Lagrange Inversion When and How
Lagrange Inversion When and How
net/publication/226195157
CITATIONS READS
70 2,173
3 authors:
M. Cecilia Verri
University of Florence
49 PUBLICATIONS 975 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Renzo Sprugnoli on 02 June 2014.
Abstract
The aim of the present paper is to show how the Lagrange Inversion Formula (LIF) can
be applied in a straight-forward way i) to find the generating function of many combinatorial
sequences, ii) to extract the coefficients of a formal power series, iii) to compute combinatorial
sums, and iv) to perform the inversion of combinatorial identities. Particular forms of the
LIF are studied, in order to simplify the computation steps. Some examples are taken from
the literature, but their proof is different from the usual, and others are new.
1 Introduction
The “method of coefficients” is an elegant technique for proving combinatorial identities, eval-
uating and inverting sums, essentially due to Egorychev [2] (see also [9]). It mainly consists in
manipulating generating functions and their coefficients (see e.g., [6]), and we can summarize
its most relevant aspects in the following three points which can overlap each other:
(a) if the ak ’s are known, by extracting the coefficient [tn ]b(t) = [tn ]T (a(t)) we have a
closed form for the sum of the right hand member;
(b) if the ak ’s (and hence a(t)) are not known, by inverting the identity we have
a(t) = T −1 (b(t)) and hence the solution of the identity, that is, of the infinite system
it represents (see, e.g., [12]).
1
The Lagrange Inversion Formula (LIF) assumes a central role in all these problems, and our aim
is to show how its systematic use can produce very elegant and straight-forward proofs. We take
for granted the Lagrange formula, which we use below in the equivalent forms K6, K60 and G6.
Moreover, we point out (see Theorems 2.1, 2.3 and Corollary 2.2) that many applications of the
LIF can be reduced to some particular cases which correspond to the generalized binomial and
generalized exponential series in [7].
In general, the LIF is related to the computation of the compositional inverse of a formal
power series and usually is given in this context; this approach often allows to solve the problem
of coefficient extraction. Since the application of the LIF requires the solution of an equation,
explicit forms of generating functions are only obtained when the equation can be actually
solved; however, as we will see, in many cases also an implicit form of the generating function
can be very useful, especially in finding the closed form of a sum and in inverting identities.
Many variants of the LIF are known, and some of them are suited for being used in connection
with the “method of coefficients”; Egorychev in [2] gives several different forms, which we have
reduced and formalized in K6, K60 and G6, but surely other approaches can be proposed. In
fact, the literature about Lagrange inversion is extensive, and the reader is referred to [6, 8, 18]
for proofs and applications, and to Stanley [18, p. 67] for more detailed and historical remarks.
The original proof of Lagrange [1] was essentially algebraic, and the first combinatorial proof
comes back to Raney [11] in 1960. We will use the LIF in its plain one variable version, but it
has been generalized to the multivariate case, for example by Gessel [4], and to q-analogues, as
Singer summarizes in [15]. Actually Gessel [3] extents the LIF and the q-LIF to non commutative
power series.
In this expository paper, we show a number of examples, some of which are taken from
the literature, but are proved in a different way. In particular, in Section 2 we introduce the
method of coefficients and prove some theorems related to the Lagrange inversion formula.
These theorems are used in Section 3 for finding some important generating functions and in
Section 4 for performing coefficient extraction. In the same section we present a technique
for transforming a formal power series in such a way that the LIF can become applicable; as
far as we know, this approach is new, and allows us to apply the LIF in non-trivial situations.
Finally, in Sections 5 and 6 we use Riordan arrays [14, 17] as an important example of generating
function transformations; these transformations are used to close or invert combinatorial sums
in connection with the formulas of Section 2.
K1. linearity [tn ] (αf (t) + βg(t)) = α[tn ]f (t) + β[tn ]g(t)
K2. shifting [tn ]tf (t) = [tn−1 ]f (t)
K3. differentiation [tn ]f 0 (t) = (n +
P1)[t
n+1 ]f (t)
¡ ¢¡ ¢
n
K4. convolution [t ]f (t)g(t) =P k=0¡ [tk ]f (t)¢ [tn−k ]g(t)
n
Properly speaking [tn ] is a functional [tn ] : F → R, where F is the set of formal power series over
R (the field of real numbers, but any field of 0-characteristic could be considered), defined by the
rule: [tn ]tk = δn,k . This functional is a sort of inverse for the operator G, acting on a sequence
2
of real numbers and producing the formal power series which is the generating function of the
sequence; formally, we have G ([tn ]f (t)) = f (t) and [tn ]G (fn ) = fn , whenever the “principle of
identity” is applicable: two formal power series f (t) and g(t) are equal if and only if fn = gn ,
for every n ∈ N. In this sense, the rule for G corresponding to the rules for [tn ] are:
These rules are very powerful, despite their simple appearance and their obvious meaning (see
also [7, Table 320]). However, they are not sufficient as soon as the concept of the compositional
inverse of a formal power series is introduced. If f (t) ∈ F, the compositional inverse f¯(t) ∈ F is
defined by the rule: f (f¯(t)) = f¯(f (t)) = t. It is possible to prove that f (t) has a compositional
inverse if and only if f (0) = 0 and f 0 (0) 6= 0. In order to deal with this situation, the Lagrange
Inversion Formula is appropriate.
Let us suppose that a formal power series w = w(t) is implicitly defined by a relation
w = tφ(w), where φ(t) is a formal power series such that φ(0) 6= 0. The Lagrange Inversion
Formula (LIF) states that:
k
[tn ]w(t)k = [tn−k ]φ(t)n . (2.1)
n
If we set f (t) = t/φ(t), we immediately have f (w(t)) = w/φ(w) = t, showing that w(t) is the
compositional inverse of f (t). Obviously, whenever φ(t) is “simpler” than w(t), the coefficient
extraction in the right hand member may be performed even if the coefficient extraction of the
left hand member seems to be impossible. Formula (2.1) can be given the equivalent form:
Here, F (t) is any formal power series (actually, any formal Laurent series) and we have w = tφ(w)
as before. For F (t) = tk we find again formula (2.1). The generating function counterpart is
the following rule:
· ¯ ¸
n n F (w) ¯¯
G6. diagonalization G ([t ]F (t)φ(t) ) = w = tφ(w) .
1 − tφ0 (w) ¯
The notation [f (w)|w = g(t)] is a linearization of f (w)|w=g(t) and denotes the substitution of
g(t) to every occurrence of w in f (w) (that is, f (g(t))). In particular, w = tφ(w) is to be solved
in w = w(t) and w has to be substituted in the expression on the left of the | sign.
Formula K6 requires the evaluation of F 0 (t); sometimes this derivative is rather complex and
straight forward results can be obtained by using another version of the formula, which is proved
by using the diagonalization rule G6. If we replace F (t) with F (t)(1 − φ0 (t)/φ(t)) in G6, we
immediately get:
3
∞
X
t 1 k
- the exponential series: e = exp(t) = t .
k!
k=0
Theorem 2.1 Let us consider a, q ∈ R; then we have the implicit generating functions:
µ µ ¶¶
a a + qk
G = [ (1 + w)a | w = t(1 + w)q ] ; (2.2)
a + qk k
µµ ¶¶ · ¯ ¸
a + qk (1 + w)a+1 ¯¯ q
G = w = t(1 + w) . (2.3)
k 1 − (q − 1)w ¯
This form is suitable for the LIF when we set φ(t) = (1 + t)q ; actually we have:
µ µ ¶¶ · ¯ ¸
a a + qk (1 − (q − 1)w)(1 + w)a−1 ¯¯ q a q
G = ¯ w = t(1 + w) = [ (1 + w) | w = t(1 + w) ]
a + qk k 1 − tq(1 + w)q−1
When q = 2, the equation w = t(1 + w)q can be solved explicitly, and we find a relation with
the Catalan numbers. In fact, we have:
√
1 − 1 − 4t
1+w = = C(t)
2t
which is the well-known Catalan number generating function. Therefore we can state the fol-
lowing:
4
Corollary 2.2 Let us consider a ∈ R; then we have the explicit generating functions:
µ µ ¶¶
a a + 2k
G = C(t)a ; (2.4)
a + 2k k
µµ ¶¶
a + 2k C(t)a
G =√ . (2.5)
k 1 − 4t
Analogous results can be obtained from the exponential function:
Theorem 2.3 Let us consider a, q ∈ R; then we have the implicit generating functions:
µ ¶
a(a + qk)k−1
G = [ eaw | w = teqw ] ; (2.6)
k!
µ ¶ · aw ¯ ¸
(a + qk)k e ¯
¯ qw
G = w = te . (2.7)
k! 1 − qw ¯
F (t) − f0 1
= aF (t) or F (t) − 1 = atF (t) so that F (t) = G (an ) = .
t 1 − at
In a similar way, it is immediate to find the generating functions of a great number of combina-
torial sequences, as Fibonacci, Catalan and Bell numbers.
As a simple example of applying equation (2.3) in the case q = 1, we wish to show that
µµ ¶¶
p+k tm−p
G = (m ≥ p).
m (1 − t)m+1
5
In fact by setting p − m + k = h we have:
µµ ¶¶ X∞ µ ¶ ∞
X µ ¶
p+k p+k k m + h m−p+h
G = t = t =
m p+k−m h
k=0 h=p−m
X∞ µ ¶
m+h h £ ¯ ¤ tm−p
= tm−p t = tm−p (1 + w)m+1 ¯ w = t(1 + w) = .
h (1 − t)m+1
h=0
³¡ ¢´
2k
A more complex example is given by the sequence k−r , where r ∈ Z is a parameter:
k∈N
µµ ¶¶ ³ ´ ³ ´
2k
G = G [tk−r ](1 + t)2k = G [tk ]tr (1 + t)2k
k−r
As in the previous case, we substitute for t its expression w/(1 + w)2 and find an explicit
value for w = w(t). This requires a bit of attention; the second degree equation we obtain is
tw2 − (1 − 2t)w + t = 0, and therefore we can explicitly find an expression for w = w(t):
√
1 − 2t ± 1 − 4t
w=
2t
As we observed before, we are interested in the solution w = w(t) such that w(0) = 0; this
implies that we should choose
√ the sign
√ − in the expression for w = w(t). Now we have:
1 − 2t(1 + w) = 1 − (1 − 1 − 4t) = 1 − 4t and therefore we find the generating function:
µµ ¶¶ µ √ ¶r
2k 1 1 − 2t − 1 − 4t
G =√ . (3.1)
k−r 1 − 4t 2t
In this application of the LIF, an unpleasant aspect is the fact that we have to solve an
equation, and this equation can be rather complex. If it is an algebraic equation of first or
second degree, as in the two previous examples, there is no problem and the substitution can
be performed easily. However, the equation can have any degree, or can be not algebraic, and
in that case the LIF can only give us an implicit expression. Notwithstanding this drawback,
there can be situations, in which an implicit expression can be useful as an explicit one. Let us
consider the following identity:
n
X µ ¶µ ¶ µ ¶
a a + qk qn − qk a + qn
Sn[a,q] = = .
a + qk k n−k n
k=0
6
The sum is clearly a convolution and by rule G4 we only need to determine the generating
functions of the two factors. By Theorem 2.1 we have:
µ µ ¶¶
a a + qk
Fa,q (t) = G = [ (1 + w)a | w = t(1 + w)q ] ,
a + qk k
µµ ¶¶ · ¯ ¸
qk 1+w ¯ q
Gq (t) = G = ¯ w = t(1 + w) .
k 1 − (q − 1)w ¯
At this point we can perform the convolution, take advantage from the fact that the two sub-
stitutions are the same and finally apply equation (2.3) from right to left:
· ¯ ¸ µ ¶
[a,q] n n (1 + w)a+1 ¯¯ q a + qn
Sn = [t ]Fa,q (t)Gq (t) = [t ] w = t(1 + w) = .
1 − (q − 1)w ¯ n
A direct √
extraction of the coefficient is not feasible, but we can use formula (2.4) if we observe
that 1 − 1 + t = −t/2C(−t/4). In fact we have:
µ ¶n µ ¶n
√ t 1
m n m
[t ](1 − 1 + t) = [t ] − C(−t/4) = − [tm−n ] (C(−t/4))n =
2 2
µ ¶n X∞ µ ¶ µ ¶k
1 m−n n n + 2k t
= − [t ] − =
2 n + 2k k 4
k=0
µ ¶n µ ¶ µ ¶m−n µ ¶
1 n 2m − n 1 n2n 2m − n − 1
= − − = .
2 2m − n m − n 4 m(−4)m m−n
It can be instructive, however, to see how the LIF can be applied
√ directly, without
√ referring
to the particular case of Theorem 2.1. If we set w = w(t) = 1 − 1 + t, we have 1 + t = 1 − w
or 1 + t = 1 − 2w + w2 , which is equivalent to w = t/(w − 2). This result suggests setting
φ(w) = 1/(w − 2), so that:
n m−n 1 n (−1)m
S = [tm ]w(t)n = [w ] = [w m−n
] =
m (w − 2)m m2m (1 − w/2)m
µ ¶ µ ¶
n(−1)m m−n 1 n(−1)m −m (−1)m+n n2n (−1)m 2m − n − 1
= [w ] = = .
m2m (1 − w/2)m m2m m−n 2m−n m4m m−n
√
The previous example is rather simple, because by setting w = 1 − 1 + t we directly arrive
to a manageable form for φ(t). This is not always the case, as one can easily imagine. Let us
7
³ p ´p
consider the following example: [tn ] 1 + 2t + 2 t(1 + t) which arises in the solution of some
combinatorial identities (see Section 5). This coefficient can be computed by √using equation
(2.2) with a = p and q√= 1/2. In fact, if w = t(1 + w)1/2 then w = t(t + 4 + t2 )/2 and
1 + w = 1 + t2 /2 + (t/2) 4 + t2 = f (t2 /4), hence we have:
∞
X µ ¶
n 2 p n p p p + k/2 k
[t ]f (t /4) = [t ](1 + w) = t .
p + k/2 k
k=0
Finally,
∞
X µ ¶ µ ¶
n p n p p + k/2 k k/2 p p+n n
[t ]f (t) = [t ] 2 t = 4 .
p + k/2 k p + n 2n
k=0
Again, this approach requires some clever considerations on the use of equation (2.2). A more
complex, but also more direct method is to proceed as in pthe previous example. By the conditions
for LIF applicability, we can exclude to set w = 1+2t+2 t(1 + t) since we would havep w(0) 6= 0.
Formally, we can try to apply the LIF if we are able to express f (t) = 1 + 2t + 2 t(1 + t) as a
simple function of w, for t = w/φ(w). More precisely, the idea is to determine two functions F
and φ such that w = tφ(w), φ(0) 6= 0, and f (t) = F (w(t)) so that:
³ ´p µ ¶
n
p n p 1 n−1 d
[t ] 1 + 2t + 2 t(1 + t) = [t ] [ F (w) | w = tφ(w)] = [w ] F (w) φ(w)n (4.1)
p
n dw
Let us formally set t = w/φ(w) in f (t); we have:
s µ ¶
w w w p
F (w) = 1 + 2 +2 1+ or φ(w)F (w) − φ(w) − 2w = 2 wφ(w) + w2
φ(w) φ(w) φ(w)
8
In 1826 the first issue of the Journal of reine und angewandte Mathematik, better known
as Journal de Crelle, was published. Five of the papers were written by Abel. In one of these
papers, he presented the following generalization of the binomial formula, as given by Riordan
[12, p. 18], which we prove by Theorem 2.3:
n µ ¶
X
n n
An = (x + y + an) = x (x + ka)k−1 (y + (n − k)a)n−k .
k
k=0
(x + y + an)n
An = .
n!
However, we wish to observe that we can directly apply rule K60 :
" ¯ #
e(x+y)w ¯ e(x+y)t ¡ at ¢n−1 at
n ¯ aw
[t ] ¯ w = te = e (e − ateat ) =
1 − aw ¯ 1 − at
9
transformations and solve a large number of combinatorial identities and sum inversions. Obvi-
ously, Riordan arrays are not a panacea, and just to give two negative examples, we can quote
Narayana and Eulerian triangles. Our reasoning starts from the following result: if (d(t), h(t))
is a Riordan array as above and (fk )k∈N is a sequence of numbers with generating function
G (fk ) = f (t), we have:
Xn
dn,k fk = [tn ]d(t)f (h(t)) (5.1)
k=0
In this sense, the Riordan array (d(t), h(t)) defines a transformation of the generating function
f (t). For example, by using the Pascal triangle we find:
n µ ¶
X µ ¶
n n 1 t
fk = [t ] f
k 1−t 1−t
k=0
is known with the pompous name of Govindarajulu and Suzuki identity in Gould’s collection [5,
(1.13)] and in Egorichev [2, p. 186]. Since k j is a polynomial in k of degree j, Newton’s rule for
the differences of a polynomial immediately implies:
n
X µ ¶ n
X µ ¶
k n j k n
(−1) k = 0, for j < n and (−1) k n = (−1)n n!.
k k
k=0 k=0
What happens when j > n? Flajolet and Sedgewick [13, p. 429] consider the generating function
of Stirling numbers of the second kind (et − 1)j and by expanding the power they find the
answer. Both these approaches require some sort of ingenuity or, if one prefers, they are ad hoc
solutions. So we wonder if a more straight-forward strategy exists to obtain the final result.
The strategy should be constructive and pertain to combinatorial algebra. Actually, the theory
of generating functions (and Riordan arrays) give a simple and general solution: we apply the
Euler transformation to the generating function (see [7, 7.46]):
j ½ ¾
X j k!(−t)k
G{(−1)k k j } = ;
k (1 + t)k+1
k=0
n µ ¶
X j ½ ¾ j ½ ¾ ½ ¾
n k j n 1 X j k!(−t)k k+1 n
X j k k j
(−1) k = [t ] k
(1−t) = [t ] k!(−1) t = (−1)n n!,
k 1−t k (1 − t) k n
k=0 k=0 k=0
10
m µ
X ¶ ³ ´
n + ak
fk = [tm ](1 + t)n f t−b (1 + t)a , b<0 (5.3)
m + bk
k=0
In this case, we can prove the identity by showing that the two members are just the same
coefficient of the same generating function. We apply formula (5.3) to the generating function
[x,z] ¡ ¢
of Sk = x+kz k (see formula (2.3)):
n µ
X ¶µ ¶ ·· ¯ ¸¯ ¸
y − kz x + kz n y (1 + w)x+1 ¯¯ ¯
z ¯ t
= [t ](1 + t) w = u(1 + w) ¯u =
n−k k 1 − (z − 1)w ¯ (1 + t)z
k=0
and this proves that the two sums are equal, as desired.
11
Identity (3.110) in Gould’s collection is rather unusual in its conclusion:
Xn µ ¶µ ¶ µ ¶
2k 2n − k k n −1/4
S= = (−4) .
k n 2k (2n − k) n
k=0
We begin by rewriting the left hand member in order to eliminate k/(2n − k):
Xn µ µ ¶ µ ¶¶ µ ¶
2n − k − 1 2n − k 2k 1
S= 2 − .
n−1 n k 2k
k=0
¡ ¢ k √
The generating function of 2kk /2 is obviously 1/ 1 − 2t and therefore we can apply the trans-
formation (5.2) above:
µ ¶· ¯ ¸
2n−1 tn−1 2n tn 1 ¯
¯
S = 2[t ] − [t ] √ u=t .
(1 − t)n (1 − t)n+1 1 − 2u ¯
The substitution is rather easy, and we have:
√
n 1 − 2t 1 n 1 − 2t
S = [t ] n+1
·√ = [t ] .
(1 − t) 1 − 2t (1 − t)n+1
Here we apply the diagonalization with φ(t) = 1/(1 − t), i.e., 1 − tφ0 (w) = (1 − 2w)/(1 − w) :
·√ ¯ ¸ · ¯ √ ¸
n 1 − 2w 1 − w ¯¯ t n 1 ¯
¯w = 1 − 1 − 4t
S = [t ] w= = [t ] √ =
1 − w 1 − 2w ¯ 1−w 1 − 2w ¯ 2
µ ¶
n 1 n −1/4
= [t ] √ = [t ](1 − 4t)−1/4
= (−4)n .
4
1 − 4t n
We conclude by showing how Riordan arrays and generating functions allow us to solve
problems related to Abel identities. Let us consider identity (1.118) in [5], but the proof of the
others can follow the same lines2 :
Xn µ ¶
n (yk)n−k xn
S= (x − yk)k = .
k k n
k=0
We observe that the first factor is related to the Riordan array (1 + yt, teyt ) :
µ ¶
(yk)n−k (yk)n−k−1 1 (yk)n−k (yk)n−k−1 1
=y· = +y· = [tn−k ](1 + yt)eykt .
k(n − k)! (n − k)! n (n − k)! (n − k − 1)! n
The generating function of the second term corresponds to formula (2.7) with a = x and q = −y :
µ ¶ · xw ¯ ¸
(x − yk)k e ¯
¯ −yw
G = w = te .
k! 1 + yw ¯
Therefore, Abel identity reduces to a Riordan array transformation:
· · xw ¯ ¸¯ ¸
n! n e ¯
¯ −yw ¯
¯ yt n! n ext xn
S = (1 + yt)[t ] w = ue u = te = [t ](1 + yt) · = ;
n 1 + yw ¯ ¯ n 1 + yt n
in fact, we observe that w = teyt e−yw implies w = t.
2
As observed by a referee, the “y” in the formula is redundant; however, this is the form given in [5].
12
6 Inverting combinatorial identities
The use of Riordan arrays in proving identities related to sum inversion can be illustrated by a
simple application involving the Pascal triangle. Let us suppose we have an identity:
Xn µ ¶
n
bn = ak (6.1)
k
k=0
and wish to invert it, that is to find an expression relating an to the bk ’s; in other words, if the
sequence (bk )k∈N is given and the sequence (ak )k∈N is unknown, we wish to solve the infinite
system (6.1). By Euler transformation we know:
µ ¶ µ ¶
n 1 t 1 t
bn = [t ] a or b(t) = a .
1−t 1−t 1−t 1−t
This is a classical example, but we can go on to more sophisticated cases. Suppose we have:
X µµrn + p¶ µ
rn + p
¶¶
an = − (qr − 1) bn−qk
k k−1
k
and we wish to find the inverse sum, relating the bn ’s to the ak ’s. Since bn−qk = [tn−qk ]b(t) =
[tn ]b(t)tqk , we can imagine that bn−qk be the generic element of the Riordan array (b(t), tq−1 )
and use it as a transformation. Since the generating functions for the two terms in the right
hand member are obvious, we find:
an = [tn ]b(t)(1 + tq )rn+p − (qr − 1)[tn ]b(t)tq (1 + tq )rn+p = [tn ]b(t)(1 − (qr − 1)tq )(1 + tq )rn+p .
We wish to find a relation between generating functions, and because of the exponent n in
the right hand member, we should apply diagonalization:
· ¸
b(w)(1 − qrwq + wq )(1 + wq )p+1 ¯¯ q r
a(t) = ¯ w = t(1 + w ) ;
1 − qrwq + wq
13
The indeterminate t disappears and we recognize the transformation related to the Riordan
array: ((1 + wq )−p−1 , w(1 + wq )−r ) whose generic element is:
µ ¶ µ ¶
1 −p − 1 − rk (pq + n + (qr − 1)k)/q
dn,k = [wn−k ] = = (−1)(n−k)/q .
(1 + wq )p+1+rk (n − k)/q (n − k)/q
Therefore, we conclude by setting n − k = qh, since a binomial coefficient is zero when its
“denominator” is not an integer:
X µp + rn − (rq − 1)h¶
bn = (−1)h an−qh .
h
h
When q = r = 1 we find the inverse relations:
X µp + n¶ X µp + n¶
an = bn−k ⇔ bn = (−1)k an−k ,
k k
k k
a variant of (6.1). When q = 1 and r = 2 we have:
X µµ2n + p¶ µ2n + p¶¶ X µ2n + p − k ¶
an = − bn−k ⇔ bn = (−1)k an−k .
k k−1 k
k k
When q = 2 and r = 1 we obtain the inverse relations:
X µµn + p¶ µn + p¶¶ X µn + p − k ¶
an = − bn−2k ⇔ bn = (−1)k an−2k .
k k−1 k
k k
When q = r = 2 we find inversion (2.5.6) in Riordan’s book [12].
We conclude with an inversion of Abel’s type, which is better proved
P by using exponen-
a(t) we denote the formal power series k ak tk /k!, the ordinary
tial generating functions: by b
generating function of the sequence (ak /k!)k∈N . Let us suppose we are given the sum:
X µn¶ an X (x + k)n−k bk
an = (x + k)n−k bk that is = ·
k n! (n − k)! k!
k k
where the first factor in the right hand member is the generic element of the Riordan array
(ext , tet ). In fact we have:
(x + k)n−k
dn,k = [tn−k ]ext ekt = [tn−k ]e(x+k)t = .
(n − k)!
Therefore,
h we find ¯ ba(t) = eixtbb(tet ) or bb(tet ) = e−xt b
a(t). By setting y = tet or t = ye−t , we have
bb(y) = e−xt b ¯
a(t) ¯ t = ye−t . By using Theorem K60 we have:
bn ¡ ¢
= [tn ]e−xt b
a(t)e−(n−1)t e−t + te−t = [tn ](1 + t)e−(x+n)t b
a(t) =
n!
X (−1)n−k (x + n)n−k ak X (−1)n−k−1 (x + n)n−k−1 ak
= · + · =
(n − k)! k! (n − k − 1)! k!
k k
X (x + n)n−k−1 ak
= (−1)n−k · (x + k) · .
(n − k)! k!
k
Finally, by multiplying everything by n!:
X µn¶
bn = (−1)n−k (x + n)n−k−1 (x + k)ak .
k
k
This is inversion (3.1.3) in Riordan’s book [12].
14
Acknowledgment
We wish to thank the anonymous referee for the very useful and pertinent comments, in particu-
lar, for suggesting to point out the special applications of the LIF corresponding to Theorems 2.1
and 2.2.
References
[1] L. de Lagrange. Nouvelle méthode pour résoudre des équations littérales par le moyen des
séries. Mém. Acad. Roy. Sci. Belles-Lettres de Berlin, 24, 1770.
[3] I. M. Gessel. A factorization for formal Laurent series and lattice path enumeration. Journal
of Combinatorial Theory, Series A, 28:321–337, 1980.
[5] H.W. Gould. Combinatorial Identities, A Standardized Set of Tables Listing 500 Binomial
Coefficient Summations. Morgantown W. Va., 1972.
[6] I. P. Goulden and D. M. Jackson. Combinatorial Enumeration. Wiley, New York, 1983.
[8] P. Henrici. Applied and Computational Complex Analysis, I. Wiley, New York, 1988.
[9] D. Merlini, R. Sprugnoli, and M. C. Verri. The method of coefficients. Am. Math. Monthly.
to appear.
[10] D. Merlini, R. Sprugnoli, and M. C. Verri. Human and constructive proof of combinato-
rial identities: an example from Romik. Discrete Mathematics and Theoretical Computer
Science, AD:383–392, 2005.
[11] G. N. Raney. Functional composition patterns and power series reversion. Trans. Amer.
Math. Soc., 94:441–451, 1960.
[14] L. W. Shapiro, S. Getu, W.-J. Woan, and L. Woodson. The Riordan group. Discrete Appl.
Math., 34:229–239, 1991.
[17] R. Sprugnoli. Riordan arrays and combinatorial sums. Discrete Math., 132:267–290, 1994.
15
[18] R. P. Stanley. Enumerative Combinatorics, volume 2. Cambridge University Press, Cam-
bridge, 1999.
16