167
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Comments on Exchange Graphs in Cluster Algebras

ORCID Icon & ORCID Icon
Pages 79-100 | Published online: 26 Feb 2018
 

ABSTRACT

An important problem in the theory of cluster algebras is to compute the fundamental group of the exchange graph. A non-trivial closed loop in the exchange graph, for example, generates a non-trivial identity for the classical and quantum dilogarithm functions. An interesting conjecture, partly motivated by dilogarithm functions, is that this fundamental group is generated by closed loops of mutations involving only two of the cluster variables. We present examples and counterexamples for this naive conjecture, and then formulate a better version of the conjecture for acyclic seeds.

Mathematics Subject Classification:

Notes

1 This is defined by (1) L(x):=-120xdtlog(1-t)t+logt1-t.(1)

2 We can formulate this problem more intrinsically at the level of the Bloch group. Suppose that we have a set of rational functions xi(t) with respect to variables t satisfying icixi(t)(1-xi(t))=0. Then ici[xi(t)] defines an element of the Bloch group, and the question is if this element is trivial in the Bloch group.

3 Five-term identity “almost” determines the function L(x); a one-variable function satifying the pentagon (Equation3) as well as the inversion relation L(x) + L(1 − x) = π2/6 and differentiable three times or more coincides with L(x) [CitationRog06, Section 4]). This result in itself, however, does not guarantee that (Equation2) arises from repeated use of the five-term identity (Equation3).

4 This theorem is known long before [CitationFST08], see, e.g., [CitationHarer 86] and references in [CitationFST08] for more detailed literature list.

5 We can associate a signature + 1, 0, −1 to each puncture, and the set of such numbers define strata [CitationFomin 08, section 9].

6 In some literature, q2 is denoted by q. In our notation, we always have integer powers of q.

7 During the preparation of this work we came to aware that the fact that G2 identity follows from the pentagon identity is known to some experts, including Gen Kuroki [CitationKuroki]. We would like to thank him for correspondence.

Additional information

Funding

Ewha Womans University (Research Grant of 2017); Japan Society for the Promotion of Science (JSPS-NRF) Joint Research Project, KAKENHI Grant Number 15K17634, Program for Advancing Strategic International Networks to Accelerate the Circulation of Talented Researchers; National Research Foundation of Korea (2017R1D1A1B03030230).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 360.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.