<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Kesten–McKay Law for Random Subensembles of Paley Equiangular Tight Frames</title></titleStmt>
			<publicationStmt>
				<publisher></publisher>
				<date>04/01/2021</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10303784</idno>
					<idno type="doi">10.1007/s00365-020-09516-z</idno>
					<title level='j'>Constructive Approximation</title>
<idno>0176-4276</idno>
<biblScope unit="volume">53</biblScope>
<biblScope unit="issue">2</biblScope>					

					<author>Mark Magsino</author><author>Dustin G. Mixon</author><author>Hans Parshall</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[We apply the method of moments to prove a recent conjecture of Haikin, Zamir and Gavish [22] concerning the distribution of the singular values of random subensembles of Paley equiangular tight frames. Our analysis applies more generally to real equiangular tight frames of redundancy 2, and we suspect similar ideas will eventually produce more general results for arbitrary choices of redundancy.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Frame theory concerns redundant representations in a Hilbert space. A frame <ref type="bibr">[16]</ref> is a sequence {&#981; i } i&#8712;I in a Hilbert space H for which there exist &#945;, &#946; &#8712; (0, &#8734;) such that</p><p>for every x &#8712; H. If every &#981; i has unit norm, then we say the frame is unit norm, and if &#945; = &#946;, we say the frame is tight <ref type="bibr">[12]</ref>. In the special case where H = R d , a frame is simply a spanning set, but unit norm tight frames are still interesting and useful <ref type="bibr">[5,</ref><ref type="bibr">27]</ref>. For example, equiangular tight frames are unit norm tight frames with the additional property that | &#981; i , &#981; j | is constant over the choice of pair {i, j}. Equiangular tight frames are important because they necessarily span optimally packed lines, which in turn find applications in multiple description coding <ref type="bibr">[33]</ref>, digital fingerprinting <ref type="bibr">[28]</ref>, compressed sensing <ref type="bibr">[2]</ref>, and quantum state tomography <ref type="bibr">[30]</ref>; see <ref type="bibr">[18]</ref> for a survey.</p><p>Various applications demand control over the singular values of subensembles of frames. In quantum physics, Weaver's conjecture <ref type="bibr">[38]</ref> (equivalent to the Kadison-Singer problem <ref type="bibr">[24,</ref><ref type="bibr">10]</ref>, and recently resolved in <ref type="bibr">[25]</ref>) concerns the existence of subensembles of unit norm tight frames with appropriately small spectral norm. Compressed sensing <ref type="bibr">[9,</ref><ref type="bibr">14]</ref> has spurred the pursuit of explicit frames with the property that every subensemble is well conditioned <ref type="bibr">[13,</ref><ref type="bibr">6,</ref><ref type="bibr">2]</ref>, or at least that most subensembles are well conditioned <ref type="bibr">[35,</ref><ref type="bibr">8]</ref>. In this vein, Gurevich and Hadani <ref type="bibr">[19]</ref> established that random subensembles of incoherent ensembles satisfy Wigner's semicircle law when the subensemble size is a vanishing fraction of the full ensemble size. Motivated by applications in erasure-robust analog coding, Haikin, Zamir and Gavish <ref type="bibr">[22,</ref><ref type="bibr">21]</ref> recently considered the case in which this fraction is fixed. Of particular interest are random subensembles of equiangular tight frames, and in this paper, we consider equiangular tight frames comprised of 2d vectors in R d , which correspond to symmetric conference matrices. (Note that such frames have already received some attention in the context of compressed sensing <ref type="bibr">[2,</ref><ref type="bibr">3]</ref>.)</p><p>An n &#215; n matrix S is said to be a conference matrix if (i) S ii = 0 for every i &#8712; [n],</p><p>(ii) S ij &#8712; {&#177;1} for every i, j &#8712; [n] with i = j, and</p><p>(iii) S S = (n -1)I.</p><p>A symmetric conference matrix of order n exists whenever n -1 &#8801; 1 mod 4 is a prime power (by a Paley-based construction), and only if n &#8801; 2 mod 4 and n -1 is a sum of two squares <ref type="bibr">[23]</ref>. Explicitly, the Paley conference matrices are obtained by building a circulant matrix from the Legendre symbol and then padding with ones, for example:</p><p>where "&#177;" denotes &#177;1. One may verify that the above example satisfies S 2 = 5I. For every n &#215; n symmetric conference matrix S, it holds that I + 1 &#8730; n-1 S is the Gram matrix of an equiangular tight frame consisting of n vectors in R n/2 <ref type="bibr">[33]</ref>. In particular, the equiangular tight frames that arise from the Paley conference matrices are known as Paley equiangular tight frames. In what follows, we consider random principal submatrices of symmetric conference matrices with the understanding that they may be identified with the Gram matrix of a random subensemble of the corresponding equiangular tight frame.</p><p>Given an n &#215; n symmetric matrix Z with eigenvalues &#955; 1 &#8804; &#8226; &#8226; &#8226; &#8804; &#955; n , we let &#181; Z denote the uniform probability measure over the spectrum of Z (counted with multiplicity):</p><p>This is known as the empirical spectral distribution of Z. If Z is a random matrix, then its empirical spectral distribution &#181; Z is a random measure. We say a sequence {&#950; i } &#8734; i=1 of random measures converges weakly almost surely to a non-random measure &#181; if for every bounded continuous function f : R &#8594; R, it holds that the random variable R f (x)d&#950; i (x) converges to R f (x)d&#181;(x) almost surely. We are interested in random matrices of a particular form. Let I denote a random subset of <ref type="bibr">[n]</ref> such that the events {1 &#8712; I}, . . . , {n &#8712; I} have probability p and are independent. Then for any fixed n &#215; n matrix A, we write X &#8764; Sub(A, p) to denote the (random) principal submatrix of A with rows and columns indexed by I. For instance, take S from (1), put p = 1/3, and draw X &#8764; Sub(S, p). Then the random index subset I &#8838; {1, . . . , 6} equals {2, 4} with probability p 2 (1p) 4 = 16/729, in which case X = [ 0 - -0 ]. Note that the size of the random matrix X is a random variable with binomial distribution.</p><p>Following <ref type="bibr">[15]</ref>, we define the Kesten-McKay distribution with parameter v &#8805; 2 by</p><p>Recall that a lacunary sequence is a set {n i : i &#8712; N} of natural numbers for which there exists &#955; &gt; 1 such that n i+1 &#8805; &#955;n i for every i. We are now ready to state our main result; see Figure <ref type="figure">1</ref> for an illustration.</p><p>Theorem 1. Fix p &#8712; (0, 1 2 ), take any lacunary sequence L for which there exists a sequence {S n } n&#8712;L of symmetric conference matrices of increasing size n, and consider the corresponding random matrices X n &#8764; Sub(S n , p). Then the empirical spectral distribution of 1 p &#8730; n X n converges weakly almost surely to the Kesten-McKay distribution with parameter v = 1/p. We note that Theorem 1 is the first proven instance of an assortment of conjectures posed by Haikin, Zamir and Gavish in <ref type="bibr">[22]</ref>. In general, we expect random submatrices of the Gram matrix of an equiangular tight frame of n vectors in C d to have empirical spectral distribution corresponding to the Wachter distribution <ref type="bibr">[37]</ref> (also known as the MANOVA distribution) with parameters determined by both the sample probability p and the redundancy n d . As partial progress toward proving these conjectures, Haikin, Zamir and Gavish <ref type="bibr">[21]</ref> demonstrated that for any sequence of equiangular tight frames of any fixed redundancy, the first four moments converge in expectation to the corresponding Wachter moments. In her masters thesis <ref type="bibr">[20]</ref>, Haikin made additional combinatorial observations to facilitate an eventual proof by the method of moments. The Kesten-McKay distribution is a special case of the Wachter distribution, and as illustrated in <ref type="bibr">[15]</ref>, its moments are far less complicated. This is our reason for focusing on the redundancy-2 case, and we credit our success to the relative simplicity of these moments.</p><p>While the hypothesis p &lt; 1 2 in Theorem 1 may seem artificial at first glance, this constraint appears in the original Haikin-Zamir-Gavish conjectures <ref type="bibr">[22]</ref>, and for good reason. In terms of the equiangular tight frame &#934; &#8712; R n/2&#215;n such that &#934; &#934; = I + 1 &#8730; n-1 S, this restriction biases I to be typically smaller than the dimension n 2 so that the submatrix &#934; I of columns indexed by I has a tall, skinny aspect ratio. When |I| &gt; n 2 , then we expect a different spectral behavior since the submatrix &#934; I now has a nontrivial nullspace. In this case of large I, if we let S I denote the submatrix of S with rows and columns indexed by I, then it is straightforward to show that the eigenvalues of S I are precisely the eigenvalues of S I c , though with an additional |I| -n 2 eigenvalues equal to each of &#177; &#8730; n -1. Indeed, this follows from the facts that (i) the eigenvalues of A A are identical to the eigenvalues of AA modulo additional eigenvalues equal to 0, and (ii)</p><p>As an alternative method of drawing the random index subset I, one might be inclined to fix k and draw I uniformly from the subsets of [n] of order k. We suspect that the same convergence holds for this model by taking k = p/n , say; in fact, this might be provable from Theorem 1 by a perturbation argument. We instead focus on the model used n X along with a suitably scaled version of the Kesten-McKay density for v = 1/p. The similarity between these distributions was first observed by Haikin, Zamir and Gavish <ref type="bibr">[22]</ref>. Our main result (Theorem 1) explains this phenomenon. in the original Haikin-Zamir-Gavish conjectures, and our proof makes use of the fact that {i &#8712; I} is independent of {j &#8712; I} for i = j in this model. One might also make progress on this problem by using a transform method instead of the method of moments. In fact, such techniques have proven effective in demonstrating that random submatrices of complex Hadamard matrices satisfy a Wachter law <ref type="bibr">[36,</ref><ref type="bibr">17,</ref><ref type="bibr">1]</ref>. As an adjacent pursuit, there has been some work on constructing explicit matrices that satisfy Wigner's semicircle law <ref type="bibr">[31,</ref><ref type="bibr">32]</ref>, and it would be interesting to transfer these ideas to our setting.</p><p>In the next section, we prove Theorem 1 using the method of moments, saving the more technical portions for Section 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Notation</head><p>Given x &#8712; R n , let diag(x) denote the n &#215; n diagonal matrix whose diagonal entries are the entries of x. Given Z &#8712; R m&#215;n , let Z 2&#8594;2 denote the induced 2-norm of Z (i.e., the largest singular value of Z), and let Z S p denote the Schatten p-norm of Z (i.e., the p-norm of the singular values of Z). Throughout this paper, we will investigate how quantities relate as n &#8594; &#8734;. For example, suppose we are interested in a quantity f (n, &#952;) &#8805; 0 that depends on both n &#8712; N and some additional parameters &#952; &#8712; R m . Then we write f</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Proof of the main result</head><p>Our proof makes use of a standard sufficient condition for the almost sure weak convergence of random measures, namely, Proposition 2 below. We say that a probability measure &#181; is (a, b)-subgaussian if &#181;([-t, t] c ) &#8804; ae -bt 2 for every t &gt; 0. A probability measure is called subgaussian if it is (a, b)-subgaussian for some a, b &gt; 0. A sequence of probability measures is said to be uniformly subgaussian if there exists a, b &gt; 0 for which every probability measure in the sequence is (a, b)-subgaussian.</p><p>i=1 be a sequence of random probability measures that are almost surely uniformly subgaussian, and let &#181; be a non-random subgaussian probability measure. Suppose that for every k &#8712; N, it holds that</p><p>Then &#950; i converges weakly almost surely to &#181;.</p><p>The proof of Proposition 2 is standard (cf. Exercise 2.4.6 in <ref type="bibr">[34]</ref>): use Chebyshev's inequality and the Borel-Cantelli lemma to show</p><p>almost surely for each k &#8712; N, and then apply the moment continuity theorem to points in the convergence event. As we will see, verifying hypothesis (i) in our case reduces to a combinatorics problem, whereas hypothesis (ii) can be treated separately with the help of Talagrand concentration: Proposition 3 (Talagrand concentration, Theorem 2.1.13 in <ref type="bibr">[34]</ref>). There exists a universal constant c &gt; 0 for which the following holds: Suppose f : R n &#8594; R is both convex and &#963;-Lipschitz in &#8226; 2 , and let X be a random vector in R n with independent coordinates satisfying |X i | &#8804; b almost surely. Then for every t &#8805; 0, it holds that</p><p>Throughout, S n denotes an n&#215;n symmetric conference matrix, we draw X n &#8764; Sub(S n , p) and put Z n := 1 p &#8730; n X n . We typically suppress the subscript n. While the size of Z is random, its average size is pn, and so we use 1  pn tr(Z k ) as a proxy for R x k d&#181; Z (x). As one might expect, this is a good approximation:</p><p>Proof. Since X is a submatrix of S, it holds that </p><p>where the last step applies the fact that N has binomial distribution. This immediately implies the desired bound on |EV -EW |. Finally, since |V |, |W | p 1 almost surely, we have</p><p>which completes the result.</p><p>As such, to demonstrate hypothesis (i) from Proposition 2 in our case, it suffices to prove</p><p>The Kesten-McKay moments are implicitly computed in <ref type="bibr">[26]</ref>, and are naturally expressed in terms of entries of Catalan's triangle:</p><p>Proposition 5 (Lemma 2.1 in <ref type="bibr">[26]</ref>). For every v &#8805; 2 and k &#8712; N, it holds that</p><p>where B(n, k) denotes an entry of Borel's triangle:</p><p>To compute these limits, we first find a convenient expression for 1 n k/2+1 E tr(X k ). To this end, recall that X is the submatrix of S with index set I, and let P denote the random n &#215; n diagonal matrix such that</p><p>It remains to show that these coefficients converge to the corresponding coefficients in <ref type="bibr">(3)</ref>. First, we introduce some additional notation. Taking inspiration from Bargmann invariants <ref type="bibr">[4]</ref>, it is convenient to write </p><p>With this, we define</p><p>&#8710;(a(1), . . . , a(k)).</p><p>Considering (4), it therefore holds that</p><p>As such, to demonstrate (3), it suffices to determine the limit of V n (&#960;) for every partition &#960; of [k]. We start with a quick calculation: Lemma 6. For every &#960; &#8712; &#928;(k, t) with t &lt; k/2 + 1, it holds that V n (&#960;) &#8594; 0.</p><p>Proof. Estimate |V n (&#960;)| using the triangle inequality to obtain a sum of</p><p>) terms, each of size at most 1.</p><p>For each t &lt; k/2 + 1, this establishes that the coefficient of p t in (5) approaches zero, i.e., the corresponding coefficient in <ref type="bibr">(3)</ref>. Now we wish to tackle the limiting value of V n (&#960;) in general. In light of the related literature <ref type="bibr">[29]</ref>, it comes as no surprise that V n (&#960;) depends on whether &#960; is a so-called crossing partition. We say a partition &#960; of [k] is crossing if there exist A, B &#8712; &#960; with A = B for which there exist a 1 , a 2 &#8712; A and b 1 , b 2 &#8712; B such that a 1 &lt; b 1 &lt; a 2 &lt; b 2 . Otherwise, &#960; is said to be non-crossing. Next, for each x &#8712; [k], we let &#960;(x) denote the unique member of &#960; such that x &#8712; &#960;(x). Consider the graph G &#960; with vertex set &#960; and edges given by &#960;(x) &#8596; &#960;(x + 1) for every x &#8712; [k]; here, we interpret x + 1 modulo k so that k + 1 = 1. Let EC(k, t) denote the set of non-crossing &#960; &#8712; &#928;(k, t) for which the edges of G &#960; partition into simple even cycles. See Figure <ref type="figure">2</ref> for an example of such a partition &#960; and its graph G &#960; . Finally, let C n := 1 n+1 2n n denote the nth Catalan number. With these notions, we can describe the limit of each V n (&#960;):</p><p>Lemma 7 (Key combinatorial lemma).</p><p>(ii) Suppose &#960; &#8712; EC(k, t) and the edges of G &#960; partition into m simple cycles of sizes 2s 1 , . . . , 2s m . Then m = kt + 1 and</p><p>The proof of Lemma 7 is rather technical (involving multiple rounds of induction), and so we save it for Section 3. (Curiously, a reviewer of this paper noted that these signed products of Catalan numbers are the values of the M&#246;bius function of the non-crossing partition lattice <ref type="bibr">[29]</ref>, and this observation may eventually lead to a more bijective combinatorial proof of Lemma 7.) In the meantime, we demonstrate how Lemma 7 can be applied to prove that the coefficients in (5) converge to the coefficients in <ref type="bibr">(3)</ref>. Recall that a Dyck path of semilength n is a path in the plane from (0, 0) to (2n, 0) consisting of n steps along the vector (1, 1), called up-steps, and n steps along the vector (1, -1), called down-steps, that never goes below the x-axis. We say a Dyck path is strict if none of the path's interior vertices reside on the x-axis. Each (strict) Dyck path determines a sequence of 2n letters from {U, D} that represent up-and down-steps in the path; this sequence is known as a (strict) Dyck word. With these notions, we may prove the following result by leveraging the fact that Borel's triangle counts so-called marked Dyck paths <ref type="bibr">[7]</ref>; see Figure <ref type="figure">2</ref> for an illustration.</p><p>Proof. When t &lt; k/2+1, the result follows from Lemma 6, and when k is odd, the k edges in each G &#960; fail to partition into even simple cycles, and so the result follows from Lemma 7(i). Now suppose k is even and t &#8805; k/2 + 1. For &#960; &#8712; EC(k, t), recall that the edges of G &#960; are indexed by [k] and partitioned into simple even cycles. Define MD(&#960;) to be the words w : [k] &#8594; {U, U , D} such that for every simple cycle in G &#960; with edges indexed by T &#8838; [k],  Notice that G &#960; can be recovered from either marked Dyck path since a cycle is born with each un-marked up-step and dies once the Dyck path returns to its height from the birth of that cycle. By Theorem 2 in <ref type="bibr">[7]</ref>, marked Dyck paths are counted by entries in Borel's triangle, which explains their appearance in <ref type="bibr">(3)</ref>.</p><p>the restriction w| T is a strict Dyck word with all but its first up-steps marked (here, U denotes a marked up-step). Note that strict Dyck words of semi-length s are in one-to-one correspondence with Dyck words of semi-length s -1, and so there are C s-1 of them. As such, Lemma 7 implies that for every &#960; &#8712; &#928;(k, t), it holds that</p><p>Let MD(k, t) denote the set of marked Dyck words w : [k] &#8594; {U, U , D} with tk/2 -1 marked up-steps, none of which are at ground level. We observe that</p><p>Then equations ( <ref type="formula">6</ref>) and ( <ref type="formula">7</ref>) together give</p><p>where the last step applies Theorem 2 in <ref type="bibr">[7]</ref>.</p><p>At this point, we are in a position to verify hypothesis (i) from Proposition 2 in our case. For hypothesis (ii), we follow the approach suggested by Remark 2.4.5 in <ref type="bibr">[34]</ref> of leveraging Talagrand concentration to bound the variance. First, we pass to a setting that is more amenable to analysis with Talagrand concentration. Here and throughout, for each n &#8712; L, we fix an n &#215; n matrix F such that</p><p>Var F P 2j</p><p>Proof. Define Y := 1 p &#8730; n P SP , and observe that</p><p>Since Y commutes with P and Y P = Y , the binomial theorem gives</p><p>and so rearranging gives</p><p>The following estimate holds for any choice of random variables</p><p>Var(X i ).</p><p>The lemma follows from applying this estimate to (8) by induction on k.</p><p>Next, we establish the convexity and Lipschitz continuity required by Talagrand:</p><p>. Then f is convex and (8 k kn 1-1/2k )-Lipschitz. Proof. We adopt the shorthand notation D x := diag(x). First, f is convex since &#8226; S 2k satisfies the triangle inequality and t &#8594; t 2k is convex:</p><p>To compute a Lipschitz bound, we apply the factorization</p><p>where the last step follows from the fact that</p><p>(and similarly for v). Next, we apply the reverse triangle inequality to get</p><p>which implies the result.</p><p>Finally, we apply Talagrand concentration to obtain a variance bound:</p><p>Proof. Given the mapping f from Lemma 10, define f : R n &#8594; R in terms of subgradients by f (x) := sup</p><p>This is known as the smallest convex extension of f to R n , and it is straightforward to verify that f is convex and (8 k kn 1-1/2k )-Lipschitz with f | R = f . Let B &#8712; R n have independent entries, each equal to 1 with probability p and 0 otherwise. Since B &#8712; R almost surely, it holds that f (B) has the same distribution as F P 2k S 2k , and we let E denote its expectation. By Talagrand concentration (Proposition 3), there exists c &gt; 0 such that</p><p>Combining with Lemma 9 then gives</p><p>We may now verify hypotheses (i) and (ii) from Proposition 2 in our case.</p><p>Proof of Theorem 1. Put Z n := 1 p &#8730; n X n and &#181; := &#181; KM(1/p) . First, we modify the random measure &#181; Zn so that we may apply Proposition 2 to prove the result. Indeed, &#181; Zn fails to be a probability measure with probability (1p) n , since &#181; Zn = 0 when I = I n is the empty set. To rectify this, we define</p><p>Then it suffices to prove &#950; n &#8594; &#181; weakly almost surely, since the Borel-Cantelli lemma implies 1 {In=&#8709;} &#8594; 0 almost surely, and so for every bounded continuous f : R &#8594; R, it holds that</p><p>Conveniently, for every n &#8712; L and k &#8712; N, it holds that</p><p>almost surely, and so the left-hand side inherits moments from the right-hand side.</p><p>To apply Proposition 2, we first observe that</p><p>almost surely, and so {&#950; n } n&#8712;L are almost surely uniformly bounded, and therefore almost surely uniformly subgaussian. Similarly, &#181; is bounded and therefore subgaussian. Fix k &#8712; N.</p><p>As a consequence of Lemma 8, it holds that</p><p>and so by Lemma 4, we have</p><p>As such, {&#950; n } n&#8712;L satisfies hypothesis (i) from Proposition 2. Next, Lemma 11 establishes that Var 1 pn tr(Z k n ) p,k n -1/k , and so Lemma 4 implies</p><p>Writing L = {n i : i &#8712; N}, select &#955; &gt; 1 such that n i+1 &#8805; &#955;n i for every i &#8712; N.</p><p>As such, {&#950; n } n&#8712;L also satisfies hypothesis (ii) from Proposition 2, and so &#950; n &#8594; &#181; weakly almost surely, as desired.</p><p>3 Proof of Lemma 7</p><p>It remains to compute, for each &#960; &#8712; &#928;(k, t), the limit of We begin with some basic properties of &#8710;.  (v) If a 1 = a k-1 and a 1 = a k , then &#8710;(a 1 , . . . , a k ) = &#8710;(a 1 , . . . , a k-2 ).</p><p>Proof. First, (i) follows from the fact that S is symmetric with off-diagonal entries in {&#177;1}. Next, (ii) follows from the fact that the diagonal entries of S are 0. Recalling the definition of &#8710;, then (iii) follows from commutativity. Next suppose a k-1 = a 1 . Then</p><p>and (iv) follows since b&#8712;[n] S a k-1 b S ba 1 is the (a k-1 , a 1 ) entry of S 2 = (n -1)I. Finally, in the case where a 1 = a k-1 , we have</p><p>Let &#960; be a partition of <ref type="bibr">[k]</ref>. Recall that for j &#8712; [k], we let &#960;(j) denote the block of &#960; containing j. We extend this notation to any integer j by considering &#960;(j) to be the block of &#960; containing a representative of j modulo k. For convenience, we record the following immediate consequence of Lemma 12(iii).</p><p>Lemma 13. Let &#960; be a partition of [k] and fix j &#8712; Z. Define &#960; to be the partition of</p><p>To establish Lemma 7(i), we will show separately that V n (&#960;) &#8594; 0 for every crossing partition &#960; &#8712; &#928;(k, t) and that V n (&#960;) &#8594; 0 for every non-crossing partition &#960; &#8712; &#928;(k, t) such that G &#960; contains an odd cycle. Lemma 14. Let &#960; &#8712; &#928;(k, t) be a crossing partition. Then V n (&#960;) &#8594; 0.</p><p>Proof. For &#960; &#8712; &#928;(k, t) to be a crossing partition, it must hold that t &#8805; 2 and k &#8805; 4. Observe that the case t = 2 follows immediately from Lemma 6 since k &#8805; 4. Now consider t &gt; 2 and suppose the lemma has been established for every crossing partition on t -1 blocks. By Lemma 6, we may further suppose that k satisfies t &#8805; k/2 + 1. Then for &#960; &#8712; &#928;(k, t), the pigeonhole principle guarantees that &#960; contains a singleton block {j} &#8712; &#960;. By Lemma 13, we may assume {k} &#8712; &#960;. We proceed in cases:</p><p>Case I: &#960;(1) = &#960;(k -1). We may apply Lemma 12(v) to obtain</p><p>The restriction of &#960; \ {k} to [k -2] results in a crossing partition &#960; of [k -2] into t -1 blocks. Moreover, the above expression for V n (&#960;) implies</p><p>and so our induction hypothesis provides V n (&#960;) &#8594; 0.</p><p>Case II: &#960;(1) = &#960;(k-1). Writing out &#960; = {B 1 , . . . , B t-1 , {k}}, we choose representatives j 1 , . . . , j t-1 &#8712; [k -1] with &#960;(j i ) = B i . Then by Lemma 12(iv), we have</p><p>&#8710;(a(1), . . . , a(k -1), a(j i )).</p><p>For i, j &#8712; [t -1], we define new blocks</p><p>and the corresponding crossing partition</p><p>Since each V n (&#960; i ) &#8594; 0 by our induction hypothesis, we see V n (&#960;) &#8594; 0 as well.</p><p>For non-crossing partitions, we will study the structure of the graph G &#960; for &#960; &#8712; &#928;(k, t), which we recall has vertex set &#960; and edges &#960;(j) &#8596; &#960;(j + 1) for all j &#8712; [k]. Observe that if G &#960; has a loop, then &#960;(j) = &#960;(j + 1) for some j &#8712; [k], and so V n (&#960;) = 0 by Lemma 12(ii). For this reason, we direct our attention to loop-free partitions &#960;, that is, partitions &#960; for which G &#960; is loop-free.</p><p>Given a loop-free graph G on vertices V with edges E, we say v &#8712; V is a cut vertex if the induced subgraph of G on V \ {v} is disconnected. A graph with no cut vertices is called biconnected, and the biconnected components of a graph are its maximal biconnected subgraphs. When the biconnected components of G are all simple cycles, we call G a cactus. A reviewer of this paper noted that cactus graphs also emerge in the context of traffic freeness <ref type="bibr">[11]</ref>, but at the time of this writing, we have not fully investigated how deep this connection is. Lemma 15. If &#960; &#8712; &#928;(k, t) is a loop-free non-crossing partition, then t &#8805; k/2 + 1 and G &#960; is a cactus whose edges partition into kt + 1 simple cycles.</p><p>Proof. First, suppose G &#960; is a cactus whose edges partition into kt + 1 simple cycles. Since G &#960; has no loops, the number of cycles is at least at least half the number of edges, that is, kt + 1 &#8805; k/2. Rearranging then gives t &#8805; k/2 + 1. It remains to verify that G &#960; is, indeed, a cactus whose edges partition into kt + 1 simple cycles.</p><p>Fixing k, we proceed by induction on kt. If &#960; &#8712; &#928;(k, k), then G &#960; is itself a simple cycle and hence a cactus. For kt &gt; 0, we now consider a loop-free non-crossing partition &#960; &#8712; &#928;(k, t). By the pigeonhole principle, we may select B &#8712; &#960; such that B contains at least Observe that our cycle {B 1 , . . . , B } in G &#960; of length corresponds to the two simple cycles in G &#960; i of {B i 2 , . . . , B i i } and {B i i , B i i+1 , . . . , B i } with lengths i -1 andi + 1 and share the cut vertex B i i . Moreover, all other simple cycles are identical between the two graphs. If is odd, then for each i &#8712; [3, -1], either i -1 ori + 1 is odd, and so G &#960; i must have an odd cycle. Since each &#960; i has t -1 blocks and an odd cycle, we can apply our induction hypothesis to conclude that each V n (&#960; i ) &#8594; 0 so that V n (&#960;) &#8594; 0, as desired by (i). Suppose instead that is even, but G &#960; has an odd cycle. This odd cycle is also contained in each G &#960; i for i &#8712; [3, -1], and again we can apply our induction hypothesis to conclude that V n (&#960;) &#8594; 0, thereby establishing (i).</p><p>Finally, for (ii), suppose that is even and that the edges of G &#960; partition into m cycles of lengths 2s 1 , . . . , 2s m with 2s m = . Notice that if i -1 is odd, then G &#960; i contains an odd cycle, and V n (&#960; i ) &#8594; 0. Since the contribution of these terms is negligible, we must compute the limit of</p><p>The cycles of lengths 2s 1 , . . . , 2s m-1 are common to both G &#960; and G &#960; 2i+1 , while the cycle of length = 2s m in G &#960; corresponds to two cycles of length 2i and -2i in G &#960; 2i+1 . Applying our induction hypothesis, we have</p><p>Reindexing and applying the convolution identity for Catalan numbers, we have Hence, V n (&#960;) &#8594; (-1) k/2-m &#8226; C s 1 -1 &#8226; &#8226; &#8226; C sm-1 , thereby establishing (ii).</p><p>Proof of Lemma 7. To prove (i), consider &#960; &#8712; &#928;(k, t)\EC(k, t). Then either &#960; is crossing, G &#960; contains a loop, or G &#960; contains an odd cycle. If &#960; is crossing, then V n (&#960;) &#8594; 0 by Lemma 14. If G &#960; contains a loop, then V n (&#960;) = 0 by Lemma 12(ii). If &#960; is loop-free and non-crossing but G &#960; contains an odd cycle, then V n (&#960;) &#8594; 0 by <ref type="bibr">Lemma 16(i)</ref>. This establishes (i). Finally, (ii) follows from applying both Lemmas 15 and 16(ii).</p></div></body>
		</text>
</TEI>
