JDT CSP
JDT CSP
THEORY
BRENDON RHOADES
Abstract. We prove a collection of conjectures of D. White [37], as well as some
related conjectures of Abuzzahab-Korson-Li-Meyer [1] and of Reiner and White [21],
[37], regarding the cyclic sieving phenomenon of Reiner, Stanton, and White [22]
as it applies to jeu-de-taquin promotion on rectangular tableaux. To do this, we
use Kazhdan-Lusztig theory and a characterization of the dual canonical basis of
C[x11 , . . . , xnn ] due to Skandera [27]. Afterwards, we extend our results to analyzing
the fixed points of a dihedral action on rectangular tableaux generated by promotion and evacuation, suggesting a possible sieving phenomenon for dihedral groups.
Finally, we give applications of this theory to cyclic sieving phenomena involving
reduced words for the long elements of hyperoctohedral groups and noncrossing
partitions.
1. Introduction
Suppose that we are given a finite set X equipped with the action of a finite
cyclic group C generated by c. In studying the combinatorial structure of the action of C on X, it is natural to ask for the sizes of the fixed point sets X 1 =
2
(|C|1)
X, X c , X c , . . . , X c
. Indeed, the cardinalities of the above sets determine the
cycle structure of the image of c under the canonical homomorphism C SX , so
from a purely enumerative standpoint these fixed point set sizes determine the action
of C on X.
Reiner, Stanton, and White studied such actions and associated polynomials to
them which encode the sizes of all of the above fixed point sets at the same time [22].
Following their 2004 paper, we make the following definition.
Definition 1.1. Let C be a finite cyclic group acting on a finite set X and let c be a
generator of C. Let C be a root of unity having the same multiplicative order as
c and let X(q) Q[q] be a polynomial. We say that the triple (X, C, X(q)) exhibits
the cyclic sieving phenomenon (CSP) if for any integer d 0 we have that the fixed
d
point set cardinality |X c | is equal to the polynomial evaluation X( d).
Date: March 17, 2009.
1
BRENDON RHOADES
Theorem 1.2. (Reiner-Stanton-White 2004 [22]) Fix two positive integers k and n.
Let X be the set of all k-element multisets of [n]. Let C = Z/nZ act on X by the
long cycle (1, 2, . . . , n) Sn .
.
Then, the triple (X, C, X(q)) exhibits the CSP, where X(q) = n+k1
k
q
In each of these results and in all of the rest of the CSPs appearing in this paper, the
set X is a set of combinatorial objects and C is generated by a natural combinatorial
operator on X. We shall see that Theorems 1.1 and 1.2 are both implied by CSPs
regarding certain sets of tableaux and an action given by the sliding algorithm of
jeu-de-taquin promotion. Postponing definitions until Section 2, we state our three
main results. The following was conjetured by D. White [37].
Theorem 1.3. Let n be a rectangular partition and let X = SY T (). Let
C = Z/nZ act on X by jeu-de-taquin promotion.
Then, the triple (X, C, X(q)) exhibits the cyclic sieving phenomenon, where X(q)
is the qanalogue of the hook length formula
[n]!q
X(q) = f (q) :=
.
(i,j) [hij ]q
There are several interpretations of the polynomial X(q) in the above result.
In addition to being the natural q-analogue of the hook length formula, up to a
power of q we may also interpret X(q) to be the fake degree polynomial corresponding to the -isotypic component of the action of Sn on the coinvariant algebra
C[x1 , . . . , xn ]/C[x1 , . . . , xn ]S+n (see Proposition 4.1 Stanley [32] together with Corollary 7.21.5 of [30]). Moreover, we have that X(q) is equal to the Kostka-Foulkes
polynomial K,1n (q) corresponding to and the composition (1n ) of length n consisting entirely of 1s. Finally, up to a power of q, X(q) is equal to the qanalogue
of the Weyl dimension formula for the (1, 1, . . . , 1)-weight space of the irreducible
representation of GLn (C) having highest weight . There is a column strict version
of the above result, also conjectured by White [37].
Theorem 1.4. Let k 0 and let n be a rectangular partition. Let X = CST (, k)
and let C = Z/kZ act on X via jeu-de-taquin promotion.
Then, the triple (X, C, X(q)) exhibits the cyclic sieving phenomenon, where X(q)
is a qshift of the principal specialization of the Schur function
X(q) := q () s (1, q, q 2, . . . , q k1),
where is the statistic on partitions = (1 , 2 , . . . ) given by
() = 01 + 12 + 23 + . . . .
There are several interpretations of the polynomial X(q) in the above theorem,
as well. Just as standard tableaux of a fixed shape are enumerated by the hook
length formula, the hook content formula enumerates column strict tableaux of a fixed
shape (with uniformly bounded entries). Up to a power of q, the polynomial X(q)
is the qanalogue of the hook content formula. Also, X(q) is equal to MacMahons
generating function for plane partitions which fit inside a box having dimensions 1
by 1 by k 1 weighted by number of boxes [18]. This latter interpretation can
be easily seen via the obvious bijection between column strict tableaux and plane
partitions. Finally, up to a power of q, X(q) is equal to the qanalogue of the Weyl
dimension formula corresponding to the irreducible representation of GLk (C) having
highest weight .
The previous two results have concerned standard tableaux of fixed rectangular
shape and column strict tableaux of fixed rectangular shape and arbitrary content,
respectively. We can also formulate a result suggested by Reiner and White [21]
[37] concerning column strict tableaux of fixed shape and fixed content. Specifically,
BRENDON RHOADES
Specifically, suppose that we have some complex vector space V with basis {fx | x
X} indexed by the elements of X. Suppose further that V is equipped with the
action of a group G and denote the corresponding representation by : G GL(V ).
Finally suppose that we can find some element g G whose action on V is given by
the formula
(1.1)
(g)(fx ) = fcx ,
for all x X. That is, the matrix for the action of g with respect to the given basis of
V is the permutation matrix corresponding to the action of c on X. It is immediate
d
that for any d 0, the number of fixed points |X c | of the action of cd on X is equal
to the trace of the linear operator (g d ). In symbols, if : G C is the character of
our representation,
(1.2)
|X c | = (g d),
for all d 0. So, we have reduced our problem of enumerating fixed point sets to
the evaluation of a certain character at a certain group element. If we can interpret
this character evaluation as an appropriate root of unity evaluation of X(q), then our
CSP will be proved.
At first glance, this approach may seem to complicate matters. We must first
model our action of C on X in a representation theoretic context. Moreover, the
evaluation of the character (g d) may be no easier than the enumeration of the fixed
d
point set X c , particularly if the action of C on X is easy to understand. However,
character theory is a well studied subject and provides us with much artillery with
which to attack the former problem. An elementary and fundamentally important
example of this is that if h G is a group element which is conjugate to g, we
have that (g d ) = (hd ), where the latter character may be easier to compute. So,
under nice conditions, the problem of proving a CSP may be reduced to a problem
of studying conjugacy in a group. And, as a bonus, this method of proving a CSP
reveals representation theoretic structure that may have previously gone unnoticed.
In our situation, we will gain some understanding of why the hypothesis that our
partitions be rectangular is necessary in our results. It is this approach that we will
use in proving our CSPs.
These representation theoretic methods, however, come with some fine print. It is
often too much to ask that an equation of the form (1.1) hold. Sometimes we must
content ourselves with finding a group element g G such that for all x X we have
(1.3)
(g)(fx ) = (x)fcx ,
BRENDON RHOADES
this part of the proof of our result on standard tableaux will use results from Springers
theory of regular elements.
The remainder of this paper is organized as follows. In Section 2 we review some
tableaux theoretic definitions, the algorithm of jeu-de-taquin promotion, and some
representation theoretic tools we will be using in the proofs of our CSPs (specifically
Kazhdan-Lusztig theory). In Section 3 we prove our CSP for standard tableaux. In
Section 4 we derive a slightly new perspective on the irreducible representations of the
general linear group which will lead to a proof of our CSP for column strict tableaux
in Section 5. In Section 6 we extend the general philosophy of the proofs in Section
5 to get our result concerning column strict tableaux of fixed content. In Section 7
we extend our results on cyclic actions and prove some results which enumerate fixed
points under combinatorial dihedral actions. In Section 8 we derive corollaries of our
fixed point results on tableaux for other combinatorial actions involving handshake
patterns and the reflection group Bn . We close in Section 9 with some open questions.
.
Given a coordinate (i, j) in the Ferrers diagram of , the hook length hij at (i, j)
is the number of dots directly south or directly east of (i, j), the dot (i, j) included.
In the above partition h12 = 6. A partition is said to be rectangular if its Ferrers
diagram is a rectangle. The conjugate of a partition is the partition whose Ferrers
diagram is obtained by reflecting the Ferrers diagram for across the line y = x.
So, (4, 4, 3, 1) = (4, 3, 3, 2).
Given partitions and such that we have a set theoretic containment of Ferrers
diagrams , we define the skew partition / to be the set theoretic difference
r of Ferrers diagrams. The size of / is the difference || || and we write
/ n to denote that the skew partition / has size n.
Given a positive integer n, a composition of n is a finite sequence of nonnegative
integers = (1 , 2 , . . . , k ) which satisfies 1 + 2 + + k = n. In particular,
some of the i may be zero. We write |= n to denote that is a composition of
n. The number n is called the size || of and the number k is called the length
() of . If |= n and () = k, the composition defines a function [n] [k]
given by sending every number in the interval (1 + + i1 , 1 + + i ] to the
number i for i = 1, 2, . . . , k. We denote this function by , as well. For example, if
= (0, 2, 1, 0, 1), then : [4] [5] is given by (1) = 2, (2) = 2, (3) = 3, (4) = 5.
Given a partition = (1 , 2 , . . . , k ) of length k, define ck to be the cyclically
rotated composition (2 , 3 , . . . , k , 1 ). This defines an action of the order k cyclic
subgroup of Sk generated by (1, 2, . . . , k) on the set of all compositions of n having
length k.
Let n and let |= n be a composition with () = k. A column strict tableau
T of shape with content is a filling of the Ferrers diagram of with 1 1 s, 2 2 s,
. . . , k k s such that the numbers increase strictly down every column and weakly
across every row. An example of a column strict tableau of shape (4, 4, 3, 1) is
1 1 3 4
3 3 4 6
4 5 5
6
.
Given a partition n and a composition |= n, the set of all column strict
tableaux of shape and content is denoted CST (, k, ), where k := () reminds us of the maximum possible entry in our tableau. The set of all column
strict tableaux
S of shape with entries at most k is denoted CST (, k), so that
CST (, k) = |=n,()=k CST (, k, ). The tableaux obtained by requiring that entries increase weakly down columns and strictly across rows are called row strict and
we have the analogous definitions of RST (, k, ) and RST (, k). Finally, a tableau
is called standard if its content composition consists entirely of 1 s. We denote by
SY T () the set of all standard tableaux of shape and make the canonical identification of SY T () with CST (, n, 1n ) for n. Given any partition n, we
have the column superstandard tableaux CSS() obtained by filling in the boxes of
within each column, going from left to right. For example,
1 4 7
CSS((3, 3, 2)) = 2 5 8
3 6
.
BRENDON RHOADES
For a partition n, f := |SY T ()| is famously enumerated by the FrameRobinson-Thrall hook length formula [8]:
n!
(2.1)
f =
.
(i,j) hij
Also given a positive integer k, the Schur function associated to the partition in k
variables is the element of the polynomial ring C[x1 , . . . , xk ] given by
X
X
(2.2)
s (x1 , . . . , xk ) =
x1 1 . . . xk k .
|=n,()=k T CST (,k,)
That is, the Schur function associated to is the generating function for column strict
tableaux of shape weighted by their content compositions.
The sets X involved in the most important CSPs proved in this paper will be
standard tableaux with fixed rectangular shape, column strict tableaux with fixed
rectangular shape and uniformly bounded entries, and column strict tableaux with
fixed rectangular shape and specified content. The cyclic actions on each of these
sets will be based on jeu-de-taquin promotion, a combinatorial algorithm which we
presently outline. The action of promotion has received recent attention from Stanley
[31], who considers a related action on linear extensions of finite posets, and from
Bandlow, Schilling, and Thiery [2], who derive crystal theoretic uniqueness results
related to the action of promotion on column strict tableaux.
Roughly speaking, promotion acts on tableaux by deleting all of the highest possible
entries, sliding the remaining entries out while preserving the column strict condition,
and then increasing all entries by one and filling holes with one so that the resulting
object is a column strict tableaux. More formally, suppose that we are given a
partition n and a positive integer k. We define the jeu-de-taquin promotion
operator j : CST (, k) CST (, k) as follows. Given a tableau T in CST (, k),
first replace every k appearing in T with a dot. Suppose that there is some dot in the
figure so obtained that is not contained in a continuous strip of dots in the northwest
corner. Then, choose the westernmost dot contained in a connected component of
dots not in the northwest corner of the figure. Say this dot has coordinates (a, b),
where a > 0 and b < 0. By our choice of dot, at least one of the positions (a 1, b) or
(a, b + 1) must be filled with a number - i.e., the positions immediately west or north
of our dot. If only one of these positions has a number, interchange that number and
the dot. If both of these positions have a number, interchange the greater of these
two numbers and the dot (if the two numbers are equal, interchange the number
at the northern position (a, b + 1) and the dot). This interchange moves the dot
one unit north or one unit west. Continue interchanging the dot with numbers in
this fashion until the dot lies in a connected component of dots in the northwest
corner of the resulting figure. If all of the dots in the resulting figure are not in a
connected component in the northwest corner, choose the westernmost dot contained
in a connected component of dots not in the northwest corner of the figure and slide
this new dot to the northwest corner in the same way. Iterate this process until all
dots are contained in a connected component in the northwest corner of the figure.
Now increase all the numbers in the figure by 1 and replace the dots with 1 s. The
resulting figure is j(T ).
Example 2.1. Let T be the following element of CST ((4, 4, 3, 1), 6):
1 1 3 4
3 3 4 6
T = 4 5 5
6
.
We compute the image j(T ) of T under jeu-de-taquin promotion.
1 1 3 4
3 3 4 6
T = 4 5 5
7
1 1 3 4
3 3 4
4 5 5
7
1 3 4
1 3 4
3 5 5
4
1 3
1 1 2 4
1 3 4 4
2 4 5 5
7 3 5 5
7 4 6 6
= j(T )
4
5
Notice that the content of T is (2, 0, 3, 3, 2, 2) and the content of j(T ) is (2, 2, 0, 3, 3, 2)
- that is, j acts by cyclic rotation on content compositions. Also notice that the result
of applying j to T depended on our considering T as an element of CST ((4, 4, 3, 1), 6).
If we had considered T as an element of CST ((4, 4, 3, 1), k) for any k > 6, then we
would have
2 2 4 5
4 4 5 7
j(T ) = 5 6 6
7
.
For the proof of the following lemma about promotion, see [25] or [30].
Lemma 2.1. Let T be in CST (, k).
1. The tableau j(T ) is well-defined, i.e., independent of the order in which we chose
dots to slide northwest in the algorithm.
2. The tableau j(T ) is column strict with entries k.
3. If T has content , then j(T ) has content ck .
So, j is indeed a well defined function CST (, k) CST (, k). By running the
defining algorithm for j in reverse, we see that j is a bijection and we call its inverse
j 1 jeu-de-taquin demotion. By Part 3 of the above lemma, j restricts to an operator
10
BRENDON RHOADES
(2.3)
si sj = sj si
for |i j| > 1,
(2.4)
si sj si = sj si sj
for |i j| = 1,
(2.5)
s2i = 1
for all i.
11
for |i j| > 1,
(2.7)
for |i j| = 1,
(2.8)
Ts2i = (1 q)Tsi + q
for all i.
12
BRENDON RHOADES
extending linearly over C. In the latter formula, the inverse in the subscript is taken
in the symmetric group Sn and the inverse in the exponent is taken in the Hecke
algebra Hn (q). Notice that in the specialization at q = 1, the involution D is just the
identity map on C[Sn ].
Theorem 2.2. (Kazhdan-Lusztig
[14]) There is a unique basis
P
1/2 (w)
{Cw (q) = (q
)
vSn Pv,w (q)Tv | w Sn } of Hn (q) such that
The KL function is well behaved with respect to left and right multiplication by
the long element wo Sn , as well as taking the inverses of the permutations involved.
For a proof of the following lemma, see for example [4].
Lemma 2.4. Let u, v Sn . We have that (u, v) = (wo v, wou) = (vwo , uwo) =
(wo uwo, wo vwo ). Also, we have that (u, v) = (u1 , v 1).
13
1 3 4 5
1 3 4 6
.
, 2
623415 7 2
6
5
Define the shape sh(w) of a permutation w to be the shape of either P (w) or Q(w).
So, sh(623415) = (4,1,1).
To further explore the interaction between the RSK algorithm and the algebraic
properties of the Coxeter group Sn , we introduce the notion of a descent set of a
tableau. Given n and T SY T (), the descent set D(T ) of T is the subset of
[n 1] defined by i D(T ) if and only if i + 1 occurs strictly south and weakRoughly
speaking, promotion acts on tableaux by deleting all of the highest possible entries,
sliding the remaining entries out while preserving the column strict condition, and
then altering entries and filling holes so that the resulting object is a column strict
tableaux.ly west of i in T . For example, if
1 3 5
T = 2 4 7
6
,
14
BRENDON RHOADES
then D(T ) = {1, 3, 5}. In the case of rectangular tableaux, we will later generalize
the descent set to another combinatorial object called an extended descent set which
will help us greatly in proving our representation theoretic results.
The RSK algorithm behaves in a predictable way with respect to taking inverses,
finding descent sets, and left and right multiplication by the long permutation wo . To
show this, we recall Sch
utzenbergers combinatorial algorithm of evacuation. Given
an arbitrary partition n and a tableau T in CST (, k) for some k 0, define
the image e(T ) of T under evacuation as follows. First, embed T in the northwest
corner of a very large rectangle. Then rotate the rectangle by 180 degrees, moving T
to the southeast corner. Then, for i = 1, 2, . . . , k, replace each i occurring in T with
k i + 1. Finally, use the jeu-de-taquin sliding algorithm to move the boxes of T from
the southeast corner to the northwest corner of the rectangle. The resulting tableau
is e(T ).
Lemma 2.5. Let n and let T CST (, k, ) for some k 0 and some composition = (1 , 2 , . . . , k ).
1. e(T ) is a well-defined element of CST (, k), that is, independent of the choices
involved in embedding or sliding.
2. The content of e(T ) is (k , k1 , . . . , 1 ).
3. The operator e is an involution, that is, e(e(T )) = T always.
With Part 2 of the above lemma as motivation, given a composition = (1 , . . . , k ),
we define wok to be the reverse composition (k , k1 , . . . , 1 ). It follows from the
above lemma that e restricts to an involution on SY T () for arbitrary partitions
. Evacuation interacts nicely with RSK. Proofs of these results can be found, for
example, in [25] and [4].
Lemma 2.6. Let w Sn and suppose w 7 (P, Q).
1. w 1 7 (Q, P ).
2. wo w 7 (P , e(Q) ).
3. wwo 7 (e(P ) , Q ).
4. wo wwo 7 (e(P ), e(Q)).
5. i DL (w) if and only if i D(P ).
6. i DR (w) if and only if i D(Q),
where T denotes the conjugate of a standard tableau T .
RSK leads to a natural triple of equivalence relations on Sn . We say that two permutations v, w Sn are left Knuth equivalent if we have P (w) = P (v). Analogously,
v and w are right Knuth equivalent if we have the equality Q(w) = Q(v). Finally, we
have an equivalence relation given by w v if and only if w and v have the same
shape. Amazingly, these algorithmic, combinatorial equivalence classes agree with
the KL cells.
15
w C{Cw (1)}, where the w in the direct sum ranges over all permutations such that
either sh(T ) <dom sh(w) or T = P (w). Also by the paragraph following Theorem 2.7
L
the module S0,T contains an Sn -invariant submodule S1,T := w C{Cw (1)}, where
now w ranges over all permutations such that sh(T ) <dom sh(w). It therefore makes
sense to define S ,T to be the quotient module
S ,T := S0,T /S1,T .
The vector space S ,T carries an action of the group algebra C[Sn ]. We can identify
the basis vectors of S ,T with elements of SY T () via associating to a tableau U of
16
BRENDON RHOADES
generators si on the space S ,T is completely determined by the symmetrized KL function and the purely combinatorial descent set of a tableau. Identifying the basis
elements of S ,T with tableaux in SY T (), we have that the action of si on S ,T is
given by the explicit formula
(
P
if i D(P )
P
(2.10)
si P =
P + iD(Q) [P, Q]Q if i
/ D(P ).
This formula can be proven via some reasonably explicit manipulations of the KL
basis and KL polynomials [9]. In particular, the action of si does not depend on the
tableau T that we chose in the construction of S ,T . It follows that the matrices giving
the left action of si with respect to the given bases of S ,T and S ,U are literally equal
(up to reordering basis elements) for any two standard tableaux T, U SY T ().
With this strong isomorphism in hand, we define the C[Sn ]-module S to be the
C[Sn ]-module S ,T for any choice of T SY T (). Again remarkably, the modules S
are precisely the irreducible representations of Sn . For an exposition and extended
version of the following result, see [9].
Theorem 2.9. The module S is isomorphic as a C[Sn ]-module to the irreducible
representation of Sn indexed by the partition .
S is called the (left) KL cellular representation indexed by . The basis elements
of S are homomorphic images of a subset of the KL basis of C[Sn ] and are in
natural bijection with the elements of SY T (). This avatar of the Specht modules will
turn out to be very useful in the representation theoretic modeling of combinatorial
operators.
An earlier use of the modules S in this way is due to Berenstein, Zelevinsky [3]
and Stembridge [35] and concerns the action of the evacuation operator e. Since e has
order 2, one would hope to find an order 2 element in the symmetric group Sn which
maps (up to sign) to the permutation matrix corresponding the evacuation under the
KL cellular representation. It turns out that the long element does the trick.
Theorem 2.10. (Berenstein-Zelevinsky [3], Stembridge [35]) Identify the basis vectors
of the Kazhdan-Lusztig (left) cellular representation corresponding to with elements
P SY T (). Denote this representation by : Sn GL(S ). Let wo Sn be the
long element.
Then, up to a plus or minus sign, we have that (wo ) is the linear operator which
sends P to e(P ), where e is evacuation.
Informally, this result states that given any partition n, the image of the long
element wo Sn models the action of evacuation on SY T (). It will turn out that for
rectangular partitions , the image of the long cycle (1, 2, . . . , n) in Sn will model the
17
action of promotion on SY T (). A straightforward application of the MurnaghanNakayama rule determines whether the sign appearing in the above theorem is a plus
or a minus. The issue of resolving this sign will be slightly more involved for us and
will be taken care of by direct manipulation of the KL basis. In the next section we
show precisely how this is done.
3. Promotion on Standard Tableaux
Given a rectangular shape = ba with ab = n, we want to determine how the
operation of jeu-de-taquin promotion on SY T () interacts with the left KL cellular
representation S of shape . Our first goal is to show that the promotion operator
j interacts nicely with the function.
Define a deletion operator d : SY T (ba ) SY T (ba1 (b 1)) by letting d(U) be the
(standard) tableau obtained by deleting the n in the lower right hand corner of U. It
is easy to see that d is a bijection. Our first lemma shows that d is well behaved with
respect to the function.
Lemma 3.1. For any U, T SY T (ba ), we have that [U, T ] = [d(U), d(T )].
Proof. The line of reasoning here is similar to one used by Taskin in Lemma 3.12 of
[36].
Recall that for any partition n we have the associated column superstandard
tableau CSS() defined by inserting the numbers 1, 2, . . . , n into the diagram of first
from top to bottom within each column, then from left to right across columns. Define
permutations u = u1 . . . un , v = v1 . . . vn Sn and t = t1 . . . tn1 , w = w1 . . . wn1
Sn1 by their images under RSK:
u 7 (U, CSS(ba )),
v 7 (T, CSS(ba )),
w 7 (d(U), CSS(ba1 (b 1)),
t 7 (d(T ), CSS(ba1 (b 1)).
Using the definition of the RSK algorithm its easy to check that, using one-line
notation for permutations in Sn ,
u1 . . . un = w1 w2 . . . wna (n)wna+1 . . . wn1 ,
v1 . . . vn = t1 t2 . . . tna (n)tna+1 . . . tn1 .
By a result of Brenti ([5], Theorem 4.4), we have an equality of Kazhdan-Lusztig
polynomials Pw,t (q) = Pw(n),t(n) (q). For 1 k n, define permutations w (k) and
t(k) in Sn by w (k) := sk sk+1 sn1 (w(n)), t(k) := sk sk+1 sn1 (t(n)). Here w(n)
(respectively t(n)) is the permutation in Sn whose one-line notation is w1 . . . wn1 n
18
BRENDON RHOADES
(respectively t1 . . . tn1 n). By the above remarks it follows that w (na+1) = u and
t(na+1) = v.
We claim that for all k, Pw(k) ,t(k) (q) = Pw(k+1) ,t(k+1) (q). It will then follow by induction and Brentis result that Pu,v (q) = Pw,t(q). To see this, notice that w (k) = sk w (k+1) ,
t(k) = sk t(k+1) , and the transposition sk satisfies sk DL (w (k+1) ) DL (t(k+1) ). These
conditions together with Lemma 2.3 in the case c = 1 imply that we have the following
polynomial relation:
(3.1) Pw(k) ,t(k) (q) = Psk w(k+1) ,sk t(k+1) (q)
= Pw(k+1) ,t(k+1) (q) + qPsk w(k+1) ,t(k+1) (q)
(r,t(k) )
2
sk r<r
(i1)
(i1)
19
This lemma and the above example give some representation theoretic justification
for why we need our hypotheses that be rectangular in Theorems 1.5 through
1.7, but perhaps leave mysterious why these results fail in general for rectangles
minus outer corners. We will soon give combinatorial intuition for why the strictly
rectangular hypotheses are needed.
Proof. (of Proposition 3.2) We prove this first for the case of rectangular shapes.
The case of shapes which are rectangular minus an outer corner will follow easily. We introduce a family of operators on tableaux. Define a creation operator
c : SY T (ba1 (b 1)) SY T (ba ) by letting c(T ) be the tableau obtained by adding
a box labeled n to the lower right hand corner of T . Given a tableau T of shape /,
let r(T ) be the tableau obtained by rotating T by 180 degrees and let (T ) be the
tableau obtained by replacing every entry i in T with |T | + 1 i. Given a standard
tableau T which is not skew, let J(T ) be the tableau obtained by embedding T in
the northwest corner of a very large rectangle, and playing jeu-de-taquin to move the
boxes of T to the southeast corner. Observe that we have the following relations of
operators:
I. r = r
II. e = rJ
III. j = rcrJd
Let P and Q be standard tableaux of shape ba . With the above definitions, we have
the following chain of equalities:
[P, Q] = [d(P ), d(Q)]
(Lemma 3.1)
= [ed(P ), ed(Q)]
= [rJd(P ), rJd(Q)]
(II)
= [crJd(P ), crJd(Q)]
(Lemma 3.1)
= [ecrJd(P ), ecrJd(Q)]
= [rJcrJd(P ), rJcrJd(Q)]
(II)
= [rcrJd(P ), rcrJd(Q)]
= [rcrJd(P ), rcrJd(Q)]
(I)
= [j(P ), j(Q)].
(III)
This completes the proof for the case of rectangular shapes. For the case of shapes
which are rectangular minus an outer corner, notice that we have the following equality of operators on SY T (ba1 (b 1)):
IV. j = djc.
20
BRENDON RHOADES
(Lemma 3.1)
(c(P ), c(Q) are rectangles)
= [djc(P ), djc(Q)]
= [j(P ), j(Q)].
(Lemma 3.1)
(IV)
21
22
BRENDON RHOADES
element C(j(CSS()),CSS())
(1) in the expansion of C(CSS(),CSS())
(1)cn in the KL basis
a1
of C[Sn ] is (1) .
(1)(x,u) x,
xSab
Cu (1)cn =
(1)(x,u) xcn .
xSab
The unique Bruhat maximal element xo cn for which xo Sab has one-line notation
xo cn = (a+1)a . . . 32(2a+1)(2a) . . . (a+2)(3a+1) . . . (2a+2) . . . n(n1) . . . (na+2)1.
Right multiplying by c1
n yields that
xo = a(a1) . . . 21(2a) . . . (na)(na1) . . . (n2a+1)(n1)(n2) . . . (na+1)(n).
Therefore, xo and u differ by a cycle of length a and (1)(xo ,u) = (1)a1 . It follows
that there exist numbers y C,
X
Cu (1)cn = (1)a1 Cx o cn (1) +
y Cy (1).
y<xo cn
The coefficient we are interested in is v . First, notice that the Bruhat interval
[v, xo cn ] consists of all permutations in Sn whose one line notation has the form
(a + 1)a . . . 31 (2a + 1)(2a) . . . (a + 3)2 . . . n(n 1) . . . (n a + 2)b ,
zw (1)
(z,w)
23
All of the conditions in the above paragraph imply that v = (1)a1 , as desired.
We now have all of the ingredients necessary to analyze the relationship between
j and the KL representation. Specifically, we show that up to a predictable scalar, j
acts like the long cycle (1, 2, . . . , n) Sn . This gives our desired analogue of Equation
1.5.
Proposition 3.5. Let = ba be a rectangular shape with ab = n and let :
Sn GL(S ) be the associated KL cellular representation, with basis identified with
SY T (). Let cn denote the long cycle (1, 2, . . . n) Sn . Define a C-linear map
J : S S by extending J(P ) = j(P ). We have that
(3.2)
(cn ) = (1)a1 J.
Proof. We want to show that the operator J 1 (cn ) commutes with the action of Sn .
If we can do this, by Schurs Lemma it will follow that for some constant C
we have the equality of operators J = (cn ). In [35], Stembridge used this sort of
argument to prove Theorem 2.10.
Since Sn is generated by the simple reflections si for i = 1, 2, . . . , n1, it is enough to
show that J 1 (cn ) commutes with (si ) for each i = 1, 2, . . . , n1. From conjugation
within the symmetric group we know that (cn )(si ) = (si+1 )(cn ) always, where
we interpret sn to be the affine transposition (1, n). So, it is enough to show that
J 1 (si+1 ) = (si )J 1 always. For i = 1, 2, . . . , n 2 this will follow from the action
of Coxeter generators on S , but for i = n 1 this poses a problem since there is no
known nice formula in general for the action of sn on these modules. In fact, we show
that J 1 (cn ) commutes with (si ) for only i = 1, 2, . . . , n 2 and then apply the
branching rule for restriction of irreducible symmetric group modules to show that
these commutation relations are in fact sufficient for our purposes.
We first show that for i = 1, 2, . . . , n 2 we have
J 1 (cn )(si ) = (si )J 1 (cn ).
Given a standard tableau P , let j 1 (P ) be the unique tableau which maps to P under
promotion. From the corresponding conjugation relation in the symmetric group it
follows that
(cn )(si ) = (si+1 )(cn ).
24
BRENDON RHOADES
The first equality is the action of the simple transpositions on the cellular KL basis,
the second is Lemma 3.3, the third is Proposition 3.2, and the fourth is again the
definition of the action of simple transpositions.
The above discussion implies that the operator J 1 (cn ) commutes with the action
of the parabolic subgroup Sn1 of Sn on the irreducible Sn -module S . Since is
a rectangle, has a unique outer corner and by the branching rule for symmetric
groups, the restriction S SSnn1 remains an irreducible Sn1 -module. Therefore, by
Schurs Lemma, we conclude that there is a number C so that
J = (cn ).
We want to show that = (1)
a1
The above result states that for Specht modules of rectangular shape the image of
the long cycle cn under the KL representation is plus or minus the permutation matrix
which encodes jeu-de-taquin promotion. It is not true that any conjugate of cn in Sn
enjoys this property - indeed, many are not even permutation matrices. Observe the
analogy to Theorem 2.10 which states that the image of the long element wo under
the KL representation for an arbitrary shape is plus or minus a permutation matrix
which encodes evacuation.
Also notice that if is a partition of any nonrectangular shape, then has more
than one outer corner. This implies that the restricted module S SSnn1 is not irreducible and the above proof breaks down.
As a corollary to this we get a classical result on the order of promotion [11].
Corollary 3.6. For n rectangular, every element of SY T () is fixed by j n .
Remark 3.2. For arbitrary partitions it is not true that the order of promotion on
SY T () divides ||. In fact, this order for arbitrary is unknown. So, the hypothesis
that be rectangular in the statement of the the corollary is necessary. Moreover, it
25
is not in general true that for a rectangular partition n the order of promotion
on SY T () is equal to n. For an extreme counterexample, if is either a single row
or a single column, the set SY T () consists of a single element and j has order 1.
Other counterexamples exist, minimal among them = (2, 2). The author does not
know of a formula for the order of j on SY T () for arbitrary shapes . As a possible
indication of the subtlety here, given any nonrectangular partition n, there exists
a tableau P SY T () which is not fixed by the nth power of promotion [19].
For the special case of staircase shapes = (k, k 1, . . . , 1) n, the operator j 2n
fixes every element of SY T (). This leads one to hope that the KL cellular basis may
be exploited in studying the action of promotion on SY T () for staircase shapes .
Unfortunately, even for the staircase (3, 2, 1) we do not have the result analogous to
Proposition 3.2 that j preserves the function. It is, however, possible to show that
for any staircase , the action of j || on SY T () is given by transposition, which is
known to preserve the function. Taken together, the operators of transposition and
evacuation generate a group isomorphic to the Klein four group Z/2ZZ/2Z, leaving
some hope that the study of the action of this smaller group might be analyzed by our
methods. Unfortunately, the case of the staircase (3, 2, 1) also shows that no power j d
for 1 d 5 preserves the function, so it would seem difficult to use our methods
to analyze the action of any of the larger groups on the set SY T () generated by
lower positive powers of j together with evacuation.
Even in the case of rectangular shapes , the previous corollary does not give the
order of j on a specific tableau T SY T (). For the case where has 3 rows,
this order can be interpreted as the order of the cyclic symmetry of a combinatorial
object associated to T called an A2 web [20].
Let sn denote the affine transposition (1, n) in Sn . As another corollary, we get
a nice formula for the image of sn under the KL representation.
Corollary 3.7. Let = ba be a rectangular shape and identify the basis of the corresponding left KL cellular representation with SY T ().
We have that
(
P
P
sn P =
P + nDe (Q) [P, Q]Q
if n De (P )
if n
/ De (P ).
Proof. Using the notation of the proof of the above proposition, we have that sn1
commutes with the action of J 1 (c). It follows that J 1 sn (P ) = sn1 J 1 (P ). The
desired formula follows.
Finally, the above analysis leads to many equalities of coefficients.
26
BRENDON RHOADES
1 4
1 2
1 3
1 3
1 2
2 5
3 5
2 4 2 5
3 4
3 6 , 4 6 , 5 6
4 6 , 5 6
Mapping the elements of these orbits to their column reading words in S6 , the above
Corollary implies that when v is any element of the set {321654, 521643, 431652} S6
and w is any element of the set {421653, 531642} we have that [v, w] is a constant.
Since 421653 covers 321654 in Bruhat order, we see that this common value of is
equal to 1.
An application of the above proposition yields Theorem 1.3, our desired result on
cyclic sieving in the action of jeu-de-taquin on standard tableaux. Implicit in the
statement of Theorem 1.3 is the fact that the nth power of promotion fixes every
element of SY T (). This fails if is nonrectangular. Even if we were to replace
C with the cyclic group having order equal to the order of promotion on SY T ()
for nonrectangular , the action of promotion together with the appropriate q-hook
length formula would still not in general yield a CSP. For example, consider the
shape = (3, 3, 1) 7. There are 21 standard tableaux of shape and the action of
promotion breaks SY T () up into three orbits having sizes 3, 5, and 13. Thus, the
order of promotion on SY T () is 3 5 13 = 195. It can be shown that the q-hook
length formula for the shape lambda is X(q) = (1+q+q 2 +q 3 +q 4 +q 5 +q 6 )(1+q 2 +q 4 ).
The evaluation of X(q) at a primitive 195th root of unity is not even real, let alone
equal to zero, the number of fixed points of one iteration of promotion on SY T ().
Example 3.4. In the above example of the action of promotion on SY T ((2, 2, 2)),
we have that
[6]!q
f (2,2,2) (q) =
= (1 q + q 2 )(1 + q + q 2 + q 3 + q 4 ).
[4]q [3]q [2]q [3]q [2]q [1]q
i
27
28
BRENDON RHOADES
will essentially be a homomorphic image of a subset of the dual canonical basis for
the polynomial ring C[x11 , . . . , xkk ] and, as such, will bear spiritual similarities to
Lusztigs canonical basis [17]. As a starting point of our construction, we introduce a
family of polynomials called immanants. The homomorphic images of an appropriate
subset of these polynomials will be the zero weight space of our representations.
For a positive integer n N, let x = (xij )1i,jn be an n n matrix of commuting
variables and let C[x11 , . . . , xnn ] be the complex polynomial ring in these variables.
We will sometimes abbreviate the latter ring as C[xij ]1i,jn . Call a polynomial
in C[xij ]1i,jn an immanant if it belongs to the C-linear span of the permutation
monomials {x1,w(1) xn,w(n) | w Sn }. Thus, immanants form an n!-dimensional
complex vector space. Given any polynomial f (x11 , . . . , xnn ) C[xij ]1i,jn and an
n n matrix A = (aij ) with entries in any commutative Calgebra R, define f (A)
to be the element f (a11 , . . . , ann ) of R obtained by applying f to A.
Following [24], define for any w Sn the w-Kazhdan-Lusztig immanant Immw (x)
by the equation
X
(4.1)
Immw (x) =
(1)(w,v) Pwo v,wo w (1)x1,v(1) xn,v(n) .
vw
Specializing to the identity permutation, we have that Imm1 (x) = det(x). So, at least
superficially, KL immanants are deformations of the determinant. It can be shown
that the KL immanants share the properties of Schur nonnegativity and total nonnegativity with the determinant [24], and that for the case of permutations w which
are 321-avoiding, the application of the KL immanant Immw (x) to the path matrix
of a planar network has a combinatorial interpretation which naturally generalizes
Lindstroms Lemma [23]. By the Bruhat triangularity of the KL polynomials, the set
{Immw (x) | w Sn } forms a basis for the vector space of immanants.
We will find it necessary to work with KL immanants defined on variable sets with
repeated entries. More precisely, given any pair of compositions , |= n, we define
the matrix x, to be (x(i),(j) )1i,jn . Note that either or both of () or () may
exceed n. We also construct the corresponding polynomial ring C[x(i),(j) ]1i,jn .
For a permutation w Sn , denote by Immw (x, ) the element of C[x(i),(j) ]1i,jn
which results in applying the w-KL immanant to the matrix x, . So, for example,
we have that Immw (x) = Immw (x1n ,1n ). In this paper we will mostly be interested in
the case where = 1n .
Example 4.1. Take n = 3 and let = (1, 2) and
given by
x11 x12
x(1,2),(1,1,1) = x11 x12
x21 x22
x13
x13
x23 .
29
si w > w,
si w < w.
Using the formula in the above lemma, one can show that the KL immanants
form a cellular basis for the vector space of immanants. More precisely, identifying
permutations with their images under RSK, for any n and T SY T (), we have
30
BRENDON RHOADES
VT,n,1
n := C{Imm(T,P ) (x) | P SY T ()}
>dom
is closed under the left action of Sn . This closure is essentially a consequence of the
fact that the formula in Lemma 4.2 is almost the same as the formula for the action
of si on the KL basis of C[Sn ].
Since VT,n,1
n is closed under the action of C[Sn ] for any T , it follows immediately
that the quotient space
M
1 4 5
std(P ) = 2 6
SY T ((3, 2, 2)).
3 7
31
32
BRENDON RHOADES
Proof. Let S denote the parabolic subgroup of Sn which setwise fixes the intervals
[1, 1 ], [1 + 1, 1 + 2 ], and so on. By Skanderas results on the dual canonical basis
[27], we have that Imm(T,U ) (x,1n ) 6= 0 if and only if the inverse image w of (T, U)
under RSK is a Bruhat maximal element of some left coset of S in Sn . It is easy to
show using the properties of jeu-de-taquin and RSK that this happens if and only if U
is -semistandardizable. The claim about linear independence follows from Theorem
4.1.
Example 4.4. As we have seen in Example 4.1, we have that Imm213 (x(2,1),(1,1,1) ) is
nonzero and Imm231 (x(2,1),(1,1,1) ) = 0. It is easy to see that the permutation 213 and
231 row insert as follows:
1 3
1 3
213 7
2
, 2
1 3
1 2
.
231 7
2
, 3
Therefore, the recording tableau for 213 is (2, 1)-semistandardizable whereas the
recording tableau for 231 is not. The nonvanishing and vanishing of the associated
polynomials is therefore predicted by Lemma 4.4.
We are finally ready to define our general linear group modules. For any T
VT,k
:=
C{Imm(T,U ) (x,1n )
C{Imm(P,Q)(x ,1n )},
<dom
P,Q
where the first set ranges over all compositions |= n such that () = k and
all U SY T () which are -semistandardizable and the second set ranges over all
compositions |= n with ( ) = k and all pairs of tableaux P, Q SY T (). We
Proof. For 1 i < k and z C, let Ei,z (resp. Fi,z ) denote the elementary matrices
in GLk (C) which are obtained by replacing the 0 in position (i, i + 1) (resp. (i + 1, i))
. If
is closed under the action of si Sk . Let Imm(P,Q) (x,1n ) be a basis element of VT,k
we let si be the composition given by si := (1 , . . . , i1 , i+1 , i , i+2 , . . . , k ) |=
n, it follows that the polynomial si Imm(P,Q) (x,1n ) is equal to the image of w
33
Imm(P,Q) (x1n ,1n ) under the C-algebra homomorphism xi,j 7 x (i),j . Here w is the
permutation in Sn which is obtained by replacing the square diagonal submatrix of
size |i + i+1 | in the n n identity matrix corresponding to rows and columns in
(1 + + i1 , 1 + + i+1 ] with an antidiagonal matrix of 1s. It follows from
Theorem 2.7 and the analogous actions of Equations 2.10 and 4.4 that this latter
a1 ak . Thus, VT,k
is closed under the action H.
m[n]I
Expanding out the terms in parenthesis and regrouping, we see that the above expression is equal to
Y
Y
Y
X
X
(1)(v,w) Pwo v,wo w (1)
x(i+1)v(j)
xiv()
x(m),v(m) .
z |J|
JI
jJ
vSn
IJ
m[n]I
Fix a subset J I. Let y be any permutation in Sn which fixes every letter not in I
and rearranges the letters of I so that the letters in J are mapped into a contiguous
suffix. Let |= n be the composition of n defined by
:= (1 , . . . , i1 , i |J|, i+1 + |J|, i+1 , . . . , k ).
By the discussion following Lemma 4.2, the image of
Y
Y
Y
X
(1)(v,w) Pwo v,wo w (1)
x(i+1)v(j)
xiv()
x(m),v(m)
vSn
jJ
IJ
m[n]I
Since the subset J was arbitrary and since we already know that VT,k
is closed under
the action of Sk , it follows that VT,k is stable under the action of Fi,z 1 , as desired.
34
BRENDON RHOADES
The above result can be found in [7] together with [27]. At any rate, we define VT,k
to be the quotient GLk (C)-module given by
!
M MM
VT,k := VT,k
/
C{Imm(P,Q) (x ,1n )} ,
>dom
P,Q
where the second direct sum ranges over compositions |= n with ( ) = k and
the third direct sum ranges over all standard tableaux P and Q of shape . Basis
elements of VT,k are given by the images of the polynomials Imm(T,U ) (x,1n ) for compositions = (1 , . . . , k ) |= n and -semistandardizable U. The image of the above
polynomial in VT,k shall be abbreviated I (U ), where U is the unique element of
RST (, k, ) such that std(U ) = U.
Theorem 4.6. The GLk (C)-module VT,k is isomorphic to the dual of the irreducible
finite dimensional GLk (C)-module with highest weight , where is the shape of T .
Moreover, for any |= n with () = k, the weight space of VT,k corresponding to
is equal to the C-linear span of {I (U)}, where U ranges over RST (, k, ).
Proof. We compute the Weyl character of VT,k . Let h := diag(a1 , . . . , ak ) be an element of the Cartan subgroup of GLk (C) for some nonzero complex numbers a1 , . . . , ak .
It is easy to see that the action of h on some basis element I (U) for U row strict
with content is given by
1
k
I (U).
h I (U) = a
a
1
k
(Here we recall that our action of GLk (C) came from the contragredient action.) Since
the set of all I (U) where U ranges over all row strict tableaux of shape and entries
k forms a basis for VT,k , it follows that h acts on VT,k with trace
X
X
1
k
a
a
.
1
k
|=n,()=k U RST (,k,)
1
This latter sum is the combinatorial definition of the Schur function s (a1
1 , . . . , ak ),
which is the Weyl character of the dual of the irreducible finite dimensional GLk (C)module with highest weight .
1 2
3 4.
|RST ((2, 2), 3)|+|RST ((2, 1, 1), 3)| |SY T (2, 1, 1)|+
|RST ((1, 1, 1, 1), 3)| |SY T (1, 1, 1, 1)| = 6 + 15 3 + 35 1 = 86
35
linearly independent polynomials which are obtained as above by applying KL immanants corresponding to permutations in S4 which row insert to any of the shapes
(2, 2), (2, 1, 1), or (1, 1, 1, 1) to 4 4 matrices in the 9 variables x11 , . . . , x33 with
possibly repeated rows. Also as explained above, we only consider KL immanants
corresponding to the permutations with shape (2, 2) whose insertion tableaux are
First note that the permutations in S4 with insertion tableau T are precisely 3412
and 3142. It can be shown that the KL immanants corresponding to these permutations are
Imm3412 (x) = x13 x24 x31 x42 x14 x23 x31 x42 x13 x24 x32 x41 + x14 x23 x32 x41
and
Imm3142 (x) = x13 x21 x34 x42 x13 x22 x34 x41 x13 x24 x31 x42 x14 x21 x33 x42
+ x14 x22 x33 x41 + x13 x24 x32 x41 + x14 x23 x31 x42 x14 x23 x32 x41 .
Let To be the tableau given by
To =
1 3
2 4
and I(1,2,1) (rst(1,2,1) (T )) is the homomorphic image of this in the quotient VT,3
.
36
BRENDON RHOADES
j rst = rstck j k ,
37
C[xij ]1i,jn and d maps C[x(i)j ]1i,jn into C[xck (i)j ]1i,jn . We have the following
commutative square.
cnk
(5.2)
C[xij ]1i,jn
C[xij ]1i,jn
ck
C[x(i)j ]1i,jn C[xck (i)j ]1i,jn
ck
Proof. The commutativity of this diagram is easily checked on the generators xij of
the algebra in the upper left.
Recall that in the last section we constructed representations VT,k of GLk (C) for a
fixed standard tableau T with n boxes. Let VT,k, be the subspace of VT,k generated by
the elements {I (U)}, where U ranges over RST (, k, ). By Theorem 4.6, the spaces
VT,k, give the weight space decomposition of the irreducible representation VT,k . In
terms of this weight space decomposition, the commutative square (5.2) implies the
following commutative square:
cnk
(5.3)
VT,n,1n
VT,n,1n
ck .
VT,k, VT,k,ck
ck
38
BRENDON RHOADES
1 1
2 2
1 1
2 2 , 3 3 , 3 3
which does indeed have order k = 3.
1 2
1 2
1 1
2 3 , 3 3 , 2 3
Finally we are able to prove Theorem 1.4. As in the standard tableau case of
Theorem 1.3, the hypothesis that is rectangular is necessary. For arbitrary shapes
, the order of the operator j on CST (, k) is unknown. Also as with the standard
case, even if we removed the rectangular condition and replaced C by the cyclic group
of size the same as the order of j on CST (, k) (still taking X(q) to be the principal
specialization of s ), this result would not be true.
Example 5.2. Keeping with the earlier example of = (2, 2) and k = 3, we compute
that ((2, 2)) = 2 and s(2,2) (x1 , x2 , x3 ) = x21 x22 +x22 x23 +x21 x23 +x1 x22 x3 +x1 x2 x23 +x21 x2 x3 .
Maintaining the notation of Theorem 5.7, we therefore have that X(q) = 1 + q + 2q 2 +
2i
q 3 + q 4 . Letting = e 3 , we see that
X(1) = 6 X() = 0 X( 2 ) = 0.
These numbers agree with the fixed point set sizes:
2
|X 1 | = 6 |X j | = 0 |X j | = 0,
as predicted by Theorem 1.4.
Proof. (of Theorem 1.4) We prove the equivalent assertion which is obtained by re
placing X by RST (, k) and X(q) by q ( ) s (1, q, q 2, . . . , q k1). We fix a standard
tableau T of shape and consider the action of (1, 2, . . . , k) on VT,k .
2i
39
( m )( ) = (e
2i
k
mab(b1)
2
= (e k )mn(b1)
= (ei )(1 ++m )(b1)
= (1)(1 ++m )(b1) .
However, we already know that
(1 ++m )(b1)
cm
I (j m (U)).
k I (U) = (1)
It follows that for any r 0, the coefficient of I (U) in crk I (U) is r( ) if j r (U) = U
and 0 otherwise. Therefore, the trace of the operator crk on the space VT,k is equal to
r
r( ) |X j |.
On the other hand, the operator crk is conjugate to diag(1, r , (2r) , . . . , (k1)r )
in GLk (C). It is easy to see that if P is row strict with content , then I (P )
is an eigenvector for the latter operator with eigenvalue (1r )1 ( r )2 ( 2r )3 .
It follows that the trace of crk on V is the specialization of the Schur function
s (1, q, q 2, . . . , q k1) at q = r . The desired CSP follows.
As a pair of corollaries to Theorem 1.4, we can prove Reiner-Stanton-Whites results
from the introduction quite easily.
Proof. (of Theorem 1.1) Interchange n and k in Theorem 1.4 and take to be a single
column.
Proof. (of Theorem 1.2) Interchange n and k in Theorem 1.4 and take to be a single
row.
6. Promotion on Column Strict Tableaux with Fixed Content
In this section we fix a rectangular partition = ba with ab = n, a positive integer
k and a composition |= n with () = k such that has some cyclic symmetry.
We prove a near-CSP involving the action of certain powers of promotion on the set
CST (, k, ) and the Kostka-Foulkes polynomials. In representation theoretic terms,
this corresponds to a weight space refinement of our results in the last section.
Assume that for some integer d|k, we have that the composition has cyclic symmetry of order d. That is, i = j whenever i j (mod d). Since j maps the set
CST (, k, (1, . . . , k )) into the set CST (, k, (k , 1 , 2 , . . . , k1)), we have that
the dth power j d of j maps the set CST (, k, ) into itself. Note that for the special
40
BRENDON RHOADES
To get our fixed point result, we will need some information about the evaluation
of Kostka-Foulkes polynomials at roots of unity. Lascoux, Leclerc, and Thibon [16]
have interpreted these evaluations in terms of ribbon tableaux. We define the relevant
combinatorial objects.
For a positive integer m, an m-ribbon is a connected skew shape with m boxes which
contains no 2 by 2 squares. The southwesternmost box of an m-ribbon is called the
head of the m-ribbon and the northeasternmost box of an m-ribbon is called the tail
of the m-ribbon.
For any skew partition /, an m-ribbon tableau of shape / is a tiling of the
diagram of / by m-ribbons with a number attached to every m-ribbon in the tiling.
Observe that the set of m-ribbon tableaux of shape is empty unless m divides |/|.
41
K,d a1d
add d ,
where the sum on the right hand side is over all compositions |=
nd
.
k
The domino case d = k2 of the above lemma was known, for example, to Stembridge [35]. We also remark that the right hand side of the above identity can
be interpreted as a product of specializations of Schur functions. In particular let
k
((1) , (2) , . . . , ( d ) ) be the kd -quotient of the partition and let be the kd -core of .
42
BRENDON RHOADES
(6.3)
d
s(i) (a1 , a2 , | . . . , ad )|.
|s (a1 , da1 , . . . , kda1 , . . . , ad , . . . , | kdad )| = |i=1
Proof. We show that both sides of this equation satisfy the same recursion.
For the left hand side of the above equation, observe that in any column strict
tableaux in CST (, k), the last kd letters {k d + 1, k d + 2, k} of [k] must
appear in a skew shape flush with the exterior of the shape . This gives a partition
of CST (, k) according to this skew shape /.
We consider the skew Schur function specialization s/ (1, d, . . . , kd) for the various skew shapes /. By a result of Lascoux, Leclerc, and Thibon [16], we have
that the above is equal to 0 if / is not a horizontal kd -ribbon strip and is equal to
k (/) if / is a horizontal kd -ribbon strip.
d
For the right hand side, given any column strict kd -ribbon tableau T of content
= (1 , . . . , d ), we have that the restriction of T to the number d is a horizontal kd ribbon strip of skew shape / for some normal shape . On the other hand, given
any normal shape such that / is a horizontal kd -ribbon strip of with k ribbons
and any column strict kd -ribbon tableau To of shape and content (1 , 2 , . . . , g
k1 ),
k
we have that To extends uniquely to a column strict d -ribbon tableau T of shape and
It follows that both sides of the above equation satisfy the same recursion
content .
relation and, thus, the above equation holds for arbitrary partitions . Also, we have
that both sides of the above equation are equal to zero when is not a kd -ribbon
tableau.
Proof. (of Theorem 1.5)
d
For any composition |= n of length k, let N,
denote the number of column
strict tableaux of shape and content which are fixed by the operator j d . Observe
d
that N,
is nonzero only if i = j whenever i j (mod d).
Let ck = (1, 2, . . . , k) denote the long cycle in Sk GLk (C). Let T be an arbitrary
standard tableau of shape and let VT,k be the irreducible GLk (C-representation
constructed in Section 4. Identify the basis elements of VT,K with symbols I (P ) for
compositions of n of length k and column strict tableaux P of shape and content
43
where VT,k, is the C-linear subspace of VT,k spanned by the vectors I (P ) for P
CST (, k, ). Recall that each of the subspaces VT,k, is stabilized by the Cartan
subgroup H of diagonal matrices in GLk (C) and the action of ck maps the space
VT,k, into the space VT,k,ck .
2i
(6.5)
d
N,
a1d add d ,
(6.6)
where the sum on the lattermost expression ranges over all compositions of n of
length k such that i = j whenever i j (mod d). By Lemma 6.2 we can interpret
the first expression in the above sequence of equalities as follows.
(6.7)
d
N,
a1d
add
K,d a1d
add d ,
where the sum on the left hand side ranges over all compositions of n having
length k such that i = j whenever i j (mod d) and the sum on the right hand
side ranges over all compositions of nd
having length d. Choosing the complex
k
numbers a1 , . . . , ad to be algebraically independent over Q, we can view this latter
equation as a polynomial identity. It follows that if is any composition of n of
length k satisfying i = j whenever i j (mod d) and if we set := (1 , 2 , . . . , d ),
we have the equality
k
d
N,
= K,d .
It remains to relate the right hand side of the above equation to the evaluation of a
Kostka-Foulkes polynomial at an appropriate root of unity. This is Theorem 6.1.
Remark 6.1. It would be desirable to strengthen Theorem 1.5 to a genuine CSP.
One obvious way of doing this would be to find an expression f (, ) potentially
44
BRENDON RHOADES
depending on both the rectangular partition and the composition such that the
triple (CST (, k, ), hj di, q f (,) K, (q)) exhibits the CSP. That is, our polynomial
X(q) would just be a qshift of a Kostka-Foulkes polynomial. By Lascoux-LeclercThibon we know that the evaluation of the Kostka-Foulkes polynomial K, (q) itself
at the relevant roots of unity is plus or minus the correct positive number, but we do
not know of an expression f (, ) which takes this sign into account.
7. Dihedral Actions
The cyclic sieving phenomenon is concerned with the enumeration of the fixed point
set sizes when we are given an action on a finite set X by a finite cyclic group C.
However, there are many interesting combinatorial actions on finite sets where the
group in question is not cyclic. In general, given a finite group G acting on a finite set
X, we can ask for the fixed point set sizes |X g | for all g G. For the case where G is
a product of two cyclic groups, Barcelo, Reiner, and Stanton have proven an instance
of a bicyclic sieving phenomenon involving complex reflection groups where the fixed
point set sizes involved are obtained by evaluating a polynomial X(q, t) Q[q, t] in
two variables at two appropriate roots of unity. In our case, we are interested in
actions of dihedral groups D generated by promotion and evacuation on either of the
sets SY T () or CST (, k), where is a fixed rectangular shape and k 0. While it
is not yet known how to interpret the associated fixed point set sizes as evaluations
of a naturally associated polynomial, we hope that this work will give motivation to
the study of a dihedral sieving phenomenon. Some work regarding dihedral actions
is in the REU report [1].
Let = ba be a rectangular partition with ab = n and let k 0. It is possible to
show that we have eje = j 1 as operators on CST (, k). Moreover, we know that
the order of the operator j is equal to k while the order of the operator e is equal to
2. This implies that the group he, ji generated by e and j, considered as a subgroup
of the symmetric group SCST (,k), is dihedral of order 2k. Similar remarks hold for
the action of e and j on RST (, k) and SY T ().
We have already determined that the action of j on the above sets of tableaux is
modeled by the action of the long cycle of an appropriate symmetric group on an
appropriate module. By Stembridges result, the action of e can be modeled by the
action of the long element wo . So, corresponding to the dihedral group acting on
the sets CST (, k), RST (, k), and SY T (), we get an isomorphic dihedral group
generated by the long cycle and wo sitting inside Sk , Sk , and Sn , respectively. Our
first observation gives the cycle types of the operators wo and wo cn in the symmetric
group Sn .
Lemma 7.1. Let wo Sn be the long element and let cn Sn be the long cycle
n1
n
(1, 2, . . . , n). The permutation wo has cycle type 2 2 when n is even and 2 2 1 when
45
n1
2
Proof. This is straightforward from the definition of permutation multiplication. Looking at the dihedral group generated by cn and wo , this essentially asserts that if n
is odd, any element of the unique conjugacy class of reflections within the symmetry
group of an n-gon fixes one vertex and if n is even there are two conjugacy classes of
reflections fixing zero or two vertices. See Figure 7.1.
This simple lemma about permutation multiplication allows us to pin down, including sign, the action of the operators wo and wo cn on the cellular representation.
As in Section 3, given a rectangular partition = ba , identify the basis of the KL
cellular representation of Sn corresponding to with SY T ().
Proposition 7.2. Let = ba be a rectangle and let be the KL cellular representation
corresponding to . We have that
(
e(P )
if b is even
(wo )P =
(7.1)
a2
(1) e(P ) if b is odd
if b is even
e(j(P ))
( a2 1)
(wo cn )P = (1)
(7.2)
e(j(P )) if b is odd and a is even
(1) a2 e(j(P ))
if b, a are odd.
Proof. Recall that the KL cellular representation corresponding to a shape is an
irreducible Sn module of shape . By Theorem 2.10 and Proposition 3.5, we need
only verify that the signs in these equations are correct. To do this we will use the
46
BRENDON RHOADES
Murnaghan-Nakayama rule (see, for example, [25]). For any of the 3 cycle types
which appear in Lemma 7.1, there exists a corresponding removal of rim hooks from
the corresponding rectangle with the appropriate sign.
In particular, if b is even, we can fill the diagram of with n2 rim hooks of shape
2 1 in the case of wo and ( n2 1) rim hooks of shape 2 1 together with two rim
hooks of shape 1 1 in the case of wo c. In either case, the product (1)h() over all
the rim hooks in either of these fillings, where h() is the height of , is equal to 1.
If b is odd and a is even for the case of wo , we can fill the diagram of with na
2
rim hooks of shape 2 1 in the left (b 1) a box and a2 rim hooks of shape 1 2
a
in the first column. The sign of this filling is equal to (1) 2 . In the case of wo c with
the same parity conditions on a and b, we can replace the upper left 1 2 rectangle
a
in the filling with two 1 1 rim hooks, and the resulting filling has sign (1)( 2 1) .
If b and a are both odd, in the case of wo and wo cn we can fill the diagram of
with na
rim hooks of shape 2 1 in the left (b 1) a box, a2 rim hooks of shape
2
1 2 in the lower portion of the first column of , and one 1 1 rim hook in the
a
upper left hand corner of . The sign of this filling is (1) 2 .
It is possible to show that the sign of all rim hook fillings of corresponding to the
conjugacy class of either wo or wo cn is the same, either 1 or 1. The desired result
now follows from the Murnaghan-Nakayama rule.
Observe that, in this case, we were able to use the Murnaghan-Nakayama rule to
deduce the sign of our permutation matrices relatively easily. This is in contrast to
the proof of Lemma 3.4, where we needed to use special facts about the KL cellular
representation. In fact, it is possible to use the Murnaghan-Nakayama rule in a similar
way to derive Lemma 3.4 in the cases where both a and b are not odd, but for this
particular case more specific facts are needed.
We already know that the number of points fixed by the action of a given power of
j on standard tableaux is given by the evaluation of the q-hook length formula at an
appropriate root of unity. The previous lemma allows us to give the number of fixed
points of the operators e and ej on standard tableaux as a character evaluation.
Proposition 7.3. Let = ba be a rectangular partition of n, let c be the long cycle
in Sn , and let : Sn C be the irreducible character of Sn corresponding to . Let
he, ji be the dihedral subgroup of SSY T () generated by e and j and let : hwo, cn i
he, ji be the group epimorphism defined by (wo ) = e and (c) = j. For any g he, ji
and any w such that (w) = g one has
|SY T ()g | = (w).
(wo cn )
a
(7.4)
|SY T ()ej | = (1)( 2 1) (wo cn )
(1) a2 (w c )
o n
47
is even
is odd
if b is even
if b is odd and a is even
if b and a are odd.
Our next task is to extend these results to facts about the dual canonical basis. Let
be a rectangular partition and let k 0. By the results of Section 4, there exists
a basis {I (P )} for the GLk (C)-module VT,k for T SY T () fixed, where ranges
over all compositions of n of length k and P ranges over all elements of RST (, k, ).
For any choice of and P and any diagonal matrix g = diag(x1 , . . . , xk ) GL(Ck ),
1 2
the vector I (P ) is an eigenvector for g with eigenvalue x
x2 . We first show
1
how multiplication by the long elements interacts with the projection maps .
Lemma 7.4. Let be a rectangular partition and fix T SY T (). Let won be the long
permutation in Sn and let wok be the long permutation in Sk . We have the following
commutative diagram, where = (1 , . . . , k ) |= n and wok is the composition of
n of length k given by (k , k1, . . . , 1 ).
won
(7.5)
VT,n,1n
VT,n,1n
wok
VT,k, VT,k,wok
wok
48
BRENDON RHOADES
that
(
I(k ,...,1 ) (e(P ))
if a is even
wok I (P ) =
2b
(1) I(k ,...,1 ) (e(P )) if a is odd
(b1)
(1)( 2b +k (b1)) I
if b, a are odd.
(k1 ,k2 ,...,1 ,k ) (ej(P ))
Proof. This combines previously proven results about the actions of the long element
and the long cycle.
Our results about fixed points have two flavors. When k is odd, j and ej are
conjugate in the dihedral group he, ji and hence have the same number of fixed points
as operators on CST (, k). However, when k is odd, e and ej are not conjugate, so
different numbers of fixed points are possible. Parts of the next theorem come from
conjectures and results of Abuzzahab, Korson, Li, and Meyer [1] and a theorem of
Stembridge [35].
Theorem 7.6. Let = ba be a rectangular partition of n and let k 0. Assume that
at k is odd. We have that
(7.6)
(7.7)
|CST (, k)ej | =
b
1+()
2
(1)
s (1, 1, . . . , (1)k1)
a
a
a
a
and b even
even, b odd
odd, b even
and b odd.
Proof. The claims about the operator e are Theorem 3.1 of [35]. The claim about the
operator ej in the case where k is odd follows from the claim about the operator j
by conjugacy, as mentioned above. We are reduced to the claim about the operator
ej in the case where k is even. As before, we prove the equivalent statement for row
strict tableaux. This can be obtained by copying the above claim verbatim, replacing
every RST with a CST , every with a , and swapping every b for every a.
49
50
BRENDON RHOADES
a new proof of a result of White [37], as well as a new proof of results of Heitsch
[12] which have biological applications related to RNA secondary structure. The
case of handshake patterns gives a very explicit realization of the dihedral actions
investigated in Section 7.
Given n N, a handshake pattern of size 2n consists of a circle around which the
points 1, 2, . . . , 2n are written clockwise and a perfect matching on the set [2n] such
that, when drawn on the circle, none of the arcs in this matching intersect. This can
be thought of as a way in which the people labelled 1, 2, . . . , 2n can all shake hands so
that no one crosses arms. Let Hn denote the set of all handshake patterns of size 2n.
Handshake patterns can be identified with the basis elements for the Temperley-Lieb
algebra Tn () (see, for example, [23]).
For n N, a noncrossing partition of [n] is a set partition (P1 |P2 | . . . |Pk ) of the set
[n] so that whenever there are integers a, b, c, d, i, and j with 1 a < b < c < d n
and a, c Pi and b, d Pj , we must necessarily have that i = j. Noncrossing
partitions have a pictorial interpretation. Drawing the numbers 1, 2, . . . , n clockwise
around a circle, a partition of [n] is noncrossing if and only if, when the blocks of
are drawn on the circle, none of the regions intersect.
Recall that a poset L is a lattice if and only if given any pair of elements x, y L,
there exist unique least upper bounds and greatest lower bounds for x and y (denoted
x y and x y, respectively). If L is a finite lattice and x L, then an element
y L is said to be a complement to x if we have x y = 1 and also x y = 0.
Here 1 and 0 denote the unique maximal and minimal elements of L. A finite lattice
L is said to be complemented if every element has at least one complement. The
set NC(n) of all noncrossing partitions of [n] is a lattice with respect to the partial
order given by refinement (however, this lattice is not a sublattice of the lattice of all
partitions since the formulas for the least upper bounds and greatest lower bounds do
not agree). The lattice NC(n) is complemented, and given a noncrossing partition
of [n], Kreweras complementation [15] gives a way to produce a complement of .
Write the numbers 1, 1 , 2, 2, . . . , n, n clockwise around a circle. Draw the blocks of
on the numbers 1, 2, . . . , n. Now draw the unique maximal noncrossing partition
of the numbers 1 , 2 , . . . , n which does not intersect the blocks of . Call this new
partition . Kreweras showed that is a complement to in NC(n). Complements
in NC(n) are not in general unique and it is an open problem to determine how many
complements there are in NC(n) for a fixed noncrossing partition of [n].
Both of the
sets Hn and NC(n) have cardinality given by the Catalan number
2n
1
Cn = n+1
. Moreover, these sets both carry an action of the cyclic group - in the
n
case of Hn given by the action of rotating the table clockwise by one position and in
the case of NC(n) given by Kreweras complementation. As a corollary of our earlier
work, we get results of White [37] and Heitsch [12].
51
Theorem 8.2. Let n N and let C = Z/(2n)Z. Let X(q) be the q-Catalan number
1
2n
.
X(q) = Cn (q) =
[n + 1]q n q
Let X be either Hn equipped with the C-action of rotation or NC(n) equipped with
the C-action of Kreweras complementation.
Then, the triple (X, C, X(q)) exhibits the cyclic sieving phenomenon.
Proof. It is well known (see, e.g., Heitsch [12]) that there exists a bijection NC(n)
Hn under which Kreweras complementation corresponds to rotation, so we need only
prove this theorem in the case where X = Hn . To do this, we use a bijection Hn
SY T ((n, n)) which maps rotation to jeu-de-taquin promotion. It is well known that
the q-Catalan numbers are equal to the q-hook length formula in the special case of
a 2 by n partition, so then the result will follow from Theorem 1.3.
To construct this bijection, given a handshake pattern h Hn , fill the top row
of a 2 by n tableau T with the smaller members of each of the n handshake pairs
in h in increasing order left to right. Fill the bottom row of T with the smaller
members of each handshake pair in increasing order from left to right. Since h is a
handshake pattern, it follows that T is a standard tableau. It is easy to see that the
correspondence h 7 T defines a bijection Hn SY T ((n, n)).
White proved that, under the above bijection, rotation maps to promotion [37].
For completeness, we prove this again here.
Given a tableau T SY T (n, n), define the ascent set A(T ) of T to be the subset
of [2n 1] defined by i A(T ) if and only if i + 1 occurs strictly north and weakly
east of i in T . It is easy to check that for i = 1, 2, . . . , 2n 2, i is contained in A(T )
if and only if i is contained in A(j(T )). Moreover, by Lemma 3.3, j acts cyclically on
the extended descent set. It is easy to check that the ascent set and extended descent
set of a two-row rectangular standard tableau T together determine the associated
handshake pattern. Moreover, it is easy to check that table rotation acts cyclically
on the ascent set and extended descent set of the associated tableau. Therefore,
the bijection between Hn and SY T ((n, n)) maps table rotation to promotion, as
desired.
White proved the portion of Theorem 8.2 involving handshake patterns directly in
the investigation of the rectangular standard tableaux CSP conjecture, thus proving
the conjecture in the case of tableaux with 2 rows. Having proven this more general
conjecture in Theorem 8.2 we get Whites result on handshake patterns as a corollary.
The set Hn also carries an action of the dihedral group D4n of order 4n. Namely,
we think of the points 1, 2, . . . 2n as the vertices of a regular 2n-gon and let D4n act
52
BRENDON RHOADES
naturally. Let r denote the reflection in D4n across the line bisecting the pairs of
vertices (1, 2n) and (n, n + 1). Let s denote rotation in D4n by one clockwise unit.
Proposition 8.3. Let X be either the set Hn or the set NC(n). X carries an action
of D4n , where r and s have the action described above in the case of Hn and act by
reflection about the line through 1 bisecting the circle and Kreweras complementation
in the case of NC(n). Let wo denote the long element of S2n and let c denote the long
cycle (1, 2, . . . , 2n) in S2n .
Then, the number of fixed points of the operators r and rs on X are given by the
formulas:
(
(n,n) (wo )
if n is even
|X r | =
(8.1)
(n,n)
(1)
(wo ) if n is odd
(8.2)
|X rs | = (n,n) (wo c)
Proof. It is easy to see, given the simplified algorithm for evacuation in the case of
rectangular tableaux, that under Whites bijection Hn SY T ((n, n)) the action of
r corresponds to evacuation. Moreover, it is simple to see that under the bijection of
Heitsch [12] Hn NC(n), the action of r corresponds to reflection across the line
bisecting the circle and going through the vertex labelled 1. Therefore, the result
follows from the specialization of Proposition 7.2 to the case a = 2 and b = n.
9. Open Problems
Most of the results in this paper have enumerated some fixed point set via some
representation theoretic interpretation of the associated action. These enumerative
results imply a collection of bijections involving standard tableaux.
Corollary 9.1. Let n be a rectangular partition and suppose d|n. Then, there is
a bijective correspondence between the set of tableaux in SY T () fixed by j d and the
n
set of column strict nd -ribbon tableaux of shape with content 1 d .
Corollary 9.2. Let n be a rectangular partition and suppose d|k are positive
integers. Then, there is a bijective correspondence between the set of tableaux in
CST (, k) fixed by j d and the set of column strict kd -ribbon tableaux of shape with
labels drawn from [ kd ].
Corollary 9.3. Let n be a rectangular partition and let |= n be a composition
with () = k. Suppose that d|k and cdk = . Then, there is a bijective correspondence between the set of tableaux in CST (, k, ) which are fixed by j d and the set of
column strict kd -ribbon tableaux of shape and content (1 , 2 , . . . , d ).
These combinatorial results naturally lead to the following problem.
53
Problem 9.4. Write down an explicit bijection between any of the above three pairs
of sets.
As we mentioned, one of the reasons that we required to be rectangular in Theorems 1.3, 1.4, and 1.5 was that j n does not in general fix every element of SY T ()
for arbitrary partitions n. This leads to the following question.
Question 9.5. Let n be an arbitrary partition. What is the order of the promotion
operator j on SY T ()? What about on CST (, k) for some fixed k 0? What about
on CST (, k, ) for some fixed k 0 and composition |= n with () = k?
Related to determining the order of promotion on nonrectangular tableaux is the
problem of determining the cycle structure of its action.
Question 9.6. Let n be an arbitrary partition and let the cyclic group C act on
SY T () where the action is generated by jeu-de-taquin promotion. Find an explicit
polynomial X(q) such that (SY T (), C, X(q)) exhibits the CSP. Do the same for
column strict tableaux, with or without fixed content.
10. Acknowledgments
The author would like to thank Serge Fomin, Vic Reiner, Mark Skandera, Dennis
Stanton, John Stembridge, Muge Taskin, and Dennis White for many helpful conversations. Also, the author would like to thank the anonymous referees for many
helpful comments regarding correcting errors, improving exposition, and in particular
pointing out a (as presented corrected) flaw in the proof of Lemma 3.3.
References
[1] O. Abuzzahab, M. Korson, M. Li, and S. Meyer. Cyclic and dihedral sieving for plane
partitions (2005). U. Minnesota REU Report.
[2] J. Bandlow, A. Schilling, and N. Thiery. On the uniqueness of promotion operators on
tensor products of type A crystals (2008). Available on arXiv: 0806.3131.
[3] A. Berenstein and A. Zelevinsky. Canonical bases for the quantum groups of type Ar and
piecewise linear combinatorics. Duke Math. J., 82 (1996) pp. 473502.
rner and F. Brenti. Combinatorics of Coxeter groups. Springer (1995).
[4] A. Bjo
[5] F. Brenti. Combinatorial properties of the Kazhdan-Lusztig R-polynomials for Sn . Adv. Math.,
126, 1 (1997) pp. 2151.
[6] R. K. Brylinski. Limits of weight spaces. J. Amer. Math. Soc., 2 (1989) pp. 517533.
[7] J. Du. Canonical bases for irreducible representations of quantum GLn . Bull. London Math.
Soc., 24, 4 (1992) pp. 325334.
[8] J. S. Frame, G. B. Robinson, and R. M. Thrall. The hook graphs of the symmetric
group. Canad. J. Math., 6 (1954) pp. 316325.
[9] A. M. Garsia and T. J. McLarnan. Relations between Youngs natural and the KazhdanLusztig representations of Sn . Adv. Math., 69 (1988) pp. 3292.
54
BRENDON RHOADES
[10] M. Haiman. On mixed insertion, symmetry, and shifted Young tableaux. J. Combin. Thy. Ser.
A, 50, 2 (1989) pp. 196225.
[11] M. Haiman. Dual equivalence with applications, including a conjecture of Proctor. Discrete
Math., 99 (1992) pp. 79113.
[12] C. E. Heitsch. Kreweras complementation and orbits in Catalan lattices. Submitted, 2007.
[13] A. Joseph, G. Letzter, and S. Zelikson. On the Brylinski-Kostant filtration. J. Amer.
Math. Soc., 13 (2000) pp. 945970.
[14] D. Kazhdan and G. Lusztig. Representations of Coxeter groups and Hecke algebras. Inv.
Math., 53 (1979) pp. 165184.
[15] G. Kreweras. Sur les partitions non croisees dun cycle. Discrete Math., 1, 4 (1972) pp.
333350.
[16] A. Lascoux, B. Leclerc, and J.-Y. Thibon. Green polynomials and Hall-Littlewood functions at roots of unity. Euorp. J. Combinatorics, 15 (1994) pp. 173180.
[17] G. Lusztig. Canonical bases arising from quantized enveloping algebras. J. Amer. Math. Soc.,
3 (1990) pp. 447498.
[18] P. MacMahon. Combinatory Analysis, vol. 1 and 2. Cambridge Univ. Press, Cambridge
(1915).
[19] T. K. Petersen and B. Rhoades. Notes on the order of promotion (2008). In progress.
[20] P. Pylyavskyy. A2 web immanants (2008). In progress.
[21] V. Reiner (2007). Personal communication.
[22] V. Reiner, D. Stanton, and D. White. The cyclic sieving phenomenon. J. Combin. Theory
Ser. A, 108 (2004).
[23] B. Rhoades and M. Skandera. Temperley-Lieb immanants. Ann. Comb., 9, 4 (2005) pp.
451494.
[24] B. Rhoades and M. Skandera. Kazhdan-Lusztig immanants and products of matrix minors.
J. Algebra, 304, 2 (2006) pp. 793811.
[25] B. Sagan. The Symmetric Group. Springer, New York (2001).
[26] B. E. Sagan. Shifted tableaux, Schur Q-functions, and a conjecture of R. Stanley. J. Combin.
Theory Ser. A, 45, 1 (1987) pp. 62103.
[27] M. Skandera. On the dual canonical and Kazhdan-Lusztig bases and 3412, 4231-avoiding
permutations (2006). Submitted.
[28] T. A. Springer. Regular elements of finite reflection groups. Invent. Math., 29 (1974) pp.
159198.
[29] R. Stanley. Enumerative Combinatorics, vol. 1. Cambridge University Press, Cambridge
(1997).
[30] R. Stanley. Enumerative Combinatorics, vol. 2. Cambridge University Press, Cambridge
(1999).
[31] R. Stanley. Promotion and evacuation. Electronic J. Combinatorics, 15, 2 (2008-2009).
[32] R. P. Stanley. Invariants of finite groups and their applications to combinatorics. Bull. Amer.
Math. Soc. (N.S.), 1, 3 (1979) pp. 475511.
[33] D. Stanton and D. White. A Schensted algorithm for rim-hook tableaux. J. Combin. Theory
A, 40 (1985) pp. 211247.
[34] J. Stembridge. On minuscule representations, plane partitions, and involutions in complex
Lie groups. Duke Math J., 73 (1994) pp. 469490.
[35] J. Stembridge. Canonical bases and self-evacuating tableaux. Duke Math. J., 82, 3 (1996)
pp. 585606.
[36] M. Taskin. Properties of four partial orders on standard Young tableaux. J. Combin. Theory
Ser. A. In press, 2006.
55