COMMUTING POLYNOMIAL OPERATIONS OF
DISTRIBUTIVE LATTICES
MIKE BEHRISCH, MIGUEL COUCEIRO, KEITH A. KEARNES, ERKKO LEHTONEN,
AND ÁGNES SZENDREI
Abstract. We describe which pairs of distributive lattice polynomial operations commute.
1. Introduction
Let f : X m → X and g : X n → X be operations on X and let [xij ] ∈ X m×n
be a matrix of elements of X. By f ◦ g([xij ]) we mean the value obtained by first
applying g to the rows of [xij ] and then applying f to the column of results.
g
x11 x12 · · · x1n
−→ g(x11 , x12 , . . . , x1n )
x21 x22 · · · x2n −→ g(x21 , x22 , . . . , x2n )
f
..
..
..
..
y
.
.
.
.
xm1 xm2 · · · xmn
−→ g(xm1 , xm2 , . . . , xmn )
f ◦ g([xij ])
One says that f commutes with g on [xij ] if f ◦ g([xij ]) = g ◦ f ([xij ]T ), and that f
and g commute if they commute on all matrices [xij ] ∈ X m×n . More explicitly, f
and g commute on X if
f g(x11 , x12 , . . . , x1n ), g(x21 , x22 , . . . , x2n ), . . . , g(xm1 , xm2 , . . . , xmn )
= g f (x11 , x21 , . . . , xm1 ), f (x12 , x22 , . . . , xm2 ), . . . , f (x1n , x2n , . . . , xmn ) (1.1)
holds for all xij ∈ X (1 ≤ i ≤ m, 1 ≤ j ≤ n). A self-commuting operation is one
that commutes with itself.
Operations that are self-commuting are also called entropic or medial. If C is
a clone on X, then the set of operations on X that commute with each member
of C is another clone on X, called the centralizer of C. Centralizer clones are also
called bicentrally closed clones. On a finite set X, bicentrally closed clones coincide
with primitive positive clones. There is a vast literature about entropic algebras,
centralizer clones, and clones consisting of pairwise commuting operations. For
entropic algebras, see [13] and the references therein. For commutative clones or
centralizer clones see, for example, [8, 9, 11, 14]. For primitive positive clones
see [2, 7, 10, 15, 16].
Date: November 1, 2010.
1991 Mathematics Subject Classification. Primary 08A40, 06D99; Secondary 39B05.
Key words and phrases. Polynomial operation, commuting operations, functional equation.
This material is based upon work supported by the Hungarian National Foundation for Scientific Research (OTKA) grant no. K77409.
1
2
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
Aggregation functions return a single representative value from a list of values
(such as the maximum or average of a list of real numbers). To aggregate the values
in a table, one might use a row aggregation function and a (possibly different) column aggregation function. The commutativity of the row and column aggregation
functions asserts that the final value is independent of the order of aggregation. A
self-commuting aggregation function is called bisymmetric, and certain sequences of
pairwise commuting aggregation functions are called strongly bisymmetric. See [1, 6]
for more details.
It is easy to determine which pairs of module polynomial operations
commute.
Pm
Suppose that M P
is an R-module, and that f (x1 , . . . , xm ) =
a
x
i
i + c and
i=1
n
g(x1 , . . . , xn ) =
b
x
+
d
are
module
polynomial
operations.
If
f and g
j
j
j=1
Pm
Pn
commute on the zero matrix, then it must be that (i) ( i=1 ai )d+c = ( j=1 bj )c+d
holds. If f ◦ g([xij ]) = g ◦ f ([xij ]T ) on just those matrices [xij ] whose only nonzero
entry is in position ij, then (ii) (ai bj − bj ai )x = 0 holds for all x ∈ M . Conversely,
if (i) and (ii) hold, then f and g commute on all matrices in M m×n .
The main features of the argument for module polynomials are: a normal form
for polynomial operations is used and final results are expressed in terms of this
normal form; a commutativity condition on coefficients of the normal form must
hold and a condition on the constant term must hold; the commutativity of polynomials on general matrices is equivalent to commutativity on matrices with at
most one nonzero entry. All of these features have analogues in our argument
for commuting distributive lattice polynomial operations. Our result will be expressed in terms P
of the disjunctive
normal form for polynomial
operations.
If
Q
P
Q
f (x1 , . . . , xm ) =
j∈T xj are
T ⊆[n] bT
i∈S xi and g(x1 , . . . , xn ) =
S⊆[m] aS
distributive lattice polynomial operations written in disjunctive normal form, then
f commutes with g if and only if (i) some condition on constant terms and leading
coefficients is met and (ii) some type of “commutativity condition” is satisfied by
all coefficients. Condition (i) is a∅ + b∅ ≤ a[m] b[n] , which asserts that the join of
the constant terms is dominated by the meet of the leading coefficients. This is
equivalent to the condition that the ranges of f and g have nonempty intersection.
This is obviously a necessary condition for f to commute with g, and is equivalent
to the commutativity of f and g on the zero matrix. The commutativity condition
for the other coefficients in the case when a∅ = b∅ = 0 is
aU1 ∩U2 bV1 ∪V2 + aU1 bV1 + aU2 bV2 + aU1 ∪U2 bV1 bV2
= aU1 ∪U2 bV1 ∩V2 + aU1 bV1 + aU2 bV2 + aU1 aU2 bV1 ∪V2
(1.2)
for all U1 , U2 ⊆ [m] and V1 , V2 ⊆ [n]. This condition can be shown to hold provided
f and g commute on all 0, 1-matrices where the 1’s occur precisely in the union of
two rectangular subregions U1 × V1 , U2 × V2 ⊆ [m] × [n]. Conversely, we show that
any pair of polynomial operations that commute on these “2-rectangle” matrices
consisting solely of 0’s and 1’s must commute on all matrices. Still under the
assumption that a∅ = b∅ = 0, we show that (1.2) is equivalent to the simpler
condition
X
b{v} ,
(1.3)
aU1 aU2 bV = aU1 ∩U2 bV + aU1 aU2
v∈V
together with the condition obtained from this by interchanging the roles of the a’s
and the b’s.
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
3
Corollaries of the main theorem include: a characterization of the self-commuting, distributive lattice polynomial operations (generalizing the results of [3]), and
a characterization of the pairs of commuting distributive lattice term operations.
The main result of this paper was obtained after the BLAST 2010 conference
held at the University of Colorado at Boulder. At this meeting, the report on [3]
generated the question that is answered in this paper.
2. Preliminaries
Throughout the paper [n] denotes {1, 2, . . . , n} if n is a natural number, P(X)
denotes the power set of a set X, ⊆ denotes inclusion, and ⊂ denotes proper
inclusion for sets.
The join and meet operations of a lattice will be denoted by + and · (or juxtaposition), respectively. If a lattice has a least element, then it will be denoted by
0, and if it has a largest element, it will be denoted by 1. If L is a lattice, then
L01 denotes the smallest bounded lattice that contains L as a sublattice; that is,
L01 = L ∪ {0, 1} where 0 is the least element of L if L has a least element, while 0
is a new least element otherwise, and similarly for 1. It is straightforward to check
that for a distributive lattice L the lattice L01 is also distributive.
Recall that a clone of operations on a set X is a set of operations on X that
contains the projection operations and is closed under composition. The clone of
polynomial operations of an algebra on X is the least clone on X that contains
the fundamental operations of the algebra and all constant operations on X. If L
is a distributive lattice, then these conditions are satisfied by the collection of all
operations on L which can be written as a join of meets
Y
Y
X
xi for each S ∈ S,
(2.1)
xi or MS = ãS
MS with MS =
i∈S
i∈S
S∈S
where S is a nonempty
1, ãS ∈ L for all S ∈ S,
Q set of subsets of [m] for some m ≥01
all
elements
of
L
to be coefficients ãS ,
and S 6= ∅ if MS = i∈S xi . Allowing
Q
Q
we can write every meet MSP= i∈S xi above as MS = ãS Qi∈S xi with ãS = 1,
and we can expand the join S∈S MS by joinands MS = ãS i∈S xi with ãS = 0
whenever S ⊆ [m] but S ∈
/ S. Thus we get the following.
Lemma 2.1. If L is a distributive lattice, then the clone of polynomial operations
of L consists of all operations of the form
X
Y
xi with m ≥ 1 and ãS ∈ L01 for all S ⊆ [m]
f (x1 , . . . , xm ) =
ãS
S⊆[m]
i∈S
such that ã∅ 6= 1 if 1 ∈
/ L, and at least one coefficient ãS 6= 0 if 0 ∈
/ L.
For a distributive lattice L, we will denote the clone of polynomial operations
of L by PClo(L), and for each f ∈ PClo(L), we will refer to a representation of f
described inQLemma 2.1 as a disjunctive normal form, or briefly, a DNF of f . The
joinand ãS i∈S xi of a DNF will be called the S-term, and ãS the S-coefficient of
the DNF. If S = {i} is a singleton, then we will write ãi instead of ã{i} .
An operation in PClo(L) can have many different DNFs. We will call a DNF
X
Y
xi
(2.2)
f (x1 , . . . , xm ) =
aS
S⊆[m]
i∈S
4
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
of f maximal if the following conditions hold for the coefficients aS :
aS ≤ aT
whenever
S ⊆ T ⊆ [m],
(2.3)
a[m] 6= 0 if 0 ∈
/ L.
(2.4)
and
a∅ 6= 1 if 1 ∈
/L
and
The next proposition shows that every polynomial operation f of a distributive
lattice has a unique maximal DNF. Moreover, it shows that for every S ⊆ [m], the
S-coefficient of the maximal DNF of f dominates the S-coefficients of all DNFs of
f , which justifies the name “maximal DNF”. For bounded distributive lattices, the
construction of the maximal DNF of f described in part (3) of the proposition can
be found in [5].
Proposition 2.2. Let L be a distributive lattice,
and Q
let f be an m-ary polynomial
P
operation of L with DNF f (x1 , . . . , xm ) = S⊆[m] ãS i∈S xi .
P
(1) For the elements aS := Q⊆S ãQ (S ⊆ [m]) of L01 , (2.2) is a maximal
DNF of f .
(2) The coefficients aS (S ⊆ [m]) of a maximal DNF of f are uniquely determined by f .
(3) If L is bounded, then the coefficients of the maximal DNF of f can be
computed from f as follows: for every S ⊆ [m],
aS = f (e1 , . . . , em )
where ei = 1 if i ∈ S and ei = 0 if i ∈
/ S.
Proof. We start the proof of (1) by verifying the equality (2.2). For all elements
x1 , . . . , xn ∈ L, we have
X
X X
X
Y
Y
Y
xi =
xi =
xi = f (x1 , . . . , xm ),
aS
ãQ
ãQ
S⊆[m]
i∈S
S⊆[m] Q⊆S
i∈S
Q⊆[m]
i∈Q
where the first equality follows from the definition Q
of aS , while theQ
second one follows
from the absorption laws and the fact that ãQ i∈S xi ≤ ãQ i∈Q xi whenever
Q ⊆ S. This proves (2.2). Condition (2.3) follows
P immediately from the definition
of aS . Finally, since a∅ = ã∅ and a[m] =
Q⊆[m] ãQ , condition (2.4) is just a
restatement of the restrictions on ãS stated in Lemma 2.1. Thus, the proof of (1)
is complete.
Q
P
For (2), let f (x1 , . . . , xm ) = S⊆[m] a′S i∈S xi be another maximal DNF of f ,
and assume that aU 6= a′U for some U ⊆ [m]. By symmetry, we may assume that
a′U aU . Thus aU 6= 1 and a′U 6= 0. Now choose elements c, d ∈ L such that
c ≥ aU ,
d ≤ a′U ,
and
d c.
(2.5)
If aU and a′U are in L, then we can let c = aU and d = a′U , but c, d ∈ L satisfying
(2.5) exist even if aU = 0 ∈
/ L or a′U = 1 ∈
/ L. This is so because aU = 0 ∈
/ L and
′
aU 6= 0 imply that the principal ideal (d] of L is infinite for all d ∈ L, d ≤ a′U . Thus
there exist c, d ∈ L such that 0 = aU ≤ c < d ≤ a′U . A dual argument works if
a′U = 1 ∈
/ L. For 1 ≤ i ≤ m let di = d if i ∈ U and di = c if i ∈
/ U . Then, from the
first maximal DNF of f we get that
X
X
f (d1 , . . . , dm ) = a∅ +
aS d +
aS c ≤ a∅ + aU d + a[m] c ≤ aU + c = c,
∅6=S⊆U
S*U
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
5
where the inequalities ≤ follow from the monotonicity (2.3) of the coefficients aS ,
and the last equality follows from c ≥ aU in (2.5). From the second maximal DNF
of f we obtain that
X
X
f (d1 , . . . , dm ) = a′∅ +
a′S c ≥ a′U d = d,
a′S d + a′U d +
∅6=S⊂U
S*U
a′U
in (2.5). The last two displayed
where the last equality follows from d ≤
inequalitites yield that d ≤ c. However, c and d were chosen in (2.5) so that d c.
Thus we reached the desired contradiction, which completes the proof of (2).
Finally, if L is bounded and S ⊆ [m], then for e1 , . . . , em as in (3),
X
X
X
f (e1 , . . . , em ) = a∅ +
aS ′ · 0 =
aS ′ · 1 +
aS ′ = aS ,
∅6=S ′ ⊆S
S ′ *S
S ′ ⊆S
by (2.3).
P
Q
Proposition 2.2 implies that if in a DNF f (x1 , . . . , xm ) = S⊆[m] ãS i∈S xi of
P
f ∈ PClo(L) we have ãU ≤ Q⊂U ãQ for some U ⊆ [m], then by omitting the
Q
joinand ãU i∈U xi (i.e., replacing ãU by 0) we still have a DNF for f , because the
two DNFs yield the same maximal DNF. This justifies the following definition.
If L is aQdistributive lattice and f is a polynomial
operation
of L then the
Q
P
x
ã
U -term ãU i∈U xi of a DNF f (x1 , . . . , xm ) =
S
i∈S i of f will be
S⊆[m]
P
ã
,
and
essential
otherwise.
In the maximal
called inessential if ãU ≤
Q
Q⊂UQ
P
P
DNF f (x1 , . . . , xm ) = S⊆[m] aS i∈S xi of f we have aU ≥ Q⊂U aQ for every
P
U ⊆ [m], therefore the U -term is essential if and only if aU > Q⊂U aQ .
For a distributive lattice L let
PClo∗ (L01 ) :=
{f ∈ PClo(L01 ) : f is not a constant operation with value in L01 \ L}.
The existence and uniqueness of maximal DNFs for polynomial operations of L
immediately implies the following corollary.
Corollary 2.3. For every distributive lattice L, the map PClo(L) → PClo∗ (L01 )
that assigns to every polynomial operation f ∈ PClo(L) the polynomial operation
f ∗ ∈ PClo∗ (L01 ) which has the same maximal DNF as f , is a clone isomorphism.
Consequently, every polynomial operation f of L has a unique extension to a polynomial operation of L01 , namely f ∗ .
3. Commuting polynomial operations of distributive lattices
Recall from the introduction that two operations f and g on a set X commute
if they satisfy the equality (1.1) for all arguments xij ∈ X. We will write f ⊥ g to
indicate that f and g commute. Clearly, f ⊥ g if and only if g ⊥ f .
From now on f , g will be polynomial operations of a distributive lattice. First
we will rewrite the condition defining f ⊥ g in terms of the maximal DNFs of f
and g. The following notation will be useful: if R ⊆ [m] × [n] (m, n ≥ 1), then for
arbitrary i ∈ [m] and j ∈ [n] we let
R(i, −) := {j ∈ [n] : (i, j) ∈ R}
R(−, j) := {i ∈ [m] : (i, j) ∈ R}.
and
6
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
Proposition 3.1. If L is a distributive lattice and f , g are polynomial operations
of L with maximal DNFs
X
Y
X
Y
xj ,
xi
and
g(x1 , . . . , xn ) =
bT
f (x1 , . . . , xm ) =
aS
S⊆[m]
i∈S
T ⊆[n]
j∈T
then f ⊥ g if and only if the following equality holds for all R ⊆ [m] × [n]:
X
X
Y
Y
bR(i,−) =
aR(−,j) .
aS
bT
S⊆[m]
i∈S
(3.1)
j∈T
T ⊆[n]
Proof. By definition, f and g commute if and only if the mn-ary composite polynomials f ◦ g([xij ]) and g ◦ f ([xij ]T ) shown on the two sides of (1.1) are equal.
Our goal is to prove that for each R ⊆ [m] × [n], the left-hand side of (3.1) is
the R-coefficient of the maximal DNF of f ◦ g([xij ]), while the right-hand side
of (3.1) is the R-coefficient of the maximal DNF of g ◦ f ([xij ]T ). This will imply
that the equality (3.1) holds for all R ⊆ [m] × [n] if and only if f ◦ g([xij ]) and
g ◦ f ([xij ]T ) have the same maximal DNFs, i.e., f ◦ g([xij ]) and g ◦ f ([xij ]T ) are
the same polynomial operation, and will therefore complete the proof.
Using the maximal DNFs of f and g we see that
Y
X
Y X
xij
bT
f ◦ g([xij ]) =
aS
S⊆[m]
=
X
i∈S T ⊆[n]
X
j∈T
aS
S⊆[m] (Ti )i∈S ∈P([n])S
Y
i∈S
bT i
Y Y
i∈S j∈Ti
xij .
This yields a DNF for f ◦ g([xij ]) in which, for each R ⊆ [m] × [n], the R-coefficient
is
X
Y
c̃R :=
bR(i,−) .
aS
S⊆[m]
i∈S
If R′ ⊆ R, then for each i ∈ [m] we have that R′ (i, −) ⊆ R(i, −), and hence the
inequality bR′ (i,−) ≤ bR(i,−) holds. This implies that c̃R′ ≤ c̃R . Therefore, it follows
from
P Proposition 2.2 (1) that the R-coefficient of the maximal DNF of f ◦ g([xij ])
is R′ ⊆R c̃′R = c̃R , which is the left-hand side of (3.1).
The fact that the R-coefficient of the maximal DNF of g ◦ f ([xij ]T ) is the righthand side of (3.1) follows from the result in the preceding paragraph by observing
that the operation g ◦ f ([xij ]T ) is obtained from f ◦ g([xij ]) by switching the roles
of f and g and simultaneously switching the subscripts of the variables.
Corollary 3.2. Let L be a distributive lattice, let f, g ∈ PClo(L), and let C be the
sublattice of L01 generated by the coefficients of the maximal DNFs of f and g. The
following conditions on f and g are equivalent:
(i) f and g are commuting polynomial operations of L;
(ii) the unique extensions f ∗ and g ∗ of f and g to L01 are commuting polynomial
operations of L01 ;
(iii) the restrictions f ∗ |C and g ∗ |C of f ∗ and g ∗ to C are commuting polynomial
operations of the finite lattice C.
Proof. Clearly, the lattice C is finitely generated, hence it is finite. We will use the
notation of Proposition 3.1 for the maximal DNFs of f and g. By the definition
of f ∗ , f ∗ has the same maximal DNF as f . Furthermore, since C contains the
coefficients of the maximal DNF of f ∗ , f ∗ can be restricted to C, and f ∗ |C is a
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
7
polynomial operation of C with the same maximal DNF as f ∗ (and f ). Similarly,
g ∗ ∈ PClo(L01 ) and g ∗ |C ∈ PClo(C) have the same maximal DNF as g. Therefore,
by Proposition 3.1, each one of the commutativity conditions f ⊥ g, f ∗ ⊥ g ∗ , and
f ∗ |C ⊥ g ∗ |C is equivalent to the requirement that (3.1) holds for the coefficients of
their maximal DNFs for all R ⊆ [m] × [n]. It follows that (i) ⇔ (ii) ⇔ (iii).
Corollary 3.2 shows that when studying the relation f ⊥ g for polynomial operations f , g of distributive lattices one could restrict, without loss of generality, to
bounded distributive lattices, or even to finite lattices.
Next we will establish some necessary conditions for two polynomial operations to
commute. The equivalence of some of conditions (i)–(vi) below for unary polynomial
operations of distributive lattices appears in [4].
Lemma 3.3. Let f , g be polynomial operations of a distributive lattice L with
maximal DNFs as in Proposition 3.1. If f and g commute, then they must satisfy
the following equivalent conditions:
(i)
(ii)
(iii)
(iv)
(v)
(vi)
the unary polynomial operations f (x, . . . , x) and g(x, . . . , x) commute;
a∅ + a[m] b∅ = b∅ + b[n] a∅ ;
the coefficients of the maximal DNFs of f and g satisfy (3.1) for R = ∅;
im(f ) ∩ im(g) 6= ∅;
a∅ + b∅ ≤ a[m] b[n] ;
a∅ + a[m] b∅ = a∅ + b∅ = b∅ + b[n] a∅ .
Proof. If f and g commute on all matrices, then they commute on all constant
matrices, which is easily seen to be equivalent to condition (i). It remains to show
that all conditions are equivalent. First we make some remarks about distributive
lattice polynomials.
Since a∅ is a joinand of the maximal DNF for f , it follows that a∅ ≤ c holds
for all c ∈ im(f ). Since f and a[m] f have the same maximal DNF, it follows that
c ≤ a[m] for all c ∈ im(f ). Hence im(f ) is contained in the restriction to L of the
interval [a∅ , a[m] ] of L01 . On the other hand, for any d ∈ [a∅ , a[m] ] ∩ L it is the case
that f (d, . . . , d) = d, so the set im(f ) exactly coincides with [a∅ , a[m] ] ∩ L.
Now we begin the proof. Assume (i), so that f ′ (x) := f (x, . . . , x) = a∅ + a[m] x
and g ′ (x) = b∅ + b[n] x commute. The equality between f ′ ◦ g ′ ([x]) and g ′ ◦ f ′ ([x])
is expressible as
a∅ + a[m] b∅ + a[m] b[n] x = b∅ + b[n] a∅ + a[m] b[n] x,
which holds if and only if a∅ + a[m] b∅ = b∅ + b[n] a∅ . Hence (i) ⇔ (ii).
If R = ∅ in (3.1), then, due to the monotonicity of the coefficients, (3.1) reduces
to a∅ + a[m] b∅ = b∅ + b[n] a∅ . Hence (ii) ⇔ (iii).
Condition (iii) asserts that f ◦ g([xij ]) and g ◦ f ([xij ]T ) have the same constant
term c. Let If g and Igf denote the images of f ◦ g([xij ]) and g ◦ f ([xij ]T ). If
c ∈ L, then by the observations of the second paragraph of this proof we have that
c ∈ If g ⊆ im(f ) and c ∈ Igf ⊆ im(g). It follows that c ∈ im(f ) ∩ im(g). If, on the
other hand, c = 0 ∈
/ L, then both If g and Igf are nonempty downward directed
sets. Hence if d ∈ If g and e ∈ Igf , then de ∈ If g ∩ Igf ⊆ im(f ) ∩ im(g). This shows
that (iii) implies (iv).
Assume that (iv) holds. If d ∈ im(f ) ∩ im(g) = [a∅ , a[m] ] ∩ [b∅ , b[n] ] ∩ L, then
a∅ + b∅ ≤ d ≤ a[m] b[n] . Hence (iv) implies (v).
8
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
If (v) holds, then
a∅ + a[m] b∅ = (a∅ + a[m] )(a∅ + b∅ )
= a[m] (a∅ + b∅ )
= a ∅ + b∅ ,
where the first equality follows from distributivity, the second follows from the
monotonicity of coefficients in a maximal DNF, and the third follows from (v):
a∅ + b∅ ≤ a[m] b[n] (≤ a[m] ). By symmetry we also have b∅ + b[n] a∅ = a∅ + b∅ , so (v)
implies (vi).
Item (ii) is included in (vi), so we are done.
Lemma 3.4. Let f , g be polynomial operations of a distributive lattice L with
maximal DNFs as in Proposition 3.1. For arbitrary subsets U1 , U2 ⊆ [m] and
V1 , V2 ⊆ [n], the equality (3.1) for R = (U1 × V1 ) ∪ (U2 × V2 ) is equivalent to the
equality
a∅ + a[m] b∅ + aU1 ∩U2 bV1 ∪V2 + aU1 bV1 + aU2 bV2 + aU1 ∪U2 bV1 bV2 =
b∅ + b[n] a∅ + bV1 ∩V2 aU1 ∪U2 + bV1 aU1 + bV2 aU2 + bV1 ∪V2 aU1 aU2 .
(3.2)
Consequently, (3.2) holds for f and g whenever f and g commute.
Since (3.2) is obtained from the special case of (3.1) when R is a union of two
rectangles Ui × Vi (i = 1, 2), we will refer to (3.2) as the 2-rectangle condition.
Proof. Throughout the proof, U1 , U2 ⊆ [m] and V1 , V2 ⊆ [n] are fixed, and R =
(U1 × V1 ) ∪ (U2 × V2 ). First we will simplify the left-hand side of (3.1) for this R.
We want to show that
X
Y
bR(i,−)
aS
S⊆[m]
i∈S
= a∅ + a[m] b∅ + aU1 ∩U2 bV1 ∪V2 + aU1 bV1 + aU2 bV2 + aU1 ∪U2 bV1 bV2 .
(3.3)
We will use the monotonicity of the coefficients of the maximal DNFs of f and g,
namely that (2.3) holds for the a’s, and analogously, for the b’s. Also, notice that
the shape of R implies that
V1 ∪ V2 if i ∈ U1 ∩ U2 ,
R(i, −) = Vℓ
if i ∈ Uℓ \ (U1 ∩ U2 ), ℓ = 1, 2, and
∅
if i ∈ [m] \ (U1 ∪ U2 ).
The fact that the left-hand side of (3.3) is dominated by the right-hand side will
follow if we verify that every joinand on the left-hand
Q side is ≤ a joinand on the
right-hand side. Let S ⊆ [m]. If S = ∅, then aS i∈S bR(i,−) = a∅ , which is a
joinand on the right-hand side. If S 6= ∅ but S ⊆ U1 ∩ U2 , then by the description
of R(i, −) above we have that R(i, −) = V1 ∪ V2 for each i ∈ S. Since S 6= ∅, the
monotonicity of the a’s and b’s implies that
Y
Y
bV1 ∪V2 = aU1 ∩U2 bV1 ∪V2 .
bR(i,−) ≤ aU1 ∩U2
aS
i∈S
i∈S
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
9
If S * U1 ∩ U2 but S ⊆ Uℓ for ℓ = 1 or 2, then R(i, −) = V1 ∪ V2 for each
i ∈ S∩(U1 ∩U2 ), while R(i, −) = Vℓ for each i ∈ S\(U1 ∩U2 ). Since S\(U1 ∩U2 ) 6= ∅,
the monotonicity of the a’s and b’s implies again that
Y
Y
Y
bR(i,−) ≤ aUℓ
bV1 ∪V2
aS
bV ℓ = a Uℓ b V ℓ .
i∈S
i∈S∩(U1 ∩U2 )
i∈S\(U1 ∩U2 )
If S * U1 , U2 but S ⊆ U1 ∪ U2 , then R(i, −) = V1 ∪ V2 for each i ∈ S ∩ (U1 ∩ U2 ) and
R(i, −) = Vℓ for each i ∈ (S∩Uℓ )\(S∩U3−ℓ ) (ℓ = 1, 2). Since (S∩Uℓ )\(S∩U3−ℓ ) 6= ∅
for both ℓ = 1, 2, the monotonicity of the a’s and b’s implies that
Y
Y
Y
Y
bR(i,−) ≤ aU1 ∪U2
bV1 ∪V2
bV 1
bV 2
aS
i∈S
i∈S∩(U1 ∪U2 )
i∈(S∩U1 )\(S∪U2 )
i∈(S∩U2 )\(S∪U1 )
= aU1 ∪U2 bV1 bV2 .
Finally, if S * U1 ∪ U2 , then R(i, −) = ∅ for all i ∈ S \ (U1 ∪ U2 ).
S \ (U1 ∪ U2 ) 6= ∅, we get that
Y
Y
Y
bR(i,−) ≤ a[m]
bR(i,−)
b∅ = a[m] b∅ .
aS
i∈S
i∈S∩(U1 ∪U2 )
Since
i∈S\(U1 ∪U2 )
This proves ≤ in (3.3).
To prove the reverse inequality ≥ in (3.3) it suffices to establish
Q that every
joinand on the right-hand side is bounded above by a joinand
a
S
i∈S bR(i,−) on
Q
b
the left-hand side. The first joinand a∅ appears
as
a
S
i∈S R(i,−) for S = ∅.
Q
The last joinand satisfies aU1 ∪U2 bV1 bV2 ≤ aU1 ∪U2 i∈U1 ∪U2 bR(i,−) , because we have
R(i, −) ∈ {V1 , V2 } for each i ∈ U1 ∪ U2 . All other joinands on the right-hand side
of (3.3) are of the form aS bT such that S ∈ {[m],
QU1 ∩ U2 , U1 , U2 } and T ⊆ R(i, −)
for all i ∈ S. Therefore, they satisfy aS bT ≤ aS i∈S bR(i,−) .
This proves the equality (3.3), which simplifies the left-hand side of (3.1) for the
set R = (U1 ×V1 )∪(U2 ×V2 ). By switching the roles of f and g we get an analogous
equality for the right-hand side of (3.1):
X
Y
aR(−,j)
bT
T ⊆[n]
j∈T
= b∅ + b[n] a∅ + bV1 ∩V2 aU1 ∪U2 + bV1 aU1 + bV2 aU2 + bV1 ∪V2 aU1 aU2 .
(3.4)
Thus we obtain from (3.3) and (3.4) that for R = (U1 ×V1 )∪(U2 ×V2 ), condition (3.1)
is equivalent to (3.2), as claimed.
After these preparations we can state the main theorem of this paper, which
characterizes commuting pairs of polynomial operations of distributive lattices. We
will show that two polynomial operations commute if and only if they satisfy the
2-rectangle condition (3.2). We will also present a more transparent condition characterizing commutativity. As the proof develops we will find other necessary and
sufficient conditions for commutativity, which we will summarize in Corollary 3.10.
Theorem 3.5. Let L be a distributive lattice, and let f , g be polynomial operations
of L with maximal DNFs
X
Y
X
Y
xj .
xi
and
g(x1 , . . . , xn ) =
f (x1 , . . . , xm ) =
bT
aS
S⊆[m]
i∈S
The following conditions on f and g are equivalent:
T ⊆[n]
j∈T
10
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
(i) f ⊥ g;
(ii) the 2-rectangle condition (3.2) holds for all U1 , U2 ⊆ [m] and V1 , V2 ⊆ [n];
(iii) (a) a∅ + b∅ ≤ a[m] b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
(b) the equalities
X
bv ,
a∅ + aU1 aU2 bV = a∅ + aU1 ∩U2 bV + aU1 aU2 b∅ +
(3.5)
v∈V
X
au .
b∅ + bV1 bV2 aU = b∅ + bV1 ∩V2 aU + bV1 bV2 a∅ +
(3.6)
u∈U
hold for all U1 , U2 , U ⊆ [m] and V1 , V2 , V ⊆ [n].
The proof of Theorem 3.5 will occupy most of this section. Since the implication
(i) ⇒ (ii) has been established already in Lemma 3.4, we will first focus on the
implication (ii) ⇒ (iii).
Lemma 3.6. Let f, g ∈ PClo(L) be as in Theorem 3.5. If f and g satisfy condition (ii) in Theorem 3.5, then they also satisfy the following condition:
(†)2 (a) a∅ + b∅ ≤ a[m] b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
(b) the equalities
a∅ + aU1 aU2 bV1 ∪V2 = a∅ + aU1 ∩U2 bV1 ∪V2 + aU1 aU2 (bV1 + bV2 ),
(3.7)
b∅ + bV1 bV2 aU1 ∪U2 = b∅ + bV1 ∩V2 aU1 ∪U2 + bV1 bV2 (aU1 + aU2 )
(3.8)
hold for all U1 , U2 ⊆ [m] and V1 , V2 ⊆ [n].
Proof. Assume that the 2-rectangle condition (3.2) holds for all U1 , U2 ⊆ [m] and
V1 , V2 ⊆ [n]. By Lemma 3.4, condition (3.2) for U1 = U2 = V1 = V2 = ∅ is
equivalent to condition (3.1) for R = ∅, and by Lemma 3.3, the latter is equivalent
to the inequality a∅ +b∅ ≤ a[m] b[n] , as well as to the condition that im(f )∩im(g) 6= ∅.
This proves (a).
For (b), to prove (3.7) for arbitrary U1 , U2 ⊆ [m] and V1 , V2 ⊆ [n], we take the
meet of the left-hand side of (3.2) with aU1 aU2 , and apply the distributive and
absorption laws to get that
aU1 aU2 (a∅ + a[m] b∅ + aU1 ∩U2 bV1 ∪V2 + aU1 bV1 + aU2 bV2 + aU1 ∪U2 bV1 bV2 )
= a∅ + aU1 aU2 b∅ + aU1 ∩U2 bV1 ∪V2 + aU1 aU2 bV1 + aU1 aU2 bV2 + aU1 aU2 bV1 bV2
= a∅ + aU1 ∩U2 bV1 ∪V2 + aU1 aU2 (bV1 + bV2 ).
Taking the meet of the right-hand side of (3.2) with aU1 aU2 and applying the
distributive and absorption laws again we obtain that
aU1 aU2 (b∅ + b[n] a∅ + bV1 ∩V2 aU1 ∪U2 + bV1 aU1 + bV2 aU2 + bV1 ∪V2 aU1 aU2 )
= b∅ aU1 aU2 + b[n] a∅ + bV1 ∩V2 aU1 aU2 + bV1 aU1 aU2 + bV2 aU1 aU2 + bV1 ∪V2 aU1 aU2
= b[n] a∅ + bV1 ∪V2 aU1 aU2 .
Thus (3.2) implies that
b[n] a∅ + bV1 ∪V2 aU1 aU2 = a∅ + aU1 ∩U2 bV1 ∪V2 + aU1 aU2 (bV1 + bV2 ).
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
11
Since a∅ ≤ b[n] , and hence b[n] a∅ = a∅ , the equality (3.7) follows. The equality (3.8)
can be proved in a similar way.
Lemma 3.7. Let f, g ∈ PClo(L) be as in Theorem 3.5. If f and g satisfy condition (†)2 in Lemma 3.6, then they also satisfy condition (iii) in Theorem 3.5.
Proof. Assume that condition (†)2 in Lemma 3.6 holds for f and g. We have to
verify the equalities (3.5) and (3.6). Since (3.5) and (3.6) can be obtained from one
another by interchanging the roles of the aS ’s and the bT ’s (i.e., the roles of f and
g), it is enough to prove (3.5). Let U1 , U2 ⊆ [m] be fixed, and let V ⊆ [n]. We will
prove the equality (3.5) by induction on |V |. For V = ∅ (3.5) is the equality
a∅ + aU1 aU2 b∅ = a∅ + aU1 ∩U2 b∅ + aU1 aU2 b∅ ,
which is clearly true, as aU1 ∩U2 ≤ aU1 aU2 .
Next let |V | ≥ 1, say V = W ∪ {z} with z ∈
/ W . We will prove (3.5) for V ,
assuming that (3.5) is true for W in place of V . Applying the assumption (3.7)
to V1 = W and V2 = {z} to get the second equality below, the absorption and
distributive laws to get the third, the induction hypothesis to get the fourth, and
again the absorption and distributive laws in the fifth, we deduce that
a∅ +aU1 aU2 bV
= a∅ + aU1 aU2 bW ∪{z}
= a∅ + aU1 ∩U2 bW ∪{z} + aU1 aU2 (bW + bz )
= a∅ + aU1 ∩U2 bV + (a∅ + aU1 aU2 bW ) + aU1 aU2 bz
X
= a∅ + aU1 ∩U2 bV + a∅ + aU1 ∩U2 bW + aU1 aU2 b∅ +
b w + a U1 a U2 bz
w∈W
X
= a∅ + aU1 ∩U2 bV + aU1 aU2 b∅ +
bv
v∈W ∪{z}
X
= a∅ + aU1 ∩U2 bV + aU1 aU2 b∅ +
bv ,
v∈V
completing the proof.
To prepare the proof of the implication (iii) ⇒ (i) in Theorem 3.5, we will show
now that the equalities (3.5) and (3.6) extend to any finite number of Ui ’s and Vj ’s.
Lemma 3.8. Let f, g ∈ PClo(L) be as in Theorem 3.5. If f and g satisfy condition (iii) in Theorem 3.5, then they also satisfy the following condition:
(‡) (a) a∅ + b∅ ≤ a[m] b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
(b) the equalities
k
k
Y
Y
X
bv ,
a Ui b V = a ∅ + a T k U i bV +
a Ui b ∅ +
a∅ +
i=1
i=1
i=1
b∅ +
k
Y
j=1
bV j a U = b∅ + bT k
aU
j=1 Vj
+
k
Y
j=1
(3.9)
v∈V
bV j
a∅ +
X
u∈U
au .
hold for all k ≥ 1, U1 , . . . , Uk , U ⊆ [m] and V1 , . . . , Vk , V ⊆ [n].
(3.10)
12
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
Proof. Assume that condition (iii) in Theorem 3.5 holds for f and g. Again, by
symmetry, it suffices to prove equality (3.9). We will proceed by induction on k.
Let k ≥ 1, U1 , . . . , Uk ⊆ [m], and V ⊆ [n]. PFor k = 1, condition (3.9) takes the
form P
a∅ + aU1 bV = a∅ + aU1 bV + aU1 b∅ + v∈V bv , which is clearly true, since
b∅ + v∈V bv ≤ bV . For k = 2, (3.9) coincides with the equality (3.5), which holds
by assumption.
From now on let k ≥ 3, and suppose that (3.9) is true for k − 1 in place of k,
that is,
k−1
k−1
X
Y
Y
bv .
a Ui b ∅ +
aUi bV = a∅ + aTk−1 Ui bV +
a∅ +
i=1
i=1
i=1
v∈V
Taking the meet of both sides with aUk and using the distributive law together with
a∅ ≤ aUk we see that
a∅ +
k
Y
a Ui bV = a ∅ +
i=1
aTk−1
i=1
Applying the equality (3.5) to the sets
we obtain that
k
Y
a∅ +
a Ui b V
Ui a Uk bV
+
k
Y
a Ui
i=1
Tk−1
i=1
b∅ +
X
v∈V
bv .
Ui , Uk , and V on the right-hand side
i=1
= a∅ +
a Tk
bV
i=1 Ui
= a ∅ + a Tk
i=1
+
Ui b V
+
aTk−1
i=1
k
Y
i=1
Ui a Uk
a Ui
b∅ +
b∅ +
X
bv +
v∈V
X
v∈V
k
Y
i=1
a Ui
b∅ +
X
v∈V
bv
bv ,
where the last equality follows by observing that the monotonicity of the coefficients
Qk−1
in a maximal DNF implies that aTk−1 Ui ≤ i=1 aUi , and hence that the joinand
i=1
P
aTk−1 Ui aUk b∅ + v∈V bv can be omitted. This completes the proof of Lemma 3.8.
i=1
Lemma 3.9. Let f, g ∈ PClo(L) be as in Theorem 3.5. If f and g satisfy condition (‡) in Lemma 3.8, then they also satisfy the equality (3.1) for all R ⊆ [m] × [n].
Proof. Assume that f and g satisfy condition (‡) in Lemma 3.8, and let R ⊆
[m]×[n]. Since the two sides of (3.1) can be obtained from one another by switching
the roles of the coefficients aS of f with the coefficients bT of g, and since the
assumption (‡) is invariant under this switch, it will be sufficient to verify the
inequality
≥ in (3.1). To start, we notice that for the choice S = ∅ the joinand
Q
aS i∈S bR(i,−) on the left-hand side of (3.1) is equal to a∅ , while for the choice
S = [m] it is ≥ a[m] b∅ . Therefore, to verify ≥ in (3.1) it suffices to show that for
every set T ⊆ [n],
Y
X
Y
aR(−,j) bT .
(3.11)
a∅ + a[m] b∅ +
bR(i,−) ≥ a∅ +
aS
S⊆[m]
Q
i∈S
j∈T
If T = ∅, then a∅ +
j∈T aR(−,j) bT = a∅ + b∅ = a∅ + a[m] b∅ by Lemma 3.3,
so (3.11) holds in this case. From now on we will assume that T 6= ∅, and set
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
13
T
Ŝ = j∈T R(−, j). Thus, applying (3.9) to the right-hand side of (3.11), simplifying
P
P
the last joinand by taking into account that b∅ + t∈T bt = t∈T bt if T 6= ∅, and
then using the distributive law, we get that
X
Y
Y
bt
aR(−,j)
aR(−,j) bT = a∅ + aTj∈T R(−,j) bT +
a∅ +
t∈T
j∈T
j∈T
= a∅ + aŜ bT +
X Y
aR(−,j) bt .
j∈T
t∈T
(3.12)
Q
Here aŜ bT ≤ aŜ i∈Ŝ bR(i,−) , because Ŝ ⊆ R(−, j) for all j ∈ T implies that
Ŝ × T ⊆ R, whence it follows that T ⊆ R(i, −) and bT ≤ bR(i,−) hold for all
i ∈ Ŝ. Thus aŜ bT is bounded above by one of the joinands
on the left-hand
Q
aR(−,j) bt in (3.12) where
side of (3.11). Similarly, for each other joinand
j∈T
Q
t ∈ T , we have that
j∈T aR(−,j) bt ≤ aR(−,t) bt , and aR(−,t) bt is bounded above
by one of the joinands
on the left-hand side of (3.11) for the following reason:
Q
aR(−,t) bt ≤ aR(−,t) i∈R(−,t) bR(i,−) , because t ∈ R(i, −) for all i ∈ R(−, t).
This proves (3.11), and therefore completes the proof of Lemma 3.9.
Now we are ready to complete the proof of Theorem 3.5.
Proof of Theorem 3.5. The implication (i) ⇒ (ii) was established in Lemma 3.4,
while the implication (ii) ⇒ (iii) follows from Lemmas 3.6 and 3.7. Finally, Lemmas 3.8 and 3.9, combined with Proposition 3.1, show that (iii) ⇒ (i).
Corollary 3.10. Let L be a distributive lattice, and let f , g be polynomial operations of L with maximal DNFs
X
X
Y
Y
f (x1 , . . . , xm ) =
xi
and
g(x1 , . . . , xn ) =
xj .
aS
bT
S⊆[m]
i∈S
T ⊆[n]
j∈T
In addition to conditions (ii)–(iii) in Theorem 3.5 the conditions listed below are
also equivalent to f ⊥ g:
(iv) condition (‡) in Lemma 3.8, which strengthens (iii);
(v) condition (†)2 in Lemma 3.6;
(vi) the following conditions, which strengthen (v):
(a) a∅ + b∅ ≤ a[m] b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
(b) the equalities
k
k
ℓ
Y
X
Y
a Ui b S ℓ V j = a ∅ + a T k Ui b S ℓ V j +
a Ui
a∅ +
bV j ,
i=1
j=1
j=1
i=1
b∅ +
ℓ
Y
j=1
i=1
bV j a Sk
i=1
Ui
= b∅ + bT ℓ
j=1
S
Vj a k
i=1
Ui
+
ℓ
Y
j=1
j=1
bV j
k
X
(3.13)
aUi (3.14)
i=1
hold for all k, ℓ ≥ 1, U1 , . . . , Uk ⊆ [m] and V1 , . . . , Vℓ ⊆ [n].
Proof. Theorem 3.5 was proved via the implications f ⊥ g ⇒ (ii) ⇒ (v) ⇒ (iii) ⇒
(iv) ⇒ f ⊥ g, so conditions (ii)–(v) are all equivalent to f ⊥ g. Clearly, (v) is
the special case k = 2 = ℓ of (vi), therefore (vi) ⇒ (v). Finally, we show that
14
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
(iv) ⇒ (vi). To this end we have to prove that (3.9)–(3.10) imply (3.13)–(3.14).
Sℓ
If V = j=1 Vj , then by comparing the equality (3.13) with the equality (3.9) we
see that (3.13) and (3.9) have the same left-hand sides, while the right-hand side of
(3.13) is less than or equal to the common left-hand sides of (3.9) and (3.13), but
is greater than or equal to the right-hand side of (3.9). Thus, (3.9) implies (3.13),
and similarly, (3.10) implies (3.14). This proves that condition (vi) is equivalent to
(ii)–(v), and hence to f ⊥ g.
4. Applications
4.1. Self-commuting lattice polynomial operations. Let L be a distributive
lattice, and let f , g be polynomial operations of L. Applying the characterizations
of f ⊥ g in Theorem 3.5 and Corollary 3.10 to the case when f = g, we can obtain
analogous characterizations of self-commuting polynomial operations of distributive
lattices. The conditions obtained in this way can be simplified by observing that
the requirement im(f ) ∩ im(g) = ∅ holds automatically for f = g. Moreover, in the
remaining requirements the joinands a∅ = b∅ on both sides of the equalities can be
omitted, since they are dominated by the remaining joinands on both sides. In the
corollary below we will state only the characterizations obtained from Theorem 3.5.
Corollary 4.1. Let L be a distributive lattice, and let f be a polynomial operation
of L with maximal DNF
X
Y
f (x1 , . . . , xm ) =
xi .
aS
S⊆[m]
i∈S
The following conditions on f equivalent:
(i) f ⊥ f ;
(ii) the equality
aU1 ∩U2 aV1 ∪V2 + aU1 aV1 + aU2 aV2 + aU1 ∪U2 aV1 aV2
= aU1 aU2 aV1 ∪V2 + aU1 aV1 + aU2 aV2 + aU1 ∪U2 aV1 ∩V2
(4.1)
holds for all U1 , U2 , V1 , V2 ⊆ [m];
(iii) the equality
X
av
aU1 aU2 aV = aU1 ∩U2 aV + aU1 aU2 a∅ +
(4.2)
v∈V
holds for all U1 , U2 , V ⊆ [m].
Next we will apply Corollary 4.1 to obtain the main result of [3], which is an
explicit description of all self-commuting polynomial operations of a bounded chain.
We will state the result for a wider class of polynomial operations, but in view of
Corollary 3.2 this is equivalent to the original formulation.
Corollary 4.2. Let L be a distributive lattice. If f is a polynomial operation of L
with a DNF
X
Y
xi
f (x1 , . . . , xm ) =
ãS
S⊆[m]
i∈S
such that the set {ãS : S ⊆ [m]} of coefficients is a chain in L01 , then the following
conditions on f are equivalent:
(i) f ⊥ f ;
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
15
(ii) f has a DNF
f (x1 , . . . , xm ) = a∅ +
X
ai xi +
r
X
a Sℓ
ℓ=1
i∈[m]
Y
xi
(4.3)
i∈Sℓ
such that
(1) S1 ⊂ S2 ⊂ · · · ⊂ Sr ⊆ [m] (r ≥ 0),
(2) {a∅ } ∪ {ai : i ∈ [m]} is a chain, and
X
X
ai = a∅ +
a i < aS1 < · · · < aSr .
a∅ +
i∈S1
i∈[m]
Remark 4.3. Condition (ii) is stated here in a slightly different form than in [3],
but the two formulations are equivalent.
Proof of Corollary 4.2. To prove the implication (i) ⇒ (ii) assume that f ⊥ f , and
let
X
Y
f (x1 , . . . , xm ) =
xi
(4.4)
aS
S⊆[m]
i∈S
be the maximal DNF of f . By the definition of maximal DNF, the coefficients
aS ∈ L01 satisfy aS ≤ aT whenever S ⊆ T ⊆ [m]. We will use this property
without further reference. In addition, since f ⊥ f , the coefficients also satisfy
(4.2) for all U1 , U2 , V ⊆ [m]. Notice also that by Proposition 2.2 the coefficients aU
are obtained from the coefficients ãS of the given DNF by taking joins. Therefore,
the hypothesis that {ãS : S ⊆ [m]} is a chain in L01 implies that {aU : U ⊆ [m]} is
also a chain in L01 .
Let E denote theP
set of all S ⊆ [m] such that |S| ≥ 2 and the S-term of (4.4) is
essential, i.e., aS > U ⊂S aU . First we will prove that
aS ≤ aT ⇐⇒ S ⊆ T
for all S, T ∈ E.
(4.5)
Since the implication ⇐ is clear, suppose for a contradiction that ⇒ is false, that
is, for some S, T ∈ E we have aS ≤ aT but S * T . Then S ∩ T ⊂ S, and hence the
fact that aS is essential implies that aS∩T < aS . Now, applying (4.2) to U1 = S,
U2 = T , and V = S we get that
X
aS aT aS = aS∩T aS + aS aT a∅ +
as .
s∈S
P
Since a∅ + s∈S as ≤ aS , and as we have seen, aS∩T < aS ≤ aT , therefore the
P
P
displayed equality simplifies to aS = aS∩T + a∅ + s∈S as = a∅ + s∈S as +aS∩T .
Since |S| ≥ 2 and S ∩ T ⊂ S, this equality shows that, contrary to the choice of S,
the S-term of (4.4) is inessential. This proves (4.5).
Since {aU : U ⊆ [m]} is a chain, (4.5) implies that E is a chain of subsets of [m],
say, E = {Sℓ : 1 P
≤ ℓ ≤ r} with S1 ⊂ S2 ⊂ · · · ⊂ Sr (r ≥ 0). Thus, (1) and the
inequalities a∅ + i∈S1 ai < aS1 < · · · < aSr from (2) are true. Moreover, since E
contains all S ⊆ [m] with |S| ≥ 2 for which the S-term of (4.4) is essential, (4.3)
also holds. The condition from (2) that {a∅ } ∪ {ai : i ∈ [m]} is a chain is obviously
satisfied.
P
P
Therefore, it remains to show the equality a∅ + i∈S1 ai = a∅ + i∈[m] ai
P
P
from (2). Suppose that the equality fails, that is, a∅ + i∈S1 ai < a∅ + i∈[m] ai .
P
The fact that {a∅ } ∪ {ai : i ∈ [m]} is a chain implies then that a∅ + i∈[m] ai = ap
16
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
for some p ∈ [m], and p ∈
/ S1 . Thus, applying (4.2) to U1 = S1 , U2 = {p}, and
V = S1 we get that
X
as .
aS1 a{p} aS1 = aS1 ∩{p} aS1 + aS1 a{p} a∅ +
s∈S1
The first joinand
P S1 ∩ {p} = ∅. FurPon the right-hand side can be omitted, since
thermore, a∅ + s∈S1 as < ap by the choice of ap , and a∅ + s∈S1 as < aS1 , since
P
S1 ∈ E. Since aS1 , ap are comparable, this implies that
P a∅ + s∈S1 as < aS1 ap .
Thus the displayed equality simplifies to aS1 ap = a∅ + s∈S1 as , contradicting the
preceding conclusion. This completes the proof of (i) ⇒ (ii).
For the reverse implication (ii) ⇒ (i) let us assume that (ii) holds. Condition (ii)
remains valid if we replace each coefficient ai (i ∈ [m]) with a∅ + ai , therefore we
may assume without loss of generality that a∅ ≤ ai holds for all i ∈ [m]. Under this
additional assumption one can easily see, using Proposition 2.2, that for each one of
the sets S = ∅, S = {i} with i ∈ [m], and S = Sℓ with 1 ≤ ℓ ≤ r, the S-coefficient
of the maximal DNF of f is aS . Therefore, we can describe all coefficients of the
maximal DNF of f as follows:
(
a Sℓ
if Sℓ ⊆ S and Sℓ+1 * S (1 ≤ ℓ ≤)),
aS =
P
a∅ + s∈S as if S1 * S.
In view of Corollary 4.1, the proof of (i) will be complete if we verify that (4.2)
holds for all U1 , U2 , V ⊆ [m].
Since the inequality ≥ is clearly true in (4.2), we will prove = by showing that
the element on left-hand side of (4.2) is dominatedPby one of the joinands on the
right-hand side of (4.2). If S1 * V , i.e., aV = a∅ + v∈V av , then this is obviously
the case. Therefore, we will assume from now on that S1 ⊆ V . Let ℓ be such that
Sℓ ⊆ V , but Sℓ+1 * V . Thus aV = aSℓ . If one of U1 , U2 fails to contain S1 , say,
S1 * U1 , then
X
X
X
X
av ≤ aV ,
au ≤ a∅ +
as ≤ a∅ +
a U1 = a ∅ +
ai = a∅ +
u∈U1
s∈S1
i∈[m]
v∈V
where the second = follows from condition (2) in (ii), and the succeedingP≤ follows
from S1 ⊆ V . Hence aU1 aU2 aV = aU1 aU2 = aU1 aU2 aU1 ≤ aU1 aU2 a∅ + v∈V av ,
completing the proof in this case. Finally, let S1 ⊆ U1 , U2 , say Si ⊆ U1 , Si+1 * U1 ,
and Sj ⊆ U2 , Sj+1 * U2 . We may assume without loss of generality that i ≤ j.
Then Si ⊆ U1 ∩ U2 , Si+1 * U1 ∩ U2 . so aU1 aU2 aV = aSi aV = aU1 ∩U2 aV , which
completes the proof of Corollary 4.2.
An m-ary operation f is called symmetric, if it satisfies the identity
f (x1 , x2 , . . . , xm ) = f (xσ(1) , xσ(2) , . . . , xσ(m) )
for all permutations σ of [m]. If f is a polynomial operation of a distributive lattice
L with maximal DNF
X
Y
xi ,
(4.6)
f (x1 , . . . , xm ) =
aS
S⊆[m]
i∈S
then the uniqueness of maximal DNFs (see Proposition 2.2) implies that f is symmetric if and only if aI = aJ whenever |I| = |J| (I, J ⊆ [m]). It follows that
in this case {aS : S ⊆ [m]} is a chain in L01 . Hence we can apply Corollary 4.2
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
17
to characterize when a symmetric polynomial operation of a distributive lattice is
self-commuting.
Corollary 4.4. A polynomial operation f of a distributive lattice is symmetric and
self-commuting if and only if it has a DNF of the form
X
Y
f (x1 , . . . , xm ) = a∅ +
a1 xi + a[m]
xi
i∈[m]
for some a∅ , a1 , a[m] ∈ L
01
i∈[m]
with a∅ ≤ a1 ≤ a[m] .
Proof. If f has such a DNF, then f is symmetric. Furthermore, if a1 < a[m] ,
then the given DNF satisfies condition (ii) in Corollary 4.2 with r = 1, while if
a1 = a[m] , then the [m]-term of the given DNF is inessential and can be omitted,
so the resulting DNF satisfies condition (ii) in Corollary 4.2 with r = 0. In either
case, f is self-commuting.
Conversely, assume that f is symmetric and self-commuting. As we observed
above, symmetry implies that in the maximal DNF (4.6) of f we have aI = aJ
whenever |I| = |J| (I, J ⊆ [m]). Now, if an I-term in (4.6) is essential, then so
are all J-terms with |J| = |I|. However, as we have seen in the proof of (ii) ⇒ (i)
in Corollary 4.2, if f is self-commuting, then the sets S ⊆ [m] with |S| ≥ 2 for
which the S-terms of the maximal DNF of f are essential form a chain. This forces
that the only set S with |S| ≥ 2 for which the S-term in (4.6) may be essential is
S = [m]. Thus an S-term in (4.6) is essential only if |S| ∈ {0, 1, m}, so f has the
prescribed form.
4.2. Commutativity of special lattice polynomial operations. We will now
use our theorem on commuting pairs of distributive lattice polynomial operations
to determine all commuting pairs of distributive lattice term operations. At the
end of this subsection we will outline a second proof of the same result that does
not use our theorem on commuting polynomials.
When determining pairs of commuting term operations, one special case that is
key to the general argument is the case where one term is a join of two variables.
We shall work out that case first in a bit more generality than necessary, namely we
will describe those polynomial operations of a distributive lattice which commute
with an arbitrary linear polynomial operation. It seems plausible that this case
will find application some day.
By a linear polynomial operation of a distributive lattice we mean a polynomial
operation of the form
X
f (x1 , . . . , xm ) = a∅ +
ai xi where m ≥ 1 and a∅ ≤ ai for all i ∈ [m]. (4.7)
i∈[m]
For 1 ≤ i < j ≤ m let
φij
f
denote the unary polynomial operation
φij
f (x) := a∅ + ai aj x
01
of L. As φij
→ L01 .
f is a unary polynomial, it is a lattice homomorphism L
Corollary 4.5. Let L be a distributive lattice, and let f be a linear polynomial
operation
of
QL. A polynomial operation g of L with maximal DNF g(x1 , . . . , xn ) =
P
j∈T xj commutes with f if and only if
T ⊆[n] bT
P
(a) a∅ + b∅ ≤
i∈[m] ai b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
18
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
ij
(a) φij
f (bV ) = φf b∅ +
P
v∈V
bv for all V ⊆ [n] and 1 ≤ i < j ≤ m.
01
Since φij
→ L01 are lattice homomorphisms, condition (b) here is easily
f : L
seen to be equivalent to
ij
(b)′ φij
f (bV1 ∪V2 ) = φf (bV1 + bV2 ) for all V1 , V2 ⊆ [n] and 1 ≤ i < j ≤ m.
Proof of Corollary 4.5. The assumption a∅ ≤ ai for all i ∈ [m] ensures
P that the
coefficients aU (U ⊆ [m]) of the maximal DNF of f are aU = a∅ + u∈U au for
all U ⊆ [m]. By Theorem 3.5, f ⊥ g if and only if (a) holds and the equalities
(3.5)–(3.6) are satisfied by the coefficients aU , bV of the maximal DNFs of f and
g. For our f , the equality (3.6) holds automatically for arbitrary U ⊆ [m] and
V1 , V2 ⊆ [n]. Now let U1 , U2 ⊆ [m] and V ⊆ [n]. Since
X
X
a u1 a ∅ +
a u2
a U1 a U2 = a ∅ +
u2 ∈U2
u1 ∈U1
= a∅ +
X
au +
u∈U1 ∩U2
X
au1 au2 = aU1 ∩U2 +
u1 ∈U1 \U2
u2 ∈U2 \U1
X
a u1 a u2 ,
u1 ∈U1 \U2
u2 ∈U2 \U1
the equality (3.5) is equivalent to the following:
X
a u 1 a u 2 bV
a∅ + aU1 ∩U2 bV +
u1 ∈U1 \U2
u2 ∈U2 \U1
= a∅ + aU1 ∩U2 bV +
X
a u1 a u2
u1 ∈U1 \U2
u2 ∈U2 \U1
b∅ +
X
v∈V
bv .
(4.8)
In the special case when U1 = {i} and U2 = {j} (1 ≤ i < j ≤ m) we have
aU1 ∩U2 = a∅ , so (4.8) simplifies to
X
(4.9)
a ∅ + a i a j bV = a ∅ + a i a j b∅ +
bv ,
v∈V
ij
i.e., φij
v∈V bv . Conversely, the equality (4.8) can be obtained by
f (bV ) = φf b∅ +
joining to the obvious equality a∅ + aU1 ∩U2 bV = a∅ + aU1 ∩U2 bV all equalities (4.9)
where {i, j} = {u1 , u2 }, u1 ∈ U1 \ U2 , u2 ∈ U2 \ U1 , and 1 ≤ i < j ≤ m. This proves
Corollary 4.5.
P
The dual statement to Corollary 4.5 concerns polynomial operations f of the
form
Y
Y
X
Y
xi
f (x1 , . . . , xm ) = a[m]
(a[m]\{i} + xi ) =
a[m]
a[m]\{i}
i∈[m]
S⊆[m]
i∈S
/
i∈S
where m ≥ 1 and a[m] ≥ a[m]\{i} for all i ∈ [m].
For 1 ≤ i < j ≤ m let now ψfij denote the unary polynomial operation
ψfij (x) := a[m] (a[m]\{i} + a[m]\{j} + x) = a[m]\{i} + a[m]\{j} + a[m] x
of L. Again, ψfij is a lattice homomorphism L01 → L01 .
(4.10)
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
19
Corollary 4.6. Let L be a distributive lattice, and let f be a polynomial operation of L satisfying
(4.10).
Q A polynomial operation g of L with maximal DNF
P
g(x1 , . . . , xn ) = T ⊆[n] bT j∈T xj commutes with f if and only if
Q
(a)
i∈[m] a[m]\{i} + b∅ ≤ a[m] b[n] (i.e., im(f ) ∩ im(g) 6= ∅), and
Q
(b) ψfij (bV ) = ψfij b[n] v∈V
/ b[n]\{v} for all V ⊆ [n] and 1 ≤ i < j ≤ m.
Since ψfij : L01 → L01 are lattice homomorphisms, condition (b) here is easily
seen to be equivalent to
(b)′ ψfij (bV1 ∩V2 ) = ψfij bV1 bV2 ) for all V1 , V2 ⊆ [n] and 1 ≤ i < j ≤ m.
Now we are ready to determine all pairs of commuting term operations of a
distributive lattice.
Corollary 4.7. Let L be a distributive lattice. Two term operations f and g of L
commute if and only if they satisfy one of the following conditions:
(a) one of f , g is a projection, and the other one is arbitrary,
(b) both of f and g are joins of variables,
(c) both of f and g are meets of variables.
Proof. The sufficiency of the given condition for f ⊥ g is clear. To prove the
necessity assume that f ⊥ g and neither f nor g is a projection. Let
X
Y
X
Y
xj ,
xi
and
g(x1 , . . . , xn ) =
bT
f (x1 , . . . , xm ) =
aS
S⊆[m]
i∈S
T ⊆[n]
j∈T
be the maximal DNFs of f and g. Since f and g are term operations, aS , bT ∈ {0, 1}
for all S ⊆ [m] and T ⊆ [n]. Let
F := {S ⊆ [m] : aS = 1}
and
G := {T ⊆ [n] : bT = 1}.
F is an order filter in the power set of [m], and G is an order filter in the power set
of [n]. Moreover, a∅ = b∅ = 0 and a[m] = b[n] = 1; that is, ∅ ∈
/ F, [m] ∈ F, and
∅∈
/ G, [n] ∈ G.
We will distinguish two cases. Suppose first that F has a least element, S0 .
Then S0 6= ∅ and the SQ0 -term is the only essential term of the maximal DNF of
f , so f (x1 , . . . , xm ) = i∈S0 xi . By assumption, f is not a projection, therefore
|S0 | ≥ 2. Since f generates the same clone as x1 x2 , we have f ⊥ g if and only
if x1 x2 ⊥ g. Applying Corollary 4.6 with m = 2 and a[2] = 1, a1 = a2 = 0,
we see that ψ 12 is the identity homomorphism, and hence G is closed under ∩ by
Corollary 4.6 (b)′ . The intersection
of all elements of G yields a least element T0
Q
of G, and g(x1 , . . . , xn ) = j∈T0 xj . This shows that if f ⊥ g and f is a meet of at
least two variables, then g is also a meet of variables.
It remains to consider the case when F has two incomparable minimal elements,
say U1 and U2 . In this case aU1 = aU2 = 1, but aU1 ∩U2 = 0, while we still have
a∅ = b∅ = 0. We will substitute these values into condition (3.5) of Theorem 3.5,
which we recall here:
X
a∅ + aU1 aU2 bV = a∅ + aU1 ∩U2 bV + aU1 aU2 b∅ +
bv .
v∈V
P
The result of the substitution is that bV = v∈V bv holds for arbitrary V ⊆ [n],
which shows that if a V -term of g is essential, then V is a singleton. Hence
20
M. BEHRISCH, M. COUCEIRO, K. A. KEARNES, E. LEHTONEN, AND Á. SZENDREI
P
g(x1 , . . . , xn ) = t∈T0 xt for some T0 ⊆ [n]. By assumption, g is not a projection, so it is a join of at least two variables. By the dual of the last sentence of the
preceding paragraph, f must also be a join of variables.
Now we outline a second proof of Corollary 4.7. Suppose that f and g are term
operations of a nontrivial distributive lattice L. The restriction map to a 2-element
sublattice of L is a clone isomorphism, because the variety of distributive lattices
is minimal, so f and g commute on L if and only if they commute on some (any)
2-element sublattice. Thus no generality is lost in assuming that L = {0, 1} has
only two elements.
Let I denote the clone of all idempotent operations on {0, 1}. Let C be the clone
generated by f , let D = C ⊥ ∩ I be the clone of idempotent operations centralizing
C, and let E = D⊥ ∩ I be the clone of idempotent operations centralizing D. We
have that {D, E} is an unordered pair of idempotent clones, each the “idempotent
centralizer” of the other, and that g ∈ D and f ∈ E. By examining Post’s lattice of
all clones on the 2-element set [12] and by determining the centralizer clones among
them [7, 10] it is easy to see that there are four such pairs {D, E}:
(1)
(2)
(3)
(4)
{D, E} = {the clone of projections, I},
D = E = the clone generated by ternary addition modulo 2,
D = E = the clone generated by meet, or
D = E = the clone generated by join.
In case (1), one of f or g must be a projection. In case (2), both f and g are
monotone affine operations, hence again must be projections. So if neither f nor
g is a projection, then both are nonprojections from the same (minimal) clone
generated by one of the semilattice operations. This forces them both to be meets
of variables or both to be joins of variables.
References
[1] J. Aczél, J. Dhombres, Functional Equations in Several Variables, Encyclopedia of Mathematics and Its Applications, vol. 31, Cambridge University Press, Cambridge, 1989.
[2] S. Burris, R. Willard, Finitely many primitive positive clones, Proc. Amer. Math. Soc.
101 (1987), no. 3, 427–430.
[3] M. Couceiro, E. Lehtonen, Self-commuting lattice polynomial functions, arXiv:0912.0478.
[4] G. Eigenthaler, R. Winkler, Commutative composition semigroups of polynomials, Contributions to General Algebra 6, Hölder–Pichler–Tempsky, Vienna, 1988, pp. 89–101.
[5] R. L. Goodstein, The solution of equations in a lattice, Proc. Roy. Soc. Edinburgh Sect. A
67 (1965/1967), 231–242.
[6] M. Grabisch, J.-L. Marichal, R. Mesiar, E. Pap, Aggregation Functions, Encyclopedia of
Mathematics and Its Applications, vol. 127, Cambridge University Press, Cambridge, 2009.
[7] M. Hermann, On Boolean primitive positive clones, Discrete Math. 308 (2008), 3151–3162.
[8] K. A. Kearnes, A quasi-affine representation, Internat. J. Algebra Comput. 5 (1995), 673–
702.
[9] K. A. Kearnes, Á. Szendrei, The classification of commutative minimal clones, Discuss.
Math. Algebra Stochastic Methods 19 (1999), 147–178.
[10] A. V. Kuznecov, On detecting non-deducibility and non-expressibility, Logical deduction,
Nauka, Moscow, 1979, pp. 5–33 (in Russian).
[11] B. Larose, On the centralizer of the join operation of a finite lattice, Algebra Universalis 34
(1995), 304–313.
[12] E. L. Post, The Two-Valued Iterative Systems of Mathematical Logic, Annals of Mathematics Studies, no. 5, Princeton University Press, Princeton, 1941.
[13] A. Romanowska, J. D. Smith, Modes, World Scientific, Singapore, 2002.
COMMUTING POLYNOMIAL OPERATIONS OF DISTRIBUTIVE LATTICES
21
[14] V. Trnková, J. Sichler, All clones are centralizer clones, Algebra Universalis 61 (2009),
no. 1, 77–95.
[15] J. W. Snow, Primitive positive clones of groupoids, Algebra Universalis 60 (2009), no. 2,
231–237.
[16] L. Szabó, On algebras with primitive positive clones, Acta Sci. Math. (Szeged) 73 (2007),
no. 3-4, 463–470.
(M. Behrisch) Institute of Algebra, Dresden University of Technology, 01062 Dresden, Germany
E-mail address: mike.behrisch@mailbox.tu-dresden.de
(M. Couceiro) Mathematics Research Unit, University of Luxembourg, 6, rue Richard
Coudenhove-Kalergi, L–1359 Luxembourg, Luxembourg
E-mail address: miguel.couceiro@uni.lu
(K. A. Kearnes) Department of Mathematics, University of Colorado at Boulder,
Campus Box 395, Boulder, Colorado 80309-0395, USA
E-mail address: kearnes@euclid.colorado.edu
(E. Lehtonen) Computer Science and Communications Research Unit, University of
Luxembourg, 6, rue Richard Coudenhove-Kalergi, L–1359 Luxembourg, Luxembourg
E-mail address: erkko.lehtonen@uni.lu
(Á. Szendrei) Department of Mathematics, University of Colorado at Boulder, Campus Box 395, Boulder, Colorado 80309-0395, USA
E-mail address: szendrei@euclid.colorado.edu