Sample Paper for the amsmath Package
File name:
testmath.tex

American Mathematical Society
(Version 2.0a, 2023/08/24)

1 Introduction

This paper contains examples of various features from AmS-.

2 Enumeration of Hamiltonian paths in a graph

Let 𝐀=(aij) be the adjacency matrix of graph G. The corresponding Kirchhoff matrix 𝐊=(kij) is obtained from 𝐀 by replacing in 𝐀 each diagonal entry by the degree of its corresponding vertex; i.e., the ith diagonal entry is identified with the degree of the ith vertex. It is well known that

det𝐊(i|i)= the number of spanning trees of G,i=1,,n (1)

where 𝐊(i|i) is the ith principal submatrix of 𝐊.

\det\mathbf{K}(i|i)=\text{ the number of spanning trees of $G$},

Let Ci(j) be the set of graphs obtained from G by attaching edge (vivj) to each spanning tree of G. Denote by Ci=jCi(j). It is obvious that the collection of Hamiltonian cycles is a subset of Ci. Note that the cardinality of Ci is kiidet𝐊(i|i). Let X^={x^1,,x^n}.

$\wh X=\{\hat x_1,\dots,\hat x_n\}$

Define multiplication for the elements of X^ by

x^ix^j=x^jx^i,x^i2=0,i,j=1,,n. (2)

Let k^ij=kijx^j and k^ij=jik^ij. Then the number of Hamiltonian cycles Hc is given by the relation [8]

(j=1nx^j)Hc=12k^ijdet𝐊^(i|i),i=1,,n. (3)

The task here is to express (3) in a form free of any x^i, i=1,,n. The result also leads to the resolution of enumeration of Hamiltonian paths in a graph.

It is well known that the enumeration of Hamiltonian cycles and paths in a complete graph Kn and in a complete bipartite graph Kn1n2 can only be found from first combinatorial principles [4]. One wonders if there exists a formula which can be used very efficiently to produce Kn and Kn1n2. Recently, using Lagrangian methods, Goulden and Jackson have shown that Hc can be expressed in terms of the determinant and permanent of the adjacency matrix [3]. However, the formula of Goulden and Jackson determines neither Kn nor Kn1n2 effectively. In this paper, using an algebraic method, we parametrize the adjacency matrix. The resulting formula also involves the determinant and permanent, but it can easily be applied to Kn and Kn1n2. In addition, we eliminate the permanent from Hc and show that Hc can be represented by a determinantal function of multivariables, each variable with domain {0,1}. Furthermore, we show that Hc can be written by number of spanning trees of subgraphs. Finally, we apply the formulas to a complete multigraph Kn1np.

The conditions aij=aji, i,j=1,,n, are not required in this paper. All formulas can be extended to a digraph simply by multiplying Hc by 2.

3 Main Theorem

Notation.

For p,qP and nω we write (q,n)(p,n) if qp and Aq,n=Ap,n.

\begin{notation} For $p,q\in P$ and $n\in\omega$
...
\end{notation}

Let 𝐁=(bij) be an n×n matrix. Let 𝐧={1,,n}. Using the properties of (2), it is readily seen that

Lemma 3.1.
i𝐧(j𝐧bijx^i)=(i𝐧x^i)per𝐁 (4)

where per𝐁 is the permanent of 𝐁.

Let Y^={y^1,,y^n}. Define multiplication for the elements of Y^ by

y^iy^j+y^jy^i=0,i,j=1,,n. (5)

Then, it follows that

Lemma 3.2.
i𝐧(j𝐧bijy^j)=(i𝐧y^i)det𝐁. (6)

Note that all basic properties of determinants are direct consequences of Lemma 3.2. Write

j𝐧bijy^j=j𝐧bij(λ)y^j+(biiλi)y^iy^ (7)

where

bii(λ)=λi,bij(λ)=bij,ij. (8)

Let 𝐁(λ)=(bij(λ)). By (6) and (7), it is straightforward to show the following result:

Theorem 3.3.
det𝐁=l=0nIlniIl(biiλi)det𝐁(λ)(Il|Il), (9)

where Il={i1,,il} and 𝐁(λ)(Il|Il) is the principal submatrix obtained from 𝐁(λ) by deleting its i1,,il rows and columns.

Remark 3.1.

Let 𝐌 be an n×n matrix. The convention 𝐌(𝐧|𝐧)=1 has been used in (9) and hereafter.

Before proceeding with our discussion, we pause to note that Theorem 3.3 yields immediately a fundamental formula which can be used to compute the coefficients of a characteristic polynomial [9]:

Corollary 3.4.

Write det(𝐁x𝐈)=l=0n(1)lblxl. Then

bl=Il𝐧det𝐁(Il|Il). (10)

Let

𝐊(t,t1,,tn)=(D1ta12t2a1ntna21t1D2ta2ntn[2]4an1t1an2t2Dnt), (11)
\begin{pmatrix} D_1t&-a_{12}t_2&\dots&-a_{1n}t_n\\
-a_{21}t_1&D_2t&\dots&-a_{2n}t_n\\
\hdotsfor[2]{4}\\
-a_{n1}t_1&-a_{n2}t_2&\dots&D_nt\end{pmatrix}

where

Di=j𝐧aijtj,i=1,,n. (12)

Set

D(t1,,tn)=δδtdet𝐊(t,t1,,tn)|t=1.

Then

D(t1,,tn)=i𝐧Didet𝐊(t=1,t1,,tn;i|i), (13)

where 𝐊(t=1,t1,,tn;i|i) is the ith principal submatrix of 𝐊(t=1,t1,,tn).

Theorem 3.3 leads to

det𝐊(t1,t1,,tn)=I𝐧(1)|I|tn|I|iItijI(Dj+λjtj)det𝐀(λt)(I¯|I¯). (14)

Note that

det𝐊(t=1,t1,,tn)=I𝐧(1)|I|iItijI(Dj+λjtj)det𝐀(λ)(I¯|I¯)=0. (15)

Let ti=x^i,i=1,,n. Lemma 3.1 yields

(i𝐧alixi)det𝐊(t=1,x1,,xn;l|l)=(i𝐧x^i)I𝐧{l}(1)|I|per𝐀(λ)(I|I)det𝐀(λ)(I¯{l}|I¯{l}). (16)
\begin{multline}
\biggl(\sum_{\,i\in\mathbf{n}}a_{l _i}x_i\biggr)
\det\mathbf{K}(t=1,x_1,\dots,x_n;l |l )\\
=\biggl(\prod_{\,i\in\mathbf{n}}\hat x_i\biggr)
\sum_{I\subseteq\mathbf{n}-\{l \}}
(-1)^{\envert{I}}\per\mathbf{A}^{(\lambda)}(I|I)
\det\mathbf{A}^{(\lambda)}
(\overline I\cup\{l \}|\overline I\cup\{l \}).
\label{sum-ali}
\end{multline}

By (3), (6), and (7), we have

Proposition 3.5.
Hc=12nl=0n(1)lDl, (17)

where

Dl=Il𝐧D(t1,,tn)2|ti={0,if iIl1,otherwise,i=1,,n. (18)

4 Application

We consider here the applications of Theorems 5.1 and 5.2 to a complete multipartite graph Kn1np. It can be shown that the number of spanning trees of Kn1np may be written

T=np2i=1p(nni)ni1 (19)

where

n=n1++np. (20)

It follows from Theorems 5.1 and 5.2 that

Hc=12nl=0n(1)l(nl)p2l1++lp=li=1p(nili)[(nl)(nili)]nili[(nl)2j=1p(nili)2]. (21)
... \binom{n_i}{l _i}\\

and

Hc=12l=0n1(1)l(nl)p2l1++lp=li=1p(nili)[(nl)(nili)]nili(1lpnp)[(nl)(nplp)]. (22)

The enumeration of Hc in a Kn1np graph can also be carried out by Theorem 7.2 or 7.3 together with the algebraic method of (2). Some elegant representations may be obtained. For example, Hc in a Kn1n2n3 graph may be written

Hc=n1!n2!n3!n1+n2+n3i[(n1i)(n2n3n1+i)(n3n3n2+i)+(n11i)(n21n3n1+i)(n31n3n2+i)]. (23)

5 Secret Key Exchanges

Modern cryptography is fundamentally concerned with the problem of secure private communication. A Secret Key Exchange is a protocol where Alice and Bob, having no secret information in common to start, are able to agree on a common secret key, conversing over a public channel. The notion of a Secret Key Exchange protocol was first introduced in the seminal paper of Diffie and Hellman [1]. [1] presented a concrete implementation of a Secret Key Exchange protocol, dependent on a specific assumption (a variant on the discrete log), specially tailored to yield Secret Key Exchange. Secret Key Exchange is of course trivial if trapdoor permutations exist. However, there is no known implementation based on a weaker general assumption.

The concept of an informationally one-way function was introduced in [5]. We give only an informal definition here:

Definition 5.1.

A polynomial time computable function f={fk} is informationally one-way if there is no probabilistic polynomial time algorithm which (with probability of the form 1ke for some e>0) returns on input y{0,1}k a random element of f1(y).

In the non-uniform setting [5] show that these are not weaker than one-way functions:

Theorem 5.1 ([5] (non-uniform)).

The existence of informationally one-way functions implies the existence of one-way functions.

We will stick to the convention introduced above of saying “non-uniform” before the theorem statement when the theorem makes use of non-uniformity. It should be understood that if nothing is said then the result holds for both the uniform and the non-uniform models.

It now follows from Theorem 5.1 that

Theorem 5.2 (non-uniform).

Weak SKE implies the existence of a one-way function.

More recently, the polynomial-time, interior point algorithms for linear programming have been extended to the case of convex quadratic programs [11, 13], certain linear complementarity problems [7, 10], and the nonlinear complementarity problem [6]. The connection between these algorithms and the classical Newton method for nonlinear equations is well explained in [7].

6 Review

We begin our discussion with the following definition:

Definition 6.1.

A function H:nn is said to be B-differentiable at the point z if (i) H is Lipschitz continuous in a neighborhood of z, and (ii) there exists a positive homogeneous function BH(z):nn, called the B-derivative of H at z, such that

limv0H(z+v)H(z)BH(z)vv=0.

The function H is B-differentiable in set S if it is B-differentiable at every point in S. The B-derivative BH(z) is said to be strong if

lim(v,v)(0,0)H(z+v)H(z+v)BH(z)(vv)vv=0.
Lemma 6.1.

There exists a smooth function ψ0(z) defined for |z|>12a satisfying the following properties:

  1. (i)

    ψ0(z) is bounded above and below by positive constants c1ψ0(z)c2.

  2. (ii)

    If |z|>1, then ψ0(z)=1.

  3. (iii)

    For all z in the domain of ψ0, Δ0lnψ00.

  4. (iv)

    If 12a<|z|<1a, then Δ0lnψ0c3>0.

Proof.

We choose ψ0(z) to be a radial function depending only on r=|z|. Let h(r)0 be a suitable smooth function satisfying h(r)c3 for 12a<|z|<1a, and h(r)=0 for |z|>1a2. The radial Laplacian

Δ0lnψ0(r)=(d2dr2+1rddr)lnψ0(r)

has smooth coefficients for r>12a. Therefore, we may apply the existence and uniqueness theory for ordinary differential equations. Simply let lnψ0(r) be the solution of the differential equation

(d2dr2+1rddr)lnψ0(r)=h(r)

with initial conditions given by lnψ0(1)=0 and lnψ0(1)=0.

Next, let Dν be a finite collection of pairwise disjoint disks, all of which are contained in the unit disk centered at the origin in C. We assume that Dν={z|zzν|<δ}. Suppose that Dν(a) denotes the smaller concentric disk Dν(a)={z|zzν|(12a)δ}. We define a smooth weight function Φ0(z) for zCνDν(a) by setting Φ0(z)=1 when zνDν and Φ0(z)=ψ0((zzν)/δ) when z is an element of Dν. It follows from Lemma 6.1 that Φ0 satisfies the properties:

  1. (i)

    Φ0(z) is bounded above and below by positive constants c1Φ0(z)c2.

  2. (ii)

    Δ0lnΦ00 for all zCνDν(a), the domain where the function Φ0 is defined.

  3. (iii)

    Δ0lnΦ0c3δ2 when (12a)δ<|zzν|<(1a)δ.

Let Aν denote the annulus Aν={(12a)δ<|zzν|<(1a)δ}, and set A=νAν. The properties (2) and (3) of Φ0 may be summarized as Δ0lnΦ0c3δ2χA, where χA is the characteristic function of A. End of proof

Suppose that α is a nonnegative real constant. We apply Proposition 3.5 with Φ(z)=Φ0(z)eα|z|2. If uC0(R2νDν(a)), assume that 𝒟 is a bounded domain containing the support of u and A𝒟R2νDν(a). A calculation gives

𝒟|¯u|2Φ0(z)eα|z|2c4α𝒟|u|2Φ0eα|z|2+c5δ2A|u|2Φ0eα|z|2.

The boundedness, property (1) of Φ0, then yields

𝒟|¯u|2eα|z|2c6α𝒟|u|2eα|z|2+c7δ2A|u|2eα|z|2.

Let B(X) be the set of blocks of ΛX and let b(X)=|B(X)|. If ϕQX then ϕ is constant on the blocks of ΛX.

PX={ϕMΛϕ=ΛX},QX={ϕMΛϕΛX}. (24)

If ΛϕΛX then Λϕ=ΛY for some YX so that

QX=YXPY.

Thus by Möbius inversion

|PY|=XYμ(Y,X)|QX|.

Thus there is a bijection from QX to WB(X). In particular |QX|=wb(X).

Next note that b(X)=dimX. We see this by choosing a basis for X consisting of vectors vk defined by

vik={1if iΛk,0otherwise.
\[v^{k}_{i}=
\begin{cases} 1 & \text{if $i \in \Lambda_{k}$},\\
0 &\text{otherwise.} \end{cases}
\]
Lemma 6.2.

Let 𝒜 be an arrangement. Then

χ(𝒜,t)=𝒜(1)||tdimT().

In order to compute R′′ recall the definition of S(X,Y) from Lemma 3.1. Since H, 𝒜H. Thus if T()=Y then S(H,Y). Let L′′=L(𝒜′′). Then

R′′=H𝒜(1)||tdimT()=YL′′S(H,Y)(1)||tdimY=YL′′S(H,Y)(1)|𝒜H|tdimY=YL′′μ(H,Y)tdimY=χ(𝒜′′,t). (25)
Corollary 6.3.

Let (𝒜,𝒜,𝒜′′) be a triple of arrangements. Then

π(𝒜,t)=π(𝒜,t)+tπ(𝒜′′,t).
Definition 6.2.

Let (𝒜,𝒜,𝒜′′) be a triple with respect to the hyperplane H𝒜. Call H a separator if T(𝒜)L(𝒜).

Corollary 6.4.

Let (𝒜,𝒜,𝒜′′) be a triple with respect to H𝒜.

  1. (i)

    If H is a separator then

    μ(𝒜)=μ(𝒜′′)

    and hence

    |μ(𝒜)|=|μ(𝒜′′)|.
  2. (ii)

    If H is not a separator then

    μ(𝒜)=μ(𝒜)μ(𝒜′′)

    and

    |μ(𝒜)|=|μ(𝒜)|+|μ(𝒜′′)|.
Proof.

It follows from Theorem 5.1 that π(𝒜,t) has leading term

(1)r(𝒜)μ(𝒜)tr(𝒜).

The conclusion follows by comparing coefficients of the leading terms on both sides of the equation in Corollary 6.3. If H is a separator then r(𝒜)<r(𝒜) and there is no contribution from π(𝒜,t). End of proof

The Poincaré polynomial of an arrangement will appear repeatedly in these notes. It will be shown to equal the Poincaré polynomial of the graded algebras which we are going to associate with 𝒜. It is also the Poincaré polynomial of the complement M(𝒜) for a complex arrangement. Here we prove that the Poincaré polynomial is the chamber counting function for a real arrangement. The complement M(𝒜) is a disjoint union of chambers

M(𝒜)=CCham(𝒜)C.

The number of chambers is determined by the Poincaré polynomial as follows.

Theorem 6.5.

Let 𝒜𝐑 be a real arrangement. Then

|Cham(𝒜𝐑)|=π(𝒜𝐑,1).
Proof.

We check the properties required in Corollary 6.4: (i) follows from π(Φl,t)=1, and (ii) is a consequence of Corollary 3.4. End of proof

Figure 1: Q(𝒜1)=xyz(xz)(x+z)(yz)(y+z)
Figure 2: Q(𝒜2)=xyz(x+y+z)(x+yz)(xy+z)(xyz)
Theorem 6.6.

Let ϕ be a protocol for a random pair (X,Y). If one of σϕ(x,y) and σϕ(x,y) is a prefix of the other and (x,y)SX,Y, then

σj(x,y)j=1=σj(x,y)j=1=σj(x,y)j=1.
Proof.

We show by induction on i that

σj(x,y)j=1i=σj(x,y)j=1i=σj(x,y)j=1i.

The induction hypothesis holds vacuously for i=0. Assume it holds for i1, in particular [σj(x,y)]j=1i1=[σj(x,y)]j=1i1. Then one of [σj(x,y)]j=i and [σj(x,y)]j=i is a prefix of the other which implies that one of σi(x,y) and σi(x,y) is a prefix of the other. If the ith message is transmitted by P𝒳 then, by the separate-transmissions property and the induction hypothesis, σi(x,y)=σi(x,y), hence one of σi(x,y) and σi(x,y) is a prefix of the other. By the implicit-termination property, neither σi(x,y) nor σi(x,y) can be a proper prefix of the other, hence they must be the same and σi(x,y)=σi(x,y)=σi(x,y). If the ith message is transmitted by P𝒴 then, symmetrically, σi(x,y)=σi(x,y) by the induction hypothesis and the separate-transmissions property, and, then, σi(x,y)=σi(x,y) by the implicit-termination property, proving the induction step. End of proof

If ϕ is a protocol for (X,Y), and (x,y), (x,y) are distinct inputs in SX,Y, then, by the correct-decision property, σj(x,y)j=1σj(x,y)j=1.

Equation (25) defined P𝒴’s ambiguity set SX|Y(y) to be the set of possible X values when Y=y. The last corollary implies that for all ySY, the multiset111A multiset allows multiplicity of elements. Hence, {0,01,01} is prefix free as a set, but not as a multiset. of codewords {σϕ(x,y):xSX|Y(y)} is prefix free.

7 One-Way Complexity

C^1(X|Y), the one-way complexity of a random pair (X,Y), is the number of bits P𝒳 must transmit in the worst case when P𝒴 is not permitted to transmit any feedback messages. Starting with SX,Y, the support set of (X,Y), we define G(X|Y), the characteristic hypergraph of (X,Y), and show that

C^1(X|Y)=logχ(G(X|Y)).

Let (X,Y) be a random pair. For each y in SY, the support set of Y, Equation (25) defined SX|Y(y) to be the set of possible x values when Y=y. The characteristic hypergraph G(X|Y) of (X,Y) has SX as its vertex set and the hyperedge SX|Y(y) for each ySY.

We can now prove a continuity theorem.

Theorem 7.1.

Let Ω𝐑n be an open set, let uBV(Ω;𝐑m), and let

Txu={y𝐑m:y=u~(x)+Du|Du|(x),z for some z𝐑n} (26)

for every xΩ\Su. Let f:𝐑m𝐑k be a Lipschitz continuous function such that f(0)=0, and let v=f(u):Ω𝐑k. Then vBV(Ω;𝐑k) and

Jv=(f(u+)f(u))νun1|Su. (27)

In addition, for |D~u|-almost every xΩ the restriction of the function f to Txu is differentiable at u~(x) and

D~v=(f|Txu)(u~)D~u|D~u||D~u|. (28)

Before proving the theorem, we state without proof three elementary remarks which will be useful in the sequel.

Remark 7.1.

Let ω:]0,+[]0,+[ be a continuous function such that ω(t)0 as t0. Then

limh0+g(ω(h))=Llimh0+g(h)=L

for any function g:]0,+[𝐑.

Remark 7.2.

Let g:𝐑n𝐑 be a Lipschitz continuous function and assume that

L(z)=limh0+g(hz)g(0)h

exists for every z𝐐n and that L is a linear function of z. Then g is differentiable at 0.

Remark 7.3.

Let A:𝐑n𝐑m be a linear function, and let f:𝐑m𝐑 be a function. Then the restriction of f to the range of A is differentiable at 0 if and only if f(A):𝐑n𝐑 is differentiable at 0 and

(f|Im(A))(0)A=(f(A))(0).
Proof.

We begin by showing that vBV(Ω;𝐑k) and

|Dv|(B)K|Du|(B)B𝐁(Ω), (29)

where K>0 is the Lipschitz constant of f. By (13) and by the approximation result quoted in §3, it is possible to find a sequence (uh)C1(Ω;𝐑m) converging to u in L1(Ω;𝐑m) and such that

limh+Ω|uh|𝑑x=|Du|(Ω).

The functions vh=f(uh) are locally Lipschitz continuous in Ω, and the definition of differential implies that |vh|K|uh| almost everywhere in Ω. The lower semicontinuity of the total variation and (13) yield

|Dv|(Ω)lim infh+|Dvh|(Ω)=lim infh+Ω|vh|𝑑xKlim infh+Ω|uh|𝑑x=K|Du|(Ω). (30)

Since f(0)=0, we have also

Ω|v|𝑑xKΩ|u|𝑑x;

therefore uBV(Ω;𝐑k). Repeating the same argument for every open set AΩ, we get (29) for every B𝐁(Ω), because |Dv|, |Du| are Radon measures. To prove Lemma 6.1, first we observe that

SvSu,v~(x)=f(u~(x))xΩ\Su. (31)

In fact, for every ε>0 we have

{yBρ(x):|v(y)f(u~(x))|>ε}{yBρ(x):|u(y)u~(x)|>ε/K},

hence

limρ0+|{yBρ(x):|v(y)f(u~(x))|>ε}|ρn=0

whenever xΩ\Su. By a similar argument, if xSu is a point such that there exists a triplet (u+,u,νu) satisfying (14), (15), then

(v+(x)v(x))νv=(f(u+(x))f(u(x)))νuif xSv

and f(u(x))=f(u+(x)) if xSu\Sv. Hence, by (1.8) we get

Jv(B)=BSv(v+v)νv𝑑n1=BSv(f(u+)f(u))νu𝑑n1=BSu(f(u+)f(u))νu𝑑n1

and Lemma 6.1 is proved. End of proof

To prove (31), it is not restrictive to assume that k=1. Moreover, to simplify our notation, from now on we shall assume that Ω=𝐑n. The proof of (31) is divided into two steps. In the first step we prove the statement in the one-dimensional case (n=1), using Theorem 5.2. In the second step we achieve the general result using Theorem 7.1.

Step 1

Assume that n=1. Since Su is at most countable, (7) yields that |D~v|(Su\Sv)=0, so that (19) and (21) imply that Dv=D~v+Jv is the Radon-Nikodým decomposition of Dv in absolutely continuous and singular part with respect to |D~u|. By Theorem 5.2, we have

D~v|D~u|(t)=limst+Dv([t,s[)|D~u|([t,s[),D~u|D~u|(t)=limst+Du([t,s[)|D~u|([t,s[)

|D~u|-almost everywhere in 𝐑. It is well known (see, for instance, [12, 2.5.16]) that every one-dimensional function of bounded variation w has a unique left continuous representative, i.e., a function w^ such that w^=w almost everywhere and limstw^(s)=w^(t) for every t𝐑. These conditions imply

u^(t)=Du(],t[),v^(t)=Dv(],t[)t𝐑 (32)

and

v^(t)=f(u^(t))t𝐑. (33)

Let t𝐑 be such that |D~u|([t,s[)>0 for every s>t and assume that the limits in (22) exist. By (23) and (24) we get

v^(s)v^(t)|D~u|([t,s[)=f(u^(s))f(u^(t))|D~u|([t,s[)=f(u^(s))f(u^(t)+D~u|D~u|(t)|D~u|([t,s[))|D~u|([t,s[)+f(u^(t)+D~u|D~u|(t)|D~u|([t,s[))f(u^(t))|D~u|([t,s[)

for every s>t. Using the Lipschitz condition on f we find

|v^(s)v^(t)|D~u|([t,s[)f(u^(t)+D~u|D~u|(t)|D~u|([t,s[))f(u^(t))|D~u|([t,s[)|K|u^(s)u^(t)|D~u|([t,s[)D~u|D~u|(t)|.

By (29), the function s|D~u|([t,s[) is continuous and converges to 0 as st. Therefore Remark 7.1 and the previous inequality imply

D~v|D~u|(t)=limh0+f(u^(t)+hD~u|D~u|(t))f(u^(t))h|D~u|-a.e. in 𝐑.

By (22), u^(x)=u~(x) for every x𝐑\Su; moreover, applying the same argument to the functions u(t)=u(t), v(t)=f(u(t))=v(t), we get

D~v|D~u|(t)=limh0f(u~(t)+hD~u|D~u|(t))f(u~(t))h|D~u|-a.e. in 𝐑

and our statement is proved.

Step 2

Let us consider now the general case n>1. Let ν𝐑n be such that |ν|=1, and let πν={y𝐑n:y,ν=0}. In the following, we shall identify 𝐑n with πν×𝐑, and we shall denote by y the variable ranging in πν and by t the variable ranging in 𝐑. By the just proven one-dimensional result, and by Theorem 3.3, we get

limh0f(u~(y+tν)+hD~uy|D~uy|(t))f(u~(y+tν))h=D~vy|D~uy|(t)|D~uy|-a.e. in 𝐑

for n1-almost every yπν. We claim that

D~u,ν|D~u,ν|(y+tν)=D~uy|D~uy|(t)|D~uy|-a.e. in 𝐑 (34)

for n1-almost every yπν. In fact, by (16) and (18) we get

πνD~uy|D~uy||D~uy|𝑑n1(y)=πνD~uy𝑑n1(y)=D~u,ν=D~u,ν|D~u,ν||D~u,ν|=πνD~u,ν|D~u,ν|(y+ν)|D~uy|dn1(y)

and (24) follows from (13). By the same argument it is possible to prove that

D~v,ν|D~u,ν|(y+tν)=D~vy|D~uy|(t)|D~uy|-a.e. in 𝐑 (35)

for n1-almost every yπν. By (24) and (25) we get

limh0f(u~(y+tν)+hD~u,ν|D~u,ν|(y+tν))f(u~(y+tν))h=D~v,ν|D~u,ν|(y+tν)

for n1-almost every yπν, and using again (14), (15) we get

limh0f(u~(x)+hD~u,ν|D~u,ν|(x))f(u~(x))h=D~v,ν|D~u,ν|(x)

|D~u,ν|-a.e. in 𝐑n.

Since the function |D~u,ν|/|D~u| is strictly positive |D~u,ν|-almost everywhere, we obtain also

limh0f(u~(x)+h|D~u,ν||D~u|(x)D~u,ν|D~u,ν|(x))f(u~(x))h=|D~u,ν||D~u|(x)D~v,ν|D~u,ν|(x)

|D~u,ν|-almost everywhere in 𝐑n.

Finally, since

|D~u,ν||D~u|D~u,ν|D~u,ν|=D~u,ν|D~u|=D~u|D~u|,ν|D~u|-a.e. in 𝐑n
|D~u,ν||D~u|D~v,ν|D~u,ν|=D~v,ν|D~u|=D~v|D~u|,ν|D~u|-a.e. in 𝐑n

and since both sides of (33) are zero |D~u|-almost everywhere on |D~u,ν|-negligible sets, we conclude that

limh0f(u~(x)+hD~u|D~u|(x),ν)f(u~(x))h=D~v|D~u|(x),ν,

|D~u|-a.e. in 𝐑n. Since ν is arbitrary, by Remarks 7.2 and 7.3 the restriction of f to the affine space Txu is differentiable at u~(x) for |D~u|-almost every x𝐑n and (26) holds. End of proof

It follows from (13), (14), and (15) that

D(t1,,tn)=I𝐧(1)|I|1|I|iItijI(Dj+λjtj)det𝐀(λ)(I¯|I¯). (36)

Let ti=x^i, i=1,,n. Lemma 1 leads to

D(x^1,,x^n)=i𝐧x^iI𝐧(1)|I|1|I|per𝐀(λ)(I|I)det𝐀(λ)(I¯|I¯). (37)

By (3), (13), and (37), we have the following result:

Theorem 7.2.
Hc=12nl=1nl(1)l1Al(λ), (38)

where

Al(λ)=Il𝐧per𝐀(λ)(Il|Il)det𝐀(λ)(I¯l|I¯l),|Il|=l. (39)

It is worth noting that Al(λ) of (39) is similar to the coefficients bl of the characteristic polynomial of (10). It is well known in graph theory that the coefficients bl can be expressed as a sum over certain subgraphs. It is interesting to see whether Al, λ=0, structural properties of a graph.

We may call (38) a parametric representation of Hc. In computation, the parameter λi plays very important roles. The choice of the parameter usually depends on the properties of the given graph. For a complete graph Kn, let λi=1, i=1,,n. It follows from (39) that

Al(1)={n!,if l=10,otherwise. (40)

By (38)

Hc=12(n1)!. (41)

For a complete bipartite graph Kn1n2, let λi=0, i=1,,n. By (39),

Al={n1!n2!δn1n2,if l=20,otherwise . (42)

Theorem 7.2 leads to

Hc=1n1+n2n1!n2!δn1n2. (43)

Now, we consider an asymmetrical approach. Theorem 3.3 leads to

det𝐊(t=1,t1,,tn;l|l)=I𝐧{l}(1)|I|iItijI(Dj+λjtj)det𝐀(λ)(I¯{l}|I¯{l}). (44)

By (3) and (16) we have the following asymmetrical result:

Theorem 7.3.
Hc=12I𝐧{l}(1)|I|per𝐀(λ)(I|I)det𝐀(λ)(I¯{l}|I¯{l}) (45)

which reduces to Goulden–Jackson’s formula when λi=0,i=1,,n [9].

8 Various font features of the amsmath package

8.1 Bold versions of special symbols

In the amsmath package \boldsymbol is used for getting individual bold math symbols and bold Greek letters—everything in math except for letters of the Latin alphabet, where you’d use \mathbf. For example,

A_\infty + \pi A_0 \sim
\mathbf{A}_{\boldsymbol{\infty}} \boldsymbol{+}
\boldsymbol{\pi} \mathbf{A}_{\boldsymbol{0}}

looks like this:

A+πA0𝐀+𝝅𝐀𝟎

8.2 “Poor man’s bold”

If a bold version of a particular symbol doesn’t exist in the available fonts, then \boldsymbol can’t be used to make that symbol bold. At the present time, this means that \boldsymbol can’t be used with symbols from the msam and msbm fonts, among others. In some cases, poor man’s bold (\pmb) can be used instead of \boldsymbol:

xy|yz
\[\frac{\partial x}{\partial y}
\pmb{\bigg\vert}
\frac{\partial y}{\partial z}\]

So-called “large operator” symbols such as and require an additional command, \mathop, to produce proper spacing and limits when \pmb is used. For further details see The book.

i<Bi oddκκF(ri)i<Bi oddκκ(ri)
\[\sum_{\substack{i<B\\\text{$i$ odd}}}
\prod_\kappa \kappa F(r_i)\qquad
\mathop{\pmb{\sum}}_{\substack{i<B\\\text{$i$ odd}}}
\mathop{\pmb{\prod}}_\kappa \kappa(r_i)
\]

9 Compound symbols and other features

9.1 Multiple integral signs

\iint, \iiint, and \iiiint give multiple integral signs with the spacing between them nicely adjusted, in both text and display style. \idotsint gives two integral signs with dots between them.

Af(x,y)𝑑x𝑑yAf(x,y,z)𝑑x𝑑y𝑑z (46)
Af(w,x,y,z)𝑑w𝑑x𝑑y𝑑z∫⋯∫Af(x1,,xk) (47)

9.2 Over and under arrows

Some extra over and under arrow operations are provided in the amsmath package. (Basic provides \overrightarrow and \overleftarrow).

ψδ(t)Eth =ψδ(t)Eth
ψδ(t)Eth =ψδ(t)Eth
ψδ(t)Eth =ψδ(t)Eth
\begin{align*}
\overrightarrow{\psi_\delta(t) E_t h}&
=\underrightarrow{\psi_\delta(t) E_t h}\\
\overleftarrow{\psi_\delta(t) E_t h}&
=\underleftarrow{\psi_\delta(t) E_t h}\\
\overleftrightarrow{\psi_\delta(t) E_t h}&
=\underleftrightarrow{\psi_\delta(t) E_t h}
\end{align*}

These all scale properly in subscript sizes:

ABax𝑑x
\[\int_{\overrightarrow{AB}} ax\,dx\]

9.3 Dots

Normally you need only type \dots for ellipsis dots in a math formula. The main exception is when the dots fall at the end of the formula; then you need to specify one of \dotsc (series dots, after a comma), \dotsb (binary dots, for binary relations or operators), \dotsm (multiplication dots), or \dotsi (dots after an integral). For example, the input

Then we have the series $A_1,A_2,\dotsc$,
the regional sum $A_1+A_2+\dotsb$,
the orthogonal product $A_1A_2\dotsm$,
and the infinite integral
\[\int_{A_1}\int_{A_2}\dotsi\].

produces

Then we have the series A1,A2,, the regional sum A1+A2+, the orthogonal product A1A2, and the infinite integral

A1A2

9.4 Accents in math

Double accents:

H^^CˇˇT~~A´´G``D˙˙D¨¨B˘˘B¯¯V
\[\Hat{\Hat{H}}\quad\Check{\Check{C}}\quad
\Tilde{\Tilde{T}}\quad\Acute{\Acute{A}}\quad
\Grave{\Grave{G}}\quad\Dot{\Dot{D}}\quad
\Ddot{\Ddot{D}}\quad\Breve{\Breve{B}}\quad
\Bar{\Bar{B}}\quad\Vec{\Vec{V}}\]

This double accent operation is complicated and tends to slow down the processing of a file.

9.5 Dot accents

\dddot and \ddddot are available to produce triple and quadruple dot accents in addition to the \dot and \ddot accents already available in :

Q˙˙˙R˙˙˙˙
\[\dddot{Q}\qquad\ddddot{R}\]

9.6 Roots

In the amsmath package \leftroot and \uproot allow you to adjust the position of the root index of a radical:

\sqrt[\leftroot{-2}\uproot{2}\beta]{k}

gives good positioning of the β:

kβ

9.7 Boxed formulas

The command \boxed puts a box around its argument, like \fbox except that the contents are in math mode:

\boxed{W_t-F\subseteq V(P_i)\subseteq W_t}
WtFV(Pi)Wt.

9.8 Extensible arrows

\xleftarrow and \xrightarrow produce arrows that extend automatically to accommodate unusually wide subscripts or superscripts. The text of the subscript or superscript are given as an optional resp. mandatory argument: Example:

0𝜁𝛼F×[n1]0α(b)E0b
\[0 \xleftarrow[\zeta]{\alpha} F\times\triangle[n-1]
  \xrightarrow{\partial_0\alpha(b)} E^{\partial_0b}\]

9.9 \overset, \underset, and \sideset

Examples:

XXX𝑏𝑎
\[\overset{*}{X}\qquad\underset{*}{X}\qquad
\overset{a}{\underset{b}{X}}\]

The command \sideset is for a rather special purpose: putting symbols at the subscript and superscript corners of a large operator symbol such as or , without affecting the placement of limits. Examples:

k0imEiβx
\[\sideset{_*^*}{_*^*}\prod_k\qquad
\sideset{}{’}\sum_{0\le i\le m} E_i\beta x
\]

9.10 The \text command

The main use of the command \text is for words or phrases in a display:

𝐲=𝐲if and only ifyk=δkyτ(k)
\[\mathbf{y}=\mathbf{y}’\quad\text{if and only if}\quad
y’_k=\delta_k y_{\tau(k)}\]

9.11 Operator names

The more common math functions such as log, sin, and lim have predefined control sequences: \log, \sin, \lim. The amsmath package provides \DeclareMathOperator and \DeclareMathOperator* for producing new function names that will have the same typographical treatment. Examples:

f=esssupxRn|f(x)|
\[\norm{f}_\infty=
\esssup_{x\in R^n}\abs{f(x)}\]
meas1{uR+1:f(u)>α}=measn{xRn:|f(x)|α}α>0.
\[\meas_1\{u\in R_+^1\colon f^*(u)>\alpha\}
=\meas_n\{x\in R^n\colon \abs{f(x)}\geq\alpha\}
\quad \forall\alpha>0.\]

\esssup and \meas would be defined in the document preamble as

\DeclareMathOperator*{\esssup}{ess\,sup}
\DeclareMathOperator{\meas}{meas}

The following special operator names are predefined in the amsmath package: \varlimsup, \varliminf, \varinjlim, and \varprojlim. Here’s what they look like in use:

lim¯n𝒬(un,unu#)0 (48)
lim¯n|an+1|/|an|=0 (49)
lim(miλ)0 (50)
limpS(A)Ap0 (51)
\begin{align}
&\varlimsup_{n\rightarrow\infty}
       \mathcal{Q}(u_n,u_n-u^{\#})\le0\\
&\varliminf_{n\rightarrow\infty}
  \left\lvert a_{n+1}\right\rvert/\left\lvert a_n\right\rvert=0\\
&\varinjlim (m_i^\lambda\cdot)^*\le0\\
&\varprojlim_{p\in S(A)}A_p\le0
\end{align}

9.12 \mod and its relatives

The commands \mod and \pod are variants of \pmod preferred by some authors; \mod omits the parentheses, whereas \pod omits the ‘mod’ and retains the parentheses. Examples:

x y+1(modm2) (52)
x y+1modm2 (53)
x y+1(m2) (54)
\begin{align}
x&\equiv y+1\pmod{m^2}\\
x&\equiv y+1\mod{m^2}\\
x&\equiv y+1\pod{m^2}
\end{align}

9.13 Fractions and related constructions

The usual notation for binomials is similar to the fraction concept, so it has a similar command \binom with two arguments. Example:

γΓCIγ=2k(k1)2k1+(k2)2k2++(1)l(kl)2kl++(1)k=(21)k=1 (55)
\begin{equation}
\begin{split}
[\sum_{\gamma\in\Gamma_C} I_\gamma&
=2^k-\binom{k}{1}2^{k-1}+\binom{k}{2}2^{k-2}\\
&\quad+\dots+(-1)^l\binom{k}{l}2^{k-l}
+\dots+(-1)^k\\
&=(2-1)^k=1
\end{split}
\end{equation}

There are also abbreviations

\dfrac        \dbinom
\tfrac        \tbinom

for the commonly needed constructions

{\displaystyle\frac ... }   {\displaystyle\binom ... }
{\textstyle\frac ... }      {\textstyle\binom ... }

The generalized fraction command \genfrac provides full access to the six fraction primitives:

\over: n+12 \overwithdelims: n+12 (56)
\atop: n+12 \atopwithdelims: (n+12) (57)
\above: n+12 \abovewithdelims: [n+12] (58)
\text{\cn{over}: }&\genfrac{}{}{}{}{n+1}{2}&
\text{\cn{overwithdelims}: }&
  \genfrac{\langle}{\rangle}{}{}{n+1}{2}\\
\text{\cn{atop}: }&\genfrac{}{}{0pt}{}{n+1}{2}&
\text{\cn{atopwithdelims}: }&
  \genfrac{(}{)}{0pt}{}{n+1}{2}\\
\text{\cn{above}: }&\genfrac{}{}{1pt}{}{n+1}{2}&
\text{\cn{abovewithdelims}: }&
  \genfrac{[}{]}{1pt}{}{n+1}{2}

9.14 Continued fractions

The continued fraction

12+12+12+12+12+ (59)

can be obtained by typing

\cfrac{1}{\sqrt{2}+
 \cfrac{1}{\sqrt{2}+
  \cfrac{1}{\sqrt{2}+
   \cfrac{1}{\sqrt{2}+
    \cfrac{1}{\sqrt{2}+\dotsb
}}}}}

Left or right placement of any of the numerators is accomplished by using \cfrac[l] or \cfrac[r] instead of \cfrac.

9.15 Smash

In amsmath there are optional arguments t and b for the plain command \smash, because sometimes it is advantageous to be able to ‘smash’ only the top or only the bottom of something while retaining the natural depth or height. In the formula Xj=(1/λj)Xj \smash[b] has been used to limit the size of the radical symbol.

$X_j=(1/\sqrt{\smash[b]{\lambda_j}})X_j’$

Without the use of \smash[b] the formula would have appeared thus: Xj=(1/λj)Xj, with the radical extending to encompass the depth of the subscript j.

9.16 The ‘cases’ environment

‘Cases’ constructions like the following can be produced using the cases environment.

Prj={0if rj is odd,r!(1)(rj)/2if rj is even. (60)
\begin{equation} P_{r-j}=
  \begin{cases}
    0&  \text{if $r-j$ is odd},\\
    r!\,(-1)^{(r-j)/2}&  \text{if $r-j$ is even}.
  \end{cases}
\end{equation}

Notice the use of \text and the embedded math.

9.17 Matrix

Here are samples of the matrix environments, \matrix, \pmatrix, \bmatrix, \Bmatrix, \vmatrix and \Vmatrix:

ϑϱφϖ(ϑϱφϖ)[ϑϱφϖ]{ϑϱφϖ}|ϑϱφϖ|ϑϱφϖ (61)
\begin{matrix}
\vartheta& \varrho\\\varphi& \varpi
\end{matrix}\quad
\begin{pmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{pmatrix}\quad
\begin{bmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{bmatrix}\quad
\begin{Bmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{Bmatrix}\quad
\begin{vmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{vmatrix}\quad
\begin{Vmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{Vmatrix}

To produce a small matrix suitable for use in text, use the smallmatrix environment.

\begin{math}
  \bigl( \begin{smallmatrix}
      a&b\\ c&d
    \end{smallmatrix} \bigr)
\end{math}

To show the effect of the matrix on the surrounding lines of a paragraph, we put it here: (abcd) and follow it with enough text to ensure that there will be at least one full line below the matrix.

\hdotsfor{number} produces a row of dots in a matrix spanning the given number of columns:

W(Φ)=φ(φ1,ε1)00φkn2(φ2,ε1)φ(φ2,ε2)05φkn1(φn,ε1)φkn2(φn,ε2)φknn1(φn,εn1)φ(φn,εn)
\[W(\Phi)= \begin{Vmatrix}
\dfrac\varphi{(\varphi_1,\varepsilon_1)}&0&\dots&0\\
\dfrac{\varphi k_{n2}}{(\varphi_2,\varepsilon_1)}&
\dfrac\varphi{(\varphi_2,\varepsilon_2)}&\dots&0\\
\hdotsfor{5}\\
\dfrac{\varphi k_{n1}}{(\varphi_n,\varepsilon_1)}&
\dfrac{\varphi k_{n2}}{(\varphi_n,\varepsilon_2)}&\dots&
\dfrac{\varphi k_{n\,n-1}}{(\varphi_n,\varepsilon_{n-1})}&
\dfrac{\varphi}{(\varphi_n,\varepsilon_n)}
\end{Vmatrix}\]

The spacing of the dots can be varied through use of a square-bracket option, for example, \hdotsfor[1.5]{3}. The number in square brackets will be used as a multiplier; the normal value is 1.

9.18 The \substack command

The \substack command can be used to produce a multiline subscript or superscript: for example

\sum_{\substack{0\le i\le m\\ 0<j<n}} P(i,j)

produces a two-line subscript underneath the sum:

0im0<j<nP(i,j) (62)

A slightly more generalized form is the subarray environment which allows you to specify that each line should be left-aligned instead of centered, as here:

0im0<j<nP(i,j) (63)
\sum_{\begin{subarray}{l}
        0\le i\le m\\ 0<j<n
      \end{subarray}}
 P(i,j)

9.19 Big-g-g delimiters

Here are some big delimiters, first in \normalsize:

(𝐄y0tεLx,yx(s)φ(x)𝑑s)
\[\biggl(\mathbf{E}_{y}
  \int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
  \biggr)
\]

and now in \Large size:

(𝐄y0tεLx,yx(s)φ(x)𝑑s)
{\Large
\[\biggl(\mathbf{E}_{y}
  \int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
  \biggr)
\]}

Appendix A Examples of multiple-line equation structures

Note: Starting on this page, vertical rules are added at the margins so that the positioning of various display elements with respect to the margins can be seen more clearly.

A.1 Split

The split environment is not an independent environment but should be used inside something else such as equation or align.

If there is not enough room for it, the equation number for a split will be shifted to the previous line, when equation numbers are on the left; the number shifts down to the next line when numbers are on the right.

fh,ε(x,y)=ε𝐄x,y0tεLx,yε(εu)φ(x)𝑑u=hLx,zφ(x)ρx(dz)+h[1tε(𝐄y0tεLx,yx(s)φ(x)dstεLx,zφ(x)ρx(dz))+1tε(𝐄y0tεLx,yx(s)φ(x)ds𝐄x,y0tεLx,yε(εs)φ(x)ds)]=hL^xφ(x)+hθε(x,y), (64)

Some text after to test the below-display spacing.

\begin{equation}
\begin{split}
f_{h,\varepsilon}(x,y)
&=\varepsilon\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon u)}\varphi(x)\,du\\
&= h\int L_{x,z}\varphi(x)\rho_x(dz)\\
&\quad+h\biggl[\frac{1}{t_\varepsilon}\biggl(\mathbf{E}_{y}
  \int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
  -t_\varepsilon\int L_{x,z}\varphi(x)\rho_x(dz)\biggr)\\
&\phantom{{=}+h\biggl[}+\frac{1}{t_\varepsilon}
  \biggl(\mathbf{E}_{y}\int_0^{t_\varepsilon}L_{x,y^x(s)}
    \varphi(x)\,ds -\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
   L_{x,y_\varepsilon(\varepsilon s)}
   \varphi(x)\,ds\biggr)\biggr]\\
&=h\wh{L}_x\varphi(x)+h\theta_\varepsilon(x,y),
\end{split}
\end{equation}

Unnumbered version:

fh,ε(x,y)=ε𝐄x,y0tεLx,yε(εu)φ(x)𝑑u=hLx,zφ(x)ρx(dz)+h[1tε(𝐄y0tεLx,yx(s)φ(x)dstεLx,zφ(x)ρx(dz))+1tε(𝐄y0tεLx,yx(s)φ(x)ds𝐄x,y0tεLx,yε(εs)φ(x)ds)]=hL^xφ(x)+hθε(x,y),

Some text after to test the below-display spacing.

\begin{equation*}
\begin{split}
f_{h,\varepsilon}(x,y)
&=\varepsilon\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon u)}\varphi(x)\,du\\
&= h\int L_{x,z}\varphi(x)\rho_x(dz)\\
&\quad+h\biggl[\frac{1}{t_\varepsilon}\biggl(\mathbf{E}_{y}
  \int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
  -t_\varepsilon\int L_{x,z}\varphi(x)\rho_x(dz)\biggr)\\
&\phantom{{=}+h\biggl[}+\frac{1}{t_\varepsilon}
  \biggl(\mathbf{E}_{y}\int_0^{t_\varepsilon}L_{x,y^x(s)}
    \varphi(x)\,ds -\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
   L_{x,y_\varepsilon(\varepsilon s)}
   \varphi(x)\,ds\biggr)\biggr]\\
&=h\wh{L}_x\varphi(x)+h\theta_\varepsilon(x,y),
\end{split}
\end{equation*}

If the option centertags is included in the options list of the amsmath package, the equation numbers for split environments will be centered vertically on the height of the split:

|I2|=|0Tψ(t){u(a,t)γ(t)adθk(θ,t)aθc(ξ)ut(ξ,t)𝑑ξ}𝑑t|C6||fΩ|S~a,1,0W2(Ω,Γl)||||u|W2A~(Ω;Γr,T)||. (65)

Some text after to test the below-display spacing.

Use of split within align:

|I1|=|ΩgRu𝑑Ω|C3[Ω(axg(ξ,t)𝑑ξ)2𝑑Ω]1/2×[Ω{ux2+1k(axcut𝑑ξ)2}cΩ]1/2C4||f|S~a,1,0W2(Ω,Γl)||||u|W2A~(Ω;Γr,T)||. (66)
|I2|=|0Tψ(t){u(a,t)γ(t)adθk(θ,t)aθc(ξ)ut(ξ,t)𝑑ξ}𝑑t|C6||fΩ|S~a,1,0W2(Ω,Γl)||||u|W2A~(Ω;Γr,T)||. (67)

Some text after to test the below-display spacing.

\begin{align}
\begin{split}\abs{I_1}
  &=\left\lvert \int_\Omega gRu\,d\Omega\right\rvert\\
&\le C_3\left[\int_\Omega\left(\int_{a}^x
  g(\xi,t)\,d\xi\right)^2d\Omega\right]^{1/2}\\
&\quad\times \left[\int_\Omega\left\{u^2_x+\frac{1}{k}
  \left(\int_{a}^x cu_t\,d\xi\right)^2\right\}
  c\Omega\right]^{1/2}\\
&\le C_4\left\lvert \left\lvert f\left\lvert \wt{S}^{-1,0}_{a,-}
  W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
  \left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
  (\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\label{eq:A}\\
\begin{split}\abs{I_2}&=\left\lvert \int_{0}^T \psi(t)\left\{u(a,t)
  -\int_{\gamma(t)}^a\frac{d\theta}{k(\theta,t)}
  \int_{a}^\theta c(\xi)u_t(\xi,t)\,d\xi\right\}dt\right\rvert\\
&\le C_6\left\lvert \left\lvert f\int_\Omega
  \left\lvert \wt{S}^{-1,0}_{a,-}
  W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
  \left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
  (\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}
\end{align}

Unnumbered align, with a number on the second split:

|I1|=|ΩgRu𝑑Ω|C3[Ω(axg(ξ,t)𝑑ξ)2𝑑Ω]1/2×[Ω{ux2+1k(axcut𝑑ξ)2}cΩ]1/2C4||f|S~a,1,0W2(Ω,Γl)||||u|W2A~(Ω;Γr,T)||.
|I2|=|0Tψ(t){u(a,t)γ(t)adθk(θ,t)aθc(ξ)ut(ξ,t)𝑑ξ}𝑑t|C6||fΩ|S~a,1,0W2(Ω,Γl)||||u|W2A~(Ω;Γr,T)||. (67)

Some text after to test the below-display spacing.

\begin{align*}
\begin{split}\abs{I_1}&=\left\lvert \int_\Omega gRu\,d\Omega\right\rvert\\
  &\le C_3\left[\int_\Omega\left(\int_{a}^x
  g(\xi,t)\,d\xi\right)^2d\Omega\right]^{1/2}\\
&\phantom{=}\times \left[\int_\Omega\left\{u^2_x+\frac{1}{k}
  \left(\int_{a}^x cu_t\,d\xi\right)^2\right\}
  c\Omega\right]^{1/2}\\
&\le C_4\left\lvert \left\lvert f\left\lvert \wt{S}^{-1,0}_{a,-}
  W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
  \left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
  (\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\\
\begin{split}\abs{I_2}&=\left\lvert \int_{0}^T \psi(t)\left\{u(a,t)
  -\int_{\gamma(t)}^a\frac{d\theta}{k(\theta,t)}
  \int_{a}^\theta c(\xi)u_t(\xi,t)\,d\xi\right\}dt\right\rvert\\
&\le C_6\left\lvert \left\lvert f\int_\Omega
  \left\lvert \wt{S}^{-1,0}_{a,-}
  W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
  \left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
  (\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\tag{\theequation$’$}
\end{align*}

A.2 Multline

Numbered version:

ab{ab[f(x)2g(y)2+f(y)2g(x)2]2f(x)g(x)f(y)g(y)dx}𝑑y=ab{g(y)2abf2+f(y)2abg22f(y)g(y)abfg}𝑑y (68)

To test the use of \label and \ref, we refer to the number of this equation here: (68).

\begin{multline}\label{eq:E}
\int_a^b\biggl\{\int_a^b[f(x)^2g(y)^2+f(y)^2g(x)^2]
 -2f(x)g(x)f(y)g(y)\,dx\biggr\}\,dy \\
 =\int_a^b\biggl\{g(y)^2\int_a^bf^2+f(y)^2
  \int_a^b g^2-2f(y)g(y)\int_a^b fg\biggr\}\,dy
\end{multline}

Unnumbered version:

ab{ab[f(x)2g(y)2+f(y)2g(x)2]2f(x)g(x)f(y)g(y)dx}𝑑y=ab{g(y)2abf2+f(y)2abg22f(y)g(y)abfg}𝑑y

Some text after to test the below-display spacing.

\begin{multline*}
\int_a^b\biggl\{\int_a^b[f(x)^2g(y)^2+f(y)^2g(x)^2]
 -2f(x)g(x)f(y)g(y)\,dx\biggr\}\,dy \\
 =\int_a^b\biggl\{g(y)^2\int_a^bf^2+f(y)^2
  \int_a^b g^2-2f(y)g(y)\int_a^b fg\biggr\}\,dy
\end{multline*}

A.3 Gather

Numbered version with \notag on the second line:

D(a,r){z𝐂:|za|<r}, (69)
seg(a,r){z𝐂:z=a,|za|<r},
c(e,θ,r){(x,y)𝐂:|xe|<ytanθ, 0<y<r}, (70)
C(E,θ,r)eEc(e,θ,r). (71)
\begin{gather}
D(a,r)\equiv\{z\in\mathbf{C}\colon \abs{z-a}<r\},\\
\seg(a,r)\equiv\{z\in\mathbf{C}\colon
\Im z= \Im a,\ \abs{z-a}<r\},\notag\\
c(e,\theta,r)\equiv\{(x,y)\in\mathbf{C}
\colon \abs{x-e}<y\tan\theta,\ 0<y<r\},\\
C(E,\theta,r)\equiv\bigcup_{e\in E}c(e,\theta,r).
\end{gather}

Unnumbered version.

D(a,r){z𝐂:|za|<r},
seg(a,r){z𝐂:z=a,|za|<r},
c(e,θ,r){(x,y)𝐂:|xe|<ytanθ, 0<y<r},
C(E,θ,r)eEc(e,θ,r).

Some text after to test the below-display spacing.

\begin{gather*}
D(a,r)\equiv\{z\in\mathbf{C}\colon \abs{z-a}<r\},\\
\seg (a,r)\equiv\{z\in\mathbf{C}\colon
\Im z= \Im a,\ \abs{z-a}<r\},\\
c(e,\theta,r)\equiv\{(x,y)\in\mathbf{C}
 \colon \abs{x-e}<y\tan\theta,\ 0<y<r\},\\
C(E,\theta,r)\equiv\bigcup_{e\in E}c(e,\theta,r).
\end{gather*}

A.4 Align

Numbered version:

γx(t) =(costu+sintx,v), (72)
γy(t) =(u,costv+sinty), (73)
γz(t) =(costu+αβsintv,βαsintu+costv). (74)

Some text after to test the below-display spacing.

\begin{align}
\gamma_x(t)&=(\cos tu+\sin tx,v),\\
\gamma_y(t)&=(u,\cos tv+\sin ty),\\
\gamma_z(t)&=\left(\cos tu+\frac\alpha\beta\sin tv,
  -\frac\beta\alpha\sin tu+\cos tv\right).
\end{align}

Unnumbered version:

γx(t) =(costu+sintx,v),
γy(t) =(u,costv+sinty),
γz(t) =(costu+αβsintv,βαsintu+costv).

Some text after to test the below-display spacing.

\begin{align*}
\gamma_x(t)&=(\cos tu+\sin tx,v),\\
\gamma_y(t)&=(u,\cos tv+\sin ty),\\
\gamma_z(t)&=\left(\cos tu+\frac\alpha\beta\sin tv,
  -\frac\beta\alpha\sin tu+\cos tv\right).
\end{align*}

A variation:

x =y by (82) (75)
x =y by (83) (76)
x+x =y+y by Axiom 1. (77)

Some text after to test the below-display spacing.

\begin{align}
x& =y && \text {by (\ref{eq:C})}\\
x’& = y’ && \text {by (\ref{eq:D})}\\
x+x’ & = y+y’ && \text {by Axiom 1.}
\end{align}

A.5 Align and split within gather

When using the align environment within the gather environment, one or the other, or both, should be unnumbered (using the * form); numbering both the outer and inner environment would cause a conflict.

Automatically numbered gather with split and align*:

φ(x,z)=zγ10xγmnxmzn=zMr1xMr(m+n)xmzn (78)
ζ0=(ξ0)2,ζ1=ξ0ξ1,ζ2=(ξ1)2, (79)

Here the split environment gets a number from the outer gather environment; numbers for individual lines of the align* are suppressed because of the star.

\begin{gather}
\begin{split} \varphi(x,z)
&=z-\gamma_{10}x-\gamma_{mn}x^mz^n\\
&=z-Mr^{-1}x-Mr^{-(m+n)}x^mz^n
\end{split}\\[6pt]
\begin{align*}
\zeta^0 &=(\xi^0)^2,\\
\zeta^1 &=\xi^0\xi^1,\\
\zeta^2 &=(\xi^1)^2,
\end{align*}
\end{gather}

The *-ed form of gather with the non-*-ed form of align.

φ(x,z)=zγ10xγmnxmzn=zMr1xMr(m+n)xmzn
ζ0=(ξ0)2,ζ1=ξ0ξ1,ζ2=(ξ1)2,

Some text after to test the below-display spacing.

\begin{gather*}
\begin{split} \varphi(x,z)
&=z-\gamma_{10}x-\gamma_{mn}x^mz^n\\
&=z-Mr^{-1}x-Mr^{-(m+n)}x^mz^n
\end{split}\\[6pt]
\begin{align} \zeta^0&=(\xi^0)^2,\\
\zeta^1 &=\xi^0\xi^1,\\
\zeta^2 &=(\xi^1)^2,
\end{align}
\end{gather*}

A.6 Alignat

Numbered version:

Vi =viqivj, Xi =xiqixj, Ui =ui,for ij; (80)
Vj =vj, Xj =xj, Uj uj+ijqiui. (81)

Some text after to test the below-display spacing.

\begin{alignat}{3}
V_i & =v_i - q_i v_j, & \qquad X_i & = x_i - q_i x_j,
 & \qquad U_i & = u_i,
 \qquad \text{for $i\ne j$;}\label{eq:B}\\
V_j & = v_j, & \qquad X_j & = x_j,
  & \qquad U_j & u_j + \sum_{i\ne j} q_i u_i.
\end{alignat}

Unnumbered version:

Vi =viqivj, Xi =xiqixj, Ui =ui,for ij;
Vj =vj, Xj =xj, Uj uj+ijqiui.

Some text after to test the below-display spacing.

\begin{alignat*}3
V_i & =v_i - q_i v_j, & \qquad X_i & = x_i - q_i x_j,
 & \qquad U_i & = u_i,
 \qquad \text{for $i\ne j$;} \\
V_j & = v_j, & \qquad X_j & = x_j,
  & \qquad U_j & u_j + \sum_{i\ne j} q_i u_i.
\end{alignat*}

The most common use for alignat is for things like

x =y by (66) (82)
x =y by (80) (83)
x+x =y+y by Axiom 1. (84)

Some text after to test the below-display spacing.

\begin{alignat}{2}
x& =y && \qquad \text {by (\ref{eq:A})}\label{eq:C}\\
x’& = y’ && \qquad \text {by (\ref{eq:B})}\label{eq:D}\\
x+x’ & = y+y’ && \qquad \text {by Axiom 1.}
\end{alignat}

References

  • [1] W. Diffie and E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), no. 5, 644–654.
  • [2] D. H. Fremlin, Cichon’s diagram, 1983/1984, presented at the Séminaire Initiation à l’Analyse, G. Choquet, M. Rogalski, J. Saint Raymond, at the Université Pierre et Marie Curie, Paris, 23e année.
  • [3] I. P. Goulden and D. M. Jackson, The enumeration of directed closed Euler trails and directed Hamiltonian circuits by Langrangian methods, European J. Combin. 2 (1981), 131–212.
  • [4] F. Harary and E. M. Palmer, Graphical enumeration, Academic Press, 1973.
  • [5] R. Impagliazzo, L. Levin, and M. Luby, Pseudo-random generation from one-way functions, Proc. 21st STOC (1989), ACM, New York, pp. 12–24.
  • [6] M. Kojima, S. Mizuno, and A. Yoshise, A new continuation method for complementarity problems with uniform p-functions, Tech. Report B-194, Tokyo Inst. of Technology, Tokyo, 1987, Dept. of Information Sciences.
  • [7]   , A polynomial-time algorithm for a class of linear complementarity problems, Tech. Report B-193, Tokyo Inst. of Technology, Tokyo, 1987, Dept. of Information Sciences.
  • [8] C. J. Liu and Yutze Chow, On operator and formal sum methods for graph enumeration problems, SIAM J. Algorithms Discrete Methods 5 (1984), 384–438.
  • [9] M. Marcus and H. Minc, A survey of matrix theory and matrix inequalities, Complementary Series in Math. 14 (1964), 21–48.
  • [10] S. Mizuno, A. Yoshise, and T. Kikuchi, Practical polynomial time algorithms for linear complementarity problems, Tech. Report 13, Tokyo Inst. of Technology, Tokyo, April 1988, Dept. of Industrial Engineering and Management.
  • [11] R. D. Monteiro and I. Adler, Interior path following primal-dual algorithms, part II: Quadratic programming, August 1987, Working paper, Dept. of Industrial Engineering and Operations Research.
  • [12] E. M. Stein, Singular integrals and differentiability properties of functions, Princeton Univ. Press, Princeton, N.J., 1970.
  • [13] Y. Ye, Interior algorithms for linear, quadratic and linearly constrained convex programming, Ph.D. thesis, Stanford Univ., Palo Alto, Calif., July 1987, Dept. of Engineering–Economic Systems, unpublished.