 2) such that
1985
+ γ3(t∗
1986
+ 1) = 0
1987
+ and
1988
+ γ3(t) < 0 for all t ∈ (0, t∗
1989
+ 1).
1990
+ On the other hand,
1991
+
1992
+ γ3(t) − 2τ 2
1993
+ 1 (t)
1994
+ �′ > 0, γ3(t) − 2τ 2
1995
+ 1 (t) → −∞ as t → 0+, γ3(t) − 2τ 2
1996
+ 1 (t) → +∞ as t → 1−,
1997
+ and γ3( 1
1998
+ 2) − 2τ 2
1999
+ 1 ( 1
2000
+ 2) < 0. Thus there exists t∗
2001
+ 2 ∈ ( 1
2002
+ 2, 1) such that
2003
+ γ3(t∗
2004
+ 2) − 2τ 2
2005
+ 1 (t∗
2006
+ 2) = 0
2007
+ and
2008
+ γ3(t) − 2τ 2
2009
+ 1 (t) > 0 for all t ∈ (t∗
2010
+ 2, 1).
2011
+ It follows that for every t ∈ (0, t∗
2012
+ 1) ∪ (t∗
2013
+ 2, 1) there exist unique λ0(t), λ1(t), λ2(t) such that
2014
+ ∇λ0,λ1,λ2f5(λ0(t), λ1(t), λ2(t), t) = 0,
2015
+ where λ0(t), λ1(t), λ2(t) satisfy (6.5), (6.6), (6.7) and (6.8). This proves Claim 1.
2016
+ Claim 2: The Hessian matrix D2
2017
+ λ0,λ1,λ2f5(λ0(t), λ1(t), λ2(t), t) is nondegenerate for any t ∈ (0, t∗
2018
+ 1) ∪ (t∗
2019
+ 2, 1).
2020
+
2021
+ 18
2022
+ T. Bartsch, Q. Guo
2023
+ A direct computation using (6.2), (6.3), and (6.4) shows that, writing λi instead of λi(t),
2024
+ ∂2f5(λ0, λ1, λ2, t)
2025
+ ∂λ2
2026
+ 0
2027
+ = (N − 2)b1
2028
+
2029
+ (N − 3)H(0, 0)λN−4
2030
+ 0
2031
+ + (N − 4)τ1(t)λ
2032
+ N−6
2033
+ 2
2034
+ 0
2035
+
2036
+ λ
2037
+ N−2
2038
+ 2
2039
+ 1
2040
+ − λ
2041
+ N−2
2042
+ 2
2043
+ 2
2044
+ � �
2045
+ + (N − 2)b2
2046
+ 2λ2
2047
+ 0
2048
+ = (N − 2)2b1
2049
+
2050
+ H(0, 0)λN−4
2051
+ 0
2052
+ + τ1(t)λ
2053
+ N−6
2054
+ 2
2055
+ 0
2056
+
2057
+ λ
2058
+ N−2
2059
+ 2
2060
+ 1
2061
+ − λ
2062
+ N−2
2063
+ 2
2064
+ 2
2065
+ � �
2066
+ ,
2067
+ ∂2f5(λ0, λ1, λ2, t)
2068
+ ∂λ2
2069
+ 1
2070
+ = (N − 2)b1
2071
+
2072
+ 2(N − 3)γ3(t)λN−4
2073
+ 1
2074
+ + (N − 4)τ1(t)λ
2075
+ N−2
2076
+ 2
2077
+ 0
2078
+ λ
2079
+ N−6
2080
+ 2
2081
+ 1
2082
+ + 2(N − 4)γ4(t)λ
2083
+ N−6
2084
+ 2
2085
+ 1
2086
+ λ
2087
+ N−2
2088
+ 2
2089
+ 2
2090
+
2091
+ + (N − 2)b2
2092
+ λ2
2093
+ 1
2094
+ = (N − 2)2b1
2095
+
2096
+ 2γ3(t)λN−4
2097
+ 1
2098
+ + τ1(t)λ
2099
+ N−2
2100
+ 2
2101
+ 0
2102
+ λ
2103
+ N−6
2104
+ 2
2105
+ 1
2106
+ + 2γ4(t)λ
2107
+ N−6
2108
+ 2
2109
+ 1
2110
+ λ
2111
+ N−2
2112
+ 2
2113
+ 2
2114
+
2115
+ ,
2116
+ ∂2f5(λ0, λ1, λ2, t)
2117
+ ∂λ2
2118
+ 2
2119
+ = (N − 2)b1
2120
+
2121
+ 2(N − 3)γ3(t)λN−4
2122
+ 2
2123
+ − (N − 4)τ1(t)λ
2124
+ N−2
2125
+ 2
2126
+ 0
2127
+ λ
2128
+ N−6
2129
+ 2
2130
+ 2
2131
+ + 2(N − 4)γ4(t)λ
2132
+ N−6
2133
+ 2
2134
+ 1
2135
+ λ
2136
+ N−2
2137
+ 2
2138
+ 2
2139
+
2140
+ + (N − 2)b2
2141
+ λ2
2142
+ 2
2143
+ = (N − 2)2b1
2144
+
2145
+ 2γ3(t)λN−4
2146
+ 2
2147
+ − τ1(t)λ
2148
+ N−2
2149
+ 2
2150
+ 0
2151
+ λ
2152
+ N−6
2153
+ 2
2154
+ 2
2155
+ + 2γ4(t)λ
2156
+ N−2
2157
+ 2
2158
+ 1
2159
+ λ
2160
+ N−6
2161
+ 2
2162
+ 2
2163
+
2164
+ ,
2165
+ ∂2f4(λ0, λ1, λ2, t)
2166
+ ∂λ0∂λ1
2167
+ = (N − 2)2b1τ1(t)λ
2168
+ N−4
2169
+ 2
2170
+ 0
2171
+ λ
2172
+ N−4
2173
+ 2
2174
+ 1
2175
+ ,
2176
+ ∂2f4(λ1, λ2, λ0, t)
2177
+ ∂λ0∂λ2
2178
+ = −(N − 2)2b1τ1(t)λ
2179
+ N−4
2180
+ 2
2181
+ 0
2182
+ λ
2183
+ N−4
2184
+ 2
2185
+ 2
2186
+ ,
2187
+ ∂2f4(λ1, λ2, λ0, t)
2188
+ ∂λ1∂λ2
2189
+ = 2(N − 2)2b1γ4(t)λ
2190
+ N−4
2191
+ 2
2192
+ 1
2193
+ λ
2194
+ N−4
2195
+ 2
2196
+ 2
2197
+ .
2198
+ For simplicity, we introduce the notation
2199
+ X := λ
2200
+ N−2
2201
+ 2
2202
+ 0
2203
+ ,
2204
+ Y := λ
2205
+ N−2
2206
+ 2
2207
+ 1
2208
+ ,
2209
+ Z := λ
2210
+ N−2
2211
+ 2
2212
+ 2
2213
+ .
2214
+ In order to prove that D2
2215
+ λ0,λ1,λ2f5(λ0(t), λ1(t), λ2(t), t) is nondegenerate for any t ∈ (0, t∗
2216
+ 1) ∪ (t∗
2217
+ 2, 1), it suffices
2218
+ to show that the matrix
2219
+
2220
+
2221
+
2222
+
2223
+ X + τ1(t)(Y − Z)
2224
+ τ1(t)X
2225
+ 2
2226
+ N−2 Y
2227
+ N−4
2228
+ N−2
2229
+ −τ1(t)X
2230
+ 2
2231
+ N−2 Z
2232
+ N−4
2233
+ N−2
2234
+ τ1(t)X
2235
+ N−4
2236
+ N−2 Y
2237
+ 2
2238
+ N−2
2239
+ 2γ3(t)Y + τ1(t)X + 2γ4(t)Z
2240
+ 2γ4(t)Y
2241
+ 2
2242
+ N−2 Z
2243
+ N−4
2244
+ N−2
2245
+ −τ1(t)X
2246
+ N−4
2247
+ N−2 Z
2248
+ 2
2249
+ N−2
2250
+ 2γ4(t)Y
2251
+ N−4
2252
+ N−2 Z
2253
+ 2
2254
+ N−2
2255
+ 2γ3(t)Z − τ1(t)X + 2γ4(t)Y
2256
+
2257
+
2258
+
2259
+
2260
+ is nondegenerate. Using (6.2), (6.3) and (6.4) this is equivalent to showing that the matrix
2261
+
2262
+
2263
+
2264
+
2265
+ X
2266
+ 2 + b2
2267
+ 4b1 · 1
2268
+ X
2269
+ τ1(t)X
2270
+ 2
2271
+ N−2 Y
2272
+ N−4
2273
+ N−2
2274
+ −τ1(t)X
2275
+ 2
2276
+ N−2 Z
2277
+ N−4
2278
+ N−2
2279
+ τ1(t)X
2280
+ N−4
2281
+ N−2 Y
2282
+ 2
2283
+ N−2
2284
+ γ3(t)Y + b2
2285
+ 2b1 · 1
2286
+ Y
2287
+ 2γ4(t)Y
2288
+ 2
2289
+ N−2 Z
2290
+ N−4
2291
+ N−2
2292
+ −τ1(t)X
2293
+ N−4
2294
+ N−2 Z
2295
+ 2
2296
+ N−2
2297
+ 2γ4(t)Y
2298
+ N−4
2299
+ N−2 Z
2300
+ 2
2301
+ N−2
2302
+ γ3(t)Z + b2
2303
+ 2b1 · 1
2304
+ Z
2305
+
2306
+
2307
+
2308
+
2309
+ is nondegenerate. A direct computation, using (6.7), shows that the determinant of the above matrix has the
2310
+ same sign as γ3(t), hence is nontrivial, proving Claim 2.
2311
+ Theorem 1.6 now follows from
2312
+
2313
+ Nodal solutions to problems with Hardy terms
2314
+ 19
2315
+ Claim 3: The function ν2(t) := f5
2316
+
2317
+ λ0(t), λ1(t), λ2(t), t
2318
+
2319
+ has a critical point t1 ∈ (0, t∗
2320
+ 1).
2321
+ Observe that, writing again λi instead of λi(t),
2322
+ ν′
2323
+ 2(t) = ∂f4(λ0(t), λ1(t), λ2(t), t)
2324
+ ∂t
2325
+ = 2b1
2326
+
2327
+ γ′
2328
+ 3(t)
2329
+
2330
+ λN−2
2331
+ 1
2332
+ + λN−2
2333
+ 2
2334
+
2335
+ + 2τ ′
2336
+ 1(t)λ
2337
+ N−2
2338
+ 2
2339
+ 0
2340
+
2341
+ λ
2342
+ N−2
2343
+ 2
2344
+ 1
2345
+ − λ
2346
+ N−2
2347
+ 2
2348
+ 2
2349
+
2350
+ + 4γ′
2351
+ 4(t)λ
2352
+ N−2
2353
+ 2
2354
+ 1
2355
+ λ
2356
+ N−2
2357
+ 2
2358
+ 2
2359
+
2360
+ ,
2361
+ where λ0, λ1, λ2 satisfy (6.5), (6.6), (6.7) and (6.8). Therefore, ν′
2362
+ 2(t) = 0 for t ∈ (0, t∗
2363
+ 1) is equivalent to
2364
+ ι3(t) := γ′
2365
+ 3(t)
2366
+
2367
+ 2γ3(t)(γ3(t) − 2τ 2
2368
+ 1 (t)) + τ2
2369
+ 1 (t)(γ3(t) + 2γ4(t))
2370
+
2371
+ − 2τ ′
2372
+ 1(t)τ1(t)γ3(t)
2373
+
2374
+ γ3(t) + 2γ4(t)
2375
+
2376
+ + 4γ′
2377
+ 4(t)γ3(t)
2378
+
2379
+ γ3(t) − 2τ 2
2380
+ 1 (t)
2381
+
2382
+ = 0.
2383
+ It is easy to check that ι3(t) → −∞ as t → 0+ and ι3(t∗
2384
+ 1) > 0 because γ′
2385
+ 3(t∗
2386
+ 1) > 0, γ4(t∗
2387
+ 1) > 0 and γ3(t∗
2388
+ 1) = 0.
2389
+ Hence there exists t1 ∈ (0, t∗
2390
+ 1) such that ι3(t1) = 0. Claim 3 follows, finishing the proof of Theorem 1.6.
2391
+
2392
+ Remark 6.1. We conjecture that there should also exist t2 ∈ (t∗
2393
+ 2, 1) such that ι3(t2) = 0. This is not considered
2394
+ here because the computations get enormous.
2395
+ Acknowledgements: The authors would like to thank Professor Daomin Cao for many helpful discussions
2396
+ during the preparation of this paper. This work was carried out while Qianqiao Guo was visiting Justus-
2397
+ Liebig-Universit¨at Gießen, to which he would like to express his gratitude for their warm hospitality.
2398
+ Funding: Qianqiao Guo was supported by the National Natural Science Foundation of China (Grant No.
2399
+ 11971385) and the Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2019JM275).
2400
+ References
2401
+ [1] Th. Aubin, Probl`emes isop´erim´etriques et espaces de Sobolev, J. Differential Geometry 11 (1976), 573-598.
2402
+ [2] A. Bahri, Y. Li, O. Rey, On a variational problem with lack of compactness: the topological effect of the
2403
+ critical points at infinity, Calc. Var. Part. Diff. Equ. 3 (1995), 67-93.
2404
+ [3] T. Bartsch, T. D’Aprile, A. Pistoia, Multi-bubble nodal solutions for slightly subcritical elliptic problems
2405
+ in domains with symmetries, Ann. Inst. H. Poincar´e Anal. Non Lin´eaire 30 (2013), 1027-1047.
2406
+ [4] T. Bartsch, T. D’Aprile, A. Pistoia, On the profile of sign-changing solutions of an almost critical problem
2407
+ in the ball, Bull. London Math. Soc. 45 (2013), 1246-1258.
2408
+ [5] T. Bartsch, Q. Guo, Nodal blow-up solutions to slightly subcritical elliptic problems with Hardy-critical
2409
+ term, Adv. Nonlinear Stud. 17 (2017), 55-85.
2410
+
2411
+ 20
2412
+ T. Bartsch, Q. Guo
2413
+ [6] T. Bartsch, Q. Guo, Nodal bubble tower solutions to slightly subcritical elliptic problems with Hardy
2414
+ terms, SN Partial Differ. Equ. Appl. (2020) 1:26.
2415
+ [7] T. Bartsch, A. Micheletti, A. Pistoia, On the existence and the profile of nodal solutions of elliptic equations
2416
+ involving critical growth, Calc. Var. Part. Diff. Equ. 26 (2006), 265-282.
2417
+ [8] G. Bianchi, H. Egnell, A note on the Sobolev inequality, J. Functional Analysis 100 (1991), 18-24.
2418
+ [9] H. Brezis, L.A. Peletier, Asymptotics for elliptic equations involving critical growth, Partial differential
2419
+ equations and the calculus of variations, vol. I, Progr. Nonlinear Diff. Equ. Appl. Birkh¨auser, Boston, MA
2420
+ 1 (1989), 149-192.
2421
+ [10] D.M. Cao, P.G. Han, Solutions for semilinear elliptic equations with critical exponents and Hardy poten-
2422
+ tial, J. Diff. Equ. 205 (2004), 521-537.
2423
+ [11] D.M. Cao, S.J. Peng, A note on the sign-changing solutions to elliptic problems with critical Sobolev and
2424
+ Hardy terms, J. Diff. Equ. 193 (2003), 424-434.
2425
+ [12] D.M. Cao, S.J. Peng, Asymptotic behavior for elliptic problems with singular coefficient and nearly critical
2426
+ Sobolev growth, Ann. Mat. Pura. Appl. 185 (2006), 189-205.
2427
+ [13] F. Catrina, Z.Q. Wang, On the Caffarelli-Kohn-Nirenberg inequalities: sharp constants, existence (and
2428
+ nonexistence), and symmetry of extremal functions, Comm. Pure Appl. Math. 54 (2001), 229-258.
2429
+ [14] M. del Pino, J. Dolbeault, M. Musso, “Bubble-tower” radial solutions in the slightly supercritical Brezis-
2430
+ Nirenberg problem, J. Diff. Equ. 193(2) (2003), 280-306.
2431
+ [15] I. Ekeland, N. Ghoussoub, Selected new aspects of the calculus of variations in the large, Bull. Amer.
2432
+ Math. Soc. (N.S.) 39(2) (2002), 207-265.
2433
+ [16] V. Felli, A. Pistoia, Existence of blowing-up solutions for a nonlinear elliptic equation with Hardy potential
2434
+ and critical growth, Comm. Part. Diff. Equ. 31 (2006), 21-56.
2435
+ [17] V. Felli, S. Terracini, Fountain-like solutions for nonlinear elliptic equations with critical growth and
2436
+ Hardy potential, Comm. Contemp. Math. 7 (2005), 867-904.
2437
+ [18] A. Ferrero, F. Gazzola, Existence of solutions for singular critical growth semilinear elliptic equations, J.
2438
+ Diff. Equ. 177 (2001), 494-522.
2439
+ [19] M. Flucher, J. Wei, Semilinear Dirichlet problem with nearly critical exponent, asymptotic location of
2440
+ hot spots, Manuscripta Math. 94 (1997), 337-346.
2441
+ [20] N. Ghoussoub, F. Robert, The Hardy–Schr¨odinger operator with interior singularity: the remaining cases,
2442
+ Calc. Var. Part. Diff. Equ. 56 (20017), paper 149, 54 pp.
2443
+
2444
+ Nodal solutions to problems with Hardy terms
2445
+ 21
2446
+ [21] N. Ghoussoub, C. Yuan, Multiple solutions for quasi-linear PDEs involving the critical Sobolev and Hardy
2447
+ exponents, Trans. Amer. Math. Soc. 352 (2000), 5703-5743.
2448
+ [22] M. Grossi, F. Takahashi, Nonexistence of multi-bubble solutions to some elliptic equations on convex
2449
+ domains, J. Functional Analysis 259 (2010), 904-917.
2450
+ [23] Q.Q. Guo, P.C. Niu, Nodal and positive solutions for singular semilinear elliptic equations with critical
2451
+ exponents in symmetric domains, J. Diff. Equ. 245 (2008), 3974-3985.
2452
+ [24] Z.C. Han, Asymptotic approach to singular solutions for nonlinear elliptic equations involving critical
2453
+ Sobolev exponent, Ann. Inst. H. Poincar´e Anal. Non Lin´eaire 8 (1991), 159-174.
2454
+ [25] E. Jannelli, The role played by space dimension in elliptic critical problems, J. Diff. Equ. 156 (1999),
2455
+ 407-426.
2456
+ [26] M. Musso, A. Pistoia, Tower of bubbles for almost critical problems in general domains, J. Math. Pures
2457
+ Appl. 93 (2010), 1-40.
2458
+ [27] M. Musso, J. Wei, Nonradial solutions to critical elliptic equations of Caffarelli-Kohn-Nirenberg type, Int.
2459
+ Math. Res. Not. 18 (2012), 4120-4162.
2460
+ [28] A. Pistoia, T. Weth, Sign changing bubble tower solutions in a slightly subcritical semilinear Dirichlet
2461
+ problem, Ann. Inst. H. Poincar´e Anal. Non Lin´eaire 24 (2007), 325-340.
2462
+ [29] O. Rey, Proof of two conjectures of H. Br´ezis and L.A. Peletier, Manuscripta Math. 65 (1989), 19-37.
2463
+ [30] O. Rey, The role of the Green’s function in a nonlinear elliptic equation involving the critical Sobolev
2464
+ exponent, J. Functional Analysis 89 (1990), 1-52.
2465
+ [31] O. Rey, Blow-up points of solutions to elliptic equations with limiting nonlinearity, Differential Integral
2466
+ Equations 4 (1991), 1155-1167.
2467
+ [32] D. Ruiz, M. Willem, Elliptic problems with critical exponents and Hardy potentials, J. Diff. Equ. 190
2468
+ (2003), 524-538.
2469
+ [33] D. Smets, Nonlinear Schr¨odinger equations with Hardy potential and critical nonlinearities, Trans. Amer.
2470
+ Math. Soc. 357 (2005), 2909-2938.
2471
+ [34] G. Talenti, Best constant in Sobolev inequality, Ann. Mat. Pura Appl. 110 (1976), 353-372.
2472
+ [35] S.Terracini, On positive entire solutions to a class of equations with a singular coefficient and critical
2473
+ exponent, Adv. Diff. Equations 2 (1996), 241-264.
2474
+ E-mail:
2475
+
2476
+ 22
2477
+ T. Bartsch, Q. Guo
2478
+ thomas.bartsch@math.uni-giessen.de
2479
+ gqianqiao@nwpu.edu.cn
2480
+
IdE4T4oBgHgl3EQfIQyU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KdE2T4oBgHgl3EQfAgZ0/content/2301.03592v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad28611f3b590fc686abbfabfb9be9d64c3f7a54c69ddc1ffb67c77bab4f92e4
3
+ size 3120024
KdE2T4oBgHgl3EQfAgZ0/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae690443b8f1237b3062e65bd90794f2fd980f759db0888199b27dd71e22a2d1
3
+ size 7405613
KdE3T4oBgHgl3EQfXwqt/content/tmp_files/2301.04482v1.pdf.txt ADDED
@@ -0,0 +1,1531 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation
2
+ with Prediction
3
+ KYLE K. QIN, RMIT University, Australia
4
+ YONGLI REN, RMIT University, Australia
5
+ WEI SHAO, RMIT University, Australia
6
+ BRENNAN LAKE, Cuebiq Inc., USA
7
+ FILIPPO PRIVITERA, Cuebiq Inc., USA
8
+ FLORA D. SALIM, University of New South Wales, Australia
9
+ Sparsity is a common issue in many trajectory datasets, including human mobility data. This issue frequently brings more difficulty
10
+ to relevant learning tasks, such as trajectory imputation and prediction. Nowadays, little existing work simultaneously deals with
11
+ imputation and prediction on human trajectories. This work plans to explore whether the learning process of imputation and prediction
12
+ could benefit from each other to achieve better outcomes. And the question will be answered by studying the coexistence patterns
13
+ between missing points and observed ones in incomplete trajectories. More specifically, the proposed model develops an imputation
14
+ component based on the self-attention mechanism to capture the coexistence patterns between observations and missing points among
15
+ encoder-decoder layers. Meanwhile, a recurrent unit is integrated to extract the sequential embeddings from newly imputed sequences
16
+ for predicting the following location. Furthermore, a new implementation called Imputation Cycle is introduced to enable gradual
17
+ imputation with prediction enhancement at multiple levels, which helps to accelerate the speed of convergence. The experimental
18
+ results on three different real-world mobility datasets show that the proposed approach has significant advantages over the competitive
19
+ baselines across both imputation and prediction tasks in terms of accuracy and stability.
20
+ CCS Concepts: • Information systems → Spatial-temporal systems.
21
+ Additional Key Words and Phrases: Location Imputation; Human Trajectory Prediction; Self-attention Network
22
+ ACM Reference Format:
23
+ Kyle K. Qin, Yongli Ren, Wei Shao, Brennan Lake, Filippo Privitera, and Flora D. Salim. 2022. Multiple-level Point Embedding for
24
+ Solving Human Trajectory Imputation with Prediction. ACM Trans. Spatial Algorithms Syst. 1, 1, Article 1 (January 2022), 22 pages.
25
+ https://doi.org/10.1145/1122445.1122333
26
+ 1
27
+ INTRODUCTION
28
+ Mining knowledge on datasets such as time series and human mobility data has received much attention from the
29
+ public [4, 6, 17, 24, 28]. However, missing values that commonly exist in this type of dataset can implicitly influence the
30
+ Authors’ addresses: Kyle K. Qin, RMIT University, 124 La Trobe St, Melbourne, VIC, Australia, 3000, kyle.qin@hotmail.com; Yongli Ren, RMIT University,
31
+ 124 La Trobe St, Melbourne, VIC, Australia, 3000, yongli.ren@rmit.edu.au; Wei Shao, RMIT University, 124 La Trobe St, Melbourne, VIC, Australia, 3000,
32
+ wei.shao@rmit.edu.au; Brennan Lake, Cuebiq Inc., 15 West 27th Street, New York, NY, USA, 10001, blake@cuebiq.com; Filippo Privitera, Cuebiq Inc., 15
33
+ West 27th Street, New York, NY, USA, 10001, fprivitera@cuebiq.com; Flora D. Salim, University of New South Wales, School of Computer Science and
34
+ Engineering, Engineering Rd, Kensington, NSW, Australia, 2052, flora.salim@unsw.edu.au.
35
+ Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not
36
+ made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components
37
+ of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to
38
+ redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
39
+ © 2022 Association for Computing Machinery.
40
+ Manuscript submitted to ACM
41
+ Manuscript submitted to ACM
42
+ 1
43
+ arXiv:2301.04482v1 [cs.LG] 11 Jan 2023
44
+
45
+ 2
46
+ Qin et al.
47
+ quality of the analysis and learning process. As we know, data on human mobility at a fine-grained scale can help with
48
+ understanding people’s movement patterns, activities, and potential intentions, allowing customized recommendations
49
+ and services to be delivered to individuals or groups. However, human trajectory data is frequently incomplete in
50
+ practice for many reasons, such as power or bandwidth limitations on sensor-based devices and varying communication
51
+ frequency of signals between devices and servers. It has been mentioned that the sparsity of data could cause deterioration
52
+ of performance on learning human activities or movements [18, 23]. Therefore, imputing missing values in a trajectory
53
+ becomes a fundamental problem for other learning tasks, such as predictions.
54
+ Human mobility prediction or imputation has become prevalent, with various types of mobility data available for
55
+ collection and processing. Previous works of human trajectory prediction mainly focused on forecasting future positions
56
+ at different levels of granularity, including coordinates [9, 11, 26], specific locations such as Point-of-Interests (POIs)
57
+ [7, 31, 32, 38] and grids or regions on map [8, 22]. Intuitively, the imputation of human trajectories can be formulated
58
+ as the problem of time series imputation, which a number of relevant approaches have solved. Previous algorithms
59
+ proposed for sequence imputation generally leverage the advantages of Generative Adversarial Networks (GANs)
60
+ [6, 20, 21] or Recurrent Neural Networks (RNNs) [3]. However, those generative models that are autoregressive could
61
+ be vulnerable to compounding errors in long-range temporal sequence modeling, and the recurrent models may face
62
+ issues of vanishing gradients and difficult training. Recently, two non-autoregressive models [18, 25] were claimed to
63
+ have more merits for imputing values in sequential data such as traffic flows and pedestrians’ trajectories in a specific
64
+ scene. Nonetheless, these approaches first lack explicit observation and evaluation of the imputation of human mobility
65
+ in the scope of the city. As we know, compared with walking or running trajectories in a small scene, the patterns
66
+ and factors could be dramatically varied when the distribution of movements is spread at the macro city scope (e.g.,
67
+ check-in data). We would encounter more challenges in this kind of dataset which is normally accompanied by arbitrary
68
+ movements, sparsity, and no uniform frequency of points collection. Secondly, the specific dependencies or coexistence
69
+ patterns between visited locations and missing ones in trajectories were not well considered during the training by the
70
+ previous methods. Moreover, little existing work deals with prediction while simultaneously imputing values in the
71
+ data of trajectories.
72
+ This paper plans to tackle the imputation issue by studying the coexistence patterns or dependencies between missing
73
+ points and observed ones while incomplete human trajectories are given. Meanwhile, we argue that while solving the
74
+ data sparsity issue, the imputation and prediction tasks can complement each other. In other words, we develop an
75
+ approach that could achieve mutually beneficial effects between both tasks with interactive optimization. As we know,
76
+ information will be lost when passing messages in a sequential manner of learning. Missing values are often randomly
77
+ distributed in human movement trajectories, potentially inhibiting the efficacy of imputation in a traditional sequential
78
+ manner (e.g., RNNs). Transformer Networks [29] can effectively learn representations of observations for prediction
79
+ purposes by weighting the values of sequences via the attention mechanism. This method is naturally suitable for
80
+ learning in a non-sequential way. We propose a new approach called multIple-level poiNt embeddinG for solving
81
+ tRajectory imputAtion wIth predictioN (INGRAIN). INGRAIN can effectively capture coexistence dependencies among
82
+ observed and missing values via multi-head attention in encoder-decoder layers, which helps ameliorate the imputation
83
+ efficiency. Meanwhile, the model effectively integrates with a recurrent unit to extract sequential embeddings from
84
+ newly imputed sequences to predict the next moving positions. For flexible learning, a new process called the Imputation
85
+ Cycle is designed to enable progressive imputation with prediction at multiple levels by constraining the number of
86
+ missing points for each imputation recurrence. In addition, the model delivers messages from the imputation module to
87
+ Manuscript submitted to ACM
88
+
89
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
90
+ 3
91
+ RNN units to generate sequential embeddings for forecasting purposes. In summary, the key contributions of this paper
92
+ are as follows:
93
+ • We propose one new framework that integrates both autoregressive and non-autoregressive components to
94
+ impute missing points in human trajectories and predict future movements.
95
+ • A model is established for trajectory imputation with prediction based on gradual amelioration at multiple levels
96
+ via setting the granularity of imputing points. It is applicable to different human mobility datasets.
97
+ • Comprehensive evaluations are conducted to show the efficiency and effectiveness of our model on three real-
98
+ world human trajectory datasets. The paper provides insights into how the method satisfies accurate estimations
99
+ on missing points and next positions and how trade-offs could be handled in this type of cooperative learning.
100
+ The rest of the paper is organized as follows: Section 2 introduces the related work, and Section 3 provides the
101
+ definitions for the problem of human trajectory imputation with prediction. Section 4 presents the details of the
102
+ proposed solution and its important components. Section 5 shows the experimental results, and the conclusion is given
103
+ in Section 6.
104
+ 2
105
+ RELATED WORK
106
+ 2.1
107
+ Human Trajectory Prediction
108
+ Many studies have been devoted to human trajectory prediction. They can be categorized according to the granularity of
109
+ targeted locations in prediction. A part of the literature has focused on forecasting grids or regions for next movements
110
+ on maps [8, 22], whereas other parts have explored predicting coordinates [9, 11, 26] or POIs [7, 31, 32] in the future.
111
+ We can further classify the relevant literature from the perspective of traveling scope in human mobility data: some
112
+ studies [7, 26, 31, 32] have concentrated on predicting locations of people across city areas that are often sparsely or
113
+ scattered populated, and others [1, 9, 11] have examined the motions of persons in smaller-scale scenes such as crowds
114
+ on the street or customers on the floor of a building. The patterns and factors of human movement could be particularly
115
+ distinct while the scale of traveling distance is changed. For example, by extracting grid-based stay time statistics of
116
+ users and periodically analyzing their frequency of visiting regions [8], the Inhomogeneous Continuous-Time Markov
117
+ model was used to capture temporal and sequential regularities for predicting the leaving time of objects in regions and
118
+ their next locations. There is a certain positive correlation between people’s morning trajectories and corresponding
119
+ afternoon trajectories [26] in cities, so the integrated similarity metric was developed to estimate similar segments
120
+ of trajectories with temporal segmentation and temporal correlation extraction. In a series of RNNs, LSTM [13] and
121
+ Gated Recurrent Units (GRU) [5] are two popular variants that effectively moderate short-term memory and can help
122
+ to avoid the vanishing gradient problem. Social Long Short-Term Memory [1] was proposed based on LSTM to estimate
123
+ the motions of pedestrians among the crowd in different scenes while taking into account the navigation of all their
124
+ walking neighbors in a shared site.
125
+ 2.2
126
+ Missing Data Imputation
127
+ Imputation of missing values on trajectory datasets has become an indispensable work in many applications. Previously,
128
+ a considerable number of methods for trajectory completion focused on inferring missing portion of traffic trajectories
129
+ from sparse GPS samples based on the geometry of road network [16, 19, 33, 36]. For instance, the History-based Route
130
+ Inference System (HRIS) [36] was established with a set of new mapping algorithms that could effectively extract
131
+ and learn the traveling patterns from historical trajectories and incorporate them into the route inference process.
132
+ Manuscript submitted to ACM
133
+
134
+ 4
135
+ Qin et al.
136
+ Along with estimating the traffic flows across junctions in a road network, Li et al. utilized the GPS samples within
137
+ each flow cluster to achieve fine-level completion of individual trajectories [16]. Yin et al. developed a map-matching
138
+ algorithm by evaluating the traveling cost of candidate routes and considering the distance feature and road selection
139
+ behavior of users [33]. However, the imputation methods for traffic trajectories on roads are hard to adapt to outdoor
140
+ human mobility in city areas. Those road network mapping techniques could become ineffective while human beings’
141
+ movements are relatively arbitrary on the map and affected by a variety of factors.
142
+ More recent research related to missing value imputation has mainly relied on techniques to impute sequential data
143
+ including Matrix Factorisation [23], GANs [6, 20, 21, 34] or RNNs [3, 35]. Naghizade et al. [23] proposed a contextual
144
+ model to predict information at missing locations in sparse indoor trajectories via using Graph-regularised Non-
145
+ negative Matrix Factorisation with consideration of implicit social ties among individuals. A model called BRITS [3]
146
+ was built on RNNs to directly learn missing values for time series in a bidirectional recurrent dynamical system without
147
+ strong assumptions. In GAIN [34], the generator imputes the missing values conditioned on observed data, and the
148
+ discriminator then attempts to identify which parts of the conjectured vector are actually observed and which are
149
+ imputed. The former module focuses on the imputation quality, and the latter is forced to learn according to real data
150
+ distribution. In contrast, MASKGAN [6] explicitly trains the generator to produce high-quality samples for infilling text
151
+ on sentences. GRUI [20], an autoregressive model based on GAN, was developed for the imputation of multivariate
152
+ time series, such as electronic medical record datasets or air quality and weather data. Additionally, Liu et al. recently
153
+ presented a non-autoregressive model NAOMI [18] to impute missing values in different sequential datasets, such as
154
+ traffic flows and trajectories of basketball players. The missing values are filled recursively from coarse to fine-grained
155
+ resolutions via a forward and backward RNN-based model. NAOMI considers multiple-resolution imputation, wherein
156
+ new imputations will be performed based on the previous inferences of values.
157
+ 2.3
158
+ Attention Mechanism
159
+ In the learning process, recurrent models can make predictions by transiting successive dependencies of observations
160
+ from the beginning of entire sequences. That gives recurrent models the expressive ability to deal with long sequential
161
+ data while maintaining hidden states. Nowadays, autoregressive models such as the Transformer Network are competi-
162
+ tive with or even supersede RNNs on a diverse set of missions. Transformer Network is claimed to effectively weigh and
163
+ learn representations over available observations via the multi-head attention mechanism. The original Transformer
164
+ [29] was established to model and predict sequences in the natural language processing field. Subsequently, GATs [30]
165
+ was developed to operate on graph-structured data, leveraging self-attentional layers to address weighting nodes for
166
+ graph convolutions. Recently, it was adopted by Giuliari et al. [9] to forecast the future motions of people in different
167
+ scenes, which renders better performance than the LSTM-based and Linear approaches.
168
+ 2.4
169
+ Main Research Gaps
170
+ In this paper, we attempt to examine whether the imputation of missing points in human historical mobility can bring
171
+ sake to the prediction of future movements, which is rarely investigated by the existing works. As we mentioned,
172
+ our objective focus on inferring missing locations of daily human mobility in city areas. The road network mapping
173
+ techniques for vehicle traffic trajectories can not adapt well to such datasets as the distribution of human beings’
174
+ movements is relatively arbitrary without strictly following the road networks. And human activities could be affected
175
+ heavily by social connections, professions, and weather conditions. In addition, many GAN-based approaches, such as
176
+ MASKGAN, GRUI, and GAIN were not designed or tested for complex human mobility data in terms of constructing
177
+ Manuscript submitted to ACM
178
+
179
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
180
+ 5
181
+ Table 1. Symbols and notations.
182
+ Symbols
183
+ Description
184
+ 𝑝𝑡
185
+ The point was recorded at time 𝑡
186
+ 𝑆𝑢
187
+ The original mobility sequence of user 𝑢
188
+ 𝑡𝑟𝑤
189
+ 𝑢
190
+ One sub-trajectory of 𝑆𝑢 in 𝑤-𝑡ℎ time window
191
+ 𝑈
192
+ The number of users involved
193
+ 𝑇
194
+ The maximum number of points considered
195
+ 𝐿
196
+ The width of each time window
197
+ 𝑆
198
+
199
+ 𝑢
200
+ A set of sub-trajectories of user 𝑢 from 𝑆𝑢
201
+ 𝑝𝑙
202
+ The point at step 𝑙 in a trajectory
203
+ 𝑝𝑖
204
+ A missing point in one trajectory
205
+ 𝑀
206
+ A masking vector for missing values
207
+ 𝐼
208
+ The total number of missing points in trajectory
209
+ 𝐷
210
+ The dimension of initial representation
211
+ 𝑍
212
+ An initial representation of input points
213
+ 𝑧𝑙
214
+ 𝑜𝑏𝑠
215
+ The initial representation of point 𝑝𝑙
216
+ 𝑧𝑖
217
+ 𝑚𝑖𝑠
218
+ The initial representation of missing point 𝑝𝑖
219
+ 𝜆1
220
+ The weight of imputation component
221
+ 𝜆2
222
+ The weight of prediction component
223
+ 𝜆3
224
+ The weight of movement velocity
225
+ coordinates of locations with Spatio-temporal dimensions. Recently, NAOMI and another variant called SingleRes [18]
226
+ were proposed to apply forward and backward RNN on observed points to infer missing values in each trajectory.
227
+ However, those methods still rely on learning sequential dependencies of points in trajectories, and the experiments only
228
+ tested the trajectories of agents in a relatively small scene (e.g., a billiard table or basketball square). The performance
229
+ of daily human movements’ trajectories across city regions remains unknown. This type of trajectory contains more
230
+ arbitrary movements occurring in an ample space with possibly more sparsity. Our approach can provide insights
231
+ for capturing the coexisting dependencies between missing positions and observed ones on different human mobility
232
+ datasets. And the model is established based on the conditional independence assumption, considering both spatial and
233
+ temporal perspectives, which the previous work did not examine sufficiently.
234
+ 3
235
+ PROBLEM DEFINITION
236
+ In this section, we define the problem of trajectory prediction and imputation task as follows:
237
+ • The Prediction Task: we denote an original mobility sequence of user 𝑢 as 𝑆𝑢 = {𝑝1, 𝑝2, ..., 𝑝𝑇 }, where 𝑝𝑡 ∈ R2
238
+ is the coordinates of point recorded at time frame 𝑡 and 𝑇 is the maximum number of observed values in
239
+ consideration. A trajectory 𝑡𝑟𝑤
240
+ 𝑢 is one sub-sequence of 𝑆𝑢 in 𝑤-𝑡ℎ time window, and the width of the window is
241
+ 𝐿. Therefore, 𝑡𝑟𝑤
242
+ 𝑢 = {𝑝𝑤
243
+ 1 , 𝑝𝑤
244
+ 2 , ..., 𝑝𝑤
245
+ 𝐿 }, 𝑙-𝑡ℎ is the number of points in the sub-sequence. A set of such trajectories
246
+ can be extracted from the original sequence with a defined time window for user 𝑢: 𝑆
247
+
248
+ 𝑢 = {𝑡𝑟1𝑢,𝑡𝑟2𝑢, ...𝑡𝑟𝑊
249
+ 𝑢 }. The
250
+ whole dataset can be denoted as 𝑆 = {𝑆
251
+
252
+ 1,𝑆
253
+
254
+ 2, ...𝑆
255
+
256
+ 𝑈 } and 𝑈 is the total number of users. The goal of this task is to
257
+ predict the coordinates of the next movement when giving a trajectory.
258
+ Manuscript submitted to ACM
259
+
260
+ 6
261
+ Qin et al.
262
+ • The Imputation Task: we assume that 𝑡𝑟𝑤
263
+ 𝑢 denotes one of user 𝑢’s trajectories. In reality, 𝑡𝑟𝑤
264
+ 𝑢 may contain a
265
+ portion of missing points for many reasons. Thus, the states of all the points inside the trajectory are represented
266
+ with one masking vector 𝑀 = [𝑚1,𝑚2, ...,𝑚𝐿], where 𝑚𝑙 equals to zero if 𝑝𝑤
267
+ 𝑙 is not observed. Otherwise, 𝑚𝑙
268
+ is set to one. The purpose is to infer and substitute the missing values with appropriate alternatives in each
269
+ trajectory.
270
+ Moreover, Table 1 provides more information about the symbols and notations used in this paper.
271
+ 4
272
+ PROPOSED APPROACH
273
+ Fig. 1 illustrates the architecture of our proposed method for both human trajectory imputation and prediction. For
274
+ imputation purposes, encoders and decoders based on self-attention are applied to learn coexisting patterns between
275
+ observations and missing points. Then, a recurrent component plays a role in extracting sequential dependencies on
276
+ newly learned embeddings from the Supplement Layer for forwarding prediction. Meanwhile, a mechanism called the
277
+ Imputation Cycle is introduced to achieve progressive learning of both imputation and prediction at multiple levels. The
278
+ model interactively considers learning two main components and improves overall performance. Algorithm 1 shows an
279
+ overview of training conducted using the proposed approach, and the details of the main components are described in
280
+ the following subsections.
281
+ 4.1
282
+ Imputation Component
283
+ In the beginning, the representations of each trajectory with missing points are generated via Linear layers and
284
+ Frame-positional Encoding. Then, the imputation component takes the initial representations and captures the spatial-
285
+ temporal dependencies among points through self-attention in either Encoders or Decoders. This process will produce
286
+ embeddings for observations and missing values, respectively. Here, one agile design allows the model to decode 𝑛
287
+ number of missing points at each imputation time, and the process is repeated by the Imputation Cycle. Thus, the final
288
+ impute layer is responsible for inferring 𝑛 number of missing points each time.
289
+ 4.1.1
290
+ Feature Initialisation. In the first stage, the framework projects representations of an incomplete trajectory into a
291
+ higher 𝐷-dimensional space via the Linear Embedding Layer. Specifically, the initial representation of one observed
292
+ point 𝑝𝑙 is 𝑧𝑙
293
+ 𝑜𝑏𝑠 = 𝑝⊤
294
+ 𝑙 𝑊𝑜𝑏𝑠, where ⊤ denotes transpose matrix, 𝑊𝑜𝑏𝑠 is the weight matrix, and 𝑝𝑙 is a zero vector if
295
+ it is missing. We obtain a queue for the incomplete trajectory 𝐸𝑜𝑏𝑠 = {𝑧1
296
+ 𝑜𝑏𝑠,𝑧2
297
+ 𝑜𝑏𝑠, ...,𝑧𝐿
298
+ 𝑜𝑏𝑠}. We extract another queue
299
+ of missing points from 𝐸𝑜𝑏𝑠 as 𝐸𝑚𝑖𝑠 = {𝑧1
300
+ 𝑚𝑖𝑠,𝑧2
301
+ 𝑚𝑖𝑠, ...,𝑧𝐼
302
+ 𝑚𝑖𝑠}. Similarly, the initial representation of a missing point is
303
+ 𝑧𝑖
304
+ 𝑚𝑖𝑠 = 𝑝⊤
305
+ 𝑖 𝑊𝑚𝑖𝑠, where 𝑝𝑖 is also zero vector (0 ≤ 𝑖 ≤ 𝐼) and 𝐼 is the total number of missing points in a trajectory.
306
+ Adding time information to the initial representations of trajectories is essential because the imputation unit relies
307
+ on the attention mechanism for learning without any sequential knowledge. We insert time representation to the points
308
+ as distinctive identifications in trajectory based on the Positional Encoding method [29]. The relevant equations are
309
+ given as follows:
310
+ 𝐹 (𝑡,𝑑) =
311
+ 
312
+ 
313
+ sin(
314
+ 𝑡
315
+ 10000𝑑/𝐷 ),
316
+ when d is even,
317
+ cos(
318
+ 𝑡
319
+ 10000𝑑/𝐷 ),
320
+ when d is odd,
321
+ (1)
322
+ where 𝐹 (𝑡,𝑑) outputs the representation vector for time frame 𝑡 recorded for a point in the trajectory, and 𝑑 is the
323
+ 𝑑-th dimension in the vector, which is also 𝐷-dimensional. Then, the representation of the time frame is added to
324
+ (e.g., element-wise addition) the initial embedding of the corresponding point in either 𝐸𝑜𝑏𝑠 or 𝐸𝑚𝑖𝑠. Noticeably, the
325
+ Manuscript submitted to ACM
326
+
327
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
328
+ 7
329
+ Fig. 1. The proposed framework solves trajectory imputation and prediction jointly. 𝑃1, 𝑃4, 𝑃6, and 𝑃8 are the observed points in the
330
+ trajectory, 𝑃2, 𝑃3, 𝑃5, and 𝑃7 are the missing values. Multiple Encoders and Decoders are employed in the learning process to produce
331
+ high-level embeddings for the observed trajectory and missing values, respectively. First, the Linear embedding layer initializes the
332
+ representations of the trajectory queue and missing point(s), and Time Frame Encoding is responsible for adding observed time points
333
+ to relevant representations. Next, the trajectory embeddings from Encoders are fed to Encoder-Decoder Attention to enhance the
334
+ embedding of missing points. Finally, new embeddings of the trajectory are reconstructed by the Supplement Layer and transferred
335
+ to an RNN-based unit for prediction purposes. In addition, the Imputation Cycle enables the model to conduct gradual imputation on
336
+ multiple levels.
337
+ 𝐹 is applied to the missing points in both queues 𝐸𝑜𝑏𝑠 and 𝐸𝑚𝑖𝑠, such that the model can have consistent temporal
338
+ information of missing values from both queues during the imputation.
339
+ The original Positional Encoding encodes the positions of words in a sequence. Here, we encode the time frames of
340
+ points in a trajectory within the observed period. One time frame 𝑡 is a unique numeric index like 0, 1, 2..., which stands
341
+ for the order in which people’s movements occurred in the observation period (day, week, or month). Some existing
342
+ literature [7] has mentioned that the patterns of human mobility tend to occur periodically, and integrating with this
343
+ information can help to learn relevant tasks. Therefore, we add time information using the time positional encoder to
344
+ embed the time frame of points during a considered period. Although the missing points are initially represented with
345
+ Manuscript submitted to ACM
346
+
347
+ RNN
348
+ learn
349
+ Units
350
+ Predict Layer
351
+ Supplement Layer
352
+ ImputeLayer
353
+ Traj Encoded
354
+ Mssing Point
355
+ Ermbedding
356
+ Embedding
357
+
358
+ Add&Normalize
359
+ Add&Normalize
360
+ Feed Forward
361
+ Feed Forward
362
+ Enc-DecAttention
363
+ Nx Encoder
364
+ NxDecoder
365
+ Add&Normalize
366
+ Add&Normalize
367
+ Multi-HeadAttention
368
+ Multi-Head Attention
369
+ Time Frame Encoding
370
+ LinearEmbedding
371
+ LinearEmbedding
372
+ P1
373
+ P2
374
+ P3
375
+ P4
376
+ P5
377
+ P6
378
+ P7
379
+ P8
380
+ P2
381
+ P3
382
+ P5
383
+ P78
384
+ Qin et al.
385
+ zero vectors, the Positional Encoding attaches time features on each missing value which will be further updated by the
386
+ attention-based Encoders and Decoders in the next training stage.
387
+ 4.1.2
388
+ Encoder and Decoder. As Fig. 1 shows, multiple Encoders and Decoders are employed to produce embeddings
389
+ by weighting the correlation between observed and missing values, respectively. They share a similar structure:
390
+ Self-attention, Normalisation, and Feed-forward Layers. The self-attention block of the first encoder and decoder
391
+ acquires 𝐸𝑜𝑏𝑠 and 𝐸𝑚𝑖𝑠 as inputs, respectively. And they are responsible for obtaining the internal dependencies
392
+ among the points on each side. Moreover, each decoder contains an Encode-decode Attention to learn further external
393
+ dependencies between an incomplete trajectory and its missing values. More specifically, a 𝑑𝑘-dimensional 𝑞𝑢𝑒𝑟𝑦 vector,
394
+ 𝑑𝑘-dimensional 𝑘𝑒𝑦 vector, and 𝑑𝑣-dimensional 𝑣𝑎𝑙𝑢𝑒 vector are built for each point by multiplying its embedding
395
+ with three different weight matrices, respectively. In practice, we deal with a set of points together by wrapping the
396
+ 𝑞𝑢𝑒𝑟𝑦 vectors into matrix 𝑄, 𝑘𝑒𝑦𝑠 into matrix 𝐾, and 𝑣𝑎𝑙𝑢𝑒𝑠 into matrix 𝑉 . The final output of the self-attention layer is
397
+ calculated using the following formula:
398
+ 𝐴𝑡𝑡𝑒𝑛𝑡𝑖𝑜𝑛(𝑄, 𝐾,𝑉 ) = 𝑠𝑜𝑓 𝑡𝑚𝑎𝑥(𝑄𝐾⊤
399
+ √︁
400
+ 𝑑𝑘
401
+ )𝑉,
402
+ (2)
403
+ where 𝑑𝑘 is the dimension of 𝐾. Multiple encoders or decoders work sequentially in the imputation component: the
404
+ output of one block will be taken as input by the next block.
405
+ According to [29], multi-head attention that comprises several self-attentions can be applied to jointly synthesize the
406
+ initial representation 𝑍 of points in each input queue from different representation sub-spaces, which helps enhance
407
+ embedding learning. The functions of the operation are given as follows:
408
+ 𝑀𝑢𝑙𝑡𝑖𝐻𝑒𝑎𝑑(𝑍) = 𝐶𝑜𝑛𝑐𝑎𝑡(ℎ𝑒𝑎𝑑1,ℎ𝑒𝑎𝑑2, ...,ℎ𝑒𝑎𝑑ℎ)𝑊 𝑂,
409
+ 𝑊 𝑂 ∈ Rℎ𝑑𝑣×𝐷,
410
+ (3)
411
+ ℎ𝑒𝑎𝑑𝑖 = 𝐴𝑡𝑡𝑒𝑛𝑡𝑖𝑜𝑛(𝑍𝑊 𝑄
412
+ 𝑖 ,𝑍𝑊 𝐾
413
+ 𝑖 ,𝑍𝑊 𝑉
414
+ 𝑖 ),
415
+ 𝑊 𝑄
416
+ 𝑖
417
+ ∈ R𝐷×𝑑𝑘,𝑊 𝐾
418
+ 𝑖
419
+ ∈ R𝐷×𝑑𝑘,𝑊 𝑉
420
+ 𝑖
421
+ ∈ R𝐷×𝑑𝑣 .
422
+ (4)
423
+ Here, ℎ is the total number of heads in consideration, and each ℎ𝑒𝑎𝑑𝑖 is an individual of self-attention. 𝑄𝑖 = 𝑍𝑊 𝑄
424
+ 𝑖 , 𝐾𝑖 =
425
+ 𝑍𝑊 𝐾
426
+ 𝑖
427
+ and 𝑉𝑖 = 𝑍𝑊 𝑉
428
+ 𝑖 . One of the main merits of multi-head attention is that attending computations can be executed
429
+ in parallel to boost the overall runtime. We apply two heads of self-attention in both encoders or decoders in the
430
+ experiments.
431
+ The proposed framework learns the coexistence patterns of the observed and missing points by capturing their
432
+ dependencies between the point embeddings from the encoders and decoders. Fig. 2 illustrates the component of
433
+ an Encoder-Decoder Attention that extracts the dependent relations between the observed trajectory and missing
434
+ points. For the imputation of one incomplete trajectory, the queues are created for missing points and the relevant
435
+ trajectory, respectively. Furthermore, the model imputes 𝑛 missing points each time from the queue of missing points.
436
+ In the example of Fig. 2, when 𝑛 = 2, missing points 𝑃2 and 𝑃3 are first ejected into the Decoder Self-Attention for
437
+ producing embeddings of 𝑃2 and 𝑃3. Simultaneously, the queue of the incomplete trajectory is injected into the Encoder
438
+ Self-Attention for trajectory embedding production. Then, the Encoder-Decoder Attention is responsible for learning
439
+ the dependencies by weighting the relationship of missing points (𝑃2, 𝑃3) and the observed trajectory. Finally, the
440
+ locations of the missing points can be inferred based on their learned embeddings.
441
+ Manuscript submitted to ACM
442
+
443
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
444
+ 9
445
+ P1
446
+ P2
447
+ P3
448
+ P4
449
+ P5
450
+ P6
451
+ P7
452
+ P8
453
+ Enc-Dec Attention
454
+ P2
455
+ P3
456
+ P2
457
+ P3
458
+ P5
459
+ P7
460
+ n = 2
461
+ Weighting
462
+ Decoder Self-Attention
463
+ P1
464
+ P2
465
+ P3
466
+ P4
467
+ P5
468
+ P6
469
+ P7
470
+ P8
471
+ Encoder Self-Attention
472
+ Missing Points
473
+ Queue
474
+ Traj Queue
475
+ Fig. 2. The diagram shows that the Encoder-Decoder Attention captures the dependent patterns between the missing points and an
476
+ observed trajectory.
477
+ 4.1.3
478
+ Imputation Recurrence. The model is capable of carrying out gradual imputation at multiple levels, which gives
479
+ the model more flexibility by inferring 𝑛 (1 < 𝑛 < 𝐼) missing nodes in each imputation cycle. The encoders yield
480
+ the embeddings of an incomplete trajectory and then transfer them to decoders for weighting with missing values in
481
+ imputation. Before that, the decoder takes the 𝑛 number of missing values as inputs in each cycle. Further, 𝑛 alternatives
482
+ are yielded from the Imputing Linear Layer, and new learning circulation is started based on the previous state. The
483
+ model can train and learn on each trajectory progressively. As Fig. 3 shows, the model takes 𝑛 points from the missing
484
+ points queue in each imputation cycle. In a decoder, the embeddings of 𝑛 missing points are weighted based on observed
485
+ trajectory embedding produced by an encoder. Then, the impute layer outputs the locations of 𝑛 missing points. The
486
+ imputation cycle will be repeated until all the missing points have been learned.
487
+ 4.2
488
+ Prediction Component
489
+ The details of the prediction component are provided in this section. At the upper part of the framework in Fig. 1, it is
490
+ the Supplement Layer that fetches the embeddings of observed portion 𝑌𝑜𝑏𝑠 and missing values 𝑌𝑚𝑖𝑠 from the final
491
+ layer of encoder and decoder, respectively. The Supplement layer is responsible for reconstructing a new trajectory
492
+ sequence by replenishing the trajectory representation with the embeddings of the missing points after the encoding
493
+ stage. Subsequently, an RNN-based unit is built upon this module to capture sequential dependency. The formula of a
494
+ Manuscript submitted to ACM
495
+
496
+ 10
497
+ Qin et al.
498
+ P1
499
+ P2
500
+ P3
501
+ P4
502
+ P5
503
+ P6
504
+ P7
505
+ P8
506
+ P2
507
+ P3
508
+ P5
509
+ P7
510
+ Encoder
511
+ Decoder
512
+ Linear &
513
+ Time Enc
514
+ P2
515
+ Impute
516
+ n = 1
517
+ P2
518
+ P3
519
+ P5
520
+ P7
521
+ Encoder
522
+ Decoder
523
+ Linear &
524
+ Time Enc
525
+ P3
526
+ Impute
527
+ ...
528
+ P1
529
+ P2
530
+ P3
531
+ P4
532
+ P5
533
+ P6
534
+ P7
535
+ P8
536
+ P2
537
+ P3
538
+ P5
539
+ P7
540
+ Encoder
541
+ Decoder
542
+ Linear &
543
+ Time Enc
544
+ P2
545
+ Impute
546
+ n = 2
547
+ P2
548
+ P3
549
+ P5
550
+ P7
551
+ Encoder
552
+ Decoder
553
+ Linear &
554
+ Time Enc
555
+ P5
556
+ Impute
557
+ P3
558
+ P7
559
+ Missing Points Queue
560
+ Traj Queue
561
+ Fig. 3. The Imputation Cycle enables the model to conduct gradual imputation on multiple levels. In each imputation cycle, 𝑛 missing
562
+ points will be taken into the model for learning with the relevant trajectory information. The diagram shows the imputation process
563
+ when 𝑛 equals 1 or 2.
564
+ supplement operation is given below:
565
+ 𝑌𝑠𝑒𝑞(𝑝𝑙) =
566
+ 
567
+ 
568
+ 𝑌𝑚𝑖𝑠 (𝑚𝑖),
569
+ if 𝑝𝑙 = 𝑚𝑖
570
+ 𝑌𝑜𝑏𝑠 (𝑜𝑖),
571
+ if 𝑝𝑙 = 𝑜𝑖
572
+ (5)
573
+ where 𝑌𝑠𝑒𝑞 is the embedding matrix of the whole trajectory, 𝑝𝑙 is a point at step 𝑙 in the trajectory, 𝑚𝑖 is a point in
574
+ the missing queue, and 𝑜𝑖 denotes a point in the observation queue. We interpolate the embedding of a point from
575
+ matrix 𝑌𝑚𝑖𝑠 if it is missing; otherwise, the corresponding embedding is extracted from matrix 𝑌𝑜𝑏𝑠. In addition to using
576
+ a ’Replace operation’, we can alternatively consider an ’Add operation’ in the Supplement layer to add the embedding
577
+ of missing values to the corresponding positions in the trajectory representation.
578
+ In the prediction stage, GRU [5] is selected as the recurrent unit because of its efficient computation without
579
+ performance deterioration. This layer is implanted by receiving the embeddings of the newly reconstructed sequence
580
+ from the supplement layer and produces relevant hidden states. The updated formulations of GRU are as follows:
581
+ 𝑓𝑡 = 𝜎(𝑊𝑓 𝑥𝑥𝑡 +𝑊𝑓 ℎℎ𝑡−1 + 𝑏𝑓 ),
582
+ (6)
583
+ 𝑟𝑡 = 𝜎(𝑊𝑟𝑥𝑥𝑡 +𝑊𝑟ℎℎ𝑡−1 + 𝑏𝑟),
584
+ (7)
585
+ Manuscript submitted to ACM
586
+
587
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
588
+ 11
589
+ Algorithm 1 Overview of INGRAIN Training
590
+ Input:
591
+ A set of user trajectory 𝑆
592
+
593
+ 𝑢 = {𝑡𝑟1𝑢,𝑡𝑟2𝑢, ...𝑡𝑟𝑊
594
+ 𝑢 };
595
+ One masking vector 𝑀 = [𝑚1,𝑚2, ...,𝑚𝐿];
596
+ Epochs of training 𝑒𝑝𝑜;
597
+ Number of points for each imputation cycle, 𝑛 < 𝐼.
598
+ 1: while training epoch < 𝑒𝑝𝑜 do
599
+ 2:
600
+ for each trajectory 𝑡𝑟𝑤
601
+ 𝑢 ∈ 𝑆
602
+
603
+ 𝑢 do
604
+ 3:
605
+ Apply mask 𝑀 on 𝑡𝑟𝑤
606
+ 𝑢 ;
607
+ 4:
608
+ Initialize representations of observed trajectory, 𝐸𝑜𝑏𝑠;
609
+ 5:
610
+ Encode time information with 𝐸𝑜𝑏𝑠;
611
+ 6:
612
+ while has missing values do
613
+ 7:
614
+ Initialize representations of 𝑛 missing points, 𝐸𝑚𝑖𝑠;
615
+ 8:
616
+ Apply time encoding on 𝐸𝑚𝑖𝑠;
617
+ 9:
618
+ Compute attention for observations, 𝐸
619
+
620
+ 𝑜𝑏𝑠;
621
+ 10:
622
+ Compute attention of 𝑛 missing values in observations, 𝐸′𝑚𝑖𝑠;
623
+ 11:
624
+ Reconstruct trajectory based on 𝐸
625
+
626
+ 𝑜𝑏𝑠 and 𝐸′𝑚𝑖𝑠;
627
+ 12:
628
+ Conduct imputation and prediction;
629
+ 13:
630
+ Optimisation with fused objective function L𝑙𝑒𝑎𝑟𝑛.
631
+ 14:
632
+ end while
633
+ 15:
634
+ end for
635
+ 16: end while
636
+ 𝑐𝑡 = 𝑡𝑎𝑛ℎ(𝑊𝑐𝑥𝑥𝑡 + 𝑟𝑡 ◦𝑊𝑐ℎℎ𝑡−1 + 𝑏𝑐),
637
+ (8)
638
+ ℎ𝑡 = (1 − 𝑓𝑡) ◦ 𝑐𝑡 + 𝑓𝑡 ◦ ℎ𝑡−1,
639
+ (9)
640
+ where 𝑥𝑡 is the embedding of the point in time 𝑡, ℎ𝑡−1 is the output of the last unit, 𝑊 is the weight matrix, 𝑏 is the
641
+ bias vector, ◦ means element-wise multiplication, 𝑓𝑡 is the update gate, 𝑟𝑡 is the reset gate, 𝑐𝑡 is the candidate, and ℎ𝑡
642
+ is the output. Noticeably, the model flexibly subjoins prediction training in each imputation cycle. In other words, it
643
+ can recurrently learn and make forward predictions based on the latest status of the sequence restored by previous
644
+ imputation recurrences. In the testing step, we need to detach the forward prediction from the imputing cycles and
645
+ solely execute it when the imputation of the whole trajectory is completed.
646
+ 4.3
647
+ Collaborative Learning Objective
648
+ As we mentioned, there are two main components established in the framework: imputation and prediction units.
649
+ During the training stage of imputation, the purpose is to minimize the mean squared error between imputing values
650
+ and ground truth with the following objective function:
651
+ L𝑖𝑚𝑝 = E𝑋∼𝐶,�
652
+ 𝑋∼𝐺𝜃 (𝑋,𝑀)
653
+ ��𝐿
654
+ 𝑙=1
655
+ ��� ˆ𝑥𝑙 − 𝑥𝑙
656
+ ���
657
+ 2
658
+
659
+ ,
660
+ (10)
661
+ where 𝐶 = {𝑋 ∗} is the set of original sequences, 𝑀 is a masking vector for missing values, 𝐺𝜃 (𝑋, 𝑀) denotes the
662
+ function to infer missing values for imputation with parameter 𝜃, and ˆ𝑥 is one of the imputed values �𝑋. Subsequently,
663
+ we generate embedding 𝑌 of the sequence from the previous component in the training process of prediction. 𝐽𝜔 (𝑌) is
664
+ the predictor of the next movement with parameter 𝜔, and the objective function of the prediction task is constructed
665
+ Manuscript submitted to ACM
666
+
667
+ 12
668
+ Qin et al.
669
+ as follows:
670
+ L𝑝𝑟𝑒 = E𝑋∼𝐶,𝑌∼𝐺𝜃 (𝑋,𝑀), ˆ𝑦∼𝐽𝜔 (𝑌)
671
+ ����ˆ𝑦 − 𝑦
672
+ ���
673
+ 2
674
+
675
+ .
676
+ (11)
677
+ Furthermore, we introduce a third loss function L𝑣𝑒𝑙 to constraint the movement velocity between imputed and
678
+ observed points and comply with the speed observed in trajectories:
679
+ L𝑣𝑒𝑙 = E𝑋∼𝐶,�
680
+ 𝑋∼𝐺𝜃 (𝑋,𝑀),𝑣∼𝐻 (𝑋−�
681
+ 𝑋),ˆ𝑣∼𝐻 ( �
682
+ 𝑋)
683
+ ����ˆ𝑣 − 𝑣
684
+ ���
685
+ 2
686
+
687
+ ,
688
+ (12)
689
+ where 𝐻 is the function to compute movement speed between each pair of points, 𝑣 is the observed speed in a trajectory,
690
+ and ˆ𝑣 is the speed computed between imputed and observed points.
691
+ To train the entire model, we fuse the optimization of the above objective functions in each execution as shown
692
+ below:
693
+ L𝑙𝑒𝑎𝑟𝑛 = 𝜆1L𝑖𝑚𝑝 + 𝜆2L𝑝𝑟𝑒 + 𝜆3L𝑣𝑒𝑙.
694
+ (13)
695
+ Here, 𝜆1, 𝜆2, and 𝜆3 are the hyperparameters representing the weights of different loss functions correspondingly in
696
+ training. In this way, the model can benefit from optimizing different modules, and this collaborative learning could
697
+ eventually give the model a latent boost of convergence.
698
+ 4.4
699
+ Computational Complexity
700
+ In this part, we take into account the main phases of the proposed framework for calculating computational complexity.
701
+ The meanings of symbols used here are independent of the notations in the previous sections. The essential phases
702
+ include initial representation generation, encoder and decoder attention, and RNN-based prediction module.
703
+ The stage of initial representation generation is directly built on Multi-Layer Perceptron (MLP) [15], which approxi-
704
+ mately has time complexity 𝑂(𝑙 ∗ 𝑛 ∗ 𝑑) for one layer of implementation. Here, 𝑙 is the trajectory length, 𝑛 is the input
705
+ dimension (it is regularly a small value), and 𝑑 is the embedding dimension. In the imputation stage, the encoder and
706
+ decoder mainly rely on the self-attention mechanism, which has 𝑂(𝑙2 ∗ 𝑑) [29]. On the other hand, the RNN-based
707
+ module typically contributes to time complexity 𝑂(𝑙 ∗ 𝑑2). In most cases, the trajectory length 𝑙 is smaller than the
708
+ embedding dimension 𝑑. However, self-attention is unnecessary to conduct sequential operations on all the points. It is
709
+ able to consider neighbor locations of size 𝑟 in the input trajectory if it is particularly long [29]. So, the complexity could
710
+ reduce to 𝑂(𝑙 ∗ 𝑟 ∗ 𝑑), which will be considered in future work. Overall, the 𝑂(𝑚𝑎𝑥{𝑙 ∗ 𝑛 ∗ 𝑑,𝑙2 ∗ 𝑑,𝑙 ∗ 𝑑2}) is the total
711
+ complexity of the framework. In the experiments, 𝑛 is two for the input size, and 𝑙 and 𝑑 are configured correspondingly
712
+ to different values.
713
+ 5
714
+ EXPERIMENTAL RESULTS
715
+ This section compares the performance of trajectory imputation and prediction for the proposed model and the baselines
716
+ on different human mobility datasets. Then, the primary hyperparameters of the proposed model are assessed intensively.
717
+ A ablation study is provided at the end of the section.
718
+ 5.1
719
+ Experimental Setup
720
+ 5.1.1
721
+ Datasets. We use real-world human mobility datasets from three different cities worldwide for the experiments.
722
+ The datasets record a broad range of users’ movements among city areas:
723
+ • Geolife Data [37] contains outdoor GPS trajectories of 182 users from April 2007 to August 2012 in Beijing,
724
+ China. The sampling rates vary in trajectories: approximately 91% are logged every 1 to 5 seconds or every 5 to
725
+ Manuscript submitted to ACM
726
+
727
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
728
+ 13
729
+ Table 2. The total number of trajectories used in each dataset and 𝐿 denotes the length of each trajectory.
730
+ Geolife
731
+ Cuebiq-AU
732
+ Cuebiq-US
733
+ L = 20
734
+ L = 50
735
+ L = 100
736
+ L = 20
737
+ L = 50
738
+ L = 100
739
+ L = 20
740
+ L = 50
741
+ L = 100
742
+ 20,435
743
+ 20,435
744
+ 20,301
745
+ 30,030
746
+ 30,030
747
+ 30,030
748
+ 30,030
749
+ 30,030
750
+ 30,030
751
+ 10 meters per point. Each record contains timestamp, user ID, latitude and longitude. We selected 30 users with
752
+ the most GPS records in January and February 2009 for evaluation.
753
+ • Cuebiq-US Data [14] contains more diverse human movements on a daily basis. The data collection period
754
+ ranged from January 2018 to June 2018, and the location was New York, USA. Sampling frequencies of approxi-
755
+ mately 91% of data range from 1 to 600 seconds per record, and each record has timestamp, device ID, latitude, and
756
+ longitude. Cuebiq’s anonymized and privacy-enhanced data is collected from users who opted for anonymous
757
+ data sharing for research purposes through a GDPR-compliant framework. The trajectories of the 30 most active
758
+ users in May 2018 are extracted for experiments.
759
+ • Cuebiq-AU Data [14] has the same data format as Cuebiq-US. It was collected over two years, from December
760
+ 2017 to November 2019, in cities in Australia. The sampling rate of the collected data is similar to that of
761
+ Cuebiq-US for most records. Likewise, The trajectories of 30 users who were most active in October 2019 are
762
+ used for testing.
763
+ Based on the original movement sequences of the users in each dataset, we produce a set of sub-trajectories of the
764
+ users with a defined length (see Section 3). Table 2 gives the total number of trajectories used in each dataset by length.
765
+ Then, the extracted trajectories are randomly separated into a training part (80%) and a testing part (20%). Additionally,
766
+ a varied size of masking vector is randomly created to imitate different degrees of missing values in sub-trajectories for
767
+ imputation. The default probability of generating missing values follows a discrete uniform distribution. Finally, the
768
+ model requires predicting the location of the next movement when an observed trajectory with missing points is given.
769
+ 5.1.2
770
+ Metrics. In this paper, the losses of L𝑖𝑚𝑝 and L𝑝𝑟𝑒 are basically average euclidean distances between 2D points.
771
+ In imputation, we infer the coordinates of missing points in trajectories and calculate the average 𝐿2 loss between
772
+ imputed values and ground truth among all users. Moreover, we assess the proposed approach for the prediction
773
+ task, which is to forecast the coordinates of the next location for users if a historical trajectory with missing points is
774
+ given. The average 𝐿2 loss between the predicted values and ground truth is used for the evaluation. In our model, the
775
+ predicted values will be evaluated merely after a trajectory’s imputation is completed during the testing phase.
776
+ 5.1.3
777
+ Baselines. For trajectory imputation, two state-of-the-art methods for comparison are NAOMI [18] and Sin-
778
+ gleRes [18]. NAOMI is one of the latest non-autoregressive approaches for sequence imputation. In contrast, SingleRes
779
+ is the autoregressive counterpart, and it can be reduced to BRITS [3] if the adversarial training is discarded. GRUI
780
+ [20] is also an autoregressive model with GAN for time series imputation, which is used to handle the completion of a
781
+ trajectory sequence. Moreover, GAIN [34] is another recent method to impute missing data using GANs. We also test the
782
+ imputation task with a classical approach named KNN + Linear [12], which searches K nearest neighbors from samples
783
+ and then applies Linear regression to impute missing points based on those neighbors. Here, we also implemented
784
+ this approach by inferring a defined number of missing points in a trajectory in different degrees. Simultaneously,
785
+ several RNN variations are used for comparison with the proposed model for prediction purpose, such as stacked LSTM
786
+ Manuscript submitted to ACM
787
+
788
+ 14
789
+ Qin et al.
790
+ Table 3. The results show the L2 loss of imputation and prediction on three different datasets. The percentage of missing points in
791
+ each trajectory is 0.8 for all the tests, and 𝐿 denotes the length of trajectories in different trials.
792
+ L2 Loss for Imputation
793
+ Methods
794
+ Geolife
795
+ Cuebiq - AU
796
+ Cuebiq - US
797
+ L = 20
798
+ L = 50
799
+ L = 100
800
+ L = 20
801
+ L = 50
802
+ L = 100
803
+ L = 20
804
+ L = 50
805
+ L = 100
806
+ KNN + Linear [12]
807
+ 4.7095
808
+ 4.7014
809
+ 8.7260
810
+ 1.6466
811
+ 1.9836
812
+ 1.9567
813
+ 0.0238
814
+ 0.0254
815
+ 0.0323
816
+ GAIN [34]
817
+ 2.1597
818
+ 2.1903
819
+ 2.9478
820
+ 0.8619
821
+ 0.8842
822
+ 1.0788
823
+ 0.0125
824
+ 0.0126
825
+ 0.0137
826
+ GRUI [20]
827
+ 0.3884
828
+ 0.2584
829
+ 0.2443
830
+ 0.3150
831
+ 0.2062
832
+ 0.2088
833
+ 0.8407
834
+ 0.2871
835
+ 0.2189
836
+ NAOMI [18]
837
+ 0.0498
838
+ 0.1613
839
+ 0.0598
840
+ 0.2007
841
+ 0.0186
842
+ 0.0524
843
+ 0.0122
844
+ 0.0129
845
+ 0.0127
846
+ SingleRes [18]
847
+ 0.4365
848
+ 0.0405
849
+ 0.0171
850
+ 0.0716
851
+ 0.0190
852
+ 0.0622
853
+ 0.0121
854
+ 0.0128
855
+ 0.0126
856
+ INGRAIN (ours)
857
+ 0.0270
858
+ 0.0075
859
+ 0.0062
860
+ 0.0122
861
+ 0.0116
862
+ 0.0117
863
+ 0.0055
864
+ 0.0050
865
+ 0.0046
866
+ L2 Loss for Prediction
867
+ B-LSTM [10]
868
+ 2.1856
869
+ 2.0427
870
+ 2.4948
871
+ 0.8294
872
+ 0.9935
873
+ 1.0853
874
+ 0.0120
875
+ 0.0127
876
+ 0.0126
877
+ RNNSearch [2]
878
+ 2.2282
879
+ 2.0754
880
+ 2.5726
881
+ 0.8809
882
+ 1.0151
883
+ 1.0941
884
+ 0.0962
885
+ 0.0187
886
+ 0.0176
887
+ S-GRU [5]
888
+ 2.2309
889
+ 2.0437
890
+ 2.5305
891
+ 0.8276
892
+ 0.9919
893
+ 1.0895
894
+ 0.0121
895
+ 0.0129
896
+ 0.0126
897
+ S-LSTM [27]
898
+ 2.2081
899
+ 2.0656
900
+ 2.5289
901
+ 0.8257
902
+ 0.9947
903
+ 1.0846
904
+ 0.0120
905
+ 0.0128
906
+ 0.0125
907
+ INGRAIN (ours)
908
+ 0.0525
909
+ 0.0464
910
+ 0.0751
911
+ 1.0496
912
+ 1.0139
913
+ 0.9194
914
+ 0.0073
915
+ 0.0070
916
+ 0.0071
917
+ (S-LSTM) [27], bidirectional LSTM (B-LSTM) [10] and stacked GRU (S-GRU) [5]. Another sequence forecasting method
918
+ is RNNSearch [2], which implements the attention mechanism based on RNN to selectively retrieve information from
919
+ the encoder to the decoder for prediction.
920
+ 5.1.4
921
+ Implementation. The proposed method (INGRAIN) is implemented with Pytorch, and the Adam algorithm is
922
+ used as the optimizer with a learning rate of 0.001 and batch size of 70. In the imputation component, we use two layers
923
+ of either encoders or decoders. The number of heads (self-attention) in each layer is two, and the dimension of learning
924
+ embedding is 256. In the prediction part, 1-layer GRU is adopted with a hidden size of 256. For training in different
925
+ settings, the number of epochs is 60, and we compute the mean of the best test results for each task in five runs.
926
+ For other imputation methods, NAOMI and SingleRes [18] use the same values of some basic parameters as our model:
927
+ learning rate 0.001, batch size 70, and training epochs 60. The other parameters are default in their implementation.
928
+ GRUI [20], and GAIN [34] are faster for training but harder to achieve convergence. Furthermore, we tried a different
929
+ number of iterations for training to obtain optimal results on different datasets, ranging from 50 to 1000. The baselines
930
+ are all RNN based for the prediction methods, and we can directly compare them with our prediction component by
931
+ applying similar parameters for training, such as learning rate, batch size, training epochs, or size of hidden features.
932
+ 5.2
933
+ Performance Analysis
934
+ The evaluations are conducted on Geolife, Cuebiq-AU, and Cuebiq-US, and the sampling rates of points collection vary
935
+ drastically. This section selected the top 20 users of each dataset who were most active within the observed period
936
+ for the learning task evaluation, sensitivity analysis, and ablation study. In addition, to further assess the model’s
937
+ effectiveness, we generate three different groups of users, and each group contains ten persons randomly picked from
938
+ Manuscript submitted to ACM
939
+
940
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
941
+ 15
942
+ (a) Geolife - Imputation
943
+ (b) Cuebiq-AU - Imputation
944
+ (c) Cuebiq-US - Imputation
945
+ (d) Geolife - Prediction
946
+ (e) Cuebiq-AU - Prediction
947
+ (f) Cuebiq-US - Prediction
948
+ Fig. 4. We use the 13 most active users of Geolife and the 20 most active users of Cuebiq-AU and Cuebiq-US for this experiment, and
949
+ the length of a trajectory is 20. (a), (b) and (c) demonstrate the imputation loss of the proposed model and baselines on different
950
+ datasets, with varying percentages of missing points in trajectories. (d), (e) and (f) show the results for prediction loss on three
951
+ datasets, respectively.
952
+ the 30 users in each dataset. The data of groups were tested directly on two learning tasks, and the results are shown in
953
+ Fig. 5.
954
+ 5.2.1
955
+ Imputation Results. We first evaluate imputation performance for different lengths of trajectories with a certain
956
+ degree of missing values. Table 3 displays the experimental results on three different lengths (20, 50 and 100) of
957
+ trajectories across all the datasets. The missing rate of points is 0.8. The parameters 𝜆1 and 𝜆2 are configured to one for
958
+ our model, which means that the model fully considers the feedback from different components for training. 𝜆3 is not
959
+ considered in this test. Overall, the proposed model has the best imputation performance on these datasets regarding
960
+ average L2 loss. It is also noticeable that the INGRAIN can keep contributing to a minor loss of imputation when the
961
+ length of tested trajectories is increased, whereas no such obvious advantage can be found for the baselines. One reason
962
+ for this could be that longer trajectories contain more sample fragments, and the model can effectively utilize this
963
+ increment of data to infer missing values. Another argument is that a good combination of attention-based imputation
964
+ and prediction components can better enable INGRAIN to overcome imputation in longer trajectories. The proposed
965
+ imputation component is built with an attention mechanism that learns embeddings by weighting the relations between
966
+ the points in trajectories. And the other two baselines rely on learning embeddings in sequential dependencies of the
967
+ trajectories, which could be affected more heavily when more random points are missing.
968
+ Manuscript submitted to ACM
969
+
970
+ ++16
971
+ Qin et al.
972
+ (a) Geolife - Imputation
973
+ (b) Cuebiq-AU - Imputation
974
+ (c) Cuebiq-US - Imputation
975
+ (d) Geolife - Prediction
976
+ (e) Cuebiq-AU - Prediction
977
+ (f) Cuebiq-US - Prediction
978
+ Fig. 5. The experiment was run with three groups of 10 users randomly picked from the 30 most active ones in each dataset. The
979
+ length of a trajectory is 20 in the tests. (a), (b) and (c) demonstrate the imputation loss of the proposed model and baselines on
980
+ different datasets, with varying percentages of missing points in trajectories. (d), (e) and (f) show the results for prediction loss on
981
+ three datasets, respectively.
982
+ Next, we assess the impact of different missing rates of points on the task of imputation by the algorithms. Fig.
983
+ 4a and 4b demonstrate the stability of our method in solving imputation on both Geolife and Cuebiq-AU when the
984
+ percentage of missing points varies from 0.2 to 0.8 with a trajectory length of 20. As the missing rate rises, the INGRAIN
985
+ can maintain the loss at a relatively low position while the loss of either NAOMI or SingleRes fluctuates dramatically
986
+ and tends to rise or stay between the missing rate from 0.5 to 0.8. However, the SingleRes performs better on Geolife
987
+ when the rate is smaller than 0.5. As we can see from Fig. 4c, the baselines become steadier on the dataset Cuebiq-US,
988
+ but have (approximately two times) higher loss of imputation than that of our model. In addition, in other tests with
989
+ different groups of random users, Fig. 5 further demonstrates the model’s prominent ability on trajectory imputation
990
+ in terms of accurate estimation and stability. We claim that learning point embeddings based on the mode of a fully
991
+ connected graph (attention mechanism) could better capture the dependencies between missing points and the observed
992
+ trajectories for solving the imputation of daily human mobility in the city regions.
993
+ 5.2.2
994
+ Prediction Results. Forward prediction is conducted along with imputation by the proposed model. The results
995
+ of the proposed model again show its advantages in predicting future values after the imputation of the trajectory is
996
+ processed. Table 3 reveals that the INGRAIN is superior to all the other RNN-based baselines (S-GRU, S-LSTM, B-LSTM,
997
+ and RNNSearch) on both Geolife and Cuebiq-US datasets with missing rates of 0.8. For the dataset Cuebiq-AU, the
998
+ Manuscript submitted to ACM
999
+
1000
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
1001
+ 17
1002
+ INGRAIN tends to improve in longer trajectories (𝐿=100), although it is worse in shorter ones (𝐿=20 or 50) compared
1003
+ with its counterparts. Overall, the results of the baselines deteriorated slightly while the length of trajectories was
1004
+ prolonged, with the same degree of missing rate. Our model shows a more reliable capability to overcome the impact of
1005
+ missing values in longer trajectories for next-location forecasting.
1006
+ Moreover, Fig. 4d, 4e and 4f display the results of prediction with missing rates from 0.2 to 0.8 on three different
1007
+ datasets, respectively. And the length of all the trajectories in this test is 20. The performance of the RNN-based baselines
1008
+ is stable among the three datasets but weaker in regard to the ability to converge at a smaller loss. In contrast, the
1009
+ figure of INGRAIN fluctuates on the Cuebiq-AU but can keep prediction loss at significantly lower values on the other
1010
+ two datasets. Fig. 5e and 5f also show the advantages of the proposed model for prediction tasks with different groups
1011
+ of random users. In general, the previous results indicate that effectively incorporating the imputation component
1012
+ with the prediction unit in INGRAIN would eventually benefit both learning tasks and outperform the counterparts of
1013
+ baselines. We claim that the proposed model conducts the prediction based on the status or effect of imputation on
1014
+ trajectories, which could potentially enhance the performance.
1015
+ 5.2.3
1016
+ Sensitivity Analysis. In this section, we examine the effect of primary hyperparameters on the performance of
1017
+ INGRAIN for both tasks. That gives us more insights into how the proposed method converges in different configurations
1018
+ and what trade-offs can be made between two learning tasks. As this paper mentioned, the model is agile to infer a
1019
+ defined number of missing points in each imputing cycle. This process iterates until the whole imputation work of
1020
+ each trajectory is finished. Thus, we first check how this number potentially acts on the results of two learning tasks
1021
+ with the dataset Geolife. In Fig. 6a, the number of missing points from 1 to 5 per imputing cycle is inspected for the
1022
+ best average L2 loss of imputation and prediction in each test simultaneously. There is an increase in the loss for both
1023
+ criteria when more points are imputed in each cycle. The loss of imputation and prediction is relatively minor when
1024
+ the number is one. Although the prediction loss arrives at its lowest position when the number is two, the imputation
1025
+ loss value soars. Therefore, using fewer missing points in each imputation operation can offer better learning results
1026
+ for both tasks. It is well known that the learning rate is a fundamental factor that affects the convergence of a deep
1027
+ learning model. Fig. 6b illustrates that the performance of two tasks becomes gradually worse when we increase the
1028
+ value of the learning rate from 0.001 (10−1) to 0.15 (10−1). As we can see, learning rates 0.001 (10−1) and 0.01 (10−1)
1029
+ allow the model to produce better results for both imputation and prediction.
1030
+ In the assessment of using a different window length for constructing trajectories, Fig. 6c shows that imputation loss
1031
+ tends to become smaller in the learning with longer trajectories, and prediction loss fluctuates slightly between around
1032
+ 0.02 to 0.07. We see that the performance of both imputation and prediction work is relatively advantageous when the
1033
+ length is 70. Fig. 6d indicates that using two heads of self-attention can simultaneously perform better for both learning
1034
+ tasks. Furthermore, the computational requirement becomes relatively less than applying a bigger number of heads. In
1035
+ addition, the evaluation of embedding and hidden size used in the model demonstrates that a smaller value can already
1036
+ contribute to a good performance of two tasks, such as 128 or 256. As Fig. 6e and Fig. 6f show, more computation with
1037
+ an increased value of such parameters did not provide better results.
1038
+ In the following, we examine the functions of imputation and prediction components by changing the values of 𝜆1
1039
+ and 𝜆2 without considering the constraint of movement velocity (𝜆3 = 0). As we mentioned in Section 4.3, 𝜆1 and 𝜆2 are
1040
+ two hyperparameters that control the feedback of imputation and prediction unit received by the model during training,
1041
+ respectively. In Fig. 6g and 6h, higher values indicate that more strength is considered for the corresponding component
1042
+ during entire training. We see that the loss of imputation reduces slightly in Fig. 6g when bigger 𝜆1 is configured.
1043
+ Manuscript submitted to ACM
1044
+
1045
+ 18
1046
+ Qin et al.
1047
+ (a) # of Points per Imp-cycle
1048
+ (b) Change of Learning Rate
1049
+ (c) Window Length
1050
+ (d) Head Number
1051
+ (e) Embedding Size
1052
+ (f) Hidden Size
1053
+ (g) Evaluation of 𝜆1
1054
+ (h) Evaluation of 𝜆2
1055
+ (i) Evaluation of 𝜆3
1056
+ Fig. 6. We evaluate the main hyperparameters of the proposed model for both imputation and prediction on Geolife. (a) shows the
1057
+ results for applying different numbers of missing points in each imputing cycle, and (b) illustrates the results with the change in
1058
+ learning rate. (c) and (d) show the evaluation of the model for window length and head number, respectively. The figures related
1059
+ to embedding and hidden size are given in (e) and (f). In addition, (g), (h) and (i) are the results of investigation for 𝜆1, 𝜆2 and 𝜆3,
1060
+ respectively.
1061
+ Meanwhile, the prediction loss simultaneously undergoes a reversed change (rise). However, the combination 𝜆1 = 1
1062
+ and 𝜆2 = 1 could offer a better trade-off for the performance of both tasks. Similarly, in a different run, the loss of
1063
+ prediction decreases drastically while the value of 𝜆2 is raised from 0.2 to 1 along with a fixed 𝜆1 in Fig. 6h, and both
1064
+ tasks are beneficial when 𝜆2 is round 0.3. In addition, Fig. 6i presents the results of varied 𝜆3 when 𝜆1 = 1 and 𝜆2 = 1. It
1065
+ is apparent that the performance of both task benefit at most when 𝜆3 = 0.8.
1066
+ In Fig. 7, we compare the performance of the proposed model and the baselines with different distributions of missing
1067
+ values generation, such as Uniform and Poisson distribution. Fig. 7a, 7b and 7c demonstrate the imputation loss of the
1068
+ proposed model and baselines on different datasets, respectively. Fig. 7d, 7e and 7f are the results for the prediction
1069
+ Manuscript submitted to ACM
1070
+
1071
+ O-Loss-lmp
1072
+ Loss-Pred
1073
+ 0.038
1074
+ 0.3
1075
+ 0.036
1076
+ 0.25
1077
+ Loss
1078
+ LOSS
1079
+ 0.034
1080
+ 0.2
1081
+ Imputation
1082
+ 0.032
1083
+ 0.15
1084
+ 0.03
1085
+ 0.1
1086
+ 0.028
1087
+ 0.05
1088
+ 0.026
1089
+ 0
1090
+ 2
1091
+ cCi
1092
+ 4
1093
+ 5
1094
+ Number of PointsO-Loss-Imp
1095
+ Loss-Pred
1096
+ 0.8
1097
+ 0.6
1098
+ 1.5
1099
+ Imputation Loss
1100
+ LOsS
1101
+ 0.4
1102
+ 0.2
1103
+ 0.5
1104
+ 0.001
1105
+ 0.005
1106
+ 0.01
1107
+ 0.05
1108
+ 0.1
1109
+ Learning Rate (10-1)O- Loss-Imp
1110
+ Loss-Pred
1111
+ 0.04
1112
+ 0.08
1113
+ 0.03
1114
+ 0.06
1115
+ Loss
1116
+ Loss
1117
+ Imputation
1118
+ Prediction
1119
+ 0.02
1120
+ 0.04
1121
+ 0.01
1122
+ 0.02
1123
+ 0
1124
+ 20
1125
+ 35
1126
+ 50
1127
+ 70
1128
+ 100
1129
+ Window LengthO- Loss-lmp
1130
+ Loss-Pred
1131
+ 0.03
1132
+ 0.07
1133
+ 0.027
1134
+ 0.06
1135
+ Loss
1136
+ LOss
1137
+ Imputation L
1138
+ 0.024
1139
+ 0.05
1140
+ iction
1141
+ 0.021
1142
+ 0.04
1143
+ redi
1144
+ P
1145
+ 0.018
1146
+ 0.03
1147
+ 0.015
1148
+ 0.02
1149
+ 2
1150
+ 4
1151
+ 8
1152
+ 16
1153
+ 32
1154
+ Number of HeadsO-Loss-Imp
1155
+ Loss-Pred
1156
+ 0.05
1157
+ 1.5
1158
+ 0.04
1159
+ 1.2
1160
+ Loss
1161
+ LOSS
1162
+ Imputationl
1163
+ 0.03
1164
+ 0.9
1165
+ 0.02
1166
+ 0.6
1167
+ 0.01
1168
+ 0.3
1169
+ 0
1170
+ 128
1171
+ 256
1172
+ 512
1173
+ 768
1174
+ 1024
1175
+ Embedding SizeO-Loss-lmp
1176
+ Loss-Pred
1177
+ 0.05
1178
+ 0.8
1179
+ 0.04
1180
+ 0.6
1181
+ Imputation Loss
1182
+ Prediction Loss
1183
+ 0.03
1184
+ 0.4
1185
+ 0.02
1186
+ 0.2
1187
+ 0.01
1188
+ 0
1189
+ 128
1190
+ 256
1191
+ 512
1192
+ 768
1193
+ 1024
1194
+ Hidden SizeO-Loss-Imp
1195
+ Loss-Pred
1196
+ 0.036
1197
+ 0.15
1198
+ 0.034
1199
+ 0.13
1200
+ Loss
1201
+ Loss
1202
+ Imputation L
1203
+ 0.032
1204
+ 0.11
1205
+ 0.03
1206
+ 0.09
1207
+ 0.028
1208
+ 0.07
1209
+ 0.026
1210
+ 0.05
1211
+ 0.2
1212
+ 0.4
1213
+ 0.6
1214
+ 0.8
1215
+ 入1 (入2= 1)O- Loss-lmp
1216
+ Loss-Pred
1217
+ 0.032
1218
+ 1.2
1219
+ 0.03
1220
+ 1
1221
+ Loss
1222
+ LOss
1223
+ 0.028
1224
+ 0.8
1225
+ Imputation I
1226
+ Prediction
1227
+ 0.026
1228
+ 0.6
1229
+ 0.024
1230
+ 0.4
1231
+ 0.022
1232
+ 0.2
1233
+ 0.02
1234
+ 0.2
1235
+ 0.4
1236
+ 0.6
1237
+ 0.8
1238
+ 入2 (入1= 1)O- Loss-Imp
1239
+ Loss-Pred
1240
+ 0.01
1241
+ 0.1
1242
+ 0.0098
1243
+ 0.08
1244
+ Loss
1245
+ Loss
1246
+ Imputation l
1247
+ Prediction
1248
+ 0.0096
1249
+ 0.06
1250
+ 0.0094
1251
+ 0.04
1252
+ 0.0092
1253
+ 0.02
1254
+ 0.2
1255
+ 0.4
1256
+ 0.6
1257
+ 0.8
1258
+ 1
1259
+ 入3 (入1=入2= 1)Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
1260
+ 19
1261
+ (a) Geolife - Imputation
1262
+ (b) Cuebiq-AU - Imputation
1263
+ (c) Cuebiq-US - Imputation
1264
+ (d) Geolife - Prediction
1265
+ (e) Cuebiq-AU - Prediction
1266
+ (f) Cuebiq-US - Prediction
1267
+ Fig. 7. This experiment was run with a group of 10 users randomly picked from the 30 most active ones in each dataset, and the
1268
+ trajectory length is 20. (a), (b) and (c) demonstrate the imputation loss of the proposed model and baselines on three datasets,
1269
+ with different distributions of missing values generation. (d), (e) and (f) show the results for the prediction task on three datasets,
1270
+ respectively.
1271
+ task on three datasets, respectively. As we can see, when using various distributions for the experiment, the proposed
1272
+ approach exhibits significant advantages on the imputation task. Meanwhile, our model can still keep a competitive
1273
+ performance on the prediction task compared with the other algorithms.
1274
+ 5.2.4
1275
+ Ablation Study. We conduct an ablation study of 𝜆1, 𝜆2, and 𝜆3 to check the model’s performance when feedback
1276
+ of the imputation component, prediction component, or speed constraint is totally discarded during optimization. The
1277
+ proposed model will fully consider the feedback of imputation in the optimization process when 𝜆1 = 1 and 𝜆2 = 1
1278
+ indicates that the optimizer will receive the feedback of the prediction component without any abandon. In contrast,
1279
+ zero value means that the feedback from one component is totally left out during training. It is found that when the
1280
+ feedback from one task is totally discarded during the training of the whole model, the outputs of that task will be
1281
+ meaningless and random floats because no specific optimization arises based on the ground truth. Thus, we omit those
1282
+ relevant results on the Table 4. We temporarily neglect the movement speed constraint by setting 𝜆3 to zero in the
1283
+ beginning. Furthermore, the table illustrates that the setting of 𝜆1 = 1 and 𝜆2 = 0 could achieve better imputation
1284
+ results in some cases, accompanied by the sacrifice of optimization for the prediction. However, considering the full
1285
+ feedback of both components (𝜆1 = 1, 𝜆2 = 1) could also provide competitive prediction performance in most cases
1286
+ (the length of trajectory in 20 or 50). This experiment also indicates that switching one of two main components could
1287
+ give the model the flexibility to concentrate better on optimizing a single task. In addition, adding movement speed
1288
+ Manuscript submitted to ACM
1289
+
1290
+ GRA
1291
+ NAO
1292
+ onolekGRA
1293
+ AO
1294
+ SngleRIGRA
1295
+ NAO
1296
+ onoerNGRA
1297
+ -GFGRA
1298
+ S-GRIGRA
1299
+ -GF20
1300
+ Qin et al.
1301
+ Table 4. The model will not consider the feedback from the imputation unit during training when 𝜆1=0. Otherwise, 𝜆1=1. 𝜆2 and 𝜆3
1302
+ are responsible for controlling the feedback from the prediction unit and the weight of speed constraint, respectively. Loss-I and
1303
+ Loss-P represent the L2 loss of imputation and prediction, respectively. Further, the portion of missing points is 0.8 for all the tests,
1304
+ and L denotes the length of trajectories in different trials. Basically, the learning of a task is infeasible if its designated optimization is
1305
+ totally ignored. However, another task has the chance of getting a slight improvement than considering more optimization units in
1306
+ the same iterations of training.
1307
+ Weights
1308
+ Tasks
1309
+ Geolife
1310
+ Cuebiq - AU
1311
+ Cuebiq - US
1312
+ 𝜆1
1313
+ 𝜆2
1314
+ 𝜆3
1315
+ L = 20
1316
+ L = 50
1317
+ L = 20
1318
+ L = 50
1319
+ L = 20
1320
+ L = 50
1321
+ 1
1322
+ 1
1323
+ 0
1324
+ Loss-I
1325
+ 0.0270
1326
+ 0.0075
1327
+ 0.0122
1328
+ 0.0117
1329
+ 0.0055
1330
+ 0.0050
1331
+ Loss-P
1332
+ 0.0525
1333
+ 0.0464
1334
+ 1.0497
1335
+ 1.0140
1336
+ 0.0073
1337
+ 0.0070
1338
+ 1
1339
+ 0
1340
+ 0
1341
+ Loss-I
1342
+ 0.0275
1343
+ 0.0098
1344
+ 0.0113
1345
+ 0.0109
1346
+ 0.0054
1347
+ 0.0055
1348
+ Loss-P
1349
+
1350
+
1351
+
1352
+
1353
+
1354
+
1355
+ 0
1356
+ 1
1357
+ 0
1358
+ Loss-I
1359
+
1360
+
1361
+
1362
+
1363
+
1364
+
1365
+ Loss-P
1366
+ 0.0959
1367
+ 0.0393
1368
+ 0.8611
1369
+ 1.1230
1370
+ 0.0114
1371
+ 0.0082
1372
+ 1
1373
+ 1
1374
+ 1
1375
+ Loss-I
1376
+ 0.0107
1377
+ 0.0062
1378
+ 0.0120
1379
+ 0.0110
1380
+ 0.0055
1381
+ 0.0048
1382
+ Loss-P
1383
+ 0.0648
1384
+ 0.0499
1385
+ 0.9350
1386
+ 1.2609
1387
+ 0.0070
1388
+ 0.0076
1389
+ Table 5. The RNN-based unit and the Supplement layer are two modules that support the imputation and prediction learning
1390
+ process. The table shows the impact of these two modules on the model’s performance. ’Add operation’ or ’Replace operation’ is used
1391
+ individually in the Supplement layer with or without the RNN unit. The tests were conducted on Geolife with a trajectory length of
1392
+ 20.
1393
+ Components
1394
+ Geolife
1395
+ RNN Unit
1396
+ Add Operation
1397
+ Replace Operation
1398
+ Loss-I
1399
+ Loss-P
1400
+ -
1401
+ -
1402
+ -
1403
+ 0.0105
1404
+ 0.0143
1405
+
1406
+ -
1407
+ -
1408
+ 0.0097
1409
+ 0.0480
1410
+ -
1411
+ -
1412
+
1413
+ 0.0159
1414
+ 0.0695
1415
+
1416
+
1417
+ -
1418
+ 0.0094
1419
+ 0.0732
1420
+
1421
+ -
1422
+
1423
+ 0.0090
1424
+ 0.0886
1425
+ constraint (𝜆3 = 1) could lead to a slight improvement of imputation on Geolife, which has a more stable sampling rate
1426
+ of points collection than the other two datasets.
1427
+ As mentioned before, the RNN-based unit and the Supplement layer are two modules that support the imputation and
1428
+ prediction learning process. An evaluation is given of their effects on the overall performance of the proposed model in
1429
+ Table 5. ’Add operation’ or ’Replace operation’ is used individually in the Supplement layer to incorporate missing
1430
+ values’ embedding into the trajectory representation. Five tests were conducted for each combination on Geolife with a
1431
+ trajectory length of 20, and the mean values were reported. We can see that combining a supplement operation and
1432
+ an RNN unit tends to contribute to a minor loss of imputation. In contrast, the prediction can not benefit too much
1433
+ from the joint use of two components. However, we can find that integration of RNN unit for learning can improve
1434
+ imputation performance to some extent.
1435
+ Manuscript submitted to ACM
1436
+
1437
+ Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction
1438
+ 21
1439
+ 6
1440
+ CONCLUSION
1441
+ Usually, human mobility data are incomplete in practice, leading to bias or difficulties in learning tasks, such as imputation
1442
+ and prediction. We propose a new approach incorporating non-autoregressive and autoregressive components to help
1443
+ trajectory imputation and prediction. The model effectively learns the dependence between observations and missing
1444
+ values on multiple levels with the advantage of self-attention. Meanwhile, one RNN-based unit is applied to extract
1445
+ potential features recurrently from the newly learned sequences. Intensive experiments are conducted on three datasets:
1446
+ Geolife, Cuebiq-AU, and Cuebiq-US. The results show that the proposed model can achieve advanced performance
1447
+ in both learning tasks compared to the baselines. Additionally, the analysis of primary hyperparameters reveals how
1448
+ trade-offs could be made between different tasks with proper settings. Moreover, the flexible configuration of switching
1449
+ the acceptance of additional feedback enables us to pay more attention to individual units to attain better results for a
1450
+ specific task. In the future, we plan to conduct more experiments on more diverse types of mobility datasets (e.g., POIs
1451
+ and grid-based datasets) and analyze the potential factors that crucially influence the learning of different imputation
1452
+ algorithms.
1453
+ REFERENCES
1454
+ [1] Alexandre Alahi, Kratarth Goel, Vignesh Ramanathan, Alexandre Robicquet, Li Fei-Fei, and Silvio Savarese. 2016. Social lstm: Human trajectory
1455
+ prediction in crowded spaces. In IEEE conference on computer vision and pattern recognition. 961–971.
1456
+ [2] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint
1457
+ arXiv:1409.0473 (2014).
1458
+ [3] Wei Cao, Dong Wang, Jian Li, Hao Zhou, Lei Li, and Yitan Li. 2018. Brits: Bidirectional recurrent imputation for time series. In Advances in Neural
1459
+ Information Processing Systems. 6775–6785.
1460
+ [4] Cynthia Chen, Jingtao Ma, Yusak Susilo, Yu Liu, and Menglin Wang. 2016. The promises of big data and small data for travel behavior (aka human
1461
+ mobility) analysis. Transportation research part C: emerging technologies 68 (2016), 285–299.
1462
+ [5] Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence
1463
+ modeling. arXiv preprint arXiv:1412.3555 (2014).
1464
+ [6] William Fedus, Ian Goodfellow, and Andrew M Dai. 2018. MaskGAN: Better text generation via filling in the_. arXiv preprint arXiv:1801.07736
1465
+ (2018).
1466
+ [7] Jie Feng, Yong Li, Chao Zhang, Funing Sun, Fanchao Meng, Ang Guo, and Depeng Jin. 2018. Deepmove: Predicting human mobility with attentional
1467
+ recurrent networks. In 2018 world wide web conference. 1459–1468.
1468
+ [8] Győző Gidófalvi and Fang Dong. 2012. When and where next: individual mobility prediction. In SIGSPATIAL. 57–64.
1469
+ [9] Francesco Giuliari, Irtiza Hasan, Marco Cristani, and Fabio Galasso. 2020. Transformer Networks for Trajectory Forecasting. arXiv preprint
1470
+ arXiv:2003.08111 (2020).
1471
+ [10] Alex Graves, Santiago Fernández, and Jürgen Schmidhuber. 2005. Bidirectional LSTM networks for improved phoneme classification and recognition.
1472
+ In International conference on artificial neural networks. Springer, 799–804.
1473
+ [11] Agrim Gupta, Justin Johnson, Li Fei-Fei, Silvio Savarese, and Alexandre Alahi. 2018. Social gan: Socially acceptable trajectories with generative
1474
+ adversarial networks. In IEEE Conference on Computer Vision and Pattern Recognition. 2255–2264.
1475
+ [12] Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The elements of statistical learning: data mining, inference, and prediction. Springer
1476
+ Science & Business Media.
1477
+ [13] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780.
1478
+ [14] Cuebiq Inc. 2021. Data for Good - Cuebiq. https://www.cuebiq.com/about/data-for-good/
1479
+ [15] Tarun Khanna. 1990. Foundations of neural networks. Addison-Wesley Longman Publishing Co., Inc.
1480
+ [16] Yang Li, Yangyan Li, Dimitrios Gunopulos, and Leonidas Guibas. 2016. Knowledge-based trajectory completion from sparse GPS samples. In
1481
+ Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. 1–10.
1482
+ [17] Biwei Liang, Tengjiao Wang, Shun Li, Wei Chen, Hongyan Li, and Kai Lei. 2016. Online learning for accurate real-time map matching. In PAKDD.
1483
+ Springer, 67–78.
1484
+ [18] Yukai Liu, Rose Yu, Stephan Zheng, Eric Zhan, and Yisong Yue. 2019. NAOMI: Non-autoregressive multiresolution sequence imputation. In Advances
1485
+ in Neural Information Processing Systems. 11238–11248.
1486
+ [19] Yin Lou, Chengyang Zhang, Yu Zheng, Xing Xie, Wei Wang, and Yan Huang. 2009. Map-matching for low-sampling-rate GPS trajectories. In
1487
+ Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems. 352–361.
1488
+ Manuscript submitted to ACM
1489
+
1490
+ 22
1491
+ Qin et al.
1492
+ [20] Yonghong Luo, Xiangrui Cai, Ying Zhang, Jun Xu, et al. 2018. Multivariate time series imputation with generative adversarial networks. In Advances
1493
+ in Neural Information Processing Systems. 1596–1607.
1494
+ [21] Yonghong Luo, Ying Zhang, Xiangrui Cai, and Xiaojie Yuan. 2019. E2GAN: End-to-End Generative Adversarial Network for Multivariate Time
1495
+ Series Imputation. In 28th International Joint Conference on Artificial Intelligence. AAAI Press, 3094–3100.
1496
+ [22] Anna Monreale, Fabio Pinelli, Roberto Trasarti, and Fosca Giannotti. 2009. Wherenext: a location predictor on trajectory pattern mining. In
1497
+ Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. 637–646.
1498
+ [23] Elham Naghizade, Jeffrey Chan, Yongli Ren, and Martin Tomko. 2018. Contextual Location Imputation for Confined WiFi Trajectories. In Pacific-Asia
1499
+ Conference on Knowledge Discovery and Data Mining. Springer, 444–457.
1500
+ [24] Elham Naghizade, Lars Kulik, Egemen Tanin, and James Bailey. 2020. Privacy-and context-aware release of trajectory data. ACM Transactions on
1501
+ Spatial Algorithms and Systems (TSAS) 6, 1 (2020), 1–25.
1502
+ [25] Mengshi Qi, Jie Qin, Yu Wu, and Yi Yang. 2020. Imitative Non-Autoregressive Modeling for Trajectory Forecasting and Imputation. In IEEE/CVF.
1503
+ 12736–12745.
1504
+ [26] Amin Sadri, Flora D Salim, Yongli Ren, Wei Shao, John C Krumm, and Cecilia Mascolo. 2018. What will you do for the rest of the day? an approach
1505
+ to continuous trajectory prediction. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 1–26.
1506
+ [27] Martin Sundermeyer, Ralf Schlüter, and Hermann Ney. 2012. LSTM neural networks for language modeling. In Thirteenth annual conference of the
1507
+ international speech communication association.
1508
+ [28] Douglas Do Couto Teixeira, Aline Carneiro Viana, Jussara M Almeida, and Mrio S Alvim. 2021. The impact of stationarity, regularity, and context
1509
+ on the predictability of individual human mobility. ACM Transactions on Spatial Algorithms and Systems 7, 4 (2021), 1–24.
1510
+ [29] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is
1511
+ all you need. In Advances in neural information processing systems. 5998–6008.
1512
+ [30] Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv
1513
+ preprint arXiv:1710.10903 (2017).
1514
+ [31] Hao Wang, Huawei Shen, Wentao Ouyang, and Xueqi Cheng. 2018. Exploiting POI-Specific Geographical Influence for Point-of-Interest Recommen-
1515
+ dation.. In IJCAI. 3877–3883.
1516
+ [32] Xianjing Wang, Flora D Salim, Yongli Ren, and Piotr Koniusz. 2020. Relation Embedding for Personalised Translation-Based POI Recommendation.
1517
+ In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 53–64.
1518
+ [33] Yifang Yin, Rajiv Ratn Shah, Guanfeng Wang, and Roger Zimmermann. 2018. Feature-based map matching for low-sampling-rate GPS trajectories.
1519
+ ACM Transactions on Spatial Algorithms and Systems (TSAS) 4, 2 (2018), 1–24.
1520
+ [34] Jinsung Yoon, James Jordon, and Mihaela Schaar. 2018. Gain: Missing data imputation using generative adversarial nets. In International Conference
1521
+ on Machine Learning. PMLR, 5689–5698.
1522
+ [35] Jinsung Yoon, William R Zame, and Mihaela van der Schaar. 2018. Estimating missing data in temporal data streams using multi-directional recurrent
1523
+ neural networks. IEEE Transactions on Biomedical Engineering 66, 5 (2018), 1477–1490.
1524
+ [36] Kai Zheng, Yu Zheng, Xing Xie, and Xiaofang Zhou. 2012. Reducing uncertainty of low-sampling-rate trajectories. In 2012 IEEE 28th international
1525
+ conference on data engineering. IEEE, 1144–1155.
1526
+ [37] Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In 18th
1527
+ International conference on World Wide Web. 791–800.
1528
+ [38] Fan Zhou, Hantao Wu, Goce Trajcevski, Ashfaq Khokhar, and Kunpeng Zhang. 2020. Semi-supervised trajectory understanding with poi attention
1529
+ for end-to-end trip recommendation. ACM Transactions on Spatial Algorithms and Systems (TSAS) 6, 2 (2020), 1–25.
1530
+ Manuscript submitted to ACM
1531
+
KdE3T4oBgHgl3EQfXwqt/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LdE3T4oBgHgl3EQfvwu2/content/tmp_files/2301.04697v1.pdf.txt ADDED
@@ -0,0 +1,2052 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Prepared for submission to JHEP
2
+ Regular Black Holes and Horizonless Ultra-Compact
3
+ Objects in Lorentz-Violating Gravity
4
+ Jacopo Mazza and Stefano Liberati
5
+ SISSA, International School for Advanced Studies,
6
+ via Bonomea 265, 34136 Trieste, Italy
7
+ IFPU, Institute for Fundamental Physics of the Universe,
8
+ via Beirut 2, 34014 Trieste, Italy
9
+ INFN, Sezione di Trieste,
10
+ via Valerio 2, 34127 Trieste, Italy
11
+ E-mail: jmazza@sissa.it, liberati@sissa.it
12
+ Abstract: There is growing evidence that Hoˇrava gravity may be a viable quantum
13
+ theory of gravity. It is thus legitimate to expect that gravitational collapse in the full,
14
+ non-projectable version of the theory should result in geometries that are free of space-
15
+ time singularities. Previous analyses have shown that such geometries must belong to one
16
+ of the following classes: simply connected regular black holes with inner horizons; non-
17
+ connected black holes “hiding” a wormhole mouth (black bounces); simply connected or
18
+ non-connected horizonless compact objects.
19
+ Here, we consider a singular black hole in
20
+ the low-energy limit of non-projectable Hoˇrava gravity, i.e. khronometric theory, and de-
21
+ scribe examples of its possible “regularisations”, covering all of the viable classes. To our
22
+ knowledge, these examples constitute the first instances of black holes with inner universal
23
+ horizons, of black bounces and of stars with a de Sitter core in the context of Lorentz-
24
+ violating theories of gravity.
25
+ Keywords: Regular black hole, wormhole, Hoˇrava gravity, khronometric theory
26
+ arXiv:2301.04697v1 [gr-qc] 11 Jan 2023
27
+
28
+ Contents
29
+ 1
30
+ Introduction
31
+ 1
32
+ 2
33
+ A (singular) black hole solution
34
+ 4
35
+ 3
36
+ Regularisations of the singularity
37
+ 7
38
+ 3.1
39
+ Connected regularisation
40
+ 7
41
+ 3.2
42
+ Non-connected regularisation
43
+ 8
44
+ 4
45
+ Horizons
46
+ 10
47
+ 4.1
48
+ Connected regularisation
49
+ 10
50
+ 4.2
51
+ Non-connected regularisation
52
+ 12
53
+ 5
54
+ Causal structure
55
+ 13
56
+ 5.1
57
+ Connected regularisation
58
+ 13
59
+ 5.2
60
+ Non-connected regularisation
61
+ 14
62
+ 6
63
+ Deviations from vacuum, or The effective SET
64
+ 15
65
+ 6.1
66
+ Hayward’s effective sources
67
+ 17
68
+ 6.2
69
+ Black bounce’s effective sources
70
+ 20
71
+ 7
72
+ Conclusions
73
+ 22
74
+ A Optical scalars
75
+ 24
76
+ B 2D expansions
77
+ 25
78
+ 1
79
+ Introduction
80
+ General relativity (GR) is notoriously non-renormalisable at the perturbative level [1, 2].
81
+ Though this is not the only reason why a quantum theory of gravity remains elusive, it
82
+ still represents an important technical impediment. To circumvent the issue, Hoˇrava [3]
83
+ proposed a field theory of gravity in which power-counting renormalisability is manifest
84
+ thanks to the addition, to the action of gravity, of terms that are higher-order in spatial
85
+ derivatives. This choice improves the ultra-violet (UV) behaviour of propagators while
86
+ ensuring that no ghosts are introduced; but it comes at the cost of breaking diffeomorphism
87
+ invariance and, locally, Lorentz invariance. In the following years, several improvements
88
+ to the original idea have been proposed, including a “healthy” extension known as non-
89
+ projectable Hoˇrava gravity [4–6], in which diffeomorphism invariance is restored via the
90
+ introduction of an irrotational, unit-norm, timelike vector field — the so-called æther.
91
+ – 1 –
92
+
93
+ There are now strong indications — [7–12] and references therein — that this version of
94
+ the theory is renormalisable beyond power-counting: if this property is confirmed, non-
95
+ projectable Hoˇrava gravity will represent an example of a consistent quantum theory of
96
+ gravity in four spacetime dimensions.
97
+ At low energies, one can neglect all but the lowest-dimensional operators. The theory
98
+ thereby obtained has an action of the form
99
+ S = −
100
+ 1
101
+ 16πG
102
+
103
+ d4x √−g
104
+
105
+ R + λ(∇aua)2 + β∇aub∇bua + αaaaa
106
+
107
+ ,
108
+ (1.1)
109
+ where aa = ub∇bua is the æther’s acceleration and α, β, λ are three dimensionless cou-
110
+ plings. This action coincides with that of Einstein–æther theory [13, 14], when the æther is
111
+ constrained to be hypersurface-orthogonal [15, 16] — this justifies the choice of terminology
112
+ for ua. However, since hypersurface orthogonality restricts the number of physical degrees
113
+ of freedom, the theory specified by eq. (1.1) goes by its own name: khronometric theory.
114
+ The parameters α, β, λ are tightly constrained by observations [17]: |β| ≲ 10−15
115
+ and either |α| ≲ 10−7 with λ unconstrained or |α| ≲ 0.25 × 10−4 with λ ≈ α/(1 − 2α).
116
+ Moreover, λ > 0 to avoid ghosts. Since α and β seem both very small, one may at times
117
+ consider a “minimal theory” in which they are set to zero exactly, while λ remains free.
118
+ Due to hypersurface orthogonality, the æther can be expressed as
119
+ ua = ∇aT
120
+ N
121
+ with
122
+ N =
123
+
124
+ ∇bT∇bT ,
125
+ (1.2)
126
+ and T a scalar field called khronon.
127
+ The khronon’s level sets are three-dimensional,
128
+ everywhere-spacelike hypersurfaces that provide a time foliation with a preferred status.
129
+ The existence of a preferred foliation — or equivalently of a preferred reference frame, in
130
+ this case the one provided by the æther — is a direct consequence of the Lorentz-violating
131
+ nature of Hoˇrava gravity, and it opens the door to the existence of modified dispersion
132
+ relations. Indeed, khronometric theory allows for superluminal propagation of signals and
133
+ even contains an instantaneous mode that travels at infinite speed.
134
+ In such a context, it would be natural to expect that the notion of black hole had
135
+ no meaning. Surprisingly, the theory does admit black hole solutions [18–27]. The moral
136
+ equivalent of the event horizon is the so-called universal horizon (UH): a compact constant-
137
+ khronon surface that traps modes of any speed — even the instantaneous one. When the
138
+ spacetime is stationary, meaning that there exists a Killing vector field χa that is timelike
139
+ at infinity, the UH is characterised by the conditions [28]
140
+ ua χa
141
+ ����
142
+ UH
143
+ = 0
144
+ and
145
+ aa χa
146
+ ����
147
+ UH
148
+ ̸= 0 .
149
+ (1.3)
150
+ Known black hole solutions harbour a spacetime singularity at their centre, exactly as
151
+ their general-relativistic counterparts do. One can conjecture, however, that these singular-
152
+ ities might be “cured” by properly taking into account all the higher-dimensional operators
153
+ that define the full theory. In this scenario, the end state of gravitational collapse would
154
+ be more appropriately described by a non-singular (or regular) configuration, consisting of
155
+ – 2 –
156
+
157
+ a non-singular metric and a non-singular æther flow. Solutions of this kind are however
158
+ still lacking, and their derivation is probably going to be challenging.
159
+ On the other hand, a lot is known about singularities (and how to avoid their formation)
160
+ in the context of purely metric theories of gravity: it is thus natural to wonder whether
161
+ this know-how could guide the search for non-singular configurations in Hoˇrava gravity. In
162
+ particular, if one assumes that pseudo-Riemannian geometry provides a good description of
163
+ the spacetimes resulting from quantum gravitational regularisation at late times, Penrose’s
164
+ singularity theorem [29] can be used to compile a classification of all the non-singular
165
+ geometries that gravitational collapse could result in [30, 31].
166
+ This approach is purely
167
+ geometric and therefore largely theory-agnostic.
168
+ Surprisingly, the resulting list of viable spacetimes is remarkably short. In essence,
169
+ once a trapping horizon is formed somewhere in the spacetime, there are only two options
170
+ for avoiding an inner singularity: either the geometry is endowed with an “inner” trapping
171
+ horizon; or the singularity is replaced by a wormhole mouth, which is “hidden” behind the
172
+ trapping horizon. Note that, while in the former case the spacetime is simply connected,
173
+ the latter case is characterised by the existence of a minimum radius that renders the
174
+ spacetime topologically different. For this reason, we will refer to these alternatives as
175
+ connected and non-connected regularisation, respectively. The only way to avoid either of
176
+ them is to prevent the formation of the trapping horizon altogether. In principle, one can
177
+ still consider both connected and non-connected configurations without horizons: while a
178
+ connected horizonless object is a star (though possibly of an exotic kind), a non-connected
179
+ one is a traversable wormhole.
180
+ The analysis of [30] was performed under the assumption of Lorentz invariance but
181
+ it can be extended to the framework of Lorentz-breaking theories [32].
182
+ Despite some
183
+ technical subtleties, the main result carries over: non-singular configurations are either
184
+ simply connected or non-connected; and they might display a universal trapping horizon
185
+ (the moral equivalent of the trapping horizon) or not — but if they are connected and with
186
+ horizon, a second universal inner horizon must exist.
187
+ Such classification is best suited for describing dynamical situations, namely the col-
188
+ lapse of some energy density leading to the formation of a compact object. In particular,
189
+ [30, 32] assume global hyperbolicity and therefore do not admit, for instance, stationary
190
+ simply connected regular black holes. Yet, if the evolution of the geometry is characterised
191
+ by a timescale that is much longer than any other relevant timescale, a stationary non-
192
+ singular spacetime might provide an approximate description that is sufficiently accurate
193
+ for phenomenological purposes.
194
+ This line of reasoning has given rise to a thriving industry, fuelled by recent obser-
195
+ vational achievements, aimed at constructing models of non-singular geometries. Models
196
+ of simply connected regular black holes have a longer history, dating back to the work of
197
+ Bardeen in 1968 [33], and are therefore more abundant in the literature — see e.g. [34–36]
198
+ end references therein. Several (though fewer) instances of wormholes whose mouths are
199
+ hidden behind an horizon exist as well [37–42].
200
+ Only very recently [43], it was realised that the same models can describe horizonless
201
+ objects too: typically, horizons only exist when the parameters that specify the model fall
202
+ – 3 –
203
+
204
+ within a given range; but when they do not, the corresponding geometries are still perfectly
205
+ viable. In particular, the connected regular black holes are counterparts of compact stars
206
+ that usually have a de Sitter core and are therefore instances of gravastar-like objects
207
+ [44, 45].
208
+ These models, which are usually constructed ad hoc and without referring to physically
209
+ well-motivated theories, implicitly assume that all the relevant information concerning the
210
+ geometry is encoded in the metric. In theories like Hoˇrava gravity, in contrast, the preferred
211
+ foliation has a crucial, genuinely physical role that is not entirely played by the metric.
212
+ The goal of this paper, therefore, is to construct explicit examples of non-singular
213
+ geometries, connected and non-connected, in the context of low-energy Hoˇrava gravity.
214
+ Such examples will consist of a metric and an æther flow, both of which will be free of
215
+ singularities. They will not constitute solutions of khronometric theory in vacuum, nor
216
+ with any simple form matter; yet, they will display all the key features that are expected
217
+ for exact non-singular solutions of both khronometric theory and the full Hoˇrava gravity.
218
+ In particular, these configurations will exhibit pairs of inner/outer UHs, hidden wormholes
219
+ and (gravastar-like) compact stars with de Sitter core — all features that, to our knowledge,
220
+ have never been described before in this context.
221
+ Non-singular black holes have been searched for, but not found, in (2 + 1) projectable
222
+ Hoˇrava gravity in [46]. Spherical stars in Einstein-æther and khronometric theory have
223
+ been investigated in [47], while examples of wormholes are given in [48, 49]; however, the
224
+ æther flow considered in these references is often assumed to be parallel to the Killing
225
+ vector: our analysis is therefore substantially different.
226
+ The paper is structured as follows. Section 2 is an introduction to the singular solution
227
+ we take as a starting point for constructing our non-singular geometries. Such geometries
228
+ are introduced in section 3 and characterised in the following sections. In particular, sec-
229
+ tion 4 investigates horizons (Killing and universal); section 5 describes the causal structure;
230
+ section 6 quantifies the deviations away from the vacuum of the khronometric theory. Fi-
231
+ nally, section 7 reports our conclusions. We also include appendices A and B, which provide
232
+ further details on the non-singular configurations.
233
+ 2
234
+ A (singular) black hole solution
235
+ The equations of motion obtained by varying eq. (1.1) with respect to δgab and δT can be
236
+ written as:
237
+ Gab = 0 ,
238
+ (2.1)
239
+ ∇a
240
+ �Aa
241
+ N
242
+
243
+ = 0 .
244
+ (2.2)
245
+ Eq. (2.1) is the equivalent of the Einstein’s equation, indeed one can write Gab = Gab −T æ
246
+ ab,
247
+ with Gab the Einstein’s tensor and T æ
248
+ ab the stress-energy tensor (SET) of the æther. Eq. (2.2)
249
+ is the equation of motion of the khronon: the vector Aa is built out of ua and its derivatives
250
+ and is orthogonal to the æther uaAa = 0. To include matter, one can add the matter action
251
+ – 4 –
252
+
253
+ Smat to eq. (1.1). This yields source terms that appear on the right-hand side of eqs. (2.1)
254
+ and (2.2).
255
+ In this paper, we will investigate spherically symmetric and static spacetimes, and
256
+ assume that the same symmetries extend to the æther field. This implies the existence of a
257
+ Killing vector χa, timelike at spatial infinity, along which both the metric and æther are Lie-
258
+ dragged. Adopting in-going Eddington–Finkelstein coordinates, we can generically write
259
+ the metric and the æther as
260
+ ds2 = F(r) dv2 − 2 dv dr − R2(r) dΩ2 ,
261
+ (2.3)
262
+ ua∂a = A(r)∂v + y(r)∂r ,
263
+ (2.4)
264
+ with
265
+ y = −1 − A2F
266
+ 2A
267
+ (2.5)
268
+ so that uaua = +1. With these notations, the projection of the æther along the Killing
269
+ vector is
270
+ ua χa = 1 + A2F
271
+ 2A
272
+ .
273
+ (2.6)
274
+ An exact solution is known for α = 0 [26].1 In our coordinates, it is given by2
275
+ F = 1 − r0
276
+ r − β r4
277
+ æ
278
+ r4 ,
279
+ R(r) = r ,
280
+ (2.7)
281
+ A(r) =
282
+ 1
283
+ F(r)
284
+
285
+ −r2
286
+ æ
287
+ r2 ±
288
+
289
+ F(r) + r4æ
290
+ r4
291
+
292
+ ,
293
+ (2.8)
294
+ where r0 is twice the Arnowitt–Deser–Misner (ADM) mass of the spacetime (measured in
295
+ appropirate units) and ræ is another, a priori independent, integration constant. Depend-
296
+ ing on the relative magnitude of r0 and ræ, the quantity
297
+ F(r) + r4
298
+ æ
299
+ r4
300
+ (2.9)
301
+ may become negative, thus rendering A(r) ill-defined. One can further check that this
302
+ quantity coincides with (ua χa)2, hence its zeroes correspond to UHs.
303
+ Only when the
304
+ parameters satisfy
305
+ ræ = r0
306
+ 4
307
+ � 27
308
+ 1 − β
309
+ �1/4
310
+ (2.10)
311
+ 1Another exact solution can be found for β + λ = 0.
312
+ 2Reference [26] only reports the plus sign, although the equations of motion actually allow for both.
313
+ However, the square root, with its sign, coincides with ua χa, which must become negative upon crossing
314
+ the universal horizon [50]. Hence, the choice of [26] is in fact ill-behaved at the universal horizon; all their
315
+ conclusions still stand, despite this clarification.
316
+ – 5 –
317
+
318
+ does the solution describe a black hole with one universal horizon located at
319
+ rUH = 3
320
+ 4r0 .
321
+ (2.11)
322
+ When this fine-tuned choice is assumed — as we will do for the rest of this paper —, one
323
+ can write
324
+ ua ��a = 1
325
+ r2
326
+
327
+ r − 3
328
+ 4r0
329
+ � �
330
+ r2 + r0
331
+ 2 r + 3r2
332
+ 0
333
+ 16 .
334
+ (2.12)
335
+ The signs have been chosen so that this quantity tends to one at spatial infinity but changes
336
+ sign upon crossing the universal horizon — as it must [50]. This corresponds to choosing
337
+ the plus sign in eq. (2.8) outside of the UH and the minus inside.
338
+ The UH has an associated surface gravity that seems to provide some thermal prop-
339
+ erties, in a way similar to the surface gravity of horizons in GR. It is defined as
340
+ κUH = −1
341
+ 2aa χa ,
342
+ (2.13)
343
+ which on the singular solution evaluates to
344
+ κsing.
345
+ UH =
346
+ 2
347
+
348
+ 2
349
+ 3
350
+
351
+ 3r0
352
+ √1 − β .
353
+ (2.14)
354
+ The metric also exhibits a Killing horizon (KH), associated with the zero of F(r).
355
+ Clearly, when β = 0 the metric reduced to that of Schwarzschild and the KH is located at
356
+ rKH = r0. More generally, one can write F(r) = 0 as
357
+ r3(r − r0) −
358
+ � 27
359
+ 256
360
+ β
361
+ 1 − β r4
362
+ 0
363
+
364
+ = 0 ;
365
+ (2.15)
366
+ hence, one can deduce that the KH moves towards larger values of r as β increases (we
367
+ always assume β < 1), i.e. rKH ≥ r0. Thus, the KH always encloses the UH. The equation
368
+ does not have any more roots. Note that A(r) is well-behaved at the KH, as can be verified
369
+ by expanding close to r = rKH:
370
+ A(r) =
371
+ 1
372
+ F ′ (rKH) (r − rKH)
373
+ �r2
374
+ KHF ′ (rKH)
375
+ 2r2æ
376
+ (r − rKH)
377
+
378
+ + O
379
+
380
+ (r − rKH)2�
381
+ (2.16)
382
+ = r2
383
+ KH
384
+ 2r2æ
385
+ + O
386
+
387
+ (r − rKH)2�
388
+ .
389
+ (2.17)
390
+ This metric is singular at r = 0, as one can check e.g. by evaluating the Kretschmann
391
+ scalar:
392
+ RabcdRabcd = 12r2
393
+ 0r6 + 10βr0r4
394
+ ær3 + 39β2r8
395
+ æ
396
+ r12
397
+ .
398
+ (2.18)
399
+ The components of the æther also seem ill-defined at that point, although this statement
400
+ relies on the choice of coordinates. To check that the æther flow is in fact singular at
401
+ r = 0 one should characterise it in terms of scalar quantities. Since the æther constitutes
402
+ a timelike non-geodesic congruence, a rather natural choice is to describe it in terms of its
403
+ optical scalars: 3 the expansion, the square of the symmetric shear and the square of the
404
+ antisymmetric twist. Further details can be found in appendix A.
405
+ 3The term “optical scalars” is usually reserved for null geodesic congruences.
406
+ We are abusing this
407
+ terminology, hopefully without confusion.
408
+ – 6 –
409
+
410
+ 3
411
+ Regularisations of the singularity
412
+ As mentioned in section 1, there are only two qualitatively different ways of avoiding,
413
+ i.e. “regularising”, the central singularity: we have referred to these alternatives as con-
414
+ nected and non-connected regularisation. The connected regularisation corresponds to a
415
+ physical scenario in which gravity effectively becomes weaker and “turns off” at r = 0.
416
+ Metrics that exhibit such behaviour can be built by modifying a singular solution (typi-
417
+ cally Schwarzschild) in a simple way. The non-connected regularisation instead does not
418
+ correspond to a weakening of gravity. On the contrary, gravity becomes so strong that it
419
+ induces a change in the topology of spacetime. As a consequence, a finite region containing
420
+ r = 0 gets excised from the spacetime: this alternative is therefore characterised by the
421
+ existence of a minimal length scale corresponding, roughly speaking, to the radius of the
422
+ smallest sphere centred at r = 0. Despite the different topology, metrics portraying this
423
+ scenario can be built by modifying a singular solution too.
424
+ To be explicit and as clear as possible, in the following we will explore two specific
425
+ examples, one connected and one not. Most of the qualitative considerations, however,
426
+ hold true in general.
427
+ Appendix B reports further details, using a characterisation in terms of two-dimensional
428
+ congreunces in order to make contact with the language of [32].
429
+ 3.1
430
+ Connected regularisation
431
+ A simple way to construct a simply connected non-singular metric, starting from a singular
432
+ one, is to upgrade the parameter r0 to a function of the radius r0(r). Remarkably, when this
433
+ replacement is performed on eq. (2.7) and eq. (2.8), the resulting æther becomes regular
434
+ too. Explicitly, the metric components of eq. (2.3) and the æther one of eq. (2.4) become
435
+ F(r) = 1 − r0(r)
436
+ r
437
+ − β r4
438
+ æ(r)
439
+ r4
440
+ ,
441
+ R(r) = r ,
442
+ (3.1)
443
+ A(r) =
444
+ 1
445
+ F(r)
446
+
447
+ −r2
448
+ æ(r)
449
+ r2
450
+ + 1
451
+ r2
452
+
453
+ r − 3
454
+ 4r0(r)
455
+ � �
456
+ r2 + r0(r)
457
+ 2
458
+ r + 3r2
459
+ 0(r)
460
+ 16
461
+
462
+ ,
463
+ (3.2)
464
+ ræ(r) = r0(r)
465
+ 4
466
+ � 27
467
+ 1 − β
468
+ �1/4
469
+ .
470
+ The function r0(r) is arbitrary, except for a minimum set of requirements [34–36, 51]: it
471
+ should be “well-behaved”, in the sense that it should not introduce new singularities (this is
472
+ guaranteed if e.g. r0(r) > 0); it should not spoil asymptotic flatness, i.e. limr→∞ r0(r) = 2M
473
+ with M the ADM mass; and, crucially, it must be r0(r) = O
474
+
475
+ r3�
476
+ close to r = 0. This last
477
+ requirement makes the components of the metric manifestly regular at the origin and
478
+ prevents divergences in any scalar polynomial built out of the Riemann tensor and the
479
+ metric. Expanding close to r = 0, one has
480
+ F(r) = 1 − cr2 + O
481
+
482
+ r3�
483
+ ,
484
+ (3.3)
485
+ showing that the geometry of the inner core is asymptotically de Sitter (anti-de Sitter) if
486
+ c > 0 (c < 0) or Minkowski if c = 0.
487
+ – 7 –
488
+
489
+ The components of the æther are now manifestly regular, too. In particular,
490
+ A(r) = 1 + c
491
+ 2r2 + O
492
+
493
+ r3�
494
+ and
495
+ y(r) = O
496
+
497
+ r3�
498
+ ,
499
+ (3.4)
500
+ i.e. in the limit r → 0 the æther coincides with the Killing vector, up to corrections of
501
+ order O
502
+
503
+ r2�
504
+ . This is precisely the trivial æther flow that one would expect in a maximally
505
+ symmetric space. The first derivatives of F(r) and A(r) are similarly well-behaved close
506
+ to r = 0, which ensures that all the optical scalars characterising the æther congruence are
507
+ regular too — details can be found in appendix A.
508
+ Note, incidentally, that the geometry described by eq. (3.2) is certainly non-singular,
509
+ in general, only for r ≥ 0. If one allows the coordinate r to become negative, one might still
510
+ encounter spacetime singularities [52, 53] — in the form of divergences in the curvatures
511
+ or in the sense of geodesic incompleteness. In order to interpret eq. (3.2) as a non-singular
512
+ black hole, therefore, one must limit the domain of r to [0, +∞). Clearly, this is coherent
513
+ with the interpretation of r as a radius, and with the fact that r = 0 is, at any given v, a
514
+ point (i.e. a degenerate, zero-radius sphere).
515
+ Many explicit forms of r0(r) have been proposed and the corresponding metrics have
516
+ been extensively studied: all of them are characterised by at least one additional parameter,
517
+ usually carrying the dimensions of a length, upon which r0(r) depends continuously. Often,
518
+ r0(r) reduces to a constant for some particular values of the parameters (typically zero).
519
+ In this limit, the regularisation is undone.
520
+ In what follows, we will present calculations for a particular choice of r0(r) introduced
521
+ by Hayward [54],
522
+ r0(r) = 2M
523
+ r3
524
+ r3 + 2Mℓ2
525
+ (3.5)
526
+ (we have called ℓ the additional parameter; note that r0 = 2M for ℓ = 0), but the fea-
527
+ tures we will describe are generic: other well-studied examples, e.g. the Bardeen [33] or
528
+ Dymnikova [55] metrics, yield very similar results.
529
+ 3.2
530
+ Non-connected regularisation
531
+ Many instances of wormhole exist in the literature (see e.g. [56]). In the past, the attention
532
+ has mostly focused on “traversable” wormholes, i.e. wormholes with a timelike mouth
533
+ that can be traversed in both directions.
534
+ However, there has been recently a growing
535
+ interest towards “hidden” wormholes, i.e. wormholes whose mouths are shielded by trapping
536
+ horizons. In the presence of a single outer horizon such mouth is not traversable, being
537
+ spacelike, and indeed the metric can be more precisely characterised as a “black-bounce”
538
+ being endowed with a minimum radius.
539
+ The example that we investigate here is a very simple black-bounce geometry proposed
540
+ by Simpson and Visser [37]. The original metric is a slight modification of the Schwarzschild
541
+ one, formally obtained by replacing any instance of r with
542
+
543
+ r2 + ℓ2. When this trick is
544
+ applied to the singular solution eqs. (2.7) and (2.8), the metric components of eq. (2.3) and
545
+ – 8 –
546
+
547
+ the æther one of eq. (2.4) take the form
548
+ F(r) = 1 −
549
+ r0
550
+
551
+ r2 + ℓ2 − β
552
+ r4
553
+ æ
554
+ (r2 + ℓ2)2 ,
555
+ R(r) =
556
+
557
+ r2 + ℓ2 ,
558
+ (3.6)
559
+ A(r) =
560
+ 1
561
+ F(r)
562
+
563
+ �−
564
+ r2
565
+ æ
566
+ r2 + ℓ2 +
567
+ 1
568
+ r2 + ℓ2
569
+ ��
570
+ r2 + ℓ2 − 3
571
+ 4r0
572
+ � �
573
+ (r2 + ℓ2) + r0
574
+
575
+ r2 + ℓ2
576
+ 2
577
+ + 3r2
578
+ 0
579
+ 16
580
+
581
+ � .
582
+ (3.7)
583
+ We are still assuming ræ = 271/4(1−β)−1/4(r0/4), without r-dependence, as in the singular
584
+ solution.
585
+ In this example, regularity is manifest, since all components of both the metric and
586
+ the æther approach a finite non-zero limit as r → 0. (Details on the æther’s optical scalars
587
+ can be found in appendix A.) Notably, R(r) = ℓ + O
588
+
589
+ r2�
590
+ , meaning that, at any given time
591
+ v, r = 0 is not a point; rather, it is a sphere of surface area 4πℓ2. It is therefore clear how
592
+ this example could be generalised: any other R(r) that attains a finite value in r = 0 works
593
+ as fine — provided one writes F (R(r)) and A (R(r)).
594
+ Since the metric and the æther are invariant under r → −r, one can extend the
595
+ domain of the coordinate r to (−∞, +∞). Hence, the geometry should be interpreted as
596
+ representing a wormhole whose asymptotically flat ends are at r → +∞ and r → −∞ and
597
+ whose mouth, a sphere of surface area 4πℓ2, is located at r = 0. We will often call “our
598
+ universe” the (r > 0)-patch and “other universe” the (r < 0)-patch.
599
+ It is useful to express eqs. (3.6) and (3.7) in terms of a new coordinate ϱ =
600
+
601
+ r2 + ℓ2.
602
+ We have
603
+ ds2 = F(ϱ) dv2 − 2δ(ϱ) dv dϱ − R2(ϱ) dΩ2 ,
604
+ (3.8)
605
+ ua∂a = A(ϱ)∂v + y(ϱ)
606
+ δ(ϱ)∂ϱ ,
607
+ (3.9)
608
+ where
609
+ δ(ϱ) = dr
610
+ dϱ =
611
+ ϱ
612
+
613
+ ϱ2 − ℓ2
614
+ (3.10)
615
+ and
616
+ F(ϱ) = 1 − r0
617
+ ϱ − β r4
618
+ æ
619
+ ϱ4 ,
620
+ R(ϱ) = ϱ ,
621
+ (3.11)
622
+ A(ϱ) =
623
+ 1
624
+ F(ϱ)
625
+
626
+ −r2
627
+ æ
628
+ ϱ2 + 1
629
+ ϱ2
630
+
631
+ ϱ − 3
632
+ 4r0
633
+ � �
634
+ ϱ2 + r0
635
+ 2 ϱ + 3
636
+ 16r2
637
+ 0
638
+
639
+ .
640
+ (3.12)
641
+ The new coordinate ϱ has a simple physical interpretation: it is the aerial radius, i.e. sur-
642
+ faces of constant ϱ (and v) are spheres with area 4πϱ2. In this coordinate, the components
643
+ of the metric and of the æther look identical to those of the singular case, except for δ;
644
+ however, ϱ can never reach zero, since min(ϱ) = ϱ (r = 0) = ℓ > 0, and the geometry thus
645
+ remains free of spacetime singularities. There is now a coordinate singularity at the throat
646
+ ϱ = ℓ, hence this coordinate system can only describe one of the two universes at a time.
647
+ – 9 –
648
+
649
+ 4
650
+ Horizons
651
+ The regularised metrics introduced above, similarly to the singular solution, exhibit KHs
652
+ located at the solutions of F(r) = 0.
653
+ These horizons are still surfaces of infinite red-
654
+ shift/blueshift for matter that is minimally coupled to the metric and uncoupled to the
655
+ æther. However, because of the breaking of local Lorentz invariance, they are not causal
656
+ horizons since the presence of superluminal signals affects the causal structure [57]. As
657
+ mentioned above, in khronometric gravity the role of causal horizons is instead played by
658
+ UHs (see e.g. the relative discussion in [57] and references therein).
659
+ Nonetheless, it is easy to see that in the configurations we are exploring these structures
660
+ are tightly related. Indeed, for both kinds of regularisation (as for the singular case) one
661
+ can write
662
+ (ua χa)2 = F(r) + f(r)
663
+ with
664
+ f(r) > 0 ,
665
+ (4.1)
666
+ so, since both ua χa and F are positive at infinity, ua χa can reach zero only in a region in
667
+ which F(r) is negative. This means that UHs must necessarily lie in a “trapped region”
668
+ — as one would call it in GR. Hence, the presence of a UH implies the existence of a
669
+ KH that encloses it. Moreover, F(r) must be positive at r = 0 in the connected case and
670
+ at r = −∞ in the disconnected case. This entails that KHs have to come in pairs and
671
+ therefore, generically, UHs have too.
672
+ Thus, non-singular black hole geometries typically exhibit a nested structures of Killing
673
+ and universal horizons. In the following subsections we will describe this structure in detail
674
+ for the specific examples that we are exploring, but the above considerations can be proven
675
+ to be general by exploiting the notion of the degree of a map. Moreover, in appendix B
676
+ we present an alternative, local characterisation of UHs in terms of the expansions of two
677
+ congruences, in a language that makes contact with [32].
678
+ 4.1
679
+ Connected regularisation
680
+ We start by setting β = 0, for simplicity.
681
+ KHs are given by r = r0(r) and UHs by
682
+ 4r/3 = r0(r).
683
+ Whether these equations admit solutions or not is a model-dependent
684
+ question. When r0(r) is that of eq. (3.5), for example, the answer depends on the value of
685
+ the parameter ℓ.
686
+ As an illustration, in figure 1 we plot Hayward’s r0(r) for three values of ℓ; the plot
687
+ also reports two straight lines, with slope equal to one (dashed line) and 4/3 (solid line)
688
+ respectively: the intersections of r0(r) with these lines determine the horizons. When ℓ
689
+ is small, we can count two intersections with the dashed line and two with the solid one.
690
+ Hence, this configuration presents two KHs and two UHs; coming from infinity, they are
691
+ met in the following order: outer KH, outer UH, inner UH, inner KH. As ℓ is increased,
692
+ the curve relative to r0(r) moves towards the bottom-left corner of the picture: inner and
693
+ outer horizons thus approach each other. They keep approaching until the two UHs merge
694
+ into a single, degenerate UH; this happens at a threshold value of ℓ = M/2 above which
695
+ no UH exist. Similarly, the KHs keep approaching until they merge into a degenerate KH
696
+ and then disappear: this second threshold corresponds to a higher value of ℓ = 4M/(3
697
+
698
+ 3).
699
+ – 10 –
700
+
701
+ 0.0
702
+ 0.5
703
+ 1.0
704
+ 1.5
705
+ 2.0
706
+ 2.5
707
+ 3.0
708
+ 0.0
709
+ 0.5
710
+ 1.0
711
+ 1.5
712
+ 2.0
713
+ Figure 1: Plot of Hayward’s choice of r0(r) for three values of the parameter ℓ. Intersec-
714
+ tions with the straight (dashed) black line correspond to UHs (KHs) in the minimal theory
715
+ α = β = 0.
716
+ Therefore, we can distinguish three qualitatively different regimes: a non-singular black
717
+ hole regime, characterised by an inner/outer UH pair (as well as an inner/outer KH pair);
718
+ an intermediate regime in which there are two KHs but no UHs; and a star-like regime
719
+ with no horizons. Although technically a black hole is present only in the first regime, an
720
+ object in the intermediate regime would still appear “almost black”, given that low energy
721
+ modes would linger for an extremely long time at the KH before being able to escape to
722
+ infinity.
723
+ Reinstating the parameter β does not greatly distort this picture, since its only effect
724
+ is that of displacing the KHs. Eq. (2.15) remains valid upon replacing r0 with r0(r), so
725
+ increasing the value of β shifts the outer KH outwards. The inner KH, instead, moves
726
+ inwards. That is, increasing β has the effect of pushing KHs further apart; this is the
727
+ opposite effect one has by increasing the regularisation parameter ℓ, which instead pushes
728
+ KHs closer together. The location of UHs is unaffected by β.
729
+ In the black hole regime, the universal horizons each have a surface gravity. Plugging
730
+ eq. (3.3) in the definition eq. (2.13), we get
731
+ κUH =
732
+ 4 − 3r′
733
+ 0(r)
734
+ 3
735
+
736
+ 6r0
737
+ √1 − β
738
+ ����
739
+ UH
740
+ ,
741
+ (4.2)
742
+ which should be evaluated at each of the UHs. Note that when r′
743
+ 0 = 0 we recover the result
744
+ for the singular solution eq. (2.14).
745
+ In the black hole and in the intermediate regime, the horizon radii provide an intuitive
746
+ way of telling the “size” of the compact object. It would be useful to extend this notion
747
+ to the star-like regime by defining an appropriate effective radius. A particularly simple
748
+ choice is to pick the unique r⋆ for which F ′(r⋆) = 0. This is the radius of maximum (metric)
749
+ – 11 –
750
+
751
+ redshift and thus quantifies the compactness of the star. Moreover, in the limit in which
752
+ ℓ approaches (from above) the threshold value for the KH’s formation, r⋆ approaches the
753
+ (degenerate) horizon radius.
754
+ Explicitly, we have
755
+ F ′ = −
756
+ �r0
757
+ r
758
+ �′ �
759
+ 1 + 4 27
760
+ 256
761
+ β
762
+ 1 − β
763
+ �r0
764
+ r
765
+ ��
766
+ ,
767
+ (4.3)
768
+ hence F ′ = 0 reduces to
769
+ r0(r) − rr′
770
+ 0(r) = 0 ,
771
+ (4.4)
772
+ independently on β. For Hayward’s choice, we find
773
+ r⋆ =
774
+
775
+ 4Mℓ2�1/3 .
776
+ (4.5)
777
+ 4.2
778
+ Non-connected regularisation
779
+ As in the previous case, the existence and location of horizons is, strictly speaking, a
780
+ model-dependent question. In the simple example that we are considering, the answer is
781
+ determined by the only free parameter ℓ. The discussion becomes particularly simple if
782
+ one resorts to the coordinate ϱ.
783
+ KHs are solutions of
784
+ ϱ3(ϱ − r0) −
785
+ �27
786
+ 56
787
+ β
788
+ 1 − β r4
789
+ 0
790
+
791
+ = 0 ,
792
+ (4.6)
793
+ which is formally the same as eq. (2.15). Call ϱKH the (unique) solution; in the r coordi-
794
+ nates, this corresponds to
795
+ r2
796
+ KH = ϱ2
797
+ KH − ℓ2 .
798
+ (4.7)
799
+ Hence, for ℓ < ϱKH the spacetime has one KH per each universe, located at r = ±rKH
800
+ with rKH =
801
+
802
+ ϱ2
803
+ KH − ℓ2; when instead ℓ > ϱKH the spacetime has no KHs; the limiting
804
+ case ℓ = ϱKH corresponds to the two horizons coinciding with the wormhole mouth, which
805
+ in this case is null. Similarly to the simply connected configuration, one can easily check
806
+ that increasing ℓ makes the KH shrink, while increasing β makes it larger.
807
+ For what concerns the UHs, instead, they are located at
808
+ ϱUH = 3
809
+ 4r0 .
810
+ (4.8)
811
+ That is, when ℓ < 3r0/4 there is one UH per each universe, located at r = ±rUH with
812
+ rUH =
813
+
814
+ ϱ2
815
+ UH − ℓ2; when instead ℓ > 3r0/4 there are no UHs. As before, the equality
816
+ corresponds to a degenerate case for which the mouth of the wormhole coincides with the
817
+ UH. Analogously to the previous case, increasing ℓ makes the UH shrink while β has no
818
+ effect at all; note that rUH < rKH.
819
+ – 12 –
820
+
821
+ The surface gravity of the UH has a particularly simple form:
822
+ κUH = κsing.
823
+ UH
824
+
825
+ 1 − ℓ2
826
+ ϱ2
827
+ UH
828
+ ,
829
+ (4.9)
830
+ where κsing.
831
+ UH is the surface gravity for the singular solution written in eq. (2.14). Thus, for
832
+ ℓ = ϱUH = 3r0/4 the UH is “degenerate” and the black hole is extremal, in the sense that
833
+ its UH’s surface gravity vanishes.
834
+ 5
835
+ Causal structure
836
+ In a Lorentz-violating theory of gravity like khronometric theory, the causal structure is
837
+ not determined by null rays. Rather, the theory exhibits a preferred foliation, specified
838
+ by constant-khronon surfaces: it is the embedding of the leafs of the foliation into the
839
+ four-dimensional spacetime, therefore, that defines the causal structure.
840
+ Due to spherical symmetry, the khronon does not depend on the angles in either of the
841
+ spacetimes we constructed. Hence, we can visualise the causal structure by simply plotting,
842
+ in an appropriate (time–radius) plane, the surfaces of constant khronon. The most natural
843
+ definition of time is given in terms of the null coordinate v as
844
+ dt∗ = dv − dr ;
845
+ (5.1)
846
+ this is a (Killing-)“horizon-penetrating” time. The more familiar time t, given by dt =
847
+ dv − dr/F, would not be appropriate, since the components of the metric and of the
848
+ æther are singular at the KHs when expressed in terms of it.
849
+ In addition, we plot the flow of the æther, written in its covariant form. Since the
850
+ æther is by definition orthogonal to constant-khronon hypersurfaces, the information pro-
851
+ vided by these plots and by those representing constant-khronon surfaces is not independent
852
+ but complementary. We report both, hoping this will benefit the reader.
853
+ 5.1
854
+ Connected regularisation
855
+ The causal structure corresponding to the Hayward-like regularisation is summarised in
856
+ figure 2. Each row corresponds to a different value of ℓ and therefore to a different regime:
857
+ the top row represents a non-singular black hole, the second row the intermediate regime
858
+ and the third row the star-like regime.
859
+ The left-hand panel displays the flow of ua, written in the (t∗, r) coordinates: the
860
+ horizontal component of the arrows is ur = y while the vertical one is ut∗ = ua χa. The
861
+ right-hand panel, instead, presents constant-khronon lines.
862
+ At large r, the æther is almost vertical, i.e. aligned with the Killing vector, and
863
+ constant-khronon lines are also lines of constant t∗.
864
+ As one approaches to smaller r,
865
+ however, the æther tilts inwards. Nothing remarkable happens at the outer KH, whose
866
+ location is depicted for reference only. At the outer UH, instead, the æther is horizontal
867
+ while the constant-khronon lines exponentially recede away from the UH — i.e. they peal
868
+ off, in an amount that is controlled by the surface gravity, exactly as null rays would do at
869
+ – 13 –
870
+
871
+ 0
872
+ 1
873
+ 2
874
+ 3
875
+ 4
876
+ 5
877
+ 6
878
+ 7
879
+ 0.0
880
+ 0.5
881
+ 1.0
882
+ 1.5
883
+ 2.0
884
+ 2.5
885
+ 0.0
886
+ 0.1
887
+ 0.2
888
+ 0.3
889
+ 0.4
890
+ 0.00
891
+ 0.05
892
+ 0.10
893
+ 0.15
894
+ (a) ℓ = 0.25M.
895
+ 0
896
+ 1
897
+ 2
898
+ 3
899
+ 4
900
+ 5
901
+ 6
902
+ 7
903
+ -3
904
+ -2
905
+ -1
906
+ 0
907
+ 1
908
+ 2
909
+ 3
910
+ 0.0
911
+ 0.1
912
+ 0.2
913
+ 0.3
914
+ 0.4
915
+ -1.5
916
+ -1.0
917
+ -0.5
918
+ 0.0
919
+ 0.5
920
+ 1.0
921
+ 1.5
922
+ (b) ℓ = 0.25M.
923
+ 0
924
+ 1
925
+ 2
926
+ 3
927
+ 4
928
+ 5
929
+ 6
930
+ 7
931
+ 0.0
932
+ 0.5
933
+ 1.0
934
+ 1.5
935
+ 2.0
936
+ 2.5
937
+ (c) ℓ = 0.6M.
938
+ 0
939
+ 1
940
+ 2
941
+ 3
942
+ 4
943
+ 5
944
+ 6
945
+ 7
946
+ -3
947
+ -2
948
+ -1
949
+ 0
950
+ 1
951
+ 2
952
+ 3
953
+ (d) ℓ = 0.6M.
954
+ 0
955
+ 1
956
+ 2
957
+ 3
958
+ 4
959
+ 5
960
+ 6
961
+ 7
962
+ 0.0
963
+ 0.5
964
+ 1.0
965
+ 1.5
966
+ 2.0
967
+ 2.5
968
+ (e) ℓ = 1.3M.
969
+ 0
970
+ 1
971
+ 2
972
+ 3
973
+ 4
974
+ 5
975
+ 6
976
+ 7
977
+ -3
978
+ -2
979
+ -1
980
+ 0
981
+ 1
982
+ 2
983
+ 3
984
+ (f) ℓ = 1.3M.
985
+ Figure 2: Hayward non-singular black hole: æther flow (left) and constant-khronon sur-
986
+ faces (right). Black solid lines mark universal horizons, dashed lines Killing horizons; the
987
+ dotted line signals the star’s effective radius. The first row depicts the case with outer and
988
+ inner KHs and UHs (with inlets magnifying the inner KH-UH region), the middle row the
989
+ case with only two KHs, the bottom row the case of an ultracompact, horizonless, object.
990
+ a trapping horizon. Note that behind the outer UH the æther points downwards, meaning
991
+ that it flows in the opposite direction with respect to the Killing vector.
992
+ Moving to yet smaller r, the æther becomes horizontal again at the inner UH. The
993
+ constant-khronon lines instead pile up exponentially at the UH — as null rays would do
994
+ at an inner trapping horizon. Inside the inner UH the æther points again in the same
995
+ direction as the Killing vector. Note that nothing remarkable takes place at the inner KH.
996
+ Close to r = 0, the flow becomes identical to that of large r, i.e. to that of flat space.
997
+ 5.2
998
+ Non-connected regularisation
999
+ The æther flow and constant-khronon lines for the black-bounce-like regularisation are
1000
+ displayed in figure 3. As before, each row corresponds to a different regime: the first to
1001
+ a black bounce with UHs, the second to one with KHs but no UHs and the third to one
1002
+ without horizons.
1003
+ – 14 –
1004
+
1005
+ -4
1006
+ -2
1007
+ 0
1008
+ 2
1009
+ 4
1010
+ 0.0
1011
+ 0.5
1012
+ 1.0
1013
+ 1.5
1014
+ 2.0
1015
+ (a) ℓ = 0.25M.
1016
+ -4
1017
+ -2
1018
+ 0
1019
+ 2
1020
+ 4
1021
+ -3
1022
+ -2
1023
+ -1
1024
+ 0
1025
+ 1
1026
+ 2
1027
+ 3
1028
+ (b) ℓ = 0.25M.
1029
+ -4
1030
+ -2
1031
+ 0
1032
+ 2
1033
+ 4
1034
+ 0.0
1035
+ 0.5
1036
+ 1.0
1037
+ 1.5
1038
+ 2.0
1039
+ (c) ℓ = 1.8M.
1040
+ -4
1041
+ -2
1042
+ 0
1043
+ 2
1044
+ 4
1045
+ -3
1046
+ -2
1047
+ -1
1048
+ 0
1049
+ 1
1050
+ 2
1051
+ 3
1052
+ (d) ℓ = 1.8M.
1053
+ -4
1054
+ -2
1055
+ 0
1056
+ 2
1057
+ 4
1058
+ 0.0
1059
+ 0.5
1060
+ 1.0
1061
+ 1.5
1062
+ 2.0
1063
+ (e) ℓ = 2.5M.
1064
+ -4
1065
+ -2
1066
+ 0
1067
+ 2
1068
+ 4
1069
+ -3
1070
+ -2
1071
+ -1
1072
+ 0
1073
+ 1
1074
+ 2
1075
+ 3
1076
+ (f) ℓ = 2.5M.
1077
+ Figure 3: Black bounce: æther flow (left) and constant-khronon surfaces (right). Black
1078
+ solid lines mark universal horizons, dashed lines Killing horizons; the dotted line signals
1079
+ the mouth. the first row depicts a black bounce with a UH and a KH per side, the second
1080
+ row represents a configuration with just one with KHs per side but no UHs, the third row
1081
+ portraits a naked (without horizons) traversable wormhole
1082
+ The æther, which is aligned with the Killing vector at infinity, tilts inwards as one
1083
+ moves closer to r = 0. At the UH it becomes horizontal, it flows in the opposite direction
1084
+ until it becomes horizontal again at the UH in the other universe and then returns aligned
1085
+ with the Killing vector at r = −∞. The constant-khronon curves pile off the UH in our
1086
+ universe and pile up at the UH in the other universe. Note that the KHs and the throat
1087
+ look like any other location to the æther.
1088
+ 6
1089
+ Deviations from vacuum, or The effective SET
1090
+ As already mentioned in the Introduction, section 1, the non-singular configurations we are
1091
+ describing are supposed to be solutions of the full Hoˇrava action, and in this sense cannot
1092
+ be expected to be vacuum solutions of its low-energy version — khronometric theory.
1093
+ Nevertheless, it is still instructive to study the extent to which our configurations fail
1094
+ to be (vacuum) solutions. Our strategy is inspired by the analysis of non-vacuum solutions,
1095
+ – 15 –
1096
+
1097
+ since any metric and æther flow can be seen as solutions of the equations of motion with an
1098
+ appropriate matter content (in this case, one that couples to the metric and to the æther).
1099
+ For this reason, we will speak of “effective sources” and use terms such as “energy density”
1100
+ and “pressures”. It should be clear, however, that this is merely a choice of terminology
1101
+ and we are not positing the existence of any physical form matter. Indeed, such density
1102
+ and pressures can be seen as components of an effective SET induced by the higher-order
1103
+ terms of the Hoˇrava action. Understanding whether this is actually the case is a crucial
1104
+ but open question, given the daunting task of manipulating such extra terms.
1105
+ Thus, in the following we will characterise the form and distribution of such effective
1106
+ sources, in order to better understand the regular geometries we are proposing.
1107
+ Let us start by noticing that the equation of motion for the khronon eq. (2.2) can be
1108
+ written as
1109
+ 1
1110
+ N J = 0
1111
+ with
1112
+ J = [∇aAa − aaAa] .
1113
+ (6.1)
1114
+ The lapse N can be chosen (almost) arbitrarily, since it depends on how the khronon is
1115
+ parametrised; the scalar quantity J instead only depends on the æther and can be computed
1116
+ unequivocally. Thus, J will be the khronon’s effective source.
1117
+ Similar considerations hold for the Einstein’s equations eq. (2.1). Since the components
1118
+ of Gab clearly depend on the choice of coordinates, one first needs to find a coordinate-
1119
+ independent way of characterising the source. One way to achieve this goal would be to
1120
+ compute its eigenvalues, which are scalars under general coordinate transformations. When
1121
+ the eigenvalues are real, they can be interpreted as energy density and principal pressures of
1122
+ some non-perfect fluid. Unfortunately, while this characterisation works for the Einstein’s
1123
+ tensor, it fails for the SET of the æther, since there are regions in the spacetime where
1124
+ the eigenvalues are complex (i.e. the æther’s SET is of Type IV in the Hawking–Ellis
1125
+ classification [58]).
1126
+ However, since in the framework of Hoˇrava gravity there exists a preferred foliation and
1127
+ therefore a preferred observer, it makes sense to characterise the deviations from vacuum
1128
+ as measured by such observer. Hence, we compute the projection
1129
+ ρ(u) = Gabuaub ,
1130
+ (6.2)
1131
+ which we could interpret as the energy density measured by an observer that is comoving
1132
+ with the æther. We then pick another vector sa that is spacelike, outward-pointing, of unit
1133
+ norm and orthogonal to ua and use it to define a radial pressure as
1134
+ p(s) = Gabsasb .
1135
+ (6.3)
1136
+ We use
1137
+ sa∂a = A∂v + w∂r
1138
+ with
1139
+ w = +1 + A2F
1140
+ 2A
1141
+ .
1142
+ (6.4)
1143
+ Finally, we could define a tangential pressure in an analogous way, or simply as
1144
+ p⊥ = −Gθ
1145
+ θ = −Gφ
1146
+ φ .
1147
+ (6.5)
1148
+ – 16 –
1149
+
1150
+ Since the parameters α, β, λ enter the action as coupling constants, all the scalars
1151
+ that we have just introduced share the same simple structure. Consider ρ(u) as an example:
1152
+ it can be written as
1153
+ ρ(u) = ρ(u)
1154
+ G + αρ(u)
1155
+ α
1156
+ + βρ(u)
1157
+ β
1158
+ + λρ(u)
1159
+ λ
1160
+ .
1161
+ (6.6)
1162
+ Here, ρ(u)
1163
+ G
1164
+ derives from the Einstein’s tensor while each of ρ(u)
1165
+ α , ρ(u)
1166
+ β , ρ(u)
1167
+ λ
1168
+ derives from the
1169
+ operators that appear in the action multiplied respectively by α, β and λ. Clearly, each
1170
+ of them still depends on β (and on ℓ), since the explicit form of the metric and of the
1171
+ æther does; but not on α nor λ. We will use analogous notations for the decompositions
1172
+ of p(s), p⊥ and J, with the only difference that J has no “JG” part. One can check that
1173
+ p(s)
1174
+ α = −p⊥
1175
+ α in all the cases that we consider.
1176
+ A remark is in order, at this point. The singular geometry of eqs. (2.7) and (2.8) is
1177
+ a solution of the equations of motion only for α = 0. Indeed, as will be made explicit in
1178
+ the next two subsections, the effective sources proportional to α generically do not vanish
1179
+ — not even in the limit ℓ → 0, in which the singular geometry is retrieved. Hence, one
1180
+ might worry that allowing α ̸= 0 in the analysis of the non-singular configurations is not
1181
+ consistent.
1182
+ Here, however, we choose to keep α ̸= 0. The reason is that, in the absence of some
1183
+ custodial symmetry that protects it against running, the higher-order operators in the
1184
+ action of Hoˇrava gravity will generically affect the value of α (as well as that of β and λ) at
1185
+ the level of the effective field theory. Hence, we cannot presume it to be zero at this stage.
1186
+ Still, at low energies, the effect of higher-order operators is negligible and the value of
1187
+ α is the one set by (low-energy) observations: α ≲ O
1188
+
1189
+ 10−4�
1190
+ — cf. section 2. One should
1191
+ bear in mind, therefore, that at large distances the effective sources proportional to α are
1192
+ highly suppressed.
1193
+ 6.1
1194
+ Hayward’s effective sources
1195
+ Here, we remain agnostic on the specific choice of r0(r) for as long as possible; however, the
1196
+ explicit results are often cumbersome and not particularly enlightening. For this reason,
1197
+ we specialise to Hayward’s choice and discuss, in particular, the asymptotic behaviour of
1198
+ the effective sources.
1199
+ Khronon’s equation
1200
+ One finds that Jβ = Jλ; clearly, these are zero when ℓ = 0. Jα
1201
+ instead is non-zero even in the limit in which the regularisation parameter vanishes, since
1202
+ the singular solution we started with is an exact (vacuum) solution only for α = 0. The
1203
+ explicit expressions are not particularly enlightening and we hence omit them here. We
1204
+ can however get useful insights by looking at their asymptotic behaviour.
1205
+ At infinity, we find
1206
+ J = αJα + (β + λ)Jβ,λ
1207
+ = α
1208
+
1209
+ −6
1210
+
1211
+ 3
1212
+
1213
+ 1
1214
+ 1 − β
1215
+ M4
1216
+ r5 + O
1217
+
1218
+ r−6��
1219
+ + (β + λ)
1220
+
1221
+ 540
1222
+
1223
+ 3
1224
+
1225
+ 1
1226
+ 1 − β
1227
+ M3ℓ2
1228
+ r6
1229
+ + O
1230
+
1231
+ r−7��
1232
+ . (6.7)
1233
+ – 17 –
1234
+
1235
+ The different scaling between Jα and Jβ,λ is not surprising, since the former does not vanish
1236
+ in the ℓ → 0 limit — as previously argued. In any case, it is easy to see from the above
1237
+ expression that the effective source vanishes rapidly as one moves away from the object.
1238
+ The sources may be large at intermediate radii, but become very small in the opposite
1239
+ limit, small r, and vanish exactly at r = 0. Indeed, expanding around this point, we find
1240
+ J = α
1241
+
1242
+ 27
1243
+
1244
+ 3
1245
+ 4
1246
+
1247
+ 1
1248
+ 1 − β
1249
+ r5
1250
+ ℓ6 + O
1251
+
1252
+ r6�
1253
+
1254
+ + (β + λ)
1255
+
1256
+ 27
1257
+
1258
+ 3
1259
+
1260
+ 1
1261
+ 1 − β
1262
+ r3
1263
+ ℓ4 + O
1264
+
1265
+ r4��
1266
+ .
1267
+ (6.8)
1268
+ Hence, the connected non-singular configuration is almost a solution of khronometric
1269
+ theory at very large and very small distances from the centre.
1270
+ Einstein’s equations
1271
+ Plugging in the Ans¨atze eqs. (3.2) and (3.3), we find a series of
1272
+ additional identities:
1273
+ ρ (u)
1274
+ G = −p(s)
1275
+ G ,
1276
+ p⊥
1277
+ λ = p(s)
1278
+ λ
1279
+ (6.9)
1280
+ ρ(u)
1281
+ G + βρ(u)
1282
+ β
1283
+ = r′
1284
+ 0
1285
+ r2 + βρ(u)
1286
+ λ
1287
+ ,
1288
+ p(s)
1289
+ G + βp(s)
1290
+ β
1291
+ = −r′
1292
+ 0
1293
+ r2 + βp(s)
1294
+ λ ,
1295
+ p⊥
1296
+ G + βp⊥
1297
+ β = −r′′
1298
+ 0
1299
+ 2r + βp⊥
1300
+ λ
1301
+ (6.10)
1302
+ Hence, we can write
1303
+ ρ(u) = r′
1304
+ 0
1305
+ r2 + (β + λ)
1306
+ 27r2
1307
+ 0
1308
+ 128(1 − β)
1309
+ �r′
1310
+ 0
1311
+ r2
1312
+ �2
1313
+ + αρ(u)
1314
+ α ,
1315
+ (6.11)
1316
+ p(s) = −r′
1317
+ 0
1318
+ r2 − (β + λ)
1319
+ 27r2
1320
+ 0
1321
+ 128(1 − β)r5
1322
+
1323
+ 2r(r′
1324
+ 0)2 + r0(rr′′
1325
+ 0 − 2r′
1326
+ 0)
1327
+
1328
+ + αp(s)
1329
+ α ,
1330
+ (6.12)
1331
+ p⊥ = −r′′
1332
+ 0
1333
+ 2r − (β + λ)
1334
+ 27r2
1335
+ 0
1336
+ 128(1 − β)r5
1337
+
1338
+ 2r(r′
1339
+ 0)2 + r0(rr′′
1340
+ 0 − 2r′
1341
+ 0)
1342
+
1343
+ − αp(s)
1344
+ α
1345
+ (6.13)
1346
+ The expressions of ρ(u)
1347
+ α
1348
+ and p(s)
1349
+ α
1350
+ are slightly more involved and we omit them here.
1351
+ Focusing on Hayward’s choice, we can read off the asymptotic behaviours. At large r
1352
+ we have
1353
+ ρ(u) =
1354
+ �12M2ℓ2
1355
+ r6
1356
+ + O
1357
+
1358
+ r−9��
1359
+ + (β + λ)
1360
+ � 243M6ℓ4
1361
+ 2(1 − β)r12 + O
1362
+
1363
+ r−15��
1364
+ + α
1365
+ �M2
1366
+ 2r4 + O
1367
+
1368
+ r−5��
1369
+ ,
1370
+ (6.14)
1371
+ p(s) = −
1372
+ �12M2ℓ2
1373
+ r6
1374
+ + O
1375
+
1376
+ r−9��
1377
+ + (β + λ)
1378
+ � 243M5ℓ2
1379
+ 2(1 − β)r9 + O
1380
+
1381
+ r−12��
1382
+ + α
1383
+ �M2
1384
+ 2r4 + O
1385
+
1386
+ r−5��
1387
+ ,
1388
+ (6.15)
1389
+ p⊥ =
1390
+ �24M2ℓ2
1391
+ r6
1392
+ + O
1393
+
1394
+ r−9��
1395
+ + (β + λ)
1396
+ � 243M5ℓ2
1397
+ 2(1 − β)r9 + O
1398
+
1399
+ r−12��
1400
+ − α
1401
+ �M2
1402
+ 2r4 + O
1403
+
1404
+ r−5��
1405
+ .
1406
+ (6.16)
1407
+ Clearly, these effective sources display “tails” that extend, in principle, up to infinity;
1408
+ the tails however decrease very rapidly, hence for all practical purposes the spacetime
1409
+ surrounding the object can be considered empty. Further note that, as anticipated, these
1410
+ – 18 –
1411
+
1412
+ 0
1413
+ 1
1414
+ 2
1415
+ 3
1416
+ 4
1417
+ 5
1418
+ 6
1419
+ 7
1420
+ -0.5
1421
+ 0.0
1422
+ 0.5
1423
+ 1.0
1424
+ 1.5
1425
+ 2.0
1426
+ 2.5
1427
+ 3.0
1428
+ (a) Energy density and principal pressures de-
1429
+ riving from the Einstein’s tensor.
1430
+ 0
1431
+ 1
1432
+ 2
1433
+ 3
1434
+ 4
1435
+ 5
1436
+ 6
1437
+ 7
1438
+ -0.2
1439
+ -0.1
1440
+ 0.0
1441
+ 0.1
1442
+ (b) Energy density and principal pressures de-
1443
+ rived from the æther’s SEMT. These curves
1444
+ should be multiplied by λ.
1445
+ Figure 4: Components of the energy density and the principal pressures, as measured
1446
+ by an observer comoving with the æther, for the Hayward non-singular configuration in
1447
+ the minimal theory α = β = 0. The position of the horizons in this coordinate strongly
1448
+ depends on ℓ: the vertical black lines mark UH (solid) and KH (dashed) for ℓ = 0.25M; the
1449
+ dotted line corresponds to the star’s effective radius (which coincides with the degenerate
1450
+ KH in the extremal case).
1451
+ sources do not vanish in the limit ℓ → 0 because of the terms ∝ α. This is simply due to
1452
+ the fact that the singular configuration is a solution only for α = 0.
1453
+ At r = 0, the following expansions hold:
1454
+ ρ(u) =
1455
+ � 3
1456
+ ℓ2 + O
1457
+
1458
+ r3��
1459
+ + (β + λ)
1460
+
1461
+ 243r6
1462
+ 128(1 − β)ℓ8 + O
1463
+
1464
+ r7��
1465
+ + α
1466
+ � 3
1467
+ ℓ2 + O(r)
1468
+
1469
+ ,
1470
+ (6.17)
1471
+ p(s) = −
1472
+ � 3
1473
+ ℓ2 + O
1474
+
1475
+ r3��
1476
+ − (β + λ)
1477
+
1478
+ 243r6
1479
+ 64(1 − β)ℓ8 + O
1480
+
1481
+ r7��
1482
+ + α
1483
+ � r2
1484
+ 2ℓ4 + O
1485
+
1486
+ r3��
1487
+ ,
1488
+ (6.18)
1489
+ p⊥ = −
1490
+ � 3
1491
+ ℓ2 + O
1492
+
1493
+ r3��
1494
+ − (β + λ)
1495
+
1496
+ 243r6
1497
+ 64(1 − β)ℓ8 + O
1498
+
1499
+ r7��
1500
+ − α
1501
+ � r2
1502
+ 2ℓ4 + O
1503
+
1504
+ r3��
1505
+ .
1506
+ (6.19)
1507
+ Note that the Einstein’s tensor presents a de Sitter form.
1508
+ Focusing on the minimal theory (α = β = 0), the analytic expressions become more
1509
+ tractable. We report them for completeness:
1510
+ ρ(u)
1511
+ G = −p(s)
1512
+ G =
1513
+ 12M2ℓ2
1514
+ (r3 + 12Mℓ2)2 ,
1515
+ p⊥
1516
+ G = −24M2ℓ2(Mℓ2 − r3)
1517
+ (r3 + 2Mℓ2)3
1518
+ ,
1519
+ (6.20)
1520
+ ρ(u)
1521
+ λ
1522
+ =
1523
+ 243M6ℓ4r6
1524
+ 2(r3 + 2Mℓ2)6 ,
1525
+ p(s)
1526
+ λ
1527
+ = p⊥
1528
+ λ = 243M5ℓ2r6(r3 − 2Mℓ2)
1529
+ 2(r3 + 2Mℓ2)6
1530
+ ;
1531
+ (6.21)
1532
+ and provide their plots in figure 4.
1533
+ In order to produce the figures, we exploit a self-similarity property that these functions
1534
+ enjoy: when written in terms of the variable x = r
1535
+
1536
+ Mℓ2�−1/3, they only depend on ℓ
1537
+ through a multiplicative factor, which we can remove. Thus, the curves in figure 4 are ℓ-
1538
+ independent: the ℓ-dependence can be reinstated by simply rescaling the axes appropriately.
1539
+ – 19 –
1540
+
1541
+ The location of the horizons in the x coordinate depends markedly on ℓ: for reference,
1542
+ figure 4 reports an illustrative example. It also reports the location of the star’s effective
1543
+ radius, which is defined only for ℓ > 4M/(3
1544
+
1545
+ 3) but has an otherwise ℓ-independent x-
1546
+ coordinate:
1547
+ r⋆ =
1548
+
1549
+ 4Mℓ2�1/3 �→ x⋆ = 41/3 ≃ 1.59 .
1550
+ (6.22)
1551
+ The fact that x⋆ does not depend on the regularisation parameter might sound suspicious,
1552
+ as it seems to suggest that the value of the effective sources at the star’s radius is always
1553
+ the same, irrespective of the value of ℓ. Physical intuition would suggest the opposite:
1554
+ the sources corresponding to large stars should be “dilute” with respect to those of more
1555
+ compact stars. Physical intuition does indeed paint the correct picture: the value of each of
1556
+ the effective sources at the star’s radius is given by a constant (of order one in appropriate
1557
+ units) divided by ℓ2. So increasing ℓ does suppress the deviations away from vacuum.
1558
+ Inspecting the figure, we realise that the effective sources are typically negligible at
1559
+ the scale of the outer horizon. They are still small, though less so, at the scale of the star’s
1560
+ radius, and become almost zero very rapidly as one moves outwards. We deduce that most
1561
+ of the phenomenologically relevant phenomena involving these non-singular objects take
1562
+ place, for all practical purposes, in vacuum.
1563
+ 6.2
1564
+ Black bounce’s effective sources
1565
+ In the non-connected case, we are forced to analyse the specific example provided by the
1566
+ black bounce spacetime. The analytic expressions are often reasonably compact: when this
1567
+ is the case, we report them in full. However, as in the previous section, we will put the
1568
+ emphasis on the more informative asymptotic behaviours of the effective sources.
1569
+ Khronon’s equation
1570
+ We find that Jλ = 0 identically. This means that, remarkably, the
1571
+ khronon’s equation of motion is satisfied in the minimal theory α = β = 0. For the more
1572
+ general cases, Jα and Jβ can be written as
1573
+ Jα = r
1574
+
1575
+ Mϱ2P5(ϱ) + ℓ2P6(ϱ)
1576
+
1577
+ jα(ϱ)
1578
+ and
1579
+ Jβ = rℓ2jβ(ϱ) ,
1580
+ (6.23)
1581
+ where jα and jβ do not depend on ℓ while P5(ϱ) and P6(ϱ) are polynomials of degree five
1582
+ and six, respectively, in ϱ.
1583
+ At infinity, one finds the following expansions:
1584
+ J = α
1585
+
1586
+ −6
1587
+
1588
+ 3
1589
+
1590
+ β
1591
+ 1 − β
1592
+ M4
1593
+ ϱ5 + O
1594
+
1595
+ ϱ−6�
1596
+
1597
+ + β
1598
+
1599
+ 12
1600
+
1601
+ 3
1602
+
1603
+ β
1604
+ 1 − β
1605
+ M2ℓ2
1606
+ ϱ5
1607
+ + O
1608
+
1609
+ ϱ−6�
1610
+
1611
+ ,
1612
+ (6.24)
1613
+ so even in this case the effective sources go to zero very rapidly.
1614
+ As the expressions in eq. (6.23) make explicit, these functions are O(r) close to r = 0,
1615
+ for all nonzero values of ℓ. Note that the limit ℓ → 0 is, as expected, singular.
1616
+ – 20 –
1617
+
1618
+ Einstein’s equations
1619
+ We find that the term proportional to λ in Gab vanishes identically:
1620
+ this means that, in the minimal theory α = β = 0, the only deviations from vacuum come
1621
+ from the Einstein tensor. In other words
1622
+ ρ(u)
1623
+ λ
1624
+ = p(s)
1625
+ λ
1626
+ = p⊥
1627
+ λ = 0 .
1628
+ (6.25)
1629
+ The analytic expression of the effective energy density is
1630
+ ρ(u) = − ℓ2
1631
+ 8ϱ8
1632
+
1633
+ 8ϱ4 − 32ϱ3M + 27M4�
1634
+ + α
1635
+
1636
+ M
1637
+ ϱ2MP4(ϱ) + ℓ2P5(ϱ)
1638
+ 8ϱ8 (4ϱ2 + 4ϱM + 3M2)
1639
+
1640
+ ,
1641
+ (6.26)
1642
+ where the Pn are polynomials of degree n in ϱ; note in particular that nothing depends on
1643
+ β — ρ(u)
1644
+ G
1645
+ and ρ(u)
1646
+ β
1647
+ separately do, but the sum ρ(u)
1648
+ G + βρ(u)
1649
+ β
1650
+ does not. For the pressures, we
1651
+ find
1652
+ p(s) = − ℓ2
1653
+ 8ϱ8
1654
+
1655
+ 8ϱ4 + 27M4�
1656
+ + α
1657
+
1658
+ M2r2 �
1659
+ 4ϱ2 + 6ϱM + 9M2�2
1660
+ 8ϱ8 (4ϱ2 + 4ϱM + 3M2)
1661
+
1662
+ ,
1663
+ (6.27)
1664
+ p⊥ = ℓ2(ϱ − M)
1665
+ ϱ5
1666
+ − α
1667
+
1668
+ M2r2 �
1669
+ 4ϱ2 + 6ϱM + 9M2�2
1670
+ 8ϱ8 (4ϱ2 + 4ϱM + 3M2)
1671
+
1672
+ ;
1673
+ (6.28)
1674
+ as before, the β-dependence cancels out.
1675
+ Once again, we focus on the asymptotic behaviour. At infinity
1676
+ ρ(u) =
1677
+
1678
+ − ℓ2
1679
+ ϱ4 + O
1680
+
1681
+ ϱ−5��
1682
+ + α
1683
+
1684
+ −M2
1685
+ 2ϱ4 + O
1686
+
1687
+ ϱ−5��
1688
+ ,
1689
+ (6.29)
1690
+ p(s) = −p⊥ + O
1691
+
1692
+ ϱ−5�
1693
+ = ρ(u) + O
1694
+
1695
+ ϱ−5�
1696
+ .
1697
+ (6.30)
1698
+ Note that the fall-off rate of the tails is still rather fast. Again, it is easy to see that even
1699
+ for ℓ → 0 one does not recover vacuum if α ̸= 0. As in the previous case this is simply due
1700
+ to the fact that only for α = 0 the considered singular BH spacetime is an exact solution
1701
+ of the field equations in vacuum.
1702
+ At r = 0, instead, the values of the sources are nonzero and controlled by the regular-
1703
+ isation parameter ℓ:
1704
+ ρ(u) = −8ℓ4 + 27M4 − 32ℓ3M
1705
+ 8ℓ6
1706
+ + α
1707
+ �27M4 − 8Mℓ3
1708
+ 8ℓ6
1709
+
1710
+ ,
1711
+ (6.31)
1712
+ p(s) = −8ℓ4 + 27M4
1713
+ ℓ6
1714
+ ,
1715
+ (6.32)
1716
+ p⊥ = ℓ − M
1717
+ ℓ3
1718
+ .
1719
+ (6.33)
1720
+ For symmetry reasons, the throat is an extremal point (either a local minimum or maxi-
1721
+ mum) for these functions.
1722
+ Finally, we again focus on the minimal theory and provide plots of the nonzero sources.
1723
+ As the analytic expressions make clear, once the coordinate ϱ is employed the dependence
1724
+ on ℓ is trivial, since this parameter only enters as a multiplicative factor. For this reason,
1725
+ – 21 –
1726
+
1727
+ 0
1728
+ 1
1729
+ 2
1730
+ 3
1731
+ 4
1732
+ 5
1733
+ -0.6
1734
+ -0.4
1735
+ -0.2
1736
+ 0.0
1737
+ 0.2
1738
+ 0.4
1739
+ Figure 5: Energy density and principal pressures, as measured by an observer comoving
1740
+ with the æther, for the black-bounce non-singular metric in the minimal theory α = β = 0.
1741
+ The black vertical lines mark the UH (solid) and KH (dashed), which may be present or not
1742
+ depending on the value of ℓ. Dotted lines signal the position of the mouth for two choices
1743
+ of ℓ, corresponding to a hidden (ℓ = 0.25M) and a traversable (ℓ = 2.5M) wormhole
1744
+ respectively. Recall that, since ϱ =
1745
+
1746
+ r2 + ℓ2, the region ϱ < ℓ is unphysical and should be
1747
+ removed; for this reason it is shaded.
1748
+ we decide to plot, in figure 5, the ℓ-independent part only, as a function of ϱ. For refer-
1749
+ ence, dotted lines mark the location of the wormhole mouth for two specific choices of ℓ,
1750
+ corresponding to a hidden and a traversable wormhole respectively.
1751
+ We remind the reader that, although the plot extends to ϱ = 0, min(ϱ) = ℓ. Hence, for
1752
+ any given choice ℓ, the region ϱ < ℓ does not belong to the spacetime and should therefore
1753
+ be removed: in figure 5 this is rendered by shading. The curves should thus be cut off at
1754
+ ϱ = ℓ and joined smoothly with a mirror copy of themselves; moreover, they should be
1755
+ multiplied by ℓ2.
1756
+ The upshot of this analysis is that the deviations away from vacuum are sizeable only
1757
+ in a region close to the mouth, but decay very fast as one moves away from the object.
1758
+ Therefore, the physics in the surrounding of the black bounce is well described by the
1759
+ equations of vacuum khronometric theory.
1760
+ 7
1761
+ Conclusions
1762
+ In this paper, we have presented explicit examples of simply connected and non-connected
1763
+ regularisations of an exact static and spherically symmetric black-hole solution in low-
1764
+ energy Hoˇrava gravity.
1765
+ These configurations, consisting of a non-singular metric and a non-singular æther flow,
1766
+ may or may not exhibit universal and/or Killing horizons. To our knowledge, our connected
1767
+ – 22 –
1768
+
1769
+ configurations represent the first instances of regular black holes and of stars with (anti-)de
1770
+ Sitter core in the context of khronometric theory. Similarly, the non-connected configura-
1771
+ tions are the first instances, in this context, of hidden and traversable wormholes whose
1772
+ æther is not aligned with the Killing vector associated to staticity.
1773
+ Our proposals are summarised in eqs. (3.2) and (3.3) (connected) and eqs. (3.6)
1774
+ and (3.7) (non-connected). They are not solutions of khronometric theory; however, they
1775
+ instantiate all of the few physically viable classes of non-singular end states of gravitational
1776
+ collapse: connected regular black holes and horizonless objects, non-connected hidden and
1777
+ traversable wormholes. Therefore, if non-projectable Hoˇrava gravity is indeed a UV com-
1778
+ pletion of khronometric theory, gravitational collapse in the full theory should produce
1779
+ solutions that are qualitatively akin to the configurations that we have hereby described.
1780
+ In this frame of mind, the deviations of our configurations from the vacuum of khrono-
1781
+ metric theory should be interpreted as arising from the contributions of higher-order oper-
1782
+ ators. Checking directly whether this is the case is probably close to impossible. It seems
1783
+ important, therefore, to seek indirect ways of validating this conjecture.
1784
+ Even within the low-energy theory, however, our proposals present several intriguing
1785
+ features. For instance, when a UH is present both the connected and non-connected con-
1786
+ figurations represent one-parameter generalisations of the exact solution.
1787
+ Notably, this
1788
+ additional parameter can be used to trim the surface gravity of the UH, thereby affect-
1789
+ ing the thermal properties of the black hole. In particular, it seems possible to construct
1790
+ configurations in which the UH is extremal, i.e. its surface gravity vanishes.
1791
+ Moreover, connected non-singular black holes necessarily have multiple UHs. Since
1792
+ the peeling properties of the inner UH are highly reminiscent of those of inner KHs in GR,
1793
+ which are believed to be unstable (see e.g. [59–61] and references therein), it is legitimate
1794
+ to wonder whether inner UHs will be subject to a similar (mass inflation) instability in
1795
+ spite of the modified dispersion relations associated to Lorentz-breaking matter. We think
1796
+ this question deserves further investigation in the future.
1797
+ Finally, we note that, both on theoretical as well as phenomenological grounds, the
1798
+ Lorentz-violating effects in matter should be suppressed by some energy scale higher than
1799
+ the one associated with Lorentz breaking in Hoˇrava gravity (see e.g. [62] or [63] and ref-
1800
+ erences therein). This implies that for all practical purposes light rays and test particles,
1801
+ typically used for BH phenomenology nowadays, essentially move along geodesics of the
1802
+ metric — regardless of the specifics of the modified dispersion relation.
1803
+ Previous studies have shown that the geodesics of the Hayward (as well as Bardeen,
1804
+ Dymnikova et similia) and black bounce spacetimes are parametrically close to those of the
1805
+ Schwarzschild metric. In particular, these metrics typically admit an unstable light ring
1806
+ — whose properties are connected, for instance, to the shape and size of electromagnetic
1807
+ shadows, or to the frequencies of the longest-lived quasinormal modes — that lies close to
1808
+ the one of Schwarzschild. (Moreover, in the horizonless regime they can admit another,
1809
+ stable light ring, located inside the unstable light ring or at the wormhole mouth, which
1810
+ might be associated to a non-linear instability [64].)
1811
+ Therefore, when probed at low energies — e.g. employing very long-baseline interfer-
1812
+ ometry, accretion disk spectroscopy, star dynamics or early inspiral gravitational waves
1813
+ – 23 –
1814
+
1815
+ — these objects represent phenomenologically viable “mimickers” of Schwarzschild black
1816
+ holes, similar but not identical to their singular counterparts. The search for signatures of
1817
+ these subtle deviations could then mark the dawn of a new channel for quantum gravity
1818
+ phenomenology.
1819
+ Acknowledgements
1820
+ We wish to thank Edgrado Franzin, Enrico Barausse and Mario Herrero-Valea for the
1821
+ precious discussions and their comments on an early draft of the manuscript. The au-
1822
+ thors acknowledge funding from the Italian Ministry of Education and Scientific Research
1823
+ (MIUR) under the grant PRIN MIUR 2017-MB8AEZ.
1824
+ A
1825
+ Optical scalars
1826
+ A coordinate-independent way to characterise the æther congruence is through the optical
1827
+ scalars: 4
1828
+ expansion
1829
+ θ = ∇aua ,
1830
+ (A.1)
1831
+ shear squared
1832
+ σ2
1833
+ with
1834
+ σab = ∇(aub) − u(aab) ,
1835
+ (A.2)
1836
+ twist squared
1837
+ ω2
1838
+ with
1839
+ ωab = ∇[buc] − u[aab] .
1840
+ (A.3)
1841
+ Other interesting scalars are ua χa and aa χa, as they are associated with properties of the
1842
+ UHs.
1843
+ Since the æther is hypersurface-orthogonal, Frobenius’ theorem implies that the twist
1844
+ vanishes. (Note that ω2 ∝ (u[a∇buc])2.) Moreover
1845
+ aa χa =
1846
+
1847
+ −a2 = y (ua χa)′ .
1848
+ (A.4)
1849
+ When evaluated on the Ansatz of eqs. (2.3) and (2.4), one finds
1850
+ θ = y′ + 2yR′
1851
+ R
1852
+ (A.5)
1853
+ and a similar, though lengthier, expression for σ2.
1854
+ All this quantities thus depend al-
1855
+ gebraically on the functions F(r), R(r), A(r) and their first derivatives, in a way that
1856
+ renders the following statement manifestly true: when F(r), R(r), A(r) are of class C1
1857
+ and bounded, all the scalars introduced above are C1 and bounded. We have computed
1858
+ them explicitly for the singular solution and found that they are ill-behaved at the origin;
1859
+ and then on the connected and on the non-connected non-singular configurations, checking
1860
+ that they are indeed well-behaved everywhere — in particular, at the origin, at the UHs
1861
+ and at the KHs.
1862
+ 4The shear is usually taken to be traceless; our definition is good enough for our purposes.
1863
+ – 24 –
1864
+
1865
+ B
1866
+ 2D expansions
1867
+ In order to make contact with the arguments of [32], we complement our analysis with a
1868
+ discussion on the local characterisation of horizons.
1869
+ We start by considering a closed, spacelike 2-surface S 2. The subspace of the tangent
1870
+ space that is orthogonal to the tangent space of S 2 is spanned by two vectors that can
1871
+ be taken timelike, future-pointing and spacelike, outward-pointing — respectively. In our
1872
+ case, a simple choice for S 2 is any sphere centred at the origin. The two vectors are then
1873
+ the æther and the vector sa of eq. (6.4) used to define the tangential pressure.
1874
+ The induced metric on S 2 is
1875
+ hab = gab − uaub + sasb
1876
+ (B.1)
1877
+ and can be used to define the scalars
1878
+ θ(X) = hab∇aXb
1879
+ with
1880
+ X = {u, s} .
1881
+ (B.2)
1882
+ These are expansions, but should not be confused with the optical scalar θ, which is defined
1883
+ in terms of a three-dimensional transverse metric. θ(u) and θ(s), and in particular their
1884
+ signs, determine whether S 2 is a universal (marginally) trapped surface.
1885
+ With our Ans¨atze of eqs. (2.3) and (2.4), we have
1886
+ θ(u) = 2yR′
1887
+ R
1888
+ and
1889
+ θ(s) = 2(ua χa)R′
1890
+ R .
1891
+ (B.3)
1892
+ Recall that y < 0. Hence, on the singular solution eqs. (2.7) and (2.8), θ(u) is always
1893
+ negative, i.e. the future-directed congruence is always converging, while θ(s) has the sign
1894
+ of ua χa. Thus, ua χa = 0 marks a universal trapping horizon. Note that both expansions
1895
+ diverge as r → 0, meaning that r = 0 is a caustic. Penrose’s theorem then implies that
1896
+ this is in fact a singularity, in the sense that the spacetime is not geodesically complete.
1897
+ On the simply connected configurations of eqs. (3.2) and (3.3) we still have that θ(u) < 0
1898
+ and that θ(s) has the sign of ua χa, but we know that in this case ua χa = 0 has multiple
1899
+ roots and in particular it is positive in a neighbourhood of r = 0. Hence there exist multiple
1900
+ universal trapping horizons. Further note that in this case r = 0 is not a caustic anymore,
1901
+ since θ(u) → 0 and θ(s) → 1 as r → 0.
1902
+ In the non-connected configuration the sign of the two expansions depends also on
1903
+ R′/R, which is positive in our universe but negative in the other. I.e. both congruences
1904
+ vanish and change sign at the wormhole mouth r = 0.
1905
+ References
1906
+ [1] G. ’t Hooft and M.J.G. Veltman, One loop divergencies in the theory of gravitation, Ann.
1907
+ Inst. H. Poincare Phys. Theor. A 20 (1974) 69.
1908
+ [2] M.H. Goroff and A. Sagnotti, The Ultraviolet Behavior of Einstein Gravity, Nucl. Phys. B
1909
+ 266 (1986) 709.
1910
+ – 25 –
1911
+
1912
+ [3] P. Hoˇrava, Quantum Gravity at a Lifshitz Point, Physical Review D 79 (2009) 084008
1913
+ [0901.3775].
1914
+ [4] D. Blas, O. Pujolas and S. Sibiryakov, On the Extra Mode and Inconsistency of Hoˇrava
1915
+ Gravity, Journal of High Energy Physics 2009 (2009) 029 [0906.3046].
1916
+ [5] D. Blas, O. Pujolas and S. Sibiryakov, Consistent extension of Hoˇrava gravity, Physical
1917
+ Review Letters 104 (2010) 181302 [0909.3525].
1918
+ [6] D. Blas, O. Pujolas and S. Sibiryakov, Models of non-relativistic quantum gravity: The good,
1919
+ the bad and the healthy, Journal of High Energy Physics 2011 (2011) 18 [1007.3503].
1920
+ [7] J. Bellorin, C. Borquez and B. Droguett, BRST symmetry and unitarity of the Hoˇrava
1921
+ theory, 2212.14079.
1922
+ [8] J. Bellorin, C. Borquez and B. Droguett, Cancellation of divergences in the nonprojectable
1923
+ Hoˇrava theory, Physical Review D 106 (2022) 044055 [2207.08938].
1924
+ [9] A.O. Barvinsky, A.V. Kurov and S.M. Sibiryakov, Beta functions of (3 + 1)-dimensional
1925
+ projectable Hoˇrava gravity, Physical Review D 105 (2022) 044009 [2110.14688].
1926
+ [10] A.O. Barvinsky, M. Herrero-Valea and S.M. Sibiryakov, Towards the renormalization group
1927
+ flow of Hoˇrava gravity in (3 + 1) dimensions, Physical Review D 100 (2019) 026012
1928
+ [1905.03798].
1929
+ [11] A.O. Barvinsky, D. Blas, M. Herrero-Valea, S.M. Sibiryakov and C.F. Steinwachs, Hoˇrava
1930
+ gravity is asymptotically free (in 2 + 1 dimensions), Physical Review Letters 119 (2017)
1931
+ 211301 [1706.06809].
1932
+ [12] A.O. Barvinsky, D. Blas, M. Herrero-Valea, S.M. Sibiryakov and C.F. Steinwachs,
1933
+ Renormalization of Hoˇrava Gravity, Physical Review D 93 (2016) 064022 [1512.02250].
1934
+ [13] T. Jacobson and D. Mattingly, Gravity with a dynamical preferred frame, Physical Review D
1935
+ 64 (2001) 024028 [gr-qc/0007031].
1936
+ [14] T. Jacobson, Einstein-æther gravity: A status report, in Proceedings of From Quantum to
1937
+ Emergent Gravity: Theory and Phenomenology — PoS(QG-Ph), vol. 43, p. 020, SISSA
1938
+ Medialab, Oct., 2008, DOI.
1939
+ [15] T. Jacobson, Extended hoˇrava gravity and einstein-aether theory, Physical Review D 81
1940
+ (2010) 101502 [1001.4823].
1941
+ [16] T. Jacobson, Undoing the twist: The Hoˇrava limit of Einstein-aether, Physical Review D 89
1942
+ (2014) 081501 [1310.5115].
1943
+ [17] N. Franchini, M. Herrero-Valea and E. Barausse, The relation between general relativity and
1944
+ a class of hoˇrava gravity theories, Physical Review D 103 (2021) 084012 [2103.00929].
1945
+ [18] C. Eling and T. Jacobson, Black Holes in Einstein-Aether Theory, Classical and Quantum
1946
+ Gravity 23 (2006) 5643 [gr-qc/0604088].
1947
+ [19] E. Barausse, T. Jacobson and T.P. Sotiriou, Black holes in Einstein-aether and
1948
+ Hoˇrava-Lifshitz gravity, Physical Review D 83 (2011) 124043 [1104.2889].
1949
+ [20] D. Blas and S. Sibiryakov, Hoˇrava gravity vs. thermodynamics: The black hole case, Physical
1950
+ Review D 84 (2011) 124043 [1110.2195].
1951
+ [21] E. Barausse and T.P. Sotiriou, Slowly rotating black holes in Hoˇrava-Lifshitz gravity,
1952
+ Physical Review D 87 (2013) 087504 [1212.1334].
1953
+ – 26 –
1954
+
1955
+ [22] E. Barausse and T.P. Sotiriou, A no-go theorem for slowly rotating black holes in
1956
+ Hoˇrava-Lifshitz gravity, Physical Review Letters 109 (2012) 181101 [1207.6370].
1957
+ [23] E. Barausse, T.P. Sotiriou and I. Vega, Slowly rotating black holes in Einstein-æther theory,
1958
+ Physical Review D 93 (2016) 044044 [1512.05894].
1959
+ [24] J. Oost, S. Mukohyama and A. Wang, Spherically symmetric exact vacuum solutions in
1960
+ Einstein-aether theory, Universe 7 (2021) 272 [2106.09044].
1961
+ [25] M. Bhattacharjee, S. Mukohyama, M.-B. Wan and A. Wang, Gravitational collapse and
1962
+ formation of universal horizons in Einstein-æther theory, Phys. Rev. D 98 (2018) 064010
1963
+ [1806.00142].
1964
+ [26] P. Berglund, J. Bhattacharyya and D. Mattingly, Mechanics of universal horizons, Physical
1965
+ Review D 85 (2012) 124019 [1202.4497].
1966
+ [27] S. Janiszewski, A. Karch, B. Robinson and D. Sommer, Charged black holes in Hoˇrava
1967
+ gravity, Journal of High Energy Physics 2014 (2014) 163 [1401.6479].
1968
+ [28] J. Bhattacharyya, M. Colombo and T.P. Sotiriou, Causality and black holes in spacetimes
1969
+ with a preferred foliation, Classical and Quantum Gravity 33 (2016) 235003 [1509.01558].
1970
+ [29] R. Penrose, Gravitational Collapse and Space-Time Singularities, Physical Review Letters 14
1971
+ (1965) 57.
1972
+ [30] R. Carballo-Rubio, F. Di Filippo, S. Liberati and M. Visser, Geodesically complete black
1973
+ holes, Physical Review D 101 (2020) 084047 [1911.11200].
1974
+ [31] R. Carballo-Rubio, F. Di Filippo, S. Liberati and M. Visser, Opening the Pandora’s box at
1975
+ the core of black holes, Classical and Quantum Gravity 37 (2020) 145005 [1908.03261].
1976
+ [32] R. Carballo-Rubio, F. Di Filippo, S. Liberati and M. Visser, Geodesically complete black holes
1977
+ in Lorentz-violating gravity, Journal of High Energy Physics 2022 (2022) 122 [2111.03113].
1978
+ [33] J.M. Bardeen, Non-singular general relativistic gravitational collapse, in Proceedings of the
1979
+ International Conference GR5, (Tblisi, Georgia), Tbilisi University Press, 1968.
1980
+ [34] S. Ansoldi, Spherical black holes with regular center: A review of existing models including a
1981
+ recent realization with Gaussian sources, 0802.0330.
1982
+ [35] H. Maeda, Quest for realistic non-singular black-hole geometries: Regular-center type,
1983
+ Journal of High Energy Physics 2022 (2022) 108 [2107.04791].
1984
+ [36] L. Sebastiani and S. Zerbini, Some remarks on non-singular spherically symmetric
1985
+ space-times, 2206.03814.
1986
+ [37] A. Simpson and M. Visser, Black-bounce to traversable wormhole, Journal of Cosmology and
1987
+ Astroparticle Physics 2019 (2019) 042 [1812.07114].
1988
+ [38] A. Simpson, P. Martin-Moruno and M. Visser, Vaidya spacetimes, black-bounces, and
1989
+ traversable wormholes, Classical and Quantum Gravity 36 (2019) 145007 [1902.04232].
1990
+ [39] F.S.N. Lobo, M.E. Rodrigues, M.V.d.S. Silva, A. Simpson and M. Visser, Novel black-bounce
1991
+ spacetimes: Wormholes, regularity, energy conditions, and causal structure, Physical Review
1992
+ D 103 (2021) 084052 [2009.12057].
1993
+ [40] E. Franzin, S. Liberati, J. Mazza, A. Simpson and M. Visser, Charged black-bounce
1994
+ spacetimes, Journal of Cosmology and Astroparticle Physics 2021 (2021) 036 [2104.11376].
1995
+ – 27 –
1996
+
1997
+ [41] K.A. Bronnikov and J.C. Fabris, Regular phantom black holes, Physical Review Letters 96
1998
+ (2006) 251101 [gr-qc/0511109].
1999
+ [42] K.A. Bronnikov, H. Dehnen and V.N. Melnikov, Regular black holes and black universes,
2000
+ General Relativity and Gravitation 39 (2007) 973 [gr-qc/0611022].
2001
+ [43] R. Carballo-Rubio, F. Di Filippo, S. Liberati and M. Visser, A connection between regular
2002
+ black holes and horizonless ultracompact stars, 2211.05817.
2003
+ [44] P.O. Mazur and E. Mottola, Gravitational Vacuum Condensate Stars, Proceedings of the
2004
+ National Academy of Sciences 101 (2004) 9545 [gr-qc/0407075].
2005
+ [45] E. Mottola, The Effective Theory of Gravity and Dynamical Vacuum Energy, Journal of High
2006
+ Energy Physics 2022 (2022) 37 [2205.04703].
2007
+ [46] G. Lara, M. Herrero-Valea, E. Barausse and S.M. Sibiryakov, Black Holes in
2008
+ Ultraviolet-Complete Hoˇrava Gravity, Physical Review D 103 (2021) 104007 [2103.01975].
2009
+ [47] C. Eling and T. Jacobson, Spherical Solutions in Einstein-Aether Theory: Static Aether and
2010
+ Stars, Classical and Quantum Gravity 23 (2006) 5625 [gr-qc/0603058].
2011
+ [48] J. Chojnacki and J. Kwapisz, Finite action principle and Hoˇrava-Lifshitz gravity: Early
2012
+ universe, black holes, and wormholes, Physical Review D 104 (2021) 103504 [2102.13556].
2013
+ [49] K. Lin and W.-L. Qian, Ellis drainhole solution in Einstein-æther gravity and the axial
2014
+ gravitational quasinormal modes, The European Physical Journal C 82 (2022) 529
2015
+ [2203.03081].
2016
+ [50] F. Del Porro, M. Herrero-Valea, S. Liberati and M. Schneider, Time Orientability and
2017
+ Particle Production from Universal Horizons, Physical Review D 105 (2022) 104009
2018
+ [2201.03584].
2019
+ [51] V.P. Frolov, Notes on non-singular models of black holes, Physical Review D 94 (2016)
2020
+ 104056 [1609.01758].
2021
+ [52] T. Zhou and L. Modesto, Geodesic incompleteness of some popular regular black holes,
2022
+ 2208.02557.
2023
+ [53] C. Lan and Y.-F. Wang, Singularities of regular black holes and the monodromy method for
2024
+ asymptotic quasinormal modes, Chinese Physics C (2022) [2205.05935].
2025
+ [54] S.A. Hayward, Formation and evaporation of non-singular black holes, Physical Review
2026
+ Letters 96 (2006) 031103 [gr-qc/0506126].
2027
+ [55] I. Dymnikova, Vacuum nonsingular black hole, General Relativity and Gravitation 24 (1992)
2028
+ 235.
2029
+ [56] M. Visser, Lorentzian Wormholes: From Einstein to Hawking, AIP-Press (1996).
2030
+ [57] R. Carballo-Rubio, F. Di Filippo, S. Liberati and M. Visser, Causal hierarchy in modified
2031
+ gravity, Journal of High Energy Physics 2020 (2020) 55 [2005.08533].
2032
+ [58] S.W. Hawking and G.F.R. Ellis, The Large Scale Structure of Space-Time, Cambridge
2033
+ Monographs on Mathematical Physics, Cambridge University Press, Cambridge (1973),
2034
+ 10.1017/CBO9780511524646.
2035
+ [59] R. Carballo-Rubio, F. Di Filippo, S. Liberati, C. Pacilio and M. Visser, On the viability of
2036
+ regular black holes, Journal of High Energy Physics 2018 (2018) 23 [1805.02675].
2037
+ – 28 –
2038
+
2039
+ [60] R. Carballo-Rubio, F. Di Filippo, S. Liberati, C. Pacilio and M. Visser, Inner horizon
2040
+ instability and the unstable cores of regular black holes, Journal of High Energy Physics 2021
2041
+ (2021) 132 [2101.05006].
2042
+ [61] F. Di Filippo, R. Carballo-Rubio, S. Liberati, C. Pacilio and M. Visser, On the Inner
2043
+ Horizon Instability of Non-Singular Black Holes, Universe 8 (2022) 204.
2044
+ [62] S. Liberati, L. Maccione and T.P. Sotiriou, Scale hierarchy in Hoˇrava-Lifshitz gravity: A
2045
+ strong constraint from synchrotron radiation in the Crab nebula, Physical Review Letters 109
2046
+ (2012) 151602 [1207.0670].
2047
+ [63] S. Liberati, Tests of Lorentz invariance: A 2013 update, Classical and Quantum Gravity 30
2048
+ (2013) 133001 [1304.5795].
2049
+ [64] P.V.P. Cunha, E. Berti and C.A.R. Herdeiro, Light ring stability in ultra-compact objects,
2050
+ Physical Review Letters 119 (2017) 251102 [1708.04211].
2051
+ – 29 –
2052
+