The critical points of lattice trees and lattice animals in high dimensions by Yuri Mej´ıa Miranda B.Sc. Universidad Aut´onoma del Estado de Hidalgo, 2006 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy in THE FACULTY OF GRADUATE STUDIES (Mathematics) The University Of British Columbia (Vancouver) August 2012 c Yuri Mej´ıa Miranda, 2012 Abstract We study lattice trees and lattice animals in high dimensions. Lattice trees and animals are interesting combinatorial objects used to model branched polymers in polymer science. They are also of interest in combinatorics and in the study of critical phenomena in statistical physics. The nearest-neighbor and spread-out models on the d dimensional integer lattice Zd , have edge set consisting of pairs {x, y} with x − y 1 = 1 and 0 < x − y ∞ ≤ L with L ≥ 1 fixed, respectively. On either graph, a lattice animal is a finite connected subgraph, and a lattice tree is an animal without cycles. Let tn and an be the number of lattice trees and animals with n bonds that contain the origin, respectively. Standard subadditivity arguments provide the existence of the growth 1/n constants τ = limn→∞ tn 1/n and α = limn→∞ an . We are interested in the critical points of these models, which are the reciprocals of the corresponding growth constants. We rigorously calculate the first three terms of a 1/d–expansion for the critical points of nearestneighbor lattice trees and animals. The proof follows a recursive argument similar to the one used in [20] and [24], to obtain analogous results for the critical points of self-avoiding walks and percolation. To provide the leading terms in the expansions, we use a mean-field model, related to the Galton-Watson branching process with critical Poisson offspring distribution, and results obtained with the lace expansion. The leading terms are also calculated in the spread-out model. Then we develop expansions for the nearest-neighbor generating functions and, together with the lace expansion, obtain the first and second correction terms. Our result gives a rigorous proof for previous work on the subject [11], [21, 36]. Given the algorithmic nature of the proof, it can be extended, with sufficient labor, to compute higher degree terms. It may provide the starting point for proving the existence of an asymptotic expansion with rational coefficients, for the critical point of nearest-neighbor lattice trees. ii Preface The work presented in this thesis is the result of my time as a doctoral student under the supervision of my advisor Professor Gordon Slade. The research problems were originally suggested by Professor Slade. We jointly worked on the publication: [1] Y. Mej´ıa-Miranda and G. Slade. The growth constants of lattice trees and lattice animals in high dimensions. Electronic Communications in Probability, 16:129–136, 2011. The publication is the basis for Chapter 2. The content of Section 3.2.1 and Section 3.2.2 is based on [39] and is not original work. The research presented in Section 3.1, Chapter 4 and Chapter 5, was conducted by myself and supervised by Professor Slade. iii Table of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii 1 2 3 4 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 The model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Growth constants in low dimensions . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Growth constants in high dimensions . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5 Our main result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.6 Overview of the proof and the thesis . . . . . . . . . . . . . . . . . . . . . . . . . 11 Proof of leading behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.1 Main steps in the proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2 The proof completed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Expansion methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.1 Expansion for the one-point functions . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2 The lace expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 3.2.1 The lace expansion for lattice trees . . . . . . . . . . . . . . . . . . . . . . 24 3.2.2 The lace expansion for lattice animals . . . . . . . . . . . . . . . . . . . . 30 Proof of first order correction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.1 34 Main ingredients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv 4.2 Useful estimates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 4.3 Proof of Lemma 4.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.3.1 Lattice trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.3.2 Lattice animals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Proof of Lemma 4.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Proof of second order correction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 5.1 Update of useful estimates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 5.2 Proof of Theorem 1.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5.2.1 Lattice trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5.2.2 Lattice animals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Proof of Theorem 1.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 4.4 5 5.3 6 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 v List of Tables Table 1.1 Estimates for τ and α . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Table 5.1 Possibilities for labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 vi List of Figures Figure 1.1 Embedded polymers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Figure 1.2 Flow of the proof of Theorem 1.2 . . . . . . . . . . . . . . . . . . . . . . . . 13 Figure 2.1 A lattice animal and its associated cut-tree . . . . . . . . . . . . . . . . . . . . 18 Figure 3.1 Decomposition of a lattice tree and animal . . . . . . . . . . . . . . . . . . . . 21 Figure 3.2 Decomposition of a lattice tree . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Figure 3.3 Examples of graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Figure 3.4 Connected graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 L (1) [a, b] and L (2) [a, b] Figure 3.5 Laces in . . . . . . . . . . . . . . . . . . . . . . . . 29 Figure 3.6 A connected graph and its associated lace . . . . . . . . . . . . . . . . . . . . 30 Figure 3.7 Decomposition of a lattice animal . . . . . . . . . . . . . . . . . . . . . . . . 32 Figure 4.1 Examples on the use of Sz . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Figure 4.2 Terms in the upper bound for Wz (x) . . . . . . . . . . . . . . . . . . . . . . . 41 Figure 4.3 Terms in the lower bound for Wz (x) . . . . . . . . . . . . . . . . . . . . . . . 42 (m,n) (t,1) Πz (x) Figure 4.4 Cycles contributing to . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Figure 5.1 Negligible contributions from laces . . . . . . . . . . . . . . . . . . . . . . . 78 L (2) [0, |ω|] Figure 5.2 Bounds on contributions by laces in . . . . . . . . . . . . . . . . 79 Figure 5.3 The case s1 = s2 = s3 = s4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 vii Acknowledgments My advisor, Professor Gordon Slade, has my deepest gratitude for his patient, thoughtful guidance and encouragement during the hard times. I also appreciate his careful readings of this manuscript. I would like to thank the members of my supervisory committee, particularly Edwin Perkins and David Brydges, for their comments and suggestions on this work. My career path might have been completely different without Dr. Cruz-Sampedro and Dr. Mart´ınez-Avenda˜no, my undergraduate math teachers who propelled me to pursue this dream. My family and friends have my gratitude for encouragement and support during these years of study. I specially thank Dennis, because of the immense peace and support during the last four years. Lastly, I would like to thank the support of CONACYT (Consejo Nacional de Ciencia y Tecnolog´ıa). viii Chapter 1 Introduction This chapter gives an introduction to the terminology, context and structure of this thesis. In Section 1.1 and Section 1.2, we present some of the motivation for the present work and define the models of study. In Section 1.3 and Section 1.4, we discuss some of the known results for these models in low and high dimensions, respectively. We state our main result in Section 1.5. Finally, in Section 1.6, we explain the strategy that we will follow for the proof of our main result and, at the same time, outline the structure of this thesis. 1.1 Motivation Lattice animals are finite connected subgraphs of the d-dimensional integer lattice Zd . Lattice trees are lattice animals that do not contain cycles. They are very interesting combinatorial objects that are used to model branched polymers in chemistry and physics [27]. They are also of interest in combinatorics, graph theory and in statistical physics for the study of critical phenomena, as we shall see shortly in Section 1.2. Lattice trees and lattice animals are natural models for branched polymers. A linear polymer is a large molecule that consists of atoms or groups of atoms (called monomers) joined in a sequence with chemical bonds, see Figure 1.1a. A branched polymer is a linear polymer with side-chains (set of linear polymers) attached to the monomers. A common way to model a polymer is using a graph in which the vertices represent the monomers and the edges the chemical bonds. The chemical bonds connect the monomers at determined angles. This behavior is modeled by embedding the graph in a lattice, e.g., Zd . In this context, lattice trees model branched polymers that do not have cycles, see Figure 1.1b; and lattice animals model branched polymers that may have cycles, see Figure 1.1c. 1 (a) Linear polymer (b) Lattice tree (c) Lattice animal Figure 1.1: Linear and branched polymers embedded in Z2 . 1.2 The model Our work takes place in the d-dimensional integer lattice Zd , which are the points in Rd with integer coordinates. We write (x1 , x2 , . . . , xd ) for the coordinates of a vertex (point) x ∈ Zd , and the unordered pair {x, y} for the edge (bond) joining the vertices x and y. The two graphs in which we will define the models of study have vertex set given by Zd . These are: 1. The nearest-neighbor graph has edge set consisting of pairs {x, y} with d x−y 1 := ∑ |xi − yi | = 1. i 2. The spread-out graph has edge set consisting of pairs {x, y} with 0 < x−y ∞ := max |xi − yi | ≤ L, with L fixed. 1≤i≤d These two graphs have degree 2d and (2L + 1)d − 1, respectively. Often we discuss both graphs simultaneously, and use K to denote the degree. Also we will write limK→∞ to simultaneously denote the limit as the dimension d → ∞ for the nearest-neighbor case, and the limit as L → ∞ for the spread out-case. For n ≥ 1, a walk ω of length n, or n-step walk, is a sequence (ω(0), ω(1), . . . , ω(n)) of vertices in Zd such that {ω(i), ω(i + 1)} is an edge in the corresponding (nearest-neighbor or spread-out) graph for all i = 0, . . . , n − 1. We denote the length of ω by |ω|. Let Wn (x, y) be the set of n-step walks with ω(0) = x and ω(n) = y, and let W (x, y) = n∈N Wn (x, y) denote the set of all walks that start at x and end at y. A cycle of length n, or n-step cycle, is an n-step walk with ω(0) = ω(n) and ω(i) = ω( j) for all 0 < i < j < n. The models that we study are (bond) lattice animals and lattice trees on the nearest-neighbor and spread-out graphs. On either graph, lattice animals are finite connected subgraphs and lattice 2 trees are the very interesting subset of lattice animals without cycles. Figure 1.1b and Figure 1.1c show a lattice tree and a lattice animal in Z2 , respectively. We denote a lattice tree by T and a lattice animal by A. We write C to refer simultaneously to a tree and an animal, and call C a cluster. The number of bonds contained in the cluster C, is denoted by |C|. If the vertex x is contained in the cluster C, we denote by C x. Often in our discussion, we will settle asymptotic results, therefore it is convenient to explain our notation. Let f , g : N → N, we write f (n) • f ∼ g to mean limn→∞ g(n) = 1. f (n) • f = o(g) to mean limn→∞ g(n) = 0. • f = O(g) to mean that there is a constant M > 0 and a number N such that for all n ≥ N, we have | f (n)| ≤ M|g(n)|. We denote by tn and an the number of lattice trees and lattice animals with n bonds that contain the origin of Zd , respectively. For instance, in the nearest-neighbor model, t0 = a0 = 1 (the single animal that contains the origin and has no edges), t1 = a1 = 2d, t2 = a2 = 2d(2d − 1) + (0) tn and (0) an 2d 2 , . . . . Let denote the number of lattice trees and lattice animals with n bonds, modulo translation, respectively. Then (0) tn = (n + 1)tn (0) (0) an ≤ an ≤ (n + 1)an , and (1.1) where the equality on the left is due to the fact that trees with n bonds have n + 1 vertices (so n + 1 possibilities for the origin); and the expression on the right is due to the fact that animals with n bonds have at most n + 1 vertices (so at most n + 1 options for the origin). An elementary combinatorial question is to know the values of tn and an for all n, but even in two dimensions the answer is not known for large values of n. However, standard subadditivity arguments (see [32] for trees and [31] for animals), provide the existence of the growth constants τ > 0 and α > 0, defined by (0) 1/n τ = lim tn n→∞ and (0) 1/n α = lim an n→∞ . (1.2) The growth constants depend on the dimension d, and for the spread-out model, also on L. Then (1.1) and (1.2) imply that 1/n lim tn n→∞ =τ and 1/n lim an = α. n→∞ The precise asymptotic behavior of tn and an as n → ∞ is believed to be given by tn ∼ Ct τ n n1−θt and 3 an ∼ Ca α n n1−θa , where the constants Ct , Ca , τ and α should depend upon the lattice, but the critical exponents θt and θa depend only on the dimension. This lack of dependence on the details of the model is called universality, and models with the same critical exponents are said to be in the same universality class. It is also believed that lattice trees and lattice animals belong to the same universality class, so that in particular, θt = θa = θ in every dimension. It has been proved that θt = 5 2 for lattice trees in high dimensions [19]. The bounds (0) c1 n−c2 log n τ n ≤ tn ≤ c3 n−(d−1)/d τ n , were proved in [26] and [33] respectively. This implies c1 n−c2 log n τ n ≤ tn ≤ c3 n1/d τ n . In studying tn and an , it is convenient to consider their generating functions, which we call one-point functions. These are given by ∞ g(t) (z) = ∑ tn z n and ∑ z|T | and g(a) (z) = n=0 ∞ ∑ an zn , (1.3) ∑ z|A| , (1.4) n=0 or equivalently, g(t) (z) = g(a) (z) = T 0 A 0 where the sums are over the lattice trees and the lattice animals that contain the origin, respectively. The two-point functions are defined by (t) Gz (x, y) = ∑ z|T | and (a) Gz (x, y) = T x,y z|A| , ∑ (1.5) A x,y where the sums are over the lattice trees and the lattice animals that contain the vertices x and y, (t) (a) (t) (a) respectively. We denote Gz (0, x) and Gz (0, x) by Gz (x) and Gz (x), respectively. Due to the (t) symmetries of the lattice Zd , the two-point functions in (1.5) can be rewritten as Gz (y − x) and (a) Gz (y − x), respectively. The susceptibility functions are defined as χ (t) (z) = (t) ∑ Gz (x) and χ (a) (z) = x∈Zd (a) ∑ Gz (x). (1.6) x∈Zd The critical points are the radii of convergence of the susceptibility functions. They are given in terms of the growth constants by (t) zc = τ −1 and 4 (a) zc = α −1 . The reader may have noticed that the super indices (t) and (a) in a quantity, mean that it corresponds to lattice trees and animals, respectively. However, when we omit them, the term refers to (t) (a) (t) (a) zc zc both models. For instance, zc denotes zc and zc , and Gzc (x) denotes G (t) and G (a) . It is predicted that the two-point function changes from having an exponential decay in |x| for z < zc , to a power law decay Gzc (x) ∼ const 1 |x|d−2+η , as |x| → ∞. where η is a universal critical exponent. Using the lace expansion, it was proved in [16] that the two-point function at the critical point is asymptotic to const|x|2−d as |x| → ∞, for sufficiently large dimension d. This change in the properties of the model at z = zc is characteristic of a phase transition. The critical points for lattice trees and lattice animals are the focus of our study. In the following sections of this chapter we give a brief account of several known facts for these quantities. 1.3 Growth constants in low dimensions In low dimensions the values of the growth constants have been approximated through exact enumeration of trees and animals; however, this task is non-trivial. In [28], τ = 5.1439 ± 0.0025 (1.7) was numerically estimated for the nearest-neighbor graph in Z2 , using Montecarlo methods. In [12], τ = 10.53 ± 0.07 (1.8) was numerically estimated for the nearest-neighbor graph in Z3 . In [9], the following numerical estimates are reported, log α = 1.651 ± 0.002 =⇒ 5.2018 ≤ α ≤ 5.2226, (1.9) for the nearest-neighbor graph in Z2 , and log α = 2.364 ± 0.005 =⇒ 10.5804 ≤ α ≤ 10.6867, (1.10) for the nearest-neighbor graph in Z3 . On the other hand, for (bond) lattice trees and animals in the spread out model, Penrose [38] 5 showed that, in all dimensions d ≥ 1, KK KK 5/7 − O(K log K) ≤ τ ≤ α ≤ (K − 1)K−1 (K − 1)K−1 (1.11) Notice that both the right- and left-hand sides of (1.11) are ∼ Ke as K → ∞. 1.4 Growth constants in high dimensions In the high dimensional case exact results for the growth constants are unavailable. Instead, expansions in the inverse dimension or 1/d–expansions, have been extensively studied in the physics literature. They provide approximate results in situations where more precise information is unavailable. An inverse dimension, or 1/d–expansion is an asymptotic expansion of some function f (d) in powers of 1/d, where d is the dimension. It is generally assumed that in such expansions the remainder is of the order of the first omitted term, but this is rarely proved due to the limitations of the employed techniques. These type of expansions have been obtained for the closely related models of self-avoiding walks (SAW) and percolation. These models are of great relevance in the fields of combinatorics, probability theory, statistical physics and polymer chemistry. See [34], for an extensive study of self-avoiding walks, and [15] for an introduction to percolation. Self-avoiding walks model linear polymers, see Figure 1.1a. Mathematically, a self-avoiding walk is a walk ω = (ω(0), ω(1), . . . , ω(|ω|)) in Zd that satisfies ω(i) = ω( j) for all i = j. Let cn denote the number of n-step self-avoiding walks starting at the origin. It is well known that the 1/n connective constant µ := limn→∞ cn exists [34]. For nearest-neighbor self-avoiding walks, it was proved in [20] that the connective constant has an asymptotic expansion ∞ µ∼ mi (as d → ∞), i i=−1 (2d) ∑ with mi ∈ Z for all i. The first thirteen coefficients in this expansion are now known [7], and it appears likely that the series ∑i mi xi has radius of convergence equal to zero. It may however be Borel summable, and a partial result in this direction is given in [14]. The percolation model can be thought intuitively as a model for a liquid passing through a porous material, like water going through the soil in a flowerpot. Since the liquid penetrates the medium depending on the porosity, one of the basic questions that we can ask is whether it percolates. In our example, this could be whether the water ever reaches the root of the plant we are watering. To model this situation, we think of the material (soil) as given by the nearest-neighbor model or spread out model in Zd . To each bond {x, y} we associate an independent Bernoulli random variable n{x,y} , which takes the value of 1 with probability p and the value of 0 with probability 1 − p, where p is a parameter in [0, 1] that corresponds to the porosity in our example. We say that 6 the edge {x, y} is open , if the random variable n{x,y} = 1, and closed , otherwise. We think of an open edge as being open to the transit of the liquid. A configuration is a realization of the random variables for all edges. We denote by P p the joint probability distribution of the bond variables. Given a configuration and two vertices x and y, we say that x and y are connected, denoted x ↔ y, if there is a path joining x and y consisting of open bonds, or if x = y. The open cluster C(x) is the random set of vertices connected to x, we denote its cardinality by |C(x)|. The principal object of study is the percolation probability θ (p) given by θ (p) = P p (|C(0)| = ∞). The critical probability is defined as pc = pc (d) := sup {p : θ (p) = 0} . The critical probability pc for nearest-neighbor bond percolation has been a much studied object in literature. It has been proved by several authors that the leading order term, as d → ∞, of pc (d) is (2d)−1 . However, Bollob´as and Kesten [30], Hara and Slade [17], Kohayakawa [4], Gordon [13] and Alon, Benjamini and Stacey [2] derived different bounds for the error term. Currently the best rigorous result is pc (d) = 1 1 7 + + + O (2d)−4 , 2 2d (2d) 2(2d)3 which was established in [20, 24] using the lace expansion. Moreover, this same technique was used in [23] to prove the existence of an asymptotic expansion for pc of the form ∞ qi , i i=1 (2d) pc (d) ∼ ∑ where the coefficients qi are rational numbers. It is believed that this expansion has radius of convergence equal to zero, but there is no proof of this. Some related results for spread-out models of percolation and self-avoiding walks are obtained in [22, 37, 38]. In particular, using the lace expansion, it is shown in [22] that when d > 4 for selfavoiding walks and d > 6 for percolation, and L is sufficiently large, the critical points are given by 1+ c 1 +O d d+1 L L , where c is a model-dependent constant. For lattice trees and lattice animals, it is shown in [18] that the one-point functions at criticality (t) g(t) (zc ) (a) and g(a) (zc ) are finite (in fact, at most 4) in sufficiently high dimensions for the nearest- 7 neighbor model, and for the spread-out model in dimensions d > 8 if L is large enough, and that in (t) (a) these two limits, the critical points zc and zc obey the equations (t) (t) (a) (a) lim Kzc g(t) (zc ) = lim Kzc g(a) (zc ) = 1. K→∞ K→∞ (1.12) This is discussed for the nearest neighbor model in [16] (see, in particular, [16, (1.31)]). A more detailed discussion is found in [39]. The behavior of the growth constants τ and α in the nearest-neighbor model, as d → ∞, has been extensively studied in the physics literature. For τ, the expansion τ = σ e exp − 11 8 1 85 1 931 1 2777 1 − − − +··· − 2 3 4 2σ 3σ 12 σ 20 σ 10 σ 5 where σ = 2d − 1 (1.13) is reported in [11], but without a rigorous estimate for the error term. This raises the question of whether there exists an asymptotic expansion for τ of the form ∞ e ri , i (2d) i=−1 ∑ with ri ∈ Q. For α, the series 85 1 1 931 139 1 11 8 1 1 1 − − − − − − − 2 2 3 2σ 3 2e σ 12 4e σ 20 48e 8e σ 4 2777 177 29 1 − + − +··· 2 10 32e 12e σ 5 α = σ e exp − (1.14) was derived in [21, 36], again without a rigorous error estimate; here the role of the transcendental number e is more delicate. Expansions (1.13) and (1.14) yield the estimates for τ and α in Table 1.1. Comparing these results to (1.7)–(1.10), we notice that the more terms we consider in the expansion does not necessarily give a better estimate. However, we must recall that these expansions are for dimension d high. τ α d 2 3 2 3 1 term 6.9029 12.298 6.9029 12.298 2 terms 5.1328 11.0538 5.2388 11.1354 3 terms 3.9484 10.4448 4.0436 10.5297 4 terms 2.2225 9.6951 2.3067 9.7909 5 terms 0.7088 8.8708 0.7305 8.9535 Table 1.1: Estimates for τ and α for dimensions d = 2 and 3, taking into account 1, 2, 3, 4 and 5 terms in expansions (1.13) and (1.14) 8 On the other hand, expansions (1.13) and (1.14) would imply that the critical points satisfy (t) 309 619103 543967 3 115 1 + 2 2 + 24 3 + 16 4 + 57605 + 768 6 + . . . . 2d (2d) (2d) (2d) (2d) (2d) (a) 3 1 + 2 2+ 2d (2d) zc = e−1 zc = e−1 − 12 e−1 + (2d)3 115 24 − 2e−1 + (2d)4 −1 − 113 12 e (2d)5 309 16 + (1.15) 619103 5760 543967 768 −1 − 55 e−2 − 395 12 e 24 +.... (2d)6 (1.16) In [35] we provide a rigorous confirmation of the leading terms in (1.15)–(1.16). This is the content of Theorem 1.1 below, whose proof will be presented in Chapter 2. Theorem 1.1. For the nearest neighbor model as d → ∞, and for the spread-out model in dimensions d > 8 as L → ∞, (t) zc ∼ 1 Ke and (a) zc ∼ 1 , Ke (1.17) and, in these same limits, (t) (a) lim g(t) (zc ) = lim g(a) (zc ) = e. K→∞ K→∞ (1.18) The main step in the proof of Theorem 1.1 is to establish a connection between the critical points and the one-point functions of lattice trees and animals, to the analogous quantities of a mean-field model. This mean-field model (see [5, 39]), is related to the Galton–Watson branching process with critical Poisson offspring distribution. The advantage of using it is that the values of the critical point and the one-point function at criticality are known. In other developments, the relation with the mean-field model is reflected by the super-Brownian scaling limits proved for lattice trees in high dimensions [8, 25]. The proof of Theorem 1.1 uses a lace expansion result by Hara and Slade [16, 18]. However, the lace expansion technique is not explicitly used. No bound on the rate of convergence is obtained for either (1.17) or (1.18). To our knowledge, Theorem 1.1 is new for the nearest-neighbor model. Although for the spreadout model, Penrose’s result given in (1.11) is stronger, since it gives the asymptotic result (1.17) without the restriction d > 8 and including error estimates. In fact, if we combine (1.11) and (1.12), we get (1.18) for the spread-out model in dimensions d > 8. A similar result to Theorem 1.1, was proved for the related models of nearest-neighbor (site) trees and (site) animals in [1] and [3], respectively. A nearest-neighbor site animal is a connected section graph of the lattice, i.e., for each pair of vertices v1 and v2 in a site animal, which differ by one in exactly one coordinate, the edge e = (v1 , v2 ) must be in the site animal. In [1] and [3], using very different methods than ours, it is proved that the corresponding growth constants are 2de − o(d), as d → ∞. 9 1.5 Our main result The main result of the thesis is the rigorous calculation of the first three terms in a 1/d–expansion for the critical points of nearest-neighbor lattice trees and animals. This is specifically stated in the following theorem. Theorem 1.2. In the nearest neighbor model, as d → ∞, (t) 3 115 1 + 2 2 + 24 3 + o (2d)−3 2d (2d) (2d) (a) 3 1 + 2 2+ 2d (2d) zc = e−1 zc = e−1 − 21 e−1 + o (2d)−3 . (2d)3 115 24 (t) (1.19) (a) Remark 1.3. The coefficients in the expansions for zc and zc given in (1.19) agree with the ones predicted in (1.15) and (1.16). Moreover, in our proof, the appearance of − 12 e−1 in the third term (a) of zc is due to the animals that have a 4-step cycle containing the origin. This of course cannot occur in the lattice tree case. The proof is based on a recursive argument similar to the one used in [20] and [24], where 1/d– expansions for the critical points of self-avoiding walks and percolation were obtained, respectively. The procedure uses the first n terms to compute the (n +1)th term in the 1/d-expansion. The starting point is Theorem 1.1, which provides the leading term in the expansion of zc . The following two steps in the reasoning yield the second and third terms in the expansion. They extensively use the lace expansion and the results obtained with this method in [16]. The lace expansion for lattice trees and animals will be discussed in Chapter 3. This technique gives, among other things, implicit formulas for the critical points of several models like self-avoiding walks, percolation, and of course lattice trees and animals. It is the core of the argument for obtaining the 1/d–expansions for the critical points of self-avoiding walks and percolation that we mentioned before. However, unlike these two models, the formula for zc includes the corresponding critical one-point function g(zc ). This fact increments significantly the level of difficulty of our problem. To tackle this challenge we developed a new approach that consists in 1. Finding an expansion for the one-point function g(zc ), such that the resulting expression resembles the one given by the lace expansion for the two-point function. This allows us to use analogous methods to this technique to bound error terms. 2. Combining the formula for zc and the expansion for g(zc ) in a convenient way. In the following section we describe the strategy that will lead us to the proof of Theorem 1.2. 10 1.6 Overview of the proof and the thesis In this section we explain the strategy that we will follow to prove Theorem 1.2, and at the same time describe the organization of the thesis. We commence by defining the quantities needed. The Fourier transform of an absolutely summable function f : Zd → C is defined by fˆ(k) = ∑ f (x)eik·x , (1.20) x∈Zd where k ∈ [−π, π]d and k · x = ∑dj=1 k j x j . The inverse Fourier transform is given by f (x) = [−π,π]d dd k . fˆ(k)e−ik·x (2π)d (1.21) Once equipped with these definitions, we can see that the susceptibility function defined in (1.6), is also equivalent to χ(z) = Gˆ z (0). The lace expansion is one of the main ingredients in the proof of Theorem 1.2. As we will discuss in Chapter 3, this technique involves a sequence of inclusion-exclusion steps and a process of resummation that results in an expansion for the two-point function, in terms of the one-point ˆ z (0) (see equation (3.25) for trees and equation function and the Fourier transform of a function Π (3.41) for animals). The Fourier transform of this expansion evaluated at 0 is χ(z) = Gˆ z (0) = ˆ z (0) g(z) + Π . ˆ z (0) 1 − 2dz g(z) + Π (1.22) Using that the critical point zc is the value of z such that the denominator in (1.22) vanishes [16, (1.30)], i.e., ˆ zc (0) = 0, 1 − 2dzc g(zc ) + Π (1.23) we get the following implicit formula for the critical point zc zc = 1 1 , ˆ zc (0) 2d g(zc ) + Π (1.24) which will be one of the key ingredients in the proof of Theorem 1.2. The demonstration of Theorem 1.2 follows a recursive argument in which the calculation of the terms in the expansion for zc is intertwined with the computation of the terms in the expansions for ˆ zc (0) and g(zc ), given in Theorem 1.4 and Theorem 1.5 below. The route that will the quantities Π lead us to the proof of Theorem 1.2 is as follows. In Chapter 2, we will prove Theorem 1.1, which is the starting point of the recursive argument. Theorem 1.1 establishes the leading term for the one-point function g(zc ) and the critical point zc . 11 For the nearest-neighbor model, these are given by g(z) = e + o (1) 1 1 +o 2de 2d zc = and , as d → ∞. It is worth noticing that Theorem 1.1 also gives analogous results for the spread-out model. However, in the remaining chapters we restrict our work to the nearest-neighbor model. In the proof of Theorem 1.1 we use the following estimates ˆ zc (0) = o (1) Π and lim 2dzc g(zc ) = 1, d→∞ obtained in [16, (1.23)] and [16, (1.30)], respectively, using the lace expansion. In Chapter 3, we will develop a new expansion for the one-point function that will allow us to study it at criticality, and present some fundamental facts for the lace expansion technique for lattice trees and lattice animals. In particular, we will see that the lace expansion technique gives an expansion for the two-point function whose Fourier transform, evaluated at 0, is given in (1.22). ˆ zc (0) given below in TheoIn Chapter 4, we will compute the first term in the expansion for Π rem 1.4. Then we will calculate the second term in the expansion of the one-point function g(zc ) given below in Theorem 1.5. Finally, using formula (1.24), we will get the first order correction of zc , which is the second term in the expansion for zc in Theorem 1.2. In Chapter 5, all the previous information will allow us to calculate the second term in the ˆ zc (0). following expansion of Π Theorem 1.4. In the nearest neighbor model, as d → ∞, 27 e 3e 1 ˆ (t) Π − 2 2 +o (t) (0) = − zc 2d (2d) (2d)2 (1.25) 3e 27 e − 23 1 Π (a) (0) = − − 2 +o zc 2d (2d)2 (2d)2 ˆ (a) . Then we will be able to compute the third term in the following expansion for the one-point function g(zc ). Theorem 1.5. In the nearest neighbor model, as d → ∞, (t) g(t) (zc ) = e + g (a) (a) (zc ) = e+ 3 2e 2d 3 2e 2d + 263 24 e (2d)2 + 263 24 e − 1 (2d)2 +o 1 (2d)2 , 1 +o (2d)2 (1.26) . ˆ zc (0) and g(zc ) in the formula for zc given in (1.24), yields Substituting these expansions for Π the second order correction of the critical point as follows. 12 Proof of Theorem 1.2. By (1.24), (1.25) and (1.26), for the critical point of nearest-neighbor lattice trees we have 1 (t) zc = (t) (t) ˆ (t) (0) 2d g(t) (zc ) + Π 3 2 61 24 2de 1 − 2d − (2d) 2 +o zc = e−1 1 = 3 115 1 1 + 2 2 + 24 3 + o 2d (2d) (2d) (2d)2 1 (2d)2 , as d → ∞. And for the critical point of nearest-neighbor lattice animals, (a) zc = = 1 = 1 61 3 (a) −1 ˆ (a) 2d g(a) (zc ) + Π 2de 1 − 2d2 − 24(2d)2e2 (a) (0) zc 115 3 − 1 1 1 e−1 + 2 2 + 24 32e + o , as 2d (2d) (2d) (2d)2 +o 1 (2d)2 d → ∞. Therefore, it only remains to show Theorem 1.1, Theorem 1.4 and Theorem 1.5. This is the main content of the following chapters, which we summarize in Figure 1.2. Chapter 2: Leading terms Chapter 4: First order correction Chapter 5: Second order correction Figure 1.2: Flow of the proof of Theorem 1.2. The indicator function Ia takes the value of 1 for the case of lattice animals and 0 for the case of lattice trees. 13 Chapter 2 Proof of leading behavior In this chapter we present the proof of Theorem 1.1, which we published in [35]. This theorem gives the leading order behavior of zc and g(zc ) for both lattice trees and lattice animals in the nearestneighbor model and the spread out model. In Section 2.1 we assume Lemma 2.1 and Proposition 2.2 below, and prove Theorem 1.1. In Section 2.2 we prove these two key results. 2.1 Main steps in the proof We define z0 := 1 , Ke (2.1) where K, as stated before, represents the degree of both the nearest-neighbor and spread-out graphs on Zd . The proof of Theorem 1.1 uses the following two ingredients: Lemma 2.1. In all dimensions d ≥ 1, and for the nearest-neighbor or spread-out models, (t) (a) zc ≥ zc ≥ z0 = 1 . Ke Proposition 2.2. For the nearest-neighbor model, or for the spread-out model in dimensions d ≥ 1, lim g(t) (z0 ) = e, K→∞ where the notation limK→∞ means the limit as the dimension d → ∞ for the nearest-neighbor case, and the limit as L → ∞ for the spread out-case. Since, by definition, a lattice tree is a lattice animal, we have τ ≤ α, which implies that the critical points obey (t) (a) zc ≥ zc . 14 In fact, the strict inequality τ < α is known [10]. Therefore, the main content of Lemma 2.1 is that (a) zc ≥ z0 , or, equivalently, that α ≤ Ke. This fact is presumably well-known, though we did not find an explicit proof in the literature. Klarner [31] proves that for 2-dimensional nearest-neighbor site animals the growth constant is at most 27/4 = 33 /22 , and Penrose [38] states that this can be generalized to the upper bound α ≤ K K /(K − 1)K−1 ∼ Ke for bond animals on an arbitrary regular graph. We will provide an elementary proof that α ≤ Ke in Section 2.2, both to be self-contained and because elements of the proof are also useful elsewhere in our approach. At this stage we assume Lemma 2.1 and Proposition 2.2, whose proof we deferred to Section 2.2, and show Theorem 1.1. Proof of Theorem 1.1. We will prove that, under the hypotheses of Theorem 1.1, (t) lim g(t) (zc ) = e. (2.2) K→∞ It then follows from (1.12) that (t) zc ∼ z0 . Lemma 2.1 then implies that (a) zc ∼ z0 , and finally (1.12) implies that (a) lim g(a) (zc ) = e, K→∞ which are the desired results. Thus Theorem 1.1 will follow, once we prove (2.2). Proposition 2.2 gives that 1 = limK→∞ e−1 g(t) (z0 ) which together with (1.12) imply, (t) (t) lim Kzc g(t) (zc ) − e−1 g(t) (z0 ) = 0. K→∞ (t) (t) By adding and subtracting limK→∞ Kz0 g(t) (zc ) = limK→∞ e−1 g(t) (zc ), this expression can be rewritten as (t) (t) (t) lim K zc − z0 g(t) (zc ) + e−1 g(t) (zc ) − g(t) (z0 ) K→∞ = 0. By Lemma 2.1 and the monotonicity of g(t) in z, both terms in the limit are non-negative. Therefore, the two of them vanish in the limit, and in particular, (t) lim (g(t) (zc ) − g(t) (z0 )) = 0. K→∞ With Proposition 2.2, this gives (2.2) and completes the proof. 15 It remains to prove Lemma 2.1 and Proposition 2.2, and this is what we do in the next section. 2.2 The proof completed We will make use of the following mean-field model (see [5, 39]), which is related to the GaltonWatson branching process with critical Poisson offspring distribution. ˜ Let Tn denote the set of n-edge rooted plane trees [40], and let T = ∞ n=0 Tn . Given T ∈ T , d we consider mappings ϕ : T˜ → Z with the property that ϕ maps the root to the origin, and maps each other vertex of T˜ to a neighbor of its parent (nearest-neighbor or spread-out, depending on the setting); the set of such mappings is denoted Φ(T˜ ). There is no self-avoidance constraint. By definition, for T˜ ∈ Tn , the cardinality of Φ(T˜ ) is K n . We may interpret the image of T˜ under ϕ as a multigraph (a graph whose edges may have the same end vertices) without loops, and we refer to the pair (T˜ , ϕ) as a mean-field configuration. The set of all mean-field configurations (T˜ , ϕ) with T˜ ∈ Tn is denoted Mn . Let ξi denote the number of children for vertex i; this is the degree of the root when i is the root of T˜ and otherwise it is the degree of i minus 1. For n ≥ 0, let 1 fn = 1 ∑ ∏ ξi ! = K n ∑ ∏ ξi ! , (T˜ ,ϕ)∈Mn i∈T˜ (2.3) T˜ ∈Tn i∈T˜ where the second equality follows from the fact that Φ(T˜ ) has K n elements. Let |T˜ | denote the number of edges in T˜ . Then the generating function for { fn } is ∞ 1 ˜ ∑ fn zn = (Kz)−1 ∑ (Kez)|T |+1 ∏ eξi ! . (2.4) i∈T˜ T˜ ∈T n=0 ˜ In this expression notice that the factor e−|T |−1 appears in the last product since it is over the vertices in T˜ , which are one more than the number of edges. Moreover, since P(T˜ ) = ∏i∈T˜ (eξi !)−1 is the probability that T˜ arises as the family tree of a Galton–Watson branching process with critical Poisson offspring distribution, it follows from (2.4) that ∞ ∑ fn zn0 = e ∑ n=0 P(T˜ ) = e. (2.5) T˜ ∈T The relation with the critical Poisson branching process can easily be exploited further (see, e.g., [5, Theorem 2.1]) to obtain ∞ ∑ n=0 nn−1 (Kz)n . n! n=1 ∞ fn zn = (Kz)−1 ∑ 16 The series on the right-hand side converges if and only if |Kez| ≤ 1, by Stirling’s formula, and hence 1/n lim fn n→∞ = Ke = 1 . z0 (2.6) Let Ln denote the set of n-bond lattice trees containing the origin; its cardinality is tn . We will use the fact, proved in [5, (5.5)], that for every L ∈ Ln , 1 ∏ ξi ! = 1. ∑ (2.7) (T˜ ,ϕ)∈Mn :ϕ(T˜ )=L i∈T˜ The proof of (2.7) in [5] is given for the nearest-neighbor model, but it applies without change also to the spread-out model. By summing (2.7) over L ∈ Ln , we obtain tn ≤ f n , 1/n and hence τ ≤ limn→∞ fn (2.8) (t) = Ke. This gives the inequality zc ≥ z0 , which is weaker than the (a) inequality zc ≥ z0 that we seek in Lemma 2.1. (t) (a) Proof of Lemma 2.1. Recall that the inequality zc ≥ zc z0 = (Ke)−1 follows from tn ≤ an , and the equality (a) holds by definition, so it suffices to prove that zc ≥ z0 . By (2.6), for this it suffices to prove that an ≤ fn . (2.9) To prove this, we adapt the proof of (2.7) from [5]. The first step involves a unique determination of a tree structure within a lattice animal. For this, we order all bonds in the infinite lattice lexicographically. Also, we regard a bond as an arc joining the vertices of its endpoints, and we order the two halves of this arc as minimal and maximal. These orderings are fixed once and for all. Given a lattice animal A, suppose that it contains c cycles. Choose the minimal bond whose removal would break a cycle, and remove its minimal half from the animal. Repeat this until no cycles remain. The result is a kind of lattice tree, which we will call the cut-tree A∗ , in which c leaves are endpoints of half edges. See Figure 2.1. Recall that An denotes the set of n-bond lattice animals that contain the origin. Let An∗ denote the set of n-bond cut-trees that can be produced from a lattice animal in An by this procedure. By construction, lattice animals and cut-trees are in one-to-one correspondence, so An∗ has cardinality an . We may regard the edges of T˜ ∈ T as directed away from the root, and we write a directed edge as (i, i ). Given A∗ ∈ An∗ and (T˜ , ϕ) ∈ Mn , we say that ϕ(T˜ ) = A∗ if (i) each bond in A is the image of a unique edge in T˜ under ϕ, and if, in addition, (ii) if (b+ , b− ) is a directed bond in A from which the half-bond containing b− is removed in A∗ , and if the edge of T˜ that is mapped by ϕ to (b+ , b− ) is (i, i ), then i is a leaf of T˜ . Roughly speaking, the condition ϕ(T˜ ) = A∗ means that the mapping 17 A∗ A Figure 2.1: A lattice animal A and its associated cut-tree A∗ . ϕ “folds” T˜ over A∗ in such a way that the tree structure of T˜ is preserved in A∗ . We claim that for every A∗ ∈ An∗ , 1 ∏ ξi ! = 1. ∑ (2.10) (T˜ ,ϕ)∈Mn :ϕ(T˜ )=A∗ i∈T˜ This implies that an = ∑ 1 1 ∏ ξi ! ≤ ∑ ∏ ξi ! = fn , (T˜ ,ϕ)∈Mn :ϕ(T˜ )∈An∗ i∈T˜ (T˜ ,ϕ)∈Mn i∈T˜ which is the required inequality (2.9). Thus it suffices to prove (2.10). To prove (2.10), we adapt the proof of (2.7) from [5], as follows. Let b0 be the degree of 0 in A∗ , and given a nonzero vertex x ∈ A∗ , let bx be the degree of x in A∗ minus 1 (the forward degree of x). Then the set {bx : x ∈ A∗ } (with repetitions) must be equal to the set {ξi : i ∈ T˜ } (with repetitions) for any T˜ such that ϕ(T˜ ) = A∗ . Defining ν(A∗ ) to be the cardinality of {(T˜ , ϕ) : ϕ(T˜ ) = A∗ }, (2.10) is therefore equivalent to ν(A∗ ) = ∏ bx !. (2.11) x∈A∗ We prove (2.11) by induction on the number N of generations of A∗ , i.e., the number of bonds or half-bonds in the longest self-avoiding path in A∗ starting from the origin. The identity (2.11) clearly holds if N = 0. Our induction hypothesis is that (2.11) holds if there are N − 1 or fewer generations. Suppose A∗ has N generations, and let A∗1 , . . . , A∗b0 denote the cut-trees resulting by deleting from A∗ the origin and all bonds and half-bonds incident on the origin. We regard each A∗a as rooted at the 0 non-zero vertex in the corresponding deleted bond. It suffices to show that ν(A∗ ) = b0 ! ∏ba=1 ν(A∗a ), since each A∗a has fewer than N generations. To prove this, we note that each pair (T˜ , ϕ) with ϕ(T˜ ) = A∗ induces a set of (T˜a , ϕa ) such that ϕa (T˜a ) = A∗a . This correspondence is b0 ! to 1, since (T˜ , ϕ) is determined by the set of (T˜a , ϕa ), up 0 to permutation of the branches of T˜ at its root. This proves ν(A∗ ) = b0 ! ∏ba=1 ν(A∗a ), and completes the proof of the lemma. 18 Lemma 2.3. For the nearest-neighbor or spread-out models (the latter in all dimensions d ≥ 1), for each fixed n ≥ 0, tn = ∑ K→∞ K n T˜ ∈T lim 1 ∏ ξi ! . n i∈T˜ Proof. By (2.7), tn = 1 1 ∏ ξi ! = ∑ ∏ ξi ! ∑ (T˜ ,ϕ)∈Mn :ϕ(T˜ )∈Ln i∈T˜ T˜ ∈Tn i∈T˜ 1. ∑ ϕ∈Φ(T˜ ):ϕ(T˜ )∈Ln (2.12) Given T˜ ∈ Tn , the cardinality of Φ(T˜ ) is K n , so there are at most K n nonzero terms in the above sum over ϕ. On the other hand, there are at least K(K − 1) · · · (K − n + 1) nonzero terms. To see this, consider the mapping ϕ of T˜ to proceed in a connected fashion to map the edges of T˜ one by one to bonds in Zd , starting from the root. The first edge of T˜ can be mapped to any one of K possible bonds. The second edge of T˜ includes one of the vertices of the first edge, and to avoid the image of the other vertex of the first edge, it can be mapped to any one of K − 1 possible edges. In this way, as ϕ proceeds from the root to map vertices of T˜ into Zd , the restriction that the image contain n + 1 distinct vertices allows K choices for the first bond, K − 1 choices for the second bond, at least K − 2 for the third, at least K − 3 for the fourth, and so on. This implies that 1 K(K − 1) · · · (K − n + 1) 1 ∑ ∏ ξi ! ≤ tn ≤ K n ∑ ∏ ξi ! , T˜ ∈Tn i∈T˜ T˜ ∈Tn i∈T˜ and the desired conclusion follows. Proof of Proposition 2.2. By (2.8), (2.3) and (2.1), tn zn0 ≤ fn zn0 = e−n 1 ∑ ∏ ξi ! , T˜ ∈Tn i∈T˜ n which is independent of K. Also, by (2.5), ∑∞ n=0 f n z0 = e. Hence, by Lemma 2.3 and the dominated convergence theorem, we have lim g(t) (z0 ) = K→∞ ∞ ∞ lim tn zn0 = ∑ K→∞ n=0 ∑ n=0 19 ∑ T˜ ∈Tn 1 ∏ ξi ! i∈T˜ e−n = ∞ ∑ fn zn0 = e. n=0 Chapter 3 Expansion methods In this chapter we present the expansions for the quantities needed in the proof of Theorem 1.2. Since this theorem exclusively involves nearest-neighbor lattice trees and animals, the results obtained in this chapter are only valid for the nearest-neighbor model. However, with minor modifications, the results on the lace expansion can be extended to the spread-out model, see [39]. In Section 3.1, we develop a new expansion for the one-point function g(z). This expansion is one of the key ingredients that will allow us to study the behavior of the one-point function, at criticality, in subsequent chapters. In Section 3.2, we present the lace expansion technique for lattice trees and lattice animals. We follow the ideas developed by Hara and Slade in [16] and [39], but do not give a detailed explanation of the derivation. We will discuss the main quantities that contribute to this technique, and omit a few of the technicalities which can be consulted in [39]. 3.1 Expansion for the one-point functions In this section, we develop a new expansion for the one-point functions of lattice trees and lattice animals, simultaneously. The expansions will be obtained by a systematic use of inclusion-exclusion. In the case of g(a) (z), it is convenient to separate the sum over the lattice animals depending on whether the origin is contained in a cycle or not, which we denote by 0 ∈ cycle and 0 ∈ cycle, respectively. Then we get g(a) (z) = ∑ z|A| = ∑ A 0 A 0 0∈cycle z|A| + ∑ z|A| . (3.1) A 0 0∈cycle The one-point function for trees and the sum over animals in which the origin does not belong to a cycle in (3.1), have a similar behavior. To see this, suppose that a tree T (respectively, an animal A) contains the origin and m of its 2d nearest neighbors. Then T (A) consists of the m edges incident to the origin and m non-intersecting trees (animals) emanating from these edges. The non-intersection 20 restriction guarantees that, indeed, the origin is not part of a cycle for the case of lattice animals. This observation allows us to rewrite the one-point function, for both lattice trees and lattice animals (1.4), as g(z) = ∑ z|C| = ∑ C 0 z|C| + Ia ∑ z|C| , (3.2) C 0 0∈cycle C 0 0∈cycle where the clusters C are lattice trees or lattice animals depending on which model we consider, and the indicator function Ia takes the value 1 for the case of lattice animals, and the value 0 for the case of lattice trees. We will use inclusion-exclusion to expand the first term on the right-hand side of (3.2), but will not expand the second one. Let C0 = {0} be the cluster that only contains the origin. We count a factor of z for every one of the m edges incident to the origin, attach a cluster Ci to each one of these edges, count a factor of z for every edge in these clusters, and discard the contributions in which the attached clusters intersect C0 or each other. See Figure 3.1 for a depiction of such a decomposition of a lattice tree and a lattice animal containing the origin. (a) Lattice tree (b) Lattice animal Figure 3.1: Decomposition into the edges connecting 0 to its nearest neighbors si and the nonintersecting clusters Ci attached to them. This procedure yields that ∑ z|C| = C 0 0∈cycle zm ∑ m=0 m! s1 ,...,sm ∈E ∞ ∑ ∑ z|C1 | · · · C1 s1 ∑ Cm sm z|Cm | ∏ (1 + Vi, j ) , (3.3) 0≤i< j≤m where E = {e1 , e2 , . . . , e2d } is the set of the 2d nearest-neighbors of the origin ordered such that ei = (0, . . . , 1, 0, . . . , 0), with 1 located at the i-th coordinate for 1 ≤ i ≤ d, and ei = −ei−d for d + 1 ≤ i ≤ 2d; and for 0 ≤ i < j ≤ m and a set C = {C0 , . . . ,Cm } of m + 1 clusters, the function Vi, j = Vi, j (C) is given by −1 Vi, j (C) = 0 if clusters Ci and C j share a common vertex if clusters Ci and C j share no common vertex. 21 Remark 3.1. The sum in (3.3) is a finite sum since the terms vanish for m > 2d. The function V0, j ensures that the cluster C j does not contain the origin, while Vi, j , that the clusters Ci and C j do not intersect each other, in particular, excluding the possibility that si = s j . We will expand the product ∏0≤i< j≤m (1 + Vi, j ) in (3.3), and group the summands in a special way. We want to identify the factors Vi j that have label i = 0, since, as we will see, the cluster C0 = 0 plays an important role. We start by noticing that Claim 3.2. For a positive integer n, n n n ∏ (1 + xi ) = 1 + ∑ xi i=1 i=1 ∏ (1 + x j ) , (3.4) j=i+1 with the convention that the empty product in the second term on the right-hand side is equal to 1. Proof of Claim 3.2. We follow an inductive argument. For n = 1 the formula clearly holds. Assuming it is true for n, the case for n + 1 is given by n+1 n+1 n+1 n+1 ∏ (1 + xi ) = (1 + x1 ) ∏ (1 + xi ) = ∏ (1 + xi ) + x1 ∏ (1 + xi ) i=1 n+1 i=2 n+1 = 1 + ∑ xi i=2 ∏ j=i+1 i=2 i=2 n+1 n+1 n+1 (1 + x j ) + x1 ∏ (1 + xi ) = 1 + ∑ xi i=2 i=1 (1 + x j ) . ∏ j=i+1 We can iterate the result in (3.4) by applying it to the product that appears on its right-hand side and obtain n n ∏ (1 + xi ) = 1 + ∑ xi i=1 i=1 n n ∏ j=i+1 n (1 + x j ) = 1 + ∑ xi 1 + i=1 n n = 1 + ∑ xi + ∑ i=1 ∑ n xj j=i+1 n ∑ (1 + xk ) ∏ k= j+1 n xi x j i=1 j=i+1 ∏ (3.5) (1 + xk ) . k= j+1 Using this expression we rewrite the product ∏0≤i< j≤m (1 + Vi, j ) as ∏ (1 + Vi, j ) = 1 + 0≤i< j≤m ∑ Vi, j + 0≤i< j≤m ∑ 0≤i< j≤m m = 1 + ∑ V0, j + j=1 ∑ Vi, j + 1≤i< j≤m ∑ Vi, j Vk,l ∑ 0≤i< j≤m ∏ (1 + V p,q ) (p,q)∈Ak,l (k,l)∈Ai, j ∑ (k,l)∈Ai, j Vi, j Vk,l ∏ (1 + V p,q ) , (p,q)∈Ak,l (3.6) where the set Ai j = Ai j (m) = {(i, l) : j < l ≤ m} ∪ {(k, l) : i < k < l ≤ m}. 22 (3.7) In the second equality of (3.6) we have only separated the terms in the first sum that correspond to i = 0 and i > 0. Substituting (3.6) into (3.3) yields ∑ z|C| = C 0 0∈cycle zm ∑ m=0 m! s1 ,...,sm ∈E ∞ ∑ z|C1 | · · · ∑ C1 s1 Cm sm m × 1 + ∑ V0, j + j=1 z|Cm | ∑ ∑ Vi, j + 1≤i< j≤m ∑ Vi, j Vk,l ∑ 0≤i< j≤m (k,l)∈Ai, j ∏ (1 + V p,q ) (3.8) (p,q)∈Ak,l = A(z) + B(z) +C(z) + E(z), where the four terms in the last line arise from distributing the product among the four terms within parentheses in the second line (in that order). Therefore, substituting (3.8) into (3.2) yields g(z) = A(z) + B(z) +C(z) + E(z) + Ia ∑ z|C| , (3.9) C 0 0∈cycle which is the expansion for g(z) that will allows to study it at criticality in the following chapters. The term A(z) can be immediately computed. Indeed, by definition, and (1.4), zm ∑ m=0 m! s1 ,...,sm ∈E ∞ A(z) = ∑ ∑ z|C1 | · · · C1 s1 z|Cm | = ∑ Cm sm zm (2dg(z))m = e2dzg(z) . m! m=0 ∞ ∑ (3.10) The term B(z) can be simplified by exchanging the order of the sums over the nearest-neighbors s1 , . . . , sm and the label j, as follows zm ∑ m=1 m! s1 ,...,sm ∈E ∞ B(z) = ∑ ∑ z|C1 | · · · C1 s1 ∑ z|Cm | m ∑ V0, j , j=1 Cm sm m zm (2dg(z))m−1 ∑ ∑ ∑ z|C j | =− ∑ j=1 s j ∈E C j s j ,0 m=1 m! ∞ ∞ =− ∑ zm m=1 m! (3.11) (2dg(z))m−1 m2dGz (0, e1 ) = −2dze2dzg(z) Gz (e1 ) = −2dzA(z)Gz (e1 ). The term C(z), given by zm ∑ m=2 m! s1 ,...,sm ∈E ∞ C(z) = ∑ ∑ z|C1 | · · · C1 s1 ∑ Cm sm z|Cm | ∑ Vi, j , (3.12) 1≤i< j≤m will be expanded in the proof of the next step of the recursive argument, in Chapter 4, to extract its 23 contribution to g(z). The term E(z), given by zm ∑ m=2 m! s1 ,...,sm ∈E ∞ E(z) = ∑ ∑ z|C1 | · · · z|Cm | ∑ ∑ ∑ Vi, j Vk,l 0≤i< j≤m (k,l)∈Ai, j Cm sm C1 s1 ∏ (1 + V p,q ) , (p,q)∈Ak,l (3.13) will correspond to an error term in the proof of the next step of the recursive argument in Chapter 4. 3.2 The lace expansion The lace expansion was developed by Brydges and Spencer in [6] to tackle problems related to self-avoiding walks in 5 or more dimensions. Originally, it involved an expansion and resummation procedure, but it has been expanded to other models like percolation, lattice trees and lattice animals, by using an inclusion-exclusion relation [39]. This technique will produce an expansion for the two-point function Gz (x) in terms of the functions g(z) and Πz (x) which, as we anticipated in (1.24), implicitly defines the critical point zc . Moreover, through the derivation of such expansion the quantity Πz (0, x) will be clearly defined. 3.2.1 The lace expansion for lattice trees We commence by defining the quantities needed in our discussion of the technique. Recall that the (t) (t) two-point function for lattice trees Gz (x) = Gz (0, x) is given in (1.5) by (t) Gz (x) = ∑ z|T | , (3.14) T 0,x where the sum is over the lattice trees that contain both vertices 0 and x. A tree T with this characteristic consists of a path connecting 0 to x and mutually non-intersecting subtrees emanating from every vertex on this path. Due to the topology of T this path is unique, we refer to it as the backbone, and to the subtrees emanating from the backbone as the ribs. See Figure 3.2 for a depiction of such a decomposition of a tree T that contains 0 and x. (t) This observation allows us to rewrite Gz (x) in terms of walks ω from 0 to x, and non-intersecting ribs emanating from the vertices of ω. Recall that W (0, x) is set of walks ω from 0 to x. Given ω ∈ W (0, x), let R = R0 , . . . , R|ω| be the set of |ω| + 1 mutually non-intersecting trees (ribs) R j attached to the vertices of ω. To guarantee that the ribs R = {Ra , . . . , Rb } are mutually non-intersecting, we consider K[a, b] := ∏ a≤i< j≤b 24 1 + Ui j (R) , (3.15) Figure 3.2: Decomposition of a lattice tree T into the backbone from 0 to x (bold), and the ribs emanating from it R = {R0 , . . . , R9 }. where the function Ui j (R) is defined by −1 if ribs R and R share a common vertex i j Ui j (R) = 0 if ribs Ri and R j share no common vertex. (3.16) The product (3.15) is equal to 1 when all the ribs satisfy the desired property and it vanishes otherwise. Then the two-point function (3.14) can be written (t) Gz (x) = z|ω| ∑ ∑ ... ∑ R0 0 ω∈W (0,x) z|R0 |+···+|R|ω| | K[0, |ω|], R|ω| x where the sum over ω is over all simple random walks from 0 to x, the sums over Ri are over trees that contain the vertex ω(i), and R = R0 , . . . , R|ω| is the set of ribs emanating from the walk ω. Note that K[0, |ω|] guarantees that only the self-avoiding walks (paths) ω contribute to the sum. In this expression we will abbreviate |ω| ∑ ... R0 0 ∑ R|ω| x z|R0 |+···+|R|ω| | = ∏ ∑ z|Ri | , i=0 Ri ω(i) where the equal sign means equality when both sides are applied to a function of the ribs. Therefore, the two-point function can be rewritten as (t) Gz (x) = |ω| ∑ ω∈W (0,x) z|ω| ∏ ∑ z|Ri | K[0, |ω|]. i=0 Ri ω(i) In order to rewrite the product (3.15), we define Definition 3.3. Let [a, b] be an interval of non-negative integers a,b. 25 (3.17) 1. An edge is a pair {i, j} (i < j) of elements of [a, b], which we will also denote by i j. 2. A graph Γ is a set of edges. The set of all graphs on [a, b] is denoted by B[a, b]. 3. A connected graph Γ on [a, b], is a graph in which both a and b are endpoints of edges in Γ, and if in addition for each c ∈ (a, b) there are i, j ∈ [a, b] such that i < c < j with either {i, j} ∈ Γ, or {i, c} ∈ Γ and {c, j} ∈ Γ. Equivalently, Γ is connected if, as intervals, ∪i j∈Γ [i, j] = [a, b]. The set of all connected graphs on [a, b] is denoted by G [a, b]. Remark 3.4. The definition of connectivity does not correspond to the usual notion of path-connectivity in graph theory. The graphic representation of the graphs we are considering is depicted in Figure 3.3. Figure 3.3: Graphs in which the edge i j is represented by an arc joining i and j. Graphs (a) and (b) are not connected, the former has an edge containing a while the latter does not. Graph (c) is connected. We set K[a, a] = 1, then for a < b the expression (3.15) is equivalent to K[a, b] = ∑ ∏ Ui j , (3.18) Γ∈B[a,b] i j∈Γ where we have omitted the dependence on R. For the case of connected graphs we consider an analogous quantity to K[a, b]. We set J[a, a] = 1, and for a < b we define J[a, b] = ∑ ∏ Ui j , (3.19) Γ∈G [a,b] i j∈Γ where the sum is restricted to the connected graphs. Lemma 3.5. For any a < b b−1 K[a, b] = J[a, b] + K[a + 1, b] + ∑ c=a+1 26 J[a, c]K[c + 1, b]. (3.20) Proof of Lemma 3.5. The sum on the right hand side of (3.18) can be over the connected graphs on [a, b], whose contribution is J[a, b], and the disconnected graphs on [a, b]. In the latter case, the contribution of the graphs for which a is not in an edge is K[a + 1, b]. For the disconnected graphs Γ that have an edge containing a, let c(Γ) be the largest value of c ∈ (a, b) such that the set of edges in Γ with both ends in the interval [a, c] forms a connected graph on [a, c]. Then the sum over these graphs Γ factorizes into sums over connected graphs on [a, c], which yield the factor J[a, c], and arbitrary graphs on [c + 1, b], which yield the factor K[c + 1, b]. Substituting the expression (3.20), with a = 0 and b = |ω|, into (3.17) yields |ω| (t) Gz (x) = ∑ z|R | δ0,x + ∑ z|ω| 0 R0 0 ∏ ∑ z|Ri | J[0, |ω|] i=0 Ri ω(i) ω∈W (0,x) |ω|≥1 |ω| + z|ω| ∑ z|Ri | K[1, |ω|] ∏ ∑ |ω|−1 |ω| + z ∑ (3.21) i=0 Ri ω(i) ω∈W (0,x) |ω|≥1 |ω| z ∏ ∑ |Ri | i=0 Ri ω(i) ω∈W (0,x) |ω|≥2 ∑ J[0, c]K[c + 1, |ω|]. c=1 The first term on the right hand side results from the walks with length 0 and, by (1.4), is equal to g(t) (z)δ0,x . The other summands are due to the walks whose length is at least 1. We denote the second term by |ω| (t) Πz (x) := ∑ z|ω| ω∈W (0,x) |ω|≥1 ∏ ∑ z|Ri | J[0, |ω|]. (3.22) i=0 Ri ω(i) Let D : Zd → R be the one-step transition probability function for a simple random walk in the nearest-neighbor model of Zd , i.e., (2d)−1 if ||x|| = 1, D(x) = 0 otherwise. (3.23) The convolution of the absolutely summable functions f : Zd → R and g : Zd → R is given by ( f ∗ g)(x) = ∑ f (y)g(x − y). (3.24) y∈Zd Therefore, the third term on the right hand side of (3.21) can be written as |ω| ∑ ω∈W (0,x) |ω|≥1 z|ω| ∏ ∑ (t) z|Ri | K[1, |ω|] = g(t) (z) 2dzD ∗ Gz i=0 Ri ω(i) 27 (x), and the fourth term can be expressed as |ω|−1 |ω| ∑ ω∈W (0,x) |ω|≥2 z|ω| ∏ ∑ z|Ri | i=0 Ri ω(i) ∑ (t) (t) (x). (t) (t) (x), J[0, c]K[c + 1, |ω|] = Πz ∗ 2dzD ∗ Gz c=1 Hence, the expression in (3.21) is equal to (t) (t) (t) Gz (x) = g(t) (z)δ0,x + Πz (x) + g(t) (z) 2dzD ∗ Gz (x) + Πz ∗ 2dzD ∗ Gz (3.25) which is the lace expansion for lattice trees. Taking the Fourier transform of the right-hand side of this equation, and using that the Fourier transform of a convolution of functions is given by the product of their Fourier transforms, i.e., f ∗ g = fˆg, ˆ (3.26) yields (t) (t) ˆ (t) ˆ z(t) (k)2dzD(k) ˆ Gˆ z(t) (k) + Π ˆ Gˆ (t) Gˆ z (k) = g(t) (z) + Π z (k) + g (z)2dzD(k) z (k), (t) where we have used that δˆ ≡ 1. Solving for Gˆ z (k) we get (t) Gˆ z (k) = ˆ (t) g(t) (z) + Π z (k) . (t) ˆ (t) ˆ ˆ Π 1 − 2dzg (z)D(k) − 2dzD(k) z (k) (3.27) The Fourier transform of the transition probability function D(x) (3.23), is given by 1 ˆ D(k) = d d ∑ cos (k j ) , which implies that ˆ D(0) = 1. (3.28) j=1 Therefore, evaluating (3.27) at k = 0, yields (t) (t) Gˆ z (0) = ˆ z (0) g(t) (z) + Π , ˆ z(t) (0) 1 − 2dzg(t) (z) − 2dzΠ which agrees with equation (1.22). (t) In order to fully exploit expression (3.27), we will rewrite the function Πz (x) in a more man(t) ageable way. The quantity Πz (x) was defined in (3.22) in terms of J[0, |ω|], which involves a sum over connected graphs. Therefore, we focus on connected graphs. Figure 3.4 depicts two graphs of this kind, we observe that in the graph Γ, depicted in Figure 3.4 (a), the removal of the edges {1, 3}, {3, 4} or {6, 9} does not disconnect it, but if any other edge is suppressed it becomes disconnected. On the other hand, in the graph Γ , depicted in (b), the absence of any of its edges disconnects it. This idea of minimal connectedness is captured below in the notion of a lace. 28 (a) The removal of the edges {1, 3}, {3, 4} and {6, 9} does not disconnect Γ. (b) The removal of any edge disconnects Γ . Figure 3.4: A connected graph and a minimal connected graph Definition 3.6. A lace L is a minimal connected graph, i.e., a connected graph for which the removal of any edge would result in a disconnected graph. The set of laces on [a, b] is denoted by L [a, b], and the set of laces on [a, b] which consist of exactly N edges is denoted by L (N) [a, b]. For example, the graph depicted in Figure 3.4 (a), is not a lace but the one in (b) is. The set L (1) [a, b] consists of the lace L = {ab}, the one whose only edge is ab. The set L (2) [a, b] consists of laces of the form L = {a j1 , j1 b} with a < j1 < b, and L = {a j1 , i2 b} with a < i2 < j1 < b. See Figure 3.5 for a graphical representation of these laces. (a) The only lace in L (1) [a, b]. (b) The two types of laces in L (2) [a, b]. Figure 3.5: Laces in L (1) [a, b] and L (2) [a, b]. For N ≥ 3, the laces L ∈ L (N) [a, b] are of the form L = {i1 j1 , . . . , iN jN }, with a = i1 < i2 , ik+1 ≤ jk < ik+2 for k = 1 . . . N − 2, iN ≤ jN−1 < jN = b. There are 2N−1 different topologies for the laces in L (N) [a, b], depending on whether ik+1 = jk or ik+1 < jk , like in the case of Figure 3.5 (b). Given a connected graph Γ ∈ G [a, b] we can associate a unique lace LΓ to it. This lace LΓ consists of the edges i1 j1 , i2 j2 , . . . , whose endpoints are determined inductively as follows: j1 = max { j : a j ∈ Γ} , i1 = a, jk+1 = max { j : ∃i ≤ jk such that i j ∈ Γ} , ik+1 = min {i : i ≤ jk+1 ∈ Γ} . The induction finishes when jk+1 = b. Given a lace L, the compatible edges C (L) to L, is the set of 29 all edges i j ∈ L such that LL∪{i j} = L. See Figure 3.6 for an example of a connected graph Γ and its extracted lace LΓ . Figure 3.6: (a) A connected graph Γ. (b) The associated lace L = LΓ . Edges {1, 2}, {3, 5} and {7, 10} are compatible with L. (t) Now we are ready to rewrite Πz (x) in a more convenient way. The core of the lace expansion is that the sum over connected graphs in the term J[a, b], which was defined in (3.19), can be done by first summing over laces and then, given a lace, summing over all connected graphs whose associated lace (obtained by the above procedure) coincides with the given lace, see [39] for more details on this important result. This yields, ∑ ∏ Ui j ∏ J[a, b] = L∈L [a,b] i j∈L 1 + Ui j . (3.29) i j ∈C (L) For N ≥ 1, let J (N) [a, b] := ∏ Ui j ∏ ∑ L∈L (N) [a,b] i j∈L and (t,N) Πz 1 + Ui j (3.30) i j ∈C (L) |ω| (x) := (−1)N z|ω| ∑ N≥1 L (N) [a, b] J[a, b] = (3.31) i=0 Ri ω(i) ω∈W (0,x) |ω|≥1 The fact that the set L [a, b] = z|Ri | J (N) [0, |ω|]. ∏ ∑ (disjoint union) and (3.29), imply ∑ J (N) [a, b], (3.32) N≥1 (t) which together with (3.22) yield that the function Πz (x) is given by the alternating series (t) Πz (x) = ∞ (t,N) ∑ (−1)N Πz N=1 30 (x). (3.33) 3.2.2 The lace expansion for lattice animals In this section we present the lace expansion for lattice animals which, as we will see, is an extension of the lace expansion for lattice trees that we studied in Section 3.2.1. We start by giving the definitions of the quantities involved in our discussion. (a) (a) The two-point function for lattice animals Gz (x) = Gz (0, x) was given in (1.5) by (a) Gz (x) = ∑ z|A| , (3.34) A 0,x where the sum is over the lattice animals that contain both vertices 0 and x. An animal A with this characteristic contains a path connecting 0 to x; however, unlike the lattice tree case, this path is not necessarily unique. To deal with this difficulty we need the following definitions. Definition 3.7. Let A be an animal containing the vertices x and y. 1. The animal A has a double connection from x to y, if there are two bond-disjoint self avoiding walks in A between x and y (the walks may share a common vertex, but not a common bond), or if x = y. The set of all animals having a double connection between x and y is denoted by Dx,y . 2. A bond {x, y} in A is pivotal for the connection from x to y, if its removal would disconnect the animal into two connected components with x contained in one of them and y in the other. An animal A x, y that is not an element of Dx,y , has at least one pivotal bond for the connection from x to y. To establish an order among these edges, we define the first pivotal bond to be the first edge for which there is a double connection between x and one of the endpoints of this bond. This endpoint is the first endpoint of the first pivotal bond. To determine the second pivotal bond, the role of x is played by the second endpoint of the first pivotal bond, and so on. For a lattice animal A that contains x and y, the backbone is the set of pivotal bonds for the connection from x to y. Notice that the backbone is not necessarily connected. The ribs are the connected components that remain after the backbone is removed from A. By definition, the ribs do not have any pivotal bond for the connection from x to y, so they have a double connection between the end-points of the corresponding pivotal bonds. See Figure 3.7 for an example of an animal decomposed into its backbone and ribs. Let B be an arbitrary finite ordered set of directed bonds B = (u1 , v1 ) , . . . , u|B| , v|B| , and let v0 = 0 and u|B|+1 = x. Then we can write the two-point function (3.34) in terms of the 31 Figure 3.7: Decomposition of a lattice animal A into the backbone from 0 to x (bold), and the ribs emanating from it R = {R0 , R1 , R2 , R3 }. Note that R2 only contains the vertex in the backbone. backbone B and the mutually nonintersecting ribs R = R0 , . . . , R|B| , as (a) Gz (x) = |B| z|B| ∏ ∑ B:|B|≥0 z|Ri | K[0, |B|], ∑ (3.35) Ri ∈Dvi ,ui+1 i=0 where K[0, |B|] is defined as in (3.15), with Ui j (R) as in (3.16) for the new notion of ribs R. We recall the definition of J[0, |B|] in (3.19), and define ˜ (a) Π z (x) := |B| z|B| ∏ ∑ B:|B|≥1 z|Ri | J[0, |B|], ∑ (3.36) Ri ∈Dvi ,ui+1 i=0 and (a) hz (y − x) := z|R| . ∑ (3.37) R∈Dx,y (a) Notice that Dx,x is the set of animals that contain x and that hz (0) = g(a) (z). An argument similar to the one used to derive (3.25), using (3.20), yields the lace expansion for lattice animals (a) (a) (a) (a) (a) ˜ z (x) + hz ∗ 2dzD ∗ Gz Gz (x) = hz (x) + Π (a) ˜ (a) (x) + Π (x). z ∗ 2dzD ∗ Gz (3.38) To make this expression look like (3.25), we define (a,0) Πz z|R| , (3.39) ˜ z (x). (x) + Π (3.40) (x) := (1 − δ0,x ) ∑ R∈D0,x and (a) (a,0) Πz (x) := Πz 32 (a) Then (a) (a,0) hz (x) = g(a) (z)δ0,x + Πz (x), which implies that (3.38) can be written as (a) (a) (a) (a) Gz (x) = g(a) (z)δ0,x + Πz (x) + g(a) (z) 2dzD ∗ Gz (a) (x) + Πz ∗ 2dzD ∗ Gz (x). (3.41) We use relation (3.26) to compute the Fourier transform of this expression, and get (a) (a) ˆ (a) ˆ (a) ˆ Gˆ (a) ˆ Gˆ (a) Gˆ z (k) = g(a) (z) + Π z (k) + g (z)2dzD(k) z (k) + Π z (k)2dzD(k) z (k). (a) Isolating Gˆ z (k) in this expression yields (a) Gˆ z (k) = ˆ (a) g(a) (z) + Π z (k) . ˆ (a) ˆ ˆ Π 1 − 2dzg(a) (z)D(k) − 2dzD(k) z (k) (3.42) ˆ This result and the fact that D(0) = 1, as established in (3.28), implies that (a) (a) Gˆ z (0) = ˆ z (0) g(a) (z) + Π , ˆ (a) 1 − 2dzg(a) (z) − 2dzΠ z (0) which, like in the lattice tree case, agrees with equation (1.22). (a) Our aim is to rewrite Πz (x) in a more manageable way. We proceed similarly to what we did (a,N) for the corresponding quantity for lattice trees. For N ≥ 1, we define Πz by J (N) [0, |B|] by substituting J[0, |B|] in (3.36), (a,N) Πz (x) := (−1)N ∑ z|B| ∏ i=0 B:|B|≥1 |B| ∑ z|Ri | J (N) [0, |B|], (3.43) Ri ∈Dvi ,ui+1 (t,N) where J (N) [0, |B|] is defined as in (3.30). This is analogous to the lattice tree quantity Πz in (3.31). The fact that J[0, |B|] = ∑N≥1 J (N) [0, |B|], given as established in (3.32), together with equations (3.36) and (3.43) yields ˜ (a) Π z (x) = ∞ (a,N) (x). (a,N) (x). ∑ (−1)N Πz N=1 Finally, by (3.40), we get (a) Πz (x) = ∞ ∑ (−1)N Πz N=0 33 (3.44) Chapter 4 Proof of first order correction In this chapter we compute the first order correction for the critical points of lattice trees and animals in the nearest-neighbor case. This result corresponds to the second term in the expansion of zc in Theorem 1.2, which we specifically state in Lemma 4.1 below. ˆ zc (0) and In Section 4.1, we give the proof of Lemma 4.1 after assuming the expansions for Π g(zc ) given below in Lemma 4.2 and Lemma 4.3, respectively. In Section 4.2, we introduce the quantities involved in the demonstrations of Lemma 4.2 and Lemma 4.3, and give some estimates on them. ˆ zc (0) in Lemma 4.2. We do it for lattice trees in In Section 4.3, we show the expansion for Π Section 4.3.1, and for lattice animals in Section 4.3.2. Finally, in Section 4.4 we show the expansion for g(zc ) in Lemma 4.3, simultaneously, for lattice trees and animals. We remind the reader that we will only work in the nearest-neighbor model. So all the results in this chapter and the coming one, only apply to this case. 4.1 Main ingredients Our goal is to show that Lemma 4.1. For nearest-neighbor lattice trees and animals, the critical point obeys zc = 3 −1 e e−1 1 + 2 2 +o 2d (2d) (2d)2 , as d → ∞. (4.1) In the proof of Lemma 4.1 there are two main ingredients. The first one is the following lemma, which we prove in Section 4.3. 34 Lemma 4.2. For nearest-neighbor lattice trees and animals, as d → ∞, ˆ zc (0) = − 3e + o 1 Π 2d 2d . (4.2) This result will allow us to show, in Section 4.4, the second ingredient for the proof of Lemma 4.1. This states that the one-point function at criticality obeys Lemma 4.3. For nearest-neighbor lattice trees and animals, as d → ∞, g(zc ) = e + 3 2e 2d +o 1 2d (4.3) . Assuming Lemma 4.2 and Lemma 4.3, the demonstration of Lemma 4.1 is as follows. Proof of Lemma 4.1. Substituting the expansions given in (4.27) and (4.53), into the formula that the lace expansion produces for the critical point in (1.24), yields that zc = 1 1 1 1 = 3 ˆ zc (0) 2de 2d g(zc ) + Π 1 − 2d2 + o = 1 2d 3 1 1 1+ 2 +o 2de 2d 2d , as d → ∞, which is the desired expression. Therefore, it only remains to prove Lemma 4.2 and Lemma 4.3. Before accomplishing this task we need to define and bound the quantities involved in the demonstrations. This is the purpose of the following section. 4.2 Useful estimates In this section, we formulate and estimate the essential quantities used in the proofs of Lemma 4.2 and Lemma 4.3. These are given in Proposition 4.5 and Claim 4.6 below. Recall the convolution of the functions f and g, given in (3.24). We will denote by f ∗l the convolution of l factors of f , i.e., f ∗l (x) := ( f ∗ f ∗ · · · ∗ f )(x). l Armed with this notation and the definition of the transition probability D(x) in (3.23), we can see that the quantity D∗2m (0) is the probability that a random walk that starts at the origin returns to it after 2m steps. Bound [24, (3.12)] establishes that for positive integers m there is a positive constant 35 cm , independent of the dimension d, such that the inequality below holds d ˆ 2m d k ≤ cm , D(k) (2π)d (2d)m [−π,π]d D∗2m (0) = (4.4) where the equality is given by the inverse Fourier transform and relation (3.26). The infrared bound for nearest-neighbor lattice trees and lattice animals, given in [16, (1.25)], establishes that for dimensions d ≥ d0 , where d0 is sufficiently large, there is a positive constant c independent of z and d, such that for 0 ≤ z ≤ zc , 0 ≤ Gˆ z (k) ≤ where k 2 := k12 + · · · + kd2 1/2 cd , k 22 (4.5) is the Euclidean norm. Proposition 4.4. In the case of nearest-neighbor lattice trees and lattice animals, if m and n are non-negative integers and the dimension d > max {d0 , 4n}, then there is a constant Km,n , whose value only depends on m and n, such that for all 0 ≤ z ≤ zc , sup D∗m ∗ G∗n z (x) ≤ x Km,n . (2d)m/2 (4.6) Proof of Proposition 4.4. Using the inverse Fourier transform (1.21) and relation (3.26), we get D∗m ∗ G∗n z (x) = d ˆ m Gˆ z (k)n e−ik·x d k . D(k) (2π)d [−π,π]d The Cauchy-Schwarz inequality implies ∗m D ∗ G∗n z (x) ≤ d 2m d k ˆ |D(k)| (2π)d [−π,π]d 1/2 dd k Gˆ z (k)2n (2π)d [−π,π]d 1/2 , (4.7) where we have used that the left-hand side of this expression is nonnegative, and that so is Gˆ z (k) (t) ˆ is real, for 0 ≤ z ≤ zc , according to (4.5). By (3.28), we also know that the Fourier transform D(k) 2m = D(k) ˆ ˆ 2m . Then estimate (4.4) gives the desired result, as long as we which implies that |D(k)| show that the second factor on the right-hand side of (4.7) is finite independently of d. This is what we do next. The infrared bound (4.5) implies dd k Gˆ z (k)2n ≤ c2n (2π)d [−π,π]d 36 [−π,π]d d k 2n 2 2 dd k (2π)d (4.8) To deal with the right-hand side of this expression, we use that for A > 0 and j > 0, 1 1 = Aj Γ( j) Thus taking A = k 22 d ∞ u j−1 e−uA du. (4.9) 0 in (4.9) and using Fubini theorem, yield c2n [−π,π]d d k 2n 2 2 dd k c2n = (2π)d Γ(2n) = ∞ u2n−1 e−u k 2 2 d [−π,π]d 0 c2n Γ(2n) ∞ k2 e−u d −π 0 c2n ≤ Γ(2n) π u2n−1 ∞ π 2n−1 u 2 e dk 2π −u kd p −π 0 du dd k (2π)d d du d p dk 2π du, where we have used convexity in the last inequality with p ≥ 1. Let d1 = max {d0 , 4n} + 1, clearly d1 ≤ d. If we choose p such that c2n Γ(2n) ∞ u e −π 0 = d1 , then the expression in the last line becomes 2 π 2n−1 d p −u dk 1 dk 2π d1 c2n du = Γ(2n) = c2n ∞ u [−π,π]d1 [−π,π]d1 2n−1 −u e k 2 2 d1 0 d1 k 22 2n du dd1 k (2π)d1 dd1 k , (2π)d1 where in the last equality we have used (4.9) in a reversed way. This proves that the right-hand side of (4.8) is non-increasing in the dimension d. Now, we show that it is finite for the dimension d = d1 . A change to hyper spherical coordinates gives c2n [−π,π]d1 where R := d1 k 22 2n dd1 k ≤ (d1 c)2n NΘd1 (2π)d1 R 0 rd1 −1−4n dr = (d1 c)2n NΘd1 Rd1 −4n < ∞, d1 − 4n √ d1 π is big enough to contain the hypercube [−π, π]d1 , and NΘd1 denotes the value of the integrals over the angular coordinates. Notice that the integral on the radial variable r is finite since d1 > 4n. Hence, (4.6) holds with 1/2 Km,n = cm (d1 c)2n NΘd1 Rd1 −4n . d1 − 4n Let k be a non-negative integer and let C be a cluster (a tree or an animal) containing the vertices x and y. We denote by {x ↔ y} k 37 (4.10) the event in which x is connected to y by a (self-avoiding) path in C of length k or more. We define by (k) Gz (x, y) := ∑ z|C| , (4.11) C x,y x↔y k the two-point function in which the sum is restricted to the clusters in which x is connected to y by a path with at least k steps. This definition and (3.14) imply (0) (1) Gz (x, y) = Gz (x, y) = g(z)δx,y + Gz (x, y), since for x = y the two-point function Gz (x, y) reduces to the one-point function g(z), and for x = y the path connecting these two vertices requires at least one step. (m,n) (a) Use of Sz to bound a connection between x and y through n subpaths of total length m. (m,3) (b) Use of Sz (m,n) (c) Use of Sz to bound a polygon that contains 0 and has 3 subpaths of total length m. to bound a diagram that contains 0 and has 7 subpaths of total length m. (m,n) Figure 4.1: Examples on the use of Sz for bounding different diagrams. We are ready to introduce the quantity which will be the cornerstone when bounding error terms in all coming proofs. For nonnegative integers m and n, and vertices x and y, we define (m,n) Sz (y − x) := ∑ (k1 ) Gz (k ) ∗ · · · ∗ Gz n (y − x) − I{m=0 and x=y} g(z)n , (4.12) k1 +···+kn =m where the sum is over nonnegative k1 , . . . , kn . This quantity represents a connection between the vertices x and y through n subpaths of lengths at least k1 , k2 , . . . kn , that make a total of k1 + · · · + kn = m steps. Since m = 0 implies that ki = 0 for all i = 1, . . . , n, the second summand subtracts the contribution when all the factors in the convolution are evaluated at 0 and, therefore, given by one38 (m,n) point functions. See Figure 4.1a for a depiction of Sz Proposition 4.5 below is the estimate on it states that the quantity (m,n) Sz (x) (y − x). (m,n) Sz (y − x) used to bound error terms. Essentially, is of order at most O (2d)m/2 , independently of n and x. See (m,n) Figure 4.1 for a depiction on the use of Sz and Proposition 4.5 for bounding different diagrams. Proposition 4.5. Let m and n be positive integers, if the dimension d > max {d0 , 4m}, then there is a constant Cm,n , whose value only depends on m and n, such that for all z ≤ zc , (m,n) (m,n) := sup Sz Sz (x) ≤ x Cm,n . (2d)m/2 (4.13) (k) Proof of Proposition 4.5. We commence by analyzing Gz (x, y) for k ≥ 1, which is the particular (k,1) case Sz (y − x). If in (4.11) we neglect the self avoidance restriction among the k steps of the path connecting x and y, and treat the ribs emanating from them as independent, we get (k) Gz (x, y) ≤ (2dzg(z)D)∗k ∗ Gz (x − y). (m,n) This bound and the definition of Sz (m,n) Sz (x) = (x) in (4.12) imply (k1 ) Gz ∑ (4.14) (k ) ∗ · · · ∗ Gz n (x) k1 +···+kn =m ≤ ∑ (2dzg(z)D)∗k1 ∗ Gz ∗ · · · ∗ (2dzg(z)D)∗kn ∗ Gz (x) ∑ ∗m ∗n ˜ (2dzg(z)D)∗m ∗ G∗n z (x) = Cm,n (2dzg(z)D) ∗ Gz (x), k1 +···+kn =m = k1 +···+kn =m where C˜m,n is the corresponding combinatorial factor, its exact value is not important only the fact that it depends on m and n. By (1.12), since d is large enough, we know that for z ≤ zc , 2dzg(z) ≤ 2dzc g(zc ) ≤ 2, (4.15) which together with Proposition 4.4 imply (m,n) Sz (x) ≤ C˜m,n 2m Km,n . (2d)m/2 The following quantity is another essential ingredient in coming demonstrations. For vertices x and y, we define the negative quantity Wz (x, y) := ∑ ∑ z|C |+|C | U0,1 , 0 C0 x C1 y 39 1 (4.16) where the sums are over the clusters C0 and C1 (both trees or animals) that contain the vertices x and y, respectively; and the factor U0,1 = U0,1 (C0 ,C1 ) := −I{C0 ∩C1 =0} / , is minus the indicator function that the clusters C0 and C1 have a vertex in common. We will denote Wz (0, x) by Wz (x). Notice that due to the symmetries of the lattice, Wz (x, y) = Wz (y − x). Claim 4.6 below, gives an estimate on Wz (x, y) which is sufficient for the proofs in this chapter; however, it will be extended in the following chapter. Claim 4.6. For nearest-neighbor lattice trees and animals, let x be a nearest neighbor of the origin, then as d → ∞, Wzc (x) = − 2e2 1 +o 2d 2d . (4.17) (a) Proof of Claim 4.6. For the case Wzc (x) = W (a) (x), i.e., the clusters C0 and C1 involved in the sums zc of (4.16) are animals, we distinguish two cases: (a) The origin and x belong to a cycle that is contained in either animal C0 or animal C1 . (b) Both animals C0 and C1 , do not have any cycle that contains the origin and x. For part (a), suppose that C0 is the cluster that contains such a cycle. The smallest cycles that contain 0 and x have length 4. The other cycles containing both vertices have length 6 or more and, (a) by Proposition 4.5, their contribution to W (a) (x) is of order O (2d)3 and can be neglected. The zc (a) number of 4-step cycles that contain 0 and x is (2d − 2). The contribution to W (a) (x) of clusters zc with such cycles is bounded by (a) (a) 2(2d − 2)(zc )4 g(a) (zc )5 , (4.18) where the factor 2 is obtained when inverting the roles of C0 and C1 ; one of the factors g(a) (z) corresponds to treating cluster C1 as independent of C2 ; and the remaining factors are obtained when treating the ribs emanating from the vertices in the 4-step cycles as independent of each other. Theorem 1.1 yields that this expression is of order (a) (a) 2(2d − 2)(zc )4 g(a) (zc )5 = O (2d)−3 . (4.19) (a) Therefore, the contribution to W (a) (x) from the animals of type (a) is negligible. We only need to zc (a) show that the contribution to W (a) (x) from the animals of type (b), agrees with (4.17). zc The clusters C0 and C1 , both trees or type (b) animals, only contribute to Wz (x) if they have a vertex in common, say y. Therefore, there is a path ω connecting 0 to x, passing through y, that consists in a path in C0 connection 0 to x, and a path in C1 connecting y to x. This path ω can be chosen uniquely. The simplest path ω consists of the bond {0, x}, which implies that y = x or y = 0 depending on whether {0, x} is contained in either C0 or C1 , respectively. Then this cluster 40 (that is, C0 , respectively, C1 ) consists of the edge {0, x} and two non intersecting subclusters, one emanating from 0 and the other one emanating from x, which we denote by C0∗ and C1∗ , respectively. Discounting the contribution due to the event in which both clusters C0 and C1 contain {0, x} yields the upper bound Wz (x) ≤ −2zg(z) ∗ 0 ∗ 1 ∑ z|C |+|C | C0∗ 0 C1∗ x ∗ 1 + U0,1 + z2 ∗ 0 ∗ 1 ∑ z|C |+|C | C0∗ 0 C1∗ x 2 ∗ 1 + U0,1 , ∗ = −1 if the subclusters C ∗ and C ∗ have a common vertex, and 0 otherwise. See Figwhere U0,1 0 1 ure 4.2 for a depiction of this bound. Figure 4.2: Curved lines represent (sub)clusters, the ones with the same shading are non intersecting. The straight line corresponds to the edge {0, x}. (a) C0 = C0∗ ∪ {0, x} ∪C1∗ is independent of C1 . (b) C0 is independent of C1 = C0∗ ∪ {0, x} ∪ C1∗ . (c) Intersection of both situations (a) and (b). Distributing the product in the first term of the previous expression, together with the definitions ∗ in the second term is at most 1, give the upper of Wz (x) and g(z), and the fact that the factor 1 + U0,1 bound Wz (x) ≤ −2zg(z)3 − 2zg(z)Wz (x) + z2 g(z)4 . Thus Wz (x) ≤ −2zg(z)3 + z2 g(z)4 . 1 + 2zg(z) Theorem 1.1 yields Wzc (x) ≤ − 2e2 1 +o 2d 2d , as d → ∞. For a lower bound, we neglect the non-intersection of the subclusters C0∗ and C1∗ , this yields the first term in the inequality below. The second term, is due to the fact that the remaining paths ω, connecting 0 and x, have length at least 3. See Figure 4.3 for a depiction of this situation. (3,2) Wz (x) ≥ −2zg(z)3 − Sz 41 (x). Figure 4.3: Curved lines represent (sub)clusters and straight lines correspond to edges. (a) C0 = C0∗ ∪ {0, x} ∪C1∗ is independent of C1 , or C0 is independent of C1 = C0∗ ∪ {0, x} ∪C1∗ . (b) All other intersections between C0 and C1 require at least three bonds. Finally, Theorem 1.1 and Proposition 4.5 yield the lower bound Wzc (x) ≥ − 1 2e2 +o 2d 2d , as d → ∞. Proposition 4.5 and Claim 4.6, are the key ingredients for the proof of Lemma 4.2 in Section 4.3. The remainder of this section is devoted to show Lemma 4.7 (below), which is an important ingredient for the proof of Lemma 4.3 in Section 4.4. Lemma 4.7. Let x be a nearest neighbor of the origin, then for lattice trees and lattice animals, as d → ∞, Gzc (x) = e 1 +o 2d 2d . (4.20) Proof of Lemma 4.7. Lattice trees. We start by studying the two-point function for lattice trees. Recall that equation (3.17) gives the following expression for this quantity (in terms of the lace expansion), |ω| (t) Gz (x) = ∑ ω∈W (0,x) z|ω| ∏ ∑ z|Ri | K[0, |ω|]. i=0 Ri ω(i) We separate the sum over walks ω in the cases |ω| = 1 and |ω| > 1. Due to the topology of the (t) lattice Zd , the latter case is in reality |ω| ≥ 3 and, therefore, its contribution to Gz (x) is given by (t,3) Gz (x), which is of order O (2d)3/2 , by Proposition 4.5, and can be neglected. (t) If |ω| = 1, the only walk ω consists of the edge {0, x}. In this case the contribution to G (t) (x) is zc (t) zc (t) |R0 |+|R1 | ∑ (zc ) (t) (1 + U0,1 ) = zc (t) (t) g(t) (zc )2 +W (t) (x) R0 0 R1 x zc (4.21) e 1 = +o 2d 2d 42 , as d → ∞, where the last equality is due to Theorem 1.1 and Claim 4.6. This completes the proof of (4.20) for the case of lattice trees. Lattice animals. Now we analyze the two-point function for lattice animals, which was defined in (3.35), in terms of the lace expansion, as (a) Gz (x) = |B| z|B| ∏ ∑ Ri ∈Dvi ,ui+1 i=0 B:|B|≥0 z|Ri | K[0, |B|]. ∑ We separate the sum over backbones B in the cases |B| = 0, |B| = 1, |B| = 2 and |B| ≥ 3. We (a) commence with the case |B| = 1 which, as we will see, is the only one that contributes to G (a) (x) zc up to order (2d)−1 . For the case |B| = 1, the backbone is given for some directed edge (u, v). Then the the contri(a) bution to Gz (x) is z|R0 |+|R1 | (1 + U0,1 ) , ∑z ∑ R0 ∈D0,u R1 ∈Dv,x (u,v) which, distinguishing whether the backbone (u, v) is given by the edge (0, x), becomes z ∑ z|R |+|R | (1 + U0,1 ) + z ∑ 0 2dD(v − u) 1 u,v (u,v)=(0,x) R0 0 R1 x z|R0 |+|R1 | (1 + U0,1 ) . ∑ R0 ∈D0,u R1 ∈Dv,x (4.22) The first term agrees with the corresponding expression for lattice trees when the backbone |ω| has length 1, then a similar argument to (4.21) together with Theorem 1.1 and Claim 4.6, yield that it is e(2d)−1 + o (2d)−1 , which gives the desired result (4.20). To show that the second term’ contribution is negligible, notice that if the backbone is not (0, x), then the double connections between 0 and u, and between v and x, require at least eight edges. Therefore, this term is bounded by z ∑ 2dD(v − u) u,v (u,v)=(0,x) ≤ 2dz ≤ 2dz ∑ z|R0 |+|R1 | (1 + U0,1 ) (a,i) D(v − u)Gz ∑ i+ j+k+l=8 u,v (u,v)=(0,x) ∑ sup Gz i+ j+k+l=8 ≤ ∑ R0 ∈D0,u R1 ∈Dv,x (a,i) (u) (a,k) sup Gz u 2dz ∑ 2dzg(a) (z) (2d)9/2 i+ j+k+l=8 (a, j) (u)Gz (a,k) (u)Gz (a, j) (v) D ∗ Gz (a,l) (x − v)Gz (a,l) ∗ Gz (x − v) (x) v j+l Ci,1Ck,1 K1+ j+l,2 . The last inequality is due to Proposition 4.4 and Proposition 4.5. Theorem 1.1 yields that the con43 tribution of this term at criticality is of order o (2d)−4 , as d → ∞, and can be neglected. It only remains to prove that the cases |B| = 0, |B| = 2 and |B| ≥ 3 produce error terms. (a) When |B| = 0 , the contribution to Gz (x) is z|R| , ∑ R∈D0,x where the sum is over the animals R containing 0 and x that have a double connection from 0 to x, i.e., there are two self-avoiding walks in R between 0 and x that share no common bond. These two walks form a cycle containing 0 and x. This situation is very similar to part (a) in the proof of Claim 4.6, the difference is that now there is only one animal containing both vertices, which implies (a) that we need to omit the factors 2g(a) (zc ) from (4.18). Then Theorem 1.1 and Proposition 4.5 yield ∑ 1 (2d)2 (a) (zc )|R| = o R∈D0,x , as d → ∞. (4.23) (a) When |B| = 2, the contribution to Gz (x) is ∑ 2 z2 ∏ i=0 B:|B|=2 z|Ri | K[0, 2]. ∑ (4.24) Ri ∈Dvi ,ui+1 Due to the topology of Zd , the fact that x is at distance 1 from the origin, and that the backbone has length 3, at least one of the three double connections must have a cycle (of length 4 or more) containing the corresponding pivotal end points. The contribution of the double connections with (a,2+ j) such cycles will be bounded by the term 3 ∑ j+k=2 Gz (a,k) (u1 )Gz (u1 ) below, the factor 3 takes into account the three possibilities for the double connection. 2 z2 ∏ ∑ B:|B|=2 z|Ri | K[0, 2] ∑ i=0 Ri ∈Dvi ,ui+1 = 2 ∑ (2dz)2 D(v1 − u1 )D(v2 − u2 ) ∏ ∑ u1 ,v1 u2 ,v2 ≤3 i=0 Ri ∈Dvi ,ui+1 ∑ (2dz)2 D(v1 − u1 )D(v2 − u2 ) u1 ,v1 u2 ,v2 ≤ 3 (2dz)2 z|Ri | K[0, 2] (a,2+ j) Gz ∑ (a,k) (u1 )Gz (a) (a) (u1 ) Gz (v1 − u2 )Gz (x − v2 ) j+k=2 ∑ j+k=2 (a,2+ j) sup Gz (a,k) (u) D∗2 ∗ Gz (a) ∗2 ∗ Gz (x), u (4.25) where the last line was obtained by exchanging the sums over the labels j and k and the vertices u1 , 44 v1 , u2 and v2 ; the convolution is obtained after summing over u1 , v1 , u2 and v2 , in that order. Then inequality (4.14) gives the bound 3 (2dz)2 (2+ j,1) (2dzg(z))k Sz ∑ D∗(2+k) ∗ (Gz )∗3 (x). j+k=2 Theorem 1.1, Proposition 4.4 and Proposition 4.5 yield that this expression, at criticality, is (a) 2 3 2dzc 1 (2d)3 (a) (a) 2dzc g(a) (zc ) ∑ k C2+ j,1 K2+k,3 = o j+k=2 1 (2d)2 (a) , as d → ∞. (a,3) (3,1) zc zc (4.26) Finally, when |B| ≥ 3, the contribution to Gz (x) is bounded by G (a) ≤ S (a) , which is of order O (2d)−2/3 , by Proposition 4.5, and can be neglected. 4.3 Proof of Lemma 4.2 The goal of this section is to show Lemma 4.2, which states that for nearest-neighbor lattice trees and lattice animals, ˆ zc (0) = − 3e + o 1 Π 2d 2d , as d → ∞. (4.27) In the proof we use extensively Proposition 4.5 and Claim 4.6. For convenience we have separated the proof in two parts, the one for lattice trees in Section 4.3.1, and the one for lattice animals in Section 4.3.2. 4.3.1 Lattice trees ˆ (t) Proof of Lemma 4.2 for lattice trees. Recall that the Fourier transform Π (t) (0) is given in (3.33) by zc ˆ (t) ˆ (t,1) Π (t) (0) = −Π (t) (0) + zc zc (t,N) ∑ (−1)N Πˆ z N≥2 (t) c (0). (4.28) (t) It is known (see [16, (1.23)]) that there is a c > 0 such that for all N ≥ 1 and all z ∈ [0, zc ], N −N ˆ (a,N) 0≤Π , (a) (0) ≤ c d (4.29) zc and this implies that the second summand in (4.28) is of order O (2d)−2 . Therefore, it is enough to prove 3e 1 ˆ (t,1) −Π +o (t) (0) = − zc 2d 2d 45 . (4.30) (t,1) ˆ (t,1) The quantity Π (0, x), at criticality, and is (t) (0) is the Fourier transform of the function Πz zc given by (t,1) ˆ (t,1) Π (t) (0) = ∑ Π (t) (x). zc (t,1) The function Πz (4.31) zc x (x) corresponds to the term in the lace expansion whose lace has only one edge. It was defined in (3.31) and Figure 3.5 (a) depicts a graphical representation of it. Below it is given in more detail (t,1) Πz |ω| (x) = − ∑ z|ω| z|Ri | J (1) [0, |ω|] ∏ ∑ i=0 Ri ω(i) ω∈W (0,x) |ω|≥1 (4.32) |ω| =− ∑ z|ω| ∏ ∑ z|Ri | U0,|ω| ∏ i=0 Ri ω(i) ω∈W (0,x) |ω|≥1 (1 + Ust ) , 0≤s<t≤|ω| (s,t)=(0,|ω|) the factor U0,|ω| forces the first and last ribs to have a common vertex, say y, and the final product avoids any other intersection among the ribs. Notice that the sum in (4.31) is over all the vertices, in particular, when x = 0, the walk ω in (4.32) forms a cycle that contains the origin, and automatically there is an intersection between the first and last ribs, which implies that the factor U0,|ω| = −1. Similarly, when the vertex x = 0, the paths connecting 0 and x, 0 and y, and x and y, form a cycle. See Figure 4.4 for a depiction of these cycles. 0 0 (a) (b) (t,1) Figure 4.4: (a) Cycle formed in Πz (t,1) (0). (b) Cycle formed in Πz (x), for x = 0. ˆ (t,1,n) ˆ z(t,1) (x) by the cases in which the cycle formed (x) the contribution to Π We will denote by Π z in (4.32) has length n. Proposition 4.5 imply (t, j) ˆ (t,1,≥n) Π (x) ≤ z ∑ ∑ ∑ Gz j+k+l=n x = (t, j) (t,k) ∗ Gz (t,l) ∗ Gz j+k+l=n (n,3) = Sz (t,l) (y − x)Gz (x) y Gz ∑ (t,k) (y)Gz (0) ≤ O (2d)−n/2 . 46 (0) (4.33) −1 , we only need to study the cases in ˆ (t,1) Therefore, when computing Π (t) (0) up to order (2d) zc which the cycles formed in (4.32) have length 2 since, due to the topology of the lattice Zd , all other cases form cycles that have length at least 4, and (4.33) implies that their contribution is of order O (2d)−2 and, therefore, negligible. The following are the only two scenarios in which the cycles in (4.32) have length 2. (a) The vertex x = 0. In this case the walk ω has length 2, it connects 0 to one of its 2d nearest neighbors and returns to the origin. (b) The vertex x is one of the 2d nearest neighbors of the origin. In this case the walk ω is of length 1, it connects 0 to x and the ribs on both end-points, R0 and R1 , intersect. Since the cycle has length 2, the presence of the edge {0, x} in either R0 or R1 is necessary, and in either case the cycle is given by (0, x, 0). (t,1,n) Let Πz We (t,1) (x) denote the contribution to Πz (x) when the cycles formed in (4.32) have length n. (t,1,2) (t,1,2) are interested in Πz (0) and Πz (x) due to cases (a) and (b), respectively. (t,1) ˆ z (0) due to (a). Using that U0,2 = −1 in (4.32), we have The contribution to Π (t,1,2) Πz (0) = 2dz2 z|R0 |+|R1 |+|R2 | (1 + U0,1 ) (1 + U1,2 ) . ∑ R0 0,R1 e1 R2 0 (4.34) Since the factors (1 + U0,1 ) and (1 + U1,2 ) are at most 1, we get the upper bound (t,1,2) Πz (0) ≤ 2dz2 ∑ z|R0 |+|R1 |+|R2 | = 2dz2 g(t) (z)3 . (0) ≤ e 1 +o 2d 2d R0 0,R1 e1 R2 0 (4.35) Theorem 1.1 imply (t,1,2) Π (t) zc . (4.36) On the other hand, since the terms Ui, j are 0 or -1, we have ∏ (1 + Ui, j ) ≥ 1 + 0≤i< j≤n ∑ Ui, j . 0≤i< j≤n Hence, the product (1 + U0,1 ) (1 + U1,2 ) ≥ 1 + U0,1 + U1,2 , 47 (4.37) which yields the lower bound (t,1,2) Πz (0) ≥ 2dz2 z|R0 |+|R1 |+|R2 | (1 + U0,1 + U1,2 ) ∑ R0 0,R1 e1 R2 0 (t) 2 (4.38) (t) 3 = 2dz g (z) + 2g (t) (z)Wz (e1 ) . Hence, Theorem 1.1 and Claim 4.6 imply (t,1,2) Π (t) zc (0) ≥ e 1 +o 2d 2d , (4.39) (0) = e 1 +o 2d 2d . (4.40) which together with (4.36) give (t,1,2) Π (t) zc ˆ (t,1) The contribution to Π (0) due to (b). This is z ∑ (t,1,2) Πz (t,1,2) (x) = 2dΠz (0, e1 ) = −2dz ∑ (t) z|R0 |+|R1 | U0,1 = −2dzWz (e1 ). R0 0 R1 e1 x: x 1 =1 (4.41) Then Theorem 1.1 and Claim 4.6 yield (t,1,2) ∑ Π (t) x: x 1 =1 zc (x) = 1 2e +o 2d 2d . (4.42) Finally, adding (4.40) and (4.42) gives the desired result (4.27) for lattice trees, namely, ˆ (t) ˆ (t,1) Π (t) (0) = −Π (t) (0) + o zc 4.3.2 zc 1 2d =− 3e 1 +o 2d 2d . Lattice animals In this section we complete the proof of Lemma 4.2 by addressing the lattice animal case. We will see that the analysis, up to some details, is very similar to the one for lattice trees that we exposed in Section 4.3.1. ˆ (a) Proof of Lemma 4.2 for lattice animals. Recall that the Fourier transform Π (a) (0) is given in (3.44) zc by ˆ (a) ˆ (a,0) ˆ (a,1) Π (a) (0) = Π (a) (0) − Π (a) (0) + zc zc zc (a,N) ∑ (−1)N Πˆ z N≥2 48 (a) c (0). (4.43) (a) It is known (see [16, (1.23)]) that there is a c > 0 such that for all N ≥ 1 and all z ∈ [0, zc ], (a,N) ˆ (a) (0) ≤ cN d −(N∨1) , 0≤Π (4.44) zc and this implies that the third summand in (4.43) is of order O (2d)−2 and, therefore, can be neglected. We will prove that the first two terms on the right-hand side of (4.43), satisfy −2 ˆ (a,0) Π (a) (0) = O (2d) (a,1) ˆ (a) (0) = − −Π and zc zc 1 3e +o 2d 2d , (4.45) which give the desired result (4.27) for lattice animals. (a,0) ˆ (a,0) The term Π (x), at criticality, which was (a) (0) is the Fourier transform of the function Πz zc defined in (3.39). It is given by (a,0) ˆ (a,0) Π (0) = ∑ Πz (x) = ∑ (1 − δ0,x ) z x x z|R| . ∑ R∈D0,x Notice that, by definition, an animal R ∈ D0,x contains two self-avoiding walks between 0 and x that do not have common bonds. These walks form a cycle, of length 4 or more, containing 0 and x. (a) Therefore Proposition 4.5 implies that, for z ≤ zc , ˆ (a,0) Π (0) ≤ ∑ z ∑ (a,i) Gz (a, j) (0, x)Gz (0, x) = x i+ j=4 ∑ (a,i) Gz (a, j) ∗ Gz (4,2) (0) = Sz (0) ≤ O (2d)−2 . i+ j=4 ˆ (a,1) On the other hand, the analysis of the term Π (0) is analogous to the corresponding one for z lattice trees. It is given by (a,1) (a,1) ˆ (a,1) Π (0) = ∑ Πz (x) = Πz (0) + z x ∑ (a,1) Πz (x) + ∑ (a,1) Πz (x), (4.46) x: x 1 ≥2 x: x 1 =1 where the function (a,1) Πz (x) = − ∑ B:|B|≥1 |B| z|B| ∏ i=0 ∑ Ri ∈Dvi ,ui+1 z|Ri | U0,|B| ∏ (1 + Ust ) , (4.47) 0≤s<t≤|B| (s,t)=(0,|B|) with v0 = 0 and u|B|+1 = x. The factor U0,|B| in the previous expression forces a common vertex, say y, between the first and last ribs, and the last product forbids any other intersection. This implies that the paths connecting 0 to y, 0 to x and x to y form a cycle containing 0 and x. We denote by ˆ (a,1,n) ˆ (a,1) Π (0), the contribution to Π (0) by the cases in which the cycle formed in (4.47) has length z z n. An argument similar to the one used to obtain (4.33), gives that when these cycles have length n 49 (a) ˆ (a,1) or more, the contribution to Π (0), for z ≤ zc , is at most of order z ˆ (a,1,≥n) Π (0) ≤ O (2d)−n/2 . z (4.48) −1 , we only need to ˆ (a,1) Therefore, when computing the Fourier transform Π (a) (0) up to order (2d) zc study the cases in which the cycles formed in (4.47) have length 2. All other cases form cycles that have length at least 4, then (4.48) implies that their contribution is of order O (2d)−2 , and can be neglected. This observation implies that the contribution of the third term on the right-hand side of (4.46) is negligible, since any cycle containing 0 and x (which is at distance 2 or more from the origin) is of length at least 6. Hence, we will only analyze the first and second summands in (4.46), for the (a,1,n) cases in which the cycles formed in (4.47) have length 2. Let Πz (a,1) to Πz (x) when the cycles (a,1,2) Πz (x), for x 1 = 1. (x) denote the contribution (a,1,2) formed in (4.47) have length n. We are interested in Πz (0) and When the vertex x = 0, the cycles of length 2 are formed by a path connecting the origin with one of its neighbors and ending at 0. These cycles are at the same time the backbones B = ((u1 , v1 ) , (u2 , v2 )), with u1 = 0, v1 = u2 given by a nearest neighbor of the origin, and u2 = 0. This implies that the sums over animals Ri with a double connection between vi and ui+1 in (4.47), get simplified to sums over animals containing the vertex vi = ui+1 . Let Then we have (a,1,2) Πz (0) = 2dz2 ∑ z|R0 |+|R1 |+|R2 | (1 + U0,1 ) (1 + U1,2 ) , R0 0,R1 e1 R2 0 (4.49) which agrees with the analogous quantity for lattice trees given in (4.34). Since Theorem 1.1 and Claim 4.6 give equal results for lattice trees and animals, a procedure similar to the one used to (t,1,2) study Π (t) zc (0), in (4.36) and (4.39), yields (a,1,2) Π (a) zc (0) = e 1 +o 2d 2d . (4.50) For the second term on (4.46), the cycles of length 2 consist of the backbone B = (0, x), and the intersection of the ribs emanating from 0 and x through one edge. All other possibilities in which the backbone consists of a bond different from (0, x) or has more than one edge, produce cycles of length 4 or more, and are negligible. In the case of B = (0, x), the sums over animals Ri with a double connection between 0 and x that appear in (4.47), get simplified to sums over animals that 50 contain the vertices 0 or x. This implies that ∑ (a,1,2) Πz (a,1,2) (0, x) = 2dΠz (0, e1 ) = −2dz (a) ∑ z|R |+|R | U0,1 = −2dzWz 0 1 R0 0 R1 x x: x 1 =1 (e1 ), (4.51) which agrees with the corresponding quantity for lattice trees given in (4.41). Theorem 1.1 and Claim 4.6 imply (a,1,2) ∑ Π (a) zc x: x 1 =1 (0, x) = 1 2e +o 2d 2d . (4.52) Finally, adding (4.50) and (4.52), we get the desired result (4.27) for lattice animals, namely, ˆ (a,1) ˆ (a,1) Π (a) (0) = −Π (a) (0) + o zc 4.4 zc 1 2d =− 3e 1 +o 2d 2d . Proof of Lemma 4.3 The goal of this section is to show Lemma 4.3, which states that for nearest-neighbor lattice trees and lattice animals, g(zc ) = e + 3 2e 2d +o 1 2d (4.53) . Except for minor adjustments for the case of lattice animals, the proof will be simultaneously done ˆ z (0) obtained in Section 4.3, and estimates for both models. In our reasoning, the expansion for Π Proposition 4.5, Claim 4.6 and Lemma 4.7 from Section 4.2, will be fundamental. Proof of Lemma 4.3. By (3.9), we know that g(zc ) = A(zc ) + B(zc ) +C(zc ) + E(zc ) + Ia ∑ A 0 0∈cycle 51 (zc )|A| . We will show that for nearest-neighbor lattice trees and lattice animals, as d → ∞, 1 3e +o 2d 2d e 1 B(zc ) = − + o 2d 2d e 1 C(zc ) = − 2 + o 2d 2d 1 E(zc ) = o 2d 1 (zc )|A| = o . 2d A(zc ) = e + Ia ∑ A 0 0∈cycle (4.54) Adding these quantities gives the desired result (4.53); hence, it only remains to show (4.54). ˆ zc (0) to the one-point function g(zc ). To tackle this A key ingredient for the proof, is to relate Π task, we first define the quantity ˆ z (0), M (z) := 2dzΠ (4.55) which will play an important role in the expansion of g(z). Theorem 1.1 and Lemma 4.2 yield M(zc ) = − 1 3 +o 2d 2d as d → ∞. (4.56) The term A(zc ). Recall that A(z) is given, in (3.10), by A(z) = e2dzg(z) . Then (1.23) and (4.55), yield that the exponent ˆ zc (0) = 1 − M(zc ), 2dzc g(zc ) = 1 − 2dzc Π which implies that A(zc ) = e1−M(zc ) . (4.57) Therefore, e−M(zc ) − 1 = 3e, d→∞ −M(zc ) lim 2d(A(zc ) − e) = lim 2de e−M(zc ) − 1 = lim −2deM(zc ) lim d→∞ d→∞ d→∞ where in the last equality we used (4.56) and the fact that the limit of the ratio is 1, since it is the 52 derivative of the function ex evaluated at 0. Then we have the desired result (4.54) for A(zc ), i.e., A(zc ) = e + 1 3e +o 2d 2d . (4.58) The term B(zc ). Recall that B(z) was defined in (3.11) as B(z) = −2dzA(z)Gz (e1 ). Using (4.58) together with Theorem 1.1 and Lemma 4.7, yield the desired result (4.54) for B(zc ), i.e., B(zc ) = −2dzc A(zc )Gzc (e1 ) = − 1 e +o 2d 2d . The term C(zc ). Recall that C(z) is given in (3.12) by zm ∑ m=2 m! s1 ,...,sm ∈E ∞ C(z) = ∑ z|C1 | · · · ∑ C1 s1 ∑ z|Cm | Vi, j . ∑ 1≤i< j≤m Cm sm We first exchange the sums over s1 , . . . , sm ∈ E and 1 ≤ i < j ≤ m and get zm (2dg(z))m−2 ∑ m! 1≤i< j≤m m=2 ∞ C(z) = ∑ ∑ si ,s j ∈E z|C j | Vi, j . ∑ z|C | ∑ i Ci si Cj sj We distinguish whether the vertices si and s j are equal, denoted by Isi =s j , or not, denoted by Isi =s j , zm ∑ m! (2dg(z))m−2 ∑ m=2 1≤i< j≤m ∞ C(z) = ∑ ∑ z|C | ∑ (zc )|C | Isi =s j + Isi =s j j i si ,s j ∈E Ci si Vi, j . Cj sj In the case that si = s j , automatically the factor Vi, j = −1, which implies that the sums over Ci and C j are independent and can be reduced to one-point functions. This observation yields (m − 1)m zm (2dg(z))m−2 2dg(z)2 m! 2 m=2 ∞ C(z) = − ∑ zm ∑ m! (2dg(z))m−2 ∑ m=2 1≤i< j≤m ∞ + ∑ Isi =s j ∑ Isi =s j si ,s j ∈E ∑ z|C | ∑ z|C j | Vi, j (4.59) ∑ z|C | ∑ z|C j | Vi, j . (4.60) i Cj sj Ci si 1 = − 2d(zg(z))2 e2dzg(z) +Cerror (z), 2 where zm (2dg(z))m−2 ∑ m! m=2 1≤i< j≤m ∞ Cerror (z) := ∑ si ,s j ∈E i Ci si Notice that the first term in the last line of (4.59) is 1 1 − 2d(zg(z))2 e2dzg(z) = − 2d(zg(z))2 A(z). 2 2 53 Cj sj Theorem 1.1 and (4.58) imply that, at criticality, this expression is 1 e 1 1 − 2d(zc g(zc ))2 A(zc ) = − 2 + o 2 2d 2d , which is the desired result (4.54) for the term C(zc ). Thus it only remains to prove that Cerror (zc ) is an error term (hence its name). The factor Vi, j in (4.60) forces an intersection between the clusters Ci and C j , say y. The simplest ways in which an intersection happens is either Ci or C j contain the couple of edges {0, si } and 0, s j , or Ci contains the bond {0, si } and C j contains 0, s j . In case that si and s j are perpendicular, we also need to consider the possibility that either Ci or C j contain the couple of edges si , si + s j and s j + si , si , or Ci contains the bond si , si + s j and C j contains si + s j , s j . All other intersections between Ci and C j require at least 4 edges and, hence, their (4,2) contribution is bounded by Sz (s j − si ) ≤ O (2d)−2 , by Proposition 4.5. Therefore, ignoring the non-intersection restriction of the three ribs emanating from the endpoints of these 2 edges and the overlapping of these events, yields Isi =s j ∑ z|C | ∑ i Ci si z|C j | Vi, j ≤ 6z2 g(z)4 + O (2d)−2 . Cj sj Substituting this result into (4.60), gives zm ∑ m! (2dg(z))m−2 ∑ m=2 1≤i< j≤m ∞ |Cerror (z)| ≤ 6z2 g(z)3 + O (2d)−2 ∑ si ,s j ∈E si =s j zm (m − 1)m (2dg(z))m−2 2d(2d − 1) 6z2 g(z)3 + O (2d)−2 m! 2 m=2 1 ≤ (2dz)2 A(z) 6z2 g(z)3 + O (2d)−2 . 2 ∞ = ∑ Theorem 1.1 and (4.58) imply that, at criticality, this expression is of order o((2d)−1 ), as d → ∞. The term E(zc ). Recall that E(z) was defined in (3.13) as zm ∑ m=2 m! s1 ,...,sm ∈E ∞ E(z) = ∑ ∑ z|C1 | · · · C1 s1 ∑ z|Cm | ∑ ∑ Vi, j Vk,l 0≤i< j≤m (k,l)∈Ai, j Cm sm ∏ (1 + V p,q ) . (p,q)∈Ak,l The fact that the factors V p,q are equal to 0 or to -1, implies that the product ∏(p,q)∈Ak,l (1 + V p,q ) ≤ 1. This observation yields the bound zm ∑ ∑ m=2 m! s1 ,...,sm ∈E ∞ E(z) ≤ ∑ C1 s1 z|C1 | · · · ∑ z|Cm | Cm sm 54 ∑ 0≤i< j≤m ∑ (k,l)∈Ai, j Vi, j Vk,l . (4.61) We decompose the last factor in this expression as follows ∑ 0≤i< j≤m ∑ Vi, j Vk,l = ∑ V0, j V0,l + ∑ V0, j Vk,l + ∑ 1≤i< j≤m 1≤ j≤m 1≤k<l≤m 1≤ j<l≤m (k,l)∈Ai, j ∑ Vi, j Vk,l , (k,l)∈Ai, j (4.62) where the first summand corresponds to i = k = 0, the second one to i = 0 and k > i, and the third one to i ≥ 1. We substitute this expression back into (4.61) and distribute the product among the summands, to get E(z) ≤ E 1 (z) + E 2 (z) + E 3 (z), (4.63) where E 1 (z) := zm ∑ ∑ m≥2 m! s1 ,...,sm ∈E ∞ ∑ z|C1 | · · · C1 s1 ∑ z|Cm | Cm sm m z E 2 (z) := ∑ ∑ ∑ z|C1 | · · · ∑ z|Cm | m! m≥2 Cm sm s1 ,...,sm ∈E C1 s1 E 3 (z) := zm ∑ m≥3 m! s1 ,...,sm ∈E ∑ ∑ z|C1 | · · · ∑ (4.64) ∑ V0, j Vk,l , ∑ ∑ (4.65) 1≤ j≤m 1≤k<l≤m z|Cm | Cm sm C1 s1 V0, j V0,l , ∑ 1≤ j<l≤m Vi, j Vk,l . (4.66) 1≤i< j≤m (k,l)∈Ai, j We will analyze the terms E 1 (z), E 2 and E 3 (z), separately; and show that, at criticality, they are of order o((2d)−1 ), as d → ∞. In each case we start by exchanging the sums over the labels i, j, k and l, and the vertices s2 , . . . , sm . The term E 1 (zc ). By definition, E 1 (z) is equivalent to E 1 (z) = zm (2dg(z))m−2 ∑ m! m≥2 1≤i< j≤m ∑ ∑ Gz (s j )Gz (sl ) s j ,sl ∈E = zm m(m − 1) ∑ m! (2dg(z))m−2 2 (2dGz (e1 ))2 m≥2 = 1 1 (2dzGz (e1 ))2 e2dzg(z) = (2dzGz (e1 ))2 A(z). 2 2 By Theorem 1.1, Lemma 4.7 and (5.50), we have E 1 (zc ) = 1 2e (2d)2 +o 1 (2d)2 and can be neglected at this stage. 55 , as d → ∞, (4.67) The term E 2 (zc ). By definition, E 2 (z) is equivalent to E 2 (z) = zm (2dg(z))m−3 m! m≥2 ∑ ∑ 1≤ j≤m 1≤k<l≤m ∑ s j ,sk ,sl ∈E ∑ C j s j ,Ck sk Cl sl z|C j |+|Ck |+|Cl | V0, j Vk,l . (4.68) The cardinality of the set of labels j, k and l satisfy r := |{ j, k, l}| = 2 or 3. In both cases, the number of possibilities for the labels is C˜r m , where the coefficient C˜r is a combinatorial factor, r independent of d, that can be determined for r = 2, 3. Substituting C˜r m r in (4.68) produces zm ∑ m! (2dg(z))m−r C˜r m≥r m I r |{ j,k,l}|=r s j ,s∑ k ,sl ∈E ∑ C j s j ,Ck sk Cl sl z|C j |+|Ck |+|Cl | V0, j Vk,l = C˜r A(z)zr I|{ j,k,l}|=r ∑ r! s j ,sk ,sl ∈E ∑ C j s j ,Ck sk Cl sl (4.69) z|C j |+|Ck |+|Cl | V0, j Vk,l , with r = 2, 3. We will show that the contribution in both cases r = 2, 3, is of order o((2d)−1 ), as d → ∞. In our analysis we estimate the following quantity for r = 2, 3, I|{ j,k,l}|=r ∑ s j ,sk ,sl ∈E ∑ z|C j |+|Ck |+|Cl | V0, j Vk,l . (4.70) C j s j ,Ck sk Cl sl If the labels obey r = |{ j, k, l}| = 2, then either j = k = l or j = l = k. Then the number of options for the labels is 2 m 2 . We only analyze the case j = k = l since the other one is analogous. For convenience we suppose that j = k = 1 and l = 2. The vertices s1 and s2 are either the same or different nearest-neighbors of the origin, i.e., the cardinality of the set {s1 , s2 } is |{s1 , s2 }| = 1 or |{s1 , s2 }| = 2. If |{s1 , s2 }| = 1, automatically the factor V1,2 = −1. Then (4.70) becomes ∑ s1 ,s2 ∈E Is1 =s2 ∑ z|C1 |+|C2 | V0,1 V1,2 = −2dg(z) C1 s1 ,C2 s2 ∑ z|C1 | V0,1 = 2dg(z)Gz (e1 ). C1 e1 (4.71) Substituting this result into (4.69) and using Theorem 1.1, Lemma 4.7 and (5.50), we get that the contribution to E 2 (zc ) is 2dA(zc )z2c g(zc )Gzc (e1 ) = 1 e +o 2 (2d) (2d)2 , as d → ∞, (4.72) and can be neglected at this stage. If |{s1 , s2 }| = 2, the simplest way in which the term V0,1 V1,2 is non zero is when the clus56 ter C1 contains the edges {0, s1 } and {0, s2 }, or the cluster C1 contains {0, s1 } and C2 contains {0, s2 }, all other intersections require at least four edges and their contribution is bounded by (4,2) Sz ≤ O (2d)−2 . Therefore, (4.70) is bounded by ∑ Is1 =s2 s1 ,s2 ∈E ∑ z|C1 |+|C2 | V0,1 V1,2 ≤ 2(2d)2 2z2 g(z)4 + O (2d)−2 . C1 s1 ,C2 s2 Replacing this expression into (4.69) and using Theorem 1.1, Lemma 4.7 and (5.50), we get that the contribution to E 2 (zc ) is of order A(zc )z2c (2d)2 2z2c g(zc )4 + O (2d)−2 1 2d =o , as d → ∞. (4.73) When the labels satisfy r = |{ j, k, l}| = 3, to determine the number of options for j, k and l with 1 ≤ j ≤ m, 1 ≤ k < l ≤ m and j = k = l, we choose three labels among m, and notice that j can be any of these and once j is determined, so are k and l. Therefore, the desired quantity is 3 m 3 . For convenience, we suppose that j = 1, k = 2 and l = 3. Hence, (4.70) becomes ∑ ∑ z|C1 | V0,1 s1 ∈E C1 s1 = −2dGz (e1 ) ∑ ∑ z|C2 |+|C3 | V2,3 s2 ,s3 ∈E C2 s2 ,C3 s3 ∑ ∑ z (4.74) |C2 |+|C3 | V2,3 . s2 ,s3 ∈E C2 s2 ,C3 s3 In the last factor, we distinguish whether the vertices s2 and s3 are equal. When s2 = s3 , the factor V2,3 is automatically -1 and does not affect the sums, which become a product of two one-point functions. When s2 = s3 the intersection between C2 and C3 requires at least two edges. These observations imply that (4.74) is bounded by (2,2) 2dGz (e1 ) 2dg(zc )2 + 2d(2d − 1)Sz . Therefore, replacing this expression into (4.69) and using Theorem 1.1, Proposition 4.5, Lemma 4.7 and (4.58), yield that the contribution to E 2 (zc ), when |{ j, k, l}| = 3, is of order o((2d)−1 ), as d → ∞. The term E 3 (z). We exchange the order of the sums over the labels i, j, k and l, and the vertices s2 , . . . , sm in (4.66), to get the equivalent expression E 3 (z) = zm (2dg(z))m−4 ∑ 1≤i< j≤m m≥3 m! ∑ (k,l)∈Ai, j ∑ ∑ si ,...,sl ∈E Ci si ...Cl sl z|Ci |+···+|Cl | Vi, j Vk,l . (4.75) The set of labels satisfies r := |{i, j, k, l}| = 3 or 4. In both cases, the number of possibilities for 57 the labels is C˜r m r , where the coefficient C˜r is a combinatorial factor, independent of d, that can be determined for r = 3, 4. Substituting C˜r m in (4.76) produces r m zm ∑ m! (2dg(z))m−r C˜r r I|{i, j,k,l}|=r m≥r C˜r = A(z)zr I|{i, j,k,l}|=r r! ∑ ∑ ∑ z|Ci |+···+|Cl | Vi, j Vk,l si ,...,sl ∈E Ci si ...Cl sl |Ci |+···+|Cl | z ∑ (4.76) Vi, j Vk,l , si ,...,sl ∈E Ci si ...Cl sl for r = 3, 4. We will show that the contribution in both cases is of order o((2d)−1 ), as d → ∞. In our analysis we estimate the following quantity for r = 3, 4, I|{i, j,k,l}|=r ∑ z|Ci |+|C j |+|Ck |+|Cl | Vi, j Vk,l . (4.77) Ci si ,C j s j Ck sk ,Cl sl The condition r = |{i, j, k, l}| = 3 is satisfied when k = i, k = j or l = j. In all cases, we choose three labels from a set of m and order them, this order automatically determines which one corresponds to i, j, k and l. Hence, the number of options for the labels is 3 m 3 . We will study the case k = i, since the other two are analogous. For convenience we assume that i = k = 1, j = 2 and l = 3. We distinguish two possibilities for the vertices s1 , s2 and s3 , |{s1 , s2 , s3 }| = 1 and |{s1 , s2 , s3 }| = 2, 3. If |{s1 , s2 , s3 }| = 1, then automatically the factor V1,2 V1,3 = 1 because the three clusters C1 , C2 and C3 contain the same vertex s1 . Therefore, (4.77) becomes ∑ I|{s1 ,s2 ,s3 }|=1 s1 ,s2 ,s3 ∈E ∑ z|C1 |+|C2 |+|C3 | V1,2 V1,3 = 2dg(z)3 . (4.78) C1 s1 ,C2 s2 C3 s3 Substituting this expression into (4.76) and using Theorem 1.1 and (4.58), yield that the contribution to E 3 (zc ) is 1 e 1 3 2dA(zc )(zc g(zc ))3 = 2 2 + o 3! (2d) (2d)2 (4.79) , as d → ∞, and can be neglected at this stage. If |{s1 , s2 , s3 }| = 2 or 3, then at least two of the vertices are different, say s1 = s2 . Using that |V1,3 | ≤ 1, we get the following bound for (4.77), ∑ s1 ,s2 ,s3 ∈E I|{s1 ,s2 ,s3 }|≥2 ∑ z|C1 |+|C2 |+|C3 | V1,2 V1,3 ≤ 3(2d)3 g(z) ∑ z|C1 |+|C2 | |V1,2 | C1 e1 ,C2 e2 C1 s1 ,C2 s2 C3 s3 ≤ 3(2d)3 g(z) 58 (4,2) 6z2 g(z)2 + Sz (4.80) , where in the last inequality the terms in braces correspond to the intersection between C1 and C2 requiring 2, and 4 or more edges, respectively. Substituting this result into (4.76) yields that this term is bounded by 3 3 (4,2) z A(zc )(2d)3 g(z) 6z2 g(z)2 + Sz = o((2d)−1 ), as d → ∞, 2 where in the equality we have used Theorem 1.1, Proposition 4.5 and (4.58). Now we study the case when i, j, k and l are all different. To determine the number of possibilities for the labels we chose four labels from a set of m and order them. Then i is the smallest one by definition, j has the remaining 3 options, and once j is determined, so are k and l. Hence, the m 4 desired quantity is 3 . For convenience we assume that i = 1, k = 2, j = 3 and l = 4. Then in this case, (4.77) is given by 2 ∑ ∑ s1 ,...,s4 ∈E |C1 |+|C2 | z V1,2 |C3 |+|C4 | z ∑ C1 s1 C2 s2 V3,4 = |C1 |+|C2 | z ∑ ∑ s1 ,s2 ∈E C3 s3 C4 s4 V1,2 C1 s1 C2 s2 (4.81) 2 (2,2) ≤ 2dg(zc )2 + 2d(2d − 1)Sz , where in the inequality we have applied the same reasoning that we employed when analyzing the last factor in (4.74). Replacing this expression into (4.76) yields the bound, 3 4 (2,2) z A(z) 2dg(zc )2 + 2d(2d − 1)Sz 4! 2 . By Theorem 1.1, Proposition 4.5 and (4.58), this expression, at criticality, is of order o((2d)−1 ), as d → ∞. This completes the proof that E(z) is an error term. The term Ia ∑ A 0 0∈cycle z|A| . Due to the topology of Zd , a cycle that contains the origin has length 4 or more, this implies Ia ∑ A 0 0∈cycle z|A| ≤ ∑ ∑ (a,i) Gz (a, j) (x)Gz (x) = x i+ j=4 ∑ (a,i) Gz i+ j=4 and Proposition 4.5 gives Ia ∑ (zc )|A| = o A 0 0∈cycle This completes the proof of Lemma 4.3. 59 1 2d (a, j) ∗ Gz as d → ∞. (4,2) (0) = Sz (0), Chapter 5 Proof of second order correction The goal of this chapter is to prove Theorem 1.4, which states that 27 1 3e 2e ˆ (t) − +o Π (0) = − (t) zc 2d (2d)2 (2d)2 3 3e 27 1 2 e− 2 ˆ (a) (0) = − Π − +o (a) zc 2d (2d)2 (2d)2 , and Theorem 1.5, which states that (t) g(t) (zc ) = e + (a) g(a) (zc ) = e + 3 2e 2d 3 2e 2d + 263 24 e (2d)2 + 263 24 e − 1 (2d)2 +o 1 (2d)2 +o , 1 (2d)2 . These demonstrations complete the proof of Theorem 1.2, which is the main goal of this thesis. In Section 5.1, we calculate the next term in the expansions for Wzc (x) and Gzc (x). These extended expansions will allow us to prove Theorem 1.4, in Section 5.2, and Theorem 1.5, in Section 5.3. 5.1 Update of useful estimates In this section, we calculate the next term in the expansions for Wzc (x) and Gzc (x) in Claim 5.1 and Lemma 5.2, respectively, which extends the results in Claim 4.6 and Lemma 4.7. The proof uses the new expansions for zc and g(zc ) that we computed in Lemma 4.1 and Lemma 4.3, respectively. On this occasion, we also estimate the quantity Wzc (x), when x is at distance 2 from the origin; however, in this case, the results for zc and g(zc ) in Theorem 1.1 are sufficient. 60 Recall that Wz (x) was defined in (4.16) as Wz (x) = ∑ ∑ z|C |+|C | U0,1 , 0 1 C0 0 C1 x where U0,1 = −1 if the clusters C0 and C1 share a common vertex, and 0 otherwise. Claim 5.1. For nearest-neighbor lattice trees and animals, let ei and e j be two nearest neighbors of the origin such that they are perpendicular. Then as d → ∞, 1 2e2 11e2 − +o 2 2d (2d) (2d)2 1 3e2 +o , Wzc (2ei ) = − (2d)2 (2d)2 6e2 1 Wzc (ei + e j ) = − +o . 2 (2d) (2d)2 Wzc (ei ) = − , (5.1) (5.2) (5.3) Proof of Claim 5.1. For the lattice animal case, we distinguish whether 0 and x belong to a cycle contained in one of the animals C0 or C1 . A similar argument to the one preceding (4.19), yields that the contribution to Wzc (x) when this condition is satisfied is at most of order o (2d)−2 . Therefore, for the rest of the proof we assume that both animals, C0 and C1 , do not have any cycle containing the 0 and x = ei , 2ei or ei + e j . Clusters C0 and C1 contribute to Wz (x) if and only if they have a vertex in common, say y. Then there is a path connecting 0 and y contained in C0 , and a path connecting y and x contained in C1 , which we denote ω 0 and ω 1 , respectively. The paths ω 0 and ω 1 can be uniquely determined. The union of ω 0 and ω 1 form a path connecting 0 to x (passing through y), which we call ω. We write Wzn (x) to refer to the contribution to Wz (x) by all the configurations whose path ω has length n. Proof of Equation 5.1. If the path ω has length 1, then ω = (0, ei ). This means that the edge {0, ei } is contained in either C0 or C1 , say in C0 . In this case, C0 consists of the edge {0, ei } and two non intersecting subclusters, C0∗ and C1∗ , the first one emanating from 0 and the second one emanating from ei . Exchanging the roles of C0 and C1 , and subtracting the contribution due to the event in which both clusters C0 and C1 contain the bond {0, ei }, yield Wz1 (ei ) = −2zg(z) ∑z |C0∗ |+|C1∗ | C0∗ 0 C1∗ x ∗ 1 + U0,1 +z 2 ∑z C0∗ 0 C1∗ x |C0∗ |+|C1∗ | 2 ∗ 1 + U0,1 , ∗ = −1 if the subclusters C ∗ and C ∗ have a common vertex, and 0 otherwise. Distributing where U0,1 0 1 the products in this expression we get 2 Wz1 (ei ) = −2zg(z)3 − 2zg(z)Wz (x) + z2 g(z)2 +Wz (x) . 61 By Theorem 1.1, Lemma 4.1 and Claim 4.6 we have Wz1c (ei ) = − 1 7e2 2e2 − +o 2 2d (2d) (2d)2 , as d → ∞. (5.4) If the path ω has length 3, then it is of the form ω = (0, w, w + ei , ei ), for some vertex w perpendicular to ei . There are 2d − 2 of such paths and each of them has four possibilities for y. If we treat the five ribs emanating from the vertices in ω 0 and ω 1 as independent, we have the lower bound Wz3c (ei ) ≥ −4(2d − 2)z3c g(zc )5 = − 1 4e2 +o 2 (2d) (2d)2 , as d → ∞, where the last equality is due to Theorem 1.1. For an upper bound, we use inclusion-exclusion and subtract from the lower bound the contribution when there are pairwise intersections among the ribs that belong to the same path, either ω 0 or ω 1 . This gives Wz3c (ei ) ≤ −4(2d − 2)z3c g(zc )3 g(zc )2 + 4Wzc (ei ) + 2Wzc (ei + w) . On the right-hand side of this expression appears Wz (ei + w), which is precisely one of the quantities we want to compute. At this point we only determine that it is of order O((2d)−1 ). Since |ei + w| = 2, Proposition 4.5 implies that |Wzc (ei + w)| ≤ ∑ (i) ( j) (2,2) Gzc ∗ Gzc (ei + w) = Szc (ei + w) ≤ j+k=2 C2,2 . 2d This result, Theorem 1.1 and Claim 4.6, yield Wz3c (ei ) ≤ − 1 4e2 +o 2 (2d) (2d)2 , as d → ∞. 4e2 1 +o 2 (2d) (2d)2 , as d → ∞. Therefore, both bounds yield Wz3c (ei ) = − The contribution to Wz (ei ) when the path ω has length 5 or more, is bounded by Wz≥5 (ei ) ≤ ∑ c ∑ (i) ( j) (5,2) Gzc (y)Gzc (ei − y) = Szc y i+ j=5 where the last equality is due to Proposition 4.5. 62 (ei ) = o 1 (2d)2 , as d → ∞, (5.5) Finally, we have that, as d → ∞, Wzc (ei ) = Wz1c (ei ) +Wz3c (ei ) +Wz≥5 (ei ) = − c 1 11e2 2e2 − +o 2 2d (2d) (2d)2 . This completes the proof of equation (5.1). Proof of Equation 5.2. If the path ω has length 2, then ω = (0, ei , 2ei ). There are three possibilities for y. Treating the four ribs emanating from the vertices in ω 0 and ω 1 as independent, yields the lower bound Wz2c (2ei ) ≥ −3z2c g(zc )4 = − 1 3e2 +o 2 (2d) (2d)2 , as d → ∞, where the equality is due to Theorem 1.1. For an upper bound, we use inclusion-exclusion and subtract from the lower bound the contribution by the the pairwise intersections among the ribs that belong to the same path, either ω 0 or ω 1 . This gives Wz2c (2ei ) ≤ −3z2c g(zc )2 g(zc )2 + 2Wzc (ei ) +Wzc (2ei ) . (5.6) On the right-hand side of this expression appears Wzc (2e1 ), which is precisely the quantity we want to compute. At this point we only determine that is of order O((2d)−1 ). Since |2ei | = 2, Proposition 4.5 implies that |Wzc (2ei )| ≤ (i) ( j) (2,2) Gzc ∗ Gzc (2ei ) = Szc ∑ (2ei ) ≤ j+k=2 C2,2 . 2d (5.7) This result, Theorem 1.1 and Claim 4.6, yield Wz2c (2ei ) ≤ − 1 3e2 +o 2 (2d) (2d)2 , as d → ∞. If the path ω has length 4, then it is of the form ω = (0, w, w + ei , w + 2ei , 2ei ), for some vertex w perpendicular to ei . There are 2d − 2 of such paths and each of them has five possibilities for y. If we treat the six ribs emanating from the vertices in ω 0 and ω 1 as independent, we get the bound Wz4c (2ei ) ≤ 5(2d − 2)z4c g(zc )6 = o 1 (2d)2 , as d → ∞ where the equality is due to Theorem 1.1. The contribution to Wz (2ei ) when the path ω has length 6 or more, is bounded by Wz≥6 (2ei ) ≤ ∑ c ∑ (i) ( j) (6,2) Gzc (y)Gzc (2ei − y) = Szc y i+ j=6 by Proposition 4.5. 63 (2ei ) ≤ O (2d)−2 , Finally, we have that, as d → ∞, Wzc (2ei ) = Wz2c (2ei ) +Wz4c (2ei ) +Wz≥6 (2ei ) = − c 1 3e2 +o 2 (2d) (2d)2 , which completes the proof of equation (5.2). Proof of Equation 5.3. The argument is similar to the one we use in the proof of Equation 5.2. The main difference is that when the path ω has length 2, there are two possibilities for it, ω = (0, ei , ei + e j ) and ω = (0, e j , ei + e j ). For each path ω there are three options for y. This explains the appearance of 6 instead of 3 for the coefficient of (2d)−2 . The other thing that must be modified, is that the upper bound for Wz2c (ei + e j ), analogous to (5.6), will contain the quantity Wzc (ei + e j ), instead of Wzc (2ei ). Using that Wzc (2ei ) is of order O((2d)−1 ), as estimated in (5.5), gives the result. Claim 5.1 will be fundamental in the proofs of Theorem 1.4 and Theorem 1.5. For showing the latter, we first update the expansion of the two-point function Gzc (x), with x 1 = 1, in Lemma 5.2 below. Lemma 5.2. For nearest-neighbor lattice trees and animals, let x be a nearest neighbor of the origin, then as d → ∞, Gzc (x) = 7 e e 1 + 2 2 +o 2d (2d) (2d)2 . (5.8) (t) Proof of Lemma 5.2. Lattice trees. In the definition of Gz (x) given in (3.17), let x = e1 = (1, 0, . . . , 0). We separate the sum over walks in the cases |ω| = 1, |ω| = 3 and |ω| ≥ 5, which gives the first, second and third terms in the expression below, respectively, (t) Gz (0, x) = z ∑ z|R |+|R | (1 + U0,1 ) 0 1 R0 0 R1 x + (2d − 2)z3 ∑ z|R0 |+|R1 |+|R2 |+|R3 | (t,5) + Gz ∏ (1 + Ui, j ) (5.9) 0≤i< j≤3 R0 0,R1 e2 R2 y,R3 x (0, x), where in the second summand e2 = (0, 1, 0, . . . , 0), and y = e1 + e2 . The first summand on the right-hand side of (5.9), evaluated at criticality, is given by (t) zc ∑ (t) |R0 |+|R1 | zc (t) (t) (t) (t) (1 + U0,1 ) = zc g(t) (zc )2 + zc W (t) (x) zc R0 0 R1 x (5.10) = 5 2e 1 e + +o 2d (2d)2 (2d)2 64 as d → ∞, where the second equality is due to Lemma 4.1, Lemma 4.3 and Claim 5.1. To analyze the second summand on the right-hand side of (5.9), we use that the product ∏ (1 + Ui, j ) ≤ 1, 0≤i< j≤3 which together with Theorem 1.1 yield the upper bound (t) 3 (t) e 1 +o 2 (2d) (2d)2 (t) g (zc )4 = (2d − 2) zc as d → ∞. For a lower bound, we use inequality (4.37) and get (2d − 2)z3 z|R0 |+|R1 |+|R2 |+|R3 | ∑ ≥ (2d − 2)z3 ∑ ∏ (1 + Ui, j ) 0≤i< j≤3 R0 0,R1 e2 R2 y,R3 x z|R0 |+|R1 |+|R2 |+|R3 | 1 + Ui, j ∑ 0≤i< j≤3 R0 0,R1 e2 R2 y,R3 x (t) (t) = (2d − 2)z3 g(t) (z)4 + 4g(t) (z)2Wz (x) + 2g(t) (z)2Wz (x + y) . By Theorem 1.1 and Claim 5.1, the last expression, at criticality, is e 1 +o 2 (2d) (2d)2 , as d → ∞. Hence, both bounds yield that, as d → ∞, (t) 3 (2d − 2) zc ∑ (t) |R0 |+|R1 |+|R2 |+|R3 | zc ∏ (1 + Ui, j ) = 0≤i< j≤3 R0 0,R1 e2 R2 y,R3 x e 1 +o 2 (2d) (2d)2 . (5.11) The third summand on the right-hand side of (5.9), satisfies (t,5) (5,1) zc zc G (t) (x) = S (t) (x) = o 1 (2d)2 , (5.12) by Proposition 4.5. Finally, adding the contributions of (5.10), (5.11) and (5.12) gives the desired result (5.8) for lattice trees, namely, (t) G (t) (x) = zc 7 e e 1 + 2 2 +o 2d (2d) (2d)2 . (a) Lattice animals. Now we analyze the two-point function for lattice animals Gz , which was defined 65 in (3.35) in terms of the lace expansion. Recall that in the proof of Lemma 4.7 we analyze it according to the length of the backbone, |B| = 0, 1, 2 and ≥ 3. By (4.23) and (4.26), we know that (a) the contribution to G (a) (x) when |B| = 0 or |B| = 2, is of order o((2d)−2 ). On this occasion we will zc study the cases |B| = 1, 3, 4 and |B| ≥ 5, and see that only the cases |B| = 1 and |B| = 3 contribute (a) to G (a) (x) up to order (2d)−2 . zc (a) When |B| = 1, (4.22) gives the two terms that contribute to G (a) (x) in this case. By the discuszc sion below (4.22), we know that one of them is of order o((2d)−4 ). The other term is (a) zc ∑ (a) |R0 |+|R1 | zc (a) (a) (a) (a) (1 + U0,1 ) = zc g(a) (zc )2 + zc W (a) (x) zc R0 0 R1 x (5.13) = 5 2e e 1 + +o 2d (2d)2 (2d)2 , where the second equality is due to Lemma 4.1, Lemma 4.3 and Claim 5.1. For |B| = 3, if the backbone is one of the 2d − 2 walks of the form ω = (0, y, y + x, x), for some nearest-neighbor y of the origin perpendicular to x, then the double connections between the end-points of these vertices, are simplified to sums over non-intersecting animals containing them. The contribution in this case agrees with the analogous quantity for lattice trees given in the second summand of (5.9). The only difference is that now, the sums are over animals instead of trees. Since the results from Theorem 1.1 and Claim 5.1 are the same for lattice trees and animals, the analysis applied to obtain (5.11), can also be used in this situation to get that, as d → ∞, (a) 3 (2d − 2) zc ∑ (a) |R0 |+|R1 |+|R2 |+|R3 | zc ∏ (1 + Ui, j ) = 0≤i< j≤3 R0 0,R1 e2 R2 y,R3 x 1 e +o 2 (2d) (2d)2 . This expression together with (5.13) give the desired result (5.8) for lattice animals, namely, (a) G (a) (x) = zc 7 e e 1 + 2 2 +o 2d (2d) (2d)2 . It only remains to prove that the contribution when backbone is not of form ω = (0, y, y + x, x), is negligible. If the backbone |B| = 3 but is not given by any of the 3-step walks connecting 0 to x, or |B| = 4, then necessarily one of the double connections between the endpoints of the vertices conforming the backbone has a cycle, of length four or more, containing the corresponding backbone vertices. These two situations are very similar to the one analyzed in the proof of Claim 4.6, for the lattice animal case when |B| = 2. In fact, following the same argument, gives bounds for both cases analogous to the one given in (4.25). The main difference when |B| = 3 and |B| = 4, is that the factor (2dz)2 gets replaced by (2dz)3 and (2dz)4 , there are three and four functions D instead of 66 (a) two, and three and four two-point functions Gz obtain that the contribution is of order o((2d)−2 ), instead of two, respectively. In both cases, we which is analogous to (4.26). When |B| ≥ 5, then necessarily there is a path of length at least five connecting 0 and x. Then the contribution in this case is bounded by (a,5) (5,1) zc zc G (a) (x) = S (a) (x) ≤ O (2d)−5/2 , where the inequality is due to Proposition 4.5. 5.2 Proof of Theorem 1.4 The goal of this section is to show Theorem 1.4, which states that for nearest-neighbor lattice trees and lattice animals, 27 1 3e 2e ˆ (t) +o − Π (0) = − (t) 2 zc 2d (2d) (2d)2 3 3e 27 1 2 e− 2 ˆ (a) Π (0) = − +o − (a) 2 zc 2d (2d) (2d)2 (5.14) . In the proof, we use extensively Proposition 4.5 and Claim 5.1, together with the new results for zc and g(zc ) in Lemma 4.1 and Lemma 4.3, respectively. For convenience we have separated the proof in two parts, the one for lattice trees in Section 5.2.1, and the one for lattice animals in Section 5.2.2. 5.2.1 Lattice trees ˆ (t) Proof of Theorem 1.4 for lattice trees. Recall that the Fourier transform Π (t) (0) is given, in (4.28), zc by ˆ (t) ˆ (t,1) ˆ (t,2) Π (t) (0) = −Π (t) (0) + Π (t) (0) + zc zc zc (t,N) ∑ (−1)N Πˆ z (t) c N≥3 (0). (5.15) By (4.29), the third summand in this expression is of order O (2d)−3 and can be neglected. We will prove that the first and second terms on the right-hand side of (5.15) satisfy (t,1) ˆ (t) (0) = − −Π zc and 49 e 3e 1 − 2 2 +o 2d (2d) (2d)2 11e 1 ˆ (t,2) Π +o (t) (0) = zc (2d)2 (2d)2 . , (5.16) (5.17) Substituting (5.16) and (5.17) into (5.15) gives the desired result (5.14) for the case of lattice trees. Notice that the main difference with the previous step in our analysis, is that now we also need to ˆ (t) study the next term in the series of Π (t) (0). zc 67 ˆ (t,1) Proof of Equation 5.16. It is convenient to decompose the quantity Π (t) (0) as zc (t,1) ˆ (t,1) Π (t) (0) = Π (t) (0) + zc zc (t,1) Π (t) (x) + ∑ x: x 1 =1 zc (t,1) Π (t) (x) + ∑ x: x 1 =2 zc ∑ (t,1) Π (t) (x). x: x 1 ≥3 zc (5.18) By (4.33), the contribution of the first three terms when the cycles formed in (4.32) have length 6 or more, and the contribution of the last term is bounded by ˆ (t,1,≥6) Π (0) = O (2d)−3 . (t) (5.19) zc Therefore, we only need to study the first three terms in (5.18), when the cycles formed in (4.32) have length 2 and 4. (t,1) (t,1,2) zc zc First term in (5.18). For Π (t) (0), we will study Π (t) In the case of (t,1,2) Πz (0), (t,1,2) Πz (t,1,4) (0) and Π (t) zc (0). if in (4.34) the product (1 + U0,1 ) (1 + U1,2 ) is expanded, then (0) = 2dz2 ∑ z|R0 |+|R1 |+|R2 | (1 + U0,1 + U1,2 + U0,1 U1,2 ) R0 0,R1 e1 R2 0 (t) = 2dz2 g(t) (z)3 + 2g(t) (z)Wz (e1 ) + (5.20) z|R0 |+|R1 |+|R2 | U0,1 U1,2 . ∑ R0 0,R1 e1 R2 0 We study in more detail the last term in the this expression. The simplest way in which it contributes is when the rib R1 contains the edge {0, e1 }, then automatically the factors U0,1 and U1,2 are -1 and do not interfere. In this case, we can think of R1 consisting of the edge {0, e1 } and the two nonintersecting subribs R01 and R11 emanating from 0 and e1 , respectively. Then we have ∑ z|R0 |+|R1 |+|R2 | U0,1 U1,2 = zg(t) (z)2 R0 0,R1 e1 R2 0 ∑ 0 1 ∗ z|R1 |+|R1 | 1 + U0,1 R01 0,R11 e1 + ∑ z|R0 |+|R1 |+|R2 | U0,1 U1,2 , (5.21) R0 ,R2 0 R1 e1 ,R1 {0,e1 } ∗ := −1 if the subribs R0 and R1 have a common vertex, and 0 otherwise. The second where U0,1 1 1 summand of this expression is of order o (2d)−1 as d → ∞. The reason is that if the edge {0, e1 } is not present in R1 , then either R1 reaches R0 and R2 , which requires at least three edges and (t,3) can be bounded by g(t) (z)2 Gz (e1 ); or R0 and R2 reach R1 , which requires at least 2 edges (one from R0 and another one from R2 ), and this contribution can be bounded by z2 g(t) (z)5 . These (t) bounds evaluated at z = zc , together with Theorem 1.1 and Proposition 4.5, yield the desired order o (2d)−1 . 68 ∗ We distribute the product by 1 + U0,1 in the first term of (5.21) and get (t) |R0 |+|R1 |+|R2 | zc ∑ (t) (t) (t) (t) (t) U0,1 U1,2 = zc g(t) (zc )4 + zc g(t) (zc )2W (t) (e1 ) + o zc R0 0,R1 e1 R2 0 (t) 1 2d (t) = zc g(t) (zc )4 + o 1 2d as d → ∞, where the second equality is due to Theorem 1.1 and Claim 4.6. Substituting this result into (5.20), and using Claim 4.6, Lemma 4.3 and Lemma 4.1, yield (t,1,2) Π (t) zc (t) 2 (0) = 2d zc (t) (t) (t) (t) (t) g(t) (zc )3 + 2g(t) (zc )W (t) (e1 ) + zc g(t) (zc )4 + o zc 9 2e e 1 +o = + 2 2d (2d) (2d)2 (t,1) The contribution to Πz (t,1,4) Πz 1 2d (5.22) , as d → ∞. (0) when the cycles formed in (4.32) have length 4, is given by (0) = z4 ∑ ω∈W (0,0), |ω|=4 4 z|Ri | ∏ ∑ ∏ i=0 Ri ω(i) (1 + Uk,l ) . (5.23) 0≤k<l≤4 (k,l)=(0,4) The walks in this sum have the form ω = (0, ei , ei + e j , e j , 0), where ei and e j are perpendicular nearest-neighbors of the origin, denoted by ei ⊥ e j . There are 2d(2d − 2) of these walks. Hence, for the walk ω = (0, e1 , e1 + e2 , e2 , 0) we have (t,1,4) Πz 4 (0) = 2d(2d − 2)z4 ∏ ∑ z|Ri | i=0 Ri ω(i) ∏ (1 + Uk,l ) . (5.24) 0≤k<l≤4 (k,l)=(0,4) To determine an upper bound for this quantity we use that the product ∏ (1 + Uk,l ) ≤ 1, and Theorem 1.1, to get (t,1,4) Π (t) zc (t) 4 (t) (t) g (zc )5 = (0) ≤ 2d(2d − 2) zc 1 e +o (2d)2 (2d)2 , as d → ∞. (5.25) To obtain a lower bound for (5.24), we apply inequality (4.37) to the last product in it and get (t,1,4) Πz (0) ≥ 2d(2d − 2)z4 4 ∏ ∑ z|Ri | i=0 Ri ω(i) 1+ ∑ Uk,l 0≤k<l≤4 (k,l)=(0,4) (t) (t) = 2d(2d − 2)z4 g(t) (z)5 + 6g(t) (z)3Wz (e1 ) + 3g(t) (z)3Wz (e1 + e2 ) . 69 Estimate (5.5) together with Theorem 1.1 and Claim 4.6, yield (t,1,4) Π (t) zc (0) ≥ 1 e +o 2 (2d) (2d)2 . (5.26) 1 e +o 2 (2d) (2d)2 . (5.27) Therefore, bounds (5.25) and (5.26) imply (t,1,4) Π (t) zc (0) = Adding (5.22) and (5.27) yields (t,1) Π (t) (0) = zc 11 e e 1 + 2 2 +o 2d (2d) (2d)2 . (5.28) Second summand in (5.18). In this case the vertex x is a nearest neighbor of the origin. By (4.41) and Claim 5.1, the contribution by the cycles with length 2 is given by (t,1,2) ∑ Π (t) x: x 1 =1 zc (t) (t) (x) = −2dzc W (t) (e1 ) = zc 14e 1 2e + +o 2 2d (2d) (2d)2 , as d → ∞. (5.29) The contribution by the cycles with length 4 is given by (t,1,4) ∑ Πz (t,1,4) (x) = 2dΠz (0, e1 ) = − ∑ z3 ∏∑ z|Ri | U0,3 i=0 Ri ωi ω∈W (0,e1 ) |ω|=3 x: x 1 =1 3 ∏ (1 + Uk,l ) , 0≤k<l≤3 (k,l)=(0,3) where the sum is over all 3-step walks connecting 0 to e1 of the form ω = (0, y, y + e1 , e1 ), with y a nearest-neighbor of the origin perpendicular to e1 . There are 2d − 2 of these walks. Therefore, the fact that the final product ∏ (1 + Uk,l ) ≤ 1, Theorem 1.1 and Claim 4.6, yield the upper bound ∑ (t,1,4) Π (t) x: x 1 =1 zc (t) 3 (t) (t) (t) g (zc )2W (t) (e1 ) = (x) ≤ −2d(2d − 2) zc zc 1 2e +o 2 (2d) (2d)2 , as d → ∞. A lower bound can be achieved by using inequality (4.37), ∑ (t,1,4) Πz (x) ≥ −2d(2d − 2)z3 3 z|Ri | U0,3 1 + ∏∑ i=0 Ri ωi x: x 1 =1 ∑ Uk,l 0≤k<l≤3 (k,l)=(0,3) (t) = −2d(2d − 2)z3 g(t) (z)2Wz (e1 ) − 2d(2d − 2)z3 3 ∏∑ z|Ri | U0,3 (U0,1 + U0,2 + U1,2 + U1,3 + U2,3 ) . i=0 Ti ωi (5.30) 70 Applying Lemma 4.3, Lemma 4.1 and Claim 4.6 to the first term, and using that the second one evaluated at criticality is of order o (2d)−2 , which we will prove below, we get (t,1,4) ∑ Π (t) zc x: x 1 =1 (x) ≥ 1 2e +o 2 (2d) (2d)2 . 1 2e +o (2d)2 (2d)2 . Therefore, these upper and lower bounds imply (t,1,4) ∑ Π (t) x: x 1 =1 zc (x) = (5.31) Adding (5.29) and (5.31), gives (t,1) Π (t) (x) = ∑ x: x 1 =1 zc 2e 16e 1 + +o 2 2d (2d) (2d)2 . (5.32) To see that the second term in (5.30) is of order o (2d)−2 , we distribute the product of U0,3 among the factors U0,1 , U0,2 ,. . . , U2,3 , and study the summand containing U0,3 U0,1 , which is analogous to the others. This term is given by −2d(2d − 2)z3 g(t) (z) z|R0 |+|R1 |+|R3 | U0,3 U0,1 . ∑ R0 0,R1 y R3 e1 Intersections between the trees R0 and R3 , and R0 and R1 , require at least one edge each, so if we treat the ribs emanating from these bonds as independent of each other, we get the bound z|R0 |+|R1 |+|R3 | U0,3 U0,1 ≤ 4z2 g(t) (z)5 , ∑ R0 0,R1 y R3 e1 (5.33) which together with Theorem 1.1 imply the desired result, namely, 3 (t) 3 −2d(2d − 2) zc (t) |Ri | ∏∑ zc (t) 5 (t) (t) U0,3 (U0,1 + U0,2 + U1,2 + U1,3 + U2,3 ) i=0 Ri ωi ≤ 5 · 4 · 2d(2d − 2) zc g (zc )6 = o 1 (2d)2 , as d → ∞. Third summand in (5.18). In this case the vertices x are at distance 2 from the origin, they are of the form x = 2ei or x = ei + e j , with ei and e j perpendicular nearest-neighbors of the origin. When x = 2ei , the shortest walk that connects it to the origin is given by ω = (0, ei , 2ei ). If there is an intersection between the ribs containing 0 and x, without intersecting the rib emanating from ei , a cycle of length at least 6 must exist. Moreover, all other walks connecting 0 and x in which the first and last rib intersect, form a cycle of length greater than 6. Hence, the contribution of this case 71 is included in the error term (5.19) and is of order O (2d)−3 . Therefore, we only need to analyze the cases in which x = ei + e j . The cycles have length 4, they consist of a 2-step walk connecting x to the origin, and two more edges belonging to either the first or last rib. There are 2d(2d − 2)/2 of the points x and for each one of them, there are two 2-step walks connecting them to the origin, namely, ω = (0, ei , ei + e j ) and ω = (0, e j , ei + e j ). This implies ∑ (t,1,4) Πz (x) = −2d(2d − 2)z2 x=ei +e j z|R0 |+|R1 |+|R2 | U0,2 (1 + U0,1 ) (1 + U1,2 ) . ∑ (5.34) R0 0,R1 e1 R2 e1 +e2 (t) The analysis of the sum is very similar to one we do for the quantity Wz (e1 + e2 ) in the proof of Claim 5.1, if we treat the tree R1 independently. The only difference is that, since R0 and R2 must avoid intersecting R1 , there is only one walk along which these two trees intersect instead of two, namely, (0, e2 , e1 + e2 ). Therefore, we have the lower bound ∑ 1 (t) z|R0 |+|R1 |+|R2 | U0,2 (1 + U0,1 ) (1 + U1,2 ) ≥ Wz (e1 + e2 )g(t) (z). 2 e1 R0 0,R1 R2 e1 +e2 To get an upper bound for this sum, we subtract the cases in which R1 intersects one of the trees R0 or R2 , this event requires of at least an edge. This gives ∑ 1 (t) 1 (t) z|R0 |+|R1 |+|R2 | U0,2 (1 + U0,1 ) (1 + U1,2 ) ≤ Wz (e1 + e2 )g(t) (z) − Wz (e1 + e2 )zg(t) (z)2 . 2 2 e1 R0 0,R1 R2 e1 +e2 These two bounds together with Theorem 1.1 and Claim 5.1 imply ∑ (t) |R0 |+|R1 |+|R2 | zc U0,2 (1 + U0,1 ) (1 + U1,2 ) = − R0 0,R1 e1 R2 e1 +e2 3e 1 +o 2 (2d) (2d)2 . Substituting this result into (5.34) and Theorem 1.1, yield ∑ x=ei +e j (t,1,4) Π (t) zc (x) = 3e 1 +o 2 (2d) (2d)2 . (5.35) Finally, replacing (5.28), (5.32) and (5.35) into (5.18) gives the desired result (5.16), namely, 49 3e 1 2e ˆ (t,1) Π (0) = + +o (t) 2 zc 2d (2d) (2d)2 (t,2) . (t,2) ˆ (t) (0) is the Fourier transform of the function Πz Proof of Equation 5.17. The quantity Π zc 72 (x), at criticality, it is given by ˆ z(t,2) (0) = ∑ Πz(t,2) (x). Π (5.36) x (t,2) The quantity Πz (t,2) Πz (x) is defined, in (3.31), by (x) = z|ω| ∑ ω∈W (0,x) |ω|≥2 |ω| z|Ri | ∏ ∑ i=0 Ri ω(i) ∏ Ui j ∏ ∑ L∈L (2) [0,|ω|] i j∈L 1 + Ui j , (5.37) i j ∈C (L) where the set L (2) [0, |ω|] consists of the following two types of laces: (a) L = {0 j, j|ω|}, with 0 < j < |ω|. (b) L = {0 j, i|ω|}, with 0 < i < j < |ω|. Recall that in Figure 3.5 (b) there is a graphical representation of these laces. We will analyze (t,2) Πz (t,2,n) (x) according to the length of the walk ω. We will denote by Πz (t,2) Πz (x) (x), the contribution to when |ω| = n on the right-hand side of (5.37). When the walk ω has length 2, the only lace in L (2) [0, 2] is of type (a). It is given by L = {01, 12} and has no compatible edges. This implies that (t,2,2) ∑ Πz x (x) = ∑ x z2 ∑ ω∈W (0,x) |ω|=2 z|R0 |+|R1 |+|R2 | U0,1 U1,2 . ∑ (5.38) R0 ω(0),R1 ω(1) R2 ω(2) This quantity is non-zero when the vertex x = 0 or x is at distance two from the origin. When x = 0, the walk is of the form ω = (0, ei , 0), where ei is one of the 2d nearest-neighbor vertices of the origin. The simplest way in which there are intersections among the ribs R0 and R1 , and R1 and R2 , is when R1 consists of the edge {0, ei } and two non-intersecting subribs R∗0 and R∗1 , emanating from 0 and ei respectively. In this situation the product U0,1 U1,2 = 1 and does not affect R0 and R1 , which implies that the sums over these trees become one-point functions. Then we have the lower bound (t,2,2) Π (t) zc (t) (t) (0) ≥ 2d(zc )3 g(t) (zc )2 (t) ∑ R∗0 0,R∗1 ei (t) (t) ∗ ∗ ∗ (zc )|R0 |+|R1 | 1 + U0,1 (t) (t) = 2d(zc )3 g(t) (zc )2 g(t) (zc )2 +W (t) (ei ) = zc e 1 +o (2d)2 (2d)2 , as d → ∞, ∗ is minus the indicator that subribs R∗ and R∗ have a common vertex, and the last equality where U0,1 0 1 is given by Theorem 1.1 and Claim 4.6. ∗ ≤ 1, to get that the contribuFor an upper bound, in the previous expression we use that 1 + U0,1 (t) (t) tion when R1 contains the edge {0, ei } is bounded above by 2d(zc )3 g(t) (zc )4 . When {0, ei } ∈ R1 , either both ribs R0 and R2 contain the edge {0, ei } or one of them does not, say R0 . In the first case, 73 we treat the subribs emanating from {0, ei } as independent to get one-point functions. In the second case, the intersection among R0 and R1 requires at least three bonds. These observations imply the upper bound (t,2,2) Π (t) zc (t) (t) (t) (t) (t) (t) (0) ≤ 2d(zc )2 zc g(t) (zc )4 + (zc )2 g(t) (zc )5 + g(t) (zc ) j+k=3 = e 1 +o (2d)2 (2d)2 (t, j) (t,k) zc zc G (t) ∗ G (t) (ei ) ∑ , as d → ∞, where the last equality is given by Theorem 1.1 and Proposition 4.5. When x is one of the 2d(2d − 1) vertices at distance two from the origin, i.e., x = ei + e j with ei and e j nearest-neighbors of the origin with e j = −ei . If ei = e j , the two walks connecting 0 to x are ω = (0, ei , x) and ω = (0, e j , x). In this case the simplest intersection among the ribs R0 and R1 , and R1 and R2 , requires that either R0 or R1 have the bond {0, ei }, and that either R1 or R2 have the bond {ei , x}. To get a lower bound, we treat the subribs emanating from these bonds as independent and use inclusion-exclusion to subtract the possible intersections among them, this yields (t,2,2) ∑ Π (t) zc x: x 1 =2 (t) (t) (t) (t) (t) (t) (x) ≥ 4(2d)(2d − 2)(zc )4 g(t) (zc ) g(t) (zc )4 − 2W (t) (ei )zc g(t) (zc )2 zc = 4e 1 +o 2 (2d) (2d)2 , as d → ∞, where the last equality is given by Theorem 1.1 and Claim 4.6. For an upper bound, if {0, ei } is not present in R0 and R1 , or {ei , x} is not present in R1 and R2 , then an intersection among the corresponding ribs requires at least three edges. This implies ∑ x: x 1 =2 (t,2,2) Π (t) zc (t) (t) (x) ≤ 4(2d)(2d − 1)(zc )4 g(t) (zc )4 (t) (t) + 2(2d)(2d − 1)(zc )3 g(t) (zc )2 ∑ (t, j) (t,k) zc zc G (t) ∗ G (t) (ei ) j+k=3 2 (t) + 2d(2d − 1)(zc )2 ∑ j+k=3 = 1 4e +o 2 (2d) (2d)2 (t, j) (t,k) zc zc G (t) ∗ G (t) (ei ) , as d → ∞, where the last equality is given by Theorem 1.1 and Proposition 4.5. Therefore, when |ω| = 2 the contribution to (5.36) is (t,2,2) ∑ Πz x (t) c (t,2,2) (x) = Π (t) zc (0) + ∑ x: x 1 =2 (t,2,2) Π (t) zc (x) = 74 5e 1 +o 2 (2d) (2d)2 , as d → ∞. (5.39) When the walk ω has length 3, the laces of type (a) in L (2) [0, 2] are L = {01, 13} and L = {02, 23}. There is only one lace of type (b), namely L = {02, 13}. Due to the symmetries of Zd , the (t,2,3) two type (a) laces give the same contribution, so we only study the contribution to Πz (x) in the case of L = {01, 13}, which is (t,2,3) ∑ Πz (x) = ∑ x x z3 ∑ ω∈W (0,x) |ω|=3 z|R0 |+|R1 |+|R2 |+|R3 | U0,1 U1,3 (1 + U1,2 ) (1 + U2,3 ) . (5.40) ∑ R0 ω(0),R1 ω(1) R2 ω(2),R3 ω(3) This quantity is non-zero when x is at distance 1 and 3 from the origin. When x 1 = 1, the walks ω are of the form ω = (0, x, y, x), for y a nearest-neighbor of x (including the origin); and ω = (0, ei , ei + x, x), for a nearest-neighbor of the origin ei different from x. In the first case, when ω = (0, x, y, x), there are 2d of these walks for every vertex x and, since ω(1) = x = ω(3), the factor U1,3 = −1 and does not affect (5.40). The fact that (1 + U1,2 ) (1 + U2,3 ) ≤ 1, Theorem 1.1 and Claim 5.1, yield that the contribution to (5.40), at criticality, is bounded above by (t) (t) −(2d)2 (zc )3 g(t) (zc )2 (t) (t) (t) (t) (zc )|R0 |+|R1 | U0,1 = −(2d)2 (zc )3 g(t) (zc )2W (t) (x) ∑ zc R0 0,R1 x = 2e 1 +o 2 (2d) (2d)2 , as d → ∞. For a lower bound, we use inequality (4.37). Then Theorem 1.1 and Claim 5.1 yield that the contribution to (5.40), at criticality, is bounded below by (t) − (2d)2 (zc )3 z|R0 |+|R1 |+|R2 |+|R3 | U0,1 (1 + U1,2 + U2,3 ) ∑ R0 ω(0),R1 ω(1) R2 ω(2),R3 ω(3) (t) (t) (t) (t) zc zc ≥ −(2d)2 (zc )3 g(t) (zc )2W (t) (x) + 2W (t) (x)2 = 1 2e +o (2d)2 (2d)2 , as d → ∞. Recall to count this result twice to take into account the contribution of the other lace, L = {02, 23}. In the second case, when ω = (0, ei , ei + x, x), using the fact that |U0,1 (1 + U1,2 ) (1 + U2,3 )| ≤ 1, Theorem 1.1 and Claim 5.1, yield that the contribution to (5.40), at criticality, is bounded by (t) (t) (2d)2 (zc )3 g(t) (zc )2 ∑ (t) (t) zc R1 ei ,R3 x =o If x 1 (t) z|R1 |+|R3 | |U1,3 | = (2d)2 (zc )3 g(t) (zc )2 W (t) (x − ei ) 1 (2d)2 , as d → ∞. = 3, an intersection between the ribs R1 and R3 , without intersecting R2 , requires at least four edges. This observation together with Theorem 1.1 and Proposition 4.5, yield that the 75 contribution to (5.40), at criticality, is bounded by (t) (t) (2d)2 (zc )3 g(t) (zc ) (t) (zc )|R1 |+|R2 |+|R3 | |U1,3 (1 + U1,2 ) (1 + U2,3 )| ∑ R1 ω(1),R2 ω(2) R3 ω(3) 2 ≤ (2d) (t) (t) (zc )3 g(t) (zc )2 (t, j) (t,k) zc zc G (t) ∗ G (t) ∑ j+k=4 1 (x − ei ) = o (2d)2 (5.41) , as d → ∞. (t,2,3) Now we analyze the type (b) lace L = {02, 13}. The contribution to Πz (t,2,3) ∑ Πz (x) = ∑ x x ∑ z3 ω∈W (0,x) |ω|=3 (x) is z|R0 |+···+|R3 | U0,2 U1,3 (1 + U0,1 ) (1 + U1,2 ) (1 + U2,3 ) . (5.42) ∑ R0 ω(0),..., R3 ω(3) This expression is non-zero when x is at distance 1 and 3 from the origin. When x 1 = 1, the walks ω are of the form ω = (0, x, 0, x), and ω = (0, ei , ei + y, x), for a nearest-neighbor of the origin ei different from x, and y = −ei or y = x. In the first case, since ω(0) = 0 = ω(2) and ω(1) = x = ω(3), the factor U0,2 U1,3 = 1 and does not affect (5.42). The fact that (1 + U0,1 ) (1 + U1,2 ) (1 + U2,3 ) ≤ 1 and Theorem 1.1, yield that the contribution to (5.40), at criticality, is bounded above by (t) (t) 2d(zc )3 g(t) (zc )4 = e 1 +o 2 (2d) (2d)2 , as d → ∞. For a lower bound, we use inequality (4.37). Then Theorem 1.1 and Claim 5.1 yield that the contribution to (5.42), at criticality, is bounded below by 2dz3 ∑ (t) (t) z|R0 |+···+|R3 | (1 + U0,1 + U1,2 + U2,3 ) ≥ 2dz3 g(t) (zc )4 + 3W (t) (x) zc R0 0,..., R3 x = e 1 +o 2 (2d) (2d)2 , as d → ∞. In the second case, when ω = (0, ei , ei +y, x), the fact that |U0,2 (1 + U0,1 ) (1 + U1,2 ) (1 + U2,3 )| ≤ 1, Theorem 1.1 and Claim 5.1, yield that the contribution to (5.40), at criticality, is bounded by (t) 2d(2d − 1)z3 g(t) (zc )2 ∑ (t) zc R1 ei ,R3 x =o If x 1 (t) (z)|R1 |+|R3 | |U1,3 | ≤ 2d(2d − 1)z3 g(t) (zc )2 W (t) (x − ei ) 1 (2d)2 , as d → ∞. = 3, the lace L = {02, 13} forces an intersection between the ribs R1 and R3 , without intersecting R2 . An argument similar to (5.41), yields that the contribution in this case is of order o (2d)−2 . 76 Therefore, when |ω| = 3 the contribution to (5.36) is (t,2,3) ∑ Πz x (t) c (x) = ∑ (t,2,3) Π (t) x: x 1 =1 zc (x) + (t,2,3) ∑ Π (t) x: x 1 =3 zc (x) = 1 5e +o 2 (2d) (2d)2 , as d → ∞. (5.43) When the walk ω has length 4, the laces of type (a) in L (2) [0, 2] are L = {01, 14}, L = {02, 24} and L = {03, 34}. The laces of type (b) are L = {02, 14}, L = {03, 14} and L = {03, 24}. First, we will analyze the lace L = {02, 24}, and then show that the remaining laces’ contributions are of order ((2d)−2 ) as d → ∞. The lace L = {02, 24} contributes only for x = 0. In this case the significant walks are of the form ω = (0, ei , 0, e j , 0) with ei and e j nearest neighbors of the origin. There are (2d)2 of such walks and and due to their topology the factors U0,2 and U2,4 are automatically -1. Hence, treating the ribs emanating from the walk as independent and applying Theorem 1.1, gives the upper bound (t) (t) (2d)2 (zc )4 g(t) (zc )5 = e 1 +o (2d)2 (2d)2 , as d → ∞. For a lower bound we subtract from this term the possible contributions from the intersections (t) of the ribs with the term W (t) (e1 ), this together with Theorem 1.1 and Claim 5.1 yield zc (t) (t) (t) (t) (2d)2 (zc )4 g(t) (zc )5 + 4g(t) (zc )3W (t) (e1 ) = zc e 1 +o 2 (2d) (2d)2 , as d → ∞. ˆ (t,2) Adding this contribution to (5.39) and (5.43) we get the desired result for Π (t) (0) in (5.17), zc namely. 1 11e ˆ (t,2) +o Π (t) (0) = zc (2d)2 (2d)2 . Next we prove that the remaining terms’ contributions is of order o((2d)−2 ), as d → ∞. The other walks connecting 0 to 0 of length four, are 4-step cycles containing the origin. If we substitute one of the factors U0,2 or U2,4 by 1, say U0,2 , and use that there are 2d(2d − 2)/2 of such (t,2,4) cycles, we get that the contribution to Π (t) zc 2 (0) is bounded by 2d(2d − 2) (t) 4 (t) (t) 3 (t) 1 (zc ) g (zc ) W (t) (e1 + e2 ) = o zc 2 (2d)2 , as d → ∞, (t) where the first factor 2 is given by exchanging the role of U0,2 and U2,4 , W (t) (e1 + e2 ) takes into zc account the intersection of two of the ribs R2 and R4 that U2,4 forces, and the equality is given by Theorem 1.1 and Claim 5.1. For the same lace L = {02, 24}, when x = 0. We will analyze just one case to illustrate how 77 these terms can be bounded. If x is at distance two from the origin, then the walk may look like in Figure 5.1. Notice that the factor U2,4 forces an intersection among the corresponding ribs R2 and R4 , then we can find paths of lengths i and j that connect 0 to y, and y to x, respectively, with i + j ≥ 2. This contribution can be bounded by (t,4) ∑ ∑ ∑ Gz i+ j=2 x (t,i) (t, j) (x)Gz (y)Gz (x − y) = y ∑ (t,4) Gz (t,i) ∗ Gz (t, j) ∗ Gz (0) i+ j=2 ≤ 3 2dzg(t) (z) ≤ 3 2dzg(t) (z) 6 6 (t,∗i) D∗6 ∗ Gzc (0) (5.44) C6,3 , (2d)3 where we used (4.14) for the first inequality, and Proposition 4.5 for the second one. Then Theorem 1.1 gives that this expression at criticality is of order o((2d)−2 ), as d → ∞. Figure 5.1: L = {02, 24} and x 1 = 2. The other laces for the 4-walk ω, have an edge between points at distance three, for example, in L = {01, 14} the edge 14 is present. Moreover, for these laces, there are compatible edges of length two, in our example these are 13 and 24. This implies that the part of the walk that lies between the points 1 and 4 is self-avoiding. Since the edge of 14 forces an intersection between the corresponding ribs, a cycle of length four or more is created. These observations will allows to conclude that all laces, except L = {02, 24}, give a contribution of order O((2d)−3 ), which we can neglect. We will only explain L = {01, 14} and a few other cases depicted in Figure 5.2. The following is a standard step in the lace expansion technique. We only outline the the main ideas behind it, so we encourage the curious reader to consult [39] for more details. We construct a walk ω, with the minimum amount of edges to satisfy the intersections among its emanating ribs, according to the lace on the left in Figure 5.2. We add bonds (dash line in picture), if necessary, to create such intersections. As we have noticed, the parts of the path that lie between the end points of the edges in the lace are self-avoiding, therefore, some cycles are created in order to satisfy the intersections required by the lace. The contribution by these walks is bounded by a convolution of 78 n two-point functions taking at least m steps (m and n depend on the lace), like we did in (5.44). We (p,q) separate (factor out) the cycles and bound them by Sz , then Proposition 4.5 yields the contribution on the right hand side. (a) A case when |ω| = 4 (b) A case when |ω| = 5 (c) A case when |ω| = 6 (d) A case when |ω| ≥ 7 Figure 5.2: Bounds for different laces and different sizes of |ω|. Dashed lines represent edges that must be added in order to create the intersections required by the lace on the left. 5.2.2 Lattice animals In this section we prove Theorem 1.4 for the case of lattice animals. Moreover, the discrepancy between the expansions in Theorem 1.2 is explained. (a) ˆ (a) (0) is given in (3.44) Proof of Theorem 1.4 for lattice animals. Recall that the Fourier transform Π zc by ˆ (a) ˆ (a,0) ˆ (a,1) ˆ (a,2) Π (a) (0) = Π (a) (0) − Π (a) (0) + Π (a) (0) + zc zc zc zc (a,N) ∑ (−1)N Πˆ z N≥3 (a) c (0). (5.45) By (4.44), the fourth term in this expression is of order O (2d)−3 , and can be neglected. We will 79 prove that the first three terms on the right-hand side of (5.45) satisfy, as d → ∞, ˆ (a,0) Π (a) (0) = zc 3 2 (2d)2 +o 1 (2d)2 , 49 e 1 3e − 2 2 +o zc 2d (2d) (2d)2 1 11e ˆ (a,2) Π +o . (a) (0) = 2 zc (2d) (2d)2 (a,1) ˆ (a) (0) = − −Π (5.46) , (5.47) (5.48) Substituting (5.46), (5.47) and (5.48) into (5.45), gives the desired result (5.14). (a,0) ˆ (a) (0) in (5.46), which is absent for lattice trees, that gives the new Remark 5.3. It is the term Π zc term in (1.19) for lattice animals. Results in (5.47) and (5.48) coincide with the corresponding ones for lattice trees in (5.16) and (5.17). ˆ (a,0) The term Π (0). It is defined in (3.39). It is bounded above by summing z4 over x = 0 and z the cycles of length four, that contain the vertices 0 and x, plus the contribution of the animals (6,2) with cycles of length six and more that contain 0 and x, which is bounded by Sz (0). There are 2d(2d − 2)/2 of cycles with length four, and each such cycle has three possibilities for x. If we treat the four ribs emanating from the vertices in the four-step cycle as independent, then, by Theorem 1.1 and Proposition 4.5, we get 3 1 3 (a) (a) (a) 4 (6,2) 2 ˆ (a,0) +o Π (0) ≤ 2d(2d − 2)(z g (z )) + S (0) = c c (a) (a) zc zc 2 (2d)2 (2d)2 , as d → ∞. From the term corresponding to the four-step cycles we subtract the contribution of the possible intersections among the ribs, to get the lower bound 3 (a) (a) (a) (a) (a) (a) ˆ (a,0) Π 2d(2d − 2)(zc )4 g(a) (zc )4 + 4g(a) (zc )2W (a) (e1 ) + 2g(a) (zc )2W (a) (e1 + e2 ) (a) (0) ≥ zc zc zc 2 3 1 , as d → ∞, = 2 2 +o (2d) (2d)2 where the equality is due to Theorem 1.1 and Claim 5.1. This completes the proof of equation (5.46). Remark 5.4. The sum over cycles is the reason why the factor e is not present in the expression for ˆ (a,0) Π (a) (0). Cycles, unlike walks, have the same amount of edges and vertices. Hence, there are the zc same amount of ribs emanating from its vertices as there are edges. Each one of these ribs, when treated as independent, contributes with a factor of g(zc ) ∼ e which gets canceled by the factor e−1 in zc ∼ (2de)−1 associated to each one of the edges in the cycle. ˆ (a,1) ˆ (a,2) Terms −Π (a) (0) and Π (a) (0). First we notice that when the backbone is given by walks, then the zc zc 80 double connections between the endpoints of the edges in the backbone become sums over animals that contain such vertices. Thus the reasoning that the we did for lattice trees in the previous section can be applied to this situation and yield the results in (5.47) and (5.48). On the other hand, if the backbone is not given by a walk, then some of the double connections between the endpoints of the vertices in the backbone contain cycles of length four or more. Similar ˆ (a) ideas used in our discussion for Gzc (x) and Π (a) (0) in Section 4.2 and Section 5.2.2, respectively, zc yield that the contribution in this case is of order (2d)−2 , as d → ∞. 5.3 Proof of Theorem 1.5 The goal of this section is to show Theorem 1.5, which states that, as d → ∞, (t) g(t) (zc ) = e + g (a) (a) (zc ) = e+ 3 2e 2d 3 2e 2d + 263 24 e (2d)2 + 263 24 e − 1 (2d)2 +o 1 (2d)2 , (5.49) 1 +o (2d)2 . This result completes the demonstration of Theorem 1.2. The proof will be simultaneously done for both lattice trees and lattice animals, except for minor ˆ z (0) obtained in Section 5.2, adjustments for the latter case. In our reasoning, the expansion for Π Claim 5.1 and Lemma 5.2, will be fundamental. Proof of Theorem 1.5. We will show that for nearest-neighbor lattice trees, as d → ∞, (t) A(zc ) = e + 45 e 3e 1 + 2 2 +o 2d (2d) (2d)2 (5.50) , while for nearest-neighbor lattice animals, (a) A(zc ) = e + e − 23 3e 45 1 + 2 +o 2 2d (2d) (2d)2 81 , (5.51) and for both lattices trees and animals, B(zc ) = − 1 e 8e − +o 2 2d (2d) (2d)2 15 1 e e 1 C(zc ) = − 2 − 2 2 + o 2d (2d) (2d)2 E(zc ) = Ia 1 +o 2 (2d) (2d)2 1 2 |A| zc = ∑ A 0 0∈cycle (5.52) 95 24 e (2d)2 1 (2d)2 +o . By (3.9), this gives the desired result (t) (t) (t) (t) 3 2e (t) g(t) (zc ) = A(zc ) + B(zc ) +C(zc ) + E(zc ) = e + 2d + 263 24 e (2d)2 1 (2d)2 +o , and (a) (a) (a) (a) (a) g(a) (zc ) = A(zc ) + B(zc ) +C(zc ) + E(zc ) + Ia ∑ (a) (zc )|A| A 0 0∈cycle = e+ 3 2e 2d + 263 24 e − 1 (2d)2 +o 1 (2d)2 . It remains to show (5.50), (5.51) and (5.52). The term A(zc ). We commence studying A(z), which is given in (4.57) by A(zc ) = e1−M(zc ) = e 1 − M(zc ) + M(zc )2 + O M(zc )3 2! . (5.53) (t) (a) zc zc ˆ (t) (0) and Π ˆ (a) (0) given in We update the expansion for M(zc ) by substituting the new results for Π Theorem 1.4, into (4.55). In the case of lattice trees, we get (t) M(zc ) = − 3 18 1 − +o 2 2d (2d) (2d)2 , as d → ∞, and for lattice animals, (a) M(zc ) = − 18 − 32 e−1 3 1 − +o 2 2d (2d) (2d)2 , as d → ∞. Substituting these expansions in (5.53) yields the desired results (5.50) and (5.51). For the remainder of the proof, only the first two terms of the expansions in (5.50) and (5.51) will be used. Since these 82 terms agree, we will only refer to (5.50) for both lattice trees and lattice animals. The term B(zc ). Recall that B(zc ) is given in (3.11) by B(zc ) = −2dzc A(zc )Gzc (e1 ). The desired result (5.52) for B(zc ) is obtained when substituting (5.50), and the new expansions for zc and Gzc (e1 ) given in Lemma 4.1 and Lemma 5.2, respectively, into this expression. The term C(zc ). Recall that C(z) is given in (4.59) by 1 C(z) = − 2d(zg(z))2 A(z) +Cerror (z), 2 (5.54) where zm (2dg(z))m−2 ∑ m! m=2 1≤i< j≤m ∞ Cerror (z) = ∑ Isi =s j ∑ si ,s j ∈E ∑ z|C | ∑ i Ci si z|C j | Vi, j . Cj sj In the proof of Lemma 4.3 in Section 4.4, Cerror (zc ) was indeed an error term. However, we will see that on this occasion, its contribution cannot be neglected. For the first term on the right-hand side of (5.54), Theorem 1.1, (5.50) and Lemma 4.1, yield 1 9 e e 1 1 − 2d(zc g(zc ))2 A(zc ) = − 2 − 2 2 + o 2 2d (2d) (2d)2 (5.55) , as d → ∞. For Cerror (z), we consider separately when the vertices si and s j are parallel and perpendicular, we denoted the latter situation by s1 ⊥ s2 . Hence, Cerror (z) = z2 ∞ 1 m(m − 1) (2dzg(z))m−2 ∑ [Is2 =−s1 + Is1 ⊥s2 ] 2 m=2 m! s1 ,s2 ∈E ∑ 1 = z2 e2dzg(z) 2d 2 ∑ z|C1 |+|C2 | V1,2 C1 s1 C2 s2 ∑ z|C1 |+|C2 | V1,2 + 2d(2d − 2) C1 e1 C2 −e1 ∑ C1 e1 C2 e2 z|C1 |+|C2 | V1,2 1 = z2 A(z) [2dWz (2e1 ) + 2d(2d − 2)Wz (e1 + e2 )] . 2 By Theorem 1.1,(5.50) and Claim 5.1, we get that, as d → ∞, Cerror (zc ) = − 3e 1 +o 2 (2d) (2d)2 83 . (5.56) Finally, replacing (5.55) and (5.56) into (5.54), yields the desired result 1 15 e e 1 C(zc ) = − 2 − 2 2 + o 2d (2d) (2d)2 , as d → ∞. The term E(zc ). Recall that E(z) is given in (3.13) by zm ∑ m=2 m! s1 ,...,sm ∈E ∞ E(z) = z|C1 | · · · ∑ ∑ C1 s1 z|Cm | ∑ ∑ Vi, j Vk,l ∑ 0≤i< j≤m (k,l)∈Ai, j Cm sm ∏ (1 + V p,q ) , (p,q)∈Ak,l We will rewrite it in a more convenient expression for its study. We iterate the result in (3.5) by applying it to the product that appears on its right-hand side, to obtain n n ∏ (1 + xi ) = 1 + ∑ xi + ∑ i=1 xi x j 1≤i< j≤n i=1 (1 + xk ) ∏ j<k≤n n = 1 + ∑ xi + i=1 n = 1 + ∑ xi + i=1 + xi x j 1 + ∑ 1≤i< j≤n xi x j + ∑ 1≤i< j≤n 1≤i< j<k<l≤n xk xl ∑ j<k<l≤n ∏ (1 + x p ) l<p≤n (5.57) xi x j xk ∑ 1≤i< j<k≤n xi x j xk xl ∑ xk + ∑ j<k≤n ∏ (1 + x p ) . l<p≤n Using this result, we can decompose the product ∏0≤i< j≤m (1 + Vi, j ) as ∏ (1 + Vi, j ) = 1 + 0≤i< j≤m ∑ 1≤ j≤m + V0, j + ∑ Vi, j + 1≤i< j≤m ∑ ∑ ∑ ∑ ∑ ∑ ∑ 0≤i< j≤m ∑ Vi, j Vk,l (k,l)∈Ai, j Vi, j Vk,l V p,q (5.58) 0≤i< j≤m (k,l)∈Ai, j (p,q)∈Ak,l + ∑ 0≤i< j≤m (k,l)∈Ai, j (p,q)∈Ak,l (s,t)∈A p,q Vi, j Vk,l V p,q Vs,t ∏ (1 + Vu,v ) , (u,v)∈As,t where the sets Ai, j are as defined in (3.7). If we compare this expression to the one given in (3.6), we see that the last three terms in (5.58) correspond to the one used for defining E(z) in (3.13). Moreover, the fourth summand on the right-hand side of (5.58) was decomposed in (4.62). Substituting (4.62) and the last two terms on the right-hand side of (5.58) into the definition of E(z) in (3.13), 84 and distributing the product among the summands, yield ∞ E(z) = ∑ zm ∑ m=2 m! s1 ,...,sm ∈E + ∑ 1≤i< j≤m z|C1 | · · · ∑ C1 s1 Cm sm Vi, j Vk,l + ∑ z|Cm | ∑ ∑ 0≤i< j≤m (k,l)∈Ai, j V0, j V0,l + ∑ ∑ V0, j Vk,l 1≤ j≤m 1≤k<l≤m 1≤ j<l≤m Vi, j Vk,l V p,q ∑ ∑ (k,l)∈Ai, j (p,q)∈Ak,l (5.59) + ∑ 0≤i< j≤m Vi, j Vk,l V p,q Vs,t ∑ ∑ ∑ (k,l)∈Ai, j (p,q)∈Ak,l (s,t)∈A p,q ∏ (1 + Vu,v ) (u,v)∈As,t = E 1 (z) + E 2 (z) + E 3 (z) + E 4 (z) + E 5 (z), where E 1 (z), E 2 (z), and E 3 (z) are as in (4.64), (4.65) and (4.66), respectively, and E 4 (z) := E 5 (z) := zm ∑ m=3 m! s1 ,...,sm ∈E ∞ ∑ zm ∑ ∑ m=4 m! s1 ,...,sm ∈E ∑ z|C1 | · · · ∑ z|C1 | · · · C1 s1 ∞ ∑ z|Cm | ∑ z|Cm | C1 s1 ∑ ∑ ∑ Vi, j Vk,l V p,q , Cm sm × ∑ ∑ (5.60) 0≤i< j≤m (k,l)∈Ai, j (p,q)∈Ak,l Cm sm ∑ Vi, j Vk,l V p,q Vs,t ∑ 0≤i< j≤m (k,l)∈Ai, j (p,q)∈Ak,l (s,t)∈A p,q ∏ (5.61) (1 + Vu,v ) . (u,v)∈As,t To analyze E 1 (z), E 2 (z) and E 3 (z), we will recall several results for these terms that were obtained in the proof of Lemma 4.3 in Section 4.4. The term E 1 (zc ). By (4.67), we know that E 1 (zc ) = 1 2e (2d)2 +o 1 (2d)2 , as d → ∞. (5.62) The term E 2 (zc ). Recall equation (4.69) in the proof of Lemma 4.3. For this equation we analyzed the cases when r = |{ j, k, l}| = 2 and r = |{ j, k, l}| = 3; counted that the number of possibilities for the labels j, k and l that obey these conditions are 2 m 2 and 3 m 3 , respectively; estimated (4.70) and substituted this result into (4.69) to obtain the contribution in each case. Here, we will follow this same strategy using the updated values for the quantities involved. Assume that the labels obey |{ j, k, l}| = 2, then the vertices s1 and s2 satisfy |{s1 , s2 }| = 1 or |{s1 , s2 }| = 2. In the first case, by (4.72), we know that the contribution is e 1 +o (2d)2 (2d)2 85 , as d → ∞. (5.63) When |{s1 , s2 }| = 2, the simplest way in which the term V0,1 V1,2 is positive is when the cluster C1 contains the edges {0, s1 } and {0, s2 }, or the cluster C1 contains {0, s1 } and C2 contains {0, s2 }. The analysis when s1 ⊥ s2 (perpendicular) and s1 = 2s2 is very similar to the one we did in Claim 5.1 for studying the quantities Wz (ei + e j ) and Wz (2ei ), respectively. The difference is that the path connecting s1 and s2 does not belong to the cluster C2 ; and in the case of s1 ⊥ s2 , since the path must contain the origin, there is only one two-step walk connecting the vertices s1 and s2 instead of two. Hence, the contribution is captured in the positive quantity −Wz (e1 + e2 )/3. This implies that (4.70) is given by ∑ Is1 =s2 s1 ,s2 ∈E ∑ C1 s1 ,C2 1 z|C1 |+|C2 | V0,1 V1,2 = − 2d(2d − 1)Wz (e1 + e2 ). 3 s2 (5.64) Substituting this result into (4.69), and applying Theorem 1.1, (5.50) and Claim 5.1, give that the contribution to E 2 (zc ) is 1 1 2e +o − 2d(2d − 1)A(zc )z2c Wzc (ei + e j ) = 3 (2d)2 (2d)2 , as d → ∞. (5.65) For the case r = |{ j, k, l}| = 3, by (4.74) and (4.69), we know that the contribution to E 2 (z) is 1 − 2dz3 A(zc )Gz (e1 ) 2 ∑ ∑ z|C2 |+|C3 | V2,3 . (5.66) s2 ,s3 ∈E C2 s2 ,C3 s3 There are three possibilities for vertices s2 and s3 in this expression, namely, s2 = s3 , s2 = −s3 and s2 ⊥ s3 . Notice that in the first case, the factor V2,3 is automatically -1 and does not affect the sums. These three cases correspond to the three terms in the expression below, ∑ ∑ z|C2 |+|C3 | V2,3 = −2dg(z)2 + 2dWz (2e1 ) + 2d(2d − 2)Wzc (e1 + e2 ). (5.67) s2 ,s3 ∈E C2 s2 ,C3 s3 Replacing this expression in (5.66) and applying Theorem 1.1, (5.50), Claim 5.1 and Lemma 5.2, yield that the contribution to E 2 (zc ) is 1 2e (2d)2 +o 1 (2d)2 , as d → ∞. (5.68) Finally, adding (5.63), (5.65) and (5.68) yields that, as d → ∞, E 2 (zc ) = 7 2e (2d)2 +o 1 (2d)2 . (5.69) The term E 3 (z). We will follow a similar strategy to the one used previously for E 2 (z). Recall 86 equation (4.76) in the proof of Lemma 4.3. For this equation we analyzed the cases when r = |{i, j, k, l}| = 3 and 4; counted that the number of possibilities for the labels i, j, k and l that obey these conditions are 3 m 3 and 3 m 4 , respectively; estimated (4.77) and substituted this result into (4.76) to obtain the contribution in each case. The case r = |{i, j, k, l}| = 3. We assume that i = k = 1, j = 2 and l = 3, and study the situations |{s1 , s2 , s3 }| = 1, 2, 3. If |{s1 , s2 , s3 }| = 1, by (4.79) we know that the contribution to E 3 (zc ) is 1 2e (2d)2 +o 1 (2d)2 (5.70) , as d → ∞, If |{s1 , s2 , s3 }| = 2, then two of the vertices are different and two are equal, say s1 = s2 = s3 . Using that |V2,3 | ≤ 1, yields the following bound for (4.77) ∑ I|{s1 ,s2 ,s3 }|=2 s1 ,s2 ,s3 ∈E z|C1 |+|C2 |+|C3 | |V1,2 V1,3 | = 2d(2d − 1) [−3g(z)Wz (e1 + e2 )] , ∑ C1 s1 ,C2 s2 C3 s3 where the minus sign in the braces guarantees that Wz (e1 + e2 ) is a positive quantity. Theorem 1.1 and Claim 5.1, imply that this expression at criticality is of order O(1). Therefore, if we substitute it in (4.76), the presence of the factor z3 together with Theorem 1.1 and (5.50) gives a contribution of order O((2d)−3 ), and thus negligible. If |{s1 , s2 , s3 }| = 3, then the simplest way in which the factor V1,2 V1,3 is non zero is when the clusters C1 , C2 and C3 also contain the origin. Other intersections require at least four edges, if we treat the ribs emanating from these bonds, then the sum (4.77) is bounded by ∑ I|{s1 ,s2 ,s3 }|=3 s1 ,s2 ,s3 ∈E ∑ (2,2) 2 z|C1 |+|C2 |+|C3 | V1,2 V1,3 ≤ (2d)3 Gz (e1 )3 + 2Sz z g(z) . (5.71) C1 s1 ,C2 s2 C3 s3 The right-hand side of this expression at criticality is of order O(1), by Lemma 5.2 and Proposition 4.5. Hence, when substituted into (4.76), the factor z3 and Theorem 1.1 together with (5.50), yield that the contribution is of order O((2d)−3 ) and thus negligible. The case r = |{i, j, k, l}| = 4. We assume that i = 1, k = 2, j = 3 and l = 4. By (4.81) and (5.67), (4.77) is given by 2 ∑ ∑ s1 ,s2 ∈E z |C1 |+|C2 | V1,2 2 = −2dg(z)2 + 2dWz (2e1 ) + 2d(2d − 2)Wzc (e1 + e2 ) . C1 s1 C2 s2 In this expression we are only interested in the terms of order O((2d)2 ), which is (2d)2 g(z)4 , by Theorem 1.1 and Claim 5.1. Replacing this expression into (4.76), and applying equation (5.50), 87 yield that the contribution to E 3 (zc ), as d → ∞, is 1 e 1 3 4 zc A(zc )(2d)2 g(zc )4 = 8 2 + o 4! (2d) (2d)2 . (5.72) Therefore, this result and (5.70) yield E 3 (zc ) = 5 8e 1 (2d)2 +o (2d)2 (5.73) , as d → ∞. The term E 4 (zc ). In the expression (5.60) that defines this term, we distinguish whether the labels i,k, or p, in Vi, j Vk,l V p,q , are equal to 0. According to this condition we decompose the factors Vi, j Vk,l V p,q into the following four cases: (1) V0, j V0,l V0,q for 1 ≤ j < l < q ≤ m, (2) V0, j V0,l V p,q for 1 ≤ j < l ≤ m and 1 ≤ p < q ≤ m, (3) V0, j Vk,l V p,q for 1 ≤ j ≤ m, 1 ≤ k < l ≤ m and (p, q) ∈ Ak,l , (4) Vi, j Vk,l V p,q for 1 ≤ i < j ≤ m, (k, l) ∈ Ai, j and (p, q) ∈ Ak,l . We substitute this result in the definition of E 4 (z), given in (5.60), and exchange the order of sums over i, . . . , q and s1 , . . . , sm , to obtain E 4 (z) = E 4,1 (z) + E 4,2 (z) + E 4,3 (z) + E 4,4 (z), where E 4,1 (z) := E 4,2 (z) := E 4,3 (z) := E 4,4 (z) := zm (2dg(z))m−3 ∑ m! m≥3 1≤ j<l<q≤m ∑ zm ∑ m! (2dg(z))m−4 m≥2 zm ∑ m! (2dg(z))m−5 m≥3 ∑ s j ,sl ,s p ,sq ∈E ∑ ∑ ∑ ∑ ∑ C j s j ,Cl sl Cq sq (k,l)∈Ai, j (p,q)∈Ak,l si ,...,sq ∈E 88 ∑ z|C j |+|Cl |+|Cp |+|Cq | V0, j V0,l V p,q C j s j ,Cl sl C p s p ,Cq sq (p,q)∈Ak,l s j ,...,sq ∈E zm ∑ m! (2dg(z))m−6 ∑ 1≤i< j≤m m≥3 z|C j |+|Cl |+|Cq | V0, j V0,l V0,q ∑ s j ,sl ,sq ∈E ∑ 1≤ j<l≤m 1≤p<q≤m 1≤ j≤m 1≤k<l≤m ∑ ∑ z|C j |+···+|Cq | V0, j Vk,l V p,q ∑ z|Ci |+···+|Cq | Vi, j Vk,l V p,q . C j s j ,...,Cq sq Ci si ,...,Cq sq We will study each of these terms separately and show that, as d → ∞, 1 (2d)2 E 4,1 (z) = o 1 (2d)2 1 E 5 (zc ) = o (2d)2 E 4,3 (z) = o , E 4,2 (z) = − , E 4,4 (z) = − 1 2e (2d)2 1 6e (2d)2 +o 1 (2d)2 +o 1 (2d)2 (5.74) . Notice that if we assume (5.74), and add them to the contributions of E 1 (zc ), E 2 (zc ) and E 3 (zc ) given in (5.62), (5.69) and (5.73), respectively, we get that as, d → ∞, E(zc ) = E 1 (zc ) + E 2 (zc ) + E 3 (zc ) + E 4,1 (zc ) + E 4,2 (zc ) + E 4,3 (zc ) + E 4,4 (zc ) = 1 2 + 27 + 58 − 12 − 16 e 1 +o (2d)2 (2d)2 = 95 24 e (2d)2 +o 1 (2d)2 , which is the desired result for E(zc ) in (5.52). Therefore, it only remains to prove (5.74). The term E 4,1 (zc ). In this case, the number of labels j, l and q that satisfy 1 ≤ j < l < q ≤ m is m 3 . For convenience we assume j = 1, l = 2 and q = 3, then ∑ s1 ,s2 ,s3 ∈E ∑ z|C1 |+|C2 |+|C3 | V0,1 V0,2 V0,3 = [−2dGz (e1 )]3 . C1 s1 ,C2 s2 C3 s3 Substituting this expression in the definition of E 4,1 (zc ) we get E 4,1 (zc ) = zm m 1 (2dg(zc ))m−3 [−2dGzc (e1 )]3 = − A(zc ) [2dzc Gzc (e1 )]3 . m! 3! 3 m≥3 ∑ Theorem 1.1, (5.50) and Lemma 5.2, give that this term is of order O((2d)−3 ) and, hence, can be neglected. The term E 4,2 (zc ). Recall that E 4,2 (z) is given by E 4,2 (z) = zm (2dg(z))m−4 m! m≥2 ∑ ∑ 1≤ j<l≤m 1≤p<q≤m ∑ s j ,sl ,s p ,sq ∈E ∑ z|C j |+|Cl |+|Cp |+|Cq | V0, j V0,l V p,q . C j s j ,Cl sl C p s p ,Cq sq The cardinality of the set of labels obeys r := |{ j, l, p, q}| = 2, 3, 4. In every case, the number of possibilities for the labels is C˜r m , where the coefficient C˜r is a combinatorial factor, independent r 89 of d, that can be determined for r = 2, 3, 4. Substituting C˜r zm m ∑ m! (2dg(z))m−r C˜r r I|{ j,l,p,q}|=r ∑ m≥r s j ,sl ,s p ,sq ∈E C˜r = zr A(z)I|{ j,l,p,q}|=r ∑ r! s j ,sl ,s p ,sq ∈E m r z|C j |+···+|Cq | V0, j V0,l V p,q ∑ C j s j ,...,Cq sq |C j |+···+|Cq | z ∑ in the definition of E 4,2 (z) produces (5.75) V0, j V0,l V p,q . C j s j ,...,Cq sq with r = 2, 3, 4. In our analysis we estimate the following expression for r = 2, 3, 4. I|{i, j,k,l,p,q}|=r ∑ s j ,sl ,s p ,sq ∈E z|C j |+|Cl |+|Cp |+|Cq | V0, j V0,l V p,q . ∑ (5.76) C j s j ,Cl sl C p s p ,Cq sq When r = |{ j, l, p, q}| = 2, necessarily p = j and q = l, which implies that the number of possibilities for the labels j and l is m 2 . For convenience we assume that j = 1 and l = 2. The factors V0,1 and V0,2 force an intersection of the clusters C1 and C2 at the origin, this implies that automatically the factor V1,2 = −1. Hence, (5.76) becomes ∑ s1 ,s2 ∈E z|C1 |+|C2 | V0,1 V0,2 V1,2 = − [2dGz (e1 )]2 . ∑ C1 s1 ,C2 s2 By (5.50) and Lemma 5.2, the contribution to E 4,2 (zc ) is 1 e 1 1 − z2c e2dzc g(zc ) [2dGzc (e1 )]2 = − 2 2 + o 2 (2d) (2d)2 , as d → ∞. (5.77) When r = |{ j, l, p, q}| = 3, the number of terms V0, j V0,l V p,q whose labels satisfy this condition is 4 m 3 . If we choose 3 labels out of m and order them, then j gets the smallest label, l has two possible options and in each case there are two more choices. For convenience we assume that j = 1, l = 2, p = 1 and q = 3. Hence, (5.76) becomes ∑ s1 ,s2 ,s3 ∈E z|C1 |+|C2 |+|C3 | V0,1 V0,2 V1,3 ∑ C1 s1 ,C2 s2 C3 s3 = 2dGz (e1 ) ∑ ∑ z|C1 |+|C3 | V0,1 V1,3 s1 ,s3 ∈E C1 s1 ,C3 s3 1 = 2dGz (e1 ) 2dg(z)Gz (e1 ) − 2d(2d − 1)Wz (e1 + e2 ) 3 where the last equality is due to (4.71) and (5.64). Therefore, substituting this expression into (5.75) 90 gives − 4 1 A(z)z3 (2d)2 Gz (e1 ) g(z)Gz (e1 ) − (2d − 1)Wz (e1 + e2 ) . 3! 3 By Theorem 1.1, (5.50), Claim 5.1 and Lemma 5.2, the product z3c (2d)2 Gzc (e1 ) is of order O((2d)−2 ) and the terms in braces are of order O((2d)−1 ). Therefore, their contribution to E 4,2 (zc ) can be neglected. When r = |{ j, l, p, q}| = 4 the number of terms V0, j V0,l V p,q whose labels satisfy this condition is 3 m 4 . If we choose 4 labels out of m and order them, then i gets the smallest label, j has three possible options and once j is determined, so are k and l. For convenience we assume j = 1, l = 2, p = 3 and q = 4. Hence, (5.76) becomes ∑ s1 ,s2 ,s3 ,s4 ∈E z|C1 |+|C2 |+|C3 |+|C4 | V0,1 V0,2 V3,4 ∑ C1 s1 ,C2 s2 C3 s3 ,C4 s4 = (−2dGz (e1 ))2 ∑ ∑ z|C3 |+|C4 | V3,4 s3 ,s4 ∈E C3 s3 ,C4 s4 2 = (−2dGz (e1 )) −2dg(z)2 + 2dWz (2e1 ) + 2d(2d − 2)Wz (e1 + e2 ) , where the last equality is due to (5.67). Notice that, at criticality, Lemma 5.2 implies that the first factor is of order O(1); and Theorem 1.1 and Claim 5.1, yield that the factor within square braces is of order O((2d)−1 ). Therefore, when substituting this expression in (5.75), the presence of the factor z4c together with (5.50) and Theorem 1.1, yield that the contribution is of order O((2d)−5 ), and thus negligible. Therefore, (5.77) and the previous reasoning yield that E 4,2 (zc ) = − 1 2e (2d)2 +o 1 (2d)2 , as d → ∞, (5.78) which is the desired result (5.74) for E 4,2 (zc ). The term E 4,3 (zc ). We will show that E 4,3 (zc ) is of order o((2d)−2 ), as d → ∞. Recall that this term is given by E 4,3 (z) = zm (2dg(z))m−5 m! m≥3 ∑ ∑ 1≤ j≤m 1≤k<l≤m ∑ ∑ (p,q)∈Ak,l s j ,...,sq ∈E z|C j |+···+|Cq | V0, j Vk,l V p,q . ∑ C j s j ,...,Cq sq The cardinality of the set of labels satisfies r := | { j, k, l, p, q} | = 3, 4 or 5. In each case, the number of possibilities for the labels is C˜r m , where the coefficient C˜r is a combinatorial factor, independent r of d, that can be determined for all r = 3, 4, 5, 6. Substituting C˜r 91 m r in the definition of E 4,3 (z) produces zm ∑ m! (2dg(z))m−r C˜r m≥r m I ∑ r |{ j,k,l,p,q}|=r si ,...,s q ∈E C˜r = A(z)zr I|{ j,k,l,p,q}|=r ∑ r! si ,...,sq ∈E z ∑ z|Ci |+···+|Cq | V0, j Vk,l V p,q ∑ Ci si ,...,Cq sq |Ci |+···+|Cq | (5.79) V0, j Vk,l V p,q , Ci si ,...,Cq sq with r = 3, 4, 5. In our analysis we will bound the following expression I|{i, j,k,l,p,q}|=r ∑ si ,...,sq ∈E ∑ z|Ci |+···+|Cq | V0, j Vk,l V p,q . (5.80) Ci si ,...,Cq sq When r = | { j, k, l, p, q} | = 3, then k < l, p = k < q or p = l < q, and j has three options. Suppose that j = k = p = 1, l = 2 and q = 3. If we distinguish the cases when | {s1 , s2 , s3 } | = 1, 2 and 3, then (5.80) is bounded by 6 ∑ ∑ s1 ,s2 ,s3 ∈E z|C1 |+|C2 |+|C3 | |V0,1 V1,2 V1,3 | C1 s1 ,C2 s2 C3 s3 (2,2) 2 ≤ 6 2dg(z)2 Gz (e1 ) + 2(2d)2 g(z)Wz (e1 + e2 ) + (2d)3 Gz (e1 )3 + 2Sz z g(z) , for the last summand we recall the discussion above equation (5.71). By Theorem 1.1, Claim 5.1, Lemma 4.7 and Proposition 4.5, the expression above is of order O(1). Hence, if we substitute it in (5.79), the the presence of the factor z3c and Theorem 1.1 and (5.50), yields a negligible contribution of order O((2d)−3 ). When r = | { j, k, l, p, q} | = 4, then either j is different from k, l, p and q, or j is equal to one of them. In the first case, the factor V0, j in (5.80) only affects the sum over j, which becomes Gz (e1 ); and the other sums behave like in equation (4.77) for the case when the set of labels has cardinality three. By (5.70) and the discussion below it, we know that the contribution is of order O((2d)−2 ), and when multiplied by Gz (e1 ) = O((2d)−1 ), we get that the contribution to E 4,3 (zc ) is of order O((2d)−3 ), and thus negligible. For the second case, when j is equal to one of the other labels, (say j = k = 1, l = 2, p = 3 and q = 4), (5.80) is bounded by 4 ∑ ∑ z|C1 |+|C2 | V0,1 V1,2 s1 ,s2 ∈E C1 s1 ,C2 s2 ≤ 4 − (2d)2Wz (e1 + e2 ) ∑ ∑ z|C3 |+|C4 | V3,4 s3 ,s4 ∈E C3 s3 ,C4 s4 2dg(z)2 − 2dWz (2e1 ) − (2d)2Wzc (e1 + e2 ) 92 where in the inequality we have used (5.64) and (5.67). Theorem 1.1 and Claim 5.1, yield that the first factor is of order O(1) and the second one, O(2d). Therefore, if we substitute this expression into (5.79), then the factor z4 together with (5.50) and Theorem 1.1, yields a contribution of order O((2d)−3 ) that we can neglect. When r = | { j, k, l, p, q} | = 5, (5.80) is given by ∑ s1 ,...,s5 ∈E z|C1 |+···+|C5 | V0,1 V2,3 V4,5 ∑ C1 s1 ,...,C5 s5 2 = 2dGz (e1 ) ∑ z |C2 |+|C3 | V2,3 C2 s2 ,C3 s3 2 2 = 2dGz (e1 ) − 2dg(z) + 2dWz (2e1 ) + 2d(2d − 2)Wz (e1 + e2 ) , where the last equality is due to (5.67). Theorem 1.1, Claim 5.1 and Lemma 5.2, yield that this expression is of order O((2d)2 ). Then if we substitute it in (5.79), the factor z5 together with (5.50) and Theorem 1.1, yield a contribution of order O((2d)−3 ) and thus negligible. The term E 4,4 (zc ). Recall that E 4,4 (z) is given by E 4,4 (z) = zm ∑ m! (2dg(z))m−6 ∑ m≥3 1≤i< j≤m ∑ ∑ (k,l)∈Ai, j (p,q)∈Ak,l si ,...,sq ∈E z|Ci |+···+|Cq | Vi, j Vk,l V p,q . ∑ Ci si ,...,Cq sq The cardinality of the set of labels obeys r := |{i, j, k, l, p, q}| = 3, 4, 5, 6. In every case, the number of possibilities for the labels is C˜r m , where the coefficient C˜r is a combinatorial factor, independent r of d, that can be determined for all r = 3, 4, 5, 6. Substituting C˜r m r in the definition of E 4,4 (z) produces zm ∑ m! (2dg(z))m−r C˜r m≥r m I ∑ r |{i, j,k,l,p,q}|=r si ,...,s q ∈E C˜r = A(z)zr I|{i, j,k,l,p,q}|=r ∑ r! si ,...,sq ∈E ∑ |Ci |+···+|Cq | z ∑ z|Ci |+···+|Cq | Vi, j Vk,l V p,q Ci si ,...,Cq sq (5.81) Vi, j Vk,l V p,q , Ci si ,...,Cq sq with r = 3, 4, 5, 6. We will show that the case r = 3 contributes to E 4,4 (z), and the contributions of the other terms are of order o((2d)−2 ), as d → ∞. In our analysis we estimate the following sums, for r = 3, 4, 5, 6, I|{i, j,k,l,p,q}|=r ∑ si ,...,sq ∈E ∑ Ci si ,...,Cq sq 93 z|Ci |+···+|Cq | Vi, j Vk,l V p,q . (5.82) When r = |{i, j, k, l, p, q}| = 3, necessarily i is the smallest label, i < j < l and k = i, p = j and q = l. This implies that the number of possibilities for the labels is m 3 . For convenience we assume that i = k = 1, j = s = 2 and l = t = 3. We distinguish three cases for the vertices s1 , s2 and s3 , when s1 = s2 = s3 , when only two of them are equal, say s1 = s2 = s3 , and when the three of them are different. In the first case, the factor V1,2 V1,3 V2,3 = −1 and does not interfere in the sum (5.82), which becomes ∑ Is1 =s2 =s3 s1 ,s2 ,s3 ∈E ∑ z|C1 |+|C2 |+|C3 | V1,2 V1,3 V2,3 = −2dg(z)3 . C1 s1 ,C2 s2 C3 s3 Substituting this result into (5.81) and using (5.50) and Theorem 1.1, we get that the contribution to E 4,4 (zc ) is − 1 e 1 1 A(zc )2d (zc g(zc ))3 = − 6 2 + o 3! (2d) (2d)2 , as d → ∞. (5.83) In the second case, when only two of the vertices are equal, say s1 = s2 = s3 , there are 2d(2d −1) possibilities for the vertices s1 and s2 , and the factor |V2,3 | = 1. Then the fact that |V1,3 | ≤ 1 implies that (5.82) is bounded by 3 (2dg(z))3 ∑ s1 ,s2 ,s3 ∈E Is1 =s2 =s3 ∑ z|C1 |+|C2 |+|C3 | |V1,2 V1,3 V2,3 | C1 s1 ,C2 s2 ,C3 s3 ≤ 3 (2dg(z))3 2d(2d − 1)g(z) ∑ z|C1 |+|C2 | |V1,2 | C1 s1 ,C2 s2 ≤ 3(2d)5 g(z)4 [−Wz (2e1 ) −Wz (e1 + e2 )] , the two summands in the last inequality are positive quantities that correspond to s1 = −s2 and s1 ⊥ s2 , respectively. Substituting this result into (5.81) we get the bound 3 A(z)(2d)5 g(z)4 z3 [−Wz (2e1 ) −Wz (e1 + e2 )] . 3! By Theorem 1.1, (5.50) and Claim 5.1, we know that the product (2d)5 g(zc )4 z3c is of order O((2d)−2 ) and that, so are the terms braces. This gives a contribution of order O((2d)−4 ) that can be neglected. When the vertices s1 = s2 = s3 , using that |V1,3 | ≤ 1, the sum (5.82) is bounded by the expression in (5.71). Then by the discussion below (5.71), we know that the contribution is negligible. When r = |{i, j, k, l, p, q}| = 4, suppose that the labels are 1,2,3 and 4. There are 16 possible arrangements for the labels, which we show in Table 5.1. They can be reduced to the two cases: (i) Three labels are equal and the other three are different from the first ones and among them, e.g., i = k = p = 1, j = 2, l = 3 and q = 4. There are 4 arrangements of this type. 94 (ii) Two pairs of equal labels and a pair of distinct labels, e.g., i = k = 1, j = p = 2, l = 3 and q = 4. There are 12 arrangements of this type. i j 12 12 12 12 12 12 12 12 kl 13 13 13 14 14 23 23 24 pq 14 24 34 23 34 24 34 34 ij 13 13 13 13 13 14 14 14 kl 14 14 23 23 24 23 23 24 pq 23 24 24 34 34 24 34 34 Table 5.1: Possibilities for labels i, j, k, l, p, q We explain the main ideas to bound (5.81), when the factors |Vi j Vk,l V p,q | in (5.82) are given by |V1,2 V1,3 V1,4 | and |V1,2 V1,3 V2,4 |. Our reasoning can be extended to the remaining cases of type (i) and (ii). We distinguish the four possibilities |{s1 , s2 , s3 , s4 }| = 1, 2, 3, 4. Since the factors A(z)z4 in (5.81) are O (2d)−4 , by Theorem 1.1 and (5.50), it is enough to prove that (5.82) is at most O(2d) for each case. If |{s1 , s2 , s3 , s4 }| = 1, the products |V12 V13 V14 | and |V12 V13 V24 | are equal to 1, and the sums in (5.82) reduce to 2dg(zc )4 = O(2d), by Theorem 1.1. If |{s1 , s2 , s3 , s4 }| = 2, we decompose the products |V12 V13 V14 | and |V12 V13 V24 | into a factor that involves the two different vertices, and the remaining two factors. We bound these last two factors by 1, so their corresponding sums are bounded by g(zc )2 = O(1). The remaining sums are equal to 2d|Wz (2e1 )| + 2d(2d − 2)|Wzc (e1 + e2 )| (see (5.67) for the case s1 = s2 ), which is of order O(1) by Claim 5.1. If |{s1 , s2 , s3 , s4 }| = 3, we decompose |V12 V13 V14 | and |V12 V13 V24 | into two factors involving the three distinct vertices, and one remaining factor. We bound the latter factor by 1, and the corresponding sum becomes g(zc ) = O(1), by Theorem 1.1. The remaining sums are bounded by E 3 (zc ) for the case |V12 V13 V14 |, and by E 3 (zc ) or (E 2 (zc ))2 for the case |V12 V13 V24 |. By (5.69) and (5.73), we know that in both cases the contribution is at most O (2d)−2 . If |{s1 , s2 , s3 , s4 }| = 4, an example of the required intersections for |V12 V13 V14 | not to vanish is depicted in Figure 5.3a. By taking into account all possibilities for non-vanishing |V12 V13 V14 | and |V12 V13 V24 |, we draw the crude conclusion that at least eight bonds are needed to achieve the required intersections, and this leads to an upper bound O(2d)−4 . We explain this conclusion for the case |V12 V13 V14 | = 1 depicted in Figure 5.3a. We think that each one of the four factors z, in (5.81), is located on one of the four edges {0, s1 } , . . . , {0, s4 }. The rib Ri emanating from vertex (1) (mi ) si together with {0, si }, are bounded by Gz ∗ Gz 95 , for i = 2, 3, 4. Similarly, rib R1 and edge (1) (m5 ) {0, s1 } are be bounded by Gz ∗ Gz (m6 ) ∗ Gz (m7 ) ∗ Gz . The steps m2 , . . . , m7 satisfy m2 + · · · + m7 ≥ 4, because the minimal case in which the ribs intersect is, when the edges {0, si } are present in the corresponding rib Ri , or when all four edges {0, s1 } , . . . , {0, s4 } are in R1 , see Figure 5.3b. Therefore, the total number of steps present in all the two-point functions is at least 8. Then an application of Proposition 4.5 yields a contribution of order O((2d)4 ), and thus negligible. (a) General case (b) Minimal case Figure 5.3: The case s1 = s2 = s3 = s4 When r = |{i, j, k, l, p, q}| = 5, one of the factors Vi, j ’s has labels that do not repeat, say i = 1 and j = 2, and the other two, share one of the labels. Then the sums over the labels that do not repeat, in our case i = 1 and j = 2, can be factor out from (5.82), which can be bounded by ∑ ∑ z|C1 |+|C2 | |V1,2 | ≤ 2dg(z)2 − 2(2d)2Wz (e1 + e2 ), s1 ,s2 ∈E C1 s1 ,C2 s2 where the first term on the right-hand side corresponds to s1 = s2 and the second one bounds when to s1 = s2 . By Theorem 1.1 and Claim 5.1, this expression is O(2d). On the other hand, the remaining sums coincide with the case of E 3 (z) when its number of labels is three. By (4.78) and (4.80), we know that these sums are bounded by (4,2) 2dg(z)3 + 3(2d)3 g(z) 6z2 g(z)2 + Sz , which, by Theorem 1.1 and Proposition 4.5, is O(2d). The factors A(z)z5 in (5.81) are O (2d)−5 , by Theorem 1.1 and (5.50). Then our previous observations yield that the contribution of (5.81) to E 4,4 (z), for r = 5, is O((2d)−3 ) and can be neglected. 96 When r = |{i, j, k, l, p, q}| = 6, the sums in (5.82) are given by 3 ∑ ∑ |C1 |+···+|C6 | z |V1,2 V3,4 V5,6 | = ∑ s1 ,...,s6 ∈E C1 s1 ,...,C6 s6 |C1 |+|C2 | z ∑ |V1,2 | s1 ,s2 ∈E C1 s1 ,C2 s2 3 = 2dg(z)2 − 2dWz (2e1 ) − 2d(2d − 2)Wzc (e1 + e2 ) , which is O (2d)3 , by Theorem 1.1 and Claim 5.1. When substituting this result into (5.81), since A(z)z6 is O (2d)−6 , by Theorem 1.1 and (5.50), we get that the contribution of (5.81) to E 4,4 (z), for r = 6, is O((2d)−3 ) and can be neglected. The term E 5 (zc ). If in the definition of E 5 (z) in (5.61), we use that the product ∏(u,v)∈As,t (1 + Vu,v ) ≤ 1, then we get the bound E 5 (z) ≤ zm ∑ ∑ z|C1 | · · · ∑ z|Cm | ∑ ∑ m! m=4 0≤i< j≤m (k,l)∈A Cm sm s1 ,...,sm ∈E C1 s1 ∞ ∑ ∑ i, j ∑ Vi, j Vk,l V p,q Vs,t . (p,q)∈Ak,l (s,t)∈A p,q (5.84) We denote the cardinality of the label set by r = |{i, j, k, l, p, q, s,t}|, so r ∈ {4, 5, 6, 7, 8}, and exchange the sums over vertices and labels. As in the previous discussion for E 4,4 (z), this allows us to rewrite the upper bound of (5.84) in the form 8 E 5 (z) ≤ A(z) ∑ ∑ αr,i E (5,r,i) (z), (5.85) r=4 i where the sum over i is a finite sum, the αr,i are constants whose values are immaterial, and each E (5,r,i) is of the form E (5,r,i) (z) = ∑ ∑ s1 ,...,sr ∈E S1 s1 |S | zc 1 · · · ∑ |S | zc r V (r,i) , (5.86) Sr sr with V (r,i) a product of 4 factors of Vab having r distinct labels in all. Since A(zc ) = O(1) (as observed in (5.50)), it suffices to show that each E (5,r,i) (zc ) is O(2d)−3 . For r = 4, 5 or 6, we substitute one of the factors in Vi, j Vk,l V p,q Vs,t by 1, with the restriction that the remaining three factors have at least four different labels. The sums involving the replaced factor yield 1 or 2dg(zc ) or (2dg(zc ))2 depending on whether this factor has 0,1 or 2 distinct labels from the remaining three factors; all three cases are O(1) by Theorem 1.1. The sums involving the other three factors reduce to E 4,4 (z) when the set of labels has cardinality four, five or six, which by our previous discussion, are of order o((2d)−2 ), as d → ∞. For r = 7 or 8, we consider three factors in the product Vi, j Vk,l V p,q Vs,t that have six different labels and bound the fourth factor by 1. The sums involving the fourth factor yield 2dg(zc ) and 97 (2dg(zc ))2 for r = 7 and r = 8, respectively. By Theorem 1.1, in both cases the contribution is O(1). By our discussion on E 4,4 (z) when the set of labels has cardinality six, the sums involving the six distinct labels is O(2d)−3 . This completes the proof of (5.74). The term Ia ∑ A 0 0∈cycle z|A| . Finally, for the lattice animal case we analyze Ia z|A| , ∑ A 0 0∈cycle where the sum is over all animals that have a cycle containing 0. A calculation similar to the one we did to get ˆ (a,0) Π (a) (0) = zc 3 2 (2d)2 +o 1 (2d)2 , (a,0) ˆ (a) (0) is the factor 3, which arose in (5.46), yields the desired result. The only difference with Π zc from the sum over x (the three remaining vertices in the 4-cycles containing 0). In this situation there is not such sum and therefore, that factor is 1, i.e., Ia ∑ A 0 0∈cycle (a) (zc )|A| = 1 2 (2d)2 +o 1 (2d)2 . This completes the proof of Theorem 1.5, and, therefore, the proof of Theorem 1.2. 98 Chapter 6 Conclusions The work presented in this thesis lies in the fields of combinatorics, probability theory, statistical physics and is inspired by polymer chemistry. We study (bond) lattice animals and lattice trees in the nearest-neighbor and spread-out models in Zd . Lattice animals are finite connected subgraphs of Zd , and lattice trees are animals without cycles. They are very interesting combinatorial objects that are easy to understand but in general, difficult to analyze. For instance, the basic question of computing the number of trees and animals of fixed size that contain the origin is unsolved even in two dimensions. However, extensive enumerations in low dimensions have been accomplished in the combinatorics literature [29]. In polymer chemistry, lattice trees and lattice animals are used to model branched polymers [27]. In statistical physics, lattice trees and lattice animals are examples of models that exhibit a phase transition, with a very interesting behavior at criticality [39]. They share this characteristic with the related models of self-avoiding walks and percolation. (t) (a) The focus of our study are the critical points zc and zc of lattice trees and lattice animals, 1/n respectively. They are the reciprocal of the growth constants τ = limn→∞ tn 1/n and α = limn→∞ an , where tn and an are the number of lattice trees and lattice animals with n bonds, that contain the origin. In this work we focus in the high dimensional case, in which exact results are not available, but instead 1/d–expansions are studied. The main result of this thesis, is the rigorous calculation of the first three terms of a 1/d– expansion for the critical points for lattice trees and lattice animals for the nearest-neighbor model. As a side result, we have also calculated three terms of a 1/d–expansion for the one-point functions at criticality. The proof follows a recursive argument similar to the one used in [20] and [24], in which some of the terms of a 1/d-expansion were obtained for self-avoiding walk and percolation. The main technique that we apply is the lace expansion. This method gives an implicit formula for the critical points. However, unlike the cases of self-avoiding walks and percolation, the formula given by the lace expansion includes the one-point function at criticality. We overcome this difficulty by developing an expansion for the one-point function, in a way that resembles the lace expansion 99 in order to exploit some of the results given by this technique. In Chapter 2, we obtain the leading order terms for the critical points and one-point functions. The chapter is base on our publication [35]. In the proof we use results given by the lace expansion but with no further application of the technique. Instead, we use a mean-field model related to the Galton-Watson branching process with critical Poisson offspring distribution. This connection was suggested by [25]. In Chapter 3, we develop a new expansion for the one-point functions, which in the subsequent chapters becomes a key ingredient in our proof. We also derive the lace expansion for lattice trees and animals following the ideas in [39]. In particular, we explain how to obtain an implicit formula ˆ zc (0). for the critical points, given in terms of the one-point function and the quantity Π Finally, in Chapter 4 and Chapter 5, we obtain the first and second order correction terms, respectively. In the proof we use the lace expansion extensively, together with the expansion for the one-point function that we develop in Chapter 3. The calculation of the terms in the expansions for the critical points are intertwined with the calculations of the terms in expansions for the one-point ˆ zc (0). function and Π When computing 1/d–expansion it is generally assumed that in such expansions the remainder is of the order of the first omitted term, but this is rarely proved due to the limitations of the employed techniques. Our method allows us to do this in a rigorous way, confirming previous results by [11] for lattice trees, and [21, 36] for lattice animals, in which bounds on the errors are not present. Our research also shows the power of the lace expansion for handling these kinds of problems. Our method is essentially algorithmic, with sufficient labor could be extended to compute higher order terms of the 1/d–expansions for the critical points and the critical one-point functions. Probably, some of the calculations could be done using a computer. Moreover, it may provide the starting point for proving the existence of an asymptotic expansion, with rational coefficients, for the critical point of nearest-neighbor lattice trees in a similar fashion as in [20] and [23], for self-avoiding walks and percolation, respectively. We expect that the ideas in our proof could by applied in the analysis of the critical point of q–lattice animals. A q–lattice animal A is an animal whose boundary (edges incident to A but not in it) are weighted by the factor q. They can be thought as an interpolating lattice animals and the percolation. Specifically, we aim to achieve a lower bound for the critical point in terms of q. 100 Bibliography [1] G. Aleksandrowicz and G. Barequet. The growth rate of high-dimensional tree polycubes. Preprint, (2012). [2] N. Alon, I. Benjamini, and A. Stacey. Percolation on finite graphs and isoperimetric inequalities. Ann. Probab., 32:1727–1745, (2004). [3] R. Barequet, G. Barequet, and G. Rote. Formulae and growth rates of high-dimensional polycubes. Combinatorica, 30:257–275, (2010). [4] B. Bollob´as and Y. Kohayakawa. Percolation in high dimensions. Europ. J. Combinatorics, 15:113–125, (1994). [5] C. Borgs, J. Chayes, R. v. d. Hofstad, and G. Slade. Mean-field lattice trees. Ann. Combinatorics, 3:205–221, (1999). [6] D. Brydges and T. Spencer. Self-avoiding walk in 5 or more dimensions. CMP, 97:125–148, 1985. [7] N. Clisby, R. Liang, and G. Slade. Self-avoiding walk enumeration via the lace expansion. J. Phys. A: Math. Theor., 40:10973–11017, (2007). [8] E. Derbez and G. Slade. The scaling limit of lattice trees in high dimensions. Commun. Math. Phys., 193:69–104, (1998). [9] S. Flesia and D. Gaunt. Lattice animal contact models of a collapsing branched polymer. J. Phys. A: Math. Gen., 25:2127–2137, 1992. [10] S. Flesia, D. S. Gaunt, C. E. Soteros, and S. G. Whittington. Statistics of collapsing lattice animals. J. Phys. A, 27(17):5831–5846, 1994. [11] D. S. Gaunt and P. J. Peard. 1/d-expansions for the free energy of weakly embedded site animal models of branched polymers. J. Phys. A, 33(42):7515–7539, 2000. [12] D. S. Gaunt, M. F. Sykes, G. M. Torrie, and S. G. Whittington. Universality in branched polymers on d-dimensional hypercubic lattices. J. Phys. A, 15(10):3209–3217, 1982. [13] D. Gordon. Percolation in high dimensions. J. London Math. Soc. (2), 44:373–384, (1991). [14] B. Graham. Borel-type bounds for the self-avoiding walk connective constant. J. Phys. A: Math. Theor., 43:235001, (2010). 101 [15] G. Grimmett. Percolation, volume 321 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, second edition, 1999. [16] T. Hara. Decay of correlations in nearest-neighbor self-avoiding walk, percolation, lattice trees and animals. Ann. Probab., 36(2):530–593, 2008. [17] T. Hara and G. Slade. Mean-field critical behaviour for percolation in high dimensions. Commun. Math. Phys., 128:333–391, (1990). [18] T. Hara and G. Slade. On the upper critical dimension of lattice trees and lattice animals. J. Stat. Phys., 59:1469–1510, (1990). [19] T. Hara and G. Slade. The number and size of branched polymers in high dimensions. J. Stat. Phys., 67:1009–1038, (1992). [20] T. Hara and G. Slade. The self-avoiding-walk and percolation critical points in high dimensions. Combin. Probab. Comput., 4:197–215, (1995). [21] A. Harris. Renormalized (1/σ ) expansion for lattice animals and localization. Phys. Rev. B, 26:337–366, (1982). [22] R. v. d. Hofstad and A. Sakai. Critical points for spread-out self-avoiding walk, percolation and the contact process. Probab. Theory Related Fields, 132:438–470, (2005). [23] R. v. d. Hofstad and G. Slade. Asymptotic expansions in n−1 for percolation critical values on the n-cube and Z n . Random Struct. Alg., 27:331–357, (2005). [24] R. v. d. Hofstad and G. Slade. Expansion in n−1 for percolation critical values on the n-cube and Z n : the first three terms. Combin. Probab. Comput., 15:695–713, (2006). [25] M. Holmes. Convergence of lattice trees to super-Brownian motion above the critical dimension. Electr. J. Probab., 13:671–755, (2008). [26] E. J. Janse van Rensburg. On the number of trees in Zd . J. Phys. A: Math. Gen., 25: 3523–3528, (1992). [27] E. J. Janse van Rensburg. The Statistical Mechanics of Interacting Walks, Polygons, Animals and Vesicles. Oxford University Press, Oxford, (2000). [28] E. J. Janse van Rensburg and R. A. High precision canonical monte carlo determination of the growth constant of square lattice trees. Physical Review E, 67:036116–1 036116–9, 2003. [29] I. Jensen. Enumeration of lattice animals and trees. J. Stat. Phys., 102:865–881, (2001). [30] H. Kesten. Asymptotics in high dimensions for percolation. In G. Grimmett and D. Welsh, editors, Disorder in Physical Systems. Clarendon Press, Oxford, (1990). [31] D. Klarner. Cell growth problems. Canad. J. Math., 19:851–863, (1967). [32] D. Klein. Rigorous results for branched polymer models with excluded volume. J. Chem. Phys., 75:5186–5189, (1981). 102 [33] N. Madras. A rigorous bound on the critical exponent for the number of lattice trees, animals and polygons. J. Stat. Phys., 78:681–699, (1995). [34] N. Madras and G. Slade. The Self-Avoiding Walk. Birkh¨auser, Boston, (1993). [35] Y. Mej´ıa-Miranda and G. Slade. The growth constants of lattice trees and lattice animals in high dimensions. Electronic Communications in Probability, 16:129–136, 2011. [36] P. Peard and D. Gaunt. 1/d-expansions for the free energy of lattice animal models of a self-interacting branched polymer. J. Phys. A: Math. Gen., 28:6109–6124, (1995). [37] M. Penrose. On the spread-out limit for bond and continuum percolation. Ann. Appl. Probab., 3:253–276, (1992). [38] M. Penrose. Self-avoiding walks and trees in spread-out lattices. Journal of Statistical Physics, 77, 1994. [39] G. Slade. The lace expansion and its applications, volume 1879 of Lecture Notes in Mathematics. Springer-Verlag, Berlin, 2006. Lectures from the 34th Summer School on Probability Theory held in Saint-Flour, July 6–24, 2004, Edited and with a foreword by Jean Picard. [40] R. Stanley. Enumerative Combinatorics, volume 1. Cambridge University Press, Cambridge, (1997). 103
- Library Home /
- Search Collections /
- Open Collections /
- Browse Collections /
- UBC Theses and Dissertations /
- The critical points of lattice trees and lattice animals...
Open Collections
UBC Theses and Dissertations
Featured Collection
UBC Theses and Dissertations
The critical points of lattice trees and lattice animals in high dimensions Mejía Miranda, Yuri 2012
pdf
Page Metadata
Item Metadata
Title | The critical points of lattice trees and lattice animals in high dimensions |
Creator |
Mejía Miranda, Yuri |
Publisher | University of British Columbia |
Date | 2012 |
Date Issued | 2012-08-30 |
Description | We study lattice trees and lattice animals in high dimensions. Lattice trees and animals are interesting combinatorial objects used to model branched polymers in polymer science. They are also of interest in combinatorics and in the study of critical phenomena in statistical physics. [Abstract portion beginning here modified and differs from the print copy]. Our study takes place in the nearest-neighbor and spread-out models on the d-dimensional integer lattice. On either graph, a lattice animal is a finite connected subgraph, and a lattice tree is an animal without cycles. Let t_n and a_n be the number of lattice trees and animals with n bonds that contain the origin, respectively. Standard subadditivity arguments provide the existence of the growth constants τ and α, which are the limit, as the dimension d goes to infinity, of the n-th root of t_n and a_n, respectively.] We are interested in the critical points of these models, which are the reciprocals of the corresponding growth constants. We rigorously calculate the first three terms of a 1/d-expansion for the critical points of nearest-neighbor lattice trees and animals. The proof follows a recursive argument similar to the one used by Hara and Slade (1995), van der Hofstad and Slade (2006), to obtain analogous results for the critical points of self-avoiding walks and percolation. To provide the leading terms in the expansions, we use a mean-field model, related to the Galton-Watson branching process with critical Poisson offspring distribution, and results obtained with the lace expansion. The leading terms are also calculated in the spread-out model. Then we develop expansions for the nearest-neighbor generating functions and, together with the lace expansion, obtain the first and second correction terms. Our result gives a rigorous proof for previous work on the subject [11],[21, 36]. Given the algorithmic nature of the proof, it can be extended, with sufficient labor, to compute higher degree terms. It may provide the starting point for proving the existence of an asymptotic expansion with rational coefficients, for the critical point of nearest-neighbor lattice trees. |
Genre |
Thesis/Dissertation |
Type |
Text |
Language | eng |
Collection |
Electronic Theses and Dissertations (ETDs) 2008+ |
Date Available | 2012-08-30 |
Provider | Vancouver : University of British Columbia Library |
DOI | 10.14288/1.0073085 |
URI | http://hdl.handle.net/2429/43087 |
Degree |
Doctor of Philosophy - PhD |
Program |
Mathematics |
Affiliation |
Science, Faculty of Mathematics, Department of |
Degree Grantor | University of British Columbia |
Graduation Date | 2012-11 |
Campus |
UBCV |
Scholarly Level | Graduate |
Aggregated Source Repository | DSpace |
Download
- Media
- ubc_2012_fall_mejiamiranda_yuri.pdf [ 1.24MB ]
- Metadata
- JSON: 1.0073085.json
- JSON-LD: 1.0073085+ld.json
- RDF/XML (Pretty): 1.0073085.xml
- RDF/JSON: 1.0073085+rdf.json
- Turtle: 1.0073085+rdf-turtle.txt
- N-Triples: 1.0073085+rdf-ntriples.txt
- Original Record: 1.0073085 +original-record.json
- Full Text
- 1.0073085.txt
- Citation
- 1.0073085.ris
Full Text
Cite
Citation Scheme:
Usage Statistics
Country | Views | Downloads |
---|---|---|
United States | 52 | 1 |
China | 4 | 0 |
Canada | 2 | 0 |
France | 1 | 0 |
Germany | 1 | 0 |
Austria | 1 | 0 |
City | Views | Downloads |
---|---|---|
Boardman | 46 | 0 |
Ashburn | 5 | 0 |
Unknown | 3 | 0 |
Shenzhen | 2 | 0 |
Vancouver | 2 | 0 |
Beijing | 2 | 0 |
Sunnyvale | 1 | 0 |
{[{ mDataHeader[type] }]} | {[{ month[type] }]} | {[{ tData[type] }]} |
Share
Embed
Customize your widget with the following options, then copy and paste the code below into the HTML
of your page to embed this item in your website.
<div id="ubcOpenCollectionsWidgetDisplay">
<script id="ubcOpenCollectionsWidget"
src="{[{embed.src}]}"
data-item="{[{embed.item}]}"
data-collection="{[{embed.collection}]}"
data-metadata="{[{embed.showMetadata}]}"
data-width="{[{embed.width}]}"
async >
</script>
</div>
Our image viewer uses the IIIF 2.0 standard.
To load this item in other compatible viewers, use this url:
http://iiif.library.ubc.ca/presentation/dsp.24.1-0073085/manifest