# The critical surface fugacity for self-avoiding walks on a rotated honeycomb lattice.

1 Introduction

Self-avoiding walks (SAWs) have been considered a model of long-chain polymers in solution for a number of decades--see for example early works by Orr (1947) and Flory (1949). In the simplest model one associates a weight (or fugacity) x with each step (or monomer, in the context of polymers) of a walk, and then (for a given lattice) considers the generating function

C(x) = [summation over (n[greater than or equal to]0)] [c.sub.n][x.sup.n],

where [c.sub.n] is the number of SAWs starting at a fixed origin and comprising n steps.

It is straightforward to show (see e.g. Madras and Slade (1993)) that the limit

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

exists and is finite. The lattice-dependent value [mu] is known as the growth constant, and is the reciprocal of the radius of convergence of the generating function C(x). The honeycomb lattice is the only regular lattice in two or more dimensions for which the value of the growth constant is known; its value [mu] = [square root of (2 + [square root of 2])] was conjectured in 1982 by Nienhuis (1982) and proved by Duminil-Copin and Smirnov (2012).

The interaction of long-chain polymers with an impenetrable surface can be modelled by restricting SAWs to a half-space, and associating another fugacity y with vertices (or edges) in the boundary of the half-space which are visited by a walk. It is standard practice to place the origin on the boundary. This naturally leads to the definition of a partition function

[C.sup.+.sub.n](y) = [summation over (m[greater than or equal to]0)] [c.sup.+.sub.n](m) [y.sup.m],

where [c.sup.+.sub.n] (m) is the number of n-step SAWs starting on the boundary of the half-space and occupying m vertices in the boundary.

The limit

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

has been shown to exist for the d-dimensional hypercubic lattice for y > 0 (see e.g. Hammersley et al. (1982)). It is a finite, log-convex and non-decreasing function of y, and is thus continuous and almost everywhere differentiable. The adaptation of the proof to other regular lattices (in particular, to the honeycomb lattice) is elementary--see Beaton (2012) for details.

It can also be shown that for 0 < y [less than or equal to] 1,

[mu](y) = [mu](1) = [mu],

and that [mu](y) [greater than or equal to] max{[mu], [square root of y]}. (The lower bound [square root of y] applies to the honeycomb lattice as discussed in this paper, but this bound varies depending on the lattice and orientation of the surface.(i)) This implies the existence of a critical fugacity [y.sub.c] [greater than or equal to] 1 satisfying

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

This critical fugacity signifies an adsorption phase transition, and demarcates the desorbed phase y < [y.sub.c] and the adsorbed phase y > [y.sub.c].

Just as the honeycomb lattice is the only regular lattice whose growth constant is known exactly, it is also the only lattice for which an exact value for [y.sub.c] is known. In fact, because there are two different ways to orient the surface (see Figure 1) for the honeycomb lattice, there are two different values of [y.sub.c]. When the surface is oriented so that there are lattice edges perpendicular to the surface (i.e. Figure 1(a)), the critical fugacity is [y.sub.c] = 1 + [square root of 2]. This value was conjectured by Batchelor and Yung (1995), using the integrability of the model and comparison with a more general solvable loop model on the square lattice. The critical boundary weight was obtained by finding reflection matrices which satisfy the boundary Yang-Baxter equation. A proof was discovered by Beaton et al. (2012); it used a generalisation of an identity obtained by Duminil-Copin and Smirnov (2012), as well as an adaptation of some results of Duminil-Copin and Hammond (2012).

It is the other orientation of an impenetrable surface on the honeycomb lattice (i.e. Figure 1(b)) that is the focus of this article. For this model of polymer adsorption there is also a conjecture regarding the critical surface fugacity, due to Batchelor et al. (1998) and obtained using the same methods as for the first orientation. In this extended abstract we sketch the proof of that result:

Theorem 1 For the self-avoiding walk model on the semi-infinite honeycomb lattice with the boundary oriented as per Figure 1(b), the critical surface fugacity is

y = [y.sub.c] = [square root of (2 + [square root of 2]/[1 + [square root of 2] - [square root of 2 + [square root of 2]])] = 2.455 ...

This paper is an overview of Beaton (2012), which in turn largely follows the same structure as Beaton et al. (2012). In the interest of brevity we omit most proofs. We first present an identity relating several different generating functions of SAWs in a finite domain, evaluated at the critical step fugacity x = [x.sub.c] = [[mu].sup.-1]. We then give adaptations of some existing results for the hypercubic lattice to the honeycomb lattice, and show how the critical fugacity relates to an appropriate limiting case of our identity. This relationship enables us to derive a proof of Theorem 1, subject to a certain generating function in a restricted geometry (specifically, the generating function of self-avoiding bridges which span a strip of height T) disappearing in a limit. We omit the proof of that result here; it is given in the appendix of Beaton (2012). The proof there is very similar to that of the appendix in Beaton et al. (2012), which was in turn based on arguments featured in Duminil-Copin and Hammond (2012).

In Beaton et al. (2012), we also established identities for a generalisation of the self-avoiding walk model, namely the O(n) loop model. The equivalent generalisation for the rotated lattice is discussed in Beaton (2012), and we refer the reader to that article for further details.

2 The identities

2.1 The local identity for bulk vertices

We consider the semi-infinite honeycomb lattice, oriented as in Figure 1(b), embedded in the complex plane in such a way that the edges have unit length. We follow the examples of Duminil-Copin and Smirnov (2012) and Beaton et al. (2012) and consider self-avoiding walks which start and end at the mid-points of edges on the lattice. Note that this means the length of a walk is the same as the number of vertices it occupies. We define a domain [OMEGA] to be a finite connected collection of mid-edges with the property that for every vertex [upsilon] adjacent to a mid-edge of [OMEGA], all three mid-edges adjacent to [upsilon] must be in [OMEGA]. We denote by V([OMEGA]) the set of vertices adjacent to mid-edges of [OMEGA], and by [partial derivative] [OMEGA] the set of mid-edges of [OMEGA] adjacent to only one vertex of V([OMEGA]). Let [gamma] be a self- avoiding walk. We denote by [absolute value of [gamma]] the number of vertices occupied by [gamma] and by c([gamma]) the number of contacts with the surface (i.e. vertices on the surface occupied by [gamma]).

Now define the following so-called parafermionic observable: for a [member of] [partial derivative] [OMEGA] and z [member of] [OMEGA], set

F([OMEGA],a, p; x, y, [sigma]) [equivalent to] F(p) := [summation over ([gamma]:a[right arrow]p)] [x.sup.[absolute value of [gamma]][y.sup.c([gamma])] [e.sup.-i[sigma]W([gamma])]

where the sum is over all SAWs [gamma] [subset] [OMEGA] which run from a to p, and W ([gamma]) is the winding angle of 7, that is, [pi]/3 times the difference between the number of left turns and right turns. See Figure 2 for an example. The following lemma appears as part of Lemma 3 in Beaton et al. (2012); the case y = 1 is due to Smirnov (2010).

Lemma 2 Let

[sigma] = -1/8, [x.sup.-1.sub.c] = 2 cos (3[pi]/8) = [square root of (2 - [square root of 2])], or (1)

[sigma] = -5/8, [x.sup.-1.sub.c] = 2 cos ([pi]/8) = [square root of (2 + [square root of 2])]. (2)

Then for a vertex [upsilon] [member of] V ([OMEGA]) not belonging to the weighted surface, the observable F satisfies

(p - [upsilon])F(p) + (q - [upsilon])F(q) + (r - [upsilon])F(r) = 0, (3)

where p, q, r are the three mid-edges adjacent to v, and the variable x is set to [x.sub.c].

Equation (1) corresponds to the larger of the two critical values of the step weight x and hence to the dense regime critical point, while (2) corresponds to the line of critical points separating the dense and dilute phases. In what follows we refer to (1) and (2) as the dense and dilute regimes respectively.

2.2 The local identity for surface vertices

We now wish to generalise Lemma 2 to include vertices lying on the weighted boundary. To do this, we have to be more particular about the domain being used. We work in the special domain [D.sub.T,L], as illustrated in Figure 3. The height T of the domain is the length of the shortest walk starting at a and ending at the top boundary; the width 2L + 1 is the number of columns of cells. Walks start at the mid-edge a. We choose this mid-edge in order to preserve the reflective symmetry of the domain, which greatly simplifies an important identity. However, the fact that a is not an external mid-edge does introduce some complications:

* A walk which ends at a particular external mid-edge could have two different winding angles, depending on whether it started from a in the left or right direction. This is undesirable, but easily corrected. Define

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

Then, define [F.sup.*] (p) in the same way as F(p), but now using [W.sup.*] instead of W.

* This new observable [F.sup.*] will satisfy the same identity (3) as F on all non-boundary vertices of [D.sub.T,L], except for the vertices [a.sup.-] and [a.sup.+] adjacent to a. To deal with this, we define V'([D.sub.T,L]) := [D.sub.T,L]\{[a.sup.-], [a.sup.+]}, and will end up evaluating (3) only on the vertices of V'([D.sub.T,L]).

Proposition 3 Let [sigma] and [x.sub.c] be as defined in (2). Define [1.sub.[beta]+] ([upsilon]) to be 1 if the vertex [upsilon] is adjacent to a mid-edge in [[beta].sup.+] and 0 otherwise, and similarly define [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. Then for every vertex [upsilon] in V'([D.sub.T,L]) with adjacent mid-edges p, q, r,

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (4)

where for vertices adjacent to mid-edges in [[beta].sup.+] or [[beta].sup.-], the surrounding mid-edges p, q, r are in clockwise order from the external mid-edge, and the sums are over walks which visit the indicated mid-edges in the prescribed order.

It is clear that if y = 1 or if v is not a weighted vertex, then the RHS of (4) disappears and thus (4) reduces to something very similar to (3)--the differences being that here a is not an external mid-edge, and V'([D.sub.T,L]) does not quite include all vertices in the domain. The factors [e.sup.-i[sigma](-[pi]/6)] and [e.sup.-i[sigma]([pi]/6)] are the contributions of the modified winding angles of walks to [[beta].sup.+] and [[beta].sup.-] mid-edges respectively.

2.3 The domain identity

In Duminil-Copin and Smirnov (2012), the authors use Lemma 2 to prove that the growth constant of selfavoiding walks (the dilute regime) is [x.sup.-1.sub.c] = [square root of (2 + [square root of 2])]. They do so by considering a special trapezoidal domain, and using the local identity (3) to derive a domain identity satisfied by generating functions of SAWs which end on different sides of the domain. In Beaton et al. (2012), that identity is generalised to one which relates generating functions of the O(n) loop model and takes into account the surface fugacity y.

Here, we construct a similar identity to the one used in Beaton et al. (2012). We take [sigma] and [x.sub.c] to be the values given in (2).

Define

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII],

where each sum runs over SAWs which start at a and end in the indicated set of external mid-edges of [D.sub.T,L]. Also, define

[P.sub.T,L](x, y) = [summation over (p[contains as member]a)] [x.sup.[absolute value of [rho]]] [y.sup.c([rho])],

which sums over all undirected (non-empty) self-avoiding polygons in [D.sub.T,L] which contain a. That is, [rho] is a simple closed loop on the edges of [D.sub.T,L] which passes through a, [absolute value of [rho]] is the number of edges (or, equivalently, vertices) occupied by [rho] and c([rho]) is the number of boundary vertices occupied by [rho].

Proposition 4 Let T + L [equivalent to] 1(mod 2). Then the generating functions [A.sup.O.sub.T,L], [A.sup.I.sub.T,L], [E.sub.T,L], [B.sub.T,L] and [P.sub.T,L], evaluated at x = [x.sub.c], satisfy the identity

[c.sup.O.sub.A] [A.sup.O.sub.T,L]([x.sub.c], y) + [c.sup.I.sub.A][A.sup.I.sub.T,L]([x.sub.c], y) + [c.sub.E] [E.sub.T,L] ([x.sub.c], y) + [c.sub.P] [P.sub.T,L]([x.sub.c], y) + [c.sub.B] (y) [B.sub.T,L]([x.sub.c],y) = [c.sub.G], (5)

where

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

The proof follows by computing the sum

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (6)

where p, q, r are the three mid-edges adjacent to vertex [upsilon], in two ways. One one hand, the contribution to S of any "internal" mid-edge (i.e. any mid-edge adjacent to two vertices in V'([D.sub.T,L])) will be 0, and thus we only need to consider the contributions of external mid-edges. On the other hand, (4) guarantees that the contribution of any unweighted vertex is 0, and so we can compute S by calculating the contributions of the vertices on the [beta] boundary. We require T + L [equivalent to] 1(mod 2) so that we can pair up vertices on the [beta] boundary.

3 The critical surface fugacity

In this extended abstract we omit most of the technical results which enable us to adapt known results for the hypercubic lattice (see Hammersley et al. (1982) and van Rensburg et al. (2006)) to the honeycomb lattice, and instead only present the main result that we need. In a strip of height T, we set the mid-edge a to be a horizontal mid-edge on the bottom of the strip (similar to its placement in the finite domain [D.sub.T,L]). We then define the following three types of SAWs (see Figure 4): bridges, which start at a and end at the top of the strip; arches, which start at a and end on the bottom of the strip; and general walks, which start at a and may end anywhere in the strip. We then define the generating function

[B.sub.T](x, y)= [summation over (n,m[greater than or equal to]0)] [b.sub.T,n] (m) [x.sup.n][y.sup.m]

where [B.sub.t,n] (m) is the number of length n bridges in the strip of width T which contain m vertices at the top of the strip. We likewise define [A.sub.T] (x, y) and [C.sub.T] (x, y) for arches and general walks respectively.

The following proposition will allow us to relate the generating functions we considered in the previous section with the critical surface fugacity [y.sub.c]. Recall from Section 1 the definition of [mu](y).

Proposition 5 For y > 0, the generating functions [A.sub.T] (x, y), [B.sub.T] (x, y) and [C.sub.T] (x, y) all have the same radius of convergence, [[rho].sub.T](y). The sequence [[rho].sub.T](y) decreases to [rho](y) := [mu][(y).sup.-1] as T [right arrow] [infinity]. In particular, [[rho].sub.T](y) decreases to [rho] := [[mu].sup.-1] for y [less than or equal to] [y.sub.c].

There exists a unique [y.sub.T] > 0 such that [[rho].sub.T]([y.sub.T]) = [x.sub.c] := [[mu].sup.-1]. The series (in y) [A.sub.T]([x.sub.c], y), [B.sub.T]([x.sub.c], y) and [C.sub.T]([x.sub.c], y) have radius of convergence [y.sub.T], and [y.sub.T] decreases to the critical fugacity [y.sub.c] as T [right arrow] [infinity].

We now return to the identity (5) relating the generating functions in the domain [D.sub.T,L]. Note that [c.sub.B] (y) is a continuous and monotone decreasing function of y for y > 0, and that [c.sub.B] ([y.sup.[dagger]]) = 0 where

[y.sup.[dagger]] = [square root of (2 + [square root of 2]/[1 + [square root of 2] - [square root of 2 + [square root of 2]]])]

For 0 < y < [y.sup.[dagger]], every term in (5) is non-negative. Observe that [A.sup.O.sub.T,L], [A.sup.I.sub.T,L], [B.sub.T,L] and [P.sub.T,L] are increasing with L. (As L increases these generating functions just count more and more objects.) We then see that for those values of L satisfing T + L [equivalent to] 1 (mod 2), [E.sub.T,L] must decrease as L increases. It is thus valid to take the limit L [right arrow] [infinity] of (5) over the values of L with T + L [equivalent to] 1 (mod 2). But now [A.sup.O.sub.T,L], [A.sup.I.sub.T,L], [B.sub.T,L] and [P.sub.T,L] actually increase with L regardless of whether T + L [equivalent to] 1 (mod 2) or not, and so they have the same limits as L [right arrow] [infinity] over any subsequence of L values. Hence, we can in fact take the limit

L [right arrow] [infinity] of (5) over all values of L. If we define

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII],

and similar limits for the other generating functions (we also have [lim.sub.L[right arrow][infinity]] [B.sub.T,L](x, y) = [B.sub.T](x, y) as defined earlier), then we obtain

[c.sup.O.sub.A][A.sup.O.sub.T]([x.sub.c], y) + [c.sup.I.sub.A][A.sup.I.sub.T] ([x.sub.c], y) + [c.sub.P][E.sub.T] ([x.sub.c], y) + [c.sub.B][P.sub.T](y) + [c.sub.B](y) [B.sub.T] ([x.sub.c], y) = [c.sub.G]. (7)

In this rest of this section, we will prove the following:

Proposition 6 If it can be shown that

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

then [y.sub.c] = [y.sup.[dagger]].

The proof that B([x.sub.c], 1) = 0 is quite involved and will thus be omitted from this extended abstract; see the appendix of Beaton (2012).

We begin by establishing a lower bound on [y.sub.c] with a straightforward corollary to Proposition 5.

Corollary 7 The critical surface fugacity [y.sub.c] satisfies

[y.sub.c] [greater than or equal to] [y.sup.[dagger]].

Proof: For y < [y.sup.[dagger]] the identity (7) establishes the finiteness of [B.sub.T]([x.sub.c], y), and thus we see [y.sub.T] [greater than or equal to] [y.sup.[dagger]]. By Proposition 5 it then follows that [y.sub.c] [greater than or equal to] [y.sup.[dagger]].

We now show that one of the generating functions in (7) has disappeared in the limit L [right arrow] [infinity].

Corollary 8 For 0 [less than or equal to] y < [y.sup.[dagger]],

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII],

and hence

[c.sup.O.sub.A][A.sup.O.sub.T]([x.sub.c], y) + [c.sup.I.sub.A][A.sup.I.sub.T] ([x.sub.c], y) + [c.sub.P][P.sub.T] ([x.sub.c], y) + [c.sub.B](y) [B.sub.T] ([x.sub.c], y) = [c.sub.G]. (8)

Proof: By Proposition 5, [y.sub.T] is the radius of convergence of [C.sub.T]([x.sub.c], y). Since [y.sub.T] [greater than or equal to] [y.sub.c] [greater than or equal to] [y.sup.[dagger]], it follows that [C.sub.T]([x.sub.c], y) is convergent for 0 [less than or equal to] y < [y.sup.[dagger]]. Now

[summation over (L)] [E.sub.T,L]([x.sub.c], y) [less than or equal to] [C.sub.T]([x.sub.c], y) < [infinity],

as each walk counted by [E.sub.T,L], for every value of L, will also be counted by [C.sub.T]. The corollary follows immediately.

We note here that [A.sup.O.sub.T] ([x.sub.c], y) [less than or equal to] [C.sub.T]([x.sub.c], y) (since any walk counted by [A.sup.O.sub.T] is also counted by [C.sub.T]), and likewise for [A.sup.O.sub.T] and [P.sub.T]. Hence all the generating functions featured in (8) have radius of convergence at least [y.sub.T].

Now consider the y = 1 case of (8):

[c.sup.O.sub.T][A.sup.O.sub.T] ([x.sub.c], 1) + [c.sup.I.sub.A][A.sup.I.sub.T] ([x.sub.c], 1) + [c.sub.P][P.sub.T] ([x.sub.c], 1) + [c.sub.B][B.sub.T] ([x.sub.c], 1) = [c.sub.G].

Since [A.sup.O.sub.T] ([x.sub.c], 1), [A.sup.I.sub.T]([x.sub.c], 1) and [P.sub.T]([x.sub.c], 1) all increase with T (as T increases these generating functions count more and more objects), and since they are all bounded by this identity, it follows that they all have limits as T [right arrow] [infinity]. Then [B.sub.T] ([x.sub.c], 1) must decrease as T increases, and it too has a limit as T [right arrow] [infinity]. As indicated in Proposition 6, we denote this limit

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

Proof of Proposition 6: Assume now that B([x.sub.c], 1) = 0. Any walk counted by [A.sup.O.sub.T+1]([x.sub.c], y) which has contacts with the top boundary can be factored into two pieces by cutting it at the mid-edge immediately following its last surface contact. (See Figure 5.) The first piece, after reflecting the last step, is an object counted by [B.sub.T+1]([x.sub.c], y), while the second piece (with its direction reversed) will be counted by (1 + [x.sub.c]) [B.sub.T]([x.sub.c], 1)/2. Thus we obtain

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

This inequality is valid in the domain of convergence of the series it involves, that is, for y < [y.sub.T+1]. Using similar arguments we can obtain the equivalent inequality for [A.sup.I.sub.T+1]([x.sub.c], y) and [P.sub.T+1]([x.sub.c], y).

Combining this decomposition for [A.sup.O.sub.T+1], [A.sup.I.sub.T+1] and [P.sub.T+1], we find for 0 [less than or equal to] y < [y.sub.T+1],

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (9)

Using (8) to eliminate the [A.sup.O], [A.sup.I] and P terms, we obtain

[c.sub.B][B.sub.T]([x.sub.c], 1) - [c.sub.B](y)[B.sub.T+1]([x.sub.c], y) [less than or equal to] ([c.sup.O.sub.A] + [c.sup.I.sub.A] + [c.sub.P]) [B.sub.T+1] ([x.sub.c], y) [B.sub.T] ([x.sub.c], 1),

and hence

0 [less than or equal to] [1/[B.sub.T+1]([x.sub.c], y)] [less than or equal to] [([c.sup.O.sub.A] + [c.sup.I.sub.A] + [c.sub.P])/[c.sub.B]] + [[c.sub.B](y)/[c.sub.B][B.sub.T]([x.sub.c], 1)]. (10)

In particular, for 0 [less than or equal to] y < [y.sub.c] = [lim.sub.T[right arrow][infinity]] [y.sub.T] and for any T,

0 [less than or equal to] [[x.sub.c]([c.sup.O.sub.A] + [c.sup.I.sub.A] + [c.sub.P])/[c.sub.B]] + [[c.sub.B](y)/[c.sub.B][B.sub.T]([x.sub.c], 1)]. (11)

Now consider what happens as T [right arrow] [infinity]. By assumption, [lim.sub.T[right arrow][infinity]] [B.sub.T]([x.sub.c], 1) = 0. Suppose (for a contradiction) that [y.sub.c] > [y.sup.[dagger]]. Then for any [y.sup.[dagger]] < y < [y.sub.c] and sufficiently large T, the RHS of (11) will be negative, because [c.sub.B](y) < 0 for y > [y.sup.[dagger]] and [B.sub.T][([x.sub.c], 1).sup.-1] will become arbitrarily large. This contradicts the inequality, and we are forced to conclude [y.sub.c] [less than or equal to] [y.sup.[dagger]], and hence [y.sub.c] = [y.sup.[dagger]].

Acknowledgements

I thank Murray Batchelor for suggesting this problem, and Tony Guttmann for helpful conversations. I received support from the ARC Centre of Excellence for Mathematics and Statistics of Complex Systems (MASCOS), as well as the Australian Mathematical Society (AustMS) in the form of a Lift-Off Fellowship. Part of this work was carried out while I was a guest of the Mathematical Sciences Research Institute (MSRI) in Berkeley, CA, during the Spring 2012 Random Spatial Processes Program, and I thank the Institute for its hospitality and the NSF (grant DMS-0932078) for its financial support.

References

M. T. Batchelor and C. M. Yung. Exact results for the adsorption of a flexible self-avoiding polymer chain in two dimensions. Phys. Rev. Lett., 74(11):2026-2029, 1995.

M. T. Batchelor, D. Bennett-Wood, and A. L. Owczarek. Two-dimensional polymer networks at a mixed boundary: Surface and wedge exponents. Eur. Phys. J. B, 5(1):139-142, 1998.

N. R. Beaton. The critical surface fugacity for self-avoiding walks on a rotated honeycomb lattice. Preprint, arXiv:1210.0274, 2012.

N. R. Beaton, M. Bousquet-Melou, J. de Gier, H. Duminil-Copin, and A. J. Guttmann. The critical fugacity for surface adsorption of self-avoiding walks on the honeycomb lattice is 1 + [square root of 2]. Preprint, arXiv:1109.0358, 2012.

H. Duminil-Copin and A. Hammond. Self-avoiding walk is sub-ballistic. Preprint, arXiv:1205.0401, 2012.

H. Duminil-Copin and S. Smirnov. The connective constant of the honeycomb lattice equals [square root of (2 + [square root of 2])] Ann. of Math., 175(3):1653-1665, 2012.

P. J. Flory. The configuration of real polymer chains. J. Chem. Phys., 17(3):303-310, 1949.

J. M. Hammersley, G. M. Torrie, and S. G. Whittington. Self-avoiding walks interacting with a surface. J. Phys. A: Math. Gen., 15(2):539-571, 1982.

N. Madras and G. Slade. The Self-Avoiding Walk. Probability and its Applications. Birkhauser, Boston, MA, 1993.

B. Nienhuis. Exact critical point and critical exponents of O(n) models in two dimensions. Phys. Rev. Lett., 49(15):1062-1065, 1982.

W. J. C. Orr. Statistical treatment of polymer solutions at infinite dilution. Trans. Faraday Soc., 43:12-27, 1947.

S. Smirnov. Discrete complex analysis and probability. In Proceedings of the International Congress of Mathematicians, vol. I, pages 595-621, Hyderabad, India, 2010. Hindustan Book Agency.

E. J. J. van Rensburg, E. Orlandini, and S. G. Whittington. Self-avoiding walks in a slab: rigorous results. J. Phys. A: Math. Gen., 39(45):13869-13902, 2006.

Nicholas R. Beaton

LIPN(UMR 7030), Universite Paris 13, 93430 Villetaneuse, France

(i) In general, it is straightforward to show [mu](y) [greater than or equal to] [y.sup.1/k], where k is the minimum number of steps required to walk from one weighted vertex to another.
COPYRIGHT 2013 DMTCS
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2013 Gale, Cengage Learning. All rights reserved.

Author: Printer friendly Cite/link Email Feedback Beaton, Nicholas R. DMTCS Proceedings Report 4EUFR Jan 1, 2013 4727 A q, t-analogue of Narayana numbers. Generalized monotone triangles: an extended combinatorial reciprocity theorem. Adsorption Lattice theory Mathematical research Phase transformations (Statistical physics) Phase transitions (Physics) Random walk theory Random walks (Mathematics)

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters