167
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Comments on Exchange Graphs in Cluster Algebras

ORCID Icon & ORCID Icon
 

ABSTRACT

An important problem in the theory of cluster algebras is to compute the fundamental group of the exchange graph. A non-trivial closed loop in the exchange graph, for example, generates a non-trivial identity for the classical and quantum dilogarithm functions. An interesting conjecture, partly motivated by dilogarithm functions, is that this fundamental group is generated by closed loops of mutations involving only two of the cluster variables. We present examples and counterexamples for this naive conjecture, and then formulate a better version of the conjecture for acyclic seeds.

Mathematics Subject Classification:

Notes

1 This is defined by (1) L(x):=-120xdtlog(1-t)t+logt1-t.(1)

2 We can formulate this problem more intrinsically at the level of the Bloch group. Suppose that we have a set of rational functions xi(t) with respect to variables t satisfying icixi(t)(1-xi(t))=0. Then ici[xi(t)] defines an element of the Bloch group, and the question is if this element is trivial in the Bloch group.

3 Five-term identity “almost” determines the function L(x); a one-variable function satifying the pentagon (Equation3) as well as the inversion relation L(x) + L(1 − x) = π2/6 and differentiable three times or more coincides with L(x) [CitationRog06, Section 4]). This result in itself, however, does not guarantee that (Equation2) arises from repeated use of the five-term identity (Equation3).

4 This theorem is known long before [CitationFST08], see, e.g., [CitationHarer 86] and references in [CitationFST08] for more detailed literature list.

5 We can associate a signature + 1, 0, −1 to each puncture, and the set of such numbers define strata [CitationFomin 08, section 9].

6 In some literature, q2 is denoted by q. In our notation, we always have integer powers of q.

7 During the preparation of this work we came to aware that the fact that G2 identity follows from the pentagon identity is known to some experts, including Gen Kuroki [CitationKuroki]. We would like to thank him for correspondence.

Additional information

Funding

Ewha Womans University (Research Grant of 2017); Japan Society for the Promotion of Science (JSPS-NRF) Joint Research Project, KAKENHI Grant Number 15K17634, Program for Advancing Strategic International Networks to Accelerate the Circulation of Talented Researchers; National Research Foundation of Korea (2017R1D1A1B03030230).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.