boolean circuits

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

View metadata, citation and similar papers at core.ac.

uk brought to you by CORE


provided by Elsevier - Publisher Connector

Journal of Pure and Applied Algebra 184 (2003) 257 – 310


www.elsevier.com/locate/jpaa

Towards an algebraic theory of Boolean circuits


Yves Lafont
Universite de la Mediterranee & Institut de Mathematiques de Luminy, UPR 9016 du CNRS,
163 avenue de Luminy, case 930, 13288 Marseille Cedex 9, France

Received 16 December 2002; received in revised form 21 January 2003


Communicated by I. Moerdijk

Abstract

Boolean circuits are used to represent programs on 3nite data. Reversible Boolean circuits and
quantum Boolean circuits have been introduced to modelize some physical aspects of compu-
tation. Those notions are essential in complexity theory, but we claim that a deep mathematical
theory is needed to make progress in this area. For that purpose, the recent developments of
knot theory is a major source of inspiration.
Following the ideas of Burroni, we consider logical gates as generators for some algebraic
structure with two compositions, and we are interested in the relations satis3ed by those gen-
erators. For that purpose, we introduce canonical forms and rewriting systems. Up to now, we
have mainly studied the basic case and the linear case, but we hope that our methods can be
used to get presentations by generators and relations for the (reversible) classical case and for
the (unitary) quantum case.
c 2003 Elsevier B.V. All rights reserved.

MSC: 15-XX

1. Introduction

We use diagrams to represent certain kinds of maps. If p and q are natural numbers,
 : p → q stands for a diagram with p inputs and q outputs. It is pictured as follows:
p
}

···

···
}

E-mail address: lafont@iml.univ-mrs.fr (Y. Lafont).

c 2003 Elsevier B.V. All rights reserved.


0022-4049/03/$ - see front matter 
doi:10.1016/S0022-4049(03)00069-0
258 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Typically, such a diagram represents:

• a map from {1; : : : ; p} to {1; : : : ; q} (basic case);


• a map from X p to X q , where X is a given set (classical case);
• a K-linear map from K p to K q , where K is a given 3eld (linear case);
• a K-linear map from ⊗p V to ⊗q V , where V is a given vector space over a 3eld K,
and ⊗n V stands for the n-ary tensor product V ⊗ · · · ⊗ V (quantum case).

The basic case corresponds to control <ow diagrams and the classical case to data
<ow diagrams.
Diagrams may be composed in two diCerent ways. For any  : p → q and : q → r,
we have a diagram ◦  : p → r, which corresponds to the usual composition of maps,
and which is pictured as follows:

···

···

···

This vertical (or sequential) composition is associative, and we have an identity dia-
gram id p : p → p for each p, such that  ◦ id p =  = id q ◦  for any  : p → q. This
id p is pictured as follows:

···

For any  : p → q and  : p → q , we have a diagram  |  : p + p → q + q which


is pictured as follows:

··· ···
 
··· ···

If  represents f and  represents f , the interpretation g of  |  depends on the


considered case:

• in the basic case, g is the disjoint union (or coproduct) f f de3ned by g(i)=f(i)
for i = 1; : : : ; p and g(p + i) = q + f (i) for i = 1; : : : ; p ;
• in the classical case, g is the cartesian product f × f de3ned by g(x1 ; : : : ; xp+p ) =
(y1 ; : : : ; yq+q ) where (y1 ; : : : ; yq ) = f(x1 ; : : : ; xp ) and (yq+1 ; : : : ; yq+q ) = f (xp+1 ; : : : ;
xp+p );
• in the linear case, g is the direct sum f ⊕ f de3ned by g(u ⊕ u ) = f(u) ⊕ f (u )

for u ∈ K p and u ∈ K p . Note that g coincides with the cartesian product f × f ;
• in the quantum case, g is the tensor product f⊗f de3ned by g(u⊗u )=f(u)⊗f (u )

for u ∈ ⊗p V and u ∈ ⊗p V .

This horizontal (or parallel) composition is associative, and the void diagram id 0 : 0 →
0 is such that  | id 0 =  = id 0 |  for any  : p → q. Furthermore, we have id p | id p =
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 259

id p+p , and the two compositions are compatible in the following sense: for any  :
p → q, : q → r,  : p → q , and  : q → r  , we have ( ◦ ) | (  ◦  ) = ( |  ) ◦
( |  ). This diagram is pictured as follows:

··· ···
 
··· ···
 
··· ···
In particular, for any  : p → q and  : p → q , we get ( | id q ) ◦ (id p |  ) =  |  =
(id q |  ) ◦ ( | id p ). This corresponds to the following picture:

··· ··· ··· ··· ···


 
=   =
 
··· ··· ··· ··· ··· ···
All this can be summarized as follows: the diagrams are the morphisms of a (strict)
monoidal category whose objects are natural numbers (with addition). See [7] for the
notion of monoidal category. Moreover, this monoidal category is freely generated by
a given list of atomic diagrams called cells. In other words, all diagrams are built from
identities and cells using vertical and horizontal composition, and an equality between
two diagrams holds only if it follows from the above properties.
An elementary diagram is a diagram  of the form id i |  | id j where  is a cell:

···
···  ···
···
It is easy to see that any diagram  is a vertical composition of elementary diagrams
1 ◦ · · · ◦ n , but this decomposition is not unique. In fact, two decompositions de3ne
the same diagram if and only if they are equivalent modulo the following commutation
rule:

··· ··· ··· ···


 
··· ··· ··· = ··· ··· ···
 
··· ··· ··· ···
In particular, all decompositions of  have the same length. This common length is
called the size of : it is the total number of cells in .
Diagrams may be interpreted in any monoidal category. We have already seen four
examples:

• sets with disjoint union (basic case) or with cartesian product (classical case);
• vector spaces with direct sum (linear case) or with tensor product (quantum case).

We may also consider monoidal subcategories obtained by restricting the class of


objects or the class of morphisms. For instance, we may limit our study to ?nite
260 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

sets or to ?nite dimensional spaces, to bijective, surjective, or injective maps, and


whenever it makes sense, to monotone, orthogonal, or unitary maps. In this paper, we
give presentations by generators and relations for some of those monoidal categories.

2. The basic case

In this section, we consider the monoidal category F of 3nite sets {1; : : : ; n}


with disjoint union, and some of its monoidal subcategories. Essentially, we
follow [3], except for the case of even permutations which was not handled in that
paper.

2.1. Permutations

Let S be the monoidal subcategory of F whose morphisms are permutations. We


represent the unique transposition of {1; 2} by a cell  : 2 → 2, which is pictured as
follows:

Note that the transposition i of {1; : : : ; n} which exchanges i with i+1 is represented
by the elementary diagram id i−1 |  | id n−i−1 :

··· ···

Obviously,  satis3es the relations ◦=id 2 and ( | id 1 )◦(id 1 | )◦( | id 1 )=(id 1 | )◦
( | id 1 ) ◦ (id 1 | ), which are pictured as follows:

= =

Of course, those equalities hold between the interpretations, not between the dia-
grams.

Theorem 1. The generator  and the above two relations form a presentation of S.

This means that  generates S, and if two diagrams represent the same permutation,
they are equivalent modulo the above relations.
If we restrict this presentation of the monoidal category S to permutations of
{1; : : : ; n}, we get the usual presentation of the symmetric group Sn by the gener-
ators 1 ; : : : ; n−1 and the following relations:
2i = 1; i i+1 i = i+1 i i+1 ; i j = j i for j ¿ i + 1:
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 261

However, our approach has several advantages: we present all Sn at the same time;
we need one generator instead of n − 1, and two relations instead of n(n − 1)=2; the
relations i j = j i for j ¿ i + 1 are made implicit by the commutation rule. Fur-
thermore, we shall see that a monoidal category such as F, which is not a groupoid,
can also be presented in this way, even though it cannot be decomposed into
monoids.
To show Theorem 1, we introduce the notions of stairs and canonical forms, which
are de3ned by the following grammar:

···
···
··· ···
is or is void or ···
··· ···
··· ··· ···

Lemma 1. Any permutation f of {1; : : : ; n} is represented by a unique canonical


form.

This is proved by induction on n:

• If n = 0, then f is the identity on the empty set, which is represented by the void
diagram.
• If n ¿ 1, we get a permutation of {1; : : : ; n − 1} by removing 1 from the domain of
f and f(1) from its codomain, and by renumbering both of them. In the canonical
form of f, the size of the stairs is f(1) − 1, and the remaining part is given by the
induction hypothesis.

Lemma 2. Any diagram  : n → n reduces to a canonical form ˆ by the following


rules:

This is proved by double induction on n and the size m of :

• If m=0, then =id n , which is a canonical form. This is easily checked by induction
on n.
• If m ¿ 1, then  =  ◦ where  is an elementary diagram and is a diagram of
size m − 1 which reduces to a canonical form ˆ by induction hypothesis. Therefore,
 reduces to  ◦ ˆ and there are four possible cases: see Fig. 1. In the 3rst case,
we use the 3rst rule and the induction hypothesis for n − 1; in the second case,
we use the second rule and we get a canonical form; in the third case, we get a
canonical form; in the fourth case, we use the induction hypothesis for n − 1. Note
that in the 3rst and in the last case, we also need the commutation rule, which is
implicit.
262 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

···
··· ···
··· ···

··· ···
··· ··· ···

··· ···
··· ···

··· ··· ··· ··· ···

Fig. 1. The four cases of Lemma 2.

Now we can prove Theorem 1:  generates S by Lemma 1, and if two diagrams 


and represent the same permutation, then  reduces to ˆ and to ˆ by Lemma 2.
Since all those diagrams represent the same permutation, we have ˆ = ˆ by Lemma 1,
so that  and are equivalent modulo the relations.
In fact, our rules form a terminating rewrite system: see Appendix A. Since they
do not increase the size of diagrams, a canonical form is always a diagram of minimal
size for the map it represents.

2.2. Monotone maps

Let M be the monoidal subcategory of F whose morphisms are monotone maps. We


introduce two generators  : 2 → 1 and  : 0 → 1, which are interpreted in the obvious
way and pictured as follows:

Obviously,  and  satisfy the relations  ◦ ( | id 1 ) =  ◦ (id 1 | ),  ◦ ( | id 1 ) = id 1 ,


and  ◦ (id 1 | ) = id 1 , which are pictured as follows:

= = =

Theorem 2. The generators ,  and the above three relations form a presentation
of M.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 263

To show this, we introduce the following notion of canonical form:

···
··· ···
is void or or
··· ··· ···

Lemma 3. Any monotone map f : {1; : : : ; p} → {1; : : : ; q} is represented by a unique


canonical form.

This is proved by induction on n = p + q:

• If n = 0, then f is the identity on the empty set, which is represented by the void
diagram.
• If p ¿ 1 and f(1) = 1, we get a monotone map by removing 1 from the domain
of f, and by renumbering it. The canonical form is of the second type, and the
remaining part is given by the induction hypothesis.
• Otherwise, q ¿ 1 and 1 is not in the image of f: we get a monotone map by
removing 1 from the codomain of f, and by renumbering it. The canonical form is
of the third type, and the remaining part is given by the induction hypothesis.

Lemma 4. Any diagram  : p → q reduces to a canonical form ˆ by the following


rules:

This is proved by double induction on n = p + q and the size m of :

• If m=0, then =id p , which reduces to a canonical form. This is proved by induction
on p, using the 3rst rule:

···
··· ···
···

• If m ¿ 1, then  =  ◦ where  is an elementary diagram and is a diagram of


size m − 1 which reduces to a canonical form ˆ by induction hypothesis. Therefore,
 reduces to ◦ ˆ and there are seven possible cases: see Fig. 2. In the 3rst case, we
use the second rule and the induction hypothesis for n − 1; in the second case, we
use the third rule and we get a canonical form; in the 3fth case, we get a canonical
form; in the other four cases, we use the induction hypothesis for n − 1.

Theorem 2 follows from Lemmas 3 and 4.


Note that identity diagrams are not in canonical form, so that the above rewrite
system is not terminating. This can be 3xed by adopting the alternative canonical form
of Fig. 3, which consists in decomposing any monotone map f : {1; : : : ; p} → {1; : : : ; q}
264 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

··· ···
··· ···

··· ··· ···


··· ··· ···

···
··· ···

··· ··· ···


··· ···

Fig. 2. The seven cases of Lemma 4.

···
··· ···
is void or or
··· ··· ··· ···
···
is ···
···
··· ··· ··· ···
is void or or
··· ··· ···

Fig. 3. Alternative canonical form of M.

Fig. 4. Alternative rules for M.

into a monotone surjection g : {1; : : : ; p} → {1; : : : ; n} followed by a monotone injection


h : {1; : : : ; n} → {1; : : : ; q}, and the terminating rewrite system of Fig. 4. By the way,
we get:

• a presentation of the monoidal subcategory Msurj of M whose morphisms are mono-


tone surjections by one generator  and the relation  ◦ ( | id 1 ) =  ◦ (id 1 | );
• a presentation of the monoidal subcategory Minj of M whose morphisms are mono-
tone injections by one generator  and no relation.

2.3. Maps

Any map f : {1; : : : ; p} → {1; : : : ; q} can be decomposed into a permutation g :


{1; : : : ; p} → {1; : : : ; p} followed by a monotone map h : {1; : : : ; p} → {1; : : : ; q}. This
decomposition is not unique, but it shows that the monoidal category F is generated
by , , and :
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 265

= = = =

= = =

Fig. 5. Relations for F.

Fig. 6. Rules for F.

These generators satisfy the relations of Fig. 5, which consist of: the two relations
for S; the 3rst two relations for M; three extra relations ◦( | id 1 )=(id 1 | )◦( | id 1 )◦
(id 1 | ), ◦( | id 1 )=id 1 | , and ◦=. Note that the third relation for M is derivable:
see Fig. 7.

Theorem 3. The generators , ,  and the seven relations of Fig. 5 form a presen-
tation of F.

To show this, we introduce the following notion of canonical form:

···
··· ···
is ··· or
···
··· ···

It is easy to see that any map is represented by a unique canonical form. Now
we introduce the rules of Fig. 6, which are derivable from the above relations: see
Fig. 7. To show that any identity diagram reduces to a canonical form, we need a
slightly more general result:

Lemma 5. The diagram  | · · · |  | id p reduces to a canonical form.


266 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

= = = = = = = =

= = = = =

Fig. 7. Deriving rules for F.

···
···
··· ···
is void or ··· or
··· ···
··· ··· ···
··· ···
is ···
···
··· ··· ··· ···
is void or or
··· ··· ···

Fig. 8. Alternative canonical form for F.

This is proved by induction on p, using the two reversible rules:

···
··· ···
··· ··· ··· ···

··· ··· ··· ··· ···

Theorem 3 follows from the fact that any diagram reduces to a canonical form by the
rules of Fig. 6. In fact, it is also possible to show that our presentation is minimal:
see [8].
Again, the rewrite system of Fig. 6 is not terminating, but we can adopt the alterna-
tive canonical form of Fig. 8, which consists in decomposing any map f : {1; : : : ; p} →
{1; : : : ; q} into a surjection g : {1; : : : ; p} → {1; : : : ; n} followed by a monotone injection
h : {1; : : : ; n}→{1; : : : ; q}, and the terminating rewrite system of Fig. 9: see Appendix A.
By the way, we get:

• a presentation of the monoidal subcategory Fsurj of F whose morphisms are surjec-


tions by , , and the 3ve relations of Fig. 5 which do not involve ;
• a presentation of the monoidal subcategory Finj of F whose morphisms are injections
by , , and the three relations of Fig. 5 which do not involve .
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 267

Fig. 9. Alternative rules for F.

2.4. Even permutations

Finally, we consider the monoidal subcategory A of S whose morphisms are even


permutations. An even permutation is a product of an even number of transpositions.
The simplest one is a cyclic permutation of order 3. So we introduce a generator
! : 3 → 3, which is pictured and de3ned as follows:

Obviously, ! satis3es the following relations:

= = =

Theorem 4. The generator ! and the above three relations form a presentation of A.

Note that the second relation can be replaced by the following one:

If we restrict this presentation of the monoidal category A to even permutations


of {1; : : : ; n}, we get a presentation of the alternating group An by the generators
268 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

!1 ; : : : ; !n−2 and the following relations:


!i3 = 1; (!i !i+1 )2 = 1; !i !i+2 !i = !i+1 !i !i+2 ;

!i !j = !j !i for j ¿ i + 2:
To show Theorem 4, we introduce the following notion of stairs:

···
···
is or
···
···

Canonical forms are de3ned as follows:

···
···
··· ···
is void or or ··· or
···
··· ···
···

Lemma 6. Any even permutation f of {1; : : : ; n} is represented by a unique canonical


form.

This is proved by induction on n:

• If n 6 2, then f is an identity which is represented by the canonical form id n .


• If n ¿ 2 and f(1) ¡ n, let p = f(1) and h = g−1 ◦ f where g is the even permutation
of {1; : : : ; n} de3ned by g(1) = p, g(2) = p + 1, g(i) = i − 2 for 3 6 i 6 p + 1, and
g(i) = i for i ¿ p + 1. Clearly, h(1) = 1 so that h is of the form 1 f where f
is an even permutation of {1; : : : ; n − 1}. So we get a canonical form of the third
type: the size of the stairs is p − 1 and the remaining part is given by the induction
hypothesis.
• Similarly, if n ¿ 2 and f(1) = n, we get a canonical form of the fourth type.

We introduce the rules of Fig. 10, which are derivable from the above relations: see
Fig. 11.

Lemma 7. Using the ?rst rule of Fig. 10, we get the following reduction (for some
diagram ):

··· ···

···
··· ···

This is proved by induction on the size of the stairs. Using this, one proves:
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 269

Fig. 10. Rules for A.

= = = = = = =

= = = =

= = = =

= = = = =

Fig. 11. Deriving rules for A.


270 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Lemma 8. Any diagram  : n → n reduces to a canonical form ˆ by the rules of


Fig. 10.

Theorem 4 follows from Lemmas 6 and 8.

3. The linear case

We consider the monoidal category L(K) of 3nite dimensional vector spaces K n


over a 3eld K, with direct sum. A linear map f : K p → K q is represented by its
matrix, with q rows and p columns. Vertical composition corresponds to the product
of matrices, and horizontal composition to the direct sum:
 
A 0
A⊕B= where 0 stands for a block of 0:
0 B

We write e1 ; : : : ; en for the canonical basis of K n . There are two major symmetries of
L(K):

• transposition (or duality), which corresponds to a symmetry with respect to the


diagonal of the matrix. Note that transposition reverts the order of vertical compo-
sition;
• conjugacy, which corresponds to a central symmetry of the matrix. We call it so
because the conjugate of a linear permutation f : K n → K n is g ◦ f ◦ g−1 = g ◦ f ◦ g
where g : K n → K n is the linear involution de3ned by g(ei ) = en+1−i , or equivalently,
by g(x1 ; : : : ; x n ) = (x n ; : : : ; x1 ). Note that conjugacy reverts the order of horizontal
composition.

For any map f : {1; : : : ; p} → {1; : : : ; q} in F, we de3ne two dual linear maps:

• f∗ : K p → K q such that f∗ (ei ) = ef(i) ;


• f∗ : K q → K p such that f∗ (x1 ; : : : ; xq ) = (xf(1) ; : : : ; xf(p) ).

So we get two natural embeddings of F into L(K): a covariant one and a contravariant
one.
We start with the 3eld K = Z2 = {0; 1} of integers modulo 2. It is indeed a 3rst step
towards an algebraic theory of Boolean circuits. We introduce 3ve generators  : 2 → 2,
! : 1 → 2, " : 1 → 0,  : 2 → 1, and  : 0 → 1, which are pictured and interpreted as
follows:

x y x x x y

y x x x x+ y 0
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 271

transpose conjugate

transpose
conjugate conjugate

transpose
conjugate conjugate

Fig. 12. Symmetries of the generators for L(Z2 ).

= =

= =

= =

= = =

= = =

= = =

Fig. 13. Relations for L(Z2 ).

This means that the matrices for , !, and  are the following:
   
0 1 1
(1 1)
1 0 1
Note that each generator is its own conjugate and the transpose of another
generator: see Fig. 12. These generators satisfy the relations of Fig. 13, which consist
of: the two relations for S, which are self-dual; the 3ve other relations for F, corres-
ponding to the covariant embedding of F into L(Z2 ); the 3ve dual relations,
corresponding to the contravariant embedding of F into L(Z2 ); the four relations
272 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

! ◦  = ( | ) ◦ (id 1 |  | id 1 ) ◦ (! | !), ! ◦  =  | , " ◦  = " | ", and " ◦  = id 0 ; one


extra relation  ◦ ! =  ◦ ", which is speci3c to Z2 . Note that four of these relations
correspond to the following axioms:
(x + y) + z = x + (y + z); 0 + x = x; x + y = y + x; x + x = 0:
Those axioms de3ne the theory of vector spaces over Z2 . Therefore, any map f : Zn2 →
Z2 is represented by a term with n variables x1 ; : : : ; x n , and two such terms represent
the same map if and only if they are equivalent modulo those axioms. Following [1,3],
we get:

Theorem 5. The generators , !, ", ,  and the relations of Fig. 13 form a presen-
tation of L(Z2 ).

We shall give an independent proof of this theorem in Section 3.2.


Note that  is a super<uous generator, since it is de3nable in terms of ! and :

However, removing  would seriously complicate the presentation.

3.1. Linear permutations

Let GL(K) be the monoidal subcategory of L(K) whose morphisms are linear per-
mutations. In this case, there is an extra symmetry, inversion, which reverts the order
of vertical composition.
Note that any  : 2 → 2 de3nes elementary operations on matrices:

• Multiplying : p → q by id i−1 |  | id q−i−1 on the left corresponds to an elementary


operation on rows i and i + 1 of the matrix. In that case, we say that we apply 
to rows i and i + 1.
• Multiplying : p → q by id j−1 |  | id p−j−1 on the right corresponds to an elementary
operation on columns j and j + 1 of the matrix. In that case, we say that we apply
 to columns j and j + 1.

Again, we consider the case of Z2 . Apart from id 2 and , there are four linear permu-
tations of Z22 :

x y x y x y x y

x x+y x+ y y x+ y x y x+ y
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 273

conjugate

transpose inverse

conjugate
inverse inverse
transpose

conjugate
transpose transpose
inverse

Fig. 14. Symmetries of the generators for GL(Z2 ).

= = =

= = =

Fig. 15. Relations for GL(Z2 ).

The corresponding matrices are the following:


       
1 0 1 1 1 1 0 1
1 1 0 1 1 0 1 1
The symmetries are given in Fig. 14. Of course, each of them is de3nable in terms of
, !, and :

= = = =

But ! and  are not permutations. In fact, GL(Z2 ) is generated by  and any of the
four above generators, for instance the third one, that we call $. The other ones are
indeed superMuous:

= = =

Theorem 6. The generators , $, and the six relations of Fig. 15 form a presentation
of GL(Z2 ).
274 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

To show this, we need an extended notion of stairs:

··· ···
···
is or or
···
··· ···

Of course, there is a dual notion of antistairs. We consider a 3rst notion of canonical


form:

··· ···
···
···
is void or
··· ···

···

It is obtained by the following algorithm, which applies to any invertible matrix A of


order n:

1. Consider the last row of A, and let j be the last index for which the coeNcient is 1.
2. While j ¿ 1, apply  or $−1 to columns j−1 and j, so that this index becomes j−1.
3. By construction, the last row is now (1 0 · · · 0). So, if we consider the 3rst column,
n is the last index i for which the coeNcient is 1.
4. While i ¿ 1, apply  or $−1 to rows i − 1 and i, so that this index becomes i − 1,
and row i − 1 becomes (1 0 · · · 0).

To sum up, we have made the following transformations:


   
∗ ··· ∗ ∗ ∗ ··· ∗ ∗ ∗ ··· ∗
   
 .. .. .. .. ..   .. .. .. 
. . . . .  .
 → . . 
   
∗ ··· ∗ ∗ ∗ ··· ∗  ∗
  ∗ ∗ ··· 
∗ ··· ∗ 1 0 ··· 0 1 0 ··· 0
 
1 0 ··· 0
 
0 ∗ ··· ∗
 
→  .. ..

.. 
. . .
 
0 ∗ ··· ∗
 
In particular, we get a matrix of the form 1 ⊕ A , where A is an invertible matrix of
order n − 1. The antistairs are given by step 2, the stairs by step 4, and the rest of the
canonical form is obtained by applying the algorithm to the matrix A . See Fig. 16 for
an example.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 275

1 1 1
1 0 0
1 0 1
0 1 1 1
0 0 1 0
1 0 0 1 1 1 1
1 0 1 0 1 0 0 0 1 1 0
1 1 0 1 0 0 1

0 1 1 1
0 1 0 0 1 0 1 1 0 1 1 0 0
1 0 0 1 0 1 0 1 0 0 0 0 1
1 1 0 0 1 0 0 0 1 0 0 1 0

1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0
1 1 0 0 1 1 0 0 1 0 0 0 0 1 1 1
0 1 0 1 1 0 0 0 0 1 0 0 0 1 0 0
1 0 0 0 0 1 0 1 0 1 0 1 0 1 0 1

Fig. 16. Computing the 3rst canonical form of a matrix in GL(Z2 ).

As a by-product, we get a simple algorithm for inverting matrices: see Appendix B.


It is easy to see that this canonical form is unique, but it is not suitable for our
purpose, because the stairs and the antistairs are far away. For that reason, we shall
use an alternative notion of canonical form:

···

···
···
is void or
···
···
··· ···

Lemma 9. Any linear permutation f : K n → K n is represented by a unique canonical


form.

This is proved by induction on n, using the following algorithm, which applies to


any invertible matrix A of order n:

1. The matrix obtained by forgetting the 3rst column of A is of rank n − 1. Since 1


is the unique invertible element of Z2 , there is a unique non-trivial linear relation
a1 u1 + · · · + an un = 0, where u1 ; : : : ; un are the rows of this truncated matrix. Let i
be the 3rst index such that ai = 1.
276 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

0 1 1 1 0 0 1 1 1 0 0 1 1 1 0 0 1 1 1 0 1 1 1 1 0 0 0
0 0 1 0 1 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 0 0 0 1 1 1
1 0 0 1 0 0 0 1 0 1 1 0 1 0 0 1 0 0 0 0 0 0 1 0 0 0 1
1 0 1 0 1 1 0 1 0 1 1 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0

1 1 1 1 0 0 1 0 0 0 1 0 0 0 1 1 0 0
0 0 1 1 1 1 0 1 0 1 0 0 1 0 0 0 0 1
0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 0 1 0

0 1 0 1 0
1 0 1 0 1

Fig. 17. Computing the second canonical form of a matrix in GL(Z2 ).

2. While i ¡ n, apply  or $−1 to rows i and i + 1 of A, so that this index becomes


i + 1.
3. By construction, the last row is now (1 0 · · · 0).
4. Proceed as in the previous algorithm.

To sum up, we have made the following transformations:


   
  ∗ ∗ ··· ∗ 0 1 0 ··· 0
∗ ∗ ··· ∗ 0   
    0 ∗ ··· ∗
 .. .. ..  ..    
. . . .    
     
     
∗ ∗ ··· ∗ 0    
  .. .. ..  ..  
  . . . .  
∗ ∗ ··· ∗ 1 → 
  → 
    .. .. .. 
    . . .
∗ ∗ ··· ∗ ∗    
    
     
 .. .. ..  ..    
. . 
. .    
 ∗ ∗ ··· ∗ 0  
   
∗ ∗ ··· ∗ ∗
1 0 ··· 0 1 0 ∗ ··· ∗

The extra column on the right contains a1 ; : : : ; an . Again, we get a matrix of the form
1 ⊕ A . This A is obtained by removing the 3rst column and one row of the original
matrix. See Fig. 17 for an example.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 277

Fig. 18. Rules for GL(Z2 ).

= = = = = =

= = = = = = =

Fig. 19. Deriving rules for GL(Z2 ).

In Fig. 18, we introduce two groups of rules for the following transformations:

or

Those 14 rules are derivable from the six relations of Fig. 15. Indeed, 3ve rules are
already in the presentation, 3ve more are derived in Fig. 19, and we get three more
by duality. It remains to show that the last rule of Fig. 18 is derivable from the
presentation. This is done in Fig. 20, using the superMuous generator $2 , which is both
the inverse and the conjugate of $:

=
278 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

= = = = = = = = =

= = = = = = =

= = = = = = = = =

Fig. 20. Deriving the last rule for GL(Z2 ).

Lemma 10. For any diagram , we have the following commutations:

··· ··· ··· ···


 
··· ··· ··· ···
 
··· ··· ··· ···
This is easily proved by induction on the size m of , using the second group
of rules. Of course, the stairs (respectively the antistairs) may be changed by this
commutation.

Lemma 11. Any diagram  : n → n reduces to a canonical form ˆ by the rules of


Fig. 18.

This is proved by double induction on n and the size m of :

• If m=0, then =id n , which reduces to a canonical form. This is proved by induction
on n, using the 3rst rule:
··· ···
···
··· ···
···
··· ···

• If m ¿ 1, then  =  ◦ where  is an elementary diagram and is a diagram of


size m − 1 which reduces to a canonical form ˆ by induction hypothesis. Therefore,
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 279

···
···
···
···

···
···
··· ···
··· ··· ···

···

···
···
···

··· ···

··· ···

··· ··· ···

Fig. 21. The four cases of Lemma 11.

 reduces to  ◦ ˆ and there are four possible cases (Fig. 21): in the 3rst case, we
use the second group of rules and the induction hypothesis for n − 1; in the second
case, we get a canonical form; in the third case, we use the crucial transformation of
Fig. 22, which itself uses Lemma 10 and the 3rst group of rules, and the induction
hypothesis for n − 1; in the fourth case, we use the second group of rules twice and
the induction hypothesis for n − 1.

Theorem 6 follows from Lemmas 9 and 11.


Note that the rewrite system of Fig. 18 is not terminating. It is easy to give an
alternative system such that identity diagrams are in canonical form, but the existence
of a terminating rewrite system for GL(Z2 ) is an open question. Indeed, it is essential
that the rules of the second group are used in both directions: one for stairs and one
for antistairs. Furthermore, the fact that we need both stairs and antistairs does not
rely on our choice of generators. Indeed, even if we take all linear permutations of
Z22 as generators, there are linear permutations of Z32 which cannot be decomposed as
follows:
280 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

··· ··· ··· ··· ···


··· ··· ···
···
··· ··· ···
··· ···
···
···
···
···
··· ··· ··· ··· ···

··· ··· ··· ···


··· ···
··· ···

··· ··· ··· ···


···
··· ··· ···
···
···
··· ··· ··· ···

···

··· ··· ···


···
··· ··· ···
···
··· ··· ···

··· ···
···
··· ··· ···

Fig. 22. Crucial transformation for the third case of Lemma 11.

In other words, there are invertible matrices of order 3 which are not of the form
(1 ⊕ A)(B ⊕ 1)(1 ⊕ C). Here is an example:
 
1 1 0
 
1 0 1
0 1 0
Finally, note that  is almost a superMuous generator, since  | id 1 and id 1 |  are de3n-
able in terms of $:

= =
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 281

1 0 1 1
1 0 0 0
1 1 0 1

Fig. 23. The canonical forms of a matrix in L(Z2 ).

This means that  is only necessary in dimension 2, but again, removing it would
seriously complicate the presentation.

3.2. Linear maps

In order to extend our presentation of GL(Z2 ) to L(Z2 ), the generators " and  are
clearly needed, but ! and  are superMuous, since they are de3nable in terms of $, ",
and :

= =

Obviously, $, ", and  satisfy the following relations:

= = =

Theorem 7. The generators , $, ", , and the six relations of Fig. 15 together with
the above three ones form a presentation of L(Z2 ).

To show this, we use the following notion of canonical form:

···
··· ···
is ··· or
···
···

It is a straightforward transcription of the matrix: the stairs correspond to the 3rst


column of the matrix, and within stairs,  stands for 0 and $ for 1. See Fig. 23 for an
example.
282 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Fig. 24. Rules for L(Z2 ).

= = = = = = = = =

= =

Fig. 25. Deriving rules for L(Z2 ).

We introduce the rules of Fig. 24, which are derivable from our presentation: see
Fig. 25. To show that any identity diagram reduces to a canonical form, an analogue
of Lemma 5 is needed: see Fig. 26. Theorem 7 follows from the fact that any diagram
reduces to a canonical form by the rules of Fig. 24.
We get Theorem 5 as a corollary. Indeed, we have de3ned a translation F of dia-
grams built with , $, ",  into diagrams built with , !, ", , , and a translation G
in the opposite direction. By applying F to the nine relations of Theorem 7, we get
relations which are derivable from those of Fig. 13. Furthermore, the following two
relations are also derivable from those of Fig. 13:

= =
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 283

··· ···
··· ···
···
··· ···

··· ··· ··· ··· ··· ···

Fig. 26. Expansion of identities for L(Z2 ).

··· ··· ···


···
is or or or
···
··· ··· ···

···
···
··· ··· ···
is void or ··· or or
··· ··· ···
··· ··· ···
··· ···
is ···
···
··· ··· ··· ···
is void or or
··· ··· ···

Fig. 27. Alternative canonical form for L(Z2 ).

This implies that for any diagram  built with , !, ", , , we have  ≡ F(G())
modulo the relations of Fig. 13. Therefore, if  and represent the same linear map, we
have G() ≡ G( ) modulo the nine relations of Theorem 7, so that  ≡ F(G()) ≡
F(G( )) ≡ modulo the relations of Fig. 13.
Again, the rewrite system of Fig. 24 is not terminating, but we can adopt the
alternative canonical form of Fig. 27, which uses the two superMuous generators !
and , and the rewrite system of Fig. 28. We conjecture that this rewrite system
is terminating: see Appendix A. The upper part of this canonical form is obtained
by the following algorithm, which applies to any matrix A without zero
row:

1. If the 3rst column is zero, remove it. Otherwise, let i be the last index for which
the coeNcient of the 3rst column is 1.
2. If row i is not of the form (1 0 · · · 0), replace this 1 by 0 and insert the row
(1 0 · · · 0) between rows i − 1 and i.
3. While i ¿ 1, apply  or $−1 to rows i − 1 and i, or in case row i − 1 is of the form
(1 0 · · · 0), remove it, so that in all cases, this index becomes i − 1 and row i − 1
becomes (1 0 · · · 0).
284 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Fig. 28. Alternative rules for L(Z2 ).

To sum up, we have made the following transformations:


     
∗ ∗ ··· ∗ ∗ ∗ ··· ∗ 1 0 ··· 0
.  ∗
. .. .. 
. .
. . .. 
 0 ∗ ··· 
. . . . . .  
     
∗  
 ∗ ··· ∗ 
∗ ∗ ··· ∗
   
     
1 ∗ ··· ∗ → 1 0 ··· 0 →   .. ..

.. 
    . . .
0 ∗ ··· ∗ 0 ∗ ··· ∗  
     
. .. 
..   . . .   
. . . ..   
. . . . .   
0 ∗ ··· ∗ 0 ∗ ··· ∗ 0 ∗ ··· ∗
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 285

In particular, we get a matrix of the form 1 ⊕ A , and by construction, A has no zero


row. The  cell (if any) is given by step 2, the (generalized) stairs by step 3, and the
rest of the canonical form is obtained by applying the algorithm to the matrix A . See
Fig. 23 for an example.
Note that the rewrite system of Fig. 28 extends the one of Fig. 9. Furthermore, it
is self-dual, so that the canonical form of the dual is always the dual of the canonical
form. This may not be clear from the grammar of Fig. 27, but remember that we have
an implicit commutation rule.
Note also that the canonical form of a linear permutation may contain the generators
! and , which are not permutations, as in the following example:

Instead, we can generalize the 3rst canonical form of linear permutations as follows:

··· ···
···
··· ···
is ··· or or
··· ··· ···

···
This canonical form is obtained by the same algorithm as in the case of linear per-
mutations, except that the last row may be zero, and one may end with a degenerate
matrix. See Fig. 23 for an example. This algorithm can also be used to compute the
rank of a matrix. Note the following points:

• The canonical form of a linear permutation contains only  and $.


• The canonical form of a linear surjection contains only , $, and ".
• The canonical form of a linear injection contains only , $, and .

In particular, the monoidal subcategory Lsurj (Z2 ) of L(Z2 ) whose morphisms are linear
surjections is generated by , $, and ". We have already seen that these generators
satisfy the following relations:

= =

Theorem 8. The generators , $, ", and the six relations of Fig. 15 together with the
above two ones form a presentation of Lsurj (Z2 ).

By duality, we get a presentation of the monoidal subcategory Linj (Z2 ) of L(Z2 )


whose morphisms are linear injections by , $, , and the six relations of Fig. 15
together with the dual of the above ones.
286 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

1 0 1 1
1 0 0 0
1 1 0 1

Fig. 29. The canonical form of a matrix in Lsurj (Z2 ).

Fig. 30. Extra rules for Lsurj (Z2 ).

To show Theorem 8, we consider the following canonical form of linear surjections,


which generalizes the second canonical form of linear permutations:

···
···
···
··· ···
is void or or
···
··· ···
··· ···

It is obtained by the following algorithm, which applies to any matrix A with q inde-
pendent rows:

1. The matrix obtained by forgetting the 3rst column of A is of rank q − 1 or q.


2. If the rank is q, remove this 3rst column. Otherwise, there is a unique non-trivial
linear relation a1 u1 + · · · + an un = 0, where u1 ; : : : ; un are the rows of this truncated
matrix.
3. Proceed as in the case of linear permutations.

We get a canonical form of the second type if the rank is q − 1, or of the third type if
the rank is q, and in that case, the stairs corresponds to the 3rst column of the matrix.
See Fig. 29 for an example.
In Fig. 30, we introduce rules for the following transformations:

or

Those rules are derivable from the six relations of Fig. 15 together with the above two
ones: see Fig. 31.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 287

= = = = = = = =

Fig. 31. Deriving rules for Lsurj (Z2 ).

··· ··· ··· ··· ··· ··· ··· ···

··· ···
···
··· ··· ··· ··· ··· ··· ··· ···
···
···

··· ··· ··· ··· ··· ··· ··· ···

··· ··· ··· ··· ··· ···


···
··· ···
··· ··· ··· ···
··· ···
··· ···
···
··· ··· ··· ··· ··· ···
··· ···

··· ··· ··· ···


··· ···
···
··· ··· ··· ···

··· ··· ··· ···

Fig. 32. Crucial transformation for Lsurj (Z2 ).

Theorem 8 follows from the fact that any diagram reduces to a canonical
form by the rules of Fig. 18 together with those of Fig. 30. To show this, we
proceed as in the case of linear permutations, using the crucial transformation of
Fig. 32.
The canonical form of linear surjections can be generalized to linear maps: see
Fig. 33. The bottom part of this canonical form is obtained by the following
algorithm, which takes any system u1 ; : : : ; uq and returns a free subsystem of the
288 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

···
···
···
··· ···
is void or or
···
···
··· ···
··· ··· ···
is ···
···
··· ···
··· ···
is void or or
··· ··· ···
···

Fig. 33. Another canonical form for L(Z2 ).

same rank:

1. Apply the algorithm to u2 ; : : : ; uq : it returns a free subsystem v1 ; : : : ; vn .


2. If u1 is independent of v1 ; : : : ; vn , return u1 ; v1 ; : : : ; vn . Otherwise, return v1 ; : : : ; vn .

This algorithm is applied to the rows of the matrix. One gets a canonical form of the
second type if u1 is independent of v1 ; : : : ; vn , or of the third type if u1 =a1 v1 +· · ·+an vn ,
and in that case, the antistairs are given by the coeNcients a1 ; : : : ; an . In both cases, the
rest of the canonical form is given by step 1. Finally, the algorithm returns a matrix
with independent rows, corresponding to a linear surjection, from which one gets the
upper part of the canonical form. See Fig. 35 for an example.
The canonical form of Fig. 33 corresponds to the unique decomposition of any linear
map f : Zp2 → Zq2 into a linear surjection g : Zp2 → Zn2 followed by a monotone linear
injection h : Zn2 → Zq2 , where n is the rank of f. Here, we assume that Zn2 is equipped
with the following antilexicographical ordering:

(0; x2 ; : : : ; x n ) ¡ (1; x2 ; : : : ; x n );

(x1 ; : : : ; x n ) ¡ (y1 ; : : : ; yn ) whenever (x2 ; : : : ; x n ) ¡ (y2 ; : : : ; yn ):

It is indeed easy to see that the bottom part of a canonical form corresponds to a mono-
tone linear injection. The converse is proved by induction on q, using the following
lemma:

Lemma 12. Let A be the matrix of a monotone linear injection f : Zp2 → Zq2 and let
B be the matrix obtained by removing the ?rst row of A. Then B is the matrix of
a monotone linear injection or A is of the form 1 ⊕ C where C is the matrix of a
monotone linear injection.

By de3nition of the ordering, B is indeed the matrix of a monotone linear map


g : Zp2 → Z2q−1 . If g is not injective, then g(u) = 0 for some u = 0 in Zp2 . Since f is
injective, f(u)=e1 , which is the smallest element after 0 in Zq2 . Since f is a monotone
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 289

injection, u = e1 . Now, if j ¿ 1, then ej ¡ e1 + ej and f(ej ) ¡ f(e1 + ej ) = f(e1 ) +


f(ej ) = e1 + f(ej ), so that the 3rst component of f(ej ) must be 0. Therefore, A is
of the form 1 ⊕ C, and it is easy to check that C is the matrix of a monotone linear
injection.
Monotone linear injections form a monoidal subcategory of Linj (Z2 ) which
is not 3nitely generated. In fact, it is generated by all maps of the form f(x1 ; : : : ; x n ) =
(a1 x1 + · · · + an x n ; x1 ; : : : ; x n ), which are represented by diagrams of the following
form:

···

···

Note also that if we apply the above decomposition to a linear injection, we get a
linear permutation followed by a monotone linear injection. This means that monotone
linear injections provide a canonical choice of basis for subspaces of Zn2 .
There is a dual notion of comonotone linear surjection. Any linear map can be
uniquely decomposed into a comonotone linear surjection followed by a linear injection.
Again, if we apply this decomposition to a linear surjection, we get a comonotone linear
surjection followed by a linear permutation. In fact, the comonotone linear surjections
coincide with the conjugate of linear surjections whose matrices are in row-reduced
echelon form. This row-reduced echelon form is just what we get when we apply the
Gauss algorithm to solve a linear system.
Finally, any linear map can be uniquely decomposed into a comonotone linear
surjection followed by a linear permutation followed by a monotone linear injection.

···
··· ··· ···
is void or or
··· ···
···

···
···
···
··· ··· ···
is is void or
··· ··· ···
···
···
··· ···

···
··· ···
is void or or
··· ··· ···
···

Fig. 34. Yet another canonical form for L(Z2 ).


290 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

0 1 1 0
1 0 1 1
0 0 0 0
1 0 0 0
1 1 0 1

Fig. 35. Other canonical forms of a matrix in L(Z2 ).

This decomposition corresponds to the canonical form of Fig. 34. See Fig. 35 for an
example.

3.3. Arbitrary ?eld

The results of the previous sections can be generalized to an arbitrary 3eld K. First
we introduce a generator Ha : 1 → 1 for each a ∈ K. It is pictured and interpreted as
follows:

x
a
ax

In particular, we write + for H−1 , which is pictured and interpreted as follows:

_x

The presentation of L(K) is the one of Fig. 13, where the last relation is replaced by
the nine relations of Fig. 36. The last six relations correspond to the following axioms
for vector spaces:

a(x + y) = ax + ay; a0 = 0; a(bx) = (ab)x; 1x = x;


(a + b)x = ax + bx; 0x = 0:

Note that H0 and H1 are superMuous generators. Furthermore, in the case of a 3nite
3eld, it is well known that the multiplicative group of invertible elements is cyclic, so
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 291

a a
= =
a a
a
=
a
a a
= =
a a

a
= ab 1 = a+ b = a b 0 =
b

Fig. 36. Extra relations for L(K).

that the Ha for a = 0 are de3nable in terms of a single one. Note also that  is always
de3nable in terms of !, , and +:

For GL(K), we keep the Ha for a = 0, and we introduce a new generator Ka : 2 → 2


for each a ∈ K, which is pictured and interpreted as follows:
x y
a
ax + y x
In particular, we write  for K0 and $ for K1 as in the case of Z2 :

x y x y

y x x+ y x
Note that the Ka for a = 0 are de3nable in terms of $ and the Ha :

a 1/a
a = =
1/a a
292 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

a a b ab b
ab 1
b b ab b a

a a a+1 /b a c
b= 0
a+ b b b −1/b b b+ac
b c c+1 /b c a

Fig. 37. Rules for GL(K).

Stairs and antistairs are built with the Ka , and the second canonical form is generalized
as follows:

···

···
···
is void or
···
···
··· ···

Any diagram built with the Ha for a = 0 and the Ka reduces to such a canonical form
by the rules of Fig. 37. From this, it is possible to get a presentation of GL(K) with
, $, and the Ha for a = 0 as generators. Again, a single Ha is needed in the case of
a 3nite 3eld.

3.4. Isometries

Finally, we consider the monoidal subcategory O of GL(R) whose morphisms are


isometries. An isometry is a linear map f : Rn → Rn which preserves the Euclidean
metrics of Rn . The matrix of an isometry is called an orthogonal matrix: its columns
form an orthonormal basis, that is a system u1 ; : : : ; un such that each ui has length 1,
and ui is orthogonal to uj for j = i. Note that if all coeNcients of u1 are zero, but the
3rst one, then the matrix is of the form ±1 ⊕ A where A is an orthogonal matrix of
order n − 1.
Apart from the identity, + is the only isometry of R. The isometries of R2 are
rotations or symmetries. So we introduce a generator R : 2 → 2 for each  ∈ R, which
is pictured as follows:

cos  −sin 
It stands for the rotation of angle , whose matrix is sin  cos  .
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 293

is is or


 
is  or or or  or  or
 


Fig. 38. Canonical form for O3 .

Symmetries are de3nable in terms of the R and +. For instance,  can be decom-
posed as follows:

= 
/2

Note also that R. is de3nable in terms of +:

 =

Therefore, we shall only use R for  ∈ ]0; .[. Stairs are built with those R , and
there is a simple notion of canonical form which is similar to the canonical form of
permutations in the basic case:

··· ···
···
is void or ··· or ···
···
··· ··· ··· ···

It is obtained by the following algorithm, which applies to any orthogonal matrix A of


order n:

1. Consider the 3rst column of A, and let i be the last index for which the coeNcient
is = 0.
2. While i ¿ 1, apply R−1
 to rows i−1 and i, so that this index becomes i−1. For that
purpose, choose  such that cot  = ai−1 =ai , where aj stands for the 3rst coeNcient
of row j.

By the previous remark, we get a matrix of the form ±1⊕A where A is an orthogonal
matrix of order n−1. The type of the canonical form is given by the sign ±1, the stairs
by step 2, and the rest of the canonical form is obtained by applying the algorithm to
the matrix A .
In dimension 3, we get the canonical form of Fig. 38. The parameters ; /; 0 ∈ ]0; .[
which appear in the bottom part of this canonical form are called Euler angles. In the
294 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

+ < 

  
= = =  + =
−  −

Fig. 39. Extra relations for O.

3rst case, where three angles are actually needed, we say that the decomposition is
generic.

Lemma 13. If ; /; 0 ∈ ]0; .[, there are  ; / ; 0 ∈ ]0; .[ such that (R0 | id 1 ) ◦ (id 1 | R/ ) ◦
(R | id 1 ) is of the form (id 1 | R ) ◦ (R/ | id 1 ) ◦ (id 1 | R0 ).

 
 = 
 

The parameters  ; / ; 0 are given by the above algorithm. In this case, it happens
that no + appears in the canonical form, and the decomposition is generic. Obviously,
the generators satisfy the extra relations of Fig. 39. Using the same argument as for
Theorem 1, one proves:

Theorem 9. The generators +, R for  ∈ ]0; .[, and the relations of Lemma 13
together with those of Fig. 39 form a presentation of O.

Similarly, it is possible to get a presentation of the monoidal subcategory SO of O


whose morphisms are rotations with the R for  ∈ ]0; 2.[ as generators. All this can
be easily generalized to get a presentation of the monoidal subcategory U of GL(C)
whose morphisms are unitary maps and similarly for the monoidal subcategory SU of
U whose morphisms are special unitary maps. Using this, one gets presentations for
the groups On , SOn , Un , and SUn .

4. The classical case

We consider the monoidal category F[k] of 3nite sets Znk with cartesian product.
Again we start with the Boolean case k = 2. Since F[2] is an extension of L(Z2 ), we
have already , !, ", , and  as generators. We introduce two new ones  : 2 → 1
and  : 0 → 1, which are pictured and interpreted as follows:

x y

xy 1
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 295

= = = =

= = =

= = =

Fig. 40. Extra relations for F[2].

It is well known that any map from Zn2 to Z2 is a polynomial, and any two polynomials
de3ne the same map if and only if they are equal modulo the axiom x2 = x. Following
[1,3], we get:

Theorem 10. The generators , !, ", , ,  ,  , and the relations of Fig. 13 together
with those of Fig. 40 form a presentation of F[2].

Diagrams built with those generators can be seen as Boolean circuits: The generators
stand respectively for exchange, duplication, erasing, xor gate, false, and gate, and
true. The last six relations of Fig. 40 correspond to the following axioms for Boolean
algebras:

(xy)z = x(yz); 1x = x; xy = yx; (x + y)z = xz + yz; 0x = 0; xx = x:

Note that  is a superMuous generator:

Furthermore, four of the six relations involving  can be removed modulo this de3ni-
tion.
Theorem 10 can also be proved directly by using a suitable notion of canonical
form. Moreover, we get:

• a presentation of the monoidal subcategory Z(Z2 ) of F[2] whose morphisms are


zero-preserving maps, by removing  and all relations involving  from the pre-
sentation of F[2];
• a presentation of the monoidal subcategory A(Z2 ) of F[2] whose morphisms are
aAne maps, by removing  and all relations involving  from the presentation of
F[2].
296 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

···

···
···
is void or
···
···
···
··· ··· ···
is ···
···
···
··· ··· ···
is void or or
··· ··· ···

Fig. 41. Canonical form for GA(Z2 ).

4.1. AAne permutations

Now, we consider the monoidal subcategory GA(Z2 ) of F[2] whose morphisms are
aAne permutations. We introduce a generator 2 : 1 → 1 for negation, which is pictured
and interpreted as follows:

x +1

Of course, 2 is de3nable in terms of  and  :

It satis3es the following relations:

= = =

Theorem 11. The generators , $, 2, and the relations of Fig. 15 together with the
above three ones form a presentation of GA(Z2 ).

To show this, it suNces to notice that any aNne permutation f : Zn2 → Zn2 is of
the form h ◦ g where g is a linear permutation and h is the translation de3ned by
h(x1 ; : : : ; x n ) = (x1 + a1 ; : : : ; x n + an ), with (a1 ; : : : ; an ) = f(0; : : : ; 0). Therefore, we have
the canonical form of Fig. 41 for aNne permutations. Any diagram reduces to such a
canonical form by the rules of Fig. 18 and those of Fig. 42. The latter are derivable:
three of them are already in the presentation and the other two are derived in Fig. 43.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 297

Fig. 42. Extra rules for GA(Z2 ).

= = =

= = = = = = = = =

Fig. 43. Deriving rules for GA(Z2 ).

4.2. Classical permutations

It is easy to see that, for n 6 2, any permutation of Zn2 is aNne, but it is not the
case for n = 3. So we introduce the 3-bit ToBoli gate T3 : 3 → 3, which is pictured
and interpreted as follows:

x y z
T3
x y z + xy
This T3 is an involution: It corresponds to the transposition of Z32 which exchanges
(1; 1; 0) with (1; 1; 1). More generally, we introduce the n-bit ToBoli gate Tn : n → n
for each n ¿ 1, corresponding to the transposition of Zn2 which exchanges (1; : : : ; 1; 0)
with (1; : : : ; 1; 1). For instance, T1 is the negation 2 and T2 is the linear involution ◦$.
It happens that the monoidal subcategory S[2] of F[2] whose morphisms are per-
mutations is not ?nitely generated. This follows from the following remark:

Lemma 14. If f is a ?nite permutation, then f × id Z2 and id Z2 × f are even permu-


tations.

Indeed, for any decomposition of f into n transpositions, we get a decomposition


of f × id Z2 into 2n transpositions, and similarly for id Z2 × f.
Now, assume that we have cells 1 : p1 → p1 ; : : : ; k : pk → pk in S[2] and let
m=max(p1 ; : : : ; pk ). Then any diagram  : n → n built with those generators represents
an even permutation of Zn2 whenever n ¿ m. To show this, it suNces to consider the
case of an elementary diagram, and the lemma applies in that case. In particular, the
298 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

odd permutation Tm+1 is not de3nable in terms of 1 ; : : : ; k . Therefore, we consider


the monoidal subcategory A[2] of S[2] whose morphisms are even permutations.

Theorem 12. A[2] is contained in the monoidal subcategory of S[2] generated by ,


T1 , T2 , and T3 .

These generators represent transpositions, which are not in A[2], but we have the
following corollaries:

Corollary 1. A[2] is ?nitely generated.

Indeed, there are 3nitely many even permutations of Zn2 with n 6 3, and by the
theorem, any even permutation of Zn2 with n ¿ 4 is de3nable in terms of  | id 1 , id 1 | ,
Ti | id 1 , and id 1 | Ti for i = 1; 2; 3. In fact, three generators suNce: see [10].

Corollary 2. S[2] is generated by  and the Tn for n ¿ 1.

For any permutation f of Zn2 , it suNces apply the theorem to f if it is even, or to


Tn ◦ f if it is odd.
Theorem 12 is proved in [10], using the Fredkin gate F3 : 3 → 3 instead of T3 : It
corresponds to the transposition of Z32 which exchanges (1; 0; 1) with (1; 1; 0). This F3
is de3nable in terms of , T2 , and T3 :

T2

F3 = T3

T2

The proof is based on the fact that any even permutation can be decomposed into
3-cycles. It does not use any notion of canonical form for S[2] or A[2]. Therefore, it
is not very helpful for getting presentations of those monoidal categories. Of course,
some obvious commutations are satis3ed by the generators:

T3 T3 T3 T2 T3
= = = =
T3 T2 T3 T3 T3 T2

But it is clear that other relations are needed.


Finally, note that S[k] is not 3nitely generated whenever k is an even number, since
we have an analogue of Lemma 14. On the other hand, Peter Selinger showed that
S[k] is 3nitely generated by unary and binary gates whenever k is an odd number
(private communication).
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 299

Acknowledgements

This paper is dedicated to Albert Burroni who inspired this theory. The author wish
also to thank Serge Burckel, Julien Cassaigne, and Peter Selinger for fruitful interac-
tions.

Appendix A. Rewriting

The theory of rewriting is well established in the case of words and in the case
of terms. Following [2], we explain how it can be generalized to diagrams. Detailed
proofs will not be given here.

A.1. Rewrite rules

A rewrite system is given by a set of cells and a set of rules. Each rule of the
system is of the form 3 → 3 where 3; 3 : p → q are two diagrams built with the cells
of the system:

··· ···
 
··· ···
If such a rule is given, and if  : m → i + p + j and : i + q + j → n are any diagrams,
we write ◦ (id i | 3 | id j ) ◦  → ◦ (id i | 3 | id j ) ◦ . This is called an elementary
reduction:

··· ···
 
··· ···
···  ··· ···  ···
··· ···
 
··· ···
We write →∗ for the iterated reduction, which is the reMexive transitive closure of
→. Similarly, we write ↔∗ for the reMexive transitive closure of ↔, which is itself
the symmetric closure of →. Note that  ↔∗ when  and are equivalent modulo
the rules (considered as relations).
We say that a diagram  is reduced if there is no  such that  →  . We say that
is a reduced form of  if  →∗ and is reduced. Note that the commutation rule
does not count as a reduction. For the question of 3nding canonical decompositions,
independently of the rewrite rules, see [9].

A.2. Termination

A rewrite system is terminating (or noetherian) if there is no in3nite reduction


0 → 1 → 2 → 3 → · · · In other words, any reduction strategy terminates and
leads to a reduced form.
300 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

x y x y

x+ y x 2x + y 1

Fig. 44. Interpretation of the generators.

Consider for instance the rewrite system of Lemma 2 for S:

This system is terminating because the 3rst rule moves one cell to the right and the
second rule removes two cells. To make this argument precise, we de3ne the natural
number  for any diagram  as follows:

• If  = id i | + | id j is an elementary diagram, then  = j + 1.


• If  = 1 ◦ · · · ◦ n where 1 ; : : : ; n are elementary diagrams, then  = 1  + · · · +
n .

This de3nition does not depend on the decomposition of  because the number of inputs
of the generator + is the same as its number of outputs. Since we have  ¿  
whenever  →  , the length of any reduction starting from a diagram  is bounded
by .
The rewrite system of Fig. 9 for F is also terminating, but the previous argument
cannot be extended. Instead, we interpret any diagram  : p → q as a strictly monotonic
map [] : N∗p → N∗q , where N∗ is the set of strictly positive integers, and N∗n is
equipped with the following partial order (product order):
(x1 ; : : : ; x n ) 6 (y1 ; : : : ; yn ) whenever x1 6 y1 ; : : : ; x n 6 yn :
It suNces to give the interpretation of each generator: see Fig. 44. For any strictly
monotone maps f; g : N∗p → N∗q , we write f ¡ g if f(x1 ; : : : ; xp ) ¡ g(x1 ; : : : ; xp ) for
all (x1 ; : : : ; xp ) ∈ N∗p . This relation is compatible with horizontal and vertical compo-
sition, and we have [3] ¿ [3 ] for each rule 3 → 3 : see Fig. 45. Therefore, [] ¿ [ ]
whenever  →  . Finally, the length of any reduction starting from a diagram  is
bounded by n1 + · · · + nq where (n1 ; : : : ; nq ) is [](1; : : : ; 1).
We conjecture that the rewrite system of Fig. 28 for L(Z2 ) is also terminating, but
another method is needed to show this, since there is no way of interpreting the cell
" : 1 → 0 as a strictly monotone map.

A.3. Con<uence

Termination ensures the existence of a reduced form for any diagram, but uniqueness
is also needed to decide whether two diagrams are equivalent. The following result is
standard in rewriting theory:
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 301

x x x x x y x y

x +1 1 x 1 x +1 x 1 x 2x + y x + y x y

x x x x x y x y

x +2 x 2x +1 x 3x+2y 2x + y

x y z x y z
x y z x y z x y z x y z

x x
x+ y y 2x + y 2x + y
x+ y x+ y
3x + y+ z 2x + y+ z 2x + y+ z x + y+ z
2x + y+ z x + y+ z

x y z x y z x y z x y z
x y z x y z

x x 4x+2y+z 2x +2y+z
4x+2y+z 2x+2y+z
3x+2y+z x+2y+z

Fig. 45. Termination for F.

Lemma 15. For a terminating rewrite system, the following properties are equivalent:

1. If  →∗ and  →∗  where and  are reduced, then =  (uniqueness of


the reduced form);
2. If  ↔∗  , then there exists such that  →∗ and  →∗ (Church-Rosser
property);
3. If  →∗  and  →∗  , then there exists such that  →∗ and  →∗
(con<uence);
4. If  →  and  →  , then there exists such that  →∗ and  →∗
(local con<uence).

 
  *
* * * *
   
* * *  *
 = 
*  * *  *
Indeed, it is easy to show that each item implies the next one, and the last one implies
the 3rst one by noetherian induction. Such a rewrite system is called canonical. In the
302 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

··· ···

 '
··· ···

*
··· ···
···
 ' 
···
··· ···
*

··· ···
 '

··· ···

Fig. 46. Proving the conMuence of a global conMict by noetherian induction.

case of words or terms, it suNces to check local conMuence for a 3nite number of
conMicts between rules called critical peaks.
In the rewrite system of Lemma 2 for S, there are four obvious conMicts:

Each of the above diagrams contains two instances of the left member of a rule, and
those instances have a common cell. However, this list is not complete, and indeed,
there was a gap in [2]. Because of the commutation rule, the general form of the last
conMict is the following:

···

···

We call this a global con<ict. Fortunately, its conMuence can be proved by noetherian
induction on the diagram : see Fig. 46. Hence, it suNces to consider the case where
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 303

 is reduced. By induction on the size, it is easy to see that such a diagram is of one
of the following two types:

···
···
or ···
···
···

Finally, it suNces to consider one extra conMict, corresponding to the case where  is
of the second type:

To sum up, there are 3ve critical peaks and all of them are conMuent: see Fig. 47.
Therefore, our system is canonical. In fact, the reduced forms are the canonical forms
of Section 2.1, so that conMuence also follows from Lemmas 1 and 2.
The rewrite system of Fig. 4 for M is also canonical. In this case, there is no global
conMict and the 3ve critical peaks are conMuent: see Fig. 48. In fact, this system can
be identi3ed with the well-know term rewrite system for the theory of monoids:
(xy)z → x(yz); 1x → x; x1 → x:
In the rewrite system of Fig. 9 for F, there are six global conMicts: see Fig. 49. Again,
it suNces to consider the case where  is reduced, and such a diagram is of one of
the following four types:

···
···
··· ···
or ··· or or
··· ··· ···
···

Furthermore, if  is of the fourth type, we get a reducible con<ict. This means that a
third rule applies, and the conMuence of this conMict can be deduced from the conMuence
of a smaller conMict: see Fig. 50. Finally, the global conMicts lead to 6 × 3 = 18 critical
peaks, and all together, there are 68 critical peaks: see Fig. 51. The conMuence can be
checked case by case, but it also follows from Section 2.3.
In our examples, the study of critical peaks is not the only way to prove conMuence,
but the notion is interesting anyway:

• In [11,12], critical peaks are used to compute homological invariants of a monoid.


See also [5,4] for an introduction. This should be extended to monoidal categories.
304 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Fig. 47. ConMuence of the 3ve critical peaks for S.

• In [7], the critical peaks of Fig. 48 are used to prove the coherence theorem for
(nonstrict) monoidal categories. Similarly, the canonical system for F can be used
to prove the coherence theorem for symmetric monoidal categories.

A.4. Terms versus diagrams

Any 3rst-order equational theory with n function symbols and r equations corre-
sponds to a presentation by n + 3 generators and r + 3n + 7 relations. This presentation
consists of:

• one generator  : m → 1 for each function symbol of arity m, and the 3 generators
 : 2 → 2, ! : 1 → 2, and " : 1 → 0;
• one relation for each equation, 3 relations for each function symbol (see Fig. 52),
and the dual of the 7 relations for F.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 305

Fig. 48. ConMuence of the 3ve critical peaks for M.

··· ···
···
 

··· ··· ···

··· ···
···
 

··· ··· ···

Fig. 49. The six global conMicts for F.

For instance, the theory of Boolean algebras with 4 function symbols and 10 equa-
tions corresponds to the presentation of Theorem 10 for F[2] with 7 generators and 29
relations. This idea comes from [1]. It is based on Lawvere’s interpretation of algebraic
theories by means of Cartesian categories: see [6].
There is a similar correspondence for rewrite systems: Any left linear canonical
term rewrite system with n function symbols, r rules, and p critical peaks corresponds
to a canonical diagram rewrite system with n + 3 generators, r + 4n + 12 rules, and
p + 4r + n2 + 14n + 68 critical peaks. In addition to the r original rules, we have
4 extra rules for each function symbol (see Fig. 53) and the dual of the 12 rules
for F.
Left linearity is a strong restriction: It means that variables occur once in the left
member of each rule. For instance, x(y + z) → xy + xz is left linear, but not x + x → 0.
Here is the crucial observation: the left member of such a rule corresponds to a diagram
306 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Fig. 50. ConMuence of a reducible conMict.

(in fact a tree) with no , !, or ", and there is no critical peak between the original
rules and those coming from the rules for F. Furthermore, one can check that all new
global conMicts are reducible. Therefore, it suNces to consider the 5 types of critical
peaks between the 3 types of rules (see Fig. 54).
This proliferation of rules and critical peaks is the price to pay for a decomposition
of equational reasoning into more elementary steps. However, we may 3nd canonical
systems which are not of the above form:

• If our conjecture about the termination of the rewrite system of Fig. 28 holds, then
we get a canonical system for L(Z2 ), whereas there is no canonical term rewrite
system for the theory of vector spaces over Z2 , simply because the commutativity
x + y = y + x cannot be oriented. This problem is usually handled by introducing
rewriting modulo associativity and commutativity, but we claim that our approach
is less ad hoc.
• There are useful algebraic structures, such as braids, tangles, and Hopf algebras,
which are naturally expressed with diagrams, but not with terms. Unfortunately,
we have no interesting example of canonical system of this kind. For instance, the
existence of a 3nite canonical rewrite system for the monoidal category of braids is
an open question.

Appendix B. Inverting matrices

Knowing a decomposition of an invertible matrix into elementary ones, it is easy to


compute its inverse. Therefore, any notion of canonical form for GL(K) should give
an inversion algorithm for matrices.
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 307

Fig. 51. The 68 critical peaks for F.


308 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

= = =

= = =

= = =

Fig. 52. Relations for function symbols of arity 0, 1, or 2.

Fig. 53. Rules for function symbols of arity 0, 1, or 2.

4r 14n
r 4n 12

p n2 68

Fig. 54. The 5 types of critical peaks between the 3 types of rules.

Consider the following canonical form for GL(K), which generalizes the 3rst canon-
ical form for GL(Z2 ):

··· ···
···
···
is void or
··· ···

···
Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310 309

It suggests a variant of the Gauss algorithm, which applies to any invertible matrix A
of order n over K:

1. Create a counter k with initial value 1, and two matrices P and Q with initial value
I (the identity matrix of order n).
2. Consider the last row of A, and let j be the last index for which the coeNcient a
is not 0.
3. Divide column j by a so that this coeNcient becomes 1, and apply the same oper-
ation to P.
4. While j ¿ k, apply an elementary operation to columns j − 1 and j, so that this
index becomes j − 1, and apply the same operation to P.
5. Now, if we consider column p, n is the last index i for which the coeNcient is not
0 (in fact, it is 1).
6. While i ¿ k, apply an elementary operation to rows i − 1 and i, so that this index
becomes i − 1, and apply the same operation to Q.
7. If k ¡ n, increment k and go back to step 2. Otherwise, return the product PQ.

Note that the 3nal value of A is I. To see that this algorithm computes the inverse,
we write A0 ; : : : ; An for the successive values of A, and similarly for P and Q. Since
P0 = Q0 = I, it is easy to see that Ai = Qi A0 Pi for each i. In particular, An = Qn A0 Pn = I,
so that A−1
0 = P n Qn .
In the case where the last coeNcient of the last row is not 0, it amounts to applying
the following formula:
 −1  
A u C −1 − 1b C −1 u
= where C = A − 1b uv:
1 −1 1 1 −1
v b − b vC b + b2 vC u
Consider now the second canonical form for GL(K), which generalizes the 3rst canon-
ical form for GL(Z2 ):

···

···
···
is void or
···
···
··· ···

Here the antistairs are obtained by solving a linear system, which means that we must
3rst compute the inverse of some submatrix. We shall not give the details here, but in
the case where the matrix obtained by forgetting the 3rst row and the 3rst column is
invertible, it amounts to applying the following formula:
 −1  
a u 1
c − 1c uB−1
= where c = a − uB−1 v:
v B − 1c B−1 v B−1 + 1c B−1 vuB−1
310 Y. Lafont / Journal of Pure and Applied Algebra 184 (2003) 257 – 310

Note that the above formulas are two instances of a more general one:
 −1  
A U C −1 −C −1 UB−1
=
V B −B−1 VC −1 B−1 + B−1 VC −1 UB−1

where C = A − UB−1 V:

References

[1] A. Burroni, Higher dimensional word problem, Theoret. Comput. Sci. 115 (1993) 43–62.
[2] Y. Lafont, Penrose diagrams and 2-dimensional rewriting, in: M.P. Fourman, P.T. Johnstone, A.M. Pitts
(Eds.), Applications of Categories in Computer Science, LMSLNS, Vol. 177, Cambridge University
Press, Cambridge, 1992, pp. 191–201.
[3] Y. Lafont, Equational reasoning with 2-dimensional diagrams, Term Rewriting, Lecture Notes in
Computer Science, Vol. 909, Springer, Berlin, 1995, pp. 170 –195.
[4] Y. Lafont, A new 3niteness condition for monoids presented by complete rewriting systems (after Craig
C. Squier), J. Pure Appl. Algebra 98 (1995) 229–244.
[5] Y. Lafont, A. ProutRe, Church–Rosser property and homology of monoids, Mathematical Structures in
Computer Science, Vol. 1 (3), Cambridge University Press, Cambridge, 1991, pp. 297–326.
[6] F.L. Lawvere, Functorial semantics of algebraic theories, Proceedings of the Natural Academy of
Science, USA, 1963.
[7] S. Mac Lane, Categories for the Working Mathematician, Vol. GTM 5, Springer, Berlin, 1971.
[8] A. Massol, Minimality of the system of seven equations for the category of 3nite sets, Theoret. Comput.
Sci. 176 (1997) 347–353.
[9] A. Massol, Calcul symbolique avec des diagrammes de Penrose, ThSese de doctorat, UniversitRe
d’Aix-Marseille II, 1997.
[10] J. Musset, GRenRerateurs et relations pour les circuits boolReens rReversibles, rapport de stage, Institut de
MathRematiques de Luminy, preprint 97-32.
[11] C.C. Squier, Word problems and a homological 3niteness condition for monoids, J. Pure Appl. Algebra
49 (1987) 201–217.
[12] C.C. Squier, F. Otto, Y. Kobayashi, A 3niteness condition for rewriting systems, Theoret. Comput. Sci.
131 (1994) 271–294.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy