ArticlePDF Available

Abstract and Figures

A formula of Stembridge states that the permutation peak polynomials and descent polynomials are connected via a quadratique transformation. The aim of this paper is to establish the cycle analogue of Stembridge's formula by using cycle peaks and excedances of permutations. We prove a series of new general formulae expressing polynomials counting permutations by various excedance statistics in terms of refined Eulerian polynomials. Our formulae are comparable with Zhuang's generalizations (Zhuang 2017 [29]) using descent statistics of permutations. Our methods include permutation enumeration techniques involving variations of classical bijections from permutations to Laguerre histories, explicit continued fraction expansions of combinatorial generating functions in Shin and Zeng (2012) [21] and cycle version of modified Foata-Strehl action. We also prove similar formulae for restricted permutations such as derangements and permutations avoiding certain patterns. Moreover, we provide new combinatorial interpretations for the γ-coefficients of the inversion polynomials restricted on 321-avoiding permutations.
Content may be subject to copyright.
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS
BIN HAN, JIANXI MAO, AND JIANG ZENG
Abstract. A formula of Stembridge states that the permutation peak polynomials and
descent polynomials are connected via a quadratique transformation. The aim of this
paper is to establish the cycle analogue of Stembridge’s formula by using cycle peaks and
excedances of permutations. We prove a series of new general formulae expressing polyno-
mials counting permutations by various excedance statistics in terms of refined Eulerian
polynomials. Our formulae are comparable with Zhuang’s generalizations [Adv. in Appl.
Math. 90 (2017) 86-144] using descent statistics of permutations. Our methods include
permutation enumeration techniques involving variations of classical bijections from per-
mutations to Laguerre histories, explicit continued fraction expansions of combinatorial
generating functions in Shin and Zeng [European J. Combin. 33 (2012), no. 2, 111–
127] and cycle version of modified Foata-Strehl action. We also prove similar formulae
for restricted permutations such as derangements and permutations avoiding certain pat-
terns. Moreover, we provide new combinatorial interpretations for the γ-coefficients of the
inversion polynomials restricted on 321-avoiding permutations.
Contents
1. Introduction 1
2. Background and preliminaries 5
2.1. Permutation statistics and two bijections 5
2.2. The bijection Φ7
2.3. The bijection Ψ7
2.4. The star variation 8
2.5. Laguerre histories as permutation encodings 11
2.6. Françon-Viennot bijection 12
2.7. Restricted Françon-Viennot bijection 14
2.8. Foata-Zeilberger bijection 15
2.9. Pattern avoidances and 2-Motzkin paths 15
3. Main results 17
4. Proofs using group actions 23
4.1. Proof of Theorem 3.5 23
Date: March 5, 2021.
2010 Mathematics Subject Classification. 05A05, 05A15, 05A19.
Key words and phrases. Eulerian polynomials; Peak polynomials; Gamma-positivity; Derangement
polynomials; q-Narayana polynomials; Continued fractions; Laguerre histories; Françon-Viennot bijection;
Foata-Zeilberger bijection; Cyclic modified Foata-Strehl action.
1
2 B. HAN, J. MAO, AND J. ZENG
4.2. Proof of Theorem 3.6 27
5. Proofs via continued fractions 31
5.1. Some combinatorial continued fractions 31
5.2. Proof of Theorems 3.1, 3.4–3.6, 3.8–3.10 32
5.3. Proof of Theorems 3.12 and 3.13 37
Acknowledgement 38
References 38
1. Introduction
Stieltjes [25] showed that the Eulerian polynomials An(t)can be defined through the
continued fraction (S-fraction) expansion
X
n0
An(t)zn=1
11·z
1t·z
12·z
12t·z
1. . .
.(1.1)
For an n-permutation σ:= σ(1)σ(2) ···σ(n)of the word 1. . . n, an index i(1in1) is
adescent (resp. excedance) of σif σ(i)> σ(i+ 1) (resp. σ(i)> i). It is well-known [10,19]
that
An(t) = X
σSn
tdes σ=X
σSn
texc σ,(1.2)
where Snis the set of n-permutations and des σ(resp. exc σ) denotes the number of
descents (resp. excedances) of σ. The value σ(i)(2in1) is a peak of σif
σ(i1) < σ(i)> σ(i+ 1) and the peak polynomials are defined by
Ppk
n(x) := X
σSn
xpk0σ,(1.3)
where pk0σdenotes the number of peaks of σ. The peak polynomials are related to the
Eulerian polynomials by Stembridge’s identity [24, Remark 4.8], see also [3,29],
An(t) = 1 + t
2n1
Ppk
n4t
(1 + t)2,(1.4)
which can be used to compute the peak polynomials. Obviously Eq. (1.4) is equivalent to
the so-called γ-expansion of Eulerian polynomials
An(t) =
b(n1)/2c
X
k=0
22k+1nγn,ktk(1 + t)n12k,(1.5)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 3
where γn,k is the number of n-permutations with kpeaks. In the form of (1.5) it is not
difficult to see that Stembridge’s formula (1.4) is actually equivalent to a formula of Foata
and Schüzenberger [10, Théorème 5.6], see also Brändén’s proof using modified Foata-Strehl
action [3]. In the last two decades, many refinements of Stembridge’s identity have been
given by Brändén [3], Petersen [18], Shin and Zeng [21,22], Zhuang [29], Athanasiadis [1]
and others. In particular, Zhuang [29] has proved several identities expressing polynomi-
als counting permutations by various descent statistics in terms of Eulerian polynomials,
extending results of Stembridge, Petersen and Brändén.
By contracting the continued fraction (1.1) starting from the first and second lines (see
Lemma 5.1), respectively, we derive the two Jacobi-type continued fraction (J-fraction)
formulae (cf. [9])
X
n0
An+1(t)zn=1
1(1 + t)·z1·2·t·z2
12(1 + t)·z2·3·t·z2
13(1 + t)·z3·4·tz2
1 · ··
,(1.6a)
and
X
n0
An(t)zn=1
1(1 + 0 ·t)·z12·z2
1(2 + 1 ·t)·z22·t·z2
1(3 + 2 ·t)·z32·t·z2
1 · ··
.
(1.6b)
In view of Flajolet’s combinatorial theory for generic J-type continued fraction expan-
sions [9], Françon-Viennot’s bijection ψF V (resp. its restricted version φFV ) between per-
mutations and Laguerre histories provides a bijective proof of (1.6a) (resp. (1.6b)), while
Foata-Zeilberger’s bijection ψF Z [12] gives a bijective proof of (1.6b). More precisely,
Françon-Viennot [13] set up a bijection (and its restricted version) from permutations to
Laguarre histories using linear statistics of permutation, while Foata-Zeilberger constructed
another bijection [12] using cyclic statistics of permutations. In 1997 Clarke-Steingrímsson-
Zeng [6] constructed a bijection Φon permutations converting statistic des into exc on per-
mutations and linking the restricted Françon-Viennot’s bijection φF V to Foata-Zeilberger
bijection φF Z , see the right diagram in Figure 1. Later, similar to Φ, Shin and Zeng [21]
constructed a bijection Ψon permutations to convert linear statistics to cycle statistics
on permutations corresponding to (1.6a). We will show that the composition ψF V Ψ1
coincides with a recent bijection of Yan, Zhou and Lin [27], see Figure 1.
4 B. HAN, J. MAO, AND J. ZENG
LHn
Sn+1 Sn+1
ψF V ψY ZL
Ψ
LH
n
SnSn
φF V φF Z
Φ
Figure 1. Two factorizations: ψF V =ψY ZL Ψand φFV =φF Z Φ.
The Narayana polynomials Nn(t)can be defined by the S-fraction expansion
X
n0
Nn(t)zn=1
1z
1t·z
1z
1t·z
1 · ··
,(1.7)
see [14]. Note that Nn(1) is the n-th Catalan number Cn=1
n+1 2n
n. Similar to Eulerian
polynomials, by contracting the S-fraction (1.7) we derive immediately the followoing J-
fractions
X
n0
Nn+1(t)zn=1
1(1 + t)·zt·z2
1(1 + t)·zt·z2
1 · ··
(1.8a)
and
X
n0
Nn(t)zn=1
1zt·z2
1(1 + t)·zt·z2
1(1 + t)·z · ··
.(1.8b)
Let τS3={123,132,213,231,312,321}. Recall that a permutation σSnis said
to avoid the pattern τif there is no triple of indices i < j < k such that σ(i)σ(j)σ(k)is
order-isomorphic to τ. We shall write Sn(τ)for the set of permutations in Snavoiding
the pattern τ. It is known [14] that the Narayana polynomials have the combinatorial
interpretations
Nn(t) = X
σSn(231)
tdes σ=X
σSn(321)
texc σ.(1.9)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 5
Hence, the Narayana polynomials can be considered as the Eulerian polynomials for re-
stricted permutations. Moreover, they are γ-positive and have the γ-expansion [19, Chapter
4]:
Nn(t) =
(n1)/2
X
j=0 eγn,jtj(1 + t)n12j,(1.10)
where eγn,j =|{σSn(231) : des(σ) = pk(σ) = j}|.
In this paper we shall give generalizations of Stembridge’s formula or their γ-analogues
(1.5) and (1.10) using excedance statistics by further exploiting the continued fraction tech-
nique in [2022]. Indeed, from the observation (cf. [21]) that the gamma-positive formula
of Eulerian polynomials (1.5) is equal to the Jacobi-Rogers polynomial corresponding to
(1.6a), it becomes clear that Flajolet-Viennot’s combinatorial theory of formal continued
fractions could shed more lights on this topic. Our main tool is the combinatorial theory
of continued fractions due to Flajolet [9] and bijections due to Françon-Viennot, Foata-
Zeilberger between permutations and Laguarre histories, see [6,9,12,13,20]. As in [21] this
approach uses both linear and cycle statistics on permutations. There are several well-
known q-Narayana polynomials in the litterature; see [14] and the references therein. As
a follow-up to [14], we shall give more results on q-Narayana polynomials using pattern-
avoiding permutations.
The rest of this paper is organized as follows. In Section 2 after recalling the necessary
definitions and results from [2022], we link the recent bijection ψY ZL of Yan-Zhou-Lin [27]
to two known bijections; in Section 3 we present our generalized formulae of (1.4) in three
classes:
Eulerian polynomials for permutations and derangements,
Eulerian polynomials for pattern-avoiding permutations,
Eulerian polynomials for signed permutations.
There are two types of proof: group actions of Foata-Strehl’s type and manipulations of
continued fractions. More precisely, we prove Theorems 3.5 and 3.6 using variations of
modified Foata-Strehl action on permutations or Laguerre histories in Section 4; we then
prove these two theorems and the remaining theorems by comparing the continued fraction
expansions of the generating functions in Section 5. In what follows, we shall abbreviate
"generating functions" by "g.f.".
2. Background and preliminaries
2.1. Permutation statistics and two bijections. For σ=σ(1)σ(2) ···σ(n)Snwith
convention 0–0, i.e., σ(0) = σ(n+ 1) = 0, a value σ(i)(1in) is called
apeak if σ(i1) < σ(i)and σ(i)> σ(i+ 1);
avalley if σ(i1) > σ(i)and σ(i)< σ(i+ 1);
adouble ascent if σ(i1) < σ(i)and σ(i)< σ(i+ 1);
adouble descent if σ(i1) > σ(i)and σ(i)> σ(i+ 1).
6 B. HAN, J. MAO, AND J. ZENG
The set of peaks (resp. valleys, double ascents, double descents) of σis denoted by
Pk σ(resp. Val σ, Da σ, Dd σ).
Let pk σ(resp. val σ,da σ,dd σ) be the number of peaks (resp. valleys, double ascents,
double descents) of σ. For i[n] := {1, . . . , n}, we introduce the following statistics:
(31-2)iσ= #{j: 1 < j < i and σ(j)< σ(i)< σ(j1)}
(2-31)iσ= #{j:i < j < n and σ(j+ 1) < σ(i)< σ(j)}
(2-13)iσ= #{j:i < j < n and σ(j)< σ(i)< σ(j+ 1)}
(13-2)iσ= #{j: 1 < j < i and σ(j1) < σ(i)< σ(j)}
(2.1)
and define four statistics (see (2.41)):
(31-2) =
n
X
i=1
(31-2)i,(2-31) =
n
X
i=1
(2-31)i,(2-13) =
n
X
i=1
(2-13)i,(13-2) =
n
X
i=1
(13-2)i.
Now, we consider σSnas a bijection i7→ σ(i)for i[n], a value x=σ(i)is called
acyclic peak if i=σ1(x)< x and x>σ(x);
acyclic valley if i=σ1(x)> x and x<σ(x);
adouble excedance if i=σ1(x)< x and x<σ(x);
adouble drop if i=σ1(x)> x and x>σ(x);
afixed point if x=σ(x).
We say that i[n1] is an ascent of σif σ(i)< σ(i+ 1) and that i[n]is a drop of
σif σ(i)< i. Let
Cpk (resp. Cval,Cda,Cdd,Fix,Drop) (2.2)
be the set of cyclic peaks (resp. cyclic valleys,double excedances,double drops,fixed points,
drops) and denote the corresponding cardinality by cpk (resp. cval,cda,cdd,fix,drop).
Obviously we have
cpk σ=cval σfor σSn.(2.3)
Moreover, we define
wex σ= #{i:iσ(i)}=exc σ+fix σ(2.4a)
crosiσ= #{j:j < i < σ(j)< σ(i)or σ(i)< σ(j)i<j},(2.4b)
nestiσ= #{j:j < i < σ(i)< σ(j)or σ(j)< σ(i)i<j}.(2.4c)
Let cros =Pn
i=1 crosi,nest =Pn
i=1 nestiand icr σ1=cros σ1. Note (cf [14, Remark 2.4])
that
nest σ1=nest σfor σSn.(2.5)
A pair of integers (i, j)is an inversion of σSnif i < j and σ(i)> σ(j), and σ(i)(resp.
σ(j)) is called inversion top (resp. bottom). Let inv σbe the inverion number of σ.
1Our definition of cros corresponds to icr in [14].
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 7
For σSnwith convention 0–, i.e., σ(0) = 0 and σ(n+ 1) = , let
Lpk (resp. Lval,Lda,Ldd)
be the set of peaks (resp. valleys,double ascents and double decents) and denote the cor-
responding cardinality by lpk (resp. lval,lda and ldd). For i[n], the value σ(i)is called
aleft-to-right maximum (resp. right-to-left minimum) if σ(i) = max {σ(1), σ(2), . . . , σ(i)}
(resp. σ(i) = min {σ(i), . . . , σ(n1), σ(n)}). Similarly, we define left-to-right minimum
(resp. right-to-left maximum).
A double ascent σ(i) (i= 1, . . . , n)is called a foremaximum (resp. afterminimum) of σ
if it is at the same time a left-to-right maximum (resp. right-to-left minimum). Denote the
number of foremaxima (resp. afterminima) of σby fmax σ(resp. amin σ). Note that for
the peak number pk0in (1.3) we have following identities :
pk0=val =pk 1and lval =lpk.(2.6)
Now we recall two bijections Φand Ψdue to Clarke et al. [6] and Shin-Zeng [21], respec-
tively.
2.2. The bijection Φ.Let σ=σ(1) . . . σ(n)Sn, an inversion top number (resp. inver-
sion bottom number) of a letter x:= σ(i)in the word σis the number of occurrences of
inversions of form (i, j)(resp (j, i)). A letter σ(i)is a descent top (resp. descent bottom)
if σ(i)> σ(i+ 1) (resp. σ(i1) > σ(i)). Given a permutation σ, we first construct two
biwords, f
f0and g
g0, where f(resp. g) is the subword of descent bottoms (resp. nonde-
scent bottoms) in σordered increasingly, and f0(resp. g0) is the permutation of descent
tops (resp. nondescent tops) in σsuch that the inversion bottom (resp. top) number of
each letter x:= σ(i)in f0(resp. g0) is (2-31)xσ, and then form the biword w=f
f0
g
g0by
concatenating fand g, and f0and g0, respectively. Rearranging the columns of w, so that
the bottom row is in increasing order, we obtain the permutation τ= Φ(σ)as the top row
of the rearranged bi-word.
The following result can be found in [21, Theorem 12] and its proof.
Lemma 2.1 (Shin-Zeng ).For σSn, we have
(2-31,31-2,des,asc,lda fmax,ldd,lval,lpk,fmax)σ
=(nest,icr,drop,exc +fix,cda,cdd,cval,cpk,fix)Φ(σ)(2.7a)
=(nest,cros,exc,drop +fix,cdd,cda,cval,cpk,fix)(Φ(σ))1,
(Lval,Lpk,Lda,Ldd)σ= (Cval,Cpk,Cda Fix,Cdd)Φ(σ),(2.7b)
and
(2-31)iσ=nestiΦ(σ)i= 1, . . . , n. (2.7c)
8 B. HAN, J. MAO, AND J. ZENG
2.3. The bijection Ψ.Given a permutation σSn, let
ˆσ=1 2 . . . n n + 1
σ(1) + 1 σ(2) + 1 . . . σ(n) + 1 1 ,(2.8)
and τ:= Φ(ˆσ)Sn+1. Since the last element of ˆσis 1, the first element of τshould be
n+ 1. Define the bijection Ψ : SnSnby
Ψ(σ) := τ(2) . . . τ (n+ 1) Sn.(2.9)
Example 2.2. If σ=412796583, then ˆσ=52381076941, and reading
from left to right, we obtain the corresponding numbers (2-31)iˆσ: 1,1,1,2,0,1,1,0,0,0for
i= 5,2,...,1, andf
f0=1
4
2
9
4
5
6
7
7
10,g
g0=3
2
5
3
8
8
9
6
10
1.
Hence
w=f
f0
g
g0=1
4
2
9
4
5
6
7
7
10
3
2
5
3
8
8
9
6
10
110
1
3
2
5
3
1
4
4
5
9
6
6
7
8
8
2
9
7
10.
Thus τ= Φ(ˆσ)=10351496827, and Ψ(σ) = τ(2) . . . τ (10) = 3 5 1 4 9 6 8 2 7.
Lemma 2.3. For i[n], we have
(2-31)i+1 ˆσ=((2-13)iσ+ 1 if i+ 1 Lval ˆσLda ˆσ,
(2-13)iσif i+ 1 Lpk ˆσLdd ˆσ.
Proof. An increasing (resp. decreasing) run of σis a maximum consecutive increasing
(resp. decreasing) subsequence R:= σ(i)σ(i+ 1) . . . σ(j)of σsuch that σ(i1) > σ(i)and
σ(j)> σ(j+ 1) (resp. σ(i1) < σ(i)and σ(j)< σ(j+ 1)) with 1ijn. For any
i[n], as ˆσ(n+ 1) = 1, there is a unique way to write
ˆσ=(w1(i+ 1)u1d2. . . uk1dkif i+ 1 Lval ˆσLda ˆσ,
w1(i+ 1)d1u2d2. . . ukdkif i+ 1 Lpk ˆσLdd ˆσ,
where ui(resp. di) is an increasing (resp. decreasing) run, and (i+ 1)u1(resp. (i+ 1)d1)
is an increasing (resp. decreasing) sequence. We say that a run Rcovers iif iis bounded
by max(R)and min(R). It is not hard to show that
#{j2 : ujcovers i+ 1}=(#{j2 : djcovers i+ 1}+ 1 if i+ 1 Lval ˆσLda ˆσ,
#{j2 : djcovers i+ 1}if i+ 1 Lpk ˆσLdd ˆσ.
Since (2-13)i(resp. (2-31)i) is the number of increasing (resp. decreasing) runs covering i
to the right of i, we are done.
We use the aforementioned statistics to define variant boundary conditions. Given a
permutation σSnwith convention 0, the number of corresponding peaks, valleys,
double ascents, and double descents of permutation σSnis denoted by rpk σ,rval σ,rda σ,
rdd σrespectively. A double descent σ(i)is called a aftermaximum (resp. foreminimum) of
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 9
σif it is at the same time a right-to-left maximum (resp. left-to-right minimum). Denote
the number of aftermaxima (resp. foreminimum) of σby amax σ(resp. fmin σ). For
σ=σ(1)σ(2) ···σ(n)Sn, we define two permutations σcand σrby
σc(i) = n+ 1 σ(i)and σr(i) = σ(n+ 1 i)for i[n].(2.10)
It is not difficult to verify the following properties
(2-31,31-2,des,lda fmax,ldd,lval,fmax)σ(2.11a)
=(13-2,2-13,asc,rdd amax,rda,rval,amax)σr(2.11b)
=(31-2,2-31,des,lda amin,ldd,lpk,amin)σrc(2.11c)
=(2-13,13-2,asc,rdd fmin,rda,rval,fmin)σrcr,(2.11d)
where σrc= (σr)cand σrcr= (σrc)r= (σr)cr.
2.4. The star variation. For σ=σ(1) ··· σ(n)Sn, we define its star companion σas
a permutation of {0, . . . , n}by
σ=0 1 2 . . . n
n σ(1) 1σ(2) 1. . . σ(n)1.(2.12)
We define the following sets of cyclic star statistics for σ:
Cpkσ={i[n1] : (σ)1(i)< i > σ(i)},(2.13a)
Cvalσ={i[n1] : (σ)1(i)> i < σ(i)},(2.13b)
Cdaσ={i[n1] : (σ)1(i)< i < σ(i)},(2.13c)
Cddσ={i[n1] : (σ)1(i)> i > σ(i)},(2.13d)
Fixσ={i[n1] : i=σ(i)},(2.13e)
Wexσ={i[n1] : iσ(i)},(2.13f)
Dropσ={i[n] : i>σ(i)}.(2.13g)
The corresponding cardinalties are denoted by cpk,cval,cda,cdd,fix,wexand drop,
respectively. By (2.13a), (2.13d) and (2.13g), we have drop1 = cdd+cpk.Let cyc σ
be the number of cycles of σand cycσ:= cycσ. For example, for σ= 3762154, we have
σ= 72651043, which has two cycles 12641and 73507. Thus
cycσ= 2.
For any subsebt SN, we write S+ 1 := {s+ 1 : sS}.
Theorem 2.4. For σSn, we have
(Val,Pkn,Da,Dd)σ= (Cval,Cpk,CdaFix,Cdd)Ψ(σ)(2.14)
with Pknσ= Pk σ\ {n}and
((2-13)i,(31-2)i)σ= (nesti,crosi)Ψ(σ)for i[n].(2.15)
10 B. HAN, J. MAO, AND J. ZENG
Proof. For σSn, by definition (2.8), (2.9) and (2.12), we have
τ(i+ 1) = (Ψ(σ))(i)+1.(2.16)
and
((Val σ+ 1) {1},Pk σ+ 1,Da σ+ 1,Dd σ+ 1) = (Lval,Lpk,Lda,Ldd)ˆσ. (2.17)
For 2in, by (2.2) and (2.16) we have the following equivalences:
iCval τ i1Cval(Ψ(σ))
and
i<τ(i)and i<τ1(i) i < Ψ(σ)(i1) and i1<(Ψ(σ))1(i).
Thus, by (2.8) and (2.9),
(CvalΨ(σ) + 1) {1}= Cval Φ(ˆσ).(2.18)
In the same vein, we have
CpkΨ(σ) + 1 = Cpk Φ(ˆσ)\ {n+ 1},
CdaΨ(σ)FixΨ(σ) + 1 = Cda Φ(ˆσ)Fix Φ(ˆσ),(2.19)
CddΨ(σ) + 1 = Cdd Φ(ˆσ).
Comparing (2.17) and (2.18)-(2.19) and using (2.7b) we derive (2.14).
Next, for (2.15), we only prove nestiΨ(σ) = (2-13)iσand leave crosiΨ(σ) = (31-2)iσto
the interested reader. By Lemma 2.3 we have
(2-31)i+1 ˆσ=((2-13)iσ+ 1 if i+ 1 Lval ˆσLda ˆσ,
(2-13)iσif i+ 1 Lpk ˆσLdd ˆσ. (2.20)
So, if we show that
(nest)i+1τ=((nest)iΨ(σ)+1 if i+ 1 Cval τCda τFix τ,
(nest)iΨ(σ)if i+ 1 Cpk τCdd τ , (2.21)
as τ= Φ(ˆσ)and by (2.7b),
(Lval,Lpk,Lda,Ldd)ˆσ= (Cval,Cpk,Cda Fix,Cdd)Φ(ˆσ),(2.22)
the result follows from the identity nestiτ= (2-31)iˆσ(see (2.7c)).
Now we prove (2.21). By (2.4c) the index nestiσ(i[n]) can be characterized in terms
of σ(see (2.12)) as follows:
nestiσ= #{j[n] : j < i σ(i)< σ(j)or σ(j)< σ(i)< i < j}.(2.23)
We consider three cases of i+ 1.
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 11
(a) if i+ 1 < τ (i+ 1), then i < (Ψ(σ))(i). By (2.16), we have
#{j[n] : j+ 1 < i + 1 < τ (i+ 1) < τ(j+ 1)}(2.24a)
=#{j[n] : j < i (Ψ(σ))(i)<(Ψ(σ))(j)}
and
#{j[n] : j+ 1 > i + 1 τ(i+ 1) > τ(j+ 1)}(2.24b)
= #{j[n] : j > i > (Ψ(σ))(i)>(Ψ(σ))(j)}.
Since τ(1) = n+ 1 and 1< i + 1 < τ(i+ 1) < n + 1, by (2.4c), (2.24a) and (2.24b)
we obtain
nesti+1 τ= 1+#{j[n] : j+ 1 < i + 1 < τ (i+ 1) < τ(j+ 1)}
+#{j[n] : j+ 1 > i + 1 τ(i+ 1) > τ(j+ 1)}
= 1+#{j[n] : j < i (Ψ(σ))(i)<(Ψ(σ))(j)}
+#{j[n] : j > i > (Ψ(σ))(i)>(Ψ(σ))(j)},
which is equal to nestiΨ(σ)+1by (2.23).
(b) if i+ 1 > τ(i+ 1), then i > (Ψ(σ))(i). Similarly to (a) we get nesti+1τ=nestiΨ(σ).
(c) if i+ 1 = τ(i+ 1), then i= (Ψ(σ))(i). It is easy to see that
#{j[n+ 1] : j > i + 1 > τ (j)}= #{j[n+ 1] : j < i + 1 < τ (j)}.(2.25)
As τ(1) = n+ 1, we have
#{j[n+ 1] : j > i + 1 > τ (j)}=#{j[n+ 1] : j < i + 1 < τ (j)}
=#{j[n] : j+ 1 < i + 1 < τ (j+ 1)}+ 1
=#{j[n] : j < i < (Ψ(σ))(j)}+ 1 (by (2.16))
Then, we have nesti+1τ=nestiΨ(σ)+1 by using (2.4c) (resp. (2.23) ) to compute
nesti+1τ(resp. nestiΨ(σ)).
Since asc =val +da,des =pk +dd 1,wex=cval+cda+fix,drop1 = cdd+cpk,
we get the following result in [21, Theorem 12].
Corollary 2.1 (Shin-Zeng).For σSnwe have
(2-13,31-2,des,asc,da,dd,val)σ
=(nest,cros,drop1,wex,cda+fix,cdd,cval)Ψ(σ).(2.26)
2.5. Laguerre histories as permutation encodings. A 2-Motzkin path is a lattice path
starting and ending on the horizontal axis but never going below it, with possible steps
(1,1),(1,0), and (1,1), where the level steps (1,0) can be given either of two colors: blue
and red, say. The length of the path is defined to be the number of its steps. For our
purpose it is convenient to identify a 2-Motzkin path of length nas a word s:= s1. . . sn
12 B. HAN, J. MAO, AND J. ZENG
•••
pi00010110
LbLrLrLb
Figure 2. A Laguerre history (s,p)of lenth 8.
on the alphabet {U,D,Lr,Lb}such that |s1. . . sn|U= [s1. . . sn|Dand the height of the ith
step is nonnegative, i.e.,
hi(s) := |s1. . . si|U[s1. . . si|D0 (i= 1, . . . , n),(2.27)
where |s1. . . si|Uis the number of letters Uin the word s1. . . si. By (1.8a) we see that the
number of 2-Motzkin paths of length nis the Catalan number Cn+1 .
ALaguerre history (resp. restricted Laguerre history) of length nis a pair (s,p), where
sis a 2-Motzkin path s1. . . snand p= (p1, . . . , pn)with 0pihi1(s)(resp. 0pi
hi1(s)1if si=Lror D) with h0(s)=0. Let LHn(resp. LH
n) be the set of Laguerre
histories (resp. restricted Laguerre histories) of length n. There are several well-known
bijections between Snand LH
nand LHn1, see [6,8].
2.6. Françon-Viennot bijection. We recall a version of Françon and Viennot’s bijection
ψF V :Sn+1 LHn. Given σSn+1, the Laguerre history ψF V (σ)=(s,p)is defined as
follows:
si=
Uif iVal σ
Dif iPk σ
Lbif iDa σ
Lrif iDd σ
(2.28)
and pi= (2-13)iσfor i= 1, . . . , n.
For example, if σ=412796583S9, then
(s,p) = ((U,Lb,Lr,D,U,Lr,Lb,D),(0,0,0,1,0,1,1,0)) LH8,
which is depicted in Figure 2.
For σSn+1, we define the following sets
Scval = {i[n] : i<σ(i)and i+ 1 σ1(i+ 1)},(2.29a)
Scpk = {i[n] : iσ(i)and i+ 1 > σ1(i+ 1)},(2.29b)
Scda = {i[n] : i<σ(i)and i+ 1 > σ1(i+ 1)},(2.29c)
Scdn = {i[n] : iσ(i)and i+ 1 σ1(i+ 1)}.(2.29d)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 13
σDD 4,k σ σrΨ(σ)SDE 4,k (31-2)σ(2-13)σinvΨ(σ)excΨ(σ)
k= 0 1324 4231 1423 0 1 2 1
1423 3241 1432 1 0 3 1
2314 4132 4123 0 2 3 1
2413 3142 4132 1 1 4 1
k= 1 3412 2143 3214 1 0 3 1
2134 4312 3124 0 1 2 1
3124 4213 4213 1 1 4 1
4123 3214 4231 2 0 5 1
Figure 3. Illustration of Ψon DD 4,k with their statistics.
Yan, Zhou and Lin [27] constructed a bijection ψY Z L :Sn+1 LHn, which can be
defined as follows. For σSn+1, let ψY ZL (σ) = (s,p)with
si=
Uif iScval σ,
Dif iScpk σ,
Lbif iScda σ,
Lrif iScdn σ,
(2.30)
and pi=nestiσfor i= 1, . . . , n.
Theorem 2.5. We have ψF V =ψY ZL Ψ.
Proof. Let ψ=ψF V Ψ1, which is a bijection from Sn+1 to LHn. By Theorem 2.4, for
σSn+1, we can define ψ(σ)=(s,p)as follows: for i= 1, . . . , n,
si=
Uif iCvalσ,
Dif iCpkσ,
Lbif iCdaσFixσ,
Lrif iCddσ,
(2.31)
with pi=nestiσ. Comparing (2.30) and (2.31) it suffices to show that for σSn+1,
(Scval,Scpk,Scdn,Scda)σ= (Cval,Cpk,Cdd,CdaFix)σ. (2.32)
We just prove Scval σ= Cvalσand omit the similar proof of other cases. As Cval(σ) =
{i:i+ 1 < σ(i), i < σ1(i+ 1)}, comparing with (2.29a) we need only to show that
Scval σCvalσ. If iScval(σ), then i<σ(i)and i+ 1 σ1(i+ 1). Suppose
i+ 1 = σ(i), then σ1(i+ 1) = i, which contradicts the second inequality. So i+ 1 < σ(i),
and iCvalσ. We are done.
Given a 2-Motzkin path sof length nwe define θ(s)to be the 2-Motzkin path obtained
by switching all the letters Lbwith Lrin s. By abuse of notation, for a Laguerre history
(s,p) LHnwe define
θ(s,p)=(θ(s),p).(2.33)
14 B. HAN, J. MAO, AND J. ZENG
Corollary 2.2. The two sextuple statistics
(nest,cros,exc,cdd,cda+fix,cpk)and (2-13,31-2,des,da,dd,pk 1)
are equidistributed on Sn.
Proof. For σSn, let τ=ψ1θψF V (σ). It follows from (2.33), (2.28) and (2.31) that
(Val,Pkn,Dd,Da,(2-13)i)σ
=(Cval,Cpk,CdaFix,Cdd,nesti)τ, i[n].
Let ψF V (σ)=(s,p)and ψ(τ)=(s0,p0). Then hi(s,p) = hi(s0,p0)for all i[n]. It is not
difficult to prove by induction that
(2-13)iσ+ (31-2)iσ=hi1(s,p),(2.34a)
nestiσ+crosiσ=hi1(s0,p0).(2.34b)
Thus we have (31-2)iσ=crosiτ. As exc =wex=cval+cda+fix,des =val +dd,
cpk=cval, and val =pk 1, the proof is completed.
For k[n]we define the subsets of Sn:
DD n,k :={σSn:des σ=k, dd σ= 0},(2.35a)
DE
n,k :={σSn:exc σ=k, cdaσ+fixσ= 0},(2.35b)
SDE n,k :={σSn:exc σ=k, scda(σ)=0}.(2.35c)
Theorem 2.6. For 0k(n1)/2we have
γn,k(q) := X
σDD n,k
q2(31-2)σ+(2-13)σ(2.36a)
=X
σDE
n,k
qinv σexc σ(2.36b)
=X
σSDE n,k
qinv σexc σ.(2.36c)
Proof. For σSn, recall that σr:= σ(n)··· σ(2)σ(1) (see (2.10)). By (2.26),
2(31-2) + 2-13σ=2(2-13) + 31-2σr= (2nest +cros)Ψ(σr).
Invoking the following formula for inversion numbers (cf. [20, Eq. (40)])
inv =exc + 2nest +cros,(2.37)
we derive 2(31-2) + (2-13)σ= (inv exc)Ψ(σr).(2.38)
Besides, by (2.26) and (2.32) we have
(des,dd)σ= (asc,da)σr
= (wex,cda+fix)Ψ(σr)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 15
= (cval+cda+fix,cda+fix)Ψ(σr).
Hence, if dd(σ)=(cda+fix)Ψ(σ)=0, from (2.26) we see that σDD n,k if and only if
Ψ(σr)DE
n,k. By (2.38) this implies (2.36b). Finally, we derive (2.36c) from (2.32).
Remark 2.7. Yang-Zhou-Lin [27] proved that
γn,k(q) = X
σDD n,k
q(31-2)σ+2(2-13)σ
which first appeared as the γ-coefficents of the polynomial PσSntexcσqinvσexcσin [22].
2.7. Restricted Françon-Viennot bijection. We recall a restricted version of Françon
and Viennot’s bijection φF V :Sn LH
n. Given σSn, the Laguerre history (s,p)is
defined as follows:
si=
Uif iLval σ
Dif iLpk σ
Lbif iLda σ
Lrif iLdd σ
(2.39)
and pi= (2-31)iσfor i= 1, . . . , n.
2.8. Foata-Zeilberger bijection. This bijection φF Z encodes permutations using cyclic
statistics. Given σSn,φF Z :Sn LH
nis for i= 1, . . . , n,
si=
Uif iCval σ
Dif iCpk σ
Lbif iCda σFix σ
Lrif iCdd σ
(2.40)
with pi=nestiσ. By (2.7b) and (2.7c), we can build a comutative diagram, see the right
diagram of Figure 1.
2.9. Pattern avoidances and 2-Motzkin paths. We shall consider the so-called vincu-
lar patterns [2]. The number of occurrences of vincular patterns 31-2,2-31,2-13 and 13-2
in πSnare defined (cf. (2.1)) by
(31-2) π= #{(i, j) : i+ 1 < j nand π(i+ 1) < π(j)< π(i)},
(2-31) π= #{(i, j) : j < i < n and π(i+ 1) < π(j)< π(i)},
(2-13) π= #{(i, j) : j < i < n and π(i)< π(j)< π(i+ 1)},
(13-2) π= #{(i, j) : i+ 1 < j nand π(i)< π(j)< π(i+ 1)}.
(2.41)
Similarly, we use Sn(31-2) to denote the set of permutations of length nthat avoid the
vincular pattern 31-2, etc. In order to apply Laguerre history to count pattern-avoiding
permutations, we will need the following results in [14, Lemma 2.8 and 2.9].
16 B. HAN, J. MAO, AND J. ZENG
Lemma 2.8. [14, Lemma 2.8] For any n1, we have
Sn(2-13) = Sn(213),Sn(31-2) = Sn(312),(2.42)
Sn(13-2) = Sn(132),Sn(2-31) = Sn(231).(2.43)
Lemma 2.9. [14, Lemma 2.9]
(i) A permutation πSnbelongs to Sn(321) if and only if nestπ= 0.
(ii) The mapping Φhas the property that Φ(Sn(231)) = Sn(321).
We use 2-Mnto denote the set of 2-Motzkin paths of length nand 2-M
nto denote its
subset that is composed of 2-Motzkin paths without Lr-step at level zero, i.e., if hi1= 0,
then si6=Lr. Let e
φF V ,e
φF Z ,e
ψF V and e
ψY ZL be the restriction of φF V ,φF Z ,ψF V and ψY ZL
on the sets Sn(231),Sn(321),Sn+1(213) and Sn+1 (321), respectively.
Theorem 2.10. We have
(1) The mapping e
φF V is a bijection from Sn(231) to 2-M
n.
(2) The mapping e
φF Z is a bijection from Sn(321) to 2-M
n.
(3) The mapping e
ψF V is a bijection from Sn(213) to 2-Mn.
(4) The mapping e
ψY ZL is a bijection from Sn(321) to 2-Mn.
Proof. We just prove (1) and leave the others to the reader. If σ1,σ2Sn(231), let
φF V (σi) = (si,pi)for i= 1,2. By definition we have (2-31)σ1= (2-31)σ2= 0, which implies
that p1=p2= (0,0,··· ,0); as φF V is a bijection, we derive that s16=s2. Hence, the
mapping e
φF V is an injection from Sn(231) to 2-M
n. Noticing that the g.f. Pn0|2-M
n|zn
has the continued fraction expansion (1.8b) with t= 1, we derive that |Sn(231)|=|2-M
n|=
Cn. Thus, the mapping e
φF V is a bijection.
Theorem 2.11. Let e
Φbe the restriction of Φon Sn(231). Then e
Φis a bijection from
Sn(231) to Sn(321). Moreover, for σSn(231), we have
(31-2,des,asc,lda fmax,ldd,lval,lpk,fmax)σ
=(icr,drop,exc +fix,cda,cdd,cval,cpk,fix)e
Φ(σ)(2.44)
=(cros,exc,drop +fix,cdd,cda,cval,cpk,fix)(e
Φ(σ))1.
Proof. For σSn(231), we have (2-31)i= 0 for i[n]. So the inversion bottom (resp.
top) number of each letter in f0(resp. g0) equals 0. Let τ=e
Φ(σ). By definition of Φ(cf.
Section 2.2) the letters in f0(resp. g0) are in increasing order. It is not hard to verify that
nesti(τ)=0for each i[n]. By Lemma 2.9, we derive that τSn(321). For σ1, σ2
Sn(231), since Φis a bijection, we have e
Φ(σ1)6=e
Φ(σ2). And |Sn(231)|=|Sn(321)|=Cn,
so e
Φis a bijection from Sn(231) to Sn(321). Finally, the equidistribution (2.44) follows
from Lemma 2.1.
Theorem 2.12. Let e
Ψbe the restriction of Ψon Sn(213). Then e
Ψis a bijection from
Sn(213) to Sn(321).
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 17
2-Mn
Sn+1(213) Sn+1(321)
e
ψF V e
ψY ZL
e
Ψ
2-M
n
Sn(231) Sn(321)
e
φF V e
φF Z
e
Φ
Figure 4. Two factorizations: e
ψF V =e
ψY ZL e
Ψand e
φF V =e
φF Z e
Φ
Proof. If σSn(213), then (2-13)iσ= 0 for i[n]. Thus, (2-31)1ˆσ= 0, and by Lemma 2.3,
(2-31)i+1 ˆσ= 1 if i+ 1 is a nondescent top and (2-31)i+1 ˆσ= 0 otherwise. By definition of Φ,
we construct two biwords, f
f0and g
g0, where f(resp. g) is the subword of descent bottoms
(resp. nondescent bottoms) in ˆσordered increasingly, and f0(resp. g0) is the permutation
of descent tops (resp. nondescent tops) in ˆσsuch that the letters (resp. except 1at the
end) in f0(resp. g0) are in increasing order.
Let τ= Φ(ˆσ). It is not hard to verify that nesti(τ) = 1 if ig0\ {1}and nesti(τ) = 0
otherwise. Thus, by (2.21), we have nest(e
Ψ(σ)) = 0. By Lemma 2.9,e
Ψ(σ)Sn(321).
For σ1, σ2Sn(213), since Ψis a bijection, we have e
Ψ(σ1)6=e
Ψ(σ2). And |Sn(213)|=
|Sn(321)|=Cn, so e
Ψis a bijection from Sn(213) to Sn(321).
Example 2.13. If σ=168972534, then ˆσ=27910836451, and reading
from left to right, we obtain the corresponding numbers (2-31)i: 1,1,1,0,0,1,0,1,0,0for
i= 2,7,...,1, andf
f0=1
5
3
6
4
8
8
10,g
g0=2
2
5
3
6
4
7
7
9
9
10
1.
Hence
w=f
f0
g
g0=1
5
3
6
4
8
8
10
2
2
5
3
6
4
7
7
9
9
10
110
1
2
2
5
3
6
4
1
5
3
6
7
7
4
8
9
9
8
10.
Thus τ= Φ(ˆσ)=10256137498, and e
Ψ(σ) = τ(2) . . . τ (10) = 2 5 6 1 3 7 4 9 8.
Combining Theorems 2.10,2.11,2.12 and Figure 1we obtain the diagrams in Figure 4.
3. Main results
For a finite set of permutations and mstatistics stat1,...,statmon , we define the
generating polynomial
P(stat1,...,statm)(Ω; t1, . . . , tm) := X
σ
tstat1σ
1. . . tstatmσ
m.(3.1)
18 B. HAN, J. MAO, AND J. ZENG
We define the polynomial
An(p, q, t) := X
σSn
pnest σqcros σtexc σ.(3.2)
The following is a generalization of Stembridge’s identity (1.4).
Theorem 3.1. For n1, we have
An(p, q, t) = 1 + xt
1 + xn1
P(nest,cros,cpk,exc)Sn;p, q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.3)
equivalently,
P(nest,cros,cpk,exc)(Sn;p, q, x, t) = 1 + u
1 + uv n1
An(p, q, v),(3.4)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
By Corollary 2.2, we obtain the following linear generalization of Stembridge’s identity.
Corollary 3.1. For n1, we have
An(p, q, t) = 1 + xt
1 + xn1
P(2-13,31-2,pk1,des)Sn;p, q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.5)
equivalently,
P(2-13,31-2,pk1,des)(Sn;p, q, x, t) = 1 + u
1 + uv n1
An(p, q, v),(3.6)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Remark 3.2. When x= 1 or p=q= 1 we recover two special cases of (3.3) due to
Brändén [3, Eq (5.1)] and Zhuang [29, Theorem 4.2], respectively.
With Lemma 2.8 and (2.6), letting p= 0 (resp. q= 0) in Corollary 3.1, we obtain the
following corollary.
Corollary 3.2. For all positive integers nand each triple statistic
(τ, stat1,stat2)∈{(213,31-2,val),(312,2-13,val)},
we have
P(stat1,des)(Sn(τ); q, t)
=1 + xt
1 + xn1
P(stat1,stat2,des)Sn(τ); q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.7)
equivalently,
P(stat1,stat2,des)(Sn(τ); q, x, t) = 1 + u
1 + uv n1
P(stat1,des)(Sn(τ); q, v),(3.8)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 19
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Remark 3.3. When x= 1, (3.7) reduces to [14, Eqs. (1.5) and (1.6)]. When (τ, stat1,stat2) =
(213,31-2,val)and q= 1, (3.7) reduces to [29, Corollary 5.3].
From (2.37) and (3.3) we derive the following result, which is an extension of Shin and
Zeng [22, Theorem 1].
Corollary 3.3. For n1,
X
σSn
qinv σexc σtexc σ
=1 + xt
1 + xn1
P(2-13,31-2,pk1,des)Sn;q2, q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt.
(3.9)
Define the cycle-refinement of the Eulerian polynomial An(t)by
A(cycfix,exc)
n(q, t) := X
σSn
q(cycfix)σtexc σ,
we obtain a cyclic analogue of Zhuang’s formula [29, Theorem 4.2].
Theorem 3.4. For n1, we have
A(cycfix,exc)
n(q, t)
=1 + xt
1 + xn1
P(cycfix,cpk,exc)Sn;q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.10)
equivalently,
P(cycfix,cpk,exc)(Sn;q, x, t) = 1 + u
1 + uv n1
An(q, v),(3.11)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Let p=q= 1 in (3.3) or q= 1 in (3.10), we get the following corollary.
Corollary 3.4. For n1, we have
An(t) = 1 + xt
1 + xn1
P(cpk,exc)Sn;(1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.12)
equivalently,
P(cpk,exc)(Sn;x, t) = 1 + u
1 + uv n1
An(v),(3.13)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
20 B. HAN, J. MAO, AND J. ZENG
Recall that a permutation σSnis a derangement if it has no fixed points, i.e., σ(i)6=i
for all i[n]. Let
D(stat1,stat2)
n(q, t) := X
σDn
qstat1σtstat2σ,
where Dnis the set of derangements in Sn.
Taking (p, q, tq, r)=(q, 1, t, 0) (resp. (p, q, tq, r)=(q2, q, tq, 0)) in Theorem 3.6 and by
(2.37), we obtain the following corollary.
Corollary 3.5. For all positive integers nand for each statistic stat {nest,inv},
D(stat,exc)
n(q, t) = 1 + xt
1 + xn
P(stat,cpk,exc)Dn;q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.14)
equivalently,
P(stat,cpk,exc)(Dn;q, x, t) = 1 + u
1 + uv n
D(stat,exc)
n(q, v),(3.15)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
By (2.37) and Lemma 2.9, the r= 0 case of (3.22) yields the following result in parallel
with Corollary 3.5, which generalizes Lin’s identity [16, Theorem 1.4].
Corollary 3.6. For n1,
P(inv,exc)(Dn(321); q, t)(3.16)
=1 + xt
1 + xn
P(inv,cpk,exc)Dn(321); q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,
equivalently,
P(inv,cpk,exc)(Dn(321); q, x, t) = 1 + u
1 + uv n
P(inv,exc)(Dn(321); q, v),(3.17)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Moreover, we have the the following formula.
Theorem 3.5. For all positive integers n,
D(cyc,exc)
n(q, t) = 1 + xt
1 + xn
P(cyc,cpk,exc)Dn;q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(3.18)
equivalently,
P(cyc,cpk,exc)(Dn;q, x, t) = 1 + u
1 + uv n
D(cyc,exc)
n(q, v),(3.19)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 21
Theorem 3.6. For n1,
P(nest,cros,exc,fix)(Sn;p, q, tq, r)
=1 + xt
1 + xn
P(nest,cros,cpk,exc,fix)Sn;p, q, (1 + x)2t
(x+t)(1 + xt),q(x+t)
1 + xt ,(1 + x)r
1 + xt ,(3.20)
equivalently,
P(nest,cros,cpk,exc,fix)(Sn;p, q, x, qt, r)
=1 + u
1 + uv n
P(nest,cros,exc,fix)Sn;p, q, qv, (1 + uv)r
1 + u,(3.21)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Remark 3.7. Cooper et al. [7, Theorem 11] have recently proved the p=q= 1 case of
(3.20) by applying Sun and Wang’s CMFS action [26], see (4.1).
Applying Lemma 2.9 and Theorem 3.6 with p= 0, we obtain the following result.
Corollary 3.7. For n1,
P(cros,exc,fix)(Sn(321); q, tq, r)
=1 + xt
1 + xn
P(cros,cpk,exc,fix)Sn(321); q, (1 + x)2t
(x+t)(1 + xt),q(x+t)
1 + xt ,(1 + x)r
1 + xt ,(3.22)
equivalently,
P(cros,cpk,exc,fix)(Sn(321); q, x, qt, r)
=1 + u
1 + uv n
P(cros,exc,fix)Sn(321); q, qv, (1 + uv)r
1 + u,(3.23)
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
Consider the generalized q-Narayana polynomials Nn(t, q, r)defined by
Nn(t, q, r) := X
σSn(321)
texc σqinv σrfix σ.(3.24)
In particular, we have
Nn(t/q, q, 1) = X
σSn(321)
texc σqinv σexc σ,(3.25)
Nn(t, q, t) = X
σSn(321)
twex σqinv σ.(3.26)
Fu et al. [14] gave more interpretations of Nn(t/q, q, 1) and Nn(t, q, t)in terms of n-
permutation patterns. We further prove the following interpretations by using the (n1)-
permutation patterns.
22 B. HAN, J. MAO, AND J. ZENG
Table 1. Five choices of (τ, stat1,stat2,stat3)
#τstat1stat2stat3
1321 exc inv fix
2231 des des + 31-2fmax
3132 asc asc + 2-13 amax
4312 des des + 2-31 amin
5213 asc asc + 13-2fmin
Theorem 3.8. For n1, the following identities hold
Nn(t/q, q, 1) = X
σSn1(τ)
tstat1σqstat2σ(1 + t)stat3σ,(3.27)
Nn(t, q, t) = tnX
σSn1(τ)
(q/t)stat1σqstat2σ(1 + q/t)stat3σ,(3.28)
where five choices for the quadruples (τ , stat1,stat2,stat3)are listed in Table 1.
For 0kn, define the sets
e
Sn,k(321) = {σSn(321) : exc σ=k, cda σ= 0},(3.29a)
e
Sn,k(213) = {σSn(213) : asc σ=k, rda σ= 0},(3.29b)
e
Sn,k(312) = {σSn(312) : des σ=k, ldd σ= 0},(3.29c)
e
Sn,k(132) = {σSn(132) : asc σ=k, rda σ= 0},(3.29d)
e
Sn,k(231) = {σSn(231) : des σ=k, ldd σ= 0},(3.29e)
and e
Sn(τ) = n
k=0 e
Sn,k(τ)for τS3.
Theorem 3.9. For n1, the following q-analogue of (1.10)holds
Nn(t/q, q, 1) =
bn1
2c
X
k=0
γn1,k(q)tk(1 + t)n12k,(3.30a)
where
γn1,k(q) = X
π
e
Sn1,k(321)
qinv π(3.30b)
=X
π
e
Sn1,k(231)
q(31-2) π+des π=X
π
e
Sn1,k(312)
q(2-31) π+des π(3.30c)
=X
π
e
Sn1,k(132)
q(2-13) π+asc π=X
π
e
Sn1,k(213)
q(13-2) π+asc π.(3.30d)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 23
Theorem 3.10. For n1, the following q-analogue of (1.10)holds
Nn(t, q, t) =
bn+1
2c
X
k=1 eγn1,k1(q)tk(1 + t/q)n+12k,(3.31)
where
eγn1,k1(q) = X
π
e
Sn1,k(321)
qn1+inv πexc π(3.32)
=X
π
e
Sn1,k1(231)
qn1+(31-2) π=X
π
e
Sn1,k1(312)
qn1+(2-31) π(3.33)
=X
π
e
Sn1,k1(132)
qn1+(2-13) π=X
π
e
Sn1,k1(213)
qn1+(13-2) π.(3.34)
Remark 3.11. Other interpretations for γn1,k(q)and eγn1,k1(q)are given in [14,16,17].
Let Bnbe the set of permutations σof 1,...,±n}with σ(i) = σ(i)for every
i[n]. From Steingrímsson [23, Definition 3], we define the excedance of σ Bnby
i <fσ(i)for i[n], in the friends order <fof 1,...,±n}:
1<f1<f2<f2<f··· <fn <fn,
and denote the number of excedances of σby excB(σ). Following Brenti [4] we say that
i {0,1, . . . , n 1}is a B-descent of σif σ(i)> σ(i+ 1) in the natural order <of
1,...,±n}:
n < ··· <2<1<1<2<··· < n,
where σ(0) = 0. Denote the number of B-descents of σby desB(σ). Brenti [4, Theorem 3.4]
considered the Eulerian polynomials of type B
Bn(y, t) := X
σ∈Bn
yneg σtdesBσ(3.35)
and proved the following exponential g.f.
X
n0
Bn(y, t)zn
n!=(1 t)ez(1t)
1tez(1t)(1+y)
=ey(t1)zS((1 + y)z;t),(3.36)
where S(z;t) := (1t)ez(1t)
1tez(1t)is the exponential g.f. of type A Eulerian polynomials An(t).
Our main results for the polynomials Bn(y, t)are the following two theorems.
Theorem 3.12. We have
Bn(y, t) = X
σ∈Bn
yneg σtexcBσ.(3.37)
24 B. HAN, J. MAO, AND J. ZENG
Theorem 3.13. For n1,
Bn(y, t) = (1 + yt)nP(cpk,exc)Sn;(1 + y)2t
(y+t)(1 + yt),y+t
1 + yt ,(3.38a)
equivalently,
P(cpk,exc)(Sn;y, t) = 1
(1 + uv)nBn(u, v),(3.38b)
where u=1+t22yt(1t)(1+t)24yt
2(1y)tand v=(1+t)22yt(1+t)(1+t)24yt
2yt .
4. Proofs using group actions
In this section, using group actions we shall prove Theorem 3.5 and Theorem 3.6, re-
spectively, in the following two subsections.
4.1. Proof of Theorem 3.5.Let σSnwith convention 0–. For any x[n], the
x-factorization of σreads σ=w1w2xw3w4,where w2(resp. w3) is the maximal contiguous
subword immediately to the left (resp. right) of xwhose letters are all smaller than x.
Following Foata and Strehl [11] we define the action ϕxby
ϕx(σ) = w1w3xw2w4.
Note that if xis a double ascent (resp. double descent), then w3=(resp. w2=),
and if xis a valley then w2=w3=. For instance, if x= 5 and σ= 26471583 S7,
then w1= 2647, w2= 1, w3=and w4= 83. Thus ϕ5(σ) = 26475183. Clearly, ϕxis an
involution acting on Snand it is not hard to see that ϕxand ϕycommute for all x, y [n].
Brändén [3] modified the map ϕxto be
ϕ0
x(σ) := (ϕx(σ)if xis not a peak of σ,
σif xis a peak of σ.
It is clear that ϕ0
xis involution and commutes with ϕ0
yfor x6=y. For any subset S[n]
with S={x1, . . . , xr}we then define the map ϕ0
S:SnSnby
ϕ0
S(σ) = Y
xS
ϕ0
x(σ)
where QxSϕ0
x=ϕ0
x1 ··· ϕ0
xr. Hence the group Zn
2acts on Snvia the functions ϕ0
S,
S[n]. This action is called the Modified Foata–Strehl action (MFS-action for short).
Recall that a permutation σSncan be factorized into distinct cycles, say C1, C2,··· , Ck,
where each cycle Ccan be written as a sequence C= (a, σ(a), . . . , σr1((a)) with σr(a) = a
for some a, r [n]. We say that stan(σ) := C1C2···Ckis the standard cycle representation
of σif
the largest element of each cycle is at the first position,
the cycles are arranged in increasing order according to their largest elements.
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 25
We define ι(σ)to be the permutation obtained from stan(σ)by erasing the parentheses
of cycles. For example, for σ= 26471583 D8, then stan(σ) = (6512)(8347) and ι(σ) =
65128347.
In this section, we consider the statistics of ι(σ)with the convention 0–.
Lemma 4.1. For σDn, we have
cval σ=lval ι(σ) = lpk T(σ) = cpk σ, lda ι(σ) = exc σcpk σ,
ldd ι(σ) =ncpk σexc σ, lda ι(σ) + ldd ι(σ) = n2cpk σ.
Proof. The first two identities are easily seen by the definitions of σand ι(σ). For the third
identity,
ldd ι(σ) =n(lpk ι(σ) + lval ι(σ) + lda ι(σ))
=n(cpk σ+cval σ+exc σcval σ)
=ncpk σexc σ.
With the second and third identities, the fourth identity can be derived directly.
For σDn, define the map τc
x:Dn7→ Dnby
τc
x(σ) := ι1(ϕ0
x(ι(σ))).
It is easy to see that τc
xis an involution and commutes with τc
yfor x, y [n]. Let S[n],
we define τc
S:DnDnby
τc
S(σ) = Y
xS
τc
x(σ).(4.1)
Sun and Wang [26] defined the group action of Zn
2on Dnvia the involutions τc
Sover all
S[n]; this group action is called the cyclic modified FoataStrehl action, abbreviated
CMFS-action, see Figure 5for an illustration. For any permutation σSn, let Orb(σ) =
{g(σ) : gZn
2}be the orbit of σunder the CMFS-action.
0
6
5
1
2
8
3
4
7
Figure 5. CMFS-actions on (6512)(8347)
26 B. HAN, J. MAO, AND J. ZENG
Remark 4.2. The CMFS-action divides the set Dninto disjoint orbits. Moreover, for
σDn,xis a double drop (resp. double excedance) of σif and only if xis a double
excedance (resp.double drop) of τc
x(σ). A double drop (resp. double excedance) xof σ
remains a double drop (resp. double excedance) of τc
y(σ)for any y6=x. Hence, there is
a unique permutation in each orbit which has no double excedance. Let ˇσbe this unique
element in Orb(σ), and for any other σ0Orb(σ), it can be obtained from ˇσby repeatedly
applying τc
xfor some double drop xof ˇσ. Each time this happens, exc increases by 1and
cdd decreases by 1. Thus by Lemma 4.1, we have
X
σOrb σ
texc σ=texc ˇσ(1 + t)cdd ˇσ=tcpk ˇσ(1 + t)n2cpk ˇσ.(4.2)
We obtain gamma expansion of derangement polynomials immediately by summing over
all the orbits that form Dn.
We can give a more general version of Theorem 3.5. For any subset ΠSnlet
A(exc,cyc)(Π; w, t) := X
σΠ
wcyc σtexc σ.
The set Πis invariant under the CMFS-action if τc
S(σ)Πfor any σΠand any S[n].
Theorem 4.3. If ΠDnis invariant under the CMFS-action, then
A(cyc,exc)(Π; w, t) = 1 + xt
1 + xn
P(cyc,cpk,exc)Π; w, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt,(4.3)
equivalently,
P(cyc,cpk,exc)(Π; x, t, w) = 1 + u
1 + uv n+1
A(cyc,exc)(Π; w, v),
where u=1+t22xt(1t)(1+t)24xt
2(1x)tand v=(1+t)22xt(1+t)(1+t)24xt
2xt .
First we prove the following identity.
Lemma 4.4. Let σDn. We have
(1 + x)cda σ+cdd σX
σ0Orb(σ)
texc σ0=X
σ0Orb(σ)
(1 + xt)cdd σ0(x+t)cda σ0tcval σ0.(4.4)
Proof. Let j=cda σ+cdd σ. By (4.2) the left-hand side of (4.4) is equal to
(1 + x)jtcval ˇσ(1 + t)j=tcval ˇσ(1 + xt +x+t)j.
Let J(σ)be the set of indices of double excedances and double drops of σ, i.e.,
J(σ) := {i[n] : σ(i)is a double excedance or double drop}.
Clearly |J(σ)|=j. By (4.1) CMFS-action establishes a bijection from the set of subsets
of J(σ)to Orb(σ)such that if SJ(σ)then |S|=cdd σ0with σ0=τc
S(σ). Hence the
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 27
right-hand side of (4.4) is equal to
tcvalˇσX
SJ(σ)
(1 + xt)|S|(x+t)j−|S|.
Eq. (4.4) follows then from PS[j](1 + xt)|S|(x+t)j−|S|= (1 + xt +x+t)j.
Proof of Theorem 4.3.With Lemma 4.1 and Eq. (4.4), we have
X
σ0Orb(σ)
texc σ0(1 + x)n2cpk σ0=X
σ0Orb(σ)
(1 + xt)nexc σ0cpk σ0(x+t)exc σ0cpk σ0tcpk σ0,
which is equivalent to
X
σ0Orb(σ)
texc σ0=X
σ0Orb(σ)
(1 + xt)nexc σ0cpk σ0(x+t)exc σ0cpk σ0tcpk σ0
(1 + x)n2cpk σ0.
Then, summing over all the orbits leads to
X
σΠ
texc σ=X
σΠ
(1 + xt)nexc σcpk σ(x+t)exc σcpk σtcpk σ
(1 + x)n2cpk σ.
For σ0Orb(σ), first we have cyc(σ0) = cyc(σ). From the definition of o(σ), we have
cyc(σ)is equal to the number of left-to-right maximum of o(σ). It is easy to see that the
number of left-to-right maximum is invariant under MFS-action. Thus the number cyc(σ0)
is invariant for any σ0Orb(σ). Therefore,
X
σΠ
texc σwcyc σ=X
σΠ
(1 + xt)nexc σcpk σ(x+t)exc σcpk σtcpk σ
(1 + x)n2cpk σwcyc σ
=1 + xt
1 + xn
P(cpk,exc,cyc)Π; (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt, w.
The proof is completed.
Remark 4.5. Recently, using the joint distribution of the cyclic valley number and ex-
cedance number statistics Cooper, Jones and Zhuang [7] have generalized the formula of
Stembridge by applying Sun and Wang’s CMFS-action. In particular they also obtained
the w= 1 case of Theorem 4.3.
4.2. Proof of Theorem 3.6.For our purpose we define a 3-Motzkin path of length nas
a word s:= s1. . . snon the alphabet {U,D,Ly,Lb,Lr}such that |s1. . . sn|U= [s1. . . sn|D
and the height of the ith step is nonnegative, i.e.,
hi(s) := |s1. . . si|U[s1. . . si|D0 (i= 1, . . . , n),(4.5)
where |s1. . . si|Uis the number of letters Uin the word s1. . . si. Let
α(s) := {i[n] : si=α}for α {U,D,Ly,Lb,Lr}.
Avariant restricted Laguerre history of length nis a pair (s,p), where sis a 3-Motzkin
path s1. . . snand p= (p1, . . . , pn)with 0pihi1(s)if si=U,0pihi1(s)1
28 B. HAN, J. MAO, AND J. ZENG
if si=D,Lb,Lrand pi=hi1if si=Lywith h0(s) = 0. Let LH0
nbe the set of variant
restricted Laguerre histories of length n.
We use a variant of Foata-Zeilberger’s bijection φF Z :Sn LH0
n(cf. (2.40)). Given
σSn, we construct the variant restricted Laguerre history φ0
F Z (σ) := (s,p) LH0
nas
follows. For i= 1, . . . , n, let
si=
Uif iCval σ,
Dif iCpk σ,
Lrif iCdd σ,
Lbif iCda σ,
Lyif iFix σ,
(4.6)
with pi=nestiσ.
Lemma 4.6. If φ0
F Z (σ) = (s,p) LH0
nwith σSn, then
Fix σ=Ly(s),(4.7a)
Exc σ=Lb(s)U(s),(4.7b)
nest σ=
n
X
i=1
pi,(4.7c)
exc σ+cros σ+nest σ=
n
X
i=1
hi1(s),(4.7d)
where Exc σdenotes the set of excedances of σ.
Proof. From the construction of φ0
F Z , it is easy to see (4.7a)-(4.7c). Define
exciσ=1if σ(i)> i,
0if σ(i)i.
By inductions on i[n]we verify that
exciσ+nestiσ+crosiσ=
hi1(s)+1,if si=U,
hi1(s)if si=Lr,
hi1(s)1if si=D,
hi1(s)if si=Lb,
hi1(s)if si=Ly.
(4.8)
This implies (4.7d) immediately.
We define a Zn
2-action on LH0
n, which is similar to Yan-Zhou-Lin’s group action on
LHnin [27] and a generalization of Lin’s group action on 2-M
nin [16]. Let i[n]and
(s,p) LH0
n. Define the group action θias follows,
θi((s,p)) = (s,p)if iLy(s),
(s0,p)otherwise,
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 29
where s0is the 3-Motzkin path obtained from sby changing sias LbLr. For any subset
S[n]define the mapping θ0
S:LH0
n LH0
nby
θ0
S((s,p)) = Y
iS
θi((s,p)).(4.9)
Hence the group Zn
2acts on LH0
nvia the function θ0
S. Note that the three sequences Ly(s),
pand (h0(s),...,(hn1(s)) are invariant under the group action. This action divides the set
LH0
ninto disjoint orbits and each orbit has a unique restricted Laguerre history whose level
steps are 6=Lyor Lb. For any fixed (s,p) LH0
nlet Orb((s,p)) := {θ0
S((s,p)) |S[n]}.
For 0jnwe define
Sn,j ={σSn:fixσ=j},(4.10a)
Rn,j ={(s,p) LH0
n:|s|Ly=j}.(4.10b)
where |s|ameans the number of letters ain the word s.
Lemma 4.7. Let (s,p) Rn,j. We have
(1 + x)|s|Lb+|s|LrX
(s0,p)Orb(s,p)
t|s0|Lb
=X
(s0,p)Orb(s,p)
(1 + xt)|s0|Lr(x+t)|s0|Lb.(4.11)
Proof. Let L(s) = {i[n] : si=Lbor si=Lr}with cardinality `=|s|Lr+|s|Lb. By (4.9),
the group action establishes a bijection from the set of subsets of L(s)to Orb(s,p)such
that if SL(s)then S=Lr(s0)with (s0,p) = θ0
S((s,p)). Eq. (4.11) is equivalent to
(1 + x)`X
SL(s)
t|S|=X
SL(s)
(1 + xt)|S|(x+t)`−|S|,
namely, (1 + x)`·(1 + t)`= (1 + xt +x+t)`.
Proof of Theorem 3.6.For (s,p) Rn,j , since 2|s|U+|s|Lr+|s|Lb+j=n, by (4.11), we
have
(1 + x)nj2|s0|UX
(s0,p)Orb(s,p)
t|s0|Lb(4.12)
=X
(s0,p)Orb(s,p)
(1 + xt)nj2|s0|U−|s0|Lb(x+t)|s0|Lb,
that is,
X
(s0,p)Orb(s,p)
t|s0|Lb=X
(s0,p)Orb(s,p)
(1 + xt)nj2|s0|U−|s0|Lb(x+t)|s0|Lb
(1 + x)nj2|s0|U.
Summing over all the orbits leads to
30 B. HAN, J. MAO, AND J. ZENG
X
(s,p)∈Rn,j
t|s|Lb=X
(s,p)∈Rn,j
(1 + xt)nj2|s|U−|s|Lb(x+t)|s|Lb
(1 + x)nj2|s|U.
Let
|p|=
n
X
i=1
piand h(s) =
n
X
i=1
hi1(s).
Since U(s),pand (h0(s), . . . , hn1(s)) are invariant under the group action,
X
(s,p)∈Rn,j p|p|qh(s)−|p|t|s|Lb+|s|U
=X
(s,p)∈Rn,j p|p|qh(s)−|p|(1 + xt)nj2|s|U−|s|Lb(x+t)|s|Lbt|s|U
(1 + x)nj2|s|U.(4.13)
By Lemma 4.6, as the bijection φ0
F Z maps Sn,j to Rn,j with corresponding statistics, we
can rewrite (4.13) as
X
σSn,j pnest σqcros σ+exc σtexc σ(4.14)
=X
σSn,j pnest σqcros σ+exc σ(1 + xt)njexc σcpk σ(x+t)exc σcpk σtcpk σ
(1 + x)nj2cpk σ
=1 + xt
1 + xnj
P(nest,cros,cpk,exc)Sn,j;p, q, (1 + x)2t
(x+t)(1 + xt),q(x+t)
1 + xt .
Multiplying (4.14) by rjand summing over jyields (3.20). By using the substitution
u=(1+x2)t
(x+t)(1+xt)and v=x+t
1+xt as in (3.20), we obtain (3.21) immediately.
Remark 4.8. We show that Eq. (4.13) implies also two other known results in the litter-
ature. When x= 1 Eq.(4.13) reduces to
X
(s,p)∈Rn,j p|p|qh(s)−|p|t|s|Lb+|s|U=X
(s,p)∈Rn,j p|p|qh(s)−|p|(1 + t)nj2|s|Ut|s|U
2nj2|s|U.(4.15)
Let
On,k,j ={(s,p) Rn,j :|s|Lb= 0 and |s|U=k}.
By the group action on Rn,j, we see that there are 2nj2|s|Uelements in each orbit, and
then
2n2kj|On,k,j |=|{(s,p) Rn,j :|s|U=k}|.
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 31
Hence (4.15) is equivalent to
X
(s,p)∈Rn,j p|p|qh(s)−|p|t|s|Lr+|s|U=
n
X
k=0 X
(s,p)∈On,j,kp|p|qh(s)−|p|(1 + t)nj2ktk.(4.16)
Thanks to the bijection φ0
F Z and (4.7a)–(4.7d) we obtain Theorem 8 in [21],
X
πSn
(tq)exc πpnest πqcros πrfix π
=
n
X
j=0
rj
b(nj)/2c
X
k=0 X
σSn,k,j
pnest σqcros σ+exc σtk(1 + t)nj2k,(4.17)
where
Sn,k,j ={σSn,cpk σ=k, fix σ=j, cda σ= 0}.
By Lemma 2.9 and (2.37), letting p= 0 in (4.17) yields Theorem 2.4 in [16],
X
σSn(321)
texc σqinv σrfix σ
=
n
X
j=0
rj
b(nj)/2c
X
k=0
X
σSn,k,j (321)
qinv σ
tk(1 + t)nj2k,(4.18)
where
Sn,k,j (321) := {σSn(321) : fix σ=j, exc σ=k, cda σ= 0}.
Note that when r= 1 + t, Eq. (4.18) reduces to Eq. (3.30a) with the γ-coefficients in
(3.30b)–(3.30d).
5. Proofs via continued fractions
For convenience, we use the following compact notation for the J-type continued fraction
J[z;bn, λn] = 1
1b0zλ1z2
1b1zλ2z2
1b2zλ3z2
1 · ··
.(5.1)
We shall use the notation [n]p,q := (pnqn)/(pq)for nN.
32 B. HAN, J. MAO, AND J. ZENG
5.1. Some combinatorial continued fractions. We first recall a standard contraction
formula for continued fractions, see [20, Eq. (44)].
Lemma 5.1 (Contraction formula).The following contraction formulae hold
1
1α1z
1α2z
1α3z
1α4z
1 · ··
=1
1α1zα1α2z2
1(α2+α3)zα3α4z2
1 · ··
= 1 + α1z
1(α1+α2)zα2α3z2
1(α3+α4)zα4α5z2
1 · ··
.
The following four combinatorial continued fraction expansions are proved by Shin and
Zeng [21]. Let
An(p, q, t, u, v, w) := X
σSn
pnest σqcros σtexc σucddσvcda+fixσwcpkσ(5.2a)
=X
σSn
p(2-13) σq(31-2) σtdes σuda σvdd σwpk σ1,(5.2b)
where the equality of the two enumerative polynomials follows from Lemma (2.2).
Lemma 5.2. [21, Eq. (28)] We have
X
n0
An+1(p, q, t, u, v, w)zn=J[z;bn, λn](5.3a)
with
bn= (u+tv)[n+ 1]p,q , λn= [n]p,q [n+ 1]p,q .(5.3b)
Let
Bn(p, q, t, u, v, w, y) := X
σSn
pnest σqcros σtexc σucdd σvcda σwcval σyfix σ.(5.4)
Lemma 5.3. [21, Eq. (34)] We have
1 +
X
n=1
Bn(p, q, t, u, v, w, y)zn=J[z;bn, λn],(5.5a)
with
bn=ypn+ (qu +tv)[n]p,q , λn=tw[n]2
p,q.(5.5b)
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 33
Let
Cn(q, t, u, v, w) := X
σSn
qcycσfixσtwexσucda+fixσvcddσwcvalσ.(5.6)
Lemma 5.4. [21, Eq. (50)] We have
X
n0
Cn+1(q, t, u, v, w)zn=J[z;bn, λn](5.7a)
with
bn= (n+ 1)(tu +v), λn=n(q+n)tw. (5.7b)
Let
Dn(q, t, u, v, w) := X
σDn
qcyc σtexc σucda σvcdd σwcval σ.(5.8)
Lemma 5.5. [21, Eq. (41)] We have
1 +
X
n=1
Dn(q, t, u, v, w)zn=J[z;bn, λn](5.9a)
with
bn=n(tu +v), λn=n(q+n1)tw. (5.9b)
5.2. Proof of Theorems 3.1,3.43.6,3.83.10.In the previous section Theorems 3.1
and 3.7 are proved using group actions. Here we shall give an alternative proof for Theo-
rems 3.1 and 3.7 using continued fractions.
Proof of Theorem 3.1.In view of (5.3a), we have
An(p, q, t, 1,1, x) = X
σSn
pnest σqcros σtexc σxcpkσ.
It follows that
X
n=0
An+1(p, q, t, 1,1, x)zn=J[z;bn, λn](5.10a)
with
bn= [n+ 1]p,q(t+ 1), λn= [n]p,q[n+ 1]p,q tx. (5.10b)
When x= 1 we have the J-fraction for P
n=0 An+1(p, q, t)zn. The g.f. of the right side of
Eq. (3.3) is
X
n0
P(nest,cros,cpk,exc)Sn+1;p, q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt(1 + xt)
1 + xn
zn.
34 B. HAN, J. MAO, AND J. ZENG
Substituting t, x and z, respectively, by
x+t
1 + xt,(1 + x)2t
(x+t)(1 + xt)and (1 + xt)z
1 + x
in (5.10a), we obtain the J-fraction of P
n=0 An+1(p, q, t)zn.
Proof of Theorem 3.4.By Eq. (5.6), the g.f. of the left side of Eq. (3.10) is
X
n0
A(cycfix,exc)
n+1 (q, t)zn=J[z;bn, λn](5.11a)
with
bn= (n+ 1)(t+ 1), λn=n(q+n).(5.11b)
By definition, the g.f. of the right side of Eq. (3.10) is
X
n0
P(cycfix,cval,exc)Sn+1;q, (1 + x)2t
(x+t)(1 + xt),x+t
1 + xt(1 + xt)
1 + xn
zn.
Letting u=v= 1 and transforming x+t
1+xt ,(1+x)2t
(x+t)(1+xt)and z(1+xt)
(1+x)to t,xand zin (5.7a),
respectively, we obtain (5.11a) immediately.
Proof of Theorem 3.5.Letting u=v=w= 1 in Eq. (5.9a), we see that the g.f. of the left
side of Eq. (3.18) is
1 +
X
n=1
D(cyc,exc)
n(q, t)zn=J[z;bn, λn](5.12a)
with
bn=n(t+ 1), λn=n(q+n1)t. (5.12b)
On the other hand, the g.f. of the right side of Eq. (3.18) is
X
n0
P(cyc,cpk,exc)Dn;q, (1 + w)2t
(w+t)(1 + wt),w+t
1 + wt (1 + wt)
1 + wn
zn.
Letting u=v= 1 in (5.9a) and substituting t,wand zwith
w+t
1 + wt ,(1 + w)2t
(w+t)(1 + wt)and (1 + wt)z
(1 + w),
respectively, we obtain the J-fraction in (5.12a) immediately.
Proof of Theorem 3.6.We prove that both sides of Eq. (3.20) have the same g.f. by
comparing their continued fraction expansions. By (5.4), we have
Bn(p, q, qt, 1,1,1, r) = P(nest,cros,exc,fix)(Sn;p, q, tq, r).
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 35
It follows from Eq. (5.5a) that
X
n0
P(nest,cros,exc,fix)(Sn;p, q, tq, r)zn=J[z;bn, λn](5.13a)
with
bn=rpn+q(1 + t)[n]p,q , λn=tq[n]2
p,q.(5.13b)
On the other hand, by definition and invoking the equality cpk =cval (cf. (2.3)), the g.f.
of the right-hand side of Eq. (3.20) is
X
n01 + xt
1 + xn
P(nest,icr,cpk,exc,fix)Sn;p, q, (1 + x)2t
(x+t)(1 + xt),q(x+t)
1 + xt ,(1 + x)r
1 + xt zn.(5.14)
In Eq. (5.5a) letting u=v= 1 and making the substitution
tq(x+t)
1 + xt , w (1 + x)2t
(x+t)(1 + xt), y (1 + x)r
1 + xt , z (1 + xt)z
(1 + x),
we see that the g.f. (5.14) has the same J-fraction expansion as (5.13a).
Proof of Theorem 3.8.Recall [5, Theorem 7.2] that
X
n=0
Nn(t, q, r)zn=1
1rz tqz2
1(1 + t)qz tq3z2
1(1 + t)q2ztq5z2
...
.(5.15)
Writing P
n=1 Nn1(t, q, r)zn=zP
n=0 Nn(t, q, r)znwe have
1 + X
n1
Nn1(t, q, 1 + t)zn= 1 + z
1(1 + t)ztqz2
1q(t+ 1)ztq3z2
1 · ··
,(5.16)
which is Pn0Nn(t/q, q, 1)znby applying Lemma 5.1. Thus
Nn(t/q, q, 1) = Nn1(t, q, 1 + t).(5.17)
By (2.5) and and Lemma 2.9, we see that πSn(321) if and only if π1Sn(321). As
wex π1=ndrop π1=nexcπand inv π1=inv πwe have
Nn(t, q, t) = X
πSn(321)
twex π1qinv π1
=tnX
πSn(321)
(1/t)exc πqinv π=tnNn(1/t, q, 1).
36 B. HAN, J. MAO, AND J. ZENG
It follows from (5.17) that
Nn(t, q, t) = tnNn1(q/t, q, 1 + q/t).(5.18)
In view of (3.24) identities (5.17) and (5.18) provide the first interpretation in Table 1.
Other interpretations in Table 1 can be derived from the equidistribution results in (2.7a)
and (2.11a)–(2.11d)
Proof of Theorem 3.9.By Lemma 2.9, (2.37) and (5.4), we have
Bn(0, q, tq, 1,0,1,1) = X
σ
e
Sn(321)
qinv σtexc σ.(5.19)
It follows from Lemma 5.3 that
X
n=0 X
σ
e
Sn(321)
qinv σtexc σzn=1
1ztqz2
1qz tq3z2
1q2ztq5z2
...
.(5.20)
Now, the g.f. of the right-hand side of Eq. (3.30a) is
GF : = 1 + zX
n1
bn1
2c
X
k=0
X
σ
e
Sn1,k(321)
qinv σ
tk(1 + t)n12kzn1
=1 + zX
n0X
σ
e
Sn(321)
qinv σt
(1 + t)2exc σ
((1 + t)z)n.
By (5.20) and Lemma 5.1 we see that
GF = 1 + z
1(1 + t)ztqz2
1(1 + t)qz tq3z2
1(1 + t)q2ztq5z2
...
=1
1ztz2
1(q+t)ztq2z2
1(q+t)qz tq4z2
···
,
which is equal to P
n0
Nn(t/q, q, 1)znby (5.15). Other interpretations can be obtained by
the equidistribution results of (2.7a) and (2.11a)–(2.11d).
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 37
Proof of Theorem 3.10.The g.f. of the right side of (3.31) can be written as
1 + zX
n1
bn+1
2c
X
k=1
X
σ
e
Sn1,k1(321)
qn1+inv σexc σ
tk(1 + t/q)n+12kzn1
=1 + zt X
n0
X
σ
e
Sn(321)
qinv σexc σtq2
(q+t)2exc σ
((q+t)z)n.(5.21)
By using the second claim of Lemma 2.9, Eq.(2.37) and (5.4), we have
Bn(0, q, t, 1,0,1,1) = X
σ
e
Sn(321)
qinv σexc σtexc σ,
Lemma 5.3 implies that
X
n=0 X
σ
e
Sn(321)
qinv σexc σtexc σzn=1
1ztz2
1qz tq2z2
1q2ztq4z2
...
.
Making the substitution z7→ (q+t)zand t7→ tq2/(q+t)2in the above equation and
applying the contarction formulae, we obtain
1 + zt
1(q+t)ztq2z2
1(q+t)qz tq4z2
1(q+t)q2ztq6z2
...
(5.22)
=1
1tz tqz2
1(1 + t)qz tq3z2
1(1 + t)q2ztq5z2
···
,(5.23)
which is equal to P
n0
Nn(t, q, t)znby (5.15). Other interpretations can be obtained by the
equidistribution results of (2.7a) and (2.11a)–(2.11d).
5.3. Proof of Theorems 3.12 and 3.13.Recall the color order <cof 1,...,±n}:
1<c2<c··· <cn <c1<c2<c··· <cn,
38 B. HAN, J. MAO, AND J. ZENG
and define the following statistics:
fix σ= #{i[n] : i=σ(i)},
excAσ= #{i[n] : i <cσ(i)},
wexAσ= #{i[n] : icσ(i)}=excAσ+fixσ,
wexCσ= #{i[n] : i |σ(i)|and σ(i)<0},
neg σ= #{i[n] : σi<0}.
Let
Fn(q, t, w, r, y) = X
σ∈Bn
qcros σtwexAσwwexCσrfix σyneg σ.
The following result is the r= 2 case of [22, Lemma 16].
Lemma 5.6. We have X
n0
Fn(q, t, w, r, y)zn=J[z;bn, λn],(5.24)
with
λn= (t+wyqn1)(1 + yqn)[n]2
q,
bn= (1 + yqn)[n]q+t(r+q[n]q) + wyqn[n+ 1]q.
We need the following lemma, see [28, Lemma 12] and [15, p. 307].
Lemma 5.7. If two sequences {µn}nand {νn}nsatisfy the equation
X
n0
µn
zn
n!=eαz X
n0
νn
zn
n!,
then X
n0
νnzn=J[z;bn, λn] =X
n0
µnzn=J[z;bn+α, λn].
Proof of Theorem 3.12.Since exc = (wexAfix) + wexC, see [22, Eq. (4.5)], we have
Fn(1, t, t, 1/t, y) = X
σ∈Bn
texcBσyneg σ
and formula (5.24) becomes
X
n0 X
σ∈Bn
texcBσyneg σ!zn=J[z;bn, λn],(5.25)
where bn= (n+ 1)(1 + yt) + n(t+y)and λn=n2(1 + y)2t. By Lemma 5.7 we derive
from (1.6b) and (3.36) that Pn0Bn(y, t)znhas the same continued fraction expansion in
(5.25).
EULERIAN POLYNOMIALS AND EXCEDANCE STATISTICS 39
Proof of Theorem 3.13.By (5.4), we have
P(cpk,exc)(Sn;w, t) = Bn(1,1, t, 1,1, w, 1).
Specializing (p, q, t, u, v, w, y)in Lemma 5.3 yields
X
n=0
P(cpk,exc)(Sn;w, t)zn=J[z;bn, λn],
where bn= 1 + n(1 + t)and λn=n2tw. It follows that the series
X
n0
P(cpk,exc)Sn;(1 + y)2t
(y+t)(1 + yt),y+t
1 + yt ((1 + yt)z)n
has the same continued fraction expansion for Pn0Bn(y, t)znin (5.25).
Acknowledgement
The first two named authors were supported by the China Scholarship Council. The
second author’s work was done during his visit at Institut Camille Jordan, Université
Claude Bernard Lyon 1 in 2018-2019. The first author was supported by the Israel Science
Foundation (grant no. 1970/18) during the revision of this work.
An extended abstract of this paper will appear in the Proceedings of the 32nd Conference
on Formal Power Series and Algebraic Combinatorics (FPSAC’20).
References
[1] C. A. Athanasiadis, Gamma-positivity in combinatorics and geometry, Sém. Lothar. Combin. 77
(2018), Article B77i, 64pp (electronic). 2
[2] E. Babson, E. Steingrímsson, E., Generalized permutation patterns and a classification of the Maho-
nian statistics, Sém. Lothar. Combin. B44b (2000), 18 pp. 15
[3] P. Brändén. Actions on permutations and unimodality of descent polynomials, European J. Combin.
29 (29):514–531, 2008. 2,18,24
[4] F. Brenti, q-Eulerian polynomials arising from Coxeter groups, European J. Combin. 15 (5): 417–441,
1994. 23
[5] S.-E. Cheng, S. Elizalde, A. Kasraoui, B. Sagan, Inversion polynomials for 321-avoiding permutations,
Discrete Math. 313 (2013) 2552–2565. 34
[6] R. J. Clarke, E. Steingrímsson, and J. Zeng, New Euler-Mahonian statistics on permutations and
words, Adv. in Appl. Math., 18 (1997), 237–270. 3,4,6,11
[7] M. C. Cooper, W. S. Jones, Y. Zhuang, On the joint distribution of cyclic valleys and excedances over
conjugacy classes of Sn, Adv. in Appl. Math. 115 (2020), 101999, 15 pp. 20,27
[8] A. de Médicis, G. X. Viennot, Moments des q-polynômes de Laguerre et la bijection de Foata-
Zeilberger. Adv. in Appl. Math. 15 (1994), no. 3, 262–304. 11
[9] P. Flajolet, Combinatorial aspects of continued fractions, Discrete Math. 32 (1980), no. 2, 125–161. 2,
3,4
[10] D. Foata, M.-P. Schützenberger, Théorie géométrique des polynômes eulériens, Lecture Notes in Math-
ematics, Vol. 138, Springer-Verlag, Berlin, 1970. 1,2
[11] D. Foata, V. Strehl, Rearrangements of the symmetric group and enumerative properties of the tangent
and secant numbers, Math Z. 137 (3) (1974): 257–264. 23
40 B. HAN, J. MAO, AND J. ZENG
[12] D. Foata, D. Zeilberger, Denert’s permutation statistic is indeed Euler-Mahonian, Stud. Appl. Math.
83 (1) (1990): 31–59. 3,4
[13] J. Françon, G. Viennot, Permutations selon leurs pics, creux, doubles montées et double descentes,
nombres d’Euler et nombres de Genocchi, Discrete Math. 28 (1) (1979): 21–35. 3,4
[14] S. Fu, D. Tang, B. Han, J, Zeng, (q, t)-Catalan numbers: gamma expansions, pattern avoidances and
the (1)-phenomenon, Adv. in Appl. Math. 106 (2019) 57–95. 4,6,15,18,21,22
[15] I. P. Goulden, D. M. Jackson, Combinatorial Enumeration, John Wiley, New York (1983). 37
[16] Z. Lin, On γ-positive polynomials arising in pattern avoidance, Adv. in Appl. Math. 82 (2017): 1–22.
19,22,28,30
[17] Z. Lin, S. Fu, On 1212-avoiding restricted growth functions, Electron. J. Combin. 24 (2017), Research
Paper 1.53, 20pp (electronic). 22
[18] T. K. Petersen, Enriched P-partitions and peak algebras, Adv. Math. 209 (2007), no. 2, 561–610. 2
[19] T. K. Petersen, Eulerian numbers, Birkhäuser Advanced Texts, Birkhäuser 2015. 1,4
[20] H. Shin, J. Zeng, The q-tangent and q-secant numbers via continued fractions, European J. Combin.
31 (7) (2010): 1689–1705. 4,14,31
[21] , The symmetric and unimodal expansion of Eulerian polynomials via continued fractions.
European J. Combin. 33 (2012), no. 2, 111–127. 2,3,4,6,7,11,30,31,32
[22] , Symmetric unimodal expansions of excedances in colored permutations. European J. Combin.
52 (2016), 174–196. 2,4,14,18,37,38
[23] E. Steingrímsson, Permutation statistics of indexed permutations, European J. Combin. 15 (2): 187–
205, 1994. 22
[24] J. R. Stembridge, Enriched P-partitions, Trans. Amer. Math. Soc. 349 (2): 763–788, 1997. 2
[25] T. J. Stieltjes, Sur la réduction en fraction continue d’une série procedant suivant les puissances
descendantes d’une variable, Ann. Fac. Sc. Toulouse 3 (1889) 1–17 . 1
[26] H. Sun, Y. Wang, A group action on derangements, Electron. J. Combin. 21 (1) (2014), #P1.67. 20,
25
[27] S. Yan, H. Zhou, Z. Lin, A new encoding of permutations by Laguerre histories, Electron. J. Combin.
26 (2019), no. 3, Paper No. 3.47, 9 pp. 3,4,12,14,28
[28] J. Zeng, Énumérations de permutations et J-fractions continues, European J. Combin. 14 (4) (1993)
37–382. 37
[29] Y. Zhuang, Eulerian polynomials and descent statistics, Adv. in Appl. Math. 90 (2017) 86–144. 2,18
(Bin Han) Univ Lyon, Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut
Camille Jordan, 43 blvd. du 11 novembre 1918, F-69622 Villeurbanne cedex, France
Email address:han@math.univ-lyon1.fr, han.combin@hotmail.com.
(Bin Han) Current address: Department of Mathematics, Bar-Ilan University, Ramat-Gan
52900, Israel.
Email address:han@math.biu.ac.il, han.combin@hotmail.com.
(Jianxi Mao) School of Mathematic Sciences, Dalian University of Technology, Dalian
116024, P. R. China
Email address:maojianxi@hotmail.com
(Jiang Zeng) Univ Lyon, Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut
Camille Jordan, 43 blvd. du 11 novembre 1918, F-69622 Villeurbanne cedex, France
Email address:zeng@math.univ-lyon1.fr
... It is well known [8,19,25] that the statistics``des"" and``exc"" are equidistributed over permutations of [n] := \{ 1, . . . , n\} , their common generating function being the Eulerian polynomials A n (t), i.e., Since MacMahon's pioneering work [17], various combinatorial variants and refinements of Eulerian polynomials have appeared; see [2,12,13,16,18,24] for some recent papers. ...
... In this paper we shall take a different approach to their problems through the combinatorial theory of J-continued fractions developed by Flajolet and Viennot in the 1980s [7,11]; see [2,6,13,24] for recent developments of this theory. Recall that a J-type continued fraction is a formal power series defined by \infty \sum n=0 a n z n = 1 1 ...
... 1 -wz -t\lambda y z 2 1 -(w + t + 1)z -t(\lambda + 1)(y + 1) z 2 \cdot \cdot \cdot (1.2) with \gamma n = w + n(t + 1) and \beta n = t(\lambda + n -1)(y + n -1). It is known that A n (t, 1, 1, 1) equals the Eulerian polynomial A n (t); see [13,24]. Recently Sokal and the third author [24] have generalized the J-fraction for Eulerian polynomials in infinitely many indeterminates, which are also generalizations of the polynomials A n (t, \lambda , y, w). ...
... Various combinatorial variants and refinements of Eulerain polynomials have recently appeared in [2,6,10,13,14,19]. For a permutation σ := σ(1)σ(2) · · · σ(n) of 1 . . . ...
... Moreover we show that (pex, cyc) is equidistributed with many other bistatistics (see Theorem 1.6). Our main tool is the combinatorial theory of J-continued fractions developed by Flajolet and Viennot in the 1980's [8,9], see [2,5,10,19] for recent developments of this theory. Recall that a J-type continued fraction is a formal power series defined by ∞ n=0 a n z n = 1 ...
... with γ n = w + n(t + 1) and β n = t(λ + n − 1)(y + n − 1). The polynomials A n (t, 1, 1, 1) are the Eulerian polynomials A n (t), see [7,10,19]. As we will show later, the generating functions of the aforementioned statistics are all specialisations of A n (t, λ, y, w). ...
Preprint
In a recent paper ({arXiv:2101.01928v1}) Baril and Kirgizov posed two conjectures on the equidistibution of (cyc,des2)(cyc,pex)(cyc, des_2)\sim (cyc, pex) and (des,des2)(exc,pex)(des, des_2)\sim (exc, pex), where cyc, des and exc are classical statistics counting the numbers of cycles, descents and excedances of permutation, while des2des_2 and pex are numbers of special descents and excedances over permutations. In this paper, using combinatorial theory of J-continued fractions and bijections we confirm and strengthen the second conjecture and expand the first one.
... Recently, many different refinements and generalizations of Propositions 1, 2 and 3 have been studied, see [22,25,28,38,42,43] and references therein. In the next section, we first present the main results of this paper and then we give some applications. ...
... The reader is referred to [22,27,32,38] for some recent results related to the joint distribution of excedances, fixed points and cycles. From Proposition 2, we see that if q > 0 is a given real number, then A n (x, 0, q) are γ-positive for n 1. Comparing (2) with (4), we get 2 n A n (x, 1/2, 1) = d B n (x). ...
... By using (22), it is routine to derive the following recurrence system: 1 (x) = 0. Let (a n (x, q), b n (x, q)) be the symmetric decomposition of A n (x, q). It follows from (23) that a (k) n (x) = k n a n (x, 1/k), b (k) n (x) = k n b n (x, 1/k). ...
Preprint
The object of this paper is to give a systematic treatment of excedance-type polynomials. We first give a sufficient condition for a sequence of polynomials to have alternatingly increasing property, and then we present a systematic study of the joint distribution of excedances, fixed points and cycles of permutations and derangements, signed or not, colored or not. Let p[0,1]p\in [0,1] and q[0,1]q\in [0,1] be two given real numbers. We prove that the cyc q-Eulerian polynomials of permutations are bi-gamma-positive, and the fix and cyc (p,q)-Eulerian polynomials of permutations are alternatingly increasing, and so they are unimodal with modes in the middle, where fix and cyc are the fixed point and cycle statistics. When p=1 and q=1/2, we find a combinatorial interpretation of the bi-gamma-coefficients of the (p,q)-Eulerian polynomials. We then study excedance and flag excedance statistics of signed permutations and colored permutations. In particular, we establish the relationships between the (p,q)-Eulerian polynomials and some multivariate Eulerian polynomials. Our results unify and generalize a variety of recent results.
... Such connections are valuable as they bear combinatorial information which naturally lead to refinements and generalizations of the enumerative results for the combinatorial objects involved. See for example [11,12,17,19,21,22,30,31,34], especially the two surveys by Corteel-Kim-Stanton [13], and Zeng [35] and the references therein. ...
... Comparing to the classic mappings Φ FV and Φ FZ , the mapping Ψ YZL [34], as well as its variant Φ YZL introduced in this paper are quite recent. The work of Han-Mao-Zeng [21] indicates that Ψ YZL actually fits well with Ψ FV by placing Ψ YZL in the first triangle in Fig. 6, where the mapping Ψ SZ was first constructed by Shin-Zeng [30]. Viewing these two factorizations in Fig. 6, one wonders if a similar factorization could be carried out for Φ FZ and Φ YZL . ...
Preprint
Laguerre histories (restricted or not) are certain weighted Motzkin paths with two types of level steps. They are, on one hand, in natural bijection with the set of permutations, and on the other hand, yield combinatorial interpretations for the moments of Laguerre polynomials via Flajolet's combinatorial theory of continued fractions. In this paper, we first introduce a reflection-like involution on restricted Laguerre histories. Then, we demonstrate its power by composing this involution with three bijections due to Fran\ccon-Viennot, Foata-Zeilberger, and Yan-Zhou-Lin, respectively. A host of equidistribution results involving various (multiset-valued) permutation statistics follow from these applications. As byproducts, seven apparently new Mahonian statistics present themselves; new interpretations of known Mahonian statistics are discovered as well. Finally, in our effort to show the interconnections between these Mahonian statistics, we are naturally led to a new link between the variant Yan-Zhou-Lin bijection and the Kreweras complement.
Preprint
We introduce a kind of (p,q,t)(p, q, t)-Catalan numbers of Type A by generalizing the Jacobian type continued fraction formula, we proved that the corresponding expansions could be expressed by the polynomials counting permutations on §n(321)\S_n(321) by various descent statistics. Moreover, we introduce a kind of (p,q,t)(p, q, t)-Catalan numbers of Type B by generalizing the Jacobian type continued fraction formula, we proved that the Taylor coefficients and their γ\gamma-coefficients could be expressed by the polynomials counting permutations on §n(3124,4123,3142,4132)\S_n(3124, 4123, 3142, 4132) by various descent statistics. Our methods include permutation enumeration techniques involving variations of bijections from permutation patterns to labeled Motzkin paths and modified Foata-Strehl action.
Article
The binomial Eulerian polynomials, first introduced in work of Postnikov, Reiner and Williams, are γ-positive polynomials and can be interpreted as h-polynomials of certain flag simplicial polytopes. Recently, Athanasiadis studied analogs of these polynomials for colored permutations and proved that they can be written as the sums of two γ-positive polynomials. In this paper, we find combinatorial interpretations of Athanasiadis' γ-positive polynomials, which leads to an alternative proof of their γ-positivity expansions using the method of group actions on colored permutations. Two results are presented. The first one is to give the γ-coefficients of the symmetric decompositions of binomial Eulerian polynomials for colored permutations, which answers a problem of Athanasiadis (2020) [3]. The second one is to give a direct combinatorial proof on the γ-expansions in the symmetric decompositions of colored derangement polynomials, which answers another problem asked by Athanasiadis (2018) [2].
Article
In 2008 Brändén proved a (p,q)-analogue of the γ-expansion formula for Eulerian polynomials and conjectured the divisibility of the γ-coefficient γn,k(p,q) by (p+q)k. As a follow-up, in 2012 Shin and Zeng showed that the fraction γn,k(p,q)/(p+q)k is a polynomial in N[p,q]. The aim of this paper is to give a combinatorial interpretation of the latter polynomial in terms of André permutations, a class of objects first defined and studied by Foata, Schützenberger and Strehl in the 1970s. It turns out that our result provides an answer to a recent open problem of Han, which was the impetus of this paper.
Article
The γ-coefficients of Eulerian polynomials were first considered by Foata and Schützenberger. In this paper, we provide combinatorial interpretations for the γ-coefficients arising from the segmented permutations and segmented derangements via Brändén’s modified Foata–Strehl action. We also give the combinatorial interpretations of γ-coefficients for the (>,≤,−)-avoiding inversion sequences via continued fractions.
Article
Full-text available
Gamma-positivity is an elementary property that polynomials with symmetric coefficients may have, which directly implies their unimodality. The idea behind it stems from work of Foata, Sch\"utzenberger and Strehl on the Eulerian polynomials; it was revived independently by Br\"and\'en and Gal in the course of their study of poset Eulerian polynomials and face enumeration of flag simplicial spheres, respectively, and has found numerous applications since then. This paper surveys some of the main results and open problems on gamma-positivity, appearing in various combinatorial or geometric contexts, as well as some of the diverse methods that have been used to prove it.
Article
Full-text available
Restricted growth functions (RGFs) avoiding the pattern 1212 are in natural bijection with noncrossing partitions. Motivated by recent work of Campbell et al., we study five classical statistics \bk,\ls,\lb,\rs and \rb on 1212-avoiding RGFs. We show the equidistribution of (\ls,\rb,\lb, \bk) and (\rb,\ls,\lb, \bk) on 1212-avoiding RGFs by constructing a simple involution. To our surprise, this result was already proved by Simion 22 years ago via an involution on noncrossing partitions. Our involution, though turns out essentially the same as Simion's, is defined quite differently and has the advantage that makes the discussion more transparent. Consequently, a multiset-valued extension of Simion's result is discovered. Furthermore, similar approach enables us to prove the equidistribution of (\mak,\rb,\rs, \bk) and (\rb,\mak,\rs, \bk) on 1212-avoiding RGFs, where ``\mak" is a set partition statistic introduced by Steingr\'imsson. Through two bijections to Motzkin paths, we also prove that the triple of classical permutation statistics (\exc+1,\den,\inv-\exc) on 321-avoiding permutations is equidistributed with the triple (\bk,\rb,\rs) on 1212-avoiding RGFs, which generalizes another result of Simion. In the course, an interesting q-analog of the γ\gamma-positivity of Narayana polynomials is found.
Article
Full-text available
We prove a generalization of a conjecture of Dokos, Dwyer, Johnson, Sagan, and Selsor giving a recursion for the inversion polynomial of 321-avoiding permutations. We also answer a question they posed about finding a recursive formulas for the major index polynomial of 321-avoiding permutations. Other properties of these polynomials are investigated as well. Our tools include Dyck and 2-Motzkin paths, polyominoes, and continued fractions.
Article
We derive a formula expressing the joint distribution of the cyclic valley number and excedance number statistics over a fixed conjugacy class of the symmetric group in terms of Eulerian polynomials. Our proof uses a slight extension of Sun and Wang's cyclic valley-hopping action as well as a formula of Brenti. Along the way, we give a new proof for the γ-positivity of the excedance number distribution over any fixed conjugacy class along with a combinatorial interpretation of the γ-coefficients.
Article
We construct a bijection from permutations to some weighted Motzkin paths known as Laguerre histories. As one application of our bijection, a neat q-γ\gamma-positivity expansion of the (inv,exc)(\mathrm{inv},\mathrm{exc})-q-Eulerian polynomials is obtained.
Chapter
Leonhard Euler certainly didn’t have permutations on his mind when in 1755 he wrote about the numbers bearing his name in this chapter. (He was trying to find an easy way to compute sums of the form 1k+2k+3k+1^k + 2^k + 3^k +\cdots for any value of k.) Nowadays, however, these numbers are usually defined combinatorially: in terms of permutations.
Article
The aim of this paper is two-fold. We first prove several new interpretations of a kind of (q,t)-Catalan numbers along with their corresponding γ-expansions using pattern avoiding permutations. Secondly, we give a complete characterization of certain (−1)-phenomenon for each subset of permutations avoiding a single pattern of length three, and discuss their q-analogues utilizing the newly obtained q-γ-expansions, as well as the continued fraction of a quint-variate generating function due to Shin and the fourth author. Moreover, we enumerate the alternating permutations avoiding simultaneously two patterns, namely (2413,3142) and (1342,2431), of length four, and consider such (−1)-phenomenon for these two subsets as well.
Article
We prove several identities expressing polynomials counting permutations by various descent statistics in terms of Eulerian polynomials, extending results of Stembridge, Petersen, and Br\"and\'en. Additionally, we find q-exponential generating functions for q-analogues of these descent statistic polynomials that also keep track of the inversion number or inverse major index. We then show that several of these descent statistic polynomials are closely related to refinements of type B Eulerian polynomials and flag descent polynomials by the number of negative letters of a signed permutation. Our methods include permutation enumeration techniques involving noncommutative symmetric functions, Br\"and\'en's modified Foata-Strehl action, and a group action of Petersen on signed permutations. Notably, the modified Foata-Strehl action yields an analogous relation between Narayana polynomials and the joint distribution of the peak number and descent number over 231-avoiding permutations, which we also interpret in terms of binary trees and Dyck paths.
Article
A classical result of Foata and Schützenberger states that the γ-coefficients of the Eulerian polynomials enumerate permutations without double descents by the number of descents. In this paper, based on works of Cheng et al. and Stankova, we provide similar combinatorial interpretations for the γ-coefficients of the inversion polynomials on 321-avoiding permutations and the descent polynomials on Separable permutations (or -avoiding permutations) and -avoiding permutations. Some further open problems are also proposed.