Advanced Mathematics

Advanced Combinatorics: Counting, Structure, and Existence

Advanced combinatorics extends basic counting into deep structural theory. From generating functions that turn sequences into algebra, to Ramsey theory that guarantees order within chaos, to the probabilistic method that proves existence without construction — this is where combinatorics becomes a powerful engine for all of mathematics.

Learning Objectives

  • Apply the multiplication rule, addition rule, and inclusion-exclusion to solve complex counting problems
  • Compute permutations and combinations with and without repetition, circular arrangements, and multinomials
  • Construct and manipulate ordinary and exponential generating functions
  • Solve linear recurrence relations using characteristic equations and generating functions
  • Apply the master theorem to divide-and-conquer recurrences
  • Enumerate trees using Cayley's formula and Prüfer sequences
  • State and apply Ramsey's theorem and Van der Waerden's theorem
  • Apply Turán's theorem and understand extremal graph theory
  • Use the first and second moment methods and the Lovász Local Lemma
  • Apply Burnside's lemma and Polya enumeration to symmetry problems
  • Construct and analyze block designs, Latin squares, and finite geometries
  • Work with integer partitions, Young tableaux, and the hook length formula

1. Fundamental Counting Principles

All of combinatorics rests on two basic rules and their powerful generalization through inclusion-exclusion.

The Multiplication Rule

If a procedure consists of k steps, and step i can be performed in n(i) ways regardless of how earlier steps were performed, then the total number of ways to complete the procedure is n(1) times n(2) times ... times n(k).

Example

A password requires 3 letters followed by 4 digits. There are 26 choices per letter and 10 choices per digit, giving 26^3 times 10^4 = 175,760,000 possible passwords.

The Addition Rule

If a task can be done in n(1) ways OR n(2) ways (with no overlap), the total number of ways is n(1) + n(2). More generally, if the tasks are mutually exclusive, the counts add. This is the finite version of countable additivity for probability.

Inclusion-Exclusion Principle

When tasks or outcomes overlap, simply adding overcounts the intersections. Inclusion-exclusion corrects for this systematically. For sets A(1), A(2), ..., A(n):

|A(1) union A(2) union ... union A(n)|

= sum |A(i)| - sum |A(i) intersect A(j)| + sum |A(i) intersect A(j) intersect A(k)| - ...

+ (-1)^(n+1) |A(1) intersect A(2) intersect ... intersect A(n)|

Classic Application: Derangements

A derangement is a permutation with no fixed points. The number of derangements D(n) of n elements equals n! times (1 - 1/1! + 1/2! - 1/3! + ... + (-1)^n / n!). This follows directly from inclusion-exclusion on the events "element i is fixed." For large n, D(n) approaches n!/e.

Pigeonhole Principle

If more than n objects are placed into n pigeonholes, at least one pigeonhole contains more than one object. The generalized version states that if kn + 1 objects are placed into n boxes, some box contains at least k + 1 objects. Despite its simplicity, the pigeonhole principle underlies deep results in number theory and combinatorics.

2. Permutations and Combinations

Without Repetition

A permutation selects and orders r items from n distinct items. A combination selects r items without regard to order.

Permutations P(n,r)

P(n,r) = n! / (n-r)!

Order matters. Choosing 3 officers from 10 candidates: P(10,3) = 720.

Combinations C(n,r)

C(n,r) = n! / (r! * (n-r)!)

Order does not matter. Choosing 3 committee members from 10: C(10,3) = 120.

With Repetition

Permutations with Repetition

n^r

r-letter strings from an n-letter alphabet with repetition allowed.

Combinations with Repetition

C(n+r-1, r)

Multisets: choosing r items from n types with repetition. Stars-and-bars interpretation.

Multinomial Coefficients

When n objects are divided into groups of sizes k(1), k(2), ..., k(m) with k(1) + k(2) + ... + k(m) = n, the number of arrangements is the multinomial coefficient:

C(n; k(1), k(2), ..., k(m)) = n! / (k(1)! * k(2)! * ... * k(m)!)

The multinomial theorem states: (x(1) + x(2) + ... + x(m))^n = sum over k(1)+...+k(m)=n of C(n; k(1),...,k(m)) times x(1)^k(1) times ... times x(m)^k(m).

Circular Permutations

When n distinct objects are arranged in a circle, one position is considered fixed to eliminate rotational equivalences, giving (n-1)! distinct arrangements. If the circle can also be flipped (necklaces), the count becomes (n-1)!/2.

Key Insight

8 people seated at a round table: (8-1)! = 5040 arrangements. If seats are labeled (fixed positions), it becomes 8! = 40320. The distinction between labeled and unlabeled positions is fundamental throughout combinatorics.

3. Generating Functions

Generating functions transform sequences into formal power series, converting combinatorial problems into algebraic ones. They are one of the most powerful and versatile tools in advanced combinatorics.

Ordinary Generating Functions (OGF)

The OGF of a sequence a(0), a(1), a(2), ... is the formal power series G(x) = a(0) + a(1)x + a(2)x^2 + a(3)x^3 + ... The key is that x is a formal variable — convergence is secondary to algebraic manipulation.

Standard OGFs

  • 1/(1-x) = 1 + x + x^2 + x^3 + ... (geometric series)
  • 1/(1-x)^(k+1) = sum C(n+k, k) x^n (balls-in-bins)
  • (1+x)^n = sum C(n,k) x^k (binomial theorem)
  • 1/(1-x-x^2) = sum F(n) x^n (Fibonacci numbers)

Exponential Generating Functions (EGF)

For labeled structures (where the identity of elements matters), use the EGF: G(x) = sum a(n) * x^n / n!. The EGF of the all-ones sequence is e^x. Products of EGFs correspond to labeled combinatorial constructions (sequences, sets, permutations).

Standard EGFs

  • e^x = sum x^n / n! (sets)
  • 1/(1-x) = sum n! * x^n / n! (sequences/permutations)
  • e^(e^x - 1) = sum B(n) x^n / n! (Bell numbers, set partitions)
  • x * e^(x * e^x) / (1 - x*e^x)^2 ... (labeled rooted trees)

Operations on Generating Functions

Addition and Multiplication

Adding GFs corresponds to combining independent choices. Multiplying OGFs of sequences a(n) and b(n) gives the convolution c(n) = sum a(k)*b(n-k). This counts ways to split n objects between two independent structures.

Differentiation and Shifting

If G(x) = sum a(n) x^n, then G'(x) = sum (n+1) a(n+1) x^n. Differentiating generates sequences with polynomial weights. x*G'(x) = sum n*a(n) x^n inserts a factor of n.

Solving Recurrences with Generating Functions

The standard approach: multiply both sides of the recurrence by x^n, sum over all valid n, recognize the resulting expressions as the GF or its derivatives/shifts, then solve for G(x) algebraically. Finally, use partial fractions to extract coefficients.

Worked Example: Fibonacci

F(n) = F(n-1) + F(n-2) with F(0)=0, F(1)=1. Multiplying by x^n and summing: G(x) - x = x*G(x) + x^2*G(x). Solving: G(x) = x / (1 - x - x^2). Partial fractions with roots phi = (1+sqrt(5))/2 and psi = (1-sqrt(5))/2 give F(n) = (phi^n - psi^n) / sqrt(5) (Binet's formula).

4. Recurrence Relations

Linear Recurrences with Constant Coefficients

A linear recurrence of order k has the form: a(n) = c(1)*a(n-1) + c(2)*a(n-2) + ... + c(k)*a(n-k). The general solution is determined by the characteristic equation obtained by substituting a(n) = r^n.

Characteristic Equation Method

  1. 1. Write the characteristic equation: r^k = c(1)*r^(k-1) + ... + c(k)
  2. 2. Find roots r(1), r(2), ..., r(k) (possibly complex or repeated)
  3. 3. If roots are distinct: a(n) = A(1)*r(1)^n + A(2)*r(2)^n + ... + A(k)*r(k)^n
  4. 4. If r(i) has multiplicity m: contribute (A(0) + A(1)*n + ... + A(m-1)*n^(m-1)) * r(i)^n
  5. 5. Apply initial conditions to find constants A(i)

Divide-and-Conquer Recurrences

Algorithms that split problems into b subproblems of size n/b with f(n) work at each level satisfy T(n) = a*T(n/b) + f(n). The master theorem resolves these in closed form.

Master Theorem

Let c = log(a)/log(b) (the critical exponent). For T(n) = a*T(n/b) + Theta(n^d):

  • If d < c: T(n) = Theta(n^c)   [subproblems dominate]
  • If d = c: T(n) = Theta(n^c * log n)   [equal work at every level]
  • If d > c: T(n) = Theta(n^d)   [root level dominates]

Example: Merge sort has a=2, b=2, d=1, c=1: T(n) = Theta(n log n).

Catalan Numbers

The Catalan numbers C(n) = C(2n, n) / (n+1) satisfy the recurrence C(n) = sum from k=0 to n-1 of C(k)*C(n-1-k), with C(0)=1. They count: triangulations of a convex polygon, balanced parenthesizations, rooted binary trees, monotone lattice paths below the diagonal, and dozens of other structures. The GF satisfies C(x) = 1 + x*C(x)^2, giving C(x) = (1 - sqrt(1-4x)) / (2x).

5. Graph Theory Combinatorics

Counting Trees

A tree on n labeled vertices has exactly n-1 edges and is connected and acyclic. Cayley's formula gives the total number of labeled trees on n vertices as n^(n-2). This is one of the most elegant results in combinatorics.

Prüfer Sequences

Prüfer's encoding establishes a bijection between labeled trees on n vertices and sequences of length n-2 from the set (1, 2, ..., n). This bijection directly proves Cayley's formula.

Prüfer Encoding Algorithm

  1. 1. Find the leaf with the smallest label.
  2. 2. Record the label of its unique neighbor.
  3. 3. Remove that leaf from the tree.
  4. 4. Repeat until 2 vertices remain (do not record the final edge).

In the resulting Prüfer sequence, vertex v appears exactly deg(v) - 1 times, so leaves of the tree are exactly those vertices not appearing in the sequence.

Spanning Trees and Kirchhoff's Matrix Tree Theorem

The number of spanning trees of a graph G equals any cofactor of the Laplacian matrix L = D - A, where D is the degree matrix and A is the adjacency matrix. Equivalently, it equals (1/n) times the product of non-zero eigenvalues of L. For the complete graph K(n), all eigenvalues are n (with multiplicity n-1), confirming n^(n-2) spanning trees via Cayley.

Euler Characteristic and Planar Graphs

For a connected planar graph with V vertices, E edges, and F faces (including the outer face): V - E + F = 2. This Euler characteristic equation constrains the structure of planar graphs: any simple planar graph satisfies E is at most 3V - 6, and any triangle-free planar graph satisfies E is at most 2V - 4.

6. Ramsey Theory

Ramsey theory is the study of unavoidable order: in any sufficiently large structure, some regular substructure must appear. The unifying theme is: "complete disorder is impossible."

Graph Ramsey Numbers

The Ramsey number R(s,t) is the minimum n such that every 2-coloring of the edges of K(n) contains a red K(s) or a blue K(t). The fundamental fact, proved by Ramsey in 1930, is that R(s,t) is always finite. The diagonal numbers R(k,k) are extremely difficult to compute.

Known Values and Bounds

  • R(3,3) = 6  (the "party problem": 6 people, some 3 all know each other or all strangers)
  • R(3,4) = 9,  R(3,5) = 14,  R(4,4) = 18
  • R(5,5) is known only to lie between 43 and 48
  • General upper bound: R(s,t) is at most C(s+t-2, s-1)
  • Lower bound (probabilistic): R(k,k) is greater than 2^(k/2)

Van der Waerden's Theorem

For any positive integers r and k, there exists a number W(r,k) such that any r-coloring of the integers (1, 2, ..., W(r,k)) contains a monochromatic arithmetic progression of length k. Van der Waerden's theorem was proved in 1927 and is the prototypical result of combinatorial number theory. The bounds on W(r,k) are notoriously difficult: W(2,3) = 9, W(2,4) = 35, W(3,3) = 27.

Hales-Jewett Theorem

The Hales-Jewett theorem is a multidimensional generalization of Van der Waerden. For any alphabet of size t and any number of colors r, there exists a dimension n such that any r-coloring of the t^n cells of an n-dimensional t^n hypercube contains a monochromatic combinatorial line. It implies Van der Waerden and is a foundational result in topological dynamics and ergodic theory.

7. Extremal Combinatorics

Extremal combinatorics asks: how large or small can a combinatorial structure be, subject to given constraints? The answer often reveals deep structural properties of the extremal configurations.

Turán's Theorem

The maximum number of edges in an n-vertex K(r+1)-free graph is achieved by the Turán graph T(n,r): divide n vertices into r parts as equally as possible and connect every pair of vertices in different parts (complete r-partite graph).

Turán Number Formula

ex(n, K(r+1)) = (1 - 1/r) * n^2/2 + O(n)

For triangle-free graphs (r=2): at most n^2/4 edges (T(n,2) is the complete bipartite graph K(n/2, n/2)). This is the Mantel theorem (1907), the earliest result in extremal graph theory.

Kruskal-Katona Theorem

The Kruskal-Katona theorem characterizes which families of sets can occur as k-element subsets: given a family F of k-element subsets of (1,...,n), the shadow (all (k-1)-element subsets of members of F) has size at least as large as the shadow of the first |F| k-element subsets in the colexicographic order. It is the key tool in proving the Frankl-Wilson theorem and many other results.

Bollobás Set-Pairs Inequality

Let (A(1), B(1)), ..., (A(m), B(m)) be pairs of finite sets such that A(i) intersects B(j) if and only if i = j (cross-intersection condition). Then: sum from i=1 to m of C(|A(i)| + |B(i)|, |A(i)|)^(-1) is at most 1. This elegant inequality generalizes Dilworth's theorem and has applications throughout extremal set theory.

Erdős-Ko-Rado Theorem

For n is at least 2k, the maximum size of an intersecting family of k-element subsets of an n-element set is C(n-1, k-1). The unique extremal family (for n > 2k) consists of all k-element sets containing a fixed element — a "star." This theorem is central to extremal set theory and has numerous generalizations.

8. The Probabilistic Method

Pioneered by Erdős, the probabilistic method proves existence of combinatorial objects by analyzing random structures. If a random object has a desired property with positive probability, then such an object must exist — even without an explicit construction.

First Moment Method (Union Bound)

If X counts the number of "bad" events and E[X] is less than 1, then Pr[X = 0] is greater than 0, so a good configuration exists. More precisely, Pr[at least one bad event] is at most E[X] by linearity of expectation and the union bound.

Example: Ramsey Lower Bound

Color each edge of K(n) red or blue independently with probability 1/2. The expected number of monochromatic K(k) subgraphs is C(n,k) * 2 * (1/2)^C(k,2). If this is less than 1, a 2-coloring with no monochromatic K(k) exists, proving R(k,k) is greater than n. Taking n = 2^(k/2) establishes the exponential lower bound.

Second Moment Method

The Paley-Zygmund inequality states: Pr[X > 0] is at least (E[X])^2 / E[X^2]. So if E[X^2] = Theta(E[X]^2), then X is positive with positive constant probability. This is used to show that not only does X have positive expectation but it is actually positive with high probability. Computing E[X^2] requires understanding covariances between indicators.

Lovász Local Lemma (LLL)

The LLL handles cases where bad events are individually unlikely but not fully independent. Let A(1), ..., A(n) be bad events. Suppose each event A(i) is independent of all but at most d other events, and Pr[A(i)] is at most p for all i. If ep(d+1) is at most 1 (where e is Euler's number), then Pr[none of the A(i) occur] is greater than 0.

Symmetric LLL Conditions

  • Each bad event has probability at most p.
  • Each bad event shares a dependency with at most d other events.
  • Condition: ep(d+1) is at most 1 (equivalently, 4pd is at most 1 suffices in many settings).
  • Conclusion: A configuration avoiding all bad events exists.

Application: k-SAT

In k-SAT, each clause is violated with probability 2^(-k) and shares variables with at most k*(2^k - 1) other clauses. The LLL guarantees satisfiability when each clause overlaps with fewer than 2^k / (ek) clauses. This gives an algorithmic result via the constructive LLL (Moser-Tardos).

9. Algebraic Combinatorics

Burnside's Lemma

Burnside's lemma (properly the Cauchy-Frobenius lemma) counts distinct objects under a symmetry group G acting on a set X of configurations. The number of distinct orbits (equivalence classes under symmetry) is:

|X/G| = (1/|G|) * sum over g in G of |Fix(g)|

where Fix(g) = set of configurations fixed by symmetry g. Example: Counting distinct colorings of the vertices of a square with 3 colors, under the dihedral group D(4) of order 8: apply each of the 8 symmetries (4 rotations, 4 reflections), count fixed colorings for each, average.

Polya Enumeration Theorem

Polya's theorem generalizes Burnside by tracking not just the count of distinct colorings but the distribution by color inventory. For a group G acting on positions, the cycle index Z(G; x(1), x(2), ...) is:

Z(G) = (1/|G|) * sum over g in G of x(1)^c(1,g) * x(2)^c(2,g) * ...

where c(k,g) is the number of k-cycles in the permutation g. Substituting x(k) = sum of y(i)^k over colors y(i) gives the generating function for colorings by color count.

Symmetric Functions

The ring of symmetric functions is spanned by several important bases: monomial symmetric functions m(lambda), elementary symmetric functions e(k) = sum of products of k distinct variables, complete homogeneous functions h(k) = sum of monomials of degree k, and Schur functions s(lambda). These bases are related by the involution omega that swaps e(k) and h(k) and transforms one Schur function into another.

Newton's Power Sum Identities

p(k) = x(1)^k + x(2)^k + ... (power sums) are related to elementary symmetric functions by Newton's identities: k*e(k) = sum from i=1 to k of (-1)^(i-1) e(k-i) p(i).

Schur Polynomials

Schur functions s(lambda) correspond to irreducible representations of the symmetric group S(n) and general linear group GL(n). The Littlewood-Richardson rule computes products s(mu)*s(nu) as a sum of Schur functions.

10. Combinatorial Designs

Combinatorial design theory studies arrangements of elements into subsets with highly regular intersection properties. These structures appear in coding theory, statistics, cryptography, and tournament scheduling.

Block Designs: (v, k, lambda)-Designs

A (v, k, lambda)-design (also called a balanced incomplete block design or BIBD) consists of a set V of v points and a collection B of k-element subsets (blocks) such that every 2-element subset of V appears in exactly lambda blocks.

Necessary Conditions

  • r = lambda*(v-1) / (k-1) must be a positive integer (r = blocks through each point)
  • b = v*r / k must be a positive integer (b = total number of blocks)
  • Fisher's inequality: b is at least v
  • These conditions are not sufficient; existence is a deep unsolved problem in general.

Steiner Systems

A Steiner system S(t, k, n) is a collection of k-element subsets of an n-element set such that every t-element subset appears in exactly one block. The most famous: S(2,3,n) are Steiner triple systems (every pair in exactly one triple), which exist iff n is congruent to 1 or 3 (mod 6). The Steiner system S(5, 6, 12) is related to the Mathieu group M(12).

Latin Squares

An n times n Latin square is an n times n array filled with n different symbols, each occurring exactly once in each row and exactly once in each column. Latin squares are equivalent to Cayley tables of quasigroups.

Orthogonal Latin Squares

Two Latin squares of order n are orthogonal if, when superimposed, every ordered pair of symbols appears exactly once. A set of mutually orthogonal Latin squares (MOLS) of order n has at most n-1 squares. A complete set of n-1 MOLS exists iff n is a prime power.

Euler's 36 Officers Problem

Euler conjectured no pair of orthogonal 6 times 6 Latin squares exists (no two MOLS of order 6). This was confirmed in 1901 by exhaustive search. Euler also conjectured no MOLS exist for n congruent to 2 (mod 4), but this was dramatically disproved for n is at least 10 by Bose, Shrikhande, and Parker in 1960.

Finite Geometries

A projective plane of order n has n^2 + n + 1 points and n^2 + n + 1 lines, with n + 1 points on each line and n + 1 lines through each point. Any two points lie on exactly one line, and any two lines meet in exactly one point. Projective planes of prime power order are constructed from finite fields GF(q). Whether non-prime-power orders exist is open (the order 10 case was ruled out by a massive computer search in 1989).

11. Partition Theory

A partition of an integer n is a way of writing n as an unordered sum of positive integers. Partition theory connects combinatorics with number theory, representation theory, and statistical mechanics.

Partition Counting and Generating Functions

Let p(n) denote the number of partitions of n. Euler's remarkable product formula gives the generating function:

sum from n=0 to infinity of p(n) x^n = product from k=1 to infinity of 1/(1-x^k)

The first values: p(0)=1, p(1)=1, p(2)=2, p(3)=3, p(4)=5, p(5)=7, p(6)=11, p(7)=15, p(8)=22, p(9)=30, p(10)=42. The Hardy-Ramanujan asymptotic formula gives p(n) approximately (1 / (4n*sqrt(3))) * exp(pi * sqrt(2n/3)).

Conjugate Partitions and Ferrers Diagrams

A partition can be visualized as a Ferrers diagram (or Young diagram): rows of dots where row i has lambda(i) dots. The conjugate partition is obtained by transposing the diagram (reflecting across the main diagonal). The number of partitions of n into at most k parts equals the number of partitions of n into parts of size at most k.

Young Tableaux

A Standard Young Tableau (SYT) of shape lambda is a filling of the Young diagram with numbers 1, 2, ..., n such that entries increase left-to-right in each row and top-to-bottom in each column. A Semistandard Young Tableau (SSYT) allows repeated entries with entries weakly increasing in rows and strictly increasing in columns.

Hook Length Formula

The number of standard Young tableaux of shape lambda, where lambda is a partition of n, is given by the hook length formula:

f^lambda = n! / (product over all cells (i,j) of h(i,j))

where h(i,j) is the hook length of cell (i,j): the number of cells directly to the right plus the number directly below, plus 1 for the cell itself. Example: for the partition (3,2,1) of n=6, the hook lengths are 5,3,1 / 3,1 / 1, giving f^lambda = 720 / 45 = 16.

RSK Correspondence

The Robinson-Schensted-Knuth (RSK) correspondence is a bijection between permutations of (1,...,n) and pairs of standard Young tableaux of the same shape. It maps the permutation's cycle structure to the shape of the tableaux and has profound implications: the number of permutations of n with longest increasing subsequence of length at most k equals the number of pairs of SYT with at most k rows.

Practice Problems with Solutions

Problem 1 — Inclusion-Exclusion

How many integers from 1 to 1000 are divisible by 3, 5, or 7?

Show Solution

Let A = multiples of 3, B = multiples of 5, C = multiples of 7 in (1,...,1000).

|A| = 333, |B| = 200, |C| = 142

|A intersect B| = floor(1000/15) = 66

|A intersect C| = floor(1000/21) = 47

|B intersect C| = floor(1000/35) = 28

|A intersect B intersect C| = floor(1000/105) = 9

|A union B union C| = 333+200+142 - 66-47-28 + 9 = 543

Problem 2 — Generating Functions

Find a closed form for the number of ways to make change for n cents using pennies (1¢), nickels (5¢), and dimes (10¢).

Show Solution

The generating function is the product of GFs for each coin type:

G(x) = 1/(1-x) * 1/(1-x^5) * 1/(1-x^10)

The number of ways to make n cents is the coefficient of x^n in G(x). This does not simplify to a single closed form, but for fixed small denominators, partial fractions over the roots of (1-x)(1-x^5)(1-x^10) yield an exact formula. The dominant term is n^2/100 + O(n), reflecting the O(n) behavior of pure pennies and O(n^2) behavior when all three denominations are used.

Problem 3 — Recurrence Relations

Solve a(n) = 5*a(n-1) - 6*a(n-2) with a(0) = 1, a(1) = 4.

Show Solution

Characteristic equation: r^2 = 5r - 6, so r^2 - 5r + 6 = 0.

(r-2)(r-3) = 0, giving roots r=2 and r=3.

General solution: a(n) = A*2^n + B*3^n.

Initial conditions: a(0) = A + B = 1 and a(1) = 2A + 3B = 4.

Solving: B = 2, A = -1.

a(n) = 2*3^n - 2^n

Problem 4 — Burnside's Lemma

How many distinct necklaces can be made with 5 beads using 3 colors, where rotations and reflections are considered the same?

Show Solution

The symmetry group is the dihedral group D(5) with 10 elements: 5 rotations and 5 reflections.

Rotations: rotation by 0 fixes 3^5 = 243; rotation by 1,2,3,4 positions fixes colorings where all beads are the same color: 3 each.

Reflections (5 is odd, so each reflection fixes 1 bead and swaps 2 pairs): each fixes 3^3 = 27 colorings (one free choice per orbit).

Sum = 243 + 4*3 + 5*27 = 243 + 12 + 135 = 390

Distinct necklaces = 390 / 10 = 39

Problem 5 — Probabilistic Method

Show that R(3,3) is at least 6 using the probabilistic method, then show R(3,3) = 6 exactly by demonstrating R(3,3) is at most 6.

Show Solution

Lower bound: R(3,3) > 5

Color K(5) edges uniformly at random. The expected number of monochromatic triangles is C(5,3) * 2 * (1/2)^3 = 10 * 2 * 1/8 = 2.5. This does not directly give the lower bound, but the explicit 2-coloring of C(5) (the 5-cycle and its complement) shows K(5) has no monochromatic triangle, confirming R(3,3) > 5.

Upper bound: R(3,3) is at most 6

In any 2-coloring of K(6), pick any vertex v. It has 5 edges; by pigeonhole, at least 3 are the same color — say red, to vertices u(1), u(2), u(3). If any edge among u(1), u(2), u(3) is red, it forms a red triangle with v. If all edges among them are blue, they form a blue triangle. Either way, a monochromatic triangle exists.

Therefore R(3,3) = 6.

Problem 6 — Hook Length Formula

Count the number of Standard Young Tableaux of shape (3,2) — a partition of 5 with three cells in the first row and two in the second.

Show Solution

The Young diagram of (3,2) has cells at positions: row 1: (1,1),(1,2),(1,3) and row 2: (2,1),(2,2).

Hook lengths:

h(1,1) = 3+1+1 = 4,   h(1,2) = 2+0+1 = 3, wait — correct calculation:

h(1,1): 2 cells right, 1 cell below = 2+1+1 = 4

h(1,2): 1 cell right, 1 cell below = 1+1+1 = 3

h(1,3): 0 cells right, 0 cells below = 0+0+1 = 1

h(2,1): 1 cell right, 0 cells below = 1+0+1 = 2

h(2,2): 0 cells right, 0 cells below = 0+0+1 = 1

f^lambda = 5! / (4*3*1*2*1) = 120 / 24 = 5

There are exactly 5 standard Young tableaux of shape (3,2).

Exam Tips and Common Pitfalls

Do This

  • Always check whether order matters before choosing permutation vs. combination.
  • For generating function problems, identify whether the structure is labeled (use EGF) or unlabeled (use OGF).
  • In inclusion-exclusion, count intersections by the LCM of the relevant conditions.
  • When using the master theorem, identify a, b, and d precisely before applying the cases.
  • For Burnside's lemma, list all group elements and count fixed points for each, not just one representative per conjugacy class (unless weighting properly).
  • Double-check Ramsey bounds: R(s,t) is at most R(s-1,t) + R(s,t-1).

Avoid This

  • Confusing C(n,r) (unordered) with P(n,r) (ordered) — ask "does arrangement matter?"
  • Forgetting the (-1)^(k+1) sign pattern in inclusion-exclusion (it alternates: add, subtract, add, ...).
  • Applying the master theorem when f(n) does not match a polynomial form — use Akra-Bazzi instead.
  • In Turán's theorem, confusing K(r) and K(r+1)-free: T(n,r) is K(r+1)-free but contains K(r).
  • In Young tableaux, confusing standard (entries 1 to n, strictly increasing in rows and columns) with semistandard (weakly increasing in rows).
  • Assuming the LLL condition ep(d+1) is at most 1 gives a constructive algorithm — you also need Moser-Tardos for that.

Quick Reference

Formula / ResultStatementApplication
Derangements D(n)n! * sum from k=0 to n of (-1)^k / k!Permutations with no fixed points
Cayley's Formulan^(n-2) labeled trees on n verticesSpanning trees, Prüfer bijection
Catalan C(n)C(2n,n) / (n+1)Triangulations, parentheses, ballot sequences
Bell number B(n)Number of set partitions of n-element setEGF = e^(e^x - 1)
Stirling (1st kind) s(n,k)Permutations of n with k cyclesCycle structure of permutations
Stirling (2nd kind) S(n,k)Partitions of n-element set into k non-empty subsetsSurjections: k! * S(n,k)
Turán ex(n,K(r+1))(1-1/r) * n^2/2 + O(n)Maximum edges in K(r+1)-free graph
Hook length formulan! / product of hook lengthsNumber of standard Young tableaux
LLL conditionep(d+1) is at most 1Avoiding all bad events simultaneously
Inclusion-exclusionAlternating sum of |k-wise intersections|Counting with overlapping forbidden conditions

Related Topics

Frequently Asked Questions

What background is needed for advanced combinatorics?

Solid foundation in discrete mathematics and proof writing is essential. Familiarity with linear algebra (for algebraic combinatorics), basic probability (for the probabilistic method), and group theory (for Burnside/Polya) will open additional areas. A course in graph theory is highly recommended before tackling Ramsey theory and extremal results.

How are generating functions different from formal power series?

Generating functions ARE formal power series — the word 'formal' means we treat them as algebraic objects without worrying about convergence. We care about the algebraic identities between series, not their values at specific points. When convergence does matter (e.g., for asymptotic extraction via complex analysis), the analytic theory of generating functions comes into play.

Why is finding Ramsey numbers so hard?

The difficulty is exponential in nature. Even R(5,5) — the smallest n such that any 2-coloring of K(n) has a monochromatic K(5) — is only known to be between 43 and 48. Checking all 2-colorings of K(43) requires examining 2^(C(43,2)) = 2^903 colorings. Erdős famously said: 'Aliens demand we tell them R(5,5) or they destroy the Earth — we should compute it. If they demand R(6,6), we should attack the aliens.'

What is the relationship between the probabilistic method and explicit constructions?

The probabilistic method proves existence but gives no explicit construction. The Moser-Tardos algorithm (2010) derandomizes LLL arguments, converting probabilistic proofs into efficient algorithms. More broadly, turning probabilistic existence proofs into explicit constructions (derandomization) is a central theme in theoretical computer science.

Where do combinatorial designs appear in applications?

Block designs are used in experimental design (statistics) to balance treatment comparisons. Latin squares appear in cryptography (as components of AES-like ciphers) and in scheduling (round-robin tournaments). Finite projective planes underlie error-correcting codes (Reed-Solomon, BCH codes). Steiner systems appear in the construction of perfect hash families.

Advanced combinatorics is one of the richest areas of mathematics, connecting to algebra, probability, number theory, and theoretical computer science. Master the foundational techniques here, then explore the connections in Discrete Mathematics, Graph Theory, and Probability Theory.