0% found this document useful (0 votes)
117 views17 pages

Lagrange Inversion When and How

This document summarizes a research article that examines when and how to apply the Lagrange Inversion Formula to solve various combinatorial problems. Specifically, the formula can be used to: (1) find the generating functions of combinatorial sequences; (2) extract the coefficients of a formal power series; and (3) compute combinatorial sums and invert combinatorial identities. The document outlines some theorems related to simplified forms of the Lagrange Inversion Formula and provides examples of its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views17 pages

Lagrange Inversion When and How

This document summarizes a research article that examines when and how to apply the Lagrange Inversion Formula to solve various combinatorial problems. Specifically, the formula can be used to: (1) find the generating functions of combinatorial sequences; (2) extract the coefficients of a formal power series; and (3) compute combinatorial sums and invert combinatorial identities. The document outlines some theorems related to simplified forms of the Lagrange Inversion Formula and provides examples of its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/226195157

Lagrange Inversion: When and How

Article  in  Acta Applicandae Mathematicae · January 2006


DOI: 10.1007/s10440-006-9077-7

CITATIONS READS
70 2,173

3 authors:

Donatella Merlini Renzo Sprugnoli


University of Florence University of Florence
74 PUBLICATIONS   1,123 CITATIONS    111 PUBLICATIONS   1,999 CITATIONS   

SEE PROFILE SEE PROFILE

M. Cecilia Verri
University of Florence
49 PUBLICATIONS   975 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

First book on Riordan arrays View project

All content following this page was uploaded by Renzo Sprugnoli on 02 June 2014.

The user has requested enhancement of the downloaded file.


Lagrange Inversion: when and how
D. Merlini, R. Sprugnoli, M. C. Verri

Dipartimento di Sistemi e Informatica


viale Morgagni 65, 50134, Firenze, Italia
[merlini,sprugnoli,verri]@dsi.unifi.it

Abstract
The aim of the present paper is to show how the Lagrange Inversion Formula (LIF) can
be applied in a straight-forward way i) to find the generating function of many combinatorial
sequences, ii) to extract the coefficients of a formal power series, iii) to compute combinatorial
sums, and iv) to perform the inversion of combinatorial identities. Particular forms of the
LIF are studied, in order to simplify the computation steps. Some examples are taken from
the literature, but their proof is different from the usual, and others are new.

Keywords: Combinatorial sums, generating functions, Lagrange Inversion Formula, method


of coefficients, Riordan arrays.

AMS mathematical subject classification: 05A10, 05A15, 05A19.

1 Introduction
The “method of coefficients” is an elegant technique for proving combinatorial identities, eval-
uating and inverting sums, essentially due to Egorychev [2] (see also [9]). It mainly consists in
manipulating generating functions and their coefficients (see e.g., [6]), and we can summarize
its most relevant aspects in the following three points which can overlap each other:

1. given a sequence (fn )n∈N of combinatorial interest, defined by a formula


P∞ or by a recurrence
relation, find its generating function Gt (fn )n∈N = G (fn ) = k=0 fn tn = f (t);
P k n n
2. given a formal power series f (t) = ∞ k=0 fk t , extract the coefficient of t : [t ] f (t) = fn
as an explicit expression;
P
3. given a combinatorial identity such as a sum: bn = nk=0 dn,k ak , find the transformation
T connecting the two generating functions b(t) = G(bn ) and a(t) = G(an ) and expressing
the identity as b(t) = T (a(t)). This approach can solve two important problems:

(a) if the ak ’s are known, by extracting the coefficient [tn ]b(t) = [tn ]T (a(t)) we have a
closed form for the sum of the right hand member;
(b) if the ak ’s (and hence a(t)) are not known, by inverting the identity we have
a(t) = T −1 (b(t)) and hence the solution of the identity, that is, of the infinite system
it represents (see, e.g., [12]).

1
The Lagrange Inversion Formula (LIF) assumes a central role in all these problems, and our aim
is to show how its systematic use can produce very elegant and straight-forward proofs. We take
for granted the Lagrange formula, which we use below in the equivalent forms K6, K60 and G6.
Moreover, we point out (see Theorems 2.1, 2.3 and Corollary 2.2) that many applications of the
LIF can be reduced to some particular cases which correspond to the generalized binomial and
generalized exponential series in [7].
In general, the LIF is related to the computation of the compositional inverse of a formal
power series and usually is given in this context; this approach often allows to solve the problem
of coefficient extraction. Since the application of the LIF requires the solution of an equation,
explicit forms of generating functions are only obtained when the equation can be actually
solved; however, as we will see, in many cases also an implicit form of the generating function
can be very useful, especially in finding the closed form of a sum and in inverting identities.
Many variants of the LIF are known, and some of them are suited for being used in connection
with the “method of coefficients”; Egorychev in [2] gives several different forms, which we have
reduced and formalized in K6, K60 and G6, but surely other approaches can be proposed. In
fact, the literature about Lagrange inversion is extensive, and the reader is referred to [6, 8, 18]
for proofs and applications, and to Stanley [18, p. 67] for more detailed and historical remarks.
The original proof of Lagrange [1] was essentially algebraic, and the first combinatorial proof
comes back to Raney [11] in 1960. We will use the LIF in its plain one variable version, but it
has been generalized to the multivariate case, for example by Gessel [4], and to q-analogues, as
Singer summarizes in [15]. Actually Gessel [3] extents the LIF and the q-LIF to non commutative
power series.
In this expository paper, we show a number of examples, some of which are taken from
the literature, but are proved in a different way. In particular, in Section 2 we introduce the
method of coefficients and prove some theorems related to the Lagrange inversion formula.
These theorems are used in Section 3 for finding some important generating functions and in
Section 4 for performing coefficient extraction. In the same section we present a technique
for transforming a formal power series in such a way that the LIF can become applicable; as
far as we know, this approach is new, and allows us to apply the LIF in non-trivial situations.
Finally, in Sections 5 and 6 we use Riordan arrays [14, 17] as an important example of generating
function transformations; these transformations are used to close or invert combinatorial sums
in connection with the formulas of Section 2.

2 The Lagrange Inversion Theorems


It is possible to specify some formal rules, which allow us to deduce, in a simple and “human”
way [10], many generating functions and to extract the coefficients from a number of formal
power series. For example, coefficient extraction can be performed by means of this set of rules:

K1. linearity [tn ] (αf (t) + βg(t)) = α[tn ]f (t) + β[tn ]g(t)
K2. shifting [tn ]tf (t) = [tn−1 ]f (t)
K3. differentiation [tn ]f 0 (t) = (n +
P1)[t
n+1 ]f (t)
¡ ¢¡ ¢
n
K4. convolution [t ]f (t)g(t) =P k=0¡ [tk ]f (t)¢ [tn−k ]g(t)
n

K5. composition [tn ]f (g(t)) = ∞ k n


k=0 [t ]f (t) [t ]g(t)
k

Properly speaking [tn ] is a functional [tn ] : F → R, where F is the set of formal power series over
R (the field of real numbers, but any field of 0-characteristic could be considered), defined by the
rule: [tn ]tk = δn,k . This functional is a sort of inverse for the operator G, acting on a sequence

2
of real numbers and producing the formal power series which is the generating function of the
sequence; formally, we have G ([tn ]f (t)) = f (t) and [tn ]G (fn ) = fn , whenever the “principle of
identity” is applicable: two formal power series f (t) and g(t) are equal if and only if fn = gn ,
for every n ∈ N. In this sense, the rule for G corresponding to the rules for [tn ] are:

G1. linearity G (αfn + βgn ) = αG (fn ) + βG (gn )


G2. shifting G (fn+1 ) = (G (fn ) − f0 ) /t
G3. differentiation G (nf
Pnn ) = tDt G (fn )
G4. convolution P∞ k=0 fk gn−kn ) = G (fn ) G (gn )
G (
G5. composition n=0 fn G (gn ) = G (fn ) ◦ G (gn )

These rules are very powerful, despite their simple appearance and their obvious meaning (see
also [7, Table 320]). However, they are not sufficient as soon as the concept of the compositional
inverse of a formal power series is introduced. If f (t) ∈ F, the compositional inverse f¯(t) ∈ F is
defined by the rule: f (f¯(t)) = f¯(f (t)) = t. It is possible to prove that f (t) has a compositional
inverse if and only if f (0) = 0 and f 0 (0) 6= 0. In order to deal with this situation, the Lagrange
Inversion Formula is appropriate.
Let us suppose that a formal power series w = w(t) is implicitly defined by a relation
w = tφ(w), where φ(t) is a formal power series such that φ(0) 6= 0. The Lagrange Inversion
Formula (LIF) states that:
k
[tn ]w(t)k = [tn−k ]φ(t)n . (2.1)
n
If we set f (t) = t/φ(t), we immediately have f (w(t)) = w/φ(w) = t, showing that w(t) is the
compositional inverse of f (t). Obviously, whenever φ(t) is “simpler” than w(t), the coefficient
extraction in the right hand member may be performed even if the coefficient extraction of the
left hand member seems to be impossible. Formula (2.1) can be given the equivalent form:

K6. inversion [tn ]F (w(t)) = n1 [tn−1 ]F 0 (t)φ(t)n .

Here, F (t) is any formal power series (actually, any formal Laurent series) and we have w = tφ(w)
as before. For F (t) = tk we find again formula (2.1). The generating function counterpart is
the following rule:
· ¯ ¸
n n F (w) ¯¯
G6. diagonalization G ([t ]F (t)φ(t) ) = w = tφ(w) .
1 − tφ0 (w) ¯
The notation [f (w)|w = g(t)] is a linearization of f (w)|w=g(t) and denotes the substitution of
g(t) to every occurrence of w in f (w) (that is, f (g(t))). In particular, w = tφ(w) is to be solved
in w = w(t) and w has to be substituted in the expression on the left of the | sign.
Formula K6 requires the evaluation of F 0 (t); sometimes this derivative is rather complex and
straight forward results can be obtained by using another version of the formula, which is proved
by using the diagonalization rule G6. If we replace F (t) with F (t)(1 − φ0 (t)/φ(t)) in G6, we
immediately get:

K60 . inversion [tn ]F (w(t)) = [tn ]F (t)φ(t)n−1 (φ(t) − tφ0 (t)),


a formula involving φ0 (t) instead of F 0 (t).
The following power series will be used throughout the paper:
X∞ µ ¶
r r k
- the binomial series: (1 + t) = t , r ∈ R;
k
k=0

3

X
t 1 k
- the exponential series: e = exp(t) = t .
k!
k=0

By rule K5 we have the more general formula (known as Newton’s rule):


∞ µ ¶
X µ ¶
r r n n n r r n
(1 + αt) = α t or, equivalently, [t ](1 + αt) = α .
n n
n=0
¡ ¢ ¡r+n−1¢
In the sequel we also use the well-known property of binomial coefficients: −r
n = n (−1)n .
Furthermore, some consequences of the diagonalization rule will play an important role in
our developments; in fact, let us prove the following theorems (see [7, p. 200-204]).

Theorem 2.1 Let us consider a, q ∈ R; then we have the implicit generating functions:
µ µ ¶¶
a a + qk
G = [ (1 + w)a | w = t(1 + w)q ] ; (2.2)
a + qk k
µµ ¶¶ · ¯ ¸
a + qk (1 + w)a+1 ¯¯ q
G = w = t(1 + w) . (2.3)
k 1 − (q − 1)w ¯

Proof: For formula (2.2) we find:


µ µ ¶¶ µ µ ¶¶ µµ ¶ µ ¶¶
a a + qk a + qk − qk a + qk a + qk a + qk − 1
G =G =G −q =
a + qk k a + qk k k k−1
³ ´ ³ ´
= G [tk ](1 + t)a+qk − q[tk−1 ](1 + t)a+qk−1 = G [tk ](1 − (q − 1)t)(1 + t)a+qk−1

This form is suitable for the LIF when we set φ(t) = (1 + t)q ; actually we have:
µ µ ¶¶ · ¯ ¸
a a + qk (1 − (q − 1)w)(1 + w)a−1 ¯¯ q a q
G = ¯ w = t(1 + w) = [ (1 + w) | w = t(1 + w) ]
a + qk k 1 − tq(1 + w)q−1

since the (1 − (q − 1)w) simplifies when we substitute t = w/(1 + w)q .


For formula (2.3) we find:
µµ ¶¶ ³ ´ · ¯ ¸
a + qk k a+qk (1 + w)a ¯
¯ q
G = G [t ](1 + t) = w = t(1 + w) =
k 1 − tq(1 + w)q−1 ¯
· ¯ ¸
(1 + w)a+1 ¯¯ q
= w = t(1 + w) .
1 − (q − 1)w ¯

When q = 2, the equation w = t(1 + w)q can be solved explicitly, and we find a relation with
the Catalan numbers. In fact, we have:

1 − 1 − 4t
1+w = = C(t)
2t
which is the well-known Catalan number generating function. Therefore we can state the fol-
lowing:

4
Corollary 2.2 Let us consider a ∈ R; then we have the explicit generating functions:
µ µ ¶¶
a a + 2k
G = C(t)a ; (2.4)
a + 2k k
µµ ¶¶
a + 2k C(t)a
G =√ . (2.5)
k 1 − 4t
Analogous results can be obtained from the exponential function:

Theorem 2.3 Let us consider a, q ∈ R; then we have the implicit generating functions:
µ ¶
a(a + qk)k−1
G = [ eaw | w = teqw ] ; (2.6)
k!
µ ¶ · aw ¯ ¸
(a + qk)k e ¯
¯ qw
G = w = te . (2.7)
k! 1 − qw ¯

Proof: For the first formula we find:


a(a + qk)k−1 (a + qk)k (a + qk)k−1
= −q = [tk ]e(a+qk)t − q[tk−1 ]e(a+qk)t =
k! k! (k − 1)!
· ¯ ¸
k at qkt k (1 − qw)eaw ¯¯ qw
= [t ](1 − qt)e e = [t ] w = te = [tk ] [ eaw | w = teqw ] .
1 − qwe−qw eqw ¯
For the second formula we have:
· ¯ ¸ · aw ¯ ¸
(a + qk)k k (a+qk)t k eaw ¯
¯ qw e ¯
¯ qw
= [t ]e = [t ] w = te = w = te .
k! 1 − qwe−qw eqw ¯ 1 − qw ¯

3 Finding generating functions


Rules G1−G5 constitute a practical basis for finding the generating function of many sequences.
For example, let us consider (an )n∈N and suppose we do not know anything about the geometric
series. If we set fn = an , we obviously have fn+1 = afn , which is valid for every n ∈ N (principle
of identity); therefore in terms of generating functions we find: G (fn+1 ) = aG (fn ) (linearity).
Let us set F (t) = G (fn ) for simplicity sake; by the shifting rule we have:

F (t) − f0 1
= aF (t) or F (t) − 1 = atF (t) so that F (t) = G (an ) = .
t 1 − at
In a similar way, it is immediate to find the generating functions of a great number of combina-
torial sequences, as Fibonacci, Catalan and Bell numbers.
As a simple example of applying equation (2.3) in the case q = 1, we wish to show that
µµ ¶¶
p+k tm−p
G = (m ≥ p).
m (1 − t)m+1

5
In fact by setting p − m + k = h we have:
µµ ¶¶ X∞ µ ¶ ∞
X µ ¶
p+k p+k k m + h m−p+h
G = t = t =
m p+k−m h
k=0 h=p−m

X∞ µ ¶
m+h h £ ¯ ¤ tm−p
= tm−p t = tm−p (1 + w)m+1 ¯ w = t(1 + w) = .
h (1 − t)m+1
h=0
³¡ ¢´
2k
A more complex example is given by the sequence k−r , where r ∈ Z is a parameter:
k∈N
µµ ¶¶ ³ ´ ³ ´
2k
G = G [tk−r ](1 + t)2k = G [tk ]tr (1 + t)2k
k−r

Again, we have a sequence defined by diagonalization, and therefore we find


µµ ¶¶ · ¯ ¸
2k wr ¯
¯ 2
G = w = t(1 + w) .
k−r 1 − 2t(1 + w) ¯

As in the previous case, we substitute for t its expression w/(1 + w)2 and find an explicit
value for w = w(t). This requires a bit of attention; the second degree equation we obtain is
tw2 − (1 − 2t)w + t = 0, and therefore we can explicitly find an expression for w = w(t):

1 − 2t ± 1 − 4t
w=
2t
As we observed before, we are interested in the solution w = w(t) such that w(0) = 0; this
implies that we should choose
√ the sign
√ − in the expression for w = w(t). Now we have:
1 − 2t(1 + w) = 1 − (1 − 1 − 4t) = 1 − 4t and therefore we find the generating function:
µµ ¶¶ µ √ ¶r
2k 1 1 − 2t − 1 − 4t
G =√ . (3.1)
k−r 1 − 4t 2t

For r = 0, we obtain the well-known


√ generating function for central binomial coefficients. We
can now observe that (1 − 2t − 1 − 4t)/(2t) = C(t) − 1 = tC(t)2 , and therefore, formula (3.1)
can be checked by setting a = 2r in formula (2.5); in fact we have:
r 2r 2r
µ ¶
k t C(t) k−r C(t) 2k
[t ] √ = [t ] √ = .
1 − 4t 1 − 4t k−r

In this application of the LIF, an unpleasant aspect is the fact that we have to solve an
equation, and this equation can be rather complex. If it is an algebraic equation of first or
second degree, as in the two previous examples, there is no problem and the substitution can
be performed easily. However, the equation can have any degree, or can be not algebraic, and
in that case the LIF can only give us an implicit expression. Notwithstanding this drawback,
there can be situations, in which an implicit expression can be useful as an explicit one. Let us
consider the following identity:
n
X µ ¶µ ¶ µ ¶
a a + qk qn − qk a + qn
Sn[a,q] = = .
a + qk k n−k n
k=0

6
The sum is clearly a convolution and by rule G4 we only need to determine the generating
functions of the two factors. By Theorem 2.1 we have:
µ µ ¶¶
a a + qk
Fa,q (t) = G = [ (1 + w)a | w = t(1 + w)q ] ,
a + qk k
µµ ¶¶ · ¯ ¸
qk 1+w ¯ q
Gq (t) = G = ¯ w = t(1 + w) .
k 1 − (q − 1)w ¯
At this point we can perform the convolution, take advantage from the fact that the two sub-
stitutions are the same and finally apply equation (2.3) from right to left:
· ¯ ¸ µ ¶
[a,q] n n (1 + w)a+1 ¯¯ q a + qn
Sn = [t ]Fa,q (t)Gq (t) = [t ] w = t(1 + w) = .
1 − (q − 1)w ¯ n

4 Performing coefficient extraction


Let us consider identity (3.164) in Gould’s collection of combinatorial identities [5]:
n
X µ ¶µ ¶ µµ ¶ µ ¶¶ µ ¶
k n k/2 2n 2m − n − 1 2m − n − 1 n2n 2m − n − 1
(−1) = − = .
k m (−4)m m−1 m m(−4)m m−n
k=0

By applying Newton’s rule, for the left hand member we have:


n
X µ ¶µ ¶ Xn µ ¶
k n k/2 k n
√ k √
S= (−1) = (−1) [tm ] 1 + t = [tm ](1 − 1 + t)n .
k m k
k=0 k=0

A direct √
extraction of the coefficient is not feasible, but we can use formula (2.4) if we observe
that 1 − 1 + t = −t/2C(−t/4). In fact we have:
µ ¶n µ ¶n
√ t 1
m n m
[t ](1 − 1 + t) = [t ] − C(−t/4) = − [tm−n ] (C(−t/4))n =
2 2
µ ¶n X∞ µ ¶ µ ¶k
1 m−n n n + 2k t
= − [t ] − =
2 n + 2k k 4
k=0
µ ¶n µ ¶ µ ¶m−n µ ¶
1 n 2m − n 1 n2n 2m − n − 1
= − − = .
2 2m − n m − n 4 m(−4)m m−n
It can be instructive, however, to see how the LIF can be applied
√ directly, without
√ referring
to the particular case of Theorem 2.1. If we set w = w(t) = 1 − 1 + t, we have 1 + t = 1 − w
or 1 + t = 1 − 2w + w2 , which is equivalent to w = t/(w − 2). This result suggests setting
φ(w) = 1/(w − 2), so that:

n m−n 1 n (−1)m
S = [tm ]w(t)n = [w ] = [w m−n
] =
m (w − 2)m m2m (1 − w/2)m
µ ¶ µ ¶
n(−1)m m−n 1 n(−1)m −m (−1)m+n n2n (−1)m 2m − n − 1
= [w ] = = .
m2m (1 − w/2)m m2m m−n 2m−n m4m m−n

The previous example is rather simple, because by setting w = 1 − 1 + t we directly arrive
to a manageable form for φ(t). This is not always the case, as one can easily imagine. Let us

7
³ p ´p
consider the following example: [tn ] 1 + 2t + 2 t(1 + t) which arises in the solution of some
combinatorial identities (see Section 5). This coefficient can be computed by √using equation
(2.2) with a = p and q√= 1/2. In fact, if w = t(1 + w)1/2 then w = t(t + 4 + t2 )/2 and
1 + w = 1 + t2 /2 + (t/2) 4 + t2 = f (t2 /4), hence we have:

X µ ¶
n 2 p n p p p + k/2 k
[t ]f (t /4) = [t ](1 + w) = t .
p + k/2 k
k=0

Finally,

X µ ¶ µ ¶
n p n p p + k/2 k k/2 p p+n n
[t ]f (t) = [t ] 2 t = 4 .
p + k/2 k p + n 2n
k=0
Again, this approach requires some clever considerations on the use of equation (2.2). A more
complex, but also more direct method is to proceed as in pthe previous example. By the conditions
for LIF applicability, we can exclude to set w = 1+2t+2 t(1 + t) since we would havep w(0) 6= 0.
Formally, we can try to apply the LIF if we are able to express f (t) = 1 + 2t + 2 t(1 + t) as a
simple function of w, for t = w/φ(w). More precisely, the idea is to determine two functions F
and φ such that w = tφ(w), φ(0) 6= 0, and f (t) = F (w(t)) so that:
³ ´p µ ¶
n
p n p 1 n−1 d
[t ] 1 + 2t + 2 t(1 + t) = [t ] [ F (w) | w = tφ(w)] = [w ] F (w) φ(w)n (4.1)
p
n dw
Let us formally set t = w/φ(w) in f (t); we have:
s µ ¶
w w w p
F (w) = 1 + 2 +2 1+ or φ(w)F (w) − φ(w) − 2w = 2 wφ(w) + w2
φ(w) φ(w) φ(w)

and simplifying we obtain:


4wF (w)
φ(w) = . (4.2)
(1 − F (w))2
In order to be able to extract the coefficient (4.1) we would like a simple relation between F (w)
and φ(w), possibly φ(w) = F (w), φ(w) = 1 − F (w) or something like that. Fortunately, in the
right hand side of (4.2) we recognize the factors F (w), 1/(1 − F (w)) and 1/(1 − F (w))2 and if
φ(w) were one of these factors, we would obtain an equation in the only unknown F (w). In fact,
F (0) = 1 and since we must have φ(w) 6= 0, the only possibility among the three is to choose
φ(w) = F (w); so we have:
4w √
1= or F (w) = φ(w) = 1 ± 2 w.
(1 − F (w))2

Finally, by considering the plus sign, we obtain1 :


µ ¶ µ ¶
1 n−1 d p n 1 n−1 d √ p √
[w ] F (w) φ(w) = [w ] (1 + 2 w) (1 + 2 w)n =
n dw n dw
√ n+p−1 µ ¶ µ ¶
p n−1 (1 + 2 w) p 2n−1 n+p−1 p n + p − 1 2n−1 p p+n n
[w ] √ = [z ](1 + 2z) = 2 = 4 .
n w n n 2n − 1 p + n 2n
1
series√in the indeterminate t, or t1/2 , such as

√In this
P∞ case, as√ in many others, we consider formal power
f ( t) = k=0 fk ( t)k . Obviously, the main property of t is that ( t)2 = t. Since no convergence √

problem
√ is
considered, this is a legitimate procedure. In general, other indeterminates can be considered such as 3 t, 4 t and
even ln(t).

8
In 1826 the first issue of the Journal of reine und angewandte Mathematik, better known
as Journal de Crelle, was published. Five of the papers were written by Abel. In one of these
papers, he presented the following generalization of the binomial formula, as given by Riordan
[12, p. 18], which we prove by Theorem 2.3:
n µ ¶
X
n n
An = (x + y + an) = x (x + ka)k−1 (y + (n − k)a)n−k .
k
k=0

This identity can be written:


n
(x + y + an)n X x(x + ka)k−1 (y + (n − k)a)n−k
=
n! k! (n − k)!
k=0

and it is clearly the convolution of the generating functions:


µ ¶ µ ¶ · yw ¯ ¸
x(x + ak)k−1 xw aw (y + ak)k e ¯
¯ aw
G = [ e | w = te ] , G = w = te .
k! k! 1 − aw ¯

By performing the convolution we obtain:


·
yw ¯
¯ ¸ " (x+y)w ¯¯ #
n xw aw e ¯ w = teaw e ¯ aw
An = [t ] [ e | w = te ] = ¯ w = te .
1 − aw ¯ 1 − aw ¯

and by applying backwards formula (2.7) we finally find:

(x + y + an)n
An = .
n!
However, we wish to observe that we can directly apply rule K60 :
" ¯ #
e(x+y)w ¯ e(x+y)t ¡ at ¢n−1 at
n ¯ aw
[t ] ¯ w = te = e (e − ateat ) =
1 − aw ¯ 1 − at

e(x+y)t atn (x + y + an)n


= [tn ] e (1 − at) = .
1 − at n!

5 Computing combinatorial sums


The rules of multiplication, differentiation, shifting and convolution are just examples of trans-
formations of generating functions. As we shall see, combinatorial identities (among which an
important role is reserved to sum inversions) are closely related to generating function trans-
formations and to Lagrange inversion formula. In our opinion, the most important examples of
transformations are induced by the concept of Riordan arrays, as introduced by Shapiro et al.
[14] and used by Sprugnoli [17].
A (proper) Riordan array is a pair of formal power series (d(t), h(t)), d(0) 6= 0, h(0) = 0,
h (0) 6= 0, which defines an infinite, lower triangular array dn,k = [tn ]d(t)h(t)k . The simplest
0
¡ ¢
example is the Pascal triangle P = (1/(1 − t), t/(1 − t)) whose generic element is dn,k = nk .
However, other important triangles, as Catalan, Motzkin and Schröder, are Riordan arrays and
the Stirling numbers of both kinds are related to two Riordan arrays. As we shall see, a great va-
riety of binomial coefficients constitute Riordan arrays and this will allow us to define important

9
transformations and solve a large number of combinatorial identities and sum inversions. Obvi-
ously, Riordan arrays are not a panacea, and just to give two negative examples, we can quote
Narayana and Eulerian triangles. Our reasoning starts from the following result: if (d(t), h(t))
is a Riordan array as above and (fk )k∈N is a sequence of numbers with generating function
G (fk ) = f (t), we have:
Xn
dn,k fk = [tn ]d(t)f (h(t)) (5.1)
k=0

In this sense, the Riordan array (d(t), h(t)) defines a transformation of the generating function
f (t). For example, by using the Pascal triangle we find:
n µ ¶
X µ ¶
n n 1 t
fk = [t ] f
k 1−t 1−t
k=0

and this is called Euler transformation (see, Riordan [12]).


Let us consider a simple, but meaningful example; the relation
n
X µ ¶ ½ ¾
k n j j
(−1) k = (−1)n n!
k n
k=0

is known with the pompous name of Govindarajulu and Suzuki identity in Gould’s collection [5,
(1.13)] and in Egorichev [2, p. 186]. Since k j is a polynomial in k of degree j, Newton’s rule for
the differences of a polynomial immediately implies:
n
X µ ¶ n
X µ ¶
k n j k n
(−1) k = 0, for j < n and (−1) k n = (−1)n n!.
k k
k=0 k=0

What happens when j > n? Flajolet and Sedgewick [13, p. 429] consider the generating function
of Stirling numbers of the second kind (et − 1)j and by expanding the power they find the
answer. Both these approaches require some sort of ingenuity or, if one prefers, they are ad hoc
solutions. So we wonder if a more straight-forward strategy exists to obtain the final result.
The strategy should be constructive and pertain to combinatorial algebra. Actually, the theory
of generating functions (and Riordan arrays) give a simple and general solution: we apply the
Euler transformation to the generating function (see [7, 7.46]):
j ½ ¾
X j k!(−t)k
G{(−1)k k j } = ;
k (1 + t)k+1
k=0

n µ ¶
X j ½ ¾ j ½ ¾ ½ ¾
n k j n 1 X j k!(−t)k k+1 n
X j k k j
(−1) k = [t ] k
(1−t) = [t ] k!(−1) t = (−1)n n!,
k 1−t k (1 − t) k n
k=0 k=0 k=0

since, as we know, [tn ]tk = δn,k by definition.


In [17], Sprugnoli shows how the concept of Riordan arrays can be used to prove combinatorial
identities involving binomial coefficients and Stirling numbers of both kinds. In particular, he
proves the following two transformations:
n µ
X ¶ µ b−a ¶
n + ak n tm t
fk = [t ] m+1
f , b>a (5.2)
m + bk (1 − t) (1 − t)b
k=0

10
m µ
X ¶ ³ ´
n + ak
fk = [tm ](1 + t)n f t−b (1 + t)a , b<0 (5.3)
m + bk
k=0

provided m + bk ≥ 0 in both equations and n + ak ≥ 0 in (5.2).


The previous examples on the Euler transformation is indicative, but let us give some other
examples. We take them from Gould’s collection [5], where more than 90% of identities in
Chapters 1 and 3 can be proved by the two transformations above (see Sprugnoli [16]). Identity
(3.26) is:
X n µ ¶µ ¶ µ ¶
2x x − k x x+n n
S= = 4 .
2k n−k x + n 2n
k=0
¡ ¢
The generating function of the first factor 2x 2x
2k can be found by applying the bisection to (1+t) ;
this generating function is then transformed according to the second factor and to rule (5.3)
above. Thus we have:
n µ ¶µ ¶ · √ √ ¸
X x−k 2x (1 + u)2x + (1 − u)2x ¯¯ t
S= = [tn ](1 + t)x ¯ u = =
n−k 2k 2 1+t
k=0
³ p ´x ³ p ´x
1 + 2t + 2 t(1 + t) + 1 + 2t − 2 t(1 + t)
= [tn ]
2
³ p ´x
We start with [tn ] 1 + 2t + 2 t(1 + t) , calculated in the previous section. It is easily seen
³ p ´x
that 1 + 2t − 2 t(1 + t) gives an analogous result, so that we obtain the desired formula
using linearity.
The identity (3.144) of Gould’s collection is ascribed to Jensen (1902), and is an example of
a non-closed formula:
Xn µ ¶µ ¶ X n µ ¶
y − kz x + kz x+y−k k
S= = z .
n−k k n−k
k=0 k=0

In this case, we can prove the identity by showing that the two members are just the same
coefficient of the same generating function. We apply formula (5.3) to the generating function
[x,z] ¡ ¢
of Sk = x+kz k (see formula (2.3)):
n µ
X ¶µ ¶ ·· ¯ ¸¯ ¸
y − kz x + kz n y (1 + w)x+1 ¯¯ ¯
z ¯ t
= [t ](1 + t) w = u(1 + w) ¯u =
n−k k 1 − (z − 1)w ¯ (1 + t)z
k=0

where we have a substitution in a substitution, which however simplifies to w = t. We therefore


conclude:
(1 + t)x+y+1
S = [tn ] .
1 − (z − 1)t
On the other hand, for the right hand member we apply rule (5.3) again and obtain:
n µ
X ¶ · ¯ ¸ x+y+1
x+y−k k n x+y 1 ¯¯ t n (1 + t)
z = [t ](1 + t) u = = [t ]
n−k 1 − zu ¯ 1+t 1 − (z − 1)t
k=0

and this proves that the two sums are equal, as desired.

11
Identity (3.110) in Gould’s collection is rather unusual in its conclusion:
Xn µ ¶µ ¶ µ ¶
2k 2n − k k n −1/4
S= = (−4) .
k n 2k (2n − k) n
k=0

We begin by rewriting the left hand member in order to eliminate k/(2n − k):
Xn µ µ ¶ µ ¶¶ µ ¶
2n − k − 1 2n − k 2k 1
S= 2 − .
n−1 n k 2k
k=0
¡ ¢ k √
The generating function of 2kk /2 is obviously 1/ 1 − 2t and therefore we can apply the trans-
formation (5.2) above:
µ ¶· ¯ ¸
2n−1 tn−1 2n tn 1 ¯
¯
S = 2[t ] − [t ] √ u=t .
(1 − t)n (1 − t)n+1 1 − 2u ¯
The substitution is rather easy, and we have:

n 1 − 2t 1 n 1 − 2t
S = [t ] n+1
·√ = [t ] .
(1 − t) 1 − 2t (1 − t)n+1
Here we apply the diagonalization with φ(t) = 1/(1 − t), i.e., 1 − tφ0 (w) = (1 − 2w)/(1 − w) :
·√ ¯ ¸ · ¯ √ ¸
n 1 − 2w 1 − w ¯¯ t n 1 ¯
¯w = 1 − 1 − 4t
S = [t ] w= = [t ] √ =
1 − w 1 − 2w ¯ 1−w 1 − 2w ¯ 2
µ ¶
n 1 n −1/4
= [t ] √ = [t ](1 − 4t)−1/4
= (−4)n .
4
1 − 4t n
We conclude by showing how Riordan arrays and generating functions allow us to solve
problems related to Abel identities. Let us consider identity (1.118) in [5], but the proof of the
others can follow the same lines2 :
Xn µ ¶
n (yk)n−k xn
S= (x − yk)k = .
k k n
k=0

Actually, the sum can be rewritten in the following form:


n
X (yk)n−k (x − yk)k
S = n! · .
k(n − k)! k!
k=0

We observe that the first factor is related to the Riordan array (1 + yt, teyt ) :
µ ¶
(yk)n−k (yk)n−k−1 1 (yk)n−k (yk)n−k−1 1
=y· = +y· = [tn−k ](1 + yt)eykt .
k(n − k)! (n − k)! n (n − k)! (n − k − 1)! n
The generating function of the second term corresponds to formula (2.7) with a = x and q = −y :
µ ¶ · xw ¯ ¸
(x − yk)k e ¯
¯ −yw
G = w = te .
k! 1 + yw ¯
Therefore, Abel identity reduces to a Riordan array transformation:
· · xw ¯ ¸¯ ¸
n! n e ¯
¯ −yw ¯
¯ yt n! n ext xn
S = (1 + yt)[t ] w = ue u = te = [t ](1 + yt) · = ;
n 1 + yw ¯ ¯ n 1 + yt n
in fact, we observe that w = teyt e−yw implies w = t.
2
As observed by a referee, the “y” in the formula is redundant; however, this is the form given in [5].

12
6 Inverting combinatorial identities
The use of Riordan arrays in proving identities related to sum inversion can be illustrated by a
simple application involving the Pascal triangle. Let us suppose we have an identity:
Xn µ ¶
n
bn = ak (6.1)
k
k=0

and wish to invert it, that is to find an expression relating an to the bk ’s; in other words, if the
sequence (bk )k∈N is given and the sequence (ak )k∈N is unknown, we wish to solve the infinite
system (6.1). By Euler transformation we know:
µ ¶ µ ¶
n 1 t 1 t
bn = [t ] a or b(t) = a .
1−t 1−t 1−t 1−t

If we set y = t/(1 − t), we can substitute t = y/(1 + y) in:


µ ¶ µ ¶
t 1 y
(1 − t)b(t) = a obtaining a(y) = b .
1−t 1+y 1+y
¡ ¢
Here we recognize the Riordan array (1/(1 + y), y/(1 + y)) with elements nk (−1)n−k , and
therefore we obtain the inverse relation:
Xn µ ¶
n
an = (−1)n−k bk .
k
k=0

This is a classical example, but we can go on to more sophisticated cases. Suppose we have:
X µµrn + p¶ µ
rn + p
¶¶
an = − (qr − 1) bn−qk
k k−1
k

and we wish to find the inverse sum, relating the bn ’s to the ak ’s. Since bn−qk = [tn−qk ]b(t) =
[tn ]b(t)tqk , we can imagine that bn−qk be the generic element of the Riordan array (b(t), tq−1 )
and use it as a transformation. Since the generating functions for the two terms in the right
hand member are obvious, we find:

an = [tn ]b(t)(1 + tq )rn+p − (qr − 1)[tn ]b(t)tq (1 + tq )rn+p = [tn ]b(t)(1 − (qr − 1)tq )(1 + tq )rn+p .

We wish to find a relation between generating functions, and because of the exponent n in
the right hand member, we should apply diagonalization:
· ¸
b(w)(1 − qrwq + wq )(1 + wq )p+1 ¯¯ q r
a(t) = ¯ w = t(1 + w ) ;
1 − qrwq + wq

here we computed: 1 − tφ0 (w) = (1 − qrwq + wq )/(1 + wq ). The expression simplifies:


h ¯ i
¯
a(t) = b(w)(1 + wq )p+1 ¯ w = t(1 + wq )r

and we can invert, since we know that t = w/(1 + wq )r :


µ ¶
1 w
b(w) = a .
(1 + wq )p+1 (1 + wq )r

13
The indeterminate t disappears and we recognize the transformation related to the Riordan
array: ((1 + wq )−p−1 , w(1 + wq )−r ) whose generic element is:
µ ¶ µ ¶
1 −p − 1 − rk (pq + n + (qr − 1)k)/q
dn,k = [wn−k ] = = (−1)(n−k)/q .
(1 + wq )p+1+rk (n − k)/q (n − k)/q
Therefore, we conclude by setting n − k = qh, since a binomial coefficient is zero when its
“denominator” is not an integer:
X µp + rn − (rq − 1)h¶
bn = (−1)h an−qh .
h
h
When q = r = 1 we find the inverse relations:
X µp + n¶ X µp + n¶
an = bn−k ⇔ bn = (−1)k an−k ,
k k
k k
a variant of (6.1). When q = 1 and r = 2 we have:
X µµ2n + p¶ µ2n + p¶¶ X µ2n + p − k ¶
an = − bn−k ⇔ bn = (−1)k an−k .
k k−1 k
k k
When q = 2 and r = 1 we obtain the inverse relations:
X µµn + p¶ µn + p¶¶ X µn + p − k ¶
an = − bn−2k ⇔ bn = (−1)k an−2k .
k k−1 k
k k
When q = r = 2 we find inversion (2.5.6) in Riordan’s book [12].
We conclude with an inversion of Abel’s type, which is better proved
P by using exponen-
a(t) we denote the formal power series k ak tk /k!, the ordinary
tial generating functions: by b
generating function of the sequence (ak /k!)k∈N . Let us suppose we are given the sum:
X µn¶ an X (x + k)n−k bk
an = (x + k)n−k bk that is = ·
k n! (n − k)! k!
k k
where the first factor in the right hand member is the generic element of the Riordan array
(ext , tet ). In fact we have:
(x + k)n−k
dn,k = [tn−k ]ext ekt = [tn−k ]e(x+k)t = .
(n − k)!
Therefore,
h we find ¯ ba(t) = eixtbb(tet ) or bb(tet ) = e−xt b
a(t). By setting y = tet or t = ye−t , we have
bb(y) = e−xt b ¯
a(t) ¯ t = ye−t . By using Theorem K60 we have:
bn ¡ ¢
= [tn ]e−xt b
a(t)e−(n−1)t e−t + te−t = [tn ](1 + t)e−(x+n)t b
a(t) =
n!
X (−1)n−k (x + n)n−k ak X (−1)n−k−1 (x + n)n−k−1 ak
= · + · =
(n − k)! k! (n − k − 1)! k!
k k
X (x + n)n−k−1 ak
= (−1)n−k · (x + k) · .
(n − k)! k!
k
Finally, by multiplying everything by n!:
X µn¶
bn = (−1)n−k (x + n)n−k−1 (x + k)ak .
k
k
This is inversion (3.1.3) in Riordan’s book [12].

14
Acknowledgment
We wish to thank the anonymous referee for the very useful and pertinent comments, in particu-
lar, for suggesting to point out the special applications of the LIF corresponding to Theorems 2.1
and 2.2.

References
[1] L. de Lagrange. Nouvelle méthode pour résoudre des équations littérales par le moyen des
séries. Mém. Acad. Roy. Sci. Belles-Lettres de Berlin, 24, 1770.

[2] G. P. Egorychev. Integral Representation and the Computation of Combinatorial Sums


(trans. H. H. McFadden), volume 59. American Mathematical Society, Providence, 1984.

[3] I. M. Gessel. A factorization for formal Laurent series and lattice path enumeration. Journal
of Combinatorial Theory, Series A, 28:321–337, 1980.

[4] I. M. Gessel. A combinatorial proof of the multivariable Lagrange inversion formula. J.


Combinatorial Theory, Series A, 45:178–195, 1987.

[5] H.W. Gould. Combinatorial Identities, A Standardized Set of Tables Listing 500 Binomial
Coefficient Summations. Morgantown W. Va., 1972.

[6] I. P. Goulden and D. M. Jackson. Combinatorial Enumeration. Wiley, New York, 1983.

[7] R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics. Addison-Wesley,


New York, 1989.

[8] P. Henrici. Applied and Computational Complex Analysis, I. Wiley, New York, 1988.

[9] D. Merlini, R. Sprugnoli, and M. C. Verri. The method of coefficients. Am. Math. Monthly.
to appear.

[10] D. Merlini, R. Sprugnoli, and M. C. Verri. Human and constructive proof of combinato-
rial identities: an example from Romik. Discrete Mathematics and Theoretical Computer
Science, AD:383–392, 2005.

[11] G. N. Raney. Functional composition patterns and power series reversion. Trans. Amer.
Math. Soc., 94:441–451, 1960.

[12] J. Riordan. Combinatorial Identities. Wiley, New York, 1968.

[13] R. Sedgewick and P. Flajolet. An Introduction to the Analysis of Algorithms. Addison-


Wesley, Reading, MA, 1996.

[14] L. W. Shapiro, S. Getu, W.-J. Woan, and L. Woodson. The Riordan group. Discrete Appl.
Math., 34:229–239, 1991.

[15] D. Singer. Q-analogues of Lagrangre inversion. Advances in Math., 115:73–82, 1978.

[16] R. Sprugnoli. Riordan Array Proofs of Identities in Gould’s Book.


http://www.dsi.unifi.it/∼resp.

[17] R. Sprugnoli. Riordan arrays and combinatorial sums. Discrete Math., 132:267–290, 1994.

15
[18] R. P. Stanley. Enumerative Combinatorics, volume 2. Cambridge University Press, Cam-
bridge, 1999.

16

View publication stats

You might also like