Journal of Functional Analysis 260 (2011) 1257–1284 www.elsevier.com/locate/jfa
An exact estimate result for a class of singular equations with critical exponents Sun Yijing a,∗ , Wu Shaoping b a School of Mathematical Sciences, Graduate University of Chinese Academy of Sciences, Beijing 100049, PR China b Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, PR China
Received 18 June 2009; accepted 26 November 2010 Available online 14 December 2010 Communicated by G. Godefroy
Abstract We consider the singular boundary value problem −u =
h(x) + λup−1 uγ
in Ω,
u = 0 on ∂Ω
with p = 2N/(N − 2), γ ∈ (0, 1). It is well known that there exists λ∗ > 0 such that the problem has a solution for all λ ∈ (0, λ∗ ) and no solution for λ > λ∗ . We obtain an exact result for λ∗ (Ω, p, γ , h). © 2010 Elsevier Inc. All rights reserved. Keywords: An exact estimate result; Extremal value; Singular nonlinearity; Critical exponent
1. Introduction Let Ω be a smooth bounded domain in RN , N 3, and p = 2N/(N − 2). We consider the range of λ in the singular problem u +
h(x) + λup−1 = 0 in Ω, uγ
u > 0 in Ω,
* Corresponding author.
E-mail addresses:
[email protected],
[email protected] (Y.J. Sun). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.018
u=0
on ∂Ω
(1λ )
1258
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
where h ∈ L∞ (Ω) is like distα (x, ∂Ω) with α − γ 0 (i.e. there exist two positive constants m, M such that m distα (x, ∂Ω) h(x) M distα (x, ∂Ω), ∀x ∈ Ω), γ ∈ (0, 1), and λ > 0 is a parameter. Equations of the type (1λ ) have been intensively studied for both bounded and unbounded domains because of its wide applications to physical models in the study of non-Newtonian fluids, boundary layer phenomena for viscous fluids, chemical heterogenous catalysts, glacial advance, etc. (cf. [2,8–11,13,15,16,19–26,28]). In [10] Coclite and Palmieri proved that there exists λ∗ > 0 such that (1λ ) has a solution for all λ ∈ (0, λ∗ ) and no solution for λ > λ∗ . Furthermore, our previous work [26] and Yang [28] showed the multiplicity of (1λ ). We are now interested in the dependence of λ∗ on Ω, p, γ and h (i.e. how large is λ∗ ?). This is precisely the aim of this paper. As we shall see in Section 3, for λ in an exact range (see Section 2), (1λ ) has at least two solutions. To see this, we give a complete description of a constraint set associated to the action functional and use careful estimates inspired by these in [26,27]. We emphasize that there is no restriction on the shape of Ω. Thus we obtain uniform lower bounds for λ∗ = λ∗ (Ω, p, γ , h). There, it must be said that the method of sub and supersolutions does not adapt for dealing with estimates of this type, since for general Ω (without symmetric property, say) precise information about sub/supersolutions is no longer possible and explicit calculations for λ∗ cannot be actually carried out. The distance condition on h(x) has already been introduced in the study of regularity of pure singular problem (i.e. λ = 0) (cf. [12,16,18]). Gomes [16], del Pino [12] proved that the unique solution of (10 ) belongs to C 1,β (Ω), ∀β ∈ [0, 1). Moreover, Gui and Lin [18] established the following estimate for the unique solution c1 dist(x, ∂Ω) u(x) c2 dist(x, ∂Ω),
∀x ∈ Ω.
As it turns out, the condition also plays an important role in the combined effect of singular and critical nonlinearities, which contributes to the boundedness of the gradient of desired minimizers. Actually, from our arguments the behavior near the boundary (i.e. h(x) ∼ distα (x, ∂Ω) for all x near ∂Ω) is sufficient to guarantee the boundedness. To state our results we first introduce some notations and definitions. Throughout the paper we assume that Ω ∈ L, where L = Ω ⊂ RN ; Ω bounded open and regular say C 1,β . measure of A. C deFor a measurable set A ⊂ RN denote with |A| the N -dimensional Lebesgue note (possibly different) positive constants. Furthermore, u2 = Ω |∇u|2 dx denotes the usual norm of u in H01 (Ω), while for any other function space X, we denote its norm by · X . We denote by the first eigenfunction e1 with e1 + λ1 e1 = 0 in Ω, e1 |∂Ω = 0, 0 e1 1, and we know that 0 < d0 e1 (x) dist(x, ∂Ω)−1 d1 on Ω for some constants d0 , d1 . We assume N 3, let p = 2N/(N − 2) and set |∇u|2 dx 1 u ∈ H (Ω), u =
0 S = inf Ω p 0 ( Ω |u| dx)2/p the best Sobolev constant. It is well known that S is independent of Ω and depends only on N . The infimum can be achieved by the function
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
U ∗ (x) =
1259
1 (1 + |x|2 )(N −2)/2
that is, ∗ 2 N |∇U | dx S= R . ∗ p ( RN |U | dx)2/p The functional associated to (1λ ) is 1 Iλ (u) = 2
1 |∇u| dx − 1−γ
2
Ω
1−γ
h(x)|u|
λ dx − p
Ω
|u|p dx,
∀u ∈ H01 (Ω).
Ω
Clearly Iλ is only a continuous functional on H01 (Ω). Define the constraint set Nλ = t (u)u: u ∈ H01 (Ω)\{0} where t (u) are the zeros of the map 1
d Iλ (tu) dt
2−p 2 −γ −p+1 1−γ |∇u| dx − t h(x)|u| dx − λ |u|p dx. =t
t → φ(t, u) =
t p−1
Ω
Ω
Ω
Let Nλ+ (resp. Nλ− ) be the subset of Nλ corresponding to t (u) with d dt |t=t (u) φ(t, u) < 0), that is
d dt |t=t (u) φ(t, u)
> 0 (resp.
Nλ± = v = t (u)u ∈ Nλ : (2 − p) |∇v|2 dx + (p + γ − 1) h(x)|v|1−γ dx > (<)0 . Ω
Ω
By a solution of (1λ ) we mean, a function u ∈ H01 (Ω) such that u(x) > 0 a.e. in Ω and
∇u · ∇ϕ dx −
Ω
h(x) ϕ dx − λ uγ
Ω
up−1 ϕ dx = 0,
∀ϕ ∈ H01 (Ω).
Ω
Our main result is as follows: Theorem. Let λ∗ be the extremal value for problem (1λ ). Then ∗
λ (Ω, p, γ , h)
1+γ p+γ −1
p−2 p+γ −1
p−2 1+γ
S |Ω|2/N
p+γ −1 1+γ
1 h∞
p−2 1+γ
:= Λ.
1260
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
For general domains without symmetric properties it is difficult to derive an exact result for λ∗ . Still few general results are known except in [14] Gazzola and Malchiodi provide uniform lower bounds of λ∗ for the problem −u = λ(1 + u)p , 1 < p (N + 2)/(N − 2) and our recent paper [24,25] for singular-subcritical and nonsingular-critical cases. The outline of the paper is the following. In Section 2 we obtain the value Λ through the connection between Nλ and the fibrering maps (i.e., maps of the form t → Iλ (tu); see Alves and El Hamidi [1], Brown and Zhang [7]). In Section 3, we discuss infN + Iλ under λ ∈ (0, Λ). λ First, we provide an estimate for u0 as a weak limit of a minimizing sequence for infN + Iλ , λ which will influence a series of estimates of critical case since ∇u turns rather delicate in singular case (see Lazer and Mckenna [21]). Then, with the help of the estimate and the family Uε,a (x) := η(x)ε −(N −2)/2 U ∗ ( x−a ε ), we manage to locate that u0 ∈ Nλ . Finally, using the ideas of Graham-Eagle [17] and the location information we prove that u0 is a solution of (1λ ). By taking advantage of the structure of Nλ under λ ∈ (0, Λ), we discuss the problem infN − Iλ and λ obtain the multiplicity of (1λ ). In Section 4 we provide uniform bounds for λ∗ (Ω, p, γ , h). 2. The number Λ Lemma 1. Suppose that λ ∈ (0, Λ). Then for any u ∈ H01 (Ω)\{0}, φ(t, u) has exactly two zeros t ∓ (u) which satisfy 0 < t − (u) < t + (u),
t − (u)u ∈ Nλ+ , t + (u)u ∈ Nλ− .
Proof. Define φ : (0, ∞) × {H01 (Ω)\{0}} → R by
φ(t, u) = t 2−p
|∇u|2 dx − t −γ −p+1
Ω
h(x)|u|1−γ dx − λ Ω
|u|p dx. Ω
Since φ(t, u) is increasing/decreasing along t > 0, it is easily derived that
(p − 2)∇u22 tmax,u = (p + γ − 1) Ω h(x)|u|1−γ dx
−1/(1+γ ) ,
φ(tmax,u , u) (p−2)/(1+γ )
2(p+γ −1)/(1+γ ) ∇u2 p−2 1+γ = − λ |u|p dx p+γ −1 p+γ −1 ( Ω h(x)|u|1−γ dx)(p−2)/(1+γ ) Ω
>
p−2 1+γ p+γ −1 p+γ −1 p 1 p ∇u2 −λ √ S p
:= D(λ)∇u2 , and
(p−2)/(1+γ )
1 h∞
(p−2)/(1+γ )
√ |Ω|
S
(p−2)(1−γ ) (1+γ )
p−(1−γ ) p(1−γ )
(2)
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
D(λ) = 0 iff
1261
λ = Λ,
where we have used Hölder’s and Sobolev inequalities, and the following two relations (p − 2)(1 − γ ) 2(p + γ − 1) +p= , 1+γ 1+γ 2 p+γ −1 p − (1 − γ ) p − 2 p − 2 (p + γ − 1) · = · = . p 1+γ p (1 + γ ) N 1+γ Since λ < Λ, it follows D(λ) > 0 and φ(tmax,u , u) > 0, therefore φ(t, u) has exactly two zeros 0 < t − (u) < t + (u), that is
∇v22 −
h(x)|v|1−γ − λ
Ω
|v|p = 0,
where v = t ∓ (u)u
Ω
such that t − (u)u ∈ Nλ+ , This completes the proof of Lemma 1.
t + (u)u ∈ Nλ− .
2
Set E0 =
p+γ −1 p−1
1 1+γ
1
1+γ h∞
1+γ E(λ) = λ(p + γ − 1)
1
+1
1−γ
|Ω| 2 N 1+γ , √ 1−γ 1+γ S
(N −2)/4
√ N/2 S .
Lemma 2. Suppose that λ ∈ (0, Λ). Then Nλ has a gap structure in the sense that ∇u2 < E0 , ∀u ∈ Nλ+ ; ∇U 2 > E(λ) > E0 , ∀U ∈ Nλ− . Clearly, E(λ) → ∞ as λ → 0. Proof. If u ∈ Nλ+ then necessarily (p − 2)∇u22 − (p + γ − 1) other hand, for all U ∈ Nλ− (⊂ Nλ )
Ω
h(x)|u|1−γ dx < 0. On the
p
(1 + γ )∇U 22 − λ(p + γ − 1)U p
2 1−γ = − (p − 2)∇U 2 − (p + γ − 1) h(x)|U | dx < 0. Ω
Consequently, ∇U 2 > E(λ), ∇u2 < E0 ,
∀U ∈ Nλ− , ∀u ∈ Nλ+ .
(3) (4)
1262
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
Surprisingly enough, E(λ) = E0
λ = Λ,
iff
we conclude that ∇U 2 > E(λ) > E0 > ∇u2 ,
∀u ∈ Nλ+ , U ∈ Nλ−
(5)
for all λ ∈ (0, Λ), where we have used the following two relations 1 1−γ p − (1 − γ ) 1 = + , p(1 + γ ) 2 N 1+γ 1−γ 4 2N 1−γ 2(p + γ − 1) + = (p − 2) + p = . 1+γ N −2 N −2 1+γ 1+γ This completes the proof of Lemma 2.
2
Lemma 3. Suppose that λ ∈ (0, Λ). Then Nλ− is a closed set in H01 -topology. Proof. From the arguments of Lemma 1 we derive that if u ∈ H01 (Ω)\{0} satisfies the following two equalities
∇u22 −
h(x)|u|1−γ dx − λ
Ω
(p − 2)∇u22 − (p + γ − 1)
|u|p dx = 0, Ω
h(x)|u|1−γ dx = 0, Ω
then p
D(λ)∇u2 (p−2)/(1+γ )
2(p+γ −1)/(1+γ ) ∇u2 p−2 1+γ < − λ |u|p dx p+γ −1 p+γ −1 ( Ω h(x)|u|1−γ dx)(p−2)/(1+γ ) Ω
=
1+γ p+γ −1
−
p−2 p+γ −1
(p−2)/(1+γ )
( Ω
2(p−2)/(1+γ ) ∇u2 ∇u22 h(x)|u|1−γ dx)(p−2)/(1+γ )
1+γ ∇u22 = 0, p+γ −1
which is impossible as D(λ) > 0 for all λ ∈ (0, Λ). This fact, together with (3) implies that Nλ− is closed. This completes the proof of Lemma 3. 2 After these preliminaries, let us give Section 3.
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1263
3. Solutions of (1λ ) for all λ ∈ (0, Λ) Theorem 1. Suppose that λ ∈ (0, Λ). Then the singular problem (1λ ) has a solution u0 ∈ H01 (Ω) ∩ C 1,β (Ω), ∀0 < β < 1, satisfying Iλ (u0 ) < 0 and ∇u0 2 E0 (E0 defined in Lemma 2). Proof. Note that for u ∈ Nλ it is clear that
1 Iλ (u) = 2 =
1 |∇u| dx − 1−γ
2
Ω
1 1 − 2 p
1−γ
h(x)|u| Ω
|∇u|2 dx − Ω
λ dx − p
1 1 − 1−γ p
1 1 1−γ − ∇u22 − C∇u2 , 2 p
|u|p dx Ω
h(x)|u|1−γ dx Ω
∀u ∈ Nλ .
Therefore Iλ is coercive and bounded below in Nλ . So, two immediate candidates for solutions of the singular problem (1λ ) would be that found by considering the following minimization problems inf Iλ ,
Nλ+
inf Iλ .
Nλ−
d Iλ (tu) has the same sign with φ(t, u), Iλ (tu) is increasing in [t − (u), t + (u)] for Observe that dt 1 each u ∈ H0 (Ω)\{0}. In particular, if u ∈ Nλ− (i.e., t + (u) = 1) we clearly have Iλ (t − (u)u) Iλ (t + (u)u) = Iλ (u), and consequently infN + Iλ infN − Iλ . Also, infNλ Iλ = infN + Iλ . λ
λ
λ
In view of the arguments in Lemma 3, Nλ+ ∪ {0} and Nλ− are two closed sets in H01 (Ω) provided λ ∈ (0, Λ). This allows us to select “best” minimizing sequences by means of Ekeland’s principle (see [3]). First, consider (un ) ⊂ Nλ+ ∪ {0} with the properties: (i) Iλ (un ) < infN + ∪{0} Iλ + n1 ; λ
(ii) Iλ (u) Iλ (un ) − n1 u − un , ∀u ∈ Nλ+ ∪ {0}. Since I (|u|) = I (u), we may assume un 0. Clearly, (un ) is bounded in H01 (Ω), so (a subsequence of) un u0 weakly in H01 (Ω) and Lp (Ω), strongly in L1−γ (Ω), and pointwise a.e. in Ω, with u0 0. Write un = u0 + wn with wn 0 weakly in H01 (Ω). Now, taking into account that, Iλ (u) =
1 1 1 1 2 ∇u2 − h(x)|u|1−γ dx − − 2 p 1−γ p
< that is,
1 p−2 1 − p 2 1−γ
∇u22 < 0,
Ω
for all u ∈ Nλ+
1264
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
inf Iλ = inf Iλ < 0
Nλ+ ∪{0}
(6)
Nλ+
while by the weak lower semi-continuity of norm Iλ (u0 ) lim inf Iλ (un ) = infN + ∪{0} Iλ , we see λ
that u0 ≡ 0 and (un ) ⊂ Nλ+ . Now, using techniques developed in our previous work [26], we investigate further properties of (un ) which yield the important estimate for u0 : Claim 1. There exists ε0 > 0 such that u0 (x) ε0 e1 (x), ∀x ∈ Ω. We start by observing that lim inf (p − 2)∇un 22 < (p + γ − 1)
1−γ
h(x)u0
n→∞
(7)
dx.
Ω
In fact, arguing by contradiction and assume that lim infn→∞ [(p − 2)∇un 22 ] = 1−γ (p + γ − 1) Ω h(x)u0 dx. Since un ∈ Nλ+ , then lim inf (p − 2)∇un 22 lim sup (p − 2)∇un 22 (p + γ − 1) n→∞
1−γ
h(x)u0
n→∞
dx
Ω
and thus lim ∇un 22 =
n→∞
p+γ −1 p−2
1−γ
h(x)u0
(8)
dx.
Ω
Consequently,
1+γ 1−γ 1−γ p h(x)u0 dx. lim λun p = lim ∇un 22 − h(x)un dx = n→∞ n→∞ p−2 Ω
Ω
Note that D(λ) > 0. This provides the necessary contradiction, as (8) and (9) imply that p
0 < D(λ)∇un 2 (p−2)/(1+γ ) 2(p+γ −1)/(1+γ ) ∇un 2 1+γ p−2 p < − λun p 1−γ p+γ −1 p+γ −1 ( Ω h(x)un dx)(p−2)/(1+γ ) (p−2)/(1+γ ) ( p+γ −1 h(x)u1−γ dx)(p+γ −1)/(1+γ ) 1+γ p−2 0 Ω p−2 n→∞ −−−− → 1−γ p+γ −1 p+γ −1 ( Ω h(x)u0 dx)(p−2)/(1+γ )
1+γ 1−γ − h(x)u0 dx = 0 p−2 Ω
that is, un → 0 strongly in H01 (Ω) while Iλ (un ) → infN + Iλ < 0. λ
(9)
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1265
By (7), we may extract a subsequence such that
(p − 2)∇un 22
1−γ
− (p + γ − 1)
h(x)un
dx −C
(10)
Ω
for suitable constant C > 0. Let ϕ ∈ H01 (Ω) with ϕ(x) 0. From Lemma 1 we know that, for each un there exists a continuous function fn (t) such that fn (t)(un + tϕ) ∈ Nλ+ (⊂ Nλ ) for all sufficiently small t 0. Clearly, fn (0) = 1. Therefore,
2 1−γ p p 2 0 = fn (t) un + tϕ − fn (t) h(x)(un + tϕ)1−γ dx − λ fn (t) un + tϕp , Ω
0 = un 2 −
1−γ
h(x)un
p
dx − λun p ,
Ω
for t > 0 small, that is, 0 = fn2 (t) − 1 un + tϕ2 + un + tϕ2 − un 2
1−γ 1−γ h(x)(un + tϕ)1−γ − h(x)(un + tϕ)1−γ − h(x)un − fn (t) − 1 Ω
Ω
Ω
p p p p − λ fn (t) − 1 un + tϕp − λun + tϕp − λun p fn2 (t) − 1 un + tϕ2 + un + tϕ2 − un 2
1−γ p p − fn (t) − 1 h(x)(un + tϕ)1−γ − λ fn (t) − 1 un + tϕp , Ω
dividing by t > 0 and passing to the limit for t → 0, we derive
1−γ p 0 2fn (0)∇un 22 + 2 ∇un · ∇ϕ − (1 − γ )fn (0) h(x)un − λpfn (0)un p Ω
Ω
1−γ 2 + 2 ∇un · ∇ϕ = fn (0) (2 − p)∇un 2 + (p + γ − 1) h(x)un Ω
Ω
where fn (0) ∈ [−∞, +∞] denotes the right derivate of fn (t) at zero (for the sake of simplicity, we assume henceforth that the right derivate of fn at t = 0 exists. Indeed, if it isn’t real, we let tk → 0 (instead of t → 0), tk > 0 is chosen in such a way that fn satisfies qn := limk→∞ fn (ttkk)−1 , where qn ∈ [−∞, +∞], and then replace fn (0) by qn ). Since un ∈ Nλ+ , fn (0) = −∞. Furthermore, from (10) we conclude that fn (0) is uniformly bounded from below. On the other hand, using (ii) we clearly have 1 Iλ (un ) Iλ fn (t)(un + tϕ) + fn (t)(un + tϕ) − un n
(11)
1266
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
for t > 0 small, that is, 1 fn (t) − 1un + tfn (t)ϕ n 1 fn (t)(un + tϕ) − un n Iλ (un ) − Iλ fn (t)(un + tϕ) 2 1 1 1 1 1 1 p 2 − un + λ − un p − − fn (t) un + tϕ2 = 2 1−γ 1−γ p 2 1−γ 1 1 p p − fn (t) un + tϕp , −λ 1−γ p dividing by t > 0 and passing to the limit as t → 0, we get
fn (0) 1 1−γ 2 f (0) un + ϕ (p + γ − 1) h(x)un − (p − 2)∇un 2 n n 1−γ
1+γ + 1−γ
Ω
∇un · ∇ϕ − λ Ω
p+γ −1 1−γ
p−1
un
ϕ.
(12)
Ω
But by (10), for n large enough
un 1 1−γ 2 − (p − 2)∇un 2 − (p + γ − 1) h(x)un C − 1−γ n
(13)
Ω
with C > 0 a suitable constant. Putting together (12) and (13), we see that fn (0) is uniformly bounded from above. In conclusion, fn (0) is uniformly bounded in n. Now, applying (11) again, 1 fn (t) − 1un + tfn (t)ϕ n 1 fn (t)(un + tϕ) − un n Iλ (un ) − Iλ fn (t)(un + tϕ)
2 1 1 λ 1 1−γ p = un 2 − h(x)un − un p − fn (t) un + tϕ2 2 1−γ p 2 Ω
+
1 1−γ
1−γ fn (t)
h(x)(un + tϕ)1−γ + Ω
p λ p fn (t) un + tϕp , p
(14)
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1267
dividing by t > 0 and passing to the limit as t → 0, we obtain 1 fn (0) un + ϕ n
1−γ p p−1 −fn (0)un 2 − ∇un · ∇ϕ + λfn (0)un p + λ un ϕ + fn (0) h(x)un Ω
+ lim inf t→0
Ω
1 1−γ
h(x)
Ω
t
Ω
∇un · ∇ϕ + λ
=−
1−γ (un + tϕ)1−γ − un
Ω
p−1 un ϕ
+ lim inf t→0
Ω
1 1−γ
1−γ
(un + tϕ)1−γ − un h(x) t
,
Ω
which gives,
lim inf t→0
1 1−γ
1−γ
(un + tϕ)1−γ − un h(x) t
Ω
∇un · ∇ϕ dx − λ Ω
p−1
un
ϕ dx +
dx
|fn (0)|un + ϕ . n
Ω
1−γ −u1−γ n
Since h(x) (un +tϕ) t
0 in Ω, by Fatou’s Lemma we know that
1−γ (un + tϕ)1−γ − un lim inf h(x) t→0 t
is integrable, and
lim inf
1−γ
t→0
1 (un + tϕ)1−γ − un h(x) 1−γ t
Ω
∇un · ∇ϕ dx − λ Ω
p−1
un
ϕ dx +
dx
|fn (0)|un + ϕ . n
Ω
Note that 1 (un h(x) 1−γ
+ tϕ)1−γ t
⎧ 0, un (x) = 0, ϕ(x) = 0, ⎪ ⎨ +∞, un (x) = 0, ϕ(x) > 0, −−−→ ⎪ ⎩ h(x) un (x) > 0, ϕ(x) 0. γ ϕ, u
1−γ − un t→0
n
Now, if we use ϕ = e1 as a test-function in (15), we see un (x) > 0 a.e. in Ω, then
(15)
1268
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
Ω
h(x) γ ϕ dx un
∇un · ∇ϕ dx − λ
Ω
p−1
un
ϕ dx +
|fn (0)|un + ϕ , n
Ω
and in view of (14), we can proceed as above to conclude that u0 (x) > 0 a.e. in Ω, and
Ω
h(x) γ ϕ dx u0
∇u0 · ∇ϕ dx − λ
Ω
p−1
u0
∀ϕ ∈ H01 (Ω), ϕ 0.
ϕ dx,
(16)
Ω
At this point the conclusion of Claim 1 follows by a result of Brezis and Nirenberg [6, Theorem 3] which shows that u0 (x) c dist(x, ∂Ω),
∀x ∈ Ω.
(17)
Let uε (x) =
ε (N −2)/2 , (ε 2 + |x|2 )(N −2)/2
ε > 0, x ∈ RN
be an extremal function for the Sobolev inequality in RN . For a ∈ Ω let η ∈ C0∞ (Ω) such that 0 η(x) 1 in Ω and η(x) = 1, ∀x ∈ B r (a) ⊂ Ω for a suitable r > 0. Set p Uε,a (x) = η(x)uε (x − a) ∈ H01 (Ω). It is well known that ∇Uε,a 22 = B + O(ε N −2 ), Uε,a p = A + O(ε N ), and S = AB2/p , where
B=
∇U ∗ 2 dx,
RN
A= RN
1 dx. (1 + |x|2 )N
The crucial step in our proof is the following: Claim 2. u0 ∈ Nλ with λ ∈ (0, Λ). Denote by
a0 = ∇u0 22 −
h(x)|u0 |1−γ dx − λ
Ω
|u0 |p dx. Ω
Let ϕ = u0 in (16), we know that a0 0. Let us argue by contradiction and assume that a0 > 0. In the following we will concentrate on a contradiction. By the (contradictory) assumption a0 > 0, there exists a unique c0 > 0 such that p c02 B −λc0 A = −a0 , i.e. S(c0 A1/p )2 −λ(c0 A1/p )p = −a0 . But, as Iλ (un ) → μ0 := infN + ∪{0} Iλ = infN + Iλ with un ∈ Nλ+ (⊂ Nλ ), by the Brezis–Lieb Lemma [5] we have λ
λ
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
μ0 + o(1) = Iλ (un ) = =
1 1 − 2 1−γ
1 1 − 2 1−γ
h(x)|un |1−γ dx + λ
Ω
h(x)|u0 |1−γ dx + λ
1269
1 1 p − un p 2 p
1 1 p − u0 p 2 p
Ω
1 1 p − wn p + o(1) +λ 2 p
and
0 = ∇un 22 −
h(x)|un |1−γ dx − λ Ω
|un |p dx Ω
= a0 + ∇wn 22
p − λwn p
p
+ o(1) a0 + Swn 2p − λwn p + o(1)
which would imply that limn→∞ wn p exists and limn→∞ wn p c0 A1/p . In other words, u0 satisfies μ0
1 1 − 2 1−γ
1 1 1 1 p p − u0 p + λ − c A. dx + λ 2 p 2 p 0
h(x)|u0 |
1−γ
(18)
Ω
p On the other hand, for any u ∈ H01 (Ω) with au = ∇u22 − Ω h(x)|u|1−γ dx − λup > 0, p p we can find Ru > 0 such that ∇u22 − Ω h(x)|u|1−γ dx − λup + Ru2 B − λRu A < 0, and thus ∇(u + Ru Uε,a )2 −
p
h(x)|u + Ru Uε,a |1−γ dx − λu + Ru Uε,a p
2
Ω
= ∇u22
+ Ru2 ∇Uε,a 22
+ 2Ru
∇u · ∇Uε,a dx − Ω
h(x)|u + Ru Uε,a |1−γ dx Ω
p p p − λ up + Ru Uε,a p + o(1) p
= au + Ru2 B − λRu A + o(1) < 0 for ε > 0 small, where we have used
Ω
∇u · ∇Uε,a dx = o(1) and the fact
h(x)|u + cUε,a |1−γ dx − h(x)|u|1−γ dx Ω
h∞
Ω
(N−2)(1−γ ) 2 . (cUε,a )1−γ dx = h∞ c1−γ O ε
Ω
This allows us to take 0 < cε,u < Ru to satisfy
1270
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
∇(u + cε,u Uε,a )2 −
p
h(x)|u + cε,u Uε,a |1−γ dx − λu + cε,u Uε,a p = 0
2
(19)
Ω
that is, u + cε,u Uε,a ∈ Nλ . p
Furthermore, since au > 0, let cu > 0 be the unique such that cu2 B − λcu A = −au . Then, clearly B 1/(p−2) 2 B − λcp A + o(1), and hence cu > ( λA ) . From (19) it follows that 0 = au + cε,u ε,u cε,u → cu
as ε → 0,
(20)
which yields ∇(u + cε,u Uε,a )2 = ∇u2 + c2 B + o(1) > c2 B > u u 2 2
B λA
2/(p−2)
(N −2)/2 1 B= S N/2 λ
for ε > 0 small. Necessarily, ∇(u + cε,u Uε,a ) > 2
(N −2)/4 (N −2)/4
√ N/2 √ N/2 1 1+γ S > S = E(λ). λ λ(p + γ − 1)
The gap structure of Nλ (see (5)) then guarantees u + cε,u Uε,a ∈ Nλ− . This information will be useful in the proof of Theorem 2. Thus, in view of the fact that infN + Iλ = infNλ Iλ , we derive λ that μ0 Iλ (u + cε,u Uε,a )
1 1 1 1 p 1−γ − − u + cε,u Uε,a p h(x)|u + cε,u Uε,a | dx + λ = 2 1−γ 2 p =
Ω
1 1 − 2 1−γ
1 1 1 1 p p − up + λ − cε,u A + o(1), dx + λ 2 p 2 p
1−γ
h(x)|u| Ω
that is, μ0
1 1 − 2 1−γ
1 1 1 1 p p − up + λ − cu A. dx + λ 2 p 2 p
1−γ
h(x)|u|
(21)
Ω
Now, putting together (18) and (21), we see that μ0 =
1 1 − 2 1−γ
h(x)|u0 |1−γ dx + λ
Ω
1 1 1 1 p p u0 p + λ c A. − − 2 p 2 p 0
(22)
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1271
This implies that, necessarily u0 is a local minimizer for the functional:
1 1 − 2 1−γ
1 1 1 1 p p − up + λ − cu A. dx + λ 2 p 2 p
1−γ
h(x)|u|
(23)
Ω
For the functional cu , let ϕ ∈ C0∞ (Ω) and evaluate in a small neighborhood of t = 0
g(t) := cu0 +tϕ that is,
p 2 p g(t) B − λ g(t) A = − ∇u0 + tϕ22 − h(x)|u0 + tϕ|1−γ dx − λu0 + tϕp . Ω
By a0 > 0, we know that g(t) exists, with g(0) = c0 . Moreover, since u0 (x) ε0 e1 (x) in Ω (see Claim 1), by dominated convergence,
h(x)|u0 + tϕ|1−γ dx − h(x)|u0 |1−γ dx t
h(x)(1 − γ )(u0 + θ tϕ)−γ ϕ dx =
Ω
supp ϕ
−γ h(x)(1 − γ )u0 ϕ dx
t→0
−−−→
=
supp ϕ
−γ
h(x)(1 − γ )u0 ϕ dx, Ω
and consequently p−1 g(t) − g(0) B g(t) + g(0) − λAp g(0) + θ g(t) − g(0) t 2 p 2 p [g(t)] B − λ[g(t)] A − [g(0)] B + λ[g(0)] A = t
1 p = − ∇u0 + tϕ22 − h(x)|u0 + tϕ|1−γ dx − λu0 + tϕp t Ω
− ∇u0 22
+
h(x)|u0 |
1−γ
dx
p + λu0 p
Ω
h(x) p−1 t→0 − −−→ − 2 ∇u0 · ∇ϕ dx − (1 − γ ) ϕ dx − λp u ϕ dx γ 0 u0 Ω
Ω
Ω
which implies that g (0) exists and g (0) =
h(x) p−1 2 ∇u · ∇ϕ dx − (1 − γ ) ϕ dx − λp u ϕ dx . 0 γ 0 p−1 u0 2c0 B − λpc A −1
0
Ω
Ω
Ω
1272
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
Resuming from (23) we see that
1 1 1 1 d p − − u0 + tϕp h(x)|u0 + tϕ|1−γ + λ dt 2 1−γ 2 p Ω
p 1 1 − g(t) A +λ =0 2 p t=0 that is,
1 1 h(x) 1 1 1 1 p−1 p−1 − (1 − γ ) − p − pc0 A ϕ dx + λ u ϕ dx + λ γ 0 2 1−γ 2 p 2 p u0 Ω
Ω
−1 h(x) p−1 2 × ∇u · ∇ϕ dx − (1 − γ ) ϕ dx − λp u ϕ dx =0 0 γ 0 p−1 u0 2c0 B − λpc A
0
Ω
Ω
Ω
for all ϕ ∈ C0∞ (Ω). Since h(x) is like distα (x, ∂Ω) with α − γ 0, from Claim 1 follows −γ immediately that h(x)u0 ∈ L∞ (Ω). Hence, for all ϕ ∈ H01 (Ω) we conclude that
1 1 h(x) 1 1 1 1 p−1 p−1 − (1 − γ ) − p u0 ϕ + λ − Apc0 0= γ ϕ+λ 2 1−γ 2 p 2 p u0 Ω
Ω
h(x) p−1 2 × ∇u · ∇ϕ − (1 − γ ) ϕ − λp u ϕ . 0 γ 0 p−1 u0 2c0 B − λpc A
−1
0
Ω
Ω
(24)
Ω
Thus, we can use Eq. (24) to derive that u0 ∈ C 1,β (Ω), ∀0 < β < 1 by usual bootstrap argument, and so the famous estimates follow (see [27]):
∇u0 · ∇Uε,a dx = O ε (N −2)/2 ,
Ω p−1 Uε,a u0 dx
= u0 (a) RN
Ω
|u0 |
p−2
u0 Uε,a dx =
Ω
Ω
1 (1 + |x|2 )(N +2)/2
dx ε (N −2)/2 + o ε (N −2)/2 ,
|u0 |p−2 u0 η dx ε (N −2)/2 + o ε (N −2)/2 . (|x − a|2 )(N −2)/2
−γ
In particular, as h(x)u0 ∈ L∞ (Ω), we can reevaluate
h(x)(u0 + cε,u Uε,a )1−γ dx − h(x)u1−γ dx 0 0 Ω
=
Ω
h(x)(1 − γ )(u0 + θ cε,u0 Uε,a )−γ cε,u0 Uε,a dx
Ω
−γ = ε (N −2)/2 (1 − γ )c0 h(x)u0 Ω
η(x) dx + o(1) (|x − a|2 )(N −2)/2
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1273
that is,
h(x)(u0 + cε,u0 Uε,a )1−γ dx Ω
=
1−γ h(x)u0
dx + (1 − γ )c0
Ω
−γ
h(x)u0 Ω
η(x) dx ε (N −2)/2 + o ε (N −2)/2 . (|x − a|2 )(N −2)/2
Write cε,u0 = c0 + δε . By (20), δε → 0. Inserting all the above estimates into (19), we obtain 2 0 = ∇(u0 + cε,u0 Uε,a )2 −
p
h(x)|u0 + cε,u0 Uε,a |1−γ dx − λu0 + cε,u0 Uε,a p Ω
− λp
−γ
h(x)u0 Ω
p−1
u0
∇u0 · ∇Uε,a dx − Ω
− (1 − γ )c0
2 = ∇u0 22 + cε,u ∇Uε,a 22 + 2cε,u0 0
η(x) p p p dx ε (N −2)/2 − λu0 p − λcε,u0 Uε,a p (|x − a|2 )(N −2)/2 p−1
Ω
p−1 Uε,a u0 dx + o ε (N −2)/2
Ω
p p 2 B − λcε,u0 A + 2c0 = − c02 B − λc0 A + cε,u 0 − (1 − γ )c0 p−1
− λpc0
∇u0 · ∇Uε,a dx Ω
−γ h(x)u0
Ω
dx
Ω
cε,u0 Uε,a dx − λpcε,u0
1−γ
h(x)u0
η(x) dx ε (N −2)/2 − λpc0 |x − a|N −2
p−1
u0
Uε,a dx
Ω
p−1 Uε,a u0 dx + o ε (N −2)/2 ,
Ω
which gives p−1 2c0 B − λpc0 A + o(1) (−δε )
−γ = 2c0 ∇u0 · ∇Uε,a dx − (1 − γ )c0 h(x)u0 Uε,a dx Ω
− λpc0
Ω
p−1
u0
p−1
Uε,a dx − λpc0
Ω
Furthermore, from (24) follows that
Ω
p−1 Uε,a u0 dx + o ε (N −2)/2 .
1274
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
(−δε ) =
c0 p−1
[2c0 B − λpc0 − −
−
Ω
c0 p−1
[2c0 B − λpc0 p−1
[2c0 B − c0
A]
−
Ω p−1
u0
)(1 − γ )
λp Ω
h(x) Ω uγ Uε,a dx 0
p−1
c0 [2c0 B
Uε,a dx
p−1 Uε,a u0 dx + o ε (N −2)/2
λ( 12
−
h(x)u0 Uε,a dx
Ω
p−1 − λpc0 A]
1 1−γ
−γ
(1 − γ )
λp A]
p−1 c0
[2c0 B
c0
( 12
= c0
∇u0 · ∇Uε,a dx
2 A]
p−1 − λpc0 A]
λp
−
+ λ( 12 − p1 )p
Ω
p−1
u0
Uε,a dx
p−1 1 p )Apc0
see (24)
p−1 Uε,a u0 dx + o ε (N −2)/2 .
(25)
Ω
Also, δε = O(ε (N −2)/2 ). Now, we can proceed to get the contradiction. Since a0 > 0, clearly 2c0 B
p−1 − λpc0 A =
2 2 p p 2 2 2 p c B − λ c0 A < c B − λc0 A = − a0 < 0. c0 0 2 c0 0 c0
Subsequently, in virtue of u0 + cε,u0 Uε,a ∈ Nλ , applying (22) and (25) we obtain Iλ (u0 + cε,u0 Uε,a )
1 1 1 1 p − − u0 + cε,u0 Uε,a p h(x)(u0 + cε,u0 Uε,a )1−γ dx + λ = 2 1−γ 2 p =
Ω
1 1 − 2 1−γ
1−γ
h(x)u0
dx + λ
Ω
1 1 − + 2 1−γ
1 1 1 1 p p − u0 p + λ − cε,u0 A 2 p 2 p
−γ (1 − γ )c0 h(x)u0 Ω
η(x) dx ε (N −2)/2 |x − a|N −2
1 1 1 1 p−1 p−1 p−1 − p u0 cε,u0 Uε,a dx + λ − pcε,u0 Uε,a u0 dx + o ε (N −2)/2 +λ 2 p 2 p
=
1 1 − 2 1−γ
+λ
Ω 1−γ
h(x)u0
Ω
1 1 1 1 p p − u0 p + λ − c A dx + λ 2 p 2 p 0
Ω
1 1 1 1 −γ p−1 − pc0 δε A + − (1 − γ )c0 h(x)u0 Uε,a dx 2 p 2 1−γ Ω
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
+λ
1275
1 1 1 1 p−1 p−1 p−1 − pc0 u0 Uε,a dx + λ − pc0 Uε,a u0 dx + o ε (N −2)/2 2 p 2 p
Ω
Ω
see (22)
1 1 p−1 − pc0 Aδε 2 p
1 1 1 1 −γ p−1 − − + (1 − γ )c0 h(x)u0 Uε,a dx + λ pc0 u0 Uε,a dx 2 1−γ 2 p
= μ0 + λ
Ω
Ω
1 1 p−1 p−1 − pc0 +λ Uε,a u0 dx + o ε (N −2)/2 2 p
Ω
= μ0 + λ
p−1 c0 1 1 1 1 p−1 p−1 p−1 − pc0 Aδε + λ − Apc0 U u dx λp 0 ε,a p−1 2 p 2 p 2c0 B − λpc A
1 1 p−1 + (−δε ) λ − pc0 A 2 p
1 1 p−1 p−1 +λ − pc0 Uε,a u0 dx + o ε (N −2)/2 2 p
0
Ω
see (25)
Ω
1 1 2c0 B p−1 p−1 − = μ0 + λ Uε,a u0 dx + o ε (N −2)/2 < μ0 pc0 p−1 2 p 2c0 B − λpc A 0
Ω
which is clearly impossible. This concludes the proof of Claim 2. Claim 3. u0 is a solution of (1λ ). The proof is inspired by Graham-Eagle in [17]. For ϕ ∈ H01 (Ω), ε > 0 define Ψ := (u0 + εϕ)+ ∈ H01 (Ω). Using Claim 2 and inserting Ψ into (16), we see that
∇u0 · ∇Ψ −
0 Ω
h(x) p−1 γ Ψ − λu0 Ψ dx u0
∇u0 · ∇(u0 + εϕ) −
= [u0 +εϕ>0]
−
= Ω
[u0 +εϕ0]
= ∇u0 22 −
h(x) p−1 ∇u0 · ∇(u0 + εϕ) − γ (u0 + εϕ) − λu0 (u0 + εϕ) dx u0 1−γ
h(x)u0 Ω
h(x) p−1 γ (u0 + εϕ) − λu0 (u0 + εϕ) dx u0
dx − λ
p
u0 dx + ε Ω
∇u0 · ∇ϕ − Ω
h(x) p−1 γ ϕ − λu0 ϕ dx u0
1276
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
−
∇u0 · ∇(u0 + εϕ) −
[u0 +εϕ0]
=ε
Ω
−
h(x) p−1 ∇u0 · ∇ϕ − γ ϕ − λu0 ϕ dx − u0
∇u0 · ∇(u0 + εϕ)
[u0 +εϕ0]
h(x) p−1 γ (u0 + εϕ) − λu0 (u0 + εφ) dx u0 ∇u0 · ∇ϕ −
ε
h(x) p−1 γ (u0 + εϕ) − λu0 (u0 + εϕ) dx u0
h(x) p−1 γ ϕ − λu0 ϕ dx − ε u0
∇u0 · ∇ϕ dx.
[u0 +εϕ0]
Ω
Since the measure of the domain of integration [u0 + εϕ 0] tends to zero as ε → 0, it follows that [u0 +εϕ0] ∇u0 · ∇ϕ dx → 0. Dividing by ε and letting ε → 0 therefore shows
∇u0 · ∇ϕ dx −
Ω
Ω
h(x) γ ϕ dx − λ u0
p−1
u0
ϕ dx 0
Ω
and since this holds equally well for −ϕ, it follows that u0 is a solution of the singular problem (1λ ). By Claim 1 we derive that u0 ∈ C 1,β (Ω), ∀0 < β < 1. Since un u0 weakly in H01 (Ω), by the weak lower semi-continuity of · we conclude that u0 lim infn→∞ un E0 , Claim 2 and the gap structure of Nλ in turn imply that u0 ∈ Nλ+ . At this point, from Iλ (un ) → infN + Iλ λ we see that inf Iλ
Nλ+
1 1 1 1 1−γ 2 − ∇u0 2 − − h(x)u0 dx = Iλ (u0 ) 2 p 1−γ p Ω
that is, Iλ (u0 ) = infN + Iλ . This completes the proof of Theorem 1.
2
λ
Theorem 2. Suppose that λ ∈ (0, Λ). Then the singular problem (1λ ) has a solution U0 ∈ H01 (Ω) ∩ C 1,β (Ω), ∀0 < β < 1, satisfying ∇U0 2 E(λ) > E0 with E(λ) → +∞ as λ → 0. Proof. We provide only a sketch, as the arguments are by now familiar. Then, consider (Un ) ⊂ Nλ− the “best” minimizing sequence (i.e., satisfying Ekeland’s principle) for infN − Iλ . λ
Since (Un ) is bounded in H01 (Ω), after passing to a subsequence, we may assume that Un U0 weakly in H01 (Ω), and pointwise a.e. Write Un = U0 + Wn with Wn 0 weakly in H01 (Ω). 1−γ The result lim infn→∞ [(p − 2)∇Un 22 ] > (p + γ − 1) Ω h(x)U0 follows easily with an argument by contradiction. In fact suppose that lim inf (p − 2)∇Un 22 = (p + γ − 1)
Ω
that is,
1−γ
h(x)U0
n→∞
dx,
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
lim inf n→∞
1277
(p − 2)∇Un 22 = 1, 1−γ (p + γ − 1) Ω h(x)Un dx
then there exists a subsequence of Un , called Unk , such that (p − 2)∇Unk 22 → 1, 1−γ (p + γ − 1) Ω h(x)Unk dx
k → ∞.
Therefore ∇Unk 22
p+γ −1 → p−2
p
λUnk p = ∇Unk 22 −
1−γ
h(x)U0 Ω
1−γ
h(x)Unk
dx →
Ω
1+γ p−2
dx,
1−γ
h(x)U0
dx,
Ω
and (recalling u E(λ) for all u ∈ Nλ− ) consequently, p
D(λ)E p (λ) < D(λ)∇Unk 2 <
1+γ p+γ −1
p−2 p+γ −1
−1 2 p+γ 1+γ
p−2 1+γ
∇Unk 2
p
k→∞ − λUnk p − −−→ 0 p−2 1−γ ( Ω h(x)Unk dx) 1+γ
which is clearly impossible, as D(λ) > 0, E(λ) > 0 for all λ ∈ (0, Λ). Thus, we can proceed as in the proof of Theorem 1 to obtain U0 (x) > 0 e1 (x), ∀x ∈ Ω, and
Ω
h(x) γ ϕ U0
∇U0 · ∇ϕ − λ
Ω
p−1
U0
ϕ,
∀ϕ ∈ H01 (Ω), ϕ 0.
Ω
1−γ p By taking ϕ = U0 we know that ∇U0 22 − h(x)U0 − λU0 p 0. All that remains is to 1−γ prove that U0 ∈ Nλ . Arguing by contradiction and assume that a˜ 0 = ∇U0 22 − h(x)U0 − p p λU0 p > 0. Then there would exist a unique point c˜0 > 0 such that c˜02 B − λc˜0 A = −a˜ 0 . Since Iλ (Un ) → π0 := infN − Iλ with Un ∈ Nλ− (⊂ Nλ ), we have λ
π0 + o(1) = Iλ (Un ) = =
and
1 1 − 2 1−γ
1 1 − 2 1−γ
Ω
1−γ
h(x)Un Ω
1−γ h(x)U0
dx + λ
1 1 p − Un p 2 p
1 1 1 1 p p − U0 p + λ − Wn p + o(1), dx + λ 2 p 2 p
1278
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
0 = ∇Un 22
1−γ
−
h(x)Un
p
dx − λUn p
Ω p
p
= a˜ 0 + ∇Wn 22 − λWn p + o(1) a˜ 0 + SWn 2p − λWn p + o(1), which would imply that limn→∞ Wn p exists and limn→∞ Wn p c˜0 A1/p , and consequently, π0
1 1 − 2 1−γ
1−γ
h(x)U0
dx + λ
1 1 1 1 p p − U0 p + λ − c˜ A. 2 p 2 p 0
(26)
Ω
As shown in the proof of Theorem 1, for any u ∈ H01 (Ω) with au = ∇u22 − h(x)|u|1−γ − p λup > 0, we can always find 0 < cε,u < Ru such that u + cε,u Uε,a ∈ Nλ− for ε > 0 small. Subsequently, π0 Iλ (u + cε,u Uε,a )
1 1 1 1 p − − h(x)|u + cε,u Uε,a |1−γ dx + λ = u + cε,u Uε,a p 2 1−γ 2 p =
Ω
1 1 − 2 1−γ
1 1 1 1 p p − up + λ − cε,u A + o(1), dx + λ 2 p 2 p
1−γ
h(x)|u| Ω
which yields, π0
1 1 − 2 1−γ
h(x)|u|1−γ dx + λ
1 1 1 1 p p − up + λ − cu A. 2 p 2 p
(27)
Ω
Putting together (26) and (27), we obtain: π0 =
1 1 − 2 1−γ
h(x)|U0 |1−γ dx + λ
1 1 1 1 p p − U0 p + λ − c˜ A, 2 p 2 p 0
Ω
and that for every ϕ ∈ C0∞ (Ω), d dt
1 1 − 2 1−γ
h(x)|U0 + tϕ|1−γ + λ
1 1 p − U0 + tϕp 2 p
Ω
p 1 1 − A G(t) +λ =0 2 p t=0
where
2 p p G(t) B − λ G(t) A = − ∇U0 + tϕ22 − h(x)|U0 + tϕ|1−γ dx − λU0 + tϕp , Ω
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1279
and we can proceed as in (24), (25) to reach a contradiction. The desired result that U0 is a solution of the singular problem (1λ ) follows. Still no location information can be obtained for U0 . In the sequel we prove that U0 ∈ Nλ− . Claim 4. There exist ε1 > 0 and C > 0 such that
Ω
u0 (x) + RUε,a (x) u0 + RUε,a
p dx C,
∀ε ∈ (0, ε1 ), ∀R 1.
We consider two cases. First if R 1 is such that R 2 B u0 2 , we have p
p
p
u0 + RUε,a p = u0 p + R p Uε,a p + pR
+ pR p−1
p−1
u0
Uε,a dx
Ω
p−1 Uε,a u0 dx + o ε (N −2)/2
Ω
p = u0 p
p + R p A + O ε (N −2)/2 > u0 p ,
u0 + RUε,a
2
= ∇u0 22
+R
2
∇Uε,a 22
+ 2R
∇u0 · ∇Uε,a Ω
= ∇u0 22 + R 2 B + O ε (N −2)/2 < 2∇u0 22 + 1 for ε > 0 small, so
Ω
u0 + RUε,a u0 + RUε,a
p
p
dx >
u0 p (2∇u0 22 + 1)p/2
.
On the other hand, if R 1 is such that R 2 B > u0 2 , then p
p
p
u0 + RUε,a p = u0 p + R p Uε,a p + pR
+ pR p−1
p−1
u0
Uε,a
Ω
p−1 Uε,a u0 + R β o ε (N −2)/2
Ω
p = u0 p
(N −2)/2 1 p p A +O ε where β ∈ (0, p) see [4] + R A+R 2 2
1 > R p A, 2
u0 + RUε,a 2 = ∇u0 22 + R 2 ∇Uε,a 22 + 2R
∇u0 · ∇Uε,a < 2R 2 (B + 1) Ω
1280
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
for ε > 0 small, and therefore
Ω
u0 + RUε,a u0 + RUε,a
p dx >
[2(B
1 p 2R A + 1)]p/2 R p
=
1 2A
[2(B + 1)]p/2
.
Thus there exist constants C > 0 and ε1 > 0 such that for all ε ∈ (0, ε1 ) and R 1,
Ω
u0 + RUε,a u0 + RUε,a
p dx C.
Define u 1 + Σ1 = u ∈ H0 (Ω)\{0}: u < t , u u Σ2 = u ∈ H01 (Ω)\{0}: u > t + . u It is easily verified that u . Nλ− = u ∈ H01 (Ω)\{0}: u = t + u
Nλ+ ⊂ Σ1 ,
Claim 5. There exist ε2 > 0 and R0 > 1 so that u0 + R0 Uε,a ∈ Σ2
for all ε < ε2 .
u +RU
Note that t + ( u00 +RUε,a ) satisfies ε,a
λ Ω
u0 + RUε,a u0 + RUε,a
p
= t
+
− t
u0 + RUε,a u0 + RUε,a
+
2−p
u0 + RUε,a u0 + RUε,a
−γ −p+1
Ω
u0 + RUε,a 1−γ h(x) . u0 + RUε,a
u +RU
By Claim 4, t + ( u00 +RUε,a ) is forced to be uniformly bounded from above, that is, ε,a t+
u0 + RUε,a u0 + RUε,a
C,
∀ε ∈ (0, ε1 ), ∀R 1.
On the other hand, for sufficiently large R
B 2 1 1 + O ε (N −2)/2 > R 2 B > C 2 u0 + RUε,a 2 = ∇u0 22 + R 2 B + R 2 2 2 R 2
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1281
provided ε > 0 small. Hence, there exist 0 < ε2 (< ε1 ) and R0 > 1 such that for all ε ∈ (0, ε2 ) and R R0 , u0 + RUε,a . u0 + RUε,a > t + u0 + RUε,a This readily gives u0 + RUε,a ∈ Σ2 , ∀ε ∈ (0, ε2 ), ∀R R0 . Claim 6. There exists ε3 > 0 such that ∀ε ∈ (0, ε3 ) there holds 1 N/2 1 (N −2)/2 Iλ (u0 + tR0 Uε,a ) < Iλ (u0 ) + S , N λ
∀t ∈ [0, 1].
Since u0 is a solution of (1λ ), we derive Iλ (u0 + tR0 Uε,a )
2 1 λ 1 p h(x)(u0 + tR0 Uε,a )1−γ dx − u0 + tR0 Uε,a p = ∇(u0 + tR0 Uε,a ) 2 − 2 1−γ p Ω
1 1 = ∇u0 22 + (tR0 )2 ∇Uε,a 22 + (tR0 ) 2 2
− (tR0 )
Ω
−γ h(x)u0 Uε,a dx
Ω
− λ(tR0 )
p−1
1 ∇u0 · ∇Uε,a dx − 1−γ
1−γ
h(x)u0 Ω
λ λ p p − u0 p − (tR0 )p Uε,a p − λ(tR0 ) p p
p−1
u0
dx
Uε,a dx
Ω
p−1 Uε,a u0 dx + o ε (N −2)/2
Ω
1 λ = Iλ (u0 ) + (tR0 )2 B − (tR0 )p A − λ(tR0 )p−1 u0 (a)Dε (N −2)/2 + o ε (N −2)/2 2 p with D ≡ RN (1+|x|21)(N+2)/2 dx, where we have used
h(x)(u0 + tR0 Uε,a )1−γ dx −
Ω
= (1 − γ )(tR0 )
dx
Ω −γ
h(x)u0 Ω
1−γ
h(x)u0
η(x) dx ε (N −2)/2 + o ε (N −2)/2 . N −2 |x − a|
Define q(s) =
B 2 λA p s − s − λu0 (a)Dε (N −2)/2 s p−1 , 2 p
∀s 0.
Following the argument in [27], we can estimate q(tR0 ). We provide a short proof for the reader’s B 1/(p−2) ) and sε > 0 be the unique such that q(sε ) = max∀s0 q(s). convenience. Let s0 = ( λA Clearly, sε → s0 as ε → 0. Write sε = s0 + lε with lε → 0. Since q (sε ) = 0 it follows that
1282
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
3−p B(s0 + lε )3−p − λA(s0 + lε ) − Bs0 − λAs0 = λ(p − 1)u0 (a)Dε (N −2)/2 , so lε = O(ε (N −2)/2 ). Consequently, B 2 λA p s − s − λu0 (a)Dε (N −2)/2 sεp−1 2 ε p ε λA p B 2 p−1 s0 + 2s0 lε + o ε (N −2)/2 − s0 + ps0 lε + o ε (N −2)/2 = 2 p p−1 p−2 − λu0 (a)Dε (N −2)/2 s0 + (p − 1)s0 lε + o ε (N −2)/2 1 N/2 1 (N −2)/2 p−1 = S − λu0 (a)Ds0 ε (N −2)/2 + o ε (N −2)/2 . N λ
q(tR0 ) q(sε ) =
Therefore, for all t ∈ [0, 1] we have 1 N/2 1 (N −2)/2 p−1 Iλ (u0 + tR0 Uε,a ) Iλ (u0 ) + S − λu0 (a)Ds0 ε (N −2)/2 + o ε (N −2)/2 N λ then there exists 0 < ε3 (< ε2 ) such that ∀ε ∈ (0, ε3 ) there holds p−1 1 N/2 1 (N −2)/2 λu0 (a)Ds0 ε (N −2)/2 , Iλ (u0 + tR0 Uε,a ) < Iλ (u0 ) + S − N λ 2
∀t ∈ [0, 1].
Now we locate U0 . Since from Theorem 1 and Claim 5 we have that u0 ∈ Nλ+ ⊂ Σ1 and u0 + R0 Uε,a ∈ Σ2 , there must exists tε ∈ (0, 1) such that u0 + tε R0 Uε,a ∈ Nλ− , and from Claim 5 we derive that inf Iλ < Iλ (u0 ) +
Nλ−
1 N/2 1 (N −2)/2 S . N λ
(28)
Moreover, since Un , U0 ∈ Nλ , we clearly have
0 = ∇U0 22 −
1−γ
h(x)U0
p
p
dx − λU0 p + ∇Wn 22 − λWn p + o(1)
Ω
= ∇Wn 22
p
− λWn p + o(1).
(29)
The desired result Un → U0 strongly in H01 (Ω) now follows with an argument by contradiction. In fact suppose that there exists a subsequence {Unk } with ∇Wnk 2 C > 0, and from (29) that p Wnk p C. Then, (29) yields
Wnk p
1/(p−2) S + o(1) , λ
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
1283
and ∇Wnk 22 λ
N/2 S + o(1). λ
(30)
Combining (28) and (30) we obtain 1 N/2 1 (N −2)/2 Iλ (u0 ) + S N λ > Iλ (Unk ) since Iλ (Un ) → inf Iλ =
Nλ−
1 1 1 1 1−γ 2 − ∇Unk 2 − − h(x)Unk dx 2 p 1−γ p Ω
1 1 − ∇Wnk 22 + o(1) (here it is essential that U0 ∈ Nλ !) 2 p 1 1 1 1 − ∇Wnk 22 + o(1) = Iλ (u0 ) + − ∇Wnk 22 + o(1) inf Iλ + 2 p 2 p Nλ N/2 S 1 1 1 N/2 1 (N −2)/2 − λ + o(1) = Iλ (u0 ) + S + o(1) Iλ (u0 ) + 2 p λ N λ
= Iλ (U0 ) +
a contradiction. The gap structure of Nλ ensures that U0 ∈ Nλ− ; therefore u0 and U0 define two different solutions for the singular problem (1λ ). This completes the proof of Theorem 2. 2 4. Estimate for λ∗ (Ω, p, γ , h) Combining the above results we provide the estimate for λ∗ (N, Ω, γ , h): Theorem 3. For all Ω ∈ L, all γ ∈ (0, 1), p = distα (x, ∂Ω) with α − γ 0 we have λ∗ (Ω, p, γ , h)
1+γ p+γ −1
p−2 p+γ −1
2N N −2 ,
p−2 1+γ
and all functions h ∈ L∞ (Ω) like
S |Ω|2/N
p+γ −1 1+γ
1 h∞
p−2 1+γ
.
Acknowledgments This work was supported by the National Science Foundation of China grants 10601063 and 10971238. The first author thanks Dr. Duanzhi Zhang for insightful discussions. The authors thank the referee for useful suggestions. References [1] C.O. Alves, A. El Hamidi, Nehari manifold and existence of positive solutions to a class of quasilinear problems, Nonlinear Anal. 60 (2005) 611–624.
1284
Y.J. Sun, S.P. Wu / Journal of Functional Analysis 260 (2011) 1257–1284
[2] R. Aris, The Mathematical Theory of Diffusion and Reaction in Permeable Catalysts, Clarendon Press, Oxford, 1975. [3] J.P. Aubin, I. Ekeland, Applied Nonlinear Analysis, Pure Appl. Math., Wiley–Interscience Publications, 1984. [4] M. Badiale, G. Tarantello, Existence and multiplicity results for elliptic problems with critical growth and discontinuous nonlinearities, Nonlinear Anal. 29 (1997) 639–677. [5] H. Brezis, E. Lieb, A relation between pointwise convergence of functionals and convergence of functionals, Proc. Amer. Math. Soc. 28 (1983) 486–490. [6] H. Brezis, L. Nirenberg, H 1 versus C 1 local minimizers, C. R. Acad. Sci. Paris 317 (1993) 465–472. [7] K.J. Brown, Y. Zhang, The Nehari manifold for a semilinear elliptic equation with a sign-changing weight function, J. Differential Equations 193 (2003) 481–499. [8] A. Canino, Minimax methods for singular elliptic equations with an application to a jumping problem, J. Differential Equations 221 (2006) 210–223. [9] Y.S. Choi, A.C. Lazer, P.J. Mckenna, Some remarks on a singular elliptic boundary value problem, Nonlinear Anal. 3 (1998) 305–314. [10] M.M. Coclite, G. Palmieri, On a singular nonlinear Dirichlet problem, Comm. Partial Differential Equations 14 (1989) 1315–1327. [11] M.G. Crandall, P.H. Rabinowitz, L. Tatar, On a Dirichlet problem with a singular nonlinearity, Comm. Partial Differential Equations 2 (1977) 193–222. [12] M. del Pino, A global estimate for the gradient in a singular elliptic boundary value problem, Proc. Roy. Soc. Edinburgh Sect. A 122 (1992) 341–352. [13] J.I. Diaz, J.M. Morel, L. Oswald, An elliptic equation with singular nonlinearity, Comm. Partial Differential Equations 12 (1987) 1333–1344. [14] F. Gazzola, A. Malchiodi, Some remarks on the equation −u = λ(1 + u)p for varying λ, p and varying domains, Comm. Partial Differential Equations 27 (2002) 809–845. [15] J. Giacomoni, K. Saoudi, Multiplicity of positive solutions for a singular and critical problem, Nonlinear Anal. 71 (2009) 4060–4077. [16] S.M. Gomes, On a singular nonlinear elliptic problem, SIAM J. Math. Anal. 17 (1986) 1359–1369. [17] J. Graham-Eagle, A variational approach to upper and lower solutions, IMA J. Appl. Math. 44 (1990) 181–184. [18] C. Gui, F. Lin, Regularity of an elliptic problem with a singular nonlinearity, Proc. Roy. Soc. Edinburgh Sect. A 123 (1993) 1021–1029. [19] J. Hernández, F.J. Mancebo, J.M. Vega, Positive solutions for singular nonlinear elliptic equations, Proc. Roy. Soc. Edinburgh Sect. A 137 (2007) 41–62. [20] N. Hirano, C. Saccon, N. Shioji, Existence of multiple positive solutions for singular elliptic problems with a concave and convex nonlinearities, Adv. Differential Equations 9 (2004) 197–220. [21] A.C. Lazer, P.J. Mckenna, On a singular nonlinear elliptic boundary value problem, Proc. Amer. Math. Soc. 111 (1991) 720–730. [22] W.L. Perry, A monotone iterative technique for solution of pth order (p < 0) reaction–diffusion problems in permeable catalysis, J. Comput. Chem. 5 (1984) 353–357. [23] J.P. Shi, M.X. Yao, On a singular semilinear elliptic problem, Proc. Roy. Soc. Edinburgh Sect. A 128 (1998) 1389– 1401. [24] Y.J. Sun, S.J. Li, Some remarks on a superlinear-singular problem: Estimates for λ∗ , Nonlinear Anal. 69 (2008) 2636–2650. [25] Y.J. Sun, S.J. Li, A nonlinear elliptic equation with critical exponent: estimates for extremal values, Nonlinear Anal. 69 (2008) 1856–1869. [26] Y.J. Sun, S.P. Wu, Y.M. Long, Combined effects of singular and superlinear nonlinearities in some singular boundary value problems, J. Differential Equations 176 (2001) 511–531. [27] G. Tarantello, On nonhomogeneous elliptic equations involving critical Sobolev exponent, Ann. Inst. H. Poincaré Anal. Non Linéaire 9 (1992) 281–304. [28] H.T. Yang, Multiplicity and asymptotic behavior of positive solutions for a singular semilinear elliptic problem, J. Differential Equations 189 (2003) 487–512.
Journal of Functional Analysis 260 (2011) 1285–1303 www.elsevier.com/locate/jfa
Operators whose dual has non-separable range ✩ Pandelis Dodos Department of Mathematics, University of Athens, Panepistimiopolis 157 84, Athens, Greece Received 17 November 2009; accepted 7 December 2010 Available online 18 December 2010 Communicated by Gilles Godefroy
Abstract Let X and Y be separable Banach spaces and T : X → Y be a bounded linear operator. We characterize the non-separability of T ∗ (Y ∗ ) by means of fixing properties of the operator T . © 2010 Elsevier Inc. All rights reserved. Keywords: Operators; Trees; Schauder bases
1. Introduction The study of fixing properties of certain classes of operators1 between separable Banach spaces is a heavily investigated part of Banach Space Theory which is closely related to some central questions, most notably with the problem of classifying, up to isomorphism, all complemented subspaces of classical function spaces (see [28] for an excellent exposition). Typically, one has an operator T : X → Y which is “large” in a suitable sense and tries to find a concrete object that the operator T preserves. Various versions of this problem have been studied in the literature and several satisfactory answers have been obtained; see, for instance, [1,4,5,13–16,23,24]. Among them, there are two fundamental results that deserve special attention. The first one is due to A. Pełczy´nski and asserts that every non-weakly compact operator T : C[0, 1] → Y must fix a copy2 of c0 . The second result is due to H. P. Rosenthal and asserts ✩
Research supported by NSF grant DMS-0903558. E-mail address:
[email protected]. 1 Throughout the paper by the term operator we mean bounded, linear operator. 2 An operator T : X → Y is said to fix a copy of a Banach space E if there exists a subspace Z of X which is isomorphic to E and is such that T |Z is an isomorphic embedding. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.004
1286
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
that every operator T : C[0, 1] → Y whose dual T ∗ has non-separable range must fix a copy of C[0, 1]. The present paper is a continuation of this line of research and is devoted to the study of the following problem. Problem 1. Let X and Y be separable Banach spaces and T : X → Y be an operator such that T ∗ has non-separable range. What kind of fixing properties does the operator T have? To state our main results we need to fix some pieces of notation and introduce some terminology. By 2
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1287
The assumption in Theorem 3 that the space X does not contain a copy of 1 is not redundant. Indeed, if Q : 1 → J T is a quotient map, then the dual operator Q∗ of Q has non-separable range yet Q is strictly singular3 and fixes no copy of a sequence topologically equivalent to the basis of James tree. Observe, however, that in this case there exists a bounded sequence (xt )t∈2
1288
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
2.1.1. Downwards closed subtrees A non-empty subset R of 2
(1)
The family A⊥ is called the orthogonal of A. Clearly A⊥ is hereditary. Moreover, it is invariant under finite changes; that is, if B ∈ A⊥ and C ∈ [S]∞ are such that B C is finite, then C ∈ A⊥ . We recall the following class of hereditary families introduced in [11]. Definition 5. We say that a hereditary family A of infinite subsets of S is an M-family if for every sequence (An ) in A there exists A ∈ A whose all but finitely many elements are in nk An for every k ∈ N. The notion of an M-family is the “hereditary” analogue of the notion of a happy family (also known as selective co-ideal) introduced by A.R.D. Mathias [21]. We isolate, for future use, the following easy fact (see [11, Fact 3]).
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1289
Fact 6. Let A ⊆ [S]∞ be a hereditary family. Then the following are equivalent. (i) The family A is an M-family. (ii) For every sequence (An ) in A there exists A ∈ A such that A ∩ An = ∅ for infinitely many n ∈ N. Much of our interest on M-families stems from the fact that they possess strong structural properties. To state the particular property we need, we recall the following notion. Definition 7. Let A, B ⊆ [S]∞ be two hereditary and orthogonal families. A perfect Lusin gap inside (A, B) is a continuous, one-to-one map 2N σ → (Aσ , Bσ ) ∈ A × B such that the following are satisfied. (1) For every σ ∈ 2N we have Aσ ∩ Bσ = ∅. (2) For every σ, τ ∈ 2N with σ = τ we have (Aσ ∩ Bτ ) ∪ (Aτ ∩ Bσ ) = ∅. The notion of a perfect Lusin gap is due to S. Todorcevic [29] though it can be traced on earlier work of K. Kunen. It is relatively easy to see that if A, B ⊆ [S]∞ are hereditary and orthogonal families and there exists a perfect Lusin gap inside (A, B), then A is not countably generated in B ⊥ . We will need the following theorem which establishes the converse for certain pairs of orthogonal families (see [11, Theorem I]). Theorem 8. Let A, B ⊆ [S]∞ be two hereditary and orthogonal families. Assume that A is analytic4 and that B is an M-family and C-measurable5 . Then, either (i) A is countably generated in B ⊥ , or (ii) there exists a perfect Lusin gap inside (A, B). 2.3. Increasing and decreasing antichains of a regular dyadic tree We recall the following classes of antichains of the Cantor tree introduced in [2, §3]. Definition 9. Let D be a regular dyadic subtree of the Cantor tree. An infinite antichain (sn ) of D will be called increasing if the following conditions are satisfied. (1) For every n, m ∈ N with n < m we have |sn |D < |sm |D . (2) For every n, m, l ∈ N with n < m < l we have |sn |D |sm ∧D sl |D . (3I) For every n, m ∈ N with n < m we have sn ≺ sm . The set of all increasing antichains of D will be denoted by Incr(D). Respectively, an infinite antichain (sn ) of D will be called decreasing if (1) and (2) above are satisfied and condition (3I) is replaced by the following. (3D) For every n, m ∈ N with n < m we have sm ≺ sn . The set of all decreasing antichains of D will be denoted by Decr(D). 4 A subset A of a Polish space X is said to be analytic if there exists a Borel map f : NN → X such that f (NN ) = A. The complement of an analytic set is said to be co-analytic. 5 A subset of a Polish space is said to be C-measurable if it belongs to the smallest σ -algebra that contains the open sets and is closed under the Souslin operation. All analytic and co-analytic sets are C-measurable (see [19]).
1290
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
We will need the following stability properties of the above defined classes of antichains (see [2, Lemma 8]). Lemma 10. Let D be a regular dyadic subtree of 2
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1291
Lemma 13. Let X and Y be Banach spaces and T : X → Y be an operator. Assume that there exists a bounded sequence (xt )t∈2
Therefore, there exist t0 ∈ 2
1292
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
in [6,22,26]. In what follows, we will use these results without giving an explicit reference, unless there is some particular need to do so. We are going to introduce four families of infinite subsets of N which are naturally associated to the sequences (dn ) and (rn ). These families will play a decisive rôle in the proof. The first one is defined by D = L ∈ [N]∞ : the sequence (dn )n∈L is weak∗ convergent (2) while the second one is defined by R = L ∈ [N]∞ : the sequence (rn )n∈L is weak∗ convergent .
(3)
Before we give the definition of the next two families, we will isolate some basic properties of D and R. Fact 15. The families D and R are hereditary, co-analytic and cofinal in [N]∞ . Proof. It is clear that both D and R are hereditary. It is also easy to see that they are cofinal in [N]∞ . To see that D is co-analytic notice that L∈D
⇔
the sequence (dn )n∈L is weak Cauchy
⇔
∀x ∗ ∈ BX∗ ∀ε > 0 ∃k ∈ N such that ∗ x (dn ) − x ∗ (dm ) < ε for every n, m ∈ L with n, m k.
The same argument shows that R is co-analytic. The proof is completed.
2
By Fact 15, we see that the family D ∩ R is hereditary, co-analytic and cofinal in [N]∞ . We will need the following stronger property which is essentially a consequence of the deep effective version of the Bourgain–Fremlin–Talagrand Theorem due to G. Debs [7,8]. Lemma 16. There exists a hereditary, Borel and cofinal subfamily F of D ∩ R. In particular, the family F is hereditary, Borel and cofinal in [N]∞ . Proof. We have already observed that BX∗∗ consists only of Baire-1 functions and that the sequence (dn ) is dense in BX∗∗ . As it was explained in [9, Remark 1(2)], by Debs’ Theorem [7] (see also [8]) there exists a hereditary, Borel and cofinal subfamily F0 of D. With the same reasoning, we see that there exists a hereditary, Borel and cofinal subfamily F1 of R. We set F = F0 ∩ F1 . Clearly the family F is as desired. The proof is completed. 2 We proceed to define the next two families we mentioned before. The third one is defined by (4) D0 = L ∈ [N]∞ : the sequence (dn )n∈L is weakly null . Finally, we set R0 = L ∈ [N]∞ : the sequence (rn )n∈L is weakly null . We isolate, below, some structural properties of D0 and R0 .
(5)
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1293
Lemma 17. Both D0 and R0 are hereditary, co-analytic and M-families. Moreover, we have D0 ⊆ R0 . Proof. It is clear that D0 ⊆ R0 and that D0 and R0 are hereditary. Arguing as in the proof of Fact 15, it is easy to see that they are co-analytic. It remains to check that they are M-families. We will argue only for the family D0 (the case of R0 is similarly treated). By Fact 6, it is enough to show that for every sequence (An ) in D0 there exists A ∈ D0 such that A ∩ An = ∅ for infinitely many n ∈ N. So, let (An ) be one. We may assume that An ∩ Am = ∅ if n = m. For every n ∈ N let {a0n < a1n < · · ·} be the increasing enumeration of the set An and set xkn = dakn for every k ∈ N. Since An ∈ D0 the sequence (xkn ) is weakly null. By Theorem 12, there exists a sequence (ni , ki ) n in N × N with ni < ki < ni+1 and such that the sequence (xkii ) is also weakly null. We set A = {aknii : i ∈ N}. Then A ∈ D0 and Ani ∩ A = ∅ for every i ∈ N. The proof is completed. 2 We are about to introduce one more family of infinite subsets of N. Let F be the family obtained by Lemma 16. We set A = F \ R0 .
(6)
The following lemma is the main technical step towards the proof of Theorem 3. Lemma 18. There exists a perfect Lusin gap inside (A, D0 ). Proof. It is clear that A and D0 are hereditary and orthogonal. By Lemma 16 and Lemma 17, we see that A is analytic and D0 is co-analytic and M-family. By Theorem 8, the proof will be completed once we show that A is not countably generated in D0⊥ . To show this we will argue by contradiction. So, assume that there exists a sequence (Mk ) in D0⊥ such that for every L ∈ A there exists k ∈ N with L ⊆∗ Mk . For every k ∈ N let Kk be the weak∗ closure of the set {dn : n ∈ Mk } in X ∗∗ . Claim 19. For every k ∈ N there exist Fk ⊆ X ∗ finite and εk > 0 such that Kk ∩ W (0, Fk , εk ) = ∅ where W (0, Fk , εk ) = {x ∗∗ ∈ X ∗∗ : |x ∗∗ (x ∗ )| < εk for every x ∗ ∈ Fk }. Proof of Claim 19. Fix k ∈ N. It is enough to show that 0 ∈ / Kk . To see this assume, towards a contradiction, that 0 ∈ Kk . Since Kk ⊆ BX∗∗ there exists N ∈ [Mk ]∞ such that N ∈ D0 . This contradicts the fact that Mk ∈ D0⊥ . The proof of Claim 19 is completed. 2 Let Z be the norm closure of the linear span of the set F=
k
Clearly Z is a norm-separable subspace of X ∗ . Claim 20. We have T ∗ (Y ∗ ) ⊆ Z.
Fk .
1294
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
Granting Claim 20, the proof of Lemma 18 is completed. Indeed, the inclusion T ∗ (Y ∗ ) ⊆ Z and the norm-separability of Z yield that T ∗ has separable range. This contradicts our assumption on the operator T . It remains to prove Claim 20. Again we will argue by contradiction. So, assume that T ∗ (Y ∗ ) Z. There exist y ∗ ∈ Y ∗ , x ∗∗ ∈ X ∗∗ and δ > 0 such that (a) T ∗ (y ∗ ) = x ∗∗ = 1, (b) Z ⊆ Ker(x ∗∗ ), and (c) x ∗∗ (T ∗ (y ∗ )) > δ. By (a) above, we may select L ∈ [N]∞ such that the sequence (dn )n∈L is weak∗ convergent to x ∗∗ . By (c), we may assume that y ∗ (T (dn )) = y ∗ (rn ) > δ for every n ∈ L, and so, [L]∞ ∩ R0 = ∅. By Lemma 16, the family F is hereditary and cofinal in [N]∞ . Hence, there exists A ∈ [L]∞ such that [A]∞ ⊆ A. Recall that the sequence (Mk ) generates A. Therefore, there exists k0 ∈ N such that A ⊆∗ Mk0 . We select N ∈ [A]∞ with N ⊆ Mk0 . By Claim 19, the set Fk0 is finite and dn ∈ / W (0, Fk0 , εk0 ) for every n ∈ N . Hence, there exist x0∗ ∈ Fk0 and M ∈ [N ]∞ such ∗ that |x0 (dn )| εk0 for every n ∈ M. Since the sequence (dn )n∈L is weak∗ convergent to x ∗∗ and M ∈ [L]∞ we get that |x ∗∗ (x0∗ )| εk0 . In particular, x0∗ ∈ / Ker(x ∗∗ ) and x0∗ ∈ Fk0 ⊆ F ⊆ Z. This contradicts property (b) above. Having arrived to the desired contradiction, the proof of Claim 20 is completed, and as we have already indicated, the proof of Lemma 18 is also completed. 2 We fix a perfect Lusin gap 2N σ → (Aσ , Bσ ) ∈ A × D0 whose existence is guaranteed by Lemma 18. We recall the following properties of this assignment. (P1) The map 2N σ → (Aσ , Bσ ) ∈ [N]∞ × [N]∞ is one-to-one and continuous. (P2) For every σ ∈ 2N we have Aσ ∩ Bσ = ∅. (P3) For every σ, τ ∈ 2N with σ = τ we have (Aσ ∩ Bτ ) ∪ (Aτ ∩ Bσ ) = ∅. Let σ ∈ 2N be arbitrary. Since Aσ ∈ A ⊆ (D ∩ R) \ R0 and D0 ⊆ R0 we see that there exist two non-zero vectors xσ∗∗ ∈ X ∗∗ and yσ∗∗ ∈ Y ∗∗ such that xσ∗∗ = weak∗ − lim dn n∈Aσ
and yσ∗∗ = weak∗ − lim rn . n∈Aσ
(7)
Notice that yσ∗∗ = T ∗∗ xσ∗∗ .
(8)
The following lemma is a consequence of properties (P2) and (P3) and it is a typical application of related combinatorics (see, for instance, [12, Lemma 3.2] and the references therein). Lemma 21. For every uncountable subset U of 2N there exists a sequence (σn ) in U such that the sequences (xσ∗∗n ) and (yσ∗∗n ) are both weak∗ convergent to 0. Proof. By (8) and the weak∗ continuity of the operator T ∗∗ , it is enough to find a sequence (σn ) in U such that the sequence (xσ∗∗n ) is weak∗ convergent to 0. To this end, it suffices to show that 0 belongs to the weak∗ closure of the set {xσ∗∗ : σ ∈ U } in X ∗∗ . Assume, towards a contradiction,
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1295
that this is not the case. It is then possible to select a weak∗ open subset W of X ∗∗ and a weak∗ closed subset F of X ∗∗ such that 0 ∈ W ⊆ F and xσ∗∗ ∈ / F for every σ ∈ U . We set / F } and B = {n ∈ N: dn ∈ W} A = {n ∈ N: dn ∈
(9)
/ F , we see that and we notice A ∩ B = ∅. Let σ ∈ U be arbitrary. By (7) and the fact that xσ∗∗ ∈ Aσ ⊆∗ A. Moreover, since Bσ ∈ D0 and 0 ∈ W we have Bσ ⊆∗ B. Therefore, it is possible to find k ∈ N and an uncountable subset U of U such that Aσ \ {0, . . . , k} ⊆ A
and Bσ \ {0, . . . , k} ⊆ B
(10)
for every σ ∈ U . There exist two subsets F and G of {0, . . . , k} and an uncountable subset U
of U such that Aσ ∩ {0, . . . , k} = F
and Bσ ∩ {0, . . . , k} = G
(11)
for every σ ∈ U
. Notice that F ∩ G = ∅; indeed, by (11) and property (P2), for every σ ∈ U
we have F ∩ G ⊆ Aσ ∩ Bσ = ∅. Let σ, τ ∈ U
with σ = τ . By (10) and (11), we see that (Aσ ∩ Bτ ) ∪ (Aτ ∩ Bσ ) ⊆ (F ∩ G) ∪ (A ∩ B) = ∅. This contradicts property (P3). Having arrived to the desired contradiction, the proof is completed. 2 We should point out that properties (P2) and (P3) will not be used in the rest of the proof. However, heavy use will be made of property (P1). We proceed with the following lemma. Lemma 22. There exists a perfect subset P of 2N such that xσ∗∗ = xτ∗∗ and yσ∗∗ = yτ∗∗ for every σ, τ ∈ P with σ = τ . Proof. For every subset S of 2N by [S]2 we denote the set of all unordered pairs of elements of S. We set 2 2 and Y = {σ, τ } ∈ 2N : yσ∗∗ = yτ∗∗ . X = {σ, τ } ∈ 2N : xσ∗∗ = xτ∗∗ The sets X and Y are analytic in [2N ]2 , in the sense that the sets
(σ, τ ) ∈ 2N × 2N : {σ, τ } ∈ X
and
(σ, τ ) ∈ 2N × 2N : {σ, τ } ∈ Y
are both analytic subsets of 2N × 2N . Indeed, by (7), we have {σ, τ } ∈ X
⇔
∃x ∗ ∈ BX∗ ∃ε > 0 ∃k ∈ N such that x ∗ (dn ) − x ∗ (dm ) ε
for every n ∈ Aσ and every m ∈ Aτ
with n, m k.
Since the map 2N σ → Aσ ∈ [N]∞ is continuous, the above equivalence yields that the set X is analytic. With the same reasoning and using the continuity of the map 2N σ → Bσ ∈ [N]∞
1296
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
we see that Y is also analytic. By a result of F. Galvin (see [19, Theorem 19.7]), there exists a perfect subset P of 2N such that one of the following cases occur. C ASE 1: [P ]2 ∩ X = ∅. In this case we see that there exists a non-zero vector x ∗∗ ∈ X ∗∗ such that xσ∗∗ = x ∗∗ for every σ ∈ P . This is impossible by Lemma 21. C ASE 2: [P ]2 ∩ Y = ∅. As above, we see that there exists a non-zero vector y ∗∗ ∈ Y ∗∗ such that yσ∗∗ = y ∗∗ for every σ ∈ P . This is also impossible. C ASE 3: [P ]2 ⊆ (X ∩ Y). Notice that, in this case, we have xσ∗∗ = xτ∗∗ and yσ∗∗ = yτ∗∗ for every σ, τ ∈ P with σ = τ . Therefore, the perfect set P is as desired. The proof is completed. 2 So far we have been working with the perfect Lusin gap inside (A, D0 ). The next lemma we will unable us to start the process for selecting the sequence (xt )t∈2
The sequence (kt )t∈2
2
Let (kt )t∈2
(12)
The desired sequence (xt )t∈2
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1297
Lemma 24. There exist a regular dyadic subtree D0 of 2
0 such that T (et ) θ for every t ∈ D0 . Proof. We will show that there exist s0 ∈ 2 0 such that for every t ∈ 2 0 there exists t ∈ 2
tk ∈ 2 N .
k∈N ∗∗ . By property (P4), the sequence (T (eτ |n )) is weak∗ convergent to the non-zero vector yh(τ ) ∗∗ = 0, a contradiction. The Hence, so is the sequence (T (etk )). By (b) above, we see that yh(τ ) proof is completed. 2
Lemma 25. There exists a regular dyadic subtree D1 of 2
⇔
the sequence (esn )
is weakly null.
It is easy to check that C is a co-analytic subset of D0N . Applying Theorem 11 for the increasing antichains of D0 and the color C, we find a regular dyadic subtree R of 2
By part (ii) of Lemma 10, there exists a sequence (sn ) in S such that either (sn ) ∈ Incr(D1 ) or
1298
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
(sn ) ∈ Decr(D1 ). If (sn ) ∈ Incr(D1 ), then, by part (iii) of Lemma 10, we see that Incr(R) ∩ C = ∅ and so Incr(D1 ) ⊆ Incr(R) ⊆ C. Otherwise, Decr(D1 ) ∩ C = ∅ which yields that Decr(D1 ) ⊆ C. The proof of Claim 26 is completed. 2 Next we strengthen the conclusion of Claim 26 as follows. Claim 27. We have Incr(D1 ) ⊆ C and Decr(D1 ) ⊆ C. Proof of Claim 27. By Claim 26, either Incr(D1 ) ⊆ C or Decr(D1 ) ⊆ C. As the argument is symmetric, we will assume that Incr(D1 ) ⊆ C. Recursively, for every n ∈ N we select an infinite antichain (tkn ) of D1 such that the following are satisfied. (a) For every n ∈ N we have (tkn ) ∈ Incr(D1 ).
(b) For every n, n ∈ N with n < n and every k, l ∈ N we have tkn ≺ tln . The recursive selection is fairly standard and the details are left to the reader. By (a) above and our assumption that Incr(D1 ) ⊆ C, we see that for every n ∈ N the sequence (etkn ) is weakly null. By Theorem 12, there exists a sequence (ni , ki ) in N × N with ni < ki < ni+1 for every i ∈ N and such that the sequence (et ni ) is also weakly null. By (b), we see that ki
n
(c) tk i ≺ tknii for every i, i ∈ N with i < i . i
By part (ii) of Lemma 10, there exists a subsequence of (tknii ), denoted for simplicity by (sm ), such that either (sm ) ∈ Incr(D1 ) or (sm ) ∈ Decr(D1 ). Invoking (c), we get that (sm ) ∈ Decr(D1 ). Since the sequence (esm ) is weakly null, we conclude that Decr(D1 ) ∩ C = ∅ and so Decr(D1 ) ⊆ C. The proof of Claim 27 is completed. 2 We are now ready to check that the sequence (et )t∈A is weakly null for every infinite antichain A of D1 . So let A be one. Let B be an arbitrary infinite subset of A. By part (ii) of Lemma 10, there exists an infinite sequence (sn ) in B such that either (sn ) ∈ Incr(D1 ) or (sn ) ∈ Decr(D1 ). By Claim 27, we see that the sequence (esn ) is weakly null. In other words, every subsequence of (et )t∈A has a further weakly null subsequence. This yields that the entire sequence (et )t∈A is weakly null. Thus, the proof of Lemma 25 is completed. 2 As we have already mentioned in the introduction, by ϕ : 2
θ T (et ) T and θ · T −1 et 1.
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1299
Let t ∈ D1 be arbitrary. We select an infinite antichain A of D1 such that t < s for every s ∈ A. By Lemma 25, the sequences (xs )s∈A and (T (xs ))s∈A are both weakly null. Using this observation and the classical procedure of Mazur for selecting basic sequences (see [20]), the result follows. 2 Let D2 = {st : t ∈ 2
(13)
We will show that the sequence (xt )t∈2
sσ |n ∈ 2N
n∈N
and we notice that (xσ |n ) is a subsequence of (eτσ |n ). By property (P4), we see that the sequences ∗∗ ∗∗ (xσ |n ) and (T (xσ |n )) are weak∗ convergent to the non-zero vectors xh(τ and yh(τ respectively. σ) σ) ∗∗ ∗∗ ∗∗ Next we check that xh(τσ ) ∈ X \ X. Assume on the contrary that xh(τσ ) ∈ X. Let (tn ) be the enumeration on 2
1300
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
C ASE 1: There exists a subsequence (rln ) of (rn ) which is equivalent to the standard unit vector basis of 1 . Let E be the closed subspace of X spanned by the corresponding subsequence (dln ) of (dn ). Notice that E is isomorphic to 1 and that T : E → Y is an isomorphic embedding. Hence, in this case we see that the operator T fixes a copy of 1 . C ASE 2: No subsequence of (rn ) is equivalent to the standard unit vector basis of 1 . We will show that there exists a bounded sequence (xt )t∈2
(14)
We have the following analogue of Lemma 18. Lemma 29. There exists a perfect Lusin gap inside (A , R0 ). Granting Lemma 29, the rest of the proof of Theorem 4 is the same to that of Theorem 3 mutatis mutandis. So, what remains is to prove Lemma 29. By Theorem 8, it is enough to show that the family A is not countably generated in the family R⊥ 0 . If this is not the case, then there exists a sequence ⊥
(Nk ) in R0 such that for every L ∈ A there exists k ∈ N with L ⊆∗ Nk . For every k ∈ N let Hk be the weak∗ closure of the set {rn : n ∈ Nk } in Y ∗∗ . The fact that Nk ∈ R⊥ 0 reduces to the fact that 0 ∈ / Hk . Therefore, there exist Ek ⊆ Y ∗ finite and εk > 0 such that Hk ∩ W (0, Ek , εk ) = ∅. Let E be the norm closure of the linear span of the set E=
Ek .
k
The proof will be completed once we show that T ∗ (E) is norm dense in T ∗ (Y ∗ ). To this end, we will argue by contradiction. So, assume that there exist x ∗∗ ∈ X ∗∗ , y ∗ ∈ Y ∗ and δ > 0 such that (a) x ∗∗ = T ∗ (y ∗ ) = 1, (b) T ∗ (E) ⊆ Ker(x ∗∗ ), and (c) x ∗∗ (T ∗ (y ∗ )) > δ. Since T ∗∗ (BX∗∗ ) ⊆ H and H consists only of Baire-1 functions we may select L ∈ R such that the sequence (rn )n∈L is weak∗ convergent to T ∗∗ (x ∗∗ ). By (c) above, we may assume that y ∗ (rn ) > δ for every n ∈ L, and so, [L]∞ ∩ R0 = ∅. Since the family F is cofinal in [N]∞ and the sequence (Nk ) generates A , it is possible to select k0 ∈ N, y0∗ ∈ Ek0 and A ∈ [L]∞ such that |y0∗ (rn )| εk0 for every n ∈ A. This implies that T ∗ (y0∗ ) ∈ / Ker(x ∗∗ ) which contradicts property
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1301
(b) above. Having arrived to the desired contradiction the proof of Lemma 29 is completed, and as we have already indicated, the proof of Theorem 4 is also completed. 5. Comments 5.1. Theorem 3 and Theorem 4 were motivated by the structural results in [2,3] and our recent work on quotients of separable Banach spaces in [10] where a special case of Theorem 3 was proved and applied. Results of this type are, typically, used to reduce the existence of an uncountable family to the existence of a canonical countable object which is much more amenable to combinatorial manipulations. 5.2. We have already mentioned in the introduction that if an operator T : X → Y fixes a copy of a sequence (xt )t∈2
2
1302
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
By Claim 31, Claim 32 and the fact that K and H consist only of Baire-functions, we may apply Lemma 19 in [2] to infer that the map K xt → T (xt ) ∈ H is extended to a weak∗ homeomorphism Φ : K → H. Using the weak∗ continuity of T ∗∗ we see that T ∗∗ |K = Φ. The proof of Lemma 30 is completed. 2 5.3. Recall that a non-empty finite subset s of 2
p 1/p d x(t) i=0 t∈si
where the above supremum is taken over all families (si )di=0 of pairwise disjoint segments of 2
P. Dodos / Journal of Functional Analysis 260 (2011) 1285–1303
1303
[16] I. Gasparis, Operators on C(K) spaces preserving copies of Schreier spaces, Trans. Amer. Math. Soc. 357 (2005) 1–30. [17] R.C. James, A separable somewhat reflexive Banach space with non-separable dual, Bull. Amer. Math. Soc. 80 (1974) 738–743. [18] V. Kanellopoulos, Ramsey families of subtrees of the dyadic tree, Trans. Amer. Math. Soc. 357 (2005) 3865–3886. [19] A.S. Kechris, Classical Descriptive Set Theory, Grad. Texts in Math., vol. 156, Springer-Verlag, 1995. [20] J. Lindenstrauss, L. Tzafriri, Classical Banach Spaces, vol. I: Sequence Spaces, Ergeb. Math. Grenzgeb., vol. 92, Springer, 1977. [21] A.R.D. Mathias, Happy families, Ann. Math. Logic 12 (1977) 59–111. [22] E. Odell, H.P. Rosenthal, A double-dual characterization of separable Banach spaces not containing 1 , Israel J. Math. 20 (1975) 375–384. [23] A. Pełczy´nski, Projections in certain Banach spaces, Studia Math. 32 (1960) 209–228. [24] H.P. Rosenthal, On factors of C([0, 1]) with non-separable dual, Israel J. Math. 13 (1972) 361–378. [25] H.P. Rosenthal, A characterization of Banach spaces containing 1 , Proc. Natl. Acad. Sci. USA 71 (1974) 2411– 2413. [26] H.P. Rosenthal, Pointwise compact subsets of the first Baire class, Amer. J. Math. 99 (1977) 362–378. [27] H.P. Rosenthal, Some remarks concerning unconditional basic sequences, in: Longhorn Notes, Texas Functional Analysis Seminar 1982–1983, University of Texas, 1983, pp. 15–47. [28] H.P. Rosenthal, The Banach spaces C(K), in: W.B. Johnson, J. Lindenstrauss (Eds.), Handbook of the Geometry of Banach Spaces, vol. 2, Elsevier, 2003. [29] S. Todorcevic, Analytic gaps, Fund. Math. 150 (1996) 55–66.
Journal of Functional Analysis 260 (2011) 1304–1368 www.elsevier.com/locate/jfa
On stabilization and control for the critical Klein–Gordon equation on a 3-D compact manifold Camille Laurent Laboratoire de Mathématiques d’Orsay, UMR 8628 CNRS, Université Paris-Sud, Orsay Cedex F-91405, France Received 16 April 2010; accepted 23 October 2010 Available online 5 November 2010 Communicated by J. Coron
Abstract In this article, we study the internal stabilization and control of the critical nonlinear Klein–Gordon equation on 3-D compact manifolds. Under a geometric assumption slightly stronger than the classical geometric control condition, we prove exponential decay for some solutions bounded in the energy space but small in a lower norm. The proof combines profile decomposition and microlocal arguments. This profile decomposition, analogous to the one of Bahouri and Gérard (1999) [2] on R3 , is performed by taking care of possible geometric effects. It uses some results of S. Ibrahim (2004) [21] on the behavior of concentrating waves on manifolds. © 2010 Elsevier Inc. All rights reserved. Résumé Dans cet article, on étudie la stabilisation et le contrôle interne de l’équation de Klein–Gordon critique sur des variétés de dimension 3. Sous des conditions géométriques légèrement plus fortes que la condition de contrôle géométrique classique, on prouve la décroissance exponentielle de solutions bornées dans l’espace d’énergie mais petites dans des normes plus faibles. La preuve combine la décomposition en profils et des arguments microlocaux. Cette décomposition, analogue à celle de Bahouri et Gérard (1999) [2] sur R3 , nécessite l’analyse de certains effets dus à la géométrie. Elle utilise des résultats de S. Ibrahim (2004) [21] sur le comportement d’ondes de concentration sur les variétés. © 2010 Elsevier Inc. All rights reserved. Keywords: Control; Stabilization; Critical nonlinear Klein–Gordon equation; Concentration-compactness
E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.019
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1305
0. Introduction In this article, we study the internal stabilization and exact controllability for the defocussing critical nonlinear Klein–Gordon equation on some compact manifolds:
2u = ∂t2 u − u = −u − |u|4 u on [0, +∞[ × M, u(0), ∂t u(0) = (u0 , u1 ) ∈ E,
(1)
where is the Laplace–Beltrami operator on M and E is the energy space H 1 (M) × L2 (M). The solution displays a conserved energy E(t) =
1 2
|∂t u|2 +
M
|u|2 +
M
1 |∇u|2 + |u|6 . 6
M
(2)
M
This problem was already treated in the subcritical case by B. Dehman, G. Lebeau and E. Zuazua [11]. The problem is posed in a different geometry but their proof could easily be transposed in our setting. Yet, their result fails to apply to the critical problem for two main reasons, as explained in their paper: (a) The bootstrap argument they employed to improve the regularity of solutions vanishing in the zone of control ω so that the existing results on unique continuation apply, does not work for this critical exponent. (b) They cannot use the linearizability results by P. Gérard [19] to deduce that the microlocal defect measure for the nonlinear problem propagates as in the linear case. In this paper, we propose a strategy to avoid the second difficulty at the cost of an additional condition for the subset ω. It was already performed by B. Dehman and P. Gérard [8] in the case of R3 with a flat metric. In fact, in that case, this defect of linearizability is described by the profile decomposition of H. Bahouri and P. Gérard [2]. The purpose of this paper is to extend a part of this proof to the case of a manifold with a variable metric. This more complicated geometry leads to extra difficulties, in the profile decomposition and the stabilization argument. We also mention the recent result of L. Aloui, S. Ibrahim and K. Nakanishi [1] for Rd . Their method of proof is very different and uses Morawetz-type estimates. They obtain uniform exponential decay for a damping around spatial infinity for any nonlinearity, provided the solution exists globally. This result is stronger than ours, but their method does not seem to apply to the more complicated geometries we deal with. We will need some geometrical condition to prove controllability. The first one is the classical geometric control condition of Rauch and Taylor [33] and Bardos, Lebeau and Rauch [3], while the second one is more restrictive. Assumption 0.1 (Geometric Control Condition). There exists T0 > 0 such that every geodesic travelling at speed 1 meets ω in a time t < T0 . Definition 0.1. We say that (x1 , x2 , t) ∈ M 2 × R∗+ is a couple of focus at distance t if the set
Fx1 ,x2 ,t := ξ ∈ Sx∗1 M expx1 tξ = x2
1306
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
of directions of geodesics stemming from x1 and reaching x2 in a time t has a positive surface measure. We denote by Tfocus the infimum of the t > 0 such that there exists a couple of focus at distance t. If M is compact, we have necessarily Tfocus > 0. Assumption 0.2 (Geometric control before refocusing). The open set ω satisfies the Geometric Control Condition in a time T0 < Tfocus . For example, for T3 , there is no refocusing and the geometric assumption is the classical Geometric Control Condition. Yet, for the sphere S 3 , our assumption is stronger. For example, it is fulfilled if ω is a neighborhood of {x4 = 0}. We can imagine some geometric situations where the Geometric Control Condition is fulfilled while our condition is not, for example if we take only a neighborhood of {x4 = 0, x3 0} (see Remark 0.1 and Fig. 1 for S 2 ). We do not know if the exponential decay is true in this case. The main result of this article is the following theorem. Theorem 0.1. Let R0 > 0 and ω satisfy Assumption 0.2. Then, there exist T > 0 and δ > 0 such that for any (u0 , u1 ) and (u˜ 0 , u˜ 1 ) in H 1 × L2 , with (u0 , u1 ) 1 2 R0 ; H ×L (u0 , u1 ) 2 −1 δ; L ×H
(u˜ 0 , u˜ 1 ) 1 2 R0 , H ×L (u˜ 0 , u˜ 1 ) 2 −1 δ L ×H
there exists g ∈ L∞ ([0, T ], L2 ) supported in [0, T ] × ω such that the unique strong solution of 2u + u + |u|4 u = g on [0, T ] × M, u(0), ∂t u(0) = (u0 , u1 ) satisfies (u(T ), ∂t u(T )) = (u˜ 0 , u˜ 1 ). Let us discuss the assumptions on the size. In some sense, our theorem is a high frequency controllability result and expresses in a rough physical way that we can control some “small noisy data”. In the subcritical case, two similar kind of results were proved: in Dehman, Lebeau and Zuazua [11] similar results were proved for the nonlinear wave equation but without the smallness assumption in L2 × H −1 while in Dehman and Lebeau [10], they obtained similar high frequency controllability results for the subcritical equation but in a uniform time which is actually the time of linear controllability (see also the work of the author [30] for the Schrödinger equation). Actually, this smallness assumption is made necessary in our proof because we are not able to prove the following unique continuation result. Missing theorem. u ≡ 0 is the unique strong solution in the energy space of
2u + u + |u|4 u = 0 on [0, T ] × M, ∂t u = 0 on [0, T ] × ω.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1307
In the subcritical case, this kind of theorem can be proved with Carleman estimates under some additional geometrical conditions and once the solution is known to be smooth. Yet, in the critical case, we are not able to prove this propagation of regularity. Note also that H. Koch and D. Tataru [27] managed to prove some unique continuation result in the critical case, but in the case u = 0 on ω instead of ∂t u = 0. In the case of R3 with flat metric and ω the complementary of a ball, B. Dehman and P. Gérard [8] proved this theorem using the existence of the scattering operator proved by K. Nakanishi [32], which is not available on a manifold. Moreover, as in the subcritical case, we do not know if the time of controllability does depend on the size of the data. This is actually still an open problem for several nonlinear evolution equations such as nonlinear wave or Schrödinger equation (even in the subcritical case). For the nonlinear wave equation, by finite speed of propagation, we do not expect the controllability in arbitrary short time, but at least to compare with the time of geometric control condition of the linear equation. Note that for certain nonlinear parabolic equations, it has been proved that we cannot have controllability in arbitrary short time, while it is the case for the linear equation, see [15] or [14]. The strategy for proving Theorem 0.1 consists in proving a stabilization result for a damped nonlinear Klein–Gordon equation and then, by a perturbative argument using the linear control, to bring the solution to zero once the energy of the solution is small enough. Namely, we prove Theorem 0.2. Let R0 > 0, ω satisfy Assumption 0.2 and a ∈ C ∞ (M) satisfy a(x) > η > 0 for all x ∈ ω. Then, there exist C, γ > 0 and δ > 0 such that for any (u0 , u1 ) in H 1 × L2 , with (u0 , u1 ) 2 −1 δ, (u0 , u1 ) 1 2 R0 ; H ×L L ×H the unique strong solution of 2u + u + |u|4 u + a(x)2 ∂t u = 0 on [0, T ] × M, u(0), ∂t u(0) = (u0 , u1 )
(3)
satisfies E(u)(t) Ce−γ t E(u)(0). This theorem is false for the classical nonlinear wave equation (see Section 3.1.1) and it is why we have chosen the Klein–Gordon equation instead. Let us now discuss the proof of Theorem 0.2, following B. Dehman and P. Gérard [8] for the case of R3 . We have the energy decay t E(u)(t) = E(u)(0) −
a(x)∂t u 2 .
0 M
So, the exponential decay is equivalent to an observability estimate for the nonlinear damped equation. We prove it by contradiction. We are led to proving the strong convergence to zero of a normalized sequence un of solutions contradicting observability. In the subcritical case, the argument consisted in two steps • to prove that the limit is zero by a unique continuation argument, • to prove that the convergence is actually strong by linearization and linear propagation of compactness thanks to microlocal defect measures of P. Gérard [18] and L. Tartar [36].
1308
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
By linearization, we mean (according to the terminology of P. Gérard [19]) that we have |||un − −→ 0 where vn is a solution of the linear Klein–Gordon equation with same initial data: vn ||| n→∞
2vn + vn = 0 on [0, T ] × M, vn (0), ∂t vn (0) = un (0), ∂t un (0) .
In our case, the smallness assumption in the lower regularity L2 × H −1 makes that the limit is automatically zero, which allows to skip the first step. In the subcritical case, any sequence weakly convergent to zero is linearizable. Yet, for critical nonlinearity, there exist nonlinearizable sequences. Hopefully, in the case of R3 , this defect can be precisely described. It is linked to the non-compact action of the invariants of the equation: the dilations and translations. More precisely, the work of H. Bahouri and P. Gérard [2] states that any bounded sequence un of solutions to the nonlinear critical wave equation can be decomposed into an infinite sum of: the weak limit of un , a sequence of solutions to the free wave equation and an infinite sum of profiles which are translations–dilations of fixed nonlinear solutions. This decomposition was used by the authors of [8] to get the expected result in R3 . Therefore, we are led to make an analog of this profile decomposition for compact manifolds. We begin by the definition of the profiles. Definition 0.2. Let x∞ ∈ M and (f, g) ∈ Ex∞ = (H˙ 1 × L2 )(Tx∞ M). Given [(f, g), h, x] ∈ Ex∞ × (R∗+ × M)N such that limn (hn , xn ) = (0, x∞ ). We call the associated concentrating data the class of equivalence, modulo sequences convergent to 0 in E , of sequence in E that take the form 1 x − xn −1 + o(1)E hn 2 ΨU (x) f, g hn hn
(4)
in some coordinate patch UM ≈ U ⊂ Rd containing x∞ and for some ΨU ∈ C0∞ (U ) such that ΨU (x) = 1 in a neighborhood of x∞ . (Here we have identified xn , x∞ with its image in U .) We will prove later (Lemma 1.3) that this definition does not depend on the coordinate charts and on ΨU : two sequences defined by (4) in different coordinate charts are in the same class. In what follows, we will often call concentrating data associated to [(f, g), h, x] an arbitrary sequence in this class. Definition 0.3. Let (tn ) be a bounded sequence in R converging to t∞ and (fn , gn ) a concentrating data associated to [(f, g), h, x]. A damped linear concentrating wave is a sequence vn solution of
2vn + vn + a(x)∂t vn = 0 on R × M, vn (tn ), ∂t vn (tn ) = (fn , gn ).
(5)
The associated damped nonlinear concentrating wave is the sequence un solution of
2un + un + a(x)∂t un + |un |4 un = 0 un (0), ∂t un (0) = vn (0), ∂t vn (0) .
on R × M,
If a ≡ 0, we will only write linear or nonlinear concentrating wave.
(6)
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1309
It might seem counterintuitive to take the initial data at t = 0 (and not at t = tn ) for the nonlinear concentrating wave. This will, actually, be more convenient in the nonlinear profile decomposition where we want to compare the linear and nonlinear solution with same initial data. Energy estimate yields that two representatives of the same concentrating data have the same associated concentrating wave modulo strong convergence in L∞ loc (R, E). This is not obvious for the nonlinear evolution but will be a consequence of the study of nonlinear concentrating waves. It can be easily seen that this kind of nonlinear solutions are not linearizable. Actually, it can be shown that this concentration phenomenon is the only obstacle to linearizability. We begin with the linear decomposition. Theorem 0.3. Let (vn ) be a sequence of solutions to the damped Klein–Gordon equation (5) with initial data, at time t = 0, (ϕn , ψn ) bounded in E. Then, up to extraction, there exist a sequence of damped linear concentrating waves (p (j ) ), as defined in Definition 0.3, associated to concentrating data [(ϕ (j ) , ψ (j ) ), h(j ) , x (j ) , t (j ) ], such that for any l ∈ N∗ , vn (t, x) = v(t, x) +
l
(j )
pn (t, x) + wn(l) (t, x),
(7)
j =1
∀T > 0,
lim wn(l) L∞ ([−T ,T ],L6 (M))∩L5 ([−T ,T ],L10 ) −→ 0,
n→∞
l→∞
l
(j ) (vn , ∂t vn )2 = pn , ∂t pn(j ) 2 + w (l) , ∂t w (l) 2 + o(1), n n E E E
as n → ∞,
(8) (9)
j =1
where o(1) is uniform for t ∈ [−T , T ]. The nonlinear flow map follows this decomposition up to an error term in the strong following norm |||u|||I = u L∞ (I,H 1 (M)) + ∂t u L∞ (I,L2 (M)) + u L5 (I,L10 (M)) . Theorem 0.4. Let T < Tfocus /2. Let un be the sequence of solutions to damped nonlinear Klein– (j ) Gordon equation (6) with initial data, at time 0, (ϕn , ψn ) bounded in E. Let pn be the linear (j ) damped concentrating waves (resp. v the weak limit) given by Theorem 0.3 and qn the associated nonlinear damped concentrating wave (resp. u the associated solution of the nonlinear equation with (u, ∂t u)t=0 = (v, ∂t v)t=0 ). Then, up to extraction, we have un (t, x) = u +
l
(j )
qn (t, x) + wn(l) (t, x) + rn(l) ,
(10)
j =1
lim rn(l) [−T ,T ] −→ 0
n→∞ (l)
where wn is given by Theorem 0.3.
l→∞
(11)
1310
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
The same theorem remains true if M is the sphere S 3 and a ≡ 0 (undamped equation) without any assumption on the time T . The more precise result we get for the sphere S 3 will not be useful for the proof of our controllability result. Yet, we have chosen to give it because it is the only case where we are able to describe what happens when some refocusing occurs. This profile decomposition has already been proved for the critical wave equation on R3 by H. Bahouri and P. Gérard [2] and on the exterior of a convex obstacle by I. Gallagher and P. Gérard [17]. The same decomposition has also been performed for the Schrödinger equation by S. Keraani [26] and quite recently for the wave maps by Krieger and Schlag [28]. Note that such decomposition has proved to be useful in different contexts: the understanding of the precise behavior near the threshold for well-posedness for focusing nonlinear wave see Kenig and Merle [25] and Duyckaerts and Merle [13], the study of the compactness of Strichartz estimates and maximizers for Strichartz estimates, (see Keraani [26]), the global existence for wave maps [28], for NLS in the hyperbolic space [23]. . . Maybe our decomposition on manifolds could be useful in one of these contexts. Let us also mention that, this kind of decomposition appears for a long time in the context of Palais–Smale sequences for critical elliptic equation and optimal constant for Sobolev embedding, but with a finite number of profiles, see Brezis and Coron [4], the book [12] and the references therein. . . Let us describe quickly the proof of the decomposition. The linear decomposition of Theorem 0.3 is made in two steps: first, we decompose our sequence in a sum of an infinite number (j ) of sequences oscillating at different rate hn . Then, for each part oscillating at a fixed rate, we extract the possible concentration at certain points. We only have to prove that this process produces a rest wnl that gets smaller in the norm L∞ L6 at each stage. Once the linear decomposition is established, Theorem 0.4 says, roughly speaking, that the nonlinear flow map acts almost linearly on the linear decomposition. To establish the nonlinear decomposition we have to prove that each element of the decomposition do not interact with the others. For each element of the linear decomposition, we are able to describe the nonlinear solution arising from this element as initial data. The linear rest wnl is small in L∞ ([−T , T ], L6 ) for l large enough and so the associated nonlinear solution with same initial data is very close to the linear one. The behavior of nonlinear concentrating waves is described in [21] (see Section 2.2.1 for a short review). Before the concentration, linear and nonlinear waves are very close. For times close to the time of concentration, the nonlinear rescaled solution behaves as if the metric was flat and is subject to the scattering of R3 . After concentration, the solution is close to a linear concentrating wave but with a new profile obtained by the scattering operator on R3 . We finish this introduction by a discussion on the geometric conditions we imposed to get our main theorem. For the linear wave equation, the controllability is known to be equivalent to the so-called Geometric Control Condition (Assumption 0.1). This was first proved by Rauch and Taylor [33] in the case of a compact manifold and by Bardos, Lebeau and Rauch [3] for boundary control (see Burq and Gérard [5] for the necessity). For the nonlinear subcritical problem, the result of [10] only requires the classical Geometric Control Condition. Our assumption is stronger and we can naturally wonder if it is really necessary. It is actually strongly linked with the critical behavior and nonlinear concentrating waves. Removing this stronger assumption would require a better understanding of the scattering operator of the nonlinear equation on R3 (see Remark 0.1). However, we think that the same result could be obtained with the following weaker assumption.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1311
Fig. 1. Possible situation on the sphere.
Assumption 0.3. ω satisfies the Geometric Control Condition. Moreover, for every couple of focus (x1 , x2 , t) at distance t, according to Definition 0.1, each geodesic starting from x1 in direction ξ such that expx1 tξ = x2 meets ω in a time 0 s < t. Finally, we note that our theorem can easily be extended to the case of R3 with a metric flat at infinity. In this case, our stabilization term a(x) should fulfill the two assumptions: • there exist R > 0 and ρ > 0 such that a(x) > ρ for |x| > R, • a(x) > ρ for x ∈ ω where ω satisfies Assumption 0.2. The proof would be very similar. The only difference would come from the fact that the domain is not compact. So the profile decomposition would require the “compactness at infinity” (see property (1.6) of [2]). Moreover, the equipartition of the energy could not be made only with measures but with an explicit computation (see (3.14) of [8]). Remark 0.1. In order to know if our stronger Assumptions 0.2 or 0.3 are really necessary compared to the classical Geometric Control Condition, we need to prove that the following scenario cannot happen. We take the example of S 3 with ω a neighborhood of {x4 = 0, x3 0}. Take some data concentrating on the north pole, with a Fourier transform (on the tangent plane) supported around a direction ξ0 . The nonlinear solution will propagate linearly as long as it does not concentrate: at time t it will be supported in a neighborhood of the point x(t) where x(t) follows the geodesic stemming from the north pole at time 0 in direction ξ0 . Then, if ξ0 is well chosen, it can avoid ω during that time. Yet, at time π , the solution will concentrate again in the south pole. According to the description of S. Ibrahim [21], in a short time, the solution will be transformed following the nonlinear scattering operator on R3 . So, at time π + ε the solution is close to a linear concentrating wave but it concentrates with a new profile which is obtained with the nonlinear scattering operator on R3 . This operator is strongly nonlinear and we do not know whether the new profile will be supported in Fourier near a new direction ξ1 . If it happens, the solution will then be supported near the point y(t) where y(t) follows the geodesic stemming from the south pole at time π in direction ξ1 . In this situation, it will be possible that the trajectory y(t) still avoids ω. If this phenomenon happens several times, we would have a sequence that concentrates periodically on the north and south pole but always avoiding the region ω (which in that case satisfies Geometric Control Condition).
1312
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
We are led to the following informal question. If S is the scattering operator on R3 , then it is possible that for some data (f, g) ∈ H˙ 1 × L2 supported in Fourier near a direction ξ0 , the Fourier transform of S(f, g) is supported near another direction ξ1 . In other words, can the nonlinear wave operator change the direction of the light? Note, that in this specific example of S 3 , the use of the momentum on R3 should allow to conclude. This will be detailed in a forthcoming article. The structure of the article is as follows. The first section contains some preliminaries that will be used all along the article: the existence theorem for damped nonlinear equation, the description of the main properties of concentrating waves and the useful properties of the scales necessary for the linear decomposition. The second section contains the proof of the profile decomposition of Theorems 0.3 and 0.4. It is naturally divided in two steps corresponding to the linear decomposition and the nonlinear one. We close this section by some useful consequences of the decomposition. The third section contains the proof of the main theorems: the control and stabilization. Note that the main argument for the proof of stabilization is contained in the last Section 3: in Proposition 3.1 we apply the linearization argument to get rid of the profiles while Theorem 3.1 contains the proof of the weak observability estimates. We advise the hurried reader to have a first glance at these two proofs in order to understand the global argument. 0.1. Notation For an interval I , denote |||u|||I = u L∞ (I,H 1 (M)) + ∂t u L∞ (I,L2 (M)) + u L5 (I,L10 (M)) . Moreover, when we work in local coordinate, we will need the similar norm (except for H˙ 1 instead of H 1 ) |||u|||I ×R3 = u L∞ (I,H˙ 1 (R3 )) + ∂t u L∞ (I,L2 (R3 )) + u L5 (I,L10 (R3 )) . 0 x−x0 Note that if I = R, then |||u|||I ×R3 is invariant by the translation and scaling u → √1 u( t−t h , h ). h The energy spaces are denoted by
E = H 1 (M) × L2 (M), Ex∞ = H˙ 1 (Tx∞ M) × L2 (Tx∞ M) with the respective norms (f, g)2 = f 2 2 + ∇f 2L2 (M) + g 2L2 (M) , E L (M) (f, g)2 = ∇f 2 2 + g 2L2 (T M) . E L (T M) ∞
x∞
x∞
We will denote by ·,·E and ·,·E∞ the associated scalar products.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1313
When dealing with solutions of nonlinear wave equations on M (or on Tx∞ M), “the unique strong solution” will mean the unique solution in the Strichartz space L5loc (R, L10 (M)) (or L5loc (R, L10 (Tx∞ M))) such that (u, ∂t u) ∈ C(R, E) (or C(R, Ex∞ )). All along the article, for a point x ∈ M, we will sometimes not distinguish x with its image in a coordinate patch and will write R3 instead of Tx∞ M. M will always be smooth, compact and the number of coordinate charts we use is always assumed to be finite. We also assume that all the charts are relatively compact. In all the article, C will denote any constant, possibly depending on the manifold M and the damping function a. We will also write instead of C for a constant C. s (M) denotes the Besov space on M defined by B2,∞ 1 k k+1 ( −M )u s . s (M) = 1[0,1[ ( −M )u 2 u B2,∞ + sup [2 ,2 [ L (M) H (M) k∈N
s (R3 ) with We use the same definition for B2,∞ M replaced by R3 which can be expressed s (M) is using the Fourier transform and the Littlewood–Paley decomposition. Of course, B2,∞ s (R3 ) by the expression in coordinate charts. This will be precised in Lemma 2.1. linked with B2,∞ From now on, a = a(x) will always denote a smooth real-valued function defined on M.
1. Preliminaries 1.1. Existence theorem The existence of solutions to our equation is proved using two tools: Strichartz and Morawetz estimates. Strichartz estimates take the following form. Proposition 1.1 (Strichartz and energy estimates). Let T > 0 and (p, q) satisfy 3 1 1 + = , p q 2
p > 2.
Then, there exists C > 0 such that any solution u of
2v + v + a(x)∂t v = f on [−T , T ] × M, v(0), ∂t u(0) = (u0 , u1 )
satisfies the estimate (v, ∂t v)
L∞ ([−T ,T ],E )
+ v Lp ([−T ,T ],Lq (M)) C (u0 , u1 )E + f L1 ([−T ,T ],L2 ) .
Proof. The case with a ≡ 0 for the wave equation can be found in L.V. Kapitanski [24]. To treat the case of damped Klein–Gordon, we only have to absorb the additional terms and get the desired estimate for T small enough. We can then reiterate the operation to get the result for large times. 2
1314
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Then, we are going to prove the global existence for the equation
2u + u + |u|4 u = a(x)∂t u + g u(0), ∂t u(0) = (u0 , u1 ) ∈ E
on [−T , T ] × M,
(12)
with g ∈ L1 ([−T , T ], L2 (M)) and a ∈ C ∞ (M). The proof is now very classical, see for example [37] for a survey of the subject. The critical defocussing nonlinear wave equation on R3 was proved to be globally well posed by Shatah and Struwe [35,34] using Morawetz estimates. Later, S. Ibrahim and M. Majdoub managed to apply this strategy in the case of variable coefficients in [22], but without damping and forcing term. In this subsection, we extend this strategy to the case with these additional terms. We also refer to the appendix of [2] where the computation of Morawetz estimates on R3 is made with a forcing term. We also mention the result of N. Burq, G. Lebeau and F. Planchon [7] in the case of 3-D domains. We only have to check that the two additional terms do not create any trouble. Actually, the main difference is that the energy in the light cones is not decreasing, but it is locally “almost decreasing” (see formula (13)) and this will be enough to conclude with the same type of arguments. As usual in critical problems, the local problem is well understood thanks to Strichartz estimates while we have to prove global existence. We only consider Shatah–Struwe solutions, that are satisfying Strichartz estimates and we have uniqueness for local solutions in this class. We assume that there is a maximal time of existence t0 and we want to prove that it is infinite. The solution considered will be limit of smooth solutions of the nonlinear equation with smoothed initial data and nonlinearity. Therefore, the integrations by part are licit by a limiting argument. We need some notations. To simplify the notations, the space–time point where we want to extend the solution will be z0 = (t0 , x0 ) = (0, 0). ϕ is the geodesic distance on M to x0 = 0 defined in a neighborhood U of 0. Denote for some small α < β < 0 by
Kαβ := z = (t, x) ∈ [α, β] × U ϕ |t| backward truncated cone,
Mαβ := z = (t, x) ∈ [α, β] × U ϕ = |t| mantle of the truncated cone,
D(t) := x ∈ U ϕ |t| spacelike section of the cone at time t. In what follows, the gradient, norm, density are computed with respect to the Riemannian metric on M (for example, we have |∇ϕ| = 1). We also define by 1 1 |∂t u|2 + |∇u|2 + |u|6 local energy, 2 6 E u, D(t) := e(u)(t, x) dx energy at time t in the section of the cone, e(u)(t, x) :=
D(t)
1 Flux u, Mαβ := √ 2
β Mα
1 1 |∂t u∇ϕ − ∇u|2 + |u|6 dσ 2 6
flux getting out of the truncated cone.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1315
Lemma 1.1. Let u be a solution of Eq. (12). The function E(u, D(t)) satisfies for α < β < 0 a(x)|∂t u|2 − u∂t u¯ + g∂t u¯ E u, D(β) + Flux u, Mαβ = E u, D(α) + β
Kα
β
β
Kα
Kα
and it has a left limit in t = 0 as a function of t. Proof. The identity is obtained by multiplying the equation by ∂t u to get ∂t e(u) − β div(∂t u∇x u) = a(x)|∂t u|2 − u∂t u¯ + g∂t u, then, we integrate over the truncated cone Kα and use Stokes formula. Denote f (t) = E(u, D(t)). Using the positivity of the flux and the Hölder inequality, we estimate 2/3
f L∞ ([α,β]) f (α) + C(β − α) f L∞ ([α,β]) + C|α|(β − α) f L∞ ([α,β]) 1/2
+ g L1 ([α,β],L2 ) f L∞ ([α,β]) . 2/3
1/2
Using C|α|(β − α) f L∞ ([α,β]) C(β − α)( f L∞ ([α,β]) + f L∞ ([α,β]) ), we get for β − α small enough f (β)1/2
1 f (α)1/2 + C(β − α) + g L1 ([α,β],L2 ) . 1 − 2C(β − α)
(13)
This property will replace the decrease of the energy that occurs without damping and forcing term in all the rest of the proof. It easily implies that f has a left limit. 2 Lemma 1.2. For u and g being a strong solution of 2u + |u|4 u = g
on [−T , 0[ × M
we have the estimate β 6 f (β) + f (β)1/3 + f (β) − f (α) + g L1 L2 (K β ) ∂t u L∞ L2 (K β ) |u| C α α α D(α)
1/3 + f (β) − f (α) + g L1 L2 (K β ) ∂t u L∞ L2 (K β ) α α + g L1 L2 (K β ) ∂t u L∞ L2 (K β ) + ∇u L∞ L2 (K β ) + u L∞ L6 (K β ) α α α α + (β − α) sup f (t) + f (t)1/3 t∈[α,β]
where we have used the notation f (t) = E(u, D(t)). Proof. It is a consequence of Morawetz estimates. The only difference is the presence of the forcing term g and the metric. The case of flat metric is treated in [2]. The metric leads to the same estimates with an additional term (β − α) supt∈[α,β] f (t) + f (t)1/3 as treated in [22]. Another minor difference is that in the presence of a forcing term, the energy does not decrease
1316
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
and f (β) + f (β)1/3 have to be replaced by the supremum on the interval. Note also that our estimate is made in the backward cone while the computation is made in the future cone in these references. We leave the easy modifications to the reader. 2 The previous estimates will be the main tools of the proof. It will be enough to prove some non-concentration property in the light cone for L∞ L6 , L5 L10 and finally in energy space. It is the object of the following three corollaries. Corollary 1.1.
u(α, x) 6 dx −→ 0. α→0
D(α)
Proof. We are going to use the previous Lemma 1.2, replacing g by g − u + a(x)∂t u and with β = εα, 0 < ε < 1. Denote by L the limit of f (t) as t tends to 0 given by Lemma 1.1. So for α small enough, we have for a constant C > 0 ∂t u L∞ L2 (K β ) + ∇u L∞ L2 (K β ) + u L∞ L6 (K β ) 1 + C L1/2 + L1/6 . α
α
α
We also use g − u + a(x)∂t u
β
L1 L2 (Kα )
g L1 L2 (K β ) + C(β − α) u L∞ L2 (K β ) + C(β − α) ∂t u L∞ L2 (K β ) α α α 1/6 1/2 g L1 L2 (K β ) + C(β − α) 1 + L + L α
which tends to 0 as β tends to 0. This yields lim
α→0 D(α)
u(α, x) 6 dx Cε L + L1/3 .
2
Corollary 1.2. 0 . u ∈ L5 L10 K−T Proof. Localized Strichartz estimates in cones (see Proposition 4.4 of [22]) give u L4 L12 (Ks0 ) 1/2 CE u, D(s) + u 5L5 L10 (K 0 ) + a(x)∂t u − u + g L1 L2 (K 0 ) s s 1/2 CE u, D(s) + u L∞ L6 (Ks0 ) 1 + u 4L4 L12 (K 0 ) + ∂t u L∞ L2 (Ks0 ) + g L1 L2 (Ks0 ) . s
A bootstrap argument and Corollary 1.1 give that for s sufficiently close to 0, u L4 L12 (Ks0 ) is bounded. We get the announced result by interpolation between L4 L12 and L∞ L6 . 2
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1317
Corollary 1.3. E u, D(s) −→ 0. s→0
Proof. Let ε > 0. Corollary 1.2 allows to fix s < 0 close to 0 so that u L5 L10 (Ks0 ) ε. Denote by vs the solution to the linear equation 2vs + vs + a(x)∂t vs = 0,
(vs , ∂t v)t=s = (u, ∂t u)t=s
then, the difference ws = u − vs is a solution of 2ws + ws + a(x)∂t ws = −|u|4 u,
(ws , ∂t ws )t=s = (0, 0).
Then, for s < t < 0, the linear energy estimates give 1/2 E0 ws , D(t) C u 5L5 L10 (K 0 ) Cε 5 s
where we have set 1 E0 ws , D(t) = 2
|∇ws |2 + |∂t ws |2 dx.
D(t,z0 )
The triangular inequality yields 1/2 1/2 E0 u, D(t) E0 vs , D(t) + Cε 5 . Since vs is a solution of the free damped linear equation, we have E0 (vs , D(t)) −→ 0. This yields t→0 the result with E0 instead of E. The final result is obtained thanks to Corollary 1.1. 2 We can now finish the proof of the global existence. Let ε > 0 be chosen later. By Corollary 1.3, E(u, D(s)) ε for s close enough to 0. By dominated convergence, for any s < 0 close to 0, there exists η > 0 so that
e(u)(s) = E u, D(s, η) 2ε
ϕ(x)t0 −s+η
where E(u, D(s, η)) is the spacelike energy at time s of the cone centered at (t0 = η, x0 = 0) (see Fig. 2). For s close enough to 0 and s < s < 0, we apply estimate (13) in this cone. It gives 1/2 1/2 E u, D s , η C E u, D(s, η) + s − s + g L1 ([s,s ],L2 ) Cε 1/2 . In particular, u L∞ L6 (K) Cε 1/2 on the truncated cone K=
s , x ϕ(x) η − s , s < s < 0 .
1318
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Fig. 2. The truncated cone K.
Therefore, choosing ε small enough to apply the same proof as Corollary 1.2, we get u L5 L10 (K) < +∞. Since x0 = 0 is arbitrary, a compactness argument yields one s < 0 such that u L5 ([s,0[,L10 (M)) < +∞. Therefore, by the Duhamel formula, (u(t), ∂t u(t)) has a limit in E as t tends to 0 and u can be extended for some small t > 0 using local existence theory. Remark 1.1. It is likely that the global existence can also be proved using the Kenig–Merle argument [25] and the profile decomposition below (assuming only local existence) as it is done for example in [28] for the wave maps. 1.2. Concentration waves In this subsection, we give the details about concentrating waves that will be useful in the profile decomposition. The first lemma states that Definition 0.2 of concentrating data does not depend on the choice of coordinate patch and cut-off function ΨU . Lemma 1.3. Let [(f, g), h, x] ∈ E × (R∗+ × M×)N be such that limn (hn , xn ) = (0, x∞ ) then, all the sequences defined by formula (4) in different coordinates charts and the cut-off function ΨU are equivalent, modulo convergence in E. Proof. It is very close to the one of S. Ibrahim [21] where the concentrating data are given in geodesic coordinates. So, let VM ≈ V be another coordinate patch and Φ : V → U the associated transition map. Without loss of generality, we can suppose that x∞ is represented by 0 in U and V . We have to prove that the sequences 1 1 x − Φ(xn ) Φ(x) − Φ(xn ) −1 −1 = hn 2 ΨU Φ(x) f, g hn 2 Φ ∗ ΨU (x) f, g hn hn hn hn and −1/2
hn
1 x − xn ΨV (x) f ◦ DΦ(0), g ◦ DΦ(0) hn hn
are equivalent in the energy space associated to M or R3 (the volume form and the gradient are not the same but the energies are equivalent). By approximation, we can assume (f, g) ∈
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1319
(C0∞ (R3 ))2 . We make the proof for the H˙ 1 part for f , the proof being simpler for g. We remark that the terms coming from derivatives hitting on ΨU (x) tend to 0 in L2 . Therefore, we have to prove the convergence to 0 of
Φ(x) − Φ(xn ) Φ(x) DΦ(x)∇f hn 2 DΦ(0)x − DΦ(0)xn − ΨV (x)DΦ(0)∇f 2 . hn L (V )
h−3 n ΨU
First, we prove that the cut-off functions ΨU and ΨV can be replaced by a unique Ψ . Let δ be so that B(0, δ) ⊂ V . Let Ψ ∈ C0∞ (B(0, δ)) be such that Ψ ≡ 1 in a neighborhood of 0 and has a support included in the set of x such that ΨV (x) = ΨU (Φ(x)) = 1, so that Ψ ΨV = Ψ and Ψ (ΨU ◦ Φ) = Ψ . Then, on the support of 1 − Ψ , we have Φ(x) − Φ(xn ) > ε for some ε > 0 and some n large enough. Therefore, we have 2 Φ(x) − Φ(xn ) 1 − Ψ (x) ΨU Φ(x) DΦ(x)∇f 2 hn L (V ) 2 Φ(x) − Φ(xn ) Ch−3 n ∇f 2 hn L ( Φ(x)−Φ(xn ) >ε)
h−3 n
which is 0 for n large enough since f has compact support. Making the same proof for the other term, we are led to prove the convergence to 0 of 2 Ψ (x)DΦ(x)∇f Φ(x) − Φ(xn ) − Ψ (x)DΦ(0)∇f DΦ(0)x − DΦ(0)xn h−3 n 2 hn hn L (B(0,δ)) 2 Φ(hn x + xn ) − Φ(xn ) − DΦ(0)∇f DΦ(0)x . 2 DΦ(hn x + xn )∇f hn L ({x: |xn +hn x|δ}) (14) By the fundamental theorem of calculus, there exists zn (x) ∈ [xn , hn x + xn ] such that | Φ(hn x+xhnn)−Φ(xn ) | = |DΦ(zn )x| > C|x| for some uniform C > 0. As ∇f is compactly supported, we deduce that for |x| large enough, the integral is zero. So, we are led with the norm (14) with L2 (B(0, C)) instead of L2 ({x: |xn + hn x| δ}). We conclude by dominated convergence. 2 Using the previous lemma in geodesic coordinates, we get that our definition of concentrating data is the same as Definition 1.2 of S. Ibrahim [21]. Remark that for a concentrating data, xn − x∞ cannot be defined invariantly on Tx∞ M, we can only define the limit of (xn − x∞ )/ hn . The change of coordinates must act on xn as an element of M and not Tx∞ M even if it converges to x∞ . Yet, the functions (f, g) of a concentrating data “live” on the tangent space. Moreover, the norm in energy of a concentrating data is the one of its data.
1320
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Lemma 1.4. Let (un , vn ) be a concentrating data associated to [(ϕ, ψ), h, x], then, we have (un , vn ) = (ϕ, ψ) E E
x∞
+ o(1)
where ∇x∞ and L2 (Tx∞ M) are computed with respect to the frozen metric. The proof is a direct consequence of Lemmas 1.5 and 1.6 below or by a direct computation in coordinates. The next definition is the tool that will be used to “track” the concentrations. Definition 1.1. Let x∞ ∈ M and (f, g) ∈ Ex∞ . Given [(f, g), h, x] ∈ Ex∞ × (R∗+ × M)N such that limn (hn , xn ) = (0, x∞ ). Let (fn , gn ) be a sequence bounded in E, we set Dhn (fn , gn ) (f, g) if in some coordinate patch UM ≈ U ⊂ Rd containing x∞ and for some ΨU ∈ C0∞ (U ) such that ΨU (x) = 1 in a neighborhood of x∞ , we have 1
hn2 (ΨU fn , hn ΨU gn )(xn + hn x) (f, g)
weakly in Ex∞
where we have identified ΨU (fn , gn ) with its representation on Tx∞ M in the local trivialization. If this holds for one (U, ΨU ), it holds for any other coordinate chart with the induced transition map. We denote Dh1n fn f if we only consider the first part concerning H˙ 1 and Dh2n gn g for the L2 part convergence. Of course, this definition depends on the core of concentration h and x. In the rest of the paper, the rate h and x will always be implicit. When several rates of concentration [h(j ) , x (j ) ], (j ) j ∈ N, are used in a proof, we use the notation Dh to distinguish them. The fact that this definition is independent of the choice of a coordinate chart can be seen with the following lemma which will also be useful afterward. Lemma 1.5. Dhn (fn , gn ) (f, g) is equivalent to
∇M fn · ∇M un n→∞ −→ M
∇x∞ f · ∇x∞ ϕ,
Tx∞ M
gn vn n→∞ −→ M
gψ
Tx∞ M
where (un , vn ) is any concentrating data associated with [(ϕ, ψ), h, x]. The ∇ is computed with respect to the metric on M when the integral is over M and with respect to the frozen metric in x∞ when the integral is over Tx∞ M.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1321
Proof of Lemma 1.5. We only compute the first term for the H 1 norm and assume ϕ ∈ C0∞ (R3 ). dω(y) denotes the Riemannian volume form at the point y, ·y the scalar product at the point y and ∇hn x+xn = g(hn x + xn )−1 ∇. 1 2 n We denote Vh = V −x and L = h n,V n Vh ∇x∞ [ΨV fn (xn + hn x)] · ∇x∞ ϕ(x) dω(0). h 1
∇xn +hn x ΨV fn (xn + hn x) ·(xn +hn x) ∇xn +hn x ϕ(x) dω(xn + hn x) + o(1)
Ln,V = hn2 Vh 3 2
= hn
ΨV (xn + hn x)(∇xn +hn x fn )(xn + hn x) ·(xn +hn x) ∇xn +hn x ϕ(x) dω(xn + hn x) Vh
+ o(1) y − xn −3 dω(y) + o(1) = hn 2 ∇y fn (y) ·y ΨV (y)∇y ϕ hn V − 12
= hn
V
=
y − xn dω(y) + o(1) ∇y fn (y) ·y ∇y ΨV (y)ϕ hn
∇M fn · ∇M un + o(1). M
Therefore, Ln,V tends to limit. 2
∇f (x) · ∇ϕ(x) dω(0) if and only if
M
∇M fn · ∇M un has the same
An easy consequence of this lemma is the link with concentrating waves. Lemma 1.6. Let (fn , gn ) be some concentrating data associated with [(f, g), h, x], then, we have Dhn (fn , gn ) (f, g). Proof. Lemma 1.3 permits to work in geodesic coordinates so that the metric g is the identity at −1
the point x∞ . In thischart, we have fn (xn + hn x) = ΨU (xn + hn x)hn 2 f . So, the computation of Lemma 1.5 gives ∇∞ f · ∇∞ ϕ dω(0) = M ∇M fn · ∇M un + o(1) which gives the result. 2 We conclude this subsection by a definition of orthogonality that will discriminate concentrating data. Definition 1.2. We say that two sequences [h(1) , x (1) , t (1) ] and [h(2) , x (2) , t (2) ] are orthogonal if either (1)
• log | hn(2) | n→∞ −→ +∞, (1)
hn
(2)
• x∞ = x∞ , or
1322
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 (1)
(1)
(1)
(2)
• hn = hn = h and x∞ = x∞ = x∞ and in some coordinate chart around x∞ , we have |th(1) − th(2) | |xh(1) − xh(2) | + −→ +∞. h→0 h h We note [h(1) , x (1) , t (1) ] ⊥ [h(2) , x (2) , t (2) ] and (x (1) , t (1) ) ⊥h (x (2) , t (2) ) if h(1) = h(2) = h. This definition does not depend on the coordinate chart. This can be seen because we have the estimate C1 |xh(1) − xh(2) | |Φ(xh(1) ) − Φ(xh(2) )| C|xh(1) − xh(2) | if Φ is the transition map. 1.3. Scales In this subsection, we precise a few facts that will be useful in the first part of the proof of j linear profile decomposition which consists of the extration of the scales of oscillation hn . 1 2 On the Hilbert space E = H (M) × L (M), we define the self-adjoint operator AM by: 2 1 D(AM ) = HM × HM , AM (u, v) = (−M )1/2 v, (−M )1/2 u .
We define similarly ARd with the flat laplacian. We denote by ARd ,N the obvious operator on (H 1 (Rd ) × L2 (Rd ))N obtained by applying ARd on each “coordinate”. The following definition is taken from Gallagher and Gérard [17]. Definition 1.3. Let A be a self-adjoint (unbounded) operator on a Hilbert space H . Let (hn ) be a sequence of positive numbers converging to 0. A bounded sequence (un ) in H is said to be (hn )-oscillatory with respect to A if lim 1|A| R un H −→ 0.
n→∞
hn
R→∞
(15)
(un ) is said to be strictly (hn )-oscillatory with respect to A if it satisfies (15) and lim 1|A| hε un H −→ 0.
n→∞
n
ε→0
At the contrary, (un ) is said to be (hn )-singular with respect to A if we have 1
a b hn |A| hn
un H n→∞ −→ 0 for all 0 < a < b.
Remark that 1|x|1 can easily be replaced by a well-chosen function ϕ ∈ C0∞ (R). Moreover, if a sequence (un ) is strictly (hn )-oscillatory while a second sequence (vn ) is (hn )-singular, then −→ 0. we have the interesting property that un , vn H n→∞ Proposition 1.2. Let M = N finite covering of M with some associated local coordii=1 Ui be a nate patch Φi : Ui → Vi ⊂ R3 . Let 1 = i Ψi be an associated partition of the unity of M with Ψi ∈ C0∞ (Ui ). Let (un , vn ) be a bounded sequence in the M energy space and hn a sequence
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1323
converging to 0. Then (un , vn ) is (strictly) (hn )-oscillatory with respect to AM , if and only if all the Φi∗ Ψi (un , vn ) are (strictly) (hn )-oscillatory with respect to ARd . Proof. First, we remark that a sequence is (strictly) (hn )-oscillatory with respect to A if and only if it is (strictly) (h2n )-oscillatory with respect to A2 . So we can replace AM and AR3 by −(M , M ) and −(R3 , R3 ). We apply a proposition taken from [17] that makes the link between oscillation with different operators. Proposition 1.3. (See Proposition 2.2.3 of [17].) Let Λ : H1 → H2 be a continuous linear map between Hilbert spaces H1 , H2 . Let A1 be a self-adjoint operator on H1 , A2 be a self-adjoint operator on H2 . Assume there exists C > 0 such that Λ(D(A1 )) ⊂ D(A2 ), Λ∗ (D(A2 )) ⊂ D(A1 ) and for any u ∈ D(A1 ), v ∈ D(A2 ), A2 Λu C A1 u + u , A1 Λ∗ v C A2 v + v .
(16) (17)
If a bounded sequence (un ) in H1 is (strictly) (hn )-oscillatory with respect to A1 , then (Λun ) is (strictly) (hn )-oscillatory with respect to A2 . To prove the first implication, we apply the proposition with Λ(u, v) = (Φ1∗ Ψ1 (u, v), . . . , ΦN ∗ ΨN (u, v)). We only prove the necessary estimates, the inclusions of domains being a direct consequence of the inequalities and of the density of smooth functions. To simplify the notation, we denote (ui , vi ) = Φi∗ Ψi (u, v). The proof of (16) mainly uses the equivalent definitions of the H s norm on a manifold. 2 A 3 (ui , vi ) 1 H R
R3
×L2 3 R
= R3 ui H 1 + R3 vi L2 R3
R3
ui H 3 + vi H 2 u H 3 + v H 2 R3
R3
M
M
u H 1 + M u H 1 + v L2 + M v L2 M M M M 2 AM (u, v) H 1 ×L2 + (u, v) H 1 ×L2 . M
M
M
M
Let us prove (17) for the duality H 1 × L2 of the scalar product. Let (f, g) = (fi , gi )i=1,...,N ∈ (C0∞ (R3 ) × C0∞ (R3 ))N and (u, v) ∈ C ∞ (M). (u, v), A2M Λ∗ (f, g) H 1 (M)×L2 (M) = ΛA2M (u, v), (f, g) (H 1 (R3 )×L2 (R3 ))N
= (Φi∗ Ψi M u, fi )H 1 + (Φi∗ Ψi M v, gi )L2 R3
i
i
i
Φi∗ Ψi M u H −1 fi H 3 + R3
R3
i
Φi∗ Ψi M v H −2 gi H 2 R3
R3
1324
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
u H 1
M
fi H 3 + M v H −2 R3
i
(u, v)
1 ×L2 HM M
M
gi H 2
R3
i
( 3 fi , 3 gi ) 1 R R H
R3
i
×L2 3 R
+ (fi , gi )
Therefore, we get A2M Λ∗ (f, g) H 1 ×L2 C( A2R3 ,N (f, g) (H 1 M
M
R3
×L2 3 )N R
H 1 3 ×L2 3 R
.
R
+ (f, g) (H 1
R3
×L2 3 )N ) R
and Proposition 1.3 implies that (strict) (hn )-oscillation of (un ) with respect to AM implies (strict) (hn )-oscillation of Λun with respect to AR3 ,N . To prove the other implication, we use a quite similar operator. Denote by ϕi some other cut-off functions in C0∞ (Vi ) ⊂ C0∞ (R3 ) such that ϕi ≡ 1 on Supp(Φi∗ Ψi ). We define by Γ the 1 × L2 given by bounded operator from (HR1 3 × L2R3 )N to HM M Γ (f, g) =
−1 Φi∗ ϕi (fi , gi )
i
Then, we have Γ ◦ Λ = Id and we only have to prove that (strict) (hn )-oscillation of (fn , gn ) with respect to AR3 ,N implies (strict) (hn )-oscillation of Γ (fn , gn ) with respect to AM . The needed estimates are quite similar and we omit them. 2 Remark 1.2. Another way to prove Proposition 1.2 would have been to use the pseudodifferential operators ϕ(h2 M ) as in [6]. Now, we will prove that the (hn )-oscillation is conserved by the equation, even with a damping term. Proposition 1.4. Let T > 0. Let (ϕn , ψn ) be a bounded sequence of E that is (strictly) (hn )oscillatory with respect to AM . Let un be the solution of
2un + un = a(x)∂t un on [0, T ] × M, un (0), ∂t un (0) = (ϕn , ψn ).
(18)
Then, (un (t), ∂t un (t)) are (strictly) (hn )-oscillatory with respect to AM , uniformly on [0, T ]. At the contrary, if (ϕn , ψn ) is (hn )-singular with respect to AM , (un (t), ∂t un (t)) is (hn )singular with respect to AM , uniformly on [0, T ]. Proof. Let χ ∈ C0∞ (R) be such that 0 χ(s) 1 and χ(s) = 1 for |s| 1. The (hn )-oscillation (resp. strict oscillation) is equivalent to limn→∞ (1 − χ)(R 2 h2n )(un , ∂t un ) E −→ 0 (resp. h2n )(un , ∂t un ) E −→ 0). R2 R→∞ vn = (1 − χ)(R 2 h2n )un is a solution
R→∞
limn→∞ χ(
of
2vn + vn = a(x)∂t vn − χ R 2 h2n , a ∂t un on [0, T ] × M, vn (0), ∂t vn (0) = (1 − χ) R 2 h2n (ϕn , ψn )
and energy estimates give
(19)
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1325
vn (t), ∂t vn (t) CT (1 − χ) R 2 h2 (ϕn , ψn ) + CT a, χ R 2 h2 ∂t un 1 n n E E L ([0,t],L2 ) 2 2 CT (1 − χ) R hn (ϕn , ψn )E + CT Rhn , where the last inequality comes from the fact that χ(−h2 ) is a semiclassical pseudodifferential operator, as proved in Burq, Gérard and Tzvetkov [6, Proposition 2.1] using the Helffer–Sjöstrand formula. Therefore, passing to the limitsup in n and using the oscillation assumption, we get the expected result uniformly in t for 0 t T . The results for strict oscillation and singularity are proved similarly. 2 Proposition 1.5. There exists CT > 0 such that for every (ϕn , ψn ) bounded sequence of E weakly convergent to 0, we have the estimate lim (un , ∂t un )L∞ ([0,T ],B 1
0 2,∞ (M)×B2,∞ (M))
n→∞
CT lim (ϕn , ψn )B 1 n→∞
0 2,∞ (M)×B2,∞ (M)
where un is the solution of (18). Proof. Without loss of generality and since the equation is linear, we can that assume −2k x). (ϕn , ψn ) E is bounded by 1. Let ε > 0. Let χ0 , χ ∈ C0∞ (R) be so that 1 = χ0 + ∞ χ(2 k=1 We denote ukn = χ(2−2k )un . Using the same estimates as in the previous lemma, we get k u (t), ∂t uk (t) CT uk (0), ∂t uk (0) + CT 2−k . n n n n E E Take K large enough so that CT 2−k ε for k K so that we have k u (t), ∂t uk (t) CT (ϕn , ψn ) 1 n n E B
0 2,∞ (M)×B2,∞ (M)
+ ε.
(20)
Then, for k < K, using again some energy estimates for the equation verified by ukn , we get k u (t), ∂t uk (t) CT uk (0), ∂t uk (0) + CT a, χ −2−2k ∂t un 1 . n n n n E E L ([0,T ],L2 ) Yet, for fixed k, [a, χ(−2−2k )] is an operator from L2 into H 1 (for instance) and we conclude by the Aubin–Lions Lemma that for fixed k K lim ukn (t), ∂t ukn (t) E CT lim ukn (0), ∂t ukn (0) E .
n→∞
(21)
n→∞
We get the expected result with an additional ε by combining (20) and (21).
2
We end this subsection by two lemmas that will be useful in the nonlinear decomposition. The first one is Lemma 3.2 of [17].
1326
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Lemma 1.7. Let hn and h˜n be two orthogonal scales, and let (fn ) and f˜n be two sequences such that ∇fn (resp. ∇ f˜n ) is strictly (hn ) (resp. h˜ n )-oscillatory with respect to R3 . Then, we have lim fn f˜n L3 (R3 ) = 0.
n→∞
Then, we easily deduce the following result. Lemma 1.8. Let hn and h˜n be two orthogonal scales and vn , v˜n be two sequences that are strictly hn (resp. h˜n )-oscillatory with respect to M (considered on the Hilbert space H 1 ), uniformly on [−T , T ]. Then, we have vn v˜n L∞ ([−T ,T ],L3 (M)) n→∞ −→ 0. Moreover, the same result remains true if v˜n is a constant sequence v ∈ H 1 and h˜ n = 1. Proof. Using a partition of unity 1 =
i
Ψi2 adapted to coordinate charts, we have to compute
Φi∗ Ψi vn Ψi v˜n L∞ ([−T ,T ],L3 (R 3 )) . Using Proposition 1.2, we infer that Φi∗ Ψi vn is strictly (hn )-oscillatory with respect to R3 (defined on H 1 ) and the same result holds for ∇(Φi∗ Ψi vn ) with respect to R3 defined on L2 . We conclude by applying Lemma 1.7 to Φi∗ Ψi vn and Φi∗ Ψi vn . 2 1.4. Microlocal defect measure and energy In this subsection, we state without proof the propagation of the measure for the damped wave equation. We refer to [18] for the definition and to [19, Section 4] or [16] in the specific context of the wave equation. It will be used several times in the article. Lemma 1.9 (Measure for the damped equation and equicontinuity of the energy). Let un , u˜ n be two sequences of solution to 2un + un = a(x)∂t un , weakly convergent to 0 in E . Then, there exists a subsequence (still denoted by un , u˜ n ) such that for any t ∈ [0, T ] there exists a (nonnegative if un = u˜ n ) Radon measure μt on S ∗ M such that for any classical pseudodifferential operator B of order 0, we have with a uniform convergence in t −→ σ0 (B) dμt . (22) B(−)1/2 un (t), (−)1/2 u˜ n (t) L2 (M) + B∂t un (t), ∂t u˜ n (t) L2 (M) n→∞ S∗M
Moreover, one can decompose μt =
1 t μ + μt− 2 +
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1327
which satisfy the following transport equation ∂t μ± (t) = ±H|ξ |x μ± (t) + a(x)μ± (t). Furthermore, if tn n→∞ −→ t, we have the same convergence with t replaced by tn in (22). The microlocal defect measure of a concentrating data [(ϕ, ψ), h, x] can be explicitly computed, as follows −3
μ± = (2π)
+∞ 2 ψ(rξ ˆ δx∞ (x) ⊗ ˆ ) r 2 dr. ) ± i|rξ |∞ ϕ(rξ 0
This can be easily computed, for instance, with the next lemma. Lemma 1.10. Let (ϕn , ψn ) = [(ϕ, ψ), h, x] be a concentration data and A(x, Dx ), B(x, Dx ) two polyhomogeneous pseudodifferential operators of respective order 0. Then A(x, Dx )ϕn , B(x, Dx )ψn − A0 (x∞ , Dx )ϕ, B0 (x∞ , Dx )ψ , h, x
−→ 0
H 1 ×L2 n→∞
where A0 (x∞ , Dx ) is the Fourier multiplier of homogeneous symbol a0 (x∞ , ξ ) defined on Tx∗∞ M. Proof. We only give a sketch of the proof for B(x, Dx )ψn . By approximation, we can assume ∈ C ∞ (R3 \0). In local coordinates centered at x∞ = 0, we have for an o(1) small in L2 that ψ 0 x − xn + o(1) ΨU (x)(χψ) hn x − xn −3 + o(1) = hn 2 Bn (y, Dy )ψ hn
−3 B(x, Dx )ψn = hn 2 B(x, Dx )
where Bn (y, Dy ) is the operator of symbol bn (y, ξ ) = b0 (hn y + xn , ξ/ hn ). Here b0 is the principal symbol of B, homogeneous for large ξ . We write b0 (hn y + xn , ξ/ hn ) = b0 (xn , ξ/ hn ) + 1 hn y 0 (∂y b0 )(xn + thn , ξ/ hn ) dt. The first term converges to b0 (0, ξ ) by homogeneity while the second produces a term small in L2 . 2 The previous lemma is made interesting when combined with the propagation of microlocal defect measure. Lemma 1.11. Let un be a sequence of solutions of 2un + un = a(x)∂t un weakly convergent to 0 and pn = [(ϕ, ψ), h, x, t] a linear damped concentrating wave. We assume Dh (un , ∂t un ) 0. Then, for any classical pseudodifferential operators A(x, Dx ) of order 0, we have uniformly for t ∈ [−T , T ] −→ 0. A(−)1/2 pn (t), (−)1/2 un (t) L2 (M) + A∂t pn (t), ∂t un (t) L2 (M) n→∞
1328
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
In particular, we have ∇pn · ∇un + ∂t pn ∂t un 0 in D ]−T , T [ × M . Proof. We first check the property for t = tn . Using Lemma 1.10 several times, we are led to estimate (−)1/2 ϕn , (−)1/2 un (tn ) L2 (M) + ψn , ∂t un (tn ) L2 (M) where (ϕn , ψn ) are the concentrating data associated with [(A(x∞ , Dx )ϕ, B(x∞ , Dx )ψ), h, x]. Then, the hypotheses Dh (un , ∂t un ) 0 and Lemma 1.5 yields the convergence to 0 for this particular case t = tn . We conclude by equicontinuity and by the propagation of joint measures stated in Lemma 1.9. 2 2. Profile decomposition 2.1. Linear profile decomposition The main purpose of this section is to establish Theorem 0.3. It is completed in two main (j ) steps: the first one is the extraction of the scales hn where we decompose vn in an infinite (j ) (j ) sum of sequence vn which are respectively hn -oscillatory and the second step consists in (j ) (j ) decomposing each vn in an infinite sum of concentrating wave at the rate hn . Actually, in order to perform the nonlinear decomposition, we will need that, in some sense, each profile of the decomposition do not interact with the other. It is stated in this orthogonality result. Theorem 0.3’. With the notation of Theorem 0.3, we have the additional following properties. If 2T < Tfocus , we have (h(k) , x (k) , t (k) ) ⊥ (h(j ) , x (j ) , t (j ) ) for any j = k, according to Definition 1.2. If M = S 3 and a ≡ 0 (undamped solutions), but with T eventually large, we have (k) (h , (−1)m x (k) , t (k) + mπ) orthogonal to (h(j ) , x (j ) , t (j ) ) for any m ∈ Z and j = k. 2.1.1. Extraction of scales Proposition 2.1. Let T > 0. Let (ϕn , ψn ) be a bounded sequence of E and vn the solution of
2vn + vn = a(x)∂t vn on [−T , T ] × M, vn (0), ∂t vn (0) = (ϕn , ψn ).
(23)
Then, up to an extraction, vn can be decomposed in the following way: for any l ∈ N∗ vn (t, x) = v(t, x) +
l
(j )
vn (t, x) + ρn(l) (t, x),
j =1 (l)
(j )
where vn is a strictly (hn )-oscillatory solution of the damped linear wave equation (23) on M. (j ) (j ) The scales hn satisfy hn n→∞ −→ 0 and are orthogonal:
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
(k) log hn −→ +∞ (j ) hn n→∞
1329
if j = k.
(24)
Moreover, we have lim ρn(l) L∞ (]−T ,T [,L6 (M)) −→ 0,
n→∞
(25)
l→∞
l
(j ) (vn , ∂t vn )(t)2 = (v, ∂t v)(t)2 + vn , ∂t vn(j ) (t)2 E E E j =1
2 + ρn(l) , ∂t ρn(l) (t)E + o(1)(t),
(26)
where o(1)(t) n→∞ −→ 0 uniformly for t ∈ [−T , T ]. Proof. We first make this decomposition for the initial data as done in [20] (see also [2]). Then, using the propagation of (hn )-oscillation proved in Proposition 1.4, we extend it for all time. More precisely, by applying the same procedure as in [20], with the operator AM , we decompose l
(j ) (j ) (l) (l) ϕn , ψn + Φn , Ψn (ϕn , ψn ) = (ϕ, ψ) + j (j )
(j )
(j )
(j )
−→ 0, and where (ϕn , ψn ) is (hn )-oscillatory for AM , hn n→∞ lim sup1[2k ,2k+1 [ (AM ) Φn(l) , Ψn(l) E −→ 0.
n→∞ k∈N
(27)
l→∞
Moreover, we have the orthogonality property: l
(j ) (j ) 2 (l) (l) 2 (ϕn , ψn )2 = (ϕ, ψ)2 + ϕn , ψn + Φ , Ψ + o(1), n n E E E E
n → ∞,
j (j )
(l)
(l)
(j )
and the hn are orthogonal each other as in (24). Moreover, (Φn , Ψn ) is (hn )-singular for 1 j l. This decomposition for the initial data can be extended to the solution by vn (t, x) = v(t, x) +
l
(j )
vn (t, x) + ρn(l) (t, x),
j (j )
where each vn is a solution of
(j )
(j )
(j )
2vn + vn = a(x)∂t vn on Rt × M, (j ) (j ) (j ) (j ) vn (0), ∂t vn (0) = ϕn , ψn .
1330
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 (j )
(j )
(j )
(l)
Thanks to Proposition 1.4, each (vn (t), ∂t vn (t)) is strictly (hn )-oscillatory and (ρn (t), (j ) (l) (l) (l) ∂t ρn (t)) is (hn )-singular for 1 j l. So, we easily infer for instance that (ρn (t), ∂t ρn (t)), (j ) (j ) −→ 0 uniformly on [−T , T ] where , E is the scalar product on E. This is (vn (t), ∂t vn (t))E n→∞ (j )
(k)
also true for the product between vn and vn , j = k thanks to the orthogonality (24). The same convergence holds for the product with v by weak convergence to 0 of the other terms. Then, we get l
(j ) (vn , ∂t vn )2 = (v, ∂t v)2 + vn , ∂t vn(j ) 2 + ρ (l) , ∂t ρ (l) 2 + o(1), n n E E E E
n → ∞.
j
Let us now prove estimate (25) of the remaining term in L∞ (L6 ). (27) gives the convergence (l) (l) 1 (M) × B 0 (M). We extend this convergence for all time to zero of (ρn (0), ∂t ρn (0)) in B2,∞ 2,∞ with Proposition 1.5 and get sup
lim ρn(l) (t), ∂t ρn(l) (t) B 1
t∈[0,T ] n→∞
0 2,∞ ×B2,∞
−→ 0.
l→∞
The following lemma will transfer this information in local charts. Lemma 2.1. There exists C > 0 such that 1 Λf B 0 (R3 )N f B 0 (M) C Λf B 0 (R3 )N , 2,∞ 2,∞ 2,∞ C 1 Λf B 1 (R3 )N f B 1 (M) C Λf B 1 (R3 )N 2,∞ 2,∞ 2,∞ C where Λ is the operator described in Proposition 1.2 of cut-off and transition in N local charts. We postpone the proof of this lemma and continue the proof of the proposition. Using this lemma, we get for every coordinate patch (Ui , Φi ) and Ψi ∈ C0∞ (Ui ) lim Φi∗ Ψi ρn(l) L∞ ([−T ,T ],B 1 (R3 )) −→ 0. n→∞
l→∞
2,∞
The refined Sobolev estimate, Lemma 3.5 of [2], yields for any f ∈ H 1 (R3 ) 1/3 2/3 1/3 2/3 f L6 (R3 ) (−R3 )1/2 f L2 (−R3 )1/2 f B˙ 0 f H 1 (R3 ) f 1
B2,∞ (R3 )
2,∞
Therefore, we have lim Φi∗ Ψi ρn(l) L∞ ([−T ,T ],L6 (R3 )) −→ 0
n→∞
l→∞
and finally lim ρn(l) L∞ ([−T ,T ],L6 (M)) −→ 0.
n→∞
l→∞
This completes the proof of Proposition 2.1, up to the proof of Lemma 2.1.
2
.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1331
Proof of Lemma 2.1. We essentially use the following fact: see Lemma 3.1 of [2]. Let fn be a sequence of L2 (R3 ) weakly convergent to 0 and compact at infinity lim
n→+∞ |x|>R
f (x) 2 dx −→ 0. R→+∞
0 (R3 ) if and only if f is h singular for every scale h . Then, fn tends to 0 in B˙ 2,∞ n n n Actually, the same result holds for M , with the same demonstration. The compactness at infinity in R3 is only assumed to ensure
lim 1[−A,A](R3 ) fn L2 = 0 for any A > 0,
n→+∞
which is obvious in the case of M because of weak convergence and discrete spectrum. Using Proposition 1.2, we obtain that fn is (hn )-singular with respect to M if and only if Λfn is (hn )-singular with respect to R3 . Combining the two previous results, we obtain that the two norms we consider have the same converging sequences and are therefore equivalent. 2 2.1.2. Description of linear concentrating waves (after S. Ibrahim) In this subsection, we describe the asymptotic behavior of linear concentrating waves as described in [21] of S. Ibrahim. In [21], it is stated for the linear wave equation without damping. We give some sketch of the proof when necessary to emphasize the tiny modifications. The following lemma yields that for times close to concentration, the linear damped concentrating wave is close to the solution of the wave equation with flat metric and without damping. It is Lemma 2.2 of [21], except that there is an additional damping term which disappears after rescaling. We do not give the proof and refer to the more complicated nonlinear case (see estimate (53)). Lemma 2.2. Let vn = [(ϕ, ψ), h, x, t] be a linear damped concentrating wave and v solution of
2∞ v = 0
on R × Tx∞ M,
(v, ∂t v)|t=0 = (ϕ, ψ).
(28)
n x−xn Denote by v˜n the rescaled function associated to v, that is v˜n = Φ ∗ Ψ √1h v( t−t hn , hn ) where n (U, Φ) is a coordinate chart around x∞ and Ψ ∈ C0∞ (U ) is constant equal to 1 around x∞ . Then, we have
lim |||v˜n − vn |||[tn −Λhn ,tn +Λhn ]×M −→ 0.
n→∞
Λ→∞
Corollary 2.1. With the notation of the lemma, if t˜n = tn + (C + o(1))hn , then (vn , ∂t vn )|t=t˜n is a concentrating data associated with [(v(C), ∂t v), h, x]. Moreover, Lemma 2.3 of S. Ibrahim [21] yields the “non-reconcentration” property for linear concentrating waves.
1332
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Lemma 2.3. Let v = [(ϕ, ψ), h, x, t] be a linear (possibly damped) concentrating wave. Consider the interval [−T , T ] containing t∞ , satisfying the following non-focusing property (see Definition 0.1) mes(Fx,x∞ ,s ) = 0 ∀x ∈ M and s = 0 such that t∞ + s ∈ [−T , T ].
(29)
Then, if we set In1,Λ = [−T , tn − Λhn ] and In3,Λ = ]tn + Λhn , T ], we have lim vn L∞ (I 1,Λ ∪I 3,Λ ,L6 (M)) −→ 0, n
n
n
Λ→∞
lim vn L5 (I 1,Λ ∪I 3,Λ ,L10 (M)) −→ 0. n
n
n
Λ→∞
Sketch of the proof of Lemma 2.3 in the damped case. To simplify the notation, we can assume tn = 0. In [21], the proof is made by contradiction, assuming the existence of a subsequence (still denoted by vn ) such that vn (sn ) L6 (M) → C > 0 and |shnn| → ∞. If sn → τ = 0, using the concentration-compactness principle of [31], we are led to prove that the microlocal defect measure μ associated to vn (tn ) satisfies μ({y} × S 2 ) = 0 for any y ∈ M. We use the same argument for the damped equation except that in that case, the measure μt associated to vn (t) is not solution of the exact transport equation but of a damped transport equation (see Lemma 1.9). Yet, the non-focusing assumption (29) still implies μt ({y} × S 2 ) = 0 for all y ∈ M and t = 0, which allows to conclude similarly. In the case τ = 0, we use in local coordinates the rescaled function v˜n (s, y) = √ sn vn (sn s, sn y + xn ). v˜n at time s = 0 is a concentrating data at scale hn /sn . We prove lim v˜n (1, ·) L6 (R3 ) = 0. Again by concentration compactness, it is enough to prove that the microlocal defect measure μs of v˜n propagates along the curves of the hamiltonian flow with constant coefficient H|ξ | . Since vn is a solution of 2vn + vn + a(x)∂t vn = 0, v˜n is a solution of 2n v˜n + sn2 v˜n + sn a(sn · +xn )∂t v˜n = 0 where 2n is a suitably rescaled d’Alembert operator. Since the additional terms sn2 v˜n + sn a(sn · +xn )∂t v˜n converge to 0 in L1 L2 , we can finish the proof as in Lemma 2.3 of [21] by proving that μs propagates as if 2n was replaced by 2∞ , that is along the hamiltonian H|ξ | . The estimate in norm L5 L10 is obtained by interpolation of L∞ L6 with another bounded Strichartz norm. 2 In the specific case of S 3 , Lemma 4.2 of [21] allows to describe precisely the behavior of concentrating wave for large times, as follows. Lemma 2.4. Let p be a sequence of solutions of
2pn = 0 on [0, +∞[ × M, pn (0), ∂t pn (0) = (ϕn , ψn )
where (ϕn , ψn ) is weakly convergent to (0, 0) in E. Then, we have pn (t + π, x) = −pn (t, −x) + o(1)(t) where the o(1)(t) is small in the energy space. The same holds for solutions of 2un + un .
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1333
In particular, if p is a concentrating wave associated with data [(ϕ, ψ), h, x, t], then, for any j ∈ N, pn (t + j π, x) is a linear concentrating wave associated with [(−1)j (ϕ, ψ)((−1)j .), h, (−1)j x, t]. In the previous lemma, −x refers to the embedding of S 3 into R4 . Moreover, the notation (ϕ, ψ)(−.) could be written more rigorously (ϕ, ψ)(D∞ I.) where D∞ I is the differential at the point x∞ of the application I : x → −x defined from S 3 into itself. Actually, we are identifying the tangent plane at the south pole with the one on the north pole by the application x → −x on R4 . The fact that the result remains true for the equation 2u + u = 0 comes from the fact that for initial data weakly convergent to zero, the solutions of 2u = 0 and 2v + v = 0 with same data are asymptotically close in the energy space. This can be proved by observing that for a weakly convergent sequence of solutions un the Aubin–Lions Lemma yields that un converges strongly to 0 in L∞ ([−T , T ], L2 ). So rn = un − vn is a solution of 2rn = un and converges strongly in E. 2.1.3. Extraction of times and cores of concentration In this subsection, hn is a fixed sequence in R∗+ converging to 0. For simplicity, we will denote it by h and uh for sequences of functions. The main purpose of this subsection is the proof of the following proposition, which is the profile decomposition for h-oscillatory sequences. It easily implies Theorem 0.3 when combined with Proposition 2.1. Proposition 2.2. Let (uh ) be an h-oscillatory sequence of solutions to the damped Klein–Gordon equation (23). Then, up to extraction, there exist damped linear concentrating waves phk , as defined in Definition 0.3, associated to concentrating data [(ϕ (k) , ψ (k) ), h, x (k) , t (k) ], such that for any l ∈ N∗ , and up to a subsequence, vh (t, x) =
l
(j )
pn (t, x) + wn(l) (t, x),
(30)
j =1
∀T > 0,
(l) lim wh L∞ (]−T ,T [,L6 (M)) −→ 0,
n→∞
(31)
l→∞
l
(j ) (vh , ∂t vh )2 = p , ∂t p (j ) 2 + w (l) , ∂t w (l) 2 + o(1), h h h h E E E
as h → ∞,
j =1
uniformly for t ∈ [−T , T ].
(32)
Moreover, if 2T < Tfocus , for any j = k, we have (x (k) , t (k) ) ⊥h (x (j ) , t (j ) ) according to Definition 1.2. If M = S 3 and a ≡ 0 (undamped solutions), but with T eventually large, ((−1)m x (k) , t (k) + mπ) is orthogonal to (x (j ) , t (j ) ) for any m ∈ Z and j = k. Remark 2.1. The assumptions to get the orthogonality of the cores of concentration are related to our lack of understanding of the solutions concentrating in a point x1 where (x1 , x2 , t) is a couple of focus at distance t. We know that the solution reconcentrates after a time t in the other focus x2 but we do not know precisely how: can it split into several concentrating waves on x2
1334
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
with different “rate of concentration”? That is to say with some different xn converging to x2 but which are orthogonal. Before getting into the proof of the proposition, we state two lemmas that will be useful in the proof. Using the notation of Definition 1.1, denote δ x (v) = sup ∇ϕ 2L2 (T
x∞ M )
x
, Dh1 vh ϕ, up to a subsequence
where the supremum is taken over all the sequences x in M. If vh ∈ L∞ ([−T , T ], H 1 (M)), we denote δ(v) = sup ∇ϕ 2L2 (T x,t
x∞ M )
, Dh1 vh (th ) ϕ, up to a subsequence = sup δ x v(th , ·) t
where the supremum is taken over all the sequences x = (xh ) in M and t = (th ) in [−T , T ]. Lemma 2.5. Let Ψ ∈ C ∞ (M). Then, there exists C > 0 such that for any v, we have the estimate δ x (Ψ v) Cδ x (v). The proof is left to the reader. Lemma 2.6. There exists C > 0 such that for any v = (vh ) a bounded strictly (hn )-oscillatory sequence in H 1 (M) 1/6
lim vh L6 Cδ x (v)1/3 lim vh H 1 (M) .
n→+∞
n→+∞
x is the same Proof. This lemma is already known in the case of R3 where the definition of δR 3 except that Dh1 is only considered in the trivial coordinate chart. It is estimate (4.19) of [20] in the case of a 1-oscillatory sequence, which can be easily extended to (hn )-oscillatory sequence by dilation. Let Ψi ∈ C0∞ (Ui ) be associated to a coordinate patch Φi . By Proposition 1.2, Φi∗ Ψi vh is still (hn )-oscillatory and we can apply the estimate on R3 . We get
1/6 x 1/3 lim Φi∗ Ψi vh L6 (R3 ) CδR lim Φi∗ Ψi vh H 1 (R3 ) 3 (Φi∗ Ψi v)
n→+∞
n→+∞
x CδR 3
∗ 1/3 1/6 Φi Ψ i v lim vh H 1 (M) . n→+∞
Then, by definition of the convergence Dh , we easily get ∗ x x δR 3 Φi Ψi v Cδ (Ψi v). We conclude by using Lemma 2.5 and partition of unity.
2
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1335
Lemma 2.7. Let T > 0. There exists C > 0 such that for any sequence v = (vh ) (hn )-oscillatory, solution of the damped linear Klein–Gordon equation on M with bounded energy, we have 1/6 lim vh L∞ ([−T ,T ],L6 (M)) Cδ(v)1/3 lim vh (0), ∂t vh (0) E .
n→+∞
n→+∞
Proof. Let th be an arbitrary sequence in [−T , T ]. We apply Lemma 2.6 to the sequence vh (th ) and get 1/6 1/3 lim vh (th , ·)L6 Cδ x v(th , ·) lim vh (th )H 1 (M)
n→+∞
n→+∞
Cδ(v)1/3 by definition of δ and by energy estimates.
1/6 lim vh (0), ∂t vh (0) E
n→+∞
2
Proof of Proposition 2.2. It is based on the same extraction argument as in [2] and [17]: the concentration will be tracked using our tool Dh and we will extract concentrating waves so that δ(v) decreases. We conclude with Lemma 2.7 to estimate the L∞ (L6 ) norm of the remainder term. More precisely, if δ(v) = 0, Lemma 2.7 shows that there is nothing to be proved. Otherwise, (1) (1) (1) (1) pick (xh , th ) converging to (x∞ , t∞ ) and (ϕ (1) , ψ (1) ) ∈ Ex∞ , such that (1) 2 ∇ϕ 2
L (Tx∞ M)
2 + ψ (1) L2 (T
x∞ M)
2 ∇ϕ (1) L2 (T
x∞ M)
1 δ(v) 2
and (1) (1) ϕ (1) , ψ (1) . Dh (vh , ∂t vh ) th h→0
The existence of the weak limit ψ (1) (up to a subsequence) is ensured by the boundedness in L2 (R3 ) of ∂t vh (considered in a coordinate chart) by conservation of energy. Then, we choose ph(1) as the damped linear concentrating profile associated with [(ϕ (1) , ψ (1) ), h, x (1) , t (1) ] (actually, we pick one representative in the equivalence class modulo sequences (1) converging to 0 in the energy space as in Definition 0.2). Remark here that the assumption th ∈ (1) [−T , T ] ensures t∞ ∈ [−T , T ], which will always be the case for all the concentrating waves we consider. Then, we give a lemma that will be the main step to the orthogonality of energies. (1)
(1)
Lemma 2.8. Let wh = vh − ph . Then, (vh , ∂t vh )(t)2 = p (1) , ∂t p (1) (t)2 + w (1) , ∂t w (1) (t)2 + o(1) h h h h E E E where the o(1) is uniform for t in bounded intervals. (1)
Proof. We first compute the energy at time th . We denote by B the bilinear form associated with the energy:
1336
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
B(a, b) =
ab + ∇a · ∇b + ∂t a∂t b. M
We have to prove (1) (1) (1) (1) (1) (1) (1) (1) (1) B ph th , wh th = B ph t h , v h t h − p h t h = o(1). (1) (1) By weak convergence to 0 in H 1 of vh , ph and wh , we can omit the term M ab (1) (1) of B. By construction and Lemma 1.6, we have Dh (vh , ∂t vh )(th ) (ϕ (1) , ψ (1) ) and (1)
(1)
(1)
(1)
(1)
(1)
(1)
h→0
Dh (ph , ∂t ph ) (ϕ (1) , ψ (1) ). Therefore, Dh (wh , ∂t wh )(th ) (0, 0). Lemma 1.11 h→0 h→0 gives the expected result. Remark that if a ≡ 0, this is just a consequence of the conservation of scalar product for solution of linear wave equation. 2 We get the expansion of uh announced in Proposition 2.2 by induction iterating the same process. Let us assume that vh (t, x) =
l
(j )
pn (t, x) + wn(l) (t, x),
j =1 l
(j ) p , ∂t p (j ) 2 + w (l) , ∂t w (l) 2 + o(1), (vh , ∂t vh )2 = h h h h E E E j =1
uniformly in t, as h → 0,
(33)
(j )
and where ph is a linear damped concentrating wave, associated with data [(ϕ (k) , ψ (k) ), h, x (k) , t (k) ] mutually orthogonal. We argue as before: we can assume δ(w (l) ) > 0 and we can pick (ϕ (l+1) , ψ (l+1) ), x (l+1) , t (l+1) such that: (l) 2 ∇ϕ 2
2 + ψ (l) L2 (T
1 δ w (l) , 2 (l+1) (l+1) (l+1) (l) (l) (l+1) Dh wh , ∂t wh th ϕ , ,ψ L (T
(l+1) M) x∞
(l+1) M) x∞
h→0
(l+1)
(34)
and we define ph as a linear damped concentrating wave, associated with data [(ϕ (l+1) , (l) (l+1) ψ (l+1) ), h, x (l+1) , t (l+1) ]. Again, Lemma 2.8 applied to wh and ph implies estimates (32) (l+1) (l) (l+1) = wh − ph . with wh Let us now deal with estimate (31). Lemma 1.4 combined with energy estimates gives for some C > 0 only depending on T and a (j ) 2 ∇ϕ 2
L (T
(j ) x∞
(j ) 2 ψ 2 + L (T M)
From this and estimate (32), we infer
(j ) x∞
(j ) 2 p , ∂t p (j ) + o(1). C h h M) t=0 E
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 l
(j ) 2 ∇ϕ 2 j =1
L (T
(j ) M) x∞
2 + ψ (j ) L2 (T
(j ) M) x∞
So, the series of general term ( ∇ϕ (j ) 2L2 (T mate (34), we get
2 C lim (uh , ∂t uh )E C. h→0
+ ψ (j ) 2L2 (T
(j ) M) x∞
1337
(j ) M) x∞
) converges. Using esti-
lim δ w(l) = 0.
l→∞
Lemma 2.7 yields (l) lim wh L∞ ([−T ,T ],L6 (M)) −→ 0. l→∞
h→0
This completes the proof of the first part of Proposition 2.2. Let us now deal with the orthogonality result. We will need the following two lemmas. Lemma 2.9. Let (x (1) , t (1) ) ⊥h (x (2) , t (2) ). Let vh be an h-oscillatory sequence solution of the damped linear wave equation such that (1) (1) ϕ (1) , ψ (1) . Dh (vh , ∂t vh ) th
(35)
h→0
Then, there exists (ϕ (2) , ψ (2) ) such that, up to a subsequence (2) (2) ϕ (2) , ψ (2) . Dh (vh , ∂t vh ) th
(36)
h→0
Moreover, we have (1) (1) ϕ ,ψ
Ex∞
= ϕ (2) , ψ (2) E
x∞
(37)
.
Proof. First, we assume x (1) = x (2) . By translation in time, we can assume t (1) = 0. The non(2) orthogonality assumption yields, up to extraction, th / h = C + o(1) with C constant. Let (ϕ, ψ) ∈ E∞ be arbitrary and ph the linear damped concentrating wave associated with [(ϕ, ψ), h, x (1) , 0]. We use the equivalent definition stated in Lemma 1.5: (35) is equivalent to
∇vh (0) · ∇ph (0) n→∞ −→
M
∇ϕ (1) · ∇ϕ,
Tx∞ M
∂t vh (0)∂t ph (0) n→∞ −→ M
ψ (1) ψ.
Tx∞ M (2)
As both vh and ph are solutions of the damped wave equation on M and th −→ 0, we have by h→0 equicontinuity (see Lemma 1.9).
1338
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
(2) (2) ∇vh th · ∇ph th +
M
(2) (2) −→ ∂t vh th ∂t ph th n→∞
M
∇ϕ
· ∇ϕ +
(1)
Tx∞ M
ψ (1) ψ.
Tx∞ M
Let v, w satisfy on Tx∞ M (v, ∂t v)|t=0 = ϕ (1) , ψ (1) ,
2∞ v = 0, 2∞ w = 0,
(w, ∂t w)|t=0 = (ϕ, ψ).
Conservation of the scalar product yields
∇ϕ (1) · ∇ϕ + Tx∞ M
ψ (1) ψ =
Tx∞ M
∇v(C) · ∇w(C) +
Tx∞ M
∂t v(C)∂t w(C).
Tx∞ M
But according to Corollary 2.1, (ph , ∂t ph )|t=t (2) is a concentrating data according to [(w(C), h
∂t w(C)), h, x (1) ]. Since the wave equation is reversible and (ϕ, ψ) is arbitrary, we have proved ˜ h, x (1) ], we have ˜ ψ), that for any concentrating data (fh , gh ) associated with [(ϕ,
(2) ∇vh th · ∇fh +
M
(2) ∂t vh th gh n→∞ −→
M (1)
∇v(C) · ∇ ϕ˜ +
Tx∞ M
˜ ∂t v(C)ψ.
Tx∞ M
(2)
This gives the result for xh = xh by taking (ϕ (2) , ψ (2) ) = (v(C), ∂t v(C)) which satisfies (37) by conservation of the energy. In the general case x (1) ⊥h x (2) , we have in a local coordinate chart and up to a subse(2) (1) + o(1))h where D ∈ Tx∞ M is a constant vector. We remark that if quence xh = xh + (D (1) (2) a bounded sequence (fh , gh ) satisfies Dh (fh , gh ) (ϕ, ψ), it also fulfills Dh (fh , gh ) h→0 h→0 ψ(. + D)). (ϕ(. + D), 2 We will also need the following lemma which is the analog of Lemma 3.7 of [17]. We keep the notation of the algorithm of extraction for further use. Lemma 2.10. Let {j, j } ∈ {1, . . . , K}2 be such that (j ) (j ) ⊥h x (K+1) , t (K+1) and x (j ) , t (j ) ⊥h x (j ) , t (j ) . x ,t (K+1)
Then, Dh
(K+1)
(wh
(K+1)
, ∂t wh
(K+1)
)(th
(j )
(j )
(K+1)
) 0 implies Dh (wh
(j )
(K+1)
, ∂t wh
(j )
)(th ) 0. (j )
(j )
Moreover, if we assume |t∞ − t∞ | < Tfocus (see Definition 0.1), then Dh (ph , (j )
(j )
(j )
∂t ph )(th ) (0, 0) for any concentrating wave ph h, x (j ) , t (j ) ].
associated with [(ϕ (j ) , ψ (j ) ),
Proof. The first result is a particular case of Lemma 2.9. The proof of the second part is very similar to Lemma 3.7 of [17]. To simplify the notation, we can assume by translation in time that (j ) th = 0. We have to distinguish two cases: time and space orthogonality.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
In the case of time orthogonality, that is |
(j )
th h
1,(j )
1339
1,(j )
| −→ +∞, we first prove Dh h→0
(j )
(j )
(ph )(th ) 0
(recall that the exponent 1 in Dh means that we only consider the H 1 part of the weak limit). Thanks to the nonfocusing assumption, Lemma 2.3 yields (j ) (j ) p t ,. h
−→ 0.
L6 (M) h→0
h
We choose (U, ΦU ) some local chart around x∞ and ΨU ∈ C0∞ (U ) equals to 1 around x∞ . (j )
(j )
1
(j )
(j )
(j )
(j )
Then, ΨU ph (th , .) L6 (M) −→ 0 and h 2 ΨU ph (th , xh + hx) L6 (R3 ) −→ 0 (here we (j )
have identified ΨU ph
h→0
(j )
1,(j )
hx) 0 and Dh
1
h→0 (j )
(j )
with its local representation in R3 ). In particular h 2 ΨU ph (th , xh + (j )
(j )
(j )
(ph )(th ) 0. Now, we want to prove more precisely Dh (ph , (j ) (j ) (j ) (j ) (j ) (j ) (j ) ∂t ph )(th ) 0. Suppose Dh (ph , ∂t ph )(th ) (0, ψ). Take s ∈ R arbitrary. t˜h =
(j ) t˜h (j ) +∞ and the nonfocusing property |t˜∞ | < Tfocus . h | −→ h→0 1,(j ) (j ) (j ) Dh (ph )(t˜h ) 0. But the proof of Lemma 2.9 gives that
(j )
th + sh fulfills the same assumption |
So, we conclude similarly that (j ) (j ) (j ) (j ) Dh (ph , ∂t ph )(t˜h ) (v, ∂t v)(s) where v is a solution of 2∞ v = 0,
(v, ∂t v)(0) = (0, ψ). (j )
(j )
(j )
(j )
So, we have v(s) = 0 for any s ∈ R, which gives ψ = 0 and Dh (ph , ∂t ph )(th ) (0, 0). (j )
(j )
In the case of th ⊥h th (j )
(j )
th = th
and space orthogonality, Lemma 2.9 allows us to assume that
= 0. In local coordinates, we have (j ) (j ) x − xh (j ) − 12 (j ) 1 (j ) . ph , ∂t ph (0) = h ΨU (x) ϕ , ψ h h
(j )
If x∞ = x∞ , the conclusion is obvious. If it is not the case, take g ∈ C0∞ (R3 ). For the first part, we have to estimate (j )
ΨU2
(j ) (j ) (j ) (j ) xh − xh xn + hy ϕ y+ g(y) dy h
R3
which goes to 0 as h tends to 0 because g is compactly supported. The same result holds for the (j ) second part for ∂t ph . 2 Let us come back to the proof of the orthogonality of cores in Proposition 2.2. Define (j ) (j ) (K+1) (K+1)
, xh jK = max j ∈ {1, . . . , K} th , xh ⊥h th assuming that such an index exists.
1340
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
We list a few consequences of our algorithm (l+1)
Dh
(l)
(l) (l+1) th ϕ (l+1) , ψ (l+1) h→0
with ϕ (l+1) = 0 if l K,
wh , ∂t wh
(l)
(l+1)
w h = ph
K+1
(j )
wh K =
(l+1)
+ wh
(38) (39)
,
(j )
ph + wh(K+1) .
(40)
j =jK +1
The definition of ph(l) and Lemma 1.6 implies Dh(l) (ph(l) , ∂t ph(l) )(th(l) ) (ϕ (l) , ψ (l) ). Then, we get (l+1) (l+1) (l+1) (l+1) ) (0, 0). We apply this to l + 1 = jK from (38) and (39) that Dh (wh , ∂t wh )(th (jK ) (jK ) (K+1) (K+1) and it gives Dh (wh , ∂t wh )(th ) (0, 0) thanks to the first part of Lemma 2.10 and the definition of jK . 1,(K+1) (l) The definition of jK and the second part of Lemma 2.10 gives Dh (ph , (l) (K+1) ∂t ph )(th ) (0, 0) for jK + 1 l K. 1,(K+1) 1,(K+1) (jK ) (K+1) To conclude, we “apply” Dh to equality (40) and get Dh wh (th ) ϕ (K+1) (jK ) (jK ) (K+1) (K+1) while we have just proved Dh (wh , ∂t wh )(th ) (0, 0) which is a contradiction and complete the proof of the proposition for 2T < Tfocus . In the case of S 3 and large times, the orthogonality result is a consequence of the orthogonality in short times and the almost periodicity. Denote (j ) (K+1) (K+1)
(j ) jK = max j ∈ {1, . . . , K} ∃m ∈ Z s.t. th + mπ, (−1)m xh ⊥h th . , xh Then, for any jK + 1 j K, we can find m(j ) ∈ Z such that (j ) (jK ) t∞ + m(j ) π − t∞ π/2 < Tfocus ,
(j ) (K+1) (K+1) (j ) (j ) th + m(j ) π, (−1)m xh ⊥h th , , xh (j )
(j )
(j )
(K+1)
(K+1)
, xh ). and we denote m(jK ) ∈ Z such that (th K + m(jK ) π, (−1)m K xh K ) ⊥h (th (j ) (j ) (j ) We remark that ph (th + m π, .) is still a nonzero concentrating data associated with (j ) (j ) [(−1)m (ϕ, ψ)((−1)m .), h, (−1)j x] thanks to Lemma 2.4 (note that it is at this stage that we use M = S 3 and a ≡ 0: it is the only case where we are able to describe this phenomenon of reconcentration). So, we are in the same situation as before, and we get a contradition. This completes the proof of Proposition 2.2. 2 Proof of Theorem 0.3. We only have to combine the two decompositions we made. Denote by j (j ) (j,α) (l) vn (and the rest ρn ) the hn -oscillatory component obtained by decomposition (24) and pn (j,Aj ) the concentrating waves obtained from decomposition (30) (and the rest wn ). We enumerate them by the bijection σ from N2 into N defined by σ (j, α) < σ (k, β)
if j + α < k + β or j + α = k + β and j < k.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1341
For l and Aj fixed, 1 j l, the rest can be written as wn(l,A1 ,...,Al ) = ρn(l) +
l
(j,Aj )
wn
.
j =1 (l,A ,...,A )
l L∞ (L6 ) ε Let ε > 0. To get the result, it suffices to prove that for l0 large enough, wn 1 for all (l, A1 , . . . , Al ) satisfying l l0 and σ (j, Aj ) σ (l0 , 1). (9) can easily be deduced from the same orthogonality result in the two other decompositions. (j,α) (j,α) In particular, it gives that the series of general term (j,α) limn→∞ (pn , ∂t pn )t=0 2E is convergent. In particular, we can find l0 large enough such that we have
(j,α) 2 (j,α) ε. lim pn , ∂t pn t=0 E
σ (j,α)>σ (l0 ,1)
(41)
n→∞
Moreover, for l0 large enough, we have for l l0 lim ρn(l) L∞ (L6 ) ε.
n→∞
Then, for any l l0 , one can find one Bl such that for any 1 j l, A˜ j Bl implies (j,A˜ ) lim wn j L∞ (L6 ) ε/ l.
n→∞
The rest can be decomposed by wn(l,A1 ,...,Al ) = ρn(l) +
l
(j,max(Aj ,Bl ))
wn
(j,A1 ,...,Al )
+ Sn
,
j =1
where (j,A1 ,...,Al )
Sn
=
l
(j,Aj ) (j,B ) wn − wn l =
(j,A ,...,Al )
j,α
pn .
j =1 Aj <αBl
1j l,Aj
Since Sn 1 embedding give
is a solution of the damped wave equation, energy estimates and Sobolev
(j,A ,...,Al ) 2 2 ∞ 6 C lim Sn(j,A1 ,...,Al ) , ∂t Sn(j,A1 ,...,Al ) lim Sn 1 t=0 E L (L )
n→∞
n→∞
C
l
j =1 Aj <αBl
(j,α) pn , ∂t pnj,α
2 , t=0 E
where we have used almost orthogonality in the last estimate. But the sum is restricted to some (j, α) satisfying σ (j, α) > σ (j, αj ) > σ (l0 , 1) and is indeed smaller than Cε thanks to (41).
1342
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 (l,A ,...,A )
l Combining our estimates, we get that limn→∞ wn 1 L∞ (L6 ) is smaller than (2 + C)ε for all (l, A1 , . . . , Al ) satisfying l l0 and σ (j, Aj ) σ (l0 , 1). We get the same estimates with the L5 (L10 ) norm by interpolation between L∞ (L6 ) and L4 (L12 ). The second norm being bounded by Strichartz estimates and the fact that wn(l,A1 ,...,Al ) is uniformly bounded in the energy space. 2
We also state a few consequences of the algorithm of Theorem 0.3 that will be used below. The following two lemmas use the notation and the assumptions of Theorem 0.3. Lemma 2.11. Let 2T < Tfocus . For any l ∈ N and 1 j l, we have, with the notation and assumptions of Theorem 0.3 (j )
(j ) wn(l) , ∂t wn(l) tn (0, 0).
Dn (j )
(j )
Proof. Assume Dn (wn(l) , ∂t wn(l) )(tn ) (ϕ, ψ). We directly use the decomposition of Theorem 0.3 to write for L > l L
wn(l) =
pn(i) + wn(L) .
i=l+1 (j )
(j )
(i)
(i)
In case of scale orthogonality of hn and hn , for l + 1 i L, we have directly Dn (pn , (j ) (j ) (j ) (j ) (i) (i) ∂t pn(i) )(tn ) (0, 0). Otherwise, if hn = h(i) n and (x , t ) ⊥h (x , t ), Lemma 2.10 (j ) (j ) (L) (L) gives the same result. Therefore, Dn (wn , ∂t wn )(tn ) (ϕ, ψ). Since (L) limn→∞ wn L∞ ([−T ,T ],L6 ) −→ 0, we have ϕ = 0. We finish the proof as in Lemma 2.10. L→∞
(j )
(j )
We use the same argument for times tn + shn and get ψ ≡ 0 by the proof of Lemma 2.9. Re(j ) (l) mark that Lemma 2.9 requires that wn is strictly hn -oscillatory, but this can be easily avoided (j ) (j ) (l) by decomposing wn = fn + gn with fn (hn )-oscillatory and gn (hn )-singular. 2 Lemma 2.12. With the notation and assumptions of Theorem 0.3, we have, for any j ∈ N (j ) lim pn L5 ([−T ,T ],L10 ) C lim vn L5 ([−T ,T ],L10 )
n→∞
n→∞
where C only depends on the manifold M. Proof. We first assume 2T < Tfocus . Actually, in the case of R3 , the result is proved using the (j ) fact that the pn are some concentration of some weak limit of a dilation of vn . The proof for a manifold follows the same path with a little more care due to the fact that dilation only have a local meaning. For any ε > 0, we prove (j ) lim pn L5 ([−T ,T ],L10 ) C lim vn L5 ([−T ,T ],L10 ) + Cε.
n→∞
n→∞
We use the decomposition of Theorem 0.3 and choose l j large enough such that
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1343
lim wnl L5 ([−T ,T ],L10 ) ε.
n→∞
j
Let ΨU be a cut-off function related to local charts (U, ΦU ) such that ΨU (x) = 1 around x∞ and i = x j . ΨU (x) = 0 around any x∞ ∞ 1,Λ 2,Λ 3,Λ ∪ In,i ∪ In,i according to Lemma 2.3. For each 1 i l, we decompose [−T , T ] = In,i j
i = x , for Λ large enough, we have For any i such that x∞ ∞
lim pn(i) L5 (I 1,Λ ∪I 3,Λ ,L10 ) ε/ l.
n→∞
n,i
(42)
n,i
Moreover, Lemma 2.2 yields for Λ large enough lim pn(i) − vn(i) L5 (I 2,Λ ,L10 ) ε/ l
n→∞
where vn(i) (t, x) =
(i)
1 Φ ∗ ΨU (x)v (i) ( t−t(i)n U (i) hn hn
(43)
n,i
(i)
, x−x(i)n ) on a coordinate patch and v (i) solution of hn
2x j v (i) = 0 on R × Tx j M, ∞ ∞ (i) v (0), ∂t v (i) (0) = ϕ (i) , ψ (i) .
(44)
Thanks to (42) and (43), the conclusion of the lemma will be obtained if we prove (j ) v
L5 (R,L10 (T
j M)) x∞
lim vn L5 ([−T ,T ],L10 ) + Cε. n→∞
We argue by duality. Take f ∈ C0∞ (R × Tx j M) with f L5/4 (R,L10/9 ) = 1. ∞
(j )
From now on, we work in local coordinates around x∞ and we will not distinguish a function defined on U ⊂ M with its representative in R3 ≈ Tx j M. Denote by W j the operator defined on ∞
functions on Rt × R3 by W g(s, y) := j
j j j j j hn g tn + hn s, tn + hn s .
(j )
The definition of vn in local coordinates yields j (j ) W 1[−T ,T ] vn f n→∞ −→ R×R3
v (j ) f.
R×R3
On the other hand j j W ΨU 1[−T ,T ] pn f R×R3
= R×R3
W ΨU 1[−T ,T ] vn − pni − j
(j ) (i) x∞ =x∞
(j ) (i) x∞ =x∞ ,i=j
pni
− wnl
f.
1344
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 (j )
(i)
For any 1 i l, with x∞ = x∞ , using again Lemmas 2.3 and 2.2 and the fact that we can (i) choose ΨU with ΨU (x∞ ) = 0, we easily get lim ΨU pn(i) L5 ([−T ,T ],L10 ) = 0.
n→∞
So for n large enough j (j ) W f Ψ p U n C vn L5 ([−T ,T ],L10 ) + 2ε R×R3
+
W j ΨU 1[−T ,T ]
(i)
pn(i) f .
(j )
x∞ =x∞ ,i=j
R×R3 (j )
(i) But for i = j , x∞ = x∞ , using (42) and then (43), we have for Λ and n large enough j (i) j (i) W ΨU 1[−T ,T ] pn f W ΨU 1I 2,Λ pn f + ε/ l n,i
R×R3
R×R3
W j ΨU 1I 2,Λ vn(i) f + 2ε/ l. n,i
R×R3
These terms are actually j (i) W ΨU 1I 2,Λ vn f n,i
R×R3
=
j j j j j i i hn j 2 j (i) thn + tn − tn xhn + xn − xn ΨU hn x + xn 1 t i −t j −Λhi t i −t j +Λhi v f . , hin hin hin [ n nj n , n nj n ] R×R3
hn
hn
Since this expression is uniformly continuous in v i ∈ L5 (R, L10 (R3 )), we may assume v i in C0∞ (R × R3 ). Then, if
j
hn −→ 0, hin n→∞
R×R3 j
If
hn −→ ∞, hin n→∞
j hn j (i) . W ΨU 1I 2,Λ vn f = O n,i hin
the change of variables s = R×R3
j
we have
W
j
j
j
thn +tn −tni j hn
ΨU 1I 2,Λ vni n,i
,y=
j
j
xhn +xn −xni hin
gives
j −7/2 hn . f =O hin
If hn = hin , the space or time orthogonality yields that the integral is zero for n large enough.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1345
In conclusion, for any f ∈ C0∞ (R × R3 ) with f L5/4 (R,L10/9 ) = 1, we have proved:
v f C lim vn L5 ([−T ,T ],L10 ) + Cε. n→∞ j
R×R3
This gives the expected result by duality. The case of S 3 is proved by considering subintervals of length smaller than Tfocus where the former result can be applied. 2 2.2. Nonlinear profile decomposition 2.2.1. Behavior of nonlinear concentrating waves (after S. Ibrahim) In this subsection, we recall the description of nonlinear concentrating waves. As explained in the introduction, the behavior for times close to concentration is ruled by the scattering operator on R3 with a flat metric. So, we first state the existence of the wave operator on R3 , following the notation of [2]. We state it for any constant metric on the tangent plane Tx∞ M ≈ R3 . Proposition 2.3 (Scattering operators on R3 ). Let x∞ ∈ M and 2∞ be the d’Alembertian operator (constant) on Tx∞ M ≈ R3 induced by the metric on M. To every solution of
2∞ v = 0 on R × Tx∞ M, v(0), ∂t v(0) = (ϕ, ψ) ∈ Ex∞
there exists a unique strong solution u± of
2∞ u± = −|u± |4 u± on R × Tx∞ M, lim v − u± , ∂t (v − u± ) (t)E = 0.
t→±∞
x∞
The wave operators Ω± : (v, ∂t v)t=0 → (u± , ∂t u± )t=0 are bijective from Ex∞ onto itself. The scattering operator S is defined as S = (Ω+ )−1 ◦ Ω− . The analysis of nonlinear concentrating waves computed by S. Ibrahim in [21] shows that there are three different periods to be considered: before, during and after the time of concentration. Roughly speaking, for times close to the concentrating time, the solution is closed to nonlinear concentrating waves on R3 with flat metric and without damping, as described in Bahouri and Gérard [2]: in the fast time hn t, it follows the scattering on R3 . Before and after the time of concentration, the nonlinear concentrating wave is “close” to some linear damped concentrating waves as defined in Table 1 below. This is precised in the following theorem whose proof can be found in S. Ibrahim [21]. Yet, in [21], the result is stated for an equation without damping and we give a sketch of the proof in the damped case in Section 2.2.2.
1346
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Table 1 Transformation of the profile through a focus. t
lim hh −∞ 0 ∞
(ϕ1 , ψ1 )
(ϕ2 , ψ2 )
(ϕ3 , ψ3 )
−1 Ω− ◦ Ω+ (ϕ, ψ) −1 Ω− (ϕ, ψ) (ϕ, ψ)
Ω+ (ϕ, ψ) (ϕ, ψ) Ω− (ϕ, ψ)
(ϕ, ψ) −1 Ω+ (ϕ, ψ) −1 Ω+ ◦ Ω− (ϕ, ψ)
Theorem 2.1. Let v = [(ϕ, ψ), h, x, t] be a linear damped concentrating wave. We denote by u its associated nonlinear damped concentrating wave (same data at t = 0). There exist three linear damped concentrating waves denoted by [(ϕi , ψi ), h, x, t], i = 1, 2 or 3 such that: for all interval [−T , T ] containing t∞ , satisfying the following non-focusing property (see Definition 0.1) mes(Fx,x∞ ,s ) = 0
∀x ∈ M and s = 0 such that t∞ + s ∈ [−T , T ]
(45)
we have lim un − (ϕ1 , ψ1 ), h, x, t I 1,Λ −→ 0, n n Λ→+∞ lim un − (ϕ3 , ψ3 ), h, x, t I 3,Λ −→ 0 n
n
Λ→+∞
(46) (47)
where In1,Λ = [−T , tn − Λhn ] and In3,Λ = ]tn + Λhn , T ]. Moreover, for times close to concentration In2,Λ = [tn − Λhn , tn + Λhn ], we have ∀Λ > 0,
lim |||un − wn |||I 2,Λ = 0 n
n
(48)
n x−xn where wn (t, x) = ΨU (x) √1h w( t−t hn , hn ) on a coordinate patch and w solution of n
2∞ w = −|w|4 w on R × Tx∞ M, w(0), ∂t w(0) = (ϕ2 , ψ2 ),
(49)
where 2∞ corresponds to the frozen metric on Tx∞ M. The different functions (ϕi , ψi ) are defined according to Table 1, following the notation of Proposition 2.3. Remark 2.2. Note that the transition from the first column to the third one represents the modification of profile due to the concentration and the concentrating functions are modified according to the scattering operator S. To go from the first column to the second one, we apply the operator −1 Ω− while we apply Ω+ to get from the second to the third one. Remark 2.3. The behavior for times close to concentration is not written in this way in the article [21] of S. Ibrahim, but is a byproduct of its proof. We refer to the next section which contains a sketch of the proof.
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1347
Corollary 2.2. A nonlinear damped concentrating wave qh is strictly (h)-oscillatory with respect to AM and bounded in all Strichartz norms, uniformly on any bounded interval. Proof. The boundedness of all Strichartz norms is a consequence of the Duhamel formula and Strichartz estimates once the result is known in the case of L5 L10 . On the intervals In1,Λ and In3,Λ when qh is closed to a linear concentrating wave, the result follows from Proposition 1.4 and linear Strichartz estimates. On In2,Λ , qh behaves like a concentration of a nonlinear solution on Tx∞ M. The strict (h)-oscillation is obvious and the Strichartz estimates follow from the global estimates on R3 . 2 In the case of S 3 , thanks to a better knowledge of the behavior of nonlinear concentrating waves we can avoid assumption (45). This is Theorem 1.8 from [21]. It will allow us to perform the profile decomposition for large times. Theorem 2.2. Let v = [(ϕ, ψ), h, x, t] be a linear (not damped, that is a(x) ≡ 0) concentrating wave on S 3 . We denote by u its nonlinear associated concentrating wave (same data at t = 0). We assume that t∞ ∈ ]0, π[. Then, for all j ∈ Z, we have lim un − S˜ (j ) S(ϕ, ψ), h, (−1)j x, t ]t n
n +j π+Λhn ,tn +(j +1)π−Λhn ]
−→ 0
Λ→+∞
˜ j times and A(ϕ, ψ)(x) = −(ϕ, ψ)(−x). where S˜ = S ◦ A, S˜ (j ) = S˜ ◦ S˜ ◦ · · · ◦ S, Moreover, the cases t∞ ∈ ]−π, 0[ and t∞ = 0 can be deduced similarly to Theorem 2.1 with some changes on the concentration data in the same spirit as Table 1. 2.2.2. Modification of the proof of S. Ibrahim for Theorem 2.1 in the case of damped equation In this subsection, we give some sketch of the proof for the behavior of nonlinear damped concentrating waves announced in Section 2.2.1. These results are proved in [21] in the undamped case a(x) ≡ 0 and so we only briefly emphasize the main necessary modifications of the proof. To simplify, we only treat the case htnn −→ ∞. n→+∞
Sketch of the proof of estimate (46) of Theorem 2.1: Behavior before concentration. The proof is exactly the same as Corollary 3.2 of [21]. wn = un − vn is a solution of 2wn + wn + a(x)∂t wn = −|wn + vn |4 (wn + vn )
on In1,Λ × M,
(wn , ∂t wn )|t=0 = (0, 0). Using Strichartz and energy estimates, we are able to use a bootstrap argument if limn→∞ vn L5 (I 1,Λ ,L10 ) is small enough. This can be achieved thanks to Lemma 2.3 and gives n the result. 2 Sketch of the proof of estimate (48) of Theorem 2.1: Behavior for times close to concentration. By definition of vn and finite propagation speed, the main energy part of vn is concentrated near x∞ for times close to t∞ . By estimate (46), it is also the case for un . Therefore, for times t ∈ [tn − Λhn , tn + Λhn ], we can neglect the energy outside of a fixed open set and work in local
1348
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
coordinates. Moreover, in that case, we can use the norm ||| · |||I ×R3 instead of ||| · |||I and use the fact that it is invariant by translation and scaling up to a modification of the interval of time. Denote by u˜ n (resp. v˜n ) the rescaled function associated to un (resp. vn ), so that un (t, x) = n √1 u ˜ ( t−tn , x−x ˜ n − w|||[−Λ,Λ]×R3 −→ 0 where w is a solution hn ). We need to prove limn→∞ |||u hn n hn Λ→∞ of
2∞ w = −|w|4 w on R × R3 , (w, ∂t w)|t=0 = (ϕ2 , ψ2 ) = Ω− (ϕ, ψ).
By definition of Ω− , w satisfies (w − v, ∂t (w − v))(t) H˙ 1 ×L2 −→ 0 where v is a solution of t→−∞
2∞ v = 0
on R × R3 ,
(50)
(v, ∂t v)|t=0 = (ϕ, ψ).
Moreover, it is known that Ω− (ϕ, ψ) = lims→−∞ U (−s)U0 (s)(ϕ, ψ) where U and U0 are the nonlinear and linear flow maps. More precisely, by Lemma 3.4 of [21], we have |||wΛ − w|||[−Λ,Λ]×R3 −→ 0 where wΛ is the smooth solution of Λ→∞
2∞ wΛ + |wΛ |4 wΛ = 0 on [−Λ, Λ] × R3 , (wΛ , ∂t wΛ )|t=−Λ = χΛ (v, ∂t v)|t=−Λ ,
where χΛ is an appropriate family of smoothing operator. So, we are left to prove limn→∞ |||u˜ n − wΛ |||[−Λ,Λ]×R3 −→ 0. Λ→∞
We introduce the auxiliary family of functions u˜ Λ n solution of
4 Λ 2 Λ ˜ = −hn a(hn x + xn )∂t u˜ Λ 2n u˜ Λ ˜ n + u˜ Λ n + hn u n u n n Λ u˜ n , ∂t u˜ Λ = ( v ˜ , ∂ v ˜ ) , n t n |t=−Λ n |t=−Λ
on [−Λ, Λ] × R3 ,
wherewe have denoted by 2n the dilation of the operator 2. So it can be written as 2n = ∂t2 − i,j g ij (hn x + xn )∂ij + hn V (hn x + xn ) · ∇ where V is a smooth vector field (note that it is only defined in an open set of size O(h−1 ˜ n , u˜ Λ n ) but it is also the case for u n and v˜ n , we omit the details). The proof is complete if we prove Λ lim u˜ Λ −→ 0 n −w [−Λ,Λ]×R3
(51)
lim u˜ Λ ˜ n [−Λ,Λ]×R3 −→ 0. n −u
(52)
n→∞
Λ→∞
and
n→∞
Λ We begin with (51). rn,Λ = u˜ Λ n − w is a solution of
Λ→∞
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1349
⎧ 2n rn,Λ + h2n rn,Λ + hn a(hn x + xn )∂t rn,Λ ⎪ ⎪ ⎪ ⎪ 4 ⎨ = |w |4 w − |r Λ Λ n,Λ + wΛ | (rn,Λ + wΛ ) 2 ⎪ − hn wΛ − hn a(hn x + xn )∂t wΛ + (2∞ − 2n )wΛ , ⎪ ⎪ ⎪ ⎩ (r , ∂ r ) n,Λ t n,Λ |t=−Λ = v˜ n − χΛ v, ∂t (v˜ n − χΛ v) |t=−Λ . A quick scaling analysis easily yields that the operator 2n + h2n + hn a(hn x + xn )∂t satisfies the same Strichartz and energy estimates as 2 + 1 + a(x)∂t for some times of order Λ. Moreover, following the same argument as Lemma 2.1 of [21], we get that for fixed Λ lim −h2n wΛ − hn a(hn x + xn )∂t wΛ + (2∞ − 2n )wΛ L1 ([−Λ,Λ],L2 ) = 0.
n→∞
Thanks to Lemma 2.2, we know that limn→∞ (v˜n − χΛ v, ∂t (v˜n − χΛ v))(−Λ) H˙ 1 ×L2 can be made arbitrary small for large Λ. Strichartz and energy estimates give for any η > −Λ |||rn,Λ |||[−Λ,η]×R3 v˜n − χΛ v, ∂t (v˜n − χΛ v) (−Λ)H˙ 1 ×L2 + −h2n wΛ − hn a(hn x + xn )∂t wΛ + (2∞ − 2n )wΛ L1 ([−Λ,η],L2 ) + rn,Λ 5L5 ([−Λ,η],L10 ) + rn,Λ L5 ([−Λ,η],L10 ) wΛ 4L5 ([−Λ,η],L10 ) . If wΛ L5 ([−Λ,η],L10 ) is small enough, a bootstrap gives (51) on [−Λ, η]. We can iterate the process by dividing [−Λ, Λ] in a finite number of intervals where the bootstrap can be performed. ˜ n are solutions of the same equation but with different For (52), we observe that u˜ Λ n and u initial data which satisfy thanks to estimate (46) lim u˜ Λ ˜ n , ∂t u˜ Λ ˜ n (−Λ)E = lim v˜n − u˜ n , ∂t (v˜n − u˜ n ) (−Λ)E −→ 0. n −u n −u
n→∞
n→∞
Λ→∞
Then, Strichartz and energy estimates allow us to use a bootstrap argument on subintervals I such that u˜ Λ n L5 (I,L10 ) is small. (51) allows to complete the proof. 2 2.2.3. Proof of the decomposition This subsection is devoted to the proof of Theorem 0.4. Let us define the function β in the following way: ∀ω ∈ C,
def
β(ω) := |ω|4 ω. (j )
Proposition 2.4. Let 0 < 2T < Tfocus (see Definition 0.1). Let pn , 1 j l, be linear damped concentrating waves, associated with data [(ϕ (j ) , ψ (j ) ), h(j ) , x (j ) , t (j ) ] (we can have h(j ) = 1 (j ) for one of it), which are orthogonal according to Definition 1.2 and such that t∞ ∈ [−T , T ]. (j ) Denote by qn the associated nonlinear damped concentrating waves (same data at t = 0). Then, we have l l
(j ) (j ) lim β qn β qn − n→∞ j =1
j =1
= 0. L1 ([−T ,T ],L2 )
(53)
1350
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Proof. We follow closely Lemma 4.2 of [17] l l
(j ) (j ) qn β qn − β j =1
j =1
L1 ([−T ,T ],L2 )
5 (jk ) qn
1j1 ,...,j5 l k=1
L1 ([−T ,T ],L2 )
(j )
where at least two qn k are different. In the case of orthogonality of scales, we use the Hölder inequality 5 (jk ) qn k=1
L1 ([−T ,T ],L2 )
5 (jk ) qn 3 C qn1 qn2 L∞ ([−T ,T ],L3 ) . L ([−T ,T ],L18 ) k=3
Then, Corollary 2.2 and Lemma 1.8 yield the result (note that L3 L18 is a pair of Strichartz norm). So now, we can assume h1n = h2n = hn . By Hölder and Corollary 2.2, we get 5 (jk ) qn k=1
L1 ([−T ,T ],L2 )
5 (jk ) qn 5 C qn1 qn2 L5/2 ([−T ,T ],L5 ) L ([−T ,T ],L10 ) k=3
C q 1 q 2
n n L5/2 ([−T ,T ],L5 ) .
We apply Theorem 2.1 to qn1 . We obtain three couples (ϕ i , ψ i ), i = 1, 2, 3 and split the interval j,Λ [−T , T ] = 3j =1 In . We first deal with the interval In1,Λ . Denote v1 = [(ϕ1 , ψ1 ), h, x, t] so that 1 2 q q
n n L5/2 (In1,Λ ,L5 )
qn1 L5 (I 1,Λ ,L10 ) C qn1 − v1,n L5 (I 1,Λ ,L10 ) + v1,n L5 (I 1,Λ ,L10 ) . n
n
n
So, combining Theorem 2.1 and Lemma 2.3 yields limqn1 qn2 L5/2 (I 1,Λ ,L5 ) −→ 0. n
n
Λ→∞
The same result holds for In3,Λ and we are led with the interval In2,Λ . In the case of time orthog|t 2 −t 1 |
onality, say nhn n n→∞ −→ +∞, the two intervals [tn1 − Λhn , tn1 + Λhn ] and [tn2 − Λhn , tn2 + Λhn ] have empty intersection for fixed Λ and n large enough, which yields the result by the same estimates applied to qn2 , once Λ is chosen large enough. We can now assume, up to a translation in time, that tn1 = tn2 . On In2,Λ , Theorem 2.1 allows us t−t 1
x−x 1
to replace qn1 by wn1 (t, x) = ΨU1 (x)w 1 ( hnn , hn n ) on a coordinate patch where w 1 is a solution 2 of a nonlinear wave equation on the tangent plane Tx∞ 1 M and similarly for qn . In the first case
1 = x 2 , the result is obvious on the interval I 2,Λ by taking Ψ 1 of space orthogonality, that is x∞ n ∞ U 1 = x 2 , we are left with the estimate of and ΨU2 with empty intersection. In the case x∞ ∞
1 w (t, x)w 2 (t, x) 5 n
In2
R3
n
1/2
ds [−Λ,Λ]
1 2 5 1/2 1 w (t, x)w 2 t, x + xn − xn ds. hn R3
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1351
This yields the result in the last case of space orthogonality by approximating w 1 and w 2 by compactly supported functions. 2 In the case of the sphere, we are able to state the same result without any restriction on the time. Corollary 2.3. Let M = S 3 and T > 0 (eventually large). We make the same assumptions as in Proposition 2.4, except for the time T , with the additional hypothesis: [h(i) , (−1)m x (i) , t (i) + mπ] is orthogonal to [h(j ) , x (j ) , t (j ) ] for any m ∈ Z and i = j . Moreover, we assume a(x) ≡ 0 (undamped equation). Then, the same conclusion as in Proposition 2.4 is true. Proof. We build a covering of the interval [−T , T ] with a finite number of intervals of length strictly less than Tfocus = π so that on each of this interval I = [α, β] and for any 1 i l, (i) there exists at most one m(i) ∈ Z such that t∞ + m(i) π ∈ I . Moreover, one can also impose (i) (i) α = t∞ + m π . (i) (i) (i) (i) Therefore, α ∈ ]tn + (mi − 1)π + Λhn , tn + m(i) π − Λhn ] for large fixed Λ and n large (i) (i) (i) (i) enough. Theorem 2.2 yields (qn − vn , ∂t (qn − vn ))t=α E n→∞ −→ 0 for a linear concentrating (i) (i) m (i) (i) (i) (i) (i) ˜ wave vn = [S S(ϕ , ψ ), h , x , t ]. In each interval, we are in the same situation as in Proposition 2.4 which yields the desired result. 2 Now, we are ready for the proof of the nonlinear profile decomposition. We give it in a quite sketchy way since it is very similar to the one of [2] or [17]. First, we obtain it in the particular case where the linear solution is small in Strichartz norm. Lemma 2.13. There exists δ1 > 0 such that if lim vn L5 ([−T ,T ],L10 ) δ1
n→∞
then the conclusion of Theorem 0.4 is true. (l)
Proof. The proof is essentially the same as Lemma 4.3 of [2]. We have to estimate the rest rn solution of ⎧ ⎪ ⎪ ⎨
2rn(l)
+ rn(l)
+ a(x)∂t rn(l)
⎪ ⎪ ⎩ (l) rn , ∂t rn(l) t=0 = (0, 0).
l l
(j ) (j ) (l) (l) = β(u) + β qn − β u + qn + wn + rn , j =1
j =1
We conclude as in [2] using Proposition 2.4 and Lemma 2.12 which is not immediate on a manifold. In the case of S 3 and a ≡ 0 for large T , we use Corollary 2.3 instead of Proposition 2.4. 2
1352
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Once the result is obtained when Strichartz norms are small, we divide [−T , T ] in a finite number of intervals where the Strichartz norms are small enough. This is done in the following lemma. Lemma 2.14. Let 2T < Tfocus . Let δ > 0 and q˜n be a sequence in L5 ([−T , T ], L10 (M)), such that lim q˜n L5 ([−T ,T ],L10 ) δ.
n→∞
(j )
Fix also l ∈ N and l sequences of nonlinear concentrating waves qn , j = 1, . . . , l. Then, for any δ > δ, there exists L ∈ N such that for any n ∈ N, we have the decomposition (i) of [−T , T ] in closed intervals In L (j )
[−T , T ] =
In , i=1
such that the sequence
Γn =
l
(j )
qn + q˜n
j =1 (i)
satisfies on each interval In
lim Γn L5 (I (j ) ,L10 ) δ .
n→∞
n
Proof. We first treat the case l = 1. We divide [−T , T ] = In1,Λ ∪ In2,Λ ∪ In3,Λ according to Theorem 2.1 (one of these intervals being possibly empty). Then, a combination of estimate (46) of Theorem 2.1 (comparison with linear concentrating wave) and Lemma 2.3 (non-reconcentration) gives for Λ large enough lim qn(1) L5 (I 1,Λ ,L10 ) δ − δ.
n→∞
n
The same result holds for In3,Λ and we are left with the interval In2,Λ . Once Λ is fixed, we can divide [−Λ, Λ] in a finite number of intervals I (i),Λ such that w L5 (I (i),Λ ,L10 ) δ − δ where (i),Λ
w is the function defined by Eq. (49) of Theorem 2.1. Then, we replace each I (i),Λ by In (1) obtained by translation dilation. We conclude by the approximation (48) of qn by translation 2,Λ dilation of w on the interval In . 2 Note that the previous lemma also applies for large times on S 3 with a ≡ 0 by doing a first decomposition of [−T , T ] in a finite number of intervals of length strictly less than π .
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1353 (l)
End of the proof of Theorem 0.4 in the general case. We choose l ∈ N such that wn δ1 (j ) and use Lemma 2.14 in order to be able to apply Lemma 2.13 on each interval In . See [2] or in the different context of the Schrödinger equation [26]. 2 2.3. Applications 2.3.1. Strichartz estimates and Lipschitz bounds for the nonlinear evolution group Proposition 2.5. Let T > 0 be fixed. There exists a non-decreasing function, A : [0, ∞[ → [0, ∞[, such that any solution of
2u + u + a(x)∂t u = −|u|4 u on [−T , T ] × M, u(0), ∂t u(0) = (u0 , u1 ) ∈ E
(54)
fulfills u L8 ([−T ,T ],L8 (M)) + u L5 ([−T ,T ],L10 (M)) + u L4 ([−T ,T ],L12 (M)) A (u0 , u1 )E . Proof. The proof is exactly the same as Corollary 2 of [2]. Using Strichartz estimates, it is enough to get the result for L5 L10 . We argue by contradiction and suppose that there exists a sequence un of strong solutions of Eq. (54) satisfying sup(u0,n , u1,n )E < +∞, n
un L5 ([−T ,T ],L10 (M)) n→∞ −→ +∞.
We apply the profile decomposition of Theorem 0.4 to our sequence. We get a contradiction by the fact that the L5 ([−T , T ], L10 (M)) norm of a nonlinear concentrating wave is uniformly bounded thanks to Corollary 2.2. This argument works for times 2T < Tfocus and can be reiterated since the nonlinear energy at time T can be bounded with respect to the one at time 0 thanks to almost conservation (we can also use energy estimates once we know u is uniformly bounded in L5 L10 ). 2 Lemma 2.15. Let R0 > 0 and T > 0. Then, there exists C > 0 such any solution u satisfying ⎧ + u + a(x)∂t u + |u|4 u = 0 on [−T , T ] × M, ⎪ ⎨ 2u u(0), ∂t u(0) = (u0 , u1 ) ∈ E, ⎪ ⎩ (u0 , u1 ) R0 . E
(55)
fulfills u(t), ∂t u(t)
L2 ×H −1
C u(0), ∂t u(0) L2 ×H −1
∀t ∈ [−T , T ].
Proof. Proposition 2.5 yields a uniform bound for u in L4 ([−T , T ], L12 (M)) and so for V = |u|4 in L1 ([0, T ], L3 (M)). We prove uniform estimates for some solutions of the linear equation
2u + u + a(x)∂t u = V u on [−T , T ] × M, u(0), ∂t u(0) = (u0 , u1 ) ∈ L2 × H −1
(56)
1354
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
where V satisfies V L1 ([−T ,T ],L3 (M)) A(R0 )4 . The product of functions in L∞ ([−T , T ], L2 ) and L1 ([−T , T ], L3 ) is in L1 ([−T , T ], L6/5 ) and so in L1 ([−T , T ], H −1 ) by Sobolev embedding. Standard estimates yield (u, ∂t u)
L∞ ([0,t],L2 ×H −1 )
C u(0), ∂t u(0) L2 ×H −1 + C t + V L1 ([0,t],L3 ) (u, ∂t u)L∞ ([0,t],L2 ×H −1 ) .
We can divide the interval [−T , T ] into a finite number of intervals [ai , ai+1 ]i=1,...,N such that C(t + V L1 ([ai ,ai+1 ],L3 (M)) ) < 1/2. N depends only on R0 and T (not on V ). Then, on each of these intervals, we have (u, ∂t u)
L∞ ([ai ,ai+1 ],L2 ×H −1 )
2C u(ai ), ∂t u(ai ) L2 ×H −1 .
We obtain the expected result by iteration. The final constant C only depends on R0 and T since it is also the case for N . 2 Corollary 2.4. Let R0 > 0 and T > 0. For any ε > 0, there exists δ > 0 such that any solution u satisfying (55) and (u0 , u1 ) L2 ×H −1 δ satisfies u(T ), ∂t u(T )
L2 ×H −1
ε.
We will also need the following lemma which states the local uniform continuity of the flow map. Note that it can be proved to be locally Lipschitz with a slightly more complicated argument (see Corollary 2 of [17]). We will not need this for our purpose. Lemma 2.16. Let un , u˜ n be two sequences of solutions of
2un + un + |un |4 un = gn on [−T , T ] × M, (un , ∂t un )t=0 = (un,0 , un,1 ) bounded in E,
with (un,0 − u˜ n,0 , un,1 − u˜ n,1 ) E + gn − g˜ n L1 ([−T ,T ],L2 ) n→∞ −→ 0. Then, we have |||un − u˜ n |||[−T ,T ] n→∞ −→ 0. Proof. rn = un − u˜ n is a solution of
2rn + rn + |un |4 un − |u˜ n |4 u˜ n = gn − g˜ n
on [−T , T ] × M,
(rn , ∂t rn )t=0 = (un,0 − u˜ n,0 , un,1 − u˜ n,1 ). Using energy and Strichartz estimates, we get |||rn |||[−T ,T ] C (un,0 − u˜ n,0 , un,1 − u˜ n,1 )E + C gn − g˜ n L1 ([−T ,T ],L2 ) + C rn L5 ([−T ,T ],L10 ) un 4L5 ([−T ,T ],L10 ) + u˜ n 4L5 ([−T ,T ],L10 ) .
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1355
Using Proposition 2.5, we can divide the interval [−T , T ] in a finite number of intervals Ii,n = [ai,n , ai+1,n ], 1 i N , such that C( un 4L5 (I ,L10 ) + u˜ n 4L5 (I ,L10 ) ) < 1/2 so that the third i,n i,n term can be absorbed. We iterate this estimate N times, which gives the result. 2 2.3.2. Profile decomposition of the limit energy For u solution of the nonlinear wave equation, we denote its nonlinear energy density by e(u)(t, x) =
2 2 1 6 2 1 ∂t u(t, x) + ∇u(t, x) + u(t, x) + u(t, x) . 2 6
For a sequence un of solution with initial data bounded in E, the corresponding nonlinear energy density is bounded in L∞ ([−T , T ], L1 ) and so in the space of bounded measures on [−T , T ] × M. This allows to consider, up to a subsequence, its weak∗ limit. The following theorem is the equivalent of Theorem 7 in [8]. It proves that the energy limit follows the same profile decomposition as un . It will be the crucial argument that will allow to use microlocal defect measure on each profile and then to apply the linearization argument. Theorem 2.3. Assume 2T < Tfocus . Let un be a sequence of solutions of 2un + un + |un |4 un = 0 with (un , ∂t un )(0) weakly convergent to 0 in E. The nonlinear energy density limit of un (up to subsequence) reads e(t, x) =
+∞
e(j ) (t, x) + ef (t, x)
j =1 (j )
where e(j ) is the limit energy limit density of qn (following the notation of Theorem 0.4) and ef = lim lim e wn(l) l→∞ n→∞
where the two limits are considered up to a subsequence and in the weak∗ sense. In particular, ef can be written as ef (t, x) =
μ(t, x, dξ )
ξ ∈Sx2
with μ(t, x, ξ ) = μ− Gt (x, ξ ) + μ+ G−t (x, ξ ) where Gt is the flow map of the vector field H|ξ |x on S ∗ M, that is the hamiltonian of the Riemannian metric.
1356
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Moreover, e is also the limit of the linear energy density elin (un )(t, x) =
2 2 1 ∂t un (t, x) + ∇un (t, x) . 2
Proof. Proposition 2.5 yields un L8 ([−T ,T ]×M) C. Then, compact embedding and Lemma 2.15 yield un L2 ([−T ,T ]×M) n→∞ −→ 0 and so un L6 ([−T ,T ]×M) n→∞ −→ 0 by interpolation. Therefore, e is the limit of b(un , un ), with b(f, g) = ∂t f (t, x)∂t g(t, x) + ∇f (t, x) · ∇g(t, x). Now, we have to compute the limit of b(un , un ) using decomposition (10) of Theorem 0.4. We set for any l ∈ N sn(l) =
l
(j )
qn
j =1
and so b(un , un ) = b sn(l) , sn(l) + b wn(l) , wn(l) + 2b sn(l) , wn(l) + 2b un , rn(l) − b rn(l) , rn(l) . (l)
(l)
(l)
Because of (11), limn→∞ 2b(un , rn ) − b(rn , rn ) L1 ([−T ,T ]×M) converges to zero as l tends
to infinity. So, if we define er = w ∗ limn→∞ (2b(un , rn ) − b(rn , rn )), we have (l)
(l)
(l) e r
(l)
(l)
−→ 0.
TV l→∞
Let ϕ ∈ C0∞ (]−T , T [ × M). For fixed l, it remains to estimate
l ϕb sn(l) , wn(l) =
(j ) ϕb qn , wn(l) .
j =1 ]−T ,T [×M
]−T ,T [×M
Since b(qn , wn(l) ) is bounded in L∞ (]−T , T [, L1 ), we can assume, up to an error arbitrary (j ) (j ) (j ) small, that ϕ is supported in {t < t∞ } or {t > t∞ } (replace ϕ by (1 − Ψ )(t)ϕ with Ψ (t∞ ) = 1 (j ) and Ψ L1 (]−T ,T [) small). On each interval, Theorem 2.1 allows to replace qn by a linear concentrating wave. Then, we combine Lemma 2.11 and Lemma 1.11 to get the weak convergence (l) (l) to zero of b(sn , wn ) for fixed l. (j ) (j ) Lemma 2.10 and the orthogonality of the cores of concentration give Dh (ph , (j )
(j )
(j )
∂t ph )(th ) (0, 0) for j = j and ph the same argument as before yields (j )
a concentrating wave at rate [h(j ) , t (j ) , x (j ) ]. Then,
l
b sn(l) , sn(l) n→∞ e(j ) . j =1
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1357
So we have proved that for any l ∈ N b(un , un ) n→∞ e=
l
(l) e(j ) + ew + er(l)
j =1
where ew is the weak∗ limit of b(wn , wn ) and er satisfies er TV −→ 0. ew is the weak∗ l→∞ limit of a sequence of solutions of the linear wave equation weakly convergent to 0 in energy space. Therefore, it has the announced form using the link with microlocal defect measure (see Lemma 1.9). We get the final result by letting l tend to infinity. 2 (l)
(l)
(l)
(l)
(l)
(l)
Remark 2.4. The fact that |un |6 is weakly convergent to 0 is false if we consider the limit in D (M) time by time. For example, for a nonlinear concentrating wave with tn = 0, the weak limit in D (]−T , T [ × M) of |un |6 is of course still zero but the weak limit of |un |6 (t) in D (M) is zero if t = 0 and a multiple of a Dirac function if t = 0. So the limit in D (M) of en|t=0 is not the same as the one of b(un , un )|t=0 . This comes from the fact that the limit of b(un , un )(t) is not equicontinuous as a function of t while it is the case for the nonlinear energy. Yet, in the proof, we are only interested in its limit in the space–time distributional sense which will be continuous. Actually, the discontinuity at t = 0 of the limit of b(un , un )(t) can be described explicitly from the scattering operator. At the contrary, the fact that the nonlinear energy density e(t) is continuous in time can, in this case, be seen as a consequence of the conservation of the nonlinear energy of the scattering operator. 3. Control and stabilization 3.1. Weak observability estimates, stabilization 3.1.1. Why Klein–Gordon and not the wave? In this subsection, we prove that the expected observability estimate E(u)(0) C
|a∂t u|2 dt dx [0,T ]×M
does not hold for the nonlinear damped wave equation 2u + ∂t u + u5 = 0 (in the simpler case a ≡ 1), even for small data. It explains why we have chosen the Klein–Gordon equation instead. The main point is that for small data, the nonlinear solution is close to the linear one which has the constants (in space–time) as undamped solutions (which is obviously false for 2u + u = 0). We take a ≡ 1 and initial data constant equal to (ε, 0). The nonlinear wave equation takes the form of the following ODE
u¨ + u˙ + u5 = 0 on [0, T ], u(0), u(0) ˙ = (ε, 0).
Decreasing of energy yields for any t 0
1358
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1 1 1 E(t) = u˙ 2 + u6 (t) E(0) = ε 6 2 6 6 and so u(t) ε
∀t 0.
Then, c = u˙ is a solution of
c˙ + c + u5 = 0 on [0, T ], c(0) = 0.
Therefore, t c(t) = −
e−(t−s) u5 (s) ds
and
0
u(t) ˙ = c(t) ε 5 . For any T > 0, we have T
2 u(s) ˙ T ε 10 .
0
Therefore, the observability estimate T Tε
10
2 1 u(s) ˙ CE(0) = C ε 6 6
0
cannot hold if ε is taken small enough. 3.1.2. Weak observability estimate As explained in the introduction, the proof of stabilization consists in the analysis of possible sequences contradicting an observability estimate. The first step is to prove that such sequence is linearizable in the sense that its behavior is close to solutions of the linear equation. Proposition 3.1. Let ω satisfy Assumption 0.2 and a ∈ C ∞ (M) satisfy a(x) > η > 0 for all x ∈ ω. Let T > T0 and un be a sequence of solutions of
satisfying
2un + un + |un |4 un + a(x)2 ∂t un = 0 on [0, T ] × M, (un , ∂t un )t=0 = (u0,n , u1,n ) ∈ E
(57)
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
(u0,n , u1,n ) n→∞ 0 weakly in E, a(x)∂t un 2 dt dx −→ 0. n→∞
1359
(58)
[0,T ]×M
Then, un is linearizable on [0, t] for any t < T − T0 , that is |||un − vn |||[0,t] n→∞ −→ 0 where vn is the solution of
2vn = 0 on [0, T ] × M, (vn , ∂t vn )t=0 = (u0,n , u1,n ).
Proof. Denote t∗ = sup{s ∈ [0, T ] | limn→∞ |||un − vn |||[0,s] = 0} and we have to prove t∗ T − T0 . If it is not the case, we can find an interval [t∗ − ε, t∗ − ε + L] ⊂ [0, T ] with T0 < L < Tfocus and 0 < 2ε < L − T0 (if t∗ = 0, take the interval [0, L] ⊂ [0, T ]). Then, Lemma 3.1 below gives that un is linearizable on [t∗ − ε, t∗ + ε]. We postpone the proof of Lemma 3.1 and finish the proof of the proposition. The definition of t∗ gives limn→∞ |||un − vn |||[0,t∗ −ε] = 0 and we have proved that limn→∞ |||un − v˜n |||[t∗ −ε,t∗ +ε] = 0 where v˜n is a solution of 2v˜n = 0;
(v˜n , ∂t v˜n )t=t∗ −ε = (un , ∂t un )t=t∗ −ε .
Since the norm ||| · ||| controls the energy norm, this easily yields limn→∞ |||un − vn |||[0,t∗ +ε] = 0 which is a contradiction to the definition of t∗ . 2 Lemma 3.1. With the assumptions of Proposition 3.1. Consider the profile decomposition according to Theorem 0.4 of un on a subinterval [t0 , t0 + L] ⊂ [0, T ] with T0 < L < Tfocus . Then, for any 0 < ε < L − T0 , this decomposition does not contain any nonlinear concentrat(j ) ing wave with t∞ ∈ [t0 , t0 + ε] and un is linearizable on [t0 , t0 + ε]. Proof. To simplify the notation, we work on the interval [0, L]. Moreover, since a(x)∂t un tends to 0 in L1 L2 , Lemma 2.16 allows to assume with the same assumptions that un is a solution of the nonlinear equation without damping. Proposition 2.5 and Lemma 2.15 (with the Rellich Theorem) give that un is bounded in L8 ([0, T ] × M) and convergent to 0 in L2 ([0, T ] × M). Therefore, un tends to 0 in L7 ([0, T ] × M) and so |un |4 un is convergent to 0 in −1 (]0, l[ × M). Then, if we consider the (space– L7/5 ([0, T ] × M) → L4/3 ([0, T ] × M) → Hloc time) microlocal defect measure of un , the elliptic regularity and the equation verified by un gives that μ is supported in {τ 2 = |ξ |2x } as in the linearizable case. So, combining this with (58), we get 1 un n→∞ ]0, L[ × ω . −→ 0 in Hloc Using the notation of Theorem 2.3, this gives e = 0 on ]0, L[ × ω. Since all the measures in the decomposition of e are positive, we get the same result for any nonlinear concentrating wave in the decomposition of un , that is (j )
qn
1 ]0, L[ × ω −→ 0 in Hloc
n→∞
1360
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368 (j )
and if μ(j ) is the microlocal defect measure of qn , we have μ(j ) ≡ 0 in S ∗ ]0, L[ × ω . (j )
(59) (j )
Assume that t∞ ∈ [0, ε] for one j ∈ N, so that the interval [t∞ , L] has length greater that T0 . (j ) (j ) Denote by pn the linear concentrating wave approaching qn in the interval In3,Λ according to (j ) the notation of Theorem 2.1, so that for any t∞ < t < L (here we use the fact that L < Tfocus ), we have (j ) qn − pn(j )
−→ 0.
[t,L] n→∞
(j )
(j )
(j )
In particular, μ(j ) is also attached to pn on the time interval ]t∞ , L]. Since pn is a solution of the linear wave equation, its measure propagates along the hamiltonian flow. Assumption 0.2 and (j ) (j ) |L − t∞ | > T0 ensure that the geometric control condition is still verified on the interval [t∞ , L] (j ) (j ) which gives μ(j ) ≡ 0 when combined with (59). This means that pn ≡ 0 and so qn ≡ 0 as expected. Then, for the profile decomposition of un on the interval [0, L] (here the weak limit u is necessarily zero)
un =
l
(j )
qn + wn(l) + rn(l) ,
j =1 (j )
we have proved that tn ∈ ]ε, L]. Then Theorem 2.1 and L < Tfocus provide a linear concen(j ) (j ) (j ) trating wave pn such that limn→∞ |||qn − pn |||[0,ε] = 0 while Lemma 2.3 gives (j ) (l) limn→∞ pn L5 ([0,ε],L10 ) = 0. Moreover, the conclusion of Theorem 2.1 gives limn→∞ wn + (l)
rn L5 ([0,ε],L10 ) −→ 0. This finally yields limn→∞ un L5 ([0,ε],L10 ) = 0 and therefore l→∞
|un |4 un
−→ 0.
L1 ([0,ε],L2 ) n→∞
This gives exactly that un is linearizable on [0, ε].
2
We are now ready for the proof of some weak observability estimates. We recall the notation E(u) for the nonlinear energy defined in (2). Theorem 3.1. Let ω satisfy Assumption 0.2 with T0 and a ∈ C ∞ (M) satisfy a(x) > η > 0 for all x ∈ ω. Let T > 2T0 and R0 > 0. Then, there exists C > 0 such that for any u solution of ⎧ 4 2 ⎪ ⎨ 2u + u + |u| u + a (x)∂t u = 0 (u, ∂t u)t=0 = (u0 , u1 ) ∈ E, ⎪ ⎩ (u0 , u1 ) R0 E
on [0, T ] × M, (60)
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1361
satisfies
a(x)∂t u 2 dt dx + (u0 , u1 ) 2 −1 E(u)(0) . L ×H
E(u)(0) C [0,T ]×M
Proof. We argue by contradiction: we suppose that there exists a sequence un of solutions of (60) such that a(x)∂t un 2 dt dx + (u0,n , u1,n ) 2 −1 E(un )(0) 1 E(un )(0). L ×H n [0,T ]×M
Denote αn = (E(un )(0))1/2 . By Sobolev embedding for the L6 norm, we have αn C(R0 ). So, up to extraction, we can assume that αn −→ α 0. We will distinguish two cases: α > 0 and α = 0. • First case: αn −→ α > 0. −→ 0 and so (u0,n , u1,n ) n→∞ 0 The second part of the estimate gives (u0,n , u1,n ) L2 ×H −1 n→∞ 1 2 in H × L . Therefore, we are in position to apply Proposition 3.1 and get that un is linearizable on an interval [0, L] with L > T0 . We get a contradiction to α > 0 by applying the following classical linear proposition, which can be easily proved using microlocal defect measure as in Lemma 3.1. Proposition 3.2. Let ω satisfy Assumption 0.2 with T0 . Let T > T0 and vn be a sequence of solutions of
2vn = 0 on [0, T ] × M, vn (0), ∂t vn (0) n→∞ 0 in E
satisfying
a(x)∂t vn 2 dt dx −→ 0. n→∞
[0,T ]×M
Then, (vn (0), ∂t vn (0)) n→∞ −→ 0 for the strong topology of H 1 × L2 . The same result holds with 2un replaced by 2un + un . • Second case: αn −→ 0. Let us make the change of unknown wn = un /αn . wn is a solution of the system 2wn + a 2 (x)∂t wn + wn + αn4 |wn |4 wn = 0 and
(61)
1362
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
[0,T ]×M
a(x)∂t wn 2 dt dx 1 . n
We have for a large constant C > 0 depending on R0 and for all t ∈ [0, T ], 1 (un , ∂t un )2 E(un ) C (un , ∂t un )2 . E E C Therefore, we have √ (t), ∂t un (t)) E E(un (t)) wn (t), ∂t wn (t) = (un√ C√ C, E E(un (0)) E(un (0)) 1 (0), ∂t un (0)) E wn (0), ∂t wn (0) = (un√ √ > 0. E E(un (0)) C
(62)
Thus, we have (wn (0), ∂t wn (0)) E ≈ 1 and (wn , ∂t wn ) is bounded in L∞ ([0, T ], E). Applying Strichartz estimates to Eq. (61), we get for C = C(R0 ) > 0 wn L5 ([0,T ],L10 ) C 1 + αn4 wn 5L5 ([0,T ],L10 ) . Then, using a bootstrap argument, we deduce that wn L5 ([0,T ],L10 ) is bounded and therefore −→ 0 in L1 [0, T ], L2 . 2wn + wn n→∞ Proposition 3.2 yields that wn converges strongly to some w solution of 2w + w = 0;
∂t w ≡ 0 on [0, T ] × ω.
(63)
We deduce as in J. Rauch and M. Taylor [33] or C. Bardos, G. Lebeau, J. Rauch [3] that the set GT of solutions in E fulfilling (63) is finite dimensional. This is also the case for some GT with T < T . So, for W = (w0 , w1 ) ∈ GT and ε small enough, (eεA W − W )/ε is also in GT , where etA is the Klein–Gordon semi-group. By equivalence of the norms in GT , we get AW ∈ E (note that we could have proved directly that GT only contains smooth functions by propagation of regularity and geometric control condition). Then, A and indeed A2 = − I maps GT into itself and so admits an eigenvector W . By unique continuation for second-order elliptic operator, we get ∂t w ≡ 0 for w the associated solution. Multiplying the equation by w¯ and integrating, we obtain w ≡ 0 (note that, at this stage, the choice of the Klein–Gordon equation instead of the wave equation is crucial to avoid the constant solutions). We conclude that (wn (0), ∂t wn (0)) tends to 0 strongly in E which gives a contradiction to (62). 2 3.2. Controllability 3.2.1. Linear control In this subsection, we recall some well-known results about linear control theory and HUM method. Let (Φ0 , Φ1 ) ∈ L2 × H −1 . We solve the system
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1363
2Φ + Φ = 0 on [0, T ] × M, (Φ, ∂t Φ)|t=0 = (Φ0 , Φ1 )
(64)
2v + v = a 2 Φ on [0, T ] × M, (v, ∂t v)|t=T = (0, 0).
(65)
and
The HUM operator S from L2 × H −1 to L2 × H 1 is defined by S(Φ0 , Φ1 ) = −∂t v(0), v(0) . Lemma 3.2. If ω satisfies the geometric control Assumption 0.1, then S is an isomorphism. ¯ integrating over [0, T ] × M and integrating by part, we get Proof. Multiplying Eq. (65) by Φ, the formula
T |aΦ|2 = − 0 M
¯ ∂t v(0)φ(0) +
M
" ! ¯ v(0)∂t φ(0) = S(Φ0 , Φ1 ), (Φ0 , Φ1 )
M
where .,. denotes the duality between L2 × H 1 and L2 × H −1 . We get the conclusion thanks to the following observability estimate which can be proved by the same techniques used in the nonlinear problem (Φ0 , Φ1 )2 2
L ×H −1
T
|aΦ|2 .
2
0 M
3.2.2. Controllability for small data Theorem 3.2. Let ω satisfy Assumption 0.1 and T > T0 . Then, there exists δ > 0 such that for any (u0 , u1 ) and (u˜ 0 , u˜ 1 ) in H 1 × L2 , with (u0 , u1 ) δ; E
(u˜ 0 , u˜ 1 ) δ E
there exists g ∈ L∞ ([0, 2T ], L2 ) supported in [0, 2T ] × ω such that the unique strong solution of
2u + u + |u|4 u = g on [0, 2T ] × M, u(0), ∂t u(0) = (u0 , u1 )
satisfies (u(2T ), ∂t u(2T )) = (u˜ 0 , u˜ 1 ).
1364
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
Proof. The proof is very similar to [11] except that the critical exponent do not allow to use compactness argument and we use the classical Picard fixed point instead of Schauder, as done in [9] or [29], [30] for NLS. By a compactness argument, we can select a ∈ C0∞ (ω) with a(x) > η > 0 for x in ω˜ where ω˜ satisfies Assumption 0.1. Since the equation is reversible, we can assume (u˜ 0 , u˜ 1 ) ≡ (0, 0) and take the time T instead of 2T . We seek g of the form a 2 (x)Φ where Φ is a solution of the free wave equation as in linear control theory with initial datum (Φ0 , Φ1 ) ∈ L2 × H −1 . The purpose will be to choose the right (Φ0 , Φ1 ) ∈ L2 × H −1 to get the expected data. We consider the solutions of the two systems
2Φ + Φ = 0 on [0, T ] × M, (Φ, ∂t Φ)|t=0 = (Φ0 , Φ1 )
and
2u + u + |u|4 u = a 2 Φ (u, ∂t u)|t=T = (0, 0).
on [0, T ] × M,
(66)
Let us define the operator L : L2 × H −1 → H 1 × L2 , (Φ0 , Φ1 ) → L(Φ0 , Φ1 ) = (u, ∂t u)|t=0 .
(67)
We split u = v + Ψ with Ψ solution of
2Ψ + Ψ = a 2 Φ on [0, T ] × M, (Ψ, ∂t Ψ )|t=T = (0, 0).
(68)
This corresponds to the linear control, and (−∂t Ψ, Ψ )|t=0 = S(Φ0 , Φ1 ). As for function v, it is a solution of 2v + v = −|u|4 u on [0, T ] × M, (69) (v, ∂t v)|t=T = (0, 0). Φ belongs to C([0, T ], L2 ). So, u, v and Ψ belong to C([0, T ], H 1 ) ∩ C 1 ([0, T ], L2 ) ∩ L5 ([0, T ], L10 ). We can write L(Φ0 , Φ1 ) = K(Φ0 , Φ1 ) + S(Φ0 , Φ1 ) where K(Φ0 , Φ1 ) = (−∂t v, v)|t=0 . L(Φ0 , Φ1 ) = (−u1 , u0 ) is equivalent to (Φ0 , Φ1 ) = −S −1 K(Φ0 , Φ1 ) + S −1 (−u1 , u0 ). Defining the operator B : L2 × H −1 → L2 × H −1 by B(Φ0 , Φ1 ) = −S −1 K(Φ0 , Φ1 ) + S −1 (−u1 , u0 ), the problem L(Φ0 , Φ1 ) = (−u1 , u0 ) is equivalent to finding a fixed point of B. We will prove that if (u0 , u1 ) E is small enough, B is a contraction and reproduces a small ball BR of L2 × H −1 .
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1365
Since S is an isomorphism, we have B(Φ0 , Φ1 )
L2 ×H −1
C K(Φ0 , Φ1 )L2 ×H 1 + (u0 , u1 )E .
So we are led to estimate K(Φ0 , Φ1 ) L2 ×H 1 = (v, ∂t v)|t=0 E . Energy estimates applied to Eq. (69) and the Hölder inequality give (v, ∂t v)|t=0 C |u|4 u 1 C u 5L5 ([0,T ],L10 ) . E L ([0,T ],L2 ) But Strichartz estimates applied to Eq. (66) give u L5 ([0,T ],L10 ) C a 2 Φ L1 ([0,T ],L2 ) + u 5L5 ([0,T ],L10 ) C (Φ0 , Φ1 )L2 ×H −1 + u 5L5 ([0,T ],L10 ) . Using a bootstrap argument, we get that for (Φ0 , Φ1 ) L2 ×H −1 R small enough, we have u L5 ([0,T ],L10 ) C (Φ0 , Φ1 )L2 ×H −1 .
(70)
We finally obtain B(Φ0 , Φ1 )
L2 ×H −1
5 C (Φ0 , Φ1 )L2 ×H −1 + (u0 , u1 )E .
Choosing R small enough and (u0 , u1 ) H 1 ×L2 R/2C, we obtain B(Φ0 , Φ1 ) L2 ×H −1 R and B reproduces the ball BR . Let us now prove that B is contracting. We examine the systems
˜ ˜ 4 u˜ = a 2 (Φ − Φ) on [0, T ] × M, 2(u − u) ˜ + (u − u) ˜ + |u|4 u − |u| u − u, ˜ ∂t (u − u) ˜ |t=T = (0, 0), ˜ 4 u˜ = 0 on [0, T ] × M, 2(v − v) ˜ + (v − v) ˜ + |u|4 u − |u| v − v, ˜ ∂t (v − v) ˜ |t=T = (0, 0).
(71)
(72)
We obtain similarly B(Φ0 , Φ1 ) − B(Φ˜ 0 , Φ˜ 1 ) 2 −1 L ×H ˜ ∂t (v − v) C v − v, ˜ |t=0 E C |u|4 u − |u| ˜ 4 u˜ 1 2 L ([0,T ],L )
C u − u ˜ L5 ([0,T ],L10 ) u 4L5 ([0,T ],L10 ) + u ˜ 4L5 ([0,T ],L10 ) ˜ L5 ([0,T ],L10 ) CR 4 u − u
(73)
where we have used estimate (70) for the last inequality. Applying Strichartz estimates to Eq. (71), we get
1366
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
˜ 1 u − u ˜ L5 ([0,T ],L10 ) C |u|4 u − |u| ˜ 4 u˜ L1 ([0,T ],L2 ) + a 2 (Φ − Φ) L ([0,T ],L2 ) CR 4 u − u ˜ L5 ([0,T ],L10 ) + C (Φ0 , Φ1 ) − (Φ˜ 0 , Φ˜ 1 )L2 ×H −1 . If R is taken small enough, it yields u − u ˜ L5 ([0,T ],L10 ) C (Φ0 , Φ1 ) − (Φ˜ 0 , Φ˜ 1 )L2 ×H −1 .
(74)
Combining (73) and (74), we finally obtain for R small enough B(Φ0 , Φ1 ) − B(Φ˜ 0 , Φ˜ 1 )
L2 ×H −1
CR 4 (Φ0 , Φ1 ) − (Φ˜ 0 , Φ˜ 1 )L2 ×H −1
and B is a contraction for R small enough, which completes the proof of Theorem 3.2.
2
3.2.3. Controllability of high frequency data This subsection is devoted to the proof of the two main theorems of the article: Theorems 0.2 and 0.1. Proof of Theorem 0.2. First, by decreasing of the energy and Sobolev embedding, there exists some constant C(R0 ) such that the assumption (u0 , u1 ) E R0 implies E(u)(t) C(R0 ) and (u, ∂t u)(t)E C(R0 );
∀t 0.
(75)
Fix T such that Theorem 3.1 applies. Then, there exists ε > 0 such that for any (u0 , u1 ) satisfying (u0 , u1 ) C(R0 ); E
(u0 , u1 )
L2 ×H −1
ε,
(76)
we have the strong observability estimate
a(x)∂t u 2 dt dx,
E(u)(0) C [0,T ]×M
for any solution of the damped equation (3). This means that there exists 0 < C such that any solution of the damped equation satisfying (76) fulfills E(u)(T ) (1 − C)E(u)(0).
(77)
Pick N ∈ N large enough such that (1 − C)N C(R0 ) ε 2 /2. Corollary 2.4 and (75) allow us to choose δ small enough such that the assumptions (u0 , u1 ) R0 ; E
(u0 , u1 )
L2 ×H −1
δ
imply u(nT ), ∂t u(nT )
L2 ×H −1
ε,
0 n N.
(78)
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
1367
So, with that choice, we have E(u)(NT ) (1 − C)N E(u)(0). Then, by the energy decreasing, for any t NT , we have (u, ∂t u)(t)2 2
L ×H −1
2E(u)(t) 2E(u)(N T ) ε 2 .
Therefore, the decay estimate (77) is true on each interval [nT , (n + 1)T ], n ∈ N and we have E(u)(nT ) (1 − C)n E(u)(0) which yields the result.
2
Proof of Theorem 0.1. Since the equation is reversible, we can assume (u˜ 0 , u˜ 1 ) = (0, 0). By a compactness argument, we can select a ∈ C0∞ (ω) with a(x) > η > 0 for x in ω˜ where ω˜ satisfies Assumption 0.2. We will first use the damping term a(x)2 ∂t u as a term of control. We apply Theorem 0.2 and Theorem 3.2 once the energy is small enough. 2 Acknowledgments The author deeply thanks his adviser Patrick Gérard for drawing his attention to this problem and for helpful discussions and encouragements. References [1] L. Aloui, S. Ibrahim, K. Nakanishi, Exponential energy decay for damped Klein–Gordon equation with nonlinearities of arbitrary growth, Comm. Partial Differential Equations (2009), in press, arXiv:1001.0209. [2] H. Bahouri, P. Gérard, High frequency approximation of critical nonlinear wave equations, Amer. J. Math. 121 (1999) 131–175. [3] C. Bardos, G. Lebeau, J. Rauch, Sharp sufficient conditions for the observation, control and stabilization of waves from the boundary, SIAM J. Control Optim. 305 (1992) 1024–1065. [4] H. Brezis, J.-M. Coron, Convergence of solutions of H-systems or how to blow bubbles, Arch. Ration. Mech. Anal. 89 (1) (1985) 21–56. [5] N. Burq, P. Gérard, Condition nécéssaire et suffisante pour la contrôlabilite exacte des ondes, C. R. Math. Acad. Sci. Paris 325 (7) (1997) 749–752. [6] N. Burq, P. Gérard, N. Tzvetkov, Strichartz inequalities and the nonlinear Schrödinger equation on compact manifolds, Amer. J. Math. 126 (2004) 569–605. [7] N. Burq, G. Lebeau, F. Planchon, Global existence for energy critical waves in 3-D domains, J. Amer. Math. Soc. 21 (3) (2008) 831. [8] B. Dehman, P. Gérard, Stabilization for the nonlinear Klein Gordon equation with critical exponent, Prépublication de l’Université Paris-Sud, available at http://www.math.u-psud.fr/~biblio/saisie/fichiers/ppo_2002_35.ps, 2002. [9] B. Dehman, P. Gérard, G. Lebeau, Stabilization and control for the nonlinear Schrödinger equation on a compact surface, Math. Z. 254 (4) (2006) 729–749. [10] B. Dehman, G. Lebeau, Analysis of the HUM control operator and exact controllability for semilinear waves in uniform time, SIAM J. Control Optim. 48 (2) (2009) 521–550. [11] B. Dehman, G. Lebeau, E. Zuazua, Stabilization and control for the subcritical semilinear wave equation, Ann. Sci. Ec. Norm. Super. 36 (4) (2003) 525–551. [12] O. Druet, E. Hebey, F. Robert, Blow-Up Theory for Elliptic PDEs in Riemannian Geometry, Princeton Univ. Press, 2004. [13] T. Duyckaerts, F. Merle, Dynamic of threshold solutions for energy-critical wave equation, Int. Math. Res. Pap. 2008 (2) (2008). [14] E. Fernández-Cara, S. Guerrero, Null controllability of the Burgers system with distributed controls, Systems Control Lett. 56 (5) (2007) 366–372.
1368
C. Laurent / Journal of Functional Analysis 260 (2011) 1304–1368
[15] E. Fernández-Cara, E. Zuazua, Null and approximate controllability for weakly blowing up semilinear heat equations, Ann. Inst. H. Poincaré Anal. Non Linéaire 17 (5) (2000) 583–616. [16] G. Francfort, F. Murat, Oscillations and energy densities in the wave equation, Comm. Partial Differential Equations 17 (11) (1992) 1785–1865. [17] I. Gallagher, P. Gérard, Profile decomposition for the wave equation outside a convex obstacle, J. Math. Pures Appl. 80 (1) (2001) 1–49. [18] P. Gérard, Microlocal defect measures, Comm. Partial Differential Equations 16 (1991) 1762–1794. [19] P. Gérard, Oscillations and concentration effects in semilinear dispersive wave equations, J. Funct. Anal. 141 (1996) 60–98. [20] P. Gérard, Description du défaut de compacité de l’injection de Sobolev, ESAIM Control Optim. Calc. Var. 3 (1998) 213–233. [21] S. Ibrahim, Geometric-optics for nonlinear concentrating waves in focusing and non-focusing two geometries, Commun. Contemp. Math. 6 (1) (2004) 1–24. [22] S. Ibrahim, M. Majdoub, Solutions globales de l’equation des ondes semi-lineaire critique a coefficients variables, Bull. Soc. Math. France 131 (1) (2003) 1–22. [23] A.D. Ionescu, B. Pausader, G. Staffilani, On the global well-posedness of energy-critical Schrödinger equations in curved spaces, preprint, arXiv:1008.1237, 2010. [24] L.V. Kapitanski, Some generalizations of the Strichartz–Brenner inequality, Leningrad Math. J. 1 (10) (1990) 693– 726. [25] C.E. Kenig, F. Merle, Global well-posedness, scattering and blow-up for the energy-critical focusing non-linear wave equation, Acta Math. 201 (2) (2008) 147–212. [26] S. Keraani, On the defect of compactness for the Strichartz estimates of the Schrödinger equations, J. Differential Equations 175 (2) (2001) 353–392. [27] H. Koch, D. Tataru, Dispersive estimates for principally normal pseudodifferential operators, Comm. Pure Appl. Math. 58 (2) (2005) 217–284. [28] J. Krieger, W. Schlag, Concentration compactness for critical wave maps, Monogr. Eur. Math. Soc., in press; preprint, arXiv:0908.2474, 2009. [29] C. Laurent, Global controllability and stabilization for the nonlinear Schrödinger equation on an interval, ESAIM Control Optim. Calc. Var. 16 (2) (2010) 356–379. [30] C. Laurent, Global controllability and stabilization for the nonlinear Schrödinger equation on some compact manifolds of dimension 3, SIAM J. Math. Anal. 42 (2) (2010) 785–832. [31] P.L. Lions, The concentration-compactness principle in the calculus of variations, The limit case, Part I, Rev. Mat. Iberoam. 1 (1) (1985) 145. [32] K. Nakanishi, Scattering theory for the nonlinear Klein–Gordon equation with Sobolev critical power, Int. Math. Res. Not. 1999 (1) (1999) 31–60. [33] J. Rauch, M. Taylor, Exponential decay of solutions to hyperbolic equations in bounded domains, Indiana Univ. Math. J. 24 (1) (1975) 79–86. [34] J. Shatah, M. Struwe, Regularity results for nonlinear wave equations, Ann. of Math. 138 (3) (1993) 503–518. [35] J. Shatah, M. Struwe, Well-posedness in the energy space for semilinear wave equations with critical growth, Int. Math. Res. Not. 1994 (7) (1994) 303–309. [36] L. Tartar, H-measures, a new approach for studying homogenisation, oscillations and concentration effects in partial differential equations, Proc. Roy. Soc. Edinburgh Sect. A 115 (3–4) (1990) 193–230. [37] C. Zuily, Solutions en grand temps d’équations d’ondes non linéaires, in: Séminaire Bourbaki, Vol. 1993/94, Astérisque 227 (1995) 107–144.
Journal of Functional Analysis 260 (2011) 1369–1427 www.elsevier.com/locate/jfa
Instanton approximation, periodic ASD connections, and mean dimension ✩ Shinichiroh Matsuo a , Masaki Tsukamoto b,∗ a Graduate School of Mathematical Sciences, University of Tokyo, 3-8-1 Komaba Meguro-ku, Tokyo 153-8914, Japan b Department of Mathematics, Kyoto University, Kyoto 606-8502, Japan
Received 20 May 2010; accepted 16 November 2010 Available online 3 December 2010 Communicated by Daniel W. Stroock
Abstract We study a moduli space of ASD connections over S 3 × R. We consider not only finite energy ASD connections but also infinite energy ones. So the moduli space is infinite dimensional in general. We study the (local) mean dimension of this infinite dimensional moduli space. We show the upper bound on the mean dimension by using a “Runge-approximation” for ASD connections, and we prove its lower bound by constructing an infinite dimensional deformation theory of periodic ASD connections. © 2010 Elsevier Inc. All rights reserved. Keywords: Yang–Mills gauge theory; Instanton approximation; Infinite dimensional deformation theory; Periodic ASD connections; Mean dimension
1. Introduction Since Donaldson [4] discovered his revolutionary theory, many mathematicians have intensively studied the Yang–Mills gauge theory. There are several astonishing results on the structures of the ASD moduli spaces and their applications. But most of them study only finite energy ASD connections and their finite dimensional moduli spaces. Almost nothing is known about infinite energy ASD connections and their infinite dimensional moduli spaces. (One of the authors ✩
Shinichiroh Matsuo was supported by Grant-in-Aid for JSPS fellows (19·5618) from JSPS, and Masaki Tsukamoto was supported by Grant-in-Aid for Young Scientists (B) (21740048) from MEXT. * Corresponding author. E-mail addresses: [email protected] (S. Matsuo), [email protected] (M. Tsukamoto). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.008
1370
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
struggled to open the way to this direction in [21,22].) This paper studies an infinite dimensional moduli space coming from the Yang–Mills theory over S 3 × R. Our main purposes are to prove estimates on its “mean dimension” (Gromov [14]) and to show that there certainly exists a nontrivial structure in this infinite dimensional moduli space. (Mean dimension is a “dimension of an infinite dimensional space averaged by a group action”.) The reason why we consider S 3 × R is that it is one of the simplest non-compact anti-selfdual 4-manifolds of (uniformly) positive scalar curvature. (Indeed it is conformally flat.) These metrical conditions are used via the Weitzenböck formula (see Section 4.1). Recall that one of the important results of the pioneering work of Atiyah, Hitchin and Singer [1, Theorem 6.1] is the calculation of the dimension of the moduli space of (irreducible) self-dual connections over a compact self-dual 4-manifold of positive scalar curvature. So our work is an attempt to develop an infinite dimensional analogue of [1, Theorem 6.1]. Of course, the study of the mean dimension is just one step toward the full understanding of the structures of the infinite dimensional moduli space. (But the authors believe that “dimension” is one of the most fundamental invariants of spaces and that the study of mean dimension is a crucial step toward the full understanding.) So we need much more studies, and the authors hope that this paper becomes a stimulus to a further study of infinite dimensional moduli spaces in the Yang–Mills gauge theory. Set X := S 3 × R. Throughout the paper, the variable t means the variable of the R-factor of X = S 3 × R. (That is, t : X → R is the natural projection.) S 3 × R is endowed with the product metric of a positive constant curvature metric on S 3 and the standard metric on R. (Therefore X is S 3 (r) × R for some r > 0 as a Riemannian manifold, where S 3 (r) = {x ∈ R4 | |x| = r}.) Let E := X × SU(2) be the product principal SU(2)-bundle over X. The additive Lie group R acts on X by X × R ((θ, t), s) → (θ, t + s) ∈ X. This action trivially lifts to the action on E by E × R ((θ, t, u), s) → (θ, t + s, u) ∈ E. Let d 0. We define Md as the set of all gauge equivalence classes of ASD connections A on E satisfying F (A)
L∞ (X)
d.
(1)
Here F (A) is the curvature of A. Md is equipped with the topology of C ∞ -convergence on compact subsets: a sequence [An ] (n 1) converges to [A] in Md if there exists a sequence of gauge transformations gn of E such that gn (An ) converges to A as n → ∞ in the C ∞ -topology over every compact subset in X. Md becomes a compact metrizable space by the Uhlenbeck compactness [24,25]. Note that the condition (1) is a “L∞ -condition”, and that the L2 -norm of F (A) can be infinite. Hence the covering (topological) dimension of the moduli space Md is infinite in general. The additive Lie group R continuously acts on Md by Md × R → Md ,
[A], s → s ∗ A ,
where s ∗ is the pull-back by s : E → E. Then we can consider the mean dimension dim(Md : R). Intuitively, dim(Md : R) =
dim Md . vol(R)
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1371
(This is ∞/∞ in general. The precise definition will be given in Section 2.) Our first main result is the following estimate on the mean dimension. Theorem 1.1. The mean dimension dim(Md : R) is finite: dim(Md : R) < +∞. Moreover, dim(Md : R) → +∞ as d → +∞. For an ASD connection A on E, we define ρ(A) by setting 1 sup ρ(A) := lim T →+∞ 8π 2 T t∈R
F (A)2 dvol.
(2)
S 3 ×[t,t+T ]
This limit always exists because we have the following subadditivity. sup t∈R
F (A)2 dvol sup
S 3 ×[t,t+T1 +T2 ]
t∈R
F (A)2 dvol + sup
S 3 ×[t,t+T1 ]
t∈R
F (A)2 dvol.
S 3 ×[t,t+T2 ]
ρ(A) is translation invariant; for s ∈ R, we have ρ(s ∗ A) = ρ(A), where s ∗ A is the pull-back of A by the map s : E = S 3 × R × SU(2) → E, (θ, t, u) → (θ, t + s, u). We define ρ(d) as the supremum of ρ(A) over all ASD connections A on E satisfying F (A)L∞ d. Let A be an ASD connection on E. We call A a periodic ASD connection if there exist T > 0, a principal SU(2)-bundle E over S 3 × (R/T Z), and an ASD connection A on E such that (E, A) is gauge equivalent to (π ∗ (E), π ∗ (A)) where π : S 3 × R → S 3 × (R/T Z) is the natural projection. (Here S 3 × (R/T Z) is equipped with the metric induced by the covering map π .) Then we have 1 F (A)2 dvol = c2 (E) . (3) ρ(A) = 2 T 8π T S 3 ×[0,T ]
We define ρperi (d) as the supremum of ρ(A) over all periodic ASD connections A on E satisfying F (A)L∞ < d. (Note that we impose the strict inequality condition here.) If d = 0, then such an A does not exist. Hence we set ρperi (0) := 0. (If d > 0, then the product connection A is a periodic ASD connection satisfying F (A)L∞ = 0 < d.) Obviously we have ρperi (d) ρ(d). Our second main result is the following estimates on the “local mean dimensions”. Theorem 1.2. For any [A] ∈ Md , dim[A] (Md : R) 8ρ(A). Moreover, if A is a periodic ASD connection satisfying F (A)L∞ < d, then dim[A] (Md : R) = 8ρ(A).
1372
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Therefore, 8ρperi (d) dimloc (Md : R) 8ρ(d). Here dim[A] (Md : R) is the “local mean dimension” of Md at [A], and dimloc (Md : R) := sup[A]∈Md dim[A] (Md : R) is the “local mean dimension” of Md . These notions will be defined in Section 2.2. Note that lim ρperi (d) = +∞.
d→+∞
This obviously follows from the fact that for any integer n 0 there exists an ASD connection on S 3 × (R/Z) whose second Chern number is equal to n. This is a special case of the famous theorem of Taubes [18]. (Note that the intersection form of S 3 × S 1 is zero.) We have dim(Md : R) dimloc (Md : R) (see (5) in Section 2.2). Hence the statement that dim(Md : R) → +∞ (d → +∞) in Theorem 1.1 follows from the inequality dimloc (Md : R) 8ρperi (d) in Theorem 1.2. Remark 1.3. All principal SU(2)-bundles over S 3 × R are gauge equivalent to the product bundle E. Hence the moduli space Md is equal to the space of all gauge equivalence classes [E, A] such that E is a principal SU(2)-bundle over X, and that A is an ASD connection on E satisfying |F (A)| d. We have [E1 , A1 ] = [E2 , A2 ] if and only if there exists a bundle map g : E1 → E2 satisfying g(A1 ) = A2 . In this description, the topology of Md is described as follows. A sequence [En , An ] (n 1) in Md converges to [E, A] if and only if there exist gauge transformations gn : En → E (n 1) such that gn (An ) converges to A as n → ∞ in C ∞ over every compact subset in X. Remark 1.4. An ASD connection satisfying the condition (1) is a Yang–Mills analogue of a “Brody curve” (cf. Brody [3]) in the entire holomorphic curve theory (Nevanlinna theory). It is widely known that there exist several similarities between the Yang–Mills gauge theory and the theory of (pseudo-)holomorphic curves (e.g. Donaldson invariant vs. Gromov–Witten invariant). On the holomorphic curve side, several researchers in the Nevanlinna theory have systematically studied the value distributions of holomorphic curves (of infinite energy) from the complex plane C. They have found several deep structures of such infinite energy holomorphic curves. Therefore the authors hope that infinite energy ASD connections also have deep structures. The rough ideas of the proofs of the main theorems are as follows. (For more about the outline of the proofs, see Section 3.) The upper bounds on the (local) mean dimension are proved by using the Runge-type approximation of ASD connections (originally due to Donaldson [5]). This “instanton approximation” technique gives a method to approximate infinite energy ASD connections by finite energy ones (instantons). Then we can construct “finite dimensional approximations” of Md by moduli spaces of instantons. This gives an upper bound on dim(Md : R). The lower bound on the local mean dimension is proved by constructing an infinite dimensional deformation theory of periodic ASD connections. This method is a Yang–Mills analogue of the deformation theory of “elliptic Brody curves” developed in Tsukamoto [23]. A big technical difficulty in the study of Md comes from the point that ASD equation is not elliptic. When we study the Yang–Mills theory over compact manifolds, this point can be easily
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1373
overcome by using the Coulomb gauge. But in our situation (perhaps) there is no such good way to recover the ellipticity. So we will consider some “partial gauge fixings” in this paper. In the proof of the upper bound, we will consider the Coulomb gauge over S 3 instead of S 3 × R (see Propositions 7.1 and 7.2). In the proof of the lower bound, we will consider the Coulomb gauge over S 3 × R, but it is less powerful and more technical than the usual Coulomb gauges over compact manifolds (see Proposition 9.6). Organization of the paper: In Section 2 we review the definition of mean dimension and define local mean dimension. In Section 3 we explain the outline of the proofs of Theorems 1.1 and 1.2. Sections 4, 5 and 7 are preparations for the proof of the upper bounds on the (local) mean dimension. Section 6 is a preparation for both proofs of the upper and lower bounds. In Section 8 we prove the upper bounds. Section 9 is a preparation for the proof of the lower bound. In Section 10 we develop the deformation theory of periodic ASD connections and prove the lower bound on the local mean dimension. In Appendix A we prepare some basic results on the Green kernel of + a (a > 0). 2. Mean dimension and local mean dimension 2.1. Review of mean dimension We review the definitions and basic properties of mean dimension in this subsection. For the detail, see Gromov [14] and Lindenstrauss and Weiss [16]. For some related works, see Lindenstrauss [15] and Gournay [10–13]. Let (X, d) be a compact metric space, Y be a topological space, and f : X → Y be a continuous map. For ε > 0, f is called an ε-embedding if we have Diam f −1 (y) ε for all y ∈ Y . We define Widimε (X, d) as the minimum integer n 0 such that there exist a polyhedron P of dimension n and an ε-embedding f : X → P . We have lim Widimε (X, d) = dim X,
ε→0
where dim X denotes the topological covering dimension of X. For example, consider [0, 1] × [0, ε] with the Euclidean distance. Then the natural projection π : [0, 1] × [0, ε] → [0, 1] is an ε-embedding. Hence Widimε ([0, 1] × [0, ε], Euclidean) 1. The following is given in Gromov [14, p. 333]. (For the detailed proof, see also Gournay [12, Lemma 2.5] and Tsukamoto [23, Appendix].) Lemma 2.1. Let (V , · ) be a finite dimensional normed linear space over R. Let Br (V ) be the closed ball of radius r > 0 in V . Then Widimε Br (V ), · = dim V
(ε < r).
Widimε (X, d) satisfies the following subadditivity. (The proof is obvious.) Lemma 2.2. For compact metric spaces (X, dX ), (Y, dY ), we set (X, dX ) × (Y, dY ) := (X × Y, dX×Y ) with dX×Y ((x1 , y1 ), (x2 , y2 )) := max(dX (x1 , x2 ), dY (y1 , y2 )). Then we have Widimε (X, dX ) × (Y, dY ) Widimε (X, dX ) + Widimε (Y, dY ).
1374
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
The following will be used in Section 8.1 Lemma 2.3. Let (X, d) be a compact metric space and suppose X = X1 ∪ X2 with closed sets X1 and X2 . Then Widimε (X, d) Widimε (X1 , d) + Widimε (X2 , d) + 1. In general, if X = X1 ∪ X2 ∪ · · · ∪ Xn (Xi : closed), then Widimε (X, d)
n
Widimε (Xi , d) + n − 1.
i=1
Proof. There exist a finite polyhedron Pi (i = 1, 2) with dim Pi = Widimε (Xi , d) and an εembedding fi : (Xi , d) → Pi . Let P1 ∗ P2 = {tx ⊕ (1 − t)y | x ∈ X1 , y ∈ X2 , 0 t 1} be the join of P1 and P2 . (P1 ∗ P2 = [0, 1] × P1 × P2 /∼, where (0, x, y) ∼ (0, x , y) for any x, x ∈ X and (1, x, y) ∼ (1, x, y ) for any y, y ∈ Y . tx ⊕ (1 − t)y is the equivalence class of (t, x, y).) P1 ∗ P2 is a finite polyhedron of dimension Widimε (X1 , d) + Widimε (X2 , d) + 1. Since a finite polyhedron is ANR, there exists an open set Ui ⊃ Xi over which the map fi continuously extends. Let ρ be a cut-off function such that 0 ρ 1, supp ρ ⊂ U1 and ρ(x) = 1 if and only if x ∈ X1 . Then supp(1 − ρ) = X \ X1 ⊂ X2 ⊂ U2 . We define a continuous map F : X → P1 ∗ P2 by setting F (x) := ρ(x)f1 (x) ⊕ (1 − ρ(x))f2 (x). F becomes an ε-embedding; Suppose F (x) = F (y). If ρ(x) = ρ(y) = 1, then x, y ∈ X1 and f1 (x) = f1 (y). Then d(x, y) ε. If ρ(x) = ρ(y) < 1, then x, y ∈ X2 and f2 (x) = f2 (y). Then d(x, y) ε. Thus Widimε (X, d) dim P1 ∗ P2 = Widimε (X1 , d) + Widimε (X2 , d) + 1. 2 Let Γ be a locally compact Hausdorff unimodular group with a bi-invariant Haar measure | · |. We suppose that Γ is endowed with a left-invariant proper distance. (Properness means that every bounded closed set is compact.) In Section 2 we always assume that Γ satisfies these conditions. When Γ is discrete, we always assume that the Haar measure | · | is the counting measure. (That is, |Ω| is equal to the cardinality of Ω.) Let Ω ⊂ Γ be a subset and r > 0. The r-boundary ∂r Ω is the set of points γ ∈ Γ such that the closed r-ball Br (γ ) centered at γ has non-empty intersection with both Ω and Γ \ Ω. A sequence of bounded Borel sets {Ωn }n1 in Γ is called amenable (or Følner) if for any r > 0 the following is satisfied: lim |∂r Ωn |/|Ωn | = 0.
n→∞
Γ is called amenable group if it admits an amenable sequence. Example 2.4. Γ = Z with the counting measure | · | and the standard distance |x − y|. Then the sequence of sets {0, 1, 2, . . . , n} (n 1) is amenable. The sequence of sets {−n, −n + 1, . . . , −1, 0, 1, . . . , n − 1, n} (n 1) is also amenable. Example 2.5. Γ = R with the Lebesgue measure | · | and the standard distance |x − y|. In this paper we always assume that R has these standard measure and distance. Then the sequence of sets {x ∈ R | 0 x n} (n 1) is amenable. The sequence of sets {x ∈ R | −n x n} (n 1) is also amenable.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1375
We need the following “Ornstein–Weiss Lemma” ([14, pp. 336–338] and [16, Appendix]). Lemma 2.6. Suppose Γ is amenable. Let h : {bounded sets in Γ } → R0 be a map satisfying the following conditions. (i) If Ω1 ⊂ Ω2 , then h(Ω1 ) h(Ω2 ). (ii) h(Ω1 ∪ Ω2 ) h(Ω1 ) + h(Ω2 ). (iii) For any γ ∈ Γ and any bounded set Ω ⊂ Γ , h(γ Ω) = h(Ω). Here γ Ω := {γ x ∈ Γ | x ∈ Ω}. Then for any amenable sequence {Ωn }n1 in Γ , the limit limn→∞ h(Ωn )/|Ωn | always exists and is independent of the choice of an amenable sequence {Ωn }n1 . Let (X, d) be a compact metric space with a continuous action of Γ . We suppose that the action is a right-action. For a subset Ω ⊂ Γ , we define a new distance dΩ (·,·) on X by dΩ (x, y) := sup d(x.γ , y.γ ) (x, y ∈ X). γ ∈Ω
Lemma 2.7. The map Ω → Widimε (X, dΩ ) satisfies the conditions (i), (ii), (iii) in Lemma 2.6. Proof. If Ω1 ⊂ Ω2 , then the identity map (X, dΩ1 ) → (X, dΩ2 ) is distance non-decreasing. Hence Widimε (X, dΩ1 ) Widimε (X, dΩ2 ). The map (X, dΩ1 ∪Ω2 ) → (X, dΩ1 ) × (X, dΩ2 ), x → (x, x), is distance preserving. Hence, by using Lemma 2.2, Widimε (X, dΩ1 ∪Ω2 ) Widimε (X, dΩ1 ) + Widimε (X, dΩ2 ). The map (X, dγ Ω ) → (X, dΩ ), x → x.γ , is an isometry. Hence Widimε (X, dγ Ω ) = Widimε (X, dΩ ). 2 Suppose that Γ is an amenable group and that an amenable sequence {Ωn }n1 is given. For ε > 0, we set Widimε (X : Γ ) := lim
n→∞
1 Widimε (X, dΩn ). |Ωn |
This limit exists and is independent of the choice of an amenable sequence {Ωn }n1 . The value of Widimε (X : Γ ) depends on the distance d. Hence, strictly speaking, we should use the notation Widimε ((X, d) : Γ ). But we use the above notation for simplicity. We define dim(X : Γ ) (the mean dimension of (X, Γ )) by dim(X : Γ ) := lim Widimε (X : Γ ). ε→0
This becomes a topological invariant, i.e., the value of dim(X : Γ ) does not depend on the choice of a distance d on X compatible with the topology of X. Example 2.8. Let Γ be a finitely generated (discrete) amenable group. Let B ⊂ RN be the closed ball. Γ acts on B Γ by the shift. Then dim B Γ : Γ = N.
1376
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
For the proof, see Lindenstrauss and Weiss [16, Propositions 3.1, 3.3] or Tsukamoto [22, Example 9.6]. 2.2. Local mean dimension Let (X, d) be a compact metric space. The usual topological dimension dim X is a “local notion” as follows: For each point p ∈ X, we define the “local dimension” dimp X at p by dimp X := limr→0 dim Br (p). (Here Br (p) is the closed r-ball centered at p.) Then we have dim X = supp∈X dimp X. The authors don’t know whether a similar description of the mean dimension is possible or not. Instead, in this subsection we will introduce a new notion “local mean dimension” (cf. [14, p. 406, the difficulty 1]). Suppose that an amenable group Γ continuously acts on X from the right. ((X, d) is a compact metric space.) Let Y ⊂ X be a closed subset. Then the map Ω → supγ ∈Γ Widimε (Y, dγ Ω ) satisfies the conditions in Lemma 2.6. Hence we can set
1 sup Widimε (Y, dγ Ωn ) , Widimε (Y ⊂ X : Γ ) := lim n→∞ |Ωn | γ ∈Γ where {Ωn }n1 is an amenable sequence. We define dim(Y ⊂ X : Γ ) := lim Widimε (Y ⊂ X : Γ ). ε→0
This does not depend on the choice of a distance on X compatible with the topology of X. If Y1 and Y2 are closed subsets in X with Y1 ⊂ Y2 , then dim(Y1 ⊂ X : Γ ) dim(Y2 ⊂ X : Γ ). If Y ⊂ X is a Γ -invariant closed subset, then Widimε (Y, dγ Ωn ) = Widimε (Y, dΩn ) because (Y, dγ Ωn ) → (Y, dΩn ), x → x.γ , is an isometry. Hence dim(Y ⊂ X : Γ ) = dim(Y : Γ ), where the right-hand side is the ordinary mean dimension of (Y, Γ ). In particular, dim(X ⊂ X : Γ ) = dim(X : Γ ), and hence for any closed subset Y ⊂ X (not necessarily Γ -invariant) dim(Y ⊂ X : Γ ) dim(X ⊂ X : Γ ) = dim(X : Γ ). Let X1 and X2 be compact metric spaces with continuous Γ -actions. Let Y1 ⊂ X1 and Y2 ⊂ X2 be closed subsets. If there exists a Γ -equivariant topological embedding f : X1 → X2 satisfying f (Y1 ) ⊂ Y2 , then dim(Y1 ⊂ X1 : Γ ) dim(Y2 ⊂ X2 : Γ ).
(4)
For each point p ∈ X and r > 0 we define Br (p)Γ (or Br (p; X)Γ ) as the closed r-ball centered at p with respect to the distance dΓ (·,·):
Br (p)Γ := x ∈ X dΓ (x, p) r .
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1377
Note that dΓ (x, p) r ⇔ d(x.γ , p.γ ) r for all γ ∈ Γ . Br (p)Γ is a closed set in X. We define the local mean dimension of X at p by dimp (X : Γ ) := lim dim Br (p)Γ ⊂ X : Γ . r→0
This is independent of the choice of a distance compatible with the topology of X. We define the local mean dimension of X by dimloc (X : Γ ) := sup dimp (X : Γ ). p∈X
Obviously we have dimloc (X : Γ ) dim(X : Γ ).
(5)
We will use the following formula in Section 8.2. Since (Br (p)Γ ).γ = Br (p.γ )Γ , we have Widimε Br (p)Γ , dγ Ω = Widimε Br (p)Γ .γ , dΩ = Widimε Br (p.γ )Γ , dΩ , and hence Widimε Br (p)Γ ⊂ X : Γ = lim
n→∞
1 sup Widimε Br (p.γ )Γ , dΩn . |Ωn | γ ∈Γ
(6)
Let X, Y be compact metric spaces with continuous Γ -actions. If there exists a Γ -equivariant topological embedding f : X → Y , then, from (4), for all p ∈ X dimp (X : Γ ) dimf (p) (Y : Γ ). Example 2.9. Let Γ be a finitely generated discrete amenable group, and B ⊂ RN be the closed ball centered at the origin. Then we have dim0 B Γ : Γ = dimloc B Γ : Γ = dim B Γ : Γ = N, where 0 = (xγ )γ ∈Γ with xγ = 0 for all γ ∈ Γ . Proof. Fix a distance on B Γ . Then it is easy to see that for any r > 0 there exists s > 0 such that BsΓ ⊂ Br (0)Γ , where Bs is the s-ball in RN . Then N = dim BsΓ : Γ dim Br (0)Γ ⊂ B Γ : Γ dim B Γ : Γ = N. Hence dim0 (B Γ : Γ ) = N .
2
Remark 2.10. We have so far supposed that Γ has a bi-invariant Haar measure and a proper leftinvariant distance. The values of mean dimension and local mean dimension depend on the choice of a Haar measure. But they are independent of the choice of a proper left-invariant distance on Γ . (We need the existence of a proper left-invariant distance on Γ for defining the notion “amenable sequence”. But this notion is independent of the choice of a proper left-invariant distance on Γ .)
1378
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
2.3. The case of Γ = R Let Γ = R with the Lebesgue measure and the standard distance. Suppose that R continuously acts on a compact metric space (X, d). For T > 0, consider the discrete subgroup T Z := {T n ∈ R | n ∈ Z} in R. T Z also acts on X. We want to compare the mean dimensions of (X, R) and (X, T Z). Here T Z is equipped with the counting measure. Proposition 2.11. dim(X : T Z) = T dim(X : R). This result is given in [14, p. 329] and [16, Proposition 2.7]. For any point p ∈ X, dimp (X : T Z) = T dimp (X : R). In particular, dimloc (X : T Z) = T dimloc (X : R). Proof. Set Ωn := {γ ∈ R | 0 γ < T n} and Ωn := Ωn ∩ T Z. {Ωn }n1 is an amenable sequence for R, and {Ωn }n1 is an amenable sequence for T Z. Let Y ⊂ X be a closed subset. For γ ∈ T Z, dγ +Ωn (·,·) dγ +Ωn (·,·). Hence, for any ε > 0, Widimε (Y, dγ +Ωn ) Widimε (Y, dγ +Ωn ). Therefore dim(Y ⊂ X : T Z) T dim(Y ⊂ X : R). For any ε > 0 there exists δ > 0 such that if d(x, y) δ then d[0,2T ) (x, y) ε. Let a ∈ R and set k := [a] (the maximum integer a). If dkT +Ωn (x, y) δ, then daT +Ωn (x, y) ε. Hence Widimε (Y, daT +Ωn ) Widimδ (Y, dkT +Ωn ). This implies sup Widimε (Y, dγ +Ωn ) sup Widimδ (Y, dγ +Ωn ).
γ ∈R
γ ∈T Z
Therefore T dim(Y ⊂ X : R) dim(Y ⊂ X : T Z). Thus T dim(Y ⊂ X : R) = dim(Y ⊂ X : T Z).
(7)
In particular, if Y = X, then dim(X : T Z) = T dim(X : R). For any r > 0 there exists r > 0 such that if d(x, y) r then d[0,T ) (x, y) r. Then if dT Z (x, y) r , we have dR (x, y) r. Hence Br (p)T Z ⊂ Br (p)R ⊂ Br (p)T Z . Therefore, by using the above (7), dim Br (p)T Z ⊂ X : T Z = T dim Br (p)T Z ⊂ X : R T dim Br (p)R ⊂ X : R T dim Br (p)T Z ⊂ X : R = dim Br (p)T Z ⊂ X : T Z . Thus dimp (X : T Z) = T dimp (X : R).
2
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1379
3. Outline of the proofs of the main theorems The ideas of the proofs of Theorems 1.1 and 1.2 are simple. But the completion of the proofs needs lengthy technical arguments. So we want to describe the outline of the proofs in this section. Here we don’t pursue the accuracy of the arguments for simplicity of the explanation. Some of the arguments will be replaced with different ones in the later sections. First we explain how to get the upper bound on the mean dimension of Md . We define a distance on Md by setting dist [A], [B] :=
inf
g:E→E
n1
2
−n
g(A) − BL∞ (|t|n) , 1 + g(A) − BL∞ (|t|n)
where g runs over all gauge transformations of E, and |t| n means the region {(θ, t) ∈ S 3 × R | |t| n}. For R = 1, 2, 3, . . . , we define ΩR ⊂ R by ΩR := {s ∈ R | −R s R}. {ΩR }R1 is an amenable sequence in R. Let ε > 0 be a positive number, and define a positive integer L = L(ε) so that
2−n < ε/2.
(8)
n>L
Let D = D(ε) be a large positive number which depends on ε but is independent of R, and set T := R + L + D. (D is chosen so that the condition (9) below is satisfied. Here we don’t explain how to define D precisely.) For c 0 we define M(c) as the space of the gauge equivalence classes [A] where A is an ASD connection on E satisfying 1 8π 2
|FA |2 dvol c. X
The index theorem gives the estimate: dim M(c) 8c. We want to construct an ε-embedding from (Md , distΩR ) to M(c) for an appropriate c 0. Let A be an ASD connection on E with [A] ∈ Md . We “cut-off” A over the region T < |t| < T + 1 and construct a new connection A satisfying the following conditions. A is a (not necessarily ASD) connection on E satisfying A ||t|T = A||t|T , F (A ) = 0 over |t| T + 1, and 1 8π 2
X
2 1 tr F A 8π 2
|t|T
2 3 F (A)2 dvol + const 2T d vol(S ) + const, 8π 2
where const is a positive constant independent of ε and R. Next we “perturb” A and construct an ASD connection A
on E satisfying
1380
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
A − A
= A − A
ε/4 |t| T − D = R + L ,
2 2 2T d 2 vol(S 3 ) 1 F A dvol = 1 tr F A + const. 8π 2 8π 2 8π 2 X
(9)
X
Then we can define the map
Md → M
2T d 2 vol(S 3 ) + const , 8π 2
[A] → A
.
The conditions (8) and (9) imply that this map is an ε-embedding with respect to the distance distΩR . Hence
2T d 2 vol(S 3 ) 2T d 2 vol(S 3 ) Widimε (Md , distΩR ) dim M + const + 8 · const. 8π 2 π2 (Caution! This estimate will not be proved in this paper. The above argument contains a gap.) Recall T = R + L + D. Since L, D and const are independent of R, we get Widimε (Md , distΩR ) d 2 vol(S 3 ) . R→∞ 2R π2
Widimε (Md : R) = lim Hence we get
dim(Md : R)
d 2 vol(S 3 ) < +∞. π2
(10)
This is the outline of the proof of the upper bound on the mean dimension. (The upper bound on the local mean dimension can be proved by investigating the above procedure more precisely.) Strictly speaking, the above argument contains a gap. Actually we have not so far succeeded to prove the estimate dim(Md : R) d 2 vol(S 3 )/π 2 . In this paper we prove only dim(Md : R) < +∞. A problem occurs in the cut-off construction. Indeed (we think that) there exists no canonical way to cut-off connections compatible with the gauge symmetry. Therefore we cannot define a suitable cut-off construction all over Md . Instead we will decompose Md as Md = 0i,j N Md,T (i, j ) (N is independent of ε and R) and define a cut-off construction for each piece Md,T (i, j ) independently. Then we will get an upper bound worse than (10) (cf. Lemma 2.3). We study the cut-off construction (the procedure [A] → [A ]) in Section 7. In Sections 4 and 5 we study the perturbation procedure (A → A
). The upper bounds on the (local) mean dimension are proved in Section 8. Next we explain how to prove the lower bound on the local mean dimension. Let T > 0, E be a principal SU(2)-bundle over S 3 × (R/T Z), and A be a non-flat ASD connection on E satisfying |F (A)| < d. Let π : S 3 × R → S 3 × (R/T Z) be the natural projection, and set E := π ∗ (E) and A := ∗ π (A). We define the infinite dimensional Banach space HA1 by
HA1 := a ∈ Ω 1 (ad E) dA∗ + dA+ a = 0, aL∞ < ∞ .
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1381
There exists a natural T Z-action on HA1 . Let r > 0 be a sufficiently small number. For each a ∈ HA1 with aL∞ r we can construct a˜ ∈ Ω 1 (ad E) (a small perturbation of a) satisfying ˜ = 0 and |F (A + a)| ˜ d. If a = 0, then a˜ = 0. F + (A + a) For n 1, let πn : S 3 × (R/nT Z) → S 3 × (R/T Z) be the natural projection, and set En := πn∗ (E) and An := πn∗ (A). We define HA1 n as the space of a ∈ Ω(ad En ) satisfying (dA∗ n + dA+n )a = 0. We can identify HA1 n with the subspace of HA1 consisting of nT Z-invariant elements. The index theorem gives dim HA1 n = 8nc2 (E). We define the map from Br (HA1 ) (the r-ball of HA1 centered at the origin) to Md by Br HA1 → Md ,
a → [E, A + a]. ˜
(Cf. the description of Md in Remark 1.3.) This map becomes a T Z-equivariant topological embedding for r 1. (Here Br (HA1 ) is endowed with the following topology. A sequence {an }n1 in Br (HA1 ) converges to a in Br (HA1 ) if and only if an uniformly converges to a over every compact subset.) Then we have dim[E,A] (Md : T Z) dim0 Br HA1 : T Z . The right-hand side is the local mean dimension of Br (HA1 ) at the origin. We can prove that dim0 (Br (HA1 ) : T Z) can be estimated from below by “the growth of periodic points”: dim0 Br HA1 : T Z lim dim HA1 n /n = 8c2 (E). n→∞
(This is not difficult to prove. This is just an application of Lemma 2.1.) Therefore dim[E,A] (Md : R) = dim[E,A] (Md : T Z)/T 8c2 (E)/T = 8ρ(A). This is the outline of the proof of the lower bound. 4. Perturbation In this section we construct the method of constructing ASD connections from “approximately ASD” connections over X = S 3 × R. We basically follow the argument of Donaldson [5]. (For a related work on “instanton approximation”, see Matsuo [17].) As we promised in the introduction, the variable t means the variable of the R-factor of S 3 × R. 4.1. Construction of the perturbation Let T be a positive number, and d, d be two non-negative real numbers. Set ε0 = 1/(1000). (The value 1/(1000) itself has no meaning. The point is that it is an explicit number which satisfies (14) below.) Let E be a principal SU(2)-bundle over X, and A be a connection on E satisfying the following conditions (i), (ii), (iii).
1382
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
(i) FA = 0 over |t| > T + 1. (ii) FA+ is supported in {(θ, t) ∈ S 3 × R | T < |t| < T + 1}, and FA+ T ε0 . Here · T is the “Taubes norm” defined below ((17) and (18)). (“T” of the norm · T comes from “Taubes”, and it has no relation with the above positive number T . Cf. Taubes [19].) (iii) |FA | d on |t| T and FA+ L∞ (X) d . (The condition (iii) is not used in Sections 4.1, 4.2, 4.3. It will be used in Section 4.4.) Let Ω + (ad E) be the set of smooth self-dual 2-forms valued in ad E (not necessarily compactly supported). The first main purpose of this section is to solve the equation F + (A + dA∗ φ) = 0 for φ ∈ Ω + (ad E). We have F + (A + dA∗ φ) = FA+ + dA+ dA∗ φ + (dA∗ φ ∧ dA∗ φ)+ . The Weitzenböck formula gives [8, Chapter 6]
1 S − W + φ + FA+ · φ, (11) dA+ dA∗ φ = ∇A∗ ∇A φ + 2 6 where S is the scalar curvature of X and W + is the self-dual part of the Weyl curvature. Since X is conformally flat, we have W + = 0. The scalar curvature S is a positive constant. Then the equation F + (A + dA∗ φ) = 0 becomes ∗ + ∇A ∇A + S/3 φ + 2FA+ · φ + 2 dA∗ φ ∧ dA∗ φ = −2FA+ .
(12)
Set c0 = 10. Then + F · φ c0 F + · |φ|, A
A
∗ d φ1 ∧ d ∗ φ2 + c0 |∇A φ1 | · |∇A φ2 |. A
A
(13)
(These are not best possible.1 ) The positive constant ε0 = 1/1000 in the above satisfies 50c0 ε0 < 1.
(14)
Let = ∇ ∗ ∇ be the Laplacian on functions over X, and g(x, y) be the Green kernel of + S/3. We prepare basic facts on g(x, y) in Appendix A. Here we state some of them without the proofs. For the proofs, see Appendix A. g(x, y) satisfies (y + S/3)g(x, y) = δx (y). This equation means that, for any compactly supported smooth function ϕ, ϕ(x) = g(x, y)(y + S/3)ϕ(y) dvol(y), X
where dvol(y) denotes the volume form of X. g(x, y) is smooth outside the diagonal and it has a singularity of order 1/d(x, y)2 along the diagonal: const1 /d(x, y)2 g(x, y) const2 /d(x, y)2
d(x, y) const3 ,
(15)
1 Strictly speaking, the choice of c depends on the convention of the metric (inner product) on su(2). Our convention 0 is: A, B = −tr(AB) for A, B ∈ su(2).
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1383
where d(x, y) is the distance on X, and const1 , const2 , const3 are positive constants. g(x, y) > 0 for x = y (Lemma A.1), and it has an exponential decay (Lemma A.2): √ S/3d(x,y)
0 < g(x, y) < const4 · e−
d(x, y) 1 .
(16)
Since S 3 × R = SU(2) × R is a Lie group and its Riemannian metric is two-sided invariant, we have g(zx, zy) = g(xz, yz) = g(x, y). In particular, for x = (θ1 , t1 ) and y = (θ2 , t2 ), we have g((θ1 , t1 − t0 ), (θ2 , t2 − t0 )) = g((θ1 , t1 ), (θ2 , t2 )) (t0 ∈ R). That is, g(x, y) is invariant under the translation t → t − t0 . For φ ∈ Ω + (ad E), we define the pointwise Taubes norm |φ|T (x) by setting (17) |φ|T (x) := g(x, y)φ(y) dvol(y) (x ∈ X). X
(Recall g(x, y) > 0 for x = y.) This may be infinity. We define the Taubes norm φT by φT := sup |φ|T (x).
(18)
x∈X
Set K :=
g(x, y) dvol(y)
(this is independent of x ∈ X).
X
(This is finite by (15) and (16).) We have φT KφL∞ . We define Ω + (ad E)0 as the set of φ ∈ Ω + (ad E) which vanish at infinity: limx→∞ |φ(x)| = 0. (Here x = (θ, t) → ∞ means |t| → +∞.) If φ ∈ Ω + (ad E)0 , then φT < ∞ and limx→∞ |φ|T (x) = 0. (See the proof of Proposition A.7.) Let η ∈ Ω + (ad E)0 . There uniquely exists φ ∈ Ω + (ad E)0 satisfying (∇A∗ ∇A + S/3)φ = η. (See Proposition A.7.) We set (∇A∗ ∇A + S/3)−1 η := φ. This satisfies φ(x) |η|T (x),
and hence φL∞ ηT .
(19)
Lemma 4.1. limx→∞ |∇A φ(x)| = 0. Proof. From the condition (i) in the beginning of this section, A is flat over |t| > T +1. Therefore there exists a bundle map g : E||t|>T +1 → X|t|>T +1 × SU(2) such that g(A) is the product connection. Here X|t|>T +1 = {(θ, t) ∈ S 3 × R | |t| > T + 1} and E||t|>T +1 is the restriction of E to X|t|>T +1 . We sometimes use similar notations in this paper. Set φ := g(φ) and η := g(η). They satisfy (∇ ∗ ∇ + S/3)φ = η . (Here ∇ is defined by the product connection on X||t|>T +1 × SU(2) and the Levi-Civita connection.) For |t| > T + 2, we set Bt := S 3 × (t − 1, t + 1). From the elliptic estimates, for any θ ∈ S 3 , ∇φ (θ, t) C φ
L∞ (Bt )
+ η L∞ (B ) , t
1384
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
where C is a constant independent of t. This means ∇A φ(θ, t) C φL∞ (B ) + ηL∞ (B ) . t t The right-hand side goes to 0 as |t| goes to infinity.
2
The following lemma shows a power of the Taubes norm. (Here η ∈ Ω + (ad E)0 and φ = (∇A∗ ∇A + S/3)−1 η ∈ Ω + (ad E)0 .) Lemma 4.2. |∇A φ|2 (x) := T
2 g(x, y)∇A φ(y) dvol(y) ηT |η|T (x).
X
In particular, |∇A φ|2 T := supx∈X ||∇A φ|2 |T (x) η2T and (dA∗ φ ∧ dA∗ φ)+ T c0 η2T . Proof. ∇|φ|2 = 2(∇A φ, φ) vanishes at infinity (Lemma 4.1). ( + 2S/3)|φ|2 = 2 ∇A∗ ∇A φ + (S/3)φ, φ − 2|∇A φ|2 = 2(η, φ) − 2|∇A φ|2 . In particular, ( + S/3)|φ|2 vanishes at infinity (Lemma 4.1). Hence |φ|2 , ∇|φ|2 , ( + S/3)|φ|2 vanish at infinity (in particular, they are contained in L∞ ). Then we can apply Lemma A.3 in Appendix A to |φ|2 and get
2 2 g(x, y)(y + S/3)φ(y) dvol(y) = φ(x) .
X
We have 1 S |∇A φ|2 = (η, φ) − ( + S/3)|φ|2 − |φ|2 2 6 1 (η, φ) − ( + S/3)|φ|2 . 2 Therefore
2 g(x, y)∇A φ(y) dvol(y)
X
2 1 g(x, y) η(y), φ(y) dvol(y) − φ(x) 2
X
g(x, y) η(y), φ(y) dvol(y)
X
φL∞ X
In the last line we have used (19).
2
g(x, y)η(y) dvol(y) ηT |η|T (x).
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1385
For η1 , η2 ∈ Ω + (ad E)0 , set φi := (∇A∗ ∇A + S/3)−1 ηi ∈ Ω + (ad E)0 (i = 1, 2) and + + β(η1 , η2 ) := dA∗ φ1 ∧ dA∗ φ2 + dA∗ φ2 ∧ dA∗ φ1 .
(20)
β is symmetric and |β(η1 , η2 )| 2c0 |∇A φ1 | · |∇A φ2 |. In particular, β(η1 , η2 ) ∈ Ω + (ad E)0 (Lemma 4.1). Lemma 4.3. β(η1 , η2 )T 4c0 η1 T η2 T . Proof. From Lemma 4.2, β(η, η)T 2c0 η2T . Suppose η1 T = η2 T = 1. Since 4β(η1 , η2 ) = β(η1 + η2 , η1 + η2 ) − β(η1 − η2 , η1 − η2 ), 4β(η1 , η2 )T 2c0 η1 + η2 2T + 2c0 η1 − η2 2T 16c0 . Hence β(η1 , η2 )T 4c0 . The general case follows from this.
2
For η ∈ Ω + (ad E)0 , we set φ := (∇A∗ ∇A + S/3)−1 η ∈ Ω + (ad E)0 and define Φ(η) := −2FA+ · φ − β(η, η) − 2FA+ ∈ Ω + (ad E)0 . If η satisfies η = Φ(η), then φ satisfies the ASD equation (12). Lemma 4.4. For η1 , η2 ∈ Ω + (ad E)0 , Φ(η1 ) − Φ(η2 ) 2c0 F + + 2η1 + η2 T η1 − η2 T . A T T Proof. Φ(η1 ) − Φ(η2 ) = −2FA+ · (φ1 − φ2 ) + β(η1 + η2 , η2 − η1 ). From Lemma 4.3 and φ1 − φ2 L∞ η1 − η2 T (see (19)), Φ(η1 ) − Φ(η2 ) 2c0 F + φ1 − φ2 L∞ + 4c0 η1 + η2 T η1 − η2 T , A T T + 2c0 F + 2η1 + η2 T η1 − η2 T . 2 A
T
Proposition 4.5. The sequence {ηn }n0 in Ω + (ad E)0 defined by η0 = 0,
ηn+1 = Φ(ηn ),
becomes a Cauchy sequence with respect to the Taubes norm · T and satisfies ηn T 3ε0 , for all n 0.
1386
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Proof. Set B := {η ∈ Ω + (ad E)0 | ηT 3ε0 }. For η ∈ B (recall: FA+ T ε0 ), Φ(η) 2c0 F + φL∞ + 2c0 η2 + 2F + T A T A T T 2c0 ε0 ηT + 2c0 η2T + 2ε0 (24c0 ε0 + 2)ε0 3ε0 . Here we have used (14). Hence Φ(η) ∈ B. Lemma 4.4 implies (for η1 , η2 ∈ B) Φ(η1 ) − Φ(η2 ) 2c0 F + + 2η1 + η2 T η1 − η2 T 26c0 ε0 η1 − η2 T . A T T 26c0 ε0 < 1 by (14). Hence Φ : B → B becomes a contraction map with respect to the norm · T . Thus ηn+1 = Φ(ηn ) (η0 = 0) becomes a Cauchy sequence. 2 The sequence φn ∈ Ω + (ad E)0 (n 0) defined by φn := (∇A∗ ∇A + S/3)−1 ηn satisfies φn − φm L∞ ηn − ηm T . Hence it becomes a Cauchy sequence in L∞ (Λ+ (ad E)). Therefore φn converges to some φA in L∞ (Λ+ (ad E)). φA is continuous since every φn is continuous. Indeed we will see later that φA is smooth and satisfies the ASD equation F + (A + dA∗ φA ) = 0. We have ηn+1 = Φ(ηn ) = −2FA+ · φn − 2(dA∗ φn ∧ dA∗ φn )+ − 2FA+ .
g(x, y)FA+ (y)φn (y) dvol(y) 2c0 FA+ T (x)φn L∞ 2c0 FA+ T (x)ηn T , ∗ 2 d φn ∧ d ∗ φn + (x) 2c0 ηn T |ηn |T (x) (Lemma 4.2). A A T + 2F · φn (x) 2c0 A T
Hence |ηn+1 |T (x) 2c0 ηn T FA+ T (x) + 2c0 ηn T |ηn |T (x) + 2FA+ T (x). Since ηn T 3ε0 , |ηn+1 |T (x) 6c0 ε0 |ηn |T (x) + (6c0 ε0 + 2)FA+ T (x). By (14), |ηn |T (x)
(6c0 ε0 + 2)|FA+ |T (x) 3FA+ T (x). 1 − 6c0 ε0
Recall that FA+ is supported in {T < |t| < T + 1} and that g(x, y) > 0 for x = y. Set δ(x) :=
g(x, y) dvol(y)
(x ∈ X).
T <|t|
Then |FA+ |T (x) δ(x)FA+ L∞ . Note that δ(x) vanishes at infinity because g(x, y) const · √ e− S/3d(x,y) for d(x, y) 1. (See (16).) We get the following decay estimate.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1387
Proposition 4.6. |φn (x)| |ηn |T (x) 3δ(x)FA+ L∞ . Hence |φA (x)| 3δ(x)FA+ L∞ . In particular, φA vanishes at infinity. 4.2. Regularity and the behavior at the end From the definition of φn , we have + ∗ ∇A ∇A + S/3 φn+1 = ηn+1 = −2FA+ · φn − 2 dA∗ φn ∧ dA∗ φn − 2FA+ .
(21)
Lemma 4.7. supn1 ∇A φn L∞ < +∞. Proof. We use the rescaling argument of Donaldson [5, Section 2.4]. Recall that φn are uniformly bounded and uniformly go to zero at infinity (Proposition 4.6). Moreover ∇A φn L∞ < ∞ for each n 1 by Lemma 4.1. Suppose supn1 ∇A φn L∞ = +∞. Then there exists a sequence n1 < n2 < n3 < · · · such that Rk := ∇A φnk L∞ go to infinity and Rk max1nnk ∇A φn L∞ . Since |∇A φn | vanishes at infinity (see Lemma 4.1), we can take xk ∈ X satisfying Rk = |∇A φnk (xk )|. From Eq. (21), |∇A∗ ∇A φnk | constA · Rk2 . Here “constA ” means a positive constant depending on A (but independent of k 1). Let r0 > 0 be a positive number less than the injectivity radius of X. We consider the geodesic coordinate centered at xk for each k 1, and we take a bundle trivialization of E over each geodesic ball B(xk , r0 ) by the exponential gauge centered at xk . Then we can consider φnk as a vector-valued function in the ball B(xk , r0 ). Under this setting, φnk satisfies ij g(k) ∂i ∂j φnk constA · Rk2
on B(xk , r0 ),
(22)
i,j
where (g(k) ) = (g(k),ij )−1 and g(k),ij is the Riemannian metric tensor in the geodesic coordinate centered at xk . (Indeed S 3 × R = SU(2) × R is a Lie group. Hence we can take the geodesic coordinates so that g(k),ij are independent of k.) Set φ˜ k (x) := φnk (x/Rk ). φ˜ k (x) is a vector-valued function defined over the r0 Rk -ball in R4 centered at the origin. φ˜ k (k 1) satisfy |∇ φ˜ k (0)| = 1, and they are uniformly bounded. From (22), they satisfy ij
ij ˜ g˜ (k) ∂i ∂j φk constA , i,j ij
ij
ij
where g˜ (k) (x) = g(k) (x/Rk ). {g˜ (k) }k1 converges to δ ij (the Kronecker delta) as k → +∞ in the C ∞ -topology over compact subsets in R4 . Hence there exists a subsequence {φ˜ kl }l1 which converges to some φ˜ in the C 1 -topology over compact subsets in R4 . Since |∇ φ˜ k (0)| = 1, we ˜ have |∇ φ(0)| = 1. If {xkl }l1 is a bounded sequence, then {φ˜ kl } has a subsequence which converges to a constant function uniformly over every compact subset because φn converges to φA (a continuous section) ˜ = 1. in the C 0 -topology (= L∞ -topology) and Rk → ∞. But this contradicts the above |∇ φ(0)| ˜ Hence {xkl } is an unbounded sequence. Since φn uniformly go to zero at infinity, {φkl } has a subsequence which converges to 0 uniformly over every compact subset. Then this also contradicts ˜ |∇ φ(0)| = 1. 2
1388
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
From Lemma 4.7 and Eq. (21), the elliptic estimates show that φn converges to φA in the C ∞ topology over every compact subset in X. In particular, φA is smooth. (Indeed φA ∈ Ω + (ad E)0 from Proposition 4.6.) From Eq. (21),
+ ∇A∗ ∇A + S/3 φA = −2FA+ · φA − 2 dA∗ φA ∧ dA∗ φA − 2FA+ .
(23)
This implies that A + dA∗ φA is an ASD connection. Lemma 4.1 shows limx→∞ |∇A φn (x)| = 0 for each n. Indeed we can prove a stronger result: Lemma 4.8. For each ε > 0, there exists a compact set K ⊂ X such that for all n ∇A φn (x) ε
(x ∈ X \ K).
Therefore, limx→∞ |∇A φA (x)| = 0. Proof. Suppose the statement is false. Then there are δ > 0, a sequence n1 < n2 < n3 < · · · , and a sequence of points x1 , x2 , x3 , . . . in X which goes to infinity such that ∇A φn (xk ) δ k
(k = 1, 2, 3, . . .).
Let xk = (θk , tk ) ∈ S 3 × R = X. |tk | goes to infinity. We can suppose |tk | > T + 2. Since A is flat in |t| > T + 1, there exists a bundle trivialization g : E||t|>T +1 → X|t|>T +1 × SU(2) such that g(A) is equal to the product connection. (Here X|t|>T +1 = {(θ, t) ∈ S 3 × R | |t| > T + 1}.) Set φn := g(φn ). We have ∗ +
∇ ∇ + S/3 φn = −2 d ∗ φn−1 ∧ d ∗ φn−1
|t| > T + 1 ,
where ∇ is defined by using the product connection on X|t|>T +1 × SU(2). From this equation and Lemma 4.7, ∗ ∇ ∇ + S/3 φ const |t| > T + 1 , n where const is independent of n. We define ϕk ∈ Γ (S 3 × (−1, 1), Λ+ ⊗ su(2)) by ϕk (θ, t) := φn k (θ, tk + t). We have |(∇ ∗ ∇ + S/3)ϕk | const. Since |φn (x)| 3δ(x)FA+ L∞ and |tk | → +∞, the sequence ϕk converges to 0 in L∞ (S 3 × (−1, 1)). Using the elliptic estimate, we get ϕk → 0 in C 1 (S 3 × [−1/2, 1/2]). On the other hand, |∇ϕk (θk , 0)| = |∇A φnk (θk , tk )| δ > 0. This is a contradiction. 2 Set + ηA := ∇A∗ ∇A + S/3 φA = −2FA+ · φA − 2 dA∗ φA ∧ dA∗ φA − 2FA+ .
(24)
This is contained in Ω + (ad E)0 (Lemma 4.8). The sequence ηn defined in Proposition 4.5 satisfies + ηn+1 = −2FA+ · φn − 2 dA∗ φn ∧ dA∗ φn − 2FA+ .
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1389
Corollary 4.9. The sequence ηn converges to ηA in L∞ . In particular, ηn − ηA T → 0 as n → ∞. Hence ηA T 3ε0 . (Proposition 4.5.) Proof.
+ ηn+1 − ηA = −2FA+ · (φn − φA ) + 2 dA∗ (φA − φn ) ∧ dA∗ φA + dA∗ φn ∧ dA∗ (φA − φn ) . Hence |ηn+1 − ηA | 2c0 FA+ L∞ φn − φA L∞ + 2c0 |∇A φn | + |∇A φA | |∇A φA − ∇A φn |. φn → φA in L∞ (X) and in C ∞ over every compact subset. Moreover |∇A φn | are uniformly bounded and uniformly go to zero at infinity (Lemmas 4.7 and 4.8). Then the above inequality implies that ηn+1 − ηA L∞ goes to 0. 2 Lemma 4.10. dA dA∗ φA L∞ < ∞. Proof. It is enough to prove |dA dA∗ φA (θ, t)| const for |t| > T + 2. Take a trivialization g of E over |t| > T + 1 such that g(A) is the product connection, and set φ := g(φA ). This satisfies + ∗ ∇ ∇ + S/3 φ = −2 d ∗ φ ∧ d ∗ φ
|t| > T + 1 .
Since |φ | and |∇φ | go to zero at infinity (Proposition 4.6 and Lemma 4.8), this shows (by using the elliptic estimates) that |dd ∗ φ | is bounded. 2 Lemma 4.11. 1 8π 2
F A + d ∗ φA 2 dvol = 1 A 8π 2
X
tr FA2 .
X
Recall that A is flat over |t| > T + 1. Hence the right-hand side is finite. (Indeed it is a nonnegative integer by the Chern–Weil theory.) Proof. Set a := dA∗ φA and csA (a) := 8π1 2 tr(2a ∧ FA + a ∧ dA a + 23 a 3 ). We have 8π1 2 tr(F (A + a)2 )− 8π1 2 tr(F (A)2 ) = dcsA (a). Since A+a is ASD, we have |F (A+a)|2 dvol = tr(F (A+a)2 ) and 1 8π 2
|t|R
1 tr F (A + a)2 − 8π 2
|t|R
tr F (A)2 =
t=R
csA (a) −
csA (a).
t=−R
From Lemma 4.8, |a| = |dA∗ φA | goes to zero at infinity. From Lemma 4.10, |dA a| = |dA dA∗ φA | is bounded. FA vanishes over |t| > T + 1. Hence |csA (a)| goes to zero at infinity. Thus the right-hand side of the above equation goes to zero as R → ∞. 2
1390
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
4.3. Conclusion of the construction The following is the conclusion of Sections 4.1 and 4.2. This will be used in Sections 5 and 8. (Notice that we have not so far used the condition (iii) in the beginning of Section 4.1.) Proposition 4.12. Let T > 0. Let E be a principal SU(2)-bundle over X, and A be a connection on E satisfying FA = 0 (|t| > T + 1), supp FA+ ⊂ {T < |t| < T + 1} and FA+ T ε0 = 1/1000. Then we can construct φA ∈ Ω + (ad E)0 satisfying the following conditions. (a) A + dA∗ φA is an ASD connection: F + (A + dA∗ φA ) = 0. (b) 1 8π 2
F A + d ∗ φA 2 dvol = 1 A 8π 2
X
tr FA2 .
X
(c) |φA (x)| 3δ(x)FA+ L∞ , where δ(x) = T <|t| 0 so that r0 is less than the injectivity radius of S 3 × R (cf. the proof of Lemma 4.7). Lemma 4.13. For any ε > 0, there exists a constant δ0 = δ0 (d, ε) > 0 depending only on d and ε such that the following statement holds. For any φ ∈ Ω + (ad E) and any closed r0 -ball B contained in S 3 × [−T + 1, T − 1], if φ satisfies ∗ + ∇A ∇A + S/3 φ = −2 dA∗ φ ∧ dA∗ φ
over B
and φL∞ (B) δ0 ,
(25)
then we have sup ∇A φ(x) d(x, ∂B) ε. x∈B
Here d(x, ∂B) is the distance between x and ∂B. (If T < 1, then S 3 × [−T + 1, T − 1] is empty, and the above statement has no meaning.)
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1391
Proof. Suppose φ satisfies sup ∇A φ(x) d(x, ∂B) > ε, x∈B
and the supremum is attained at x0 ∈ B (x0 is an inner point of B). Set R := |∇A φ(x0 )| and r0 := d(x0 , ∂B)/2. We have 2r0 R > ε. Let B be the closed r0 -ball centered at x0 . We have |∇A φ| 2R on B . We consider the geodesic coordinate over B centered at x0 , and we trivialize the bundle E over B by the exponential gauge centered at x0 . Since A is ASD and |FA | d over −T t T , the C 1 -norm of the connection matrix of A in the exponential gauge over B is bounded by a constant depending only on d. From Eq. (25) and |∇A φ| 2R on B , g ij ∂i ∂j φ constd,ε · R 2 over B , where (g ij ) = (gij )−1 and gij is the Riemannian metric tensor in the geodesic coordinate over B . ˜ := φ(x/R). Since 2r0 R > ε, Here we consider φ as a vector-valued function over B . Set φ(x) φ˜ is defined over the ε/2-ball B(ε/2) centered at the origin in R4 , and it satisfies g˜ ij ∂i ∂i φ˜ constd,ε over B(ε/2). Here g˜ ij (x) := g ij (x/R). The eigenvalues of the matrix (g˜ ij ) are bounded from below by a positive constant depending only on the geometry of X, and the C 1 -norm of g˜ ij is bounded from above by a constant depending only on ε and the geometry of X. (Note that R > ε/(2r0 ) ε/(2r0 ).) Then by using the elliptic estimate [9, Theorem 9.11] and the Sobolev embedding L82 (B(ε/4)) → C 1,1/2 (B(ε/4)) (the Hölder space), we get ˜ C 1,1/2 (B(ε/4)) constε · φ ˜ 8 φ L (B(ε/4)) C = C(d, ε). 2
˜ ˜ ˜ From the definition, we have Hence |∇ φ(x) − ∇ φ(0)| C|x|1/2 on B(ε/4). Set u := ∇ φ(0). |u| = 1. ˜ ˜ φ(tu) − φ(0) =t
1
˜ ∇ φ(tsu) · u ds = t + t
0
1
˜ ∇ φ(tsu) − u · u ds.
0
Hence φ(tu) ˜ ˜ t −t − φ(0)
1 C|tsu|1/2 ds = t − 2Ct 3/2 /3. 0
√ We can suppose C 2/ ε. Then u/C 2 ∈ B(ε/4) and φ˜ u/C 2 − φ(0) ˜ 1/ 3C 2 . If |φ| δ0 < 1/(6C 2 ), then this inequality becomes a contradiction.
2
1392
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
The following will be used in Section 8. Lemma 4.14. For any ε > 0 there exists a positive number D = D(d, d , ε) such that ∗ d φA
L∞ (S 3 ×[−T +D,T −D])
A
ε.
(If D > T , then S 3 × [−T + D, T − D] is the empty set.) Here the important point is that D is independent of T . Proof. Note that |dA∗ φA | Proposition 4.6) and
√ 3/2|∇A φA |. We have |φA (x)| 3d δ(x) by Proposition 4.12(c) (or δ(x) =
g(x, y) dvol(y).
T <|t|
Set D := D − r0 . (We choose D so that D 1.) Since g(x, y) const · e− d(x, y) 1, we have √
δ(x) C · e−
S/3d(x,y)
for
for x ∈ S 3 × −T + D , T − D .
S/3D
We choose D = D(d, d , ε) r0 + 1 so that √
3d Ce−
S/3D
δ0 (d, r0 ε 2/3).
√ Here δ0 (d, r0 ε 2/3) is the positive constant introduced in Lemma 4.13. Note that this condition is independent of T . Then φA satisfies, for x ∈ S 3 × [−T + D , T − D ], φA (x) δ0 (d, r0 ε 2/3). φA satisfies (∇A∗ ∇A + S/3)φA = −2(dA∗ φA ∧ dA∗ φA )+ over |t| T . Then Lemma 4.13 implies ∇A φA (x) ε 2/3
for x ∈ S 3 × [−T + D, T − D].
3
(Note that, for x ∈ S 3 × √ [−T + D, T − D], we have B(x, r0 ) ⊂ S × [−T + D , T − D ] and hence |φA | δ0 (d, r0 ε 2/3) over B(x, r0 ).) Then, for x ∈ S 3 × [−T + D, T − D],
∗ d φA (x) 3/2∇A φA (x) ε. A
2
5. Continuity of the perturbation The purpose of this section is to show the continuity of the perturbation construction in Section 4. The conclusion of Section 5 is Proposition 5.6. As in Section 4, X = S 3 × R, T > 0 is a positive number, and E → X is a principal SU(2)-bundle. Let ρ be a flat connection on E||t|>T +1 . (E||t|>T +1 is the restriction of E to X|t|>T +1 = {(θ, t) ∈ S 3 × R | |t| > T + 1}.) We define A as the set of connections A on E satisfying the following (i), (ii), (iii).
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1393
(i) A||t|>T +1 = ρ, i.e., A coincides with ρ over |t| > T + 1. (ii) FA+ is supported in {(θ, t) ∈ S 3 × R | T < |t| < T + 1}. (iii) FA+ T ε0 = 1/1000. By Proposition 4.12, for each A ∈ A , we have φA ∈ Ω + (ad E)0 and ηA = (∇A∗ ∇A + S/3)φA ∈ Ω + (ad E)0 satisfying + ηA = −2FA+ · φA − 2 dA∗ φA ∧ dA∗ φA − 2FA+ ,
ηA T 3ε0 .
(26)
The first equation in the above is equivalent to the ASD equation F + (A + dA∗ φA ) = 0. Since φA = (∇A∗ ∇A + S/3)−1 ηA , we have ((19) and Lemma 4.2) |∇A φA |2 ηA 2 9ε 2 . T 0 T
φA L∞ ηA T 3ε0 , Then (by the Cauchy–Schwartz inequality) ∇A φA T := sup x∈X
√ g(x, y)∇A φA (y) dvol(y) 3ε0 K,
X
where K = X g(x, y) dvol(y). (The value of K is independent of x ∈ X.) Let A, B ∈ A . We want to estimate φA − φB L∞ . Set a := B − A. Since both A and B coincide with ρ (the fixed flat connection) over |t| > T + 1, a is compactly supported. We set aC 1 := aL∞ + ∇A aL∞ . A
We suppose aC 1 1. A
Lemma 5.1. φA − φB L∞ ηA − ηB T + constaC 1 , where const is a universal constant A independent of A, B. Proof. We have ηA = (∇A∗ ∇A + S/3)φA and ηB = ∇B∗ ∇B + S/3 φB = ∇A∗ ∇A + S/3 φB + ∇A∗ a ∗ φB + a ∗ ∇B φB + a ∗ a ∗ φB , where ∗ are algebraic multiplications. Then φA − φB L∞ ∇A∗ ∇A + S/3 (φA − φB )T ηA − ηB T + const ∇A aL∞ φB T + aL∞ ∇B φB T + a2L∞ φB T ηA − ηB T + constaC 1 . A
2
1394
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Lemma 5.2. ∗ d φA ∧ d ∗ φA + − d ∗ φB ∧ d ∗ φB + A A B B T
1 + constaC 1 ηA − ηB T + constaC 1 . A A 4
Proof. ∗ + + dA φA ∧ dA∗ φA − dB∗ φB ∧ dB∗ φB + + + + = dA∗ φA ∧ dA∗ φA − dA∗ φB ∧ dA∗ φB + dA∗ φB ∧ dA∗ φB − dB∗ φB ∧ dB∗ φB . (I )
(II)
We first estimate the term (II). Since B = A + a, ∗ + + dB φB ∧ dB∗ φB − dA∗ φB ∧ dA∗ φB + + + = dA∗ φB ∧ (a ∗ φB ) + (a ∗ φB ) ∧ dA∗ φB + (a ∗ φB ) ∧ (a ∗ φB ) , (II) const∇A φB T aL∞ φB L∞ + consta2 ∞ φB 2 ∞ L L T const · ∇A φB T aL∞ + const · aL∞ . We have ∇A φB T = ∇B φB + a ∗ φB T ∇B φB T + constaL∞ φB L∞ const. Hence (II)T constaL∞ . Next we estimate the term (I ). For η1 , η2 ∈ Ω + (ad E)0 , set φi := (∇A∗ ∇A + S/3)−1 ηi ∈ + Ω (ad E)0 (i = 1, 2), and define (see (20)) + + βA (η1 , η2 ) := dA∗ φ1 ∧ dA∗ φ2 + dA∗ φ2 ∧ dA∗ φ1 . Set ηB := (∇A∗ ∇A + S/3)φB = ηB + (∇A∗ a) ∗ φB + a ∗ ∇B φB + a ∗ a ∗ φB . Then (dA∗ φB ∧ dA∗ φB )+ = βA (ηB , ηB )/2 and (I ) = (βA (ηA , ηA ) − βA (ηB , ηB ))/2 = βA (ηA + ηB , ηA − ηB )/2. From Lemma 4.3, (I ) 2c0 ηA + η ηA − η . B T B T T ηA + ηB T ηA + ηB T + ηB − ηB T 6ε0 + constaC 1 , and ηA − ηB T ηA − ηB T + A constaC 1 . From (14), we have 12c0 ε0 1/4. Then A
(I ) T
1 + constaC 1 ηA − ηB T + constaC 1 . A A 4
2
We have FB+ = FA+ + dA+ a + (a ∧ a)+ . Recall that we have supposed aC 1 1. Hence A
+ F − F + consta 1 . C B A A
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1395
Proposition 5.3. There exists δ > 0 such that if aC 1 δ then A
ηA − ηB T constaC 1 . A
Proof. From (26), ηA − ηB = 2 FB+ − FA+ · φB + 2FA+ · (φB − φA ) + + + 2 dB∗ φB ∧ dB∗ φB − dA∗ φA ∧ dA∗ φA + 2 FB+ − FA+ . Using φB L∞ 3ε0 , FA+ T ε0 and Lemma 5.2,
ηA − ηB T constaC 1 + 2c0 ε0 φA − φB L∞ + A
1 + constaC 1 ηA − ηB T . A 2
Using Lemma 5.1,
ηA − ηB T constaC 1 + A
1 + constaC 1 + 2c0 ε0 ηA − ηB T . A 2
From (14), we can choose δ > 0 so that if aC 1 δ then A
1 + constaC 1 + 2c0 ε0 3/4. A 2
Then we get ηA − ηB T constaC 1 + (3/4)ηA − ηB T . A
Then ηA − ηB T constaC 1 . A
2
From Lemma 5.1, we get (under the condition aC 1 δ) A
φA − φB L∞ ηA − ηB T + constaC 1 constaC 1 . A
A
Therefore we get the following. Corollary 5.4. The map 1 A , C -topology → Ω + (ad E)0 , · L∞ ,
A → φA ,
is continuous. Let An (n 1) be a sequence in A which converges to A ∈ A in the C 1 -topology: An − AC 1 → 0 (n → ∞). By Corollary 5.4, we get φAn − φA L∞ → 0. Set an := An − A. A
1396
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Lemma 5.5. supn1 ∇An φAn L∞ < ∞. (Equivalently, supn1 ∇A φAn L∞ < ∞.) Proof. Note that |∇An φAn | vanishes at infinity (see Lemma 4.8). Hence we can take a point xn ∈ S 3 × R satisfying |∇An φAn (xn )| = ∇An φAn L∞ . φAn − φA L∞ → 0 (n → ∞), and φAn uniformly go to zero at infinity (see Proposition 4.12(c) or Proposition 4.6). Then the rescaling argument as in the proof of Lemma 4.7 shows the above statement. 2 Since (∇A∗ n ∇An + S/3)φAn = −2FA+n · φAn − 2(dA∗ n φAn ∧ dA∗ n φAn )+ − 2FA+n , sup ∇A∗ n ∇An φAn L∞ < ∞.
n1
We have ∇A∗ n ∇An φAn = ∇A∗ ∇A φAn + (∇A∗ an ) ∗ φAn + an ∗ ∇An φAn + an ∗ an ∗ φAn . Hence sup ∇A∗ ∇A φAn L∞ < ∞.
n1
By the elliptic estimate, we conclude that φAn converges to φA in C 1 over every compact subset. Then we get the following conclusion. This will be used in Section 8. Proposition 5.6. Let {An }n1 be a sequence in A which converges to A ∈ A in the C 1 -topology. Then φAn converges to φA in the C 1 -topology over every compact subset in X. Therefore dA∗ n φAn converges to dA∗ φA in the C 0 -topology over every compact subset in X. Moreover, for any n 1,
F An + d ∗ φA 2 dvol = n An
X
F A + d ∗ φA 2 dvol. A
X
(This means that no energy is lost at the end.) Proof. The last statement follows from Proposition 4.12(b) (or Lemma 4.11) and the fact that for any A and B in A we have X
tr FA2 =
tr FB2 .
X
This is because tr FB2 − tr FA2 = d(tr(2a ∧ FA + a ∧ dA a + 23 a 3 )) (a = B − A), and both A and B coincide with the fixed flat connection ρ over |t| > T + 1. 2 6. “Non-flat” implies “irreducible” This section is short. But the results in this section are crucial for both proofs of the upper and lower bounds on the mean dimension. Note that the following trivial fact: if a smooth function u on R is bounded and convex (u
0) then u is a constant function.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1397
Lemma 6.1. If a smooth function f on S 3 × R is bounded, non-negative and sub-harmonic (f 0),2 then f is a constant function. Proof. We have = −∂ 2 /∂t 2 + S 3 where t is the coordinate of the R-factor of S 3 × R and S 3 is the Laplacian of S 3 . We have
2 ∂2 2 ∂f f = 2 + 2f S 3 f − 2f f. 2 ∂t ∂t Then we have 1 ∂2 2 ∂t 2
f dvol = 2
S 3 ×{t}
2 ∂f + |∇ 3 f |2 + f (−f ) dvol 0. S ∂t
S 3 ×{t}
Here we have used f 0 and f 0. This shows that u(t) = S 3 ×{t} f 2 is a bounded convex function. Hence it is a constant function. In particular u
≡ 0. Then the above formula implies ∂f/∂t ≡ ∇S 3 f ≡ 0. This means that f is a constant function. 2 Lemma 6.2. If A is a U (1)-ASD connection on S 3 × R satisfying FA L∞ < ∞, then A is flat. √ Proof. We have FA ∈ −1Ω − . The Weitzenböck formula (cf. (11)) gives (∇ ∗ ∇ + S/3)FA = 2d − d ∗ FA = 0. We have |FA |2 = −2|∇FA |2 + 2 FA , ∇ ∗ ∇FA = −2|∇FA |2 − (2S/3)|FA |2 0. This shows that |FA |2 is a non-negative, bounded, subharmonic function. Hence it is a constant function. In particular |FA |2 ≡ 0. Then the above formula implies FA ≡ 0. 2 An SU(2)-connection A is said to be reducible if there is a gauge transformation g = ±1 satisfying g(A) = A. A is said to be irreducible if it is not reducible. Corollary 6.3. If A is a non-flat SU(2)-ASD connection on S 3 × R satisfying FA L∞ < ∞, then A is irreducible. This corollary will be used in the proof of the lower bound on the mean dimension. The following proposition will be used in the cut-off construction in Section 7. Proposition 6.4. Let A be a non-flat SU(2)-ASD connection on S 3 × R satisfying FA L∞ < +∞. The restriction of A to S 3 × {0} is irreducible. 2 Our convention of the sign of the Laplacian is geometric; we have = −∂ 2 /∂x 2 − ∂ 2 /∂x 2 − ∂ 2 /∂x 2 − ∂ 2 /∂x 2 1 2 3 4 on R4 .
1398
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Proof. This follows from the above Corollary 6.3 and the result of Taubes [20, Theorem 5]. Here we give a brief proof for readers’ convenience. Note that the Riemannian metric on S 3 × R is real analytic. (Later we will use Cauchy–Kovalevskaya’s theorem. Hence the real analyticity of all data is essential.) Suppose A|S 3 ×{0} is reducible. Fix p ∈ S 3 and take a small open neighborhood Ω ⊂ S 3 of p. Let ε > 0 be a small positive number. By using the Uhlenbeck gauge [24, Corollary 1.4], we can suppose that A is represented by a real analytic connection matrix over Ω × (−ε, ε). Moreover, by using the (real analytic) temporal gauge (see Donaldson [6, Chapter 2]), we can assume that the (real analytic) connection matrix of A over Ω × (−ε, ε) is dt-part free and satisfies ∂ A(t) = ∗3 F A(t) 3 , ∂t where A(t) := A|Ω×{t} and F (A(t))3 is the curvature of A(t) as a connection over the 3-manifold Ω × {t}. ∗3 is the Hodge star on Ω × {t}. Since A(0) is reducible, there exists a real analytic gauge transformation u (= ±1) over Ω satisfying u(A(0)) = A(0). Set B := u(A) over Ω × (−ε, ε). B is real analytic and satisfies ∂ B(t) = ∗3 F B(t) 3 . ∂t A and B are both real analytic and satisfy the same real analytic equation of the normal form with the same real analytic initial value A(0) = B(0). Therefore Cauchy–Kovalevskaya’s theorem implies A = B = u(A). This means that A is reducible over an open set Ω × (−ε, ε) ⊂ S 3 × R. Then the unique continuation principle (see Donaldson and Kronheimer [7, Lemma 4.3.21]) implies that A is reducible all over S 3 × R. But this contradicts Corollary 6.3. 2 7. Cut-off constructions As we explained in Section 3, we need to define a ‘cut-off’ of [A] ∈ Md . Section 7.1 is a preparation to define a cut-off construction, and we define it in Section 7.2. Let δ1 > 0. We define δ1 = δ1 (δ1 ) by δ1 := sup
x∈S 3 ×R
g(x, y) dvol(y) .
S 3 ×(−δ1 ,δ1 )
Since we have g(x, y) const/d(x, y)2 (see (15) and (16)),
(δ1 )1/4
r dr = const δ1 ,
g(x, y) dvol(y) const d(x,y)(δ1 )1/4
{d(x,y)(δ1 )1/4 }∩S 3 ×(−δ1 ,δ1 )
0
1 g(x, y) dvol(y) const · δ1 √ = const δ1 . δ1
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1399
√ Hence δ1 const δ1 (this calculation is due to [5, pp. 190–191]). In particular, we have δ1 → 0 as δ1 → 0. For d 0, we choose δ1 = δ1 (d) so that 0 < δ1 < 1 and δ1 = δ1 (δ1 (d)) satisfies 5 + 7d + d 2 δ1 ε0 /4 = 1/(4000).
(27)
The reason of this choice will be revealed in Proposition 7.6. 7.1. Gauge fixing on S 3 and gluing instantons Let F := S 3 × SU(2) be the product principal SU(2)-bundle over S 3 . Let AS 3 be the space of connections on F , and G be the gauge transformation group of F . AS 3 and G are equipped with the C ∞ -topology. Set BS 3 := AS 3 /G (with the quotient topology), and let π : AS 3 → BS 3 be the natural projection. Note that the gauge transformations ±1 trivially act on AS 3 . Proposition 7.1. Let d 0, and A ∈ AS 3 be an irreducible connection. There exist a closed neighborhood UA of [A] in BS 3 and a continuous map ΦA : π −1 (UA ) → G/{±1} such that, for any B ∈ π −1 (UA ), [g] := ΦA (B) satisfies the following. (i) g(B) = A + a with aL∞ δ1 = δ1 (d). (δ1 is the positive constant chosen in the above (27).) (ii) For any gauge transformation h of F , we have ΦA (h(B)) = [gh−1 ]. Proof. Let ε > 0 be sufficiently small, and we take a closed neighborhood UA of [A] in BS 3 such that
UA ⊂ [B] ∈ BS 3 ∃g: gauge transformation of F s.t. g(B) − AL4 < ε . 1
The usual Coulomb gauge construction shows that, for each B ∈ π −1 (UA ), there uniquely exists [g] ∈ G/{±1} such that g(B) = A + a with dA∗ a = 0 and aL4 const · ε. Since L41 (S 3 ) → 1
C 0 (S 3 ), we have aL∞ const · ε δ1 for sufficiently small ε. We define ΦA (B) := [g]. Then the condition (i) is obviously satisfied, and the condition (ii) follows from the uniqueness of [g]. 2 Proposition 7.2. Let d 0, and Θ be the product connection on F = S 3 × SU(2). There exist a closed neighborhood UΘ of [Θ] in BS 3 and a continuous map ΦΘ : π −1 (UΘ ) → G such that, for any A ∈ π −1 (UΘ ), g := ΦΘ (A) satisfies the following. (i) g(A) = Θ + a with aL∞ δ1 = δ1 (d). (ii) For any gauge transformation h of F , there exists a constant gauge transformation h of F (i.e. h (Θ) = Θ) such that ΦΘ (h(A)) = h gh−1 . Proof. Fix a point θ0 ∈ S 3 . Let ε > 0 be sufficiently small, and we take a closed neighborhood UΘ of [Θ] in BS 3 such that
UΘ ⊂ [A] ∈ BS 3 ∃g: gauge transformation of F s.t. g(A) − Θ L4 < ε . 1
1400
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
For any A ∈ π −1 (UΘ ), there uniquely exists a gauge transformation g with g(θ0 ) = 1 such that ∗ a = 0 and a g(A) = Θ + a with dΘ L4 const · ε ( δ1 ). We set ΦΘ (A) := g. The condition 1
(i) is obvious, and condition (ii) follows from ΦΘ (h(A)) = h(θ0 )gh−1 . (Here h(θ0 ) is a constant gauge transformation. Note that (h(θ0 )gh−1 )(θ0 ) = 1.) 2 Recall the settings in Section 1. Let d 0. The moduli space Md is the space of all gauge equivalence classes [A] where A is an ASD connection on E := X × SU(2) satisfying |F (A)| d. We define Kd ⊂ BS 3 by
Kd := [A|S 3 ×{0} ] ∈ BS 3 [A] ∈ Md , where we identify E|S 3 ×{0} with F . From the Uhlenbeck compactness [24,25], Md is compact, and hence Kd is also compact. Proposition 6.4 implies that, for any [A] ∈ Md , A|S 3 ×{0} is irreducible or a flat connection. (The important point is that A|S 3 ×{0} never be a non-flat reducible connection.) Set A0 := Θ (the product connection on F ). There exist irreducible connections A1 , A2 , . . . , AN (N = N (d)) on F such that Kd ⊂ Int(UA0 ) ∪ Int(UA1 ) ∪ · · · ∪ Int(UAN ) and [Ai ] ∈ Kd (0 i N). Here Int(UAi ) is the interior of the closed set UAi introduced in Propositions 7.1 and 7.2. Note that we can naturally identify Kd with the space {[A|S 3 ×{T } ] ∈ BS 3 | [A] ∈ Md } for any real number T because Md admits the natural R-action. For the statement of the next proposition, we introduce a new notation. We define F × R as the pull-back of F by the natural projection X = S 3 × R → S 3 . So F × R is a principal SU(2)-bundle over X. Of course, we can naturally identify F × R with E, but here we use this notation for the later convenience. We define Aˆ 0 as the pull-back of Θ by the projection X = S 3 × R → S 3 . (Hence Aˆ 0 is the product connection on F × R under the natural identification F × R = E.) Proposition 7.3. For each i = 1, 2, . . . , N there exists a connection Aˆ i on F × R satisfying the following. (Recall 0 < δ1 < 1.) (i) Aˆ i = Ai over S 3 × [−δ1 , δ1 ]. Here Ai (a connection on F × R) means the pull-back of Ai (a connection on F ) by the natural projection X → S 3 . (ii) F (Aˆ i ) is supported in S 3 × (−1, 1). (iii) F + (Aˆ i )|δ1 <|t|<1 T ε0 /4 = 1/(4000), where F + (Aˆ i )|δ1 <|t|<1 = F + (Aˆ i ) × 1δ1 <|t|<1 and 1δ1 <|t|<1 is the characteristic function of the set {(θ, t) ∈ S 3 × R | δ1 < |t| < 1}. Proof. By using a cut-off function, we can construct a connection A i on F ×R such that A i = Ai over S 3 × [−δ1 , δ1 ] and supp F (A i ) ⊂ S 3 × (−1, 1). We can reduce the self-dual part of F (A i ) by “gluing instantons” to A i over δ1 < |t| < 1. This technique is essentially well known for the specialists in the gauge theory. For the detail, see Donaldson [5, pp. 190–199]. By the argument of [5, pp. 196–198], we get the following situation. For any ε > 0, there exists a connection Aˆ i satisfying the following. Aˆ i = A i = Ai over |t| δ1 , and supp F (Aˆ i ) ⊂ S 3 × (−1, 1). Moreover F + (Aˆ i ) = F1+ + F2+ over δ1 < |t| < 1 such that |F1+ | ε and + F const, 2
vol supp F2+ ε,
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1401
where const is a positive constant depending only on A i and independent of ε. If we take ε sufficiently small, then + F (Aˆ i )|δ <|t|<1 ε0 /4. 1 T
2
7.2. Cut-off construction Let T be a positive real number. We define a closed subset Md,T (i, j ) ⊂ Md (0 i, j N = N(d)) as the set of [A] ∈ Md satisfying [A|S 3 ×{T } ] ∈ UAi and [A|S 3 ×{−T } ] ∈ UAj . Here we naturally identify ET := E|S 3 ×{T } and E−T := E|S 3 ×{−T } with F , and Ai (0 i N ) are the connections on F introduced in the previous subsection. We have Md =
Md,T (i, j ).
(28)
0i,j N
Of course, this decomposition depends on the parameter T > 0. The important point is that N is independent of T . We will define a cut-off construction for each piece Md,T (i, j ). Let A be an ASD connection on E satisfying [A] ∈ Md,T (i, j ). Let u+ : E|tT → ET × [T , +∞) be the temporal gauge of A with u+ = id on E|S 3 ×{T } = ET . (See Donaldson [6, Chapter 2].) Here E|tT is the restriction of E to S 3 × [T , +∞), and ET × [T , +∞) is the pull-back of ET by the projection S 3 × [T , ∞) → S 3 × {T }. We will repeatedly use these kinds of notations. In the same way, let u− : E|t−T → E−T × (−∞, −T ] be the temporal gauge of A with u− = id on E|S 3 ×{−T } = E−T . We define A(t) (|t| T ) by setting A(t) := u+ (A) for t T and A(t) := u− (A) for t −T . A(t) becomes dt-part free. Since A is ASD, we have ∂A(t) = ∗3 F A(t) 3 , ∂t
(29)
where ∗3 is the Hodge star on S 3 × {t} and F (A(t))3 is the curvature of A(t) as a connection on the 3-manifold S 3 × {t}. We have [A(T )] ∈ UAi and [A(−T )] ∈ UAj . By using Propositions 7.1 and 7.2, we set [g+ ] := ΦAi (A(T )) if i > 0 and g+ := ΦΘ (A(T )) if i = 0. (If i > 0, the gauge transformation g+ is not uniquely determined because there exists the ambiguity coming from ±1. For this point, see Lemma 7.4 and its proof.) In the same way we set [g− ] := ΦAj (A(−T )) if j > 0 and g− := ΦΘ (A(−T )) if j = 0. We consider g+ (resp. g− ) as the gauge transformation of ET (resp. E−T ). They satisfy g+ A(T ) − Ai
L∞
δ1 ,
g− A(−T ) − Aj
L∞
δ1 .
(30)
We define a principal SU(2)-bundle E over X by E := E||t|
1402
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
(−∞, −T ) over the region −T − δ/4 < t < −T by the map g− ◦ u− : E|−T −δ1 /4
(31)
Over the region t > T , we set A := 1 − ρ(t − T ) g+ A(t) + ρ(t − T )Aˆ i,T
on ET × (T , +∞),
(32)
where Aˆ i,T is the pull-back of the connection Aˆ i introduced in the previous subsection (see Proposition 7.3) by the map t → t − T . So, in particular, Aˆ i,T = Ai over T − δ1 t T + δ1 and F (Aˆ i,T ) = 0 over t T + 1. (32) is compatible with (31) over T < t < T + δ1 /4 where ρ(t − T ) = 0. In the same way, over the region t < −T , we set A := 1 − ρ(t + T ) g− A(t) + ρ(t + T )Aˆ j,−T
on E−T × (−∞, −T ).
We have F (A ) = 0 (|t| T + 1). Then we have constructed (E , A ) from A with [A] ∈ Md,T (i, j ). Lemma 7.4. The gauge equivalence class of (E , A ) depends only on the gauge equivalence class of A. Proof. Suppose [A] ∈ Md,T (0, 1). Other cases can be proved in the same way. Let h : E → E be a gauge transformation and set B := h(A). Let (E A , A ) and (E B , B ) be the bundles and connections constructed by the above cut-off procedure form A and B, respectively. Let u±,A and u±,B be the temporal gauges of A and B over t T or t −T . We have u±,B = h±T ◦ u±,A ◦ h−1 where h±T := h|t=±T on E±T . Set g+,A := ΦΘ (A(T )) and g+,B := ΦΘ (B(T )) = ΦΘ (hT (A(T ))). From Proposition 7.2(ii), we have g+,B = h g+,A h−1 T , where h is a constant gauge transformation of ET (h (Θ) = Θ). Set [g−,A ] := ΦA1 (A(−T )) and [g−,B ] := ΦA1 (B(−T )) = ΦA1 (h−T (A(−T ))). We have g−,B = ±g−,A h−1 −T . We define a gauge transformation g : E A → E B by the following way: Over the region |t| < T + δ1 /4, we set g := h on E||t| T , we set g := h on ET × (T , +∞). Over the region t < −T , we set g := ±1 on E−T × (−∞, −T ). We have g(A ) = B . Indeed, over the region t > T , h (1 − ρ)g+,A A(t) + ρΘ = (1 − ρ)g+,B B(t) + ρΘ because h g+,A u+,A = g+,B u+,B h and h (Θ) = Θ.
2
ρ = ρ(t − T ) ,
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1403
Lemma 7.5. + F A 5 + 7d + d 2
on T |t| T + δ1 .
Proof. We consider the case T < t T + δ1 where Aˆ i,T = Ai . We have A = (1 − ρ)g+ (A(t)) + ρAi , ρ = ρ(t − T ). Set a := Ai − g+ (A(t)). Then A = g+ (A(t)) + ρa. We have + ρ F + A = ρ dt ∧ a + F (Ai ) + ∗3 F (Ai ) ∧ dt + ρ 2 − ρ (a ∧ a)+ . 2 We have |F (Ai )| d and |ρ | 4/δ1 . From (30), |Ai −g+ (A(T ))| δ1 . From the ASD equation (29) and |F (A)| d, |A(t) − A(T )| d|t − T | dδ1 . Hence |a| Ai − g+ A(T ) + g+ A(T ) − g+ A(t) (1 + d)δ1
(T t T + δ1 ). (33)
Therefore, for T t T + δ1 , + F A 4(1 + d) + d + (1 + d)2 = 5 + 7d + d 2 .
2
Proposition 7.6. F (A ) = 0 over |t| T + 1, and F + (A ) is supported in {T < |t| < T + 1}. We have |F (A )| d over |t| T , and + F A
L∞
d ,
+ F A ε0 = 1/(1000), T
(34)
where d = d (d) is a positive constant depending only on d. Moreover 1 8π 2
2 1 tr F A 8π 2
X
|t|T
2 3 F (A)2 dvol + C1 (d) 2T d vol(S ) + C1 (d). 8π 2
Here C1 (d) depends only on d. Proof. The statements about the supports of F (A ) and F + (A ) are obvious by the construction. Since A = A over |t| T , |F (A )| d over |t| T . We have A = Aˆ i,T for t T + δ1 and A = Aˆ j,−T for t −T − δ1 . Hence (from Lemma 7.5) + F A ∞ d := max 5 + 7d + d 2 , F + (Aˆ 1 ) ∞ , F + (Aˆ 2 ) ∞ , . . . , F + (Aˆ N ) ∞ . L L L L By using Lemma 7.5, (27) and Proposition 7.3(iii) (note that g(x, y) is invariant under the translations t → t − T and t → t + T ), + F A 2 5 + 7d + d 2 δ + ε0 /2 ε0 . 1 T We have A = A over |t| T and F A = (1 − ρ)g+ ◦ u+ F (A) + ρF (Ai ) + ρ dt ∧ a + ρ 2 − ρ a 2 ,
1404
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
over T < t < T + δ1 . Hence |F (A )| constd over T < |t| < T + δ1 by using (33). Then the last statement can be easily proved. 2 7.3. Continuity of the cut-off Fix 0 i, j N . Let [An ] (n 1) be a sequence in Md,T (i, j ) converging to [A] ∈ Md,T (i, j ) in the C ∞ -topology over every compact subset in X. Let [E n , A n ] (resp. [E , A ]) be the gauge equivalence classes of the connections constructed by cutting off [An ] (resp. [A]) as in Section 7.2. Lemma 7.7. There are gauge transformations hn : E n → E (n 1) such that hn (A n ) = A for |t| T + 1 and hn (A n ) converges to A in the C ∞ -topology over X. (Indeed, we will need only C 1 -convergence in the later argument.) Proof. We can suppose that An converges to A in the C ∞ -topology over |t| T + 2. Let u+,n : E|tT → ET × [T , +∞) (resp. u+ ) be the temporal gauge of An (resp. A), and set An (t) := u+,n (An ) and A(t) := u+ (A) for t T . We set [g+,n ] := ΦAi (An (T )) and [g+ ] := ΦAi (A(T )) if i > 0, and we set g+,n := ΦΘ (An (T )) and g+ := ΦΘ (A(T )) if i = 0. u+,n converges to u+ in the C ∞ -topology over T t T + 1, and we can suppose that g+,n converges to g+ in the C ∞ -topology. Hence there are χn ∈ Γ (S 3 ×[T , T +1], ad ET ×[T , T +1]) (n 1) satisfying g+ ◦ u+ = eχn g+,n ◦ u+,n . χn → 0 in the C ∞ -topology over T t T + 1. Let ϕ be a smooth function on X such that 0 ϕ 1, ϕ = 1 over t T + δ1 and ϕ = 0 over t T + 1. We define hn : E n → E (n 1) as follows. (i) In the case of |t| < T + δ1 /4, we set hn := id : E → E. (ii) In the case of t > T , we set hn := eϕχn : ET × (T , +∞) → ET × (T , +∞). This is compatible with the case (i). (iii) In the case of t < −T , we define hn : E−T × (−∞, −T ) → E−T × (−∞, −T ) in the same way as in the above (ii). Then we can easily check that these hn satisfy the required properties.
2
8. Proofs of the upper bounds 8.1. Proof of dim(Md : R) < ∞ As in Section 1, E = X × SU(2) and Md (d 0) is the space of all gauge equivalence classes [A] where A is an ASD connection on E satisfying F (A)L∞ d. We define a distance on Md as follows. For [A], [B] ∈ Md , we set dist [A], [B] :=
inf
g:E→E
n1
2−n
g(A) − BL∞ (|t|n) , 1 + g(A) − BL∞ (|t|n)
where g runs over all gauge transformations of E, and |t| n means the region {(θ, t) ∈ S 3 × R | |t| n}. This distance is compatible with the topology of Md introduced in Section 1. For
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1405
R = 1, 2, 3, . . . , we define an amenable sequence ΩR ⊂ R by ΩR = {s ∈ R | −R s R}. We define distΩR ([A], [B]) as in Section 2.1, i.e., distΩR [A], [B] := sup dist s ∗ A , s ∗ B , s∈ΩR
where s ∗ A is the pull-back of A by s : E → E. Let ε > 0. We take a positive integer L = L(ε) so that
2−n < ε/2.
(35)
n>L
We define D = D(d, d , ε/4) as the positive number introduced in Lemma 4.14, where d = d (d) is the positive constant introduced in Proposition 7.6. We set T = T (R, d, ε) = R + L + D > 0. We have the decomposition Md = 0i,j N Md,T (i, j ) (N = N (d)) as in Section 7.2. Md,T (i, j ) is the space of [A] ∈ Md satisfying [A|S 3 ×{T } ] ∈ UAi and [A|S 3 ×{−T } ] ∈ UAj . Fix 0 i, j N . Let A be an ASD connection on E satisfying [A] ∈ Md,T (i, j ). By the cut-off construction in Section 7.2, we have constructed (E , A ) satisfying the following conditions (see Proposition 7.6). E is a principal SU(2)-bundle over X, and A is a connection on E such that F (A ) = 0 for |t| T + 1, F + (A ) is supported in {T < |t| < T + 1}, and that + F A
+ F A ε0 , T
L∞
d ,
F A
L∞ (|t|T )
d.
We can identify E with E over |t| < T + δ1 /4 by the definition, and A ||t|
(36)
(E , A ) satisfies the conditions (i), (ii), (iii) in the beginning of Section 4.1. Therefore, by using the perturbation argument in Section 4 (see Proposition 4.12), we can construct the ASD ∗ φ on E . By Lemma 4.14, connection A
:= A + dA
A A − A
= A − A
ε/4
|t| T − D = R + L .
(37)
From Propositions 7.6 and 4.12(b), 1 8π 2
2 F A dvol = 1 8π 2
X
2 tr F A
X
1 8π 2
|t|T
2 3 F (A)2 dvol + C1 (d) 2T d vol(S ) + C1 (d), 8π 2
(38)
where C1 (d) is a positive constant depending only on d. Since the cut-off and perturbation constructions respect the gauge symmetry (see Proposition 4.12 and Lemma 7.4), the gauge equivalence class [E , A
] depends only on the gauge equivalence class [A]. We set Fi,j ([A]) := [E , A
].
1406
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
For c 0, we define M(c) as the space of all gauge equivalence classes [E, A] satisfying the following. E is a principal SU(2)-bundle over X, and A is an ASD connection on E satisfying 1 8π 2
|FA |2 dvol c. X
The topology of M(c) is defined as follows. A sequence [En , An ] ∈ M(c) (n 1) converges to [E, A] ∈ M(c) if the following two conditions are satisfied: (i) X |F (An )|2 dvol = X |F (A)|2 dvol for n 1. (ii) There are gauge transformations gn : En → E (n 1) such that for any compact set K ⊂ X we have gn (An ) − AC 0 (K) → 0. Using the index theorem, we have dim M(c) 8c.
(39)
Here dim M(c) denotes the topological covering dimension of M(c). By (38), we get the map
Fi,j
2T d 2 vol(S 3 ) : Md,T (i, j ) → M + C1 (d) , 8π 2
[A] → E , A
.
Lemma 8.1. For [A1 ] and [A2 ] in Md,T (i, j ), if Fi,j ([A1 ]) = Fi,j ([A2 ]), then distΩR [A1 ], [A2 ] < ε. Proof. From (36) and (37), there exists a gauge transformation g of E defined over |t| < T + δ1 /4 such that |g(A1 ) − A2 | ε/2 over |t| R + L. There exists a gauge transformation g˜ of E defined all over X satisfying g˜ = g on |t| T = R + L + D. Then we have |g(A ˜ 1 ) − A2 | ε/2 on |t| R + L. For s ∈ ΩR (i.e. |s| R), by using (35), −n 2 dist s ∗ A1 , s ∗ A2 n1
L
g(A ˜ 1 ) − A2 L∞ (|t−s|n) 1 + g(A ˜ 1 ) − A2 L∞ (|t−s|n)
2−n (ε/2) +
2−n < ε/2 + ε/2 = ε.
2
n>L
n=1 2
3
) + C1 (d)) is continuous. Lemma 8.2. The map Fi,j : Md,T (i, j ) → M( 2T d8πvol(S 2
Proof. Let [An ] ∈ Md,T (i, j ) be a sequence converging to [A] ∈ Md,T (i, j ). From Lemma 7.7, there are gauge transformations hn : E n → E (n 1) such that hn (A n ) = A over |t| T + 1 and that hn (A n ) converges to A in the C ∞ -topology over X. Since the perturbation construction in Section 4 is gauge equivariant (Proposition 4.12), we have E , hn A n + dh∗n (A ) φhn (A n ) = hn E n , hn A
n . n
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1407
∗ φ in the C 0 -topology over every compact From Proposition 5.6, dh∗ (A ) φhn (A n ) converges to dA
A n n subset in X and F hn A + d ∗ φh (A ) 2 dvol = F A + d ∗ φA 2 dvol for n 1. n hn (A ) n n A n
X
X
This shows that the sequence [E n , A
n ] = [E , hn (A n ) + dh∗ ∗ φ ] in M ( 2T [E , A
] = [E , A + dA
A T
d 2 vol(S 3 ) 8π 2
n (An )
+ C1 (d)).
φhn (A n ) ] (n 1) converges to
2
From Lemmas 8.1 and 8.2, Fi,j becomes an ε-embedding with respect to the distance distΩR . Hence
2T d 2 vol(S 3 ) Widimε Md,T (i, j ), distΩR dim M + C1 (d) . 8π 2 Since Md = get
0i,j N
Md,T (i, j ) (each Md,T (i, j ) is a closed set), by using Lemma 2.3, we
Widimε (Md , distΩR ) (N + 1)2 dim M
2T d 2 vol(S 3 ) + C (d) + (N + 1)2 − 1. 1 8π 2
From (39) and T = R + L + D,
dim M
2T d 2 vol(S 3 ) 2(R + L + D) d 2 vol(S 3 ) + C (d) + 8C1 (d). 1 2 8π π2
Since N = N(d), L = L(ε), D = D(d, d (d), ε/4) are independent of R, we get Widimε (Md , distΩR ) (N + 1)2 d 2 vol(S 3 ) . R→∞ |ΩR | π2
Widimε (Md : R) = lim This holds for any ε > 0. Thus
dim(Md : R) = lim Widimε (Md : R) ε→0
(N + 1)2 d 2 vol(S 3 ) < ∞. π2
8.2. Upper bound on the local mean dimension Lemma 8.3. There exists r1 = r1 (d) > 0 satisfying the following. For any [A] ∈ Md and s ∈ R, there exists an integer i (0 i N ) such that if [B] ∈ Md satisfies distR ([A], [B]) r1 then [B|S 3 ×{s} ] ∈ UAi . Here we identify E|S 3 ×{s} with F , and UAi is the closed set introduced in Section 7.1. Recall distR ([A], [B]) = sups∈R dist([s ∗ A], [s ∗ B]).
1408
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Proof. There exists r1 > 0 (the Lebesgue number) satisfying the following. For any [A] ∈ Md , there exists i = i([A]) such that if [B] ∈ Md satisfies dist([A], [B]) r1 then [B|S 3 ×{0} ] ∈ UAi . If distR ([A], [B]) r1 , then for each s ∈ R we have dist([s ∗ A], [s ∗ B]) r1 and hence [B|S 3 ×{s} ] = for i = i([s ∗ A]).
∗ s B S 3 ×{0} ∈ UAi ,
2
Lemma 8.4. For any ε > 0, there exists r2 = r2 (ε ) > 0 such that if [A] and [B] in Md satisfy distR ([A], [B]) r2 then F (A)2 − F (B)2
L∞ (X)
ε .
Proof. The map Md [A] → |F (A)|2 ∈ C 0 (S 3 × [0, 1]) is continuous. Hence there exists r2 > 0 such that if dist([A], [B]) r2 then F (A)2 − F (B)2
L∞ (S 3 ×[0,1])
ε .
Then for each s ∈ R, if dist([s ∗ A], [s ∗ B]) r2 , F (A)2 − F (B)2
L∞ (S 3 ×[s,s+1])
ε .
Therefore if distR ([A], [B]) r2 , then |F (A)|2 − |F (B)|2 L∞ (X) ε .
2
Let [A] ∈ Md , and ε, ε > 0 be arbitrary two positive numbers. There exists T0 = T0 ([A], ε ) > 0 such that for any T1 T0 1 sup 8π 2 T1 t∈R
F (A)2 dvol ρ(A) + ε /2.
S 3 ×[t,t+T1 ]
The important point for the later argument is the following: We can arrange T0 so that T0 ([s ∗ A], ε ) = T0 ([A], ε ) for all s ∈ R. We set
4π 2 ε , r = r d, ε = min r1 (d), r2 vol(S 3 ) where r1 (·) and r2 (·) are the positive constants introduced in Lemmas 8.3 and 8.4. By Lemma 8.4, if [B] ∈ Br ([A])R (the closed ball of radius r centered at [A] in Md with respect to the distance distR ), then for any T1 T0 1 sup 8π 2 T1 t∈R
F (B)2 dvol ρ(A) + ε /2 + ε /2 = ρ(A) + ε .
(40)
S 3 ×[t,t+T1 ]
We define positive numbers L = L(ε) and D = D(d, d (d), ε/4) as in the previous subsection. (L = L(ε) is a positive integer satisfying (35), and D = D(d, d (d), ε/4) is the positive number
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1409
introduced in Lemma 4.14.) Let R be an integer with R T0 , and set T := R + L + D. By Lemma 8.3, there exist i, j (0 i, j N ) depending on [A] and T such that all [B] ∈ Br ([A])R satisfy [B|S 3 ×{T } ] ∈ UAi and [B|S 3 ×{−T } ] ∈ UAj . (That is, Br ([A])R ⊂ Md,T (i, j ).) As in the previous subsection, by using the cut-off construction and perturbation, for each [B] ∈ Br ([A])R we can construct the ASD connection [E , B
]. By (38), (40) and T T0 , 1 8π 2
2 F B dvol 1 8π 2
X
F (B)2 dvol + C1 (d) 2T ρ(A) + ε + C1 (d),
|t|T
where C1 (d) depends only on d. Therefore we get the map Br [A] R → M 2T ρ(A) + ε + C1 (d) ,
[B] → E , B
.
This is an ε-embedding with respect to the distance distΩR by Lemmas 8.1 and 8.2. Therefore we get (by (39)) Widimε Br [A] R , distΩR 16T ρ(A) + ε + 8C1 (d), for R T0 ([A], ε ) and r = r(d, ε ). As we pointed out before, we have T0 ([s ∗ A], ε ) = T0 ([A], ε ) for s ∈ R. Hence for all s ∈ R and R T0 = T0 ([A], ε ), we have the same upper bound on Widimε (Br ([s ∗ A])R , distΩR ). Then for R T0 , 16T (ρ(A) + ε ) + 8C1 (d) 1 sup Widimε Br s ∗ A R , distΩR . |ΩR | s∈R 2R T = R + L + D. Here L = L(ε) and D = D(d, d (d), ε/4) are independent of R. Hence
1 sup Widimε Br s ∗ A R , distΩR R→∞ |ΩR | s∈R 8 ρ(A) + ε .
Widimε Br [A] R ⊂ Md : R = lim
Here we have used (6). This holds for any ε > 0. (Note that r = r(d, ε ) is independent of ε.) Hence dim Br [A] R ⊂ Md : R = lim Widimε Br [A] R ⊂ Md : R 8 ρ(A) + ε . ε→0
Since dim[A] (Md : R) dim(Br ([A])R ⊂ Md : R), dim[A] (Md : R) 8 ρ(A) + ε . This holds for any ε > 0. Thus dim[A] (Md : R) 8ρ(A). Therefore we get the conclusion:
1410
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Theorem 8.5. For any [A] ∈ Md , dim[A] (Md : R) 8ρ(A). 9. Analytic preliminaries for the lower bound Let T > 0 be a positive real number, E be a principal SU(2)-bundle over S 3 × (R/T Z), and A be an ASD connection on E. Suppose A is not flat. Let π : S 3 × R → S 3 × (R/T Z) be the natural projection, and E := π ∗ E and A := π ∗ A be the pull-backs. Obviously A is a non-flat ASD connection satisfying FA L∞ < ∞. Hence it is irreducible (Corollary 6.3). Some constants introduced below (e.g. C2 , C3 , ε1 , ε2 ) will depend on (E, A). But we consider that (E, A) is fixed, and hence the dependence on it will not be explicitly written. Lemma 9.1. There exists C2 > 0 such that for any u ∈ Ω 0 (ad E)
|u| C2
|dA u|2 .
2
S 3 ×[0,T ]
S 3 ×[0,T ]
Then, from the natural T -periodicity of A, for every n ∈ Z
|u|2 C2
S 3 ×[nT ,(n+1)T ]
|dA u|2 .
S 3 ×[nT ,(n+1)T ]
Proof. Since A is ASD and irreducible, the restriction of A to S 3 × (0, T ) is also irreducible (by the unique continuation [7, Section 4.3.4]). Suppose the above statement is false, then there exist un (n 1) such that 1=
|un |2 > n
S 3 ×[0,T ]
|dA un |2 .
S 3 ×[0,T ]
If we take a subsequence, then the restrictions of un to S 3 × (0, T ) converge to some u weakly in L21 (S 3 × (0, T )) and strongly in L2 (S 3 × (0, T )). We have uL2 = 1 (in particular u = 0) and dA u = 0. This means that A is reducible over S 3 × (0, T ). This is a contradiction. 2 q
Lemma 9.2. Let 4 < q < ∞. For any u ∈ L1 (S 3 × (0, T ), Λ0 (ad E)), uL∞ (S 3 ×(0,T )) constq dA uLq (S 3 ×(0,T )) . q
Proof. Note that the Sobolev embedding L1 (S 3 × (0, T )) → C 0 (S 3 × [0, T ]) is a compact operator. Then this lemma can be proved in the same way as in Lemma 9.1. 2
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1411
Lemma 9.3. Let 4 < q < ∞. For any gauge transformation g : E → E and n ∈ Z, min g − 1L∞ (S 3 ×(nT ,(n+1)T )) , g + 1L∞ (S 3 ×(nT ,(n+1)T )) constq dA gLq (S 3 ×(nT ,(n+1)T )) . Here constq is independent of g and n. Proof. From the T -periodicity of A, it is enough to prove the case of n = 0. Suppose the statement is false. Then there exists a sequence of gauge transformations {gn }n1 satisfying min gn − 1L∞ (S 3 ×(0,T )) , gn + 1L∞ (S 3 ×(0,T )) > ndA gn Lq (S 3 ×(0,T )) . q
If we take a subsequence, then gn converges to some g weakly in L1 (S 3 × (0, T )) and strongly in C 0 (S 3 × [0, T ]). In particular we have dA g = 0. Hence g = ±1 since A is irreducible. By mulq tiplying ±1 to gn , we can assume that g = 1. Then there exists un ∈ L1 (S 3 × (0, T ), Λ0 (ad E)) (n 1) satisfying gn = eun and un L∞ (S 3 ×(0,T )) constgn − 1L∞ (S 3 ×(0,T )) . Then, by using Lemma 9.2, we have gn − 1L∞ (S 3 ×(0,T )) constun L∞ (S 3 ×(0,T )) const dA un Lq (S 3 ×(0,T )) const
dA gn Lq (S 3 ×(0,T )) . This is a contradiction.
2
Lemma 9.4. There exists ε1 > 0 such that, for any gauge transformation g : E → E, if dA gL∞ (X) ε1 then min g − 1L∞ (X) , g + 1L∞ (X) constdA gL∞ (X) . Proof. From Lemma 9.3 min g − 1L∞ (S 3 ×(nT ,(n+1)T )) , g + 1L∞ (S 3 ×(nT ,(n+1)T )) CdA gL∞ (X) C · ε1 . Suppose min(g − 1L∞ (S 3 ×(0,T )) , g + 1L∞ (S 3 ×(0,T )) ) = g − 1L∞ (S 3 ×(0,T )) . We want to prove that for all n ∈ Z min g − 1L∞ (S 3 ×(nT ,(n+1)T )) , g + 1L∞ (S 3 ×(nT ,(n+1)T )) = g − 1L∞ (S 3 ×(nT ,(n+1)T )) .
(41)
We have g −1L∞ (S 3 ×(0,T )) C ·ε1 1. From |dA g| ε1 , g −1L∞ (S 3 ×(T ,2T )) (C +T )ε1 , and hence g + 1L∞ (S 3 ×(T ,2T )) 2 − (C + T )ε1 . We choose ε1 > 0 so that (C + T )ε1 < 1. Then (41) holds for n = 1. In the same way, by using induction, we can prove that (41) holds for all n ∈ Z. Then Lemma 9.3 implies g − 1L∞ (X) CdA gL∞ (X) . 2 Let N > 0 be a large positive integer which will be fixed later, and set R := N T . Let ϕ be a smooth function on R such that 0 ϕ 1, ϕ = 1 on [0, R], ϕ = 0 over t 2R and t −R, and
1412
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
|ϕ |, |ϕ
| 2/R. Then for any u ∈ Ω 0 (ad E) (not necessarily compactly supported), 2 2 dA (ϕu) = A (ϕu), ϕu . |dA u| S 3 ×[0,R]
S 3 ×R
S 3 ×R
Here A := ∇A∗ ∇A = −∗dA ∗dA on Ω 0 (ad E). We have A (ϕu) = ϕA u + ϕ · u + ∗(∗dϕ ∧ dA u − dϕ ∧ ∗dA u). Then A (ϕu) = A u over S 3 × [0, R] and A (ϕu) (2/R)|u| + (4/R)|dA u| + |A u|. Hence
|dA u|2 (2/R) S 3 ×[0,R]
|u|2 + (4/R)
t∈[−R,0]∪[R,2R]
+
|u||dA u|
t∈[−R,0]∪[R,2R]
|A u||u|.
S 3 ×[−R,2R]
From Lemma 9.1,
|u|2 C2
t∈[−R,0]∪[R,2R]
|u||dA u|
t∈[−R,0]∪[R,2R]
|dA u|2 ,
t∈[−R,0]∪[R,2R]
t∈[−R,0]∪[R,2R]
|dA u|2
t∈[−R,0]∪[R,2R]
C2
|u|2
|dA u|2 .
t∈[−R,0]∪[R,2R]
Hence √ 2C2 + 4 C2 |dA u| R
S 3 ×[0,R]
|dA u| +
2
2
t∈[−R,0]∪[R,2R]
|A u||u|.
S 3 ×[−R,2R]
For a function (or a section of some Riemannian vector bundle) f on S 3 × R and p ∈ [1, ∞], we set f ∞ Lp := sup f Lp (S 3 ×(nR,(n+1)R)) . n∈Z
Then the above implies
√ 4C2 + 8 C2 dA u2∞ L2 + 3|A u| · |u|∞ L1 . |dA u| R 2
S 3 ×[0,R]
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1413
In the same way, for any n ∈ Z, √ 4C2 + 8 C2 |dA u| dA u2∞ L2 + 3|A u| · |u|∞ L1 . R
2
S 3 ×[nR,(n+1)R]
Then we have dA u2∞ L2
√ 4C2 + 8 C2 dA u2∞ L2 + 3|A u| · |u|∞ L1 . R
√ We fix N > 0 so that (4C2 + 8 C2 )/R 1/2 (recall: R = N T ). If dA u∞ L2 < ∞, then we get dA u2∞ L2 6|A u| · |u|∞ L1 . From Hölder’s inequality and Lemma 9.1, |A u| · |u|
∞ L1
A u∞ L2 u∞ L2
C2 A u∞ L2 dA u∞ L2 .
√ √ Hence dA u∞ L2 6 C2 A u∞ L2 , and u∞ L2 C2 dA u∞ L2 6C2 A u∞ L2 . Then we get the following conclusion. Lemma 9.5. There exists a constant C3 > 0 such that, for any u ∈ Ω 0 (ad E) with dA u∞ L2 < ∞, we have u∞ L2 + dA u∞ L2 C3 A u∞ L2 . The following result gives the “partial Coulomb gauge slice” in our situation. Proposition 9.6. There exists ε2 > 0 satisfying the following. For any a and b in Ω 1 (ad E) satisfying dA∗ a = dA∗ b = 0 and aL∞ , bL∞ ε2 , if there is a gauge transformation g of E satisfying g(A + a) = A + b then a = b and g = ±1. Proof. Since g(A + a) = A + b, we have dA g = ga − bg. Then we have |dA g| 2ε2 . We choose ε2 > 0 so that 2ε2 ε1 . (ε1 is the positive constant introduced in Lemma 9.4.) From Lemma 9.4, by multiplying ±1 to g, we can suppose g − 1L∞ const · ε2 1. Then there exists u ∈ Ω 0 (ad E) satisfying g = eu and uL∞ const · ε2 . We have dA eu = dA u + (dA u · u + udA u)/2! + dA u · u2 + udA u · u + u2 dA u /3! + · · · . Since |u| const · ε2 1, dA eu |dA u| 2 − e|u| |dA u|/2.
1414
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Hence |dA u| 2|dA g| 4ε2 . In particular, dA u∞ L2 < ∞. In the same way we get |dA g| 2|dA u|, and hence dA g∞ L2 2dA u∞ L2 2C3 A u∞ L2 .
(42)
Here we have used Lemma 9.5. Since dA∗ a = dA∗ b = 0 and dA g = ga − bg, we have A g = −∗dA ∗dA g = −∗(dA g ∧ ∗a + ∗b ∧ dA g). Therefore A g∞ L2 (aL∞ + bL∞ )dA g∞ L2 < ∞. Moreover, by using the above (42) and aL∞ , bL∞ ε2 , we get A g∞ L2 4C3 ε2 A u∞ L2 .
(43)
A direct calculation shows |A un | n(n − 1)|u|n−2 |dA u|2 + n|u|n−1 |A u|. Hence u A e − u e|u| |dA u|2 + e|u| − 1 |A u| Cε2 |dA u| + |A u| .
(44)
Here we have used |u|, |dA u| const · ε2 1. Hence (1 − Cε2 )|A u| Cε2 |dA u| + |A g|, and (1 − Cε2 )A u∞ L2 Cε2 dA u∞ L2 + A g∞ L2 < ∞. We choose ε2 > 0 so that (1 − Cε2 ) > 0. Then A u∞ L2 < ∞. The above (44) implies A g − A u∞ L2 Cε2 dA u∞ L2 + A u∞ L2 . Using Lemma 9.5, we get A g − A u∞ L2 C ε2 A u∞ L2 . Then the inequality (43) gives (1 − 4C3 ε2 )A u∞ L2 C ε2 A u∞ L2 . If we choose ε2 > 0 so small that (1 − 4C3 ε2 ) > C ε2 , then this estimate gives A u = 0. (Here we have used A u∞ L2 < ∞.) Then we get (from Lemma 9.5) u = 0. This shows g = 1 and a = b. 2 The following “L∞ -estimate” will be used in the next section. For its proof, see Proposition A.5 in Appendix A. Proposition 9.7. Let ξ be a C 2 -section of Λ+ (ad E) over S 3 × R, and set η := (∇A∗ ∇A + S/3)ξ . If ξ L∞ , ηL∞ < ∞, then ξ L∞ (24/S)ηL∞ .
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1415
10. Proof of the lower bound: deformation theory The argument in this section is a Yang–Mills analogue of the deformation theory developed in Tsukamoto [23]. Let d be a positive real number. As in Section 9, let T > 0 be a positive real number, E be a principal SU(2)-bundle over S 3 × (R/T Z), and A be an ASD connection on E. Suppose that A is not flat and F (A) ∞ < d. L
(45)
Set E := π ∗ E and A := π ∗ A where π : S 3 × R → S 3 × (R/T Z) is the natural projection. Some constants introduced below depend on (E, A). But we don’t explicitly write their dependence on it because we consider that (E, A) is fixed. We define the Banach space HA1 by setting
HA1 := a ∈ Ω 1 (ad E) dA∗ + dA+ a = 0, aL∞ < ∞ . (HA1 , · L∞ ) becomes an infinite dimensional Banach space. The additive group T Z = {nT ∈ R | n ∈ Z} acts on HA1 as follows. From the definition of E and A, we have (T ∗ E, T ∗ A) = (E, A) where T : S 3 × R → S 3 × R, (θ, t) → (θ, t + T ). Hence for any a ∈ HA1 , we have T ∗ a ∈ HA1 and T ∗ aL∞ = aL∞ . Fix 0 < α < 1. We want to define the Hölder space C k,α (Λ+ (ad E)) for k 0. Let {Uλ }Λ λ=1 ,
}Λ be finite open coverings of S 3 × (R/T Z) satisfying the following conditions. , {U {Uλ }Λ λ λ=1 λ=1 (i) U¯ λ ⊂ Uλ and U¯ λ ⊂ Uλ
. Uλ , Uλ and Uλ
are connected, and their boundaries are smooth. Each Uλ
is a coordinate chart, i.e., a diffeomorphism between Uλ
and an open set in R4 is given for each λ. (ii) The covering map π : S 3 × R → S 3 × (R/T Z) can be trivialized over each Uλ
, i.e., we
such that π : U
→ U
is diffeomorphic. We −1 have a disjoint union π (Uλ ) = n∈Z Unλ nλ λ
∩ π −1 (U ) and U := U
∩ π −1 (U ). We have π −1 (U ) = set Unλ := Unλ λ λ n∈Z Unλ and nλ nλ λ
. π −1 (Uλ ) = n∈Z Unλ (iii) A trivialization of the principal SU(2)-bundle E over each Uλ
is given. From the conditions (ii) and (iii), we have a coordinate system and a trivialization of E over
. Let u be a section of Λi (ad E) (0 i 4) over S 3 × R. Then u|
can be seen as a each Unλ Unλ
. Hence we can consider the Hölder norm u vector-valued function over Unλ C k,α (U¯ nλ ) of u as a ¯ vector-valued function over Unλ (cf. Gilbarg and Trudinger [9, Chapter 4]). We define the Hölder norm uC k,α by setting uC k,α :=
sup n∈Z,1λΛ
uC k,α (U¯ nλ ) .
For a ∈ HA1 , we have aC k,α constk aL∞ < ∞ for every k = 0, 1, 2, . . . by the elliptic regularity. We define the Banach space C k,α (Λ+ (ad E)) as the space of sections u of Λ+ (ad E) over S 3 × R satisfying uC k,α < ∞.
1416
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Consider the following map: Φ : HA1 × C 2,α Λ+ (ad E) → C 0,α Λ+ (ad E) ,
(a, φ) → F + A + a + dA∗ φ .
This is a smooth map between the Banach spaces. Since F + (A + a) = (a ∧ a)+ , + + F + A + a + dA∗ φ = (a ∧ a)+ + dA+ dA∗ φ + a ∧ dA∗ φ + dA∗ φ ∧ dA∗ φ .
(46)
The derivative of Φ with respect to the second variable φ at the origin (0, 0) is given by ∂2 Φ(0,0) = dA+ dA∗ =
1 ∗ ∇A ∇A + S/3 : C 2,α Λ+ (ad E) → C 0,α Λ+ (ad E) . 2
(47)
Here we have used the Weitzenböck formula (see (11)). Proposition 10.1. The map (∇A∗ ∇A + S/3) : C 2,α (Λ+ (ad E)) → C 0,α (Λ+ (ad E)) is isomorphic. Proof. The injectivity follows from the L∞ -estimate of Proposition 9.7. So the problem is the surjectivity. First we prove the following lemma. Lemma 10.2. Suppose that η ∈ C 0,α (Λ+ (ad E)) is compactly supported. Then there exists φ ∈ C 2,α (Λ+ (ad E)) satisfying (∇A∗ ∇A + S/3)φ = η and φC 2,α const · ηC 0,α . Proof. Set L21 := {ξ ∈ L2 (Λ+ (ad E)) | ∇A ξ ∈ L2 }. For ξ1 , ξ2 ∈ L21 , set (ξ1 , ξ2 )S/3 := (S/3)(ξ1 , ξ2 )L2 + (∇A ξ1 , ∇A ξ2 )L2 . Since S is a positive constant, this inner product defines a norm equivalent to the standard L21 -norm. η defines a bounded linear functional (·, η)L2 : L21 → R, ξ → (ξ, η)L2 . From the Riesz representation theorem, there uniquely exists φ ∈ L21 satisfying (ξ, φ)S/3 = (ξ, η)L2 for any ξ ∈ L21 . This implies that (∇A∗ ∇A + S/3)φ = η in the sense of distributions. Moreover we have φL2 constηL2 . From the elliptic regularity (see Gilbarg and 1
Trudinger [9, Chapter 9]) and the Sobolev embedding L21 → L4 , φL4 (Unλ ) constλ φL4 (U ) + ηL4 (U ) nλ nλ 2 constλ φL2 (U ) + ηL4 (U ) nλ 1 nλ constλ ηL2 + ηL4 . Here constλ are constants depending on λ = 1, 2, . . . , Λ. The important point is that they are independent of n ∈ Z. This is because we have the T Z-symmetry of the equation. From the Sobolev embedding L42 → L∞ , we have φL∞ const · sup φL4 (Unλ ) const ηL2 + ηL4 < ∞. n,λ
2
Using the Schauder interior estimate (see Gilbarg and Trudinger [9, Chapter 6]), we get φC 2,α (U¯ nλ ) constλ φL∞ + ηC 0,α (U¯ ) . nλ
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1417
From Proposition 9.7, we get φL∞ (24/S)ηL∞ . It is easy to see that sup ηC 0,α (U¯ ) constηC 0,α .
(48)
nλ
n,λ
(Recall ηC 0,α = supn,λ ηC 0,α (U¯ nλ ) .) Hence φC 2,α const(ηL∞ + ηC 0,α ) constηC 0,α . 2 Let η ∈ C 0,α (Λ+ (ad E)) (not necessarily compactly supported). Let ϕk (k = 1, 2, . . .) be cut-off functions such that 0 ϕk 1, ϕk = 1 over |t| k and ϕk = 0 over |t| k + 1. Set ηk := ϕk η. From the above Lemma 10.2, there exists φk ∈ C 2,α (Λ+ (ad E)) satisfying (∇A∗ ∇A + S/3)φk = ηk . From the L∞ -estimate (Proposition 9.7), we get φk L∞ (24/S)ηk L∞ (24/S)ηL∞ . From the Schauder interior estimate, we get
) + ηk 0,α ¯ φk C 2,α (U¯ nλ ) constλ · φk L∞ (Unλ C (U ) const ηL∞ + ηk C 0,α (U¯ ) . nλ
nλ
for k 1. Hence φ We have ηk = η over each Unλ k C 2,α (U¯ nλ ) (k 1) is bounded for each (n, λ). Therefore, if we take a subsequence, φk converges to a C 2 -section φ of Λ+ (ad E) in the C 2 -topology over every compact subset. φ satisfies (∇A∗ ∇A + S/3)φ = η and φL∞ (24/S)ηL∞ . The Schauder interior estimate gives
φC 2,α (U¯ nλ ) constλ φL∞ + ηC 0,α (U¯ ) . nλ
By (48), we get φC 2,α constηC 0,α < ∞.
2
Since the map (47) is isomorphic, the implicit function theorem implies that there exist δ2 > 0 and δ3 > 0 such that for any a ∈ HA1 with aL∞ δ2 there uniquely exists φa ∈ C 2,α (Λ+ (ad E)) with φa C 2,α δ3 satisfying F + (A + a + dA∗ φa ) = 0, i.e., + + dA+ dA∗ φa + a ∧ dA∗ φa + dA∗ φa ∧ dA∗ φa = −(a ∧ a)+ .
(49)
Here the “uniqueness” means that if φ ∈ C 2,α (Λ+ (ad E)) with φC 2,α δ3 satisfies F + (A + a + dA∗ φ) = 0 then φ = φa . From the elliptic regularity, φa is smooth. We have φ0 = 0 and φa C 2,α constaL∞ ,
φa − φb C 2,α consta − bL∞ ,
(50)
for any a, b ∈ HA1 with aL∞ , bL∞ δ2 . The map a → φa is T -equivariant, i.e., φT ∗ a = T ∗ φa where T : S 3 × R → S 3 × R, (θ, t) → (θ, t + T ). We have F (A + a + dA∗ φa ) = F (A + a) + dA dA∗ φa + [a ∧ dA∗ φa ] + dA∗ φa ∧ dA∗ φa . From (45), if we choose δ2 > 0 sufficiently small, F A + a + d ∗ φa A
L∞
F (A)L∞ + const · δ2 d.
(51)
1418
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Moreover we can choose δ2 > 0 so that, for any a ∈ HA1 with aL∞ δ2 , a + d ∗ φa A
L∞
const · δ2 ε2 ,
(52)
where ε2 is the positive constant introduced in Proposition 9.6. Lemma 10.3. We can take the above constant δ2 > 0 sufficiently small so that, if a, b ∈ HA1 with aL∞ , bL∞ δ2 satisfy a + dA∗ φa = b + dA∗ φb , then a = b. Proof. By (49), 1 ∗ ∇A ∇A + S/3 (φa − φb ) 2 = dA+ dA∗ (φa − φb ) + + + + + (b − a) ∧ dA∗ φa = b ∧ (b − a) + (b − a) ∧ a + b ∧ dA∗ φb − dA∗ φa + ∗ + + dA∗ φb ∧ dA∗ φb − dA∗ φa + dA φb − dA∗ φa ∧ dA∗ φa . (53) Its C 0,α -norm is bounded by const aC 0,α + bC 0,α + dA∗ φa C 0,α a − bC 0,α + const bC 0,α + dA∗ φa C 0,α + dA∗ φb C 0,α dA∗ φa − dA∗ φb C 0,α . From (50), this is bounded by const · δ2 a − bL∞ . Then Proposition 10.1 implies φa − φb C 2,α const · δ2 a − bL∞ . Hence, if a + dA∗ φa = b + dA∗ φb then a − bL∞ = dA∗ φa − dA∗ φb L∞ const · δ2 a − bL∞ . If δ2 is sufficiently small, then this implies a = b.
2
For r > 0, we set Br (HA1 ) := {a ∈ HA1 | aL∞ r}. Lemma 10.4. Let {an }n1 ⊂ Bδ2 (HA1 ) and suppose that this sequence converges to a ∈ Bδ2 (HA1 ) in the topology of uniform convergence over compact subsets, i.e., for any compact set K ⊂ S 3 × R, an − aL∞ (K) → 0 as n → ∞. Then dA∗ φan converges to dA∗ φa in the C ∞ -topology over every compact subset in S 3 × R. Proof. It is enough to prove that there exists a subsequence (also denoted by {an }) such that dA∗ φan converges to dA∗ φa in the topology of C ∞ -convergence over compact subsets in S 3 × R. From the elliptic regularity, an converges to a in the C ∞ -topology over every compact subset. Hence, for each k 0 and each compact subset K in X, the C k -norms of φan over K (n 1) are bounded by Eq. (49) and φan C 2,α δ3 . Then a subsequence of φan converges to some φ in
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1419
the C ∞ -topology over every compact subset. We have φC 2,α δ3 and F + (A + a + dA∗ φ) = 0. Then the uniqueness of φa implies φ = φa . 2 Consider the following map (cf. the description of Md in Remark 1.3): Bδ2 HA1 → Md ,
a → E, A + a + dA∗ φa .
(54)
Note that we have |F (A+a +dA∗ φa )| d (see (51)), and hence this map is well defined. Bδ2 (HA1 ) is equipped with the topology of uniform convergence over compact subsets. (Bδ2 (HA1 ) becomes compact and metrizable.) The map (54) is continuous by Lemma 10.4. T Z naturally acts on Bδ2 (HA1 ), and the map (54) is T Z-equivariant. (Md is equipped with the action of T Z induced by the action of R.) Lemma 10.5. The map (54) is injective for sufficiently small δ2 > 0. Proof. Let a, b ∈ Bδ2 (HA1 ), and suppose that there exists a gauge transformation g : E → E satisfying g(A + a + dA∗ φa ) = A + b + dA∗ φb . We have dA∗ (a + dA∗ φa ) = dA∗ (b + dA∗ φb ) = 0 and a + dA∗ φa L∞ , b + dA∗ φb L∞ ε2 (see (52)). Then Proposition 9.6 implies a + dA∗ φa = b + dA∗ φb . Then we have a = b by Lemma 10.3. 2 Therefore the map (54) becomes a T Z-equivariant topological embedding. Hence dim[E,A] (Md : T Z) dim0 Bδ2 HA1 : T Z .
(55)
The right-hand side is the local mean dimension of (Bδ2 (HA1 ), T Z) at the origin. We define a distance on Bδ2 (HA1 ) by dist(a, b) :=
2−n a − bL∞ (|t|(n+1)T )
a, b ∈ Bδ2 HA1 .
n0
Set Ωn := {0, T , 2T , . . . , (n − 1)T } ⊂ T Z (n 1). {Ωn }n1 is an amenable sequence in T Z. For a, b ∈ Bδ2 (HA1 ), distΩn (a, b) a − bL∞ (0tnT ) .
(56)
For each n 1, let πn : S 3 × (R/nT Z) → S 3 × (R/T Z) be the natural n-fold covering, and set En := πn∗ (E) and An := πn∗ (A). We define HA1 n as the space of a ∈ Ω 1 (ad En ) over S 3 × (R/nT Z) satisfying (dA+n + dA∗ n )a = 0. We can identify HA1 n with the subspace of HA1 consisting of nT -invariant elements. The index formula gives dim HA1 n = 8nc2 (E). (We have HA0 n = HA2 n = 0.) From (56), for a, b ∈ Bδ2 (HA1 n ) := {u ∈ HA1 n | uL∞ (X) δ2 } distΩn (a, b) a − bL∞ (X) .
(57)
Let 0 < r < δ2 . Since distT Z (a, b) 2a − bL∞ , we have Br/2 (HA1 ) ⊂ Br (0; Bδ2 (HA1 ))T Z . Here Br (0; Bδ2 (HA1 ))T Z is the closed r-ball centered at 0 in Bδ2 (HA1 ) with respect to the distance distT Z (·,·). From (57) and Lemma 2.1, for ε < r/2
1420
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Widimε Br 0; Bδ2 HA1 T Z , distΩn Widimε Br/2 HA1 , distΩn Widimε Br/2 HA1 n , · L∞ = dim HA1 n = 8nc2 (E). Hence, for ε < r/2, Widimε Br 0; Bδ2 HA1 T Z ⊂ Bδ2 HA1 : T Z
1 lim sup Widimε Br 0; Bδ2 HA1 T Z , distΩn 8c2 (E). n n→∞ Let ε → 0. Then dim Br 0; Bδ2 HA1 T Z ⊂ Bδ2 HA1 : T Z 8c2 (E). Let r → 0. We get dim0 (Bδ2 (HA1 ) : T Z) 8c2 (E). From (55) and Proposition 2.11, dim[E,A] (Md : R) = dim[E,A] (Md : T Z)/T 8c2 (E)/T = 8ρ(A). Therefore we get the conclusion: Theorem 10.6. If A is a periodic ASD connection on E satisfying F (A)L∞ (X) < d, then dim[A] (Md : R) = 8ρ(A). Proof. The upper bound dim[A] (Md : R) 8ρ(A) was already proved in Section 8.2. If A is not flat, then the above argument shows that we also have the lower bound dim[A] (Md : R) 8ρ(A). If A is flat, then dim[A] (Md : R) 0 = 8ρ(A). Hence dim[A] (Md : R) = 8ρ(A). 2 We have completed all the proofs of Theorems 1.1 and 1.2. Acknowledgments The authors wish to thank Professors Kenji Nakanishi and Yoshio Tsutsumi. When the authors studied the lower bound on the local mean dimension, they gave the authors helpful advice. Their advice was very useful especially for preparing the arguments in Section 9. The authors also wish to thank Professors Kenji Fukaya and Mikio Furuta for their encouragement. Appendix A. Green kernel In this appendix, we prepare some basic facts on a Green kernel over S 3 × R. Let a > 0 be a positive constant. Some constants introduced in this appendix depend on a, but we don’t explicitly write their dependence on a for simplicity of the explanation. In the main body of the paper we have a = S/3 (S is the scalar curvature of S 3 × R), and its value is fixed throughout the argument. Hence we don’t need to care about the dependence on a = S/3.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1421
A.1. ( + a) on functions Let := ∇ ∗ ∇ be the Laplacian on functions over S 3 × R. (Notice that the sign convention of our Laplacian = ∇ ∗ ∇ is “geometric”. For example, we have = − 4i=1 ∂ 2 /∂xi2 on the Euclidean space R4 .) Let g(x, y) be the Green kernel of + a; (y + a)g(x, y) = δx (y). This equation means that g(x, y)(y + a)φ(y) dvol(y),
φ(x) = S 3 ×R
for compactly supported smooth functions φ. The existence of g(x, y) is essentially standard [2, Chapter 4]. We briefly explain how to construct it. We fix x ∈ S 3 × R and construct a function gx (y) satisfying ( + a)gx = δx . As in [2, Chapter 4, Section 2], by using a local coordinate around x, we can construct (by hand) a compactly supported function g0,x (y) satisfying ( + a)g0,x = δx − g1,x , where g1,x is a compactly supported continuous function. Moreover g0,x is smooth outside {x} and it satisfies const1 /d(x, y)2 g0,x (y) const2 /d(x, y)2 , for some positive constants const1 and const2 in some small neighborhood of x. Here d(x, y) is the distance between x and y. Since ( + a) : L22 → L2 is isomorphic, there exists g2,x ∈ L22 satisfying ( + a)g2,x = g1,x . (g2,x is of class C 1 .) Then gx := g0,x + g2,x satisfies ( + a)gx = δx , and g(x, y) := gx (y) becomes the Green kernel. g(x, y) is smooth outside the diagonal. Since S 3 × R = SU(2) × R is a Lie group and its Riemannian metric is two-sided invariant, we have g(x, y) = g(zx, zy) = g(xz, yz) for x, y, z ∈ S 3 × R. g(x, y) satisfies c1 /d(x, y)2 g(x, y) c2 /d(x, y)2
d(x, y) δ ,
(58)
for some positive constants c1 , c2 , δ. Lemma A.1. g(x, y) > 0 for x = y. Proof. Fix x = (θ0 , t0 ) ∈ S 3 × R. We have ( + a)gx = 0 outside {x}, and hence (by elliptic regularity) gx (θ, t) constgx
L2 (S 3 ×[t−1,t+1])
|t − t0 | > 1 .
Since the right-hand side goes to zero as |t| → ∞, gx vanishes at infinity. Let R > 0 be a large positive number and set Ω := S 3 × [−R, R] \ Bδ (x). (δ is a positive constant in (58).) Since gx (y) c1 /d(x, y)2 > 0 on ∂Bδ (x), we have gx − supt=±R |gx (θ, t)| on ∂Ω. Since ( +
1422
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
a)gx = 0 on Ω, we can apply the weak maximum (minimum) principle to gx (Gilbarg and Trudinger [9, Chapter 3, Section 1]) and get gx (y) − sup gx (θ, t) (y ∈ Ω). t=±R
The right-hand side goes to zero as R → ∞. Hence we have gx (y) 0 for y = x. Since gx is not constant, the strong maximum principle [9, Chapter 3, Section 2] implies that gx cannot achieve zero. Therefore gx (y) > 0 for y = x. 2 Lemma A.2. There exists c3 > 0 such that √
0 < g(x, y) c3 e−
ad(x,y)
d(x, y) 1 .
In particular, g(x, y) dvol(y) < ∞. S 3 ×R
The value of this integral is independent of x ∈ S 3 × R because of the symmetry of g(x, y). Proof. We fix x0 = (θ0 , 0) ∈ S 3 × R. Since S 3 × R is homogeneous, it is enough to show that gx0 (y) = g(x0 , y) satisfies √
gx0 (y) const · e−
a|t|
y = (θ, t) ∈ S 3 × R and |t| 1 . √
Let C := sup|t|=1 gx0 (θ, t) > 0, and set u := Ce a(1−|t|) − gx0 (y) (|t| 1). We have u 0 at t = ±1 and ( + a)u = 0 (|t| 1). u goes to zero at infinity. (See the proof of Lemma A.1.) Hence we can apply the weak minimum principle (see the proof of Lemma A.1) to u and get √ u 0 for |t| 1. Thus gx0 (y) Ce a(1−|t|) (|t| 1). 2 The following technical lemma will be used in the next subsection. Lemma A.3. Let f be a smooth function over S 3 × R. Suppose that there exist non-negative functions f1 , f2 ∈ L2 , f3 ∈ L1 and f4 , f5 , f6 ∈ L∞ such that |f | f1 + f4 , |∇f | f2 + f5 and |f + af | f3 + f6 . Then we have f (x) =
g(x, y)(y + a)f (y) dvol(y).
S 3 ×R
Proof. We fix x ∈ S 3 × R. Let ρn (n 1) be cut-off functions satisfying 0 ρn 1, ρn = 1 over |t| n and ρn = 0 over |t| n + 1. Moreover |∇ρn |, |ρn | const (independent of n 1). Set fn := ρn f . We have
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1423
fn (x) =
g(x, y)(y + a)fn (y) dvol(y),
( + a)fn = ρn · f − 2∇ρn , ∇f + ρn ( + a)f. Note that gx (y) = g(x, y) is smooth outside {x} and exponentially decreases as y goes to infinity. Hence for n 1,
gx |ρn · f | dvol C
f12 dvol + C
supp(dρn )
gx f4 dvol(y).
supp(dρn )
Since supp(dρn ) ⊂ {t ∈ [−n − 1, −n] ∪ [n, n + 1]} and f1 ∈ L2 and f4 ∈ L∞ , the right-hand side goes to zero as n → ∞. In the same way, we get
gx ∇ρn , ∇f dvol → 0 (n → ∞).
We have gx |ρn ( + a)f | gx |f + af |, and
gx (y)|f + af | dvol
gx (y)|f + af | dvol +
sup gx (y) d(x,y)>1
d(x,y)1
+
f3 dvol
d(x,y)>1
gx f6 dvol < ∞.
d(x,y)>1
Hence Lebesgue’s theorem implies
lim
n→∞
gx ρn ( + a)f dvol =
gx ( + a)f dvol.
Therefore we get f (x) =
gx ( + a)f dvol.
2
A.2. (∇ ∗ ∇ + a) on sections Let E be a real vector bundle over S 3 × R with a fiberwise metric and a connection ∇ compatible with the metric. Lemma A.4. Let φ be a smooth section of E such that φL2 , ∇φL2 and ∇ ∗ ∇φ + aφL∞ are finite. Then φ satisfies φ(x)
S 3 ×R
g(x, y)∇ ∗ ∇φ(y) + aφ(y) dvol(y).
1424
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Proof. The following argument is essentially due to Donaldson [5, p. 184]. Let R be the product line bundle over S 3 × R with the product metric and the product connection. Set φn := (φ, 1/n) (a section of E ⊕ R). Then |φn | 1/n and hence φn = 0 at all points. We want to apply Lemma A.3 to |φn |. |φn | |φ| + 1/n where |φ| ∈ L2 and 1/n ∈ L∞ . ∇φn = (∇φ, 0) and ∇ ∗ ∇φn = (∇ ∗ ∇φ, 0). We have the Kato inequality |∇|φn || |∇φn |. Hence ∇|φn | ∈ L2 . From |φn |2 /2 = (∇ ∗ ∇φn , φn ) − |∇φn |2 , |∇φn |2 − |∇|φn ||2 . ( + a)|φn | = ∇ ∗ ∇φn + aφn , φn /|φn | − |φn |
(59)
Hence (by using |φn | 1/n and |∇|φn || |∇φn |) ( + a)|φn | ∇ ∗ ∇φn + aφn + n|∇φn |2 ∇ ∗ ∇φ + aφ + a/n + n|∇φ|2 . |∇ ∗ ∇φ + aφ| + a/n ∈ L∞ and n|∇φ|2 ∈ L1 . Therefore we can apply Lemma A.3 to |φn | and get φn (x) = g(x, y)(y + a)φn (y) dvol(y). From (59) and the Kato inequality |∇|φn || |∇φn |, (y + a)φn (y) ∇ ∗ ∇φn + aφn ∇ ∗ ∇φ + aφ + a/n. Thus φn (x)
a g(x, y)∇ ∗ ∇φ(y) + aφ(y) dvol(y) + n
Let n → ∞. Then we get the desired bound.
g(x, y) dvol(y).
2
Proposition A.5. Let φ be a section of E of class C 2 , and suppose that φ and η := (∇ ∗ ∇ + a)φ are contained in L∞ . Then φL∞ (8/a)ηL∞ . Proof. There exists a point (θ1 , t1 ) ∈ S 3 × R where |φ(θ1 , t1 )| φL∞ /2. We have |φ|2 = 2 ∇ ∗ ∇φ, φ − 2|∇φ|2 = 2(η, φ) − 2a|φ|2 − 2|∇φ|2 . Set M := φL∞ ηL∞ . Then ( + 2a)|φ|2 2(η, φ) 2M. √ √ Define a function f on S 3 × R by f (θ, t) := (2M/a) cosh a(t − t1 ) = (M/a)(e a(t−t1 ) + √ e a(−t+t1 ) ). Then ( + a)f = 0, and hence ( + 2a)f = af 2M. Therefore
( + 2a) f − |φ|2 0.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1425
Since |φ| is bounded and f goes to +∞ at infinity, we have f − |φ|2 > 0 for |t| 1. Then the weak minimum principle [9, Chapter 3, Section 1] implies f (θ1 , t1 ) − |φ(θ1 , t1 )|2 0. This means that φ2L∞ /4 |φ(θ1 , t1 )|2 (2M/a) = (2/a)φL∞ ηL∞ . Thus φL∞ (8/a)ηL∞ . 2 Lemma A.6. Let η be a compactly supported smooth section of E. Then there exists a smooth section φ of E satisfying (∇ ∗ ∇ + a)φ = η and φ(x)
g(x, y)η(y) dvol(y).
S 3 ×R
Proof. Set L21 (E) := {ξ ∈ L2 (E) | ∇ξ ∈ L2 } and (ξ1 , ξ2 )a := (∇ξ1 , ∇ξ2 )L2 + a(ξ1 , ξ2 )L2 for ξ1 , ξ2 ∈ L21 (E). (Since a > 0, this inner product defines a norm equivalent to the standard L21 norm.) η defines the bounded functional (·, η)L2 : L21 (E) → R,
ξ → (ξ, η)L2 .
From the Riesz representation theorem, there uniquely exists φ ∈ L21 (E) satisfying (ξ, φ)a = (ξ, η)L2 for any ξ ∈ L21 (E). Then we have (∇ ∗ ∇ + a)φ = η in the sense of distribution. From the elliptic regularity, φ is smooth. φ and ∇φ are in L2 , and (∇ ∗ ∇ + a)φ = η is in L∞ . Hence we can apply Lemma A.4 to φ and get φ(x)
g(x, y)∇ ∗ ∇φ(y) + aφ(y) dvol(y) =
g(x, y)η(y) dvol(y).
2
Proposition A.7. Let η be a smooth section of E satisfying ηL∞ < ∞. Then there exists a smooth section φ of E satisfying (∇ ∗ ∇ + a)φ = η and φ(x)
g(x, y)η(y) dvol(y).
(60)
S 3 ×R
(Hence φ is in L∞ .) In particular, if η vanishes at infinity, then φ also vanishes at infinity. Moreover, if a smooth section φ ∈ L∞ (E) satisfies (∇ ∗ ∇ + a)φ = η (η does not necessarily vanishes at infinity), then φ = φ. Proof. Let ρn (n 1) be the cut-off functions introduced in the proof of Lemma A.3, and set ηn := ρn η. From Lemma A.6, there exists a smooth section φn satisfying (∇ ∗ ∇ + a)φn = ηn and φn (x)
g(x, y)ηn (y) dvol(y)
g(x, y)η(y) dvol(y).
(61)
Hence {φn }n1 is uniformly bounded. Then by using the Schauder interior estimate [9, Chapter 6], for any compact set K ⊂ S 3 × R, the C 2,α -norms of φn over K are bounded (0 < α < 1). Hence there exists a subsequence {φnk }k1 and a section φ of E such that φnk → φ in the C 2 topology over every compact subset in S 3 × R. Then φ satisfies (∇ ∗ ∇ + a)φ = η. φ is smooth by the elliptic regularity, and it satisfies (60) from (61).
1426
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
Suppose η vanishes at infinity. Set K := g(x, y) dvol(y) < ∞ (independent of x). For any ε > 0, there exists a compact set Ω1 ⊂ S 3 × R such that |η| ε/(2K) on the complement of Ω1 . There exists a compact set Ω2 ⊃ Ω1 such that for any x ∈ / Ω2 ηL∞
g(x, y) dvol(y) ε/2. Ω1
Then from (60), for x ∈ / Ω2 , φ(x)
Ω1
g(x, y)η(y) dvol(y) +
g(x, y)η(y) dvol(y) ε/2 + ε/2 = ε.
Ω1c
This shows that φ vanishes at infinity. Suppose that smooth φ ∈ L∞ (E) satisfies (∇ ∗ ∇ +a)φ = η. We have (∇ ∗ ∇ +a)(φ −φ ) = 0, and φ − φ is contained in L∞ . Then the L∞ -estimate in Proposition A.5 implies φ − φ = 0. 2 References [1] M.F. Atiyah, N.J. Hitchin, I.M. Singer, Self-duality in four-dimensional Riemannian geometry, Proc. R. Soc. Lond. Ser. A 362 (1978) 425–461. [2] T. Aubin, Nonlinear Analysis on Manifolds. Monge–Ampère Equations, Grundlehren Math. Wiss., vol. 252, Springer-Verlag, New York, 1982. [3] R. Brody, Compact manifolds and hyperbolicity, Trans. Amer. Math. Soc. 235 (1978) 213–219. [4] S.K. Donaldson, An application of gauge theory to four dimensional topology, J. Differential Geom. 18 (1983) 279–315. [5] S.K. Donaldson, The approximation of instantons, Geom. Funct. Anal. 3 (1993) 179–200. [6] S.K. Donaldson, Floer Homology Groups in Yang–Mills Theory, with the assistance of M. Furuta and D. Kotschick, Cambridge University Press, Cambridge, 2002. [7] S.K. Donaldson, P.B. Kronheimer, The Geometry of Four-Manifolds, Oxford University Press, New York, 1990. [8] D.S. Freed, K.K. Uhlenbeck, Instantons and Four-Manifolds, second ed., Springer-Verlag, New York, 1991. [9] D. Gilbarg, N.S. Trudinger, Elliptic Partial Differential Equations of Second Order, reprint of the 1998 edition, Classics Math., Springer-Verlag, Berlin, 2001. [10] A. Gournay, Dimension moyenne et espaces d’applications pseudo-holomorphes, thesis, Département de Mathématiques d’Orsay, 2008. [11] A. Gournay, On a Hölder covariant version of mean dimension, C. R. Acad. Sci. Paris 347 (2009) 1389–1392. [12] A. Gournay, Widths of l p balls, Houston J. Math., in press, arXiv:0711.3081. [13] A. Gournay, A metric approach to von Neumann dimension, Discrete Contin. Dyn. Syst. 26 (2010) 967–987. [14] M. Gromov, Topological invariants of dynamical systems and spaces of holomorphic maps: I, Math. Phys. Anal. Geom. 2 (1999) 323–415. [15] E. Lindenstrauss, Mean dimension, small entropy factors and an embedding theorem, Inst. Hautes Études Sci. Publ. Math. 89 (1999) 227–262. [16] E. Lindenstrauss, B. Weiss, Mean topological dimension, Israel J. Math. 115 (2000) 1–24. [17] S. Matsuo, The Runge theorem for instantons, PhD thesis, University of Tokyo, 2010. [18] C.H. Taubes, Self-dual Yang–Mills connections on non-self-dual 4-manifolds, J. Differential Geom. 17 (1982) 139– 170. [19] C.H. Taubes, Path-connected Yang–Mills moduli spaces, J. Differential Geom. 19 (1984) 337–392. [20] C.H. Taubes, Unique continuation theorems in gauge theories, Comm. Anal. Geom. 2 (1994) 35–52. [21] M. Tsukamoto, Gluing an infinite number of instantons, Nagoya Math. J. 188 (2007) 107–131. [22] M. Tsukamoto, Gauge theory on infinite connected sum and mean dimension, Math. Phys. Anal. Geom. 12 (2009) 325–380.
S. Matsuo, M. Tsukamoto / Journal of Functional Analysis 260 (2011) 1369–1427
1427
[23] M. Tsukamoto, Deformation of Brody curves and mean dimension, Ergodic Theory Dynam. Systems 29 (2009) 1641–1657. [24] K.K. Uhlenbeck, Connections with Lp bounds on curvature, Comm. Math. Phys. 83 (1982) 31–42. [25] K. Wehrheim, Uhlenbeck Compactness, EMS Ser. Lect. Math., European Mathematical Society, Zürich, 2004.
Journal of Functional Analysis 260 (2011) 1428–1445 www.elsevier.com/locate/jfa
On the Cauchy problem for the periodic generalized Degasperis–Procesi equation Xinglong Wu Department of Mathematics, Sun Yat-sen University, 510275 Guangzhou, China Received 26 May 2010; accepted 15 October 2010 Available online 19 November 2010 Communicated by H. Brezis
Abstract We mainly study the Cauchy problem of the periodic generalized Degasperis–Procesi equation. First, we establish the local well-posedness for the equation. Second, we give the precise blow-up scenario, a conservation law and prove that the equation has smooth solutions which blow up in finite time. Finally, we investigate the blow-up rate for the blow-up solutions. © 2010 Elsevier Inc. All rights reserved. Keywords: The periodic generalized Degasperis–Procesi equation; Well-posedness; Blow-up scenario; Blow-up phenomena; Conservation law; Blow-up rate
1. Introduction In this paper, we consider the Cauchy problem for the periodic generalized Degasperis– Procesi equation: ⎧ ⎪ u − utxx + 4f (u)ux = 3f (u)ux uxx + f (u)u3x + f (u)uxxx , ⎪ ⎪ t ⎨ t > 0, x ∈ R, ⎪ u(0, x) = u (x), x ∈ R, ⎪ 0 ⎪ ⎩ u(t, x) = u(t, x + 1), t > 0, x ∈ R, where f : R → R is a given C m -function, m > 3. E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.014
(1.1)
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
For f (u) =
u2 2
1429
Eq. (1.1) becomes the periodic Degasperis–Procesi equation [20]: ⎧ ⎨ ut − utxx + 4uux = 3ux uxx + uuxxx , t > 0, x ∈ R, u(0, x) = u0 (x), x ∈ R, ⎩ u(t, x) = u(t, x + 1), t > 0, x ∈ R.
(1.2)
Degasperis, Holm and Hone [20,21] proved the formal integrability of Eq. (1.2) by constructing a Lax pair. They also showed that it has bi-Hamiltonian structure and an infinite sequence of conserved quantities, and admits exact peakon solutions which are analogous to the Camassa– Holm peakons [2–5,9,18,19]. The Degasperis–Procesi equation can be regarded as a model for nonlinear shallow water dynamics and its asymptotic accuracy is the same as that for the Camassa–Holm shallow water equation [1,6,11,14–16,27,32]. Dullin, Gottwald and Holm [22] showed that the Degasperis– Procesi equation can be obtained from the shallow water elevation equation by an appropriate Kodama transformation. Vakhnenko and Parkes [34] investigated the traveling wave solutions of Eq. (1.2) and Holm and Staley [26] studied the stability of solitons and peakons [35] numerically. Lundmark and Szmigielski [30] also presented an inverse scattering approach for computing npeakon solutions to Eq. (1.2). After the Degasperis–Procesi equation was derived, many results were obtained [23,24,29]. Such as, Yin proved local well-posedness of Eq. (1.2) with initial data u0 ∈ H s (R), s > 32 on the line [37] and on the circle [38]. In these two papers the precise blow-up scenario and a blowup result were derived. The global existence of strong solutions and global weak solutions to Eq. (1.2) are also investigated in [39,40]. Recently, Lenells [28] classified all weak traveling wave solutions. Matsuno [31] studied multisoliton solutions and their peakon limits. Analogous to the case of the Camassa–Holm equation [10], Henry [25] and Mustafa [33] showed that smooth solutions to Eq. (1.2) have infinite speed of propagation. Coclite and Karlsen [7] also obtained global existence results for entropy weak solutions belonging to the class L1 (R) ∩ BV (R) and the class L2 (R) ∩ L4 (R). The Cauchy problem for the generalized Degasperis–Procesi equation has been studied in [36]. However, the periodic generalized Degasperis–Procesi equation has not been discussed yet. The aim of this paper is to establish the local well-posedness of Eq. (1.1), to give the precise blow-up scenario, an important conservation law and to show that Eq. (1.1) has blow-up solutions, provided their initial data satisfy certain conditions. While the local well-posedness results in Section 2 are similar to the corresponding results on the line [36], some blow-up results in Section 3 use the periodicity property in an essential way [8,12,17,24]. The paper is organized as follows. In Section 2, we establish local well-posedness of Eq. (1.1). In Section 3, we derive a precise blow-up scenario and present several blow-up results of strong solutions to Eq. (1.1). In Section 4, we investigate the blow-up rate for the blow-up solutions of Eq. (1.1). 2. Local well-posedness In the section, we will apply Kato’s theory to establish the local well-posedness for the Cauchy problem of Eq. (1.1) in H s (S), s > 32 with S = R/Z (the circle of unite length). First, we introduce some notations. If A is an unbounded operator, D(A) denotes the domain of the operator A, [A, B] = AB − BA denotes the commutator of the linear operators A and B, · X denotes the norm of the Banach space X. For convenience, let · s and (·,·)s denote the
1430
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
norm and inner product of H s (S), s ∈ R, respectively. Let X and Y be Hilbert spaces such that Y is continuity and densely embedded in X and let Q : Y → X be a topological isomorphism. L(Y, X) denotes the space of all bounded linear operators from Y to X (L(X), if X = Y ). Note that Eq. (1.1), analogous to the case of the Degasperis–Procesi equation, can be written in Hamiltonian form and has the invariants E1 (u) :=
u3 dx,
S
E2 (u) :=
y dx,
S
E3 (u) :=
yv dx, S
where we set y(t, x) := u − uxx , v(t, x) := (4 − ∂x2 )−1 u. By computation, Eq. (1.1) takes the form of a quasi-linear evolution equation of hyperbolic type: ⎧ ⎪ yt + f (u)y x + 2f (u)ux y = 3f (u)uux + f (u)u3x − 3f (u)ux , ⎪ ⎪ ⎨ t > 0, x ∈ R, ⎪ y(0, x) = u0 (x) − uxx (0, x), x ∈ R, ⎪ ⎪ ⎩ y(t, x) = y(t, x + 1), t 0, x ∈ R. Note that if G(x) := (1 − ∂x2 )−1 f
cosh(x−[x]− 12 ) , 2 sinh( 12 )
(2.1)
where [x] stands for the integer part of x ∈ R, then we have
= G ∗ f for all the f ∈ L2 (S) and G ∗ y = u. Here we denote by ∗ the convolution. Then we can rewrite Eq. (2.1) as follows:
⎧ ⎨ ut + f (u)ux + ∂x G ∗ 3f (u) = 0, u(0, x) = u0 (x), ⎩ u(t, x) = u(t, x + 1),
t > 0, x ∈ R, x ∈ R, t 0, x ∈ R.
(2.2)
Or in the equivalent form: ⎧
−1
⎪ 3f (u) , ⎨ ut + f (u)ux = −∂x 1 − ∂x2 u(0, x) = u0 (x), ⎪ ⎩ u(t, x) = u(t, x + 1),
t > 0, x ∈ R, x ∈ R, t 0, x ∈ R.
(2.3)
Theorem 2.1. Assume that f ∈ C m (R, R), m > 3. Given u0 ∈ H s (S), 32 < s m, there exists a unique solution u(t, x) to Eq. (1.1) (or Eq. (2.3)), and a T = T (f, u0 s ) such that
u = u(·, u0 ) ∈ C [0, T ); H s (S) ∩ C 1 [0, T ); H s−1 (S) . Moreover, the solution depends continuously on the initial data, i.e. the mapping u0 → u(·, u0 ) : H s (S) → C([0, T ); H s (S)) ∩ C 1 ([0, T ); H s−1 (S)) is continuous. If T < ∞, then lim supt↑T u(t, ·)s = ∞.
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1431
Proof. For u ∈ H r (S), 32 < r < m, we define the operator A(u) = f (u)∂x . Analogous to Lemma 2.6, [36], we have that A(u) is quasi-m-accretive, uniformly on bounded sets in H r−1 (S). One can also check that A(u) ∈ L(H r (S), H r−1 (S)). Moreover,
A(y) − A(z) w a1 y − zr−1 wr , y, z, w ∈ H r (S). r−1 1
Set B(u) = [Λ, f (u)∂x ]Λ−1 , Λ = (1 − ∂x ) 2 . Analogous to Lemma 2.8 [36], we find that B(u) ∈ L(H r−1 (S)) and
B(y) − B(z) w a2 y − zr wr−1 , y, z ∈ H r (S), w ∈ H r−1 (S). r−1 Introduce g = −∂x (1 − ∂x2 )−1 (3f (u)), X = H r−1 (S), Y = H r (S) as in Lemma 2.9 from [36], g is bounded on bounded sets in H r (S), and satisfies g(y) − g(z) a3 y − zr , y, z ∈ H r (S), r g(y) − g(z) a4 y − zr−1 , y, z ∈ H r (S). r−1 1
Set Y = H r (S), X = H r−1 (S), and Q = (1−∂x2 ) 2 . Obviously, Q is an isomorphism of Y onto X. Applying Kato’s theory for abstract quasi-linear evolution equation of hyperbolic type, we can obtain the local well-posedness of Eq. (1.1) (or Eq. (2.4)) in H r (S), 32 < r m, then the solution u(t, x) belongs to
C [0, T ); H r (S) ∩ C 1 [0, T ); H r−1 (S) . This completes the proof of Theorem 2.1.
2
Theorem 2.2. Assume that f ∈ C m (R, R), m > 4. Let u0 ∈ H s (S), 32 < s m − 2. Then T in Theorem 2.1 may be chosen independent of s in the following sense. If u = u(·, u0 ) ∈ C([0, T ); H s (S)) ∩ C 1 ([0, T ); H s−1 (S)) is a solution to Eq. (1.1) (or Eq. (2.4)), and if u0 ∈ s1 −1 (S)) H s1 (S) for some s1 = s, 32 < s1 m, then u ∈ C([0, T ); H s1 (S)) ∩ C 1 ([0, T ); H ∞ ∞ s and with the same T . In particular, if f ∈ C (R, R) and u0 ∈ H (S) = s0 H (S), then u ∈ C([0, T ); H ∞ (S)). Proof. Since the proof of Theorem 2.2 is similar to the one of Theorem 2.3 of [36], we omit it here. 2 3. Blow-up phenomena First, by using the local well-posedness result of Section 2 and the energy method, one can get the following precise blow-up scenario of strong solutions to Eq. (2.2). The proofs are similar to that in [36], we omit the proof of Lemma 3.1, Lemma 3.2 and Lemma 3.5. Lemma 3.1. Let f ∈ C m (R, R), m > 4 and u0 ∈ H r (S), 32 < r m. Then the solution u(t, x) of Eq. (1.1) blows up in finite T < ∞ if and only if
lim u(t, x)L∞ (S) + ux (t, x)L∞ (S) = ∞. t↑T
1432
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
Considering the following differential equation:
qt = f u(t, q) , t > 0, x ∈ R, q(0, x) = x, x ∈ R.
(3.1)
Applying classical results in the theory of ordinary differential equations, one can obtain the following useful result on the above initial value problem. Lemma 3.2. Let u0 ∈ H s (S), s 3, and T be the maximal existence time of solution u(t, x) to Eq. (2.2). Then Eq. (3.1) has a unique solution q(t, x) ∈ C 1 ([0, T ) × R, R). Moreover, the map q(t, ·) is an increasing diffeomorphism of R with t qx = exp
f (u)ux s, q(s, x) ds ,
∀(t, x) ∈ [0, T ) × R.
0
Lemma 3.3. Let u0 ∈ H s (S), s > 32 . Then as long as the solution u(t, x) to Eq. (1.1) given by Theorem 2.2 exists, we have
y(t, x)v(t, x) dx =
S
y0 (x)v0 (x) dx, S
where y(t, x) := u − uxx , v(t, x) := (4 − ∂x2 )−1 u, y0 (x) = y(0, x), v0 (x) = v(0, x). Moreover, we have 1 u0 2L2 u2L2 4u0 2L2 . 4 Proof. The proof of Lemma 3.3 is similar to the one of Lemma 3.1 in [24]. Applying Theorem 2.2 and a simple density argument, it suffices to consider s = 3. By Eq. (1.1), we have
yt v dx =
S
−4f (u)ux + 3f (u)ux uxx + f (u)u3x + f (u)uxxx v dx
S
=
4f (u)vx dx +
S
S
=
4f (u)vx dx +
S
=
3f (u)ux uxx + f (u)u3x + f (u)uxxx v dx
∂x3 f (u) v dx
S
4f (u)vx − f (u)∂x3 v dx S
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
=
1433
f (u)∂x 4 − ∂x2 v dx
S
=
f (u)ux dx = 0.
(3.2)
S
On the other hand, d dt
yv dx = S
yt v + yvt dx = 2
S
(yt v + yvt ) dt. S
Combining the above two relations, we deduce that
y(t, x)v(t, x) dx =
S
y0 (x)v0 (x) dx. S
In view of the above conservation law, it follows that ∞ 1 + 4π 2 n2 |uˆ |2 2 n2 n 4 + 4π n=−∞ n=−∞
= 4 y(t), ˆ v(t) ˆ = 4 y(t), v(t) = 4(y0 , v0 ) = 4(yˆ0 , vˆ0 )
u2L2 =
∞
|uˆ n |2 4
∞ 2 1 + 4π 2 n2 ( u ˆ =4 ) 0 n 4 + 4π 2 n2 n=−∞ ∞ (uˆ 0 )n 2 = 4u0 2 2 .
4
L
(3.3)
n=−∞
Similarly, we can deduce that ∞ 1 + 4π 2 n2 |uˆ |2 2 n2 n 4 + 4π n=−∞ n=−∞
= y(t), ˆ v(t) ˆ = y(t), v(t) = (y0 , v0 ) = (yˆ0 , vˆ0 )
u2L2 =
=
∞
|uˆ n |2
∞ 2 1 + 4π 2 n2 (uˆ 0 )n 2 2 4 + 4π n n=−∞
∞ 2 1 1 (uˆ 0 )n = u0 2L2 . 4 n=−∞ 4
This completes the proof of Lemma 3.3.
2
(3.4)
1434
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
Lemma 3.4. Assume that u0 ∈ H s (S), s > 32 and |f (u)| k|u|2 , k > 0. Let T be the maximal existence time of the solution u(t, x) to Eq. (2.2). Then we have uL∞ 6ku0 2L2 t + u0 L∞ ,
∀t ∈ [0, T ].
Proof. Applying Theorem 2.2 and a simple density argument, it suffices to consider s = 3. Let T > 0 be the maximal existence time of the solution u(t, x) to Eq. (1.1) with the initial data u0 ∈ H 3 (S) such that u(t, x) ∈ C([0, T ); H 3 (S)) ∩ C 1 ([0, T ); H 2 (S)). By Eq. (2.2), we have
ut + f (u)ux = −∂x G ∗ 3f (u) .
(3.5)
By Eq. (3.1), we have
du(t, q(t, x)) dq(t, x) = ut (t, q) + ux (t, q) = ut + f (u)ux (t, q). dt dt It follows from Eq. (3.5) that du(t, q(t, x))
∂x G ∗ 3f (u) ∞ ∂x GL∞ 3f (u) 1 L L dt 3 3 k u2 L1 = ku2L2 6ku0 2L2 . 2 2
(3.6)
Thus we obtain −6ku0 2L2
du(t, q(t, x)) 6ku0 2L2 . dt
Integrating the above inequality with respect to t < T on [0, t], yields
−6ku0 2L2 t + u0 (x) u t, q(t, x) 6ku0 2L2 t + u0 (x). Thus
u t, q(t, x) u t, q(t, x)
L∞
6ku0 2L2 t + u0 (x)L∞ .
Using the Sobolev’s embedding to ensure the uniform boundedness of ux (r, η) for (r, η) ∈ [0, t] × R with t ∈ [0, T ), in view of Lemma 3.2, we get a constant C(t) > 0 such that e−C(t) qx (t, x) eC(t) ,
(t, x) ∈ [0, T ) × R.
We deduce that the function q(t, ·) is strictly increasing on R with limx→±∞ q(t, x) = ±∞ as long as t ∈ [0, T ). Thus we can obtain
u(t, x) ∞ u t, q(t, x) ∞ 6ku0 2 2 t + u0 (x) ∞ . L L L L This completes the proof of Lemma 3.4.
2
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1435
Remark 3.1. Analogous to the generalized Degasperis–Procesi equation, although the H 1 -norm of the solution to the periodic generalized Degasperis–Procesi equation is not conserved generally, Lemma 3.4 ensures that the amplitude remains bounded in finite time. Lemma 3.5. Assume that f ∈ C m (R, R), m > 4. Given u0 ∈ H s (S), 3 s m, if |f (u)| k|u|2 , k > 0 and 0 < k1 f (u), then the corresponding solution u(t, x) to Eq. (2.2) blows up in finite time T < ∞ if and only if lim inf inf ux (t, x) = −∞. t↑T
x∈R
Lemma 3.6. (See [14].) Assume u0 ∈ H 3 (S) is odd. Let f be given even and T be the maximal existence time of the corresponding strong solution u(t, x) to Eq. (2.2). For 12 x 1 we have the representation formulas
u(t, x) =
x
1 sinh( 12 )
sinh(1 − x)
1 y(t, ξ ) dξ sinh ξ − 2
1/2
1 1 + sinh(1 − ξ )y(t, ξ ) dξ, sinh x − 2 sinh( 12 ) 1
t ∈ [0, T ),
(3.7)
t ∈ [0, T ).
(3.8)
x
while ux (t, x) = −
1 sinh( 12 )
x cosh(1 − x)
1 y(t, ξ ) dξ sinh ξ − 2
1/2
1 1 + sinh(1 − ξ )y(t, ξ ) dξ, cosh x − 2 sinh( 12 ) 1
x
The representation on [0, 12 ] are obtained by reflection in x = t ∈ [0, T ).
1 2
if we recall that u(t, ·) is odd for
We now present these blow-up results. First, in order to have a neat notation, let cosh( 12 ) 1 J = coth . = 2 sinh( 12 ) Theorem 3.1. Assume u0 ∈ H s (S), s > be given even, u0 be odd and
3 2
and |f (u)| k|u|2 , k > 0 and f (u) k1 > 0. Let f
u0 (0) < −
6J k u0 L2 . k1
1436
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
Then the corresponding solution u(t, x) to Eq. (2.2) blows up in finite time T and √ √ k1 u0 (0) − 6J ku0 L2 1 . T ln √ √ √ u0 L2 6J kk1 k1 u0 (0) + 6J ku0 L2 Proof. By Theorem 2.2 and a simple density argument, we only have to prove that the theorem holds for s = 3. Let T be the maximal existence time of the solution u ∈ C([0, T ); H s (S)) ∩ C 1 ([0, T ); H s−1 (S)) with the initial u0 of Eq. (1.1). Note that Eq. (1.1) enjoys the symmetry (u, x) → (−u, −x). If u0 (x) is odd, then u(t, x) is odd for any t ∈ [0, T ). Since s = 3, the functions u and uxx are continuous in x. Then we have u(t, 0) = uxx (t, 0) = 0,
∀t ∈ [0, T ).
Differentiating Eq. (2.2) with respect to x, we obtain
utx + f (u)u2x + f (u)uxx + ∂x2 G ∗ 3f (u) = 0. Let h(t) = ux (t, 0), t ∈ [0, T ). Applying ∂x2 (G ∗ f ) = G ∗ f − f , Young’s inequality and Lemma 3.3, we have
dh(t) 3J k u2 1 −k1 h2 (t) + G ∗ 3f (u) (t, 0)L∞ −k1 h2 (t) + L dt 2 3J k u2L2 −k1 h2 (t) + 6J ku0 2L2 . −k1 h2 (t) + (3.9) 2 Since h(0) < − 6Jk1k u0 L2 , it follows that h (0) < 0. Thus we get h(t) < − 6Jk1k u0 L2 and h (t) < 0. By solving the inequality (3.9), we can obtain ∀t ∈ [0, T ) √ √ √
k1 h(0) + 6J ku0 L2 2 6J ku0 L2 exp u0 L2 6J kk1 t − 1 √ < 0. √ √ √ k1 h(0) − 6J ku0 L2 k1 h(t) − 6J ku0 L2 Thus t<
√ √ k1 h(0) − 6J ku0 L2 1 . ln √ √ √ u0 L2 6J kk1 k1 h(0) + 6J ku0 L2
This completes the proof of Theorem 3.1.
2
Theorem 3.2. Assume ε > 0 and u0 ∈ H s (S), s > 32 . Let |f (u)| k|u|2 , f (u) k1 > 0. If there is x0 ∈ S such that √ 1 √ 2 −(1 + ε) 6k 2 6k 2 2 2 u0 L∞ + √ u0 L2 ln 1 + , + u0 L∞ u (x0 ) < √ ε 2 k1 k1
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1437
then the corresponding solution u(t, x) of Eq. (2.2) blows up in finite time. Moreover, the maximal existence time is estimated above by √ 2√ 6k u0 2L2 k1 12ku0 2L2
−u0 L∞ + (u0 2L∞ +
1
ln(1 + 2ε )) 2
.
Proof. As mentioned earlier, it suffices to consider s = 3. Let T be the maximal existence time of the solution u(t, x) to Eq. (2.3) with the initial data u0 ∈ H 3 (S). Differentiating Eq. (2.2) with respect to x, in view of ∂x2 (G ∗ f ) = G ∗ f − f , we obtain
utx + f (u)uxx = −f (u)u2x + 3f (u) − G ∗ 3f (u) .
(3.10)
Note that
dux (t, q(t, x)) dq(t, x) = utx (t, q) + uxx (t, q) = utx + f (u)uxx t, q(t, x) . dt dt
(3.11)
Using Young’s inequality and Lemma 3.4, we have
3f (u) − G ∗ 3f (u)
L∞
6f (u)L∞ 6ku2L∞
2 6k 6ku0 2L2 t + u0 L∞ .
(3.12)
By (3.10)–(3.12), we deduce that
2 dux (t, q(t, x)) −k1 u2x t, q(t, x) + 6k 6ku0 2L2 t + u0 L∞ . dt
(3.13)
Set m(t) = ux (t, q(t, x0 )) and fix ε > 0. Take √ √ 1 √ 6k u0 2 2 ln(1 + 2 )) 2 −2 6ku0 L∞ + (24ku0 2L∞ + 48k ε L k1 T1 = √ 24k 6ku0 2L2
and K(T1 ) =
√
6k 6ku0 2L2 T1 + u0 L∞ .
It is found that 2 2 k1 K(T1 )T1 = ln 1 + . ε
(3.14)
By the assumption of the theorem, we have K(T1 ) K(T1 ) m(0) < −(1 + ε) √ <− √ . k1 k1
(3.15)
1438
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
This implies that √ k1 m(0) − K(T1 ) 2K(T1 ) 2 0< √ =1− √ <1+ . ε k1 m(0) + K(T1 ) k1 m(0) + K(T1 ) It then follows from the above inequality and (3.14) that √ k1 m(0) − K(T1 ) 1 < T1 . √ ln √ k1 m(0) + K(T1 ) 2K(T1 ) k1 In view of (3.13), we have dm(t) −k1 m2 (t) + K 2 (T1 ), dt
∀t ∈ [0, T1 ] ∩ [0, T ).
(3.16)
√ 1 ) , ∀t ∈ [0, T1 ]∩ Note that (3.15), (3.16), the standard argument of continuity shows m(t) < − K(T k1 [0, T ). By solving the inequality (3.16), we can obtain √
k1 m(0) + K(T1 ) 2K(T1 ) exp 2K(T1 ) k1 t − 1 √ < 0. √ k1 m(0) − K(T1 ) k1 m(t) − K(T1 )
Since 0 <
√ √k1 m(0)+K(T1 ) k1 m(0)−K(T1 )
< 1, then
T
√ k1 m(0) − K(T1 ) 1 < T1 , √ ln √ 2K(T1 ) k1 k1 m(0) + K(T1 )
such that limt↑T m(t) = −∞. This completes the proof of the theorem.
2
Remark 3.2. Note that if ε > 0 goes to positive infinity and the assumption of Theorem 3.2 still holds, the maximal existence time of the solution will tend to zero. This means that the steeper the slope of the solution at some point is, the quicker the solution blows up. By Theorem 3.2, we have the following two corollaries. Corollary 3.1. Assume that u0 ∈ H s (S), s > 32 , is even and not constant. Then for sufficiently large n, the corresponding solution to Eq. (2.2) with initial data v0 (x) = u0 (nx) blows up in finite time. Proof. Take x0 ∈ [− 12 , 12 ] such that u0 (x0 ) = minx∈[− 1 , 1 ] u0 (x). Since u0 is even, it follows that 2 2 −u0 (x0 ) = u0 (−x0 ) = maxx∈[− 1 , 1 ] u0 (x). Thus we deduce that 2 2
2
min u0 (x) x∈S
2
2 u0 (x) dx > 0. = max u0 (x) > x∈S
S
Note that v0 (x) = nu0 (nx), v0 (x)L2 = u0 (x)L2 , and v0 (x)L∞ = u0 (x)L∞ . From the above inequality, we see that the assumption of Theorem 3.2 is satisfied for the initial data v0 (x) = u0 (nx) provided n is large enough. This completes the proof of the corollary. 2
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1439
Corollary 3.2. Assume that u0 ∈ H s (S), s > 32 , is even and not constant. If min u0 (x) max u0 (x), x∈S
x∈S
then for sufficiently large n, the corresponding solution to Eq. (2.2) with initial data u0 (nx) blows up in finite time. Proof. The assumption and the mean value theorem imply that there is some x0 ∈ [0, 1] such that 2 2 min u0 (x) max u0 (x) , x∈S
x∈S
2
2
2 min u0 (x) > u0 (x0 ) = u0 (x) dx > 0. x∈S
S
In view of the proof of Corollary 3.1, we can obtain the desired result of Corollary 3.2.
2
We now present the finally blow-up result. Theorem 3.3. Assume u0 ∈ H s (S), s > 32 , u0 ≡ 0. Let 0 f (u) k|u|2 , k > 0 and f (u) k1 > 0. If 9k − 8k1 < 0 and the corresponding solution u(t, x) has a zero for any time t 0, then the solution u(t, x) to Eq. (2.2) blows up in finite time. Proof. As mentioned earlier, it suffices to consider s = 3. Let T be the maximal existence time of the solution u to Eq. (2.2) with the initial data u0 ∈ H 3 (S). By assumption, for each t ∈ [0, T ), there is ηt ∈ [0, 1] such that u(t, ηt ) = 0. Then for x ∈ S we obtain x u (t, x) = 2
2 ux dx
x (x − ηt )
ηt
u2x dx. ηt
Thus the relation above and an integration by parts yield ηt + 12
u2 u2x ηt
dx
(x
− ηt )u2x
ηt
1 4
x
ηt + 12
u2x
dx dx
ηt
2
ηt + 12 u2x ηt
dx
,
1 ∀x ∈ ηt , ηt + . 2
(3.17)
1440
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
For x ∈ [ηt + 12 , ηt + 1], we can obtain the following estimate ηt +1
1 u2 u2x dx 4
2 ηt +1 u2x dx .
ηt + 12
ηt + 12
Combining the above two inequalities, we have u2 u2x dx S
1 4
2 u2x dx
.
(3.18)
u2x dx.
(3.19)
S
Using (3.17), we also obtain u2 (t, x) sup u2 (t, x) x∈S
1 2
S
Assume that the solution u(t, x) exists globally in time. Note that G(x)
1 , 2 sinh( 12 )
by (3.10), (3.18), we have d u3x dx = 3 u2x utx dx dt S
∀x ∈ S. Then
S
=3
u2x −f (u)u2x − f (u)uxx + 3f (u) − G ∗ 3f (u) dx
S
=
−3u4x f (u) + u4x f (u) dx + 9
S
−2k1
u4x dx + 9k S
u2 u2x dx − S
u4x dx +
−2k1 S
9k 4
u2x f (u) dx − 9
S
2 sinh( 12 )
2
−
u2x dx S
S
9k
u2x G ∗ f (u) dx
u2x dx S
9k 2 sinh( 12 )
u2 dx S
u2x dx S
u2 dx.
(3.20)
S
By the Cauchy–Schwartz inequality, we get 9k 4
2
u2x
dx
S
9k 4
u4x dx.
(3.21)
S
Furthermore, Lemma 3.3 and (3.19) imply that −
2
u2x
u dx S
S
dx −2
2 2
u dx S
1 − u0 4L2 . 8
(3.22)
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1441
By (3.20)–(3.22), we obtain d 9k − 8k1 9k u3x dx u4x dx − u0 4L2 . dt 4 16 sinh( 12 ) S
S
An application of Holder’s inequality yields d dt Define W (t) :=
u3x S
9k − 8k1 dx 4
3 S ux (t, x) dx.
4 u3x
3
dx
9k
−
16 sinh( 12 )
S
u0 4L2 .
(3.23)
By (3.23), we obtain
W (t) W (0) −
9k 16 sinh( 12 )
u0 4L2 ,
t 0.
Since u0 ≡ 0, it follows that −9ku0 4L2 /16 sinh( 12 ) < 0. Thus we can find that there is some t0 0 such that W (t) < 0, ∀t t0 . In view of (3.23) again, we have
4 d 9k − 8k1 W (t) W (t) 3 , dt 4
t t0 .
By solving the above inequality, we obtain
8k1 − 9k 1 (t − t0 ) + 1 12 (W (t0 )) 3
3
1 < 0, W (t)
t t0 .
Then we have t<
−24 1
(8k1 − 9k)(W (t0 )) 3
+ t0 .
Since W (t0 ) < 0, the above inequality will lead to contradiction. It follows that T < ∞. This completes the proof of Theorem 3.3. 2 By Theorem 3.3, we deduce the following useful corollaries. Corollary 3.3. Let u0 ∈ H 3 (S), u0 ≡ 0 and S u0 dx = 0 or S y0 dx = 0. Then the corresponding solution u(t, x) to Eq. (2.2) blows up in finite time. Proof. By Eq. (2.2), we can deduce that u(t, x) dx = y(t, x) dx = y0 (x) dx = u0 (x) dx = 0. S
S
S
S
The relation above shows that u(t, x) has at least a zero for all t 0. By Theorem 3.3, the solution u(t, x) blows up in finite time. 2
1442
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
Corollary 3.4. Assume f is even. If u0 ∈ H s , s > 32 , u0 ≡ 0, and u0 (x) or y0 (x) is odd, then the corresponding solution u(t, x) to Eq. (2.2) blows up in finite time. Proof. If u0 (x) or y0 (x) is odd and f is even, then the solution u(t, x) is odd for all t 0. This shows that u(t, x) has at least a zero for all t 0. Thus Theorem 3.3 ensures that the solution u(t, x) blows up in finite time. 2 Corollary 3.5. If u0 ∈ H s (S), s > 32 , u0 ≡ 0 and u(t, x) to Eq. (2.2) blows up in finite time.
3 S u0 dx
= 0, then the corresponding solution
Proof. Multiplying Eq. (2.2) by u2 and integrating by parts, we have 1 d 3 2 u dx = − u f (u)ux dx − u2 ∂x G ∗ 3f (u) dx 3 dt S
=
S
S
G ∗ 3f (u) ∂x u2 dx = 0.
S
It follows that
u (t, x) dx =
u30 (x) dx = 0.
3
S
S
The conservation law implies that u(t, x) has at least a zero for all t 0. Thus Theorem 3.3 ensures that the solution u(t, x) blows up in finite time. 2 Remark 3.3. Compare with Theorems 3.1–3.2, in Theorem 3.3 and Corollaries 3.3–3.5, the condition 9k − 8k1 < 0, 0 f (u) ku2 is indispensable. Note that there is some difference in blow-up phenomena of the generalized Degasperis–Procesi equation between the periodic and 2 the line case. In particular, set f (u) = u2 , k1 = 1 and k = 12 , these results cover the blow-up results of the periodic Degasperis–Procesi equation. 4. Blow-up rate We are now concerned with the rate of the blow-up of the slope of blow-up solutions to Eq. (2.2). First, we recall the following useful lemma. Lemma 4.1. (See [13].) Let T > 0 and u ∈ C 1 ([0, T ); H 2 (S)). Then for every t ∈ [0, T ), there is at least one point ξ(t) ∈ S with
m(t) := inf ux (t, x) = ux t, ξ(t) , x∈S
the function m(t) is absolutely continuous on [0, T ) with
dm(t) = utx t, ξ(t) dt
a.e. on [0, T ).
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1443
Theorem 4.1. Assume u0 ∈ H s (S), s > 32 . Let |f (u)| k|u|2 , f (u) k1 > 0. If T < ∞ be the blow-up time of the corresponding solution u(t, x) to Eq. (2.2) with initial data u0 , then we have 1 , lim inf ux (t, x) = O t↑T x∈R T −t
while the solution u(t, x) remains bounded. Proof. Again we may assume s = 3 to prove the above theorem. Differentiating Eq. (2.2) with respect to x, in view of ∂x2 (G ∗ f ) = G ∗ f − f , we obtain
utx + f (u)uxx + f (u)u2x = 3f (u) − G ∗ 3f (u) .
(4.1)
By Lemma 3.5, we have lim inf m(t) = −∞,
(4.2)
t→T
where m(t) := infx∈S ux (t, x) for t ∈ [0, T ). Obviously, one can check that the function m(t) is locally Lipschitz. Moreover, by Lemma 4.1 we have m(t) = ux (t, ξ(t)), t ∈ [0, T ). Note that uxx (t, ξ(t)) = 0 for a.e. t ∈ [0, T ). Using Young’s inequality and Lemma 3.4, we get
3f (u) − G ∗ 3f (u)
L∞
3J f (u) 1 3f (u)L∞ + L 2 3J k u2L2 3ku2L∞ + 2
2 3k 6ku0 2L2 t + u0 L∞ + 6J ku0 2L2 .
(4.3)
Set
2 K(T ) = 3k 6ku0 2L2 T + u0 L∞ + 6J ku0 2L2 . Combining (4.1) with (4.3) we deduce dm(t) −k1 m2 (t) + K(T ). dt
(4.4)
Choose now ε ∈ (0, 1). Using (4.2), we can find t0 ∈ [0, T ) such that m(t0 ) < −
K(T ) K(T ) + . k1 εk1
By (4.4), we deduce that m(t) is decreasing on [t0 , T ) and
K(T ) K(T ) K(T ) m(t) < − + <− , k1 εk1 εk1
t ∈ [t0 , T ).
1444
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
Since f is continuous, by Lemma 3.5, we can find k2 such that f (u) < k2 . Again, in view of (4.1) and (4.3), we obtain −k2 m2 (t) − K(T )
dm(t) −k1 m2 (t) + K(T ), dt
t ∈ [t0 , T ).
From the above inequality, we obtain d k1 − k1 ε dt
1 m(t)
k2 + k1 ε.
Integrating the above inequality on (t, T ) with t ∈ [t0 , T ) and noticing that limt→T m(t) = −∞, we get (k1 − k1 ε)(T − t) −
1 (k2 + k1 ε)(T − t). m(t)
It follows that 1 1 (t − T )m(t) . k2 + k1 ε k1 − k1 ε Since ε ∈ (0, 1) is arbitrary, in view of the definition of m(t), the above inequality implies the desired result of the theorem. 2 Remark 4.1. Note that the blow-up rate of breaking waves to the Degasperis–Procesi equation and the Camassa–Holm equation is −1, −2, respectively [9,23]. Acknowledgments The author thanks the referee for constructive suggestion on the manuscript, and is also grateful to Professor Z. Yin for his encouragement and helpful discussions. References [1] A. Ambrosetti, G. Prodi, Primer of Nonlinear Analysis, Cambridge Univ. Press, Cambridge, 1995. [2] R. Beals, D. Sattinger, J. Szmigielski, Acoustic scattering and the extended Korteweg–de Vries hierarchy, Adv. Math. 140 (1998) 190–206. [3] R. Beals, D. Sattinger, J. Szmigielski, Multipeakons and a theorem of Stieltjes, Inverse Problems 15 (1999) 1–4. [4] J.L. Bona, R. Smith, The initial-value problem for the Korteweg–de Vries equation, Philos. Trans. R. Soc. 278 (1975) 555–601. [5] R. Camassa, D. Holm, An integrable shallow water equation with peaked solution, Phys. Rev. Lett. 71 (1993) 1661–1664. [6] R. Camassa, D. Holm, J. Hyman, A new integrable shallow water equation, Adv. Appl. Mech. 31 (1994) 1–33. [7] G.M. Coclite, K.H. Karlsen, On the well-posedness of the Degasperis–Procesi equation, J. Funct. Anal. 233 (2006) 60–91. [8] A. Constantin, On the Cauchy problem for the periodic Camassa–Holm equation, J. Differential Equations 141 (1997) 218–235. [9] A. Constantin, Global existence and breaking waves for a shallow water equation: a geometric approach, Ann. Inst. Fourier (Grenoble) 50 (2000) 321–362. [10] A. Constantin, On the scattering problem for the Camassa–Holm equation, Proc. R. Soc. Lond. Ser. A 457 (2001) 953–970.
X. Wu / Journal of Functional Analysis 260 (2011) 1428–1445
1445
[11] A. Constantin, Finite propagation speed for the Camassa–Holm equation, J. Math. Phys. 46 (2005) 023506, 4 pp. [12] A. Constantin, J. Escher, Well-posedness, global existence, and blow-up phenomena for a periodic quasi-linear hyperbolic equation, Comm. Pure Appl. Math. 51 (1998) 475–504. [13] A. Constantin, J. Escher, Wave breaking for nonlinear nonlocal shallow water equation, Acta Math. 181 (1998) 229–243. [14] A. Constantin, J. Escher, On the blow-up rate and the blow-up set of breaking waves for a shallow water equation, Math. Z. 233 (2000) 75–91. [15] A. Constantin, H. Kolev, Geodesic flow on the diffeomorphism group of the circle, Comment. Math. Helv. 78 (2003) 787–804. [16] A. Constantin, D. Lannes, The hydrodynamical relevance of the Camassa–Holm and Degasperis–Procesi equations, Arch. Ration. Mech. Anal. 192 (2009) 165–186. [17] A. Constantin, M.P. McKean, A shallow water equation on the circle, Comm. Pure Appl. Math. 52 (1999) 949–982. [18] A. Constantin, W.A. Strauss, Stability of a class of solitary waves in compressible elastic rods, Phys. Lett. A 270 (2000) 140–148. [19] A. Constantin, W.A. Strauss, Stability of peakons, Comm. Pure Appl. Math. 53 (2000) 603–610. [20] A. Degasperis, D.D. Holm, A.N.W. Hone, A new integrable equation with peakon solution, Theoret. and Math. Phys. 133 (2002) 1463–1474. [21] A. Degasperis, M. Procesi, Asymptotic integrability, in: A. Degasperis, G. Gaeta (Eds.), Symmetry and Perturbation Theory, Word Scientific, 1999, pp. 23–37. [22] H.R. Dullin, G.A. Gottwald, D.D. Holm, Camassa–Holm, Korteweg–de Vries-5 and other asymptotically equivalent equations for shallow water waves, Fluid Dynam. Res. 33 (2003) 73–79. [23] J. Escher, Y. Liu, Z. Yin, Global weak solutions and blow-up structure for the Degasperis–Procesi equation, J. Funct. Anal. 241 (2006) 457–485. [24] J. Escher, Y. Liu, Z. Yin, Shock waves and blow-up phenomena for the periodic Degasperis–Procesi equation, Indiana Univ. Math. J. 56 (2007) 87–117. [25] D. Henry, Infinite propagation speed for the Degasperis–Procesi equation, J. Math. Anal. Appl. 311 (2005) 755–799. [26] D.D. Holm, M.F. Staley, Wave structure and nonlinear balances in a family of evolutionary PDEs, SIAM J. Appl. Dyn. Syst. 2 (2003) 323–380. [27] R.S. Johnson, Camassa–Holm, Korteweg–de Vries and related models for water waves, J. Fluid Mech. 455 (2002) 63–82. [28] J. Lenells, Traveling wave solutions of the Degasperis–Procesi equation, J. Math. Anal. Appl. 306 (2005) 72–82. [29] Y. Liu, Z. Yin, Global existence and blow-up phenomena for Degasperis–Procesi equation, Comm. Math. Phys. 267 (2006) 801–820. [30] H. Lundmark, J. Szmigielski, Multi-peakon solutions of the Degasperis–Procesi equation, Inverse Problems 19 (2003) 1241–1245. [31] Y. Matsuno, Multisoliton solutions of the Degasperis–Procesi equation and their peakon limit, Inverse Problems 21 (2005) 1553–1570. [32] G. Misiolek, A shallow water equation as a geodesic flow on the Bott–Virasoro group, J. Geom. Phys. 24 (1998) 203–208. [33] O.G. Mustafa, A note on the Degasperis–Procesi equation, J. Nonlinear Math. Phys. 12 (2005) 10–14. [34] V.O. Vakhnenko, E.J. Parkes, Periodic and solitary-wave solutions of the Degasperis–Procesi equation, Chaos Solitons Fractals 20 (2004) 1059–1073. [35] G.B. Whitham, Linear and Nonlinear Waves, Wiley–Interscience, New York, London, Sydney, 1974. [36] X. Wu, Z. Yin, On the Cauchy problem for a generalized Degasperis–Procesi equation, J. Math. Phys. 51 (2010), preprint. [37] Z. Yin, On the Cauchy problem for an integrable equation with peakon solutions, Illinois J. Math. 47 (2003) 649– 666. [38] Z. Yin, Global existence for a new periodic integrable equation, J. Math. Anal. Appl. 283 (2003) 129–139. [39] Z. Yin, Global weak solutions to a new periodic integrable equation with peakon solutions, J. Funct. Anal. 212 (2004) 182–194. [40] Z. Yin, Global solutions to a new integrable equation with peakons, Indiana Univ. Math. J. 53 (2004) 1189–1210.
Journal of Functional Analysis 260 (2011) 1446–1462 www.elsevier.com/locate/jfa
Semi-invertible extensions of C ∗ -algebras Vladimir Manuilov a , Klaus Thomsen b,∗ a Dept. of Mech. and Math., Moscow State University, Moscow, 119899, Russia b Institut for Matematiske Fag, Ny Munkegade, 8000 Aarhus C, Denmark
Received 1 June 2010; accepted 10 December 2010 Available online 18 December 2010 Communicated by S. Vaes
Abstract We prolong the list of C ∗ -algebras which have the property that all extensions by a stable C ∗ -algebra are semi-invertible. In particular, it is shown to include group C ∗ -algebras, both reduced and full, of certain amalgamated free products of amenable groups, as well as all free products of nuclear C ∗ -algebras with amalgamation over a common nuclear C ∗ -subalgebra. © 2010 Elsevier Inc. All rights reserved. Keywords: C ∗ -algebra; Extensions; KK-theory
1. Introduction and statements of results The number of examples of C ∗ -algebras for which the semi-group of extensions by the compact operators is not a group was only slowly increasing during the first decades following the first example of J. Anderson [1], but recently the pace has picked up, cf. [9–11] and [20], and there are now whole series of C ∗ -algebras A for which it is known that there are non-invertible extensions of A by the C ∗ -algebra of compact operators K. Furthermore, by considering extensions by general stable C ∗ -algebras the stock of examples of non-invertible extensions grows considerably. Indeed, a non-invertible extension of a C ∗ -algebra A by K gives rise to a noninvertible extension of A by B ⊗ K for any unital C ∗ -algebra B.1 * Corresponding author.
E-mail address: [email protected] (K. Thomsen). 1 Tensor the non-invertible extension with B using the maximal tensor-product, and pull back along the unital inclusion
A ⊆ A ⊗max B. It is easy to see that the resulting extension of A by B ⊗ K does not have a completely positive section for the quotient map because the original extension does not. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.009
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1447
In a different direction the authors have shown that many of the non-invertible extensions are invertible in a slightly weaker sense, called semi-invertibility. Recall that an extension of a C ∗ -algebra A by a stable C ∗ -algebra B is invertible when there is another extension, the inverse, with the property that the direct sum extension of the two is a split extension. Semi-invertibility requires only that the sum be asymptotically split, in the sense that there is an asymptotic homomorphism as defined by Connes and Higson [6], consisting of right-inverses of the quotient map. It turns out that extensions of a suspended or a contractible C ∗ -algebra are always semi-invertible [16,15], and in [21] it was shown that the extensions of the reduced group C ∗ -algebra of a free product of amenable groups are all semi-invertible. The main purpose of the present paper is to prolonge this list of C ∗ -algebras for which all the extensions by a separable stable C ∗ -algebra are semi-invertible. To explain why semi-invertibility is a natural notion which can be considered as the best alternative when invertibility fails, we recall first the central definitions. Let A and B be separable C ∗ -algebras. The multiplier algebra of B will be denoted by M(B), the generalized Calkin algebra of B by Q(B) and qB : M(B) → Q(B) is then the canonical surjection. We let Ext(A, B) denote the semi-group of unitary equivalence classes of extensions of A by B. Thus elements of Ext(A, B) are represented by ∗-homomorphisms ϕ : A → Q(B) and two extensions ϕ, ψ : A → Q(B) are unitarily equivalent when there is a unitary u ∈ M(B) such that Ad qB (u) ◦ ϕ = ψ . The addition ϕ ⊕ ψ of two extensions is defined from a choice of isometries V1 , V2 ∈ M(B) such that V1 V1∗ + V2 V2∗ = 1 to be the extension (ϕ ⊕ ψ)(a) = qB (V1 )ϕ(a)qB (V1 )∗ + qB (V2 )ψ(a)qB (V2 )∗ . An extension ϕ : A → Q(B) is split when there is a ∗-homomorphism π : A → M(B) such that ϕ = qB ◦ π and asymptotically split when there is an asymptotic homomorphism πt : A → M(B), t ∈ [1, ∞), such that qB ◦ πt = ϕ for all t. We say that Ext(A, B) is a group when every extension ϕ : A → Q(B) has an inverse, meaning that there is another extension ϕ : A → Q(B), the inverse of ϕ, such that ϕ ⊕ ϕ is split. (This terminology is justified because the condition means precisely that the semi-group quotient of Ext(A, B) by the additive semi-group of split extensions is a group.) An extension ϕ : A → Q(B) is semi-invertible when there is another extension ϕ : A → Q(B) such that ϕ ⊕ ϕ is asymptotically split. When the theory of C ∗ -extensions was first introduced, in the work of Brown, Douglas and Fillmore [3,4], the authors had very good (operator theoretic) reasons for wanting to trivialize the split extensions.2 However, there are other reasons why split extensions must be trivialized in order to get a group from the semi-group Ext(A, B). For a split extension ψ it makes sense to define the direct sum ψ ∞ of a countably infinite collection of copies of ψ. Since ψ ⊕ ψ ∞ ⊕ 0 = ψ ∞ ⊕ 0 in Ext(A, B) this shows that split extensions are trivial in any group-quotient of Ext(A, B). It is not difficult to show that ψ ∞ can also be defined when the extension ψ is asymptotically split. In fact, this is possible as soon as the extension splits via a discrete asymptotic homomorphism, e.g. when it is quasi-diagonal. But by using the real parameter for the asymptotic section it can also be arranged that ψ ⊕ ψ ∞ ⊕ 0 becomes unitarily equivalent to ψ ∞ ⊕ 0. It follows that also asymptotically split extensions must vanish in a group-quotient of Ext(A, B). In fact, any group-quotient of Ext(A, B) must factor through the cancellation semi-group of Ext(A, B). In retrospect it seems therefore not particularly surprising that it is not generally enough to trivialize only the split extensions to get a group, or even the asymptotically split extensions, as 2 They also had good reasons for restricting the attention to essential extensions, but that’s another story.
1448
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
demonstrated in [17]. In fact, seen through the right looking-glasses it seems more surprising that Ext(A, B) actually is a group in so many cases, and that semi-invertibility prevails in many cases where invertibility fails. Complementing on the cases covered by the results in [16,15,14,26] and [21] we shall show in this paper that all extensions in Ext(A, B) are semi-invertible when a) A is the reduced group C ∗ -algebra Cr∗ (G) and the group G is an amalgamated free product G = G1 ∗F G2 with F finite, G2 is amenable and G1 abelian, and b) A is the amalgamated free product of C ∗ -algebras, A = A1 ∗D A2 , when D is nuclear and all extensions of Ai by B are semi-invertible, i = 1, 2. The result concerning a) is actually slightly more general and involves a KK-theory condition which is automatically fulfilled when G1 is abelian. Furthermore we establish a few permanence properties for semi-invertibility: If all extensions of A and A by B are semi-invertible then so are all extensions of A ⊕ A by B, all extensions of C(T) ⊗ A by B and all extensions of K ⊗ A by B. It follows from this that all extensions of A by B are semi-invertible when a ) A = Cr∗ (G ) provided G = Zk × H × G where H is a finite group and G is an amalgamated free product as in a) above, and b ) A is the full group C ∗ -algebra C ∗ (Zk × H × G
) where H is a finite group and G
is obtained through successive amalgamations G
= · · · (G1 ∗H1 G2 ) ∗H2 G3 ∗H3 · · · ∗Hn−1 Gn , provided all the groups H1 , H2 , . . . , Hn−1 are amenable, and all extensions of C ∗ (Gi ) by B are semi-invertible, i = 1, 2, . . . , n. While we know from [10,11] and [20] that there are non-invertible extensions of A by B in many of the cases dealt with in a), our ignorance concerning invertibility of the extensions handled by b ) is almost complete: Only very recently we have been able to find an example of an extension of a full group C ∗ -algebra by a stable C ∗ -algebra which is not invertible, and we still don’t have such an extension with the compacts as the ideal. The proof of a) above is an elaboration of the ideas developed in [14,26] and [21]. In particular, the argument uses the notion of strong homotopy of extensions and depends on Lemma 4.3 in [15]. In contrast the method of proof of b) is new and does not use strong homotopy of extensions. Instead a key step uses methods devised for the classification of C ∗ -algebras by Lin, Dadarlat and Eilers. This difference in the proofs has consequences for the conclusions we obtain; in case a) the inverse (for semi-invertibility) can be chosen to be invertible while we do not know if this is so in case b). 2. The reduced group C ∗ -algebra of free products with amalgamation over a finite subgroup Throughout A and B are separable C ∗ -algebras and B is stable. Two extensions ϕ, ϕ : A → Q(B) are strongly homotopic when there is a path ψt , t ∈ [0, 1], of extensions ψt : A → Q(B) such that
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1449
1) t → ψt (a) is continuous for all a ∈ A, and 2) ψ0 = ϕ and ψ1 = ϕ . By Lemma 4.3 of [15] we have the following. Theorem 2.1. Assume that two extensions ϕ, ϕ : A → Q(B) are strongly homotopic. Then ϕ is asymptotically split if and only if ϕ is asymptotically split. In some of the cases we deal with below we show that for any extension ϕ : A → Q(B) there is an extension ψ : A → Q(B) such that ϕ ⊕ ψ is strongly homotopic to a split extension. This will be expressed by saying that ϕ is strongly homotopy invertible. Thanks to Theorem 2.1 this implies that ϕ is semi-invertible. In some cases it turns out that ψ can be taken to be invertible. We express this by saying that ϕ is strongly homotopy invertible with an invertible inverse. Lemma 2.2. Let Gi , i = 1, 2, be discrete countable amenable groups with a common finite subgroup H ⊆ Gi , i = 1, 2. Let G1 ∗H G2 be the amalgamated free product group. Let μ : C ∗ (G1 ∗H G2 ) → Cr∗ (G1 ∗H G2 ) be the canonical surjection and let hτ : C ∗ (G1 ∗H G2 ) → C be the character corresponding to the trivial one-dimensional representation of G1 ∗H G2 . There are then a separable infinite-dimensional Hilbert space H, ∗-homomorphisms σ, σ0 : Cr∗ (G1 ∗H G2 ) → B(H), and a path ζs : C ∗ (G1 ∗H G2 ) → B(H),
s ∈ [0, 1],
of unital ∗-homomorphisms such that a) b) c) d)
ζ0 = σ ◦ μ; ζ1 = hτ ⊕ σ0 ◦ μ; ζs (a) − ζ0 (a) ∈ K, s ∈ [0, 1]; and s → ζs (a) is continuous for all a ∈ C ∗ (G1 ∗H G2 ).
Proof. Set G = G1 ∗H G2 . Being amenable Gi has the Haagerup Property. See the discussion in 1.2.6 of [5]. It follows then from Propositions 6.1.1 and 6.2.3 of [5] that also G has the Haagerup Property. Since the Haagerup Property implies K-amenability by [27] (or Theorem 1.2 in [12]) we conclude that G is K-amenable. We can therefore find a separable infinite-dimensional Hilbert space H and ∗-homomorphisms σ, σ0 : Cr∗ (G) → B(H) such that σ and hτ ⊕ σ0 are both unital and 1) σ ◦ μ(x) − (hτ ⊕ σ0 ◦ μ)(x) ∈ K, x ∈ C ∗ (G), and 2) [σ ◦ μ, hτ ⊕ σ0 ◦ μ] = 0 in KK(C ∗ (G), K), cf. [7]. By adding the same unital and injective ∗-homomorphism to σ and σ0 we can arrange that both σ and σ0 are injective and have no non-zero compact operator in their range. Since μ|C ∗ (Gi ) : C ∗ (Gi ) → Cr∗ (Gi ) is injective because Gi is amenable, it follows that σ ◦ μ|C ∗ (Gi ) and (hτ ⊕ σ0 ◦ μ)|C ∗ (Gi ) are admissible in the sense of Section 3 of [8] for each i. Thus Theorem 3.12 of [8] applies to show that there is a norm-continuous path uis , s ∈ [1, ∞), of unitaries in 1 + K such that =0 lim σ ◦ μ|C ∗ (Gi ) (a) − uis (hτ ⊕ σ0 ◦ μ)|C ∗ (Gi ) (a)ui∗ s
s→∞
(2.1)
1450
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
for all a ∈ C ∗ (Gi ) and σ ◦ μ|C ∗ (Gi ) (a) − uis (hτ ⊕ σ0 ◦ μ)|C ∗ (Gi ) (a)ui∗ s ∈K
(2.2)
for all a ∈ C ∗ (Gi ) and all s ∈ [1, ∞). Set F = (hτ ⊕ σ0 ◦ μ) C ∗ (H ) which is a finite-dimensional unital C ∗ -subalgebra of B(H), and let P : B(H) → F ∩ B(H) be the conditional expectation given by uxu∗ du, P (x) = U (F )
where we integrate with respect to the Haar-measure on the unitary group U (F ) of F . Note that 1 P (1 + K) ⊆ 1 + K. It follows from (2.1) that u2∗ s us asymptotically commutes with elements of F and hence also that 1 2∗ 1 lim P u2∗ s us − us us = 0.
s→∞
(2.3)
Standard C ∗ -algebra techniques provide us then with a norm-continuous path vt , t ∈ [1, ∞), of 1 unitaries in F ∩ (1 + K) such that lims→∞ vs − P (u2∗ s us ) = 0, which combined with (2.3) implies that lim u2s vs − u1s = 0. s→∞
It follows that we can work with u2s vs instead of u1s to arrange that besides (2.1) and (2.2) we have also that Ad u1s ◦ (hτ ⊕ σ0 ◦ μ)|C ∗ (H ) = Ad u2s ◦ (hτ ⊕ σ0 ◦ μ)|C ∗ (H ) for all s. It follows that the ∗-homomorphisms ψs = Ad u1s ◦ (hτ ⊕ σ0 ◦ μ) ∗C ∗ (H ) Ad u2s ◦ (hτ ⊕ σ0 ◦ μ) are all defined and give us a norm-continuous path of unital ∗-homomorphisms ηs : C ∗ (G) → B(H), s ∈ [0, 1], such that a ) η0 = (Ad u11 ◦ (hτ ⊕ σ0 ◦ μ)) ∗C ∗ (H ) (Ad u21 ◦ (hτ ⊕ σ0 ◦ μ)); b ) η1 = σ ◦ μ; c ) ηs (a) − η0 (a) ∈ K, a ∈ C ∗ (G), s ∈ [0, 1]. The unitary group of F ∩ (C1 + K) is norm-connected; a fact which can be seen either from the spectral theory of compact operators or by observing that the algebra is AF. By using first 1
a continuous path of unitaries connecting u2∗ 1 u1 to 1 in F ∩ (1 + K) and then a continuous 2 path of unitaries connecting u1 to 1 in the unitary group of 1 + K, we obtain continuous paths
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1451
ws1 and ws2 , s ∈ [0, 1], of unitaries in 1 + K such that w01 = w02 = 1, w11 = u11 , w12 = u21 and Ad ws1 ◦ (hτ ⊕ σ0 ◦ μ)|C ∗ (H ) = Ad ws2 ◦ (hτ ⊕ σ0 ◦ μ)|C ∗ (H ) for all s ∈ [0, 1]. It follows that the ∗-homomorphisms ηs = Ad ws1 ◦ (hτ ⊕ σ0 ◦ μ) ∗C ∗ (H ) Ad ws2 ◦ (hτ ⊕ σ0 ◦ μ) are all defined and give us a norm-continuous path of unital ∗-homomorphisms ηs : C ∗ (G) → B(H), s ∈ [0, 1], such that a
) η0 = hτ ⊕ (σ0 ◦ μ); b
) η1 = (Ad u11 ◦ (hτ ⊕ σ0 ◦ μ)) ∗C ∗ (H ) (Ad u21 ◦ (hτ ⊕ σ0 ◦ μ)); c
) ηs (a) − η0 (a) ∈ K, a ∈ C ∗ (G), s ∈ [0, 1]. The desired path ζ is then obtained by concatenation of the paths, η and η .
2
Theorem 2.3. Let Gi , i = 1, 2, be discrete countable amenable groups with a common finite subgroup H ⊆ Gi , i = 1, 2, and let B be a separable stable C ∗ -algebra. Let G1 ∗H G2 be the amalgamated free product group. Assume that the map i1∗ − i2∗ : KK C ∗ (G1 ), B ⊕ KK C ∗ (G2 ), B → KK C ∗ (H ), B , induced by the inclusions ij : C ∗ (H ) → C ∗ (Gj ), j = 1, 2, is rationally surjective, i.e. for every x ∈ KK(C ∗ (H ), B) there is an n ∈ N\{0} such that nx is in the range of i1∗ − i2∗ . It follows that every extension of Cr∗ (G1 ∗H G2 ) by B is strongly homotopy invertible with an invertible inverse. Proof. Set G = G1 ∗H G2 and consider an extension ϕ : Cr∗ (G1 ∗H G2 ) → Q(B). Since C ∗ (G) C ∗ (G1 ) ∗C ∗ (H ) C ∗ (G2 ) it follows from Proposition 2.8 of [24] that every extension of C ∗ (G) by B is invertible. As observed in the proof of Lemma 2.2, G is K-amenable and it follows therefore from [7] that μ∗ : Ext−1 (Cr∗ (G), B) → Ext−1 (C ∗ (G), B) is an isomorphism. In particular the inverse of ϕ ◦ μ is in the range of μ∗ , which means that there is an invertible extension ϕ
: Cr∗ (G) → Q(B) such that ϕ ◦ μ ⊕ ϕ
◦ μ = 0
(2.4)
in Ext−1 (C ∗ (G), B). Let β0 : Cr∗ (G) → M(B) be an absorbing homomorphism, whose existence is guaranteed by [23] and set ϕ = ϕ ⊕ qB ◦ β0 . By Lemma 2.2 of [24] β0 |Cr∗ (Gi ) : Cr∗ (Gi ) → M(B) is absorbing for each i = 1, 2. Since Gi is amenable μ|C ∗ (Gi ) : C ∗ (Gi ) → Cr∗ (Gi ) is a ∗-isomorphism and it follows therefore from (2.4) that (ϕ ◦ μ ⊕ ϕ
◦ μ)|C ∗ (Gi ) is a split extension for each i. In other words, there are ∗-homomorphisms πi : C ∗ (Gi ) → M(B) such that (ϕ ◦ μ ⊕ ϕ
◦ μ)|C ∗ (Gi ) = qB ◦ πi , i = 1, 2. Note that π1 (x) − π2 (x) ∈ B for all x ∈ C ∗ (H ) so that (π1 , π2 ) represents an element of KK(C ∗ (H ), B). We need to change the situation to a case where this pair represents 0 in KK(C ∗ (H ), B). This is done as follows:
1452
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
β0 |C ∗ (Gi ) , i = 1, 2, are both absorbing so after adding qB ◦ β0 to ϕ
we get a situation where there are unitaries ui ∈ M(B) such that Ad ui ◦ πi (y) − β0 (y) ∈ B for all y ∈ C ∗ (Gi ), i = 1, 2. Then ϕ ◦ μ ⊕ ϕ
◦ μ = Ad qB u∗2 ◦ qB ◦ Ad u2 u∗1 ◦ β0 |C ∗ (G1 ) ∗C ∗ (H ) (qB ◦ β0 |C ∗ (G2 ) ) . It follows that we can choose the lifts, π1 , π2 , above such that [π1 |C ∗ (H ) , π2 |C ∗ (H ) ] = [Ad w ◦ β0 |C ∗ (H ) , β0 |C ∗ (H ) ] in KK(C ∗ (H ), B) where w = u2 u∗1 . To proceed we need a description of the KK-groups obtained in [23] and [25]: When A is a separable C ∗ -algebra and α : A → M(B) is an absorbing ∗-homomorphism, there is an isomorphism between K1 (Dα (A)) and KK(A, B), where Dα (A) = m ∈ M(B): α(a)m − mα(a) ∈ B ∀a ∈ A .
(2.5)
The isomorphism sends a unitary u ∈ Dα (A) to [Ad u ◦ α, α]. Ignoring the passage to matrices in K1 our assumption implies, in this picture of KK-theory, that there is an n > 0 and a norm-continuous path of unitaries in Dβ0 (C ∗ (H )) connecting w n to a product w2∗ w1 , where wi ∈ Dβ0 (C ∗ (Gi )), i = 1, 2. Then [Ad w n ◦ β0 |C ∗ (H ) , β0 |C ∗ (H ) ] = [Ad w1 ◦ β0 |C ∗ (H ) , Ad w2 ◦ β0 |C ∗ (H ) ] in KK(C ∗ (H ), B). Note that qB ◦ β0 ◦ μ = qB ◦ Ad w1∗ ◦ β0 |C ∗ (G1 ) ∗C ∗ (H ) qB ◦ Ad w2∗ ◦ β0 |C ∗ (G2 ) . After adding
ϕ ⊕ ϕ
⊕ ϕ ⊕ ϕ
⊕ · · · ⊕ ϕ ⊕ ϕ
⊕ qB ◦ β0
n−1 times
to ϕ
we come in a position where the pair (π1 , π2 ) can be chosen such that [π1 , π2 ] = 0 in KK(C ∗ (H ), B). (If we take the passage to matrices in K1 into account in the previous argument, it may be necessary to add a finite direct sum of copies of qB ◦ β0 instead of a single copy.) We can then proceed as follows: Set β = qB ◦ β0∞ where β0∞ is the direct sum of a sequence of copies of β0 . By adding β to ϕ
we come then in a situation where Theorem 3.8 of [8] applies to give us a continuous path ut , t ∈ [1, ∞), of unitaries in 1 + B such that lim Ad ut ◦ π1 (x) = π2 (x)
t→∞
for all x ∈ C ∗ (H ). Since C ∗ (H ) is finite-dimensional we have that for t large enough there is a unitary v ∈ 1 + B such that vut π1 (x)u∗t v ∗ = π2 (x) for all x ∈ C ∗ (H ). Hence, by exchanging π1 with Ad vut ◦ π1 we conclude that ϕ ◦ μ ⊕ ϕ
◦ μ is split. By a standard argument, based on Kasparov’s stabilization theorem, we may add a split extension to arrange that ϕ ◦ μ ⊕ ϕ
◦ μ = qB ◦ χ ⊕ 0 where χ : C ∗ (G) → M(B) is a unital ∗-homomorphism. Let γ : G → M(B) be the unitary representation of G defined by χ and let ζs be the continuous path of ∗-homomorphisms from Lemma 2.2, and νs the corresponding unitary representations. Let hγ ⊗νs be the ∗-homomorphism C ∗ (G) → M(B) defined from the tensor product representation γ ⊗ νs by use of a spatial isomorphism B ⊗ K B. Then qB ◦ hγ ⊗νs ,
s ∈ [0, 1],
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1453
is a strong homotopy of extensions of C ∗ (G) by B. By the argument used in the proof of Theorem 2.3 of [25] and again in the proof of Theorem 2.2 in [21] the properties of {ζs } ensure that this homotopy factors through Cr∗ (G) and gives us a strong homotopy, as well as split extensions ψ, ψ , of Cr∗ (G) by B connecting ϕ ⊕ qB ◦ β0 ⊕ ϕ
⊕ ψ = ϕ ⊕ ϕ
⊕ ψ to ψ . Since qB ◦ β0 ⊕ ϕ
⊕ ψ is invertible, this completes the proof. 2 As in [21] the fact that the strong homotopy inverse is invertible implies that the group Ext−1/2 (Cr∗ (G1 ∗H G2 ), B) of extensions modulo asymptotically split extensions agrees with the corresponding KK-theory group and can be calculated from the universal coefficient theorem. The proof is the same as in [21] and we omit it here. The KK-condition of Theorem 2.3 is satisfied when G1 is abelian since in this case already the map i1∗ : KK C ∗ (G1 ), B → KK C ∗ (H ), B is surjective. This follows because there is in this case a ∗-homomorphism p : C ∗ (G1 ) → C ∗ (H ) which is a left-inverse for i1 . We get in this way the following corollary. Corollary 2.4. Let G1 and G2 be countable discrete amenable groups with a common finite subgroup H ⊆ Gi , i = 1, 2, and B a separable stable C ∗ -algebra. Let G1 ∗H G2 be the amalgamated free product group. Assume that G1 is abelian. It follows that every extension of Cr∗ (G1 ∗H G2 ) by B is strongly homotopy invertible with an invertible inverse. Example 2.5. It is known that Sl2 (Z) Z4 ∗Z2 Z6 , cf. p. 11 in [22]. Hence Corollary 2.4 applies. (As the generator of Z4 one can use 01 −1 , 0 1 −1 and 1 0 can serve as the generator of Z6 . The amalgamation is over the subgroup ±1.) It has been shown by Hadwin and Shen in Corollary 4.4 of [10] that one can get an example of a non-invertible extension of Cr∗ (Sl2 (Z)) by K, starting from the non-invertible extension of Cr∗ (F2 ) found by Haagerup and Thorbjørnsen in [9]. This means that concerning invertibility of extensions of Cr∗ (Sl2 (Z)) the situation is as for Cr∗ (F2 ): For every stabilization B of a unital separable C ∗ -algebra there are non-invertible extensions of Cr∗ (Sl2 (Z)) by B, but all are semiinvertible. And the inverse (for semi-invertibility) can be taken to be invertible. For the full group C ∗ -algebra C ∗ (Sl2 (Z)) the situation is also as for F2 , namely that all extensions by C ∗ (Sl2 (Z)) are invertible. This follows from [2] when the ideal is K and from [24] when it is an arbitrary separable stable C ∗ -algebra. Remark 2.6. The KK-condition of Theorem 2.3 can fail even when G1 and G2 are finite and equal, and H is abelian. Here is the simplest example. Let α be the unique non-trivial automorphism of Z3 which has order 2 and let G1 = Z3 α Z2 be the semidirect product by this automorphism. Thus G1 is a copy of the symmetric group S3 . Set H = Z3 ⊂ G1 . Let B = K. Then KK(C ∗ (G), B) ∼ = R(G) for any finite group G, where R(G) denotes the Grothendieck group of the semi-group generated by irreducible (necessarily finite-dimensional) representations of G. The functorial map KK(C ∗ (G1 ), B) → KK(C ∗ (H ), B) becomes the restriction map R(G1 ) → R(H ) after the above identification. The abelian group R(H ) is freely generated by
1454
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
the three one-dimensional representations, ρ0 , ρ1 and ρ2 , that send a fixed generator of H to 1, e2πi/3 and e−2πi/3 , respectively. As the number of irreducible representations equals the number of conjugacy classes by the Burnside theorem, and as the group order equals the sum of squares of the dimensions of these representations, it follows that G1 has three irreducible representations; two, σ0 and σ1 , of dimension 1 and one, τ , of dimension 2. Thus, R(G1 ) is freely generated by three representations, σ0 , σ1 and τ . One of the one-dimensional representations, σ0 , is the identity one, and the other, σ1 , maps H to 1 and G1 \ H to −1. Restrictions of both to H equal the trivial representation ρ0 of H . The two-dimensional representation τ is the orthogonal complement to the constant functions in the obvious representation of G1 on l 2 (H ) ∼ = C3 . Then it is easy to see that τ |H = ρ1 ⊕ ρ2 . Thus, the restriction map R(G1 ) → R(H ) is not surjective. This example goes only to show that the KK-condition of Theorem 2.3 is not vacuous. For all we know the conclusion of Theorem 2.3 may very well be true without this condition. 3. Amalgamated free product C ∗ -algebras In this section we consider free products of C ∗ -algebras with amalgamation. The first result is an application of the relative K-homology developed by the authors in [18]. Theorem 3.1. Let A1 , A2 and B be separable C ∗ -algebras, B stable. Let D be a common C ∗ -subalgebra of A1 and A2 , i.e. D ⊆ A1 and D ⊆ A2 . Assume that 1) there is a ∗-homomorphism α0 : A1 ∗D A2 → M(B) such that also α0 |A1 , α0 |A2 and α0 |D are absorbing, and 2) Ext(A1 , B) and Ext(A2 , B) are both groups. It follows that every extension of A1 ∗D A2 by B is strongly homotopy invertible. Proof. Set α = qB ◦ α0 and consider an extension ϕ : A1 ∗D A2 → Q(B). By assumption 2) there is an extension ψi : Ai → Q(B) representing the inverse of ϕ|Ai in Ext(Ai , B) both for i = 1 and i = 2. Then ψ1 |D and ψ2 |D represent the same element in Ext(D, B), namely the inverse of the element represented by ϕ|D . After addition of α0 |Ai to ϕ|Ai we therefore assume that ψ1 |D and ψ2 |D are unitarily equivalent. Thus, after conjugating ψ2 by a unitary, we can arrange that ψ1 |D = ψ2 |D . Then ψ = ψ1 ∗D ψ2 : A1 ∗D A2 → Q(B) is defined. Set Φ = ϕ ⊕ ψ . By adding a copy of α to Φ both extensions Φ|Ai : Ai → Q(B), i = 1, 2, become split, i.e. there are ∗-homomorphisms Φi : Ai → M(B) such that qB ◦ Φi = Φ|Ai , i = 1, 2. By passing to a unitarily equivalent extension, i.e. by conjugating Φ by a unitary of the form qB (u), we can arrange that in addition qB ◦ Φ2 = α|A2 and that Φ2 = α0 |A2 . Then qB ◦ Φ1 represents an element of the relative extension semi-group ExtD,α|A1 (A1 , B), cf. [18]. In fact, it follows from Lemma 3.2 of [18] and assumption 2) that qB ◦ Φ1 is invertible in this semi-group, i.e. qB ◦ Φ1 ∈ Ext−1 D,α|A (A1 , B). Let 1
Φ1 : A1 → Q(B) represent the inverse of qB ◦ Φ1 in Ext−1 D,α|A1 (A1 , B) and note that Φ1 ∗D α|A2 : A1 ∗D A2 → Q(B) is then defined. After addition by this extension to Φ we can assume that Φ1 represents 0 in Ext−1 D,α|A1 (A1 , B). By definition of ExtD,α|A1 (A1 , B) this means that there is a unitary u in the connected component of 1 in the relative commutant of α(D) in Q(B) such that
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1455
Ad u ◦ qB ◦ Φ1 = α|A1 . Let ut , t ∈ [0, 1], be a continuous path of unitaries in α(D) ∩ Q(B) such that u0 = 1 and u1 = u. Then ψt = (Ad ut ◦ qB ◦ Φ1 ) ∗D (qB ◦ Φ2 ) is defined for every t ∈ [0, 1], and ψt , t ∈ [0, 1], is a strong homotopy of extensions connecting Φ = ψ0 to ψ1 = qB ◦ α. This completes the proof. 2 Condition 1) of Theorem 3.1 is always satisfied when D is nuclear or is the range of a conditional expectation Ai → D for both i = 1 and i = 2, but it can fail in general, see [24]. Condition 2) is satisfied when A1 and A2 are nuclear so Theorem 3.1 has the following corollary. Corollary 3.2. Let A1 , A2 and B be separable C ∗ -algebras, B stable. Let D be a common C ∗ -subalgebra of A1 and A2 , i.e. D ⊆ A1 and D ⊆ A2 . If A1 , A2 and D are all nuclear it follows that every extension of A1 ∗D A2 by B is strongly homotopy invertible. The next theorem shows that condition 2) of Theorem 3.1 can be weakened when D is nuclear, at the price of a slightly weaker conclusion. Theorem 3.3. Let A1 , A2 and B be separable C ∗ -algebras, B stable. Let D be a common C ∗ -subalgebra of A1 and A2 , i.e. D ⊆ A1 and D ⊆ A2 . Assume that 1) there is a ∗-homomorphism β : A1 ∗D A2 → M(B) such that β|D : D → M(B) is absorbing, 2) Ext(D, B) and Ext(D, C0 ([1, ∞), B)) are both groups, and 3) all extensions of A1 by B and all extensions of A2 by B are semi-invertible. It follows that all extensions of A1 ∗D A2 by B are semi-invertible. Proof. By adding units to A1 , A2 and D if necessary, we may assume that D is unital. Step 1. (Finding the first candidate for the inverse.) Let ϕ : A1 ∗D A2 → Q(B) be an extension. By assumption 2) there are extensions ψi : Ai → Q(B) such that ϕ|Ai ⊕ ψi : Ai → Q(B) are asymptotically split, i = 1, 2. By assumption 2) Ext(D, B) is a group and hence [ψ1 |D ] = [ψ2 |D ] = −[ϕ|D ] in Ext(D, B). (There are various ways to see this; it follows for example from Lemma 4.7 of [15].) Furthermore, by assumption 1) there is a ∗-homomorphism β : A1 ∗D A2 → M(B) such that β|D is absorbing. So after adding by qB ◦ β|A1 to ψ1 and qB ◦ β|A2 to ψ2 we may assume that ψ1 |D and ψ2 |D are unitarily equivalent, and hence without loss of generality that ψ1 |D = ψ2 |D . Then we have a candidate for a semiinverse to ϕ, namely ψ1 ∗D ψ2 . We will show that after addition by additional extensions (some of which may be non-trivial), ϕ ⊕ (ψ1 ∗D ψ2 ) becomes asymptotically split. Step 2. (Removing a KK-obstruction.) First note that ϕ ⊕ (ψ1 ∗D ψ2 ) is split over D. Hence, by adding a copy of qB ◦ β to ϕ and conjugating by a unitary we can arrange that ϕ ⊕ (ψ1 ∗D ψ2 )|D = qB ◦ β|D .
(3.1)
1456
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
Let ξ i : Ai → M(B) be equi-continuous asymptotic homomorphisms such that qB ◦ ξti = ϕ|Ai ⊕ ψi for all t, i = 1, 2. Note that by (3.1) we have that ξti (d) − β(d) ∈ B
(3.2)
for all t ∈ [1, ∞), d ∈ D, i = 1, 2. Let β ∞ denote the direct sum of a countable infinite number of copies of β and set π = 1C0 [1,∞) ⊗ β ∞ ; i.e. 1C0 [1,∞) is the unit in the multiplier algebra M(C0 [1, ∞)) and π(x) = 1C0 [1,∞) ⊗ β ∞ (x) ∈ M(C0 [1, ∞), B). Then π : D → M(C0 [1, ∞), B) is absorbing by Lemma 2.3 of [25]. Since Ext(D, C0 [1, ∞), B) is the trivial group by assumption 2), this implies that there is a strictly continuous path Ut , t ∈ [1, ∞), of unitaries in M(B) such that t → Ut ξt1 (d) ⊕ β ∞ (d) Ut∗ − ξt2 (d) ⊕ β ∞ (d)
(3.3)
is in (C0 [1, ∞), B) for all d ∈ D. For each n ∈ N, Ut , t ∈ [1, n], defines a unitary Wn in M(C[1, n] ⊗ B) in a natural way. Set πn = 1C[1,n] ⊗ β ∞ |D and βn = 1C[1,n] ⊗ β|D . Then (3.3) and (3.2) imply that Wn (βn ⊕ πn )(d)Wn∗ − (βn ⊕ πn )(d) ∈ C[1, n] ⊗ B
(3.4)
for all d ∈ D, i.e. Wn is a unitary in the C ∗ -algebra Dβn ⊕πn (D), cf. (2.5). Note that βn ⊕ πn is absorbing, again by Lemma 2.3 of [25], so that K1 (Dβn ⊕πn (D)) = KK(D, C[1, n] ⊗ B) by (3.2) of [25]. Identifying KK(D, C[1, n] ⊗ B) and KK(D, B) we can say that Ad Wn ◦ (βn ⊕ πn ), (βn ⊕ πn ) = Ad U1 ◦ β|D ⊕ β ∞ D , β|D ⊕ β ∞ D
(3.5)
in KK(D, C[1, n] ⊗ B). Add then the extension qB ◦ Ad U1 ◦ β ⊕ β ∞ A ∗D qB ◦ β ⊕ β ∞ A 1
2
to ϕ ⊕ (ψ1 ∗D ψ2 ). We can then exchange ξt1 by ξt1 ⊕ Ad U1 ◦ (β ⊕ β ∞ )|A1 , ξt2 by ξt2 ⊕ (β ⊕ β ∞ )|A2 , and Ut by Ut ⊕ U1∗ . We may therefore return to the previous notation and conclude from (3.5) that Ad Wn ◦ (βn ⊕ πn ), (βn ⊕ πn ) = 0 in KK(D, C[1, n] ⊗ B) for all n. It follows therefore that diag(Wn , 1, 1, . . . , 1) is in the connected component of 1 in the unitary group of Mkn (Dβn ⊕πn (D)) for some kn ∈ N, kn 2. Since βn ⊕ πn is absorbing, there is an isomorphism from Mkn (Dβn ⊕πn (D)) onto M2 (Dβn ⊕πn (D)) which takes diag(Wn , 1, 1, . . . , 1) to diag(Wn , 1). It follows that diag(Wn , 1) is in the connected component of 1 in the unitary group of M2 (Dβn ⊕πn (D)) for each n. After addition by the split extension β ∞ so that we can substitute Wn ⊕ 1 for Wn , we may therefore assume that Wn is in the connected component of 1 in the unitary group of Dβn ⊕πn (D) for each n ∈ N. Step 3. (The tricky part. This is an elaboration on ideas developed by Lin, Dadarlat and Eilers, in [13,8], and a very similar argument was used to prove Theorem 4.1 in [25].) Let En denote the C ∗ -subalgebra of M(C[1, n] ⊗ B) generated by the unit 1C[0,1]⊗B , C[1, n] ⊗ B and (βn ⊕ πn )(D). It follows from (3.4) that Ad Wn defines an automorphism αn
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1457
of En , and the path of unitaries in Dβn ⊕πn (D) connecting Wn to 1 gives us a uniform normcontinuous path of automorphisms in Aut En connecting αn to the identity in Aut En . Since En is separable, it follows from 8.7.8 and 8.6.12 in [19], cf. Proposition 2.15 of [8], that αn is asymptotically inner, i.e. there is a continuous path Vsn , s ∈ [1, ∞), of unitaries in En such that αn (x) = lims→∞ Vsn xVsn∗ for all x ∈ En . Let F1 ⊆ F2 ⊆ F3 ⊆ · · · be a sequence of finite subsets with dense union in D. Since lim sup Vsn (t) ξt1 ⊕ β ∞ D (d)Vsn (t)∗ − Ut ξt1 ⊕ β ∞ D (d)Ut∗ = 0 s→∞ t∈[1,n]
for all d ∈ D, we can find an sn ∈ [1, ∞) so big that n 1 V (t) ξ ⊕ β ∞ (d)V n (t)∗ − Ut ξ 1 ⊕ β ∞ (d)U ∗ 1 s t s t t D D n
(3.6)
for all s sn , all t ∈ [1, n] and all d ∈ Fn . Note that ∗ lim V n+1 (n) Vsn (n)xVsn (n)∗ Vsn+1 (n) = x s→∞ s
(3.7) ∗
for all x ∈ B ∪ (ξt1 ⊕ β ∞ )(D), t ∈ [1, n]. To simplify notation, set ks = Vsk+1 (k) Vsk (k). It follows from (3.7) that if we increase sn we can arrange that k 1 ξ ⊕ β ∞ (d)k∗ − ξ 1 ⊕ β ∞ (d) 1 s t s t D D n2
(3.8)
for all d ∈ Fn , t ∈ [1, n], and all k = 2, 3, . . . , n, when s sn . Proceeding inductively we can arrange that sn < sn+1 for all n. Let s : [1, ∞) → [1, ∞) be a continuous increasing function such that s(n) = sn+1 , n = 1, 2, 3, . . . . Define a norm-continuous path Wt , t ∈ [1, ∞), in E = C ∗ 1B , ξ11 ⊕ β ∞ D (D), B = C ∗ 1B , β ⊕ β ∞ D (D), B 2 (t), t ∈ [1, 2], and W = V k+1 (t)k · · · 3 2 , t ∈ [k, k + 1], k 2. such that Wt = Vs(t) t s(t) s(t) s(t) s(t) Let d ∈ Fn and consider t ∈ [k, k + 1], where k n. Since s(t) sk+1 and d ∈ Fk+1 , it follows from (3.8) that
k+1 k+1 Wt ξt1 ⊕ β ∞ D (d)Wt∗ ∼k· 1 Vs(t) (t) ξt1 ⊕ β ∞ D (d)Vs(t) (t)∗ ,
(3.9)
k2
where ∼δ means that the distance between the two elements is at most δ. Furthermore, it follows from (3.6) that k+1 k+1 Vs(t) (t) ξt1 ⊕ β ∞ D (d)Vs(t) (t)∗ ∼ 1 Ut ξt1 ⊕ β ∞ D (d)Ut∗ . k
(3.10)
It follows from (3.10), (3.9) and (3.3) that lim Wt ξt1 ⊕ β ∞ D (d)Wt∗ − ξt2 ⊕ β ∞ D (d) = 0,
t→∞
(3.11)
first when d ∈ Fn , and then for all d ∈ D since n was arbitrary and {ξti }i,t equi-continuous.
1458
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
Recall that D is unital. For each t there are unique elements xt ∈ D, λt ∈ C and bt ∈ B such that ⊥ Wt = ξt1 ⊕ β ∞ D (xt ) + λt ξt1 ⊕ β ∞ D (1) + bt . Since qB ◦ (ξt1 ⊕ β ∞ |D ) = qB ◦ (ξ11 ⊕ β ∞ |D ) is injective we find that {xt } must be a continuous path of unitaries in D such that limt→∞ xt dxt∗ = d for all d ∈ D. Set Ut = Wt ξt1 ⊕ β ∞ D (xt )∗ + Wt λt ξt1 ⊕ β ∞ D (1)⊥ . Then Ut , t ∈ [1, ∞), is a continuous path of unitaries 1 + B such that lim Ut ξt1 ⊕ β ∞ D (d)Ut∗ − ξt2 ⊕ β ∞ D (d) = 0
t→∞
for all d ∈ D. Step 4. (Conclusion.) By adding the split extension qB ◦ β ∞ we can now return to the notation in Step 1 and assume that Ut , t ∈ [1, ∞), is a continuous path of unitaries 1 + B such that lim Ut ξt1 (d)Ut∗ − ξt2 (d) = 0
t→∞
(3.12)
for all d ∈ D. Set A = f ∈ Cb [1, ∞), M(B) : f (1) − f (t) ∈ B ∀t ∈ [1, ∞) and note that C0 ([1, ∞), B) is an ideal in A. Let p : A → A/C0 [1, ∞), B be the quotient map. Define ∗-homomorphisms κ1 : A1 → A and κ2 : A2 → A such that κ1 (a)(t) = Ut ξt1 (a)Ut∗ and κ2 (a)(t) = ξt2 (a), respectively. Since Ut ξt1 (d)Ut∗ − ξt2 (d) ∈ D for all t and d ∈ D, it follows from (3.12) that (p ◦ κ1 ) ∗D (p ◦ κ2 ) : A1 ∗D A2 → A/C0 [1, ∞), B is defined. By composing this ∗-homomorphism with a continuous right-inverse for p, whose existence follows from the Bartle–Graves selection theorem, we get an asymptotic homomorphism Φ : A1 ∗D A2 → M(B) such that qB ◦ Φt = ϕ ⊕ (ψ1 ∗D ψ2 ) for all t. 2 Corollary 3.4. Let A1 , A2 and B be separable C ∗ -algebras, B stable. Let D be a common C ∗ -subalgebra of A1 and A2 , i.e. D ⊆ A1 and D ⊆ A2 . Assume that 1) D is nuclear, and 2) all extensions of A1 by B and all extensions of A2 by B are semi-invertible. It follows that all extensions of A1 ∗D A2 by B are semi-invertible.
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1459
Proof. It is well known that condition 2) of Theorem 3.3 is fulfilled when D is nuclear. That condition 1) also holds follows from Lemma 2.2 of [24]. 2 One important virtue of Theorem 3.3 and Corollary 3.4 when compared with Theorem 3.1 is the improved symmetry between assumptions and conclusions which allows it to be used iteratively, for example to reach the following conclusion: Let A1 , A2 , A3 , A4 be separable C ∗ -algebras, D1 ⊆ A1 , D1 ⊆ A2 , and D2 ⊆ A3 , D2 ⊆ A4 common C ∗ -algebras. Assume that the Ai ’s and Di ’s are all nuclear, and let E be a common nuclear C ∗ -subalgebra of A1 ∗D1 A2 and A3 ∗D2 A4 . It follows that all extensions of (A1 ∗D1 A2 ) ∗E (A3 ∗D2 A4 ) by a separable stable C ∗ -algebra B are semi-invertible. 4. Full group C ∗ -algebras In this section we collect some consequences of Theorem 3.1 and Theorem 3.3 for the semiinvertibility of extensions by full group C ∗ -algebras. Proposition 4.1. Let G1 , G2 be countable discrete groups and H ⊆ Gi , i = 1, 2, a common subgroup. Set G = G1 ∗H G2 and let B be a separable stable C ∗ -algebra. Assume that Ext(C ∗ (Gi ), B), i = 1, 2, are both groups. It follows that every extension of C ∗ (G) by B is strongly homotopy invertible. Proof. We can apply Theorem 3.1 because C ∗ (G) = C ∗ (G1 ) ∗C ∗ (H ) C ∗ (G2 ). Indeed, there are canonical conditional expectations C ∗ (G) → C ∗ (H ) and C ∗ (G) → C ∗ (Gi ), i = 1, 2, so any absorbing ∗-homomorphism α0 : C ∗ (G) → M(B), whose existence is guaranteed by [23], will meet the requirements in 1) of Theorem 3.1 by Lemma 2.1 of [24]. The conclusion of the corollary follows therefore from Theorem 3.1. 2 Similarly, Theorem 3.3 implies the following. Proposition 4.2. Let Gi , i = 1, 2, be discrete countable groups with a common subgroup H ⊆ Gi , i = 1, 2, and B a separable stable C ∗ -algebra. Let G1 ∗H G2 be the amalgamated free product group and let B be a separable stable C ∗ -algebra. Assume that 1) Ext(C ∗ (H ), B) and Ext(C ∗ (H ), C0 [1, ∞) ⊗ B) are both group, and 2) for both i = 1 and i = 2 every extension of C ∗ (Gi ) by B is semi-invertible. It follows that every extension of C ∗ (G1 ∗H G2 ) by B is semi-invertible. As is well known, condition 1) in Proposition 4.2 is satisfied when H is amenable, but it is also satisfied for certain non-amenable groups, e.g. free groups or an amalgamated free product of amenable groups over a finite subgroup. We shall finish this paper by showing that the conclusions of Propositions 4.1 and 4.2, and partly also the conclusion of Theorem 2.3, are preserved by taking the product of the group with a group of the form Zk ⊕ H , with H finite.
1460
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
Lemma 4.3. Let A and B be separable C ∗ -algebras, B stable. There are semi-group homomorphisms μ : Ext(A, B) → Ext(A ⊗ K, B) and ν : Ext(A ⊗ K, B) → Ext(A, B) such that μ ◦ ν(x) ⊕ 0 = x ⊕ 0 for all x ∈ Ext(A ⊗ K, B) and ν ◦ μ(y) ⊕ 0 = y ⊕ 0 for all Ext(A, B). Proof. Since B is stable we can identify B and K ⊗ B. Let e be a minimal projection in K and let V ∈ M(K ⊗ K ⊗ B) be an isometry such that V V ∗ = e ⊗ 1K⊗B . Then α(x) = V ∗ (e ⊗ x)V is an isomorphism α : K ⊗ B → K ⊗ K ⊗ B, giving us isomorphisms M(K ⊗ B) → M(K ⊗ K ⊗ B) and Q(K ⊗ B) → Q(K ⊗ K ⊗ B) which we also denote by α. Let s : A → K ⊗ A be the ∗-homomorphism s(a) = e ⊗ a. We can then define a map Ext(K ⊗ A, K ⊗ K ⊗ B) → Ext(A, K ⊗ B)
(4.1)
by ϕ → α −1 ◦ ϕ ⊗ s. To get a map in the other direction note that the canonical embedding K ⊗ M(K ⊗ B) ⊆ M(K ⊗ K ⊗ B) induces a ∗-homomorphism L : K ⊗ Q(K ⊗ B) → Q(K ⊗ K ⊗ B) which we can use to define a map Ext(A, K ⊗ B) → Ext(K ⊗ A, K ⊗ K ⊗ B)
(4.2)
by ϕ → L ◦ (idK ⊗ ϕ). Then α −1 ◦ (L ◦ (idK ⊗ ϕ)) ◦ s = Ad qK⊗B (W ) ◦ ϕ for some isometry W ∈ M(K ⊗ B), showing that −1 α ◦ L ◦ (idK ⊗ ϕ) ◦ s ⊕ 0 = [ϕ ⊕ 0] in Ext(A, K ⊗ B). Consider next an extension ϕ : K ⊗ A → Q(K ⊗ K ⊗ B). Note that L ◦ idK ⊗ α −1 ◦ ϕ ◦ s (k ⊗ a) = L k ⊗ α −1 ϕ(e ⊗ a) on simple tensors, k ∈ K, a ∈ A. Since the automorphism of Q(K ⊗ K ⊗ A) which interchange the two copies of K is given by a unitary in M(K ⊗ K ⊗ B), the extension L ◦ (idK ⊗ (α −1 ◦ ϕ ◦ s)) is unitarily equivalent to an extension ψ : K ⊗ A → Q(K ⊗ K ⊗ B) such that ψ(k ⊗ a) = L e ⊗ α −1 ϕ(k ⊗ a) on simple tensors. Since L(e ⊗ α −1 (ϕ(k ⊗ a))) = Ad qK⊗K⊗B (V )(ϕ(k ⊗ a)), we see that the two maps, (4.1) and (4.2) are inverses of each other, up to addition by 0. Since both maps clearly are semi-group homomorphisms, the proof is complete. 2 Corollary 4.4. Let A and B be separable C ∗ -algebras, B stable. Then all extensions of A by B are semi-invertible or strongly homotopy invertible if and only if the same is true for all extensions of Mn (A) by B, for any n ∈ N. Lemma 4.5. Let A1 , A2 and B be separable C ∗ -algebras, B stable. Assume that all extensions of Ai by B are semi-invertible or are strongly homotopy invertible (with an invertible inverse), i = 1, 2. It follows that all extensions of A1 ⊕ A2 by B have the same property.
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
1461
Proof. Let pi : A1 ⊕ A2 → Ai ⊆ A1 ⊕ A2 , i = 1, 2, be the canonical projections, and consider an extension ϕ : A1 ⊕ A2 → Q(B). By a standard rotation argument ϕ ⊕ 0 is strongly homotopic to the sum (ϕ ◦ p1 ) ⊕ (ϕ ◦ p2 ). The conclusion follows from this by using of Theorem 2.1. 2 By combining Corollary 4.4 and Lemma 4.5 we get the following. Corollary 4.6. Let A, F and B be separable C ∗ -algebras, B stable, F finite-dimensional. Assume that all extensions of A by B are semi-invertible or are strongly homotopy invertible (with an invertible inverse). It follows that all extensions of F ⊗ A by B have the same property. In particular, it follows that if G is a countable discrete group with the property that all extensions of Cr∗ (G) by B are semi-invertible or strongly homotopy invertible (with an invertible inverse), then the same is true for Cr∗ (H × G) for any finite group H . Lemma 4.7. Let A and B be separable C ∗ -algebras, B stable. Assume that all extensions of A by B are semi-invertible or strongly homotopy invertible. It follows that all extensions of C(T) ⊗ A by B have the same property. Proof. Let χ be the automorphism of C(T) ⊗ A such that χ(f )(z) = f (z) and let ev : C(T) ⊗ A → A be evaluation at 1 ∈ T. As is well known the ∗-homomorphism C(T) ⊗ A → M2 (C(T) ⊗ A) defined such that f →
f χ(f )
is homotopic to a ∗-homomorphism which factorizes through ev. It follows that for any extension ϕ : C(T) ⊗ A → Q(B) the extension ϕ ⊕ ϕ ◦ χ is strongly homotopic to an extension of the form ψ ◦ ev, where ψ : A → Q(B) is an extension of A by B. By assumption there is an extension ψ of A by B such that ψ ⊕ ψ is either asymptotically split or strongly homotopic to a split extension. It follows that ϕ ⊕ ϕ ◦ χ ⊕ ψ ◦ ev has the same property by Theorem 2.1. Hence ϕ is semi-invertible or strongly homotopy invertible, as the case may be. 2 Proposition 4.8. Let G be a countable discrete group, H a finite group and k ∈ N. Let B be a separable stable C ∗ -algebra and assume that all extensions of Cr∗ (G) (resp. C ∗ (G)), by B are semi-invertible or strongly homotopy invertible. It follows that all extensions of Cr∗ (Zk × H × G) (resp. C ∗ (Zk × H × G)), by B have the same property. Proof. Note that Cr∗ (Zk × H × G) C(Tk ) ⊗ C ∗ (H ) ⊗ Cr∗ (G), and that C ∗ (H ) is finitedimensional. It follows then from Corollary 4.6 and Lemma 4.7 that all extensions of Cr∗ (Zk × H × G) by B are semi-invertible or strongly homotopy invertible if Cr∗ (G) has this property. The same argument works for the full group C ∗ -algebra. 2 Finally, we observe that it is also possible to use Theorem 3.1 and Theorem 3.3 to prove semiinvertibility for extensions of the full group C ∗ -algebra of certain HNN-extensions by using the realization obtained by Ueda in [28] of such group C ∗ -algebras as amalgamated free products.
1462
V. Manuilov, K. Thomsen / Journal of Functional Analysis 260 (2011) 1446–1462
Acknowledgment The main part of this work was done during a stay of both authors at the Mathematische Forchungsinstitut in Oberwolfach in January 2010 in the framework of the ‘Research in Pairs’ programme. We want to thank the MFO for the perfect working conditions. References [1] J. Anderson, A C ∗ -algebra for which Ext(A) is not a group, Ann. of Math. 107 (1978) 455–458. [2] L. Brown, Ext of certain free product C ∗ -algebras, J. Operator Theory 6 (1981) 135–141. [3] L.G. Brown, R.G. Douglas, P.A. Fillmore, Unitary equivalence modulo the compact operators and extensions of C ∗ -algebras, in: Proc. Conf. on Operator Theory, in: Lecture Notes in Math., vol. 345, Springer-Verlag, 1973, pp. 58–128. [4] L.G. Brown, R.G. Douglas, P.A. Fillmore, Extensions of C ∗ -algebras and K-theory, Ann. of Math. 105 (1977) 265–324. [5] P.-A. Cherix, M. Cowling, P. Jolissaint, P. Julg, A. Valette, Groups with the Haagerup Property, Birkhäuser Verlag, 2001. [6] A. Connes, N. Higson, Déformations, morphismes asymptotiques et K-théories bivariante, C. R. Math. Acad. Sci. Paris 311 (1990) 101–106. [7] J. Cuntz, K-theoretic amenability for discrete groups, J. Reine Angew. Math. 344 (1983) 180–195. [8] M. Dadarlat, S. Eilers, Asymptotic unitary equivalence in KK-theory, K-Theory 23 (2001) 305–322. ∗ (F )) is not a group, Ann. of [9] U. Haagerup, S. Thorbjørnsen, A new application of random matrices: Ext(Cred 2 Math. 162 (2005) 711–775. [10] D. Hadwin, J. Shen, Some examples of Blackadar and Kirchberg’s MF algebras, preprint, arXiv:0806.4712v4 [math.OA]. [11] D. Hadwin, J. Li, J. Shen, J. Wang, Reduced free products of unital AH algebras and Blackadar and Kirchberg’s MF algebras, preprint, arXiv:0812.0189v1 [math.OA]. [12] N. Higson, G. Kasparov, E-theory and KK-theory for groups which act properly and isometrically on Hilbert space, Invent. Math. 144 (2001) 23–74. [13] H. Lin, Stable approximate unitary equivalence of homomorphisms, J. Operator Theory 47 (2002) 343–378. [14] V. Manuilov, Asymptotic representations of the reduced C ∗ -algebra of a free group: an example, Bull. London Math. Soc. 40 (2008) 838–844. [15] V. Manuilov, K. Thomsen, E-theory is a special case of KK-theory, Proc. London Math. Soc. 88 (2004) 455–478. [16] V. Manuilov, K. Thomsen, The Connes–Higson construction is an isomorphism, J. Funct. Anal. 213 (2004) 154– 175. [17] V. Manuilov, K. Thomsen, On the lack of inverses to C ∗ -extensions related to property T groups, Canad. Math. Bull. 50 (2007) 268–283. [18] V. Manuilov, K. Thomsen, Relative K-homology and normal operators, J. Operator Theory 62 (2009) 249–279. [19] G.K. Pedersen, C ∗ -Algebras and Their Automorphisms Group, Academic Press, New York, 1979. [20] J.A. Seebach, On the reduced amalgamated free products of C ∗ -algebras and the MF-property, arXiv:1004.3721. [21] J.A. Seebach, K. Thomsen, Extensions of the reduced group C ∗ -algebra of a free product of amenable groups, Adv. Math. 223 (2010) 1845–1854. [22] J.-P. Serre, Trees, Springer-Verlag, Berlin, 1977. [23] K. Thomsen, On absorbing extensions, Proc. Amer. Math. Soc. 129 (2001) 1409–1417. [24] K. Thomsen, On the KK-theory and the E-theory of amalgamated free products of C ∗ -algebras, J. Funct. Anal. 201 (2003) 30–56. [25] K. Thomsen, Homotopy invariance in E-theory, Homology, Homotopy Appl. 8 (2006) 29–49. [26] K. Thomsen, All extensions of Cr∗ (Fn ) are semi-invertible, Math. Ann. 342 (2008) 273–277. [27] J.L. Tu, La conjecture de Baum–Connes pour les feuilletages moyennables, K-Theory 17 (1999) 215–264. [28] Y. Ueda, Remarks on HNN extensions in operator algebras, Illinois J. Math. 52 (2008) 705–725.
Journal of Functional Analysis 260 (2011) 1463–1475 www.elsevier.com/locate/jfa
Integrating representations of Banach–Lie algebras Stéphane Merigon Universität Erlangen-Nürnberg, Department Mathematik AG Lie-Gruppen, Bismarckstrasse 1 1/2, Erlangen, Germany Received 8 June 2010; accepted 15 October 2010
Communicated by P. Delorme
Abstract We give two integrability criteria for representations of Banach–Lie algebras as skew-symmetric unbounded operators on a dense domain of a Hilbert space. One of them is based on analytic vectors. © 2010 Published by Elsevier Inc. Keywords: Banach–Lie groups and algebras; Integrability of unitary representations; Analytic vectors
1. Introduction In this note we give two integrability criteria for a representation α : g → End(D) of a Banach– Lie algebra g as skew-symmetric unbounded operators on a dense domain D of a Hilbert space, that is, sufficient conditions for the existence of a continuous unitary representation of a simply connected Banach–Lie group with Lie algebra g (when it exists) whose derived representation extends α. After Nelson’s famous criterion [9], new ones (for finite dimensional Lie algebras) appeared in the late sixties and early seventies, also based on analytic vectors (see [2,10]) or on smooth vectors (see [3]). In both cases the key result is the validity of the commutation relation (1) eα(x) α(y)e−α(x) = α ead x y , for every x in a Lie-generating subset of g and any y in g. It is used to transfer computations in the space of operators to computations in the Lie algebra so that the integrability follows from formulas in g. E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Published by Elsevier Inc. doi:10.1016/j.jfa.2010.10.011
1464
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
We consider a Banach–Lie algebra g which decomposes as g = a1 ⊕ a2 ⊕ · · · ⊕ an , where aj , j = 1, 2, . . . , n,are closed subspaces and we prove that the representation integrates if (1) holds for every x ∈ aj and y ∈ g. This also leads to a criterion based on analytic vectors and generalising [2]: the representation integrates if D consists of analytic vectors for every α(x), x ∈ aj (for a generalisation of Nelson’s criterion see [11]). The new difficulty in the Banach setting is that we have to differentiate paths of the form t → eα(x(t)) v,
(2)
where x(t) is a smooth path in aj , but (1) enables us to do that. The derivative of (2) involves the logarithmic derivative of x(t), therefore a formula relating such derivatives is needed. These results are particularly well suited for the study of symmetric or 3-graded Lie algebras. In a forthcoming work [5] with Karl-Hermann Neeb we will use them to prove a generalisation of the Lüscher–Mack Theorem [4, Appendix C] to the Banach–Lie setting. This is a crucial tool for the study of the representation theory of the automorphisms groups of infinite dimensional real symmetric domains. The integrability criteria are stated in Section 2. In Section 3 the relation (1) is discussed and used to prove the differentiability of (2) while the relevant formula for logarithmic derivatives is given in Section 4. The proof of the integrability criteria is achieved in Section 5. 2. Main results Let g be a Banach–Lie algebra with Lie bracket [·,·]. A representation α of g on a (dense) subspace D of a Hilbert space H is a linear map which associates to any x ∈ g a skew-symmetric unbounded operator α(x) : D → D, in such a way that α [x, y] = α(x), α(y) := α(x)α(y) − α(y)α(x). The representation is said to be strongly continuous if for every v ∈ D the map α v : g → H,
x → α(x)v
is continuous. Let G be a Banach–Lie group with Lie algebra g and π : G → U(H) be a continuous unitary representation of G in H. Each element x ∈ g gives rise to a one-parameter unitary group π(exp tx) and hence by Stone’s Theorem to a skew-adjoint operator d dπ(x)v := π(exp tx)v dt t=0 defined on the set of vectors v for which the limit exists. The derived representation is the (strongly continuous) representation of g defined on the space H∞ of smooth vectors (those vectors for which the orbit map is smooth) by dπ(x) := dπ(x)|H∞ .
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1465
When G is finite dimensional H∞ is dense and since it is invariant under the action of G, the operators dπ(x) are essentially skew-adjoint, but for an arbitrary Banach–Lie group H∞ may be empty. For issues related to smooth vectors for representations of infinite dimensional Lie groups see [7]. We say that a strongly continuous representation α on the dense domain D integrates to a continuous unitary representation of G if there exists such a representation π with D ⊆ H∞ and dπ|D = α. We below assume that g has a decomposition g = a1 ⊕ a2 ⊕ · · · ⊕ an , where aj , j = 1, 2, . . . , n, are closed subspaces. The main theorem will be stated for a strongly continuous representation α on a dense domain D which satisfies the following assumptions: (A1) For all x ∈ aj , α(x) is essentially skew-adjoint, i.e., its closure α(x) is skew-adjoint, hence generates continuous one-parameter unitary group etα(x) := etα(x) , t ∈ R. a strongly α(x) (A2) For all x ∈ aj , e D ⊆ D. (A3) For all (x, y) ∈ ( aj , g) and v ∈ D, the commutation relation eα(x) α(y)e−α(x) v = α ead x y v holds. Theorem 1. Let G be a simply connected Banach–Lie group with Lie algebra g. Any strongly continuous representation of g satisfying (A1)–(A3) integrates to a continuous unitary representation of G. First we give a corollary in which the assumption (A3) is weakened (see [3, Theorem 9.1], where in the case of finite dimensional Lie algebras it is weakened even further). Corollary 2. Let G be a simply connected Banach–Lie group with Lie algebra g. Any strongly continuous representation of g satisfying (A1)–(A2) and (A3 ) for all (x, y) ∈ ( aj , g) and v ∈ D, the map R → D, t → α(y)etα(x) v is continuous; integrates to a continuous unitary representation of G. The second corollary is an integrability criterion based on analytic vectors. It generalises the Integrability Theorem [8, 6.8], where D is assumed to consists of analytic vectors for every α(x), x ∈ g, but the techniques involved are completely different. For finite dimensional Lie algebras it was proved by M. Flato, J. Simon, H. Snellman, and D. Sternheimer (see [2]). Note that J. Simon also proved [10] that is it sufficient to assume that D consists of analytic vectors for every α(x), x ∈ S, where S is a Lie-generating subset of g.
1466
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
Corollary 3. Let G be a simply connected Banach–Lie group with Lie algebra g. Let α be a strongly continuous representation of g over a dense domain which consists of analytic vectors for the operators α(x), x ∈ aj . Then α integrates to a continuous unitary representation of G. In the next section we show how the corollaries follow from Theorem 1, which will be proved in the last section. 3. The commutation relation In this section we first prove that the assumptions of Corollary 2, as well as those of Corollary 3, lead to the assumptions (A1)–(A3). Those results can be found for finite dimensional Lie algebras in [3, Ch. 3] and in [2] respectively, but although they extend directly to the Banach setting we give full proofs for the sake of completeness. Then we show that the commutation relation (1) implies the differentiability of a family of operators which is crucial in the proof of the main theorem. We will need the following product rule. Lemma 4. Let E and F be two Banach spaces and Ls (E, F ) denote the space of continuous linear operators from E to F endowed with the strong operator topology. Let t → K(t) ∈ Ls (E, F ) be a continuous path such that t → K(t)v is differentiable for every v in a subspace D of E and let γ (t) be a differentiable path in D. We write K (t) : D → F for the linear operator obtained d by K (t)v := dt K(t)v, v ∈ D. Then t → K(t)γ (t) is differentiable with d K(t)γ (t) = K (t)γ (t) + K(t)γ (t). dt Proof. We write 1 K(t + h)γ (t + h) − K(t)γ (t) h 1 1 = K(t + h)γ (t + h) − K(t + h)γ (t) + K(t + h)γ (t) − K(t)γ (t) . h h The second term converges to K (t)γ (t) and the first one is equal to γ (t + h) − γ (t) − γ (t) + K(t + h)γ (t), K(t + h) h which converges to K(t)γ (t) by the Principle of Uniform Boundedness: If C is a compact neighbourhood of t, then for every v ∈ H, sups∈C K(s)v is bounded and hence sups∈C K(s) is bounded. 2 Lemma 5. Consider two unbounded operators A and B defined on a dense domain D of the Hilbert space H. Assume that A is essentially skew-adjoint, that AD ⊆ D and etA D ⊆ D, and that B is closable. Let v ∈ D such that t → BAetA v is continuous. Then t → BetA v is differentiable with d BetA v = BAetA v. dt
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1467
Proof. We have
t e v−v= tA
AesA v ds. 0
Let B be the closure of B. Its domain D(B) is a Banach space when endowed with the graph norm w B := w + Bw , where · is the Hilbert norm in H, and then B : D(B) → H is a continuous linear operator. assumption the map s → AesA v is continuous for the graph norm t By sA and hence the integral 0 Ae v ds exists as a Riemann integral in D(B). We therefore have
t Be v − Bv = tA
BAesA v ds, 0
and the claim follows.
2
Proposition 6. Let α be a strongly continuous representation of the Banach–Lie algebra g over a dense domain D of a Hilbert space H. Let x ∈ g such that α(x) is essentially skew-adjoint and such that the associated one-parameter unitary group leaves D invariant. Let a be a closed subspace of g which invariant under ad x. Assume that for every v ∈ D and every y ∈ a the map R → H, t → α(y)etα(x) v is continuous. Then we have for every y ∈ a the commutation relation eα(x) α(y)e−α(x) = α ead x y . Proof. (See [3, 3.2 and 3.3].) Let v ∈ D. We want to prove that the map [0, 1] → H,
s → e(1−s)α(x) α es ad x y e(s−1)α(x) v
is constant. We will apply Lemma 4 with K(s) : a → H,
z → e(1−s)α(x) α(z)e(s−1)α(x) v
and γ (s) = es ad x y. The continuity of the operator K(s) follows directly from the strong continuity of α. The continuity of the map s → α(z)e(s−1)α(x) α(x)v implies by Lemma 5 the differentiability of s → α(z)e(s−1)α(x) v, and the derivative is d α(z)e(s−1)α(x) v = α(z)α(x)e(s−1)α(x) v. ds Hence, by Lemma 4, the map s → K(s)z = e(1−s)α(x) α(z)e(s−1)α(x) v is differentiable with derivative K (s)z = e(1−s)α(x) α(z), α(x) e(s−1)α(x) v.
1468
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
Since s → es ad x y is analytic and
d s ad x y ds e
= [x, es ad x y], again by Lemma 4, we have
d (1−s)α(x) s ad x (s−1)α(x) α e y e v e ds = e(1−s)α(x) α es ad x y , α(x) e(s−1)α(x) v + e(1−s)α(x) α x, es ad x y e(s−1)α(x) v = 0.
2
Let α : g → End(D) be a strongly continuous representation of g by skew-symmetric operators and let x ∈ g such that D consists of analytic vectors for α(x). By Nelson’s Theorem [9, Lemma 5.1] α(x) then is essentially skew-adjoint. The key result here is [2, Proposition 1], the proof of which carries over to the Banach case without any change. Proposition 7. (See [2].) Let α and α be strongly continuous representations of the Banach–Lie algebra g over the domains D and D (respectively), dense in H, with D ⊆ D , and such that for any y ∈ g, α(y) is the restriction to D of α (y). Then, if D is a domain of analytic vectors for some α(x), x ∈ g, we have for any v ∈ D, w ∈ D , denoting by ·,· the scalar product in H,
−eα(x) α(y)v, w = eα(x) v, α ead x y w .
Remark that if for every y ∈ g one is given on D ⊇ D an unbounded skew-symmetric operator → D , so that α (y)|D = α(y), then α is automatically a strongly continuous Lie algebra homomorphism. Indeed, for v ∈ D and w ∈ D , we have α (y) : D
−α(y)v, w = v, α (y)w .
Hence
v, α (λx + y)w = −α(λx + y)v, w = −λα(x)v − α(y)v, w = v, λα (x)w + α (y)w
and
v, α [x, y] w = α [y, x] v, w
= α(y)α(x) − α(x)α(y)v, w = v, α (x)α (y) − α (y)α (x)w
show that α is a Lie algebra homomorphism. Moreover a representation of Banach–Lie algebra is strongly continuous if and only if it is weakly continuous [8, Lemma 4.2]. The domain D being dense, the set of functionals { ·, v, v ∈ D} separates the points in H and hence α is strongly continuous. Assume now that α(y) is essentially skew-adjoint for every y ∈ aj and let D :=
∈N, yk ∈
D α(y ) · · · α(y1 ) ,
(3)
aj
where α(y) denotes the closure of α(y). Then D contains D and is invariant under α(y), y ∈ aj , so we can set for such y,
α (y) := α(y)|D ,
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1469
and for y = y1 + · · · + yn ∈ g, yj ∈ aj , α (y) = α (y1 ) + · · · + α (yn ). By the preceding remark this defines a strongly continuous representation of g extending α. Applying Proposition 7 several times, we see, since α(y)∗ = α(y) for y ∈ aj , that for every y1 , . . . , y ∈ aj and w ∈ D , eα(x) w ∈ D(α(y ) · · · α(y1 )), and hence eα(x) D ⊆ D . Then Proposition 7 also shows that the commutation relation holds on D : Corollary 8. Let α be a strongly continuous representation of the Banach–Lie algebra g over a dense domain D such that α(y) is essentially skew-adjoint for every y ∈ aj . Let x ∈ g such that D consists of analytic vectors for α(x). Let D ⊇ D be the domain defined in (3) and α the corresponding extension of α. Then eα(x) leaves D invariant and we have for every y ∈ g the commutation relation eα(x) α (y)e−α(x) = α ead x y . For the next proposition we will need the following lemma: Lemma 9. Consider two essentially skew-adjoint operators A and B defined on a common dense domain D and assume that for all s ∈ R, esA D ⊆ D. Let v ∈ D be such that s → BesA v is continuous. Then
t e v−e v= tB
esB (B − A)e(t−s)A v ds.
tA
0
Proof. We apply Lemma 4 with K(s) = esB and γ (s) = e(t−s)A v to obtain d sB (t−s)A e e v = esB (B − A)e(t−s)A v. ds By assumption the right-hand side is continuous. Hence the claim follows from the Fundamental Theorem of Calculus. 2 Proposition 10. Let α be a strongly continuous representation of the Banach–Lie algebra g on a dense domain D. Let I be a real interval and I → g, t → x(t) be a continuous path such that each α(x(t)) is essentially skew-adjoint and esα(x(t)) D ⊆ D, s ∈ R. If, for every t, we have for sufficiently small h and every s ∈ R the commutation relation esα(x(t)) α x(t + h) e−sα(x(t)) = α es ad x(t) x(t + h) ,
(4)
1470
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
then for every v ∈ D the map (s, t) → esα(x(t)) v is continuous. If moreover the path x(t) is differentiable, then t → eα(x(t)) v is differentiable with d α(x(t)) e v=α dt
1
e
s ad x(t)
x (t) ds eα(x(t)) v.
0
Proof. Let us fix t ∈ I and let t + Nt be a convex neighbourhood of t in I such that for h ∈ Nt the relation (4) holds. Let v ∈ D. Rewriting (4) as α x(t + h) esα(x(t)) v = esα(x(t)) α e−s ad x(t) x(t + h) v, we see that s → α(x(t + h))esα(x(t)) v is continuous. We can therefore apply Lemma 9 to obtain esα(x(t+h)) v − esα(x(t)) v
s = euα(x(t+h)) α x(t + h) − x(t) e(s−u)α(x(t)) v du 0
s =
euα(x(t+h)) e(s−u)α(x(t)) α e(u−s) ad x(t) x(t + h) − x(t) e(s−u)α(x(t)) v du.
0
Thus, writing · for the norm in g, sα(x(t+h)) e v − esα(x(t)) v |s|α v e|s| ad x(t) x(t + h) − x(t) and (s, t) → esα(x(t)) v is continuous. Now assume that t → x(t) is differentiable. Let us write eα(x(t+h)) v − eα(x(t)) v = h
1 esα(x(t+h)) α
x(t + h) − x(t) (1−s)α(x(t)) e v ds h
0
and let us define on Nt the function z(h) =
x(t+h)−x(t) x (t)
h
for h = 0, for h = 0.
The formula α z(h) e(1−s)α(x(t)) v = e(1−s)α(x(t)) α e(s−1) ad x(t) z(h) v, which holds for h = 0 by assumption and for h = 0 by continuity, shows that (s, h) → α z(h) e(1−s)α(x(t)) v
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1471
is continuous, and hence (s, h) → esα(x(t+h)) α z(h) e(1−s)α(x(t)) v is continuous. We can therefore pass to the limit under the integral sign to derive that d α(x(t)) e v= dt
1 e
sα(x(t))
α x (t) e(1−s)α(x(t)) v ds =
0
1
α es ad x(t) x (t) eα(x(t)) v ds,
0
and the claim follows from the linearity and the continuity of α.
2
4. The right-logarithmic derivative Let g be a Banach–Lie algebra. Let U ⊂ g be a symmetric starlike neighbourhood of 0 in g such that the Dynkin series x ∗ y converges in U × U . Then, for x ∈ U , the maps λx y := x ∗ y,
ρx y := y ∗ x
and cx y := x ∗ y ∗ (−x)
are local diffeomorphisms at the origin. Moreover the differential at 0 of cx is given by Dcx (0) = ead x . Let I denote an interval of the real line. The right-logarithmic derivative (see [6, II.4]) of a smooth path γ : I → U is defined by δ(γ )t = Dργ (t) (0)−1 γ (t). Lemma 11. Let x ∈ U and γ (t) = tx. Then δ(γ )t = x. Proof. We have Dρtx (0)x = limh→0
hx∗tx−tx h
= limh→0
(h+t)x−tx h
= x.
2
Lemma 12. Let α, β : I → U be two differentiable paths such that (α ∗ β)(t) := α(t) ∗ β(t) ∈ U . Then δ(α ∗ β)t = δ(α)t + ead α(t) δ(β)t . Proof. We have δ(α ∗ β)t = Dρ(α∗β)(t) (0)−1 (α ∗ β) (t) −1 Dρβ(t) α(t) α (t) + Dλα(t) β(t) β (t) = Dρα(t) (0)−1 Dρβ(t) α(t) −1 = Dρα(t) (0)−1 α (t) + Dρα(t) (0)−1 Dρβ(t) α(t) Dλα(t) β(t) β (t) = Dρα(t) (0)−1 α (t) + Dcα(t) (0)Dρβ(t) (0)−1 β (t) = δ(α)t + ead α(t) δ(β)t .
2
1472
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
The next lemma says that the logarithmic derivative is the pull-back of the Maurer–Cartan form on g (and may therefore be defined for any path in g). Lemma 13. Let α : I → U be a differentiable path. Then
1 δ(α)t =
es ad α(t) α (t) ds.
0
Proof. Let us fix t ∈ I and consider the map ψ : [0, 1] → g,
s → δ(sα)t .
Then ψ(s + h) = δ (s + h)α t = δ (sα) ∗ (hα) t , so we obtain with Lemma 12, ψ(s + h) = δ(sα)t + es ad α(t) δ(hα)t . Hence we have ψ(s + h) − ψ(s) 1 = lim es ad α(t) δ(hα)t = es ad α(t) α (t), h→0 h→0 h h
ψ (s) = lim
and the result follows by integration.
2
Assume now that g decomposes as g = a1 ⊕ a 2 ⊕ · · · ⊕ a n , where aj , j = 1, 2, . . . , n, are closed subspaces. Then, for every j = 1, 2, . . . , n, there exists a 0-neighbourhood Vj in aj such that the map V1 × V2 × · · · × Vn → g,
(x1 , x2 , . . . , xn ) → x1 ∗ x2 ∗ · · · ∗ xn
is a diffeomorphism onto is image. From now on we assume that we have chosen U starlike and small enough so that it is contained in this image. So if x, y ∈ U then (tx) ∗ y = x1 (t) ∗ x2 (t) ∗ · · · ∗ xn (t) where t → xj (t) ∈ aj is analytic. Proposition 14. We have x=
n j =1
1 e
ad x1 (t)
···e
ad xj −1 (t) 0
es ad xj (t) xj (t) ds.
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1473
Proof. Let γ (t) = (tx) ∗ y = x1 (t) ∗ x2 (t) ∗ · · · ∗ xn (t). The result follows by computing, using the preceding lemmas, the right-logarithmic derivative of γ in its two expressions. 2 5. Proof of the main theorem Let us consider a strongly continuous representation α of g on a dense domain D of the Hilbert space H which satisfies the assumptions (A1)–(A3) and recall the notations of the preceding section. If z = z1 ∗ · · · ∗ zn ∈ V1 ∗ · · · ∗ Vn we set π(z) := eα(z1 ) eα(z2 ) · · · eα(zn ) .
(5)
Let U be a starlike 0-neighbourhood in g so that U ∗ U ⊆ U . Then it suffices to show that for every x, y ∈ U , π(x ∗ y) = π(x)π(y),
(6)
see, e.g., [1, Ch. 3, §6, Lemma 1.1]. Let us write (tx) ∗ y = x1 (t) ∗ x2 (t) ∗ · · · ∗ xn (t),
xj (t) ∈ aj ,
so that π (tx) ∗ y = eα(x1 (t)) eα(x2 (t)) · · · eα(xn (t)) . Let v ∈ D and γ (t) = π (tx) ∗ y v. Thanks to Proposition 10, we can use Lemma 4 several times to see that the map t → γ (t) is differentiable with γ (t) =
n
1 eα(x1 (t)) · · · eα(xj −1 (t)) α
j =1
es ad xj (t) xj (t) ds eα(xj (t)) · · · eα(xn (t)) v.
0
Then repeated use of the commutation relation yields
γ (t) = α
n j =1
1 e
ad x1 (t)
···e
ad xj −1 (t) 0
es ad xj (t) xj (t)
γ (t),
1474
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
which, according to Proposition 14, amounts to γ (t) = α(x)γ (t).
(7)
But it is well known (cf. [2, p. 431]) that the solution of the initial value problem γ (t) ∈ D,
γ (t) = α(x)γ (t),
α(0) = π(y)v,
is unique (and given by etα(x) π(y)v). Therefore we have π(tx)π(y)v = π (tx) ∗ y v, and this equality extends to H to give (6) by evaluation at t = 1. We also derive from (7), with y = 0, that dπ(x)|D = α(x), and since by construction π(tx)D ⊆ D, the operator α(x) is essentially skew-adjoint, i.e. α(x) = dπ(x). It also follows from (5) that (1) holds for every x ∈ g. Hence for v ∈ D the map g → H,
x → eα(x) v
is continuous (see Proposition 10), and this implies that the representation π is continuous. Now we have D ⊆ Dg∞ :=
D dπ(y ) · · · dπ(y1 ) ,
∈N, yk ∈g
but we know by [7, Lemma 3.4, Remark 8.3] that Dg∞ coincides with the space of smooth vectors for π . This concludes the proof. Acknowledgment I thank Karl-Hermann Neeb for guiding me through the literature and for reading preliminary versions of the manuscript. References [1] Nicolas Bourbaki, Lie Groups and Lie Algebras. Chapters 1–3, Elem. Math. (Berlin), Springer-Verlag, Berlin, 1989. [2] M. Flato, J. Simon, H. Snellman, D. Sternheimer, Simple facts about analytic vectors and integrability, Ann. Sci. École Norm. Sup. (4) 5 (1972) 423–434. [3] P.E.T. Jorgensen, R.T. Moore, Operator Commutation Relations, Math. Appl., D. Reidel Publishing Co., Dordrecht, 1984. [4] M. Lüscher, G. Mack, Global conformal invariance in quantum field theory, Comm. Math. Phys. 41 (1975) 203–234. [5] S. Merigon, K.-H. Neeb, Analytic extension techniques for unitary representations of Banach–Lie groups, in preparation. [6] Karl-Hermann Neeb, Towards a Lie theory of locally convex groups, Jpn. J. Math. 1 (2) (2006) 291–468. [7] Karl-Hermann Neeb, On differentiable vectors for representations of infinite dimensional Lie groups, J. Funct. Anal. 259 (2010) 2814–2855.
S. Merigon / Journal of Functional Analysis 260 (2011) 1463–1475
1475
[8] Karl-Hermann Neeb, On analytic vectors for representations of Banach–Lie groups, Ann. Inst. Fourier (Grenoble), in press. [9] Edward Nelson, Analytic vectors, Ann. of Math. (2) 70 (1959) 572–615. [10] Jacques Simon, On the integrability of representations of infinite dimensional real Lie algebras, Comm. Math. Phys. 28 (1972) 39–46. [11] Valerio Toledano Laredo, Integrating unitary representations of infinite-dimensional Lie groups, J. Funct. Anal. 161 (2) (1999) 478–508.
Journal of Functional Analysis 260 (2011) 1476–1490 www.elsevier.com/locate/jfa
Proper analytic free maps J. William Helton a,1 , Igor Klep b,c,2 , Scott McCullough d,∗,3 a Department of Mathematics, University of California, San Diego, United States b Univerza v Ljubljani, Fakulteta za Matematiko in Fiziko, Slovenia c Univerza v Mariboru, Fakulteta za Naravoslovje in Matematiko, Slovenia d Department of Mathematics, University of Florida, Gainesville, United States
Received 21 June 2010; accepted 11 November 2010 Available online 19 November 2010 Communicated by D. Voiculescu
Abstract This paper concerns analytic free maps. These maps are free analogs of classical analytic functions in several complex variables, and are defined in terms of non-commuting variables amongst which there are no relations – they are free variables. Analytic free maps include vector-valued polynomials in free (noncommuting) variables and form a canonical class of mappings from one non-commutative domain D in say g variables to another non-commutative domain D˜ in g˜ variables. As a natural extension of the usual notion, ˜ Assuming that both an analytic free map is proper if it maps the boundary of D into the boundary of D. domains contain 0, we show that if f : D → D˜ is a proper analytic free map, and f (0) = 0, then f is oneto-one. Moreover, if also g = g, ˜ then f is invertible and f −1 is also an analytic free map. These conclusions ˜ on the map f are the strongest possible without additional assumptions on the domains D and D. © 2010 Elsevier Inc. All rights reserved. Keywords: Non-commutative set and function; Analytic map; Proper map; Rigidity; Linear matrix inequality; Several complex variables; Free analysis; Free real algebraic geometry
* Corresponding author.
E-mail addresses: [email protected] (J.W. Helton), [email protected] (I. Klep), [email protected] (S. McCullough). 1 Research supported by NSF grants DMS-0700758, DMS-0757212, and the Ford Motor Co. 2 Research supported by the Slovenian Research Agency grants P1-0222 and P1-0288. 3 Research supported by the NSF grant DMS-0758306. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.007
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1477
1. Introduction The notion of an analytic, free or non-commutative, map arises naturally in free probability, the study of non-commutative (free) rational functions [1,20,21,18,10], and systems theory [5]. In this note rigidity results for such functions paralleling those for their classical commutative counterparts are established. The free setting leads to substantially stronger results. Namely, if f is a proper analytic free map from a non-commutative domain in g variables to another in g˜ variables, then f is injective and g˜ g. If in addition g˜ = g, then f is onto and has an inverse which is itself a (proper) analytic free map. This injectivity conclusion contrasts markedly to the classical case where a (commutative) proper analytic function f from one domain in Cg to another in Cg , need not be injective, although it must be onto. For classical theory of some commutative proper analytic maps see [3]. The definitions as used in this paper are given in the following section. The main result of the paper is in Section 3. Analytic free analogs of classical (commutative) rigidity theorems is the theme of Section 4. The article concludes with examples in Section 5, all of which involve linear matrix inequalities (LMIs). 2. Free maps This section contains the background on non-commutative sets and on free maps at the level of generality needed for this paper. As we shall see, free maps which are continuous are also analytic in several senses, a fact which (mostly) justifies the terminology analytic free map in the introduction. Indeed one typically thinks of free maps as being analytic, but in a weak sense. The discussion borrows heavily from the recent basic work of Voiculescu [20,21] and of Kalyuzhnyi-Verbovetski˘ı and Vinnikov [10], see also the references therein. These papers contain a power series approach to free maps and for more on this one can see Popescu [14,15], or also [8,6]. 2.1. Non-commutative sets and domains Fix a positive integer g. Given a positive integer n, let Mn (C)g denote g-tuples of n × n matrices. Of course, Mn (C)g is naturally identified with Mn (C) ⊗ Cg . A sequence U = (U(n))n∈N , where U(n) ⊆ Mn (C)g , is a non-commutative set if it is closed with respect to simultaneous unitary similarity; i.e., if X ∈ U(n) and U is an n × n unitary matrix, then U ∗ XU = U ∗ X1 U, . . . , U ∗ Xg U ∈ U(n); and if it is closed with respect to direct sums; i.e., if X ∈ U(n) and Y ∈ U(m) implies X⊕Y =
X 0
0 Y
∈ U(n + m).
Non-commutative sets differ from the fully matricial Cg -sets of Voiculescu [20, Section 6] in that the latter are closed with respect to simultaneous similarity, not just simultaneous unitary similarity. Remark 2.3 below briefly discusses the significance of this distinction for the results on proper analytic free maps in this paper.
1478
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
The non-commutative set U is a non-commutative domain if each U(n) is open and connected. Of course the sequence M(C)g = (Mn (C)g ) is itself a non-commutative domain. Given ε > 0, the set Nε = (Nε (n)) given by Nε (n) = X ∈ Mn (C)g : Xj Xj∗ < ε 2
(2.1)
is a non-commutative domain which we call the non-commutative ε-neighborhood of 0 in Cg . The non-commutative set U is bounded if there is a C ∈ R such that C2 −
Xj Xj∗ 0
(2.2)
for every n and X ∈ U(n). Equivalently, for some λ ∈ R, we have U ⊆ Nλ . Note that this condition is stronger than asking that each U(n) is bounded. Let C x1 , . . . , xg denote the C-algebra freely generated by g non-commuting letters x = (x1 , . . . , xg ). Its elements are linear combinations of words in x and are called polynomials. Given an r × r matrix-valued polynomial p ∈ Mr (C) ⊗ C x1 , . . . , xg with p(0) = 0, let D(n) denote the connected component of
X ∈ Mn (C)g : I + p(X) + p(X)∗ 0 containing the origin. The sequence D = (D(n)) is a non-commutative domain which is semialgebraic in nature. Note that D contains an ε > 0 neighborhood of 0, and that the choice ⎛ p=
1 ⎜ 0g×g ⎝ ε 01×g
x1 ⎞ .. . ⎟ ⎠ xg 01×1
gives D = Nε . Further examples of natural non-commutative domains can be generated by considering non-commutative polynomials in both the variables x = (x1 , . . . , xg ) and their formal adjoints, x ∗ = (x1∗ , . . . , xg∗ ). The case of domains determined by linear matrix inequalities appears in Section 5. 2.2. Free mappings Let U denote a non-commutative subset of M(C)g and let g˜ be a positive integer. A free map f from U into M(C)g˜ is a sequence of functions f [n] : U(n) → Mn (C)g˜ which respects intertwining maps; i.e., if X ∈ U(n), Y ∈ U(m), Γ : Cm → Cn , and XΓ = (X1 Γ, . . . , Xg Γ ) = (Γ Y1 , . . . , Γ Yg ) = Γ Y, then f [n](X)(Γ ) = (Γ )f [m](Y ). Note if X ∈ U(n) it is natural to write simply f (X) instead of the more cumbersome f [n](X) and likewise f : U → M(C)g˜ . In a similar fashion, we will often write f (X)Γ = Γf (Y ).
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1479
Remark 2.1. Each f [n] can be represented as ⎞ f [n]1 . f [n] = ⎝ .. ⎠ ⎛
f [n]g˜ where f [n]j : U(n) → Mn (C). Of course, for each j , the sequence (f [n]j ) is a free map fj : U → M(C) with fj [n] = f [n]j . In particular, if f : U → M(C)g˜ , X ∈ U(n), and v = ej ⊗ vj , then f (X)∗ v =
fj (X)∗ vj .
Let U be a given non-commutative subset of M(C)g and suppose f = (f [n]) is a sequence of functions f [n] : U(n) → Mn (C)g˜ . The sequence f respects direct sums if, for each n, m and X ∈ U(n) and Y ∈ U(m), f (X ⊕ Y ) = f (X) ⊕ f (Y ). Similarly, f respects similarity if for each n and X, Y ∈ U(n) and invertible n × n matrix S such that XS = SY , f (X)S = Sf (Y ). The following proposition gives an alternate characterization of free maps. Proposition 2.2. Suppose U is a non-commutative subset of M(C)g . A sequence f = (f [n]) of functions f [n] : U(n) → Mn (C)g˜ is a free map if and only if it respects direct sums and similarity. Proof. Observe f (X)Γ = Γf (Y ) if and only if
f (X) 0
0 f (Y )
I 0
Γ I
=
I 0
Γ I
f (X) 0 . 0 f (Y )
Thus if f respects direct sums and similarity, then f respects intertwining. On the other hand, if f respects intertwining then, by choosing Γ to be an appropriate projection, it is easily seen that f respects direct sums too. 2 Remark 2.3. Let U be a non-commutative domain in M(C)g and suppose f : U → M(C)g˜ is a free map. If X ∈ U is similar to Y with Y = S −1 XS, then we can define f (Y ) = S −1 f (X)S. In this way f naturally extends to a free map on H(U) ⊆ M(C)g defined by
H(U)(n) = Y ∈ Mn (C)g : there is an X ∈ U(n) such that Y is similar to X . Thus if U is a domain of holomorphy, then H(U) = U . On the other hand, because our results on proper analytic free maps to come depend strongly upon the non-commutative set U itself, the distinction between non-commutative sets and fully matricial sets as in [20] is important. See also [9,7].
1480
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
We close this subsection with the following simple observation. Proposition 2.4. If U is a non-commutative subset of M(C)g and f : U → M(C)g˜ is a free map, then the range of f , equal to the sequence f (U) = (f (U(n))), is itself a non-commutative subset of M(C)g˜ . 2.3. A continuous free map is analytic Let U ⊆ M(C)g be a non-commutative set. A free map f : U → M(C)g˜ is continuous if each f [n] : U(n) → Mn (C)g˜ is continuous. Likewise, if U is a non-commutative domain, then f is called analytic if each f [n] is analytic. This implies the existence of directional derivatives for all directions at each point in the domain, and this is the property we shall use later below. Proposition 2.5. Suppose U is a non-commutative domain in M(C)g . (1) A continuous free map f : U → M(C)g˜ is analytic. (2) If X ∈ U(n), and H ∈ Mn (C)g has sufficiently small norm, then f
X 0
H X
=
f (X) f (X)[H ] . 0 f (X)
The proof invokes the following lemma which also plays an important role in the next subsection. Lemma 2.6. Suppose U ⊆ M(C)g is a non-commutative set and f : U → M(C)g˜ is a free map. Suppose X ∈ U(n), Y ∈ U(m), and Γ is an n × m matrix. Let Cj = Xj Γ − Γ Yj ,
Zj =
Xj 0
Cj Yj
.
(2.3)
If Z = (Z1 , . . . , Zg ) ∈ U(n + m), then fj (Z) =
fj (X) fj (X)Γ − Γfj (Y ) . 0 fj (Y )
This formula generalizes to larger block matrices. Proof. With S=
I 0
Xj 0
0 Yj
Γ I
we have Z˜ j =
= SZj S −1 .
(2.4)
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1481
Thus, writing f = (f1 , . . . , fg˜ )T and using the fact that f respects intertwining maps, for each j , ˜ −1 = fj (Z) = Sfj (Z)S
fj (X)Γ − Γfj (Y ) . fj (Y )
fj (X) 0
2
Proof of Proposition 2.5. Fix n and X ∈ U(n). Because U(2n) is open and X ⊕ X ∈ U(2n), for every H ∈ Mn (C)g of sufficiently small norm the tuple with j -th entry
Xj 0
Hj Xj
is in U(2n). Hence, for z ∈ C of small modulus, the tuple Z(z) with j -th entry Zj (z) =
Xj + zHj 0
Hj Xj
is in U(2n). Note that the choice (when z = 0) of Γ (z) = 1z , X = X + zH and Y = X in Lemma 2.6 gives this Z(z). Hence, by Lemma 2.6, f Z(z) =
f (X + zH ) 0
f (X+zH )−f (X) z
f (X)
.
Since Z(z) converges as z tends to 0 and f [2n] is assumed continuous, the limit f (X + zH ) − f (X) z→0 z lim
exists. This proves that f is analytic at X. It also establishes the moreover portion of the proposition. 2 Remark 2.7. Kalyuzhnyi-Verbovetski˘ı and Vinnikov [10] are developing general results based on very weak hypotheses with the conclusion that f is (in our language) an analytic free map. Here we will assume continuity whenever expedient. For perspective we mention power series. It is shown in [21, Section 13] that an analytic free map f has a formal power series expansion in the non-commuting variables, which indeed is a powerful way to think of analytic free maps. Voiculescu also gives elegant formulas for the coefficients of the power series expansion of f in terms of clever evaluations of f . Convergence properties for bounded analytic free maps are studied in [21, Sections 14–16]; see also [21, Section 17] for a bad unbounded example. We do not dwell on this since power series are not essential to this paper. 3. A proper free map is bianalytic free Given non-commutative domains U and V in M(C)g and M(C)g˜ respectively, a free map f : U → V is proper if each f [n] : U(n) → V(n) is proper in the sense that if K ⊆ V(n) is compact, then f −1 (K) is compact. In particular, for all n, if (zj ) is a sequence in U(n) and zj → ∂U(n), then f (zj ) → ∂V(n). In the case g = g˜ and both f and f −1 are (proper) analytic
1482
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
free maps we say f is a bianalytic free map. The following theorem is a central result of this paper. Theorem 3.1. Let U and V be non-commutative domains containing 0 in M(C)g and M(C)g˜ , respectively and suppose f : U → V is a free map. (1) If f is proper, then it is one-to-one, and f −1 : f (U) → U is a free map. (2) If, for each n and Z ∈ Mn (C)g˜ , the set f [n]−1 ({Z}) has compact closure in U , then f is one-to-one and moreover, f −1 : f (U) → U is a free map. (3) If g = g˜ and f : U → V is proper and continuous, then f is bianalytic. Corollary 3.2. Suppose U and V are non-commutative domains in M(C)g . If f : U → V is a free map and if each f [n] is bianalytic, then f is a bianalytic free map. Proof. Since each f [n] is bianalytic, each f [n] is proper. Thus f is proper. Since also f is a free map, by Theorem 3.1(3) f is a bianalytic free map. 2 Before proving Theorem 3.1 we establish the following preliminary result which is of independent interest and whose proof uses the full strength of Lemma 2.6. Proposition 3.3. Let U ⊆ M(C)g be a non-commutative domain and suppose f : U → M(C)g˜ is a free map. Suppose further that X ∈ U(n), Y ∈ U(m), Γ is an n × m matrix, and f (X)Γ = Γf (Y ). If f −1 ({f (X) ⊕ f (Y )}) has compact closure in U , then XΓ = Γ Y . Proof. As in Lemma 2.6, let Cj = Xj Γ − Γ Yj . For 0 < t sufficiently small, Z(t) ∈ U(n + m), where Xj tCj . (3.1) Zj (t) = 0 Yj If f (X)Γ = Γf (Y ), then, by Lemma 2.6, fj Z(t) =
=
fj (X) 0 fj (X) 0
t (fj (X)Γ − Γfj (Y )) fj (Y ) 0 . fj (Y )
Thus, fj (Z(t)) = fj (Z(0)). In particular,
f −1 f Z(0) ⊇ Z(t): t ∈ C ∩ U. Since this set has, by assumption, compact closure in U , it follows that C = 0; i.e., XΓ = Γ Y. 2
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1483
We are now ready to prove that a proper free map is one-to-one and even a bianalytic free map if continuous and mapping between domains of the same dimension. Proof of Theorem 3.1. If f is proper, then f −1 ({Z}) has compact closure in U for every Z ∈ M(C)g˜ . Hence (1) is a consequence of (2). For (2), invoke Proposition 3.3 with Γ = γ I to conclude that f is injective. Thus f : U → f (U) is a bijection from one non-commutative set to another. Given W, Z ∈ f (U) there exists X, Y ∈ U such that f (X) = W and f (Y ) = Z. If moreover, W Γ = Γ Z, then f (X)Γ = Γf (Y ) and Proposition 3.3 implies XΓ = Γ Y ; i.e., f −1 (W )Γ = Γf −1 (Z). Hence f −1 is itself a free map. Let us now consider (3). Using the continuity hypothesis and Proposition 2.5, for each n, the map f [n] : U(n) → V(n) is analytic. By hypothesis each f [n] is also proper and hence its range is V(n) by [16, Theorem 15.1.5]. Now f [n] : U(n) → V(n) is one-to-one, onto and analytic, so its inverse is analytic. Further, by the already proved part of the theorem, f −1 is an analytic free map. 2 For both completeness and later use we record the following companion to Lemma 2.6. Proposition 3.4. Let U ⊆ M(C)g and V ⊆ M(C)g˜ be non-commutative domains. If f : U → V is a proper analytic free map and if X ∈ U(n), then f (X) : Mn (C)g → Mn (C)g˜ is one-to-one. In particular, if g = g, ˜ then f (X) is a vector space isomorphism. Proof. Suppose f
X 0
f (X)[H ] = 0. H X
=
We scale H so that
f (X) 0
f (X)[H ] f (X)
=
X 0
H X
∈ U . From Proposition 2.5
f (X) 0 0 f (X)
By the injectivity of f established in Theorem 3.1, H = 0.
=f
X 0
0 . X
2
3.1. The main result is sharp Key to the proof of Theorem 3.1 is testing f on the special class of matrices of the form (3.1). One naturally asks if the hypotheses of the theorem in fact yield stronger conclusions, say by plugging in richer classes of test matrices. The answer to this question is no: suppose f is any analytic free map from g to g variables defined on a neighborhood N of 0 with f (0) = 0 and f [1] (0) invertible. Under mild additional assumptions (e.g. the lowest eigenvalue of f (X) or the norm f (X) is bounded away from 0 for X ∈ N (n) independently of the size n) then there are non-commutative domains U and V with f : U → V meeting the hypotheses of the theorem. Indeed, consider (for fixed n) the analytic function f [n] on N (n). Its derivative at 0 is invertible; in fact, f [n] (0) is unitarily equivalent to In ⊗ f [1] (0), cf. Lemma 4.2 below. By the implicit function theorem, there is a small δ-neighborhood of 0 on which f [n]−1 is defined and analytic. By our assumptions and the bounds on the size of this neighborhood given in [22], δ > 0 may be chosen to be independent of n. This gives rise to a non-commutative domain V and the analytic free map f −1 : V → U , where U = f −1 (V). Note U is open (and hence a noncommutative domain) since f −1 (n) is analytic and one-to-one. It is now clear that f : U → V satisfies the hypotheses of Theorem 3.1.
1484
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
˜ nothing We just saw that absent more conditions on the non-commutative domains D and D, beyond bianalytic free can be concluded about f . The authors, for reasons not gone into here, are particularly interested in convex domains, the paradigm being those given by what are called LMIs. These will be discussed in Section 5. Whether or not convexity of the domain or range of an analytic free f has a highly restrictive impact on f is a serious open question. 4. Several analogs to classical theorems The conclusion of Theorem 3.1 is sufficiently strong that most would say that it does not have a classical analog. In this section analytic free map analogs of classical several complex variable theorems are obtained by combining the corresponding classical theorem and Theorem 3.1. Indeed, hypotheses for these analytic free map results are weaker than their classical analogs would suggest. 4.1. A free Caratheodory–Cartan–Kaup–Wu (CCKW) theorem The commutative Caratheodory–Cartan–Kaup–Wu (CCKW) theorem [12, Theorem 11.3.1] says that if f is an analytic self-map of a bounded domain in Cg which fixes a point P , then the eigenvalues of f (P ) have modulus at most one. Conversely, if the eigenvalues all have modulus one, then f is in fact an automorphism; and further if f (P ) = I , then f is the identity. The CCKW theorem together with Corollary 3.2 yields Corollary 4.1 below. We note that Theorem 3.1 can also be thought of as a non-commutative CCKW theorem in that it concludes, like the CCKW theorem does, that a map f is bianalytic, but under the (rather different) assumption that f is proper. Corollary 4.1. Let D be a given bounded non-commutative domain which contains 0. Suppose f : D → D is an analytic free map. Let φ denote the mapping f [1] : D(1) → D(1) and assume φ(0) = 0. (1) If all the eigenvalues of φ (0) have modulus one, then f is a bianalytic free map. (2) If φ (0) = I , then f is the identity. The proof uses the following lemma, whose proof is trivial if it is assumed that f is continuous (and hence analytic) and then one works with the formal power series representation for a free analytic function. Lemma 4.2. Keep the notation and hypothesis of Corollary 4.1. If n is a positive integer and Φ denotes the mapping f [n] : D(n) → D(n), then Φ (0) is unitarily equivalent to In ⊗ φ (0). Proof. Let Ei,j denote the matrix units for Mn (C). Fix h ∈ Cg . Arguing as in the proof of Proposition 3.4 gives, for k = and z ∈ C of small modulus, Φ (Ek,k + Ek, ) ⊗ zh = (Ek,k + Ek, ) ⊗ φ(zh). It follows that Φ (0) (Ek,k + Ek, ) ⊗ h = (Ek,k + Ek, )φ (0)[h].
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1485
On the other hand, Φ (0)[Ek,k ⊗ h] = Ek,k ⊗ φ (0)[h]. By linearity of Φ (0), it follows that Φ (0)[Ek, ⊗ h] = Ek, ⊗ φ (0)[h]. Thus, Φ (0) is unitarily equivalent to In ⊗ φ (0).
2
Proof of Corollary 4.1. The hypothesis that φ (0) has eigenvalues of modulus one, implies, by Lemma 4.2, that, for each n, the eigenvalues of f [n] (0) all have modulus one. Thus, by the CCKW theorem, each f [n] is an automorphism. Now Corollary 3.2 implies f is a bianalytic free map. Similarly, if φ (0) = Ig , then f [n] (0) = Ing for each n. Hence, by the CCKW theorem, f [n] is the identity for every n and therefore f is itself the identity. 2 Note a classical bianalytic function f is completely determined by its value and differential at a point (cf. a remark after Theorem 11.3.1 in [12]). Much the same is true for analytic free maps and for the same reason. Proposition 4.3. Suppose U, V ⊆ M(C)g are non-commutative domains, U is bounded, both contain 0, and f, g : U → V are proper analytic free maps. If f (0) = g(0) and f (0) = g (0), then f = g. Proof. By Theorem 3.1 both f and g are bianalytic free maps. Thus h = f ◦ g −1 : U → U is a bianalytic free map fixing 0 with h[1] (0) = I . Thus, by Corollary 4.1, h is the identity. Consequently f = g. 2 4.2. Circular domains A subset S of a complex vector space is circular if exp(it)s ∈ S whenever s ∈ S and t ∈ R. A non-commutative domain U is circular if each U(n) is circular. Compare the following theorem to its commutative counterpart [12, Theorem 11.1.2] where the domains U and V are the same. Theorem 4.4. Let U and V be bounded non-commutative domains in M(C)g and M(C)g˜ , respectively, both of which contain 0. Suppose f : U → V is a proper analytic free map with f (0) = 0. If U and the range R := f (U) of f are circular, then f is linear. The domain U = (U(n)) is convex if each U(n) is a convex set. Corollary 4.5. Let U and V be bounded non-commutative domains in M(C)g both of which contain 0. Suppose f : U → V is a proper analytic free map with f (0) = 0. If both U and V are circular and if one is convex, then so is the other.
1486
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
This corollary is an immediate consequence of Theorem 4.4 and the fact (see Theorem 3.1(3)) that f is onto V. We admit the hypothesis that the range R = f (U) of f in Theorem 4.4 is circular seems pretty contrived when the domains U and V have a different number of variables. On the other hand if they have the same number of variables it is the same as V being circular since by Theorem 3.1, f is onto. Proof of Theorem 4.4. Because f is a proper free map it is injective and its inverse (defined on R) is a free map by Theorem 3.1. Moreover, using the analyticity of f , its derivative is pointwise injective by Proposition 3.4. It follows that each f [n] : U(n) → Mn (C)g˜ is an embedding [4, p. 17]. Thus, each f [n] is a homeomorphism onto its range and its inverse f [n]−1 = f −1 [n] is continuous. Define F : U → U by F (x) := f −1 e−iθ f eiθ x .
(4.1)
This function respects direct sums and similarities, since it is the composition of maps which do. Moreover, it is continuous by the discussion above. Thus F is an analytic free map. Using the relation eiθ f (F (x)) = f (eiθ ) we find eiθ f (F (0))F (0) = f (0). Since f (0) is injective, eiθ F (0) = I. It follows from Corollary 4.1(2) that F (x) = eiθ x and thus, by (4.1), f (eiθ x) = eiθ f (x). Since this holds for every θ , it follows that f is linear. 2 If f is not assumed to map 0 to 0 (but instead fixes some other point), then a proper self-map need not be linear. This follows from the example we discuss in Section 5.2. Remark 4.6. A consequence of the Kaup–Upmeier series of papers [2,11] shows that given two bianalytically equivalent bounded circular domains in Cg , there is a linear bianalytic map between them. We believe this result extends to the present non-commutative setting. 5. Maps in one variable, examples This section contains two examples. The first shows that the circled hypothesis is needed in Theorem 4.4. Our second example concerns D, a non-commutative domain in one variable containing the origin, and b : D → D a proper analytic free map with b(0) = 0. It follows that b is bianalytic and hence b[1] (0) has modulus one. Our second example shows that this setting can force further restrictions on b[1] (0). The non-commutative domains of both examples are LMI domains; i.e., they are the non-commutative solution set of a linear matrix inequality (LMI). Such domains are convex, and play a major role in the important area of semidefinite programming; see [23] or the excellent survey [13]. 5.1. LMI domains A special case of the non-commutative domains are those described by a linear matrix inequality. Given a positive integer d and A1 , . . . , Ag ∈ Md (C), the linear matrix-valued polynomial L(x) =
Aj xj ∈ Md (C) ⊗ C x1 , . . . , xg
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
is a truly linear pencil. Its adjoint is, by definition, L(x)∗ =
1487
A∗j xj∗ . Let
L(x) = Id + L(x) + L(x)∗ . If X ∈ Mn (C)g , then L(X) is defined by the canonical substitution, L(X) = Id ⊗ In +
Aj ⊗ Xj +
A∗j ⊗ Xj∗ ,
and yields a symmetric dn × dn matrix. The inequality L(X) 0 for tuples X ∈ M(C)g is a linear matrix inequality (LMI). The sequence of solution sets DL defined by
DL (n) = X ∈ Mn (C)g : L(X) 0 is a non-commutative domain which contains a neighborhood of 0. It is called a non-commutative (NC) LMI domain. 5.2. A concrete example of a nonlinear bianalytic self-map on an NC LMI domain It is surprisingly difficulty to find proper self-maps on LMI domains which are not linear. This section contains the only such example, up to trivial modification, of which we are aware. Of course, by Theorem 4.4 the underlying domain cannot be circular. In this example the domain is a one-variable LMI domain. Let A=
1 1 0 0
and let L denote the univariate 2 × 2 linear pencil, L(x) := I + Ax + A∗ x ∗ =
1 + x + x∗ x∗
x . 1
Then √
DL = X X − 1 < 2 . To see this note L(X) 0 if and only if 1 + X + X ∗ − XX ∗ 0, which is in turn equivalent to (1 − X)(1 − X)∗ ≺ 2. Proposition 5.1. For real θ , consider fθ (x) :=
eiθ x . 1 + x − eiθ x
(1) fθ : DL → DL is a proper analytic free map, fθ (0) = 0, and fθ (0) = exp(iθ ). (2) Every proper analytic free map f : DL → DL fixing the origin equals one of the fθ .
1488
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
Proof. Item (1) follows from a straightforward computation: ∗ 1 − fθ (X) 1 − fθ (X) ≺ 2 ∗ eiθ X eiθ X 1 − ≺2 ⇐⇒ 1− 1 + X − eiθ X 1 + X − eiθ X 1 + X − 2eiθ X ∗ 1 + X − 2eiθ X ⇐⇒ ≺2 1 + X − eiθ X 1 + X − eiθ X ∗ ∗ ⇐⇒ 1 + X − 2eiθ X 1 + X − 2eiθ X ≺ 2 1 + X − eiθ X 1 + X − eiθ X ⇐⇒
1 + X + X ∗ − XX ∗ 0
⇐⇒
(1 − X)(1 − X)∗ ≺ 2.
Statement (2) follows from the uniqueness of a bianalytic map carrying 0 to 0 with a prescribed derivative. 2 5.3. Example of nonexistence of a bianalytic self-map on an NC LMI domain Recall that a bianalytic f with f (0) = 0 is completely determined by its differential at a point. Clearly, when f (0) = 1, then f (x) = x. Does a proper analytic free self-map exist for each f (0) of modulus one? In the previous example this was the case. For the domain in the example in this subsection, again in one variable, there is no proper analytic free self-map whose derivative at the origin is i. The domain will be a “non-commutative ellipse” described as DL with L(x) := I + Ax + A∗ x ∗ for A of the form C 1 C2 , A := 0 −C1 where C1 , C2 ∈ R. There is a choice of parameters in L such that there is no proper analytic free self-map b on DL with b(0) = 0, and b (0) = i. Suppose b : DL → DL is a proper analytic free self-map with b(0) = 0, and b (0) = i. By Theorem 3.1, b is bianalytic. In particular, b[1] : DL (1) → DL (1) is bianalytic. By the Riemann mapping theorem there is a conformal map f of the unit disk onto DL (1) satisfying f (0) = 0. Then b[1](z) = f if −1 (z) .
(5.1)
(Note that b[1] ◦ b[1] ◦ b[1] ◦ b[1] is the identity.) To give an explicit example, we recall some special functions involving elliptic integrals. Let K(z, t) and K(t) be the normal and complete elliptic integrals of the first kind, respectively, that is, z
K(z, t) = 0
dx (1 − x 2 )(1 − t 2 x 2 )
,
K(t) = K(1, t).
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
1489
Furthermore, let √ π K( 1 − t 2 ) . μ(t) = 2 K(t) Choose the axis for the non-commutative ellipse as follows:
1 2 a = cosh μ , 2 3
1 2 b = sinh μ . 2 3
Then 1 C1 = 2
1 1 − 2, 2 a b
1 C2 = . b
The desired conformal mapping is [17,19]
z 2 f (z) = sin K , 2 2 3 2K( 3 ) π
.
3
Hence b[1] in (5.1) can be explicitly computed (for details see the Mathematica notebook Example53.nb available under Preprints on http://srag.fmf.uni-lj.si). It has a power series expansion 52K( 49 )2 3 (9π 2 − 52K( 49 )2 )2 5 1 z i 9− + i z + O z7 2 4 27 π 486π ≈ i 1 + 0.30572z3 + 0.140197z5 .
b[1](z) = iz −
(5.2)
This power series expansion has a radius of convergence > 0 and thus induces an analytic free mapping N → M(C). By analytic continuation, this function coincides with b. This enables us to evaluate b(zN) for a nilpotent N . Let N be an order 3 nilpotent, ⎛
0 ⎜0 N =⎝ 0 0
1 0 0 0
0 1 0 0
⎞ 0 0⎟ ⎠. 1 0
Then r ∈ R satisfies rN ∈ DL if and only if −1.00033 r 1.00033 =: r0 . (This has been computed symbolically in the exact arithmetic using Mathematica, and the bounds given here are just approximations.) However, b(r0 N ) ∈ DL \ ∂DL contradicting the properness. (This was established by computing the 8×8 matrix L(b(r0 N )) symbolically thus ensuring it is exact. Then we apply a numerical eigenvalue solver to see that it is positive definite with smallest eigenvalue 0.0114903. . . .) We conclude that the proper analytic free self-map b does not exist.
1490
J.W. Helton et al. / Journal of Functional Analysis 260 (2011) 1476–1490
References [1] J.A. Ball, G. Groenewald, T. Malakorn, Bounded real lemma for structured non-commutative multidimensional linear systems and robust control, Multidimens. Syst. Signal Process. 17 (2006) 119–150. [2] R. Braun, W. Kaup, H. Upmeier, On the automorphisms of circular and Reinhardt domains in complex Banach spaces, Manuscripta Math. 25 (1978) 97–133. [3] J.P. D’Angelo, Several Complex Variables and the Geometry of Real Hypersurfaces, CRC Press, 1993. [4] V. Guillemin, A. Pollack, Differential Topology, Prentice Hall, 1974. [5] J.W. Helton, J.A. Ball, C.R. Johnson, J.N. Palmer, Operator Theory, Analytic Functions, Matrices, and Electrical Engineering, CBMS Reg. Conf. Ser. Math., vol. 68, Amer. Math. Soc., 1987. [6] J.W. Helton, I. Klep, S. McCullough, Analytic mappings between non-commutative pencil balls, preprint, http:// arxiv.org/abs/0908.0742; J. Math. Anal. Appl., in press. [7] J.W. Helton, I. Klep, S. McCullough, The matricial relaxation of a linear matrix inequality, preprint, http://arxiv. org/abs/1003.0908. [8] J.W. Helton, I. Klep, S. McCullough, N. Slinglend, Non-commutative ball maps, J. Funct. Anal. 257 (2009) 47–87. [9] J.W. Helton, S. McCullough, Every free basic convex semi-algebraic set has an LMI representation, preprint, http://arxiv.org/abs/0908.4352. [10] D. Kalyuzhnyi-Verbovetski˘ı, V. Vinnikov, Foundations of non-commutative function theory, in preparation. [11] W. Kaup, H. Upmeier, Banach spaces with biholomorphically equivalent unit balls are isomorphic, Proc. Amer. Math. Soc. 58 (1976) 129–133. [12] S.G. Krantz, Function Theory of Several Complex Variables, Amer. Math. Soc., 2001. [13] A. Nemirovskii, Advances in convex optimization: conic programming, in: Plenary Lecture, International Congress of Mathematicians (ICM), Madrid, Spain, 2006,. [14] G. Popescu, Free holomorphic functions on the unit ball of B(H)n , J. Funct. Anal. 241 (2006) 268–333. [15] G. Popescu, Free holomorphic automorphisms of the unit ball of B(H )n , J. Reine Angew. Math. 638 (2010) 119– 168. [16] W. Rudin, Function Theory in the Unit Ball of Cn , Springer-Verlag, 1980. [17] H.A. Schwarz, Über einige Abbildungsaufgaben, J. Reine Angew. Math. 70 (1869) 105–120. [18] D. Shlyakhtenko, D.-V. Voiculescu, Free analysis workshop summary: American institute of mathematics, http:// www.aimath.org/pastworkshops/freeanalysis.html. [19] G. Szegö, Conformal mapping of the interior of an ellipse onto a circle, Amer. Math. Monthly 57 (1950) 474–478. [20] D.-V. Voiculescu, Free analysis questions I: Duality transform for the coalgebra of ∂X:B , Int. Math. Res. Not. IMRN 16 (2004) 793–822. [21] D.-V. Voiculescu, Free analysis questions II: The Grassmannian completion and the series expansions at the origin, J. Reine Angew. Math. 645 (2010) 155–236. [22] X. Wang, Convergence of Newton’s method and inverse function theorem in Banach space, Math. Comp. 68 (1999) 169–186. [23] H. Wolkowicz, R. Saigal, L. Vandenberghe (Eds.), Handbook of Semidefinite Programming. Theory, Algorithms, and Applications, Kluwer Academic Publishers, 2000.
Journal of Functional Analysis 260 (2011) 1491–1522 www.elsevier.com/locate/jfa
From concentration to logarithmic Sobolev and Poincaré inequalities Nathael Gozlan ∗ , Cyril Roberto 1 , Paul-Marie Samson Université Paris Est Marne la Vallée, Laboratoire d’Analyse et de Mathématiques Appliquées (UMR CNRS 8050), 5 bd Descartes, 77454 Marne la Vallée Cedex 2, France Received 2 July 2010; accepted 17 November 2010 Available online 26 November 2010 Communicated by C. Villani
Abstract We give a new proof of the fact that Gaussian concentration implies the logarithmic Sobolev inequality when the curvature is bounded from below, and also that exponential concentration implies Poincaré inequality under null curvature condition. Our proof holds on non-smooth structures, such as length spaces, and provides a universal control of the constants. We also give a new proof of the equivalence between dimension free Gaussian concentration and Talagrand’s transport inequality. © 2010 Elsevier Inc. All rights reserved. Keywords: Concentration of measure; Transport inequalities; Poincaré inequalities; Logarithmic-Sobolev inequalities; Ricci curvature; Length spaces
Contents 1.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1. Inequalities related to Gaussian concentration 1.2. From concentration to functional inequalities 1.3. Lott–Villani–Sturm curvature . . . . . . . . . . . 1.4. Main results . . . . . . . . . . . . . . . . . . . . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
1492 1493 1494 1495 1497
* Corresponding author.
E-mail addresses: [email protected] (N. Gozlan), [email protected] (C. Roberto), [email protected] (P.-M. Samson). 1 The author was supported by the European Research Council through the “Advanced Grant” PTRELSS 228032. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.010
1492
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1.5. Method of proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Concentration, inf-convolutions and non-tight transport inequalities . 2.1. Transport inequalities and their dual forms . . . . . . . . . . . . . 2.2. From concentration to non-tight transport inequalities . . . . . 2.3. A characterization of dimension free Gaussian concentration 3. Log-Sobolev inequality: proof of Theorem 1.13 . . . . . . . . . . . . . . 4. Poincaré inequality: proof of Theorem 1.14 . . . . . . . . . . . . . . . . . 4.1. Non-tight Poincaré inequality . . . . . . . . . . . . . . . . . . . . . . 4.2. Weak Poincaré inequality . . . . . . . . . . . . . . . . . . . . . . . . 5. Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix A. Technical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
1498 1499 1500 1503 1507 1508 1513 1515 1517 1518 1519 1519 1520
This paper deals with the concentration of measure phenomenon and coercive inequalities, namely: transport inequalities, Poincaré and logarithmic Sobolev inequalities, isoperimetry. These notions are briefly introduced in the next section. We refer respectively to the books and surveys [29,27,5,35,38,23,49,2,45,20] for a more general introduction and a complete list of references on these topics. It is well known that if a probability measure μ on, say, (X, d) a smooth Riemannian manifold, satisfies the logarithmic Sobolev inequality with constant C (see (1.3)), then the following Gaussian concentration property holds: for all subset A with μ(A) 1/2, 2 μ Ar 1 − Me−ar , ∀r 0, where Ar = {x ∈ X; d(x, A) r}, with M = 1 and a = 1/C. Conversely, in a smooth Riemannian framework, under some curvature condition, Wang has shown in [46] that the above Gaussian concentration property implies a logarithmic Sobolev inequality. This result has been improved by Milman in a series of papers [34–36], showing that the logarithmic Sobolev constant C only depends on the concentration constants and on the lower bound on the Ricci curvature. In the present paper, one of the main contribution is to extend Milman’s result to non-smooth structures, such as length spaces (see Theorem 1.13). The curvature condition of the length space is defined in the sense of Lott–Villani–Sturm (see Definition 1.9). In the same spirit, we show that the exponential concentration property implies Poincaré inequality when the curvature of the length space is bounded below by 0 (see Theorem 1.14). The main ingredient in the proof of these new results is a characterization of the concentration property in terms of non-tight transport inequality (see Section 2). A byproduct of this characterization (see Corollary 2.23) is a new simple proof of the equivalence between dimension free Gaussian concentration and Talagrand’s transport inequality first established by the first named author in [18]. 1. Introduction In this section, we introduce the different inequalities related to concentration of measure and the notion of curvature in the sense of Lott–Villani–Sturm. Then we state our main results and we outline the proof.
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1493
1.1. Inequalities related to Gaussian concentration In the sequel, (X , d) is a polish space. A probability measure μ on X enjoys the Gaussian concentration inequality if there are two positive constants M and a such that for all A ⊂ X with μ(A) 1/2, the following inequality holds 2 μ Ar 1 − Me−ar ,
∀r 0,
(1.1)
where Ar = {x ∈ X; d(x, A) r}. Gaussian concentration can be seen as a weak version of the Gaussian isoperimetric inequality. Namely, one says that μ verifies the Gaussian isoperimetric inequality with a positive constant C (G.Isop(C)) if, for all A ⊂ X , Cμ+ (A) Φ ◦ Φ −1 μ(A) ,
(1.2)
where μ+ (A) = lim inf r→0
μ(Ar \ A) , r
and where Φ denotes the cumulative distribution function of the standard Gaussian measure on R: 1 Φ(t) = √ 2π
t
e−x
2 /2
dx,
∀t ∈ R.
−∞
It can be shown (see e.g. [29, Proposition 2.1]) that μ verifies (1.2), if and only if μ verifies the following concentration property: for all A ⊂ X , μ Ar Φ Φ −1 μ(A) + r/C ,
∀r 0.
It is not difficult to check that if μ(A) 1/2, then Φ(Φ −1 (μ(A)) + r/C) 1 − e−r /(2C ) , r 0, and so μ verifies the Gaussian concentration property with M = 1 and a = 1/(2C 2 ). There are two other important functional inequalities giving Gaussian concentration: the logarithmic Sobolev inequality and Talagrand’s transport inequality. One says that μ verifies the logarithmic Sobolev inequality (a notion introduced by Gross [22], see also [42]) with the positive constant C (LSI(C)), if 2
Entμ f 2 C
− 2 ∇ f dμ,
for all bounded Lipschitz function f , where |∇ − f | is defined by − ∇ f (x) = lim sup [f (y) − f (x)]− , d(x, y) y→x
with [A]− = max(0, −A),
2
(1.3)
1494
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
when x is not isolated in X and 0 otherwise. If μ verifies LSI(C), then by Herbst’s argument (see e.g. [2, Section 7.4.1]), it verifies the Gaussian concentration property (1.1) with M = 1 and a = 1/C. On the other hand, one says that μ verifies the transport inequality T2 (C) with some positive constant C if T2 (ν, μ) CH (ν|μ)
(1.4)
holds for all probability measure ν ∈ P(X ) (the set of all the Borel probability measures on X ), where T2 (ν, μ) denotes the quadratic optimal transport cost between ν and μ and is defined by T2 (ν, μ) = inf π
d 2 (x, y) dπ(x, y),
where the infimum runs over all probability measures π on X × X having ν and μ as marginal distributions. The quantity H (ν|μ) is the relative entropy of ν with respect to μ: H (ν|μ) =
dν log dμ dν +∞
if ν μ, otherwise.
If μ satisfies T2 (C), then by Marton’s argument [33], it verifies (1.1), with a = u/C, u ∈ (0, 1) and some positive constant M depending only on C and u. There is a natural hierarchy between these inequalities: when (X , d) is, for example, a complete Riemannian manifold (in this case, ∇ − f is the usual gradient), then G.Isop( C/2 )
⇒
LSI(C)
⇒
T2 (C)
⇒
(1.1).
(1.5)
The first implication is due to Ledoux (see [26,28]), the second one to Otto and Villani [37] (see also [11], and [31] or [21] for an extension on metric spaces) and the last one follows from Marton’s argument [33], as already mentioned. 1.2. From concentration to functional inequalities In recent years, different authors have shown that this hierarchy can be reversed under the curvature condition, Ric + Hess V K,
(1.6)
where dμ(x) = e−V (x) dx and √ K 0 (for K > 0, it is known from [3] that the Gaussian isoperimetric inequality G.Isop(1/ K ) holds). Let us recall some of these contributions. When |K|/2a < 1, it was first shown by Wang in [46] that the condition I=
ead
2 (x,x ) o
dμ(x) < +∞,
(1.7)
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1495
for some (and thus all) xo ∈ X was enough to ensure that LSI(C) holds for some constant C. This constant C depends on a, K and I . It can be deduced from Bakry and Ledoux’s paper [3], that if the probability measure μ verifies LSI(C) with a constant C such that |K|C/2 < 1, then μ verifies the Gaussian isoperimetric inequality with some other constant C˜ depending only on C and K. ˜ for some C˜ depending on K and In [37], Otto and Villani proved that T2 (C) implies LSI(C) C as soon as |K|C/2 < 1. At this step, it is worth noting an important difference between these three results. In Bakry and Ledoux, or Otto and Villani results, the relation between constants C and C˜ is universal: in both cases, the constant C˜ depends only on K and C. In particular, the dimension of X does ˜ On the other hand, the constant C˜ in Wang’s result depends not appear in the expression of C. on the integral I . Since I always depends on the dimension of the manifold X , Wang’s result is dimensional. After these pioneer works, many developments appear to unify and to generalize these observations [7,9,10,6]. We refer to [34] for a detailed bibliography. In a series of papers [34–36], E. Milman has recently obtained the most general results in this direction. Under the curvature condition (1.6), Milman has shown with a great generality that concentration inequalities imply isoperimetric inequalities. The most remarkable feature of his work is the purely adimensional character of the relations between constants. Let us give a direct corollary of Milman’s study in the context of Gaussian inequalities. According to Milman’s results, if (1.6) holds with K 0, and if μ verifies the Gaussian concentration inequality √ (1.1) with constants a and M such that |K|/(2a) < 1, then μ verifies the inequality G.Isop( C/a ), where C is a constant depending solely on a, M and K. In particular μ verifies LSI(2C/a), and contrary to what happen in Wang’s theorem, the constant appearing in the logarithmic Sobolev inequality is not affected by the dimension of X . Milman’s proof uses rather difficult tools of Riemannian geometry. Recently, Ledoux [30], gave a simplified approach to some of Milman’s results relying on semigroup tools and Γ2 calculus. The purpose of this article is to propose a first step in the challenging problem of extending Milman’s equivalence between concentration and functional inequalities in the framework of metric measured spaces with curvature, in the sense of Lott–Villani–Sturm, bounded from below (see [32,43,44]). In this non-smooth context, the tools used by Milman and Ledoux are no longer available. In the next subsection, we present the notions of length spaces and curvature. 1.3. Lott–Villani–Sturm curvature In all what follows, (X , d) is a complete separable and locally compact metric space. We will further assume that (X , d) is a length space. This means that the distance between two points equals the infimum of the lengths of the curves joining these points: for all x, y ∈ X ,
d(x, y) = inf (γ ); γ : [0, 1] → X , continuous, γ (0) = x, γ (1) = y , where (γ ) = sup
sup
N 1 0=t0
N d γ (ti−1 ), γ (ti ) . i=1
1496
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
√ Let W2 = T2 denote the Wasserstein distance on the space P2 (X ) of Borel probability measures ν on X with finite second moment: d(xo , x)2 dν(x) < +∞, for some (and thus all) xo ∈ X . The metric space (P2 (X ), W2 ) is canonically associated to the original metric space (X , d). Following Lott and Villani [32], we define DC ∞ to be the set of continuous convex functions U : [0, ∞) → R, with U (0) = 0 and such that λ → eλ U (e−λ ) is convex on (−∞, ∞). For any U ∈ DC ∞ , let U (∞) = lim
x→∞
U (x) ∈ R ∪ {∞}. x
According to our reference probability measure μ, define the function Uμ : P2 (X ) → R ∪ {−∞} by
U (f ) dμ + U (∞)νsing (X ),
Uμ (ν) =
where ν = f μ + νsing is the Lebesgue decomposition of ν with respect to μ into an absolutely continuous part f μ and a singular part νsing . For any U ∈ DC ∞ , let p(x) = xU+ (x) − U (x) (U+ stands for the right derivative of U ), and for K ∈ R we define κ(U ) = inf K x>0
p(x) ∈ R ∪ {−∞}. x
(1.8)
Definition 1.9. The space (X , d, μ) has ∞-Ricci curvature bounded below by K, K ∈ R, if for all ν1 , ν2 ∈ P2 (X ) whose supports are included in the support of μ, there exists a Wasserstein geodesic {νt }t∈[0,1] from ν0 to ν1 (this means that W2 (νs , νt ) = |s − t|W2 (ν0 , ν1 ) for all s, t ∈ [0, 1]) such that for all U ∈ DC ∞ and all t ∈ [0, 1], 1 Uμ (νt ) tUμ (ν1 ) + (1 − t)Uμ (ν0 ) − κ(U )t (1 − t)W22 (ν0 , ν1 ). 2
(1.10)
As explained in [32, Theorem 7.3.b], this definition is exactly equivalent to the usual curvature condition (1.6) when X is a smooth Riemannian manifold (M, g). A straightforward consequence of this curvature condition is the inequality (1.12) below called HWI inequality. This inequality is at the heart of the proofs of our main results. Proposition 1.11 (HWI inequality). (See Proposition 3.36 in [32].) Let U ∈ DC ∞ ∩ C 2 ; if (X , d, μ) has ∞-Ricci curvature bounded below by K, then for any probability measure ν absolutely continuous with respect to μ, such that f = dν/dμ is a positive Lipschitz function on X with U (f ) dμ < ∞, it holds Uμ (ν) U (1) +
κ(U ) T2 (ν, μ), Iμ,U (ν) T2 (ν, μ) − 2
where Iμ,U is the generalized Fisher information associated to U , Iμ,U (ν) =
2 f U (f )2 ∇ − f dμ.
(1.12)
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1497
The sketch of the proof of this result is to choose ν0 = ν, ν1 = μ and let t go to 0 in (1.10) (see [32]). 1.4. Main results Now we are in position to give our results concerning logarithmic Sobolev and Poincaré inequalities. Theorem 1.13 (Logarithmic Sobolev inequality). Suppose (X , d, μ) has ∞-Ricci curvature bounded below by K 0 and that μ verifies the Gaussian concentration property (1.1) with positive constants a and M. If the constants a, M and K satisfy the relation |K| log(2) < τ (M) := √ , 2a (2 M + log(2) )2 then μ verifies the logarithmic Sobolev inequality LSI(C) for some C depending only on K, a and M. In particular, when K = 0, one has, for any bounded Lipschitz function f : X → R, DM Entμ f 2 a
− 2 ∇ f dμ,
where D is some universal constant. Let us make a few comments on the above theorem. For K = 0, the result is as good as possible: the logarithmic Sobolev inequality is (up to numerical factors) equivalent to the Gaussian concentration. When K < 0, it is known, in a Riemannian setting, that the Gaussian concentration implies the logarithmic Sobolev inequality, only when |K|/(2a) < 1. Here, we recover the qualitative condition that the concentration constant a has to be larger than the curvature constant K, but with a wrong ratio. Moreover this ratio τ depends on the constant M. Though perfectible, this result is the first extension of Wang’s theorem available on this very general non-smooth framework. Our second main result deals with Poincaré inequality. Theorem 1.14 (Poincaré inequality). Suppose (X , d, μ) has ∞-Ricci curvature bounded below by 0 and that μ verifies the following exponential concentration property: for all A ⊂ X , with μ(A) 1/2, μ Ar 1 − Me−ar ,
∀r 0
with M, a > 0. Then, there exists a constant D that depends only on M such that for any bounded Lipschitz function f : X → R, it holds D Varμ (f ) 2 a
− 2 ∇ f dμ.
(1.15)
1498
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
Since Poincaré inequality gives back exponential concentration, the conclusion of this theorem is quite satisfactory. In [35], Milman has obtained the following striking result on a Riemannian manifold: when K = 0, if μ verifies any non-trivial concentration property (not necessarily exponential) then μ verifies Poincaré inequality (and even Cheeger linear isoperimetric inequality). The proof of this extremely powerful result uses as a main ingredient the fact that, in this situation, the isoperimetric profile Jμ of μ, defined by Jμ (t) = inf{μ+ (A); μ(A) = t}, t ∈ [0, 1], is a concave function of t. The difficult proof of the concavity of Jμ uses purely Riemannian geometric tools, and we do not know if it is reasonable to ask for an extension on metric spaces. This is far beyond the scope of the present paper. The question to know if the conclusion of the above mentioned result by Milman holds on metric spaces is open. Let us end the presentation of our results by saying that during the preparation of this work, we have made the drastic choice to restrict ourselves only to these two functional inequalities. Many Sobolev type inequalities could be covered by our methods: F -Sobolev inequalities, Beckner–Latała–Oleszkiewicz inequalities, super-Poincaré or Nash inequalities. Some results in this direction, without proof, are given in the last section. The reason of this restriction is that we wanted to put in light in the most transparent way the general methodology and the different ingredients entering the proofs. 1.5. Method of proof Here we briefly describe, in the Gaussian case, the method on which rely our proofs. As we said above, the starting point is the HWI inequality which, in the case where U (x) = x log(x), takes the form
K T2 (ν, μ) Iμ,U (ν) − T2 (ν, μ), 2 λ−K 1 T2 (ν, μ) + Iμ,U (ν), 2 2λ
H (ν|μ)
ν ∈ P(X ) (1.16)
− 2 for all λ > 0, with Iμ,U (ν) = |∇ ff | dμ when ν = f μ with f Lipschitz. In recent years, several authors have used this inequality (or the corresponding semiconvexity property given by (1.10)) to derive functional inequalities see [14,1,15,7]. It was first noticed by Otto and Villani in [37] (see also [32] for the metric space case), that (1.16) gives back the Bakry–Emery condition when K > 0. Namely, taking λ = K, the right-hand side of (1.16) is in 1 this case smaller than 2K Iμ,U (ν), and so LSI(2/K) holds. Another application of (1.16) was given in [37] in the case K 0. If μ verifies T2 (C) for some C such that |K|C/2 < 1, then plugging the inequality T2 (ν, μ) CH (ν|μ) into (1.16) leads (for a convenient choice of λ) to the following logarithmic Sobolev inequality H (ν|μ)
C Iμ,U (ν). (1 + KC/2)2
This last argument suggests that the HWI inequality is an efficient tool in order to reverse the hierarchy (1.5), when K 0. To show that Gaussian concentration implies the logarithmic Sobolev inequality, our idea is to plug into (1.16) a transport inequality weaker than T2 . Let us say that μ verifies the (non-tight) transport inequality T2 (c1 , c2 ) for some c1 , c2 0, if
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
T2 (ν, μ) c1 H (ν|μ) + c2 ,
1499
(1.17)
for all ν ∈ P(X ). One of the key ingredients of the proof of Theorem 1.13, is that it is possible to encode the Gaussian concentration property (1.1) by an inequality T2 (c1 , c2 ) with a universal link between the constants a, M, c1 and c2 (see Corollary 2.20). When plugging (1.17) into (1.16), we naturally arrive to a defective logarithmic Sobolev inequality of the form H (ν|μ) d1 Iμ,U (ν) + d2 ,
(1.18)
for all ν with a Lipschitz density with respect to μ. The rest of the proof consists in tightening this inequality. For that purpose, we use a result by Wang showing that, when d2 is small enough, (1.18) implies LSI(C), for some C depending only on d1 and d2 . Non-tight transport inequalities like (1.17) have their own interest. In Section 2, we establish a general link between concentration inequalities and non-tight transport inequalities involving functionals Uμ in the right-hand side. We also give a dual formulation of them, extending a celebrated theorem by Bobkov and Götze [12]. Moreover, this analysis enables us to recover, in a completely analytic way, the fact that dimension free Gaussian concentration is equivalent to T2 , a result obtained by the first named author in [18] using large deviation techniques. To conclude this introduction let us mention two closely related papers. In [7], Barthe and Kolesnikov have followed a similar scheme of proof to go from concentration to functional inequalities. They have shown, that in a very general framework, integrability conditions like (1.7) were sufficient to obtain Sobolev type and isoperimetric inequalities. So the main difference between their paper and ours, is that our results do not involve dimensional quantity like (1.7). In [36], E. Milman has proved that concentration inequalities can be encoded by transport inequalities involving the relative entropy and the L1 -Wasserstein distance: W1 (ν, μ) = inf d(x, y) dπ, π
where the infimum runs over all the couplings of ν and μ. The main difference with our work is that we characterize concentration in terms of the quadratic transport cost T2 . Replacing W1 by T2 requires rather subtle techniques developed in Section 2. 2. Concentration, inf-convolutions and non-tight transport inequalities In this section we deal with the links between concentration and non-tight transport inequalities. Our first task is to establish a dual version of the latter, in the spirit of Bobkov and Götze dual theorem [12]. Then we express the concentration property in term of inf-convolution operator. Finally, we use this approach to recover the characterization of the dimension free Gaussian concentration of [18]. Let us introduce some general notation. In all the section, (X , d) is a polish space. A probability measure μ is said to satisfy a concentration inequality if there is a measurable function α : [0, ∞) → [0, ∞) such that for all A ⊂ X with μ(A) 1/2, μ Ar 1 − α(r), where Ar = {x ∈ X; d(x, A) r}.
∀r > 0,
(2.1)
1500
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
2.1. Transport inequalities and their dual forms In all what follows, we let U : [0, ∞) → R be a lower semicontinuous strictly convex function which we moreover assume to be superlinear (i.e. U (x)/x → ∞ when x goes to ∞). We also impose that U (1) 0 so that, by Jensen’s inequality, Uμ (ν) 0 for all ν ∈ P(X ). We will mainly be concerned with the two following particular cases: U (x) = x log(x), for which Uμ (ν) = H (ν|μ) is the relative entropy of ν with respect to μ, and U (x) = x log2 (e + x). One of our main object of interest is the following non-tight transport inequality. Definition 2.2 (Non-tight transport inequality). One says that μ verifies the transport inequality T2 U (c1 , c2 ), c1 , c2 0, if T2 (ν, μ) c1 Uμ (ν) + c2 ,
∀ν ∈ P(X ).
When U (x) = x log(x), we denote this inequality by T2 (c1 , c2 ), and when c2 = 0, by T2 (c1 ). It is well known that T2 (c1 ) implies the Gaussian concentration property applying the Marton’s argument. Proposition 2.3 below shows that more generally T2 U (c1 , c2 ) also implies concentration properties. Moreover we will show in Section 2.2 that for some specific choices of the function U , T2 U (c1 , c2 ) is actually equivalent to the Gaussian or the exponential concentration property. Proposition 2.3. If μ verifies the inequality T2 U (c1 , c2 ), then μ verifies the following concentration inequality: for all A ⊂ X with μ(A) 1/2, μ Ar 1 − ϕU−1
1 2 (r − ro ) , c1
∀r ro +
c1 U+ (0) + U (0) + ,
√ √ where ϕU (t) = tU (1/t) + (1 − t)U (0), t > 0, and ro = 2 c2 + c1 (U (0) + U (2))/2. Remark 2.4. Observe that the function ϕU (t) = tU (1/t) + (1 − t)U (0), t > 0, is strictly decreasing on (0, ∞) with values in (U+ (0) + U (0), ∞). Its inverse function ϕU−1 is thus strictly decreasing (and well defined) on (U+ (0) + U (0), ∞) and ϕU−1 (r) → 0 when r → ∞ (all these facts are an immediate consequence of the strict convexity and the superlinearity of U ). For U (x) = x log(x), one has ϕU−1 (t) = e−t , t ∈ R. So we conclude that T2 (c1 , c2 ) implies Gaussian concentration. √ − t For U (x) = x log2 (e + x), one has ϕU−1 (t) = e −√t , t 1. In this case, T2 U (c1 , c2 ) implies 1−e exponential concentration. Proof of Proposition 2.3. What follows is a straightforward adaptation of Marton’s argument. If T2 U (c1 , c2 ) holds then the sub-additivity property of W2 implies that for all ν1 , ν2 ∈ P2 (X ), W2 (ν1 , ν2 ) W2 (ν1 , μ) + W2 (μ, ν2 )
c1 Uμ (ν1 ) +
√ c1 Uμ (ν2 ) + 2 c2 .
Let A be a subset of X . Choosing ν1 with density 1A /μ(A) and ν2 with density (1 − 1Ar )/
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1501
(1 − μ(Ar )) with respect to μ, one has r W2 (ν1 , ν2 ), Uμ (ν1 ) = ϕU (μ(A)) ϕU (1/2) = (U (0) + U (2))/2 (since ϕU √ is decreasing) and Uμ (ν2 ) = ϕU (μ(B)). Note that (U (0) + U (2))/ 2 U (1) 0. So, r − ro c1 ϕU (μ(B)) and if r is large enough, we get the desired concentration inequality. 2 Our next aim is to give a dual formulation of the non-tight transport inequalities introduced above. Let Bb be the space of all bounded measurable functions on X and Cb the space of bounded continuous functions on X . For all functions U : [0, ∞) → R, define Λμ (h) = sup (2.5) h dν − Uμ (ν) , ∀h ∈ Bb . ν∈P (X )
If f : X → R ∪ {+∞} is a measurable function bounded from below, let us define the infconvolution operators (Qλ )λ>0 as follows 1 2 Qλ f (x) = inf f (y) + d (x, y) , x ∈ X . λ y∈X For λ = 1 we denote Q1 f by Qf. The following result is a straightforward extension of Bobkov– Götze theorem [12], providing a dual formulation of transport inequalities involving the relative entropy. Theorem 2.6. A probability μ verifies T2 U (c1 , c2 ) if and only if Λμ (Qc1 f ) f dμ + c2 /c1 , ∀f ∈ Cb .
(2.7)
Proof. According to Kantorovich’s theorem T2 (ν, μ) = sup Qh dν − h dμ . h∈Cb
So, μ verifies the transport inequality if and only if for all h ∈ Cb , it holds (Qh)/c1 dν − Uμ (ν) h/c1 dμ + c2 /c1 , ∀ν ∈ P(X ). Optimizing over ν and according to (2.5), we arrive at the equivalent condition Λμ (Qh)/c1 h/c1 dμ + c2 /c1 , ∀h ∈ Cb . Letting f = h/c1 gives (2.7).
2
Define U ∗ (t) = sups0 {st − U (s)}, t ∈ R, then Λμ (h) inf
t∈R
U ∗ (h + t) − t dμ,
∀h ∈ Cb .
(2.8)
1502
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
This easily follows from the fact that Λμ (h) = Λμ (h + t) − t for all t ∈ R, and from Young’s inequality: xy U (x) + U ∗ (y), x 0, y ∈ R. A direct consequence of (2.8) is that T2 U (c1 , c2 ) holds as soon as for all f ∈ Cb , there exists some tf ∈ R such that
U ∗ (Qc1 f + tf ) − tf dμ
f dμ + c2 /c1 .
This will be a key point to show that concentration implies T2 U (c1 , c2 ) (see Section 2.2 below). For the sake of completeness, let us show that (2.8) is actually an equality. It will follow that Uμ is the dual function of Λμ . Proposition 2.9. The following duality formulas hold Λμ (h) = inf
t∈R
U ∗ (h + t) − t dμ,
∀h ∈ Cb ,
(2.10)
and for all ν ∈ P(X ), Uμ (ν) = sup
h∈Cb
= sup
h∈Cb
h dν −
U ∗ (h) dμ
h dν − Λμ (h) .
(2.11)
For example, when U (x) = x log(x), x 0, then U ∗ (y) = ey−1 and we recover the wellknown identity Λμ (h) = inf et−1 eh dμ − t = log eh dμ . t∈R
Proof of Proposition 2.9. For the proof of (2.10), since (2.8) holds, it remains to show the reverse inequality. We can restrict to the case where ν is absolutely continuous with respect to μ. Let g = dν/dμ. Fix h ∈ Cb and set F (t) = U ∗ (h + t) − t dμ, t ∈ R. Since U is superlinear, U ∗ is finite everywhere, and so is F . Furthermore, as U is strictly convex and lower semicontinuous, U ∗ is differentiable (see [40, Chapter 26]). Obviously F (t) −U (0) − t and therefore F (t) → +∞ as t → −∞. Since for all t 0, U (t) < ∞ and U ∗ (x)/x t − U (t)/x it is easy to conclude that U ∗ (x)/x → +∞ as x →+∞. As a consequence we also have F (t) → +∞ as t → +∞. Therefore the infimum inft∈R U ∗ (h + t) − t dμ is reached at some point t0 such that F (t0 ) = 0 or equivalently
∗ U (h + t0 ) dμ = 1.
Being a supremum of increasing functions, U ∗ is increasing and so (U ∗ ) (h + t0 ) 0. Let ν0 denote the probability measure with density g0 = (U ∗ ) (h + t0 ) with respect to μ: one has
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
sup
ν∈P (X )
1503
hg0 − U (g0 ) dμ h dν − Uμ (ν) =
U ∗ (h + t0 ) − t0 dμ
= inf
t∈R
U ∗ (h + t) − t dμ,
where we used the fact that for all x ∈ R x U ∗ (x) − U U ∗ (x) = U ∗ (x).
(2.12)
Let us sketch the proof of this identity in the case when U is of class C 1 (but (2.12) is true without this assumption). For x < U (0+ ), this follows from U ∗ (x) = −U (0) and (U ∗ ) (x) = 0. For x U (0+ ), since U is superlinear, the supremum U ∗ (x) is reached at some point s 0 such that U (s) = x; the equality (2.12) then follows since (U ∗ ) (x) = U −1 (x). The proof of (2.10) is complete. The first equality in (2.11) is proved for instance in [32, Theorem B.2]. The second equality follows from (2.10) and an immediate optimization noticing that Cb is stable under the translations h → h + t. 2 2.2. From concentration to non-tight transport inequalities The purpose of the next proposition is to give a new formulation of the concentration inequality (2.1) in terms of deviation inequalities of inf-convolution operators. Proposition 2.13. A probability μ verifies the concentration property (2.1), if and only if, for all λ > 0, and all measurable functions f : X → R ∪ {+∞} bounded from below, it holds √ μ Qλ f > medμ (f ) + r α( λr ),
r 0.
(2.14)
Proof. We first show that (2.14) implies (2.1). Take A ⊂ X , with μ(A) 1/2, and consider the function fA which is 0 on A and +∞ otherwise. It is clear that 0 is a median for fA , and that Qλ fA (x) = d 2 (x, A)/λ. So applying (2.14) yields √ √ μ x; d(x, A) > λr α( λr ),
r 0,
which gives back (2.1). Now we prove that (2.1) implies (2.14). Let f : X → R ∪ {+∞} be a measurable function bounded from below and define A = {x ∈ X ; f (x) medμ (f )}. If x ∈ Ar , then there is some y ∈ A such that d(x, y) r. Consequently, Qλ f (x) f (y) + d 2 (x, y)/λ medμ (f ) + r 2 /λ. So Ar ⊂ {x ∈ X ; Qλ f (x) medμ (f ) + r 2 /λ} and therefore
1504
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
μ Qλ f (x) > medμ (f ) + r 2 /λ α(r), which is (2.14).
r 0,
2
Now our objective is to deduce transport inequalities from concentration. We need some preparation. Lemma 2.15. If c1 , λ1 , λ2 are positive and such that c1 = λ1 + λ2 , then for any f ∈ Cb , Λμ (Qc1 f )
f dμ + sup Λμ Qλ1 g − medμ (g) + sup medμ (Qλ2 g) − g dμ , g∈Bb
g∈Bb
where Bb denotes the space of bounded and measurable functions on X . Proof. First, the following inequality holds Qc1 f Qλ1 (Qλ2 f ), for all f ∈ Cb (see e.g. [4, proof of Theorem 2.5(ii)]). Furthermore, it follows easily from its definition that Λμ is order preserving: f1 f2 ⇒ Λμ (f1 ) Λμ (f2 ). So, Λμ (Qc1 f ) Λμ Qλ1 (Qλ2 f ) = f dμ + Λμ Qλ1 (Qλ2 f ) − medμ (Qλ2 f ) + medμ (Qλ2 f ) − f dμ, where the last equality follows from the fact that Λμ (h + r) = Λμ (h) + r, for all h ∈ Bb and r ∈ R. Since f and Qλ2 f are bounded, the claim follows by taking supremums over g ∈ Bb . 2 Now, we will use Proposition 2.13 to bound the two supremums in Lemma 2.15. Lemma 2.16. Assume that (2.1) holds for some function α. Then, ∞ √ sup medμ (Qλ g) − g dμ α( λt ) dt,
g∈Bb
∀λ > 0.
0
Lemma 2.17. Assume that (2.1) holds for some function α. Then, if W : R → R is an increasing function of class C 1 bounded from below, it holds sup
g∈Bb
W Qλ g − medμ (g) dμ W (0) +
∞
√ W (t)α( λt ) dt,
∀λ > 0.
0
Proof of Lemma 2.16. Fix a bounded function g : X → R and assume without loss of generality ∞ √ that 0 α( t ) dt < ∞. Since Qλ g(x) g(y) + λ1 d 2 (x, y) for any y ∈ X , it holds that 1 2 −g(y) inf −Qλ g(x) + d (x, y) = Qλ (−Qλ g)(y). λ x∈X
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1505
In particular, −
g dμ
(2.18)
Qλ (−Qλ g) dμ.
Set h = −Qλ g. Then, integrating by part and using Proposition 2.13, one has
Qλ h − medμ (h) dμ
Qλ h − medμ (h) + dμ
∞ =
μ Qλ h − medμ (h) + > t dt
0
∞
μ Qλ h − medμ (h) > t dt
0
∞ √ α( λt ) dt. 0
The expected result follows from (2.18) and the fact that − medμ (h) = medμ (Qλ g).
2
Proof of Lemma 2.17. Integrating by part and using Proposition 2.13 yields
W Qλ g − medμ (g) dμ = W (−∞) +
+∞ W (s)μ Qλ g − medμ (g) s ds
−∞
0 W (−∞) +
+∞ √ W (s) ds + W (s)α( λs ) ds,
−∞
which proves the claim.
0
2
We are now in position to prove that concentration implies non-tight transport inequalities. 1 Theorem 2.19. Assume in addition √ that U is of class C on (0, ∞). If μ verifies (2.1) for some +∞ ∗ function α and 0 (U ) (t)α( λ1 t ) dt < ∞ for some 0 < λ1 , then μ verifies the inequality T2 U (c1 , c2 ) for some constants c1 , c2 > 0. More precisely, for all λ2 > 0, one can take
c1 = λ1 + λ2 and
+∞ +∞ U ∗ (t)α( λ1 t ) dt + c2 = (λ1 + λ2 ) U ∗ (0) + α( λ2 t ) dt . 0
0
1506
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
Proof. The inequality (2.8) provides Λμ (h) U ∗ (h) dμ for all bounded functions h. Applying Lemma 2.17 with W = U ∗ (which is in this case of class C 1 ) yields
U Qλ1 g − medμ (g) dμ U ∗ (0) + ∗
sup
g∈Bb
+∞ ∗ U (t)α( λ1 t ) dt. 0
The rest of the proof follows from Lemmas 2.15 and 2.16 and Theorem 2.6.
2
Let us emphasize two important particular cases corresponding to Gaussian and exponential concentrations. Corollary 2.20 (Gaussian concentration). Let μ be a probability measure on X . If μ verifies the 2 concentration inequality (2.1) with α(r) = Me−ar , r 0, for some a, M 0, then μ verifies T2 (u/a, c(u)M/a), for all u > 1, with c(u) = 4u/(u − 1). Proof. In this case, U (x) = x log(x) + 1 − x, x 0 and U ∗ (x) = ex − 1, x ∈ R. For all λ1 > 1/a, +∞
U
∗
+∞ (t)α( λ1 t ) dt = M e−(aλ1 −1)t dt =
0
0
M . aλ1 − 1
+∞ √ +∞ On the other hand, for all λ2 > 0, 0 α( λ2 t ) dt = M 0 e−aλ2 t dt = M/(aλ2 ). According to Theorem 2.19, we conclude that μ verifies the inequality T2 (c1 , c2 ) with and c2 = (λ1 + λ2 )
c1 = λ1 + λ 2
M M + , aλ1 − 1 aλ2
∀λ1 > 1/a, ∀λ2 > 0.
Equivalently, for all u > 1, μ verifies T2 (u/a, c2 ), with 1 4Mu 1 Mu = inf + , c2 = u>aλ >1 a aλ1 − 1 u − aλ1 a(u − 1) 1 since the infimum is attained at λ1 = (u + 1)/(2a). This completes the proof.
2
Corollary 2.21 (Exponential concentration). Let μ be a probability measure on X . If μ verifies the concentration inequality (2.1) with α(r) = Me−ar , r 0, for some a, M 0, then √ μ verifies T2 U (u/a 2 , c(u)M/a 2 ), for all u > 1, with U (x) = x log2 (e + x) and c(u) = 8u/( 2u − 1 − 1). Proof. According to Lemma A.1(iii), for all λ1 > 1/a 2 +∞ +∞ √ √ ∗ U (t)α( λ1 t ) dt M e−(a λ1 −1) t dt < +∞. 0
0
Hence, applying Theorem 2.19, μ verifies T2 U (c1 , c2 ), with c1 = λ1 + λ2 , λ1 > 1/a 2 and
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1507
+∞ +∞ √ √ √ c2 = (λ1 + λ2 )M e−(a λ1 −1) t dt + e−a λ2 t dt 0
0
1 , = 2(λ1 + λ2 )M + 2 ( a 2 λ1 − 1)2 a λ2
since
+∞ 0
√
e−
t
1
dt = 2. Equivalently, μ verifies T2 U (c1 , c2 ), with c1 = u/a 2 , u > 1 and c2 =
taking s = 12 (1 +
1 8Mu 2Mu 1 inf + , √ √ 2 2 2 u−s a 1<s
√ √ 2u − 1 ) ∈ (1, u) for which (u − s) = ( s − 1)2 .
2
Remark 2.22 (Integrability conditions for transport inequalities). Let us mention that in the literature, many papers have adopted another point of view to relate transport inequalities with tails estimates of μ. It was first observed by Djellout, Guillin and Wu [16] that the integrability condition I=
ead
2 (x,x ) o
dμ(x) < ∞,
for some a > 0 and xo ∈ X , implies Talagrand’s T1 transport inequality: W1 (ν, μ)
CH (ν|μ),
∀ν ∈ P(X ),
where the constant C depends on I . After that, many variants have been proposed to handle different transport costs with different tails behaviours [13,17,19]. All these results are dimensional since the quantity I depends on the dimension of X . E. Milman [36] has obtained a universal translation of concentration inequalities in terms of transport inequalities of the form W1 (ν, μ) CΨ H (ν|μ) ,
∀ν ∈ P(X ),
where Ψ is some concave function related to the concentration function, and C is a constant independent of the dimension. For our purpose, Milman’s results are not adapted since we need to control W2 . 2.3. A characterization of dimension free Gaussian concentration A consequence of the preceding section is that it enables us to give a completely analytic proof of a recent result by the first named author about the equivalence between dimension free Gaussian concentration and Talagrand’s inequality [18]. This was pointed out to us by M. Ledoux. Corollary 2.23. A probability measure μ on X verifies T2 (C) if and only if for all a < 1/C, there is some positive M(a) such that for all positive integers n, the product probability measure μn verifies the concentration inequality
1508
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
2 μn Ar 1 − M(a)e−ar ,
∀r 0,
for all A ⊂ X n with μn (A) 1/2, where the enlargement Ar is defined by Ar = x ∈ X n ; inf
y∈A
n
d 2 (xi , yi ) r 2 .
i=1
Proof. The fact that T2 implies dimension free Gaussian concentration is well known, so we will only prove the converse. According to Corollary 2.20, the assumed concentration property implies that for all a < 1/C, for all positive integers n and all u > 1, u 4M(a)u , T2 β, μn H β|μn + a a(u − 1) n for all probability measure β on X (here the transport cost is defined with respect to the metric n n n 2 d2 (x, y) = i=1 d (xi , yi ) on X ). In particular, taking β = ν and using the following easy n n n n to check relations: T2 (ν , μ ) = nT2 (ν, μ) and H (ν |μ ) = nH (ν|μ), we obtain
T2 (ν, μ)
1 4M(a)u u H (ν|μ) + · . a n a(u − 1)
Letting n → ∞ and then u → 1 and a → 1/C, we arrive at T2 (C), which completes the proof. 2 3. Log-Sobolev inequality: proof of Theorem 1.13 This section is devoted to the proof of the following quantitative version of Theorem 1.13. Theorem 3.1. Define c(u) = 4u/(u − 1), u > 1, and for M > 0 τ (M) = sup
log(2) r ; u > 1, 0 r < log(2) = √ . Mc(u) + ru (2 M + log(2) )2
Suppose that (X , d, μ) has ∞-Ricci curvature bounded below by K 0 and assume that μ verifies the Gaussian concentration property (1.1) with positive constants a and M. If the constants a, M and K satisfy the relation |K|/(2a) < τ (M), then μ verifies the logarithmic Sobolev inequality LSI(C) for some C depending only on K, a and M. More precisely, if |K|/(2a) < r/(Mc(u) + ru) for some u > 1 and r ∈ (0, log(2)), then μ verifies for all f : X → R smooth enough 1 Entμ f 2 B(u, r, M, K) a with B(u, r, M, K) =
|∇ − f |2 dμ,
(Mc(u)+ru)2 2+r Mc(u)(2r−|K|(Mc(u)+ru)) (1 + 2 2−er ).
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1509
In particular, when K = 0, the following logarithmic Sobolev inequality holds DM Entμ f 2 a
|∇ − f |2 dμ,
where D is some absolute numerical constant. The sketch of the proof of this theorem is the following. Corollary 2.20 ensures that the Gaussian concentration hypothesis implies T2 (c1 , c2 ). Proposition 3.2 indicates that T2 (c1 , c2 ) and the curvature condition imply a non-tight logarithmic-Sobolev inequality. The proof is completed by tightening this Sobolev inequality thanks to a Poincaré inequality. Proposition 3.2. Suppose that (X , d, μ) has ∞-Ricci curvature bounded below by K 0. If μ verifies the transport inequality T2 (c1 , c2 ), then it verifies the following non-tight logarithmic Sobolev inequality: for all bounded Lipschitz functions f Entμ f 2
2(c2 + c1 r)2 c2 (2r − |K|(c2 + c1 r))
− 2 ∇ f dμ + r
f 2 dμ,
for all r > |K|c2 /(2 − |K|c1 ). Proof. Under the curvature condition, by Proposition 1.11 applied with the function U (x) = x log(x), the following HWI inequality holds
K T2 (ν, μ) Iμ,U (ν) − T2 (ν, μ), 2 λ + |K| 1 T2 (ν, μ) + Iμ,U (ν), 2 2λ
H (ν|μ)
ν ∈ P(X )
for all λ > 0, where Iμ,U (ν) is the usual Fisher information (associated to U (x) = x log x). Consequently, the transport inequality T2 (c1 , c2 ) yields H (ν|μ)
(λ + |K|)c1 (λ + |K|)c2 1 H (ν|μ) + Iμ,U (ν) + . 2 2λ 2
So, if λ + |K| < 2, it holds H (ν|μ)
(λ + |K|)c2 1 Iμ,U (ν) + . λ(2 − (λ + |K|)c1 ) (2 − (λ + |K|)c1 )
Applying this inequality to dν = Entμ f 2 Letting r =
2 f f 2 dμ
4 λ(2 − (λ + |K|)c1 )
(λ+|K|)c2 (2−(λ+|K|)c1 )
dμ, with a Lipschitz bounded function f , we get
gives the result.
− 2 ∇ f dμ + 2
(λ + |K|)c2 (2 − (λ + |K|)c1 )
f 2 dμ.
1510
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
To obtain a logarithmic Sobolev inequality we will take advantage of a self-tightening phenomenon first observed by Wang [48] and described in the proposition below. Proposition 3.3 (Self-tightening phenomenon). If a probability measure μ verifies the non-tight logarithmic-Sobolev inequality Entμ f 2 b1
− 2 ∇ f dμ + b2
f 2 dμ,
with b2 < log(2), then it satisfies the logarithmic Sobolev inequality LSI(C) with 2 + b2 . C = b1 1 + 2 2 − eb2 Remark 3.4. The condition b2 < log(2) is sharp. Wang has obtained a counterexample in [48]. The proof of Proposition 3.3 is based on the two following lemmas due to Wang [47,48]. Lemma 3.5 (Non-tight Poincaré inequality). If a probability measure μ verifies the non-tight logarithmic-Sobolev inequality Entμ f 2 b1
− 2 ∇ f dμ + b2
f 2 dμ,
(3.6)
for all bounded Lipschitz functions f , then it verifies the following Poincaré type inequality
f 2 dμ b1
− 2 ∇ f dμ + eb2
|f | dμ .
Proof. Below we in a proof of Wang [47]. Take f such that improve the constants and denote α = f 2 dμ and β = |∇ − f |2 dμ. Then, we use the formula
(3.7)
|f | dμ = 1
√ s
x log x 2 /α = sup sx − 2 αe 2 −1 . s∈R
So, for all s ∈ R, √ s sα − 2 αe 2 −1
2 f |f | dμ b1 β + b2 α. |f | log α
√ s So, in particular, (s − b2 )α − 2 αe 2 −1 − b1 β 0, for all s > b2 . One conclude from this that s
√ e 2 −1 + α
es−2 + (s − b2 )b1 β , s − b2
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1511
and this implies that 4es−2 2b1 β+ . s − b2 (s − b2 )2
α In other words, for all f it holds f 2 dμ
2b1 s − b2
− 2 ∇ f dμ +
4es−2 (s − b2 )2
2 |f | dμ
,
s > b2 ,
and therefore, since infs>b2 4es−2 /(s − b2 )2 is reached for s = b2 + 2, one gets (3.7).
2
The next lemma states that if the second constant in the Poincaré type inequality (3.7) is sufficiently small then the Poincaré inequality holds. Lemma 3.8. If a probability measure μ verifies the inequality
f dμ d1 2
− 2 ∇ f dμ + d2
2 |f | dμ
,
(3.9)
for all bounded Lipschitz functions f with a constant d2 < 2, then it verifies the following Poincaré inequality Varμ (f )
2d1 2 − d2
− 2 ∇ f dμ.
Remark 3.10. Wang [48] has shown that the condition d2 < 2 is optimal. Proof of Lemma 3.8. Take f a bounded Lipschitz function and consider the bounded Lipschitz functions f+ = max(f − m, 0)
and f− = min(f − m, 0),
where m is the median of f . It is not difficult to check that − − ∇ f+ = ∇ f 1{f >m}
and ∇ − f− = ∇ − f 1{f m} .
Apply (3.9) to the function f+ ; then Cauchy–Schwarz inequality yields
f >m
− 2 ∇ f dμ + d2 2
(f − m)2 dμ d1 f >m
(f − m)2 dμ. f >m
Doing the same with f− and summing the two inequalities yields
(f − m) dμ d1 2
− 2 ∇ f dμ + d2 2
(f − m)2 dμ,
(3.11)
1512
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
and so (f − m)2 dμ
2d1 2 − d2
− 2 ∇ f dμ.
Since, Varμ (f ) (f − m)2 dμ, this ends the proof.
2
Proof of Proposition 3.3. Lemma 3.5 and (3.6) imply that
f 2 dμ b1
− 2 ∇ f dμ + eb2
2 |f | dμ
.
According to Lemma 3.8, we conclude that if b2 < log 2, then μ verifies the following Poincaré inequality: Varμ (f )
2b1 2 − eb2
− 2 ∇ f dμ.
(3.12)
We can now tighten the inequality (3.6). Namely, according to Rothaus’ lemma [41] (see also [2, Lemma 4.3.8]), it holds Entμ f 2 Entμ f¯2 + 2 Varμ (f ), with f¯ = f − f dμ. So applying (3.6) together with (3.12) gives the result.
2
Proof of Theorem 3.1. According to Corollary 2.20, μ verifies T2 (u/a, c(u)M/a), for all u > 1, with c(u) = 4u/(u − 1). Thus it follows from Proposition 3.2 that 1 Entμ f 2 b(u, r, M, K) a
− 2 ∇ f dμ + r
f 2 dμ,
(3.13)
with b(u, r, M, K) =
(Mc(u) + ru)2 , Mc(u)(2r − |K|(Mc(u) + ru))
|K|Mc(u) |K| 2r 2a−|K|u or equivalently when a < Mc(u)+ru . According 2r that if |K| a < Mc(u)+ru for some u > 1 and r < log 2, then
for all r > conclude
1 Entμ f 2 B(u, r, M, K) a
to Proposition 3.3, we
− 2 ∇ f dμ,
2+r with B(u, r, M, K) = b(u, r, M, K)(1 + 2 2−e r ). The proof of Theorem 3.1 is complete.
2
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1513
4. Poincaré inequality: proof of Theorem 1.14 In this section we deal with probability measures verifying an exponential concentration inequality as follows μ Ar 1 − Me−ar ,
∀r 0,
(4.1)
for all A ⊂ X such that μ(A) 1/2. In all this part, the measured length space (X , d, μ) is assumed to have ∞-Ricci curvature bounded below by 0. The basic reason is that we want to use the HWI inequality with U (x) = x log2 (e + x), x 0, for which κ(U ) = −∞ if K < 0 according to (1.8). The proof of Theorem 1.14 is similar to the proof of Theorem 3.1. We first establish a non-tight “U -Sobolev” inequality (see Proposition 4.2 below) that provides a non-tight Poincaré inequality (Proposition 4.4). Under null curvature condition, we may also obtain a weak Poincaré inequality (see Proposition 4.7). And it is known in the literature that a non-tight Poincaré inequality together with a weak Poincaré inequality implies a Poincaré inequality (see Proposition 4.7 below). For completeness, this is recalled in Proposition A.2 in Appendix A. Our strategy can be summarized as follows ⎫ Concentration ⇒ T2 U (c1 , c2 ) ⎪ ⎬ ⎫ ⇒ Non-tight “U -Sobolev” ⎪ + ⎬ ⎪ ⎭ + ⇒ Poincaré. Bounded curv. ⇒ HWI ⎪ ⎭ HWI ⇒ Weak Poincaré Proposition 4.2. Suppose that (X , d, μ) has ∞-Ricci curvature bounded below by 0. If μ verifies (4.1), then, it holds
U (g) dμ b1
log2 (e + g) − 2 ∇ g dμ + b2 , e+g
for all Lipschitz functions g, where b1 = 16u/a 2 and b2 = 4 +
(4.3)
√ 8M . 2u−1−1
Proof. The function U (x) = x log2 (e + x), x ∈ [0, ∞) is in the class DC ∞ ∩ C 2 . Under the non-negative curvature condition, Proposition 1.11 ensures that for every probability measures dν = g dμ with a positive Lipschitz function g such that U (g) dμ < ∞,
U (g) dμ U (1) +
2 gU (g)2 ∇ − g dμ T2 (ν, μ).
√ Using the inequalities ab εb + a/(4ε) for all ε > 0, U (1) = log2 (e + 1) 2 and g/(e + g) 1, and Lemma A.1(ii), we get for every ε > 0, U (g) dμ 2 + εT2 (ν, μ) +
4 ε
log2 (e + g) − 2 ∇ g dμ. e+g
Under the concentration property (4.1), Corollary 2.21 ensures that
1514
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
T2 (ν, μ) c1
U (g) dμ + c2 ,
with c1 = u/a 2 , c2 = c(u)M/a 2 for all u > 1 and c(u) = ε < 1/c1 ,
U (g) dμ b1
√ 8u . 2u−1−1
It follows that for every
log2 (e + g) − 2 ∇ g dμ + b2 , e+g
with b1 = 4/(ε(1 − εc1 )) and b2 = (2 + εc2 )/(1 − εc1 ). Taking ε = 1/(2c1 ) completes the proof. 2 Proposition 4.4 (Non-tight Poincaré inequality). Assume that there exist some non-negative con + with g dμ = 1 and and b such that for any positive Lipschitz function g : X → R stants b 1 2 U (g) dμ < ∞, it holds
log2 (e + g) − 2 ∇ g dμ + b2 . e+g
g log (e + g) dμ b1 2
(4.5)
Then, one has the following non-tight Poincaré inequality: for any bounded Lipschitz function h : X → R,
h2 dμ 16b1
− 2 ∇ h dμ + 4b2 e2b2
2 |h| dμ
.
(4.6)
Proposition 4.7 (Weak Poincaré inequality). Suppose that (X , d, μ) has ∞-Ricci curvature bounded below by 0. If μ verifies C = sup
g∈Bb
Qg −
g dμ +
dμ < +∞,
(4.8)
then for any bounded Lipschitz function h : X → R, for all s > 0, one has C Varμ (h) s
− 2 ∇ h dμ + s Osc(h)2 ,
(4.9)
where Osc(h) = sup(h) − inf(h). We postpone the proof of these two propositions in order to prove Theorem 1.14. Proof of Theorem 1.14. First let us show that under the concentration property (4.1), it holds 8M Qg − g dμ dμ 2 . sup a g∈Bb + Namely, for every bounded function g, it holds
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1515
Q1/2 (Q1/2 g) − g dμ dμ Qg − g dμ dμ +
+
Q1/2 (Q1/2 g) − medμ (Q1/2 g) + dμ
+ medμ (Q1/2 g) −
g dμ
, +
where the first inequality comes from the inequality Qg Q1/2 (Q1/2 g). According to Lemmas 2.16 and 2.17, sup
g∈Bb
Q1/2 g − medμ (g) + dμ + sup medμ (Q1/2 g) − g dμ g∈Bb
+∞
e−a
2M
√
t/2
dt =
+
8M , a2
0
which gives the result. According to Propositions 4.2, 4.4, 4.7 and A.2 we conclude that μ verifies a Poincaré inequality of the form Varμ (f ) for all bounded Lipschitz functions f .
c(M) a2
− 2 ∇ f dμ,
2
The two following subsections are devoted to the proofs of Proposition 4.4 and Proposition 4.7. 4.1. Non-tight Poincaré inequality Eq. (4.5) is close to (but yet different from) an inequality called I (τ ) introduced by Kolesnikov [24] and further studied in [7]. Using some techniques from [7] we deduce from (4.5) a non-tight Poincaré inequality. Proof of Proposition 4.4. Let ψ : R+ → R+ be the inverse function of U , ψ = U −1 . The function ψ is increasing and concave with ψ(0) = 0 since U is increasing and convex. Fix a bounded positive Lipschitz function f on X with f dμ = 1 and consider its Luxembourg-norm like f dμ 1 . L = inf λ: ψ λ Set g = ψ(f/L). By construction, g dμ = 1. Since ψ is increasing, one has |∇ − g| = ψ (f/L)|∇ − (f/L)|. Hence, applying (4.5) to g leads to
f dμ b1 L
2 2 log2 (e + ψ(f/L)) ψ (f/L) ∇ − (f/L) dμ + b2 L. e + ψ(f/L)
(4.10)
1516
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
Lemma A.1(i) implies that 2 ψ (u) =
1
U (ψ(u))2
1
=
log (e + ψ(u)) 4
ψ(u) u log (e + ψ(u)) 2
.
Therefore
|∇ − f |2 dμ + b2 L. f From the concavity of ψ , 1 = ψ(f/L) dμ ψ( f dμ/L) = ψ(1/L). Consequently L 1/U (1) < 1 and f dμ b1
L=L
ψ(f/L) dμ
ψ(f ) dμ.
Hence
f dμ b1
|∇ − f |2 dμ + b2 f
ψ(f ) dμ.
The latter applied to f = h2 /μ(h2 ) leads to
h dμ 4b1 2
− 2 ∇ h dμ + b2 μ h2
|h|F
|h| μ(h2 )
dμ,
(4.11)
where μ(h2 ) = h2 dμ and F (y) = ψ(y 2 )/y, y > 0. The next step is to bound the function F by affine functions. Since x/s U (x) + U ∗ (1/s) for every s > 0, x 0, then one has for every real numbers y, ψ y 2 y 2 s + sU ∗ (1/s). It follows that F (y) =
ψ(y 2 ) ψ(y 2 ) log2 (e + ψ(y 2 ))
√ ψ y 2 |y| s + sU ∗ (1/s).
Fix a bounded Lipschitz function h (not necessarily positive) with |h| dμ = 1 and set α = μ(h2 ). It follows from (4.11) and the previous computations that for 0 < s 1/b22 , √ α 2 (1 − b2 s ) − αb2 sU ∗ (1/s) − β 0, where β = 4b1 |∇ − h|2 dμ. This implies that √ √ b2 sU ∗ (1/s) + b22 sU ∗ (1/s) + 4β(1 − b2 s ) α , √ 2(1 − b2 s )
∀s ∈ 0, 1/b22 ,
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1517
and therefore h2 dμ
8b1 √ 1 − b2 s
2 ∗ − 2 ∇ h dμ + b2 sU (1/s) . √ (1 − b2 s )2
Choosing s = 1/(4b22 ) and using Lemma A.1(iv) leads to the desired inequality (4.6).
2
4.2. Weak Poincaré inequality In this section, we prove Proposition 4.7. Proof of Proposition 4.7. The weak Poincaré inequality (4.9) is a simple consequence of the usual HWI inequality (1.12) for U (x) = x log(x) that holds when the ∞-Ricci curvature is bounded below by 0. Namely, for any bounded Lipschitz function f > 0 with f dμ = 1, Entμ (f )
T2 (f μ, μ)
|∇ − f |2 dμ, f
and therefore for all s > 0, Entμ (f ) sT2 (f μ, μ) +
1 4s
|∇ − f |2 dμ. f
(4.12)
The first step is to bound T2 (f μ, μ). By the Kantorovich’s dual characterization of T2 , T2 (f μ, μ) = sup
g∈Cb
Qg −
g dμ f dμ.
Since Qg g, it holds Qg − g dμ (f − inf f ) dμ Qg − g dμ f dμ = + inf(f ) Qg dμ − g dμ Qg − g dμ dμ. Osc(f ) +
Consequently one has T2 (f μ, μ) C Osc(f ).
1518
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
By homogeneity, applying (4.12) to f = (h − inf h)2 / (h − inf h)2 dμ, it follows that
Entμ (h − inf h)
2
1 − 2 ∇ (h − inf h)2 dμ sC Osc (h − inf h) + s 1 ∇ − h2 dμ. = sC Osc2 (h) + s
The standard inequality Varμ (f ) Entμ (f 2 ) for f 0 (see e.g. [2, inequality (1.9)]) ends the proof of (4.9) since Varμ (h) = Varμ (h − inf h) Entμ (h − inf h)2 .
2
5. Extensions As mentioned in the introduction, our approach generalizes to other types of concentration (different from Gaussian and exponential). We present in this section some results in this direction, without details. For example, one could consider concentration between exponential and Gaussian of the type: for all A ⊂ X with μ(A) 1/2, 2/γ μ Ar 1 − Me−ar ,
∀r 0,
(5.1)
where γ ∈ [1, 2). In this case, one has to apply Proposition 1.11 with the function U (x) = x logγ (e + x), x 0, which belongs to the class DC ∞ ∩ C 2 . This, together with Theorem 2.19 and few rearrangements, lead to a non-tight inequality of the type (for any positive Lipschitz function f with f dμ = 1)
b1 U (f ) dμ γ a
log2(γ −1) (e + f ) − 2 ∇ f dμ + b2 e+f
for some positive constants b1 , b2 depending only on M. Now, following the same lines as in the proof of Proposition 4.4 (see Section 4), it is possible to derive the following non-tight F -Sobolev inequality c1 − 2 2 ∇ f dμ + c2 , e + f dμ γ (5.2) f log a for all bounded Lipschitz functions f with f 2 dμ = 1 (where c1 , c2 are positive constants depending only on M), and also a non-tight Poincaré inequality. If (X , d, μ) has ∞-Ricci curvature bounded below by 0, Proposition 4.7 applies and leads to a weak Poincaré inequality. This inequality together with the non-tight Poincaré inequality previously obtained imply a Poincaré inequality, as explained in Proposition A.2. Finally, one applies the analogue of Rothaus’ lemma for F -Sobolev inequalities (see [6,39,7]) in order to tighten inequality (5.2) and end up with
2
2−γ
D f 2 log2−γ e + f 2 − log2−γ (e + 1) dμ γ a
− 2 ∇ f dμ,
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1519
for all bounded Lipschitz functions f with f 2 dμ = 1, where D is a positive constant that depends only on M. Such an inequality does not enjoy the tensorization property as the Poincaré inequality or the logarithmic Sobolev inequality. However, it is known [50] to be equivalent to Beckner–Latała–Oleszkiewicz inequalities (i.e. inequality (5.5) below) that do tensorize [8,25]. Adjusting all the previous computations would lead to the following theorem. Theorem 5.3. Suppose that (X , d, μ) has ∞-Ricci curvature bounded below by 0 and fix γ ∈ [1, 2). If μ verifies the concentration property (5.1) for some M, a > 0, then there exists a constant C that depends only on M such that for any bounded Lipschitz function f : X → R with f 2 dμ = 1, it holds
C f 2 log2−γ e + f 2 − log2−γ (e + 1) dμ γ a
− 2 ∇ f dμ,
(5.4)
and sup p∈(1,2)
f 2 dμ − ( |f |p dμ)2/p C − 2 ∇ f dμ. aγ (2 − p)2−γ
(5.5)
As the reader might have noticed, inequality (5.4) has the flavour of the logarithmic Sobolev inequality and the Poincaré inequality, respectively, when γ = 1 and γ → 2, respectively. Acknowledgments The authors warmly thank Christian Léonard and Michel Ledoux for useful discussions on the topics of this paper. Appendix A. Technical results In this appendix we collect some technical facts about the function U (x) = x log2 (e + x). Also, we recall the known result that a non-tight Poincaré inequality together with any weak Poincaré inequality imply a (tight) Poincaré inequality. Lemma A.1. Let U (x) = x log2 (e + x) for x 0. Then, (i) (ii) (iii) (iv)
log2 (e + x) U (x), x 0. U (x) 4 log(e+x) e+x , x√ 0. ∗ U (x) −e +√exp{ x }, x 1. √ U ∗ (x) 2 xe x , x 0.
Proof. Point (i) follows from U (x) = log(e + x)2 + Point (ii) is a consequence of the fact that
2x log(e + x). e+x
1520
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
U (x) =
x 2 log(e + x) 2e + x + e+x e+x (e + x) log(e + x)
x and that 0 2e+x e+x + (e+x) log(e+x) 2. We omit details. Point (iii) follows from point (i) and U ∗ = U −1 . Using point (iii), U ∗ (0) = − infy {U (y)} = 0 and an integration by parts, we get point (iv):
∗
x
U (x) =
x
∗
U (y) dy −ex + 0
e
√ y
dy = −ex + 2
√ √ √x xe − e x + 1
0
√ √ 2 xe x .
2
The next proposition shows that the Poincaré inequality is a consequence of both non-tight Poincaré inequality and weak Poincaré inequality. This result is well known, see e.g. [47,49,7,51]. We write here the version by Wang [49, Corollary 4.1.2]. Proposition A.2 (Wang). Assume that there exist two constants d1 , d2 > 0 and a non-increasing positive function β, on (0, 1/2) such that for any bounded Lipschitz function f : X → R, it holds
f 2 dμ d1
− 2 ∇ f dμ + d2
2 |f | dμ
(Non-tight Poincaré)
and Varμ (f ) β(s)
− 2 ∇ f dμ + s Osc(f )2
(Weak Poincaré).
Then, every bounded Lipschitz functions f : X → R verifies Varμ (f )
d1 + β(s) √ s∈(0,d −1 ) 1 − d2 s sup
− 2 ∇ f dμ (Poincaré).
2
References [1] M. Agueh, N. Ghoussoub, X. Kang, Geometric inequalities via a general comparison principle for interacting gases, Geom. Funct. Anal. 14 (1) (2004) 215–244. [2] C. Ané, S. Blachère, D. Chafaï, P. Fougères, I. Gentil, F. Malrieu, C. Roberto, G. Scheffer, Sur les inégalités de Sobolev logarithmiques, Panor. Syntheses, vol. 10, Société Mathématique de France, Paris, 2000, with a preface by Dominique Bakry and Michel Ledoux. [3] D. Bakry, M. Ledoux, Lévy–Gromov’s isoperimetric inequality for an infinite-dimensional diffusion generator, Invent. Math. 123 (2) (1996) 259–281. [4] Z. Balogh, A. Engoulatov, L. Hunziker, O.E. Maasalo, Functional inequalities and Hamilton–Jacobi equations in geodesic spaces, preprint, available on http://arxiv.org/abs/0906.0476, 2009. [5] F. Barthe, Isoperimetric inequalities, probability measures and convex geometry, in: European Congress of Mathematics, Eur. Math. Soc., Zürich, 2005, pp. 811–826. [6] F. Barthe, P. Cattiaux, C. Roberto, Interpolated inequalities between exponential and Gaussian, Orlicz hypercontractivity and isoperimetry, Rev. Mat. Iberoamericana 22 (3) (2006) 993–1067. [7] F. Barthe, A.V. Kolesnikov, Mass transport and variants of the logarithmic Sobolev inequality, J. Geom. Anal. 18 (4) (2008) 921–979.
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
1521
[8] W. Beckner, A generalized Poincaré inequality for Gaussian measures, Proc. Amer. Math. Soc. 105 (2) (1989) 397–400. [9] S.G. Bobkov, Isoperimetric and analytic inequalities for log-concave probability measures, Ann. Probab. 27 (4) (1999) 1903–1921. [10] S.G. Bobkov, On isoperimetric constants for log-concave probability distributions, in: Geometric Aspects of Functional Analysis, in: Lecture Notes in Math., vol. 1910, Springer, Berlin, 2007, pp. 81–88. [11] S.G. Bobkov, I. Gentil, M. Ledoux, Hypercontractivity of Hamilton–Jacobi equations, J. Math. Pures Appl. (9) 80 (7) (2001) 669–696. [12] S.G. Bobkov, F. Götze, Exponential integrability and transportation cost related to logarithmic Sobolev inequalities, J. Funct. Anal. 163 (1) (1999) 1–28. [13] F. Bolley, C. Villani, Weighted Csiszár–Kullback–Pinsker inequalities and applications to transportation inequalities, Ann. Fac. Sci. Toulouse Math. (6) 14 (3) (2005) 331–352. [14] D. Cordero-Erausquin, Some applications of mass transport to Gaussian-type inequalities, Arch. Ration. Mech. Anal. 161 (3) (2002) 257–269. [15] D. Cordero-Erausquin, W. Gangbo, C. Houdré, Inequalities for generalized entropy and optimal transportation, in: Recent Advances in the Theory and Applications of Mass Transport, in: Contemp. Math., vol. 353, Amer. Math. Soc., Providence, RI, 2004, pp. 73–94. [16] H. Djellout, A. Guillin, L. Wu, Transportation cost-information inequalities and applications to random dynamical systems and diffusions, Ann. Probab. 32 (3B) (2004) 2702–2732. [17] N. Gozlan, Integral criteria for transportation-cost inequalities, Electron. Comm. Probab. 11 (2006) 64–77 (electronic). [18] N. Gozlan, A characterization of dimension free concentration in terms of transport inequalities, Ann. Probab. 37 (6) (2009) 2480–2498. [19] N. Gozlan, C. Léonard, A large deviation approach to some transportation cost inequalities, Probab. Theory Related Fields 139 (1–2) (2007) 235–283. [20] N. Gozlan, C. Léonard, Transport inequalities. A survey, Markov Process. Related Fields, in press, available on http://arxiv.org/abs/1003.3852, 2010. [21] N. Gozlan, C. Roberto, P.M. Samson, A new characterization of Talagrand’s transport-entropy inequalities and applications, Ann. Probab. (2010), doi:10.1214/10-AOP570, in press. [22] L. Gross, Logarithmic Sobolev inequalities, Amer. J. Math. 97 (4) (1975) 1061–1083. [23] L. Gross, Logarithmic Sobolev inequalities and contractivity properties of semi-groups, in: G. Dell’Antonio, U. Mosco (Eds.), Dirichlet Forms, in: Lecture Notes in Math., vol. 1563, Springer, Berlin, 1993, pp. 54–88. [24] A.V. Kolesnikov, Modified log-Sobolev inequalities and isoperimetry, Atti Accad. Naz. Lincei Cl. Sci. Fis. Mat. Natur. Rend. Lincei (9) Mat. Appl. 18 (2) (2007) 179–208. [25] R. Latała, K. Oleszkiewicz, Between Sobolev and Poincaré, in: Geometric Aspects of Functional Analysis, in: Lecture Notes in Math., vol. 1745, Springer, Berlin, 2000, pp. 147–168. [26] M. Ledoux, A simple analytic proof of an inequality by P. Buser, Proc. Amer. Math. Soc. 121 (3) (1994) 951–959. [27] M. Ledoux, Isoperimetry and Gaussian analysis, in: Lectures on Probability Theory and Statistics, Saint-Flour, 1994, in: Lecture Notes in Math., vol. 1648, Springer, Berlin, 1996, pp. 165–294. [28] M. Ledoux, The geometry of Markov diffusion generators, Ann. Fac. Sci. Toulouse Math. (6) 9 (2) (2000) 305–366, Probability theory. [29] M. Ledoux, The Concentration of Measure Phenomenon, Math. Surveys Monogr., vol. 89, Amer. Math. Soc., Providence, RI, 2001. [30] M. Ledoux, From concentration to isoperimetry: semigroup proofs, preprint, 2009. [31] J. Lott, C. Villani, Hamilton–Jacobi semigroup on length spaces and applications, J. Math. Pures Appl. (9) 88 (3) (2007) 219–229. [32] J. Lott, C. Villani, Ricci curvature for metric-measure spaces via optimal transport, Ann. of Math. (2) 169 (3) (2009) 903–991. [33] K. Marton, A simple proof of the blowing-up lemma, IEEE Trans. Inform. Theory 32 (3) (1986) 445–446. [34] E. Milman, Isoperimetric and concentration inequalities. Equivalence under curvature lower bound, Duke Math. J. 154 (2) (2010) 207–239. [35] E. Milman, On the role of convexity in functional and isoperimetric inequalities, Proc. Lond. Math. Soc. (3) 99 (1) (2009) 32–66. [36] E. Milman, Properties of isoperimetric, functional and transport-entropy inequalities via concentration, preprint, available on http://arxiv.org/abs/0909.0207, 2010. [37] F. Otto, C. Villani, Generalization of an inequality by Talagrand and links with the logarithmic Sobolev inequality, J. Funct. Anal. 173 (2) (2000) 361–400.
1522
N. Gozlan et al. / Journal of Functional Analysis 260 (2011) 1491–1522
[38] C. Roberto, Isoperimetry for product of probability measures: recent results, Markov Process. Related Fields, in press. [39] C. Roberto, B. Zegarli´nski, Orlicz–Sobolev inequalities for sub-Gaussian measures and ergodicity of Markov semigroups, J. Funct. Anal. 243 (1) (2007) 28–66. [40] R. Tyrrell Rockafellar, Convex Analysis, Princeton Landmarks in Mathematics, Princeton University Press, Princeton, NJ, 1997, reprint of the 1970 original, Princeton Paperbacks. [41] O.S. Rothaus, Analytic inequalities, isoperimetric inequalities and logarithmic Sobolev inequalities, J. Funct. Anal. 64 (1985) 296–313. [42] A.J. Stam, Some inequalities satisfied by the quantities of information of Fisher and Shannon, Inform. Control 2 (1959) 101–112. [43] K.T. Sturm, On the geometry of metric measure spaces. I, Acta Math. 196 (1) (2006) 65–131. [44] K.T. Sturm, On the geometry of metric measure spaces. II, Acta Math. 196 (1) (2006) 133–177. [45] C. Villani, Optimal Transport, Grundlehren Math. Wiss., vol. 338, Springer-Verlag, Berlin, 2009, old and new. [46] F.Y. Wang, Logarithmic Sobolev inequalities on noncompact Riemannian manifolds, Probab. Theory Related Fields 109 (3) (1997) 417–424. [47] F.Y. Wang, Functional inequalities for empty essential spectrum, J. Funct. Anal. 170 (1) (2000) 219–245. [48] F.Y. Wang, Spectral gap for hyperbounded operators, Proc. Amer. Math. Soc. 132 (9) (2004) 2629–2638 (electronic). [49] F.Y. Wang, Functional Inequalities, Markov Processes and Spectral Theory, Science Press, Beijing, 2005. [50] F.Y. Wang, A generalization of Poincaré and log-Sobolev inequalities, Potential Anal. 22 (1) (2005) 1–15. [51] P. Zitt, Super Poincaré inequalities, Orlicz norms and essential spectrum, preprint, available at hal-00426367.
Journal of Functional Analysis 260 (2011) 1523–1542 www.elsevier.com/locate/jfa
Hankel operators, the Segal–Bargmann space, and symmetrically-normed ideals ✩ Duane Farnsworth ∗,1 State University of Buffalo, 244 Mathematics Building, Buffalo, NY 14260-2900, USA Received 5 July 2010; accepted 28 October 2010 Available online 13 November 2010 Communicated by D. Voiculescu
Abstract Starting with the Segal–Bargmann space, we investigate the Hankel operators with symbol functions in a certain linear space. Given an appropriate symbol function, we consider the associated Hankel operator together with the Hankel operator associated with that symbol function’s complex conjugate. We give a necessary and sufficient condition for the simultaneous membership of these two operators in the symmetrically-normed ideal associated with any given symmetric norming function. © 2010 Elsevier Inc. All rights reserved. Keywords: Symmetrically-normed ideal; Hankel operator; Segal–Bargmann space; Fock space
1. Introduction Let dμ be the Gaussian measure on Cn centered at zero and normalized so that the measure of the whole space is one. Therefore dμ(z) = π −n e−|z| dV (z), 2
✩
This paper is based on the author’s Ph.D. dissertation, written at the State University of New York at Buffalo under the supervision of Professor Jingbo Xia. * Fax: (001) (304) 696 4646. E-mail address: [email protected]. 1 Present address: Mathematics Department, Marshall University, One John Marshall Drive, Huntington, WV 257550003, USA. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.022
1524
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
where dV denotes the standard volume measure on Cn . The Segal–Bargmann space (also called the Fock space) H 2 (Cn , dμ) is defined to be the subspace of L2 (Cn , dμ) that consists of all square integrable, entire functions on Cn . We shall denote the orthogonal projection of L2 (Cn , dμ) onto H 2 (Cn , dμ) by P . One can verify that the kernel function of P is ez,w . That is
ez,w ϕ(w) dμ(w)
P (ϕ)(z) =
ϕ ∈ L2 Cn , dμ .
Here and throughout this paper, ·,· will denote the usual inner product on Cn . Given a function f ∈ L2 (Cn , dμ), we wish to define the corresponding Hankel operator Hf : H 2 (Cn , dμ) → L2 (Cn , dμ) H 2 (Cn , dμ) by Hf = (I − P )Mf P , where Mf denotes the operator of multiplication by f . (Note that f is referred to as the symbol function of Hf .) This parallels the definition of Hankel operators for other function spaces. However, in the current setting, this definition may lead to an operator whose domain is not dense in H 2 (Cn , dμ). Consequently, we must impose some growth restriction on the symbol function. We shall work with a family of symbol functions that was previously considered in [1] and [5]. For any ζ ∈ Cn , let τζ : Cn → Cn be the translation τζ (w) = w + ζ
w ∈ Cn
and consider the linear space T Cn = f ∈ L2 Cn , dμ : f ◦ τζ ∈ L2 Cn , dμ for every ζ ∈ Cn . One can check that if f is in T (Cn ), then {h ∈ H 2 (Cn , dμ): f h ∈ L2 (Cn , dμ)} is dense in H 2 (Cn , dμ). In [1], W. Bauer completely characterized those functions f ∈ T (Cn ) for which Hf and Hf are simultaneously bounded or compact. Prior to that, J. Xia and D. Zheng [5] completely characterized those functions f ∈ T (Cn ) for which Hf and Hf are simultaneously members of the Schatten class Sp for 1 p < ∞. The purpose of this paper is to show that Xia and Zheng’s result holds if the Schatten class Sp is replaced by a more general symmetrically-normed ideal. To facilitate the statement of our main result we introduce a few conventions that will be used throughout this paper. First, we shall always consider Z2n to be a subset of Cn by identifying (k1 , l1 , . . . , kn , ln ) with (k1 + il1 , . . . , kn + iln ) for any integers k1 , l1 , . . . , kn , ln . Next, the symbol Q will always denote a particular cube in Cn : Q = (x1 + iy1 , . . . , xn + iyn ): x1 , y1 , . . . , xn , yn ∈ [−1, 2) . Finally, for any f ∈ T (Cn ) and any u ∈ Z2n we define the quantity J (f ; u) by
J (f ; u) = Q+u Q+u
1/2 f (z) − f (w)2 dV (w) dV (z) .
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1525
Contained in [5] was the following theorem (written here in a different form). Theorem 1.1. (See Xia and Zheng (2004) [5].) Let f ∈ T (Cn ) and let 1 p < ∞. Then we have the simultaneous membership of Hf and Hf in Sp if and only if Φp J (f ; u) u∈Z2n < ∞, where Φp denotes the symmetric norming function associated with the Schatten class Sp . In their proof of Theorem 1.1, Xia and Zheng used properties of the Schatten classes that do not have analogs for more general symmetrically-normed ideals. Therefore, it requires some new ideas to extend their result. In this paper, we will show that the following obvious generalization does in fact hold. Theorem 1.2. Let f ∈ T (Cn ) and let Φ be an arbitrary symmetric norming function. Then we have the simultaneous membership of Hf and Hf in the associated symmetrically-normed ideal SΦ if and only if Φ J (f ; u) u∈Z2n < ∞.
(1.1)
In the past, most investigations of this kind considered only questions of membership in the Schatten classes. However, general symmetrically-normed ideals have gradually attracted greater attention. Also, several other classes of symmetrically-normed ideals—such as the Lorentz ideals, the Macaev ideals, and the Orlicz ideals—have gained prominence. 2. Preliminaries This section provides some background material on the general theory of symmetricallynormed ideals. More details can be found in the seminal work [4]. Let H be any separable complex Hilbert space and let B(H) denote the bounded operators on H. A norm | · |S defined on some two-sided ideal S of B(H) is called a symmetric norm if it has the following additional properties: (i) For any A, B ∈ B(H) and X ∈ S, we have |AXB|S A |X|S B . (ii) For any rank one operator X, |X|S = X . Property (i) is often referred to as the symmetric norming property. A two sided ideal S = {0} of B(H) is a symmetrically-normed ideal (or s.n. ideal for short) if there is defined on it a symmetric norm which makes S into a Banach space. Given an s.n. ideal S, let S(0) denote the closure of the finite rank operators in | · |S . We note that S(0) may be a proper subset of S even when S = B(H) [4]. For the moment, let us consider only proper ideals of B(H). Thus, we have restricted our attention to ideals of compact operators [2]. If A is any compact operator, let {sj (A)}∞ j =1 be the ∗ 1/2 eigenvalues of (A A) enumerated in decreasing order and so as to include multiplicities. The terms of this sequence are called the s-numbers of A. It can be shown that if | · |S is a symmetric norm, then |A|S depends only on the s-numbers of A. This leads us to consider certain functions on sequence spaces.
1526
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Let c00 be the set of all sequences of complex numbers with a finite number of nonzero terms. A function Φ : c00 → [0, ∞) is called a symmetric norming function if it is a norm with the following additional properties: (i) Φ(1, 0, 0, . . .) = 1. (ii) Φ({ξj }j ∈N ) = Φ({|ξπ(j ) |}j ∈N ) for any bijection π : N → N. Given an arbitrary sequence of complex numbers ξ = (ξ1 , . . . , ξk , . . .), we define ξ m = (ξ1 , ξ2 , . . . , ξm , 0, 0, . . .). The sequence {Φ(ξ m )} is increasing, so we may extend Φ to a function from the set of all sequences in C to [0, ∞] by putting Φ(ξ ) = lim Φ ξ m . m→∞
It can be shown that if {sj (A)} denotes the sequence consisting of the s-numbers of a compact operator A and Φ is a symmetric norming function, then SΦ = {A ∈ B(H): Φ({sj (A)}) < ∞} is an s.n. ideal, with the corresponding symmetric norm |A|Φ = Φ({sj (A)}). Conversely, if S is an s.n. ideal on a Hilbert space H and if {ej }j ∈N is an orthonormal set in H, then
ΦS {ξj }j ∈N = ξj ej ⊗ ej j ∈N
S
defines a symmetric norming function and we have |A|S = |A|ΦS for every A ∈ S(0) . The most well-known s.n. ideals are the Schatten classes. For any p such that 1 p < ∞, the Schatten class Sp is the s.n. ideal that has Φp (ξ ) =
1/p |ξj |p
j
as its symmetric norming function. We will denote the Schatten p-norm of the operator A by |A|p . It is possible to generalize the notion of s-numbers to bounded operators [4]. Doing so allows one to consider B(H) as the s.n. ideal SΦ∞ , where Φ∞ sj (A) = sup sj (A) = A . In this paper, A will always denote the usual operator norm of A. The duality theory associated with symmetrically-normed ideals is very simple. Let Φ be any symmetric norming function. Define a new function Φ ∗ : c00 → [0, ∞), called the adjoint of Φ, by Φ ∗ (η) = sup
ξ ∈c00
1
|ηj ξj | Φ(ξ )
(η ∈ c00 ).
j
It can be shown that Φ ∗ is itself a symmetric norming function and that (Φ ∗ )∗ ≡ Φ ∗∗ = Φ. The following important fact follows immediately from the definition of the adjoint.
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1527
Proposition 2.1. If Φ is a symmetric norming function whose adjoint is Ψ and if A ∈ SΦ and B ∈ SΨ , then tr(AB) |A|Φ |B|Ψ . 3. Additional notation We shall now complete the task of fixing notation. We begin by letting {e1 , . . . , e2n } be the standard basis for R2n ∼ = Cn . A subset s = {p0 , . . . , pk } of Z2n with 1 k 2n is said to be a discrete segment if there exists an integer j with 1 j 2n and a vector r ∈ Z2n such that pl = r + lej ,
0 l k.
We will call p0 and pk the endpoints of s, and we define the length of s to be the distance between its endpoints. Therefore, if we denote the length of s by |s|, we have that |s| = card(s) − 1. Let v = (v1 , . . . , v2n ) ∈ Z2n be fixed and suppose that v has at least one nonzero component. Let j1 . . . jm be the members of {j ∈ Z: vj = 0, 1 j 2n} enumerated in ascending order. We may inductively define a function γv : {0, 1, . . . , m} → Z2n by γv (0) = 0
and γv (t) = γv (t − 1) + vjt ejt .
Note that γv (m) = v. For 1 t m, let st (v) be the discrete segment in Z2n which has γv (t − 1) and γv (t) as its endpoints. We shall call the union of s1 (v), . . . , sm (v) the discrete path from 0 to v, and we shall denote it by Γ (v). In the case where v = 0, we define the discrete path from 0 to v to be the singleton set Γ (0) = {0}. Later, we shall want an estimate on card(Γ (v)) in terms of |v|. First, note that |st | |v| for 1 t m. Taking the overlap in the discrete segments into account, we see that card Γ (v) = card(s1 ) + · · · + card(sm ) − (m − 1) = |s1 | + · · · + |sm | + 1 m|v| + 1. Therefore, since m 2n: card Γ (v) 2n|v| + 1.
(3.1)
We conclude this section with two additional notational conventions. First, the symbol S will denote the unit cube in Cn : S = (x1 + iy1 , . . . , xn + iyn ): x1 , y1 , . . . , xn , yn ∈ [0, 1) . Finally, for any function f and any measurable set E we shall write fE to denote the mean value of f on E with respect to the volume measure. That is 1 f dV . fE = V (E) E
1528
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
4. An estimation tool In this section, we will prove a lemma that allows us to obtain estimates on arbitrary symmetric norms. Our starting point is the following result due to K. Fan [3]. Proposition 4.1. Suppose that ξ = {ξj } and η = {ηj } are both in c00 . If ξ1 ξ2 · · · 0 and k
j =1
ξj
k
ηj
(k = 1, 2, . . .),
j =1
then for any symmetric norming function Φ, Φ(ξ ) Φ(η). Notice that Proposition 4.1 implies that if ξ1 ξ2 0 then Φ(ξ1 , ξ2 , 0, 0, . . .) Φ(ξ1 + ξ2 , 0, 0, . . .). This simple observation motivates the proof of the following lemma. Lemma 4.2. Suppose SΦ is a symmetrically-normed ideal and that A =
k∈N Ak .
Then
|A|Φ Φ |Ak |1 k∈N . Proof. Due to the properties of symmetric norms, it suffices to prove the lemma in the case where Ak = 0 for all but a finite number of k’s. This means that it suffices to prove the lemma under the additional assumption |A1 |1 |A2 |1 · · · |Ak |1 · · · . Let us write Hk = (A∗k Ak )1/2 for every k 1. Then the s-numbers of A are just a re-enumeration of the s-numbers of the Hk ’s. Let m ∈ N be given. So there exist integers 1 k1 < · · · < k , where m, and there exist orthogonal projections P1 , . . . , P such that s1 (A) + · · · + sm (A) = tr(Hk1 P1 ) + · · · + tr(Hk P ). The relation 1 k1 < · · · < k implies that j kj for every j satisfying 1 j . Hence s1 (A) + · · · + sm (A) |Hk1 |1 + · · · + |Hk |1 = |Ak1 |1 + · · · + |Ak |1 |A1 |1 + · · · + |A |1 |A1 |1 + · · · + |Am |1 . Since (4.1) holds for every m ∈ N, Proposition 4.1 implies that ∞ Φ sj (A) j =1 Φ |Ak |1 k∈N .
(4.1)
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1529
That is, |A|Φ Φ |Ak |1 k∈N .
2
5. The proof of sufficiency In this section, we prove that if Φ is any symmetric norming function, then (1.1) implies that Hf and Hf are in SΦ . Our starting point is the following basic fact about symmetric norms. Proposition 5.1. Let Φ be an arbitrary symmetric norming function. If an operator A is the weak limit of a sequence of operators {Ak }∞ k=1 , then |A|Φ sup |Ak |Φ . k
Lemma 5.2. Let f ∈ T (Cn ) and let Φ be any symmetric norming function. Furthermore, let Yv =
A(u, v) − B(u, v) + C(u, v) ,
(5.1)
u∈Z2n
A(u, v) = MχS+u Mf −fS+u P MχS+u+v ,
(5.2)
B(u, v) = MχS+u P Mf −fS+u+v MχS+u+v ,
(5.3)
C(u, v) = (fS+u − fS+u+v )MχS+u P MχS+u+v .
(5.4)
and
If
|Yv |Φ < ∞,
v∈Z2n
then the commutator [Mf , P ] is in SΦ and
[Mf , P ] |Yv |Φ . Φ v∈Z2n
Proof. Let E be any bounded Borel set. Observe that MχE [Mf , P ]MχE = MχE
MχS+u [Mf , P ]
u∈Z2n
=
MχS+v MχE
v∈Z2n
MχE MχS+u MχE [Mf , P ]MχS+u+v MχE
u∈Z2n v∈Z2n
=
v∈Z2n u∈Z2n
MχE MχS+u [Mf , P ]MχS+u+v MχE .
1530
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
On the other hand, it follows easily from (5.1)–(5.4) that Yv =
MχS+u [Mf , P ]MχS+u+v .
u∈Z2n
Therefore
MχE [Mf , P ]MχE =
MχE Yv MχE .
v∈Z2n
Hence
Mχ [Mf , P ]Mχ |Yv |Φ . E E Φ v∈Z2n
The result now follows from Proposition 5.1.
2
Lemma 5.3. Let Φ be any symmetric norming function. Then there exists a constant R1 , that depends only on n, such that
2 A(u, v) R1 e−|v| /12 Φ J (f ; u) u∈Z2n Φ
u∈Z2n
for any f ∈ T (Cn ), where A(u, v) is as in (5.2). Proof. Observe that since L2 (S +u, dμ) ⊥ L2 (S +u , dμ) for u = u it follows from Lemma 4.2 that
A(u, v) = MχS+u Mf −fS+u P MχS+u+v Φ
u∈Z2n
Φ
u∈Z2n
Φ |MχS+u Mf −fS+u P MχS+u+v |1 u∈Z2n .
(5.5)
We proceed by estimating the individual trace norms. Notice that |MχS+u Mf −fS+u P MχS+u+v |1
= MχS+u Mf −fS+u P MχS+r MχS+r P MχS+u+v
r∈Z2n
1
|MχS+u Mf −fS+u P MχS+r MχS+r P MχS+u+v |1
r∈Z2n
|MχS+u Mf −fS+u P MχS+r |2 |MχS+r P MχS+u+v |2 .
(5.6)
r∈Z2n
Now, we seek estimates for these Hilbert–Schmidt norms. Recall that the Hilbert–Schmidt norm of an integral operator is equal to the L2 norm of its kernel function. Therefore
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1531
|MχS+u Mf −fS+u P MχS+r |22 χS+u (z)χS+r (w) f (z) − fS+u ez,w 2 dμ(w) dμ(z) = f (z) − fS+u 2 e−|z|2 ez,w 2 e−|w|2 dV (w) dV (z) = π −2n S+u S+r
=π
−2n
f (z + u) − fS+u 2 e−|(w−z)+(r−u)|2 dV (w) dV (z).
(5.7)
S S
Next, observe that (r − u) + (w − z)2 |r − u|2 − 2|r − u||w − z| + |w − z|2 2 1 1 = |r − u|2 + |r − u| − 2|w − z| − |w − z|2 2 2 1 |r − u|2 − |w − z|2 2 1 |r − u|2 − α, 2 where α = sup{|w − z|2 : w, z ∈ S}. Hence e−|(w−z)+(r−u)| eα e−|r−u| 2
2 /2
.
(5.8)
Using this inequality in (5.7) yields |MχS+u Mf −fS+u P MχS+r |22
π
−2n α −|r−u|2 /2
=π
−2n α −|r−u|2 /2
e e
f (z + u) − fS+u 2 dV (w) dV (z)
S S
e e
S+u
π −2n eα e
−|r−u|2 /2
f (z) − fS+u 2 dV (z) f (z) − fQ+u 2 dV (z).
S+u
Notice that the last inequality here follows from the fact that fS+u is the constant function with the minimal distance to f in L2 (S + u, dV ). Now, since S + u ⊂ Q + u we have that 2 −2n α −|r−u|2 /2 f (z) − fQ+u 2 dV (z). e e (5.9) |MχS+u Mf −fS+u P MχS+r |2 π Q+u
Observe that if h ∈ L2local (Cn , dμ) and V (Ω) is finite, then it is easy to establish the following general identity: −1 h(z) − h(w)2 dV (w) dV (z). |h − hΩ |2 dV = 2V (Ω) (5.10) Ω
Ω Ω
1532
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Hence (5.9) implies |MχS+u Mf −fS+u P MχS+r |22 π
−2n α −|r−u|2 /2
e e
−1 2V (Q)
f (z) − f (w)2 dV (w) dV (z).
Q+u Q+u
Therefore |MχS+u Mf −fS+u P MχS+r |2 eα/2 e−|r−u|
2 /4
J (f ; u).
(5.11)
(Here, and elsewhere in the rest of the paper, we overestimate in order to keep expressions as simple as possible.) Next, we estimate the other Hilbert–Schmidt norm in (5.6). Observe that
χS+r (z)χS+u+v (w)ez,w 2 dμ(w) dμ(z)
|MχS+r P MχS+u+v |22 =
= π −2n
e−|w−z| dV (w) dV (z) 2
S+r S+u+v
= π −2n
e−|(w−z)+(u+v−r)| dV (w) dV (z). 2
(5.12)
S S
Using the same argument as before, we can obtain an inequality analogous to (5.8): e−|(w−z)+(u+v−r)| eα e−|u+v−r| 2
2 /2
= eα e−|r−(u+v)|
2 /2
.
Together with (5.12) this implies that |MχS+r P MχS+u+v |22
π
−2n α −|r−(u+v)|2 /2
e e
dV (w) dV (z) S S
α −|r−(u+v)|2 /2
e e
.
Hence |MχS+r P MχS+u+v |2 eα/2 e−|r−(u+v)|
2 /4
(5.13)
.
At last, combining (5.6), (5.11), and (5.13) we have |MχS+u Mf −fS+u P MχS+u+v |1
eα/2 e−|r−u|
r∈Z2n
= eα J (f ; u)
2 /4
r∈Z2n
J (f ; u)eα/2 e−|r−(u+v)|
2 /4
e−(|r−u|
2 +|r−(u+v)|2 )/4
.
(5.14)
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1533
Notice that (r − u) − v 2 |v|2 − 2|r − u||v| + |r − u|2 1 1 2 2 9 2 2 |v| − 3|v||r − u| + |r − u| − |r − u|2 = |v| + 3 3 4 2 1 1 |v|2 − |r − u|2 . 3 2 Thus −
2 1 1 1 |r − u|2 + (r − u) + v − |v|2 − |r − u|2 . 4 12 8
So e−(|r−u|
2 +|(r−u)+v|2 )/4
e−|v|
2 /12
e−|r−u|
2 /8
(5.15)
.
Consequently, (5.14) implies |MχS+u Mf −fS+u P MχS+u+v |1 eα e−|v|
2 /12
J (f ; u)
e−|r−u|
2 /8
.
r∈Z2n
Note that the sum here converges to a constant that is independent of u since Z2n + u = Z2n . Therefore |MχS+u Mf −fS+u P MχS+u+v |1 R1 e−|v|
2 /12
J (f ; u),
(5.16)
where
R1 = eα
e−|r|
2 /8
(5.17)
r∈Z2n
is a constant that depends only on n. Finally, combining (5.5) and (5.16) we obtain the desired estimate:
2 A(u, v) Φ R1 e−|v| /12 J (f ; u) u∈Z2n u∈Z2n
Φ
= R1 e−|v|
2 /12
Φ J (f ; u) u∈Z2n .
Lemma 5.4. Let Φ be any symmetric norming function. Then
R1 e−|v|2 /12 Φ J (f ; u) B(u, v) u∈Z2n u∈Z2n
Φ
for any f ∈ T (Cn ), where R1 is given by (5.17) and B(u, v) is as in (5.3).
2
1534
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Proof. Note that
∗
B(u, v) = (MχS+u P Mf −fS+u+v MχS+u+v )∗ Z2n
u∈Z2n
=
MχS+u+v Mf −f S+u+v P MχS+u
u∈Z2n
=
MχS+w Mf −f
S+w
P MχS+w−v .
w∈Z2n
Since |T ∗ |Φ = |T |Φ for any operator T , the previous lemma implies that
B(u, v) = MχS+w Mf −f S+w P MχS+w−v u∈Z2n
Φ
w∈Z2n
Φ
Φ J (f ; w) w∈Z2n 2 = R1 e−|v| /12 Φ J (f ; u) u∈Z2n .
R1 e−|−v|
2 /12
2
Lemma 5.5. Let Φ be any symmetric norming function. Then there exists a constant R2 , that depends only on n, such that
2 C(u, v) R2 |v|e−|v| /12 Φ J (f ; u) u∈Z2n u∈Z2n
Φ
for each f ∈ T (Cn ), where C(u, v) is as in (5.4). Proof. Similar to the proof of Lemma 5.3, we have that
(fS+u − fS+u+v )MχS+u P MχS+u+v u∈Z2n
Φ
Φ (fS+u − fS+u+v )MχS+u P MχS+u+v 1 u∈Z2n
(5.18)
and that (fS+u − fS+u+v )Mχ P Mχ S+u S+u+v 1
(fS+u − fS+u+v )Mχ P Mχ |Mχ P Mχ S+u S+r 2 S+r S+u+v |2 r∈Z2n
= |fS+u − fS+u+v |
r∈Z2n
|MχS+u P MχS+r |2 |MχS+r P MχS+u+v |2 .
(5.19)
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1535
Given v ∈ Z2n let us write the discrete path from 0 to v as Γ (v) = {a0 , a1 , . . . , a } where a0 = 0, a = v, and the indices are enumerated so that (S + aj −1 ) ∪ (S + aj ) ⊂ Q + aj −1 ,
1 j .
(5.20)
Since the volume of any translate of S is 1, the following holds for any integer j = 1, 2, . . . , : |fS+u+aj −1 − fS+u+aj | |fS+u+aj −1 − fQ+u+aj −1 | + |fQ+u+aj −1 − fS+u+aj | (f − fQ+u+aj −1 ) dV + (f − fQ+u+aj −1 ) dV = S+u+aj −1
S+u+aj
1/2
|f − fQ+u+aj −1 |2 dV S+u+aj −1
1/2
|f − fQ+u+aj −1 |2 dV
S+u+aj
1/2
+
|f − fQ+u+aj −1 | dV
Q+u+aj −1
1/2
+
2
|f − fQ+u+aj −1 | dV 2
,
(5.21)
Q+u+aj −1
where the last two lines follow from the Cauchy–Schwarz inequality and (5.20) respectively. Using the identity (5.10) in (5.21) gives |fS+u+aj −1 − fS+u+aj | 2 √ 2V (Q)
1/2 f (z) − f (w)2 dV (w) dV (z) .
Q+u+aj −1 Q+u+aj −1
Furthermore, since 2(2V (Q))−1/2 < 1, we have |fS+u+aj −1 − fS+u+aj | J (f ; u + aj −1 )
(j = 1, 2, . . . , ).
Using the above inequality, we can obtain a usable estimate: |fS+u − fS+u+v |
(fS+u+a − fS+u+a ) J (f ; u + aj −1 ). j j −1 j =1
(5.22)
j =1
Next, note that the inequality (5.13) applies to both the Hilbert–Schmidt norms in (5.19). Therefore |MχS+u P MχS+r |2 |MχS+r P MχS+u+v |2 eα/2 e−|r−u|
2 /4
eα/2 e−|r−(u+v)|
2 /4
,
where α = sup{|w − z|2 : w, z ∈ S}. It now follows from (5.15) that |MχS+u P MχS+r |2 |MχS+r P MχS+u+v |2 eα e−|v|
2 /12
e−|r−u|
2 /8
.
(5.23)
1536
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Combining (5.19), (5.22), and (5.23) yields (fS+u − fS+u+v )Mχ
S+u
P MχS+u+v 1
J (f ; u + aj −1 )eα e−|v|
2 /12
j =1
e−|r−u|
2 /8
2 e−|v|/12 =R
J (f ; u + aj −1 ),
j =1
r∈Z2n
where 2 = eα R
e−|r|
2 /8
.
r∈Z2n
Using this last estimate in (5.18) we find that
−|v|2 /12 C(u, v) Φ R2 e J (f ; u + aj −1 ) Φ
u∈Z2n
2 e−|v|2 /12 Φ =R
j =1
2 /12
u∈Z2n
J (f ; u + aj −1 )
j =1
2 e−|v| R
u∈Z2n
Φ J (f ; u + aj −1 ) u∈Z2n j =1
2 e =R
−|v|2 /12
Φ J (f ; u) u∈Z2n .
Finally, note that = card(Γ (v)) − 1. Therefore, it follows from (3.1) that 2n|v|. Hence
2 C(u, v) R2 |v|e−|v| /12 Φ J (f ; u) u∈Z2n , u∈Z2n
Φ
where R2 = 2neα
e−|r|
2 /8
r∈Z2n
is a constant that depends only on n.
2
Lemma 5.6. Let Φ be any symmetric norming function and suppose that Φ J (f ; u) u∈Z2n < ∞. Then [Mf , P ] ∈ SΦ and there exists a constant R, that depends only on n, such that [Mf , P ] RΦ J (f ; u) Φ u∈Z2n for any f ∈ T (Cn ).
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1537
Proof. By Lemma 5.2 it suffices to show that there is a constant R such that
|Yv |Φ < RΦ J (f ; u) u∈Z2n
v∈Z2n
holds for Yv =
A(u, v) − B(u, v) + C(u, v) ,
u∈Z2n
where A(u, v), B(u, v), and C(u, v) are defined as in (5.2)–(5.4). Invoking Lemmas 5.3–5.5, we have
A(u, v) + B(u, v) + C(u, v) |Yv |Φ Φ
u∈Z2n
u∈Z2n
Φ
Φ
u∈Z2n
2 R1 + R1 + |v|R2 e−|v| /12 Φ J (f ; u) u∈Z2n 2 Rm 2 + |v| e−|v| /12 Φ J (f ; u) u∈Z2n , where Rm = max{R1 , R2 }. Thus
v∈Z2n
−|v|2 /12 2 + |v| e |Yv |Φ Rm Φ J (f ; u) u∈Z2n v∈Z2n
= RΦ J (f ; u) u∈Z2n ,
where
2 2 + |v| e−|v| /12
R = Rm
v∈Z2n
is a constant that depends only on n.
2
Lemma 5.7. Let Φ be any symmetric norming function and let f ∈ T (Cn ). If Φ J (f ; u) u∈Z2n < ∞ then the Hankel operators Hf and Hf are both in the corresponding symmetrically-normed ideal, SΦ . Proof. Lemma 5.6 implies that the commutator [Mf , P ] is in SΦ . From this, the result follows readily; for it is easy to check that (I − P )[Mf , P ] = Hf
and P [Mf , P ] = −(Hf )∗ .
2
1538
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
6. The proof of necessity In this section, we will show that the simultaneous membership of Hf and Hf in the ideal SΦ associated with the symmetric norming function Φ implies (1.1). This will be accomplished via a duality argument that effectively translates the problem into one where the methods of the previous section may be used. Lemma 6.1. Suppose f ∈ T (Cn ) and u ∈ Z2n . Then there exists a constant K1 , that depends only on n, such that 2 J (f ; u) K1 tr [Mf , P ]MχQ+u [Mf , P ]∗ MχQ+u . Proof. Let u ∈ Z2n be given. Define the operator Tu by Tu = MχQ+u [Mf , P ]MχQ+u . It is obvious that Tu is a Hilbert–Schmidt operator. Therefore tr Tu∗ Tu =
f (z) − f (w)2 ez,w 2 dμ(w) dμ(z)
Q+u Q+u
= π −2n
f (z + u) − f (w + u)2 e−|w−z|2 dV (w) dV (z)
Q Q
π
−2n −18n
e
f (z + u) − f (w + u)2 dV (w) dV (z)
Q Q
√ since |w − z| 3 2n for any w, z ∈ Q. Now, it follows from the identity (5.10) that
f (z + u) − f (w + u)2 dV (w) dV (z) = 2V (Q)
Q Q
f (w) − fQ+u 2 dV (w).
Q+u
Therefore, substitution into (6.1) gives tr Tu∗ Tu 2π −2n e−18n V (Q)
f (w) − fQ+u 2 dV (w).
Q+u
Hence
2 J (f ; u) K1 tr Tu∗ Tu ,
where −1 1 K1 = π 2n e18n V (Q) 2
(6.1)
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1539
is constant. Therefore, for any u ∈ Z2n , we have 2 J (f ; u) K1 tr MχQ+u [Mf , P ]∗ MχQ+u MχQ+u [Mf , P ]MχQ+u K1 tr [Mf , P ]MχQ+u [Mf , P ]∗ MχQ+u . 2 Lemma 6.2. Suppose f ∈ T (Cn ) and u ∈ Z2n . Then there exists a constant K2 , that depends only on n, such that Mχ
Q+u
[Mf , P ]∗ MχQ+u 1 K2 J (f ; u).
Proof. First, observe that MχQ+u [Mf , P ]MχQ+u = MχQ+u M{f −fQ+u } P MχQ+u − MχQ+u P M{f −fQ+u } MχQ+u . Therefore Mχ
Q+u
[Mf , P ]MχQ+u 1
|MχQ+u M{f −fQ+u } P MχQ+u |1 + |MχQ+u P M{f −fQ+u } MχQ+u |1 .
(6.2)
Using arguments similar to those in the proofs of Lemmas 5.3 and 5.5, we can show that
|MχQ+u M{f −fQ+u } P MχQ+u |1 eβ J (f ; u)
e−|r|
2 /2
r∈Z2n
and
|MχQ+u P M{f −fQ+u } MχQ+u |1 eβ J (f ; u)
e−|r|
2 /2
,
r∈Z2n
where β = sup |w − z|2 : w, z ∈ Q . Therefore, (6.2) implies that Mχ
Q+u
[Mf , P ]∗ MχQ+u 1 = MχQ+u [Mf , P ]MχQ+u 1 K2 J (f ; u),
where K2 = 2eβ
e−|r|
2 /2
.
2
r∈Z2n
Lemma 6.3. Suppose Φ is any symmetric norming function. There exists a constant K, that depends only on n, such that if f ∈ T (Cn ) and [Mf , P ] ∈ SΦ then Φ J (f ; u) u∈Z2n K [Mf , P ]Φ .
1540
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Proof. Let Λ = {(λ1 , λ2 , . . . , λ2n ) ∈ R2n ∼ = Cn : λj ∈ {0, 1, 2}, 1 j 2n}. For each λ ∈ Λ, let Wλ = λ + 3Z2n . Note that for each λ the collection {Q + u}u∈Wλ is a mutually disjoint covering of Cn . Let J (f ; u) if u ∈ Wλ , aλ (u) = 0 if u ∈ / Wλ . Hence
J (f ; u) u∈Z2n = aλ (u) u∈Z2n . λ∈Λ
Therefore
aλ (u) u∈Z2n Φ aλ (u) u∈Z2n . Φ J (f ; u) u∈Z2n = Φ λ∈Λ
(6.3)
λ∈Λ
For any λ ∈ Λ, let Wλ0 = {u ∈ Wλ : aλ (u) = 0}. Thus, (6.3) implies Φ J (f ; u) u∈Z2n Φ aλ (u) u∈Z2n = Φ aλ (u) u∈W 0 . λ∈Λ
(6.4)
λ
λ∈Λ
We wish to estimate Φ({aλ (u)}u∈W 0 ) for a fixed λ ∈ Λ. Let ξu = aλ (u) = J (f ; u) for all u ∈ Wλ0 . λ Also, let Ψ = Φ ∗ and let c 00 = {γu }u∈W 0 ∈ c00 : γu 0, Ψ {γu }u∈W 0 = 1 . λ
λ
Since Φ ∗∗ = Φ we have that Φ aλ (u) u∈W 0 = Φ ∗∗ {ξu }u∈W 0 λ λ
= sup ξu γu : {γu }u∈W 0 ∈ c 00 . λ
(6.5)
u∈Wλ0 0 Let {ηu }u∈W 0 be any element of c 00 , and note that for each u ∈ Wλ we have λ
2 ξu ηu = ξu−1 ξu2 ηu = ξu−1 J (f ; u) ηu .
(6.6)
Hence, Lemma 6.1 implies that
u∈Wλ0
ξu ηu
ξu−1 K1 tr [Mf , P ]MχQ+u [Mf , P ]∗ MχQ+u ηu
u∈Wλ0
−1 ∗ = K1 tr [Mf , P ] ξu ηu MχQ+u [Mf , P ] MχQ+u . u∈Wλ0
(6.7)
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
1541
We seek an estimate on the trace in the preceding inequality. First, note that it follows from Lemma 4.2 that −1 ∗ ξ η M [M , P ] M u χQ+u f χQ+u u Ψ
u∈Wλ0
Ψ
−1 ξu ηu MχQ+u [Mf , P ]∗ MχQ+u 1 u∈Z2n .
(6.8)
Therefore, Lemma 6.2 give us that −1 −1 ∗ ξ η M [M , P ] M u χQ+u f χQ+u Ψ ξu ηu (K2 ξu ) u∈W 0 u λ Ψ
u∈Wλ0
= K2 Ψ {ηu }u∈W 0 = K2 . λ
(6.9)
Note that the last equality holds since Ψ ({ηu }u∈W 0 ) = 1. Now by virtue of (6.9) and our hypothλ esis that [Mf , P ] ∈ SΦ , we can apply Proposition 2.1 to conclude that
−1 ∗ tr [Mf , P ] ξu ηu MχQ+u [Mf , P ] MχQ+u u∈Wλ0
−1 ξu ηu MχQ+u [Mf , P ]∗ MχQ+u [Mf , P ]Φ u∈Wλ0
Ψ
K2 [Mf , P ]Φ .
(6.10)
Combining (6.10) and (6.7) we find that
ξu ηu K1 K2 [Mf , P ]Φ .
u∈Wλ0
Since {ηu }u∈W 0 ∈ c 00 was arbitrary, (6.5) and the preceding inequality imply that λ
Φ aλ (u) u∈W 0 K1 K2 [Mf , P ]Φ . λ
Therefore, it follows from (6.4) that
Φ J (f ; u) u∈Z2n K1 K2 [Mf , P ]Φ = 32n (K1 K2 )[Mf , P ]Φ . λ∈Λ
Hence Φ J (f ; u) u∈Z2n K [Mf , P ]Φ , where K = 32n K1 K2 .
2
1542
D. Farnsworth / Journal of Functional Analysis 260 (2011) 1523–1542
Lemma 6.4. Suppose Φ is any symmetric norming function and f ∈ T (Cn ). If Hf and Hf are both members of SΦ then Φ J (f ; u) u∈Z2n < ∞. Proof. Note that since [Mf , P ] = Mf P − P Mf = (I − P )Mf P + P Mf P − P Mf = Hf − (Hf )∗ , our hypotheses imply that [Mf , P ] ∈ SΦ . Therefore, it follows from Lemma 6.3 that there is a constant K such that Φ J (f ; u) u∈Z2n K [Mf , P ]Φ < ∞.
2
7. Conclusion It is interesting to compare the proof of our result with Xia and Zheng’s earlier result for the Schatten classes [5]. Working in the more general setting poses difficulties, but it can offer advantages as well. For example, one can see that the role that duality plays in the proof of necessity is much clearer when the argument is presented in terms of the abstract theory of symmetric norming functions. Looking to the future, there are numerous questions one may seek to address by applying methods similar to those in this paper. For instance, there is the “one sided” problem for Hankel operators on the Segal–Bargmann space: Given a symmetric norming function Φ, find a necessary and sufficient condition on f ∈ T (Cn ) so that the associated Hankel operator Hf is in SΦ . Beyond this, one can formulate a plethora of related questions by considering other families of operators (such as the Toeplitz operators) as well as other functions spaces (such as the Bergman space). In the case of symmetrically-normed ideals with arbitrary symmetric norming functions, these problems all appear to be open. References [1] W. Bauer, Mean oscillation and Hankel operators on the Segal–Bargmann space, Integral Equations Operator Theory 52 (2005) 1–15. [2] J.W. Calkin, Two-sided ideals and congruences in the ring of bounded operators in Hilbert space, Ann. of Math. (2) 42 (1941) 839–873. [3] K. Fan, Maximum properties and inequalities for the eigenvalues of completely continuous operators, Proc. Natl. Acad. Sci. USA 37 (1951) 760–766. [4] I.C. Gohberg, M.G. Kre˘ın, Introduction to the Theory of Linear Nonselfadjoint Operators, Transl. Math. Monogr., vol. 18, American Mathematical Society, Providence, RI, 1969, translated from the Russian by A. Feinstein. [5] J. Xia, D. Zheng, Standard deviation and Schatten class Hankel operators on the Segal–Bargmann space, Indiana Univ. Math. J. 53 (2004) 1381–1399.
Journal of Functional Analysis 260 (2011) 1543–1581 www.elsevier.com/locate/jfa
A Dixmier–Douady theorem for Fell algebras ✩ Astrid an Huef a , Alex Kumjian b , Aidan Sims c,∗ a Department of Mathematics and Statistics, University of Otago, Dunedin 9054, New Zealand b Department of Mathematics, University of Nevada, Reno, NV 89557, USA c School of Mathematics and Applied Statistics, University of Wollongong, NSW 2522, Australia
Received 16 July 2010; accepted 19 November 2010 Available online 14 December 2010 Communicated by D. Voiculescu
Abstract We generalise the Dixmier–Douady classification of continuous-trace C ∗ -algebras to Fell algebras. To do so, we show that C ∗ -diagonals in Fell algebras are precisely abelian subalgebras with the extension property, and use this to prove that every Fell algebra is Morita equivalent to one containing a diagonal subalgebra. We then use the machinery of twisted groupoid C ∗ -algebras and equivariant sheaf cohomology to define an analogue of the Dixmier–Douady invariant for Fell algebras, and to prove our classification theorem. © 2010 Elsevier Inc. All rights reserved. Keywords: Brauer group; Dixmier–Douady; Extension property; Fell algebra; Groupoid; Sheaf cohomology
1. Introduction The Dixmier–Douady theorem classifies continuous-trace C ∗ -algebras with spectrum T up to Morita equivalence by classes in a third cohomology group [17], and the Phillips–Raeburn theorem classifies their C0 (T )-automorphisms using classes in the corresponding second cohomology group [35]. The Dixmier–Douady Theorem has been very influential in the study of C ∗ -dynamical systems (see for example [36]), and has been applied in differential geometry [10], ✩ We thank Rob Archbold, Bruce Blackadar, Iain Raeburn and Dana Williams for helpful discussions and comments. This research was supported by the Australian Research Council. * Corresponding author. E-mail addresses: [email protected] (A. an Huef), [email protected] (A. Kumjian), [email protected] (A. Sims).
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.011
1544
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
in mathematical physics [8,12,30], and in the definition of twisted K-theory [40]. The object of this paper is to extend the Dixmier–Douady theorem to Fell algebras. A Fell algebra is a C ∗ -algebra A such that every irreducible representation π0 of A satisfies such that π(b) Fell’s condition: there is a positive b ∈ A and a neighbourhood U of [π0 ] in A is a rank-one projection whenever [π] ∈ U . The spectrum of a Fell algebra is always locally Hausdorff [6, Corollary 3.4], and is Hausdorff if and only if the Fell algebra is a continuous-trace C ∗ -algebra. The class of Fell algebras coincides with the class of Type I0 algebras defined by Pedersen in [34, §6.1] as the C ∗ -algebras generated by their abelian elements (see p. 1546). Fell algebras are the natural building blocks for Type I C ∗ -algebras: every Type I C ∗ -algebra has a canonical composition series consisting of Fell algebras [34, Theorem 6.2.6] (by contrast there always exists a composition series consisting of continuous-trace C ∗ -algebras, but no canonical one). Let T be a locally compact, Hausdorff space. Given a continuous-trace C ∗ -algebra A with spectrum identified with T , the Dixmier–Douady invariant δ(A) belongs to a second sheafcohomology group H 2 (T , S). The Dixmier–Douady classification of continuous-trace C ∗ algebras says that if A and B are continuous-trace C ∗ -algebras with spectra identified with T , then δ(A) = δ(B) if and only if there is an A–B-imprimitivity bimodule whose Rieffel homeo and B with T . morphism respects the identifications of A ∗ If we replace continuous-trace C -algebras with Fell algebras, we must deal with locally compact, locally Hausdorff spaces X. There is no difficulty with sheaf cohomology for such S) spaces, but the definition of our analogue of the Dixmier–Douady invariant δ(A) ∈ H 2 (A, ∗ is more involved. We tackle the problem using the machinery of C -diagonals and of twisted groupoid C ∗ -algebras. A C ∗ -diagonal consists of a C ∗ -algebra A and a maximal abelian subalgebra B of A with properties modeled on those of the subalgebra of diagonal matrices in Mn (C) (see Definition 5.2). Diagonals relate to Fell algebras as follows. Consider a Fell algebra A with a generating sequence ai of pairwise orthogonal abelian elements such that a := i 1i ai is strictly positive in A. That is, the hereditary subalgebra generated by a is equal to A. Then B := i ai Aai is an abelian subalgebra of A, which we prove is a diagonal. Indeed, Theorem 5.17 shows that every separable Fell algebra A is Morita equivalent to a C ∗ -algebra C with a diagonal subalgebra D arising in just this fashion. In outline the construction is straightforward. Fix a sequence ai of abelian elements which generate A and let a˜ i = ai ⊗ Θii ∈ A ⊗ K(l 2 (N)) for each i. Let C be the smallest hereditary C ∗ -subalgebra containing all the a˜ i and let D :=
i
a˜ i (A ⊗ K)a˜ i =
i
(ai Aai ⊗ Θii ).
To prove that D is a diagonal, we show in Theorem 5.14 that diagonals in Fell algebras A can be characterised as the abelian subalgebras B which have the extension property relative to A: every pure state of B extends uniquely to a state of A. This extends [27, Theorem 2.2] from continuous-trace C ∗ -algebras to Fell algebras. Example 5.15 shows that this characterisation does not generalise to bounded-trace C ∗ -algebras. C ∗ -diagonals arise naturally from topological twists: exact sequences of groupoids Γ (0) → Γ (0) × T → Γ → R (just Γ → R for short) such that Γ is a T-groupoid and R is a principal étale groupoid with unit space Γ (0) (see p. 1562). The associated twisted groupoid C ∗ -algebra Cr∗ (Γ ; R) is a completion
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1545
of the space of continuous T-equivariant functions on Γ and contains a subalgebra isomorphic to C0 (Γ (0) ). Moreover, the pair (Cr∗ (Γ ; R), C0 (Γ (0) )) is a C ∗ -diagonal. Kumjian showed in [27] that every diagonal pair arises in this way: given a diagonal pair (A, B) there exist a topological twist Γ → R and an isomorphism φ : A → Cr∗ (Γ ; R) such that φ(B) = C0 (Γ (0) ). Together with the results outlined in the preceding paragraph, this implies that each Fell algebra is Morita equivalent to a twisted groupoid C ∗ -algebra Cr∗ (Γ ; R). Given a principal étale groupoid R, an isomorphism of twists over R is an isomorphism of exact sequences which identifies ends. The isomorphism classes of topological twists over R form a group Tw(R) called the twist group [26]. It was shown in [28] how the twist group fits into a long exact sequence of equivariant-sheaf cohomology. In particular, the boundary map ∂ 1 in this long exact sequence determines a homomorphism from the twist group to the second equivariant-cohomology group H 2 (R, S). We use this construction to define an analogue of the Dixmier–Douady invariant for a Fell algebra A. Given a Fell algebra A with spectrum X, choose any twist Γ → R such that A is Morita equivalent to Cr∗ (Γ ; R). Applying ∂ 1 to the class of Γ in the twist group of R yields an element ∂ 1 ([Γ ]) of H 2 (R, S). We show that the local homeomorphism ψ : Γ (0) → X obtained from the state-extension property yields an isomorphism πψ∗ from the usual sheafcohomology group H 2 (X, S) to the equivariant-sheaf cohomology group H 2 (R, S). We then show that the class δ(A) = (πψ∗ )−1 (∂ 1 ([Γ ])) ∈ H 2 (X, S) does not depend on our choice of twist Γ → R, and regard δ(A) as an analogue of the Dixmier–Douady invariant for A. This paves the way for our main result, Theorem 7.13: Fell algebras A1 and A2 are Morita equivalent if and only if there is a homeomorphism between their spectra such that the induced 1 , S) ∼ 2 , S) carries δ(A1 ) to δ(A2 ). The invariant is exhausted in the isomorphism H 2 (A = H 2 (A 2 sense that each element of H (X, S) can be realised as δ(A) for some Fell algebra A with spectrum X (Proposition 7.16). A motivating example was a generalisation of Green’s theorem for free and proper transformation groups to free transformation groups (G, X) where X is a Cartan G-space. Our Corollary 4.6 gives a Morita equivalence between the transformation-group C ∗ -algebra C0 (X)G and the C ∗ algebra of the equivalence relation induced by a local homeomorphism from a Hausdorff space Y to the (not necessarily Hausdorff) quotient space G\X. This result and its construction are prototypes for our later investigations of diagonals in Fell algebras. In particular, we show that δ(C0 (X) G) is trivial. 2. Preliminaries denote the C ∗ -algebra A + C1 obtained by adjoining a unit. If B is For a C ∗ -algebra A, let A ∗ as a unital C ∗ -subalgebra of A (so, 1B = 1A). a C -subalgebra of A, we regard B Given a Hilbert space H , denote by K(H ) the C ∗ -algebra of compact operators on H . For ξ, η ∈ H , let Θξ,η ∈ K(H ) be the rank-one operator defined by Θξ,η (ζ ) = (ζ |η)ξ . A C ∗ -algebra A is liminary if π(A) = K(Hπ ) for every irreducible representation π . If B is an abelian C ∗ -algebra we freely identify B and C0 (B). Let G be a Hausdorff topological groupoid with unit space G(0) . We denote the range and source maps by r, s : G → G(0) and the set of composable pairs of G by G(2) . Let U be a subset of the unit space. We write U G, GU and U GU for r −1 (U ), s −1 (U ) and r −1 (U ) ∩ s −1 (U ); U is called full if s(U G) = G(0) . A subset T of G is a G-set if the restrictions of s and r to T are one-to-one. We implicitly identify units of G with the associated identity morphisms throughout.
1546
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
A groupoid is principal if the map γ → (r(γ ), s(γ )) is one-to-one. A groupoid is étale if the range map (equivalently the source map) is a local homeomorphism. If G is an étale groupoid then the unit space G(0) is open in G and for each u ∈ G(0) the fibre r −1 (u) is discrete. A topological space X is locally compact if every point of X has a compact neighbourhood in X; and X is locally Hausdorff if every point of X has a Hausdorff neighbourhood. 3. Fell and Type I0 algebras In this section we show that the classes of Fell and Type I0 C ∗ -algebras coincide. Let A be a C ∗ -algebra. A positive element a of A is abelian if the hereditary C ∗ -subalgebra aAa generated by a is commutative. If A is generated as a C ∗ -algebra by its abelian elements then A is said to be of Type I0 [34, §6.1]. An irreducible representation π0 of A satisfies Fell’s such that π(b) is a condition if there exist b ∈ A+ and an open neighbourhood U of [π0 ] in A rank-one projection whenever [π] ∈ U ; this property goes back as far as [18]. If every irreducible representation of A satisfies Fell’s condition then A is said to be a Fell algebra [6, §3]. That the Fell algebras coincide with the Type I0 C ∗ -algebras is a consequence of the following lemma which is stated in [6, §3]. Lemma 3.1. Let A be a C ∗ -algebra and π0 an irreducible representation of A. Then there exists an abelian element a of A such that π0 (a) = 0 if and only if π0 satisfies Fell’s condition. Proof. Suppose a ∈ A+ is an abelian element such that π0 (a) = 0. By rescaling we may assume that π0 (a) = 1. By [34, Lemma 6.1.3], rank(π(a)) 1 for all irreducible representations π of A. Since [π] → π(a) is lower semicontinuous there exists a neighbourhood U of [π0 ] in A such that π(a) > 1/2 when [π] ∈ U . In particular, the spectrum σ (π(a)) of π(a) is {0, λπ } for some λπ > 1/2. Fix f ∈ C([0, a ]) such that f is identically zero on [0, 1/8] and is identically one on [1/4, a ]. Set b = f (a). If [π] ∈ U then σ π(b) = σ π f (a) = f σ π(a) = f {0, λπ } = {0, 1}. Since rank(π(a)) = 1, π(b) is a rank-one projection. Thus π0 satisfies Fell’s condition. Now suppose that π0 satisfies Fell’s condition. Then there exist a ∈ A+ and an open neigh such that π(a) is a rank-one projection when [π] ∈ U . Let J be the bourhood U of [π0 ] in A closed ideal of A such that J = U . There exists x ∈ J + such that π0 (axa) = 0 (choose an approximate identity {eλ } for J and note that π0 (eλ ) → 1 in B(H )). Now π(axa) = 0 whenever [π] ∈ / J, and rank(π(axa)) rank(π(a)) 1 when [π] ∈ J. Thus rank(π(axa)) 1 for all irreducible representations of A, and hence axa is an abelian element by [34, Lemma 6.1.3]. 2 It is well known that if p ∈ M(A) is a projection then Ap is an ApA–pAp-imprimitivity bimodule (see, for example, [37, Example 3.6]). More generally we have: Lemma 3.2. Let A be a C ∗ -algebra. If b ∈ A is self-adjoint then Ab is an AbA–bAbimprimitivity bimodule with actions given by multiplication in A and AbA ab, cb = ab
2 ∗
c
and ab, cb bAb = ba ∗ cb.
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1547
Proof. The actions and inner products are restrictions of those on the standard A–A-bimodule A, so we need only check that both inner products are full. The right inner product is full because products are dense in A and the left inner product is full because b ∈ C ∗ ({b2 }) ⊂ A, so AbA = Ab2 A. 2 By [6, Corollary 3.4], the spectrum of a Fell algebra is locally Hausdorff. So Fell algebras may be regarded as locally continuous-trace C ∗ -algebras; since they are generated by their abelian elements, they may also be regarded as locally Morita equivalent to a commutative C ∗ -algebra. We make this precise in the following theorem. Theorem 3.3. Let A be a C ∗ -algebra. The following are equivalent: 1. A is of Type I0 ; 2. there exists a collection {Ia : a ∈ S} of ideals of A such that A is generated by these ideals and each Ia is Morita equivalent to a commutative C ∗ -algebra; 3. A is a Fell algebra. Proof. ((1) ⇒ (2)) Suppose A is Type I0 . Let S be the set of abelian elements of A. For each a ∈ S, the sub-C ∗ -algebra aAa is commutative, and by Lemma 3.2, aAa is Morita equivalent to the ideal Ia := AaA generated by a. Since A is generated by S it is also generated, as a C ∗ -algebra, by the collection of ideals {Ia : a ∈ S}. ((2) ⇒ (3)) Assume (2). Fix an irreducible representation π0 of A. Since A is generated by the ideals Ia there exists a0 such that π0 does not vanish on Ia0 . Morita equivalence preserves the property of being a continuous-trace C ∗ -algebra, so Ia0 is itself a continuous-trace C ∗ -algebra. The restriction of π0 to Ia0 is an irreducible representation which satisfies Fell’s condition in Ia0 (since Ia0 is a continuous-trace C ∗ -algebra). So there exist b ∈ Ia+0 and a neighbourhood U of Ia0 such that π(b) is a rank-one projection whenever [π] ∈ U . Now b ∈ A+ and U can be viewed as so π0 satisfies Fell’s condition in A. an open subset of A, ((3) ⇒ (1)) Suppose that A is a Fell algebra. By Lemma 3.1, for each irreducible representation π of A there exists an abelian element aπ ∈ A such that π(aπ ) = 0. Let B be the C ∗ -algebra generated by the set S of all abelian elements of A, so that B = span{a1 · · · an : n ∈ N, ai ∈ S}. B is not contained in any proper ideal of A. But B is an ideal of A Since π|B = 0 for all π ∈ A, by [34, 6.1.7] (the largest Type I0 ideal in fact), so B = A and A is Type I0 . 2 4. Green’s theorem for free Cartan transformation groups. Throughout this section let G be a second-countable, locally compact, Hausdorff group acting continuously on a second-countable, locally compact, Hausdorff space X. We will prove a generalisation of Green’s theorem for free group actions which are not proper but only locally proper. Green’s theorem says that if a group G acts freely and properly on a space X, then the crossed product C0 (X) G is Morita equivalent to C0 (X/G); it follows that the Dixmier–Douady invariant of the continuous-trace C ∗ -algebra C0 (X) G is trivial. In Section 7, we will establish the analogous result for locally proper actions and our generalisation of the Dixmier–Douady classification. Recall from [33, Definition 1.1.2] that X is a Cartan G-space if each point of X has a wandering neighbourhood U ; that is, a neighbourhood U such that {s ∈ G: s · U ∩ U = ∅} is relatively
1548
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
compact in G. If X is a Cartan G-space with a free action of G then we will just say that (G, X) is a free Cartan transformation group. The action of G on X is proper if every compact subset of X is wandering. Equivalently, the action is proper if the map φ : G × X → X × X given by φ(g, x) = (g · x, x) is proper in the sense that the inverse images of compact sets are compact. If U is a wandering neighbourhood in X, then the action of G on the saturation G · U of U is proper by [33, Proposition 1.2.4]. If G acts freely on X and x, y ∈ X with G · x = G · y, then there is a unique τ (x, y) ∈ G such that y = τ (x, y) · x;
(4.1)
this defines a function τ from
X ×G\X X := (x, y) ∈ X × X: G · x = G · y to G. If X is a free Cartan G-space, then τ is continuous by [33, Theorem 1.1.3]. The next lemma follows from [9, I.10.1 Proposition 2]. Lemma 4.1. Suppose that the group G acts freely on X. Then the action of G on X is proper if and only if φ : G × X → X × X, (g, x) → (g · x, x) is a homeomorphism onto a closed subset of X × X. Lemma 4.2. Suppose that (G, X) is a free Cartan transformation group. 1. There exists a covering {Ui : i ∈ I } of X by G-invariant open sets such that (G, Ui ) is proper for each i. 2. Let {Ui : i ∈ I } be a cover as in (1), and let W := i Ui be the topological disjoint union of the Ui . Then the map φ : G × W → W × W , (g, x) → (g · x, x) is a homeomorphism onto a closed subset of W × W . Proof. (1) If U is a wandering neighbourhood in X, then its saturation G · U is a proper G-space by [33, Proposition 1.2.4]. So choose a cover {Vi : i ∈ I } of open wandering neighbourhoods in X and then take Ui = G · Vi for all I . (2) The action of G on W is g · x i = (g · x)i , where, for x ∈ Ui ⊂ X, we write x i for the corresponding element in the copy of Ui in W . The action of G on W is free because the action of G on X is free. Since the action on W is continuous, so is φ. Since the action on W is free, φ is oneto-one. The inverse φ −1 : range φ → G × W is given by φ −1 (y, x) = (τ (x, y), x). The map τ : X ×G\X X → G of (4.1) is continuous because (G, X) is Cartan, so φ −1 is continuous. To see that the range of φ is closed, suppose that gn · xnin , xnin is a sequence in range φ converging to (y, x j ). Then xnin → x j , so in = j eventually. Since Uj is G-invariant, gn · xnin ∈ Uj eventually as well. Since gn · xnin → y it follows that y ∈ Uj . In
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1549
j
particular, G · xn converges to both G · x j and G · y. But the action of G on Uj is proper, so G\X is Hausdorff and hence y ∈ G · x as required. 2 The following definitions are from [31, §2]. Let Γ be a locally compact, Hausdorff groupoid and Z a locally compact space. We say Γ acts on the left of Z if there is a continuous open map ρ : Z → Γ (0) and a continuous map (γ , x) → γ · x from Γ ∗ Z = Γ s ∗ρ Z := {(γ , x) ∈ Γ × Z: s(γ ) = ρ(x)} to Z such that 1. ρ(γ · x) = r(γ ) for (γ , x) ∈ Γ s ∗ρ Z; 2. if (γ1 , x) ∈ Γ s ∗ρ Z and (γ2 , γ1 ) ∈ Γ (2) then (γ2 γ1 ) · x = γ2 · (γ1 · x); 3. ρ(x) · x = x for x ∈ Z. Right actions of Γ on Z are defined similarly, except that we use σ : Z → Γ (0) and Z σ ∗r Γ := {(x, γ ) ∈ Z × Γ : σ (x) = r(γ )}. An action of Γ on the left of Z is said to be free if γ · x = x implies that γ = ρ(x), and is said to be proper if the map Γ s ∗ρ Z → Z × Z : (γ , x) → (γ · x, x) is proper. Definition 4.3. If Γ1 and Γ2 are groupoids then an equivalence from Γ1 to Γ2 is a triple (Z, ρ, σ ) where (0)
1. Z carries a free and proper left-action of Γ1 with fibre map ρ : Z → Γ1 , and a free and proper right-action of Γ2 with fibre map σ : Z → Γ2(0) ; 2. the actions of Γ1 and Γ2 on Z commute; and (0) (0) 3. ρ and σ induce bijections of Z/Γ2 onto Γ1 and of Γ1 \Z onto Γ2 , respectively. Since ρ and σ are continuous open maps Definition 4.3(3) implies that ρ and σ induce (0) (0) homeomorphisms Z/Γ2 ∼ = Γ2 . We will often just say that Z is a Γ1 –Γ2 = Γ1 and Γ1 \Z ∼ equivalence, leaving the fibre maps σ, ρ implicit. The main theorem of [31] says that if Γ1 and Γ2 are groupoids with Haar systems and Z is a Γ1 –Γ2 -equivalence, then Cc (Z) can be completed to a C ∗ (Γ1 )–C ∗ (Γ2 )-imprimitivity bimodule [31, Theorem 2.8], so the full groupoid C ∗ -algebras of Γ1 and Γ2 are Morita equivalent. If (G, X) is a transformation group we view G × X as a transformation-group groupoid with composable elements (G × X)(2) =
(g, x), (h, y) ∈ (G × X) × (G × X): x = h · y
and (g, h · y)(h, y) = (gh, y); the inverse is given by (g, x)−1 = (g −1 , g · x). We identify the unit space (G × X)(0) = {e} × X with X, so s(g, x) = x and r(g, x) = g · x for all (g, x) ∈ G × X. Suppose that (G, X) is a free Cartan transformation group. Let {Ui : i ∈ I } be a covering of X by G-invariant open sets such that (G, Ui ) is proper for each i; then each Vi := G\Ui is locally compact and Hausdorff. Let q : X → G\X be the quotient map. For each i, denote by qi : Ui → Vi the restricted quotient map, and let ψi : Vi → q(Ui ) ⊆ G\X be the inclusion homeomorphism. Let Y := i Vi be the topological disjoint union of the Vi , and define ψ : Y → G\X by ψ|Vi = ψi . Then ψ is a local homeomorphism and Y is locally compact and Hausdorff.
1550
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Lemma 4.4. Suppose that X is a free Cartan G-space, and adopt the notation of the preceding paragraph. 1. The formula (g, x) · (x, y) = (g · x, y) defines a free left action of the groupoid G × X on X ∗ Y = {(x, y) ∈ X × Y : q(x) = ψ(y)}. 2. The formula (g, x) · x = g · x defines a free and proper left action of the groupoid G × X on W := i Ui . 3. There is a homeomorphism α : W → X ∗ Y such that (g, x) · α(z) = α((g, x) · z) for all g, x, z. Proof. (1) Define ρ : X ∗ Y → (G × X)(0) by ρ(x, y) = x. Then (G × X) ∗ (X ∗ Y ) =
(g, x), x , y : x = s(g, x) = ρ x , y = x .
It is straightforward to check that the formula (g, x) · (x, y) := (g · x, y) defines a free action of G × X on the left of X ∗ Y . (2) As earlier, for x ∈ Ui ⊂ X, we write x i for the corresponding element of Ui ⊂ W . Define ρ : W → (G × X)(0) by ρ (x i ) = x. Then (G × X) ∗ W =
(g, x), x i : (g, x) ∈ G × Ui , i
and the formula (g, x) · x i := (g · x)i defines a free action of (G × X) on W . By Lemma 4.1, to see that the action is proper it suffices to verify that φ : (G × X) ∗ W → W × W,
(g, x), x i → (g · x)i , x i
is a homeomorphism of (G × X) ∗ W onto a closed subset of W × W . Let τ : X ∗G\X X → G be as in (4.1). Then τ is continuous since X is a Cartan G-space. So φ : (G × X) ∗ W → range ψ is invertible with continuous inverse (y, x) →
τ (x, y), x , x .
That the range of φ is closed is precisely Lemma 4.2(2). (3) Define α : W → X ∗ Y by α(x i ) = (x, qi (x i )). Clearly α is continuous and one-to-one with continuous inverse (x, qi (x i )) → x. To see that α is onto, notice that (x, y) ∈ X ∗ Y for y ∈ Vi if and only if y = qi (x i ). That α is equivariant is a simple calculation: (g, x) · α x i = (g, x) · x i , qi x i = g · x i , qi x i = α g · x i = α (g, x) · x i .
2
Recall that under the relative topology
R(ψ) = (y1 , y2 ) ∈ Y × Y : ψ(y1 ) = ψ(y2 ) is a principal groupoid with range and source maps s(y1 , y2 ) = y2 , r(y1 , y2 ) = y1 , composition (y1 , y2 )(y2 , y3 ) = (y1 , y3 ) and inverses (y1 , y2 )−1 = (y2 , y1 ); R(ψ) is étale because ψ is a local homeomorphism. We identify R(ψ)(0) with Y via (y, y) → y.
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1551
Theorem 4.5. Let (G, X) be a free Cartan G-space. Then the transformation-group groupoid G × X is equivalent to the groupoid R(ψ) described in the preceding paragraph. More specifically, resume the notation of Lemma 4.4 and define fibre maps ρ : X ∗ Y → (G × X)(0) and σ : X ∗ Y → R(ψ)(0) by ρ(x, y) = x
and σ (x, y) = y.
Then the space X ∗ Y is a (G × X)–R(ψ) equivalence under the actions (g, x) · (x, y) = (g · x, y)
and (x, y) · (y, z) = (x, z).
Proof. We need to verify (1)–(3) of Definition 4.3. By Lemma 4.4, the left action of G × X on X ∗ Y is free and proper. It is easy to check that the right action of R(ψ) on X ∗ Y is free and proper, verifying (1). To verify (2), we calculate: (g, x) · (x, y) · (y, z) = (g · x, y) · (y, z) = (g · x, z) = (g, x) · (x, z) = (g, x) · (x, y) · (y, z) . It remains to verify (3). Since both ρ and σ are surjective, we need only show that both induce injections. Suppose that ρ(x, y) = ρ(x , y ). Then certainly x = x . Since (x, y), (x, y ) ∈ X ∗ Y we have ψ(y) = q(x) = ψ(y ), so (x, y) = (x, y ) · (y , y) with (y, y ) ∈ R(ψ). Hence ρ induces an injection. Similarly, suppose σ (x, y) = σ (x , y ). Then y = y . Also, q(x) = ψ(y) = q(x ), so there exists g ∈ G such that g · x = x . Thus (g, x) · (x, y) = (g · x, y) = (x , y) and (g, x) ∈ G × X. Hence, σ induces an injection. 2 We now obtain an analogue of Green’s beautiful theorem for free transformation groups: if G acts freely and properly on X then C0 (X) G and C0 (G\X) are Morita equivalent [19, Theorem 14]. If the action is only locally proper then G\X may not be Hausdorff, so that C0 (G\X) is not a C ∗ -algebra – the groupoid C ∗ -algebra C ∗ (R(ψ)) serves as its replacement in this case. Corollary 4.6. Suppose that (G, X) is a free Cartan transformation group. Then the transformation-group C ∗ -algebra C0 (X) G is Morita equivalent to the groupoid C ∗ -algebra C ∗ (R(ψ)). Proof. Since R(ψ) is étale, R(ψ) has a Haar systems given by counting measures. A natural Haar system for G × X is {μ × δx : x ∈ X}, where μ is a left Haar measure on G and δx is point-mass measure. So the (G × X)–R(ψ) equivalence of Theorem 4.5 induces a Morita equivalence of full groupoid C ∗ -algebras by [31, Theorem 2.8]. Since C ∗ (G × X) and C0 (X) G are isomorphic [38, remarks on p. 59] the result follows. 2 Let (G, X) be a free Cartan transformation group. Then C0 (X) G is a Fell algebra by [22]. Since the property of being a Fell algebra is preserved under Morita equivalence by [24], C ∗ (R(ψ)) is also a Fell algebra. Alternatively, by [14, Theorem 7.9] a principal-groupoid C ∗ algebra is a Fell algebra if and only if the groupoid is Cartan in the sense that every unit has a wandering neighbourhood (see Definition 7.3 of [14]); it is straightforward to verify the existence of wandering neighbourhoods in R(ψ).
1552
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
5. Fell algebras, the extension property and C ∗ -diagonals In this section we show how to construct from a separable Fell algebra A a Morita equivalent C ∗ -algebra C containing a diagonal subalgebra in the sense of [27]. The bulk of the work is to show that diagonal subalgebras of separable Fell algebras can be characterised as those abelian subalgebras which possess the extension property. We start by verifying that the different notions of diagonals in nonunital C ∗ -algebras which appear in the literature coincide. 5.1. Diagonals in nonunital C ∗ -algebras Let A be a C ∗ -algebra and B a C ∗ -subalgebra of A. Recall that P : A → B is a conditional expectation if P is a linear, norm-decreasing, positive map such that P |B = idB and P (ab) = P (a)b, P (ba) = bP (a) for all a ∈ A and b ∈ B. We say P is faithful if P (a ∗ a) = 0 implies a = 0. Remark 5.1. There are two other equivalent characterisations of a conditional expectation: 1. P : A → B is a linear idempotent of norm 1; 2. P : A → B is a linear, norm-decreasing, completely positive map such that P |B = idB and P (ab) = P (a)b, P (ba) = bP (a) for all a ∈ A and b ∈ B. Our definition above implies (1); that (1) implies (2) is in [42] (see, for example [7, Theorem II.6.10.2]), and (2) implies our definition since completely positive maps are positive. Definition 5.2. Let A be a separable C ∗ -algebra and let B be an abelian C ∗ -subalgebra of A. A normaliser n of B in A is an element n ∈ A such that n∗ Bn, nBn∗ ⊂ B; the collection of normalisers of B is denoted by N (B). A normaliser n is free if n2 = 0; the collection of free normalisers of B is denoted by Nf (B). We say B is diagonal or that (A, B) is a diagonal pair if (D1) B contains an approximate identity for A; (D2) there is a faithful conditional expectation P : A → B; and (D3) ker(P ) = span Nf (B). In [27, Definition 1.1], a pair (A, B) of unital C ∗ -algebras is said to be a diagonal pair if 1B = 1A and (D2) and (D3) are satisfied, and a nonunital pair (A, B) is said to be a diagonal pair B) (recall we identify 1B with 1A). If A is if the minimal unitisations form a diagonal pair (A, unital then (D1) implies that B contains the unit of A, so [27, Definition 1.1] and Definition 5.2 agree for unital A. We will use the next two lemmas to show in Corollary 5.6 that [27, Definition 1.1] and Definition 5.2 (which is the definition implicitly used in [26]) also coincide if A is nonunital. Lemma 5.3. Let A be a C ∗ -algebra with C ∗ -subalgebra B and let P : A → B be a conditional : A → B defined by P ((a, λ)) = (P (a), λ) is also a conditional expectation. expectation. Then P Moreover, P is faithful if and only if P is. Proof. Since P : A → B is a conditional expectation it is completely positive by Remark 5.1. By is also completely positive, and the proof of [13, Lemma 3.9] shows that P [13, Lemma 3.9], P
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1553
(1A) = 1A and since P is idempotent, P is an idempotent of norm 1 is norm-decreasing. Since P and hence is a conditional expectation by Remark 5.1. + with P (a, λ) = 0. Since P (a, λ) = Now suppose that P is faithful and that (a, λ) ∈ A (P (a), λ), we have λ = 0 and P (a) = 0. Since a ∈ A+ and P is faithful, a = 0 also. Hence, is faithful. Conversely, if P is faithful then so is its restriction P . 2 P Lemma 5.4. Let A be a C ∗ -algebra and B an abelian C ∗ -subalgebra of A. Suppose that B contains an approximate identity for A. Then n∗ n ∈ B for all n ∈ N (B). If, in addition, P : A → B is a conditional expectation, then P (n) = 0 for all n ∈ Nf (B). Proof. Fix n ∈ N(B) and let (bi )i∈I be an approximate identity for A contained in B. Then we have n∗ n = limi∈I n∗ bi n ∈ B. Now fix n ∈ Nf (B). Set ak = (n∗ n)1/k . A standard spatial argument using the polar decomposition of n shows that nak → n. To see that P (n) = 0, it suffices by continuity to show that P (nak ) = 0 for all k. Fix k. Then P (nak ) = P (n)ak = ak P (n) = P (ak n) since ak ∈ B and P is a conditional expectation. Since n ∈ Nf (B), we have (n∗ n)n = n∗ n2 = 0 and it follows that ak n = (n∗ n)1/k n = 0. Hence, P (nak ) = 0 as required. 2 : A → B Lemma 5.5. Suppose that (A, B) is a diagonal pair with expectation P : A → B. Let P be the conditional expectation of Lemma 5.3. Then
= (n, 0): n ∈ Nf (B) Nf (B)
and
= span Nf (B). ker P
Then (n, 0)2 = 0 and Proof. Fix n ∈ Nf (B) and (b, μ) ∈ B. ∗ n , 0 (b, μ)(n, 0) = n∗ bn + μn∗ n, 0 ∈ B Hence, (n, 0) ∈ Nf (B), giving {(n, 0): n ∈ by Lemma 5.4. Similarly, (n, 0)(b, μ)(n∗ , 0) ∈ B. 2 2 Nf (B)} ⊂ Nf (B). Now fix c = (n, λ) ∈ Nf (B). Since (n + 2λn, λ ) = c2 = 0, we have λ = 0 and and n2 = 0. We now verify that n normalises B. Fix b ∈ B. Then since (n, 0) ∈ Nf (B) (b, 0) ∈ B we have
n∗ bn, 0 = (n, 0)∗ (b, 0)(n, 0) ∈ B.
= {(n, 0): n ∈ Nf (B)}. Hence n∗ bn ∈ B. Similarly, nbn∗ ∈ B. This proves Nf (B) Since (A, B) is a diagonal pair, we have ker P = span Nf (B). Hence,
= (a, 0): a ∈ ker P = span (n, 0): n ∈ Nf (B) = span Nf (B). ker P
2
Corollary 5.6. Let A be a nonunital C ∗ -algebra and let B be an abelian C ∗ -subalgebra of A. B) is a diagonal Then (A, B) is a diagonal pair in the sense of Definition 5.2 if and only if (A, pair in the sense of [27, Definition 1.1].
1554
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Proof. First suppose that (A, B) is diagonal with conditional expectation P : A → B. We have by definition of the inclusion of B in A. Lemma 5.3 implies that P : A → B is faithful. 1A ∈ B Thus (A, B) is a diagonal pair in the = span Nf (B). Moreover, by Lemma 5.5 we have ker P sense of [27, Definition 1.1]. B) is a diagonal pair, in the sense of [27, Definition 1.1], with conConversely, suppose (A, → B. Since Q is faithful, P := Q|A is also a faithful conditional ditional expectation Q : A . expectation, and Q = P then λ = 0 and n ∈ Nf (B). So As in the proof of Lemma 5.5 if (n, λ) ∈ Nf (B),
⊂ Nf (B). Nf (B) := n ∈ A: (n, 0) ∈ Nf (B) By definition of P , we have ker P = {(a, 0): a ∈ ker P }. = span Nf (B). By assumption ker P Hence ker P = span Nf (B) ⊂ span Nf (B). Fix an approximate identity (bi )i∈I for B; we claim it is also an approximate identity for A. Since A = B + ker P and ker P = span Nf (B), it suffices to show that nbi → n for each we have (n∗ , 0)(0, 1)(n, 0) = (n∗ n, 0) ∈ B, n ∈ Nf (B). Fix n ∈ Nf (B). Since (n, 0) ∈ Nf (B), ∗ ∗ ∗ so n n ∈ B. Since n nbi → n n, it follows that nbi → n also, so (bi )i∈I is an approximate identity for A. Lemma 5.4 now gives span Nf (B) ⊂ ker P , and hence ker P = span Nf (B). 2 Corollary 5.6 above ensures, in particular, that we may apply the results of [27] to our diagonal pairs, and we shall do so without further comment. 5.2. Diagonals in Fell algebras and the extension property Building on the seminal work of Kadison and Singer [25], Anderson defined the extension property for a pair of unital C ∗ -algebras [3, Definition 3.3] as follows. Let A be a unital C ∗ algebra and B a C ∗ -subalgebra with 1A ∈ B. Then B is said to have the extension property relative to A if each pure state of B has a unique extension to a pure state of A (equivalently, each pure state of B has a unique extension to a state of A – this extension is then necessarily pure). If B is abelian and has the extension property relative to A then B must be maximal abelian by the Stone–Weierstass Theorem [3, p. 311]. The converse is false: for example, Cuntz has shown that the canonical maximal abelian subalgebra of On does not have the extension property [15, Proposition 3.1]; the next example shows this can happen even in a Fell algebra. Example 5.7. Let B = C([−1, 1]) and let G = {0, 1} act on [−1, 1] by g · x = (−1)g x. Then the crossed product A = B G is generated by B and a self-adjoint unitary U which does not commute with B. That A is a Fell algebra follows from, for example, [23, Lemma 5.10]. Moreover, B is a maximal abelian subalgebra of A. By [46, Theorem 5.3] the spectrum of A is homeomorphic to {π−1 , π1 } ∪ (0, 1] where tn → π1 , π−1 for tn ∈ (0, 1] if and only if tn → 0 in R. In particular, π−1 and π1 cannot be separated by disjoint open sets. The πi are one-dimensional representations determined by πj (f ) = f (0) for f ∈ B and πj (U ) = j . Hence π1 , π−1 are distinct pure states of A which restrict to evaluation at 0 on B. Thus B is a maximal abelian subalgebra but does not have the extension property. Let A be a unital C ∗ -algebra, and let be B be a maximal abelian subalgebra of A. Then B has the extension property relative to A if and only if there exists a conditional expectation
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1555
P : A → B such that for each pure state h of B, the state h ◦ P is its unique pure state extension to A [3, Theorem 3.4]. By [5, Theorem 2.4] B, whether or not it is maximal abelian, has the extension property relative to A if and only if A = B + span[B, A] where [B, A] = {ba − ab: a ∈ A, b ∈ B}. The techniques used in the proof imply that the extension property is equivalent to the requirement that B + span[B, A] be dense in A (if f is a state on A which restricts to a pure state on B, then f (ab) = f (a)f (b) = f (ba) for all a ∈ A, b ∈ B and hence f vanishes on span[B, A]). We use the following definition of the extension property for nonunital C ∗ -algebras. Definition 5.8. Let B be a C ∗ -subalgebra of a C ∗ -algebra A. As in [26, §2], we say that B has the extension property relative to A if 1. B contains an approximate identity for A; and 2. every pure state of B extends uniquely to a pure state of A. By [27, Proposition 1.4], if (A, B) is a diagonal pair, then B has the extension property relative to A. Remark 5.9. 1. The extension property as presented in [5, Definition 2.5] seems slightly different to Definition 5.8: in the former B is said to have the extension property relative to A if pure states of B extend uniquely to pure states of A and no pure state of A annihilates B. As noted in [45, §2] these two definitions are equivalent: it follows from [1, Lemma 2.32] that B contains an approximate identity for A if and only if no pure state of A annihilates B. 2. Let B be an abelian C ∗ -subalgebra of a nonunital C ∗ -algebra A. By [5, Remark 2.6(iii)] has the extension property relative B has the extension property relative to A if and only if B (and B is maximal abelian in A if and only if B is maximal abelian in A). Moreover, as to A in the unital case, B has the extension property relative to A if and only if B + span[B, A] is dense in A. Notation 5.10. Let B be an abelian C ∗ -subalgebra of a C ∗ -algebra A, and suppose that B has the extension property relative to A. By the discussion above, B is maximal abelian and there exists a unique conditional expectation P : A → B. Moreover, for each pure state h of B, the state h ◦ P is its unique pure state extension to A. For this reason, we say that the extension property is implemented by P . The map x → x ◦ P is a weak∗ -continuous map from the set of to the pure states of A. pure states of B (which may be identified with B) Of course x ◦ P determines a GNS triple (πx , Hx , ξx ). That is, πx is an irreducible representation of A on the Hilbert space Hx , the unit vector ξx is cyclic vector for πx , and → A be the map which takes x ∈ B x ◦ P (a) = (πx (a)ξx |ξx ) for all a ∈ A. Let ψ = ψP : B to the unitary equivalence class [πx ] ∈ A. We call ψ the spectral map associated to the inclusion B ⊂ A. Since diagonal pairs have the extension property, it follows from the above that if (A, B) is a diagonal pair, then the conditional expectation from B to A is unique. We use this frequently: given a diagonal pair (A, B), we will without comment refer to the expectation P : B → A and use that the extension property is implemented by x → x ◦ P .
1556
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
There is some overlap between Lemma 5.11 and [4, Proposition 2.10]. Lemma 5.11. Suppose that A is a separable C ∗ -algebra, let B be an abelian C ∗ -subalgebra → A be the with the extension property relative to A implemented by P : A → B, and let ψ : B spectral map. Suppose that π is an irreducible representation of A such that π(A) = K(Hπ ). and there exist a listing {xλ : λ ∈ Λ} of Then ψ −1 ({[π]}) is a discrete countable subset of B, −1 ψ ({[π]}) and a basis {ξλ : λ ∈ Λ} of Hπ such that xλ ◦ P = (π(·)ξλ |ξλ ) for all λ ∈ Λ and π(b) =
xλ (b)Θξλ ,ξλ
for all b ∈ B.
(5.1)
λ∈Λ
Furthermore, if A is liminary, then ψ is surjective and P : A → B is faithful. satisfyProof. We begin by identifying a basis {ξλ : λ ∈ Λ} for Hπ and points {xλ : λ ∈ Λ} in B −1 ing (5.1). We then show that the xλ form a discrete set which coincides with ψ ({[π]}). We have π(B) maximal abelian in π(A) by [5, Corollary 3.2]. Since π(A) = K(Hπ ), we have B/ ker π ∼ = π(B) = span{Θξλ ,ξλ : λ ∈ Λ} for some orthonormal basis {ξλ : λ ∈ Λ} of Hπ 1 ; and Λ is countable because A is separable. Since each one-dimensional subspace span{ξλ } is invariant under π(B), it determines an irreducible representation of B given by point evaluation at xλ ∈ B. The set {xλ : λ ∈ Λ} is discrete because for each λ there exists bλ such that π(bλ ) = Θξλ ,ξλ which forces xμ (bλ ) = 0 for λ = μ. The formula (5.1) follows from the definition of the xλ . Fix λ ∈ Λ. Then for b ∈ B, π(b)ξλ |ξλ =
xμ (b)Θξμ ,ξμ (ξλ )|ξλ = xλ (b) = xλ ◦ P (b).
μ∈Λ
Hence xλ ◦ P = (π(·)ξλ |ξλ ) for all λ ∈ Λ by the extension property. Thus ψ(xλ ) = [π], and it follows that {xλ : λ ∈ Λ} ⊂ ψ −1 ({[π]}). For the other inclusion, let x ∈ ψ −1 ({[π]}). Since the GNS representation associated to x ◦ P is equivalent to π , we may assume that x ◦ P (·) = (π(·)ξ |ξ ) for some unit vector ξ ∈ Hπ . Using (5.1) we get x(b) =
2 xλ (b)(ξ |ξλ )
for all b ∈ B.
λ∈Λ
Suppose that there exist λi such that (ξ |ξλi ) = 0 for i = 1, 2. Since {xλ : λ ∈ Λ} is discrete we can find bi ∈ B such that xλ (bi ) = 0 unless λ = λi . Now x(b1 b2 ) = 0 but 2 2 x(b1 )x(b2 ) = xλ1 (b1 )(ξ |ξλ1 ) xλ2 (b2 )(ξ |ξλ2 ) = 0 1 This standard fact follows from the Spectral Theorem. Specifically, the Spectral Theorem implies firstly that the C ∗ algebra generated by each self-adjoint T ∈ K(H ) is equal to the C ∗ -algebra generated by its spectral projections. So any abelian C ∗ -subalgebra D of K(H ) is spanned by commuting finite-dimensional projections. A minimal subprojection of any of these spanning projections then commutes with D. So if D is maximal abelian, then it is spanned by a maximal family of mutually orthogonal minimal projections on H .
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1557
which is impossible. It follows that there is precisely one λ such that (ξ |ξλ ) = 0, and hence that x = xλ . Thus {xλ : λ ∈ Λ} = ψ −1 ({[π]}). Now suppose that A is liminary and let π be an irreducible representation of A. Then π(A) = K(Hπ ), so the above argument shows that ψ −1 ({[π]}) is nonempty. Therefore, ψ is surjective. It remains to prove that P is faithful. Fix a ∈ A+ \ {0}. There is an irreducible representation π on a Hilbert space Hπ with π(a) = 0. Then with {ξλ : λ ∈ Λ} and ψ −1 ({[π]}) = {xλ : λ ∈ Λ} as in the statement of the lemma we have
π(a)ξλ |ξλ Θξλ ,ξλ = 0. xλ P (a) Θξλ ,ξλ = π P (a) = λ∈Λ
Hence P (a) = 0 and P is faithful.
λ∈Λ
2
Lemma 5.12. Let A be a separable liminary C ∗ -algebra and B an abelian C ∗ -subalgebra with the extension property relative to A, and let ψ be the spectral map. Let U be an open subset of B \ U } B. Let I = AJ A be the ideal of A generated and let J = {b ∈ B: y(b) = 0 for all y ∈ B by J . Then
π|J = 0 = ψ(U ). I= [π] ∈ A:
(5.2)
Proof. Since I is generated by J , we have I=
J ⊆ ker π , I ⊆ ker π = ker π: [π] ∈ A, ker π: [π] ∈ A,
π|J = 0}. which gives I= {[π] ∈ A: π|J = 0}, let P be the unique conditional expectation from To prove that ψ(U ) ⊂ {[π] ∈ A: A to B. Fix x ∈ U , and let π ∈ ψ(x). Since x ∈ U = J, there is an element b ∈ J such that x(b) = 0. Since x ◦ P is a pure state associated with π there is a unit vector ξ ∈ Hπ such that x ◦ P (a) = (π(a)ξ |ξ ) for all a ∈ A. But x ◦ P (b) = x(b) = 0, so π(b) = 0. Hence, ψ(U ) ⊂ π|J = 0}. {[π] ∈ A: π|J = 0} ⊂ ψ(U ), fix an irreducible representation π of A with To see that {[π] ∈ A: π(f ) = 0 for some f ∈ J . Since A is liminary, π(A) = K(Hπ ) so Lemma 5.11 implies that ψ −1 ([π]) is a countable discrete set {xλ : λ ∈ Λ} ⊂ B, and there is a basis {ξλ : λ ∈ Λ} for Hπ such that π(b) = λ∈Λ xλ (b)Θξλ ,ξλ for all b ∈ B. Since π(f ) = 0 and J = U , there exists π|J = 0} = λ ∈ Λ such that xλ ∈ U and f (xλ ) = 0. Thus [π] = ψ(xλ ) ∈ ψ(U ). Hence {[π] ∈ A: ψ(U ). 2 The following lemma is used implicitly in the proof of [27, Theorem 3.1]. Lemma 5.13. Let A be a separable liminary C ∗ -algebra and B an abelian C ∗ -subalgebra with the extension property relative to A. Let ψ be the spectral map. 1. Suppose that f, g ∈ B + have the property that the restriction of ψ to supp f ∪ supp g is injective. Then gAf ⊂ B. 2. If f, g ∈ B + have the property that the restrictions of ψ to supp f and supp g are injective, then gAf ⊂ N (B).
1558
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Proof. Let P : A → B be the unique conditional expectation. (1) Fix a ∈ A and an irreducible representation π : A → B(Hπ ). It suffices to show that π P (gaf ) = π(gaf ).
(5.3)
Since P is an expectation with f, g ∈ P (A), we have P (gaf ) = gP (a)f , so (5.3) is trivial if π(f ) = 0 or π(g) = 0. So we suppose that π(f ), π(g) = 0 and we verify that π(gaf ) = π(gP (a)f ). Since A is liminary, we may use Lemma 5.11 to obtain a listing ψ −1 ({[π]}) = {xλ : λ ∈Λ} and a basis {ξλ : λ ∈ Λ} of Hπ such that xλ ◦ P = (π(·)ξλ |ξλ ) for all λ ∈ Λ and π(b) = λ∈Λ xλ (b)Θξλ ,ξλ for all b ∈ B. Since ψ(xλ ) = [π] for all λ, and since ψ restricts to an injection on supp f ∪ supp g there exists a unique λ ∈ Λ such that xλ ∈ supp f ∪ supp g. Thus π(f ) = xλ (f )Θξλ ,ξλ and π(g) = xλ (g)Θξλ ,ξλ . Hence π(gaf ) = xλ (g)Θξλ ,ξλ π(a) xλ (f )Θξλ ,ξλ = xλ (g) π(a)ξλ |ξλ xλ (f )Θξλ ,ξλ = xλ (g)xλ P (a) xλ (f )Θξλ ,ξλ = π gP (a)f . So gaf = P (gaf ) and hence gAf ⊂ B. (2) Fix a ∈ A and set n := gaf . Then for every b ∈ B we have n∗ bn = f (a ∗ gbga)f ∈ B by (1). Thus, n∗ Bn ⊂ B and symmetrically nBn∗ ⊂ B. Hence, n = gaf ∈ N (B). 2 Our next result, Theorem 5.14, extends [26, Theorem 2.2] from continuous-trace C ∗ -algebras to Fell algebras; indeed our proof follows similar lines. There is also some overlap with [4, Proposition 3.3] and [11, Proposition 4.1]. Example 5.15 below shows that Theorem 5.14 cannot be extended to bounded-trace C ∗ -algebras. Theorem 5.14. Let A be a separable Fell algebra and let B be an abelian C ∗ -subalgebra with the extension property relative to A. Then 1. the spectral map ψ is a local homeomorphism, and 2. (A, B) is a diagonal pair. Proof. (1) We must prove that ψ is continuous, open, surjective and locally injective. Continuity follows from the observation that φ → φ ◦ P is a weak∗ -continuous map from the state space of B to that of A. That ψ is an open map follows from Lemma 5.12 and the surjectivity of ψ follows from Lemma 5.11. To show that ψ is locally injective we argue as in [28, Theorem 2]. Suppose that ψ fails to be such that yn , zn → x Then there exist sequences (yn )∞ , (zn )∞ in B locally injective at x ∈ B. n=1 n=1 and, for all n, yn = zn and ψ(yn ) = ψ(zn ). Let π ∈ ψ(x). Since A is a Fell algebra there exists [6, Corollary 3.4]. Let I be the ideal of A such that a Hausdorff neighbourhood V of [π] in A I = V . Since V is Hausdorff, I is a continuous trace C ∗ -algebra. Let U = ψ −1 (V ) and let J be the ideal of B such that J= U . We have J ⊂ I by Lemma 5.12. By Lemma 5.11, ψ −1 ({[π]}) = {xλ : λ∈ Λ} is discrete and countable, and there exists a + basis {ξλ : λ ∈ Λ} of Hπ such that π(b) = λ∈Λ xλ (b)Θξλ ,ξλ for all b ∈ B. Choose b ∈ Cc (B) such that x(b) > 0 and supp b ⊂ U . Since π ∈ ψ(x), we have x = xμ for some μ ∈ Λ, and + such that xλ (g) = 0 unless λ = μ. So since ψ −1 ({[π]}) is discrete, we may choose g ∈ Cc (B)
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1559
1 + satisfies π(f ) = Θξμ ,ξμ and π(bg) is a positive multiple of Θξμ ,ξμ , so f := xμ (bg) bg ∈ Cc (B) x(f ) = 1. We have supp(f ) ⊂ supp(b) ⊂ U , so f ∈ J ⊂ I . Since f has compact support it belongs to the Pedersen ideal of I and hence is a continuous trace element in I . For each n, fix πn ∈ ψ(yn ). Since ψ(yn ) → ψ(x) we have
lim Tr πn (f ) = Tr π(f ) = Tr Θξμ ,ξμ = 1.
n→∞
But {yn , zn } ∈ ψ −1 ({ψ(yn )}), so by Lemma 5.11 and the positivity of f we also have Tr πn (f ) yn (f ) + zn (f ) → 2x(f ) = 2, which results in a contradiction. Thus ψ is a local homeomorphism. → A is a local homeomorphism by (1), the collection (2) Since ψ : B open: ψ|U is injective} U(ψ) := {U ⊂ B Since B is separable, B is second-countable and hence paracompact. forms an open cover of B. It follows by [26, Lemma 2.1] (see also the Shrinking Lemma [37, Lemma 4.32]) that there is a countable, locally finite refinement V := {Vn : n 0} of U such that Vi ∩ Vj = ∅ implies Vi ∪ Vj ∈ U(ψ). By definition of the extension property, B contains an approximate identity for A. Since A is liminary, we may apply Lemma 5.11 to conclude that P is faithful. By Lemma 5.4 we have Nf (B) ⊂ ker P , so it remains to show that every element in ker(P ) may be approximated by sums of elements in Nf (B). By [37, Lemma 4.34] there exists a partition of unity subordinate ∞to V; that is, there exists a in B such that supp f ⊂ V , 0 f 1 and sequence (fn )∞ n n n n=0 x(fn ) = 1 for all x ∈ B. n=0 n the local finiteness of V implies For each n 0, let gn = j =0 fj . For a compact subset K of D, that K ∩ Vj = ∅ for all but finitely many j . Hence there exists n 0 such that gn (x) = 1 for all x ∈ K. Therefore, (gn )∞ n=0 is an approximate identity for B and hence for A. Fix a ∈ A. Then Since x(fi )x(fj ) = 0 whenever gn agn → a and P (gn agn ) = gn P (a)gn for all n. Fix x ∈ B. x∈ / Vi ∩ Vj , we obtain
x ◦ P (gn agn ) = x gn P (a)gn =
x(fi ) x ◦ P (a) x(fj ).
{0i,j n: x∈Vi ∩Vj }
Hence
P (gn agn ) =
fi P (a)fj .
{0i,j n: Vi ∩Vj =∅}
Suppose that Vi ∩ Vj = ∅. Then Vi ∪ Vj ∈ U(ψ), so ψ|Vi ∪Vj is injective, and Lemma 5.13 gives fi afj ∈ B. Hence fi P (a)fj = P (fi afj ) = fi afj and we have P (gn agn ) =
{0i,j n: Vi ∩Vj =∅}
fi afj ,
1560
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
and
(I − P )(gn agn ) =
fi afj .
(5.4)
{0i,j n: Vi ∩Vj =∅}
Suppose now that a ∈ ker P . Then gn agn ∈ ker P . Since gn agn → a, it suffices to show that gn agn may be expressed as a sum of free normalisers. Using (5.4) and P (gn agn ) = 0 we have
gn agn =
fi afj .
{0i,j n: Vi ∩Vj =∅}
Since ψ|Vk is injective and supp fk ⊂ Vk for all k, Lemma 5.13 gives fi afj ∈ N (B). If Vi ∩ Vj = ∅, then fi fj = 0 so that (fi afj )2 = 0. Thus fi afj ∈ Nf (B) as required, and (A, B) is a diagonal pair. 2 We now give an example of a bounded-trace C ∗ -algebra A with a maximal abelian subalgebra B such that (A, B) has the extension property but is not a diagonal pair. Thus Theorem 5.14 cannot be extended from Fell algebras to bounded-trace C ∗ -algebras. Example 5.15. Let C := {f ∈ C([0, 1], M2 ): f (0) ∈ CI2 }, and let D be the subalgebra of C consisting of functions f such that each f (t) is a diagonal matrix. Then C is a bounded-trace algebra, but is not a Fell algebra, and D is an abelian C ∗ -subalgebra. Each pure state of D has the form d → d(t)i,i for some t ∈ [0, 1] and i ∈ {1, 2}, and then c → c(t)i,i is the unique extension to a pure state of C, so D has the extension property relative to C. cos(1/t) sin(1/t) For t > 0, let ut := − sin(1/t) cos(1/t) ∈ M2 (C). Define α ∈ Aut(C) by α(f )(t) =
ut f (t)u∗t f (0)
if t > 0, if t = 0.
Let A := M2 (C)
and B :=
d1 0
0 : d1 , d2 ∈ D . α(d2 )
Then A is not a Fell algebra but has bounded trace; B is abelian, and B has the extension property relative to A because each of D and α(D) has the extension property relative to C. The unique faithful conditional expectation P : A → B is given by P :=
φ 0
0 αφα −1
,
c (t) 0 where φ is the canonical expectation from C onto D: φ(c)(t) = 1,10 c (t) . 2,2 We claim that B is not diagonal in A. First observe that if n is a normaliser of D in C, then there exists λ(n) ∈ C such that n(0) = λ(n)I2 by definition of C. Hence the off-diagonal entries of n(t) go to zero as t goes to zero. Since n is a normaliser, for t > 0 the matrix n(t) is either diagonal, or a linear combination of the off-diagonal matrix units. In particular, if n(0) = 0 then
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1561
by continuity, n(t) is diagonal for t in some neighbourhood of 0. If n is a free normaliser, then each n(t)2 = 0, and it follows from the above that n(0) = 0. Now suppose that n=
n1,1 n2,1
n1,2 n2,2
∈A
is a normaliser of B. We claim that n1,2 (0) = 0. Note that for t > 0, each of n1,1 (t), u∗t n2,2 (t)ut is a normaliser of D(t) and each of n1,2 (t)ut , and u∗t n2,1 (t) is a normaliser of D(t) in C(t). Suppose for contradiction that n1,2 (0) √ = 0. Since n1,2 (0) is diagonal, there exists ε such that for t < ε, both n1,2 (t) > n (0) / 2 and |(n1,2 (t))i,j | < n1,2 (0) /2 for i = j . Choose 1,2 1/√2 1/√2 √ . Since n1,2 (t0 )ut0 is a normaliser of D(t0 ), it is ei√ t0 < ε such that ut0 = −1/ 2 1/ 2 ther diagonal, or a linear combination of off-diagonal matrix √ units, and since t0 < ε, there is an entry of n1,2 (t0 )ut0 with modulus at least n1,2 (0) / 2. It follows by choice of ut0 that n1,2 (t0 ) = (n1,2 (0)ut0 )u∗t0 has at least one off-diagonal entry of modulus greater than √ √ ( n1,2 (0) / 2 )(1/ 2 ) = n1,2 (0) /2, contradicting the choice of ε. Hence n1,2 (0) = 0 as claimed. The function f : [0, 1] → M4 given by f (t) =
02 02
I2 02
belongs to ker(P ) ⊂ A. But f (0)1,2 = 0, so f is not in the closed span of the normalisers of B in A, and hence is not in the closed span of the free normalisers. In particular B is not diagonal in A. We will show that every separable Fell algebra is Morita equivalent to one with a diagonal subalgebra; to do this we need: Lemma 5.16. Let A be a separable Fell algebra. Then there exists a countable set of abelian elements of A which generate A as an ideal. Proof. By Lemma 3.1, for every irreducible representation π of A there exists an abelian element σ (aπ ) = 0} is an open aπ of A such that π(aπ ) = 0. For each π , the set Uπ := {[σ ] ∈ A: Since A is separable, the topology for A has a countable base [16, neighbourhood of [π] in A. Proposition 3.3.4]. So there exists a countable subset S := {aπi : i ∈ N} such that {Uπi : i ∈ N} Let I be the ideal generated by S. Since σ (aπi ) = 0 when [σ ] ∈ Uπi , it is an open cover of A. follows that π|I = 0 for every irreducible representation π of A. Hence I = A. 2 Theorem 5.17. Let A be a separable Fell algebra, and let {ai : i ∈ N} ⊂ A be a set of abelian norm-one elements which generate A as an ideal. Let K = K(2 (N)), and denote the canonical matrix units in K by {Θij : i, j ∈ N}. Set a :=
∞
1 i=1
i
ai ⊗ Θii ∈ A ⊗ K.
1562
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Then 1. the hereditary subalgebra C := a(A ⊗ K)a generated by a is Morita equivalent to A; 2. D := i∈N ai Aai ⊗ Θii is a C ∗ -diagonal in C; and 3. the conditional expectation P : C → D is given by P (c) = i∈N (1 ⊗ Θii )c(1 ⊗ Θii ). Proof. To prove (1), it suffices to show that C is full or, equivalently, that (A ⊗ K)a(A ⊗ K) = A ⊗ K. Since A is generated by the ai , it suffices to show that for all i, j, k ∈ N ai ⊗ Θj k ∈ (A ⊗ K)a(A ⊗ K). Fix i, j, k ∈ N and let (eλ )λ∈Λ be an approximate identity for A. Then ai ⊗ Θj k = i lim (eλ ⊗ Θj i )a(eλ ⊗ Θik ) ∈ (A ⊗ K)a(A ⊗ K) λ∈Λ
as required. For (2), first observe that D is commutative because each ai is an abelian element. Since A is a Fell algebra so is C. So by Theorem 5.14, to see that D is diagonal in C, it suffices to prove that D has the extension property relative to C. By Remark 5.9(2), it is enough to show that D + span[D, C] is dense in C. Sums of the form n
aj bj k ak ⊗ Θj k ,
j,k=1
with bj k ∈ A, are dense in C. It therefore suffices to show that elements of the form aj bj k ak ⊗ Θj k with j = k may be approximated by elements in [D, C]. Fix c := aj bj k ak ⊗ Θj k 1/n 1/n with j = k. For n ∈ N, let dn := aj ⊗ Θjj ∈ D. Since aj aj → aj as n → ∞, 1/n
n→∞ [dn , c] = dn c − cdn = aj aj bj k ak ⊗ Θj k − −−− → aj bj k ak ⊗ Θj k = c.
Hence c may be approximated by the commutators [dn , c], and so D + span[D, C] is dense in C. For (3), observe that the formula given for P determines a norm-decreasing projection of C onto D. This is then a conditional expectation by Remark 5.1, and is the unique expectation from C to D as discussed in Notation 5.10. 2 6. Fell algebras and twisted groupoid C ∗ -algebras In [27, Theorem 3.1] Kumjian showed that if (A, B) is a diagonal pair, then A is isomorphic to a twisted groupoid C ∗ -algebra. Here we combine this with the results of Section 5 to show that up to Morita equivalence every Fell algebra arises as a twisted groupoid C ∗ -algebra, and conversely determine for which twists the associated twisted groupoid C ∗ -algebra is Fell. We start with some background from [27, §2]. A T-groupoid Γ is a locally compact, Hausdorff groupoid Γ equipped with a free rangeand source-preserving action of the circle group T such that (t1 · γ1 )(t2 · γ2 ) = (t1 t2 ) · (γ1 γ2 )
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1563
whenever (γ1 , γ2 ) is a composable pair in Γ . The quotient groupoid Γ /T is Hausdorff because T is compact. q i Recall that a sequence K (0) → K − → G → H of groupoids is exact if q is a surjective groupoid homomorphism which restricts to an isomorphism of unit spaces, and i is an isomorphism of K onto ker(q) = {g ∈ G: q(g) ∈ H (0) }. A topological twist or just twist is a T-groupoid Γ such that there is an exact sequence q
→R Γ (0) → Γ (0) × T → Γ − of groupoids in which R is a principal, étale groupoid (a relation in the terminology of [27]). q1 R Note that Γ (0) = R (0) . We often abbreviate the exact sequence to Γ → R. Twists Γ1 −→ q2 and Γ2 −→ R over the same relation R are isomorphic if there is a T-equivariant isomorphism q π : Γ1 → Γ2 such that q2 ◦ π = q1 ; we call π a twist isomorphism. A twist Γ − → R is said to be trivial if q has a continuous section which is a groupoid homomorphism. A trivial twist over R is isomorphic to the cartesian-product groupoid R × T [27, Remark 4.2]. We outline in Appendix A the construction of the twisted groupoid C ∗ -algebra Cr∗ (Γ ; R) associated to a twist, and also prove there that the C ∗ -algebra of a trivial twist is isomorphic to the reduced groupoid C ∗ -algebra Cr∗ (R) of R. In brief, Cr∗ (Γ ; R) is a C ∗ -completion of the collection of Cc (Γ ; R) of compactly supported T-equivariant functions on Γ ; the closure of the algebra of sections in Cc (Γ ; R) which are supported on T · Γ 0 can be identified with C0 (Γ (0) ), and restriction of functions extends to a conditional expectation P : Cr∗ (Γ ; R) → C0 (Γ (0) ). For our classification theorem, a key tool will be the following theorem, proved in [27]. Theorem 6.1. (See [27, Theorem 3.1].) Let A be a separable C ∗ -algebra with diagonal B, and let Then there exist a twist Γ → R, a homeomorphism φ : Y → Γ (0) , and an isomorphism Y := B. π : A → Cr∗ (Γ ; R) such that the following diagram commutes φ∗
B −−−−→ C0 (Γ (0) ) ⏐ ⏐ ⏐ ⏐ ⊆ ⊆
(6.1)
π
A −−−−→ Cr∗ (Γ ; R). Since we need the details below, we now sketch the construction of the twist Γ from a unital diagonal pair (A, B) given in [27, Theorem 3.1]; Remark 6.2 below explains how the construc and set tion works for nonunital diagonal pairs. Let Y = B
Γ0 = (a, y) ∈ N (B) × Y : y a ∗ a > 0 . For y ∈ Y we continue to write y for the unique state extension to A, and then for each (a, y) ∈ Γ0 , we define [a, y] : A → C by [a, y](c) = y(a ∗ c)y(a ∗ a)−1/2 . Then each [a, y] belongs to the dual space A∗ of A, and the following are equivalent: (1) [a, y] = [c, y]; (2) y(a ∗ c) > 0; (3) there exist b1 , b2 ∈ B with y(b1 ), y(b2 ) > 0 such that ab1 = cb2 . Set
Γ := [a, y]: (a, y) ∈ Γ0 ⊂ A∗ .
(6.2)
1564
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Define a T-action on Γ by scalar multiplication: t · [a, y] = [ta, y]; this agrees with scalar multiplication on A∗ but not with the convention used in [39, §5]. By [27, Proposition 1.6], for each a ∈ N (B), there is a homeomorphism
σa : y ∈ Y : y a ∗ a > 0 → y ∈ Y : y aa ∗ > 0 such that y(a ∗ ba) = σa (y)(baa ∗ ) for all b ∈ B and all y in the domain of σa . The set Γ , with source and range maps defined by s([d, y]) = y and r([d, y]) = σd (y), and partial multiplication defined by [a, σc (y)][c, y] = [ac, y], is a T-groupoid. The quotient groupoid R = Γ /T is a principal étale groupoid, and Γ → R is a twist satisfying the requirements of Theorem 6.1. The class of this twist is the negative of the one constructed in [39, §5]. Remark 6.2. The construction outlined above is for unital diagonal pairs (A, B). However, as mentioned in the proof of [27, Theorem 3.1], the construction may be applied to nonunital pairs as follows. When (A, B) is a nonunital diagonal pair, one applies the above construction to the B) to obtain a twist Γ → R with unit space diagonal pair (A, (0) = B ∪ {∞}. Γ(0) = R ⊂ Γ(0) is an open invariant subset, so we may restrict both It is straightforward to see that B Γ and R to B to obtain a twist Γ → R. It is routine to check that Cr∗ (Γ ; R) may be identi ∼ fied with an ideal I Cr∗ (Γ; R) = A for which the quotient is isomorphic to Cr∗ (T; {1}) = C. Hence I coincides with A A, and it is clear from the construction that this identification takes I ∩ C0 (Γ(0) ) = C0 (Γ (0) ) to B. In particular, there is an isomorphism π : A → Cr∗ (Γ ; R) which makes the diagram (6.1) commute. We claim that Γ is still described by (6.2). This is not obvious right off the bat: by definition in A, and x belongs the elements of Γ are of the form [n, x] where n is a normaliser of B ⊂ B. So we must show that if n = (n , λ) ∈ A normalises B and x ∈ s(n) \ {∞}, then to B [n, x] = [(m, 0), x] for some normaliser m of B in A. + and x ∈ B. Moreover, if x = ∞, Fix u ∈ Γ (0) . Then u has the form [b0 , x] where b0 ∈ B + + then there exists b ∈ B ⊂ B such that b(x) > 0, and then [b, x] = [b0 , x]. Now for any n ∈ ⊂A and any x ∈ {y ∈ B: y(n∗ n) > 0}, we can express s([n, x]) = [b, x] where b ∈ B ⊂ B, N(B) and nb also and then [n, x] = [n, x][b, x] = [nb, x]. We have nb ∈ A because A is an ideal in A, normalises B: for c ∈ B, (nb)∗ c(nb) = b∗ n∗ cn b
and (nb)c(nb)∗ = n bcb∗ n∗ ,
(6.3)
and A is an ideal in A. and both belong to B because n normalises B Proposition 6.3. Let (A, B) be a diagonal pair such that A is a separable Fell algebra, and let → A be the spectral map. Then Γ → R be the twist constructed from (A, B) as above. Let ψ : B for x, y ∈ Y , there exists α ∈ R such that r(α) = x and s(α) = y if and only if ψ(x) = ψ(y). Furthermore, the map α → (r(α), s(α)) is a topological groupoid isomorphism from R onto R(ψ).
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1565
we have ψ(x) = Proof. Let P be the conditional expectation from A to B. Recall that for x ∈ B, ψP (x) = [πx ] where (πx , Hx , ξx ) is the GNS triple associated with the pure state x ◦ P ; so we have x ◦ P (a) = (πx (a)ξx |ξx ) for all a ∈ A (see Notation 5.10). First fix α ∈ R, and let x = r(α) and y = s(α). By definition of R = Γ /T, there exists n ∈ N(B) such that y(n∗ n) > 0 and x = σn (y). By scaling n we may assume that y(n∗ n) = 1. Since n∗ n ∈ B it follows that for b ∈ B, we have y(b) = y(b)y(n∗ n) = y(bn∗ n). So by definition of σn , we have x(b) = y(n∗ bn) for all b ∈ B. Since y(n∗ n) = 1, the vector ηy := πy (n)ξy has norm 1. Now x(b) = y(n∗ bn) = (πy (b)ηy |ηy ) for all b ∈ B. Since B has the extension property relative to A, x ◦ P and a → (πy (a)ηy |ηy ) coincide on A. Hence, πy and πx are unitarily equivalent, whence ψ(x) = ψ(y). Conversely, suppose ψ(x) = ψ(y). Then the GNS representations πx and πy are unitarily equivalent, so there is an irreducible representation π : A → B(H ) and unit vectors ξ, η ∈ H such that y(P (·)) = (π(·)ξ |ξ ) and x(P (·)) = (π(·)η|η). Since π(A) = K(H ), there exists a ∈ A such that π(a) = Θη,ξ . Since A is a Fell algebra, Theorem 5.14(1) implies that ψ is a local homeomorphism, so there exist open neighbourhoods U of y and V of x such that ψ|U and ψ|V are injective. Fix norm-one positive functions f, g with compact support such that supp(f ) ⊂ U , supp(g) ⊂ V , and f (y) = g(x) = 1. Then π(f )ξ = ξ and π(g)η = η. Let n := gaf . Then y(n∗ n) = (π(gaf )ξ |π(gaf )ξ ) = (η|η) = 1 and y(n∗ bn) = (π(b)π(gaf )ξ |π(gaf )ξ ) = x(b) for all b ∈ B. Lemma 5.13 implies that n ∈ N (B), so α := q([n, y]) ∈ R with r(α) = x and s(α) = y. It remains to prove that the map Υ : α → (r(α), s(α)) is a homeomorphism. It follows from the above that Υ is surjective, and it is injective since R is principal. It is continuous because the range and source maps are continuous from R to Y . We must now show that Υ is open. For such that ψ|U0 this, fix α = q([a0 , x]) ∈ R. Fix neighbourhoods U0 of σa0 (x) and V0 of x in B and ψ|V0 are homeomorphisms, and fix b, c ∈ B + with supp b ⊂ U0 and supp c ⊂ V0 such that b(σa0 (x)) = c(x) = 1. As in (6.3), the element a := ba0 c is a normaliser of B, and
aa ∗ (y) > 0 ⊂ U0 U := y ∈ B:
a ∗ a(y) > 0 ⊂ V0 . and V := y ∈ B:
Hence [a, x] = [a0 , x], so W := {q([a, y]): y ∈ V } is an open neighbourhood of [a, x] (see [27, p. 982]). Since ψ(σa (y)) = ψ(y) for all y, and since ψ is injective on U and V , we have Υ (W ) = U ∗ψ V = (U × V ) ∩ R(ψ), and hence Υ (W ) is open in the relative topology. So each α ∈ R has a neighbourhood W such that Υ (W ) is open, and it follows that Υ is open. 2 The following is a rewording of [27, Definition 5.5]. Definition 6.4. Twists Γi → Ri (i = 1, 2) are equivalent if there exist a twist Γ → R and maps ιi : Ri → R such that (0)
1. each Ui := ιi (Ri ) is a full (see p. 2) and open subset of R (0) ; 2. R (0) = U1 U2 ; and 3. each ιi is an isomorphism onto Ui RUi and the pullback ι∗i (Γ ) is isomorphic to Γi . We call Γ → R a linking twist. The following lemma will be used in the proof of Theorem 6.6 below.
1566
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Lemma 6.5. Let (C1 , D1 ) and (C2 , D2 ) be diagonal pairs and suppose that C1 and C2 are separable Fell algebras. Then C1 and C2 are Morita equivalent if and only if the associated twists obtained from Theorem 6.1 are equivalent. Proof. For the “only if” implication, let X be a C1 –C2 -imprimitivity bimodule, and let L be the associated linking algebra. Let q1 , q2 ∈ M(L) be the multiplier projections such that qi Lqi ∼ = Ci and q1 Lq2 ∼ = X, and identify the Ci and X with subsets of L under these isomorphisms. By [27, Proposition 5.4], it suffices to show that D := D1 ⊕ D2 is a diagonal in L. Since L is a Fell algebra, by Theorem 5.14 it suffices to show that D has the extension property relative to L. Let =D 1 D 2 , x is a pure state of Di for either i = 1 or i = 2 (but x be a pure state of D. Since D not both) and thus extends uniquely to a pure state of Ci = qi Lqi because (Ci , Di ) is a diagonal pair. Since all states extend uniquely from hereditary subalgebras [34, Proposition 3.1.6], x has a unique extension to L, so D has the extension property relative to L as required. The “if” implication is [27, Proposition 5.4]. 2 Theorem 6.6. 1. Suppose that A is a separable Fell algebra. Then there exists a locally compact, Hausdorff and a T-groupoid Γ such that space Y , a local homeomorphism ψ : Y → A Y → Y × T → Γ → R(ψ) is a twist, and the twisted groupoid C ∗ -algebra Cr∗ (Γ ; R(ψ)) is Morita equivalent to A. Moreover, any two such twists are equivalent. 2. Let Y be a locally compact, Hausdorff space, X a locally compact, locally Hausdorff space, and ψ : Y → X a local homeomorphism. Let Y → Y × T → Γ → R(ψ) be a twist such that Γ is second-countable. Then A := Cr∗ (Γ ; R(ψ)) is a Fell algebra. Let B := C0 (Y ), and identify B with a subalgebra of A with conditional expectation P : A → B as on p. 1563. such that h ◦ ψ = ψP . Then there is a homeomorphism h : X → A Proof. (1) Let A be a Fell algebra. By Theorem 5.17 there exists a diagonal pair (C, D) such that By Theorem 6.1 there is a twist Y → Y × T → Γ → R C is Morita equivalent to A. Let Y = D. ∗ such that C is isomorphic to Cr (Γ ; R) via an isomorphism which carries D to C0 (Γ (0) ). By is the spectral map. Hence A is Morita equivalent Proposition 6.3, R ∼ = R(ψ), where ψ : Y → C ∗ to Cr (Γ ; R(ψ)). Now suppose that Y → Y × T → Γ → R(ψ ) is another twist such that A is Morita equivalent to Cr∗ (Γ ; R(ψ )). Let (C1 , D1 ) = (Cr∗ (Γ ; R(ψ)), C0 (Y )) and (C2 , D2 ) = (Cr∗ (Γ ; R(ψ )), C0 (Y )). Then each Ci is Morita equivalent to A. So Lemma 6.5 implies that the twists are equivalent. (2) The pair (A, B) satisfies (D2) and (D3) by Theorem 2.9 of [27] and that it satisfies (D1) is shown in Appendix A, so (A, B) is a diagonal pair. We will show that for each y ∈ Y there exists fy ∈ C0 (Y ) such that fy is abelian in A and y(fy ) > 0, and then use Theorem 3.3 to see that A is a Fell algebra. Fix y ∈ Y . There exists a neighbourhood U of y in Y such that ψ|U is injective. Let fy ∈ Cc (Y ) be a positive element of A with support contained in U such that fy (y) = 0. To see that fy gfy ∈ Cc (Y ) for any g in the dense subalgebra Cc (Γ ; R) of A, we identify fy , g with
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1567
sections of the complex line bundle L over R as outlined in Appendix A. Note that fy has support in R (0) . A straightforward calculation yields fy gfy (ρ) = fy r(ρ) g(ρ)fy s(ρ) for ρ ∈ R(ψ). Now let ρ = (y1 , y2 ) ∈ supp fy gfy . Then ψ(y1 ) = ψ(y2 ) and y1 , y2 ∈ supp fy ⊂ U gives y1 = y2 , so ρ is a unit. Thus fy gfy ∈ Cc (Y ). In particular, the hereditary subalgebra fy Afy is contained in C0 (Y ), hence is abelian. Thus fy is abelian in A and y(fy ) > 0 as claimed. For each y ∈ Y , set Iy := Afy A. Then each Iy is Morita equivalent to the abelian algebra fy Afy by Lemma 3.2. Let J be the ideal of A generated by the Iy (this ideal is also the C ∗ subalgebra of A generated by the Iy ), and let I = J ∩ C0 (Y ), so I is an ideal of C0 (Y ). Then I is the set of functions vanishing on some closed subset KI of Y . But for each y ∈ Y , we have fy ∈ I and y(fy ) = 0. Hence KI = ∅, that is I = C0 (Y ). In particular, C0 (Y ) ⊂ J . Since C0 (Y ) is diagonal in A, it contains an approximate identity for A, so A is generated as a C ∗ -algebra by the Iy . Theorem 3.3 now implies that A is a Fell algebra. such that h ◦ ψ = ψP . We have It remains to prove that there is a homeomorphism h : X → A ∼ R(ψ) = R(ψP ) by Proposition 6.3. Given y, y ∈ Y , we have y, y ∈ ψ −1 {x}
⇔
y, y ∈ R(ψ) = R(ψP )
⇔
ψP (y) = ψP y .
It follows that the assignment x → ψP (y)
where y ∈ ψ −1 {x}
such that h ◦ ψ = ψP . Since A is liminal ψP gives a well-defined injective function h : X → A is surjective by Lemma 5.11, so h ◦ ψ = ψP implies h is surjective. Moreover, that h ◦ ψ = ψP and that ψ , ψP are local homeomorphisms implies that h is continuous and open. Thus h is a homeomorphism. 2 7. A Dixmier–Douady theorem for Fell algebras Recall that a sheaf of abelian groups over a topological space X is a pair (B, π) where B is a topological space and π : B → X is a local homeomorphism such that for each x ∈ X the fibre Bx := π −1 ({x}) is an abelian group. Of particular importance are the constant sheaf ZX over X whose every fibre is Z, and the sheaf SX of germs of continuous T-valued functions on X (see Notation 7.3 for details). When the base space X is clear from context, we will often suppress the subscript, and denote these Z and S respectively. Our strategy for defining an analogue of the Dixmier–Douady invariant for a Fell algebra A is as follows. We first choose a twist Γ → R whose C ∗ -algebra is Morita equivalent to A. The results of [28] show that Γ determines an element of a twist group associated to R and that this in turn determines an element of the second equivariant-sheaf cohomology group H 2 (R, S). We S) to obtain an element δ(A) of H 2 (A, S) which we regard as show that H 2 (R, S) ∼ = H 2 (A, an analogue of the Dixmier–Douady invariant for A. The bulk of the work in the section goes towards proving that this assignment does not depend on our choice of twist Γ → R. We recall [28, Definition 0.6]. Let G be an étale groupoid and B a sheaf over G(0) . An action of G on B is a continuous map α : G ∗ B := {(γ , b): γ ∈ G, b ∈ Bs(γ ) } → B, (γ , b) → αγ (b)
1568
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
such that each αγ : B(s(γ )) → B(r(γ )) is an isomorphism of abelian groups and αγ1 γ2 = αγ1 ◦ αγ2 when (γ1 , γ2 ) ∈ G(2) . It is common practice to suppress the α and write γ b for αγ (b), and we shall do so henceforth. A sheaf B over G(0) with such an action is called a G-sheaf. A G-sheaf morphism f : B1 → B2 is a sheaf morphism such that f (γ b) = γf (b) for γ ∈ G and b ∈ B. We will frequently regard the sheaves ZG(0) and SG(0) as G-sheaves with trivial action [20]. Fix a topological groupoid G, a locally compact, Hausdorff space Y , and a continuous open surjection ψ : Y → G(0) . As in [28, §0.5], we may construct a groupoid Gψ with unit space (Gψ )(0) = Y as follows:
Gψ := (x, g, y): x, y ∈ Y, g ∈ G, ψ(x) = r(g) and ψ(y) = s(g) , with structure maps r(x, g, y) = x,
s(x, g, y) = y,
(x, g, y)−1 = y, g −1 , x ,
and (x, g, y)(y, h, z) = (x, gh, z), and with the relative topology inherited from the product topology on Y × G × Y . We identify Y with the unit space (Gψ )(0) via the map x → (x, ψ(x), x). There is then a groupoid homomorphism πψ : Gψ → G given by πψ (x, g, y) = g.
(7.1)
For the next result, recall the definition of a groupoid equivalence from Definition 4.3. Lemma 7.1. Let G1 and G2 be second-countable, locally compact, Hausdorff groupoids, and let ρ (Z, ρ, σ ) be an equivalence from G1 to G2 . Then for each (x, g, y) ∈ G1 , there exists a unique element ω(x, g, y) ∈ G2 such that x · ω(x, g, y) = g · y. ρ
Moreover, the map ω is a homomorphism from G1 to G2 , and Ωρ,σ : (x, g, y)→ (x, ω(x, g, y), y) ρ is an isomorphism from G1 to Gσ2 . ρ
Proof. Fix (x, g, y) ∈ G1 . Then ρ(x) = r(g) = ρ(g · y). Since ρ induces to a bijection from (0) Z/G2 to G1 , it follows that x and g · y belong to the same G2 -coset. Since Z is a principal G2 -space, there exists a unique element ω(x, g, y) ∈ G2 such that σ (x) = r(ω(x, g, y)) and x · ω(x, g, y) = g · y. Since σ is G1 -invariant, we have σ (y) = σ (g · y) = σ (x · ω(x, g, y)). In particular, σ (y) = s(ω(x, g, y)), and hence (x, ω(x, g, y), y) ∈ Gσ2 . An argument symmetric to that of the preceding paragraph shows that g is uniquely determined by ω(x, g, y) and the formula x · ω(x, g, y) = g · y. Hence Ωρ,σ is a bijection.
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1569
To see that ω is a homomorphism, we first check that it maps units to units and that it intertwines the range and source maps. This will imply that ω maps composable pairs to comρ posable pairs. Let (x, ρ(x), x) ∈ (G1 )(0) . Since x · σ (x) = ρ(x) · x we have ω(x, ρ(x), x) = ρ σ (x); so ω preserves units. For (x, g, y) ∈ G1 , we see as above that r(ω(x, g, y)) = σ (x) and s(ω(x, g, y)) = σ (y). Thus, ω maps composable pairs to composable pairs. Now let ρ (x, g, y), (y, h, z) ∈ G1 be a composable pair; then x · ω(x, g, y)ω(y, h, z) = g · y · ω(y, h, z) = g · (h · z) = (gh) · z, so the uniqueness assertion of the first paragraph implies that ω(x, g, y)ω(y, h, z) = ω(x, gh, z) = ω (x, g, y)(y, h, z) . Hence, ω is a homomorphism. It is immediate that Ωρ,σ preserves composable pairs. So to see that Ωρ,σ is also a homomorphism, we calculate Ωρ,σ (x, g, y)Ωρ,σ (y, h, z) = x, ω(x, g, y), y y, ω(y, h, z), z = x, ω(x, g, y)ω(y, h, z), z = Ωρ,σ (x, gh, z). The map Ωρ,σ is continuous because the structure maps on the groupoid equivalence Z are con−1 = Ω tinuous. Reversing the rôles of G1 and G2 in the above yields a continuous inverse Ωρ,σ σ,ρ , so Ωρ,σ is a homeomorphism. 2 Let ψ : Y → G(0) be a local homeomorphism as before, and let πψ∗ be the pullback functor from the category Sh(G) of G-sheaves to the category Sh(Gψ ) of Gψ -sheaves. So
πψ∗ (B) = (y, b): y ∈ Y, b ∈ Bψ(y) , and for a morphism f : B1 → B2 of G-sheaves, πψ∗ (f )(y, b) = (y, f (b)). Let R(ψ) be the equivalence relation on Y induced by ψ . We may regard R(ψ) as a subgroupoid of Gψ by identifying it with {(x, ψ(x), y): (x, y) ∈ R(ψ)}. Hence, for a Gψ -sheaf B the action of Gψ on B restricts to an action of R(ψ) on B. By [28, Theorem 0.9], πψ∗ is a category equivalence between Sh(G) and Sh(Gψ ). Indeed, the proof of [28, Theorem 0.9] shows that the “inverse” functor F ψ is defined as follows. For a Gψ -sheaf B, F ψ (B) is the quotient sheaf B/R(ψ) ∈ Sh(G). Since morphisms between Gsheaves are equivariant maps, each morphism f of Gψ -sheaves descends to a morphism F ψ (f ) of G-sheaves. Specifically, [(y, b)] → b is a natural isomorphism from F ψ ◦ πψ∗ to idSh(G) , and (y, [c]) → c is a natural isomorphism from πψ∗ ◦ F ψ to idSh(Gψ ) . Moreover πψ∗ (ZG(0) ) is isomorphic to ZY . Lemma 7.2. Let G be a groupoid, and let U be a full open subset of G(0) , and let ιU : U GU → G be the inclusion map. The functor ι∗U : Sh(G) → Sh(U GU ) is an equivalence of categories such that the U GU -sheaves ι∗U (ZG(0) ) and ZU are isomorphic.
1570
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Proof. It is straightforward to verify that GU is a G–U GU equivalence under the structure maps ρ := r|GU and σ := s|GU inherited from G. Hence Lemma 7.1 provides an isomor∗ from Sh(Gρ ) to phism Ωσ,ρ from (U GU )σ to Gρ , and hence an equivalence of categories Ωσ,ρ Sh((U GU )σ ). Composing with the category equivalences πρ∗ and F σ discussed above, we ob∗ π ∗ : Sh(G) → Sh(U GU ). We show that ι∗ is naturally tain an equivalence of categories F σ Ωσ,ρ ρ U σ ∗ ∗ isomorphic to F Ωσ,ρ πρ . It then follows that ι∗U is also an equivalence of categories. Fix B ∈ Sh(G). Then ι∗U (B) = {(u, b): u ∈ U, b ∈ Bu } and ∗ F σ Ωσ,ρ πρ∗ (B) = F σ
(x, b): x ∈ GU, b ∈ Bρ(x) = [x, b]: x ∈ GU, b ∈ Bρ(x) .
The map [g] → σ (g) from GU/R(σ ) → U is a bijection. It follows that
∗ F σ Ωσ,ρ πρ∗ (B) = [u, b]: u ∈ U, b ∈ Bu , ∗ π ∗ (B) to ι∗ (B). It is routine to and that tB : [u, b] → (u, b) is an isomorphism from F σ Ωσ,ρ ρ U σ ∗ ∗ see that for a morphism f of G-sheaves, F Ωσ,ρ πρ (f )[u, b] = [u, f (b)], and ι∗U (f )(u, b) = ∗ π ∗ to ι∗ . (u, f (b)), so the family of maps tB constitute a natural isomorphism from F σ Ωσ,ρ ρ U ∗ It remains to check that ιU (ZG(0) ) ∼ = ZU . We have
ι∗U (ZG(0) ) = (x, n, y): x ∈ U, (n, y) ∈ Z × G(0) , ιU (x) = y
= (x, n, x): x ∈ U, n ∈ Z , and the latter is isomorphic to ZU via (x, n, x) → (n, x).
2
For the next lemma, we need some notation. Notation 7.3. Given a topological space X, continuous T-valued functions f, g defined on open subsets of X, and a point x ∈ X, we write f ∼x g if there exists an open neighbourhood W of x with W ⊂ dom(f ) ∩ dom(g) such that f |W = g|W . We denote by [f ]X x the equivalence class of f under ∼x ; this is called the germ of f at x. The sheaf SX has fibres
Sx := [f ]X x : f ∈ C(U, T) for some open neighbourhood U of x , X X with group operation [f ]X x + [g]x := [(f |dom(f )∩dom(g) )(g|dom(f )∩dom(g) )]x . For each open set X X U ⊂ X and function f ∈ C(U, T), let Of,U := {[f ]x : x ∈ U }. The topology on SX has basis X : U ⊂ X is open, f ∈ C(U, T)}. Fix an open subset U of X. The pullback sheaf ι∗ (S ) {Of,U U X X X is equal to {(u, [f ]u ): u ∈ U, [f ]u ∈ SX } with the relative topology inherited from X × SX ; we regard ι∗U (S) as the restriction of S to U .
Lemma 7.4. Let X and Y be second-countable, locally compact spaces such that X is locally Hausdorff and Y is Hausdorff. Let ψ be a local homeomorphism from Y onto an open subset Y of X. There is an isomorphism φ : ψ ∗ (SX ) → SY determined by φ(y, [f ]X ψ(y) ) = [f ◦ ψ]y . In particular, if U is an open subset of a second-countable, locally compact, Hausdorff space X with inclusion map ιU : U → X, then there is an isomorphism φ : ι∗U (SX ) → SU determined U by φ(u, [f ]X u ) = [f ]u .
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1571
X Proof. To see that the formula for φ is well defined, suppose that (y, [f ]X ψ(y) ) = (z, [g]ψ(z) ). Then y = z, and there exists an open neighbourhood V of ψ(y) in X such that f |V = g|V . Let U := ψ −1 (V ). Then U is an open neighbourhood of y, and (f ◦ ψ)|U = (g ◦ ψ)|U because f and g agree on ψ(U ). Hence [f ◦ ψ]Yy = [g ◦ ψ]Yz . It is routine to check that φ is a sheaf morphism. For surjectivity, fix an open subset U ⊂ Y , a function f ∈ C(U, T) and a point y ∈ U . We must show that [f ]Yy belongs to the image of φ. Choose a subneighbourhood V ⊂ U of y such that ψ|V is a homeomorphism, and define g ∈ C(ψ(V ), T) by g := f ◦ (ψ|V )−1 . By definition,
Y Y −1 φ y, [g]X ◦ ψ y = [f |V ]Yy = [f ]Yy . ψ(y) = [g ◦ ψ]y = f ◦ (ψ|V ) X For injectivity, suppose that φ(y, [f ]X ψ(y) ) = φ(z, [g]ψ(z) ). Then y = z, and there is an open U ⊂ X such that ψ(y) ∈ U and (f ◦ ψ)|U = (g ◦ ψ)|U . Since ψ is a local homeomorphism, ψ(U ) is an open neighbourhood of ψ(y) in X. Moreover, for x ∈ ψ(U ), say x = ψ(z), we have X f (x) = f ◦ ψ(z) = g ◦ ψ(z) = g(x), so f and g agree on ψ(U ). Hence [f ]X ψ(y) = [g]ψ(y) , so X (y, [f ]X ψ(y) ) = (z, [g]ψ(z) ), and hence φ is injective. To see that φ is a homeomorphism, recall that the basic open sets in SX are those of the form
X := [f ]X Of,U u: u∈U
where U ranges over open subsets of X and f ranges over continuous T-valued functions on U . Y : ψ| is a homeomorphism} Since ψ is a local homeomorphism, the family of open sets {Of,V V is a basis for the topology on SY . The basic open neighbourhoods in πψ∗ (SX ) are by definition of the form
X X ∩ πψ∗ (SX ) = w, [f ]X = W × Of,U W ∗ Of,U ψ(w) : ψ(w) ∈ W , w∈W X is a basic open set in S . We calculate: where W ⊂ Y is open and Of,U X
X = [f ◦ ψ]Yw : ψ(w) ∈ U φ W ∗ Of,U w∈W
= OfY ◦ψ,ψ −1 (U )∩W . If V ⊂ Y and ψ|V is a homeomorphism, then for f ∈ C(V ), Y Y
= φ −1 OfY ◦(ψ| )−1 ◦ψ,V = φ −1 f ◦ (ψ|V )−1 ◦ ψ y : y ∈ V φ −1 Of,V V X
= f ◦ (ψ|V )−1 ψ(y) : y ∈ V = OfX◦(ψ| )−1 ,ψ(V ) , V
which is a basic open set because ψ is open. Hence both φ and φ −1 carry basic open sets to basic open sets, and φ is a homeomorphism. For the second statement, apply the first to ιU : U → X. 2 Recall from [28, p. 215] that given a groupoid G and a G-sheaf B, for each n ∈ N, the nth equivariant-cohomology group H n (G, B) is defined by H n (G, B) := ExtnG (Z, B) (see [21] for an alternative definition of sheaf cohomology of étale groupoids).
1572
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Proposition 7.5. Let G be a second-countable, locally compact, Hausdorff, étale groupoid, B a G-sheaf, and U a full open subset of G(0) . Then the inclusion ιU : U GU → G induces an isomorphism ι∗U : H ∗ (G, B) → H ∗ (U GU, ι∗U (B)), so in particular an isomorphism ι∗U : H 2 (G, SG(0) ) → H 2 (U GU, SU ). Proof. Note that ι∗U (ZG(0) ) = ZU by Lemma 7.2. So the first isomorphism follows from applying [28, Proposition 1.8] to the groupoid homomorphism ιU : U GU → G. In particular, there is an isomorphism ι∗U : H 2 (G, SG(0) ) → H 2 (U GU, ι∗U (SG(0) )). Now Lemma 7.4 and the naturality of the homology functor H ∗ imply that H 2 (U GU, ι∗U (SG(0) )) ∼ = H 2 (U GU, SU ). 2 Corollary 7.6. Let X be a second-countable, locally compact, locally Hausdorff space. For i = 1, 2 fix a second-countable, locally compact, Hausdorff space Yi and a local homeomorphism ψi : Yi → X. Let Y = Y1 Y2 , and define ψ : Y → X by ψ|Yi = ψi . Then for each i, the inclusion map ιYi : R(ψi ) → R(ψ) induces an isomorphism ι∗Yi : H 2 (R(ψ), SY ) → H 2 (R(ψi ), SYi ). In particular ι1,2 := ι∗Y2 ◦ (ι∗Y1 )−1 is an isomorphism from H 2 (R(ψ1 ), SY1 ) to H 2 (R(ψ2 ), SY2 ). Proof. The Yi are full in R(ψ)(0) , and Yi R(ψ)Yi = R(ψi ). The result now follows from Proposition 7.5. 2 Let Γ → R be a twist, R be a principal étale groupoid, and ϕ : R → R be a continuous groupoid homomorphism. Then the pullback twist ϕ ∗ (Γ ) is the fibred product R ∗ϕ Γ with structure maps r(α, γ ) = r(α) and s(α, γ ) = s(α), and with coordinatewise operations; it is regarded as a twist over R under the surjection (α, γ ) → α. q Recall from [28, Remark 2.9] that given a twist Γ − → R there is an extension SR (0) → Γ → R such that Γ is the groupoid consisting of germs of continuous local sections of the surjection Γ → R. Such extensions are called sheaf twists, and the group of isomorphism classes of sheaf twists over R is denoted TR (S) (see [28, Definition 2.5]). Pullbacks of sheaf twists are defined in a manner analogous to that of the preceding paragraph. By the discussion in [28, Section 2.9], the assignment Γ → Γ determines an isomorphism θR : [Γ ] → [Γ ] from the group Tw(R) of isomorphism classes of twists over R to TR (S). Moreover, suppose that R is a principal étale groupoid, Γ is a twist over R, and U is a full open subset of X = R (0) . Then an argument X nearly identical to that of Lemma 7.4 shows that [φ]U u → (u, [φ]u ) determines an isomorphism ∗ ∗ ∗ ∼ ιU (Γ ) = ιU (Γ ). Hence, using Lemma 7.4 to identify ιU (SX ) with SU , we see that the diagram Tw(R) −−−−→ Tw(U RU ) ⏐ ⏐θ R
ι∗U
⏐ ⏐θ U RU
TR (SX ) −−−−→ TU RU (SU ) ι∗U
commutes.
(7.2)
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1573
The long exact sequence of [28, Theorem 3.7] yields a boundary map ∂ 1 from the first derived functor ZR1 of the cocycle functor to H 2 (R, S). By [28, Corollary 3.4], the twist group TR (S) is naturally isomorphic to ZR1 , so each twist Γ over R determines an element ∂ 1 ([Γ ]) ∈ H 2 (R, S). Theorem 7.7. Fix a separable Fell algebra A. For each of i = 1, 2 suppose that (Ci , Di ) is a diagonal pair, and that Hi is an A–Ci -imprimitivity bimodule with Rieffel homeomorphism i → A. For each i, let ψi : D i → C i be the spectral map, and let Γi be a twist associated hi : C i → A. Then the isomorphism to (Ci , Di ) as in Theorem 6.1. For each i, let ψ˜ i := hi ◦ ψi : D 2 (R(ψ 1 ([Γ ]) to ∂ 1 ([Γ ]). ˜ ι1,2 : H 2 (R(ψ˜ 1 ), SD ) → H ), S ) of Corollary 7.6 carries ∂ 1 2 2 1 2 D Proof. Since each Ci is Morita equivalent to A, each Ci is a separable Fell algebra, and Lemma 6.5 implies that Γ1 and Γ2 are equivalent twists. Let Γ → R be a linking twist (see ∗ (Γ ). Let Y := D i ∼ 1 D 2 and define i Γ D Definition 6.4). Then in particular, each Γi ∼ =D = iD i by ψ|D ˜ i . Since ι1,2 = ι∗ ◦ (ι∗ )−1 by definition, it suffices to show that, for ψ :Y →A =ψ i
each of i = 1, 2, the isomorphism
2 D
1 D
2 2 ˜ ι∗D i : H R(ψ), SY → H R(ψi ), SD i
obtained from the first statement of Corollary 7.6 carries ∂ 1 ([Γ ]) to ∂ 1 ([Γ i ]). The naturality of the long exact sequence of [28, Theorem 3.7] together with [28, Corollary 3.4] implies that the right-hand square of the diagram Tw(R(ψ˜ i ), T) −−−−→ TR(ψ˜ i ) (SD −−−→ H 2 (R(ψ˜ i ), SD i ) − i ) ∂1 ⏐ι∗ ⏐ι∗ ⏐ι∗ ⏐ Di ⏐ Di ⏐ Di Tw(R(ψ), T) −−−−→ TR(ψ) (SY ) −−−−→ H 2 (R(ψ), SY ) ∂1
commutes; the left-hand square is an instance of (7.2). Since Γ is a linking twist for the Γi , the maps ι∗D on the left of the diagram carry [Γ ] to [Γ i ]. Since the diagram commutes, it follows i
1 1 that the maps ι∗D on the right of the diagram carry ∂ ([Γ ]) to ∂ ([Γ i ]). i
2
If X and Y are topological spaces, and ψ : Y → X is a local homeomorphism, then we may regard X as a groupoid whose only elements are units, and there is then an induced groupoid homomorphism πψ : R(ψ) → X given by πψ (y, z) = ψ(y). Proposition 7.8. Let X be a second-countable, locally compact, locally Hausdorff space, let Y be a second-countable, locally compact, Hausdorff space, and let ψ : Y → X be a local homeomorphism. Then πψ∗ : Sh(X) → Sh(R(ψ)) is an equivalence of categories such that πψ∗ (ZX ) = ZY and πψ∗ (SX ) ∼ = SY . Moreover, πψ∗ determines an isomorphism ∗ ∗ ∗ πψ : H (X, SX ) → H (R(ψ), SY ). Finally, under the hypotheses of Theorem 7.7, ι1,2 ◦ π ∗˜ = ψ1 π ∗˜ . ψ2
1574
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
Proof. Regard X as a groupoid with unit space X whose only morphisms are units. Then
X ψ = (y, x, z): ψ(y) = x = ψ(z) ∼ = R(ψ), and under this identification the map πψ : (y, x, z) → x of (7.1) agrees with the map πψ : R(ψ) → X described above. By [28, Proposition 0.8 and Theorem 0.9], πψ∗ is an equivalence of categories which takes Z to Z. Moreover, Lemma 7.4 implies that πψ∗ takes S to S also. That πψ∗ determines an isomorphism of cohomologies follows from [28, Proposition 1.8]. i for i = 1, 2, let Y := Y1 Y2 It remains to show that ι1,2 ◦ π ∗˜ = π ∗˜ . For this, let Yi = D ψ2 ψ1 by ψ| ˜ Yi = ψ˜ i as in Corollary 7.6. Consider the diagrams below and define ψ˜ : Y → A ˜ R(ψ)
Y ιY1 ψ˜
Y1
ιY1
ιY2
ψ˜ 1
Y2 ψ˜ 2
A
ιY2
R(ψ˜ 1 )
R(ψ˜ 2 ).
πψ˜
πψ˜
πψ˜
1
2
A
The diagram on the left commutes by definition, and it follows that the diagram on the right commutes also. Recall that ι1,2 = (ι∗Y2 )−1 ◦ ι∗Y1 by definition. Thus functoriality and naturality of the cohomology exact sequence, and that π ∗˜ takes S to S ensure that ι1,2 ◦ π ∗˜ = π ∗˜ as ψ ψ1 ψ2 required. 2 Theorem 7.7 and Proposition 7.8 ensure that we may specify a well-defined invariant as follows. Definition 7.9. Let A be a separable Fell algebra. Let (C, D) be a diagonal pair such that C is →A be its Rieffel Morita equivalent to A, fix an A–C-imprimitivity bimodule, and let h : C ˜ homeomorphism. Let ψ : D → C be the spectral map, and ψ := h ◦ ψ : D → A. Let Γ be the twist associated to (C, D) as in Theorem 6.1. Then we define −1 1 S). δ(A) := πψ∗˜ ∂ [Γ ] ∈ H 2 (A, Remark 7.10. It seems difficult to establish that our invariant δ(A) coincides with the original Dixmier–Douady invariant of A when A is a continuous-trace C ∗ -algebra. The issue is that the ˜ to an element of H 2 (R(ψ), ˜ S) boundary map ∂ 1 which takes the class of a twist over R(ψ) is defined by abstract nonsense. Nevertheless our invariant does classify Fell algebras up to spectrum-preserving Morita equivalence (see Theorem 7.13), and this generalises the original Dixmier–Douady theorem of [17]. Proposition 7.11. Let (G, X) be a free Cartan transformation group. Then δ(C0 (X) G) = 0 as an element of H 2 (X/G, S).
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1575
Proof. By Corollary 4.6, C0 (X) G is Morita equivalent to a groupoid C ∗ -algebra C ∗ (R), where R is a principal, étale groupoid. By the remarks following Corollary 4.6, C ∗ (R) is a Fell algebra. Thus the reduced C ∗ -algebra Cr∗ (R) is also a Fell algebra and hence is nuclear. By [2, Corollary 6.2.14], since R is principal and Cr∗ (R) is nuclear, R is measurewise amenable, and thus C ∗ (R) = Cr∗ (R) by [2, Proposition 6.1.8]. By Lemma A.1, Cr∗ (R) is isomorphic to the C ∗ -algebra Cr∗ (R × T; R) of the trivial twist Γ := R × T → R. The associated sheaf twist Γ is therefore also trivial and hence ∂ 1 ([Γ ]) = 0. It follows that δ(C0 (X) G) = 0 also. 2 To prove our classification theorem, we need another lemma. Lemma 7.12. Let X be a second-countable, locally compact, locally Hausdorff space. For i = 1, 2, let Yi be a second-countable, locally compact, Hausdorff space, and let ψi : Yi → X be a local homeomorphism. For i = 1, 2, let Γi → R(ψi ) be a twist, and suppose that the isomorphism ι1,2 of Corollary 7.6 carries ∂ 1 ([Γ 1 ]) to ∂ 1 ([Γ 2 ]). Then there exist a locally compact, Hausdorff space Z and local homeomorphisms ρi : Z → Yi such that ψ1 ◦ ρ1 = ψ2 ◦ ρ2 and πρ∗1 (Γ1 ) ∼ = πρ∗2 (Γ2 ) as twists over R(ψ1 ◦ ρ1 ). In particular, Γ1 and Γ2 are equivalent twists. Proof. Let Y := Y1 ∗ Y2 = {(y1 , y2 ) ∈ Y1 × Y2 : ψ1 (y1 ) = ψ2 (y2 )}. For each i, let φi : Y → Yi be the projection map; then ψ1 ◦ φ1 = ψ2 ◦ φ2 is a local homeomorphism from Y to X. We claim that each Γi is twist-equivalent to πφ∗i (Γi ). To see this, we first observe that for i = 1, 2, the assignment x, φi (x), φi (y) , y → (x, y) is an isomorphism from R(ψi )φi to R(ψi ◦ φi ), and the assignment ((x, y), g) → (x, g, y) is an φ φ isomorphism from πφ∗i (Γi ) to Γi i . By [27, Proposition 5.7], each Γi is equivalent to Γi i , so the isomorphisms above complete the proof of the claim. Since ι1,2 ∂ 1 πφ∗1 (Γ 1 ) = ∂ 1 πφ∗2 (Γ 2 ) , [28, Proposition 3.9] implies that there exist a locally compact, Hausdorff space Z and a local homeomorphism τ : Z → Y such that πτ∗ (πφ∗1 (Γ 1 )) and πτ∗ (πφ∗2 (Γ 2 )) are isomorphic sheaf twists. Since each πφ∗i ◦τ (Γ i ) = πτ∗ (πφ∗i (Γ i )), it follows that with ρi := φi ◦ τ : Z → Yi , we have πρ∗1 (Γ 1 ) ∼ = πρ∗2 (Γ 2 ), and hence by naturality πρ∗1 (Γ1 ) ∼ = πρ∗2 (Γ2 ).
(7.3)
For the final assertion, we apply the claim above with φi replaced with ρi to see that each Γi is twist-equivalent to πρ∗i (Γi ), and then invoke (7.3). 2 Theorem 7.13. Let A1 and A2 be separable Fell algebras. Then A1 and A2 are Morita equiv1 → A 2 such that the induced isomorphism alent if and only if there is a homeomorphism h : A ∗ 2 2 h : H (A2 , S) → H (A1 , S) carries δ(A2 ) to δ(A1 ).
1576
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1 → A 2 be the Proof. First suppose that H is an A2 –A1 -imprimitivity bimodule and let h : A associated Rieffel homeomorphism. Let (C, D) be a diagonal pair together with an A2 –C→ A 2 be the Rieffel homeomorphism associated to K. imprimitivity bimodule K, and let k : C Let ψ : D → C be the spectral map. →A 2 , and let Γ2 → R be the twist obtained from (C, D) as in TheoLet ψ˜ 2 := k ◦ ψ : D ˜ rem 6.1. Note that R = R(ψ2 ) by Proposition 6.3. By definition, δ(A2 ) = (π ∗˜ )−1 (∂ 1 ([Γ 2 ])) ∈ ψ2 2 , S). Let H be the dual bimodule of H , and observe that K ⊗A2 H is a C–A1 -imprimitivity H 2 (A →A 1 , and let bimodule with Rieffel homeomorphism h−1 ◦ k. Let ψ˜ 1 := h−1 ◦ k ◦ ψ : D ˜ Γ1 be the twist over R(ψ1 ) obtained from (C, D) as in Theorem 6.1. Again by definition, δ(A1 ) = (π ∗˜ )−1 (∂ 1 ([Γ 1 ])) ∈ H 2 (R(ψ˜ 1 ), S). Since ψ˜ 2 = h ◦ ψ˜ 1 , Theorem 7.7 and Propoψ1 2 , S) → H 2 (A 1 , S) carries δ(A2 ) sition 7.8 imply that the induced isomorphism h∗ : H 2 (A to δ(A1 ). 2 such that the induced isomorphism 1 → A Now suppose that there is a homeomorphism h : A 2 , S) → H 2 (A 1 , S) carries δ(A2 ) to δ(A1 ). Let (Ci , Di ) be diagonal pairs with Ci h∗ : H 2 (A i → C i be the spectral maps, and let Γi → R(ψi ) be the Morita equivalent to Ai , let ψi : D associated twists. Proposition 7.8 and the hypothesis that h∗ carries δ(A2 ) to δ(A1 ) ensures that the induced map (also denoted h∗ ) from H 2 (R(ψ2 ), S) to H 2 (R(ψ1 ), S) satisfies h∗ ∂ 1 [Γ 2 ] = ∂ 1 [Γ 1 ] . Hence we may regard Γ1 as a twist over R(h ◦ ψ1 ) with the same image under ∂ 1 as Γ2 . Lemma 7.12 therefore implies that Γ1 and Γ2 are equivalent twists, and then Lemma 6.5 implies that C1 and C2 are Morita equivalent, whence A1 and A2 are also Morita equivalent. 2 Recall that if X is the spectrum of a C ∗ -algebra then X is locally compact, and every open subset of X is itself locally compact (because it is the spectrum of an ideal); such spaces are called locally quasi-compact in [16, §3.3]. Remark 7.14. Let X be a second-countable, locally Hausdorff space such that every open subset of X is locally compact. We will show that every element of H 2 (X, S) arises as the class of a ˇ Fell algebra with spectrum X. To do this, it is convenient to work with Cech cohomology, rather than sheaf cohomology, of a locally compact, Hausdorff “desingularisation” Y of X. It is observed in [37, Hooptedoodle 4.16], with reference to [44, §5.23], that all reasonable sheaf-cohomology theories coincide over Hausdorff paracompact spaces. Specifically, by Theorem 5.32 of [44] and the subsequent corollary, any two sheaf cohomologies over Hausdorff paracompact spaces satisfying [44, Axioms 5.18] are canonically isomorphic. Warner demonˇ strates in [44, §5.33] that Cech cohomology satisfies these axioms. All but one of these axioms are automatically satisfied by the sheaf cohomology used here because it is defined in terms of derived functors; the remaining axiom (property (b) of [44, Axioms 5.18]) requires that H q (Y, B) = 0 for q > 0 if B is a fine sheaf, and this follows from [43, Proposition 4.36]. ˇ For an introduction to Cech cohomology, see [37, Chapter 4]. Given a covering {Ui : i ∈ I } of a space Y , and given i, j, k ∈ I , we write Uij k for the intersection Ui ∩ Uj ∩ Uk .
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1577
Lemma 7.15. Let Y be a second-countable, locally compact, Hausdorff space. For each a ∈ H 2 (Y, S), there exist a locally compact, Hausdorff space Z and a local homeomorphism φ : Z → Y such that φ ∗ (a) = 0 ∈ H 2 (Z, S). Proof. By Remark 7.14, we may regard a as an element of Hˇ 2 (Y, S). So there exists a covering U = {Ui : i ∈ I } of Y by open sets and a 2-cocycle c = {cij k : Uij k → T | i, j, k ∈ I } such that a ˇ2 is equal to the class of c in H (Y, S). Let Z := i∈I ({i} × Ui ) ⊂ I × Y , and let φ : Z → Y be the projection onto the second coordinate. Let Vi := {i} × Ui ⊂ Z for each i. Then V = {Vi : i ∈ I } is a refinement of the pullback cover {φ −1 (Ui ): i ∈ I } to a cover by mutually disjoint sets; in particular the only nonempty triple overlaps are those of the form Viii . Since Hˇ 2 (Z, S) is the direct limit over covers of Z of the cocycle group, the class of φ ∗ (c) is equal to the class of its image iU ,V (φ ∗ (c)) in the cocycle group for V. Since the Vi are pairwise disjoint, iU ,V (φ ∗ (c)) amounts to a continuous circle-valued function on each Viii , and so is a coboundary (specifically, the coboundary of itself regarded as a 1-cochain). 2 Next we require notation for the forgetful functor which takes an equivariant Γ -sheaf B to an ordinary sheaf B 0 over Γ 0 by forgetting the Γ -action. Note that B 0 = j ∗ (B) where j : Γ (0) → Γ is the inclusion map. The pullback functor induces the homomorphism jn∗ : H n (Γ, B) → H n (Γ (0) , B 0 ) which appears in the long exact sequence of [28, Theorem 3.7]. Proposition 7.16. Let X be a second-countable, locally Hausdorff space such that every open subset of X is locally compact. Then for each a ∈ H 2 (X, S) there exist a locally compact, Hausdorff space Z, a local homeomorphism ψ : Z → X and a twist Γ over R(ψ) such that a = (πψ∗ )−1 (∂ 1 ([Γ ])). In particular, for each a ∈ H 2 (X, S), there exists a separable Fell alge = X and a = δ(A). bra A such that A Proof. Choose a countable open cover {Ui } of X consisting of Hausdorff subsets of X and let Y := i Ui . Since every open subset of X is locally compact, each Ui is locally compact, and hence Y is locally compact and Hausdorff. The inclusion map θ : Y → X is a local homeomorphism. Let b := πθ∗ (a) ∈ H 2 (R(θ ), S). By Lemma 7.15, there exist a secondcountable, locally compact, Hausdorff space Z and a local homeomorphism φ : Z → Y such that φ ∗ (j2∗ (b)) = 0. Let ψ := θ ◦ φ : Z → X. Then by naturality of the long exact sequence, j2∗ (πψ∗ (a)) = 0 ∈ H 2 (Z, S). By exactness, it follows that there is a twist Γ over R(ψ) such that πψ∗ (a) = ∂ 1 ([Γ ]). Let A := Cr∗ (Γ ; R(ψ)). By Theorem 6.6(2), A is a Fell algebra and its with X, δ(A) = a by Definition 7.9. 2 spectrum is homeomorphic to X. After identifying A Remark 7.17. There is a notion of a Brauer group Br(G) for a locally compact, Hausdorff groupoid G [29]. Moreover, [29, Proposition 11.3] implies that if G is étale, then Br(G) ∼ = H 2 (G, S). If Z is a groupoid equivalence of locally compact, Hausdorff groupoids G and H , then Z determines an isomorphism between H 2 (G, S) and H 2 (H, S) [29, Theorem 4.1]. Thus H 2 (X, S) is canonically isomorphic to Br(R(ψ)) for any local homeomorphism ψ from a locally compact, Hausdorff space onto X (the isomorphism of Proposition 7.5 is a special case of [29, Theorem 4.1]). Though it would have been natural to identify Br(X) with H 2 (X, S) for a locally compact, locally Hausdorff space X, we have chosen not to use the notation Br(X) nor the term Brauer
1578
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
group as the notion has not yet been extended to non-Hausdorff spaces (to say nothing of nonHausdorff groupoids). To justify the use of the term it would first be necessary to formulate a notion of balanced tensor product for Fell algebras with spectra identified with X. We leave the details for future work. Appendix A q
→ R a twist (see p. 1562 for the definition of a twist). The Let Γ be a T-groupoid and Γ − details of the construction of the twisted groupoid C ∗ -algebra Cr∗ (Γ ; R) may be found in §2 of [27]. The idea is that a dense subalgebra is identified with continuous compactly supported sections of an associated line bundle, and then convolution and involution are defined by virtue of the Fell bundle structure of the line bundle (as in [39, §5] but our conventions differ slightly). We briefly review the construction for the convenience of the reader. Since R is an étale groupoid, we may use the standard Haar system consisting of counting measures. Define a line bundle L = L(Γ ) over R by taking the quotient of C × Γ by the diagonal action of T — that is, L consists of equivalence classes of the equivalence relation (z, γ ) ∼ (tz, t · γ ) for t ∈ T. Then L is a complex line-bundle over R with bundle map [(z, γ )] → q(γ ). As usual, we denote by Lρ the fibre over ρ ∈ R. The following Fell bundle structure on L is implicit in [27]. Given a composable pair (ρ1 , ρ2 ) of elements in R and elements [(zi , γi )] ∈ Lρi , we define the product in Lρ1 ρ2 by (z1 , γ1 ) (z2 , γ2 ) = (z1 z2 , γ1 γ2 ) ; and involution is defined by [(z, γ )] ∈ Lq(γ ) → [(z, γ −1 )] ∈ Lq(γ −1 ) . It is straightforward to check that these operations are well defined. Now define
Cc (Γ ; R) := f ∈ Cc (Γ ): f (t · γ ) = tf (γ ) for t ∈ T and γ ∈ Γ . Each f ∈ Cc (Γ ; R) determines a section f˜ of L by the formula f˜(q(γ )) := [(f (γ ), γ )] (it is straightforward to check that this map is well defined). Moreover, given γ ∈ Γ , and z ∈ T the element z is uniquely determined by γ and [z, γ ], so f → f˜ is a bijection. Hence we may endow Cc (Γ ; R) with the structure of a ∗-algebra by the following formulae for f, g ∈ Cc (Γ ; R) (f ∗ g)(ρ) =
f˜(α)g(β) ˜
∗ and f˜∗ (ρ) = f˜ ρ −1 .
αβ=ρ
These operations match up with the convolution and involution on Cc (Γ ; R) used in, for example, [32,39]. To keep our notation simple we identify each element of Cc (Γ ; R) with the corresponding compactly supported continuous section of the Fell bundle L (as in [27,39]). Note that the map, (x, z) → [(x, z)] gives a trivialisation R (0) × C ∼ = L|R (0) and hence L is trivial over R (0) ; thus we may identify Cc (R (0) ) with the abelian subalgebra {f ∈ Cc (Γ ; R): supp f ⊂ R (0) }, so Cc (Γ ; R) may be regarded as a right Cc (R (0) )-module under right-multiplication. Moreover, the restriction map P : Cc (Γ ; R) → Cc (R (0) ) is a Cc (R (0) )module morphism. For f, g ∈ Cc (Γ ; R), the formula f, g = P (f ∗ g) defines an inner prod1/2 uct on Cc (Γ ; R), and the completion H (Γ ; R) of Cc (Γ ; R) in the norm f = f, f ∞
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1579
is a right-Hilbert C0 (R (0) )-module. Finally, left multiplication by f ∈ Cc (Γ ; R) extends to an adjointable operator φ(f ) on H (Γ ; R); this defines a ∗-homomorphism φ : Cc (Γ ; R) → L(H (Γ ; R)). The twisted groupoid C ∗ -algebra Cr∗ (Γ ; R) is defined to be the completion of Cc (Γ ; R) in the operator norm, and C0 (R (0) ) is identified with the closure of Cc (R (0) ) in Cr∗ (Γ ; R). We show that (Cr∗ (Γ ; R), C0 (R (0) )) is a diagonal pair in the sense of Definition 5.2. This follows from [27, Proposition 2.9] and Corollary 5.6 once we establish that C0 (R (0) ) contains an approximate identity for Cr∗ (Γ ; R). For this, let (Kn )∞ n=1 be an increasing sequence of com (0) (0) pact subsets of R such that R = n Kn , and for each n ∈ N, fix gn ∈ Cc (R (0) ) such that gn |Kn = 1. Since (f gn )(ρ) = f (ρ)gn (s(ρ)) for each compactly supported section f , the gn form an approximate identity for Cr∗ (Γ ; R). For the next result, recall from [28, Remark 4.2] that a trivial twist over R is isomorphic to R × T → R. The reduced norm on Cc (R) is variously defined in the literature; see, for example, [38, p. 82] and [2, p. 146], and also [41, §3] for a discussion of the equivalence of these two definitions. There are also two definitions of the reduced norm on Cc (Γ ; R): one using the operator norm outlined above and the other based on induced representations from point evaluations on C0 (R (0) ) used in [39, p. 40]. The equivalence of the two follows from the observation that πx (f )ξ |s −1 (x) |η|s −1 (x) H = φ(f )ξ, η C x
0 (R
(0) )
(x)
for compactly supported sections f ∈ Cc (Γ ; R) and ξ, η ∈ Cc (Γ ; R) ⊂ H (Γ ; R) (see also the discussion in [39, p. 40]). Lemma A.1. If Γ → R is a trivial twist, then Cr∗ (Γ ; R) ∼ = Cr∗ (R). Proof. Suppose that Γ is a trivial twist. Then we may identify L and C × R and therefore Cc (R, L) and Cc (R). It is routine to check that this identification preserves the ∗-algebra structure defined above. So we just need to check that for f ∈ Cc (R) we have f r = φ(f ) . Let f ∈ Cc (R). By the definition given in [38, p. 82], we have
f r = supIndμ (f ) μ
where μ ranges over all Radon measures on R (0) . Denote by πμ : C0 (R (0) ) → B(L2 (R (0) , μ)) the usual representation by multiplication operators. The discussion on p. 81 of [38] shows that the induced representation Indμ is given on H (Γ ; R) ⊗πμ L2 R (0) , μ by the formula Indμ (f )(ξ ⊗ g) = φ(f )ξ ⊗ g. Hence, Indμ (f ) φ(f ) and so f r φ(f ) . Now, let μ be a measure with full support; then πμ is faithful and hence the corresponding representation of K(H (Γ ; R)) is also faithful. Since L(H (Γ ; R)) = M(K(H (Γ ; R))), this shows that Indμ is faithful on Cr∗ (Γ ; R). Hence,
φ(f ) = Indμ (f ) f r . 2
1580
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
References [1] C.A. Akemann, F.W. Shultz, Perfect C ∗ -algebras, Mem. Amer. Math. Soc. 55 (326) (1985), xiii+117. [2] C. Anantharaman-Delaroche, J. Renault, Amenable Groupoids, with a foreword by Georges Skandalis and Appendix B by E. Germain, Enseign. Math., Geneva, 2000, p. 196. [3] J. Anderson, Extensions, restrictions, and representations of states on C ∗ -algebras, Trans. Amer. Math. Soc. 249 (1979) 303–329. [4] R.J. Archbold, Extensions of pure states and projections of norm one, J. Funct. Anal. 165 (1999) 24–43. [5] R.J. Archbold, J.W. Bunce, K.D. Gregson, Extensions of states of C ∗ -algebras. II, Proc. Roy. Soc. Edinburgh Sect. A 92 (1982) 113–122. [6] R.J. Archbold, D.W.B. Somerset, Transition probabilities and trace functions for C ∗ -algebras, Math. Scand. 73 (1993) 81–111. [7] B. Blackadar, Operator algebras, in: Theory of C ∗ -Algebras and von Neumann Algebras, in: Oper. Alg. Noncommut. Geom., vol. III, Springer-Verlag, Berlin, 2006, xx+517. [8] P. Bouwknegt, K. Hannabuss, V. Mathai, Nonassociative tori and applications to T -duality, Comm. Math. Phys. 264 (2006) 41–69. [9] N. Bourbaki, Topologie générale, Chapitres 1 à 4, Éléments de mathématique, Hermann, Paris, 1971, xv+357. [10] J.-L. Brylinski, Loop Spaces, Characteristic Classes and Geometric Quantization, Birkhäuser Boston, Boston, MA, 2008, xvi+300, reprint of the 1993 edition. [11] L.J. Bunce, C.-H. Chu, Unique extension of pure states of C ∗ -algebras, J. Operator Theory 39 (1998) 319–338. [12] A.L. Carey, M.K. Murray, Faddeev’s anomaly and bundle gerbes, Lett. Math. Phys. 37 (1996) 29–36. [13] M.D. Choi, E.G. Effros, The completely positive lifting problem for C ∗ -algebras, Ann. of Math. (2) 104 (1976) 585–609. [14] L.O. Clark, Classifying the types of principal groupoid C ∗ -algebras, J. Operator Theory 57 (2007) 251–266. [15] J. Cuntz, Automorphisms of certain simple C ∗ -algebras, in: Quantum Fields – Algebras, Processes, Proc. Sympos., Univ. Bielefeld, Bielefeld, 1978, Springer, Vienna, 1980. [16] J. Dixmier, C ∗ -Algebras, translated from the French by Francis Jellett, North-Holland Math. Library, vol. 15, North-Holland Publishing, Amsterdam, 1977, xiii+492. [17] J. Dixmier, A. Douady, Champs continus d’espaces hilbertiens et de C ∗ -algèbres, Bull. Soc. Math. France 91 (1963) 227–284. [18] J.M.G. Fell, The structure of algebras of operator fields, Acta Math. 106 (1961) 233–280. [19] P. Green, C ∗ -algebras of transformation groups with smooth orbit space, Pacific J. Math. 72 (1977) 71–97. [20] A. Grothendieck, Sur quelques points d’algèbre homologique, Tôhoku Math. J. (2) 9 (1957) 119–221. [21] A. Haefliger, Differential cohomology, in: Differential Topology, Varenna, 1976, Liguori, Naples, 1979. [22] A. an Huef, The transformation groups whose C ∗ -algebras are Fell algebras, Bull. London Math. Soc. 33 (2001) 73–76. [23] A. an Huef, Integrable actions and transformation groups whose C ∗ -algebras have bounded trace, Indiana Univ. Math. J. 51 (2002) 1197–1233. [24] A. an Huef, I. Raeburn, D.P. Williams, Properties preserved under Morita equivalence of C ∗ -algebras, Proc. Amer. Math. Soc. 135 (2007) 1495–1503. [25] R.V. Kadison, I.M. Singer, Extensions of pure states, Amer. J. Math. 81 (1959) 383–400. [26] A. Kumjian, Diagonals in algebras of continuous trace, with an appendix by Toshikazu Natsume, in: Operator Algebras and Their Connections with Topology and Ergodic Theory, Bu¸steni, 1983, in: Lecture Notes in Math., vol. 1132, Springer, Berlin, 1985, pp. 297–311. [27] A. Kumjian, On C ∗ -diagonals, Canad. J. Math. 38 (1986) 969–1008. [28] A. Kumjian, On equivariant sheaf cohomology and elementary C ∗ -bundles, J. Operator Theory 20 (1988) 207–240. [29] A. Kumjian, P.S. Muhly, J.N. Renault, D.P. Williams, The Brauer group of a locally compact groupoid, Amer. J. Math. 120 (1998) 901–954. [30] V. Mathai, J. Rosenberg, T -duality for torus bundles with H -fluxes via noncommutative topology. II. The highdimensional case and the T -duality group, Adv. Theor. Math. Phys. 10 (2006) 123–158. [31] P.S. Muhly, J.N. Renault, D.P. Williams, Equivalence and isomorphism for groupoid C ∗ -algebras, J. Operator Theory 17 (1987) 3–22. [32] P.S. Muhly, D.P. Williams, Continuous trace groupoid C ∗ -algebras. II, Math. Scand. 70 (1992) 127–145. [33] R.S. Palais, On the existence of slices for actions of non-compact Lie groups, Ann. of Math. (2) 73 (1961) 295–323. [34] G.K. Pedersen, C ∗ -Algebras and Their Automorphism Groups, Academic Press Inc. Harcourt Brace Jovanovich Publishers, London, 1979, ix+416.
A. an Huef et al. / Journal of Functional Analysis 260 (2011) 1543–1581
1581
ˇ [35] J. Phillips, I. Raeburn, Automorphisms of C ∗ -algebras and second Cech cohomology, Indiana Univ. Math. J. 29 (1980) 799–822. [36] I. Raeburn, D.P. Williams, Dixmier–Douady classes of dynamical systems and crossed products, Canad. J. Math. 45 (1993) 1032–1066. [37] I. Raeburn, D.P. Williams, Morita Equivalence and Continuous-Trace C ∗ -Algebras, Amer. Math. Soc., Providence, RI, 1998, xiv+327. [38] J. Renault, A Groupoid Approach to C ∗ -Algebras, Springer, Berlin, 1980, ii+160. [39] J. Renault, Cartan subalgebras in C ∗ -algebras, Irish Math. Soc. Bull. 61 (2008) 29–63. [40] J. Rosenberg, Continuous-trace algebras from the bundle theoretic point of view, J. Austral. Math. Soc. Ser. A 47 (1989) 368–381. [41] A. Sims, D.P. Williams, Renault’s equivalence theorem for reduced groupoid C ∗ -algebras, preprint, 2010, arXiv:1002.3093v1 [math.OA]. [42] J. Tomiyama, On the projection of norm one in W ∗ -algebras, Proc. Japan Acad. 33 (1957) 608–612. [43] C. Voisin, Théorie de Hodge et géométrie algébrique complexe, Société Mathématique de France, Paris, 2002, viii+595. [44] F.W. Warner, Foundations of Differentiable Manifolds and Lie Groups, Scott Foresman and Co., Glenview/Illinois/London, 1971, viii+270. [45] S. Wassermann, Tensor products of maximal abelian subalgebras of C ∗ -algebras, Glasg. Math. J. 50 (2008) 209– 216. [46] D.P. Williams, The topology on the primitive ideal space of transformation group C ∗ -algebras and C.C.R. transformation group C ∗ -algebras, Trans. Amer. Math. Soc. 266 (1981) 335–359.
Journal of Functional Analysis 260 (2011) 1583–1614 www.elsevier.com/locate/jfa
Operator algebras associated with unitary commutation relations Stephen C. Power a,∗,1 , Baruch Solel b,2 a Lancaster University, Department of Mathematics and Statistics, Lancaster, LA1 4YF, United Kingdom b Technion, Department of Mathematics, Haifa 32000, Israel
Received 18 January 2008; accepted 13 December 2010 Available online 23 December 2010 Communicated by D. Voiculescu
Abstract We define nonselfadjoint operator algebras with generators Le1 , . . . , Len , Lf1 , . . . , Lfm subject to the unitary commutation relations of the form Lei Lfj =
ui,j,k,l Lfl Lek
k,l
where u = (ui,j,k,l ) is an nm × nm unitary matrix. These algebras, which generalise the analytic Toeplitz algebras of rank 2 graphs with a single vertex, are classified up to isometric isomorphism in terms of the matrix u. © 2010 Elsevier Inc. All rights reserved. Keywords: Operator algebras; Commutation relations
1. Introduction The unilateral shift on complex separable Hilbert space generates two fundamental operator algebras, namely the norm closed (unital) algebra and the weak operator topology closed algebra. * Corresponding author.
E-mail addresses: [email protected] (S.C. Power), [email protected] (B. Solel). 1 Supported by EPSRC grant EP/E002625/1. 2 Supported by the Fund for the Promotion of Research at the Technion and by EPSRC grant EP/E002625/1.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.013
1584
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
The former is naturally isomorphic to the disc algebra of holomorphic functions on the unit disc, continuous to the boundary, while the latter is isomorphic to H ∞ . Noncommuting multivariable generalisations of these algebras arise from the shifts operators Le1 , . . . , Len given by the left n ⊗k creation operators on the Fock space Fn = ∞ k=0 ⊕(C ) . These operators give an isometric operator representation of the free semigroup on n generators and are thus referred to as freely noncommuting. The generated operator algebras, denoted An and Ln for the norm and weak topologies respectively, are known as the noncommutative disc algebra and the free semigroup algebra. They have been studied extensively with respect to operator algebra structure, representation theory and the multivariable operator theory of row contractions. See for example [3, 14]. Higher rank generalisations of these algebras arise when one considers several isometric operator families each of which is freely noncommuting but between which there are commutation relations. In the present paper we consider a very general form of such relations, namely Lei Lfj =
ui,j,k,l Lfl Lek
k,l
where Le1 , . . . , Len and Lf1 , . . . , Lfm are each freely noncommuting and u = (ui,j,k,l ) is an nm × nm unitary matrix. The associated operator algebras are denoted Au and Lu and we classify them up to various forms of isomorphism in terms of the unitary matrices u. Such unitary relations arose originally in the context of the general dilation theorem proven in Solel [18,17] for two row contractions [T1 · · · Tn ] and [S1 · · · Sm ] satisfying the unitary commutation relations. For n = m = 1, we have u = [α] with |α| = 1 and Au is the subalgebra of the rotation C ∗ -algebra for the relations uv = αvu. When u is a permutation unitary matrix arising from a permutation θ in Snm then the relations are those associated with a single vertex rank 2 graph in the sense of Kumjian and Pask, and the algebras in this case have been considered in Kribs and Power [10] and Power [15]. In particular, in [15] it was shown that there are 9 operator algebras Aθ arising from the 24 permutations in case n = m = 2. In contrast, we see below in Section 6 that for general 2 by 2 unitaries u there are uncountably many isomorphism classes of the unitary relation algebras Au expressed in terms of a nine-fold real parametrisation of isomorphism types. The algebras Aθ are easily defined; they are the norm closed unital operator algebras generated by the left regular representation of the semigroup F+ θ whose generators e1 , . . . , en , f1 , . . . , fm satisfy the relations ei fj = fl ek where θ (i, j ) = (k, l). On the other hand the unitary relation algebras Au are generated by creation operators on a Z2+ -graded Fock space n ⊗k ⊗ (Cm )⊗l with relations arising from the identification u : Cn ⊗ Cm → Cm ⊗ Cn . k,l ⊕(C ) In particular, Au is a representation of the nonselfadjoint tensor algebra of a rank 2 correspondence (or a product system over N2 ) in the sense of [17]. See also [7]. In the main results, summarised partly in Theorem 5.10, we see that if Au and Av are isomorphic then the two families of generators have matching cardinalities. Furthermore, if n = m then the algebras are isomorphic if and only if the unitaries u, v in Mnm (C) are unitary equivalent by a unitary A ⊗ B in Mn (C) ⊗ Mm (C). As in [15] we term this product unitary equivalence (with respect to the fixed tensor product decomposition). The case n = m admits an extra possibility, in view of the possibility of generator exchanging isomorphisms, namely that u, v˜ are product unitary equivalent, where v˜i,j,k,l = v¯l,k,j,i .
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1585
The main theorem, Theorem 5.10, is proven as follows. After some preliminaries we identify, in Section 3, the character space M(Au ) and the set of w ∗ -continuous characters on Lu . This is a subset of the closed unit ball product Bn × Bm which is associated with a variety Vu in Cn × Cm determined by u. We then define the core Ωu0 , a closed subset of the realised character space Ωu = M(Au ), and we identify this intrinsically (algebraically) in terms of representations of Au into T2 , the algebra of upper triangular matrices in M2 (C). The importance of the core is that we are able to show that the interior is an automorphism invariant subset on which automorphisms act transitively, and which is minimal with respect to this property. This allows us to infer the existence of graded isomorphisms from general isomorphisms. To construct automorphisms we first review, in Section 4, Voiculescu’s construction of a unitary action of the Lie group U (1, n) on the Cuntz algebra On and the operator algebras An and Ln . This provides, in particular, unitary automorphisms Θα , for α ∈ Bn , which act transitively on the interior ball, Bn , of the character space of An . For these explicit unitary automorphisms of the ei -generated copy of An in Au , we establish unitary commutation relations for the tuples Θα (Le1 ), . . . , Θα (Len ) and Lf1 , . . . , Lfm , when (α, 0) is a point in the core. This enables us to define natural unitary automorphisms of Au itself, and in Theorem 4.8 the relative interior of the core is identified as an automorphism invariant set in the Gelfand space Ωu . In Section 5 we determine the graded and bigraded isomorphisms in terms of product unitary equivalence. To do this we observe that such isomorphisms induce an origin preserving biholomorphic map between the cores Ωu0 and Ωv0 and that these maps, by a generalised Schwarz’s lemma, are implemented by a product unitary. We then prove the main classification theorem. In Section 6 we analyse in detail the case n = m = 2 and consider the special case of permutation unitaries. Finally, in Section 7 we show that the algebra Au is contained in a tensor algebra T+ (X), associated with a correspondence X as in [12]. Moreover, at least when n = m, every automorphism of Au extends to an automorphism of T+ (X). The advantage of the tensor algebra is that its representation theory is known [12] while this is not the case yet for the algebra Au . Two natural directions for further enquiry are the classification of rank two graph algebras and the consideration of other forms of isomorphism. We remark that general rank 1 graph algebras and their isomorphisms and representations are considered in [9,8,2,16]. Also the recent papers [4–6] develop the dilation and representation theory for the algebras considered here in the special case of permutation unitaries. 2. Preliminaries Fix two finite-dimensional Hilbert spaces E = Cn and F = Cm and a unitary mn × mn matrix u. The rows and columns of u are indexed by {1, . . . , n} × {1, . . . , m} (u = (u(i,j ),(k,l) )) and when we write u as an mn × mn matrix we assume that {1, . . . , n} × {1, . . . , m} is ordered lexicographically (so that, for example, the second row is the row indexed by (1, 2)). We also fix orthonormal bases {ei } and {fj } for E and F respectively and the matrix u is used to identify E ⊗ F with F ⊗ E through the equation
ei ⊗ f j =
k,l
u(i,j ),(k,l) fl ⊗ ek .
(1)
1586
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Equivalently, we write f l ⊗ ek =
u(i,j ),(k,l) ei ⊗ fj .
(2)
i,j
For every k, l ∈ N, we write X(k, l) for E ⊗k ⊗ F ⊗l . Using successive applications of (2) applied ⊗k1 ⊗ F ⊗l1 ⊗ E ⊗k2 ⊗ · · · ⊗ F ⊗lr to multiple tensors of the form k ) ⊗ h we identify E g ⊗ (fl ⊗ e with X(k, l) whenever k = ki and l = lj . The identification is independent of the path of successive applications of these adjacency commutation relations. This follows on considering an elementary tensor of the form u ⊗ (fl1 ⊗ ek1 ) ⊗ v ⊗ (fl2 ⊗ ek2 ) ⊗ w. Writing a(l,k),(i,j ) for u(i,j ),(k,l) application of the relations in either order leads to the same sum, namely
a(l1 ,k1 ),(α,β) a(l2 ,k2 ),(γ ,δ) u ⊗ eα ⊗ fβ ⊗ v ⊗ eγ ⊗ fδ ⊗ w.
(α,β),(γ ,δ)
It follows that the identification is well-defined and being a composition of unitary maps is a unitary identification. In particular a vector f ⊗ g with f ∈ F and g ∈ E ⊗k ⊗ F ⊗l is identified as a vector in E ⊗k ⊗ F ⊗l+1 by k-fold applications of the commutation relations. Let F (n, m, u) be the Fock space given by the Hilbert space direct sum k,l
⊕X(k, l) =
∞
⊕ E ⊗k ⊗ F ⊗l ,
k,l=1
and, for unit vectors e ∈ E and f ∈ F , write Le and Lf for the “shift” operators Le e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j 1 ⊗ f j 2 ⊗ · · · ⊗ f j l = e ⊗ e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j1 ⊗ f j2 ⊗ · · · ⊗ f jl and Lf e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j1 ⊗ f j2 ⊗ · · · ⊗ f jl = f ⊗ e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j1 ⊗ f j2 ⊗ · · · ⊗ f jl where, in the last equation, the range vector is identified, as above, with a vector of E ⊗k ⊗ F ⊗(l+1) . Evidently Le is an isometric operator similar in flavour to the usual creation operator on the usual Fock space of a finite-dimensional Hilbert space. The isometricity of Lf is also evident. However it is a shift operator with respect to a different basis from the standard one for F (n, m, u) and it is the matrix u which effects the identification of such a basis (with ei and fj
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1587
featuring in reverse order). It is elementary to check that we have the commutation relations Lei Lfj =
u(i,j ),(k,l) Lfl Lek .
k,l
The unital semigroup generated by {I, Le , Lf : e ∈ E, f ∈ F } is denoted F+ u and the algebra + ] will be written A and its closure in the it generates denoted C[F+ ]. The norm closure of C[F u u u weak operator topology will be written Lu . In particular, the algebras Lθ and Aθ studied in [15] are the algebras Lu and Au for u which is a permutation matrix. The results of Section 2 in [10] hold here too with minor changes. Thus every A ∈ Lu is the limit (in the strong operator topology) of its Cesaro sums Σp (A) =
kp
k 1− Φk (A) p
where Φk (A) lies in Lu and is “supported” on l ⊕(E ⊗l ⊗ F ⊗(k−l) ). In fact, let Qk be the projection of F (n,m, u) onto l ⊕(E ⊗l ⊗ F ⊗(k−l) ), form the one-parameter unitary group {Ut } ikt ∗ defined by Ut := ∞ k=0 e Qk and set γt = Ad Ut . Then {γt }t∈R is a w -continuous action of R on L(F (n, m, u)) that normalizes both Au and Lu and 1 Φk (a) = 2π
2π
e−ikt γt (a) dt
0
for all a ∈ L(F (n, m, u)). Then Φk leaves Lu invariant. We can define the weak operator topology closed algebra Ru generated by the right shifts Re and Rf where these operators are defined by Re e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j 1 ⊗ f j 2 ⊗ · · · ⊗ f j l = e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j1 ⊗ f j2 ⊗ · · · ⊗ f jl ⊗ e and Rf e i 1 ⊗ e i 2 ⊗ · · · ⊗ e i k ⊗ f j 1 ⊗ f j 2 ⊗ · · · ⊗ f i l = ei1 ⊗ ei2 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ fj2 ⊗ · · · ⊗ fil ⊗ f. The techniques of the proof of Proposition 2.3 of [10] can be applied here to show that the commutant of Ru is Lu . Also, mapping ei1 ⊗ ei2 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ fj2 ⊗ · · · ⊗ fjl to fjl ⊗ fjl−1 ⊗ · · · ⊗ fj1 ⊗ eik ⊗ eik−1 ⊗ · · · ⊗ ei1 , we get a unitary operator W : F (n, m, u) → F n, m, u∗ implementing a unitary equivalence between Lu and Ru∗ . In fact, it is easy to check that Rei W = W Lei and Rfj W = W Lfj for every i, j . To see that the commutation relation in the
1588
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
∗ range is∗given by u , apply W to (2) to get (in the∗range of W ) ek ⊗ fl = (u ) f (k,l),(i,j ) j ⊗ ei which is Eq. (1) with u instead of u. i,j As in [10], we conclude that (Lu ) = Ru and (Lu ) = Lu .
i,j
u(i,j ),(k,l) fj ⊗ ei =
3. The character space and its core In the following proposition we describe the structure of the character spaces M(Lu ) and M(Au ) (equipped with the weak∗ topology). Similar results were obtained in [10] for algebras defined for higher rank graphs and in [3] for analytic Toeplitz algebras. (See also [15].) It will be convenient to write
n m u(i,j ),(k,l) zk wl Vu = (z, w) ∈ C × C : zi wj =
(3)
k,l
and Ωu = Vu ∩ (Bn × Bm )
(4)
where Bn is the open unit ball of Cn . We refer to Vu as the variety associated with u. Proposition 3.1. (1) The linear multiplicative functionals on C[F+ u ] are in one-to-one correspondence with points (z, w) in Vu . (2) M(Au ) is homeomorphic to Ωu . (3) For (z, w) ∈ Ωu , write α(z,w) for the corresponding character of Au . Then α(z,w) extends to a w ∗ -continuous character on Lu if and only if (z, w) ∈ Bn × Bm . Proof. Part (1) follows immediately from Eq. (1). Fix α ∈ M(Au ) and write zi = α(Lei ), 1 i n, and wi = α(Lfj ), 1 j m. From the multiplicativity and linearity of α and (1), it follows that (z, w) ∈ Vu . Since α is contractive and maps i ai Lei to i ai zi , it follows that z 1 and similarly w 1. Thus (z, w) ∈ Ωu . For the other direction, fix first (z, w) ∈ Ωu with z < 1 and w < 1. It follows from the definition of Ωu and from (1) that (z, w) defines a linear and multiplicative map α on the algebra C[F+ u ] such that Lei is mapped into zi and α(Lfj ) = wj . Abusing notation slightly, we write α(x) for α(Lx ) for every x ∈ E ⊗k ⊗ F ⊗l . Also, for i = (i1 , . . . , ik ) and j = (j1 , . . . , jl ), we write ei fj for ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl . These elements form an orthonormal basis for E ⊗k ⊗ F ⊗l and we now set wα =
α(ei fj )ei fj
i,j k,l
where the sum extends over all possible tuples i and j . k! If pi 0 and p1 + · · · + pn = k then there are p1 !···p terms ei ⊗ · · · ⊗ eik with α(ei1 ⊗ · · · n! 1 p1 p2 pk 2 ⊗ eik ) = z1 z2 · · · zk . It follows that k i |α(ei )| = k i=(i1 ,...,ik ) |α(ei1 )|2 · · · |α(eik )|2 .
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1589
Thus wα 2 =
α(ei fj )2 = 1 − z2 −1 1 − w2 −1 < ∞. i,j,k,l
Note that, for every x ∈ E ⊗k ⊗ F ⊗l , x, wα = α(x). Thus, for e ∈ E, x, L∗e wα = Le x, wα = α(e ⊗ x) = α(e)α(x) = α(e)x, wα
and, similarly x, L∗f wα = α(f )x, wα for f ∈ F . Thus wα , L∗e wα = α(e)α(wα ) = α(e) |α(ei fj )|2 = α(e)wα 2 . Similarly, wα , L∗f wα = α(f )α(wα ) = α(f ) |α(ei fj )|2 = α(f )wα 2 for f ∈ F . Thus if we write να = wα /wα then α(x) = Lx να , να for every x ∈ E ⊗k ⊗ F ⊗l (for every k, l). This shows that α is contractive and is w ∗ -continuous. We can, therefore, extend it to an element of M(Lu ), also denoted α. The analysis above shows that the image of the map α → (z, w) ∈ Ωu defined above (on M(Au )) contains Vu ∩ (Bn × Bm ). Since M(Au ) is compact and the map is w ∗ -continuous, its image contains (and, thus, is equal to) Ωu . This completes the proof of (2). To complete the proof of (3), we need to show that, if (z, w) ∈ Ωu and the corresponding character extends to a w ∗ -continuous character on Lu , then z < 1 and w < 1. For this, write L for the w ∗ -closed subalgebra of Lu generated by {Le : e ∈ E} ∪ {I }. Let P be the projection of F (E, F, u) onto F (E) = C ⊕ E ⊕ (E ⊗ E) ⊕ · · · . Then P LP = P Lu P and the map T → P T P , is a w ∗ -continuous isomorphism of L onto P Lu P . The latter algebra is unitarily equivalent to the algebra Ln studied in [3]. A w ∗ -continuous character of Lu gives rise, therefore, to a w ∗ -continuous character on Ln . It follows from [3, Theorem 2.3] that z ∈ Bn . Similarly, one shows that w ∈ Bm . 2 To state the next result, we first write u(i,j ) for the n × m matrix whose k, l-entry is u(i,j ),(k,l) . Thus, the (i, j ) row of u provides the n rows of u(i,j ) . We then compute k,l
u(i,j ),(k,l) zk wl =
k
u(i,j ),(k,l) wl zk = (u(i,j ) w)k zk = u(i,j ) w, z¯ .
l
(5)
k
Write Ei,j for the n × m matrix whose i, j -entry is 1 and all other entries are 0 (so that Ei,j w, z¯ = zi wj ) and write C(i,j ) for the matrix u(i,j ) − Ei,j . Then the computation above yields the following. Lemma 3.2. With C(i,j ) defined as above, we have
Vu = (z, w) ∈ Cn × Cm : C(i,j ) w, z¯ = 0, for all i, j .
1590
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Definition 3.3. The core of Ωu is the subset given by
t Ωu0 := (z, w) ∈ Bn × Bm : C(i,j ) w = 0, C(i,j ) z = 0 for all i, j . Fix (z, w) ∈ Ωu0 . We have u(i,j ) w = Ei,j w for all i, j . Thus, for every k,
u(i,j ),(k,l) wl = δi,k wj
(6)
l
(where δi,k is 1 if i = k and 0 otherwise) and, for a1 , a2 , . . . , an , in C we have
u(i,j ),(k,l) ak wl = ai wj .
k,l (i)
Hence, if we let w˜ (i) be the vector in Cmn defined by w˜ (k,l) = δk,i wl , we get uw˜ (i) = w˜ (i) . Similarly, for z, we have
u(i,j ),(k,l) zk = δj,l zi
(7)
k
and for scalars b1 , . . . , bm we have k,l u(i,j ),(k,l) bl zk = bj zi . Thus, writing z˜ (j ) for the vector defined by (˜z(j ) )(k,l) = δl,j zk , we have u˜z(j ) = z˜ (j ) . The vector w˜ (i) in Cnm = Cn ⊗ Cm is also expressible as δi ⊗ w where {δ1 , . . . , δn } is the standard basis of Cn , and, similarly, z˜ (j ) = z ⊗ δj . We therefore obtain Lemma 3.4 which will be useful in Section 6. We note also the following companion formula. Suppose (z, w) ∈ Ωu0 . Then, as we noted above, u˜z(j ) = z˜ (j ) and, thus, u∗ z˜ (j ) = z˜ (j ) . Writing this explicitly, we have, for all i, j, l,
u(k,l),(i,j ) z¯ k = δj,l z¯ i .
(8)
k
Lemma 3.4. Let (z, w) be a vector in the core Ωu0 . Then
span z˜ (j ) , w˜ (i) : 1 i n, 1 j m ⊆ Ker(u − I ). In particular, (i) If the core contains a vector (z, w) with z = 0, then dim(Ker(u − I )) m. (ii) If the core contains a vector (z, w) with w = 0 then dim(Ker(u − I )) n. (iii) If the core contains a vector (z, w) with z = 0 and w = 0, then dim(Ker(u−I )) m+n−1. We now characterise the core in an algebraic manner in terms of representations into the algebra T2 of upper triangular 2 × 2 matrices. We remark that nest representations such as these have proven useful in the algebraic structure theory of nonselfadjoint algebra [8,16]. Let ρ : C[F+ u ] → T2 with ρ(T ) =
ρ1,1 (T ) 0
ρ1,2 (T ) . ρ2,1 (T )
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1591
Then ρ1,1 and ρ2,2 are characters and ρ1,2 is a linear functional that satisfies ρ1,2 (T S) = ρ1,1 (T )ρ1,2 (S) + ρ1,2 (T )ρ2,2 (S)
(9)
for T , S ∈ C[F+ u ]. We now restrict to the case where ρ1,1 = ρ2,2 . By Proposition 3.1(1), both are associated with a point (z, w) in Vu . It follows from (9) that ρ1,2 is determined by its values on Lei and Lfj . Setting λi = ρ1,2 (Lei ) and μj = ρ1,2 (Lfj ), we associate with each homomorphism ρ (as discussed above) a quadruple (z, w, λ, μ) where (z, w) ∈ Vu and, for every i, j , zi μj + λi wj =
u(i,j ),(k,l) (wl λk + μl zk ).
(10)
k,l
(The last equation follows from (1).) Using (5) we can write the last equation as ¯ + u(i,j ) μ, z¯ = zi μj + λi wj = Ei,j w, λ ¯ + Ei,j μ, z¯ . u(i,j ) w, λ That is, ¯ + μ, C t z = 0. C(i,j ) w, λ (i,j )
(11)
The following lemma now follows from the definition of the core. Lemma 3.5. A point (z, w) ∈ Ωu lies in the core Ωu0 if and only if every (λ, μ) ∈ Cn × Cm defines a homomorphism ρ : C[F+ u ] → T2 such that ρ(Lei ) =
zi 0
λi zi
wj 0
μj wj
and ρ(Lfj ) =
for all i, j . 4. Automorphisms of Ln and Lu We first derive the unitary automorphisms of Ln and An associated with U (1, n). These were obtained by Voiculescu [19] in the setting of the Cuntz–Toeplitz algebra. However the automorphisms restrict to an action of U (1, n) on the free semigroup algebra. The result is rather fundamental, being a higher-dimensional version of the familiar Möbius automorphism group on H ∞ . For the reader’s convenience we provide complete proofs. See also the discussion in Davidson and Pitts [3], and in [1,15].
1592
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Lemma 4.1. Let α ∈ Bn and write (i) x0 = (1 − α2 )−1/2 , (ii) η = x0 α, and (iii) X1 = (ICn + ηη∗ )1/2 . Then (1) η2 = |x0 |2 − 1, (2) X1 η = x0 η, and (3) X12 = I + ηη∗ . In particular, the matrix X =
η∗ η X1
x0
satisfies X ∗ J X = J , where J =
1
0 0 −I
.
Proof. Part (1) is an easy computation and part (3) follows from the definition of X1 . For (2), note that X12 η = (I + ηη∗ )η = η + η2 η = x02 η and, for every ζ ∈ η⊥ , X1 ζ = ζ . Suppose X1 η = aη + ζ (ζ ∈ η⊥ ). Then x02 η = X12 η = a 2 η + ζ and it follows that a = x0 (as X1 0) and ζ = 0. 2 The lemma exhibits specific matrices (X1 is nonnegative) in U (1, n) associated with points in the open ball. One can similarly check (see also [3] or [15]) that the general form of a matrix Z z η∗ in U (1, n) is Z = η0 Z1 where 2
1
η1 2 = η2 2 = |z0 |2 − 1, Z1 η1 = z¯ 0 η2 , Z1∗ Z1 = In + η1 η1∗ ,
Z1∗ η2 = z0 η1 , Z1 Z1∗ = In + η2 η2∗ .
It is these equations that are equivalent to the single matrix equation Z ∗ J Z = J . It is well known that the map θX defined on Bn by θX (λ) =
X1 λ + η , x0 + λ, η
λ ∈ Bn ,
is an automorphism of Bn with inverse θX−1 . See Lemma 4.9 of [3] and Lemma 8.1 of [15] for example. We make use of this in the proof of Voiculescu’s theorem below. LetL1 , . . . , Ln be the generators of the norm closed algebra An and for ζ ∈ Cn write Lζ = ζi Li . Recall that the character space M(An ) is naturally identifiable with the closed ball Bn , with λ in this ball providing a character φλ for which φλ (Li ) = λi . The proof is a reduced version of that given above for M(Aθ ). Theorem 4.2. Let α ∈ Bn and let X1 , x0 , η and X be associated with α as in Lemma 4.1. Then (i) there is an automorphism ΘX of Ln such that Θα (Lζ ) = (x0 I + Lη )−1 LX1 ζ + ζ, η I ¯ ,
(12)
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1593
(ii) the inverse automorphism ΘX−1 is ΘX−1 , and X −1 is the matrix in U (1, n) associated with −α, (iii) there is a unitary UX on Fn such that for a ∈ An , UX aξ0 = Θα (a)(x0 I + Lη )−1 ξ0 and ΘX (a) = UX aUX∗ . Proof. Let Fn be the Fock space for Ln , In = IFn , and let L˜ = [In L1 · · · Ln ] viewed as an operator from (C ⊕ Cn ) ⊗ Fn = Fn ⊕ (Cn ⊗ Fn ) to Fn . Then ˜ ⊗ I )L˜ ∗ = In − L˜ L˜ ∗ = In − L1 L∗1 + · · · + Ln L∗n = P0 L(J where P0 is the vacuum vector projection from Fn to C. Also, since XJ X = J , we have ˜ ⊗ I )L˜ ∗ = L(X ˜ L(J ⊗ In )(J ⊗ I )(X ⊗ In )L˜ ∗ = [ Y0
Y1 ] (J ⊗ I ) [ Y0
Y1 ]∗
where Y1 ] = [ In
[ Y0
L]
η ∗ ⊗ In X1 ⊗ In
x0 ⊗ In η ⊗ In
.
Thus Y0 Y0∗ − Y1 Y1∗ = P0 . Also Y0 = x0 ⊗ In + L(η ⊗ In ) = x0 In + Lη , ∗
Y1 = η ⊗ In + L(X1 ⊗ In ) = η∗ ⊗ In + [LX1 e1 · · · LX1 en ] where, here, e1 , . . . , en is the standard basis for Cn . The operator V = Y0−1 Y1 is a row isometry [V1 · · · Vn ], from Cn ⊗ Fn to Fn with defect 1. To see this we compute I − V V ∗ = I − Y0−1 Y1 Y1∗ Y0∗−1 = I − Y0−1 −P0 + Y0 Y0∗ Y0∗−1 = I + Y0−1 P0 Y0∗−1 − I = ξ0 ξ0 ∗ . Here ξ0
= Y0−1 ξ0
−1
= (x0 In + Lη )
ξ0 = x0−1
∞
j x0−1 Lη ξ0
j =0
and so ξ = |x0 |−2 |x0 |−2j η2j = 0 j
x02
1 = 1. − η2
1594
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Considering the path t → tα for 0 t 1 and the corresponding path of partial isometries V it follows from the stability of Fredholm index that the index of V and L coincide and so in fact V is a row isometry. Thus V1 , . . . , Vn are isometries with orthogonal ranges. We now have a contractive algebra homomorphism An → L(Fn ) determined by the correspondence Lei → Vi , i = 1, . . . , n. In fact it is an algebra endomorphism Θ : An → An . Indeed, for ξ = (ξ1 , . . . , ξn ) we have
ζi Y0−1 Y1 (ei ⊗ In ) = ζi (x0 In + Lη )−1 η∗ ⊗ In + [LX1 e1 · · · LX1 en ] [In · · · In ]t = (x0 In + Lη )−1 ζ, η In + LX1 ζ .
Θ(Lξ ) =
ξi Vi =
Thus far we have followed Voiculescu’s proof [19]. The following argument shows that Θ is an automorphism and is an alternative to the calculation suggested in [19]. The calculation shows that φλ ◦ ΘX = φθX (λ). We have φλ ◦ ΘX (Lζ ) = φλ (x0 In + Lη )−1 ζ, η In + LX1 ζ −1 ζ, η + X1 ζ, λ = φμ (Lζ ) = x0 + λ, η where μ=
X1∗ λ + η X1 λ + η = = θX (λ). x0 + λ, η x0 + λ, η
Write ΘX for the contractive endomorphism Θ of An as constructed above. It follows that the composition Φ = ΘX−1 ◦ ΘX is a contractive endomorphism which, by the remarks preceding the statement of the theorem, induces the identity map on the character space, so that φλ = φλ ◦ Φ −1 for all λ ∈ Bn . Such a map must be the identity. Indeed, suppose that we have the Fourier series representation Φ −1 (Le1 ) = a1 Le1 + · · · + an Len + X where X is a series with terms of total degree greater than one. It follows that lim t −1 φ(t,0,...,0) Φ −1 (Le1 ) = a1
t→0
while lim t −1 φ(t,0,...,0) (Le1 ) = 1.
t→0
Since the induced map is the identity, we have a1 = 1 and ak = 0 for k 2. In this way we see that the image of each Li has the form Li + Ti where Ti has only terms of total degree greater than one. Since Li ξ0 is orthogonal to Ti ξ0 and Φ −1 (Li ) is a contraction, we have
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1595
1 Φ −1 (Li )ξ0 2 = Li ξ0 + Ti ξ0 2 = Li ξ0 2 + Ti ξ0 2 = 1 + Ti ξ0 2 . Thus Ti ξ0 = 0 and, consequently, Ti = 0 and so the composition Φ is the identity map. Finally, we show that Θα is unitarily implemented. Define UX on An ξ0 by UX aξ0 = ΘX (a)ξ0 = ΘX (a)(x0 I + Lη )−1 ξ0 for a ∈ A. Since ΘX is an automorphism, (UX a)bξ0 = UX abξ0 = ΘX (a)ΘX (b)ξ0 = ΘX (a)UX bξ0 , for a, b ∈ An , and it follows that UX a = ΘX (a)UX , as linear transformations on the dense space An ξ0 . Now, V = [V1 , . . . , Vn ] is a row isometry with defect space spanned by ξ0 . The map UX maps ξi = Li ξ0 to ΘX (Li )ξ0 = Vi ξ0 and, if w = w(e1 , . . . , en ) is a word in e1 , . . . , en , then UX ξw = UX w(L1 , . . . , Ln )ξ0 = ΘX w(L1 , . . . , Ln ) ξ0 = w(V1 , . . . , Vn )ξ0 . Since V is a row isometry and ξ0 is a unit wandering vector for V , it follows that {w(V1 , . . . , Vn )ξ0 } is an orthonormal set. Thus, UX is an isometry. Since the range of UX contains UX An ξ0 = ΘX (An )ξ0 = An (x0 I + Lη )−1 ξ0 = An ξ0 we see that UX is unitary. 2 Remark 4.3. With the same calculations as in the proof above and slightly more notation, one can show that each invertible matrix Z ∈ U (1, n) defines an automorphism ΘZ and that Z → ΘZ is an action of U (1, n) on An and, in particular, ΘZ ΘX = ΘZX . Moreover, Z → UZ is a unitary representation of U (1, n) implementing this as the following calculation indicates. ω∗ be the matrix in U (1, n) associated with β ∈ Bn as in Lemma 4.1. Then Let W = wω0 W 1
UX UW aξ0 = UX Θβ (a)(w0 + Lω )−1 ξ0 = Θα Θβ (a)(w0 + Lω )−1 (x0 In + Lη )−1 ξ0 = Θα Θβ (a) Θα (w0 + Lω )−1 (x0 In + Lη )−1 ξ0 = ΘXW (a)Θα (w0 + Lω )−1 (x0 In + Lη )−1 ξ0 −1 = ΘXW (a) w0 In + (x0 In + Lη )−1 LX1 ω + ω, η In (x0 In + Lη )−1 ξ0 −1 = ΘXW (a) w0 x0 In + w0 Lη + LX1 ω + ω, η In ξ0 −1 = ΘXW (a) w0 x0 + ω, η In + Lw0 η+X1 ω ξ0 . One readily checks that this is the same as UXW aξ0 . It is evident from the last theorem and its proof that the unitary automorphisms of An and Ln act transitively on the open subset Bn associated with the weak star continuous characters. We shall show that a version of this holds for the unitary relation algebras with respect to the open core of the character space. As a first step to constructing automorphisms of Au we obtain unitary commutation relations for the n-tuples [Θ(Le1 ), . . . , Θ(Len )] and [Lf1 , . . . , Lfm ] for certain automorphisms Θ of the copy of An in Au . Lemma 4.4. Suppose (z, w) ∈ Ωu0 ∩ (Bn × Bm ). Write α for z¯ and let Θ := Θα be as in (12). Then, for every 1 i n and 1 j m, Θ(Lei )Lfj =
k,l
u(i,j ),(k,l) Lfl Θ(Lek ).
(13)
1596
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Proof. Write Y for ηη∗ and β for (x0 + 1)−1 . Since X12 = I + ηη∗ , X1 = I + βηη∗ = I + βY and Y = (Yi,j ) where Yi,j = ηi η¯ j = x02 z¯ i zj . We now compute (X1 ei )fj = ei fj + =
βYt,i et fj = ei fj +
t
u(i,j ),(k,l) fl ek +
k,l
=
βYt,i u(t,j ),(k,l) fl ek
t,k,l
βx02 z¯ t zi u(t,j ),(k,l) fl ek
t,k,l
u(i,j ),(k,l) fl ek + βx02 zi
k,l
z¯ t u(t,j ),(k,l) fl ek .
t,k,l
Using the core equation (8), the last expression is equal to
u(i,j ),(k,l) fl ek + βx02 zi
k,l
=
u(i,j ),(k,l) fl ek + βx02 zi
k,l
=
δj,l z¯ k fl ek
k,l
z¯ k fj ek
k
u(i,j ),(k,l) fl ek + βx02
k,l
(δj,l zi )¯zk fl ek .
k,l
Using the core equation (7), this is equal to
u(i,j ),(k,l) fl ek + βx02
k,l
=
=
u(i,j ),(k,l) fl ek + βx02
u(i,j ),(k,l) fl ek + β
u(i,j ),(k,l) zk z¯ t fl et
u(i,j ),(k,l) Yt,k fl et
k,l,t
u(i,j ),(k,l) fl ek + β
k,l
=
k,l,t
k,l
=
u(i,j ),(t,l) zt z¯ k fl ek
t
k,l
k,l
u(i,j ),(k,l) fl Y ek
k,l
u(i,j ),(k,l) fl X1 ek .
k,l
Thus LX1 ei Lfj =
u(i,j ),(k,l) Lfl LX1 ek .
k,l
Next, we compute
i z¯ i ei fj
=
i,k,l u(i,j ),(k,l) z¯ i fl ek .
k,l
δj,l z¯ k fl ek =
k
Using (8), this is equal to
z¯ k fj ek .
(14)
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1597
Thus
z¯ i ei fj =
i
z¯ i fj ei
(15)
i
and, hence, Lη commutes with Lfj . It follows that Lfj (x0 I − Lη )−1 = (x0 I − Lη )−1 Lfj .
(16)
We have, using (14) and (16), (x0 I − Lη )−1 LX1 ei Lfj =
u(i,j ),(k,l) (x0 I − Lη )−1 Lfl LX1 ek
k,l
=
u(i,j ),(k,l) Lfl (x0 I − Lη )−1 LX1 ek .
k,l
Also, applying (7) and (16), we get (x0 I − Lη )−1 ei , η Lfj = zi Lfj (x0 I − Lη )−1 = δj,l zi Lfl (x0 I − Lη )−1 l
=
u(i,j ),(k,l) zk Lfl (x0 I − Lη )−1 .
k,l
Subtracting the last two equations, we get (13).
2
Corollary 4.5. In the notation of Lemma 4.4, for every i, j , L∗fj Θ(Lei ) =
u(i,l),(k,j ) Θ(Lek )L∗fl .
k,l
Proof. It follows from (13) that Θ(Lei )Lfl = i, j, l, L∗fj Θ(Lei )Lfl L∗fl =
k,t
u(i,l),(k,t) Lft Θ(Lek ) for every i, l. Thus, for
u(i,l),(k,t) L∗fj Lft Θ(Lek )L∗fl
k,t
=
u(i,l),(k,t) δj,t Θ(Lek )L∗fl =
k,t
u(i,l),(k,j ) Θ(Lek )L∗fl .
k
Summing over l, we get
L∗fj Θ(Lei )
l
Lfl L∗fl
=
k,l
u(i,l),(k,j ) Θ(Lek )L∗fl .
1598
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
∗ Now, l Lfl Lfl = I − P where P is the projection onto the subspace C ⊕ E ⊕ (E ⊗ E) ⊕ · · · . Note that P is left invariant under the operators in the algebra generated by {Le : 1 i n} and, in particular, by Θ(Lei ). Thus L∗fj Θ(Lei )P = L∗fj P Θ(Lei )P = 0 = i ∗ k,l u(i,l),(k,j ) Θ(Lek )Lfl P . This completes the proof of the corollary. 2 Proposition 4.6. Suppose (z, w) ∈ Ωu0 ∩ (Bn × Bm ). Then there is an automorphism Θ˜ z of Au that is unitarily implemented and such that, for every X ∈ Au , α(0,w) Θ˜ z−1 (X) = α(z,w) (X)
(17)
where α(z,w) is the character associated with (z, w) by Proposition 3.1. Proof. Let U be the unitary operator implementing Θ. We can view F (n, m, u) as the sum F (n, m, u) =
F ⊗k ⊗ F (E)
k
where F (E) = C ⊕ E ⊕ (E ⊗ E) ⊕ · · · . We now let V be the unitary operator whose restriction to F ⊗k ⊗ F (E) is Ik ⊗ U (where Ik is the identity operator on F ⊗k ). It is easy to check that, for every fj , V Lfj V ∗ = Lfj . Now, fix i. We shall show, by induction, that, for every k and every ξ ∈ F ⊗k ⊗ F (E), (Ik ⊗ U )Lei ξ = Θ(Lei )(Ik ⊗ U )ξ.
(18)
For k = 0 this is just the fact that U implements Θ. Suppose we know this for k and fix fj ∈ F . Then, for ξ ∈ F ⊗k ⊗ F (E) we have, (Ik+1 ⊗ U )Lei Lfj ξ =
u(i,j ),(k,l) (Ik+1 ⊗ U )Lfl Lek ξ
k,l
=
u(i,j ),(k,l) Lfl (Ik ⊗ U )Lek ξ.
k,l
Applying the induction hypothesis, this is equal to k,l u(i,j ),(k,l) Lfl Θ(Lek )(Ik ⊗ U )ξ . Using (13), this is Θ(Lei )Lfj (Ik ⊗ U )ξ = Θ(Lei )(Ik ⊗ U )Lfj ξ . Since F ⊗(k+1) ⊗ F (E) is spanned by elements of the form Lfj ξ (as above) the equality follows. From the relations of Lemma 4.4 it follows that the map Θ˜ z : X → V XV ∗ defines a unitary endomorphism of Au . Since Θ is an automorphism of An it follows that Θ˜ z gives the desired automorphism. 2 Clearly, in Proposition 4.6, we can interchange z and w to get the following, where Θz,w = Θ˜ z Θ˜ w .
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1599
Proposition 4.7. Suppose (z, w) ∈ Ωu0 ∩ (Bn × Bm ). Then there is a unitary automorphism Θz,w of Lu which is a homeomorphism with respect to the w ∗ -topologies and which restricts to an automorphism of Au . Moreover, for every X ∈ Lu , −1 α(0,0) Θz,w (X) = α(z,w) (X)
(19)
where α(z,w) is the character associated with (z, w) as in Proposition 3.1. An automorphism Ψ of Au , defines a map on the character space of Au , namely φ → φ ◦Ψ −1 . Thus using Proposition 3.1 we have a homeomorphism θΨ of Ωu . Also, since Ωu ∩ (Bn × Bm ) is the interior of Ωu , θΨ maps Ωu ∩ (Bn × Bm ) onto itself. Similarly, if Ψ is an automorphism of Lu which is a homeomorphism with respect to the w ∗ -topologies, then θΨ is a homeomorphism of Ωu ∩ (Bn × Bm ). In the following theorem we identify the relative interior of the core as the orbit of (0, 0) under the group of maps θΨ associated with automorphisms Ψ . Theorem 4.8. For (z, w) ∈ Bn × Bm the following conditions are equivalent. (1) (z, w) ∈ Ωu0 . (2) There exists a completely isometric automorphism Ψ of Lu that is a homeomorphism with respect to the w ∗ -topologies and restricts to an automorphism of Au , such that θΨ (0, 0) = (z, w). (3) There exists an algebraic automorphism Ψ of Au such that θΨ (0, 0) = (z, w). Proof. The proof that (1) implies (2) follows from Proposition 4.7. Clearly (2) implies (3). It is left to show that (3) implies (1). Given a point (z, w) ∈ Ωu , we saw in Lemma 3.5 that, for every (λ, μ) satisfying (11) there is a homomorphism ρz,w,λ,μ : C[F+ u ] → T2 . For (z, w) = (0, 0) Eq. (11) holds for every pair (λ, μ). Since ρ0,0,λ,μ vanishes off a finite-dimensional subspace, it is a bounded homomorphism. In fact, for every (λ, μ), ρ0,0,λ,μ 1 + λ + μ. Given Ψ and (z, w) as in (3), for every (λ, μ) ∈ Cn × Cm , ρ0,0,λ,μ ◦ Ψ −1 is a homomorphism on C[F+ u ] and, thus, it is of the form ρz,w,λ ,μ for some (unique) (λ , μ ) satisfying (11). Write ψ(λ, μ) = (λ , μ ) and note that this defines a continuous map. To prove the continuity, suppose (λn , μn ) → (λ, μ) and write ρn for ρ0,0,λn ,μn and ρ for ρ0,0,λ,μ . Then (using the estimate on the norm of ρ0,0,λ,μ ) there is some M such that ρn M for all n and ρ M. For every + Y ∈ C[F+ u ], ρn (Y ) → ρ(Y ). Now fix X ∈ Au and > 0. There is some Y ∈ C[Fu ] such that X − Y and there is some N such that for n N ρn (Y ) − ρ(Y ) . Thus, for such n, ρn (X) − ρ(X) (2M + 1). Setting X = Ψ (Lei ), we get λ n → λ and similarly for μ . If (z, w) is not in Ωu0 , then the set of all (λ, μ) satisfying (11) is a subspace of Cn × Cm of dimension strictly smaller than n + m and, as is shown above, it contains the continuous image (under the injective map ψ) of Cn × Cm . This is impossible. 2 5. Isomorphic algebras In this section we shall find conditions for algebras Au and Av to be (isometrically) isomorphic. The characterisation also applies to the weak star closed algebras Lu .
1600
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
We start by considering a special type of isomorphism. We shall now assume that the set {n, m} for both algebras is the same. In fact, by interchanging E and F , we can assume that the corresponding dimensions are the same and the algebras are defined on F (n, m, u) and F (n, m, v) respectively. This assumption will be in place in the discussion below up to the end of Lemma 5.5. The algebra Au carries a natural Z2+ -grading, with the (k, l) labeled subspace being spanned by products of the form Lei1 Lei2 · · · Leik Lfi1 Lfi2 · · · Lfil . Also, the total length of such operators provides a natural Z+ -grading. Note that an algebra isomorphism Ψ : Au → Av which respects the Z+ -grading is determined by a linear map between the spans of the generators Le1 , . . . , Len , Lf1 , . . . , Lfm . Here we use the same notation for the generators of Au and Av . Such an isomorphism will be called graded. We now consider two types of graded isomorphisms, namely, either bigraded, as in the following definition, or, in case n = m, bigraded after relabeling generators. Definition 5.1. (i) An isomorphism Ψ : Au → Av is said to be bigraded isomorphism if there are unitary matrices A (n × n) and B (m × m) such that Ψ (Lei ) = ai,j Lej , Ψ (Lfk ) = bk,l Lfl . j
l
(ii) If m = n and Ψ is a graded isomorphism such that Ψ (Lei ) = ai,j Lfj , Ψ (Lfk ) = bk,l Lel j
l
for n × n unitary matrices A and B then we say that Ψ is a graded exchange isomorphism. We write ΨA,B for the bigraded isomorphism (as in (i)) and Ψ˜ A,B for the graded exchange isomorphism. Abusing notation, we write Ψ (ei ) = j ai,j ej instead of Ψ (Lei ) = j ai,j Lej for a bigraded isomorphism (and similarly for the other expressions). For unitary permutation matrices the following lemma was proved in [15, Theorem 5.1(iii)]. Lemma 5.2. (i) If ΨA,B is a bigraded isomorphism then (A ⊗ B)v = u(A ⊗ B)
(20)
where A ⊗ B is the mn × mn matrix whose (i, j ), (k, l) entry is ai,k bj,l . (ii) If m = n and Ψ˜ A,B is a graded exchange isomorphism then (A ⊗ B)v˜ = u(A ⊗ B) where v˜(i,j ),(k,l) = v¯(l,k),(j,i) .
(21)
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1601
Proof. Assume Ψ = ΨA,B is a bigraded isomorphism. For i, j , Ψ (ei ⊗ fj ) =
ai,k ek ⊗
k
=
bj,l fl =
l
(A ⊗ B)(i,j ),(k,l) ek ⊗ fl k,l
(A ⊗ B)(i,j ),(k,l) v(k,l),(r,t) ft ⊗ er =
(A ⊗ B)v (i,j ),(r,t) ft ⊗ er . r,t
k,l,r,t
On the other hand, Ψ (ei ⊗ fj ) = Ψ
u(i,j ),(k,l) fl ⊗ ek = u(i,j ),(k,l) bl,t ak,r ft ⊗ er
k,l
k,l,t,r
u(A ⊗ B) (i,j ),(r,t) ft ⊗ er . = t,r
2
This proves Eq. (20). A similar argument can be used to verify Eq. (21).
Definition 5.3. If u, v are mn × mn unitary matrices and there exist unitary matrices A and B satisfying (20), we say that u and v are product unitary equivalent. Now suppose that A and B are unitary matrices satisfying (20). The same computation as in Lemma 5.2 shows that WA,B : E ⊗u F → E ⊗v F defined by WA,B (ei ⊗ fj ) =
(A ⊗ B)(i,j ),(k,l) ek ⊗ fl
k,l
is a well-defined unitary operator. Here the notation E ⊗u F indicates that this is E ⊗ F as a subspace of F (n, m, u). Similarly, one defines a unitary operator, also denoted WA,B , from E ⊗k ⊗ F ⊗l in F (n, m, u) to E ⊗k ⊗ F ⊗l in F (n, m, v) by WA,B (ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl ) = ai1 ,r1 · · · aik ,rk bj1 ,t1 · · · bjl ,tl er1 ⊗ · · · ⊗ erk ⊗ ft1 ⊗ · · · ⊗ ftl . This gives a well-defined unitary operator WA,B : F (n, m, u) → F (n, m, v). Lemma 5.4. For every i, j , write Aei = in {e1 , . . . , en , f1 , . . . , fm },
k ai,k ek
and Bfj =
l bj,l fl .
Then, for g1 , g2 , . . . , gr
WA,B (g1 ⊗ g2 ⊗ · · · ⊗ gr ) = Cg1 ⊗ Cg2 ⊗ · · · ⊗ Cgr where Cgi = Agi if gi ∈ {e1 , . . . , en } and Cgi = Bgi if gi ∈ {f1 , . . . , fm }.
(22)
1602
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Proof. If the gi ’s are ordered such that the first ones are from E and the following vectors are from F , then the result is clear from the definition of WA,B . Since we can get any other arrangement by starting with one of this kind and interchanging pairs gl , gl+1 successively (with gl ∈ {e1 , . . . , en } and gl+1 ∈ {f1 , . . . , fm }), it is enough to show that if (22) holds for a given arrangement of e’s and f ’s and we apply such an interchange, then it still holds. So, we assume gl = ek , gl+1 = fs and we write g = g1 ⊗ · · · ⊗ gl−1 , g = gl+2 ⊗ · · · ⊗ gr , Cg = Cg1 ⊗ · · · ⊗ Cgl−1 and Cg = Cgl+2 ⊗ · · · ⊗ Cgr and compute WA,B g ⊗ fs ⊗ ek ⊗ g = WA,B
u¯ (i,j ),(k,s) g ⊗ ei ⊗ fj ⊗ g .
i,j
Using our assumption, this is equal to
u¯ (i,j ),(k,s) Cg ⊗
i,j
=
ai,t et ⊗
t
bj,q fq ⊗ Cg
q
u¯ (i,j ),(k,s) ai,t bj,q Cg ⊗ et ⊗ fq ⊗ Cg
i,j,t,q
=
u¯ (i,j ),(k,s) ai,t bj,q v(t,q),(d,p) Cg ⊗ fp ⊗ ed ⊗ Cg
i,j,t,q,d,p
u∗ (k,s),(i,j ) (A ⊗ B)(i,j ),(t,q) v(t,q),(d,p) Cg ⊗ fp ⊗ ed ⊗ Cg = (A ⊗ B)(k,s),(d,p) Cg ⊗ fp ⊗ ed ⊗ Cg = ak,d bs,p Cg ⊗ fp ⊗ ed ⊗ Cg =
d,p
d,p
= Cg ⊗ Bfs ⊗ Aek ⊗ Cg completing the proof.
2
The following lemma was proved in [15, Section 7] and it shows that the necessary conditions of Lemma 5.2 are also sufficient conditions on A ⊗ B for the existence of a unitarily implemented isomorphism ΨA,B . Lemma 5.5. For unitary matrices A, B satisfying (20) and X ∈ Au , the map ∗ X → WA,B XWA,B
is the bigraded isomorphism ΨA,B : Au → Av . Moreover ΨA,B extends to a unitary isomorphism Lu → Lv , and similar statements hold for graded exchange isomorphisms (when m = n). Proof. It will suffice to show the equality ΨA,B (X)WA,B = WA,B X for X = Lei and for X = Lfj . Let X = Lfj and apply both sides of the equation to ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl . Using Lemma 5.4, we get
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1603
ΨA,B (Lfj )WA,B (ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl ) = bj,r Lfr (Aei1 ⊗ · · · ⊗ Aeik ⊗ Bfj1 ⊗ · · · ⊗ Bfjl ) r
= Bfj ⊗ Aei1 ⊗ · · · ⊗ Aeik ⊗ Bfj1 ⊗ · · · ⊗ Bfjl = WA,B (fj ⊗ ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl ) = WA,B Lfj (ei1 ⊗ · · · ⊗ eik ⊗ fj1 ⊗ · · · ⊗ fjl ). This proves the equality for X = Lfj . The proof for X = Lei is similar.
2
At this point we drop our assumption that the set {n, m} is the same for both algebras and write {n , m } for the dimensions associated with Av . We shall see in Proposition 5.8 (and Remark 5.11(i)) that, if the algebras are isomorphic, then necessarily {n, m} = {n , m }. Given an isomorphism Ψ : Au → Av we get a homeomorphism θΨ : Ωu → Ωv (as in the discussion preceeding Theorem 4.8). The arguments used in the proof of Theorem 4.8 to show that part (3) implies part (1) apply also to isomorphisms and thus, θΨ (0, 0) ∈ Ωv0 . Proposition 5.6. Let Ψ : Au → Av be an (algebraic) isomorphism. Then θΨ (Ωu0 ) = Ωv0 and θΨ (Ωu0 ∩ (Bn × Bm )) = Ωv0 ∩ (Bn × Bm ). Proof. Fix (z, w) in Ωu0 and use Theorem 4.8 to get an automorphism Φ of Au such that θΦ (0, 0) = (z, w). But then θΨ ◦Φ (0, 0) = θΨ (z, w) and, as we noted above, this implies that θΨ (z, w) ∈ Ωv0 . It follows that θΨ (Ωu0 ) ⊆ Ωv0 and, applying this to Ψ −1 , the lemma follows. 2 Lemma 5.7. The map θΨ is a biholomorphic map. Proof. The coordinate functions for θΨ are (z, w) → α(z,w) (Ψ −1 (ei )) (and (z, w) → α(z,w) (Ψ −1 (fj ))) where α(z,w) is the character associated with (z, w) by Proposition 3.1. For every Y ∈ C[F+ v ], α(z,w) (Y ) is a polynomial in (z, w) (for (z, w) ∈ Ωv ) and, therefore, an analytic function. Each X ∈ Av is a norm limit of elements in C[F+ v ] and, thus, α(z,w) (X) is an analytic function being a uniform limit of analytic functions on compact subsets of Ωv . Hence, for every (z, w) ∈ Ωv , there is a power series that converges in some, non-empty, circular, neighborhood C of (z, w) that represents α(z,w) (X) on C ∩ Ωv . Taking for X the operators Ψ −1 (ei ) and Ψ −1 (fj ), we see that θ is analytic. The same arguments apply to θ −1 . 2 Proposition 5.8. Let Ψ : Au → Av be an algebraic isomorphism and let θΨ : Ωu → Ωv be the associated map between the character spaces. Suppose θΨ (0, 0) = (0, 0). Then we have the following. (1) {n, m} = {n , m } and we shall assume that n = n and m = m (interchanging E and F and changing u to u∗ if necessary). (2) There are unitary matrices U (n × n) and V (m × m) such that θΨ (z, w) = (U z, V w) for (z, w) ∈ Ωu . (If n = m it is also possible that θΨ (z, w) = (V w, U z).) (3) If Ψ is an isometric isomorphism, then Ψ is a bigraded isomorphism. (Or, if m = n, it may be a graded exchange isomorphism.)
1604
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Proof. We first show that (1) and (2) hold. (This was shown in the permutation case in [15] but with less detail than we give here.) Let γ = (γ1 , γ2 ) = (γ1,1 , . . . , γ1,n ), (γ2,1 , . . . , γ2,m ) , ¯ and note that where each γij (z, w) maps Ωu to C and the origin to the origin. Let β ∈ Ωu , ξ ∈ D, n ξβ ∈ Ωu . Also let α ∈ C and define h(ξ ) = α, γ1 (ξβ) . If α is a unit vector then by the Cauchy–Schwarz inequality we have |h(ξ )| 1. Since γ1 (ξβ)2 1 it follows now from Schwarz’ inequality that |h(ξ )| |ξ |. This is true for all α and so γ1 (ξβ)2 |ξ |. Let (z, w)m = max{z2 , w2 } be the polyball norm. From the last paragraph it follows that γ (z, w)m (z, w). A similar inequality holds for γ −1 and it follows that γ is isometric with respect to polyball norms. Since γ (0, 0) = (0, 0) the Taylor expansions take the form γl,i (z, w) =
l aip zp +
p
l biq wq + gl,i (z, w)
q
where gl,i (tz, tw) = O(t 2 ). The isometric nature of γ with respect to m implies that for all z in Bn we have 2 2 z22 = max γ1 (z, 0)2 , γ2 (z, 0)2 2 l = max aip zp l=1,2
i
p
2 2 = max A(1) z , A(2) z 2
2
l ) associated with γ for l = 1, 2. It follows readily that one of these where A(l) is the matrix (aip l matrices is isometric and hence unitary. Without loss of generality assume that it is matrix A = A(1) . Now γ1 (z, w) = Az + Bw + h(z, w) where h is a power series in higher order terms. We claim that B = 0. For note first that if (z, w) is in Ωu then so too is (z, tw) for 0 < t < 1. Secondly, if w2 z2 then by the polyball norm isometricity, one can conclude that for all complex numbers |a| 1
Az + aBw2 max z2 , aw2 = z2 = Az2 . (Consider δ(z, aw) ∈ Ωu , with δ tending to zero, to remove the higher order terms.) It follows that Bw = 0. Thus B = 0 in this case. In the other case it is γ2 that has this form, which is possible for certain domains if m = n, m = n . Applying the same reasoning to γ2 we see that it is in a similar form, and we conclude further, since γ be surjective, that it must be in a complementary form. Thus if the first case above holds then γ2 must be in the complementary form γ2 (z, w) = B w for some isometric m by m matrix B , as required. To establish (3) we may assume m = m and n = n . From (2) we have for each Φ(Lei ) = LU ei + X where X is a sum of higher order terms. Since Φ(Lei ) is a contraction and LU ei
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1605
is an isometry it follows, as in the proof of Voiculescu’s theorem, that X = 0. Similarly, Φ(Lfj ) = LVfj and it follows that Φ is bigraded. 2 Since every graded isomorphism Ψ satisfies θΨ (0, 0) = (0, 0), we conclude the following. Corollary 5.9. Every graded isometric isomorphism is bigraded if n = m and otherwise is either bigraded or is a graded exchange isomorphism. Theorem 5.10. The following statements are equivalent for unitary matrices u, v in Mn (C) ⊗ Mm (C). (i) There is an isometric isomorphism Ψ : Au → Av . (ii) There is a graded isometric isomorphism from Ψ : Au → Av . (iii) The matrices u, v are product unitary equivalent or (in case n = m) the matrices u, v˜ are product unitary equivalent, where v˜(i,j ),(k,l) = v¯(l,k),(j,i) . (iv) There is an isometric w ∗ -continuous isomorphism Γ : Lu → Lv . Proof. Given Ψ in (i), let (z, w) = θΨ (0, 0). By Proposition 5.6 (z, w) lies in the interior of Ωv0 . By Theorem 4.8 there is a completely isometric automorphism Φ of Av such that θΦ (0, 0) = (z, w) and, therefore, θΦ −1 ◦Ψ (0, 0) = (0, 0). By Proposition 5.8, Φ −1 ◦ Ψ is a graded isometric isomorphism and (ii) holds. Lemma 5.2 shows that (ii) implies (iii) and Lemma 5.5 that (iii) implies (i). Finally, (iii) implies (iv) follows from Lemma 5.5, and (iv) implies (ii) is entirely similar to (i) implies (ii). 2 Remark 5.11. The argument at the beginning of the proof of Theorem 5.10 shows that, whenever Au and Av are isomorphic, we have {n, m} = {n , m }. Theorem 5.12. For n = m the isometric automorphisms of Au are of the form ΨA,B Θz,w where (z, w) ∈ Ωu0 and (A ⊗ B)u = u(A ⊗ B). In case n = m the isometric automorphisms include, in addition, those of the form Ψ˜ A,B Θz,w where (A ⊗ B)u˜ = u(A ⊗ B). 6. Special cases 6.1. The case n = m = 2 Even in the low dimensions n = m = 2 there are many isomorphism classes and special cases. Note that the product unitary equivalence class orbit O(u) of the 4 × 4 unitary matrix u takes the form
O(u) = (A ⊗ B)u(A ⊗ B)∗ : A, B ∈ SU 2 (C) , and so the product unitary equivalence classes are parametrised by the set of orbits, U4 (C)/ Ad(SU 2 (C) × SU 2 (C)). This set admits a 10-fold parametrisation, since, as is easily checked, U4 (C) and SU 2 (C) × SU 2 (C) are real algebraic varieties of dimension 16 and 6 respectively. It follows that the isometric isomorphism types of the algebras Au admit a 10 fold real parametrisation, with coincidences only for pairs O(u), O(v) with u = v. ˜
1606
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
We now look at some special cases in more detail. Let d = dim Ker(u − I ). Case I. d = 0. For every (z, w) ∈ B2 × B2 , we have (z, w) ∈ Ωu if and only if the vector (z1 w1 , z1 w2 , z2 w1 , z2 w2 )t lies in Ker(u − I ). Thus, in Case I, Ωu is as small as possible and is equal to Ωmin := B2 × {0} ∪ {0} × B2 . It follows from Lemma 3.4 that, in this case,
Ωu0 = (0, 0) . By Proposition 5.8 every isometric automorphism of Au is graded and the isometric automorphisms of Au are given by pairs (A, B) of unitary matrices such that A ⊗ B either commutes with u or intertwines u and u. ˜ Case II. d = 1. When d = 1 it still follows from Lemma 3.4 that
Ωu0 = (0, 0) t but now it is possible for Ωu to be larger than Ωmin . In fact, if the non-zero vector (a, c, d) ab, b spanning Ker(u − I ) satisfies ad = bc then Ωu = Ωmin but if ad = bc then the matrix c d is of rank one and can be written as (z1 , z2 )t (w1 , w2 ). Thus, (z, w) ∈ Vu and Ωu contains some (z, w) with non-zero z and w. Since Ωu0 = {(0, 0)}, it is still true that isometric isomorphisms and automorphisms of these algebras are graded.
Case III. d = 2. When d = 2 it is possible that Ωu0 will contain non-zero vectors (z, w) but, as Lemma 3.4 shows, it does not contain a vector with both z = 0 and w = 0. All other possibilities may occur. For example write u1 , u2 and u3 for the three diagonal matrices: u1 = diag(1, −1, −1, 1),
u2 = diag(1, −1, 1, −1)
and u3 = diag(1, 1, −1, −1). Using the definition of the core, we easily see that
Ωu01 = (0, 0) ,
Ωu02 = (0, 0, w1 , 0): |w1 | 1
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1607
and
Ωu03 = (z1 , 0, 0, 0): |z1 | 1 . Thus, the only isometric automorphisms of Au1 are graded, the isometric automorphisms of Au2 are formed by composing graded automorphisms with automorphisms of the type described in Proposition 4.7 (with z = (0, 0) and w = (w1 , 0)). Similarly, for the automorphisms of Au3 , we use Proposition 4.6. Case IV. d = 3. In this case we are able to obtain an explicit 2-fold parametrization of the isomorphism types of the algebra Au . Every 4 × 4 unitary matrix u with dim(Ker(u − I )) = 3 is determined by a unit eigenvector x and its (different from 1) eigenvalue. So that ux = λx, x = 1, |λ| = 1 and λ = 1. Suppose u and v are product unitary equivalent; that is (A ⊗ B)u = v(A ⊗ B) for unitary matrices A, B, and write x, λ for the unit eigenvector and eigenvalue of u. (Of course, x is determined only up to a multiple by a scalar of absolute value 1.) Then y = (A ⊗ B)x is a unit eigenvector of v with eigenvalue λ. For unit vectors x, y (in C4 ) we write x ∼ y if there are unitary 2 × 2 matrices A, B with y = (A ⊗ B)x. For the statement of the next lemma recall that the entries of the vectors x and y in C4 are indexed by {(i, j ): 1 i, j 2}. Lemma 6.1. For a vector x = {x(i,j ) } in C4 , write c(x) for the 2 × 2 matrix c(x) =
x(1,1) x(2,1)
x(1,2) x(2,2)
.
Then x ∼ y if and only if there are unitary matrices A, B such that c(x) = Ac(y)B. (In this case, we shall write c(x) ∼ c(y).) Proof. Suppose y= (A ⊗ B)x for some unitary matrices A = (ai,j ) and B = (bi,j ). Then c(y)i,j = y(i,j ) = (A ⊗ B)(i,j ),(k,l) x(k,l) = k,l ai,k bj,l c(x)k,l = (Ac(x)B)i,j . 2 Using the polar decomposition c(x) = U |c(x)| and diagonalizing |c(x)| = V a0 d0 V ∗ , we find that c(x) ∼ a0 d0 = c(y) where y = (a, 0, 0, d) and a, d 0. Then a, d (the eigenvalues of |c(x)|) are uniquely determined √ once we choose them such that a d and, if x = 1, then d). In this way, we associate to each unitary a 2 + d 2 = 1 (so that 0 a 1/ 2 and a determines √ matrix u as above a pair (a, λ) with 0 a 1/ 2, λ = 1 and |λ| = 1. Using Lemma 6.1 and the discussion preceeding it, we have the following. Corollary 6.2. For every 4 × 4 unitary matrix √ u with dim(Ker(u − I )) = 3, there are numbers λ (with |λ| = 1 and λ = 1) and a (0 a 1/ 2 ) such that u and v are product unitary equivalent if and only if they have the same a, λ.
1608
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
Proof. Let u and v be unitary matrices with dim(Ker(u − I )) = 3 and let (a, λ), (b, μ) be the pairs associated to u and v (respectively) as above. Also write x for the unit eigenvector of u associated to the eigenvalue λ and let y be the unit eigenvector of v associated to μ. Suppose u and v are product unitarily equivalent. Then they are unitary equivalent and, thus, λ = μ. Write (A ⊗ B)u = v(A ⊗ B) for unitary matrices A, B. As we saw above, y can be chosen to be (A ⊗ B)x so that x ∼ y and, by Lemma 6.1, c(x) ∼ c(y). It follows that a = b. Conversely, assume that a = b and λ = μ. Then c(x) ∼ c(y) and, thus, x ∼ y so we can write y = (A ⊗ B)x for some unitary matrices A, B. Writing v = (A ⊗ B)u(A ⊗ B)∗ , we find that y is the unit eigenvector of v associated to λ. Thus v = v , completing the proof. 2 For every a, λ as in Corollary 6.2 we let u(a, λ) be the following 4 × 4 matrix. ⎛
(λ − 1)a 2 + 1 0 ⎜ u(a, λ) = ⎝ 0 (λ − 1)a(1 − a 2 )1/2
0 1 0 0
⎞ 0 (λ − 1)a(1 − a 2 )1/2 0 0 ⎟ ⎠. 1 0 0 λ + (1 − λ)a 2
It is a straightforward computation to verify that dim(Ker(u − I )) = 3 and that λ is an eigenvalue of u(a, λ) with eigenvector (a, 0, 0, (1 − a 2 )1/2 )t . Thus the pair associated to u(a, λ) is a, λ and we have Corollary 6.3. Every matrix u with dim(Ker(u −√I )) = 3 is product unitary equivalent to a unique matrix of the form u(a, λ) (with 0 a 1/ 2, |λ| = 1 and λ = 1). Using the definition of the core, we immediately get the following. Proposition 6.4. If a = 0, |λ| = 1, λ = 1, then Ωu(0,λ) is the union
(z1 , z2 , w1 , 0): z ∈ B2 ; |w1 | 1 ∪ (z1 , 0, w1 , w2 ): w ∈ B2 ; |z1 | 1 , and
0 = (z1 , 0, w1 , 0): |z1 | 1; |w1 | 1 . Ωu(0,λ) If a = 0 then 1/2
Ωu(a,λ) = (z1 , z2 , w1 , w2 ): az1 w1 + 1 − a 2 z2 w2 = 0, (z, w) ∈ B2 × B2 and
0 Ωu(a,λ) = (0, 0) . Proof. The space Ωu(a,λ) consists of points (z, w) for which (z1 w1 , z1 w2 , z2 w1 , z2 w2 )t = u(a, λ)(z1 w1 , z1 w2 , z2 w1 , z2 w2 )t , that is, for which
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1609
1/2 (λ − 1)a 2 + 1 z1 w1 + (λ − 1)a 1 − a 2 z2 w2 = z1 w1 , 1/2 z1 w1 + λ + (λ − 1)a 2 z2 w2 = z2 w2 . (λ − 1)a 1 − a 2 If a = 0 this implies z2 w2 = 0, while if a = 0 then (z1 w1 , 0, 0, z2 w2 ) is a fixed vector for u(a, λ) and so for some scalar μ (z1 w1 , z2 w2 ) = μ((1 − a 2 )1/2 , −a). The descriptions of Ωu(a,λ) follow. From the definition of the core and the fact that here C12 = C21 = 0 and C11 = C22 =
(λ − 1) 0 , 0 (λ − 1)a(1 − a 2 )1/2
(λ − 1)a(1 − a 2 )1/2 0
0 , (λ − 1) + (λ − 1)a 2
we see that for a = 0 we have w2 = z2 = 0 while for a = 0, z1 = z2 = w1 = w2 = 0.
2
Recall that, for a 4 × 4 unitary matrix v we defined the matrix v˜ by v˜(i,j ),(k,l) = v¯(l,k),(j,i) and showed (Corollary 5.10) that Au and Av are isometrically isomorphic if and only if either u and v or u and v˜ are product unitary equivalent. Now, it is easy to check that u(a, λ) = u(a, λ¯ ) and so, using Proposition 3.3 and previous results, we obtain the following. √ Theorem 6.5. Let 0 a, b 1/ 2, |λ| = |μ| = 1, λ, μ = 1. Then (1) Au(a,λ) and Au(b,μ) are isometrically isomorphic if and only if a = b and λ equals either μ or μ. ¯ (2) When a = 0 the isometric automorphisms of Au(0,λ) are all bigraded. (3) If a = 0 then there are isometric isomorphisms that are not graded. Case V. d = 4. This is the case where u = I . We have Ωu = Ωu0 = Bn × Bm and the isometric automorphisms are obtained by composing graded automorphisms and the automorphisms described by Propositions 4.6, 4.7. 6.2. Permutation unitary relation algebras With more structure assumed for a class of unitaries u it may be possible to derive an appropriately more definitive classification of the algebras Au . We indicate this now for the class of permutation unitaries. A fuller discussion is in [15]. Let θ ∈ S4 , viewed as a permutation of the product set {1, 2} × {1, 2} = {11, 12, 21, 22}. Associate with θ the matrix uθ = u(i,j ),(k,l) where u(i,j ),(k,l) = 1 if (k, l) = θ (i, j ) and is zero otherwise. If τ ∈ S4 is product conjugate to θ in the sense that τ = σ θ σ −1 with σ in S2 × S2 , then it follows that uτ and uθ are product unitarily equivalent. Thus we need only consider product conjugacy classes. It turns out that these classes are the same as the product unitary equivalence classes of the matrices uθ .
1610
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
It can be helpful to view a permutation θ in Snm as a permutation of the entries of an n × m rectangular array, since product conjugacy corresponds to conjugation through row permutations and column permutations. Considering this for n = m = 2 one can verify firstly that there are at most 9 isomorphism types for the algebras Aθ corresponding to the following permutations: θ1 = id,
θ2 = (11, 12),
θ3 = (11, 22), −1 θ4a = (11, 22, 12), θ4b = θ4a = (11, 12, 22), θ5 = (11, 12), (21, 22) , θ6 = (11, 22), (12, 21) , θ7 = (11, 12, 22, 21), θ8 = (11, 12, 21, 22). The Gelfand spaces of the algebras Aθ (and Lθ ) distinguish all of these algebras except for the pairs {θ4a , θ4b } and {θ7 , θ8 }. However, one can verify in both cases that neither the pair u, v nor the pair u, v˜ are product unitary equivalent. Theorem 5.10 now applies to yield the following result from [15]. Theorem 6.6. For n = m = 2 there are 9 isometric isomorphism classes for the algebras Aθ and for the algebras Lθ . To a higher rank graph (Λ, d) in the sense of Kumjian and Pask [11] one can associate nonselfadjoint Toeplitz algebra AΛ , LΛ , as in Kribs and Power [10]. In the single vertex rank 2 case it is easy to see that AΛ is equal to the algebra Au for some permutation matrix u = θ in Snm . Thus Theorem 5.10 classifies these algebras in terms of product unitary equivalence restricted to Snm as stated formally in the next theorem. In the rank 2 case this is a significant improvement on the results in [15] which, although covering general rank, were restricted to the case of trivial core for the character space. With θ˜ the permutation for the permutation matrix u˜ θ (which corresponds to generator exchange) we have: Theorem 6.7. Let Λ1 and Λ2 be single vertex 2-graphs with relations determined by the permutations θ1 and θ2 . Then the rank 2 graph algebras AΛ1 , AΛ2 are isometrically isomorphic if and only if the pair θ1 , θ2 or the pair θ1 , θ˜2 is product unitary equivalent. It is natural to expect that as in the (2, 2) case product unitary equivalence will correspond to product conjugacy. 7. Au as a subalgebra of a tensor algebra Let En be the Toeplitz extension of the Cuntz algebra On and write H for the Fock space associated with E (that is, H = C ⊕ E ⊕ (E ⊗ E) ⊕ · · ·). Note that En acts naturally on H (by the “shift” or “creation” operators Li = Lei , 1 i n). In fact, Le1 , . . . , Len generate En as a C ∗ -algebra. Consider also the space F (F ) ⊗ H = H ⊕ (F ⊗ H ) ⊕ ((F ⊗ F ) ⊗ H ) ⊕ · · · . This space is isomorphic to F (E, F, u) and we write w : F (F ) ⊗ H → F (E, F, u) for the isomorphism. It will be convenient to write wk for the restriction of w to the summand F ⊗k ⊗ H (which is an isomorphism onto its image). Note that, for a fixed k, {wk∗ Lei wk : 1 i n} is a set of n isometries with orthogonal ranges. Thus it defines a representation ρk of En on F ⊗k ⊗ H (with ρk (Lei ) = wk∗ Lei wk ). (Note that we are using Lei for the creation operators both on H and on
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1611
F (E, F, u). This should cause no confusion.) We also write ρ∞ for the representation k ⊕ρk of En on F (F ) ⊗ H (where ρ0 is the representation of En on H ). Let X be the column space Cm (En ). This is a C ∗ -module over En . As a vector space it is the of En on X is given by (ai ) · b = (ai b) direct sum of m copies of En . The right module action and the En -valued inner product is (ai ), (bi ) = i ai∗ bi . For every 1 i n, we write S˜i for the operator in L(X) defined by S˜i (aj )m j =1 =
m u(i,j ),(k,l) Lek aj
. l=1
j,k
Note that j,k
=
m u(i,j ),(k,l) Lek aj
, l=1
j,j ,k,k ,l
j ,k
m u(i,j ),(k ,l) Lek bj
l=1
uu∗ (i,j ),(i,j ) aj∗ bj = u¯ (i,j ),(k,l) aj∗ L∗ek Lek bj u(i,j ),(k ,l) = aj∗ bj j,j
= (aj ), (bj ) .
j
Thus S˜i is an isometry. A similar computation shows that these isometries have orthogonal ranges and, thus, this family defines a ∗ -homomorphism ϕ : En → L(X), with ϕ(Lei ) = S˜i , 1 i n, making X a C ∗ -correspondence over En (in the sense of [13,12]). Once we have a correspondence we can form X ⊗ X and, more generally, X ⊗k . Recall that to define X ⊗ X one defines the sesquilinear form x ⊗ y, x ⊗ y = y, ϕ( x, x )y on the algebraic tensor product and then let X ⊗ X be the Hausdorff completion. The right action of En on X ⊗ X is (x ⊗ y) · a = x ⊗ (y · a) and the left action is given by the map ϕ2 . ϕ2 (a)(x ⊗ y) = ϕ(a)x ⊗ y. The definition of X ⊗k is similar (and the left action map is denoted ϕk ). For k = 0 we set = En and ϕ0 is defined by left multiplication. Also write ϕ∞ for k ⊕ϕk , the left action of En on F (X). One can then define the Hilbert space X ⊗k ⊗En H by defining the sesquilinear form x ⊗ h, y ⊗ k = h, x, y k (x, y ∈ X ⊗k ) and applying the Hausdorff completion. Now define the map X ⊗0
v : X ⊗ En H → F ⊗ H by setting v (ai ) ⊗ h = fi ⊗ ai h. i
It is straightforward to check that this map is a well-defined Hilbert space isomorphism. By induction, we also define maps vk : X ⊗k ⊗En H → F ⊗k ⊗ H by
1612
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
vk+1 (aj ) ⊗ z = fj ⊗ vk ϕk (aj ) ⊗ IH z
(23)
j
for z ∈ X ⊗k ⊗En H and v0 is the identity map from En ⊗En H (which is isomorphic to H ) and F ⊗0 ⊗ H = H . Assume that vk is a Hilbert space isomorphism of X ⊗k ⊗En H onto F ⊗k ⊗ H and compute, for (aj ), (bj ) ∈ X and z, z ∈ X ⊗k ⊗ H , vk+1 (aj ) ⊗ z , vk+1 (bj ) ⊗ z fj ⊗ vk ϕk (aj ) ⊗ IH z , fj ⊗ vk ϕk (bj ) ⊗ IH z = j,j
vk ϕk (aj ) ⊗ IH z , vk ϕk (bj ) ⊗ IH z = j
z, ϕk aj∗ bj ⊗ IH z =
j
= (aj ) ⊗ z, (bj ) ⊗ z . Thus, by induction, each map vk is a Hilbert space isomorphism and, summing up, we get a Hilbert space isomorphism ⊕vk : F (X) ⊗En H → F (F ) ⊗ H. v∞ := k
Lemma 7.1. v∞ is a Hilbert space isomorphism and intertwines the actions of En . That is, v∞ ◦ ϕ∞ (a) ⊗ IH = ρ∞ (a) ◦ v∞ for a ∈ En . Proof. We show that, for every p 0 and a ∈ En , we have vp ◦ ϕp (a) ⊗ IH = ρp (a) ◦ vp .
(24)
The proof will proceed by induction on p. For p = 0 this is clear so we now assume that it holds for p. For 1 i n, (aj ) ∈ X and z ∈ X ⊗p ⊗ H , we have vp+1 ((ϕp+1 (Lei ) ⊗ IH )((aj ) ⊗ z)) = vp+1 (ϕ(Lei )(aj ) ⊗ z) = l,k,j u(i,j ),(k,l) fl ⊗ vp ((ϕp (Lek aj ) ⊗ IH )z). Using the induction hypothesis, this is equal to u(i,j ),(k,l) fl ⊗ ρp (Lek )ρp (aj )vp z l,k,j
=
l,k,j
∗ = w∞
u(i,j ),(k,l) fl ⊗ wp∗ Lek wp ρp (aj )vp z
∗ u(i,j ),(k,l) fl ⊗ ek ρp (aj )vp z = w∞
l,k,j ∗ = ρp+1 (Lei )wp+1
j
j
fj ⊗ ρp (aj )vp z.
ei ⊗ fj ⊗ ρp (aj )vp z
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
1613
∗ Using the induction hypothesis again, we get ρp+1 (Lei )wp+1 j fj ⊗ vp ((ϕp (aj ) ⊗ IH )z) = ρp+1 (Lei )vp+1 ((aj ) ⊗ z). This proves (24) for p + 1 and the generators of En . Since both ρp+1 ∗ and vp+1 (ϕp+1 (·) ⊗ IH )vp+1 are ∗ -homomorphisms, (24) holds for p + 1 and every a ∈ En , completing the induction step. Thus, (24) holds for every p and this implies the statement of the lemma. 2 Write δl for the vector (aj ) in X such that al = I and aj = 0 if l = j . The tensor algebra T+ (X) is generated by the operators Tδl (where Tδl is the creation operator on F (X) associated with δl ) and the C ∗ -algebra ϕ∞ (En ). The latter algebra is generated (as a C ∗ -algebra) by the operators ϕ∞ (Li ) where {Li } is the set of generators of En . We have Lemma 7.2. For every 1 i n and 1 j m and k 0, (i) w ◦ vk ◦ (ϕ∞ (Li ) ⊗ IH ) = Lei ◦ w ◦ vk . (ii) w ◦ vk+1 ◦ (Tδj ⊗ IH ) = Lfj ◦ w ◦ vk . Proof. Part (i) follows from (24) and part (ii) from (23) (with δj in place of (aj )).
2
Recalling that w ◦ v∞ is a unitary operator mapping F (X) ⊗ H onto F (E, F, u), we get Theorem 7.3. (1) The algebra Au is unitarily isomorphic to the (norm closed) subalgebra of the tensor algebra T+ (X) that is generated by {ϕ∞ (Li ), Tδj : 1 i n, 1 j m}. (2) The (norm closed) subalgebra of B(F (E, F, u)) that is generated by {Lei , L∗ei , Lfj : 1 i n, 1 j m} is unitarily isomorphic to the tensor algebra T+ (X) (and contains Au ). (3) The (norm closed) subalgebra of B(F (E, F, u)) that is generated by {Lei , L∗fj , Lfj : 1 i n, 1 j m} is unitarily isomorphic to a tensor algebra T+ (Y ) (and contains Au ). Proof. Parts (1) and (2) follow from Lemma 7.2. For part (3), note that one can interchange the roles of E and F . More precisely, one defines the C ∗ -module Y over Em to be Y = Cn (Em ) and n the left action of Em on Y by ϕY (Lfl )(bk )k=1 = ( j,k u¯ (i,j ),(k,l) Lfj bk )ni=1 . This makes Y into a C ∗ -correspondence over Em and the rest of the proof proceeds along similar lines as above. 2 Suppose m = 1. ThenX is the correspondence associated with the automorphism α of En given by mapping Ti to nj=1 ui,j Tj (note that u, in this case, is an n × n matrix). The tensor algebra T+ (X) is the analytic crossed product En ×α Z+ and Au is unitarily isomorphic to the subalgebra of this analytic crossed product that can be written An ×α Z+ . One can also embed Au in T+ (Y ) (as in Corollary 7.3(3)). Here Em is simply the (classical) Toeplitz algebra T and Y = Cn (T ) with ϕY (Tz )(bk )k = ( k u¯ i,k Tz bk )i (where Tz is the generator of T ). Remark 7.4. Since the automorphisms Θz,w and ΨA,B of Au are both unitarily implemented, they can be extended to T+ (X). It is easy to check that they map T+ (X) into itself and, thus, are automorphisms of T+ (X). Hence, at least when n = m, every automorphism of Au can be extended to an automorphism of the tensor algebra T+ (X) that contains it (see Theorem 5.12).
1614
S.C. Power, B. Solel / Journal of Functional Analysis 260 (2011) 1583–1614
References [1] K.R. Davidson, Free semigroup algebras: a survey, in: Systems, Approximation, Singular Integral Operators, and Related Topics, Bordeaux, 2000, in: Oper. Theory Adv. Appl., vol. 129, Birkhäuser, Basel, 2001, pp. 209–240. [2] K.R. Davidson, E. Katsoulis, Nest representations of directed graph algebras, Proc. London Math. Soc. 92 (2006) 762–790. [3] K.R. Davidson, D.R. Pitts, The algebraic structure of noncommutative analytic Toeplitz algebras, Math. Ann. 311 (1998) 275–303. [4] K.R. Davidson, S.C. Power, D. Yang, Dilation theory for rank 2 graph algebras, J. Operator Theory 63 (2010) 245–270. [5] K.R. Davidson, S.C. Power, D. Yang, Atomic representations of rank 2 graph algebras, J. Funct. Anal. 255 (2008) 819–853. [6] K.R. Davidson, D. Yang, Periodicity in rank 2 graph algebras, Canad. J. Math. 61 (2009) 1239–1261. [7] N. Fowler, Discrete product systems of Hilbert bimodules, Pacific J. Math. 204 (2002) 335–375. [8] E. Katsoulis, D.W. Kribs, Isomorphisms of algebras associated with directed graphs, Math. Ann. 330 (2004) 709– 728. [9] D.W. Kribs, S.C. Power, Free semigroupoid algebras, J. Ramanujan Math. Soc. 19 (2004) 75–117. [10] D.W. Kribs, S.C. Power, The analytic algebras of higher rank graphs, Math. Proc. R. Ir. Acad. 106 (2006) 199–218. [11] A. Kumjian, D. Pask, Higher rank graph C ∗ -algebras, New York J. Math. 6 (2000) 1–20. [12] P. Muhly, B. Solel, Tensor algebras over C ∗ -correspondences: Representations, dilations, and C ∗ -envelopes, J. Funct. Anal. 158 (1998) 389–457. [13] M. Pimsner, A class of C ∗ -algebras generalizing both Cuntz–Krieger algebras and crossed products by Z, in: D. Voiculescu (Ed.), Free Probability Theory, in: Fields Inst. Commun., vol. 12, Amer. Math. Soc., Providence, 1997, pp. 189–212. [14] G. Popescu, Von Neumann inequality for (B(H)n )1 , Math. Scand. 68 (1991) 292–304. [15] S.C. Power, Classifying higher rank analytic Toeplitz algebras, New York J. Math. 13 (2007) 271–298. [16] B. Solel, You can see the arrows in a quiver algebra, J. Aust. Math. Soc. 77 (2004) 111–122. [17] B. Solel, Representations of product systems over semigroups and dilations of commuting CP maps, J. Funct. Anal. 235 (2006) 593–618. [18] B. Solel, Regular dilations of representations of product systems, Math. Proc. R. Ir. Acad. 108A (2008) 89–101. [19] D. Voiculescu, Symmetries of some reduced free product C ∗ -algebras, in: Lecture Notes in Math., vol. 1132, Springer-Verlag, New York, 1985, pp. 556–588.
Journal of Functional Analysis 260 (2011) 1615–1636 www.elsevier.com/locate/jfa
Wavelet frames for (not necessarily reducing) affine subspaces II: The structure of affine subspaces Qing Gu a,1 , Deguang Han b,∗ a Department of Mathematics, East China Normal University, Shanghai 200062, PR China b Department of Mathematics, University of Central Florida, Orlando, FL 32816, USA
Received 30 July 2009; accepted 21 December 2010 Available online 24 December 2010 Communicated by Gilles Godefroy
Abstract This is a continuation of the investigation into the theory of wavelet frames for general affine subspaces. The main focus of this paper is on the structural properties of affine subspaces. We show that every affine subspace is the orthogonal direct sum of at most three purely non-reducing subspaces, while every reducing subspace (with respect to the dilation and translation operators) is the orthogonal direct sum of two purely non-reducing ones. This result is obtained through considering the basic question as to when the orthogonal complement of an affine subspace in another one is still affine. Motivated by the fundamental question as to whether every affine subspace is singly-generated, and by a recent result that every singly generated purely non-reducing subspace admits a singly generated wavelet frame, we prove that every affine subspace can be decomposed into the direct sum of a singly generated affine subspace and some space of “small size”. As a consequence we establish a connection between the above mentioned two questions. © 2010 Elsevier Inc. All rights reserved. Keywords: Affine subspaces; Wavelet frames; Translation and dilation reducing subspaces; Shift-invariant subspaces
1. Introduction An affine subspace is a closed linear subspace of L2 (R) generated by an affine system {2 ψ(2n t − ) | ψ ∈ Φ, n, ∈ Z} with some subset Φ ⊆ L2 (R). The affine structure naturally leads to the questions concerning the wavelet theory that can be possibly developed for n 2
* Corresponding author.
E-mail addresses: [email protected] (Q. Gu), [email protected] (D. Han). 1 The first author was supported in part by the National Natural Science Foundation of China (Grant No. 10671068).
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.020
1616
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
such a subspace. So far much of the work on the wavelet theory for subspaces of L2 (R) has been focused on the special cases (cf. [6–8,10,14,19,18,20]) that the underlying affine subspace is reducing with respect to the translation operator T and the dilation operator D defined by √ Tf (x) = f (x − 1) and Df (x) = 2f (2x) for f ∈ L2 (R), i.e., the subspace is invariant under both D n and T m for all n, m ∈ Z. In such cases the subspace has a very simple structure (cf. [9,8]) in the frequency domain, which leads to some nice results in its corresponding wavelet theory. In many ways the wavelet theory for this type of affine subspaces is very much like the classical wavelet theory for the entire space L2 (R). However, it is not known how much of the theory is still valid for general non-reducing affine subspaces. For example, it is well known that every reducing subspace is automatically singly-generated, and in fact there exists a singly generated wavelet frame (even Shannon-type orthonormal wavelet) for every reducing subspace (cf. [10]). This leads to the question as to whether every non-reducing affine subspace admits a singly generated wavelet frame as well. While the general question still remains open, we showed in [13] that if an affine subspace is singly-generated, then it admits a Parseval wavelet frame with at most two generators. Moreover, it admits a wavelet frame with a single function generator when the affine subspace is either reducing or purely non-reducing. These results naturally lead to a related problem (maybe slightly weaker than the previous one) of whether every affine subspace is singly-generated. We believe that in order to answer all these questions we need a good understanding of the structure of affine subspaces which, to our knowledge, has not been investigated yet in the literature. The main purpose of this paper is to establish several basic structural results which we believe will be useful in serving our ultimate goal of developing the wavelet frame theory for general affine subspaces. For a good resource of references related to the topic of this paper, we refer to [11,17] for wavelet theory, to [3–5,12,15] for frame theory and to [2,1,16] for the theory of shift invariant subspaces. Here we only recall and introduce some basic notations and definitions that will be used in this paper. A frame for a separable Hilbert space H is a sequence of vectors {fn } in H such that the frame inequality Af 2 |f, fn |2 Bf 2 n∈N
holds for some positive constants A and B and every f ∈ H . The optimal values of the constants A and B are called the lower frame bound and upper frame bound, respectively. A tight frame is a frame with equal frame bounds. When both frame bounds are equal to 1, the frame is called a Parseval frame. A closed linear subspace M of L2 (R) is called shift-invariant (SI for short) if f ∈ M implies T k f ∈ M for all k ∈ Z. For a given subset Φ ⊆ L2 (R), we say that S(Φ) = span{T k f | f ∈ Φ, k ∈ Z} is the shift invariant subspace generated by Φ. If Φ = {ϕ} for some function ϕ, then V is called principal shift-invariant (PSI). A finitely generated shift invariant (FSI) subspace refers to the case that Φ can be chosen as a finite set. By using the above notion of shift invariant subspace, we may rephrase the definition of affine subspace as follows. An affine subspace is a closed subspace of L2 (R) which has the form X := span D n M n ∈ Z for some shift invariant subspace M. The subspace M is then called a generating SI subspace for X. In other words, a subspace X of L2 (R) is an affine subspace if and only if X contains some subspace M as a generating SI subspace. Clearly, M is not necessarily unique for an affine
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1617
subspace. We will say that an affine subspace X is k-generated if k is the smallest cardinality such that there exists a generating SI subspace M whose generating set Φ has cardinality k. A singly generated affine subspace refers to a 1-generated affine subspace. n When an affine system {2 2 ψ(2n t − ) | ψ ∈ Φ, n, ∈ Z} of functions forms a frame for 2 L (R), it is called a wavelet frame for L2 (R). Likewise, when X is a closed subspace of L2 (R), if an affine system of functions is contained in X and forms a frame for X, then it is called a wavelet frame for X. In each case, the set Φ is then called the set of generators for such a wavelet frame. Clearly, for a closed subspace X of L2 (R) to have a wavelet frame, X must necessarily be an affine subspace. Tight wavelet frames and Parseval wavelet frames are defined similarly. If {D n T ψ}n,∈Z is an orthonormal basis for L2 (R) (respectively, for some affine subspace X), then ψ is called an (orthonormal) wavelet for L2 (R) (respectively, for X). Note that the closure of the linear span of any number of shift invariant subspaces is again shift-invariant. It then follows that for any subspace X of L2 (R), there exists a unique shift invariant subspace Q ⊆ X that is maximal, in the sense that any shift invariant subspace M ⊆ X must satisfy M ⊆ Q. The subspace Q will be called the maximal SI subspace in X. In particular, if X is a non-zero affine subspace, then its maximal SI subspace must be non-zero. In fact, it is quite clear that when X is affine, its maximal SI subspace must be a generating SI subspace for X. Prominent among all affine subspaces are those that are reducing. A closed subspace X of L2 (R) is called reducing (with respect to the dilation operator D and the translation operator T ) if it is invariant under both D n and T k for all n, k ∈ Z. It is well known that X is a reducing subspace if and only if there exists a measurable subset E of R such that 2E = E and X = {f ∈ L2 (R) | supp(fˆ) ⊆ E}, where fˆ is the Fourier transform defined by fˆ(ξ ) = e−2πiξ t f (t) dt R
for f ∈ L1 (R) and then uniquely extended to all f ∈ L2 (R). Similar to the case of shift invariant subspace, the closure of the linear span of any number of reducing subspaces is again reducing. It follows that in any affine subspace X there exists a unique reducing subspace Y that is maximal, in the sense that any reducing subspace Z ⊆ X must satisfy Z ⊆ Y . Note that in general an affine subspace is not necessarily reducing. In fact there are non-zero affine subspaces which do not contain any non-zero reducing subspace. We call such an affine subspace purely non-reducing. It is also easy to find affine subspaces that are neither reducing nor purely non-reducing. While we have a better understanding of the subspaces that are reducing, we try to gain some knowledge about the affine subspaces that are non-reducing. In particular, we establish the following structural result: Theorem 1.1. Let X be an affine subspace. Then the following statements are true. (i) There exists a shift invariant subspace M ⊆ X such that D n M ⊥ D m M for any distinct pair of integers (m, n) and X = n∈Z D n M. (ii) If X is a non-zero reducing subspace, then there exist two purely non-reducing affine subspaces X1 and X2 such that X = X1 ⊕ X2 . (iii) If X is non-zero and not reducing, then there exists a unique decomposition X = X1 ⊕ X2 with X1 being reducing and X2 being purely non-reducing. (iv) If X is non-zero, then X is the orthogonal direct sum of at most three purely non-reducing affine subspaces.
1618
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
We point out that only part (i), (ii) and (iii) of Theorem 1.1 need detailed proofs since part (iv) is a direct consequence of part (ii) and (iii). The proof of part (i) involves a semiorthogonalization process which will be discussed in Section 2. The proof of part (ii) relies on a concrete description of the maximal SI subspace in an affine subspace, which will be presented in Section 3, together with other related results. Part (iii) of the theorem may seem obvious in view of the observation made above that every affine subspace contains a maximal reducing subspace. However, the difficult part of the proof is to show that the orthogonal complement of a reducing subspace within an affine subspace remains affine. While in general we still do not know if there exists an example showing that the orthogonal complement of an affine subspace within another one is not necessarily affine, we obtain a necessary and sufficient condition for this to hold. As its consequence, we obtain the following result. Theorem 1.2. Let X and Y be two affine subspaces such that X ⊆ Y . Then the following are true. (i) If X is reducing, then Y X is affine. (ii) If Y is reducing, and Y X is affine, then k∈Z D k V = {0}, where V = span{T j (X Q) | j ∈ Z} and Q is the maximal SI subspace in X. We will devote the fourth section to obtaining the above mentioned necessary and sufficient condition, and to the proof of Theorem 1.2, which in turn leads to part (iii) of Theorem 1.1. Though not being able to prove or disprove the conjecture that every affine subspace is singlygenerated, in the last section we will show that any purely non-reducing affine subspace is the direct sum of a singly generated one and some space that is “purely non-affine”, in the sense that it does not contain any non-zero shift invariant subspace. The said singly generated affine subspace seems nearly as big as the original affine subspace, thus the said purely non-affine space can be thought as having relatively small size. More importantly, our construction also reveals some connection between two of the fundamental problems concerning general affine subspaces, namely whether every affine subspace is singly-generated and whether the orthogonal complement of an affine subspace in another one is always affine. In fact we obtain the following result. Theorem 1.3. Assume that the orthogonal complement of any affine subspace within another affine subspace is always affine. Then every purely non-reducing affine subspace is singlygenerated. Consequently, every affine subspace admits a wavelet frame with at most two generators. 2. Semi-orthogonalizations Part (i) of Theorem 1.1 is a frequently used result concerning the process of semiorthogonalization. We need some preparations for its proof. The first three lemmas are simple. Since they will be invoked throughout this article, we provide their proofs for the sake of completeness. Lemma 2.1. Let L be a bounded linear operator L2 (R). Assume that {xn }n∈Z ⊆ L2 (R) and that {Xn }n∈Z is a collection of subsets of L2 (R). Then the following are true.
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1619
(a) L span{xn | n ∈ Z} = span{Lxn | n ∈ Z}. (b) L span{Xn | n ∈ Z} = span{LXn | n ∈ Z}. Proof. The proofs of (a) and (b) are interchangeable. We omit the proof of (b). (a) On the one hand, the fact that span{Lxn | n ∈ Z} = L span{xn | n ∈ Z} ⊆ L span{xn | n ∈ Z} implies that span{Lxn | n ∈ Z} ⊆ L span{xn | n ∈ Z}. On the other hand, for any y ∈ L span{xn | n ∈ Z}, there is an x ∈ span{xn | n ∈ Z} with y = Lx. Hence there is a sequence {x˜k }k ⊆ span{xn | n ∈ Z} such that x˜k → x. Note that {Lx˜k }k ⊆ L span{xn | n ∈ Z} = span{Lxn | n ∈ Z}, so the boundedness of L implies that Lx˜k → Lx = y and hence y ∈ span{Lxn | n ∈ Z}. Therefore L span{xn | n ∈ Z} ⊆ span{Lxn | n ∈ Z} and L span{xn | n ∈ Z} ⊆ span{Lxn | n ∈ Z}.
2
Lemma 2.2. Let X and Y be closed subspaces of L2 (R) and PX⊥ be the orthogonal projection onto X ⊥ . Then the following are true. (a) (X ∩ Y )⊥ = span{X ⊥ , Y ⊥ }. (b) PX⊥ Y = (span{X, Y }) X. Proof. (a) Note that (span{X ⊥ , Y ⊥ })⊥ ⊆ X and (span{X ⊥ , Y ⊥ })⊥ ⊆ Y both hold. Likewise X ⊥ and Y ⊥ are both contained in (X ∩ Y )⊥ . Therefore (X ∩ Y )⊥ ⊆
⊥ ⊥ span X ⊥ , Y ⊥ = span X ⊥ , Y ⊥ ⊆ (X ∩ Y )⊥ .
(b) On the one hand, if f ∈ PX⊥ Y ⊆ PX⊥ span{X, Y }, then there is a g ∈ span{X, Y }, such that f = PX⊥ g. Therefore g = PX⊥ g + PX g = f + PX g and f = g − PX g ∈ span{X, Y }. Since f ∈ X ⊥ , we must have f ∈ (span{X, Y }) X. On the other hand, if f ∈ (span{X, Y }) X, then f ∈ (span{X, Y }) and f ⊥ X. For any ε > 0, there is a g with g < ε and an h1 ∈ X and h2 ∈ Y such that f = g + h1 + h2 . Consequently f = PX⊥ f = PX⊥ (g + h1 + h2 ) = PX⊥ g + PX⊥ h2 . This means f ∈ PX⊥ Y .
2
The following lemma is crucial to the semi-orthogonalization process. We say that a sequence {Xk }k∈Z of subspaces in L2 (R) is increasing if Xk ⊆ Xk+1 for all k ∈ Z. It is called decreasing if Xk ⊇ Xk+1 for all k ∈ Z. It is called monotone if it is either increasing or decreasing.
1620
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
Lemma 2.3. Assume that {Xk }k∈Z is a monotone sequence of subspaces in L2 (R). If {Xk }k∈Z is increasing, then span{Xk | k ∈ Z} =
Xk =
k∈Z
k∈Z
Xk
(Xk+1 Xk ) . ⊕ k∈Z
If {Xk }k∈Z is decreasing, then span{Xk | k ∈ Z} =
Xk =
k∈Z
Xk
⊕ (Xk Xk+1 ) .
k∈Z
k∈Z
Proof. We concentrate on the first case since the second case can be proved similarly. Now in the case that {Xk }k∈Z is increasing, the first equality in the conclusion is trivial. Also, it is trivial that Xk ⊕ (Xk+1 Xk ) ⊆ Xk . k∈Z
k∈Z
k∈Z
Now if f ∈ k∈Z Xk , then for any ε > 0, there is a g ∈ L2 (R), a k0 ∈ Z and an h ∈ Xk0 such that k0 g < ε and f = g + h. For such an h ∈ Xk0 , there is a unique sequence {hk }k=−∞ and a unique k0 h˜ such that hk ∈ Xk Xk−1 for each integer k k0 , h˜ ∈ k∈Z Xk and h = h˜ + k=−∞ hk . This means that f∈
k∈Z
Xk
⊕ (Xk+1 Xk ) = Xk ⊕ (Xk+1 Xk ) . k∈Z
k∈Z
2
k∈Z
Now we describe the semi-orthogonalization process. In this paper will call a natural number k the length of a shift invariant subspace M if k is the least cardinality of the sets of its generators (this is also called the cyclic multiplicity of M with respect to the integer translation operator group {T m : m ∈ Z}). being its generating SI subspace. Proposition 2.4. Suppose that X is an affine subspace with M Then there exist a shift invariant subspace M1 in X and a reducing subspace Y ⊆ X, such that and the length of M1 is no more than that of M X=
D n M1 ⊕ Y.
n∈Z
| n ∈ Z}. For each j ∈ Z, we define Proof. The assumption means that X = span{D n M n ∈ Z, n > j . Yj := span D n M Evidently, we have Yj +1 ⊆ Yj for all j ∈ Z and X = Y := j ∈Z Yj is a reducing subspace.
j ∈Z Yj .
Let us first establish the fact that
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1621
Indeed, since Yj +1 ⊆ Yj for all j ∈ Z, we have Y = j ∈Z Yj = j ∈N Yj . Thus for each k ∈ Z, T k Y = j ∈N T k Yj = j ∈N Yj = Y . By the definition of Yj , it is also clear that for each (j, k), D k Yj = Yj +k . It follows that for each k ∈ Z, D k Y = j ∈Z D k Yj = pair of integers j ∈Z Yj +k = j ∈Z Yj = Y . Next we define M1 := Y−1 Y0 . Observe that from the discussion above, for each j ∈ Z, Yj Yj +1 = D j +1 Y−1 D j +1 Y0 = D j +1 (Y−1 Y0 ) = D j +1 M1 . Hence by Lemma 2.3, X=
j +1 Yj = (Yj Yj +1 ) ⊕ Yj = D (Y−1 Y0 ) ⊕ Y
j ∈Z
=
j ∈Z
j ∈Z
j ∈Z
n n D (Y−1 Y0 ) ⊕ Y = D M1 ⊕ Y.
n∈Z
n∈Z
Y0 } ⊆ Y−1 . Also, Lastly, note that according to the definition of Yj , we have span{M, n ∈ Z, n > −1 Y−1 = span D n M DnM Y0 }. n ∈ Z, n > 0 ⊆ span{M, = span M, Y0 }. Now suppose that for some subset Ψ ⊆ L2 (R), Therefore Y−1 = span{M, := span T k ψ k ∈ Z, ψ ∈ Ψ . M Since Y0 is a shift invariant subspace, so is Y0⊥ . It then follows that for each k ∈ Z, T k PY ⊥ = 0
PY ⊥ T k . Hence by Lemma 2.1 and Lemma 2.2, we have 0
Y0 } Y0 = P ⊥ M M1 = Y−1 Y0 = span{M, Y0 = span PY ⊥ T k ψ k ∈ Z, ψ ∈ Ψ = span T k PY ⊥ ψ k ∈ Z, ψ ∈ Ψ . 0
0
Thus M1 is a shift-invariant subspace of length no more than the length of M.
2
Part (i) of Theorem 1.1 now is a direct consequence of Proposition 2.4. Proof of Theorem 1.1(i). Proposition 2.4 guarantees that any given affine subspace X can be written as X = ( n∈Z D n M1 ) ⊕ Y with some shift invariant subspace M1 ⊆ X and a reducing subspace Y . In the case that Y is non-zero, there is a ψ ∈ L2 (R) such that {D n T l ψ | n, l ∈ Z} is an orthonormal basis for Y . Let M2 := span T l ψ l ∈ Z .
1622
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
n m Then M2n ⊆ Y and D M2 ⊥ D M2 for any distinct pair of integers (m, n). Moreover, Y = D M . Now we define M := M1 ⊕ M2 . Clearly M is a shift invariant subspace contained 2 n∈Z in X. Proposition 2.4 then implies that for any distinct pair of integers (m, n), D n M ⊥ D m M and X = n∈Z D n M. 2
3. Maximal SI subspace in an affine subspace In this section, we consider the maximal shift invariant subspace in an affine subspace. Note that the existence of the maximal SI subspace in any given affine subspace is observed in Section 1. However, more information concerning the maximal SI subspaces is needed. Among other things, we will give a concrete description of the maximal SI subspaces. This concrete description allows us to construct affine subspaces with certain desired properties, which in turn leads to a proof of part (ii) of Theorem 1.1. We will need the following trivial fact. Lemma 3.1. Assume that {Xk }k∈Z , {Yk }k∈Z are two sequences of subspaces in L2 (R) satisfying Xk ⊆ Yk for each k ∈ Z. Then span{Xk | k ∈ Z} ⊆ span{Yk | k ∈ Z}. The following is a result in the spirit of Proposition 2.4. Proposition 3.2. Suppose that X is a non-zero affine subspace and Q is the maximal SI subspace contained in X. Then the following are true. (a) Q is a generating SI subspace for X. (b) DQ ⊆ Q and P := Q DQ is a shift invariant subspace contained in X. (c) X = k∈Z D k P if and only if X is purely non-reducing. Proof. (a) Note that with X being an affine subspace, there exists a shift invariant subspace M ⊆ X, such that X = span D n M n ∈ Z . Since Q is the maximal shift invariant subspace contained in X, necessarily M ⊆ Q ⊆ X. Hence for each n ∈ Z, D n M ⊆ D n Q ⊆ D n X = X. Now Lemma 3.1 implies that X = span{D n M | n ∈ Z} ⊆ span{D n Q | n ∈ Z} ⊆ X. (b) Since Q is shift-invariant, so is DQ. Also, DQ ⊆ DX = X follows from the fact that Q ⊆ X. Thus DQ ⊆ Q is deduced from the maximality of Q. Therefore the shift invariant subspace Q DQ = P is contained in X. (c) From (a) and (b) we see that X = span{D k Q | k ∈ Z} and that for each k ∈ Z, D k+1 Q ⊆ k D Q. Thus Lemma 2.3 implies that X = span D k Q k ∈ Z = Dk Q = k∈Z
k∈Z
D (Q DQ) ⊕ D k Q. k
k∈Z
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
Now suppose that X is purely non-reducing. Since subspace, necessarily k∈Z D k Q = {0} and X=
D k (Q DQ) =
k∈Z
k∈Z D
kQ
=
k∈N D
1623 kQ
is a reducing
Dk P .
k∈Z
k For the other direction, assume that X = k∈Z D P and that X contains a reducing subspace Y . Since Y is shift-invariant, we have Y ⊆ Q and DY = Y ⊆ DQ. Hence Y ⊥ (Q DQ) = P . Now for each k ∈ Z, Y = D k Y ⊥ D k (Q DQ) = D k P . This then leads to the conclusion that Y = {0}. 2 We will try to show that the length of the shift invariant subspace P = Q DQ in Proposition 3.2 can be any natural number. To this end, we need the following result, which describes the maximal shift invariant subspace Q contained in an affine subspace X. Proposition 3.3. Assume that X is an affine subspace. Let L1 := span{T l X | l ∈ Z} X. Then X ∩ span{T j L1 | j ∈ Z}⊥ is the maximal shift invariant subspace contained in X. Proof. First of all, let us establish the fact that X ∩ span{T j L1 | j ∈ Z}⊥ is indeed a shift invariant subspace in X. To this end, suppose that f ∈ X ∩ span{T j L1 | j ∈ Z}⊥ . We only need to show that for any k ∈ Z, ⊥ T k f ∈ X ∩ span T j L1 j ∈ Z . Indeed, for any such f , we have f ∈ X and f ⊥ span{T j L1 | j ∈ Z}. Thus for any k ∈ Z, we have T k f ⊥ span{T j L1 | j ∈ Z}. Therefore we are only left to show that T k f ∈ X for all k ∈ Z. By way of contradiction, suppose that there is some k0 ∈ Z such that T k0 f ∈ / X. It follows that there are x˜ ∈ X and {0} = y˜ ∈ X ⊥ such that ˜ T k0 f = x˜ + y. Clearly this implies f > x. ˜ On the other hand, since both T k0 f and x˜ are contained in l k span{T X | l ∈ Z}, so is y˜ = T 0 f − x. ˜ Therefore y˜ ∈ span{T l X | l ∈ Z} X = L1 and T −k0 y˜ ∈ j span{T L1 | j ∈ Z}. This implies that T −k0 y˜ ⊥ f by our assumption on f . Now from f = T −k0 x˜ + T −k0 y˜ we obtain the estimate that f 2 = f, T −k0 x˜ f · T −k0 x˜ , which leads to the contradiction that f x. ˜ This concludes the proof that X ∩ span{T j L1 | ⊥ j ∈ Z} is a shift invariant subspace contained in X. Lastly, assume that M is a shift invariant subspace contained in X. We will show M ⊆ Q. Indeed, for any such M ⊆ X, clearly M ⊥ L1 = span{T l X | l ∈ Z} X. Therefore M ⊥ span{T j L1 | j ∈ Z}. Thus M ⊆ X ∩ span{T j L1 | j ∈ Z}⊥ . This proves that X ∩ span{T j L1 | j ∈ Z}⊥ is exactly the maximal shift invariant subspace contained in X. 2 Armed with Proposition 3.3, we can constructively show the following:
1624
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
Proposition 3.4. For each k ∈ N, there is a purely non-reducing affine subspace X such that P is of length k, where P := Q DQ with Q being the maximal shift invariant subspace contained in X. Proof. We first choose an arbitrary non-zero reducing subspace Z. Let ψ be any fixed orthonormal wavelet for the subspace Z. Now for any fixed k ∈ N, we choose l ∈ N such that k 2l−1 . We define two subsets Ψ and Φ of Z as follows. Ψ := D l ψ, D l T ψ, D l T 2 ψ, . . . , D l T k−1 ψ , l Φ := D l T k ψ, D l T k+1 ψ, D l T k+2 ψ, . . . , D l T 2 −1 ψ . We then define two shift invariant subspaces P and M contained in Z as follows. P := span T n f f ∈ Ψ, n ∈ Z , M := span T n g g ∈ Φ, n ∈ Z . l
Note that for each n ∈ Z, we have T n D l = D l T 2 n . Hence from the facts that ψ is an orthonormal wavelet for Z and k 2l−1 , we deduce that the functions in the collection {T n f, T n g | f ∈ Ψ, g ∈ Φ, n ∈ Z} are mutually orthogonal to each other. Therefore {T n f | f ∈ Ψ, n ∈ Z} (respectively, {T n g | g ∈ Φ, n ∈ Z}) forms an orthonormal basis for P (respectively, M). This implies that the translation group {T n : n ∈ Z} restricted to P has a “wandering subspace” of dimension k and hence k is the has cyclic multiplicity of M, i.e., the length of P is k. Similarly the length of M is 2l − k. Now we define X := n∈Z D n P and Y := n∈Z D n M. By using the fact that ψ is an orthonormal wavelet for Z, it is easy to check that Z = X ⊕ Y . Finally, we define Q :=
∞
DnP .
n=0
Clearly Q is a shift invariant subspace contained in X and P = Q DQ. To complete the proof, we want to show that X is a purely non-reducing affine subspace. In view of Proposition 3.2, to this end, it suffices to show that Q is the maximal shift invariant subspace contained in X. According to Proposition 3.3, it is then enough to show X ∩ span{T n L1 | n ∈ Z}⊥ ⊆ Q, where L1 = span{T n X | n ∈ Z} X. We start by noting that since k 2l−1 , we have l−1 l−1 2 , 2 + 1, . . . , 2l−1 + k − 1 ⊆ k, k + 1, . . . , 2l − 1 . Therefore, T D −1 Ψ = T D l−1 ψ, . . . , D l−1 T k−1 ψ l−1 l−1 l = D l−1 T 2 ψ, . . . , D l−1 T 2 +k−1 ψ ⊆ D l−1 T k ψ, . . . , D l−1 T 2 −1 ψ l = D −1 D l T k ψ, . . . , D l T 2 −1 ψ = D −1 Φ ⊆ D −1 T n g | g ∈ Φ, n ∈ N = D −1 M.
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1625
Likewise, one can show T 2 D −2 Ψ ⊆ D −2 M. In general, for each j ∈ N, j −1
T2
j −1 l−j D ψ, . . . , D l−j T k−1 ψ D −j Ψ = T 2 l−1 l−1 = D l−j T 2 ψ, . . . , D l−j T 2 +k−1 ψ l ⊆ D l−j T k ψ, . . . , D l−j T 2 −1 ψ ⊆ D −j M.
Since D m M ⊥ X for all m ∈ Z, we conclude that for each j ∈ N, j −1
T2
D −j Ψ ⊆ span T n X n ∈ Z X = L1 .
It follows then that for each j ∈ N, span{T n L1 | n ∈ Z} ⊇ D −j Ψ . Therefore span T n L1 n ∈ Z ⊇ span T n h h ∈ D −j Ψ, j ∈ N, n ∈ Z = span T n D l−j ψ, . . . , T n D l−j T k−1 ψ j ∈ N, n ∈ Z −j −j = span D −j T 2 n D l ψ, . . . , D −j T 2 n D l T k−1 ψ j ∈ N, n ∈ Z ⊇ span D −j T n D l ψ, . . . , D −j T n D l T k−1 ψ j ∈ N, n ∈ Z = D −j P . j ∈N
Thus, X ∩ span{T j L1 | j ∈ Z}⊥ ⊆
∞
j =0 D
jP
= Q.
2
Proof of Theorem 1.1(ii). With the rigid choice of natural numbers k, l satisfying k = 2l−1 and a change of notation for various affine subspaces, as described below, we may repeat the proof of Proposition 3.4 to conclude that any given non-zero reducing subspace X (in stead of Z as in the said proof) can be decomposed into direct sum of two affine subspaces, which we denote by X1 and X2 (in stead of X and Y , respectively, as in the said proof), such that X1 is purely nonreducing. With the strengthened assumption that k = 2l−1 and the symmetry in the construction of X1 and X2 , we then clearly have that both X1 and X2 are purely non-reducing. 2 4. Subspaces of an affine subspace In this section, we will be mainly concerned with the orthogonal complement of an affine subspace in another one. It is a question both natural and fundamental to ask if and when such an orthogonal complement still remains affine. Utilizing the notion of maximal SI subspaces, we obtain an necessary and sufficient condition for it to be affine. Theorem 1.2 and part (iii) of Theorem 1.1 follows easily from this characterization. The following trivial fact about the direct sum of two affine subspaces will be useful. Lemma 4.1. Assume that X and Y are affine subspaces such that X ⊥ Y . If M and N are generating SI subspace for X and Y respectively, then X ⊕ Y is an affine subspace with M ⊕ N as a generating SI subspace.
1626
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
We also need the following fact, which is standard. We furnish a proof for the sake of completeness. Lemma 4.2. Assume that {Xk }k∈Z is a monotone sequence of subspaces in L2 (R). If a subspace Y in L2 (R) contains Xk for each k ∈ Z, then
span{Y Xk | k ∈ Z} =
Y Xk = Y
k∈Z
Xk .
k∈Z
Proof. The first equality is trivial, as is the inclusion
Y Xk ⊆ Y
k∈Z
Xk .
k∈Z
For the other inclusion, without loss of generality, assume that {Xk }k∈Z is increasing. According to Lemma 2.3,
Xk = Y Xk ⊕ Xk Xk = Y Xk ⊕ (Xk+1 Xk ) . Y k∈Z
k∈Z
Thus evidently Y
k∈Z Xk
k∈Z
⊆
k∈Z Y
k∈Z
Xk .
k∈Z
k∈Z
2
We also need the following fact. Lemma 4.3. Assume that X is an affine subspace. Let Q be the maximal shift invariant subspace contained in X and define V := span{T j (X Q) | j ∈ Z}. Then the following are true. (a) {D k Q}k∈Z is decreasing, {D k V }k∈Z is increasing. (b) Q ⊥ V ; V = {0} ifand only if X is a reducing subspace. (c) X ⊥ k∈Z D k V ; k∈Z D k V is in any reducing subspace containing X. Proof. (a) Note that once it is established that DQ ⊆ Q and D −1 V ⊆ V , both conclusions follow immediately. Now DQ ⊆ Q indeed holds according to Lemma 3.2(b). Moreover, DQ ⊆ Q implies that Q ⊆ D −1 Q. Therefore
D −1 V = span D −1 T j (X Q) j ∈ Z = span T 2j X D −1 Q j ∈ Z ⊆ span T 2j (X Q) j ∈ Z ⊆ span T j (X Q) j ∈ Z = V . (b) Since Q is a shift invariant subspace and Q ⊥ (X Q), it follows that Q ⊥ span{T j (X Q) | j ∈ Z} = V . Note that X is reducing if and only if Q = X. Also, evidently Q = X if and only if V = {0}. The second conclusion follows. (c) Clearly Q ⊥ V implies that D k Q ⊥ D k V for all k ∈ Z. Since {D k V }k∈Z is increasl k ing, D k Q ⊥ D V forl each pair of integers (k, l) with k l. Thus for each k ∈ Z, D Q ⊥ lV = D D V . Thus lk l∈Z l X = span D k Q k ∈ Z ⊥ D V. l∈Z
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1627
Observe that being shift-invariant, any reducing subspace containing X must necessarily contain span{T j (X Q) | j ∈ Z} = V . Therefore, such a reducing subspace, beinginvariant under D n for all n ∈ Z, must further contain D n V for all n ∈ Z. Thus it must contain k∈Z D k V . 2 Now we are ready for the key result of this section. Theorem 4.4. Assume that X and Y are affine subspaces such that X ⊆ Y . Let Q and S be the maximal shift invariant subspaces contained in X and Y respectively and define V := span{T j (X Q) | j ∈ Z}. Then S ∩ V ⊥ ∩ Q⊥ is the maximal shift invariant subspace contained in Y X and S ∩ V ⊥ ∩ Q⊥ = (S ∩ V ⊥ ) Q. Proof. Evidently, S ∩ V ⊥ ∩ Q⊥ is a shift invariant subspace contained in Y . Moreover, since X = Q ⊕ (X Q) ⊆ Q ⊕ span{T j (X Q) | j ∈ Z} = Q ⊕ V , we conclude from Lemma 2.1 that S ∩ V ⊥ ∩ Q⊥ ⊆ Y X. Furthermore, according to Lemma 4.3, V ⊥ ⊇ Q, hence S ∩ V ⊥ ⊇ Q. Therefore S ∩ V ⊥ ∩ Q⊥ = (S ∩ V ⊥ ) Q. Lastly, let M1 be a given shift invariant subspace contained in Y X. Lemma 4.1 and the maximality of S as a shift invariant subspace in Y imply that Q ⊕ M1 ⊆ S. Since Q ⊥ (X Q), M1 ⊥ X, we have that Q ⊕ M1 ⊥ (X Q). Consequently, Q ⊕ M1 ⊥ span{T j (X Q) | j ∈ Z} = V . We have thus established that Q ⊕ M1 ⊆ S ∩ V ⊥ . This allows us to conclude that M1 ⊆ (S ∩ V ⊥ ) Q = S ∩ V ⊥ ∩ Q⊥ . 2 Proof of Theorem 1.2(i). According to Lemma 4.3, when X is a reducing subspace, V = {0}, thus V ⊥ = L2 (R). Hence by Theorem 4.4, S Q is the maximal SI for Y X. Let Z = Y X, M1 = S Q, we need only to show that Z = span{D k M1 | k ∈ Z}. Let us first observe that (S Q) ⊕ X = span{(S Q) ⊕ Q, X}. Indeed, on the one hand, from the facts that S Q ⊥ X and Q ⊆ X, we see that span{(S Q) ⊕ Q, X} ⊆ (S Q) ⊕ X holds. On the other hand, we also have (S Q) ⊕ X ⊆ span{(S Q) ⊕ Q, X}. Thus, according to Lemma 2.2, we have PX⊥ S = span{S, X} X = span (S Q) ⊕ Q, X X = S Q = M1 . Since X (therefore X ⊥ ) is a reducing subspace, for any k, l ∈ Z, X ⊥ is invariant under D l , therefore PX⊥ commutes with D l . Hence according to Lemmas 2.1 and 2.2, span D k M1 k ∈ Z = span D k PX⊥ S k ∈ Z = span D k PX⊥ S k ∈ Z = span D k PX⊥ S k ∈ Z = span PX⊥ D k S k ∈ Z = PX⊥ span D k S k ∈ Z = PX⊥ Y = span{X, Y } X = Y X = Z.
2
We remark that from the characterization of reducing subspaces in terms of their frequency domain, we already know that the orthogonal complement of a reducing subspace within another reducing subspace is always reducing. This fact certainly is also deductable from Theorem 1.2(i). Proof of Theorem 1.1(iii). Assume that X is a non-reducing affine subspace. Recall that in Section 1, we have already observed the existence of the maximal reducing subspace X2 contained
1628
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
in X. Let X1 = X X2 . Then it follows from Theorem 1.2(i) that X1 is affine. X1 is purely non-reducing because of the maximality of the reducing subspace X2 . Uniqueness also follows from the maximality of the reducing subspace X2 and the fact that the orthogonal complement of a reducing space within another reducing space is always reducing. 2 Proof of Theorem 1.1(iv). It follows directly from (ii) and (iii).
2
Proposition 4.5. Assume that X and Y are affine subspaces such that X ⊆ Y . Let Q and S be the maximal shift invariant subspaces contained in X and Y respectively and define V := span{T j (X Q) | j ∈ Z}. Then Y X is an affine subspace if and only if Y = n ⊥ n∈Z D (S ∩ V ). Proof. By Theorem 4.4, M1 := (S ∩ V ⊥ ) Q is the maximal SI subspace in Y X. Hence if Y X is affine, S ∩ V ⊥ Q must be a generating SI subspace for the affine subspace Y X. It := (S ∩ V ⊥ Q) ⊕ Q = S ∩ V ⊥ is a generating SI subspace then follows from Lemma 4.1 that M for the affine subspace Y . Note that for any integer k, since D k S ⊇ D k+1 S and D k V ⊆ D k+1 V ⊇ D k+1 M. Thus by Lemma 4.2, both hold according to Lemma 4.3, we must have D k M
n∈Z = = DnM Dn S ∩ V ⊥ . Y = span D n M n∈Z
n∈Z
For the other direction, let us suppose that Y = n∈Z D n (S ∩ V ⊥ ). Our only task is to show 1 := (Y X) [(Y X) ∩ (S ∩ Y X = span{D n M1 | n ∈ Z}. To this end, we choose M 1 | n ∈ Z} and V ⊥ )⊥ ]. To complete the proof, we only need to show that Y X = span{D n M 1 ⊆ M1 . Let us check Y X = span{D n M 1 | n ∈ Z} first. By Lemma 4.2 and the assumption M that n∈Z D n (S ∩ V ⊥ ) = Y , we have 1 n ∈ Z = 1 span D n M DnM n∈Z
⊥ Dn S ∩ V ⊥ = (Y X) (Y X) ∩ = (Y X) (Y X) ∩
n∈Z
Dn
⊥ ⊥ S ∩V
n∈Z
= (Y X) (Y X) ∩ Y ⊥ = Y X. 1 ⊆ M1 , namely, Lastly let us show that M
⊥
⊆ S ∩ V ⊥ Q = S ∩ V ⊥ ∩ Q⊥ . (Y X) (Y X) ∩ S ∩ V ⊥ Note that for a given Hilbert space H with two subspaces L and M, H M ⊆ L is equivalent to H L ⊆ M. Thus, equivalently, we only need to show
⊥
⊥ (Y X) S ∩ V ⊥ ∩ Q⊥ = (Y X) ∩ S ∩ V ⊥ ∩ Q⊥ ⊆ (Y X) ∩ S ∩ V ⊥ .
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1629
According to Lemma 2.1,
⊥
⊥
(Y X) ∩ S ∩ V ⊥ ∩ Q⊥ = (Y X) ∩ span S ∩ V ⊥ , Q , so we only need to show
⊥
⊥ (Y X) ∩ span S ∩ V ⊥ , Q ⊆ (Y X) ∩ S ∩ V ⊥ . With Q ⊆ X, and Q ⊆ S ∩ V ⊥ , we see that (Y X) ⊆ (Y X) ∩ (Y Q) and span{(S ∩ V ⊥ )⊥ , Q} = (S ∩ V ⊥ )⊥ ⊕ Q. Therefore indeed
⊥
(Y X) ∩ span S ∩ V ⊥ , Q
⊥
⊆ (Y X) ∩ (Y Q) ∩ S ∩ V ⊥ ⊕ Q
⊥
⊥
= (Y X) ∩ Y ∩ Q⊥ ∩ S ∩ V ⊥ ⊕ Q = (Y X) ∩ Y ∩ S ∩ V ⊥ ⊕ Q Q
⊥
⊥ = (Y X) ∩ Y ∩ S ∩ V ⊥ = (Y X) ∩ S ∩ V ⊥ . 1 = M1 . In fact we have M
2
Note that by using Proposition 4.5, we also have a one line proof of part (i) of Theorem 1.2. Indeed, when X is a reducing subspace, V = {0}, thus V ⊥ = L2 (R). Evidently, n ⊥ n n∈Z D (S ∩ V ) = n∈Z D S = Y . Proof of Theorem 1.2(ii). When Y is a reducing subspace, we have S = Y . Since Y X is affine, according to Proposition 4.5, Y = n∈Z D n (Y ∩ V ⊥ ). Now by Lemma 4.2, Y=
Dn Y ∩ V ⊥ = Y ∩ Dn V ⊥
n∈Z
=Y ∩
n∈Z
⊥
⊥ ⊆Y ∩ DnV DnV = Y ∩
n∈Z
n∈Z
n
D V
⊥ .
n∈Z
Thus n∈Z D n V ⊆ Y ⊥ . Note that by Lemma 4.3, n∈Z D n V is contained in any reducing space containing X, so n∈Z D n V ⊆ Y . Consequently k∈Z D k V ⊆ Y ∩ Y ⊥ = {0}. 2 We may argue with a slight modification of the proof of Theorem 1.2(ii), as follows. Observe that since S ⊆ Y always holds for affine subspace Y . By using Lemma 4.2, we have n∈Z
Dn S ∩ V ⊥ ⊆ Dn Y ∩ V ⊥ n∈Z
⊥
⊥ n n D V . D V =Y ∩ ⊆Y ∩ n∈Z
n∈Z
1630
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
n ⊥ = Y . Consequently n ⊥ Therefore, if n∈Z D (S ∩ V ) = Y , then Y ∩ ( n∈Z D V ) n Y ∩ ( n∈Z D V ) = {0}. So we have the following result. Corollary 4.6. Assume that X and Y are affine subspaces such that X ⊆ Y . Let Q and S be the maximal shift invariant subspaces contained in X and Y respectively and define V := span{T j (X Q) | j ∈ Z}. If Y X is an affine subspace, then Y ∩ ( n∈Z D n V ) = {0}. 5. The generator problem of affine subspaces As explained in the introductory section, the question as to whether every affine subspace is singly-generated is both nature and fundamental to the development of the wavelet theory for general affine subspaces. There seems to be circumstantial evidences for an affirmative answer as well as those that are against it. Recall that we show in Proposition 3.4 that for any natural number k, there is a purely non-reducing affine subspace X such that P is of length k, where P := Q DQ with Q being the maximal shift invariant subspace contained in X. Intuitively, with Q being the maximal SI subspace, it seems plausible that the length of P := Q DQ may enjoy some minimality property among the collection of all possible lengths of generating SI subspaces for a given affine subspace, or at least in some special cases. Yet we are unable either to prove it in general situation, or to find some specific supporting example. Among other things, a main obstacle seems to be the insufficiency of knowledge about the length of a shift invariant subspace. In this section, we are going to present a construction which favors an affirmative answer to the above mentioned question. There are some conceivable ways that our construction could help to reach an positive answer. In particular, if we can prove that the orthogonal complement of an affine subspace in another one is always affine, then at least in the case of purely non-reducing affine subspaces, our construction would indeed imply an affirmative answer. On the other hand, if the answer to the said question turns out to be negative, then our construction seems to offer a best case scenario. We will accomplish our construction through a series of lemmas. The conclusion well be stated at the end of this section, which leads easily to a proof of Theorem 1.3. The first four lemmas are about a useful partition of natural numbers. The first lemma is trivial and we omit its proof. Lemma 5.1. Let E = [ 12 , 1), then there is a collection of intervals {En,k | (n, k) ∈ ({0} ∪ N) × N} such that the following hold: (a) |En,k | > 0 for all (n, k) ∈ ({0} ∪ N) × N; (b) E n1 ,k1 ∩ En2 ,k2 = ∅ for any distinct pair of (n1 , k1 ), (n2 , k2 ) ∈ ({0} ∪ N) × N; (c) n∈{0}∪N,k∈N En,k = E. Lemma 5.2. Let E = [ 12 , 1) and {En,k | (n, k) ∈ ({0} ∪ N) × N} be as in Lemma 5.1. For each (j, n, k) ∈ N × ({0} ∪ N) × N, define Aj,n,k = {m ∈ N | m ∈ 2j En,k }. Then {Aj,n,k | n ∈ {0} ∪ N, j, k ∈ N} is a partition of the set N. Proof. Since [1, ∞) is the disjoint union of the intervals in {2j E | j ∈ N}. It follows that [1, ∞) is the disjoint union of the intervals in {2j En,k | n ∈ {0} ∪ N, j, k ∈ N}. This partition of [1, ∞) then induces the partition of N as described in the above. 2
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1631
Lemma 5.3. Let E = [ 12 , 1) and {En,k | (n, k) ∈ ({0} ∪ N) × N} be as in Lemma 5.1. Then for any fixed triple (p, n, k) ∈ N × ({0} ∪ N) × N, there is a j ∈ N, dependent on (p, n, k), such that |2j En,k | > 2(n + p) + 1. Proof. According to Lemma 5.1, |En,k | > 0 for all (n, k) ∈ ({0} ∪ N) × N. Thus limj →∞ |2j En,k | = limj →∞ 2j |En,k | = ∞. The conclusion follows immediately. 2 Lemma 5.4. Let E = [ 12 , 1) and {En,k | (n, k) ∈ ({0} ∪ N) × N} be as in Lemma 5.1. Then the following are true: (a) For each fixed (n, k) ∈ ({0} ∪ N) × N, there is a strictly increasing sequences of natural num(n,k) bers {lp }p∈N such that for distinct pair of (p1 , n1 , k1 ), (p2 , n2 , k2 ) ∈ N × ({0} ∪ N) × N, (n1 ,k1 ) (n ,k ) = lp22 2 . lp1 (b) For each fixed (n, k) ∈ ({0} ∪ N) × N, there is a strictly increasing sequence of natural (n,k) numbers {jl (n,k) }p∈N , dependant on the sequence {lp }p∈N , such that for all (p, n, k) ∈ p N × ({0} ∪ N) × N, jl (n,k)
2 p En,k > 2 n + l (n,k) + 1. p
(c) For each fixed (n, k) ∈ ({0} ∪ N) × N, there is a strictly increasing sequence of natural (n,k) numbers {ml (n,k) }p∈N , dependant on the sequence {lp }p∈N , such that for any distinct pair p of (p1 , n1 , k1 ), (p2 , n2 , k2 ) ∈ N × ({0} ∪ N) × N,
|m (n1 ,k1 ) − m (n2 ,k2 ) | > lp(n11 ,k1 ) + lp(n22 ,k2 ) + n1 + n2 . lp 1
lp 2
Proof. (a) Using Lemma 5.3, for each fixed (n, k) ∈ ({0} ∪ N) × N, we first choose a strict (n,k) (n,k) increasing sequence of natural numbers {wp }p∈N such that for each p ∈ N, |2wp En,k | > 1. (n,k)
This then implies that 2wp
En,k ∩ N is non-empty for all p ∈ N. Applying Lemma 5.3 again, (n,k)
(n,k)
(n,k)
for each p ∈ N, we choose lp ∈ 2wp En,k ∩ N. Since {wp }p∈N is strictly increasing, so (n,k) (n,k) is {lp }p∈N . Moreover, since {wp }p∈N is strictly increasing, by Lemma 5.2, we see that (n1 ,k1 )
for distinct pair of (p1 , n1 , k1 ), (p2 , n2 , k2 ) ∈ N × ({0} ∪ N) × N, 2wp1 2
(n ,k2 )
wp22
(n ,k ) lp11 1
En2 ,k2 . Thus by our way of construction, (b) It trivially follows from (a) and Lemma 5.3.
En1 ,k1 is disjoint from
(n ,k ) lp22 2 . = j (n,k)
(c) Note that according to (b), for each (p, n, k) ∈ N × ({0} ∪ N) × N, 2 lp En,k (thus also (n,k) Aj (n,k) ,n,k ) contains at least 2(n + lp ) + 1 consecutive natural numbers, therefore we may lp
choose a natural number ml (n,k) such that p
ml (n,k) − n + lp(n,k) , . . . , ml (n,k) , . . . , ml (n,k) + n + lp(n,k) ⊆ Aj (n,k) ,n,k . p
p
p
lp
2
Now we are ready to start the construction. For the sake of simplicity, we choose to first concentrate on purely non-reducing affine subspaces, thus avoiding some cumbersome technicality at the initial stage.
1632
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
Lemma 5.5. Let Q be the maximal SI subspace contained in a purely non-reducing affine subspace X. Denote P := Q DQ. Also assume that for any n ∈ {0} ∪ N, {fn,k }k∈N is a unit norm spanning set for D n P in the sense that fn,k = 1 for all k ∈ N and span{fn,k | k ∈ N} = D n P . (n,k) Further assume that {lp }p∈N and {ml (n,k) }p∈N are as in Lemma 5.4. Then the following are p true. (a) The function φ :=
p,n,k
1 2
m (n,k)
D
m (n,k) lp
lp
fn,k
n is well defined and φ ∈ ∞ n=0 D P = Q. (b) The singly generated shift invariant subspace M := span{T l φ | l ∈ Z} is contained in Q. (c) The affine subspace X := span{D j M | j ∈ Z} is contained in X. Proof. According to Lemma 5.4(c), for any distinct pair of (p1 , n1 , k1 ), (p2 , n2 , k2 ) ∈ N × ({0} ∪ N) × N, m (n1 ,k1 ) = m (n2 ,k2 ) . It follows that the numerical series lp 1
lp 2
p,n,k
1 2
m (n,k) lp
is convergent. Since fn,k = 1 for all (n, k) ∈ ({0} ∪ N) × N, we see that φ is well defined. The rest of the conclusion follows readily. 2 Lemma 5.6. Let X, Q, {fn,k }(n,k)∈({0}∪N)×N , X be as in Lemma 5.5. Then the following are true. (a) For any (n, k) ∈ ({0} ∪ N) × N, fn,k ⊆ PQ X . (b) For any m ∈ Z, D m Q = PD m Q X . Proof. If we assume that (a) is true, then (b) can be shown as its easy consequence. In fact, it follows from (a) that Q=
∞
D n P = span fn,k (n, k) ∈ {0} ∪ N × N ⊆ PQ X ⊆ Q.
n=0
Thus, for any m ∈ Z, D m Q = D m PQ X = D m PQ X = PD m Q D m X = PD m Q X . Note that in order to prove (a), it suffices to show that for any (n0 , k0 ) ∈ ({0} ∪ N) × N and ε > 0, there is a ψ ∈ X such that fn0 ,k0 − PQ ψ < ε.
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1633
To this end, fix (n0 , k0 ) ∈ ({0} ∪ N) × N and ε > 0. According to Lemma 5.4, it is feasible to choose a p0 ∈ N such that ∞ (n ,k0 )
l=lp00
1 < ε. 2l+1
−m (n0 ,k0 )
m (n0 ,k0 )
We then define ψ := 2 lp0 D lp0 φ. Evidently ψ ∈ X . Using the concrete expression of φ in Lemma 5.5, we write ψ in the following way.
ψ=
cp,n,k D
m (n,k) −m (n0 ,k0 ) lp
lp 0
fn,k ,
p,n,k m (n0 ,k0 )
m (n,k)
where cp,n,k = 2 lp0 /2 lp . Let us look at how PQ is japplied to each term in the above. First note that since n0 ∈ {0} ∪ N, fn0 ,k0 ∈ D n0 P ⊆ ∞ j =0 D P = Q. Thus clearly PQ D
m (n0 ,k0 ) −m (n0 ,k0 ) lp 0
lp 0
fn0 ,k0 = fn0 ,k0 .
Next we consider any (p, n, k) ∈ N × ({0} ∪ N) × N with the property that ml (n,k) < m (n0 ,k0 ) . p
According to Lemma 5.4, we have ml (n,k) − m (n0 ,k0 ) < −n0 − n − 1. lp 0
p
Thus the fact that fn,k ∈ D n P implies that D
m (n,k) −m (n0 ,k0 ) lp
lp 0
fn,k ∈
−n 0 −1
D j P ⊥ Q.
j =−∞
Therefore evidently PQ cp,n,k D
m (n,k) −m (n0 ,k0 ) lp
lp 0
fn,k = 0
when ml (n,k) < m (n0 ,k0 ) . p
Lastly, denote
lp 0
B := (p, n, k) ∈ N × {0} ∪ N × N ml (n,k) > m (n0 ,k0 ) . p
According to Lemma 5.4, for any (p, n, k) ∈ B, we have ml (n,k) − m (n0 ,k0 ) > lp(n00 ,k0 ) + lp(n,k) . p
Consequently,
lp 0
lp 0
lp 0
1634
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636 m (n,k) −m (n0 ,k0 ) lp PQ cp,n,k D lp 0 fn,k cp,n,k =
1 2
lp
1
< 2 (n ,k )
m (n,k) −m (n0 ,k0 )
(n ,k0 ) (n,k) +lp
lp00
lp 0
.
(n ,k )
Note that according to Lemma 5.4, lp11 1 = lp22 2 for any distinct pair of (p1 , n1 , k1 ), (p2 , n2 , k2 ) ∈ N × ({0} ∪ N) × N. Thus m (n,k) −m (n0 ,k0 ) lp lp 0 fn0 ,k0 − PQ ψ = fn0 ,k0 − PQ cp,n,k D fn,k p,n,k
1
(p,n,k)∈B
2
(n ,k ) (n,k) lp00 0 +lp
p,n,k
1 2
(n ,k ) (n,k) lp00 0 +lp
∞
(n ,k ) l=lp00 0
1 < ε. 2l+1
2
Lemma 5.7. Let X, Q, {fn,k }(n,k)∈({0}∪N)×N , X be as in Lemma 5.5. Then the following are true: (a) For each m ∈ Z, (X X ) ∩ D m Q = {0}. (b) For any m ∈ Z, X X does not contain any non-zero subspace that is invariant under m the group of unitary operators {T 2 l | l ∈ Z}. In particular, X X does not contain any non-zero shift invariant subspace. (c) X ∩ (X \ m∈Z D m Q)⊥ ⊆ X . Proof. (a) Suppose that for some m ∈ Z, f ∈ (X X ) ∩ D m Q. We readily have PD m Q f = f ⊥ X . Thus f ⊥ PD m Q X . Namely f ∈ (PD m Q X )⊥ . On the other hand, since D m Q = PD m Q X by Lemma 5.6, we see that f ∈ (X X ) ∩ D m Q also implies f ∈ (PD m Q X ). Consequently
⊥ f ∈ PD m Q X ∩ PD m Q X = {0}. (b) This follows readily from (a) and the maximality of Q as a shift invariant subspace in X. (c) From (a) it is clear that (X X ) ∩ ( m∈Z D m Q) = {0}. Therefore m D Q ∪ {0}. XX ⊆ X m∈Z
Consequently, ⊥
⊥ X = X ∩ X X ⊇ X ∩ X DmQ .
2
m∈Z
Let us summarize our construction so far. Proposition 5.8. Let X be a purely non-reducing affine subspace with Q as the maximal SI sub space in X. (Therefore X = m∈Z D m Q.) Then there exists a singly generated affine subspace X ⊆ X such that the following are true:
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
1635
(a) For any m ∈ Z, D m Q = PD m Q X . (b) For any m ∈ Z, (X X ) ∩ D m Q = {0}. Hence X X ⊆ (X \ m∈Z D m Q) ∪ {0}. (c) For any m ∈ Z, X X does not contain any non-zero subspace that is invariant under m the group of unitary operators {T 2 l | l ∈ Z}. In particular, X X does not contain any non-zero shift invariant subspace. We remark that for a general non-zero non-reducing affine subspace X, the construction is virtually the same. The only difference is that we have to choose and fix a suitable generating SI subspace for X first. For instance, by using (iii) of Theorem 1.1, one may first decompose X into the direct sum of a purely non-reducing X1 with Q1 being its maximal SI subspace and a nreducing subspace X2 . Now choose a shift invariant subspace Q2 ⊆ X2 such that Q2 = ∞ n=0 D P2 with P2 being a generating SI subspace for X2 . This can be done using the same technique as in the proof of (i) of Theorem 1.1 and we may even choose P2 to be singly generated, though this does not seems to have any significant affect to the resulting construction. Now denote Q := Q1 ⊕ Q2 and P := P1 ⊕ P2 where P1 = Q1 DQ1 . Similar purely non-reducing case, we still to the n P . Thus we may proceed exactly the have X = m∈Z D m Q, P = Q DQ and Q = ∞ D n=0 same way as in the purely non-reducing case and obtain virtually the same results, except now the resulting space X X may contain some shift invariant subspace, which necessarily must be contained in (X2 \ m∈Z D m Q2 ) ∪ {0}. We summarize the above discussion in the following theorem. Theorem 5.9. Let X be a non-zero non-reducing affine subspace with a direct sum decomposition and X = X1 ⊕ X2 where X1 is purely non-reducing with Q1 being its maximal SI subspace X2 is reducing with a shift invariant subspace Q2 ⊆ X2 such that Q2 = ∞ D n P2 with P2 n=0 being a generating SI subspace for X2 . (Therefore X2 = m∈Z D m Q2 .) Denote Q = Q1 ⊕ Q2 . (Therefore X = m∈Z D m Q.) Then there exists a singly generated affine subspace X ⊆ X such that the following are true: (a) For any m ∈ Z, D m Q = PD m Q X . (b) For any m ∈ Z, (X X ) ∩ D m Q = {0}. Hence X X ⊆ (X \ m∈Z D m Q) ∪ {0}. (c) For any m ∈ Z, any non-zero subspace thatis invariant under the group of unitary operators m {T 2 l | l ∈ Z} must be contained in (X2 \ m∈Z D m Q2 ) ∪ {0}. Finally, we give the proof of Theorem 1.3. Proof of Theorem 1.3. Let X be a purely non-reducing affine subspace. Let X be as in Theorem 5.9. According to the assumption, we have that X X is affine. Let X X = span{D n M | n ∈ Z} with M being a shift invariant subspace. By Proposition 5.8(c) we have M = {0}. Hence X = X is singly-generated. The last statement now follows from Corollary 1.3 in [13]. 2 References [1] M. Bownik, The structure of shift invariant subspaces of L2 (Rn ), J. Funct. Anal. 177 (2000) 282–309. [2] C. de Boor, R.A. DeVore, A. Ron, The structure of finitely generated shift-invariant spaces in L2 (Rd ), J. Funct. Anal. 119 (1994) 37–78. [3] P. Casazza, The art of frame theory, Taiwanese J. Math. 4 (2000) 129–201. [4] P. Casazza, Modern tools for Weyl–Heisenberg (Gabor) frame theory, Adv. Imag. Elect. Phys. 115 (2001) 1–127.
1636
Q. Gu, D. Han / Journal of Functional Analysis 260 (2011) 1615–1636
[5] O. Christensen, An Introduction to Frames and Riesz Bases, Appl. Numer. Harmon. Anal., Birkhäuser Boston, Inc., Boston, MA, 2003. [6] X. Dai, Y. Diao, Q. Gu, Subspaces with normalized tight frame wavelets in R, Proc. Amer. Math. Soc. 130 (2002) 1661–1667. [7] X. Dai, Y. Diao, Q. Gu, D. Han, Frame wavelets in subspaces of L2 (Rd ), Proc. Amer. Math. Soc. 130 (2002) 3259–3267. [8] X. Dai, Y. Diao, Q. Gu, D. Han, The existence of subspace wavelet sets, J. Comput. Appl. Math. 155 (1) (2003) 83–90. [9] X. Dai, D. Larson, Wandering vectors for unitary systems and orthogonal wavelets, Mem. Amer. Math. Soc. 134 (640) (1998), viii+68 pp. [10] X. Dai, S. Lu, Wavelets in subspaces, Michigan Math. J. 43 (1996) 81–98. [11] I. Daubechies, Ten Lectures on Qavelets, CBMS-NSF Regional Conf. Ser. in Appl. Math., vol. 61, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA, 1992. [12] R. Duffin, A. Schaeffer, A class of non-harmonic Fourier series, Trans. Amer. Math. Soc. 72 (1952) 341–366. [13] Q. Gu, D. Han, Wavelet Frames for (not necessarily reducing) Affine Subspaces, Appl. Comput. Harmon. Anal. 27 (2009) 47–54. [14] B. Han, On dual wavelet tight frames, Appl. Comput. Harmon. Anal. 4 (1997) 380–413. [15] D. Han, D. Larson, Frames, bases and, group representations, Mem. Amer. Math. Soc. 697 (2000). [16] H. Helson, Lectures on Invariant Subspaces, Academic Press, New York–London, 1964. [17] E. Hernández, G. Weiss, Guido, A First Course on Wavelets, Stud. Adv. Math., CRC Press, Boca Raton, FL, 1996. [18] R. Lorentz, W. Madych, On the closure of the union of nested subspaces of L2 (Rd ), in: Approximation Theory IX, vol. 2, Nashville, TN, 1998, in: Innov. Appl. Math., Vanderbilt Univ. Press, Nashville, TN, 1998, pp. 197–204. [19] R. Lorentz, W. Madych, A. Sahakian, Translation and dilation invariant subspaces of L2 (R) and multiresolution analyses, Appl. Comput. Harmon. Anal. 5 (1998) 375–388. [20] R. Lorentz, A. Sahakian, Subspaces generated by wavelet systems, Math. Notes 63 (1998) 260–263.
Journal of Functional Analysis 260 (2011) 1637–1681 www.elsevier.com/locate/jfa
Families of type III KMS states on a class of C ∗ -algebras containing On and QN A.L. Carey a , J. Phillips b,∗ , I.F. Putnam b , A. Rennie a a Mathematical Sciences Institute, Australian National University, Canberra, ACT, Australia b Department of Mathematics and Statistics, University of Victoria, Victoria, BC, Canada
Received 2 December 2009; accepted 28 December 2010
Communicated by Alain Connes
Abstract We construct a family of purely infinite C ∗ -algebras, Qλ for λ ∈ (0, 1) that are classified by their Kgroups. There is an action of the circle T with a unique KMS state ψ on each Qλ . For λ = 1/n, Q1/n ∼ = On , with its usual T action and KMS state. For λ = p/q, rational in lowest terms, Qλ ∼ = On (n = q − p + 1) with UHF fixed point algebra of type (pq)∞ . For any n > 1, Qλ ∼ = On for infinitely many λ with distinct KMS states and UHF fixed-point algebras. For any λ ∈ (0, 1), Qλ = O∞ . For λ irrational the fixed point algebras, are NOT AF and the Qλ are usually NOT Cuntz algebras. For λ transcendental, K1 (Qλ ) ∼ = K0 (Qλ ) ∼ = Z∞ , so that Qλ is Cuntz’ QN [Cuntz (2008) [16]]. If λ and λ−1 are both algebraic integers, the only On which appear are those for which n ≡ 3 (mod 4). For each λ, the representation of Qλ defined by the KMS state ψ generates a type IIIλ factor. These algebras fit into the framework of modular index theory/twisted cyclic theory of Carey et al. (2010) [8], Carey et al. (2009) [12], Carey et al. (in press) [5]. © 2011 Elsevier Inc. All rights reserved. Keywords: KMS state; IIIλ factor; Modular index; Twisted cyclic theory; K-theory
1. Introduction In this paper we introduce some new examples of KMS states on a large class of purely infinite C ∗ -algebras that were motivated by the ‘modular index theory’ of [8,5]. We were aiming * Corresponding author.
E-mail addresses: [email protected] (A.L. Carey), [email protected] (J. Phillips), [email protected] (I.F. Putnam), [email protected] (A. Rennie). 0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.031
1638
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
to find algebras that were not Cuntz–Krieger algebras (or the CAR algebra) and which were not previously known to be examples of this phenomenon, in order to explore the possibilities opened by [5]. These algebras, denoted by Qλ for 0 < λ < 1, are not constructed as graph algebras, but as “corner algebras” of certain crossed product C ∗ -algebras. The Qλ have similar structural properties to the Cuntz algebras, however there are important new features, such as ∼ Oq−p+1 as mentioned in the Abstract, (1) when λ = p/q is rational in lowest terms, then Qλ = (2) when λ is algebraic, the K-groups depend on the minimal polynomial (and its coefficients) of λ, (3) when λ is transcendental, Qλ ∼ = QN , Cuntz’ algebra [16]. We prove in Section 3 that the Qλ are purely infinite, simple, separable, nuclear C ∗ -algebras, so there is no nontrivial trace on them. Also in Section 3 we determine in many cases the Kgroups of these algebras and use classification theory to identify them when these algebras have the same K-groups as others found previously (these facts are summarised in the Abstract). As each Qλ comes equipped with a gauge action of the circle, our results thus give an uncountable family of distinct circle actions on QN , each with its own unique KMS state. Indeed, for all 0 < λ < 1, we find a unique KMS state [4], for this gauge action, and we prove in Section 4 that the GNS representation of Qλ associated to our KMS state generates a type IIIλ von Neumann algebra. The result of [8] that motivated this paper was the construction of a ‘modular spectral triple’ with which one may compute an index pairing using the KMS state. In [5] it was shown how modular spectral triples arise naturally for KMS states of circle actions and lead to ‘twisted residue cocycles’ using a variation on the semifinite residue cocycle of [10]. It is well known that such twisted cocycles cannot pair with ordinary K1 . In [8,12] a substitute was introduced which is called ‘modular K1 ’. The correct definition of modular K1 was found in [5], and there is a general spectral flow formula which defines the pairing of modular K1 with our ‘twisted residue cocycle’. There is a strong analogy with the local index formula of noncommutative geometry in the L1,∞ -summable case, however, there are important differences: the usual residue cocycle is replaced by a twisted residue cocycle and the Dixmier trace arising in the standard situation is replaced by a KMS-Dixmier functional. The common ground with [10] stems from the use of the spectral flow formula of [6] to derive the twisted residue cocycle and this has the corollary that we have a homotopy invariant. To illustrate the theory for these examples we compute, for particular modular unitaries in matrix algebras over the algebras Qλ , the precise numerical values arising from the general formalism. 2. The algebras Qλ for 0 < λ < 1 2.1. The C ∗ -algebras C ∗ (Γλ ) = C(Γˆλ ) and their K-theory We will construct our algebras Qλ as “corner” algebras in certain crossed product C ∗ -algebras but first we need some preliminaries. For 0 < λ < 1, let Γλ be the countable additive abelian subgroup of R defined by Γλ =
k=N k=−N
nk λ N 0 and nk ∈ Z . k
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1639
Loosely speaking, Γλ consists of Laurent polynomials in λ and λ−1 with integer coefficients. It is not only a dense subgroup of R, but is clearly a unital subring of R. Proposition 2.1. Let 0 < λ < 1. (1) If λ = p/q where 0 < p < q are integers in lowest terms, then Γλ = Z[1/n], where n = pq. (2) If λ and λ−1 are both algebraic integers, then Γλ = Z + Zλ + · · · + Zλd−1 is an internal direct sum where d 2 is the degree of the minimal (monic) polynomial in Z[x] satisfied by λ. (3) If λ is transcendental then, Γλ = k∈Z Zλk is an internal direct sum. √ √ (4) If λ = 1/ n with n 2 a square-free positive integer, then Γλ = Z[1/n] + Z[1/n] · n is an internal direct sum. (5) In general, if λ is algebraic with minimal polynomial, nλd + · · · + m = 0 over Z, then Z ⊕ Zλ ⊕ · · · ⊕ Zλd−1 ⊆ Γλ ⊆ Z
1 1 1 ⊕Z λ ⊕ ··· ⊕ Z λd−1 . mn mn mn
Hence, rank(Γλ ) := dimQ (Γλ ⊗Z Q) = d. Proof. In case (1), since gcd(p, q) = 1, there exist a, b ∈ Z so that 1 = ap + bq. Therefore, ap+bq 1 = aλ + b ∈ Γλ ; and similarly, p1 ∈ Γλ . Since, Γλ is a commutative ring, for any q = q m k, m ∈ Z with k 1 we have: nmk = (pq) k is in Γλ . That is, Z[1/n] ⊆ Γλ . On the other hand, for k 1 we have λk =
1 1 pk = p 2k = p 2k k ∈ Z[1/n] qk (pq)k n
λ−k =
1 1 qk = q 2k = q 2k k ∈ Z[1/n]. pk (pq)k n
and
That is, Z[1/n] = Γλ . In case (2), it is not hard to see the minimal polynomial of λ in Z[x] is not only monic, but also has constant term = ±1; say, p(λ) = λd + aλd−1 + · · · ± 1 = 0. Clearly, λ ∈ Z + Zλ + · · · + Zλd−1 . Since λ−1 p(λ) = 0, we also have λ−1 ∈ Z + Zλ + · · · + Zλd−1 . By an easy induction, we have λk ∈ Z + Zλ + · · · + Zλd−1 , for all k ∈ Z. Hence, Γλ = Z + Zλ + · · · + Zλd−1 . The sum is direct by the minimality of the degree of the minimal polynomial. In case (3) the sum is direct because if λ satisfied a Laurent polynomial over Z, then by multiplying by a high power of λ it would also satisfy a genuine polynomial over Z. Case (4) is an easy calculation which we leave to the reader. Case (5) is proved by similar 1 1 1 methods used in case (2). Again, the sum Z[ mn ] + Z[ mn ]λ + · · · + Z[ mn ]λd−1 is direct by the minimality of the degree of the minimal polynomial. 2
1640
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Proposition 2.2. Let 0 < λ < 1. (1) If λ = p/q is rational in lowest terms so that Γλ = Z[1/n], where n = pq, then
K0 C(Γˆλ ) = Z[1Γˆλ ] and K1 C(Γˆλ ) = Z[1/n]. (2) If λ and λ−1 are both algebraic integers, so that Γλ = Z + Zλ + · · · + Zλd−1 is an internal direct sum as above, then
even (Γλ ) = K0 C(Γˆλ ) =
d
k
(Γλ )
k=0, k even
and odd
ˆ K1 C(Γλ ) = (Γλ ) =
d
k (Γλ ).
k=1, k odd
(3) If λ is transcendental then,
even K0 C(Γˆλ ) = (Γλ ) =
∞
k
(Γλ )
k=0, k even
and odd
K1 C(Γˆλ ) = (Γλ ) =
∞
k (Γλ ).
k=1, k odd
√ (4) If λ = 1/ n with n 2 a square-free positive integer, then
K0 C(Γˆλ ) ∼ = Z ⊕ Z[1/n]
and K1 C(Γˆλ ) ∼ = Z[1/n] ⊕ Z[1/n].
(5) In general, if λ is algebraic with nλd + · · · + m = 0 over Z then the composition of the inclusions 1 1 1 ⊕Z λ ⊕ ··· ⊕ Z λd−1 Z ⊕ Zλ ⊕ · · · ⊕ Zλd−1 ⊆ Γλ ⊆ Z mn mn mn induces an inclusion on K-theory, so that both of the following maps are one-to-one even
d
Z ∼ = K0 C ∗ Z ⊕ · · · ⊕ Zλd−1 → K0 C(Γˆλ )
and odd d
Z ∼ = K1 C ∗ Z ⊕ · · · ⊕ Zλd−1 → K1 C(Γˆλ ) .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1641
ˆ Proof. In case (1), Γλ = lim −→ Z where each map is multiplication by n, so that Γλ = lim ←− T. Since K0 (C(T)) = Z[1] is generated by multiples of the trivial rank one bundle, the maps in the direct ˆ limit K0 (C(Γˆλ )) = lim −→ K0 (C(T)) are the identity map in each case, so that K0 (C(Γλ )) = Z[1]. k On the other hand, K1 (C(T)) is generated by the maps on C(T), z → z , and each map in the direct limit is the same map induced by z → zn . Thus, K1 (C(Γˆλ )) = Z[1/n]. Cases (2) and (3) are well-known facts about the K-theory of tori. Case (4): first one uses item (4) of the previous proposition, then the proof of case (1) above in order to apply Proposition 2.11 of [31]. The proof is finished off with the easily proved observation that Z[1/n] ⊗ Z[1/n] = Z[1/n]. 1 ]⊕ Case (5) the composed embedding is just containment: Z ⊕ Zλ ⊕ · · · ⊕ Zλd−1 ⊆ Z[ mn 1 1 d−1 ∗ ∗ Z[ mn ]λ ⊕ · · · ⊕ Z[ mn ]λ . Since we know that K∗ (C (Z)) → K∗ (C (Z[1/mn])) is one-toone (even an isomorphism after tensoring with Q), an application of C. Schochet’s Künneth Theorem [31], shows that the induced map on K-theory:
∗
1 1 1 d−1 ∗ d−1 ⊕Z λ ⊕ ··· ⊕ Z λ → K∗ C Z K∗ C Z ⊕ Zλ ⊕ · · · ⊕ Zλ mn mn mn is one-to-one (even an isomorphism after tensoring with Q).
2
Corollary 2.3. If λ is algebraic with minimal polynomial of degree d so that rank(Γλ ) = d then
even
odd d
Zd = 2d−1 = rank Z rank K0 C(Γˆλ ) = rank = rank K1 C(Γˆλ ) . Proof. For each N d − 1, let ΓN = Zλ−N + · · · + ZλN ⊆ Γλ . Then each ΓN is a finitely generated torsion free (and hence free abelian) subgroup of Γλ . Moreover, Z ⊕ Zλ ⊕ · · · ⊕ Zλd−1 ⊆ ΓN ⊆ Γλ ⊆ Z
1 1 1 ⊕Z λ ⊕ ··· ⊕ Z λd−1 , mn mn mn
so that by tensoring with Q the induced inclusions are all equalities, and hence all are Q-vector spaces of dimension d. Since ΓN is free abelian, ΓN ∼ = Zd . Now,
even
d−1 Zd ∼ K0 C ∗ (ΓN ) ∼ = = Z2 = K0 C Td ∼ and odd d
d
d−1 ∼ Z ∼ C T K K1 C ∗ (ΓN ) ∼ = = Z2 . = 1
So, each Ki (C ∗ (ΓN )) ⊗Z Q is a Q-vector space of dimension 2d−1 and the map:
K∗ C ∗ Z ⊕ Zλ ⊕ · · · ⊕ Zλd−1 ⊗Z Q → K∗ C ∗ (ΓN ) ⊗Z Q is one-to-one and hence an isomorphism of Q-vector spaces. Since the corresponding isomorphism onto K∗ (C ∗ (ΓN +1 )) ⊗Z Q factors through K∗ (C ∗ (ΓN )) ⊗Z Q the maps
1642
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
K∗ C ∗ (ΓN ) ⊗Z Q → K∗ C ∗ (ΓN +1 ) ⊗Z Q are all isomorphisms. Now, C ∗ (Γλ ) = limN C ∗ (ΓN ) and so Ki (C ∗ (Γλ )) = limN Ki (C ∗ (ΓN )), and therefore,
d−1 Ki C ∗ (Γλ ) ⊗Z Q = lim Ki C ∗ (ΓN ) ⊗Z Q ∼ = Q2 N
for each i = 1, 2.
2
Now, let Gλ ⊃ G0λ be the following countable discrete groups of matrices: Gλ =
λn 0
a 1
1 a a ∈ Γλ , n ∈ Z ⊃ G0λ = a ∈ Γλ . 0 1
Of course, G0λ is isomorphic to the additive group Γλ , and Gλ is semidirect product of Z acting on G0λ ∼ = Γλ . We let Gλ act on R as an “ax + b” group, noting that the action leaves Γλ invariant. That is,
for t ∈ R and g =
λn 0
a 1
∈ Gλ
define g · t := λn t + a.
Notation. For such an element g ∈ Gλ we will use the notation g := [λn : a] in place of the matrix for g and |g| := det(g) = λn for the determinant of g. Note: G0λ = {g ∈ Gλ | |g| = 1} Gλ . We use this action on R to define the transpose action α of Gλ on L∞ (R):
αg (f )(t) = f g −1 t for f ∈ L∞ (R) and t ∈ R. Now let C0λ (R) be the separable C ∗ -subalgebra of L∞ (R) generated by the countable family of projections X[a,b) where a, b ∈ Γλ . That is, C0λ (R) = closure
n
ck X[ak ,bk ) ck ∈ C; ak , bk ∈ Γλ
.
k=1
We observe that C0λ (R) is a commutative AF-algebra. Clearly, C0 (R) ⊂ C0λ (R) and since αg (X[a,b) ) = X[g(a),g(b)) both are invariant under the action α of Gλ . We define the separable C ∗ -algebras Aλ ⊃ Aλ0 as the crossed products:
Aλ = Gλ α C0λ (R) = Z G0λ α C0λ (R) ⊃ Aλ0 = G0λ α C0λ (R). Since Gλ and G0λ are amenable these equal the reduced crossed products by [26, Theorem 7.7.7]. λ (R) denote the dense ∗-subalgebra of C λ (R) consisting of finite linear combinations Let C00 0 of the generating projections, X[a,b) , and let Aλc ⊂ lα1 (Gλ , C0λ (R)) ⊂ Aλ denote the dense λ (R). Similarly we ∗-subalgebra of Aλ consisting of finitely supported functions x : Gλ → C00 λ λ define A0,c ⊂ A0 .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1643
Proposition 2.4. For any λ ∈ (0, 1), Aλ0 and Aλ are in the bootstrap class Nnuc . Proof. Since Aλ = Z Aλ0 , it suffices to see that Aλ0 is in Nnuc . By the proof of the previous corollary, we can write Γλ as an increasing union of finitely generated torsion-free abelian groups ΓN which are free abelian group of finite rank so that Aλ0 is the direct limit of crossed products of the separable commutative C ∗ -algebra C0λ (R) by Zmi and hence is in Nnuc . 2 Notation. We remind the reader of the crossed product operations in our setting (Definition 7.6.1 of [26]) together with some particular notations we use. To this end, let x, y ∈ lα1 (Gλ , C0λ (R)) then we have the product and adjoint formulas: (x · y)(g) =
x(h)αh y h−1 g
for g ∈ Gλ ;
h∈Gλ
∗
for g ∈ Gλ . x ∗ (g) = αg x g −1 If x ∈ lα1 (Gλ , C0λ (R)) is supported on the single element g ∈ Gλ and x(g) = f ∈ C0λ (R), then we write x = f · δg . Since Aλc (respectively, Aλ0,c ) is dense in Aλ (respectively, Aλ0 ) we often do our calculations with these elements and we have the following easily verified calculus for them. Lemma 2.5. Let f1 · δg1 , f2 · δg2 , f · δg ∈ Aλc , then: (f1 · δg1 ) · (f2 · δg2 ) = f1 αg1 (f2 ) · δg1 g2 . (f · δg )∗ = αg −1 (f¯) · δg −1 . f · δg is self-adjoint if and only if f is self-adjoint and g = 1. f · δg is a projection if and only if f is a projection and g = 1. f · δg is a partial isometry if and only if |f | is a projection. The product of partial isometries of the form X[a,b) · δg is a partial isometry of the same form. (7) Consider the partial isometry, v = X[a,b) · δg . Given that v has this form, any two of the following: vv ∗ , v ∗ v, g completely determine the interval [a, b) and the element g.
(1) (2) (3) (4) (5) (6)
Definition 2.6. Let e ∈ Aλ0,c be the projection e = X[0,1) · δ1 . We define the separable unital C ∗ -algebras: Qλ := eAλ e ⊃ eAλ0 e =: F λ . We will also have occasion to use the dense subalgebras Qλc := eAλc e, and Fcλ := eAλ0,c e. Proposition 2.7. The orthogonal family of projections en = X[n,n+1) · δ1 ∈ Aλ0 for n ∈ Z are mutually equivalent by partial isometries in Aλ0 of the form Vn,k := X[n,n+1) · δgn−k where gn−k = −1 [1 : (n − k)]. Moreover, the finite sums EN := N n=−N en = X[−N,N ) · δ1 form an approximate identity for Aλ so that
Aλ ∼ = Qλ ⊗ K l 2 (Z)
and Aλ0 ∼ = F λ ⊗ K l 2 (Z) .
1644
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Proof. By Lemma 2.5, one easily calculates that for each pair n, k ∈ Z,
∗ = en Vn,k Vn,k
∗ and Vn,k Vn,k = ek .
Now for each positive integer N if we have y ∈ Aλc that satisfies supp(yh ) ⊆ [−N, N ) for all h, then using Lemma 2.5 again we see that EN · y = y. Since the collection of all such elements y ∈ Aλc is dense in Aλ , we see that the increasing sequence of projections {EN } form an approximate identity for Aλ . 2 Corollary 2.8. It follows from Proposition 2.4.7 of [30] and Proposition 2.4 that for any λ ∈ (0, 1), Qλ and F λ are both in Nnuc . Lemma 2.9. (Cf. [27, Proposition 3.1, Lemma 3.6].) The algebra C0λ (R) is a commutative separable AF algebra consisting of all functions f : R → C which vanish at ∞ and: are right continuous at each x ∈ Γλ ; have a finite left-hand limit at each x ∈ Γλ ; and are continuous λ (R) (the space of all nonzero ∗-homomorphisms: at each x ∈ (R \ Γ ). Moreover, if φ ∈ C λ
0
C0λ (R) → C) then there exists a unique x0 ∈ R such that: (1) if x0 ∈ (R \ Γλ ) then φ(f ) = f (x0 ) for all f ∈ C0λ (R), (2) if x0 ∈ Γλ then either ⎧ ⎨ φ(f ) = f (x0 )
for all f ∈ C0λ (R),
−
⎩ φ(f ) = f (x0 ) = lim− f (x) x→x0
or
for all f ∈ C0λ (R).
Proof. Since generating functions for C0λ (R) satisfy each of the properties above which are clearly preserved by passing to uniform limits, we see that any function in C0λ (R) satisfies these properties. Conversely, it is easy to show that any function satisfying these properties can be uniformly approximated by a finite linear combination of the generators. The remainder of the proof is given in [27, Lemma 3.6]. 2 λ Notation. We denote the dual space, C 0 (R) by Rλ and endow it with the relative weak-∗ topology, that is the topology of pointwise convergence on C0λ (R). Of course, Rλ is a locally compact Hausdorff space, and C0λ (R) ∼ = C0 (Rλ ). Proposition 2.10. The algebras Aλ and Aλ0 (and hence Qλ and F λ ) are simple C ∗ -algebras. Moreover, Aλ is purely infinite and hence so is Qλ . Proof. Now, both Gλ and G0λ act on C0λ (R) as countable discrete groups of outer automorphisms. Thus, we can apply Theorem 3.2 of [18] once we check that neither action has any nontrivial invariant ideals in C0λ (R) and that the actions are properly outer in the sense of Definition 2.1 of [18]. To do this we look at the induced action of Gλ and G0λ on Rλ . So, for g ∈ Gλ we have g acting on Rλ via g(φ) = φ ◦ αg−1 so that for φ = φx given by evaluation at x ∈ R, we have as expected g(φx ) = φg(x) . Now, if x ∈ Γλ we use the notation φx− to denote the ∗-homomorphism
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1645
φx− (f ) = f − (x) = f (x− ) = limy→x− f (y). One easily checks that since g(x) ∈ Γλ , we have g(φx− ) = φg(x)− . Next we claim that each of the sets {φm | m ∈ Γλ } and {φm− | m ∈ Γλ } is dense in Rλ in the relative weak-∗ topology. For example, we show that the second set is dense. To approximate φx for some x ∈ R we let {mn } be a sequence in Γλ converging to x from the right in R. Let f ∈ C0λ (R) so that f is right continuous at x. One easily shows that |φmn− (f ) − φx (f )| → 0; that is, the sequence {φmn− } converges to φx in the relative weak-∗ topology. It is easy to see that the action of G0λ on Rλ has dense orbits, and so, of course, the action of Gλ has dense orbits also. This implies that the actions of G0λ and Gλ on C0λ (R) have no nontrivial invariant ideals since the induced action on Rλ has no nontrivial invariant closed sets. We complete the proof by showing that the action is properly outer in the sense of Definition 2.1 of [18]. Since there are no nontrivial α-invariant ideals and C0λ (R) is commutative this is the condition that for each g = 1 and each nonzero closed two sided ideal I invariant under αg we have (αg − Id)|I = 2. Since I is nonzero there is a nonempty open subset, O of Rλ so that Iˆ = O. But since g = 1 and O is not finite there exists y ∈ O such that g(y) = y and g(y) ∈ O. Let x = g(y) ∈ O so that g −1 (x) = y ∈ O and x = g −1 (x). So we can choose a continuous compactly supported real-valued function f on O with f (x) = 1, f (g −1 (x)) = −1 and f = 1. But then f ∈ I and
2 (αg − Id)|I (αg − Id)(f ) = αg (f ) − f f g −1 (x) − f (x) = 2. Now that we know Aλ is simple, we can easily apply Theorem 9 of [22] to conclude that Aλ satisfies hypothesis (v) of Proposition 4.1.1 (p. 66) of [30]. For simple C ∗ -algebras, this is equivalent to being purely infinite by Definition 4.1.2 of [30]: the authors of [22] had used one of the earlier definitions of purely infinite in their paper (namely, hypothesis (v)). By Proposition 4.1.8 of [30] Qλ is also purely infinite. 2 Corollary 2.11. It follows from Corollaries 8.2.2 and 8.4.1 (Kirchberg–Phillips) of [30] and the fact that Aλ is stable that for any λ ∈ (0, 1), Aλ is classified up to isomorphism (among Kirchberg algebras in Nnuc ) by its K-theory. Since we need to calculate with elements of Qλ and F λ , we make the following observations. Lemma 2.12. Now, Qλ (respectively, F λ ) is the norm closure of finite linear combinations of the elements of the form e(X[a,b) · δg )e, where g ∈ Gλ (respectively, g ∈ G0λ ), henceforth called the generators. Thus, we calculate: (1) If f · δg ∈ Aλ (respectively, f · δg ∈ Aλ0 ) where f ∈ C0λ (R), then e(f · δg )e = X[a,b) f · δg
where [a, b) = [0, 1) ∩ g(0), g(1) .
(2) Thus, for g ∈ Gλ (respectively, g ∈ G0λ ) f · δg is in Qλ (respectively, F λ ) iff supp(f ) ⊆ [0, 1) ∩ [g(0), g(1)). In particular, for g ∈ Gλ (respectively, g ∈ G0λ ) X[a,b) · δg is in Qλ (respectively, F λ ) iff [a, b) ⊆ [0, 1) ∩ [g(0), g(1)).
1646
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Proof. The first item is an easy calculation using part (1) of Lemma 2.5 and the fact that αg (X[a,b) ) = X[g(a),g(b)) . The second item follows easily from the first. 2 Proposition 2.13. If λ is rational, then Aλ0 and F λ are AF-algebras. In particular, if λ = p/q where 0 < p < q are in lowest terms, then F λ is the UHF algebra n∞ where n = pq. Moreover, the minimal projections in the finite-dimensional subalgebras can all be chosen from the canonical commutative subalgebra C0λ (R) · δI . Proof. We have shown in Proposition 2.1 that if λ = p/q where 0 < p < q are in lowest terms, then Γλ = Z[1/n], where n = pq. Now, any element in Z[1/n] has the form m/nk = m(1/nk ) where k 1. Therefore any of the generating partial isometries X[a,b) · δ[1:c] ∈ Aλ0 can (by bringing a, b and c to a common denominator) be written (assuming c > 0) as a finite linear combination of partial isometries of the form X[l/nk ,(l+1)/nk ) · δ[1:1/nk ] . For partial isometries in F λ we would have to restrict 0 l nk − 1 and such partial isometries generate an nk by nk matrix subalgebra of F λ . It should now be clear that F λ is a UHF algebra of type n∞ . 2 At this point we define some special elements in Qλ which behave very much like the isometries Sμ ∈ On , except for the fact that some of them are not isometries. Definition 2.14. Fix 0 < λ < 1 and let k be a positive integer. Define mk to be the unique positive integer satisfying: mk λk < 1 (mk + 1)λk . For 0 m mk define partial isometries Sk,m ∈ Qλ via: Sk,m = X[mλk ,(m+1)λk ) · δgk,m
where gk,m = λk : mλk .
Note: for m < mk the Sk,m are actually isometries, and Sk,mk is an isometry iff 1 = (mk + 1)λk . Remarks. The defining inequalities mk λk < 1 (mk + 1)λk for the positive integer mk are equivalent to: 0 < λ−k − mk 1. In particular, these differences are positive and bounded above by 1. In the case of Q1/n we have mk = nk − 1. Generally we have mk1 mk < 1 (mk + 1) (m1 + 1)k . Lemma 2.15. With the previously defined elements we have ∗ Sk,m = X[0,1) · δg −1
k,m
∗ and Sk,m = X[0,λ−k −mk ) · δg −1 k
−1 where for all m, gk,m = λ−k : −m .
k,mk
∗ S ∗ Moreover, for 0 m < mk , Sk,m k,m = X[0,1) · δ1 = e while Sk,mk Sk,mk = X[0,λ−k −mk ) · δ1 . ∗ ∗ = X[mk λk ,1) · δ1 , so Finally, for 0 m < mk , Sk,m Sk,m = X[mλk ,(m+1)λk ) · δ1 while Sk,mk Sk,m k that mk m=0
∗ Sk,m Sk,m = X[0,1) · δ1 = e.
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1647
Proof. These are just straightforward calculations based on Lemma 2.5 which we leave to the reader. 2 Theorem 2.16. For each λ with 0 < λ < 1, consider the partial isometries S1,m for m = 0, . . . , m1 where m1 λ < 1 (m1 + 1)λ. For m < m1 , S1,m is an isometry and 1, m1 ∗ 1/n ∼ O , = n m=0 S1,m S1,m = 1. For λ = 1/n, m1 = n − 1, S1,m1 is also an isometry, and Q the usual Cuntz algebra. Proof. The first statement is clear. With λ = 1/n we have inside Q1/n , n isometries one for each m = 0, 1, . . . , (n − 1) defined by Sm = X[ m , m+1 ) · δgm n
n
where gm = [1/n : m/n]
and so ∗ Sm = X[0,1) · δg −1 m
−1 where gm = [n : −m].
Using Lemma 2.12, we easily see that for each m, Sm ∈ Q1/n . Then, using item (1) of Lemma 2.5 we calculate ∗ Sm = X[0,1) · δ1 = e Sm
∗ and Sm Sm = X[ m , m+1 ) · δ1 n
n
and so n−1
∗ Sm Sm = X[0,1) · δ1 = e.
m=0
Since e is the identity of Q1/n , we have constructed a unital copy of On inside Q1/n . Now one shows by induction that for each k > 0 the product of exactly k of these n isometries has the form Sk,m where Sk,m has the same defining equation as Sm above but with nk in place of n and ∗ =X m = 0, 1, . . . , (nk − 1). These new isometries have range projections Sk,m Sk,m [ m , m+1 ) · δ1 nk
nk
which therefore lie in this copy of On . By adding up some of these projections, we can get any projection of the form X[a,b) · δ1 where 0 a < b 1 and both a, b have the form m/nk . But any element a ∈ Γ1/n can be written as a = nmk for a sufficiently large k 0 and some m ∈ Z depending on k, and any pair a, b can be brought to a common denominator nk . Hence any projection of the form X[a,b) · δ1 in Q1/n is in this copy of On . Now, a straightforward calculation gives us: k −1 n
m=1
∗ Sk,m Sk,m−1
=
k −1 n
m=1
X[ m+1 , m+2 ) · δ[1:1/nk ] = X[1/nk ,1) · δ[1:1/nk ] ∈ On . nk
nk
(1)
Finally, let X[a,b) · δg ∈ Q1/n be an arbitrary generator. By taking adjoints if necessary we can assume that g has the form g = [nk : ∗] where k 0. Since Sk,0 is an isometry in On it suffices to prove that Sk,0 (X[a,b) · δg ) ∈ On . That is, we are reduced to the case g = [1 : c] and again
1648
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
by taking adjoints if necessary we can assume that c 0. The case c = 0 is done and so we can assume that c > 0. So (with possibly new a, b) we have X[a,b) · δ[1:c] where 0 < c 1 and [a, b) ⊆ [0, 1) ∩ [c, c + 1) = [c, 1). But, X[a,b) · δ[1:c] = X[a,b) X[c,1) · δ[1:c] = X[a,b) · δ1 X[c,1) · δ[1:c] and we already know that X[a,b) · δ1 ∈ On . Therefore it suffices to see that X[c,1) · δ[1:c] ∈ On . However, c = l/nk for some 0 < l < nk and so X[c,1) · δ[1:c] = X[l/nk ,1) · δ[1:l/nk ] = (X[1/nk ,1) · δ[1:1/nk ] )l which is in On by Eq. (1). Since all generators for Q1/n are in On we’re done.
2
2.2. K-theory of Qλ for λ rational Since Aλ0 is stable and stably isomorphic to the UHF algebra F λ , each of its projections is equivalent to one in some finite-dimensional subalgebra and hence to some projection in C0λ (R), and in this case the trace induces an isomorphism from K0 (Aλ0 ) onto Γλ = Z[1/(pq)] ⊂ R. This isomorphism carries the projection e = X[0,1) · δ1 which is the identity of Qλ and F λ onto 1 ∈ Z[1/(pq)]. Now, since Aλ0 is AF, K1 (Aλ0 ) = {0}, and since Aλ = Z λ Aλ0 we can use the Pimsner–Voiculescu exact sequence to calculate K∗ (Aλ ) = K∗ (Qλ ). When we do this we get
K1 Qλ = {0} and K0 Qλ = Z 1/(pq) /(1 − λ)Z 1/(pq) . Proposition 2.17. For λ rational with λ = p/q in lowest terms, we have
K1 Qλ = {0} and K0 Qλ ∼ = Z 1/(pq) /(1 − λ)Z 1/(pq) ∼ = Z(q−p) . Proof. By Proposition 2.1, Γλ = Z[1/(pq)], so we must show that
Z 1/(pq) / 1 − 1/(pq) Z 1/(pq) ∼ = Z(q−p) . Since (q −p) = (1−p/q)q and every element of Z[1/(pq)] is of the form m/(pq)N , it is easy to see that (q − p)Z[1/(pq)] = (1 − p/q)Z[1/(pq)]. Now, (q − p) and (pq)N are relatively prime for any N and so there exist a, b ∈ Z so that 1 = a(q − p) + b(pq)N and hence m/(pq)N = (q − p)am/(pq)N + mb. That is, m/(pq)N and mb represent the same element in the quotient. So, every element in the quotient has an integer representative. Two integers c, d represent the same element in the quotient if and only if c −d = (p −q)n/(pq)N , or (c −d)(pq)N = n(q −p). But then (c − d) = (c − d) a(q − p) + b(pq)N = (c − d)a(q − p) + b(c − d)(pq)N = (c − d)a + bn (q − p). That is, c, d represent the same element in Z/(q − p)Z = Z(q−p) . On the other hand if (c − d) is in (q − p)Z then clearly, [c] = [d] in Z[1/(pq)]/(1 − (1/(pq)))Z[1/(pq)] and we are done. 2 Corollary 2.18. If λ = p/q in lowest terms, then
F λ = F p/q ∼ = U H F (pq)∞ and Qλ = Qp/q ∼ = O(q−p+1) .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
In particular, if λ =
k k+1
1649
then
∞
Fλ ∼ and Qλ ∼ = U H F k(k + 1) = O2 .
Proof. Since each Qλ is separable, nuclear, simple, purely infinite and in the bootstrap category Nnuc once we show that the class of the identity e ∈ Qλ is a generator for K0 (Qλ ) = Z/(q − p)Z, the Kirchberg–Phillips Classification Theorem, Theorem 8.4.1 of [30], shows that Qλ ∼ = O(q−p+1) . To this end we observe that since e is mapped to 1 in Z[1/pq], we must show that [1] is a generator for K0 (Qλ ) = Z[1/pq]/(1 − (p/q))Z[1/pq]. Now, by the proof of the previous proposition, k[1] = [k · 1] = 0 ∈ Z[1/pq]/(1 − (p/q))Z[1/pq] if and only if [k · 1] = 0 ∈ Z/(q − p)Z if and only if k − 0 = m(q − p) for some m ∈ Z if and only if k is a multiple of (q − p). That is, [1], [2 · 1], . . . , [(q − p − 1) · 1] are all nonzero in K0 (Qλ ) = Z/(q − p)Z and hence [1] is a generator. 2 2.3. The K-theory of the algebras Aλ0 for λ irrational The case λ rational is much simpler, and while it does fit into the following scheme, it does not need this deeper machinery. Initially, we (and others) believed that the algebras Aλ0 were AF algebras when λ is irrational. In fact we will show that Aλ0 is never AF when λ is irrational. We will set up our examples to fit the situation on p. 1487 of [29] so that we can apply the six-term exact sequence of Theorem 2.1 on p. 1489 of [29]. We let Γ = Γλ ∼ = G0λ . Thus, Γ ⊂ R is a countable dense subgroup of R which acts on R by translations. Before looking at the crossed product of Γ acting on C0λ (R) = C0 (Rλ ) (which gives us Aλ0 ) we first consider the crossed product of Γ acting on C0 (R). Since Γ acts on R by translation we can Fourier transform to get an isomorphism: ˆ C(Γˆ ). Γ C0 (R) ∼ =R Then, by Connes’ Thom isomorphism we get for i = 0, 1:
ˆ C(Γˆ ) ∼ Ki Γ C0 (R) ∼ = Ki+1 C(Γˆ ) . = Ki R Proposition 2.19. The composition:
∼
i∗
= ˆ C(Γˆ ) − → K1 Γ C0 (R) − → K1 R → K0 C(Γˆ ) K1 C0 (R) − takes the generator [u] ∈ K1 (C0 (R)) = Z · [u]; where u is the Bott element in C0 (R)1 defined by ˆ u(t) = 1+it 1−it ; to [1Γˆ ] where 1Γˆ is the identity function in C(Γ ). Proof. We first work on the right-hand side of this sequence of maps. Let u(t) = 1 + ε(t). Now, by the proof of Connes’ Thom isomorphism, the mapping:
K0 C(Γˆ ) ⊗Z K1 C0 (R) → K1 R C(Γˆ ) takes the element, [1Γˆ ] ⊗ [u], to the class [1 + (convolution by εˆ · 1Γˆ )]. Now the left-hand side
1650
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
of this displayed mapping is naturally isomorphic to K0 (C(Γˆ )), via:
K0 C(Γˆ ) ⊗Z K1 C0 (R) = K0 C(Γˆ ) ⊗Z Z · [u] = K0 C(Γˆ ) · [u] ∼ = K0 C(Γˆ ) . Thus, [1Γˆ ] in K0 (C(Γˆ )) gets mapped to the class [1 + (convolution by εˆ · 1Γˆ )] by the Thom isomorphism. On the other hand, the map K1 ((C0 (R))1 ) → K1 ((Γ C0 (R))1 ) takes [u] → [δ0 · ε + 1] and by the Fourier transform this goes to [(convolution by εˆ · 1Γˆ ) + 1] in K1 (R C(Γˆ )). Combining these we get
1
1 ∈ Z → [u] ∈ Z · [u] = K1 C0 (R) = K1 C0 (R) → [1Γˆ ] ∈ K0 C(Γˆ ) .
2
Now, by Proposition 2.1 we know Γ in many cases so that these last groups are quite computable. In the notation of [29] we define the transformation groupoids: G := Rλ Γ,
G := R Γ,
and H := Γ Γ.
Then, Aλ0 = Cr∗ (G) is the reduced C ∗ -algebra of G; Γ C0 (R) = Cr∗ (G ) is the reduced C ∗ algebra of G ; and K(l 2 (Γ )) is the reduced C ∗ -algebra of H . By the proof of Proposition 2.10 there is a continuous proper surjective map: Rλ → R, where points in R which are not in Γ each have a single pre-image, while points γ ∈ Γ have exactly two pre-images in Rλ , which we denote by γ − and γ + . Thus, there are two disjoint embeddings of Γ in Rλ : i0 , i1 : Γ → Rλ :
i0 (γ ) = γ − ,
i1 (γ ) = γ + .
Now in order to mesh with the notation of [29], we let Y := Γ with the equivalence relation, “=”; X := Rλ , with the equivalence relation (i0 (γ ) ∼ i1 (γ )); and quotient π : X → X := R where X = X/(i0 (γ ) ∼ i1 (γ )) = R; while the image of the groupoid G = Rλ × Γ = X × Γ under the surjective mapping Rλ → R, is G := R × Γ = X × Γ . Heuristically, a “factor groupoid”. We represent each of these three C ∗ -algebras on H := l 2 (Γ + ) ⊕ l 2 (Γ − ) where Γ ± = {γ ± | γ ∈ Γ } in the following way. First we denote the natural orthonormal basis elements of H by δa + and δa − for each a ∈ Γ . Now the unitary representation U of Γ on H is Uγ (δa ± ) = δ(a−γ )± . The actions of C0 (Rλ ), C0 (R), and C0 (Γ ) on H are as follows for f1 ∈ C0 (Rλ ), f2 ∈ C0 (R), f3 ∈ C0 (Γ ), and δa ± ∈ H
π1 (f1 )(δa ± ) = f1 a ± δa ± ,
π2 (f2 )(δa ± ) = f2 (a)δa ± ,
π3 (f3 )(δa ± ) = f3 (a)δa ± .
These three covariant pairs of representations, (π1 , U ), (π2 , U ), and (π3 , U ) define representations of Cr∗ (G) = Aλ0 , Cr∗ (G ) = Γ C0 (R), and Cr∗ (H ) = K(l 2 (Γ )) respectively on H. Since each of these C ∗ -algebras is simple these representations are faithful. Now, one checks that the hypotheses of Theorem 2.1 of [29] are satisfied. As in [28,29] one shows that the two mapping cone algebras of the inclusions:
Cr∗ G = Γ C0 (R) → Aλ0 = Cr∗ (G) and
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1651
Cr∗ (H ) → Cr∗ (H ) ⊕ Cr∗ (H ) : x → (x, x) have isomorphic K-theory. One then pastes these isomorphisms into the mapping cone long exact sequence for Cr∗ (G ) = Γ C0 (R) → Aλ0 = Cr∗ (G). Next one observes that for any C ∗ algebra, B the diagonal embedding B → B ⊕ B induces the diagonal embedding K∗ (B) → K∗ (B) ⊕ K∗ (B) with quotient isomorphic to K∗ (B) (this is true for any abelian group). This implies that K∗ (B) ∼ = K∗+1 (M(B, B ⊕ B)) so that we get the six-term exact sequence from [29]: K1 (Cr∗ (H ))
K0 (Cr∗ (G ))
K0 (Cr∗ (G))
K1 (Cr∗ (G))
K1 (Cr∗ (G ))
K0 (Cr∗ (H )).
In our set-up this becomes: {0}
K0 (Γ C0 (R))
K0 (Γ C0 (Rλ ))
K1 (Γ C0 (Rλ ))
K1 (Γ C0 (R))
Z.
Which by Connes’ Thom isomorphism becomes: {0}
K1 (C(Γˆ ))
K0 (Aλ0 )
K1 (Aλ0 )
K0 (C(Γˆ ))
Z.
∼ K1 (Γ C0 (R)) is mapped By Proposition 2.19, the nonzero element [1Γˆ ] in K0 (C0 (Γˆ )) = to the image of the class [u] in K1 (Γ C0 (R)) by Connes’ Thom isomorphism, and then the image of [1Γˆ ] in K1 (Γ C0 (Rλ )) is the same as the image of [u] under the inclusion K1 (Γ C0 (R)) → K1 (Γ C0 (Rλ )). However, this is clearly the same as the image of [u] under the inclusion K1 (C0 (R)) → K1 (C0 (Rλ )) → K1 (Γ C0 (Rλ )). This composition is 0 since C0 (Rλ ) is an AF-algebra. That is, the element [1Γˆ ] in K0 (C0 (Γˆ )) is mapped to 0 in K1 (Aλ0 ) and hence is in the image of the map Z → K0 (C0 (Γˆ )). Since [1Γˆ ] generates a copy of Z in K0 (C0 (Γˆ )), we have a nonzero homomorphism from Z to Z[1Γˆ ] which is onto and hence oneto-one. By the exactness, the map K0 (Aλ0 ) → Z is the zero map. CONCLUSION:
K0 Aλ0 ∼ = K1 C(Γˆλ )
and K1 Aλ0 ∼ = K0 C(Γˆλ ) /[1Γˆλ ]Z.
Proposition 2.20. If λ is irrational, then K1 (Aλ0 ) = {0} so that Aλ0 is not an AF-algebra.
1652
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Proof. By items (3) and (5) of Proposition 2.2 we see that when λ is irrational, K0 (C(Γˆλ )) is not singly generated so that K1 (Aλ0 ) ∼ = K0 (C(Γˆλ ))/[1Γˆλ ]Z = {0}. 2 2.4. K-theory computations of particular Qλ for λ irrational √ Example(s) λ = 1/ n. For n > 1 a square-free integer. Using Proposition 2.1, we get
K0 F λ = K0 Aλ0 = K1 C(Γˆλ ) = Z[1/n] ⊕ Z[1/n],
K1 F λ = K1 Aλ0 = K0 C(Γˆλ ) /Z[1] = Z[1] ⊕ Z[1/n] /Z[1] = Z[1/n]. To compute the K-theory of Qλ in this case using the Pimsner–Voiculescu exact sequence, one must first compute the induced automorphism λ∗ on K1 (C(Γˆλ )) and on K0 (C(Γˆλ )) by a more detailed analysis of the proof of [31, Proposition 2.11]. In the case of K1 (C(Γˆλ )) we get √ a copy √ of the group Γλ = Z[1/n] + Z[1/n] n and the action on Γλ is just multiplication by λ = 1/ n. As an action translated to the abstract group Z[1/n] ⊕ Z[1/n], the automorphism becomes λ∗ (a, b) = (b, a/n). Therefore, id∗ − λ∗ on K0 (Aλ0 ) = Z[1/n] ⊕ Z[1/n] to itself is clearly 1 : 1. Now it is an instructive exercise to show that the kernel of the homomorphism (a, b) ∈ Z[1/n] ⊕ Z[1/n] → [a + b] ∈ Z[1/n]/(1 − 1/n)Z[1/n] is exactly the range of the homomorphism id∗ − λ∗ : Z[1/n] ⊕ Z[1/n] → Z[1/n] ⊕ Z[1/n]. Hence, we have the isomorphisms:
Z[1/n] ⊕ Z[1/n] /(id∗ − λ∗ ) Z[1/n] ⊕ Z[1/n] ∼ = Z[1/n]/(1 − 1/n)Z[1/n] ∼ = Z/(n − 1)Z, where the last isomorphism follows from the proof of Proposition 2.17 with p = 1 and q = n. Once we have computed the action of λ∗ on K1 (Aλ0 ) = Z[1/n] we will be ready to compute K∗ (Qλ ). Now, by Proposition 2.11 of [31] we have the isomorphism:
K0 C(Γˆλ ) ∼ = Z[1] ⊗Z Z[1] ⊕ Z[1/n] ⊗Z Z[1/n] = Z[1] ⊕ Z[1/n] ⊗Z Z[1/n] . The action of λ∗ on Z[1] is of course the identity. However, the action of λ∗ on (Z[1/n] ⊗Z Z[1/n]) is just x ⊗ y → y ⊗ x/n. If one combines this with the multiplication isomorphism x ⊗ y → xy : Z[1/n] ⊗Z Z[1/n] → Z[1/n] we see that λ∗ acts as multiplication by 1/n on Z[1/n] = Z[1/n] ⊗Z Z[1/n]. Thus, λ∗ on the quotient K1 (Aλ0 ) = Z[1/n] is just multiplication by 1/n. Therefore, id∗ − λ∗ becomes multiplication by (1 − 1/n) on Z[1/n] which is clearly 1 : 1. Applying the Pimsner–Voiculescu exact sequence and recalling that Ki (Qλ ) = Ki (Aλ ) we get the isomorphisms:
K0 Qλ ∼ = Z/(n − 1)Z,
and K1 Qλ ∼ = Z/(n − 1)Z,
√ for λ = 1/ n.
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1653
For n > 2 we get K1 = 0 and so these are not Cuntz √ algebras, in fact not even Cuntz–Krieger algebras since K1 has nonzero torsion.√ For λ = 1/ 2 however we get K0 = 0 = K1 and by classification theory, we must have Q1/ 2 ∼ = O2 ! However, even in this case the fixed point algebra, is NOT√AF since it has K1 = Z[1/2], the tape-measure group. So for the simplest irrational number 1/ 2 we get the Cuntz algebra, O2 with a strange gauge action of T. Remarks. In the examples below it is important to note that any polynomial of the form f (x) = x n + ax n−1 + · · · + bx ± 1 has at most n − 1 roots in the open interval (0, 1) because the product of all the roots of f must equal ±1. Example(s) quadratic integers and an algorithm. If both λ and λ−1 are quadratic integers with λ ∈ (0, 1), then λ2 + aλ ± 1 = 0 where the integer polynomial f (x) = x 2 + ax ± 1 is 2 irreducible over Q. With √ these restrictions there are two cases, either f (x) = x + ax − 1 where 2 2 a > 0 and √ λ = 1/2 · ( a + 4 − a) ∈ (0, 1); or f (x) = x + ax + 1 where a −3 and λ = 1/2 · (− a 2 − 4 − a) ∈ (0, 1). In the first case, λ2 + aλ − 1 = 0, with a > 0, so that λ + a − λ−1 = 0 and λ−1 = a + λ. For this case we outline an algorithm using the ideas of the Smith Normal Form and the Pimsner– Voiculescu exact sequence to calculate the K-theory. By Proposition 2.2, 1 and the CONCLUSION before Proposition 2.20, Γλ = Z + Zλ and K0 (Aλ0 ) ∼ (Γλ ) = Γλ ∼ = K1 (C(Γˆλ )) = = Z2 . Giving Γ its Z-basis {1, λ} we see that the action of the automorphism λ∗ on K0 (Aλ0 ) ∼ = Γλ has matrix: 1 −1 0λ 1 . So, (id − λ∗ ) = −1 (a+1) := M. To compute the kernel and cokernel of this matrix map1 −a 2 ping Z → Z2 we row and column-reduce M over Z to obtain matrices P , Q ∈ GL(2, Z) so that ∼ P MQ = D where D is diagonal = ker(D) and Z2 /M(Z2 ) ∼ = Z2 /D(Z2 ). 1 0 over Z. Then ker(M) λ In this case, we get D = 0 a . Hence, on K0 (A0 ) we have ker(id − λ∗ ) = ker(M) ∼ = ker(D) = {0} and
coker(id − λ∗ ) ∼ = coker(D) = Z/aZ.
Now we compute (id − λ∗ ) on
K1 Aλ0 ∼ = K0 C(Γˆλ ) /Z · 1o = Z · 1o ⊕ Z(1 ∧ λ) /Z · 1o = Z(1 ∧ λ). Now, λ∗ (1 ∧ λ) = λ ∧ λ2 = λ ∧ (1 − aλ) = λ ∧ 1 = (−1)1 ∧ λ. That is, λ∗ = −id on K1 (Aλ0 ) ∼ = Z. Therefore, (id − λ∗ ) = multiplication by 2 on Z(1 ∧ λ) which has ker(id − λ∗ ) = {0} and cokernel(id − λ∗ ) ∼ = Z/2Z. Applying these results to the Pimsner–Voiculescu exact sequence we obtain
K0 Qλ = Z/aZ
and K1 Qλ = Z/2Z,
for λ2 + aλ − 1 = 0, n 1.
None of these examples are Cuntz–Krieger algebras since K1 is not torsion-free. In particular, √ when λ = (1/2)( 5 − 1) is the inverse of the golden mean, we get K0 = {0} and K1 = Z/2Z. In the second case, λ2 + aλ + 1 = 0, we have as above, K0 (Aλ0 ) ∼ = Γλ = Z + Zλ with Z-basis {1, λ}; the diagonal version of (id − λ∗ ) is D = diag[1, (a + 2)] so that ker(id − λ∗ ) = {0} and coker(id − λ∗ ) ∼ = Z/(a + 2)Z. On the other hand, K1 (Aλ0 ) ∼ = Z(1 ∧ λ) only now, λ∗ = id here so
1654
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
that (id − λ∗ ) = 0 and hence ker(id − λ∗ ) ∼ = Z while coker(id − λ∗ ) ∼ = Z. By Pimsner–Voiculescu we get
K0 Qλ = Z ⊕ Z/(a + 2)Z and K1 Qλ = Z, for λ2 + aλ + 1 = 0,
a −3.
We note that in this case, Qλ has the correct K-theory to be a Cuntz–Krieger algebra √ (and is therefore stably isomorphic to one), and that in the case a = −3 (i.e., λ = (1/2)(3 − 5 )) we have K0 = Z = K1 . Example cubic integers. If λ and λ−1 are cubic integers with λ ∈ (0, 1), then λ3 + aλ2 + bλ ± 1 = 0 where the integer polynomial f (x) = x 3 + ax 2 + bx ± 1 is irreducible over Q. Such an f is irreducible if and only if f (1) = 0 = f (−1). There are two cases depending on the constant, ±1. First, consider f (x) = x 3 + ax 2 + bx − 1 = 0 with f (1) = a + b = 0 and f (−1) = a − b − 2 = 0 so that f is irreducible. Now assume a + b is positive (but a = b + 2). Then f (0) = −1 and f (1) = a + b > 0 so that f has a unique root in (0, 1) since it is a cubic. Next consider the same polynomial, f (x) = x 3 + ax 2 + bx − 1 = 0, with a + b negative (but a = b + 2). Since both f (0) and f (1) are negative, in order to have a solution the function f must have a local maximum on (0, 1). There are examples with no solutions in (0, 1); for example, f (x) = x 3 − 3x − 1. In order to have a unique solution, then considering f (x), one would need 4a 2 − 12b = 0: while this has many solutions, they all satisfy |a| b and so we cannot have a + b < 0. So solutions are not unique in this case. But, there are infinitely many cubics with two distinct solutions in (0, 1); e.g., f (x) = x 3 − (a + k)x 2 + ax − 1 for a k + 4 and k 1 has two solutions in (0, 1), since f (.5) > 0. We now calculate the K-theory of Qλ assuming that λ satisfies f (x) = x 3 + ax 2 + bx − 1 = 0, where a + b = 0, and a − b = 2. Now, λ3 + aλ2 + bλ − 1 = 0, so that λ3 = 1 − aλ2 − bλ and λ −1 2 2 ∼ ˆ λ = λ + aλ + b. Then, Γλ = Z + Zλ + Zλ and K0 (A0 ) = K1 (C(Γλ )) = odd (Γλ ) = Γλ ⊕ (Γλ ∧ Γλ ∧ Γλ ) = Γλ ⊕ (Z(1 ∧ λ ∧ λ2 )) ∼ = Z4 . Giving Γλ its natural Z-basis {1, λ, λ2 } the induced λ ∼ homomorphism (id − λ∗ ) on K0 (A0 ) = Z4 yields the diagonal matrix, D = diag[1, 1, (a + b), 0] so that on K0 (Aλ0 ) we have ker(id − λ∗ ) ∼ = ker(D) ∼ = Z and
coker(id − λ∗ ) ∼ = coker(D) = Z/(a + b)Z ⊕ Z.
∼ K0 (C(Γˆλ ))/Z · 1o = 2 (Γλ ) = Z(1 ∧ λ) + Z(1 ∧ λ2 ) + Z(λ ∧ λ2 ) ∼ Now, K1 (Aλ0 ) = = Z3 . By similar computations we get for K1 (Aλ0 ) ∼ = Z3 ; the matrix D = diag[1, 1, (a + b)]. Hence, on λ K1 (A0 ) we have ker(id − λ∗ ) ∼ = ker(D) = {0} and
coker(id − λ∗ ) ∼ = coker(D) = Z/(a + b)Z.
Applying these results to the Pimsner–Voiculescu exact sequence we obtain
K0 Qλ = Z ⊕ Z/(a + b)Z
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1655
and
K1 Qλ = Z ⊕ Z/(a + b)Z
for λ3 + aλ2 + bλ − 1 = 0.
Remarks. In case a + b = 1 (which has infinitely many solutions corresponding to infinitely many distinct invertible cubic integers λ ∈ (0, 1)) we get K0 (Qλ ) = Z =√K1 (Qλ ), which as noted above is also true for the invertible quadratic integer, λ = (1/2)(3 − 5 ). In the general cubic case with constant term −1 we always have non-torsion elements in both K0 and K1 : this is the opposite of the case where the constant term is +1, where we see below that K0 and K1 are both torsion groups. A similar phenomenon occurs in the quadratic case above, except that there we get torsion in the −1 case and non-torsion in the +1 case! That this may be a periodic phenomenon is supported by a calculation of two quartic examples: first, the unique solution λ ∈ (0, 1) to the irreducible quartic f (x) = x 4 − 3x 3 + 1 gives us K0 = Z and K1 = Z ⊕ (Z/3Z) ⊕ (Z/3Z); while, second, the unique solution λ ∈ (0, 1) to the irreducible quartic f (x) = x 4 + 3x 3 − 1 gives us K0 = (Z/3Z) ⊕ (Z/3Z) and K1 = (Z/9Z) ⊕ (Z/2Z), similar to the quadratic case. Proposition 2.21 is further evidence. When an irreducible polynomial f (x) = x n + ax n−1 + · · · ± 1 has two roots, λ1 , λ2 ∈ (0, 1), then Γλ1 ∼ = Γλ2 as rings (but not as ordered rings, for that would imply equality). Still, Qλ1 ∼ = Qλ2 (at least stably) since the calculation of their K-groups are identical. Their KMS states are not equivalent since the type III factors that they generate are not isomorphic, as we will see below. Proposition 2.21. Suppose λ satisfies the irreducible (over Z) polynomial, f (x) = x n + · · · ± 1 = 0. (1) For n odd, if f (x) = x n + · · · + 1 then K0 (Qλ ) has Z/2Z as a summand. While, if f (x) = x n + · · · − 1 then K0 (Qλ ) has Z as a summand (so, by the next proposition, rank(K0 ) = rank(K1 ) 1 in this case). (2) For n even, if f (x) = x n + · · · + 1 then K1 (Qλ ) has Z as a summand (so, by the next proposition, rank(K0 ) = rank(K1 ) 1 in this case). While, if f (x) = x n + · · · − 1 then K1 (Qλ ) has Z/2Z as a summand. Proof. In K∗ (Aλ0 ) there is a λ∗ -invariant summand, (1 ∧ λ ∧ λ2 ∧ · · · ∧ λn−1 )Z. Depending on n (mod 2) and the constant term ±1, the action of λ∗ on this summand is ±id. Hence, (id − λ∗ ) here is either 0 or 2(id). Applying Pimsner–Voiculescu gives a summand in K∗ (Qλ ) of either Z or Z/2Z. 2 Proposition 2.22. Suppose λ is algebraic. (1) Then, rank(K0 (Qλ )) = rank(K1 (Qλ )) so that Qλ is not stably isomorphic to O∞ . (2) If λ and λ−1 are both algebraic integers and Qλ is stably isomorphic to a Cuntz algebra On , then the minimal polynomial of λ has odd degree and constant term +1. Moreover, n is congruent to 3 (mod 4) and all such Cuntz algebras appear this way. Proof. To see part (1) we tensor the Pimsner–Voiculescu exact sequence by Q (which preserves exactness) to obtain an exact hexagon of Q-vector spaces:
1656
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
V1
θ1
V1
τ1
K1Q
μ0
K0Q
μ1
τ0
V0
θ0
V0
where Vi = Ki (Aλ0 ) ⊗ Q, and KiQ = Ki (Aλ ) ⊗ Q. Then
dim K0Q = rank(μ0 ) + nullity(μ0 ) = rank(μ0 ) + rank(τ0 ) and
dim K1Q = rank(μ1 ) + rank(τ1 ) and rank(τ0 ) + rank(θ0 ) = dim(V0 ) = rank(θ0 ) + rank(μ1 )
so that rank(τ0 ) = rank(μ1 ).
Similarly, rank(τ1 ) = rank(μ0 ), so that
dim K0Q = rank(μ0 ) + rank(τ0 ) = rank(μ1 ) + rank(τ1 ) = dim K1Q . That is, rank(K0 (Qλ )) = dim K0 (Qλ ) ⊗Z Q = dim K0 (Aλ ) ⊗Z Q = · · · = rank(K1 (Qλ )). By Proposition 2.21, if the minimal polynomial of λ has even degree, then K1 (Qλ ) = {0}, and so Qλ cannot be stably isomorphic to a Cuntz algebra. If Qλ is stably isomorphic to On then n is finite by part (1) and by Proposition 2.21, the order of K0 (Qλ ) must be even and therefore n must be odd. Furthermore, the minimal polynomial must have constant term +1. In order for K0 (Qλ ) to be a finite cyclic group of even order, it must be of the form Z/mZ ⊕ Z/2Z where m is odd since Z/2Z is a summand. Let m = 2k + 1 then n = [Z/mZ ⊕ Z/2Z] + 1 = 2m + 1 = 4k + 3 as claimed. In the examples below where λ3 + aλ2 + bλ + 1 = 0, and either a − b = 1 and b −2 or a = b = −1 and b −1, we obtain (stably, at least) all the Cuntz algebras On where n ≡ 3 (mod 4). 2 Now consider the case of irreducible cubics of the form f (x) = x 3 + mx 2 + nx + 1; so f (1) = m + n + 2 = 0 and f (−1) = m − n = 0. Since f (0) = 1, if we have f (1) = m + n + 2 < 0, then we have as above a unique root in (0, 1). If f (1) = m + n + 2 > 0, we can have distinct roots. For example, if n = −4 and m = 3, then, f (x) = x 3 + 3x 2 − 4x + 1 has two roots in (0, 1). If n 0, we get several solutions m for each n: e.g., n = −7 implies that any m with 6 m 9 will yield a polynomial with two roots in (0, 1). We now calculate the K-theory of Qλ assuming λ satisfies f (λ) = λ3 + mλ2 + nλ + 1 = 0. Again, K0 (Aλ0 ) ∼ = Z4 , but now the diagonal matrix D = diag[1, 1, (m + n + 2), 2]. On
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1657
K1 (Aλ0 ) ∼ = Z3 , the matrix D = diag[1, 1, (m − n)]. Both matrices are 1 : 1 since m + n + 2 = 0 = m − n. We get
K0 Qλ = Z/(n + m + 2)Z ⊕ Z/2Z and
K1 Qλ = Z/(m − n)Z for λ3 + mλ2 + nλ + 1 = 0. To obtain Cuntz algebras, we need m − n = ±1. It turns out f (1) > 0 cannot occur, so we must have f (1) = m + n + 2 < 0 hence there is a unique root λ in (0, 1). Combining this inequality with m − n = ±1 we get exactly two infinite families of solutions; m = n + 1 for n −2, OR m = n − 1 for n −1. In either case, the sequence of numbers {|m + n + 2|} is the same: {2k + 1 | k 0}. For this sequence we get the K0 groups: Z/(2k + 1)Z ⊕ Z/2Z ∼ = Z/(4k + 2)Z. Since the K1 groups are all {0}, by construction, the algebras Qλ are (at least stably) the Cuntz algebras, O4k+3 for k 0. That is, O3 , O7 , O11 , etc. Example, λ transcendental. Lemma 2.23. Let ϕ : n∈Z Z → Z be the surjective homomorphism, φ({an }) := n∈Z an ; and let S ∈ Aut( n∈Z Z) be the shift S({an }n∈Z ) := {an−1 }n∈Z . Then, (id − S) is 1 : 1 and ker(ϕ) = Im(id − S), so that ( n∈Z Z)/ Im(id − S) ∼ = Z. Proof. As a model for n∈Z Z we use Z[x, x −1 ] = n∈Z Zx n , the ring of Laurent polynomials over Z (i.e., the group ring over Z of the group {x n | n ∈ Z}). Here, ϕ is the augmentation map, S is multiplication by x, and (id − S) is multiplication by (1 − x) which is 1 : 1. Now, N n=−N
an x n ∈ ker(ϕ)
⇔
N
an = 0
n=−N
⇔
N
an x n+N ∈ ker(ϕ).
n=−N
N n+N ∈ Z[x] so p(1) = Let p(x) = N n=−N an x n=−N an = 0. Hence, p(x) factors: p(x) = (1 − x)q(x) where initially q(x) ∈ Q[x]. Since p(x) ∈ Z[x] it is easy to see that in fact, q(x) ∈ Z[x] also. Then, N
an x n = x −N p(x) = (1 − x)x −N q(x) ∈ (1 − x)Z x, x −1 = Im(id − S).
n=−N
That is, ker(ϕ) ⊆ Im(id − S), and the other containment is immediate. Proposition 2.24. If λ is transcendental then ∞ λ
∼ Z∼ K0 Q = = K1 Qλ . n=1
2
1658
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Proof. In this case, by Proposition 2.2 and the CONCLUSION before Proposition 2.20 we have ∞ 2k−1 K0 Aλ0 = (Γλ )
∞ 2k and K1 Aλ0 = (Γλ )
k=1
where Γλ =
k=1
∞
Zλn .
n=−∞
Now, each individual summand m (Γλ ) is invariant under λ∗ and yields (for m > 1) an infinite action of λ∗ is just the direct sum of (λ∗ -invariant) examples of the previous lemma where the shift. The general case is notation-heavy, so we do the examples, 2 and 3 . Letting Z+ denote the positive integers, we have 2
n n+k λ ∧λ Z (Γλ ) = k∈Z+
n∈Z
and 3
(Γλ ) =
(k1 ,k2 )∈Z2+
n
n+k1 n+k1 +k2 λ ∧λ Z . ∧λ n∈Z
The case m = 1 is just the group Γλ = n∈Z Zλn which yields a single instance of the lemma. Applying the lemma we see that (id − λ∗ ) is 1 : 1 on both K0 (Aλ0 ) and K1 (Aλ0 ) and that both K0 (Aλ0 )/(id − λ∗ )(K0 (Aλ0 )) and K1 (Aλ0 )/(id − λ∗ )(K1 (Aλ0 )) are isomorphic to a countable direct sum of copies of Z. An application of the Pimsner–Voiculescu exact sequence completes the proof. 2 Remark. The classification theory of Kirchberg algebras implies that for λ transcendental we have a new realisation of the algebras found in [16] and denoted QN there. 2.5. The dual action of T1 on Aλ and its restriction to the gauge action on Qλ Recall, G0λ = {g ∈ Gλ | |g| = 1} is a normal subgroup of Gλ . The subgroup of Gλ of elements of the form [λn : 0] is isomorphic to Z and acts on G0λ by conjugacy: n λ : 0 [1 : b] λ−n : 0 = 1 : λn b . Thus Gλ = Z G0λ is a semidirect product and we can write Aλ as an iterated crossed product:
Aλ = Gλ α C0λ (R) = Z G0λ α C0λ (R) = Z Aλ0 . The dual action γ of T1 on Aλ is relative to this latter crossed product so that for each z ∈ T1 and x in the Banach ∗-algebra, lα1 (Gλ , C0λ (R)) we have γz (x)(g) = zn x(g)
if x ∈ lα1 Gλ , C0λ (R) ; g ∈ Gλ and |g| = λn .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1659
Since Aλ is defined to be the completion of this Banach ∗-algebra in its universal representation, the action γ extends uniquely to an action (also denoted by γ ) of T1 as automorphisms of Aλ . The fixed point subalgebra of the dual action is, of course, exactly Aλ0 = G0λ α C0λ (R). Since the projection e is in Aλ0 , the action γ restricts to an action of T1 on Qλ = eAλ e, which we will also denote by γ . We call this the gauge action of T1 on Qλ . Now, γ is clearly a strongly continuous action of T1 on Qλ . Averaging over γ with respect to normalised Haar measure gives a positive, faithful expectation Φ of Qλ onto the fixed-point algebra which is clearly F λ : Φ(a) :=
1 2π
γz (a) dθ
for a ∈ Qλ , and z = eiθ .
T1
Proposition 2.25. The fixed point algebra, F λ = eAλ0 e is the norm closure of finite linear combinations of elements of the form: X[a,b) · δg
where g = [1 : c] and [a, b) ⊆ [0, 1) ∩ [c, 1 + c),
for a, b, c ∈ Γλ . Recall, Aλ0 ∼ = K(l 2 (Z)) ⊗ F λ . Proof. Applying the integral formula for Φ to a finite linear combination of the generators for Qλ we see that the only terms that survive are those where |g| = 1: that is, g has the above form. Then we apply item (2) of Lemma 2.12 to obtain the condition on the interval [a, b). 2 Corollary 2.26. The stabilised algebra Qλ ⊗ K is a crossed product of the stabilised fixed-point algebra F λ ⊗ K by an action of Z. For λ = 1/n this is a theorem of J. Cuntz. Proof. By Proposition 2.7, Aλ0 ∼ = F λ ⊗ K, and Aλ ∼ = Qλ ⊗ K. By the discussion at the beginning λ λ ∼ of Section 3.1, A = Z A0 and the proof is complete. See [15, Section 2]. 2 Remarks. If we combine the previous observation that F λ is the fixed point subalgebra of Qλ under the gauge action with Corollary 2.18 we get, for example, O2 ∼ = Q2/3 with a gauge action 2/3 ∞ is a UHF algebra of type 6 . Interestingly, F 3/4 is UHF of whose fixed point subalgebra F ∞ ∞ type 12 = 6 which is therefore isomorphic to F 2/3 . So we have two gauge actions on O2 with isomorphic UHF fixed point subalgebras, with distinct, inequivalent KMS states: one where β = log(3/2) and the other where β = log(4/3) by Proposition 2.30 below. Moreover, the two von Neumann algebras generated by the GNS representations of O2 are not isomorphic as they are type IIIλ factors for λ equalling 2/3 and 3/4, respectively, by Theorem 2.35 below. 2.6. The γ -invariant semifinite weight on Aλ and its restriction to Qλ The aim of this subsection is to exhibit the unique KMS states for the gauge action on Qλ . We first recall the definition of KMS states. Definition 2.27. Let A be a C ∗ -algebra with a continuous action γ : R → Aut(A). Let ψ be a state on A and β ∈ R a real number. We define ψ to be a KMSβ state for the action γ if
ψ xγiβ (y) = ψ(yx)
1660
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
for all x, y ∈ A a dense γ -invariant ∗-subalgebra of Aγ , the subalgebra of analytic elements for the action γ . We refer to [3, Section 2.5] for basic information on the subalgebra of analytic elements, Aγ and to [4, Section 5.3] for all the basic information on KMS states. Since Gλ is discrete it is well known that the map
x → x(1) : lα1 Gλ , C0λ (R) → C0λ (R) extends uniquely to a faithful conditional expectation E : Aλ → C0λ (R). Composing E with the densely defined (norm) lower semicontinuous weight on C0λ (R) given by integration, gives us a densely defined (norm) lower semicontinuous weight on Aλ which we denote by ψ¯ . In particular, for x ∈ lα1 (Gλ , C0λ (R)) we have
ψ¯ xx ∗ =
∗
xx (1)(t) dt = R
R
2 x(h)(t) dt . x(h)x(h) (t) dt =
h∈Gλ
h∈Gλ
R
So that ψ¯ is faithful. We observe that ψ¯ is not a trace, since 2 ∗ −1 ¯ h x(h)(t) dt. ψ(x x) = h∈Gλ
R
Proposition 2.28. The weight ψ¯ on Aλ restricts to a faithful semifinite trace τ¯ on Aλ0 and also restricts to a state denoted by ψ on Qλ satisfying: (1) The gauge action γ of T1 on Qλ leaves the state ψ invariant. (2) The state ψ restricted to the fixed point algebra, F λ is a faithful (finite) trace denoted by τ ; which is, of course, the restriction of τ¯ on Aλ0 to F λ . (3) With Φ : Qλ → F λ the canonical expectation, we have ψ = τ ◦ Φ. ¯ Proof. Since ψ(e) = R X[0,1) (t) dt = 1, we see that ψ¯ restricted to Qλ is a faithful state. To see item (1), it suffices to see that the gauge action on lα1 (Gλ , C0λ (R)) leaves ψ¯ invariant. To this end, let x 0 be in lα1 (Gλ , C0λ (R)), and let z ∈ T1 . Then
E γz (x) = γz (x)(1) = z0 x(1) = x(1) = E(x) and so
ψ¯ γz (x) =
γz (x)(1)(t) dt =
R
¯ E(x)(t) dt = ψ(x).
R
To see item (2) we use Proposition 2.25 and the above computation that shows that while ψ¯ is not generally a trace, to see that it is a trace when the group elements all have determinant 1. To see item (3), it suffices to see that for any x ∈ Qλ we have E(x) = E(Φ(x)), but this is the same as x(1) = Φ(x)(1) which is clear since det(1) = 1. 2
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1661
Now, since the state ψ is invariant under the action γ , this action is unitarily implemented on L2 (Qλ , ψ). For z ∈ T1 and x ∈ Qλc we define
uz (x) h = zn xh
for h ∈ Gλ with |h| = λn .
We define the spectral subspaces of this unitary group on L2 (Qλ , ψ) in the usual way. For each k ∈ Z let Φk be the operator on L2 (Qλ , ψ): Φk (x) =
1 2π
z−k uz (x) dθ,
z = eiθ , x ∈ L2 Qλ , ψ .
T1
We observe that if x = f · δg is a typical generator of Qλ considered as a vector in L2 (Qλ , ψ) then we have Φk (f · δg ) =
f · δg 0
if |g| = λk , otherwise.
More generally, on H := L2 (Qλ , ψ), we have Φk (H) = {x ∈ H | uz (x) = zk x for all z ∈ T1 }. Lemma 2.29. For each k ∈ Z the subspace span{f · δg ∈ Qλ | |g| = λk } is dense in the range of Φk . The operators Φk are mutually orthogonal projections on H which sum to the identity operator 1 = π(e). Proof. The proof of the first statement is similar to the proof of Proposition 2.25. The mutual orthogonality of the Φk follows from the fact that f1 · δg1 |f2 · δg2 ψ = 0 unless g1 = g2 . 2 Proposition 2.30. The dense ∗-subalgebra of Qλ consisting of finite linear combinations of the partial isometries X[a,b) · δg is contained in the subset of entire elements, Qλγ , for the action γ considered as an action of R : t → γeit . Moreover, ψ is a KMSβ state for this action where β = log(λ−1 ). In fact, ψ is the unique KMS state for this action (regardless of β). Proof. Let y = X[a,b) · δg ∈ Qλ where det(g) = λk . Then, t → γeit (y) = eikt y; t ∈ R obviously extends to the entire function w → γeiw (y) = eikw y; w ∈ C. For w = log(λ−1 )i, this equation becomes γeiw (y) = γλ (y) = λk y. Letting β = log(λ−1 ), we have γβi (y) = λk y. Now, let x = X[c,d) · h so we want to see that: λk ψ(xy) = ψ(xγβi (y)) = ψ(yx). That is, we want λk ψ(xy) = ψ(yx). Now both sides of this equation are zero unless h = g −1 . But, when h = g −1 , we have xy = X[c,d) · X[g −1 (a),g −1 (b)) · δI
while yx = X[a,b) · X[g(c),g(d)) · δI .
Moreover,
s ∈ [c, d) ∩ g −1 (a), g −1 (b)
⇔
g(s) ∈ g(c), g(d) ∩ [a, b).
Since det(g) = λk the transformation g increases the measure by a factor of λk and the result follows. That is, ψ is a KMSβ state for the action γ of R for β = log(λ−1 ).
1662
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Now let φ be a KMS state on Qλ for the action γ . Since Qλ is purely infinite it has no nontrivial traces and so φ must be KMS for some nonzero β. Hence by [4, Proposition 5.3.3], φ is invariant under the action of γ . Now, if X[a,b) · δg ∈ Qλ with det(g) = λk , then we have for all z ∈ T:
φ(X[a,b) · δg ) = φ γz (X[a,b) · δg ) = zk φ(X[a,b) · δg ). That is, if det(g) = 1 we must have φ(X[a,b) · δg ) = 0, and so φ is supported on F λ . Since F λ is γ -invariant and φ is KMS for some nonzero β, φ is a trace on F λ by [4, 5.3.28]. Now, if x = X[a,b) · δg ∈ F λ and g = I , then we claim that φ(x) = 0. For suppose g = [1 : c] with c > 0. Then there is a positive integer n such that a + nc < b a + (n + 1)c and so x = X[a,b) · δg = X[a,c) · δg + X[a+c,a+2c) · δg + · · · + X[a+nc,b) · δg := v0 + v1 + · · · + vn . Now each of these partial isometries vk satisfies vk2 = 0, and so φ(vk ) = φ(vk vk∗ vk ) = φ(vk2 vk∗ ) = 0 since φ is a trace on F λ . Thus, φ(x) = 0 as claimed. Hence φ is supported on the commutative subalgebra C := span f · δI f ∈ C0λ (R) and supp(f ) ⊆ [0, 1) . Moreover, if f1 , f2 are characteristic functions of subintervals of [0, 1) with endpoints in Γλ and having the same length they give equivalent elements fi · δI in F λ and therefore have the same value under φ. ˜ on Now, since Aλ0 ∼ = F λ ⊗ K we can define a lower semicontinuous, densely defined trace, Tr ˜ = φ ⊗ Tr, where Tr is the trace on K. So, for X[a,b) · δI ∈ F λ we have Tr(X ˜ [a,b) · δI ) = Aλ0 via Tr φ(X[a,b) · δI ). Then, for k1 < k2 ∈ Z the element X[k1 ,k2 ) · δI is the sum of (k2 − k1 ) projec˜ [k1 ,k2 ) · δI ) = tions in Aλ0 each equivalent to X[0,1) · δI which has trace equal to 1; that is, Tr(X ˜ [a,b) · δI ) = (k2 − k1 ). Now, for any a < b in Γλ , we have X[a,b) · δI ∼ X[0,b−a) · δI and so Tr(X ˜ Tr(X[0,b−a) · δI ), and these values are finite since both these projections are dominated by X[−N,N ) · δI for a sufficiently large integer N . It now suffices to prove the following. ˜ [a,b) · δI ) = b − a for a < b ∈ Γλ . Claim. Tr(X By the previous discussion we can assume that a = 0 so that b > 0. Given ε > 0 we choose positive integers m, n such that 1 ε m
and
n−1 n b< , m m
so that (n − 1) bm < n and (n − 1), bm, n ∈ Γλ . Hence ˜ [0,(n−1)) · δI ) Tr(X ˜ [0,bm) · δI ) Tr(X ˜ [0,n) · δI ) = n. (n − 1) = Tr(X But, X[0,bm) · δI = X[0,b) · δI + X[b,2b) · δI + · · · + X[(m−1)b,bm) · δI
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1663
and these projections are mutually equivalent in Aλ0 . That is, ˜ [0,b) · δI ) n so that (n − 1) mTr(X
n−1 n ˜ [0,b) · δI ) . Tr(X m m
˜ [0,b) · δI ) − b| < 1 ε. That is, b = Tr(X ˜ [0,b) · δI ) = φ(X[0,b) · δI ) and φ agrees Hence, |Tr(X m λ with the given trace τ on F and therefore φ agrees with ψ on Qλ . 2 Remarks. The above proof shows that the algebra F λ has a unique (faithful) tracial state τ, and that Aλ0 has a unique (faithful) lower semicontinuous, densely defined trace normalized so that it has value 1 at e = X[0,1) · δI . ¯ is a type IIIλ factor 2.7. The von Neumann algebra π(Aλ )−wo acting on L2 (Aλ , ψ) To prove this we will show that it is unitarily equivalent to a version of the Murray–von Neumann “group-measure space” construction of type III factors on l 2 (Gλ ) ⊗ L2 (R): see [17, Chapter 1, Section 9]. We conclude that it is a IIIλ factor by an appeal to Connes’ thesis [13]. In order to be consistent with our use of right C ∗ -modules later, we will do our GNS constructions so that our inner products are linear in the second variable. Proposition 2.31. The ∗-algebra Aλc is a Tomita algebra with the inner product:
|h|−1 xh |yh L2 (R) . y|xψ¯ = ψ¯ y ∗ x = h∈Gλ
Here we denote xh in place of x(h) to simplify notation. In this setting we have for x ∈ Aλc : (1) Sharp: S(x)h = αh (xh−1 ); (2) Flat: F (x)h = |h|αh (xh−1 ); (3) Delta: (x)h = |h|xh . Proof. We refer to [32] for Takesaki’s version of the axioms for a Tomita algebra. Since Sharp is defined to be the adjoint operation on the algebra, item (1) is immediate. A straightforward calculation shows that for all x, y ∈ Aλc we have that the defining equation for Flat holds, namely: S(y)|xψ¯ = F (x)|yψ¯ so that item (2) holds. By definition, = F S and so a simple calculation shows that (x)h = |h|xh and (3) holds. From this formula for we see that for each z ∈ C we have z (x)h = |h|z xh and a straightforward calculation shows that z (x · y) = (z (x)) · (z (y)) so that each z is an algebra homomorphism of Aλc as required. That each left multiplication π(x) is bounded when x is supported on a single group element is straightforward and the generalization to finitely supported elements is then trivial. The fact that it is a ∗-representation holds as it does for the GNS representation for any weight. In order to see that products are dense we recall that we have local units. That is, for each positive integer N we have defined EN = X[−N,N ) · δ1 , and have noted that for each y ∈ Aλc that satisfies supp(yh ) ⊆ [−N, N ) for all h, we have EN · y = y. Axioms IV, V, VI in [32] are simple calculations involving the definitions of S, F , and which we leave to the reader.
1664
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
Since our inner products are linear in the second variable, we modify Tomita’s Axiom VIII to read: z → x|x (y)ψ¯ is analytic on C for all x, y ∈ Aλc . We easily calculate that x|z (y)ψ¯ = z−1 y |x h h L2 (R) . This function is analytic since the sum is finite. 2 h |h| ¯ decomposes as the integrated form of a Lemma 2.32. The representation of Aλc on L2 (Aλc , ψ) covariant pair of representations: λ (R) → B(L2 (Aλ , ψ)), λ (R) and y ∈ Aλ ; ¯ where (π(f ˜ )(y))h = f · yh for f ∈ C00 (1) π˜ : C00 c c ¯ where (Ug (y))h = αg (yg −1 h ) for g ∈ Gλ and y ∈ Aλc . (2) U : Gλ → U (L2 (Aλc , ψ))
Proof. It is straightforward to verify that U is a unitary representation of Gλ and that π˜ is a λ (R). To see the covariance condition: ∗-representation of C00
Ug π(f ˜ )Ug −1 (y) h = · · · = αg f · αg −1 (ygg −1 ) = αg (f ) · yh = π˜ αg (f ) y h . That is, Ug π(f ˜ )Ug −1 = π˜ (αg (f )). Now, by Proposition 7.6.4 of [26] the integrated form of this covariant pair is the representation: (π˜ × U )(y) =
π˜ (yh )Uh
for y ∈ Aλc .
h
Now, we evaluate this operator on the vector x ∈ Aλc :
π˜ (yh )Uh (x) k = (π˜ × U )(y) (x) k = yh αh (xh−1 k ) = (y · x)(k) = π(y)(x) k . h
h
That is, (π˜ × U )(y) = π(y) the operator left multiplication by y.
2
2.7.1. A representation of Aλ on l 2 (Gλ ) ⊗ L2 (R) We define a covariant pair of representations of C0λ (R) and Gλ on l 2 (Gλ ) ⊗ L2 (R) as follows: (1) for f ∈ C0λ (R) let π(f ) = 1 ⊗ Mf , and (2) for g ∈ Gλ let U g = Λ(g) ⊗ Vg where Λ is the left regular representation of Gλ on l 2 (Gλ ):
Λ(g)ξ (h) = ξ g −1 h
for ξ ∈ l 2 (Gλ );
and V is the unitary action of Gλ on L2 (R) induced by the action of Gλ on R:
Vg (f ) (t) = |g|−1/2 f g −1 t for f ∈ L2 (R). Using these equations one easily checks the covariance condition for g ∈ Gλ and f ∈ C0λ (R):
U g π(f )U ∗g = π αg (f ) .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1665
Clearly the representation π extends uniquely by weak-operator continuity to the usual representation 1 ⊗ M of L∞ (R) on l 2 (Gλ ) ⊗ L2 (R) and is covariant with the unitary representation U of Gλ for the action α of Gλ on L∞ (R). Clearly, the von Neumann algebra on l 2 (Gλ ) ⊗ L2 (R) λ (R), is the same generated by the unitaries U g and the operators 1 ⊗ Mf for g ∈ Gλ and f ∈ C00 as the von Neumann algebra generated by the unitaries U g and the operators 1 ⊗ Mf for g ∈ Gλ and f ∈ L∞ (R). The second item of the following proposition is clear. Proposition 2.33. ¯ is unitarily equivalent to the represen(1) The representation π = (π˜ × U ) of Aλ on L2 (Aλc , ψ) λ 2 2 tation (π × U ) of A on l (Gλ ) ⊗ L (R). (2) (π × U )(Aλ ) is the von Neumann crossed product (in the sense of the group-measure space construction of Chapter 1 Section 9 of [17]) Gλ α L∞ (R). (3) This von Neumann algebra is a type III factor. Proof. To see item (3) we use the proof of [17, Theorem 2, Section 9, Chapter 1] where instead of the ax + b group G with a, b ∈ Q and a > 0 and its subgroup G0 (with a = 1), we use Gλ and its subgroup G0λ (with |g| = 1), to conclude that our von Neumann algebra is a type III factor. ¯ → l 2 (Gλ ) ⊗ L2 (R) as follows To see item (1), we first define a unitary W : L2 (Aλc , ψ) W
m
fi · δhi
=
i=1
m
|hi |−1/2 δhi ⊗ fi .
i=1
On the left side of this equation we are using the formalism f · δh for singly supported elements λ (R) and h ∈ G . On the right of this equation we are using δ to denote the in Aλc with f ∈ C00 λ h λ (R) ⊂ L2 (R). Clearly, canonical orthonormal basis elements in l 2 (Gλ ) and regarding f ∈ C00 W is well defined and linear with dense range. One easily checks that: for all x, y ∈ Aλc we have ! y|xψ¯ = W (x)W (y) l 2 ⊗L2 recalling that the inner product on Aλc is linear in the second coordinate. Thus W is a unitary and its inverse (adjoint) defined at first on the elements in l 2 (Gλ ) ⊗ L2 (R) of the form m i=1 δhi ⊗ fi λ (R), is given by with the fi ∈ C00 W
∗
m
δhi ⊗ fi =
i=1
m
|hi |1/2 fi · δhi .
i=1
λ (R) and g ∈ G : One then verifies the following two equations for f ∈ C00 λ
(1) W π(f ˜ )W ∗ = 1 ⊗ Mf = π(f ), and (2) W Ug W ∗ = Λ(g) ⊗ Vg = U g . The second equation is more subtle and requires the observation: Ug (f · δh ) = |g|1/2 Vg (f ) · δgh . This completes the proof of the proposition. 2
1666
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
¯ is type IIIλ 2.7.2. The factor π(Aλ ) acting on L2 (Aλc , ψ) We work in the unitarily equivalent setting of (π × U )(Aλ ) acting on l 2 (Gλ ) ⊗ L2 (R) afforded by Proposition 2.33. Recall that the subgroup of Gλ of matrices of the form [λn : 0] is isomorphic to Z and acts on the normal subgroup G0λ by conjugacy, and so Gλ = Z G0λ is a semidirect product and we can write a canonical right coset decomposition of Gλ : Gλ =
"
G0λ · λn : 0 .
n∈Z
This gives us an internal orthogonal decomposition of l 2 (Gλ ): l 2 (Gλ ) =
l 2 G0λ · λn : 0 ∼ = l 2 (Z) ⊗ l 2 G0λ . n∈Z
Here the latter isomorphism is given explicitly on basis elements by the map which takes the δ-function at g · [λn : 0] to δn ⊗ δg for n ∈ Z and g ∈ G0λ . One checks that the restriction of the representation (π × U ) of Aλ = Gλ C0λ (R) to Aλ0 := G0λ C0λ (R) on l 2 (Gλ ) ⊗ L2 (R) is unitarily equivalent to the representation on l 2 (Z) ⊗ l 2 (G0λ ) ⊗ L2 (R) via the covariant pair: 1Z ⊗ Λ(h) ⊗ Vh = 1Z ⊗ U h
for h ∈ G0λ
and 1Z ⊗ 1 ⊗ Mf = 1Z ⊗ π(f )
for f ∈ C0λ (R).
Therefore, the von Neumann subalgebra of (π × U )(Aλ ) generated by (π × U )(Aλ0 ) is isomorphic to the von Neumann algebra on l 2 (G0λ ) ⊗ L2 (R) generated by the operators Λ(h) ⊗ Vh for h ∈ G0λ and 1 ⊗ Mf for f ∈ C0λ (R). This is clearly the same as the von Neumann algebra generated by the operators Λ(h) ⊗ Vh for h ∈ G0λ and 1 ⊗ Mf for f ∈ L∞ (R), and this von Neumann algebra is a factor of type II∞ by the methods of [17, Chapter 1, Section 9]. Thus, (π × U )(Aλ0 ) is a type II∞ subfactor of the type III factor, (π × U )(Aλ ) . Moreover, the faithful normal semifinite trace on (π × U )(Aλ0 ) is given by the restriction of ψ¯ . Finally, conjugation by the unitary, U g for g = [λ : 0], which lies in our type III factor, defines an automorphism β of the type II∞ subfactor which scales the trace by λ. If N0 is our type II∞ factor acting on l 2 (G0λ ) ⊗ L2 (R) then our type III factor, say Aλ acting on l 2 (Z) ⊗ l 2 (G0λ ) ⊗ L2 (R) is unitarily equivalent to the von Neumann crossed product Aλ ∼ = Z β N0 and hence is a type IIIλ factor by [13, Theorem 4.4.1]. We have proved the following proposition. ¯ is a type IIIλ factor. Proposition 2.34. The von Neumann algebra π(Aλ ) acting on L2 (Aλc , ψ) Moreover, it is unitarily equivalent to (π × U )(Aλ ) acting on l 2 (Gλ ) ⊗ L2 (R). The von Neumann subalgebra of (π × U )(Aλ ) generated by (π × U )(Aλ0 ) is a type II∞ factor. The space l 2 (Gλ ) ⊗ L2 (R) factors as l 2 (Z) ⊗ l 2 (G0λ ) ⊗ L2 (R) and with this factorization, our II∞ factor has the form N0 = 1Z ⊗ N˜ 0 where N˜ 0 acts on l 2 (G0λ ) ⊗ L2 (R). Thus, our type IIIλ factor is
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1667
unitarily equivalent to the von Neumann crossed product Z β N0 where the automorphism β of N0 is given by β = Ad(U g ) where g = [λ : 0]. 2.8. The von Neumann algebra, π0 (Qλ )−wo acting on L2 (Qλ , ψ) is of type IIIλ Theorem 2.35. The von Neumann algebra, π0 (Qλ )−wo acting on L2 (Qλ , ψ) is of type IIIλ . Moreover, the von Neumann subalgebra, π0 (F λ )−wo is a type II1 factor with unique faithful normal state given by the restriction of the vector state, ψ which is the same as τ on F λ . By the ¯ general theory of type III factors, π0 (Qλ )−wo is isomorphic to π(Aλ )−wo acting on L2 (Aλc , ψ). Proof. Recall that Qλ = eAλ e where e = X[0,1) · δ1 ∈ Aλ . Then −wo
−wo −wo π(e) π Aλ π(e) = π(e)π Aλ π(e) = π Qλ and the cut-down of the type III factor π(Aλ )−wo (on its separable Hilbert space) by the nonzero projection π(e) is isomorphic to π(Aλ )−wo since π(e) is Murray–von Neumann equivalent to the identity operator. Of course the cut-down mapping by π(e) is not an isomorphism. Moreover, by left Hilbert algebra theory, the operator right multiplication by e which is de¯ and since we are in noted by π (e) is in the commutant of π(Aλ )−wo acting on L2 (Qλ , ψ) λ −wo λ −wo a factor the mapping π(A ) → π (e)π(A ) is an isomorphism by [17, Chapter 1, Section 2, Proposition 2]. Restricting this isomorphism to π(Qλ )−wo gives us an isomorphism ¯ which π(Qλ )−wo → π (e)π(Qλ )−wo which acts on the Hilbert space π (e)π(e)(L2 (Aλ , ψ)), has as a dense subspace π (e)π(e)(Aλc ) = eAλc e ⊂ eAλ e = Qλ with the inner product given by ψ¯ which is the same as the inner product on eAλc e given by the state ψ. The completion of this space is, of course, L2 (Qλ , ψ) with the action of Qλ being the GNS representation afforded by the state ψ. We denote this representation of Qλ on L2 (Qλ , ψ) by π0 to distinguish it from the ¯ representation π of Aλ on the larger space, L2 (Aλc , ψ). Similar considerations applied to the type II∞ subfactor, π(Aλ0 )−wo ⊂ π(Aλ )−wo on ¯ show that L2 (Aλc , ψ),
−wo −wo −wo
π(e) = π(e)π Aλ0 π(e) = π Fλ . π(e) π Aλ0 Now the projection π(e) is actually in the type II∞ subfactor π(Aλ0 )−wo of π(Aλ )−wo and has finite (ψ) trace = 1 there. Therefore, π(F λ )−wo is a type II1 factor on L2 (Qλ , ψ) with trace given by the vector state ψ. We remark that this is clearly a larger space than the subspace, L2 (F λ , τ ) ⊂ L2 (Qλ , ψ). 2 Proposition 2.36. The ∗-algebra Qλc is a Tomita algebra with the inner product: y|xψ = ψ(y ∗ x). Again we denote xh in place of x(h) to simplify notation. In this setting we have for x ∈ Qλc : (1) Sharp: S(x)h = αh (xh−1 ); (2) Flat: F (x)h = |h|αh (xh−1 ); (3) Delta: (x)h = |h|xh . Proof. This is really a corollary of Proposition 2.31, as Qλc is just a Tomita-subalgebra of Aλc . 2
1668
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
3. The modular spectral triple of the algebra Qλ Having introduced the main features of the algebras Qλ , we now turn briefly to the modular index theory of [5,8,12]. We begin with some semifinite preliminaries. 3.1. Semifinite noncommutative geometry We need to explain some semifinite versions of standard definitions and results following [10]. Let φ be a fixed faithful, normal, semifinite trace on a von Neumann algebra N . Let KN be the φ-compact operators in N (that is the norm closed ideal generated by the projections E ∈ N with φ(E) < ∞). Definition 3.1. A semifinite spectral triple (A, H, D) is given by a Hilbert space H, a ∗-algebra A ⊂ N where N is a semifinite von Neumann algebra acting on H, and a densely defined unbounded self-adjoint operator D affiliated to N such that [D, a] is densely defined and extends to a bounded operator in N for all a ∈ A and (λ − D)−1 ∈ KN for all λ ∈ / R. The triple is said to be even if there is Γ ∈ N such that Γ ∗ = Γ , Γ 2 = 1, aΓ = Γ a for all a ∈ A and DΓ + Γ D = 0. Otherwise it is odd. Note that if T ∈ N and [D, T ] is bounded, then [D, T ] ∈ N . We recall from [19] that if S ∈ N , the t-th generalized singular value of S for each real t > 0 is given by μt (S) = inf SE: E is a projection in N with φ(1 − E) t . 1 The ideal √ L (N , φ) consists of those operators T ∈ N such that T 1 := φ(|T |) < ∞ where ∗ |T | = T T . In the type I setting this is the usual trace class ideal. We will denote the norm on L1 (N , φ) by · 1 . An alternative definition in terms of singular values is that T ∈ L1 (N , φ) if ∞ T 1 := 0 μt (T ) dt < ∞. When N = B(H), L1 (N , φ) need not be complete in this norm but it is complete in the norm · 1 + · ∞ (where · ∞ is the uniform norm). We use the notation
L
(1,∞)
(N , φ) = T ∈ N : T L(1,∞)
1 := sup t>0 log(1 + t)
t
μs (T ) ds < ∞ .
0
The reader should note that L(1,∞) (N , φ) is often taken to mean an ideal in the algebra N˜ of φ-measurable operators affiliated to N . Our notation is however consistent with that of [14] in the special case N = B(H). With this convention the ideal of φ-compact operators, K(N ), consists of those T ∈ N (as opposed to N˜ ) such that μ∞ (T ) := limt→∞ μt (T ) = 0. Definition 3.2. A semifinite spectral triple (A, H, D) relative to (N , φ) with A unital is (1, ∞)summable if (D − λ)−1 ∈ L(1,∞) (N , φ) for all λ ∈ C \ R. It follows that if (A, H, D) is (1, ∞)-summable then it is n-summable (with respect to the trace φ) for all n > 1. We next need to briefly discuss Dixmier traces. For more information on semifinite Dixmier traces, see [9,11]. For T ∈ L(1,∞) (N , φ), T 0, the function
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1 FT : t → log(1 + t)
1669
t μs (T ) ds 0
∗ is bounded. There are certain ω ∈ L∞ (R+ ∗ ) [9,14], which define (Dixmier) traces on (1,∞) (N , φ) by setting L
φω (T ) = ω(FT ),
T 0
and extending to all of L(1,∞) (N , φ) by linearity. For each such ω we write φω for the associated Dixmier trace. Each Dixmier trace φω vanishes on the ideal of trace class operators. Whenever the function FT has a limit at infinity, all Dixmier traces return that limit as their value. This leads to the notion of a measurable operator [14,24], that is, one on which all Dixmier traces take the same value. 3.2. The Kasparov module and modular spectral triple We have seen that the algebras Qλ do not possess a faithful gauge invariant trace but that there is a KMSβ where β = − log(λ) for the gauge action, γ , namely ψ := τ ◦ Φ : Qλ → C, where Φ : Qλ → F λ is the expectation and τ : F λ → C is a faithful normalised trace. In fact, ψ is the only KMS state for the gauge action (for any β), by Proposition 2.30. We show below that the generator of the gauge action D acting on a suitable C ∗ -F λ -module X gives us a Kasparov module (X, D) whose class lies in KK 1,T (Qλ , F λ ). In some examples, including the case λ ∈ Q, we have K1 (Qλ ) = {0} and so pairing with ordinary K1 would be fruitless. However, following [8,5] we may compute a numerical pairing using a ‘modular spectral triple’ constructed from the Kasparov module. We now review this construction adapted to the present situation. Let H = L2 (Qλ ) be the GNS Hilbert space given by the faithful state ψ with the inner product on Qλ defined by a, b = ψ(a ∗ b) = (τ ◦ Φ)(a ∗ b). Then D is a self-adjoint unbounded operator on H [8]. The representation of Qλ on H by left multiplication (which we now denote by π in place of π0 ) is bounded and nondegenerate: the left action of an element a ∈ Qλ by π(a) satisfies π(a)b = ab for all b ∈ Qλ . This distinction between elements of Qλ as vectors in L2 (Qλ ) and operators on L2 (Qλ ) is sometimes crucial. The dense subalgebra Qλc := eAλc e which is the finite span of elements in Qλ of the form X[a,b) · δg is in the smooth domain of the derivation δ = ad(|D|). We remind the reader that the KMS condition on the modular automorphism group of the state ψ [32] (for t = i) is: ψ(xy) = ψ(σi (π(y))x) = ψ(σ (y)x) for x, y ∈ π(Qλ ), where σ (y) = −1 (y). Lemma 3.3. The group of modular automorphisms of the von Neumann algebra π(Qλ ) is given on the generators by
σt π(f · δg ) := it π(f · δg )−it = π it (f · δg ) = |g|it π(f · δg ) = det(g)it π(f · δg ). Proof. This is immediate from Lemma 2.36 if we note that |g| = det(g).
(2) 2
Corollary 3.4. With Qλ acting on H := L2 (Qλ ) and with D the generator of the natural unitary implementation of the gauge action of T1 on Qλ , we have = λD or eit D = it/ log λ .
1670
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
To simplify notation, we let A = Qλ and F = F λ = Aγ , the fixed point algebra for the T1 gauge action, γ . For convenience we will suppress the notations D ⊗ 1k and so on. The algebras Ac , Fc are defined as the finite linear span of the generators. Right multiplication makes A into a right F -module, and similarly Ac is a right module over Fc . We define an F -valued inner product (·|·)R on both these modules by (a|b)R := Φ(a ∗ b). Definition 3.5. Let X be the right F C ∗ -module obtained by completing A (or Ac ) in the norm
x2X := (x|x)R F = Φ x ∗ x F . The algebra A acting by left multiplication on X provides a representation of A as adjointable operators on X. Let Xc be the copy of Ac ⊂ X. The T1 action on Xc is unitary and extends to X [5,25]. For all k ∈ Z, the projection operator onto the k-th spectral subspace of the T1 action is also denoted (somewhat carelessly) Φk on X: Φk (x) =
1 2π
z−k uz (x) dθ,
z = eiθ , x ∈ X.
T1
Observe that Φ0 restricts to Φ on A and on generators of Qλ we have Φk (f · δg ) =
f · δg 0
if |g| = λk , otherwise.
(3)
Of course L2 (Qλ ) and X have a common dense subspace Qλc on which these projections are identical. Let Ak = Φk (A) and observe from (3) that A∗k Ak = F = Ak A∗k so that the gauge action γ on Qλ has full spectral subspaces. We quote the following result from [25], the proof in our case is the same. Lemma 3.6. The operators Φk are adjointable endomorphisms of the F -module X such that Φk∗ = Φk = Φk2 and Φk Φl = δk,l Φk . If K ⊂ Z then the sum k∈K Φk converges strictly to a projection in the endomorphism algebra. The sum Φ converges to the identity operator k∈Z k on X. For all x ∈ X, the sum x = k∈Z Φk x = k∈Z xk converges in X. The unbounded operator of the next proposition is of course the generator of the T1 action on X. We refer to Lance’s book [23, Chapters 9, 10], for information on unbounded operators on C ∗ -modules. Proposition 3.7. (See [25].) Let X be the right C ∗ -F -module of Definition 3.5. Define D : XD ⊂ X to be the linear space xk ∈ X: XD = x = k∈Z
2 < ∞ . k (x |x ) k k R k∈Z
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
For x ∈ XD define D(x) =
k∈Z kxk . Then D
1671
: XD → X is self-adjoint, regular operator on X.
This should be compared to the following Hilbert space version. Proposition 3.8. The generator D of the one-parameter unitary group {uz | z ∈ T1 } on L2 (Qλ , ψ) has eigenspaces given by the ranges of the Φk and D(x) = kx iff Φk (x) = x. In particular 2 2 dom(D) = x = xk Φk (xk ) = xk and k xk < ∞ , k
k
and D( k xk ) = k kxk . Remark. On generators in Qλ regarded as elements of either X or L2 (Qλ , ψ) we have D(f · δg ) = (logλ (|g|))f · δg . To continue, we recall the underlying right C ∗ -F λ -module, X, which is the completion of Qλ R by Θ R z = for the norm x2X = Φ(x ∗ x)F λ . Introduce the rank one operators on X: Θx,y x,y x(y|z)R . Then using the operators Sk,m defined above, we obtain formulas for the projections Φk similar to those of [25, Lemma 4.7] with some important differences. First recall [8, Lemma 3.5]. Lemma 3.9. Any F λ -linear endomorphism T of the module X which preserves the copy of Qλ inside X, extends uniquely to a bounded operator on the Hilbert space H = L2 (Qλ ). In particular, the finite rank endomorphisms of the pre-C ∗ module Qλc (acting on the left) λ satisfy this condition, and we denote the algebra of all these endomorphisms by End00 F (Qc ). Lemma 3.10. (Compare [25, Lemma 4.7].) The following formulas hold in both L(X) and in B(H). (1) For k 0, we have
R Φ0 = Θe,e
while for k > 0, Φk =
mk
ΘSRk,m ,Sk,m .
m=0
(2) For −k < 0, we have Φ−k = ΘSR∗
∗ k,m ,Sk,m
f
or any m = 0, 1, . . . , mk − 1 and also for mk if λ−k = mk + 1.
Proof. Since both Φk and the finite rank endomorphisms satisfy the hypotheses of the previous lemma, the first statement of this lemma will follow from calculations done on generators. The following calculations are based on the formulas in Lemma 2.15.
1672
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
(1) Let k > 0 and let x = mk
ΘSRk,m ,Sk,m (x) =
l xl
be a finite sum of generators, xl satisfying Φl (xl ) = xl . Then
mk
ΘSRk,m ,Sk,m (xl ) =
mk
l m=0
m=0
=
mk
l
∗ Sk,m Φ Sk,m xk =
m=0
mk
∗ Sk,m Φ Sk,m xl
m=0 ∗ Sk,m Sk,m xk = exk = xk = Φk (x).
m=0
For k = 0 this is a similar but far easier calculation. (2) Let −k < 0 and let x = l xl be a finite sum of generators as above. Then, for 0 m < mk ∗ (x) = k,m ,Sk,m
ΘSR∗
l
∗ (xl ) = k,m ,Sk,m
ΘSR∗
∗ ∗ Sk,m Φ(Sk,m xl ) = Sk,m Φ(Sk,m x−k )
l
∗ = Sk,m Sk,m x−k = ex−k = x−k = Φ−k (x).
2
We recall the following result discussed in Section 3 of [5] (a ‘bare hands’ proof can be given by the method in [8]). λ Proposition 3.11. Let N be the von Neumann algebra N = (End00 F (Qc )) , where we take the commutant inside B(H). Then N is semifinite, and there exists a faithful, semifinite, normal trace R of Qλ , τ˜ : N → C such that for all rank one endomorphisms Θx,y c
R
= (τ ◦ Φ) y ∗ x , τ˜ Θx,y
x, y ∈ Qλc .
In addition, D is affiliated to N and π(Qλ ) is a subalgebra of N . The fact that τ˜ (Φk ) = λ−k implies that with respect to the trace τ˜ we cannot expect D to satisfy a finite summability criterion. We solve this problem exactly as in [8]. Definition 3.12. We define a new weight on N + : let T ∈ N + then τ (T ) := supN τ˜ (N T ) where N = ( |k|N Φk ). Remarks. Since N is τ˜ -trace-class, we see that T → τ˜ (N T ) is a normal positive linear functional on N and hence τ is a normal weight on N + which is easily seen to be faithful and semifinite. As in [8], we now give another way to define τ which is not only conceptually useful but also makes a number of important properties straightforward to verify. Many proofs require only trivial notation changes and the substitution of n± with λ∓ . Notation. Let M be the relative commutant in N of the operator . Equivalently,M is the relative commutant of the set of spectral projections {Φk | k ∈ Z} of D. Clearly, M = k∈Z Φk N Φk . trace with τ˜ (Φk )= λ−k we deDefinition 3.13. As τ˜ restricted to each Φk N Φk is a faithful finite k fine τˆk on Φk N Φk to be λ times the restriction of τ˜ . Then, τˆ := k τˆk on M = k∈Z Φk N Φk is a faithful normal semifinite trace τˆ with τˆ (Φk ) = 1 for all k.
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1673
We use τˆ to give an alternative expression for τ below: Lemma 3.14. An element m ∈ N is in M if and only if it is in the fixed point algebra of the −it . Both π(F λ ) and the projections Φ action, σtτ on N defined for T ∈ N by σtτ (T ) = it T k belong to M. The map Ψ : N → M defined by Ψ (T ) = k Φk T Φk is a conditional expectation onto M and τ (T ) = τˆ (Ψ (T )) for all T ∈ N + . That is, τ = τˆ ◦ Ψ so that τˆ (T ) = τ (T ) for all T ∈ M+ . Finally, if one of A, B ∈ M is τˆ -trace-class and T ∈ N then τ (AT B) = τ (AΨ (T )B) = τˆ (AΨ (T )B). Proof. The proof is the same as the proof of [8, Lemma 3.9] with λk in place of n−k .
2
Lemma 3.15. The modular automorphism group σtτ of τ is inner and given by σtτ (T ) = it T −it . The weight τ is a KMS weight for the group σtτ , and σtτ |Qλ = σtτ ◦Φ . Proof. This follows from: [21, Theorem 9.2.38], which gives us the KMS properties of τ : the modular group is inner since is affiliated to N . The final statement about the restriction of the modular group to Qλ is clear. 2 We now have the key lemma: Lemma 3.16. Suppose g is a function on R such that g(D) is τ trace-class in M, then for all f ∈ F λ we have
g(k). τ π(f )g(D) = τ g(D) τ (f ) = τ (f ) k∈Z
Proof. First note that τ (g(D)) = τˆ ( k∈Z g(k)Φk ) = k∈Z g(k)τˆ (Φk ) = k∈Z g(k). We first do the computation for f ∈ Fcλ so that all the sums are finite. Now,
τ π(f )g(D) = τˆ π(f ) g(k)Φk = g(k)τˆ π(f )Φk =
k∈Z
k∈Z
g(k)τˆk π(f )Φk = g(k)λk τ˜ π(f )Φk .
k∈Z
k∈Z
So it suffices to see for each k ∈ Z, we have τ˜ (π(f )Φk ) = λ−k τ (f ). Now, by Theorem 2.35 π(F λ ) is a type II1 factor on H whose unique trace say Tr (with norm one) extends the trace τ on F λ in the sense that Tr(π(f )) = τ (f ). Since the projection Φk is in the commutant of the factor π(F λ ) the map T ∈ π F λ → T Φk = Φk T Φk is a normal isomorphism by [17, Chapter 1, Section 2, Proposition 2] and so it has a unique normalised trace also given by Trace(T Φk ) = Tr(T ). But τ˜ (T Φk ) is a trace on Φk π(F λ ) Φk = π(F λ ) Φk and so must be τ˜ (Φk ) = λ−k times the unique norm one trace. That is, we get the
1674
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
required formula:
τ˜ π(f )Φk = λ−k Trace π(f )Φk = λ−k Tr π(f ) = λ−k τ (f ). So for f ∈ Fcλ , we have the formula:
g(k)τ (f ). τ π(f )g(D) = τ g(D) τ (f ) = k∈Z
Now, the right-hand side is a norm-continuous function of f . To see that the left side is normcontinuous we do it in more generality. Let T ∈ N , then since τˆ is a trace on M we get
τ T g(D) = τˆ Ψ T g(D) = τˆ Ψ (T )g(D) Ψ (T )τˆ g(D)
T τˆ g(D) = T τ g(D) . That is the left-hand side is norm-continuous in T and so we have the formula:
τ π(f )g(D) = τ g(D) τ (f ) = g(k)τ (f ) k∈Z
for all f ∈ F λ .
2
Proposition 3.17. (i) We have (1 + D2 )−1/2 ∈ L(1,∞) (M, τ ). That is, τ ((1 + D2 )−s/2 ) < ∞ for all s > 1. Moreover, for all f ∈ F λ
−s/2
= 2τ (f ) lim (s − 1)τ π(f ) 1 + D2
s→1+
so that π(f )(1 + D2 )−1/2 is a measurable operator in the sense of [24]. (ii) For π(a) ∈ π(Qλ ) ⊂ N the following (ordinary) limit exists and
1
−s/2
= τ ◦ Φ(a), τˆω π(a) = lim (s − 1)τ π(a) 1 + D2 2 s→1+ the original KMS state ψ = τ ◦ Φ on Qλ . Proof. (i) This proof is identical to [8, Proposition 3.12]. (ii) This proof is the same as [8, Proposition 3.14] with Qλ , F λ replacing On , F .
2
Definition 3.18. The triple (A, H, D) along with γ , ψ, N , τ satisfying properties (0) to (3) below is called the modular spectral triple of the dynamical system (Qλ , γ , ψ) (0) The ∗-subalgebra A = Qλc of the algebra Qλ is faithfully represented in N with the latter acting on the Hilbert space H = L2 (Qλ , ψ).
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1675
(1) There is a faithful normal semifinite weight τ on N such that the modular automorphism group of τ is an inner automorphism group σt (for t ∈ C) of (the Tomita algebra of) N with σi |A = σ in the sense that σi (π(a)) = π(σ (a)), where σ is the automorphism σ (a) = −1 (a) on A. (2) τ restricts to a faithful semifinite trace τˆ on M = N σ , with a faithful normal projection Ψ : N → M satisfying τ = τˆ ◦ Ψ on N . (3) With D the generator of the one parameter group implementing the gauge action of T on H we have: [D, π(a)] extends to a bounded operator (in N ) for all a ∈ A and for λ in the resolvent set of D, (λ − D)−1 ∈ K(M, τ ), where K(M, τ ) is the ideal of compact operators in M relative to τ . In particular, D is affiliated to M. For matrix algebras A = Qλc ⊗ Mk over Qλc , (Qλc ⊗ Mk , H ⊗ Mk , D ⊗ Idk ) is also a modular spectral triple in the obvious fashion. We need some technical lemmas for the discussion in the next section. A function f from a complex domain Ω into a Banach space X is called holomorphic if it is complex differentiable in norm on Ω. The following is proved in [8, Lemma 3.15]. Lemma 3.19. (1) Let B be a C ∗ -algebra and let T ∈ B + . The mapping z → T z is holomorphic (in operator norm) in the half-plane Re(z) > 0. (2) Let B be a von Neumann algebra with faithful normal semifinite trace φ and let T ∈ B + be in L(1,∞) (B, φ). Then, the mapping z → T z is holomorphic (in trace norm) in the half-plane Re(z) > 1. (3) Let B, and T be as in item (2) and let A ∈ B then the mapping z → φ(AT z ) is holomorphic for Re(z) > 1. Lemma 3.20. In these modular spectral triples (A, H, D) for matrices over the algebras Qλ we have (1 + D2 )−s/2 ∈ L1 (M, τ ) for all s > 1 and for x ∈ N , τ (x(1 + D2 )−r/2 ) is holomorphic for Re(r) > 1 and we have for a ∈ Qλc , τ ([D, π(a)](1 + D2 )−r/2 ) = 0, for Re(r) > 1. Proof. We include a brief proof since there are some small but important differences from [8, Lemma 3.16]. Since the eigenvalues for D are precisely the set of integers, and the projection Φk on the eigenspace with eigenvalue k satisfies τ (Φk ) = 1, it is clear that (1 + D2 )−s/2 ∈ L1 (M, τ ). Now, τ (x(1 + D2 )−r/2 ) = τˆ (Ψ (x)(1 + D2 )−r/2 ) is holomorphic for Re(r) > 1 by item (3) of the previous lemma. To see the last statement, we observe that τ ([D, π(a)](1 + D2 )−r/2 ) = τ (Ψ ([D, π(a)]) × (1 + D2 )−r/2 ), so it suffices to see that Ψ ([D, π(a)]) = 0 for a ∈ A = Qλc . To this end, let a = f · δg where det(g) = λn is one of the linear generators of Qλc . Then by calculating the action of the operator Dπ(f · δg ) on the linear generators fi · δhi of the Hilbert space, H, we obtain
Dπ(f · δg ) = nπ(f · δg ) + π(f · δg )D that is D, π(f · δg ) = logλ |g| π(f · δg ). More generally,
#
D, π
m i=1
$ ci fi · δhi
=
m
ci logλ |hi | π(fi · δhi ). i=1
1676
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
If we apply Ψ to this equation, we see that Ψ (π(fi · δhi )) = π(Φ(fi · δhi )) = 0 whenever logλ (|hi |) = 0, and so the whole sum is 0. We also observe that [D, π(a)] ∈ π(Qλc ) for all a ∈ Qλc . This is not too surprising since D is the generator of the action γ of T on Qλ . 2 3.3. Modular K1 We now make appropriate modifications to [8, Section 4] using [5] introducing elements of these modular spectral triples (A, H, D) (where A is a matrix algebra over Qλc ) that will have a well-defined pairing with our Dixmier functional τˆω . Let A = Qλ . Following [20] we say that a unitary (invertible, projection, . . .) in the n × n matrices over Qλ for some n is a unitary (invertible, projection, . . .) over Qλ . We write σt for the automorphism σt ⊗ Idn of A. Definition 3.21. Let v be a partial isometry in the ∗-algebra A. We say that v satisfies the modular condition with respect to σ if the operators vσt (v ∗ ) and v ∗ σt (v) are in the fixed point algebra F ⊂ A for all t ∈ R. Of course, any partial isometry in F is a modular partial isometry. Lemma 3.22. (See [8, Lemma 4.8].) Let v ∈ A be a modular partial isometry. Then we have
uv =
1 − v∗v v
v∗ 1 − vv ∗
is a modular unitary over A. Moreover there is a modular homotopy uv ∼ uv ∗ . Note that in [8] we used a different approach which is implied by the one given here. In [8] we defined modular unitaries in terms of the regular automorphism:
π σ (a) = π −1 (a) = −1 π(a) = σi π(a) . That is we said that a unitary in A is modular if uσ (u∗ ) and u∗ σ (u) are in the fixed point algebra. Examples. (1) For k, j > 0 recall Sk,m ∈ Qλc with m < mk (see Definition 2.14) we write Pk,m = ∗ =X λ Sk,m Sk,m [mλk ,(m+1)λk ) · δ1 which is in clearly F . Then for each {k, m}, {j, n} we have a unitary
u{k,m},{j,n} =
1 − Pk,m ∗ Sj,n Sk,m
∗ Sk,m Sj,n 1 − Pj,n
.
It is simple to check that this a self-adjoint unitary satisfying the modular condition, and that τ (Pk,m ) = λk and τ (Pj,n ) = λj . These examples behave very much like the Sμ Sν∗ examples of [8]. (2) For k, j > 0 consider the “leftover” partial isometries Sk,mk and Sj,mj of Definition 3.13 which we will denote by Sk and Sj to lighten the notation. We let vj,k = Sj Sk∗ and calculate its range and initial projections which are both in F λ : Pj = Sj Sk∗ Sk Sj∗ = X[mj λj ,mj λj +λj (λ−k −mk )) · δ1 ,
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1677
and Pk = Sk Sj∗ Sj Sk∗ = X[mk λk ,mk λk +λk (λ−j −mj )) · δ1 . We note for future reference that
τ (Pj ) = λj λ−k − mk
and τ (Pk ) = λk λ−j − mj .
We also note that we have a modular unitary uj,k :
uj,k =
1 − Pk Sj Sk∗
Sk Sj∗ 1 − Pj
.
Define the modular K1 group as follows. Definition 3.23. Let K1 (A, σ ) be the abelian group with one generator [v] for each partial isometry v over A satisfying the modular condition and with the following relations: (1) [v] = 0 if v is over F , (2) [v] + [w] = [v ⊕ w], (3) if vt , t ∈ [0, 1], is a continuous path of modular partial isometries in some matrix algebra over A then [v0 ] = [v1 ]. One could use modular unitaries as in [8] in place of these modular partial isometries. The following can now be seen to hold. Lemma 3.24. (Compare [8, Lemma 4.9].) Let (A, H, D) be our modular spectral triple relative to (N , τ ) and set F = Aσ and σ : A → A. Let L∞ () = L∞ (D) be the von Neumann algebra generated by the spectral projections of then L∞ () ⊂ Z(M). Let v ∈ A be a partial isometry with vv ∗ , v ∗ v ∈ F . Then π(v)Qπ(v ∗ ) ∈ M and π(v ∗ )Qπ(v) ∈ M for all spectral projections Q of D, if and only if v is modular. That is, π(v)π(v ∗ ) and π(v ∗ )π(v) (or π(v)Dπ(v ∗ ) and π(v ∗ )Dπ(v)) are both affiliated to M if and only if v is modular. Thus we see that modular partial isometries conjugate to an operator affiliated to M, and so vv ∗ commutes with (and vDv ∗ commutes with D). We will next show that there is an analytic pairing between (part of) modular K1 and modular spectral triples. To do this, we are going to use the analytic formulae for spectral flow in [6]. 3.4. The mapping cone algebra Our aim in the remainder is to calculate an index pairing explicitly for the matrix algebras A over the smooth subalgebra Qλc of Qλ . In the following few pages we will sometimes abuse notation and write a in place of π(a) for a ∈ A in order to make our formulae more readable. Whenever we do this, however, we will use σi (·) = −1 (·) the spatial version of the algebra homomorphism, σ . We will generally use the spatial version σi when in the presence of operators not in π(A).
1678
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
We briefly review some results from [5], that provide an interpretation of the modular index pairing given by the spectral flow. If F ⊂ A is a sub-C ∗ -algebra of the C ∗ -algebra A, then the mapping cone algebra for the inclusion is M(F, A) = f : R+ = [0, ∞) → A: f is continuous and vanishes at infinity, f (0) ∈ F . When F is an ideal in A it is known that K0 (M(F, A)) ∼ = K0 (A/F ) [28]. In general, K0 (M(F, A)) is the set of homotopy classes of partial isometries v ∈ Mk (A) with range and source projections vv ∗ , v ∗ v in Mk (F ), with operation the direct sum and inverse −[v] = [v ∗ ]. All this is proved in [28]. It is shown in [5] that there is a natural map that injects K1 (A, σ ) into K0T (M, F ), the equivariant K-theory of the mapping cone algebra. Note that the T action on A lifts in the obvious way to the mapping cone. Now, it was shown in [7] that certain Kasparov A, F -modules extend to Kasparov M(F, A), F -modules, and this was extended to the equivariant case in [5]. Importantly the theory applies to the equivariant Kasparov module coming from a circle action. The extenˆ which is a graded unbounded Kasparov module for ˆ D) sion is explicit, namely there is a pair (X, the mapping cone algebra M(F, A) constructed using a generalised APS construction [2]. If v is a partial isometry in Mk (A), setting
ev (t) =
vv ∗ 1+t 2 t iv ∗ 1+t 2
1−
t −iv 1+t 2 v∗ v 1+t 2
,
defines ev as a projection over M(F, A). Then in [5] we showed that if v ∈ A is a modular partial isometry we have %
[ev ] −
1 0
0 0
&
ˆ ˆ D) , (X, = − Index P vP : v ∗ vP (X) → vv ∗ P (X) ∈ K0 (F )
= Index P v ∗ P : vv ∗ P (X) → v ∗ vP (X) ∈ K0T (F ).
(4)
We thus obtain an index map K1 (A, σ ) → K0T (F ). The latter may be thought of as the ring of Laurent polynomials K0 (F )(χ, χ −1 ) where we think of χ, χ −1 as generating the representation ring of T. We may obtain a real valued invariant from this map by evaluating χ at e−β where β is the inverse temperature of our KMS state and applying the trace to the resultant element of K0 (F ). Then one of the main results of [5] is that the real valued invariant so obtained is identical with the spectral flow invariant of the next subsection. However the general theory of [5] does not tell us the range of this index map and it is the latter that is of interest for these explicit calculations. 3.5. A local index formula for the algebras Qλ Using the fact that we have full spectral subspaces we know from [5] that there is a formula for spectral flow which is analogous to the local index formula in noncommutative geometry. We remind the reader that τ = τˆ ◦ Ψ where Ψ : N → M is the canonical expectation, so that τ restricted to M is τˆ .
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1679
Theorem 3.25. (Compare [8, Theorem 5.5].) Let (A, H, D) be the (1, ∞)-summable, modular spectral triple for the algebra Qλ we have constructed previously. Then for any modular partial isometry v and for any Dixmier trace τˆω˜ associated to τˆ , we have spectral flow as an actual limit
1
−s/2
sfτˆ vv ∗ D, vDv ∗ = lim (s − 1)τˆ v D, v ∗ 1 + D2 2 s→1+
−1/2
1 = τˆω˜ v D, v ∗ 1 + D2 = τ ◦ Φ v D, v ∗ . 2 The functional on A ⊗ A defined by a0 ⊗ a1 → 12 lims→1+ (s − 1)τ (a0 [D, a1 ](1 + D2 )−s/2 ) is a σ -twisted b, B-cocycle (see the proof below for the definition). Remark. Spectral flow in this setting is independent of the path joining the endpoints of unbounded self adjoint operators affiliated to M however it is not obvious that this is enough to show that it is constant on homotopy classes of modular unitaries. This latter fact is true but the proof is lengthy so we refer to [5]. Theorem 3.26. We let (Qλc ⊗ M2 , H ⊗ C2 , D ⊗ 12 ) be the modular spectral triple of (Qλc ⊗ M2 ). (1) Let u be a modular unitary defined in Section 5 of the form
∗ 1 − Pk,m Sk,m Sj,n . u{k,m},{j,n} = ∗ Sj,n Sk,m 1 − Pj,n Then the spectral flow is positive being given by
sfτ D, uDu∗ = (k − j ) λj − λk ∈ Z[λ] ⊂ Γλ . (2) Let u be a modular unitary defined in Section 5 of the form:
1 − Pk Sk Sj∗ uj,k = , Sj Sk∗ 1 − Pj ∗ and Pk and Pj are its range and initial projections, respectively. where Sk Sj∗ = Sk,mk Sj,m j Then the spectral flow is given by
sfτ D, uDu∗ = (k − j ) λj λ−k − mk − λk λ−j − mj ∈ Γλ . Proof. We have already observed that these are, in fact modular unitaries. For the computations we use a calculation from the proof of Lemma 3.20 to get in example (1):
∗ ∗ ] 0 [D, Sk,m Sj,n 1 − Pk,m Sk,m Sj,n u[D ⊗ 12 , u] = ∗ ∗ ] Sj,n Sk,m 1 − Pj,n 0 [D, Sj,n Sk,m
∗ ∗ 0 (k − j )Sk,m Sj,n 1 − Pk,m Sk,m Sj,n = ∗ ∗ Sj,n Sk,m 1 − Pj,n (j − k)Sj,n Sk,m 0
−Pk,m 0 . = (k − j ) 0 Pj,n
1680
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
So using Theorem 3.25 and our previous computation of the Dixmier trace, Proposition 3.17, ∗ =X k and the fact that Pk,m = Sk,m Sk,m [mλk ,(m+1)λk ) · δ1 so that τ (Pk,m ) = λ we have
sfτ (D, uk,m Duk,m ) = (k − j )τ (Pj,n − Pk,m ) = (k − j ) λj − λk . This number is always positive as the reader may check, and is contained in Z[λ]. The computations in example (2) are similar and use the fact that Pk = X[mk λk ,mk λk +λk (λ−j −mj )) · δ1 , so that τ (Pk ) = λk (λ−j − mj ) ∈ Γλ . In these examples, the spectral flow is not contained in the smaller polynomial ring, Z[λ]. 2 Remarks. The observation of [8] that the twisted residue cocycle formula for spectral flow is calculating Araki’s relative entropy of two KMS states [1] also applies to the examples in this subsection. Acknowledgments We would like to thank Nigel Higson, Ryszard Nest, Sergey Neshveyev, Marcelo Laca, Iain Raeburn and Peter Dukes for advice and comments. The first and fourth named authors were supported by the Australian Research Council. The second and third named authors acknowledge the support of NSERC (Canada). References [1] H. Araki, Relative entropy of states of von Neumann algebras, Publ. Res. Inst. Math. Sci. 11 (1976) 809–833; H. Araki, Relative entropy for states of von Neumann algebras II, Publ. Res. Inst. Math. Sci. 13 (1977) 173–192. [2] M.F. Atiyah, V.K. Patodi, I.M. Singer, Spectral asymmetry and Riemannian geometry. III, Math. Proc. Cambridge Philos. Soc. 79 (1976) 71–99. [3] O. Bratteli, D. Robinson, Operator Algebras and Quantum Statistical Mechanics 1, second ed., Springer-Verlag, 1987. [4] O. Bratteli, D. Robinson, Operator Algebras and Quantum Statistical Mechanics 2, second ed., Springer-Verlag, 1987. [5] A.L. Carey, R. Nest, S. Neshveyev, A. Rennie, Twisted cyclic theory, equivariant KK-theory and KMS states, J. Reine Angew. Math., in press. [6] A.L. Carey, J. Phillips, Spectral flow in θ -summable Fredholm modules, eta invariants and the JLO cocycle, KTheory 31 (2004) 135–194. [7] A.L. Carey, J. Phillips, A. Rennie, A noncommutative Atiyah–Patodi–Singer index theorem in KK-theory, J. Reine Angew. Math. 643 (2010) 59–109. [8] A.L. Carey, J. Phillips, A. Rennie, Twisted cyclic theory and an index theory for the gauge invariant KMS state on Cuntz algebras, K-Theory 6 (2010) 339–380. [9] A.L. Carey, J. Phillips, F. Sukochev, Spectral flow and Dixmier traces, Adv. Math. 173 (2003) 68–113. [10] A.L. Carey, J. Phillips, A. Rennie, F. Sukochev, The local index formula in semifinite von Neumann algebras I: Spectral Flow, Adv. Math. 202 (2006) 451–516. [11] A.L. Carey, A. Rennie, A. Sedaev, F. Sukochev, The Dixmier trace and asymptotics of zeta functions, J. Funct. Anal. 249 (2007) 253–283. [12] A.L. Carey, A. Rennie, K. Tong, Spectral flow invariants and twisted cyclic theory from the Haar state on SU q (2), J. Geom. Phys. 59 (2009) 1431–1452. [13] A. Connes, Une classification des facteurs de type III, Ann. Sci. École Norm. Sup. 6 (4) (1973) 18–252. [14] A. Connes, Noncommutative Geometry, Academic Press, 1994.
A.L. Carey et al. / Journal of Functional Analysis 260 (2011) 1637–1681
1681
[15] J. Cuntz, Simple C ∗ -algebras generated by isometries, Comm. Math. Phys. 57 (1977) 173–189. [16] J. Cuntz, C ∗ -algebras associated with the ax + b-semigroup over N, in: G. Cortinas, J. Cuntz, M. Karoubi, R. Nest, C.A. Weibel (Eds.), K-Theory and Noncommutative Geometry, in: EMS Series of Congress Reports, vol. 2, 2008. [17] J. Dixmier, Von Neumann Algebras, North-Holland, 1981. [18] G. Elliott, Some simple C ∗ -algebras constructed as crossed products with discrete outer automorphism groups, Publ. Res. Inst. Math. Sci. 16 (1980) 299–311. [19] T. Fack, H. Kosaki, Generalised s-numbers of τ -measurable operators, Pacific J. Math. 123 (1986) 269–300. [20] N. Higson, J. Roe, Analytic K-Homology, Oxford University Press, 2000. [21] R.V. Kadison, J.R. Ringrose, Fundamentals of the Theory of Operator Algebras, vol. II: Advanced Theory, Academic Press, 1986. [22] M. Laca, J. Spielberg, Purely infinite C ∗ -algebras from boundary actions of discrete groups, J. Reine Angew. Math. 480 (1996) 125–139. [23] E.C. Lance, Hilbert C ∗ -Modules, Cambridge University Press, Cambridge, 1995. [24] S. Lord, A. Sedaev, F.A. Sukochev, Dixmier traces as singular symmetric functionals and applications to measurable operators, J. Funct. Anal. 224 (1) (2005) 72–106. [25] D. Pask, A. Rennie, The noncommutative geometry of graph C ∗ -algebras I: The index theorem, J. Funct. Anal. 233 (2006) 92–134. [26] G.K. Pedersen, C ∗ -Algebras and Their Automorphism Groups, London Math. Soc. Monogr., vol. 14, Academic Press, London, 1979. [27] J. Phillips, I. Raeburn, Semigroups of isometries, Toeplitz algebras and twisted crossed products, Integral Equations Operator Theory 17 (1993) 579–602. [28] I. Putnam, An excision theorem for the K-theory of C ∗ -algebras, J. Operator Theory 38 (1997) 151–171. [29] I. Putnam, On the K-theory of C ∗ -algebras of principal groupoids, Rocky Mountain J. Math. 28 (4) (1998) 1483– 1518. [30] M. Rørdam, E. Størmer, Classification of Nuclear C ∗ -Algebras. Entropy in Operator Algebras, Encyclopaedia Math. Sci., vol. 126, Springer, Berlin, 2002. [31] C. Schochet, Topological methods for C ∗ -algebras II: geometric resolutions and the Künneth formula, Pacific J. Math. 98 (2) (1982) 443–458. [32] M. Takesaki, Tomita’s Theory of Modular Hilbert Algebras and Its Applications, Lecture Notes in Math., vol. 128, Springer, Berlin, 1970.
Journal of Functional Analysis 260 (2011) 1682–1720 www.elsevier.com/locate/jfa
Geometric analysis on small unitary representations of GL(N, R) Toshiyuki Kobayashi a,b,∗ , Bent Ørsted c , Michael Pevzner d a Graduate School of Mathematical Sciences, IPMU, The University of Tokyo, 3-8-1 Komaba, Meguro,
Tokyo 153-8914, Japan b Institut des Hautes Études Scientifiques, Bures-sur-Yvette, France 1 c Matematisk Institut, Byg. 430, Ny Munkegade, 8000 Aarhus C, Denmark d Laboratoire de Mathématiques, Université de Reims, 51687 Reims, France
Received 15 February 2010; accepted 9 December 2010 Available online 28 December 2010 Communicated by P. Delorme
Abstract The most degenerate unitary principal series representations πiλ,δ (λ ∈ R, δ ∈ Z/2Z) of G = GL(N, R) attain the minimum of the Gelfand–Kirillov dimension among all irreducible unitary representations of G. This article gives an explicit formula of the irreducible decomposition of the restriction πiλ,δ |H (branching law) with respect to all symmetric pairs (G, H ). For N = 2n with n 2, the restriction πiλ,δ |H remains irreducible for H = Sp(n, R) if λ = 0 and splits into two irreducible representations if λ = 0. The branching law of the restriction πiλ,δ |H is purely discrete for H = GL(n, C), consists only of continuous spectrum for H = GL(p, R) × GL(q, R) (p + q = N ), and contains both discrete and continuous spectra for H = O(p, q) (p > q 1). Our emphasis is laid on geometric analysis, which arises from the restriction of ‘small representations’ to various subgroups. © 2010 Elsevier Inc. All rights reserved. Keywords: Small representation; Branching law; Symmetric pair; Reductive group; Phase space representation; Symplectic group; Degenerate principal series representations
* Corresponding author at: Graduate School of Mathematical Sciences, IPMU, The University of Tokyo, 3-8-1 Komaba, Meguro, Tokyo, 153-8914 Japan. E-mail addresses: [email protected] (T. Kobayashi), [email protected] (B. Ørsted), [email protected] (M. Pevzner). 1 Current address.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.008
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1683
1. Introduction The subject of our study is geometric analysis on ‘small representations’ of GL(N, R) through branching problems to non-compact subgroups. Here, by a branching problem, we mean a general question on the understanding how irreducible representations of a group decompose when restricted to a subgroup. A classic example is studying the irreducible decomposition of the tensor product of two representations. Branching problems are one of the most basic problems in representation theory, however, it is hard in general to find explicit branching laws for unitary representations of non-compact reductive groups. For reductive symmetric spaces G/H , the multiplicities in the Plancherel formula of L2 (G/H ) are finite [1,6], whereas the multiplicities in the branching laws for the restriction G ↓ H are often infinite even when (G, H ) are symmetric pairs (see e.g. [16] for recent developments and open problems in this area). Our standing point is that ‘small representations’ of a group should have ‘large symmetries’ in the representation spaces, as was advocated by one of the authors from the perspectives in global analysis [17]. In particular, considering the restrictions of ‘small representations’ to reasonable subgroups, we expect that their breaking symmetries should have still fairly large symmetries, for which geometric analysis would deserve finer study. Then, what are ‘small representations’? For this, the Gelfand–Kirillov dimension serves as a coarse measure of the ‘size’ of infinite dimensional representations. We recall that for an irreducible unitary representation π of a real reductive Lie group G the Gelfand–Kirillov dimension DIM(π) takes the value in the set of half the dimensions of nilpotent orbits in the Lie algebra g. We may think of π as one of the ‘smallest’ infinite dimensional representations of G, if DIM(π) equals n(G), half the dimension of the minimal nilpotent orbit. For the metaplectic group G = Mp(m, R), the connected two-fold covering group of the symplectic group Sp(m, R) of rank m, the Gelfand–Kirillov dimension attains its minimum n(G) = m at the Segal–Shale–Weil representation. For the indefinite orthogonal group G = O(p, q) (p, q > 3), there exists π such that DIM(π) = n(G) (= p + q − 3) if and only if p + q is even according to an algebraic result of Howe and Vogan. See e.g. a survey paper [11] for the algebraic theory of ‘minimal representations’, and [10,17–22] for their analytic aspects. In general, a real reductive Lie group G admits at most finitely many irreducible unitary representations π with DIM(π) = n(G) if the complexified Lie algebra gC does not contain a simple factor of type A (see [11]). In contrast, for G = GL(N, R), there exist infinitely many irreducible unitary representations π with DIM(π) = n(G) (= N − 1). For example, the unitarily induced representations GL(N,R)
πiλ,δ
GL(N,R)
:= IndPN
(χiλ,δ )
(1.1)
from a unitary character χiλ,δ of a maximal parabolic subgroup PN := GL(1, R) × GL(N − 1, R) RN −1
(1.2)
are such representations with parameter λ ∈ R and δ ∈ Z/2Z. GL(N,R) In this paper, we find the irreducible decomposition of these ‘small representations’ πiλ,δ with respect to all symmetric pairs. We recall that a pair of Lie groups (G, H ) is said to be a symmetric pair if there exists an involutive automorphism σ of G such that H is an open subgroup of Gσ := {g ∈ G: σ g = g}.
1684
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
According to M. Berger’s classification [4], the following subgroups H = K, Gj (1 j 4) and G exhaust all symmetric pairs (G, H ) for G = GL(N, R) up to local isomorphisms and the center of G: K := O(N )
(maximal compact subgroup),
G1 := Sp(n, R)
(N = 2n),
G2 := GL(n, C)
(N = 2n),
G3 := GL(p, R) × GL(q, R) (N = p + q), G4 := O(p, q)
(N = p + q). GL(N,R)
It turns out that the branching laws for the restrictions of πiλ,δ with respect to these subgroups behave nicely in all the cases, and in particular, the multiplicities of irreducible representations in the branching laws are uniformly bounded. GL(N,R) To be more specific, the restriction of πiλ,δ to K splits discretely into the space of spherN ical harmonics on R , and the resulting K-type formula is multiplicity-free and so-called of ladder type. For the non-compact subgroups Gj (1 j 4), we prove the following irreducible decompositions in Theorems 8.1, 9.1, 10.1 and 11.1: GL(N,R)
Theorem 1.1. For λ ∈ R and δ ∈ Z/2Z, the irreducible unitary representation πiλ,δ poses when restricted to symmetric pairs as follows: 1) GL(2n, R) ↓ Sp(n, R) (n 2): GL(2n,R) πiλ,δ G1
(λ = 0),
Irreducible Sp(n,R) + (π0,δ )
Sp(n,R) − ⊕ (π0,δ )
(λ = 0).
2) GL(2n, R) ↓ GL(n, C): ⊕ GL(n,C) GL(2n,R) πiλ,m . πiλ,δ G 2
m∈2Z+δ
3) GL(p + q, R) ↓ GL(p, R) × GL(q, R): GL(p+q,R) πiλ,δ G3
⊕
δ ∈Z/2Z R
GL(p,R)
πiλ ,δ
πi(λ−λ ),δ−δ dλ . GL(q,R)
4) GL(p + q, R) ↓ O(p, q): GL(p+q,R) πiλ,δ G4
⊕ ν∈Aδ+ (p,q)
O(p,q) π+,ν
⊕
⊕ ν∈Aδ+ (q,p)
O(p,q) π−,ν
⊕ ⊕2 R+
O(p,q)
πiν,δ
dν.
decom-
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1685
Here, each summand in the right-hand side stands for (pairwise inequivalent) irreducible representations of the corresponding subgroups which will be defined explicitly in Sections 8, 9, 10 and 11. GL(2n,R) As indicated above, we see that the representation πiλ,δ remains generically irreducible when restricted to the subgroup G1 = Sp(n, R) and splits into a direct sum of two irreducible subrepresentations for λ = 0 and n > 1. The case n = 1 is well known (cf. [3]): the group Sp(1, R) is isomorphic to SL(2, R), and πiλ,δ are irreducible except for (λ, δ) = (0, 1), while π0,1 splits into the direct sum of two irreducible unitary representations i.e. the (classical) Hardy space and its dual. GL(2n,R) The representation πiλ,δ is discretely decomposable in the sense of [15] when restricted to the subgroup G2 = GL(n, C). In other words, the non-compact group G2 behaves in the repGL(2n,R) resentation space of πiλ,δ as if it were a compact subgroup. In contrast, the restriction of GL(p+q,R)
πiλ,δ
to another subgroup G3 = GL(p, R) × GL(q, R) decomposes without discrete specGL(p+q,R)
trum, while both discrete and continuous spectra appear for the restriction of πiλ,δ to G4 = O(p, q) if p, q 1 and (p, q) = (1, 1). Finally, in Theorem 12.1 we give an irreducible decomposition of the tensor product of the Segal–Shale–Weil representation with its dual, giving another example of explicit branching laws of small representations with respect to symmetric pairs. We have stated Theorem 1.1 from representation theoretic viewpoint. However, our emphasis is not only on results of this nature but also on geometric analysis of concrete models via branching laws of small representations, which we find surprisingly rich in its interaction with various domains of classical analysis and their new aspects. It includes the theory of Hilbert-space valued Hardy spaces (Section 2), the Weyl operator calculus (Section 3), representation theory of Jacobi and Heisenberg groups, the Segal–Shale–Weil representation of the metaplectic group (Section 4), (complex) spherical harmonics (Section 5), the K-Bessel functions (Section 7), and global analysis on space forms of indefinite-Riemannian manifolds (Section 11). Further, we introduce a non-standard L2 -model for the degenerate principal series representations of Sp(n, R) where the Knapp–Stein intertwining operator becomes an algebraic operator (Theorem 6.1). In this model the minimal K-types are given in terms of Bessel functions (Propo± sition 7.1). The two irreducible components π0,δ at λ = 0 in Theorem 1.1 1) will be presented in three ways, that is, in terms of Hardy spaces based on the Weyl operator calculus as giving the P -module structure, complex spherical harmonics as giving the K-module structure, and the eigenspaces of the Knapp–Stein intertwining operators (see Theorem 8.3). The authors are grateful to an anonymous referee for bringing the papers of Barbasch [2] and Farmer [9] to our attention. Notation. N = {0, 1, 2, . . .}, N+ = {1, 2, 3, . . .}, R± = {ρ ∈ R: ±ρ 0}, R× = R \ {0}, and C× = C \ {0}. 2. Hilbert space valued Hardy space Let W be a (separable) Hilbert space. Then, we can define the Bochner integrals of weakly measurable functions on R with values in W . For a measurable set E in R, we denote by L2 (E, W ) the Hilbert space consisting of W -valued square integrable functions on E. Clearly, it is a closed subspace of L2 (R, W ).
1686
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Suppose F is a W -valued function defined on an open subset in C. We say F is holomorphic if the scalar product (F, w)W is a holomorphic function for any w ∈ W . Let Π+ be the upper half plane {z = t + iu ∈ C: u = Im z > 0}. Then, the W -valued Hardy space is defined as 2 (W ) := F : Π+ → W : F is holomorphic and F H2 (W ) < ∞ , H+ +
(2.1)
where the norm F H2 (W ) is given by +
F H2 (W ) := +
sup u>0
F (t + iu)2 dt W
1 2
.
R
2 (W ) is defined by replacing Π with the lower half plane Π . Notice that Similarly, H− + − is the classical Hardy space, if W = C. Next, we define the W -valued Fourier transform F as
2 (W ) H+
F : L2 (R, W ) → L2 (R, W ),
f (t) → (F f )(ρ) :=
f (t)e−2πiρt dt.
R
Here, the Bochner integral converges for f ∈ (L1 ∩ L2 )(R, W ) with obvious notation. Then, F extends to the Hilbert space L2 (R, W ) as a unitary isomorphism. Example 2.1. Suppose W = L2 (Rk ) for some k. Then, we have a natural unitary isomorphism L2 (R, W ) L2 (Rk+1 ). Via this isomorphism, the L2 (Rk )-valued Fourier transform F is identified with the partial Fourier transform Ft with respect to the first variable t as follows: L2 (R, L2 (Rk ))
∼
F
L2 (R, L2 (Rk ))
L2 (Rk+1 )
∼
(2.2)
L2 (Rk+1 )
Ft
2 ≡ H2 (C), we As in the case of the classical theory on the (scalar-valued) Hardy space H+ + 2 (W ) by means of the Fourier transform: can characterize H± 2 (W ) the W -valued Hardy spaces Lemma 2.2. Let W be a separable Hilbert space, and H± (see (2.1)). 2 (W ), the boundary value 1) For F ∈ H±
F (t ± i0) := lim F (t ± iu) u↓0
exists as a weak limit in the Hilbert space L2 (R, W ), and defines an isometric embedding:
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720 2 H± (W ) → L2 (R, W ).
1687
(2.3)
2 (W ) as a closed subspace of L2 (R, W ). From now, we regard H± 2) The W -valued Fourier transform F induces the unitary isomorphism: ∼ 2 F : H± (W ) − → L2 (R± , W ). 2 (W ) ⊕ H2 (W ) (direct sum). 3) L2 (R, W ) = H+ − 2 (W ) satisfies F (t + i0) = F (−t + i0) then F ≡ 0. 4) If a function F ∈ H+
Proof. The idea is to reduce the general case to the classical one by using a uniform estimate on norms as the imaginary part u tends to zero. 2 (W ). Then we have Let {ej } be an orthonormal basis of W . Suppose F ∈ H+
F 2H2 (W ) = sup +
u>0
= sup
F (t + iu)2 dt W
R
(2.4)
Ij (u),
u>0 j
where we set Ij (u) :=
F (t + iu), ej 2 dt. W
R
Then, it follows from (2.4) that for any j supu>0 Ij (u) < ∞ and therefore Fj (z) := Fj (z), ej W
(z = t + iu ∈ Π+ )
2 . By the classical Paley–Wiener theorem for the belongs to the (scalar-valued) Hardy space H+ 2 (scalar-valued) Hardy space H+ , we have
weak limit in L2 (R) ,
Fj (t + i0) := lim Fj (t + iu) u↓0
F Fj (t + i0) ∈ L2 (R+ ), F Fj (t + iu) (ρ) = e−2πuρ F Fj (t + i0) (ρ)
(2.6) for u > 0,
Ij (u) is a monotonely decreasing function of u > 0, 2 2 lim Ij (u) = Fj (t + iu)H2 = Fj (t + i0)L2 (R) . +
u↓0
(2.5)
(2.7) (2.8) (2.9)
The formula (2.7) shows (2.8), which is crucial in the uniform estimate as below. In fact by (2.8) we can exchange supu>0 and j in (2.4). Thus, we get
F 2H2 (W ) = +
j
lim Ij (u) = u↓0
Fj (t + i0)2 2
L (R)
j
.
1688
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Hence we can define an element of L2 (R, W ) as the following weak limit: F (t + i0) :=
Fj (t + i0)ej .
j
Equivalently, F (t + i0) is the weak limit of F (t + iu) in L2 (R, W ) as u → 0. Further, (2.6) implies supp F F (t + i0) ⊂ R+ because F F (t + i0) =
F Fj (t + i0)ej
(weak limit).
j
In summary we have shown that F (t + i0) ∈ L2 (R, W ), F F (t + i0) ∈ L2 (R+ , W ), and
F H2 (W ) = F (t + i0)L2 (R,W ) = F F (t + i0)L2 (R +
+ ,W )
2 (W ). Thus, we have proved that the map for any F ∈ H+ 2 F : H+ (W ) → L2 (R+ , W )
is well defined and isometric. 2 (W ) is proved in a similar way. Conversely, the opposite inclusion F −1 (L2 (R+ , W )) ⊂ H+ Hence the statements 1), 2) and 3) follow. The last statement is now immediate from 2) because F F (t +i0)(ρ) = F F (−t +i0)(−ρ). 2 3. Weyl operator calculus In this section, based on the well-known construction of the Schrödinger representation and the Segal–Shale–Weil representation, we introduce the action of the outer automorphisms of the Heisenberg group on the Weyl operator calculus (see (3.11), (3.13), and (3.14)), and discuss carefully its basic properties, see Proposition 3.2 and Lemma 3.4. In particular, the results of this GL(2n,R) section will be used in analyzing of the ‘small representation’ πiλ,δ , when restricted to a certain maximal parabolic subgroup of Sp(n, R), see e.g. the identity (4.12). Let R2m be the 2m-dimensional Euclidean vector space endowed with the standard symplectic form ω(X, Y ) ≡ ω (x, ξ ), (y, η) := ξ, y − x, η.
(3.1)
The choice of this non-degenerate closed 2-form gives a standard realization of the symplectic group Sp(m, R) and the Heisenberg group H 2m+1 . Namely, Sp(m, R) := T ∈ GL(2m, R): ω(T X, T Y ) = ω(X, Y ) and H 2m+1 := g = (s, A) ∈ R × R2m
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1689
equipped with the product
1 g · g ≡ (s, A) · s , A := s + s + ω A, A , A + A . 2 Accordingly, the Heisenberg Lie algebra h2m+1 is then defined by (s, X), (t, Y ) = ω(X, Y ), 0 . Finally we denote by Z the center {(s, 0): s ∈ R} of H 2m+1 . The Heisenberg group H 2m+1 admits a unitary representation, denoted by ϑ , on the configuration space L2 (Rm ) by the formula 1
ϑ(g)ϕ(x) = e2πi(s+x,α− 2 a,α) ϕ(x − a),
g = (s, a, α).
(3.2)
This representation, referred to as the Schrödinger representation, is irreducible and unitary [25]. The symplectic group, or more precisely its double covering, also acts on the same Hilbert space L2 (Rm ). In order to track the effect of Aut(H 2m+1 ), we recall briefly its construction. The group Sp(m, R) acts by automorphisms of H 2m+1 preserving the center Z pointwise. Composing ϑ with such automorphisms T ∈ Sp(m, R) one gets a new representation ϑ ◦ T of H 2m+1 on L2 (Rm ). Notice that these representations have the same central character, namely ϑ ◦ T (s, 0, 0) = e2πis id = ϑ(s, 0, 0). According to the Stone–von Neumann theorem (see Fact 3.3 below) the representations ϑ and ϑ ◦ T are equivalent as irreducible unitary representations of H 2m+1 . Thus, there exists a unitary operator Met(T ) acting on L2 (Rm ) in such a way that (ϑ ◦ T )(g) = Met(T )ϑ(g) Met(T )−1 ,
g ∈ H 2m+1 .
(3.3)
Because ϑ is irreducible, Met is defined up to a scalar and gives rise to a projective unitary representation of Sp(m, R). It is known that this scalar factor may be chosen in one and only one way, up to a sign, so that Met becomes a double-valued representation of Sp(m, R). The resulting unitary representation of the metaplectic group, that we keep denoting Met, is referred to as the Segal–Shale–Weil representation and it is a lowest weight module with respect to a fixed Borel subalgebra. Notice that choosing the opposite sign of the scalar factor in the definition of Met one gets a highest weight module which is isomorphic to the contragredient representation Met∨ . The unitary representation Met splits into two irreducible and inequivalent subrepresentations Met0 and Met1 according to the decomposition of the Hilbert space L2 (Rm ) = L2 (Rm )even ⊕ L2 (Rm )odd . The Weyl quantization, or the Weyl operator calculus, is a way to associate to a function S(x, ξ ) the operator Op(S) on L2 (Rm ) defined by the equation Op(S)u (x) =
Rm ×Rm
x +y , η e2πix−y,η u(y) dy dη. S 2
Such a linear operator sets up an isometry
(3.4)
1690
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
∼ Op : L2 R2m − → HS L2 Rm , L2 Rm ,
(3.5)
from the phase space L2 (Rm × Rm ) onto the Hilbert space consisting of all Hilbert–Schmidt operators on the configuration space L2 (Rm ). Introducing the symplectic Fourier transformation Fsymp by: (Fsymp S)(X) :=
S(Y )e−2iπω(X,Y ) dY,
(3.6)
Rm ×Rm
one may give another, fully equivalent, definition of the Weyl operator by means of the equation Op(S) =
(Fsymp S)(Y )ϑ(0, Y ) dY,
(3.7)
R2m
where the right-hand side is a Bochner operator-valued integral. The Heisenberg group H 2m+1 acts on R2m H 2m+1 /Z, by R2m → R2m ,
X → X + A for g = (s, A),
and consequently it acts on the phase space L2 (R2m ) by left translations. The symplectic group Sp(m, R) also acts on the same Hilbert space L2 (R2m ) by left translations. (This representation is reducible. See Section 12 for its irreducible decomposition.) In fact, both representations come from an action on L2 (R2m ) of the semidirect product group GJ := Sp(m, R) H 2m+1 which is referred to as the Jacobi group. Let us recall some classical facts in a way that we shall use them in the sequel: Fact 3.1. 1) The representations ϑ and Met form a unitary representation of the double covering Mp(m, R) H 2m+1 of GJ on the configuration space L2 (Rm ). This action induces a representation of the Jacobi group GJ on the Hilbert space of Hilbert–Schmidt operators HS(L2 (Rm ), L2 (Rm )) by conjugations. 2) The Weyl quantization map Op intertwines the action of GJ on L2 (R2m ) with the representation Met ϑ on the Hilbert space HS(L2 (Rm ), L2 (Rm )) defined in 2). Namely, ϑ(g) Op(S)ϑ g −1 = Op S ◦ g −1 , g ∈ H 2m+1 , Met(g) Op(S) Met−1 (g) = Op S ◦ g −1 , g ∈ Sp(m, R).
(3.8) (3.9)
3) Any unitary operator satisfying (3.8) and (3.9) is a scalar multiple of the Weyl quantization map Op. Proof. Most of these statements may be found in the literature (e.g. [10, Chapter 2] for the second statement), but we give a brief explanation of some of them for the convenience of the reader. Namely, the first statement follows from (3.3). Consequently, the semi-direct product
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1691
Mp(m, R) H 2m+1 also acts by conjugations on the space HS(L2 (Rm ), L2 (Rm )), and this action is well defined for the Jacobi group GJ = Sp(m, R) H 2m+1 because the kernel of the metaplectic cover Mp(m, R) → Sp(m, R) acts trivially on HS(L2 (Rm ), L2 (Rm )). The third statement follows from the fact that L2 (R2m ) is already irreducible by the codimension one subgroup Sp(m, R) R2m of GJ . Indeed, any translation-invariant closed subspace of L2 (R2m ) is a Wiener space, i.e. the pre-image by the Fourier transform of L2 (E) for some measurable set E in R2m . On the other hand, the symplectic group acts ergodically on R2m , in the sense that the only Sp(m, R)-invariant measurable subsets of R2m are either null or conull with respect to the Lebesgue measure. Hence, the whole group Sp(m, R) R2m+1 acts irreducibly on L2 (R2m ). 2 Now we consider the ‘twist’ of the metaplectic representation by automorphisms of the Heisenberg group. The group of automorphisms of the Heisenberg group H 2m+1 , to be denoted by Aut(H 2m+1 ), is generated by – symplectic maps: (s, A) → (s, T (A)), where T ∈ Sp(m, R); – inner automorphisms (s, A) → I(t,B) (s, A) := (t, B)(s, A)(t, B)−1 = (s − ω(A, B), A), where (t, B) ∈ H 2m+1 ; – dilations (s, A) → d(r)(s, A) := (r 2 s, rA), where r > 0; – inversion: (s, A) → i(s, A) := (−s, α, a), where A = (a, α). In the sequel we shall pay a particular attention to the rescaling map τρ which is defined for every ρ = 0 by
τρ : H 2m+1 → H 2m+1 ,
(s, a, α) →
ρ ρ s, a, α . 4 4
(3.10)
Here we have adopted the parametrization of τρ in a way that it fits well into Lemma 4.2. We note that (τ−4 )2 = id and τ4 = id. The whole group Aut(H 2m+1 ) of automorphisms is generated by GJ and {τρ : ρ ∈ R× }. We denote by Aut(H 2m+1 )o the identity component of Aut(H 2m+1 ). Then we have Aut H 2m+1 = {1, τ−4 } · Aut H 2m+1 o . For any given automorphism τ ∈ Aut(H 2m+1 ), we denote by τ the induced linear operator on R2m and by π(τ ) its pull-back π(τ )f := f ◦ (τ )−1 . We notice that π(τ ) is a unitary operator on L2 (R2m ) if τ ∈ GJ . Further, we define the τ -twist Opτ of the Weyl quantization map Op by
H 2m+1 /Z
Opτ := Op ◦ π(τ ).
(3.11)
In particular, it follows from (3.4) and (3.10) that Opτρ (S)u (x) =
Rm ×Rm
S
x+y 4 , ξ e2πix−y,ξ u(y) dy dη. 2 ρ
(3.12)
1692
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Similarly, we define the τ -twist ϑτ of the Schrödinger representation ϑ by ϑτ := ϑ ◦ τ −1 .
(3.13)
Finally, we define the τ -twist Metτ of the Segal–Shale–Weil representation Met. For this, we begin with the identity component Aut(H 2m+1 )o . We set Metτ := A−1 ◦ Met ◦ A, where ⎧ ⎨ Met(τ ), for τ ∈ Sp(m, R), A = ϑ(τ ), for τ ∈ H 2m+1 , ⎩ Id, for τ = d(r).
(3.14)
It follows from Fact 3.1 1) that Metτ is well defined for τ ∈ Aut(H 2m+1 )o . For the connected component containing τ−4 , we set Metτ := (Metτ )∨
(3.15)
for τ = τ−4 τ , τ ∈ Aut(H 2m+1 )o . Thereby, Metτ is a unitary representation of Mp(m, R) on L2 (Rm ) characterized for every T ∈ Sp(m, R) by Metτ (T )ϑτ (g) Metτ (T )−1 = ϑτ T (g) . Hence, the group Aut(H 2m+1 ) acts on L2 (R2m ) in such a way that the following proposition holds. Proposition 3.2. 1) The τ -twisted Weyl calculus is covariant with respect to the Jacobi group: ϑτ (g) Opτ (S)ϑτ g −1 = Opτ S ◦ g −1 , g ∈ H 2m+1 , −1 , g ∈ Sp(m, R). Metτ (g) Opτ (S) Met−1 τ (g) = Opτ S ◦ g
(3.16) (3.17)
2) For any τ ∈ Aut(H 2m+1 ) the representation Metτ is equivalent either to Met or to its contragredient Met∨ . The special case of the τ -twist, namely, the τ -twist associated with the rescaling map τρ (3.10) deserves our attention for at least the following two reasons. First, the parameter ρ4 has a concrete physical meaning – this is the inverse of the Planck constant h (see [10, Theorem 4.57], where a slightly different notation was used. Namely, the Schrödinger representations that we denote by ϑτρ correspond therein to ρh with h = ρ4 ). Secondly, dilations do not preserve the center Z of the Heisenberg while the symplectic automorphisms of H 2m+1 do. More precisely, the whole Jacobi group GJ fixes Z pointwise. The last observation together with the Stone– von Neumann theorem (see below) shows that the action of Aut(H 2m+1 )/GJ {τρ : ρ ∈ R× }
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1693
( R× ) is sufficient in order to obtain all infinite dimensional irreducible unitary representations of the Heisenberg group. We set ϑρ := ϑτρ ,
(3.18)
to which we refer as the Schrödinger representations with central character ρ. Fact 3.3 (Stone–von Neumann theorem [12,25]). The representations ϑρ constitute a family of irreducible pairwise inequivalent unitary representations with real parameter ρ. Any infinite dimensional irreducible unitary representation of H 2m+1 is uniquely determined by its central character and thus equivalent to one of the ϑρ ’s. To end this section, we give yet another algebraic property of the Weyl operator calculus. GL(2n,R) We shall see in Lemma 4.5 that the irreducible decomposition of πiλ,δ , when restricted to a maximal parabolic subgroup of Sp(n, R), is based on an involution of the phase space coming from the parity preserving involution on the configuration space. Consider on L2 (Rm ) an involution defined by u(x) ˇ := u(−x) and induce through the map Opτρ : L2 (R2m ) → HS(L2 (Rm ), L2 (Rm )) two involutions on L2 (R2m ), denoted by S → †ρ S and S → S†ρ , by the following identities: †
S (u) = Opτρ (S)(u), ˇ † Opτρ S ρ (u) = Opτρ (S)(u) ˇ.
Opτρ
ρ
Then †ρ S and S†ρ are characterized by their partial Fourier transforms defined by
S(x, ξ )e−2πiξ,η dξ
(Fξ S)(x, η) :=
for S ∈ L2 R2m .
Rm
Lemma 3.4.
† ρ 2 ρ Fξ S (x, η) = (Fξ S) − η, − x , ρ 2
2 ρ Fξ S†ρ (x, η) = (Fξ S) η, x . ρ 2 Proof. By (3.12) the first equality (3.19) amounts to
†ρ Rm ×Rm
x +y 4 S , ξ e2iπx−y,ξ u(y) dy dξ 2 ρ
= Rm ×Rm
S
x +y 4 , ξ e2iπx−y,ξ u(−y) dy dξ. 2 ρ
(3.19) (3.20)
1694
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
The right-hand side equals
|ρ| 4
n
Rm ×Rm
ρ x−y S , ξ e2iπ 4 (x+y),ξ u(y) dy dξ. 2
This equality holds for all u ∈ L2 (Rm ), and therefore,
†ρ Rm
n
ρ x +y 4 |ρ| x−y 2iπx−y,ξ S dξ = S , ξ e , ξ e2iπ 4 (x+y),ξ dξ. 2 ρ 4 2 Rm
Namely,
† x +y ρ ρ x −y ρ , (y − x) = (Fξ S) , − (x + y) . Fξ S 2 4 2 4 Thus the first statement follows and the second may be proved in the same way.
2
4. Restriction of πiλ,δ to a maximal parabolic subgroup Let n = m + 1. Consider the space of homogeneous functions ∞ Vμ,δ := f ∈ C ∞ R2n \ {0} : f (r·) = (sgn r)δ |r|−n−μ f (·), r ∈ R× ,
(4.1)
for δ = 0, 1 and μ ∈ C. It may be seen as the space of even or odd smooth functions on the unit sphere S 2n−1 according to δ = 0 or 1, since homogeneous functions are determined by their restriction to S 2n−1 . Let Vμ,δ denote its completion with respect to the L2 -norm over S 2n−1 . Likewise, by restricting to the hyperplane defined by the first coordinate to be 1, we can identify the space Vμ,δ with the Hilbert space L2 (R2n−1 ) up to a scalar multiple on the inner product. GL(2n,R) induced from the charThe normalized degenerate principal series representations πμ,δ acter χμ,δ of a maximal parabolic subgroup P2n of GL(2n, R) corresponding to the partition 2n = 1 + (2n − 1) may be realized on these functional spaces. The realization of the same representation on Vμ,δ will be referred to as the K-picture, and on L2 (R2n−1 ) as the N -picture. GL(2n,R) , we shall use another model In addition to these standard models of πμ,δ 2 2 m 2 m L (R, HS(L (R ), L (R ))), which we call the operator calculus model. It gives a strong machinery for investigating the restriction to the maximal parabolic subgroup of Sp(n, R) (see (4.3) below). Let us denote by Ft (f )(ρ, X) =
f (t, X)e−2iπtρ dt
R
the partial Fourier transform of f (t, X) ∈ L2 (R1+2m ) with respect to the first variable. Applying the direct integral of the operators Opτρ and using (2.2), we obtain the unitary isomor-
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1695
standard model Vμ,δ = L2 (S 2n−1 )δ
K-picture
restrict ∞ = {f ∈ C ∞ (R2n \ {0}): f (rX) = |r|−μ−n (sgn r)δ f (X), r ∈ R× } Vμ,δ restrict
L2 (H 2m+1 ) = L2 (R, L2 (R2m ))
N -picture Ft
L2 (R, L2 (R2m )) L2 (R2m+1 )
Fξ
R Opτρ dρ
Uμ,δ = L2 (R2m+1 ) (see Section 6)
L2 (R, HS(L2 (Rm ), L2 (Rm ))) (see Section 5)
non-standard model
operator calculus model
Fig. 4.1.
phisms Vμ,δ L2 R1+2m L2 R, L2 R2m L2 R, L2 R2m Ft
2 m 2 m ∼ −−−−− − → 2 . Opτρ dρ L R, HS L R , L R
(4.2)
According to situations we shall use the following geometric models for the induced representations: see Fig. 4.1. The group G1 = Sp(n, R) (= Sp(m + 1, R)) acts by linear symplectomorphisms on R2n and thus it also acts on the real projective space P2m+1 R. Fix a point in P2m+1 R and denote by P its stabilizer in G1 . This is a maximal parabolic subgroup of G1 with Langlands decomposition P = MAN R× · Sp(m, R) H 2m+1 .
(4.3)
Let g1 = n + m + a + n be the Gelfand–Naimark decomposition for the Lie algebra g1 = Lie(G1 ). We identify the standard Heisenberg Lie group H 2m+1 with the subgroup N = exp n through the following Lie groups isomorphism: ⎛
1 ⎜x ⎜ (s, x, ξ ) → ⎜ ⎝ 2s ξ
0 Im tξ 0
⎞ 0 0 0 0 ⎟ ⎟ ⎟. t 1 − x⎠ 0 Im
(4.4)
∞ → L2 (H 2m+1 ) is given by Thus, in the coordinates (t, x, ξ ) ∈ H 1+2m , the restriction map Vμ,δ
f → f (1, 2t, x, ξ ).
(4.5)
1696
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
The action of G1 on P2n−1 R is transitive, and all such isotropy subgroups are conjugate to each other. Therefore, we may assume that P = Sp(n, R) ∩ P2n . Then, the natural inclusion Sp(n, R) ⊂ GL(2n, R) induces the following isomorphisms ∼ Sp(n, R)/P − → GL(2n, R)/P2n P2n−1 R. Sp(n,R)
Sp(n,R)
Hence, the (normalized) induced representation πμ,δ ≡ πμ,δ := IndP χμ,δ can (cf. Section 8) also be realized on the Hilbert space Vμ,δ . Therefore, πμ,δ is equivalent to the restriction GL(2n,R) of πμ,δ with respect to Sp(n, R). Notice that πμ,δ is unitary for μ = iλ, λ ∈ R. It is noteworthy that the unipotent radical N of P is the Heisenberg group H 2n−1 which is not abelian if n 2, although the unipotent radical of P2n clearly is. Notice also that the automorphism group Aut(H 2n−1 ) contains P /{±1} as a subgroup of index 2. Denote by Mo Sp(m, R) the identity component of M O(1) × Sp(m, R). The subgroup Mo N is isomorphic to the Jacobi group GJ introduced in Section 3. We have then the following inclusive relations for subgroups of symplectomorphisms: G1
⊃ MAN ⊃ GJ = Mo N ⊃
Symplectic group
Jacobi group
N. Heisenberg group
Our strategy of analyzing the representations πiλ,δ of G1 (see Theorem 8.3) will be based on their restrictions to these subgroups (see Lemmas 4.1 and 4.5). We recall from (3.18) that ϑρ is the Schrödinger representation of the Heisenberg group H 2m+1 with central character ρ. While the abstract Plancherel formula for the group N H 2m+1 : L2 (N ) = ϑρ ⊗ ϑρ∨ dρ, R
underlines the decomposition with respect to left and right regular actions of the group N , we shall consider the decomposition of this space with respect to the restriction of the principal series representation πiλ,δ to the Jacobi group GJ = Sp(m, R) H 2m+1 (see Lemma 4.1). Let us examine how the restriction πiλ,δ |GJ defined on the Hilbert space Viλ,δ on the left-hand side of (4.2) is transferred to L2 (R, L2 (R2m )) via the partial Fourier transform Ft . The restriction πiλ,δ |N coincides with the left regular representation of N on L2 (R1+2m ) given by 1 πiλ,δ (g)f (t, X) = f t − s − ω(A, X), X − A 2
1 = f t − s + ξ, a − x, α , x − a, ξ − α , 2
(4.6)
for f (t, X) ∈ L2 (R1+2m ) and g = (s, A) ≡ (s, a, α) ∈ H2m+1 . Taking the partial Fourier transform Ft of (4.6), we get 1 Ft πiλ,δ (g)f (ρ, x, ξ ) = e−2πiρ(s− 2 (ξ,a−x,α)) (Ft f )(ρ, x − a, ξ − α).
(4.7)
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1697
Now, for each ρ ∈ R, we define a representation ρ of N on L2 (R2m ) by 1
ρ (g)h(x, ξ ) := e−2πiρ(s− 2 (ξ,a−x,α)) h(x − a, ξ − α),
(4.8)
for g = (s, a, α) ∈ N and h ∈ L2 (R2m ). Then, ρ is a unitary representation of N for any ρ, and the formula (4.7) may be written as: Ft πiλ,δ (g)f (ρ, x, ξ ) = ρ (g)(Ft f )(ρ, x, ξ ),
(4.9)
for g ∈ N . Here, we let ρ (g) act on Ft f seen as a function of (x, ξ ). For each ρ ∈ R, we can extend the representation ρ of N to a unitary representation of the Jacobi group GJ by letting Mo act on L2 (R2m ) by ρ (g)h(x, ξ ) = h(y, η),
with (y, η) = g −1 (x, ξ ), g ∈ Mo Sp(m, R).
Then, clearly the identity (4.9) holds also for g ∈ Mo . Thus, we have proved the following decomposition formula: Lemma 4.1. For any (λ, δ) ∈ R × Z/2Z, the restriction of πiλ,δ to the Jacobi group is unitarily equivalent to the direct integral of unitary representations ρ via Ft (see (4.2)): ⊕ πiλ,δ |GJ Ft
ρ dρ.
(4.10)
R
Next we establish the link between the representations (ρ , L2 (R2m )) and (ϑρ , L2 (Rm )) of the Heisenberg group N H 2m+1 . For this we note that the representation ρ brings us to the changeover of one parameter families of automorphisms of H 2m+1 , from {τρ : ρ ∈ R× } to {ψρ : ρ ∈ R× } defined by
ψρ (s, a, α) :=
1 1 2 s, a, α . ρ 2 ρ
(4.11)
Then we state the following covariance relation given by Opτρ : Lemma 4.2. For every g ∈ H 2m+1 the following identity in End(L2 (Rm )) holds for any S ∈ L2 (R2m ): Opτρ ρ (g)S = Opτρ (S) ◦ ϑψρ g −1 .
(4.12)
Proof. Let g = (s, a, α) ∈ H 2m+1 and take an arbitrary function u ∈ L2 (Rm ). Using the integral formula (3.12) for Opτρ , we get
1698
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Opτρ ρ (g)S u(x)
x +y 4 , ξ e2πix−y,ξ u(y) dy dξ ρ (g)S = 2 ρ Rm ×Rm
1
4
e−2πiρ(s− 2 ( ρ ξ,a−
= Rm ×Rm
=
e
−2πiB
Rm ×Rm
x+y 2 ,α))
S
x +y 4 − a, ξ − α e2πix−y,ξ u(y) dy dξ 2 ρ
x+y 4 , ξ u(y + 2a) dy dξ, S 2 ρ
where
x + y + 2a ρ ρ 4 ξ + α, a − , α − x − y − 2a, ξ + α 2 ρ 2 4 ρ = ρs + a + y, α − x − y, ξ . 2
B = ρs −
In view of the definitions (3.13) and (4.11),
−1 −1 −1 ρ ϑψρ g = ϑ ψρ g = ϑ −ρs, −2a, − α . 2 Thus, by the definition (3.2) of the Schrödinger representation ϑ , we have ρ ϑψρ s −1 u (y) = e−2πi(ρs+ 2 a+y,α) u(y + 2a). Hence, the last integral equals
S Rm ×Rm
x +y 4 , ξ ϑψρ g −1 u (y)e2πix−y,ξ dy dξ 2 ρ
= Opτρ (S)ϑψρ g −1 u (x).
2
Then, it turns out that the decomposition (4.10) is not irreducible, but the following lemma holds: Lemma 4.3. For any ρ ∈ R× , ρ is a unitary representation of the Jacobi group GJ on L2 (R2m ), which splits into a direct sum ρ0 ⊕ ρ1 of two pairwise inequivalent unitary irreducible representations. Proof. Consider the rescaling map τρ introduced by (3.10) and recall that the τρ -twisted Weyl quantization map induces a GJ equivariant isomorphism ∼ → HS L2 Rm , L2 Rm Opτρ : L2 R2m − intertwining the ρ and ϑψρ actions (4.12).
(4.13)
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1699
The irreducibility of the Schrödinger representation ϑρ of the group N (Fact 3.3) implies therefore that any N -invariant closed subspace in HS(L2 (Rm ), L2 (Rm )) must be of the form HS(L2 (Rm ), U ) for some closed subspace U ⊂ L2 (Rm ). In view of the covariance relation (3.17) of the Weyl quantization, the subspace HS(L2 (Rm ), U ) is Sp(m, R)-invariant if and only if U itself is Mp(m, R)-invariant (see Proposition 3.2), and the latter happens only if U is one of {0}, L2 (Rm )even , L2 (Rm )odd or L2 (Rm ). Thus, we have the following irreducible decomposition of ρ , seen as a representation of GJ on L2 (R2m ): L2 R2m = W+ ⊕ W− 2 m 2 m 2 m 2 m − −∼−→ Opτρ HS L R , L R even ⊕ HS L R , L R odd .
(4.14)
From Proposition 3.2 2) we deduce that the corresponding representations, to be denoted by ρδ , of GJ , where δ labels the parity, are pairwise inequivalent, i.e. ρδ = ρδ if and only if ρ = ρ and δ = δ for all ρ, ρ ∈ R and δ, δ ∈ Z/2Z. 2 The following lemma is straightforward from the definition of the involution S → S†ρ (see (3.19)). Lemma 4.4. The subspaces W+ and W− introduced above are the +1 and −1 eigenspaces of the involution S → S†ρ , respectively. Eventually, we take the A-action into account, and give the branching law of the (degenerate) principal series representation πiλ,δ of G1 when restricted to the maximal parabolic subgroup MAN . Lemma 4.5 (Branching law for G1 ↓ MAN ). For every (λ, δ) ∈ R × Z/2Z the space Viλ,δ acted upon by the representation πiλ,δ |MAN splits into the direct sum of four irreducible representations: 2 2 2 2 Viλ,δ H+ (W+ ) ⊕ H+ (W− ) ⊕ H− (W+ ) ⊕ H− (W− ).
(4.15)
Proof. We shall prove first that each summand in (4.15) is already irreducible as a representation of Mo AN GJ A. Then we see that it is stable by the group MAN and thus irreducible because M is generated by Mo and −I2n , which acts on Viλ,δ by the scalar (−1)δ . In light of the GJ -irreducible decomposition (4.10), any GJ -invariant closed subspace U of Viλ,δ must be of the form U = Ft−1 L2 (E+ , W+ ) ⊕ Ft−1 L2 (E− , W− ) , for some measurable sets E± in R. Suppose furthermore that U is A-invariant. Notice that the group A acts on Viλ,δ L2 (R2m+1 ) by πiλ,δ (a)f (t, X) = a −1−m−iλ f a −2 t, a −1 X .
1700
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
In turn, their partial Fourier transforms with respect to the t ∈ R variable are given by Ft πiλ,δ (a)f (ρ, X) = a 1−m−iλ (Ft f ) a 2 ρ, a −1 X . Therefore, Ft f is supported in E± if and only if Ft πiλ,δ (a)f is supported in a −2 E± as a W± valued function on R. In particular, U is an A-invariant subspace if and only if E± is an invariant measurable set under the dilation ρ → a 2 ρ (a > 0), namely, E± = {0}, R− , R+ , or R (up to measure zero sets). Since Mo AN GJ A, Mo AN -invariant proper closed subspaces must be of the form −1 2 Ft (L (R± , Wε )) with ε = + or −. We recall from Lemma 2.2 that the Hilbert space L2 (R, Wε ) is a sum of Wε -valued Hardy spaces: ∼
2 2 2 → 2 (Wε ) ⊕ H− (Wε ) − L2 (R, Wε ) = H+ Ft L (R+ , Wε ) ⊕ L (R− , Wε ).
Now Lemma 4.5 has been proved.
(4.16)
2
Lemma 4.5 implies that the representation πiλ,δ of G1 has at most four irreducible subrepresentations. The precise statement for this will be given in Theorem 8.3. 5. Restriction of πiλ,δ to a maximal compact subgroup As the operator calculus model L2 (R, HS(L2 (Rm ), L2 (Rm ))) was appropriate for studying the P -structure of πiλ,δ , we use complex spherical harmonics for the analysis of the K-structure of these representations. We retain the convention n = m + 1. Identifying the symplectic form ω on R2n with the imaginary part of the Hermitian inner product on Cn we realize the group of unitary transformations K = U (n) as a subgroup of G1 = Sp(n, R). Then the group K is a maximal compact subgroup of G1 . Analogously to the classical spherical harmonics on Rn , consider harmonic polynomials on Cn as follows. For α, β ∈ N, let Hα,β (Cn ) denote the vector space of polynomials p(z0 , . . . , zm , z¯ 0 , . . . , z¯ m ) on Cn which (1) are homogeneous of degree α in (z0 , . . . , zm ) and of degree β in (¯z0 , . . . , z¯ m );
∂2 (2) belong to the kernel of the differential operator m i=0 ∂zi ∂ z¯ i . Then, Hα,β (Cn ) is a finite dimensional vector space. It is non-zero except for the case where n = 1 and α, β 1. The natural action of K on polynomials, p(z0 , . . . , zm , z¯ 0 , . . . , z¯ m ) → p g −1 (z0 , . . . , zm ), g −1 (z0 , . . . , zm ) (g ∈ K), leaves Hα,β (Cn ) invariant. The resulting representations of K on Hα,β (Cn ), which we denote by the same symbol Hα,β (Cn ), are irreducible and pairwise inequivalent for any such α, β. 2 The restriction of Hα,β (Cn ) to the unit sphere S 2m+1 = {(z0 , . . . , zm ) ∈ Cn : m j =0 |zj | = 1} is injective and gives a complete orthogonal basis of L2 (S 2m+1 ), and we have a discrete sum decomposition
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
⊕ α,β n C S 2m+1 L2 S 2m+1 H
(m 1).
1701
(5.1)
α,β∈N
The case m = 0 collapses to ⊕ ⊕ α,0 1 C S 1 ⊕ H H0,β C1 S 1 . L2 S 1 α∈N
β∈N+
Fixing a μ ∈ C we may extend functions on S 2m+1 to homogeneous functions of degree −(m + 1 + μ). The decomposition (5.1) gives rise to the branching law (K-type formula) with respect to the maximal compact subgroup. Lemma 5.1 (Branching law for G1 ↓ K). The restriction of πμ,δ to the subgroup K of G1 is decomposed into a discrete direct sum of pairwise inequivalent representations: πμ,δ |K
⊕
Hα,β (Cn )
(m 1),
α,β∈N α+β≡δ mod 2
πμ,δ |K
⊕
Hα,0 (C) ⊕
α∈N α≡δ mod 2
⊕
H0,β (C)
(m = 0).
β∈N+ β≡δ mod 2
We shall refer to Hα,β (Cn ) as a K-type of the representation πμ,δ . The restriction G1 ↓ K is multiplicity free. Therefore any K-intertwining operator (in particular, any G1 -intertwining operator) acts as a scalar on every K-type by Schur’s lemma. We give an explicit formula of this scalar for the Knapp–Stein intertwining operator: Tμ,δ : V−μ,δ → Vμ,δ , which is defined as the meromorphic continuation of the following integral operator
−μ−n δ sgn ω(ξ, η) dσ (ξ ). f (ξ )ω(ξ, η)
(Tμ,δ f )(η) := S 2n−1
Here dσ is the Euclidean measure on the unit sphere. Further, we normalize it by Tμ,δ :=
1 Tμ,δ , C2n (μ, δ)
(5.2)
where
C2n (μ, δ) := 2π
μ+n− 12
×
⎧ 1−μ−n Γ( 2 ) ⎪ ⎪ ⎨ μ+n Γ(
2
(δ = 0),
)
⎪ Γ ( 2−μ−n ) ⎪ 2 ⎩ −i μ+n+1 Γ(
2
)
(δ = 1).
1702
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Proposition 5.2. For α, β ∈ N, we set δ ≡ α + β mod 2. The normalized Knapp–Stein intertwining operator Tμ,δ acts on Hα,β (Cn ) as the following scalar (−1)β π −μ
Γ ( α+β+μ+n ) 2 Γ ( α+β−μ+n ) 2
.
Proof. See [5, Theorem 2.1] for δ = 0. The proof for δ = 1 works as well by using Lemma 5.4. 2 Remark 5.3. Without normalization, the Knapp–Stein intertwining operator Tμ,δ acts on Hα,β (Cn ) as Tμ,δ |Hα,β (Cn ) = (−1)β Aα+β (μ) id, where δ ≡ α + β mod 2 and
1
Ak (μ) := 2π n− 2
Γ ( k+μ+n ) 2 Γ ( k−μ+n ) 2
×
⎧ 1−μ−n Γ( 2 ) ⎪ ⎪ ⎨ μ+n Γ(
(k ∈ 2N),
)
2
⎪ Γ ( 2−μ−n ) ⎪ 2 ⎩ −i μ+n+1 Γ(
2
)
(k ∈ 2N + 1).
The symplectic Fourier transform Fsymp , defined by (3.6), may be written as: (Fsymp f )(Y ) =
f (X)e−2πiω(X,Y ) dX = (FR2n f )(J Y ),
R2n
where J : R2n → R2n is given by J (x, ξ ) := (−ξ, x). ∞ of homoFor generic complex parameter μ (e.g. μ = n, n + 2, . . . for δ = 0), the space Vμ,δ 2n 2n geneous functions on R \ {0} may be regarded as a subspace of the space S (R ) of tempered distributions, and we have the following commutative diagram: ∼
Fsymp : S (R2n ) ∪ V−μ,δ
S (R2n )
∼
∪ Vμ,δ
Lemma 5.4. As operators that depend meromorphically on μ, Tμ,δ satisfy the following identity: Tμ,δ = Fsymp |V−μ,δ . Proof. The proof parallels that of [5, Proposition 2.3]. For h ∈ C ∞ (S 2n−1 )δ , we define a homo∞ by geneous function hμ−n ∈ V−μ,δ hμ−n (rξ ) := r μ−n h(ξ )
r > 0, ξ ∈ S 2n−1 .
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1703
Then we recall from [5, Proposition 2.2] the following formula: πi
Γ (μ + n)e− 2 (μ+n) FR2n hμ−n (sη) = (2π)μ+n s μ+n
−μ−n ξ, η − i0 h(ξ ) dσ (ξ ),
S 2n−1
where (ξ, η − i0)λ is a distribution of ξ, η, obtained by the substitution of t = ξ, η into the distribution (t − i0)λ of one variable t. To conclude, we use
π π(μ + n) −μ−n π(μ + n) −μ−n |t| |t| (t − i0)−μ−n = e 2 i(μ+n) cos − i sin sgn t 2 2
π |t|−μ−n |t|−μ−n sgn t . 2 = πe 2 i(μ+n) − i 1−μ−n μ+n 2−μ−n Γ ( 1+μ+n )Γ ( ) Γ ( )Γ ( ) 2 2 2 2 We note that the Knapp–Stein intertwining operator induces a unitary equivalence of representations πiλ,δ and π−iλ,δ of G1 = Sp(n, R): πiλ,δ π−iλ,δ ,
for any λ ∈ R and δ ∈ Z/2Z.
(5.3)
6. Algebraic Knapp–Stein intertwining operator We introduce yet another model Uμ,δ L2 (R2m+1 ), referred to as the non-standard model, of the representation πμ,δ as the image of the partial Fourier transform ∼ 2 1+m+m , →L R Fξ : L2 R1+m+m − where ξ denotes the last variable in Rm . Then the space Uμ,δ inherits a G1 -module structure from (πμ,δ , Vμ,δ ) through Fξ ◦ Ft (see Fig. 4.1). The advantage of this model is that the Knapp–Stein intertwining operator becomes an algebraic operator (see Theorem 6.1 below). The price to pay is that the Lie algebra k acts on Uμ,δ by second-order differential operators. We can still give an explicit form of minimal K-types on the model Uμ,δ when it splits into two irreducible components (μ = 0, δ = 0, 1) by means of K-Bessel functions (Section 7). We define an endomorphism of L2 (R2m+1 ) by −μ
ρ 2 ρ δ (Tμ,δ H )(ρ, x, η) := (sgn ρ) H ρ, η, x . 2 ρ 2 Regarding Tμ,δ as an operator on the N -picture, we have
(6.1)
1704
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Theorem 6.1 (Algebraic Knapp–Stein intertwining operator). For any μ ∈ C and δ ∈ Z/2Z, the following diagram commutes:
V−μ,δ
Tμ,δ
Vμ,δ
Fξ Ft
U−μ,δ
Fξ Ft Tμ,δ
Uμ,δ
To prove Theorem 6.1, we work on the ambient space R2n (= R2m+2 ). Let FRn denote the partial Fourier transform of the last n coordinates in R2n . Lemma 6.2. 1) For f ∈ V−μ,δ , the function FRn f satisfies (FRn f ) rx, r −1 η = |r|μ (sgn r)δ (FRn f )(x, η),
r ∈ R× , x, η ∈ Rn .
2) For f ∈ S (R2n ), x, η ∈ Rn , we have FRn ◦ Fsymp ◦ FR−1 n f (x, ξ ) = f (ξ, x). Proof. 1) This is a straightforward computation. 2) For f (x, ξ ) ∈ S(R2n ), FRn ◦ Fsymp ◦ FR−1 y, η n f = f x, ξ e2πiξ,ξ e−2πi(ξ,y−x,η) e−2πiη,η dξ dx dξ dη Rn R2n Rn
=
f x, ξ e2πiξ −y,ξ e−2πiη −x,η dξ dx dξ dη
Rn ×R2n ×Rn
=
f x, ξ δ ξ − y δ η − x dx dξ
Rn
= f η , y .
2
From now x, ξ, η will stand again for elements of Rm , where m = n − 1. Proof of Theorem 6.1. According to the choice of the isomorphism (4.4) between the Lie group N and the standard Heisenberg Lie group, for f ∈ V−μ,δ , we set F (t, x, ξ ) := f (1, x, 2t, ξ ), H (ρ, x, η) := (Ft Fξ F )(ρ, x, η),
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1705
where t, ρ ∈ R and x, ξ ∈ Rm . Then H (ρ, x, η) = 12 (FRn f )(1, x, ρ2 , η). Thus, according to Lemma 6.2,
1 ρ Ft Fξ (Fsymp f )(ρ, x, η) = FRn (Fsymp f ) 1, x, , η 2 2
1 ρ = (FRn f ) , η, 1, x 2 2
2 ρ ρ 1 ρ −μ δ n = (sgn ρ) (FR f ) 1, η, , x 2 2 ρ 2 2 −μ
ρ 2 ρ δ = (sgn ρ) H ρ, η, x . 2 ρ 2 Now Theorem follows from Lemma 5.4.
2
7. Minimal K-type in a non-standard model We give an explicit formula for two particular K-finite vectors of π0,δ (in fact, minimal K± types of irreducible components π0,δ of π0,δ ; see Theorem 8.3 1)) in the non-standard L2 -model U0,δ ( L2 (R2m+1 )). The main results (see Proposition 7.1) show that minimal K-types are represented in terms of K-Bessel functions in this model. Although we do not use these results in the proof of Theorem 8.3, we think they are interesting of their own from the view point of geometric analysis of small representations. It is noteworthy that similar feature to Proposition 7.1 has been observed in the L2 -model of minimal representations of some other reductive groups (see e.g. [22]). We begin with the identification ∼ → H0,0 Cm+1 , C−
1 → 1
(constant function),
and extend it to a homogeneous function on R2n belonging to V0,0 (see (4.1)). Using the formula (4.5) in the N -picture, we set − m+1 2 . h+ (t, x, ξ ) := 1 + 4t 2 + |x|2 + |ξ |2 Notice that h+ (t, x, ξ ) ∈ V0,0 ∩ H0,0 (Cm+1 ) in the K-type formula of π0,0 (see Lemma 5.1). Let
2 1 2 1 2 2 ρ 2 ψ(ρ, x, η) := 1 + |x| + |η| . 4 Likewise we identify ∼ Cm+1 − → H0,1 Cm+1 ,
b →
m j =0
bj z j ,
(7.1)
1706
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
and set 2 h− b (t, x, ξ ) := 1 + 4t
m+2 2 − 2
+ |x| + |ξ | 2
ϕb (ρ, x, η) := ω
1
(1 + |x|2 ) 2 2
1
( ρ4 + |η|2 ) 2
b0 (1 − 2it) +
m
bj (xj − iξj ) ,
j =1
, b0
1 ρ 2
+
m
bj
j =1
xj ηj
,
(7.2)
(7.3)
where ω denotes the standard symplectic form on C2 defined as in (3.1). Then h− b ∈ V0,1 ∩ H0,1 (Cm+1 ) in the K-type formula of π0,1 (see Lemma 5.1). Let Kν (z) denote the modified Bessel function of the second kind (K-Bessel function for m+1 ) in the standard model (N -picture) are short). Then the K-finite vectors h+ and h− b (b ∈ C of the following form in the non-standard model U0,δ . Proposition 7.1. m+2
1) (Ft Fξ h+ )(ρ, x, η) =
π 2 K0 (2πψ(ρ, x, η)). Γ ( m+1 2 )
2) (Ft Fξ h− b )(ρ, x, η) =
ϕb (ρ,x,η) π 2 ψ(ρ,x,η) 2Γ ( m+2 2 )
m+2
exp(−2πψ(ρ, x, η)).
The rest of this section is devoted to the proof of Proposition 7.1. In order to get simpler ν (z) := ( z )−ν Kν (z) [19, Section 7.2]. formulas we also use the following normalization K 2 Lemma 7.2. For every μ ∈ R let us define the following function on R × Rm : 2 −μ −2iπξ,η Iμ ≡ Iμ (a, η) := a + |ξ |2 e dξ. Rm
Then, m
2π 2 m−2μ a Iμ (a, η) = K m2 −μ 2πa|η| . Γ (μ) Proof. Recall the classical Bochner formula m e−2iπsξ,ξ dσ (ξ ) = 2πs 1− 2 J m2 −1 (2πs),
for ξ ∈ S m−1 ,
S m−1
where Jν (z) denotes the Bessel function of the first kind. Then, ∞
2 −μ −2iπr|η|ξ, η m−1 |η| r a + r2 e dr dσ (ξ )
Iμ (a, η) = 0 S m−1
1− m 2
∞
= 2π|η|
0
−μ m r 2 J m2 −1 2πr|η| r 2 + a 2 dr.
(7.4)
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1707
According to [7, 8.5(20)] we have ∞ 0
1
−μ−1 1 1 a ν−μ y μ+ 2 Kν−μ (ay) , x ν+ 2 x 2 + a 2 Jν (xy)(xy) 2 dx = 2μ Γ (μ + 1)
for Re a > 0 and −1 < Re ν < 2 Re μ + 32 , which implies
m 2π μ a 2 −μ K m2 −μ 2πa|η| Iμ (a, η) = Γ (μ) |η| m
2π 2 m−2μ a = K m2 −μ 2πa|η| . Γ (μ)
2
In particular, we have I m+1 (a, η) = 2
I m+2 (a, η) = 2
1 (z) = Here we used K − 2
π
m+2 2
Γ ( m+1 2 ) 2π
Γ ( m+2 2 )
√
− and h− (1) for h(1,0,...,0) and
m+2 2
exp(−2πa|η|) , a |η| K1 2πa|η| . a
π −z in the first identity. 2 e − h(0,1,0,...,0) , respectively.
By a little abuse of notation, we write h− (0)
Lemma 7.3. For (t, x) ∈ R × Rm , we set a ≡ a(t, x) :=
1 + 4t 2 + |x|2 .
Then, Fξ h+ (t, x, η) = I m+1 a(t, x), η , 2
1 ∂ I m+2 a(t, x), η . (t, x, η) = x + Fξ h− 1 (1) 2 2π ∂η1 Proof. By definition Fξ h+ (t, x, η) = Fξ h− (1) (t, x, η) =
− m+1 −2πiξ,η 2 e 1 + 4t 2 + |x|2 + |ξ |2 dξ,
Rm
− m+2 2 (x − iξ )e −2πiξ,η dξ 1 + 4t 2 + |x|2 + |ξ |2 1 1
Rm
1 ∂ = x1 + I m+2 1 + 4t 2 + |x|2 , η . 2 2π ∂η1 Hence Lemma 7.3 is proved.
2
1708
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Proof of Proposition 7.1. We recall from [7, vol. I, 1.4(27); 1.13(45); 2.13(43)] the following formulas: For Re d > 0, Re c > 0 and s > 0, ∞
1
exp(−d(t 2 + c2 ) 2 ) (t 2 + c2 )
0
∞
(t 2 + c2 ) 2
1 cos(st) dt = K0 c s 2 + d 2 2 , !
1
Kν (d(t 2 + c2 ) 2 ) ν
0
1 2
cos(st) dt =
1
2 2 π Kν− 12 (c(s + d ) 2 ) 2 d ν cν− 12 (s 2 + d 2 ) 14 − 12 ν
2 1 √ 2 2 , = 2ν−1 π d −ν c1−2ν K −ν+ 1 c s + d 2
∞
1
tK1 (d(t 2 + c2 ) 2 ) 1
(t 2 + c2 ) 2
0
(7.5)
(7.6)
1
πs exp(−c(s 2 + d 2 ) 2 ) sin(st) dt = . 1 2d (s 2 + d 2 ) 2
(7.7)
1
We apply the formulas (7.5) and (7.6) with d = 4π|η|, c = 12 (1 + |x|2 ) 2 and s = 2πρ. In view 1 2
1 2
that a ≡ a(t, x) = 2(t 2 + c2 ) and 2πψ(ρ, x, η) = c(s 2 + d 2 ) , we get ∞ −∞
∞ −∞
exp(−2πa|η|) −2πitρ e dt = K0 2πψ(ρ, x, η) , a
K1 (2πa|η|) −2πitρ 1 e dt = exp −2πψ(ρ, x, η) . 1 a 4|η|(1 + |x|2 ) 2 √
1 (z) = π e−z for the second equation. Thus the first statement has Here, we have used again K −2 2 been proved. To see the second statement, it is sufficient to treat the following two cases: b = (1, 0, . . . , 0) and b = (0, 1, 0, . . . , 0). We use Ft Fξ h− (1)
1 ∂ I m+2 a(t, x), η = F t x1 + 2 2π ∂η1
1 ∂ Ft I m+2 a(t, x), η . = x1 + 2 2π ∂η1
Now use
1 ∂ exp(−2πψ(ρ, x, η)) ϕ(1) (ρ, x, η) exp(−2πψ(ρ, x, η)) x1 + . = 1 2π ∂η1 ψ(ρ, x, η) (1 + |x|2 ) 2
The case b = (1, 0, . . . , 0) goes similarly by using the formula (7.7).
2
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1709
R) ↓ Sp(n,R R) 8. Branching law for GL(2n,R From now we give a proof of Theorem 1.1 with emphasis on geometric analysis involved. Our strategy is the following. Suppose P is a closed subgroup of a Lie group G, χ : P → C× a unitary character, and L := G ×P χ a G-equivariant line bundle over G/P . We write L2 (G/P , L) for the Hilbert space consisting of L2 -sections for the line bundle L ⊗ 1 (Λtop T ∗ (G/P )) 2 . Then the group G acts on L2 (G/P , L) as a unitary representation, to be denoted by πχG , by translations. If (G, H ) is a reductive symmetric pair and P is a parabolic subgroup"of G, then there exist finitely many open H -orbits O(j ) on the real flag variety G/P such that j O(j ) is open dense in G/P . (In our cases below, the number of open H -orbits is at most two.) Applying the Mackey theory, we see that the restriction of the unitary representation πχG to the subgroup H is unitarily equivalent to a finite direct sum: # L2 O(j ) , L|O(j ) . πχG H j
Thus the branching problem is reduced to the irreducible decomposition of L2 (O(j ) , L|O(j ) ), equivalently, the Plancherel formula for the homogeneous line bundle L|O(j ) over open H orbits O(j ) . In our specific setting, where G = GL(N, R) and P = PN (see (1.2)), the base space G/P is the real projective space PN −1 R. For (λ, δ) ∈ R × Z/2Z, we define a unitary character χiλ,δ of PN by
χiλ,δ
a
tb
0
C
:= |a|λ (sgn a)δ ,
a ∈ GL(1, R), C ∈ GL(N − 1, R), b ∈ RN −1 ,
G in previous notation. In this and in the matrix realization of PN . Then πχGiλ,δ coincides with πiλ,δ the next three sections, we find the explicit irreducible decomposition of L2 (O(j ) , L|O(j ) ) with G . respect to πiλ,δ We begin with the case H = G1 , i.e.
(G, H ) ≡ GL(2n, R), Sp(n, R) . As we have already seen in Section 4 the group G1 acts transitively on G/PN , and we have the following unitary equivalence of unitary representations of G1 = Sp(n, R): G1 G πiλ,δ πiλ,δ . G 1
Sp(n,R)
Here πiλ,δ is a unitary representation of Sp(n, R) induced from the maximal parabolic subgroup P = G1 ∩ PN (GL(1, R) × Sp(n − 1, R)) H 2n−1 . Thus the following two statements are equivalent. GL(2n,R)
from GL(2n, R) to Sp(n, R) stays irreducible for any Theorem 8.1. The restriction of πiλ,δ λ ∈ R× and δ ∈ {0, 1}. It splits into two irreducible components for λ = 0, δ = 0, 1 and n 2.
1710
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Theorem 8.2. Let P be a maximal parabolic subgroup of G1 whose Levi part is isomorphic to GL(1, R) × Sp(n − 1, R), and denote by πiλ,δ (λ ∈ R, δ = 0, 1) the corresponding unitary (degenerate) principal series representation of G1 . Then for n 2, πiλ,δ is irreducible for any (λ, δ) ∈ R× × Z/2Z, and splits into a direct sum of two irreducible components for λ = 0, δ = 0, 1. Theorem 8.2 itself was proved in [23, Theorem 7.3]. The case of δ = 0 was studied by different methods earlier in [9] and also very recently in [2] (λ = 0 and δ = 0) in the context of special unipotent representations of the split group Sp(n, R). We give yet another proof of Theorem 8.2 in the most interesting case, i.e. in the case λ = 0 and δ = 0, 1 below. Theorem 8.3 describes a finer structure of the irreducible summands. The novelty here (even for the δ = 0 case) is that we characterize explicitly the two irreducible summands by their Kmodule structure, and also by their P -module structure. The former is given in terms of complex spherical harmonics (cf. Lemma 5.1) and the latter in terms of Hardy spaces (cf. Lemma 4.5), as follows: Theorem 8.3. Let n 2 and δ ∈ Z/2Z. The unitary representation π0,δ of G1 = Sp(n, R) splits into the direct sum of two irreducible representations of G1 : + − π0,δ = π0,δ ⊕ π0,δ .
(8.1)
1) (Characterization by K-type.) Each irreducible summand in (8.1) has the following K-type formula: + π0,δ
⊕
Hα,β Cn ,
β∈2N α≡β+δ mod 2 − π0,δ
⊕
Hα,β Cn ,
β∈2N+1 α≡β+δ mod 2
where ⊕ denotes the Hilbert completion of the algebraic direct sum. ± 2) (Characterization by Hardy spaces.) The irreducible summands π0,δ consist of two Hardy spaces via the isomorphism (4.15): + 2 2 π0,0 H+ (W+ ) ⊕ H− (W+ ),
− 2 2 π0,0 H+ (W− ) ⊕ H− (W− ),
+ 2 2 H+ (W+ ) ⊕ H− (W− ), π0,1
− 2 2 π0,1 H+ (W− ) ⊕ H− (W+ ).
2 (W ) are the W -valued Hardy Here, W± are the subspaces of L2 (R2m ) defined in (4.14), and H± ε ε spaces. 3) (Characterization by the Knapp–Stein intertwining operator.) The irreducible sum± mands π0,δ are the ±1 eigenspaces of the normalized Knapp–Stein intertwining operator T0,δ (see (5.2)).
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1711
Proof. 1) and 3). The normalized Knapp–Stein intertwining operator T0,δ has eigenvalues either 1 or −1 according to the parity of the K-type Hα,β (Cn ), namely β ≡ 0 or β ≡ 1 mod 2 by Proposition 5.2. Hence the statements 1) and 3) are proved. 2) In the model U0,δ L2 (R2m+1 ) (see Section 6), the Knapp–Stein intertwining operator T0,δ is equivalent to the algebraic operator
2 ρ T0,δ : H (ρ, x, η) → (sgn ρ)δ H ρ, η, x , ρ 2 by Theorem 6.1. In turn, it follows from Lemma 3.4 that T0,δ is transfered to the operator S(ρ, ∗) → (sgn ρ)δ S†ρ (ρ, ∗)
(8.2)
in the operator calculus model L2 (R, HS(L2 (Rm ), L2 (Rm ))) (see Fig. 4.1). In view of the ±1 eigenspaces of the transform (8.2), we see that the statement 2) follows from the characterization ∼ 2 (W ) − 2 of W± (see Lemma 4.4) and the isomorphism Ft : H± ε → L (R± , Wε ) given in Lemma 2.2. ± Finally, we need to prove that the summands π0,δ are irreducible G1 -modules. This is de± by means of Hardy spaces in 2) and from the following duced from the decomposition of π0,δ lemma. 2 2 (W ) (ε = ±) is G -stable with Lemma 8.4. For any δ ∈ Z/2Z, none of the Hardy spaces H± ε 1 respect to π0,δ .
Proof. For Z := (z1 , . . . , zm ) = x + iξ ∈ Cm R2m (see (4.5)), we set − m+1 2 , f0,0 (t, x, ξ ) := 1 + 4t 2 + |x|2 + |ξ |2 − m+2 2 (x − iξ ), f0,1 (t, x, ξ ) := 1 + 4t 2 + |x|2 + |ξ |2 1 1 m+2 − 2 (x1 + iξ1 ), f1,0 (t, x, ξ ) := 1 + 4t 2 + |x|2 + |ξ |2 − m+3 2 1 + 4t 2 − x12 − ξ12 . f1,1 (t, x, ξ ) := 1 + 4t 2 + |x|2 + |ξ |2 − We note that f0,0 = h+ and f0,1 = h− (0,1,0,...,0) = h(1) in the notation of Section 7. Then we have fα,β ∈ Hα,β (Cn ) for any α, β ∈ {0, 1}. In view of Theorem 8.3 1), we get
+ , f0,0 (t, x, ξ ) ∈ H0,0 Cn ⊂ V0,0 − f0,1 (t, x, ξ ) ∈ H0,1 Cn ⊂ V0,1 , + f1,0 (t, x, ξ ) ∈ H1,0 Cn ⊂ V0,1 , − f1,1 (t, x, ξ ) ∈ H1,1 Cn ⊂ V0,0 , ± ± stands for the representation space in the N -picture corresponding to π0,δ in Thewhere V0,δ 2 orem 8.3. Suppose now that one of the Hardy spaces H± (Wε ) were G1 -stable with respect
1712
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
to π0,δ . Then its orthogonal complementary subspace for the decomposition in Theorem 8.3 2) 2 (W ) would be also G1 -stable. Since K-type is multiplicity-free in π0,δ by Lemma 5.1, either H± ε or its complementary subspace should contain the K-type Hα,β (Cn ) for some α, β = 0 or 1. But this never happens because fα,β (t, x, ξ ) = fα,β (−t, x, ξ ) and thus supp Ft fα,β R± (see Lemma 2.2 4)). Thus lemma is proved. 2 Remark 8.5. The case n = 1 is well known. Here the group Sp(1, R) is isomorphic to SL(2, R), and πiλ,δ are irreducible except for (λ, δ) = (0, 1), while π0,1 splits into the direct sum of two irreducible unitary representations: Sp(1,R)
π0,1
2 2 H+ (C) ⊕ H− (C)
⊕ ⊕ Hα,0 (C) ⊕ H0,β (C) . α∈2N+1
β∈2N+1
The spaces Hα,0 (C) and H0,β (C) are one-dimensional, and − α+1 2 ∈ Hα,0 (C) ∩ V (t + i)α t 2 + 1 0,1 , β+1 − 2 (t − i)β t 2 + 1 ∈ H0,β (C) ∩ V0,1 . The former function extends holomorphically to the upper half plane Π+ , and the latter one extends holomorphically to Π− if α, β ≡ 1 mod 2, namely, if δ ≡ 1. As formulated in Theorem 8.2, our result may be compared with general theory on (degenerate) principal series representations of real reductive groups. For instance, according to Harish-Chandra and Vogan and Wallach [27], such representations are at most a finite sum of irreducible representations and are ‘generically’ irreducible. A theorem of Kostant [24] asserts that spherical unitary principal series representations (induced from minimal parabolic subgroups) are irreducible. There has been also extensive research on the structure of (degenerate) principal series representations in specific cases, in particular, in the case where the unipotent radical of P is abelian by A.U. Klimyk, B. Gruber, R. Howe, E.-T. Tan, S.-T. Lee, S. Sahi and others by algebraic and combinatorial methods (see e.g. [13] and references therein). We have not adopted here the aforementioned methods, but have used the idea of branching laws to non-compact subgroups (see [16]) primarily because of the belief that the latter approach to very small representations will open new aspects of the theory of geometric analysis. R) ↓ GL(n,C C) 9. Branching law for GL(2n,R C Let PnC = LC n Nn be the standard maximal parabolic subgroup of GL(n, C) corresponding to C the partition n = 1 + (n − 1), namely, the Levi subgroup LC n of Pn is isomorphic to GL(1, C) × GL(n − 1, C) and the unipotent radical NnC is the complex abelian group Cn−1 . Inducing from 1 a unitary character (ν, m) ∈ R × Z of the first factor of LC n , GL(1, C) R+ × S we define a GL(n,C) degenerate principal series representation πiν,m of GL(n, C). They are pairwise inequivalent, irreducible unitary representations of GL(n, C) (see [13, Corollary 2.4.3]).
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1713
We identify Cn with R2n , and regard G2 := GL(n, C) as a subgroup of G = GL(2n, R). Theorem 9.1 (Branching law GL(2n, R) ↓ GL(n, C)). GL(2n,R)
πiλ,δ
GL(n,C)
⊕
GL(n,C)
πiλ,m
.
(9.1)
m∈2Z+δ
Proof. The group G2 = GL(n, C) acts transitively on the real projective space P2n−1 R, and the unique (open) orbit O2 := P2n−1 R is represented as a homogeneous space G2 /H2 where the isotropy group H2 is of the form H2 O(1) × GL(n − 1, C) NnC . Since PnC /H2 S 1 /{±1}, we have a G2 -equivariant fibration: S 1 /{±1} → P2n−1 R → GL(n, C)/PnC . Further, if we denote by Cδ the one-dimensional representation of H2 obtained as the following compositions: δ H2 → H2 /GL(n − 1, C)NnC − → C×,
then the G-equivariant line bundle Liλ,δ = G ×P Ciλ,δ is represented as a G2 -equivariant line bundle simply by Lδ := Liλ,δ |O2 GL(n, C) ×H2 Cδ . Therefore, we have an isomorphism as unitary representations of G2 : GL(2n,R)
Hiλ,δ
G2
L2 (O2 , Lδ ).
Taking the Fourier series expansion of L2 (O2 , Lδ ) along the fiber S 1 /{±1}, we get the irreducible decomposition (9.1). 2 An interesting feature of Theorem 9.1 is that the degenerate principal series representation GL(2n,R) is discretely decomposable with respect to the restriction GL(2n, R) ↓ GL(n, C). We πiλ,δ have seen this by finding explicit branching law, however, discrete decomposability of the reGL(2n,R) striction πiλ,δ |GL(n,C) can be explained also by the general theory [15] as follows: Let t be a Cartan subalgebra of o(2n), and we take a standard basis {f1 , . . . , fn } in it∗ such that the dominant Weyl chamber for the disconnected group K = O(2n) is given as it∗+ = (λ1 , . . . , λn ): λ1 λ2 · · · λn 0 .
1714
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
For K2 := G2 ∩ K U (n) the Hamiltonian action of K on the cotangent bundle T ∗ (K/K2 ) has the momentum map T ∗ (K/K2 ) → ik∗ . The intersection of its image with the dominant Weyl chamber it∗+ is given by it∗+ ∩ Ad∨ (K) ik⊥ 2 % &' $ n ∗ . = (λ1 , . . . , λn ) ∈ it+ : λ2i−1 = λi for 1 i 2 On the other hand, it follows from Lemma 5.1 that the asymptotic K-support of πiλ,δ amounts to ASK (πiλ,δ ) = R+ (1, 0, . . . , 0). Hence, the triple (G, G2 , πiλ,δ ) satisfies ASK (πiλ,δ ) ∩ Ad∨ (K) ik⊥ 2 = {0}.
(9.2)
This is nothing but the criterion for discrete decomposability of the restriction of the unitary representation πiλ,δ |G2 [15, Theorem 2.9]. GL(2n,R) For G1 = Sp(n, R), we saw in Theorem 8.1 that the restriction πiλ,δ |G1 stays irreducible. Thus, this is another (obvious) example of discretely decomposable branching law. We can see this fact directly from the observation that G1 and G2 have the same maximal compact subgroups, (K1 :=) K ∩ G1 = K ∩ G2 (=: K2 ). In fact, we get from (9.2) ASK (πiλ,δ ) ∩ Ad∨ (K) ik⊥ 1 = {0}. Therefore, the restriction πiλ,δ |G1 is discretely decomposable, too. Remark 9.2. In contrast to the restriction of the quantization of elliptic orbits (equivalently, of Zuckerman’s Aq (λ)-modules), it is rare that the restriction of the quantization of hyperbolic orbits (equivalently, unitarily induced representations from real parabolic subgroups) is discretely decomposable with respect to non-compact reductive subgroups. Another discretely decomposable case was found by Lee–Loke in their study of the Jordan–Hölder series of a certain degenerate principal series representations. R) ↓ GL(p,R R) × GL(q,R R) 10. Branching law for GL(N,R Let N = p + q (p, q 1), and consider a subgroup G3 := GL(p, R) × GL(q, R) in G := GL(N,R) GL(N, R). The restriction of πiλ,δ with respect to the symmetric pair (G, G3 ) = GL(N, R), GL(p, R) × GL(q, R) is decomposed into the same family of degenerate principal series representations of G3 :
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1715
Theorem 10.1 (Branching law GL(p + q, R) ↓ GL(p, R) × GL(q, R)). GL(p+q,R)
πiλ,δ
G3
⊕ δ =0,1 R
GL(p,R)
πiλ ,δ
πi(λ−λ ),δ−δ dλ . GL(q,R)
Outline of the proof. The proof is similar to that of Theorem 9.1. The group G3 = GL(p, R) × GL(q, R) acts on Pp+q−1 R with an open dense orbit O3 which has a G3 -equivariant fibration R× → O3 → GL(p, R)/Pp × GL(q, R)/Pq . Hence, taking the Mellin transform by the R× -action along the fiber, we get Theorem 10.1. 2 R) ↓ O(p, q) 11. Branching law for GL(N,R For N = p + q, we introduce the standard quadratic form of signature (p, q) by 2 2 Q(x) := x12 + · · · + xp2 − xp+1 − · · · − xp+q
for x ∈ Rp+q .
Let G4 be the indefinite orthogonal group defined by O(p, q) := g ∈ GL(N, R): Q(gx) = Q(x) for any x ∈ Rp+q . For q = 0, G4 is nothing but a maximal compact subgroup K = O(N ) of G, and the branching GL(N,R) law πiλ,δ |G4 is so-called the K-type formula. In order to describe the branching law G ↓ G4 for general p and q, we introduce a family O(p,q) (ν ∈ A+ (p, q) below), of irreducible unitary representations of G4 , to be denoted by π+,ν O(p,q)
O(p,q)
π−,ν (ν ∈ A+ (q, p)), and πiν,δ (ν ∈ R) as follows. Let t be a compact Cartan subalgebra of g4 , and we take a standard dual basis {ej } of t such that the set of roots for k4 := o(p) ⊕ o(q) is given by $ % & % & % & % &' p p p q (k4 , t4 ) = ±(ei ± ej ): 1 i < j or +1i <j + 2 2 2 2 % &' $ p (p: odd) ∪ ±ei : 1 i 2 $ % & % &' % & p q p ∪ ±ei : +1i + (q: odd). 2 2 2 Then, attached to the coadjoint orbits Ad∨ (G4 )(νei ) for ν ∈ A+ (p, q) and Ad∨ (G4 )(νe[ p ]+1 ) 2
O(p,q)
for ν ∈ A+ (q, p), we can define unitary representations of G4 , to be denoted by π+,ν
O(p,q) π−,ν
and
as their geometric quantizations. These representations are realized in Dolbeault cohomologies over the corresponding coadjoint orbits endowed with G4 -invariant complex structures, and their underlying (gC , K)-modules are obtained also as cohomologically induced representations from characters of certain θ -stable parabolic subalgebras (see [21, §5] for details).
1716
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720 O(p,q)
such that its infinitesimal character is given by
% & p+q p+q p+q p+q − 2, − 3, . . . , − 2 2 2 2
We normalize π+,ν
ν,
O(p,q)
in the Harish-Chandra parametrization. The parameter set that we need for π+,ν A+ (p, q) := A0+ (p, q) ∪ A1+ (p, q) where ⎧ {ν ∈ 2Z + ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ {ν ∈ 2Z + δ A+ (p, q) := ∅ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ 1 {2}
p−q 2 p−q 2
+ 1 + δ: ν > 0} + 1 + δ: ν >
p 2
is
(p > 1, q = 0); − 1} (p > 1, q = 0); (p = 1, (q, δ) = (0, 1)) or (p = 0); (p = 1, (q, δ) = (0, 1)). O(p,q)
O(q,p)
π+,ν . Notice that the identification O(p, q) O(q, p) induces the equivalence π−,ν For p, q > 0 the group G4 = O(p, q) is non-compact and there are continuously many hyperbolic coadjoint orbits. Attached to (minimal) hyperbolic coadjoint orbits, we can define another O(p,q) for ν ∈ R and family of irreducible unitary representations of G4 , to be denoted by πiν,δ O(p,q)
be the unitary representation of G4 induced from a unitary charδ ∈ {0, 1}. Namely, let πiν,δ acter (iν, δ) of a maximal parabolic subgroup of G4 whose Levi part is O(1, 1)×O(p −1, q −1). We note that the Knapp–Stein intertwining operator gives a unitary isomorphism O(p,q)
πiν,δ
O(p,q)
π−iν,δ
(ν ∈ R, δ = 0, 1).
Theorem 11.1 (Branching law GL(p + q, R) ↓ O(p, q)). GL(p+q,R) πiλ,δ O(p,q)
⊕ ν∈Aδ+ (p,q)
O(p,q) π+,ν
⊕
⊕ ν∈Aδ+ (q,p)
O(p,q) π−,ν
⊕ ⊕2
O(p,q)
πiν,δ
dν.
R+
Notice that in case when q = 0 the latter two components of the above decomposition do not occur and one gets the K-type formula GL(n, R) ↓ O(n). As a preparation of the proof, we formalize the Plancherel formula on the hyperboloid from a modern viewpoint of representation theory. Let X(p, q)± be a hypersurface in Rp+q defined by 2 2 X(p, q)± := x = x , x ∈ Rp+q : x − x = ±1 . We endow X(p, q)± with pseudo-Riemannian structures by restricting ds 2 = dx12 + · · · + 2 2 − dxp+1 − · · · − dxp+q on Rp+q . Then, X(p, q)± becomes a space form of pseudoRiemannian manifolds in the sense that its sectional curvature κ is constant. To be explicit, X(p, q)+ has a pseudo-Riemannian structure of signature (p − 1, q) with sectional curvature κ ≡ 1, whereas X(p, q)− has a signature (p, q − 1) with κ ≡ −1. Clearly, G4 acts on X(p, q)± as isometries. dxp2
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1717
We denote by L2 (X(p, q)± ) the Hilbert space consisting of square integrable functions on X(p, q)± with respect to the induced measure from ds 2 |X(p,q) . The irreducible decomposition of the unitary representation of G4 on L2 (X(p, q)± ) is equivalent to the spectral decomposition of the Laplace–Beltrami operator on X(p, q)± with respect to the G4 -invariant pseudo-Riemannian structures. The latter viewpoint was established by Faraut [8] and Strichartz [26]. As we saw in [21, §5], the discrete series representations on hyperboloids X(p, q)± are isoO(p,q) with parameter set A± (p, q). morphic to π±,ν L X(p, q)+ δ = 2
O(p,q) π+,ν
⊕ ⊕
ν∈Aδ+ (p,q)
L X(p, q)− δ = 2
O(p,q)
dν,
(11.1)
O(p,q)
dν.
(11.2)
πiν,δ
R+ O(p,q) π−,ν
⊕ ⊕
ν∈Aδ+ (q,p)
πiν,δ
R+
Here we note that each irreducible decomposition is multiplicity free, the continuous spectra in both decompositions are the same and the discrete ones are distinct. Proof of Theorem 11.1. According to the decomposition Rp+q ⊃
dense
x ∈ Rp+q : Q(x) > 0 ∪ x ∈ Rp+q : Q(x) < 0 ,
the group G4 = O(p, q) acts on Pp+q−1 R with two open orbits, denoted by O4+ and O4− . A distinguishing feature for G4 is that these open G4 -orbits are reductive homogeneous spaces. To be explicit, let H4+ and H4− be the isotropy subgroups of G4 at [e1 ] ∈ O4+ and [ep+q ] ∈ O4− , respectively, where {ej } denotes the standard basis of Rp+q . Then we have O4+ G4 /H4+ = O(p, q)/ O(1) × O(p − 1, q) , O4− G4 /H4− = O(p, q)/ O(p, q − 1) × O(1) . Correspondingly, the restriction of the line bundle Liλ,δ = G ×P χiλ,δ to the open sets O4± of the base space G/P is given by G4 ×H ± Cδ , 4
where Cδ is a one-dimensional representation of H4± defined by O(1) × O(p − 1, q) → C× ,
(a, A) → a δ ,
O(p, q − 1) × O(1) → C× ,
(B, b) → bδ ,
respectively. It is noteworthy that unlike the cases G2 = GL(n, C) and G3 = GL(p, R) × GL(q, R), the continuous parameter λ is not involved in (11.1).
1718
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
Since the union O4+ ∪ O4− is open dense in Pp+q−1 R, we have a G4 -unitary equivalence (independent of λ): GL(p+q,R)
Hiλ,δ
G4
L2 G4 ×H4 Cδ , O4+ ⊕ L2 G4 ×H4 Cδ , O4− .
Sections for the line bundle G4 ×H ± Cδ over O4± are identified with even functions (δ = 0) 4 or odd functions (δ = 1) on hyperboloids X(p, q)± because X(p, q)± are double covering manifolds of O4± . According to the parity of functions on the hyperboloid X(p, q)± , we decompose L2 X(p, q)± = L2 X(p, q)± 0 ⊕ L2 X(p, q)± 1 . Hence, we get Theorem 11.1.
2
12. Tensor products Met∨ ⊗ Met The irreducible decomposition of the tensor product of two representations is a special example of branching laws. It is well understood that the tensor product of the same Segal–Shale–Weil representation (e.g. Met ⊗ Met) decomposes into a discrete direct sum of lowest weight representations of Sp(n, R) (see [14]). In this section, we prove Theorem 12.1. Let Met be the Segal–Shale–Weil representation of the metaplectic group Mp(n, R), and Met∨ its contragredient representation. Then the tensor product representation Met∨ ⊗ Met is well defined as a representation of Sp(n, R), and decomposes into the direct integral of irreducible unitary representations as follows:
Met∨ ⊗ Met
⊕ δ=0,1 R
Sp(n,R)
2πiλ,δ
dλ.
(12.1)
+
Remark 12.2. The branching formula in Theorem 12.1 may be regarded as the dual pair correspondence O(1, 1) · Sp(n, R) with respect to the Segal–Shale–Weil representation of Mp(2n, R). We note that the Lie group O(1, 1) is non-abelian, and its finite dimensional irreducible unitary representations are generically of dimension two, which corresponds the multiplicity two in the right-hand side of (12.1). Proof of Theorem 12.1. By Proposition 3.2, the Weyl operator calculus ∼ → HS L2 Rn , L2 Rn Op : L2 R2n −
(12.2)
gives an intertwining operator as unitary representations of Mp(n, R). We write L2 (Rn )∨ for the dual Hilbert space, and identify ∨ ( L2 R n , HS L2 Rn , L2 Rn L2 Rn ⊗
(12.3)
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
1719
( denotes the completion of the tensor product of Hilbert spaces. Composing (12.2) where ⊗ and (12.3), we see that the tensor product representation Met∨ ⊗ Met of Mp(n, R) is unitarily equivalent to the regular representation on L2 (R2n ). This representation on the phase space L2 (R2n ) is well defined as a representation of Sp(n, R). We consider the Mellin transform on R2n , which is defined as the Fourier transform along the radial direction: 1 f→ 4π
∞ |t|n−1+iλ (sgn t)δ f (tX) dt, −∞
with λ ∈ R, δ = 0, 1, X ∈ R2n . Then, the Mellin transform gives a spectral decomposition of the Hilbert space L2 (R2n ). Therefore, the phase space representation L2 (R2n ) is decomposed as a direct integral of Hilbert spaces: ⊕ 2n L R Viλ,δ dλ. 2
(12.4)
δ=0,1 R Sp(n,R)
Since πiλ,δ
Sp(n,R)
π−iλ,δ
(see (5.3)), we get Theorem 12.1.
2
Acknowledgments The authors are grateful to the Institut des Hautes Études Scientifiques, the Institute for the Physics and Mathematics of the Universe of the Tokyo University, the Universities of Århus and Reims where this work was done. References [1] E.P. van den Ban, H. Schlichtkrull, The Plancherel decomposition for a reductive symmetric space. I, II, Invent. Math. 161 (2005) 453–566, 567–628. [2] D. Barbasch, The unitary spherical spectrum for split classical groups, J. Inst. Math. Jussieu 9 (2010) 265–356. [3] V. Bargmann, Irreducible unitary representations of the Lorentz group, Ann. of Math. 48 (1947) 568–640. [4] M. Berger, Les espaces symétriques noncompacts, Ann. Sci. École Norm. Sup. (3) 74 (1957) 85–177. [5] J.-L. Clerc, T. Kobayashi, M. Pevzner, B. Ørsted, Generalized Bernstein–Reznikov integrals, Math. Ann. (2010), doi:10.1007/s00208-010-0516-4. [6] P. Delorme, Formule de Plancherel pour les espaces symétriques réductifs, Ann. of Math. (2) 147 (2) (1998) 417– 452. [7] A. Erdélyi, W. Magnus, F. Oberhettinger, F.G. Tricomi, Tables of Integral Transforms, vols. I, II, McGraw–Hill, New York, 1954. [8] J. Faraut, Distributions sphériques sur les espaces hyperboliques, J. Math. Pures Appl. 58 (1979) 369–444. [9] T.A. Farmer, Irreducibility of certain degenerate principal series representations of Sp(n, R), Proc. Amer. Math. Soc. 83 (1981) 411–420. [10] G.B. Folland, Harmonic Analysis in Phase Space, Princeton University Press, Princeton, 1989. [11] W.-T. Gan, G. Savin, On minimal representations definitions and properties, Represent. Theory 9 (2005) 46–93. [12] R. Howe, On the role of the Heisenberg group in harmonic analysis, Bull. Amer. Math. Soc. (N.S.) 3 (1980) 821– 843. [13] R. Howe, S.-T. Lee, Degenerate principal series representations of GLn (C) and GLn (R), J. Funct. Anal. 166 (1999) 244–309.
1720
T. Kobayashi et al. / Journal of Functional Analysis 260 (2011) 1682–1720
[14] M. Kashiwara, M. Vergne, On the Segal–Shale–Weil representations and harmonic polynomials, Invent. Math. 44 (1978) 1–47. [15] T. Kobayashi, Discrete decomposability of the restriction of Aq (λ) with respect to reductive subgroups II: Microlocal analysis and asymptotic K-support, Ann. of Math. 147 (1998) 709–729. [16] T. Kobayashi, Branching problems of unitary representations, in: Proc. of ICM 2002, vol. 2, Beijing, 2002, pp. 615– 627. [17] T. Kobayashi, Algebraic analysis on minimal representations, Publ. Res. Inst. Math. Sci. 47 (2011), Special Issue in Commemoration of the Golden Jubilee of Algebraic Analysis, in press, arXiv:1001.0224. [18] T. Kobayashi, G. Mano, Integral formula of the unitary inversion operator for the minimal representation of O(p, q), Proc. Japan Acad. Ser. A 83 (2007) 27–31. [19] T. Kobayashi, G. Mano, The Schrödinger model for the minimal representation of the indefinite orthogonal group O(p, q), Mem. Amer. Math. Soc. 212 (1000) (2011), in press, available at arXiv:0712.1769. [20] T. Kobayashi, B. Ørsted, Analysis on the minimal representations of O(p, q), I – Realization and conformal geometry, Adv. Math 180 (2003) 486–512. [21] T. Kobayashi, B. Ørsted, Analysis on the minimal representations of O(p, q), II – Branching laws, Adv. Math 180 (2003) 513–550. [22] T. Kobayashi, B. Ørsted, Analysis on the minimal representations of O(p, q), III – Ultra-hyperbolic equations on Rp−1,q−1 , Adv. Math 180 (2003) 551–595. [23] T. Kobayashi, B. Ørsted, M. Pevzner, A. Unterberger, Composition formulas in the Weyl calculus, J. Funct. Anal. 257 (2009) 948–991. [24] B. Kostant, On the existence and irreducibility of certain series of representations, Bull. Amer. Math. Soc. 75 (1969) 627–642. [25] J. von Neumann, Die Eindeutigkeit der Schrödingerschen Operatoren, Math. Ann. 104 (1931) 570–578. [26] R.S. Strichartz, Harmonic analysis on hyperboloids, J. Funct. Anal. 12 (1973) 341–383. [27] D.A. Vogan Jr., N.R. Wallach, Intertwining operators for real reductive groups, Adv. Math. 82 (1990) 203–243.
Journal of Functional Analysis 260 (2011) 1721–1733 www.elsevier.com/locate/jfa
Level sets and composition operators on the Dirichlet space O. El-Fallah a,1 , K. Kellay b,∗,1,2 , M. Shabankhah b,2,3 , H. Youssfi b,1,2 a Département de Mathématiques, Université Mohamed V, B.P. 1014 Rabat, Morocco b CMI, LATP, Université de Provence, 39, rue F. Joliot-Curie, 13453 Marseille, France
Received 24 March 2010; accepted 21 December 2010 Available online 3 January 2011 Communicated by Gilles Godefroy
Abstract We consider composition operators in the Dirichlet space of the unit disc in the plane. Various criteria on boundedness, compactness and Hilbert–Schmidt class membership are established. Some of these criteria are shown to be optimal. © 2010 Elsevier Inc. All rights reserved. Keywords: Dirichlet space; Composition operators; Capacity
1. Introduction In this note we consider composition operators in the Dirichlet space of the unit disc. A comprehensive study of composition operators in function spaces and their spectral behavior could be found in [3,11,16]. See also [6–8,12,13,17] for a treatment of some of the questions addressed in this paper. * Corresponding author.
E-mail addresses: [email protected] (O. El-Fallah), [email protected] (K. Kellay), [email protected], [email protected] (M. Shabankhah), [email protected] (H. Youssfi). 1 Research partially supported by a grant from AI PHC Volubilis MA 09209. 2 Research partially supported by ANR Dynop. 3 Current address: Department of Mathematics and Statistics, McGill University, Montreal, QC, Canada H3A 2K6. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.023
1722
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
Let D be the unit disc in the complex plane and let T = ∂D be its boundary. We denote by D the classical Dirichlet space. This is the space of all analytic functions f on D such that D(f ) :=
2 f (z) dA(z) < ∞,
D
where dA(z) = dx dy/π stands for the normalized area measure in D. We call D(f ) the Dirichlet integral of f . The space D is endowed with the norm 2 f 2D := f (0) + D(f ). It is standard that a function f (z) = only if
∞
n=0 f (n)z
n,
holomorphic on D, belongs to D if and
f(n)2 (1 + n) < ∞, n0
and that this series defines an equivalent norm on D. Since the Dirichlet space is contained in the Hardy space H2 (D), every function f ∈ D has non-tangential limits f ∗ almost everywhere on T. In this case, however, more can be said. Indeed, Beurling [2] showed that if f ∈ D then f ∗ (ζ ) = limr→1 f (rζ ) exists for ζ ∈ T outside of a set of logarithmic capacity zero. Let ϕ be a holomorphic self-map of D. The composition operator Cϕ on D is defined by Cϕ (f ) = f ◦ ϕ,
f ∈ D.
We are interested herein in describing the spectral properties of the composition operator Cϕ , such as compactness and Hilbert–Schmidt class membership, in terms of the size of the level set of ϕ. For s ∈ (0, 1), the level set Eϕ (s) of ϕ is given by Eϕ (s) = ζ ∈ T: ϕ(ζ ) s . We give new characterizations of Hilbert–Schmidt class membership in the case of the Dirichlet space. We also establish the sharpness of these results. 2. A general criterion For α > −1, dAα will denote the finite measure on D given by
α dAα (z) := (1 + α) 1 − |z|2 dA(z). p
For p 1 and α > −1, the weighted Bergman space Aα consists of the holomorphic functions f on D for which f p,α := D
1/p f (z)p dAα (z) < ∞.
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1723
p
We denote by Dα the space consisting of analytic functions f on D such that p p p f Dp := f (0) + f p,α < ∞. α
Appropriate choices of the parameter α give, with equivalent norm, all the standard holomorphic function spaces. Indeed, the Hardy space H2 can be identified with D12 . The classical Besov p p p space is precisely Dp−2 , and if p < α + 1, Dα = Aα−2 . Finally, the classical Dirichlet space D is identical to D02 . p We recall that, by the reproducing formula [16], for every f ∈ Aα , f (z) = D
f (w) dAα (w), (1 − wz)2+α
z ∈ D.
(1)
Lemma 2.1. Let p 1 and let σ > −1. Then, there exists a constant C depending only on p and p σ such that for every f ∈ Aσ , f (z)p C
D
|f (λ)|p |1 − λz|2+σ
z ∈ D.
dAσ (λ),
Proof. By the above reproducing formula, f (z) = 1 − zw
D
dAσ (λ) f (λ) , 1 − λw (1 − λz)2+σ
z, w ∈ D,
p
for every f ∈ Aσ . By Hölder’s inequality, with q = p/(p − 1), |f (z)|p |1 − zw|p
|f (λ)|p dAσ (λ) |1 − λz|2+σ
D
× D
dAσ (λ) |1 − λw|q |1 − λz|(2+σ )p
p q
.
Taking w = z, and using the standard estimate, [16, Lemma 3.10] D
dAc (λ) |1 − zλ|2+c+d
we get the desired conclusion.
1 , (1 − |z|2 )d
if d > 0, c > −1,
2
For λ ∈ D, consider the test function Fλ,β (z) = (1 − λz)−(1+β) ,
z ∈ D.
If β 0 is chosen such that δ := δ(p, α, β) = 2 + β − (2 + α)/p > 0, by (2), we have
−pδ p Fλ,β Dp 1 − |λ|2 . α
(2)
1724
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
The following theorem unifies and generalizes the previously known results of MacCluer [3, Theorem 3.12], Tjani [12, Theorem 3.5] and Wirths and Xiao [13, Theorem 3.2] on Hardy, Besov and weighted Dirichlet spaces, respectively. The techniques required in the proof are known, for the completeness, we give here the proof. p
Theorem 2.2. Let p > 1. Suppose ϕ ∈ Dα satisfies ϕ(D) ⊂ D. Fix β 0 such that δ := δ(p, α, β) = 2 + β − (2 + α)/p > 0. Then: p
(a) Cϕ is bounded on Dα ⇐⇒ supλ∈D (1 − |λ|2 )δ Fλ,β ◦ ϕDαp < ∞; p (b) Cϕ is compact on Dα ⇐⇒ lim|λ|→1 (1 − |λ|2 )δ Fλ,β ◦ ϕDαp = 0. Proof. Without loss of generality we assume that ϕ(0) = 0. To prove (a), we observe that if Cϕ is bounded, then
−δ
Fλ,β ◦ ϕDαp = O 1 − |λ|2 . p
For the converse, it follows from Lemma 2.1 that, for f ∈ Dα ,
p
ϕ (z) f ϕ(z) p dAα (z)
D
C D
=C
p ϕ (z)
D
|f (λ)|p |1 − λϕ(z)|(2+β)p
dA2p+βp−2 (λ) dAα (z)
p
f (λ) 1 − |λ|2 pδ (Fλ,β ◦ ϕ) p dAα (λ). p,α
D
Therefore part (a) follows. (b) Assume that lim|λ|→1 (1 − |λ|2 )δ Fλ,β ◦ ϕDαp = 0. Let (fn )n be a bounded sequence of p Dα such that fn → 0 uniformly on compact sets. Since fn → 0 uniformly on compact sets, it follows from the proof of part (a) and the hypothesis that, for r close enough to 1,
Cϕ (fn ) p p − fn (0)p Dα
p p
pδ fn (λ) 1 − |λ|2 (Fλ,β ◦ ϕ) p,α dAα (λ) rD
+
p
f (λ) 1 − |λ|2 pδ (Fλ,β ◦ ϕ) p dAα (λ) → 0, n p,α
D\rD
and Cϕ is compact. The converse is obvious.
2
The following result is an immediate consequence of Theorem 2.2.
n → ∞,
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1725
Corollary 2.3. Let ϕ : D → D such that ϕ ∈ D. (a) If supn1 D(ϕ n ) < ∞, then Cϕ is bounded. (b) If limn→∞ D(ϕ n ) = 0, then Cϕ is compact. Proof. We consider the test function Fλ,0 with β = α = 0 and p = 2. Both (a) and (b) follow from the following inequality:
2 D(Fλ,0 ◦ ϕ) 2 1 − |λ|2
D
|ϕ (z)|2 dA(z) (1 − |λ|2 ϕ(z)|2 )4
2 c 1 − |λ|2 (n + 1)3 |λ|2n n0
2 n 2 ϕ (z) ϕ (z) dA(z)
D
2
= c 1 − |λ|2 (1 + n)|λ|2n D ϕ n+1 n0
c lim sup D ϕ n+1 . n→∞
2
Remark 2.4. The compactness criterion for Cϕ in the Bloch space is equivalent to ϕ n B → 0 as was shown in [15] (see also [10,12]). In the case of the Hardy space H2 , however, we know that if Cϕ is compact on H2 then ϕ n H2 → 0 but the converse does not hold [3]. √ Note that as before in the proof of Corollary 2.3 (β = 0, α = 1 and p = 2) if ϕ n H2 = o(1/ n ), then Cϕ is compact on H2 . 3. Hilbert–Schmidt membership In the case of the Hardy space H2 , one can completely describe the membership of Cϕ in the Hilbert–Schmidt class in terms of the size of the level sets of the inducing map ϕ. Indeed, Cϕ is Hilbert–Schmidt in H2 if and only if 2
ϕ n 2 = H n0
T
|dζ | < ∞. 1 − |ϕ(ζ )|2
Given an arbitrary measurable function f on T, consider the associated distribution function mf defined by mf (λ) = ζ ∈ T: f (ζ ) > λ ,
λ > 0.
It then follows that Cϕ is in the Hilbert–Schmidt class of H2 if and only if T
|dζ | = 1 − |ϕ(ζ )|2
∞
1 m(1−|ϕ|2 )−1 (λ) dλ
1
0
|Eϕ (s)| ds < ∞. (1 − s)2
1726
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
It was shown by Gallardo-Gutiérrez and González [8, Main Theorem] that there is a mapping ϕ taking D to itself such that Cϕ is compact in H2 , and that the level set Eϕ (1) has Hausdorff dimension equal to one. Recall that the Hausdorff dimension of E: d(E) = inf α: Λα (E) = 0 where Λα (E) is the α-Hausdorff measure of E given by α Λα (E) = lim inf | i | : E ⊂
i , | i | < . →0
i
i
Given E ⊂ T and t > 0, let us write Et = ζ ∈ T: d(ζ, E) t where d denotes the arclength distance and |Et | denotes the Lebesgue measure of E. Let E be a closed subset of T with |Et | = O((log(e/t))−3 ) and E has Hausdorff dimension one (such examples can be given by generalized Cantor sets [2]). Let ω(t) = (log(e/t))−2 , and ∗ is given by consider the outer function fω,E such that its radial limit fω,E ∗ f (ζ ) = e−w(d(ζ,E)) , ω,E
a.e. on T.
Since ω satisfies the Dini condition
ω(t) dt < ∞, t
0
it follows that fω,E ∈ A(D) := Hol(D) ∩ C(D), disc algebra (see [9, pp. 105–106]) and so Efω,E (1) = E. On the other hand T
|dζ | 1 − |fω,E (ζ )|2
T
|dζ | ω(d(ζ, E))
|Et |
ω (t) dt ω(t)2
0
(see [4, Proposition A.1] for the last equality). Since the last integral converges, Cϕ is a Hilbert– Schmidt operator in H2 . We have the following more precise result. Theorem 3.1. Let E be a closed subset of T with Lebesgue measure zero. There exists a mapping ϕ : D → D, ϕ ∈ A(D), such that Cϕ is a Hilbert–Schmidt operator on H2 and that Eϕ (1) = E. Proof. The proof is based a well-known construction of peak functions in the disc algebras. Let T \ E = n1 (eian , eibn ). For t ∈ (an , bn ), we define
g eit = τn
(bn − an )1/2 , [(bn − an )2 − (2t − (bn + an ))2 ]1/4
where (τn )n ⊂ (0, ∞) will be chosen later, and g(eit ) := +∞ if eit ∈ E.
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1727
Note that 2π
2 g eit dt = τn2 (bn − an ) n1
0
bn [(bn − an
an
1
1 2 = τn (bn − an ) 2 n1
= Since
∞
n=1 (bn
π 2
∞
−1
)2
dt − (2t − (bn + an ))2 ]1/2
du [1 − u2 ]1/2
τn2 (bn − an ).
n=1
− an ) = 2π , there exists a sequence (τn )n such that ∞
lim τn = +∞ and
n→+∞
τn2 (bn − an ) < ∞.
n=1
Let U denote the harmonic extension of g on the unit disc given by
1 U reiθ = 2π
2π 0
1 − r2 g eit dt = g (n)r |n| einθ . it iθ 2 |e − re | n∈Z
Since τn → ∞, one can easily verify that limt→θ g(eit ) = +∞, for eiθ ∈ E. Hence, limr→1− U (reiθ ) = +∞, for eiθ ∈ E. Let V be the harmonic conjugate of U , with V (0) = 0. It is given by
n g (n)r |n| einθ . V reiθ = |n| n=0
Now, since g is a C 1 function on T \ E, we see that the holomorphic function f = U + iV is continuous on D \ E. Knowing that limr→1− U (reit ) = +∞, for eit ∈ E, we get that ϕ = f f+1 ∈ A(D), disc algebra, and Eϕ (1) = E. Finally 1 2π
2π 0
dt 1 = it 2 2π 1 − |ϕ(e )| 1 2π
2π 0
(U (eit ) + 1)2 + V 2 (eit ) dt (U (eit ) + 1)2 − U 2 (eit )
2π it
2
U e + 1 + V 2 eit dt 0
1+2
2 g (n) , n∈Z
which shows that Cϕ is Hilbert–Schmidt because g ∈ L2 (T).
2
1728
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
Let E be a closed subset of the unit circle T. Fix a non-negative function w ∈ C 1 (0, π] such that
w d(ζ, E) |dζ | < ∞, T
where d denotes the arclength distance. Now, let fw,E be the outer function given by ∗ f (ζ ) = e−w(d(ζ,E)) , w,E
a.e. on T.
(3)
The following lemma gives an estimate for the Dirichlet integral of fw,E in terms of w and the distance function on E. The proof is based on Carleson’s formula, and can be achieved by slightly modifying the arguments used in [5, Theorem 4.1]. Lemma 3.2. Assume that the function ω is nondecreasing and ω(t γ ) is concave for all γ > 2. Then
2 D(fw,E ) ω d(ζ, E) e−2w(d(ζ,E)) d(ζ, E) |dζ |. T
√ Since the sequence {zn / n + 1 }∞ n=0 is an orthonormal basis of D, the operator Cϕ is Hilbert– Schmidt on the Dirichlet space if and only if 1 π
D
D(ϕ n ) |ϕ (z)|2 < ∞. dA(z) = n (1 − |ϕ(z)|2 )2 n1
Theorem 3.3. Assume that the function ω is nondecreasing and ω(t γ ) is concave for some γ > 2. Then Cfw,E is in the Hilbert–Schmidt class in D if and only if T
ω (d(ζ, E))2 d(ζ, E) |dζ | < ∞. w(d(ζ, E))2
n =f Proof. We first note that fw,E nw,E . Therefore, by Lemma 3.2, we have
D
(z)|2 |fw,E
(1 − |fw,E (z)|2 )2
dA(z) =
∞ D(fnw,E ) n=1
n
∞
2 ω d(ζ, E) d(ζ, E) ne−2nw(d(ζ,E)) |dζ | n=1
T
T
ω (d(ζ, E))2 d(ζ, E) |dζ |. [1 − e−2w(d(ζ,E)) ]2
Since 1 − e−2w(d(ζ,E)) w(d(ζ, E)), the result follows.
2
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1729
Given a (Borel) probability measure μ on T, we define its α-energy, 0 α < 1, by Iα (μ) =
∞ | μ(n)|2 n=1
n1−α
.
For a closed set E ⊂ T, its α-capacity capα (E) is defined by capα (E) := 1/ inf Iα (μ): μ is a probability measure on E . If α = 0, we simply note cap(E) and this means the logarithmic capacity of E. The weak-type inequality for capacity [2] states that, for f ∈ D and t 4f 2D , 16f 2D cap ζ : f (ζ ) t . t2 As a result of this inequality, we see that if lim inf ϕ n D = 0, then cap(Eϕ (1)) = 0. Indeed, since Eϕ (1) = Eϕ n (1), the weak capacity inequality implies that
2
cap Eϕ (1) = cap Eϕ n (1) 16 ϕ n D . Now let n → ∞. Hence, in particular, if the operator Cϕ is in the Hilbert–Schmidt class in D, then cap(Eϕ (1)) = 0. This result was first obtained by Gallardo-Gutiérrez and González [6,7] using a completely different method. Theorems 3.4 and 3.6 give quantitative versions of this result. Theorem 3.4. If Cϕ is a Hilbert–Schmidt operator in D, then 1 0
cap(Eϕ (s)) 1 log ds < ∞. 1−s 1−s
Proof. Fix λ ∈ T and let ϕλ (ζ ) = log Re
1 + λϕ(ζ ) , 1 − λϕ(ζ )
ζ ∈ T.
Since D
|ϕ (z)|2 dA(z) < ∞, (1 − |ϕ(z)2 |)2
it follows that ϕλ ∈ D(T), see [6], where 2
2 2 D(T) := f ∈ L (T): f D(T) = f (n) 1 + |n| < ∞ . n∈Z
(4)
1730
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
Setting λ := {ζ ∈ T: |1 − λϕ(ζ )| 1}, we see that ϕλ (ζ ) log
1 , 1 − |ϕ(ζ )|2
∀ζ ∈ λ .
Applying the strong capacity inequality [14, Theorem 2.2] to ϕλ , we get ∞ ∞ > ϕλ D(T) c 2
cap ζ ∈ T: ϕλ (ζ ) > s ds 2 2 log 1 − |ϕ(ζ )| > s ds 2 |1 − λϕ(ζ )|2
∞
cap ζ ∈ T:
∞
cap ζ ∈ T ∩ λ :
∞
cap ζ ∈ T ∩ λ : log
=c c c
1 c1
2 log 1 − |ϕ(ζ )| > s ds 2 |1 − λϕ(ζ )|2 1 > 4s ds 2 1 − |ϕ(ζ )|2
cap ζ ∈ T ∩ λ : ϕ(ζ ) > u d log
1 1−u
2 .
Since T = 1 ∪ −1 , the subadditivity of the capacity implies that 1 ∞ > ϕ1 D(T) + ϕ−1 D(T) c2 2
2
and hence the theorem follows.
cap ζ ∈ T: ϕ(ζ ) > u d log
1 1−u
2 ,
2
1−α
Remark 3.5. Since {zn /(1+n) 2 }∞ n=0 is an orthonormal basis in Dα , α ∈ (0, 1), Cϕ is a Hilbert– Schmidt operator in Dα if and only if ∞ Dα (ϕ n ) n=1
n1−α
D
|ϕ (z)|2 dAα (z) < ∞. (1 − |ϕ(z)|2 )2+α
Therefore, for fixed λ ∈ T, the function 1 + λϕ(ζ ) −α/2 ϕλ (ζ ) = Re , 1 − λϕ(ζ )
ζ ∈ T,
belongs to the weighted harmonic Dirichlet space 2
1−α 2 2 <∞ Dα (T) := f ∈ L (T): f Dα (T) = f (n) 1 + |n| n∈Z
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1731
(see [7]). Applying again the strong capacity inequality [14, Theorem 2.2] for Dα to ϕλ , we get as before 1
capα (Eϕ (s)) ds < ∞. (1 − s)1+α
0
The following theorem is the analogue of Proposition 3.1 for the Dirichlet space. It shows that condition (4) is optimal. Theorem 3.6. Let h : [1, +∞[ → [1, +∞[ be a function such that limx→∞ h(x) = +∞. Let E be a closed subset of T such that cap(E) = 0. Then there is ϕ ∈ A(D) ∩ D, ϕ(D) ⊂ D such that: (1) Eϕ (1) = E; (2) Cϕ is in the Hilbert–Schmidt class in D; 1 cap(Eϕ (s)) 1 1 log 1−s h( 1−s ) ds = +∞. (3) 1−s Proof. Let k(x) = h(ex ), there exists a continuous decreasing function ψ such that +∞ ψ(x) dx 2 < ∞
and
+∞ ψ(x)k(x) dx 2 = ∞.
Set η(t) = ψ −1 (cap(Et )). We have
cap(Et )dη2 (t)
0
ψ η(t) dη2 (t)
+∞ ψ(x) dx 2 < ∞
0
and
cap(Et )h eη(t) dη2 (t)
0
ψ η(t) k η(t) dη2 (t)
+∞ ψ(x)k(x) dx 2 = ∞.
0
Since
cap(Et )dη2 (t) < ∞,
0
by [4, Theorem 5.1], there exists a function f ∈ D such that
Re f (ζ ) η d(ζ, E) and Im f (ζ ) < π/4, By harmonicity, Im f (z) < π/4,
|z| < 1.
q.e. on T.
1732
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
Now take
ϕ = exp −e−f . By a simple modification in the construction of f as in [1], we can suppose that ϕ ∈ A(D). Hence Eϕ (1) = E and D
|ϕ (z)|2 (1 − |ϕ(z)|2 )2
D
D
− Re f (z)
cos(Im f (z)) |f (z)|2 e−2 Re f (z) e−2e dA(z) e−2 Re f (z) cos2 (Im f (z))
2
√ f (z) exp − 2e− Re f (z) dA(z)
c
2 f (z) dA(z) < ∞.
D
Hence Cϕ is in the Hilbert–Schmidt class. Finally, since
Eϕ (s) ⊇ ζ ∈ T: η d(ζ, E) log(1/1 − s) , we get
2 cap Eϕ (s) h(1/1 − s) d log(1/1 − s)
0
cap(Et )h eη(t) dη2 (t) = +∞.
2
0
References [1] L. Brown, W. Cohn, Some examples of cyclic vectors in Dirichlet space, Proc. Amer. Math. Soc. 95 (1) (1985) 42–46. [2] L. Carleson, Selected Problems on Exceptional Sets, Van Nostrand, Princeton, NJ, 1967. [3] C.C. Cowen, B.D. MacCluer, Composition Operators on Spaces of Analytic Functions, CRC Press, Boca Raton, FL, 1995. [4] O. El-Fallah, K. Kellay, T. Ransford, Cyclicity in the Dirichlet space, Ark. Mat. 44 (2006) 61–86. [5] O. El-Fallah, K. Kellay, T. Ransford, On the Brown–Shields conjecture for cyclicity in the Dirichlet space, Adv. Math. 222 (6) (2009) 2196–2214. [6] Eva A. Gallardo-Gutiérrez, Maria J. González, Exceptional sets and Hilbert–Schmidt composition operators, J. Funct. Anal. 199 (2003) 287–300. [7] Eva A. Gallardo-Gutiérrez, Maria J. González, Hilbert–Schmidt Composition Operators on Dirichlet Spaces, Contemp. Math., vol. 321, 2003, pp. 87–90. [8] Eva A. Gallardo-Gutiérrez, Maria J. González, Hausdorff measures, capacities and compact composition operators, Math. Z. 253 (2006) 63–74. [9] J. Garnett, Bounded Analytic Functions, Academic Press, New York, 1981. [10] A. Montes-Rodriguez, The essential norm of a composition operator on Bloch spaces, Pacific J. Math. 188 (2) (1999) 339–351. [11] J.H. Shapiro, Composition Operators and Classical Function Theory, Universitext, Tracts in Math., Springer-Verlag, New York, 1993. [12] M. Tjani, Compact composition operators on Besov spaces, Trans. Amer. Math. Soc. 355 (11) (2003) 4683–4698. [13] K.-J. Wirths, J. Xiao, Global integral criteria for composition operators, J. Math. Anal. Appl. 269 (2002) 702–715. [14] Z. Wu, Carleson measures and multipliers for Dirichlet spaces, J. Funct. Anal. 169 (1999) 148–163.
O. El-Fallah et al. / Journal of Functional Analysis 260 (2011) 1721–1733
1733
[15] H. Wulan, D. Zheng, K. Zhu, Compact composition operators on BMOA and the Bloch space, Proc. Amer. Math. Soc. 137 (2009) 3861–3868. [16] K. Zhu, Operator Theory in Function Spaces, Monogr. Textb. Pure Appl. Math., vol. 139, Marcel Dekker, Inc., 1990. [17] N. Zorboska, Composition operators on weighted Dirichlet spaces, Proc. Amer. Math. Soc. 126 (7) (1998) 2013– 2023.
Journal of Functional Analysis 260 (2011) 1734–1765 www.elsevier.com/locate/jfa
On the structure of the essential spectrum of elliptic operators on metric spaces Vladimir Georgescu CNRS and University of Cergy-Pontoise, 95000 Cergy-Pontoise, France Received 12 April 2010; accepted 21 December 2010
Communicated by Alain Connes
Abstract We give a description of the essential spectrum of a large class of operators on metric measure spaces in terms of their localizations at infinity. These operators are analogues of the elliptic operators on Euclidean spaces and our main result concerns the ideal structure of the C ∗ -algebra generated by them. © 2010 Elsevier Inc. All rights reserved. Keywords: Spectral analysis; Essential spectrum; C ∗ -algebra; Metric space; Pseudo-differential operator
1. Introduction 1.1. The question we consider in this paper is whether the essential spectrum of an operator can be described in terms of its “localizations at infinity”. Later on we give a precise mathematical meaning to this notion along the following lines: we first define a C ∗ -algebra E which should be thought as the minimal C ∗ -algebra which contains the resolvents of the operators we want to study, then we point out a remarkable class of geometrically defined ideals E() in E , where are certain ultrafilters on X, and finally we define the localization of an operator in E at as its image in the quotient C ∗ -algebra E = E /E() . For the moment we shall stick to the naive interpretation of localizations at infinity of an operator H as “asymptotic operators” obtained as limits of translates of H to infinity, but we stress that translations have no meaning for the class of spaces of interest here and very soon we shall abandon this point of view.
E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.025
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1735
We begin with the case X = Rd . Note that we are interested only in operators H which are self-adjoint (Hamiltonians of quantum systems). Denote Ua the unitary operator of translation by a ∈ X in L2 (X), so that (Ua f )(x) = f (x + a). We say that H is an asymptotic Hamiltonian of H if there is a sequence an ∈ X with |an | → ∞ such that Uan H Ua∗n converges in strong re solvent sense to H . Then we have Spess (H ) = Sp(H ) for very large classes of Schrödinger operators. We refer to the paper [19] of Helffer and Mohamed as one of the first dealing with this question in a general setting and to that of Last and Simon [22] for the most recent results obtained by similar techniques (geometric methods involving partitions of unity) and for a complete list of references. We mention that the importance of the asymptotic operators has been emphasized in a series of papers in the nineties by Rabinovich, Roch, and Silbermann and summarized in their book [28] (see also [6]; we thank B. Simon for this reference). They are especially concerned with the case X = Zd and treat differential operators on Lp (Rd ) with the help of a discretization method. Results of this nature have also been obtained in [15,17] by a quite different method where the description of localizations at infinity in terms of asymptotic operators is not so natural and rather looks like an accident. To explain this point, we recall one result. Let X be an abelian locally compact non-compact group, define Ua as above, and for any character k of X let Vk be the operator of multiplication by k on L2 (X). Let E ≡ E (X) be the set of bounded operators T on L2 (X) such that Vk∗ T Vk − T → 0 and (Ua − 1)T (∗) → 0 when k → 1 and a → 0. A self-adjoint operator H satisfying (H − i)−1 ∈ E is said to be affiliated to E ; it is easy to see that this class of operators is very large. Let δ ≡ δ(X) be the set of ultrafilters on X finer than the Fréchet filter. If H is affiliated to E then for each ∈ δ the limit lima→ Ua H Ua∗ = H exists in the strong resolvent sense and we have Spess (H ) = ∈δ Sp(H ). Thus the essential spectrum of an operator affiliated to E is determined by its asymptotic operators. The proof goes as follows. The space E is in fact a C ∗ -algebra canonically associated to X, namely the crossed product C(X) X of the algebra C(X) of bounded uniformly continuous functions on X by the natural action of X. Moreover, the space K ≡ K (X) of compact operators on L2 (X) is an ideal of E . Note that by ideal in a C ∗ -algebra we mean “closed bilateral ideal” and we call morphism a ∗-homomorphism between two ∗-algebras. It is easy to see that for each ∈ δ and each T ∈ E the strong limit τ (T ) := lima→ Ua T Ua∗ exists and that the so deof E so its kernel ker τ is an ideal of E which clearly contains K . fined τ is an endomorphism The main fact is ∈δ ker τ = K and this is the only nontrivial part of the proof. From here we immediately deduce the preceding formula for the essential spectrum of the operators affiliated to E . Indeed, it suffices to recall that the essential spectrum of an operator in a C ∗ -algebra like E which contains K is equal to the spectrum of the image of the operator in the quotient algebra E /K . We shall call E the elliptic C ∗ -algebra of the group X. It is probably not clear that this has something to do with the elliptic operators, but the following fact justifies the terminology. The C ∗ -algebra generated by a set of self-adjoint operators on a given Hilbert space is by definition the smallest C ∗ -algebra which contains the resolvents of these operators. Let X = Rd and let h be a real elliptic polynomial of order m on X. Then E is the C ∗ -algebra generated by the self-adjoint operators of the form h(i∇) + S where S runs over the set of symmetric differential operators of order < m whose coefficients are C ∞ functions which are bounded together with all their derivatives. We stress that although E (X) is generated by a small class of elliptic differential operators, the class of self-adjoint operators affiliated to it is quite large and contains many
1736
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
singular perturbations of the usual elliptic operators. This is obvious from the description of E we gave before and many explicit examples may be found in [10,17]. 1.2. Our purpose is to extend the framework and the results stated above to the case when X is a metric space without any group structure or group action and for which the notion of differential operator is not a priori defined. To each measure metric space X = (X, d, μ) satisfying some quite general conditions we associate a C ∗ -algebra E ≡ E (X) of operators on L2 ≡ L2 (X, μ) and to each ∈ δ(X) we associate an ideal E() of E such that E() is the space K of compact operators on L2 if the metric space X has a certain amenability property, namely the Property A of Guoliang Yu [36]. The E() are analogues of the ker τ and the image of an operator T ∈ E in the quotient algebra E /E() is the analogue of τ (T ). The ideal E() is defined in terms of the behavior of the operators at a region at infinity which contains . Our interest in this question was roused by a recent paper of E.B. Davies [12] in which a C ∗ -algebra C (X), called standard algebra, is associated to each metric measure space X as above. Davies points out a class of ideals of C and describes their role in understanding the essential spectrum of the operators affiliated to C . This algebra is much larger than E if X is not discrete. If X is an abelian group as above, then C is the set of bounded operators T on L2 such that Vk∗ T Vk − T → 0 when k → 1. It is clearly impossible to give a complete description of the essential spectrum of such operators only in terms of their behavior at infinity in the configuration space X (consider for example the case X = R). A more precise description of C and of its relation with E may be found in Section 7. In Section 6 we show that if X is a unimodular amenable group then we have E (X) = C(X) X as in the abelian case. Thus we may recover as a corollary of our main result (Theorem 2.5) the results in [15,17] for locally compact abelian groups and those of Roe [31] in the case of finitely generated discrete (non-abelian) groups (see also [27]). Amenability is not really necessary: in fact, the natural objects here are the reduced crossed products and then Yu’s Property A is sufficient. 1.3. From a more general point of view, the main point of the approach sketched above is to shift attention from one operator to an algebra of operators. Instead of studying the essential spectrum (or other qualitative spectral properties, like the Mourre estimate) of a self-adjoint operator H on a Hilbert space H, we consider a C ∗ -algebra E of operators on H which contains K = K(H) and such that H is affiliated to it and try to find an “efficient” description of the quotient C ∗ -algebra E /K . For this, we look for a family of ideals J of E such that J = K because then we have a natural embedding E /K →
E /J
(1.1)
and, in our concrete situation, we think of this as an efficient representation of E /K if the ideals J are in some sense maximal and have a geometrically simple interpretation. This is in an important point and we shall get back to it later on. For the moment note that any representation like (1.1) has useful consequences in the spectral theory of the operators T ∈ E , for example if T is normal and T is the projection of T in E /J then its essential spectrum is given by Spess (T ) =
Sp(T ).
(1.2)
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1737
Arbitrary ideals J ⊂ E also play a role in the spectral analysis of the operators T ∈ E . For example, if we denote T /J the image of T in the quotient algebra E /J then clearly Sp(T /J ) ⊂ Sp(T ) and if J contains the compacts then Sp(T /J ) ⊂ Spess (T ). It is natural in our framework to call the quotient operator T /J localization of T at J (see Section 4.4 for the meaning of this operation in the abelian case). Observe that Sp(T /J ) becomes smaller when J increases, which allows a better understanding of parts of the spectrum of T . In particular, it will become clear later on that by taking large J one can isolate the contribution to the essential spectrum of T of the localization of T to small regions at infinity. We refer to [1,4,5,11,13] for a general discussion concerning the operation of localization with respect to an ideal and for applications in the spectral theory of many-body systems and quantum field theory but we shall mention here an example which is relevant also in the present context. Let H be the Hamiltonian of a system of N non-relativistic particles interacting through two-body potentials and let Vj k be the potential linking particles j and k. For each partition σ of the system of particles let Hσ be the Hamiltonian obtained by replacing by zero the V j k such that j, k belong to different clusters of σ . Then the HVZ theorem says that Spess (H ) = σ Sp(Hσ ) where σ runs over the set of two-cluster partitions. In fact, this is an immediate consequence of the preceding algebraic formalism: the N -body C ∗ -algebra is easy to describe and Hσ is the localization of H at a certain ideal which appears very naturally in this context. The point is that we do not have to take some limit at infinity to get Hσ , although this could be done (this would mean that we use “geometric methods”). The ideals which are involved in the representation (1.1) in this case are minimal in a precise sense. In particular, the preceding decomposition of the spectrum is very rough (you do not see the contribution of k-cluster partitions with k > 2). In connection with the algebraic approach sketched above, we would like to emphasize the previous work of J. Bellissard, who was one of the first to stress the advantage of considering C ∗ -algebras generated by Hamiltonians in the context of solid state physics [2,3], and that of H.O. Cordes, who studied C ∗ -algebras of pseudo-differential operators on manifolds and their quotients with respect to the ideal of compact operators [9] already in the seventies. 1.4. Now let’s get back to our problem. Assuming we have chosen the “correct” algebra E (X), we must find the relevant ideals. In the group case, this is easy, because there is a natural class of ideals associated to translation invariant filters [15]. Proposition 6.6 gives a characterization of these filters which involves only the metric structure of X (in fact, only the coarse structure associated to it [30]). Thus what we call coarse filters in a metric space are analogs of the invariant filters in a group. To each coarse filter ξ we then associate an ideal Jξ defined in terms of the behavior of the operators at a certain region at infinity defined by ξ , cf. (2.6). These are the geometric ideals which play the main role in or analysis. Recall that the set of ultrafilters finer than the Fréchet filter is a compact subset δ(X) of the ˇ Stone–Cech compactification β(X) of X. Any filter ξ finer than Fréchet can be thought as a closed subset of δ(X) by identifying it with the set ξ † of ultrafilters finer than it, and then the sets F ∈ ξ can be thought as traces on X of neighborhoods of this closed set in β(X). The sets ξ † with ξ coarse will be called coarse subsets of δ(X) (they are closed). If X is a group then X acts on δ(X), the coarse subsets are the closed invariant subsets of δ(X), and the small invariant sets are parametrized as follows: to each ∈ δ(X) we associate the smallest closed invariant set containing (i.e. the closure of the orbit which passes through it). But this can be easily expressed in group independent terms: if ∈ δ(X) let co() be the finer coarse filter included in and let := co()† be the smallest coarse set containing . Then the co() are the large coarse filters, the the small coarse sets, and the E() := Jco() are the large coarse ideals which
1738
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
should allow us to compute the essential spectrum of the operators in E . Heuristically speaking, . For example, if X is discrete, so E contains E() consists of the operators in E which vanish at the bounded functions ϕ on X, we have ϕ ∈ E() if and only if the continuous extension of ϕ to β(X) is zero on . We stress that this strategy denotes a certain bias toward the role played by the behavior at infinity in X (thought as physical or configuration space): we think that it has a dominant role since we hope that our choices of ideals are sufficient to describe the quotient E /K . There is no a priori reason for this to be true: there are physically natural situations in which ideals defined in terms of behavior at infinity in momentum or phase space must be taken into account [15]. However, it does not seem so clear to us how to define such physically meaningful objects in the present context (there is no natural phase space). Anyway, the situation is not simple even at the level of geometrically defined ideals. Indeed, the ideals E() are defined in terms of the behavior of the operators in E at , but it is not completely clear how to express the intuitive idea that an operator T vanishes on . Our choice is the most restrictive one, but there is a second one which is also quite natural and leads to a distinct class of ideals G , cf. (5.27) and (5.28). One has E() ⊂ G strictly in general but equality holds if the space X has the Property A. An interesting point is that in general the ideals G do not suffice to compute E /K , i.e. we do not have ∈δ G = K . In fact an ideal G which contains the compacts appears naturally in the algebra E , the so-called ghost ideal, and this ideal could contain a projection of infinite rank, hence be strictly larger than the compacts. The construction of such a projection is due to Higson, Laforgue, and Skandalis [20] and is important in the context of the Baum–Connes conjecture. They consider the simplest case of discrete metric spaces with bounded geometry (the number of points in a ball of radius r is bounded independently of the center of the ball) when E is the uniform Roe C ∗ -algebra [30]. More information concerning this question may be found in the papers [7,8,34] by Chen and Wang where the ideal structure of the uniform Roe algebra is studied in detail. Their idea of using kernel truncations with the help of positive type functions in case X has Yu’s Property A plays an important role in our proofs, as we shall see in Section 3. But before going into details on these matters we shall describe in the next section in precise terms the framework and the main results of this paper. As explained before, a representation like (1.1) involving ideals which are as large as possible will provide the most detailed information on the structure of the essential spectrum of the observables affiliated to E . Thus the fact that ∈δ G = K shows that in general the large ideals are not sufficient to compute the essential spectrum. We leave open the question whether E = K holds even if ∈δ () ∈δ G = K . 2. Main results A metric space X = (X, d) is proper if each closed ball Bx (r) = {y | d(x, y) r} is a compact set. This implies the local compactness of the topological space X but is much more because local compactness means only that the small balls are compact. In particular, if X is not compact, then the metric cannot be bounded. We are interested in proper non-compact metric spaces equipped with Radon measures μ with support equal to X, so μ(Bx (r)) > 0 for all x ∈ X and all r > 0, and which satisfy (at least) the following condition V (r) := sup μ Bx (r) < ∞ for all real r > 0. x∈X
(2.3)
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1739
We shall always assume that a metric measure space (X, d, μ) satisfies these conditions. On the other hand, for the proof of our main results we need the following supplementary condition: inf μ Bx (1/2) > 0. x
(2.4)
The choice of 1/2 in (i) is, of course, rather arbitrary, and an assumption of the form infx μ(Bx (r)) > 0 for all r > 0 would be more natural. Each time we use (2.4) we shall mention it explicitly. To simplify the notations we set dμ(x) = dx, L2 (X) = L2 (X, μ), and Bx = Bx (1). We denote B(X) the C ∗ -algebra of all bounded operators on L2 (X) and K (X) the ideal of B(X) consisting of compact operators. For A ⊂ X we denote 1A its characteristic function and if A is measurable then we use the same notation for the operator of multiplication by 1A in L2 (X). Several versions of Yu’s Property A appear in the literature (see [30, Definition 11.35] and [33] for the discrete case), we have chosen that which was easier to state and use in our context. Later on we shall state and use a more abstract version which can easily be reformulated in terms of positive type functions on X 2 . See p. 1760 here and [30, Chapter 3] for the relation with amenability in the group case. Definition 2.1. We say that the metric measure space (X, d, μ) has Property A if for each ε, r > 0 there is a Borel map φ : X → L2 (X) with φ(x) = 1, supp φ(x) ⊂ Bx (s) for some number s independent of x, and such that φ(x) − φ(y) < ε if d(x, y) < r. Definition 2.2. We say that X = (X, d, μ) is a class A space if (X, d) is a proper non-compact metric space and μ is a Borel measure on X such that: (i) μ(Bx (r)) > 0 and supx μ(Bx (r)) < ∞ for each r > 0, (ii) infx μ(Bx (1/2)) > 0, (iii) (X, d, μ) has Property A. Since X is locally compact the spaces Co (X) and Cc (X) of continuous functions on X which tend to zero at infinity or have compact support respectively are well defined. We use the slightly unusual notation C(X) for the set of bounded uniformly continuous functions on X equipped with the sup norm. Then C(X) is a C ∗ -algebra and Co (X) is an ideal in it. We embed C(X) ⊂ B(X) by identifying ϕ ∈ C with the operator ϕ(Q) of multiplication by ϕ (this is an embedding because the support of μ is equal to X). We shall however use the notation ϕ(Q) if we think that this is necessary for the clarity of the text. Functions k : X 2 → C on the product space X 2 = X × X are also called kernels on X. We say that k is a controlled kernel if there is a real number r such that d(x, y) > r ⇒ k(x, y) = 0. With the terminology of [21], a kernel is controlled if it is supported by an entourage of the bounded coarse structure on X coming from the metric. We denote Ctrl (X 2 ) the set of bounded 2 uniformly continuous controlled kernels and to each k ∈ Ctrl (X ) we associate an operator Op(k) 2 on L (X) by (Op(k)f )(x) = X k(x, y)f (y) dy. It is easy to check (see Section 3) that the set of such operators is a ∗-subalgebra of B(X). Hence
E (X) ≡ E (X, d, μ) = norm closure of Op(k) k ∈ Ctrl X 2 is a C ∗ -algebra of operators on L2 (X). We shall say that E (X) is the elliptic algebra of X.
(2.5)
1740
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
Remark 2.3. The following alternative presentation of the framework clarifies the role of the metric. Fix a couple X = (X, μ) consisting of a locally compact non-compact topological space X equipped with a Radon measure μ with support equal to X. This fixes the Hilbert space L2 (X). Then to each proper metric compatible with the topology of X and such that supx μ(Bx (r)) < ∞ for all r we associate a C ∗ -algebra E (X, d) of operators on L2 (X) which contains K (X). It is interesting to note that E (X, d) depends only on the coarse equivalence class of the metric. Recall that two metrics d, d are coarse equivalent if there are positive increasing functions u, v such that d u(d ) and d v(d). This can also be expressed in terms of coarse structures on X [32, p. 810]. There is an obvious C(X)-bimodule structure on E (X) and we have K (X) = Co (X)E (X) = E (X)Co (X) ⊂ E (X). As explained in the introduction we are interested in a “geometrically meaningful” representation of the quotient C ∗ -algebra E (X)/K (X). For this we introduce the class of “coarse ideals” described below. If F ⊂ X and r > 0 is real we denote F (r) the set of points x which belong to the interior of F and are at distance larger than r from the boundary, more precisely infy ∈F / d(x, y) > r. A filter ξ of subsets of X will be called coarse if F ∈ ξ ⇒ F (r) ∈ ξ for all r. Note that the set of complements of a coarse filter is a coarse ideal of subsets of X in the sens of [21]. The Fréchet filter, i.e. the set of sets with relatively compact complement, is clearly coarse, we denote it ∞. There is a trivial coarse filter, namely ξ = {X}, which is of no interest for us. All the other coarse filters are finer that ∞. To each coarse filter ξ on X we associate an ideal of E (X) by defining
Jξ (X) = T ∈ E (X) inf 1F T = 0 = T ∈ E (X) inf T 1F = 0 F ∈ξ
F ∈ξ
(2.6)
where the inf is taken only over measurable F ∈ ξ . We shall see that the set Iξ (X) of ϕ ∈ C(X) such that limξ ϕ = 0 is an ideal of C(X) and Jξ (X) = Iξ (X)E (X) = E (X)Iξ (X). ˇ Let β(X) be the set of all ultrafilters of X (this is the Stone–Cech compactification of the discrete space X) and let δ(X) be the set of ultrafilters finer than the Fréchet filter. For each ∈ β(X) we denote co() the largest coarse filter contained in and we set C() (X) = Ico() (X) and E() (X) = Jco() (X). These are ideals in C(X) and E (X) respectively and we have E() (X) = C() (X)E (X) = E (X)C() (X).
(2.7)
If X is of class A then from Theorem 5.9 we get a second description of these ideals. Proposition 2.4. If X is a space of class A then for any ∈ δ(X) we have
E() (X) = T ∈ E (X) lim 1Bx (r) T = 0, ∀r > 0 . x→
(2.8)
Then to each ultrafilter ∈ δ(X) we associate the quotient C ∗ -algebra E (X) = E (X)/E() (X)
(2.9)
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1741
and call it localization of E (X) at . We denote .T the image of T ∈ E (X) through the canonical morphism E (X) → E (X) and we say that .T is the localization of T at . Our main result is: Theorem 2.5. If X is a class A space then
∈δ(X) E() (X) = K
E (X)/K (X) →
E .
(X), hence (2.10)
∈δ(X)
In particular, the essential spectrum of any normal operator T ∈ E (X) is equal to the closure of the union of the spectra of its localizations at infinity: Spess (T ) =
∈δ(X) Sp(.T ).
(2.11)
In view of applications to self-adjoint operators affiliated to E (X), we recall [1] that an observable affiliated to a C ∗ -algebra A is a morphism H : Co (R) → A . We set ϕ(H ) := H (ϕ). If P : A → B is a morphism between two C ∗ -algebras then ϕ → P(ϕ(H )) is an observable affiliated to B denoted P(H ). So P(ϕ(H )) = ϕ(P(H )). If A and B are realized on Hilbert spaces Ha , Hb , then any self-adjoint operator H on Ha affiliated to A defines an observable affiliated to A , but the observable P(H ) is not necessarily associated to a self-adjoint operator on Hb because the natural operator associated to it could be non-densely defined (in our context, it often has domain equal to {0}). The spectrum and essential spectrum of an observable are defined in an obvious way [1]. Now clearly, if H is an observable affiliated to E (X) then .H defined by ϕ(.H ) = .ϕ(H ) is an observable affiliated to E (X). This is the localization of H at and we have Spess (H ) =
∈δ(X) Sp(.H ).
(2.12)
We shall not give in this paper affiliation criteria specific to the algebra E (X) but the results of Section 6 and the examples form [17] should convince the reader that the class of operators affiliated to E (X) is very large. On the other hand, if H is a positive self-adjoint operator such that e−H ∈ E (X) then H is affiliated to E (X). Or this condition is certainly satisfied by the Laplace operator associated to a large class of Riemannian manifolds due to known estimates on the heat kernel of the manifold. We thank Thierry Coulhon for an e-mail exchange on this question. In connection with Proposition 2.4 we mention that in Section 5 we consider a second class of ideals G (X) in E (X) which are similar to the E() (X). More precisely, let G (X) be defined as the right-hand side of (2.8) for any ∈ δ(X). Then G (X) is an ideal of E (X) and E() (X) ⊂ G (X) where equality holds if X is a space of class A but the inclusion is strict in general. We say that G is the ghost envelope of E() . Thus for each ultrafilter ∈ δ(X) we may have two distinct contributions to the essential spectrum of H associated to : first the spectrum of the localization .H = H /E() at and second the spectrum of H /G , which is a subset of the first one. In particular, besides the smallest ideal K (X) of E (X) there is a second “small” ideal which appears quite naturally in the theory. This is the ghost ideal defined by
(2.13) G (X) = T ∈ E (X) lim 1Bx (r) T = 0 for all r > 0 . x→∞
1742
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
The operators T ∈ G (X) vanish everywhere at infinity in the configuration space X but could be not compact. The role of the Property A is to ensure that G (X) = K (X). For discrete metric spaces of bounded geometry, this phenomenon is studied in detail by Chen and Wang, see [7,8,34] and references therein. Proposition 5.10 shows, among other things, that our definition of the ghost ideal in the discrete case coincides with theirs. Observe that in general, if H is an observable affiliated to E (X) then the ghost spectrum of H , i.e. the spectrum of the quotient observable H /G (X), is strictly included in the essential spectrum of H . 3. The elliptic C ∗ -algebra In this section X = (X, d, μ) is a metric space (X, d) equipped with a measure μ and such that: • (X, d) is a locally compact not compact metric space and each closed ball is a compact set, • μ is a Radon measure on X with support equal to X and supx μ(Bx (r)) = V (r) < ∞, ∀r > 0. If k is a controlled kernel let d(k) be the least number r such that d(x, y) > r ⇒ k(x, y) = 0. Recall that
Ctrl X 2 = k : X 2 → C k is a bounded uniformly continuous controlled kernel . (3.14) If k ∈ Ctrl (X 2 ) then Op(k) is the operator on L2 (X) given by (Op(k)f )(x) = From Op(k)2 sup k(x, y) dy · sup k(x, y) dx, x
X k(x, y)f (y) dx.
(3.15)
y
which is the Schur estimate, we get Op(k) V d(k) sup |k|.
(3.16)
¯ x) and (k l)(x, y) = k(x, z)l(z, y) dz. Clearly If k, l ∈ Ctrl (X 2 ) then we denote k ∗ (x, y) = k(y, Op(k)∗ = Op(k ∗ ) and Op(k) Op(l) = Op(k l). The following simple fact is useful. Lemma 3.1. If k, l ∈ Ctrl (X 2 ) then k l ∈ Ctrl (X 2 ), we have d(k l) d(k) + d(l), and
sup |k l| sup |k| · sup |l| · min V d(k) , V d(l) . Proof. If we set s = d(k) and t = d(l) then clearly (k l)(x, y) sup |k| · sup |l| · μ Bx (s) ∩ By (t) which gives both estimates from the statement of the lemma. To prove the uniform continuity we use
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
(k l)(x, y) − (k l) x , y supk(x, z) − k x , z
1743
l(z, y) dz
z
supk(x, z) − k x , z · sup |l| · V (t) z
and a similar inequality for |(k l)(x, y) − (k l)(x, y )|.
2
Thus Ctrl (X 2 ), when equipped with the usual linear structure and the operations k ∗ and k l, becomes a ∗-algebra and k → Op(k) is a morphism into B(X) hence its range is a ∗-subalgebra of B(X). Hence the elliptic algebra E (X) defined in (2.5) is a C ∗ -algebra of operators on L2 (X). The uniform continuity assumption involved in the definition (3.14) of Ctrl (X) hence in that of E (X) is important because thanks to it we have E (X) = C(X) r X if X is a unimodular locally compact group, cf. Sections 6 and 7. Here C(X) is the C ∗ -algebra of right uniformly continuous functions on X on which X acts by left translations and r denotes the reduced crossed product. In particular, the equality C(X) r X = E (X) gives a description of the crossed product independent of the group structure of X. We say that T ∈ B(X) is a controlled operator if there is r > 0 such that if F, G are closed subsets of X with d(F, G) > r then 1F T 1G = 0; let d(T ) be the smallest r for which this holds (see [30]; this class of operators has also been considered in [12] and in [14]). Observe that the Op(k) with k ∈ Ctrl (X 2 ) are controlled operators but if X is not discrete then there are many others and most of them do not belong to E (X). The norm closure of the set of controlled operators will be discussed in Section 7. Since the kernel of ϕ(Q) Op(k) is ϕ(x)k(x, y) and that of Op(k)ϕ(Q) is k(x, y)ϕ(y), we clearly have C(X)E (X) = E (X)C(X) = E (X). This defines a C(X)-bimodule structure on E (X). We note that, as a consequence of the Cohen– Hewitt theorem, if A is a C ∗ -subalgebra of C(X) then the set AE(X) consisting of products AT of elements A ∈ A and T ∈ E (X) is equal to the closed linear subspace of E (X) generated by these products. Proposition 3.2. We have K (X) = Co (X)E (X) = E (X)Co (X) ⊂ E (X). Proof. If ϕ ∈ Cc and k ∈ Ctrl then the operator ϕ Op(k) has kernel ϕ(x)k(x, y) which is a continuous function with compact support on X 2 , hence ϕ Op(k) is a Hilbert–Schmidt operator. Thus we have Co (X)E (X) ⊂ K (X) and by taking adjoints we also get E (X)Co (X) ⊂ K (X). Conversely, an operator with kernel in Cc (X 2 ) clearly belongs to Cc (X)E (X) for example. 2 E (X) is a non-degenerate Co (X)-bimodule and there is a natural topology associated to such a structure, we call it the local topology on E (X). Its utility will be clear from Section 6. Definition 3.3. The local topology on E (X) is the topology associated to the family of seminorms T θ = T θ (Q) + θ (Q)T with θ ∈ Co (X). This is the analog of the topology of local uniform convergence on C(X). Obviously one may replace the θ with 1Λ where Λ runs over the set of compact subsets of X. If T ∈ E (X) and
1744
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
{Tα } is a net of operators in E (X) we write Tα → T or limα Tα = T locally if the convergence takes place in the local topology. Since X is σ -compact there is θ ∈ Co (X) with θ (x) > 0 for all x ∈ X and then · θ is a norm on E (X) which induces on bounded subsets of E (X) the local topology. The local topology is finer than the ∗-strong operator topology inherited from the embedding E (X) ⊂ B(X). We may also consider on E (X) the (intrinsically defined) strict topology associated to the smallest essential ideal K (X); this is weaker than the local topology and finer than the ∗-strong operator topology, but coincides with the last one on bounded sets. Lemma 3.4. The involution T → T ∗ is locally continuous on E (X). The multiplication is locally continuous on bounded sets. Proof. Since T ∗ θ = T θ¯ the first assertion is clear. Now assume Sα → S locally and Sα C and Tα → T locally. If θ ∈ Co then T θ is a compact operator so there is θ ∈ Co such that T θ = θ K for some compact operator K. Then we write (Sα Tα − ST )θ = Sα (Tα − T )θ + (Sα − S)θ K. 2 The ghost ideal is defined as follows:
G (X) := T ∈ E (X) lim 1Bx (r) T = 0, ∀r x→∞
= T ∈ E (X) lim T 1Bx (r) = 0, ∀r . x→∞
(3.17)
The fact that G is an ideal of E follows from the equality stated above which in turn is proved as follows: for each ε > 0 there is a controlled kernel k such that T − Op(k) < ε hence if R = r + d(k) we have T 1Bx (r) < ε + Op(k)1Bx (r) = ε + 1Bx (R) Op(k)1Bx (r) < 2ε + 1Bx (R) T which is less than 3ε for large x. We have K (X) ⊂ G (X) because limx→∞ 1Bx (r) = 0 strongly on L2 . It is known that the inclusion is strict in general [20, p. 349]. In the rest of this section we prove that equality holds if X is of class A. We begin with some general useful remarks. Lemma 3.5. If (2.4) holds then there a subset Z ⊂ X with X = z∈Z Bz and a function N : R → N such that: for any x ∈ X and r 1 the number of z ∈ Z such that Bz (r) ∩ Bx (r) = ∅ is at most N(r). Proof. Let Z be a maximal subset of X such that d(a, b) > 1 if a, b are distinct points in Z. Then we have X = z∈Z Bz (the contrary would contradict the maximality of Z). Now fix r 1, let x ∈ X, denote Zx the set of z ∈ Z such that Bz (r) ∩ Bx (r) = ∅, and let Nx be the number of elements of Zx . Choose a ∈ Z such that x ∈ Ba . Then Bx (r) ⊂ Ba (r + 1) hence if z ∈ Zx then Bz (r) ∩ Ba (r + 1) = ∅ so d(z, a) 2r + 1. Since the balls Bz (1/2) corresponding to these z are pairwise disjoint and included in Ba (2r + 2), the volume of their union is larger than νNx , where ν = infy∈X μ(By (1/2)), and smaller than V (2r + 2), hence Nx V (2r + 2)/ν. Thus we may take N(r) = V (2r + 2)/ν. 2
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1745
From now on, if (2.4) is satisfied, the set Z and the function N will be as in Lemma 3.5. Lemma 3.6. If (2.4) is satisfied and T is a controlled operator, then 1/2 T N d(T ) + 1 sup 1Bx T .
(3.18)
x∈X
Proof. Set R = d(T ) + 1. Then for any f ∈ L2 we have Tf 2
1Bz Tf 2 =
z∈Z
1Bz T 1Bz (R) f 2 sup 1Bz T 2 z∈Z
z∈Z
and from Lemma 3.5 we get
z∈Z 1Bz (R)
N (R).
1Bz (R) f 2
z∈Z
2
Lemma 3.7. Assume that (2.4) is satisfied and let T ∈ B(X). If limx→∞ 1Bx (r) T = 0 holds for r = 1 then it holds for all r > 0. In particular, we have
G (X) = T ∈ E (X) lim 1Bx T = 0 = T ∈ E (X) lim T 1Bx = 0 . x→∞
x→∞
(3.19)
Proof. Let r > 1, ε > 0 and let F be a finite subset of Z such that 1Bz T < ε/N (r) if z ∈ Z \ F . We consider points x such that d(x, F ) > r + 1 and denote Z(x, r) the set of z ∈ Z such that Bz ∩ Bx (r) = ∅. Then Z(x, r) has at most N (r) elements and Bx (r) ⊂ z∈Z(x,r) Bz hence 1Bx (r) T N(r) maxz∈Z(x,r) 1Bz T < ε because F ∩ Z(x, r) = ∅. 2 An operator T ∈ B(X) is called locally compact if for any compact set K the operators 1K T and T 1K are compact. Clearly any operator in E (X) is locally compact. Lemma 3.8. Assume that (2.4) is satisfied. If T ∈ B(X) is a controlled locally compact operator such that 1Bx T → 0 as x → ∞ then T is compact. Proof. Choose o ∈ X and let 1R be the characteristic function of the ball Bo (R). Then 1R T is compact so it suffices to show that 1R T converges in norm to T as R → ∞. Clearly T − 1R T is controlled with d(T − 1R T ) d(T ) hence from Lemma 3.6 we get T − 1R T C sup 1Bx (1 − 1R )T C x∈X
which proves the lemma.
sup
1Bx T
d(x,o)>R−1
2
Now we use an idea from [7] (truncation of kernels with the help of functions of positive type) and the technique of the proof of Theorem 5.1 from [26]. Let H be an arbitrary separable Hilbert space (in Definition 2.1 we took H = L2 (X)) and let φ : X → H be a Borel function such that φ(x) = 1 for all x. Define Mφ : L2 (X) → L2 (X; H) = L2 (X)⊗H by (Mφ f )(x) = f (x)φ(x). Then Mφ is a linear operator with Mφ = 1 and its adjoint Mφ∗ : L2 (X; H) → L2 (X) acts as follows: (Mφ∗ F )(x) = φ(x)|F (x). Let T → Tφ be the linear continuous map on B(X) given by Tφ = Mφ∗ (T ⊗ 1)Mφ . Clearly Tφ T .
1746
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
Let k : X 2 → C be a locally integrable function. We say that an operator T ∈ B(X) has integral kernel k if f |T g = X2 k(x, y)f¯(x)g(y) dx dy for all f, g ∈ Cc (X). If k is a Schur kernel, i.e. supx X (|k(x, y)| + |k(y, x)|) dy < ∞, then we say that T is a Schur operator and we have the estimate (3.15) for its norm. And T is a Hilbert–Schmidt operator if and only if k ∈ L2 (X 2 ). From the relation f |Tφ g = f φ|T ⊗ 1gφ valid for f, g ∈ Cc (X) we easily get: Lemma 3.9. If T has kernel k then Tφ has kernel kφ (x, y) = φ(x)|φ(y)k(x, y). In particular, if T is a Schur, Hilbert–Schmidt, or compact operator, then Tφ has the same property. Lemma 3.10. Assume that φ(x)|φ(y) = 0 if d(x, y) > r. Then for each T ∈ B(X) the operator Tφ is controlled, more precisely: if F, G are closed subsets of X with d(F, G) > r then 1F Tφ 1G = 0. Proof. We have to prove that 1F f |Tφ 1G g = 0 for all f, g ∈ L2 (X) and T ∈ B(X). The map T → Tφ is continuous for the weak operator topology and the set of finite range operators is dense in B(X) for this topology. Thus it suffices to assume that T is Hilbert–Schmidt (or even of rank one) and then the assertion is clear by Lemma 3.9. 2 Observe that if θ : X → C is a bounded Borel function then Mφ θ (Q) = (θ (Q) ⊗ 1)Mφ hence θ Tφ = (θ T )φ and Tφ θ = (T θ )φ with the usual abbreviation θ = θ (Q). In particular, Lemma 3.9 implies: Lemma 3.11. Let T ∈ B(X). If T is locally compact then Tφ is locally compact. If 1Bx (r) T → 0 as x → ∞, then 1Bx (r) Tφ → 0 as x → ∞. Theorem 3.12. If X is a class A space then K (X) = G (X). Proof. Let T ∈ G (X) and φ as above. Then T is locally compact hence Tφ is locally compact, and we have 1Bx Tφ → 0 as x → ∞ by Lemma 3.11. Moreover, if φ is as in Lemma 3.10 then Tφ is controlled so, by Lemma 3.8, Tφ is compact. Thus it suffices to show that any T ∈ E (X) is a norm limit of operators Tφ with φ of the preceding form. Since T → Tφ is a linear contraction, it suffices to show this for operators of the form T = Op(k) with k ∈ Ctrl (X 2 ). But then T − Tφ is an operator with kernel k(x, y)(1 − φ(x)|φ(y)) hence, if we denote M = sup |k|, d = d(k), from (3.15) we get
1 − φ(x)φ(y) dy.
T − Tφ M sup x
Bx (d)
Until now we did not use the fact that H = L2 (X) in Definition 2.1. If we are in this situation note that we may replace φ(x) by |φ(x)| and then φ(x)|φ(y) is real. More generally, assume that the φ(x) belong to a real subspace of the (abstract) Hilbert space H so that φ(x)|φ(y) is real for all x, y. Then 1 − φ(x)|φ(y) = φ(x) − φ(y)2 /2 so we have T − Tφ (M/2) sup x
Bx (d)
φ(x) − φ(y)2 dy.
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1747
Since X has Property A, one may choose φ such that this be smaller than any given number. 2 4. Coarse filters on X and ideals of C(X) 4.1. Filters We recall some elementary facts; for the moment X is an arbitrary set. A filter on X is a nonempty set ξ of subsets of X which is stable under finite intersections, does not contain the empty set, and has the property: G ⊃ F ∈ ξ ⇒ G ∈ ξ . If Y is a topological space and φ : X → Y then limξ φ = y or limx→ξ φ(x) = y means that y ∈ Y and if V is a neighborhood of y then φ −1 (V ) ∈ ξ . The set of filters on X is equipped with the order relation given by inclusion. Then the trivial filter {X} nonempty set F of filters exists: is the smallest filter and the lower bound of any inf F = ξ ∈F ξ . A set F of filters is called admissible if ξ ∈F Fξ = ∅ if Fξ ∈ ξ for all ξ and ξ . If F is admissible then the upper bound sup F exists: Fξ = X but for a finite number of indices this is the set of sets of the form ξ ∈F Fξ where Fξ ∈ ξ for all ξ and Fξ = X but for a finite number of indices ξ . Let β(X) be the set of ultrafilters on X. If ξ is a filter let ξ † be the set of ultrafilters finer than it. Then ξ = inf ξ † . We equip β(X) with the topology defined by the condition: a nonempty subset of β(X) is closed if and only if it is of the form ξ † for some filter ξ . Note that for the trivial filter consisting of only one set we have {X}† = β(X). Then β(X) becomes a compact topological ˇ space, this is the Stone–Cech compactification of the discrete space X, and is naturally identified with the spectrum of the C ∗ -algebra of all bounded complex functions on X. There is an obvious dense embedding X ⊂ β(X), any bounded function ϕ : X → C has a unique continuous extension β(ϕ) to β(X), and any map φ : X → X has a unique extension to a continuous map β(φ) : β(X) → β(X). More generally, if Y is a compact topological space, each map φ : X → Y has a unique extension to a continuous map β(φ) : β(X) → Y . The following simple fact should be noticed: if ξ is a filter and o is a point in Y then limξ φ = o is equivalent to β(φ)|ξ † = o. Indeed, limξ φ = o is equivalent to lim φ = o for any ∈ ξ † (for the proof, observe that if this last relation holds then for each neighborhood V of o the set φ −1 (V ) belongs to for all ∈ ξ † , hence φ −1 (V ) ⊂ ∈ξ † = ξ ). Now assume that X is a locally compact non-compact topological space. Then the Fréchet filter is the set of complements of relatively compact sets; we denote it ∞, so that limx→∞ φ(x) = y has the standard meaning. Let δ(X) = ∞† be the set of ultrafilters finer than it. Thus δ(X) is a compact subset of β(X) and we have δ(X) ⊂ β(X) \ X (strictly in general):
/ . δ(X) = ∈ β(X) if K ⊂ X is relatively compact then K ∈ Indeed, if is an ultrafilter then for any set K either K ∈ or K c ∈ . If we interpret as a character of ∞ (X) then ∈ δ(X) means (ϕ) = 0 for all ϕ ∈ Co (X). 4.2. Coarse filters Now assume that X is a metric space. If F ⊂ X then F¯ is its closure and F c = X \ F its complement. We set dF (x) := infy∈F d(x, y). Note that dF = dF¯ and |dF (x) − dF (y)| d(x, y). If r > 0 let F(r) := {x | d(x, F ) r} = x∈F Bx (r) be the neighborhood “of order r” of F .
1748
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
If r > 0 we denote F (r) the set of points x such that d(x, F c ) > r. This is an open subset of X included in F and at distance r from the boundary of F (so if F is too thin, F (r) is empty). In other terms, x ∈ F (r) means that there is r > r such that Bx (r ) ⊂ F . In particular, (F (r) )(r) ⊂ F and for an arbitrary pair of sets F, G we have (F ∩ G)(r) = F (r) ∩ G(r) and F ⊂ G ⇒ F (r) ⊂ G(r) . We say that a filter ξ is coarse if for any F ∈ ξ and r > 0 we have F (r) ∈ ξ . We emphasize that this should hold for all r > 0. If for each F ∈ ξ there is r > 0 such that F (r) ∈ ξ then the filter is called round. Equivalently, ξ is coarse if for each F ∈ ξ and r > 0 there is G ∈ ξ such that G(r) ⊂ F and ξ is round if for each F ∈ ξ there are G ∈ ξ and r > 0 such that G(r) ⊂ F . Our terminology is related to the notion of coarse ideal introduced in [21] (our space X being equipped with the bounded metric coarse structure). More precisely, a coarse ideal is a set I of subsets of X such that B ⊂ A ∈ I ⇒ B ∈ I and A ∈ I ⇒ A(r) ∈ I for all r > 0. Clearly I → I c := {Ac | A ∈ I} is a one-one correspondence between coarse ideals and filters. Coarse filters on groups are very natural objects: if X is a group, then a round filter is coarse if and only if it is translation invariant (Proposition 6.6). The Fréchet filter is coarse because if K is relatively compact then K(r) is compact for any r (the function dK is proper under our assumptions on X). The trivial filter {X} is coarse. More general examples of coarse filters are constructed as follows [12,15]. Let L ⊂ X be a set such that L(r) = X for all r > 0. Then the filter generated by the sets Lc(r) = {x | d(x, L) > r} when r runs over the set of positive real numbers is coarse (indeed, it is clear that the L(r) generate a coarse ideal). If L is compact the associated filter is ∞. If X = R and L = ]−∞, 0] then the corresponding filter consists of neighborhoods of +∞ and this example has obvious n-dimensional versions. If L is a sparse set (i.e. the distance between a ∈ L and L \ {a} tends to infinity as a → ∞) then the ideal in C(X) associated to it (cf. below) and its crossed product by the action of X (if X is a group) are quite remarkable objects, cf. [15]. It should be clear however that most coarse filters are not associated to any set L. Let X be an Euclidean space and let G(X) be the set of finite unions of strict vector subspaces of X. The sets Lc(r) when L runs over G(X) and r over R+ form a filter basis and the filter generated by it is the Grassmann filter γ of X. This is a translation invariant hence coarse filter which plays a role in a general version of the N -body problem, see [17, Section 6.5]. The relation limγ ϕ = 0 means that the function ϕ vanishes when we are far from any strict affine subspace. Lemma 4.1. If F is a nonempty set of coarse filters then inf F is a coarse filter. If F is admissible then sup F is a coarse filter. Proof. If F ∈ inf F = ξ ∈F ξ then for any r > 0 and ξ we have F (r) ∈ ξ and so F (r) ∈ ξ ∈F ξ . Now assume for example that F ∈ ξ and G ∈ η with ξ, η ∈ F and let r > 0. Then there are ⊂ F and G ⊂ G hence (F ∩ G ) F ∈ ξ and G ∈ η such that F(r) (r) ⊂ F(r) ∩ G(r) ⊂ F ∩ G. (r) The argument for sets of the form ξ Fξ with Fξ = X but for a finite number of indices ξ is similar. 2 Lemma 4.2. A coarse filter is either trivial, and then ξ † = β(X), or finer than the Fréchet filter, and then ξ † ⊂ δ(X). Proof. Assume that ξ is not finer than the Fréchet filter. Then there is a compact set K such that Kc ∈ / ξ . Hence for any F ∈ ξ we have F ⊂ K c so F ∩ K = ∅. Note that the closed sets in ξ form a basis of ξ (if F ∈ ξ then the closure of F (2) belongs to ξ and is included in F (1) hence in F ).
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1749
The set {F ∩ K | F ∈ ξ and is closed} is a filter basis consisting of closed sets in the compact set K hence there is a ∈ K such that a ∈ F for all F ∈ ξ . Then if F ∈ ξ and r > 0 there is G ∈ ξ such that G(r) ⊂ F and since a ∈ G we have Ba (r) ⊂ G(r) ⊂ F . But X = r Ba (r) so X ⊂ F . 2 4.3. Coarse ideals of C(X) We now recall some facts concerning the relation between filters on X and ideals of C(X). To each filter ξ on X we associate an ideal Iξ (X) of C(X):
Iξ (X) := ϕ ∈ C(X) lim ϕ = 0 . ξ
(4.20)
If ξ is the Fréchet filter then limξ ϕ = 0 means limx→∞ ϕ(x) = 0 in the usual sense and so the corresponding ideal is Co (X). The ideal associated to the trivial filter clearly is {0}. We also have: ξ ⊂η
⇒
Iξ (X) ⊂ Iη (X),
Iξ ∩η (X) = Iξ (X) ∩ Iη (X) = Iξ (X)Iη (X).
(4.21) (4.22)
The round envelope ξ ◦ of ξ is the finer round filter included in ξ . Clearly this is the filter generated by the sets F(r) when F runs over ξ and r over R+ . Note that Iξ (X) = Iξ ◦ (X), i.e. for ϕ ∈ C(X) we have limξ ϕ = 0 if and only if limξ ◦ ϕ = 0. Indeed, if ε > 0 let F be the set of points were |ϕ(x)| < ε/2 and let r > 0 be such that |ϕ(x) − ϕ(y)| < ε/2 if d(x, y) r. Then |ϕ(x)| < ε if x ∈ F(r) . We recall a well-known description of the spectrum of the algebra C(X) in terms of round filters. Proposition 4.3. The map ξ → Iξ (X) is a bijection between the set of all round filters on X and the set of all ideals of C(X). An ideal I of C(X) will be called coarse if for each positive ϕ ∈ I and r > 0 there is a positive ψ ∈ I such that d(x, y) r
and ψ(y) < 1
⇒
ϕ(x) < 1.
(4.23)
Lemma 4.4. Let F, G be subsets of X such that G(r) ⊂ F . Then the function θ = dF c (dF c + dG )−1 belongs to C(X) and satisfies the estimates 1G θ 1F and |θ (x) − θ (y)| 3r −1 d(x, y). In particular, a filter ξ is coarse if and only if for any F ∈ ξ and any ε > 0 there is G ∈ ξ and a function θ such that 1G θ 1F and |θ (x) − θ (y)| εd(x, y). Proof. If a ∈ G and b ∈ / F then r < d(a, b) d(x, a) + d(x, b) for any x. By taking the lower bound of the right-hand side over a, b we get r dG (x) + dF c (x) ≡ D(x). Hence if d(x) ≡ dF c (x) then θ (x) − θ (y) |d(x) − d(y)| + d(y) |D(x) − D(y)| D(x) D(x)D(y) d(x, y) d(x, y) + D(x) − D(y) . r 3r
1750
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
To prove the last assertion, notice that if such a θ exists for some ε < 1/r and if x ∈ G and d(x, y) r then θ (x) = 1 and |θ (x) − θ (y)| < 1 hence θ (y) > 0 so y ∈ F . Thus G(r) ⊂ F . 2 Proposition 4.5. The filter ξ is coarse if and only if the ideal Iξ (X) is coarse. Proof. Assume ξ is not trivial and coarse and let ϕ ∈ Iξ positive and r > 0. Then Oϕ := {ϕ < 1} ∈ ξ hence there is G ∈ ξ such that G(2r) ⊂ Oϕ . By using Lemma 4.4 we construct ψ ∈ C such that 0 ψ 1, ψ|G = 0, and ψ|Gc(r) = 1. Clearly ψ ∈ Iξ . If ψ(y) < 1 then y ∈ G(r) hence if d(x, y) r then x ∈ G(2r) so ϕ(x) < 1. Thus Iξ is coarse. Reciprocally, assume that Iξ is a coarse ideal and let F ∈ ξ and r > 0. There is ϕ ∈ Iξ positive such that Oϕ ⊂ F and there is a positive function ψ ∈ Iξ such that (4.23) holds. But then Oψ ∈ ξ and (Oψ )(r) ⊂ Oϕ so ξ is coarse. 2 4.4. Coarse envelope If ξ is a filter then the family of coarse filters included in ξ is admissible, hence there is a largest coarse filter included in ξ . We denote it co(ξ ) and call it coarse envelope (or cover) of ξ . A set F belongs to co(ξ ) if and only if F (r) ∈ ξ for any r > 0 (the set of such F is a filter, see p. 1748). By Lemma 4.2 we have only two possibilities: either co(ξ ) = {X} or co(ξ ) ⊃ ∞. Since co(ξ ) ⊂ ξ , we see that either ξ is finer than Fréchet, and then co(ξ ) ⊃ ∞, or not, and then co(ξ ) = {X}. To each ultrafilter ∈ β(X) we associate a compact subset ⊂ β(X) by the rule := co()† = set of ultrafilters finer than the coarse envelope of .
(4.24)
Thus we have either ⊂ δ(X), or ∈ / δ(X) and then = β(X). On the other ∈ δ(X) and then hand, we have ∈δ(X) = δ(X) because ∈ . More explicitly, if , χ ∈ δ(X) then χ ∈ means: if F is a set such that F (r) ∈ for all r, then F ∈ χ (which is equivalent to F ∩ G = ∅ for all G ∈ χ ). If is an ultrafilter on X then C() (X) is the coarse ideal of C(X) defined by
C() (X) = Ico() = ϕ ∈ C(X) lim ϕ = 0 . co()
(4.25)
The quotient C ∗ -algebra C (X) = C(X)/C() (X) will be called localization of C(X) at . If ϕ ∈ C(X) then its image in the quotient is denoted .ϕ and is called localization of ϕ at . The next comments give another description of these objects and will make clear that localization means extension followed by restriction. Observe that ϕ ∈ C(X) belongs to C() (X) if and only if the restriction of β(ϕ) to is zero. Hence two bounded uniformly continuous functions are equal modulo C() (X) if and only if their restrictions to are equal. Thus ϕ → β(ϕ)| induces an embedding C (X) → C( ) which allows us to identify C (X) with an algebra of continuous functions on . From this we deduce ∈δ(X)
C() (X) = Co (X).
(4.26)
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1751
Indeed, ϕ belongs to the left-hand side if and only if β(ϕ)| = 0 for all ∈ δ(X). But the union of the sets is equal to δ(X) hence this means β(ϕ)|δ(X) = 0 which is equivalent to ϕ ∈ Co (X). A maximal coarse filter is a coarse filter which is maximal in the set of coarse filters equipped with inclusion as order relation. This set is inductive (the union of an increasing set of coarse filters is a coarse filter) hence each coarse filter is majorated by a maximal one. Dually, we say that a subset T ⊂ δ(X) is coarse if it is of the form T = † for some coarse filter . Note that if T is a minimal coarse set then T = for any ultrafilter ∈ T . In general the coarse sets of the form with ∈ δ(X) are not minimal. 5. Ideals of E (X) There are two classes of ideals in E (X) which can be defined in terms of the behavior at infinity of the operators. For any filter ξ on X we define
Jξ (X) = T ∈ E (X) inf 1F T = 0 ,
(5.27)
Gξ (X) = T ∈ E (X) lim 1Bx (r) T = 0, ∀r .
(5.28)
F ∈ξ
x→ξ
Here infF ∈ξ 1F T is the lower bound of the numbers 1F T when F runs over the set of measurable F ∈ ξ and we define infF ∈ξ T 1F similarly. Note that 1F T 1G T and T 1F T 1G if F ⊂ G are measurable. Recall also that limx→ξ 1Bx (r) T = 0 means: for each ε > 0 there is G ∈ ξ such that 1Bx (r) T < ε for all x ∈ G. Observe that for the Fréchet filter ξ = ∞ we have K = J∞
and K ⊂ G∞ = G
(5.29)
where G (X) is the ghost ideal introduced in (3.17). That J∞ = K follows from the fact that 1K T is compact if K is compact (or use (5.30) and Proposition 3.2). The equality G∞ (X) = G (X) is just a change of notation. Lemma 5.1. If T ∈ E and ξ is a coarse filter then infF ∈ξ 1F T = infF ∈ξ T 1F . Proof. If infF ∈ξ 1F T = a and ε > 0 then there is F ∈ ξ such that 1F T < a + ε. We may choose k ∈ Ctrl such that T − Op(k) < ε and then 1F Op(k) < a + 2ε. Assume that k(x, y) = 0 if d(x, y) r and let G ∈ ξ such that G(r) ⊂ F . Then k(x, y)1G (y) = 1G(r) (x)k(x, y)1G (y) hence Op(k)1G = 1G(r) Op(k)1G = 1G(r) 1F Op(k)1G so Op(k)1G 1F Op(k) < a + 2ε and so T 1G < a + 3ε. 2 Lemma 5.2. For any filter ξ the set Gξ is an ideal of E and we have Jco(ξ ) ⊂ Gξ . If ξ is coarse then Jξ is also an ideal of E and Jξ ⊂ Gξ . Proof. Gξ is obviously a closed right ideal in E so it will be an ideal if we show that limx→ξ T 1Bx (r) = 0 for all T ∈ Gξ . Choose ε > and let S be a controlled operator such that S − T < ε. Then there is R such that S1Bx (r) = 1Bx (R) S1Bx (r) and there is F ∈ ξ such that
1752
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1Bx (R) T < ε for x ∈ F , hence T 1Bx (r) < ε + S1Bx (r) ε + 1Bx (R) S < 2ε + 1Bx (R) T < 3ε. If T ∈ Jco(ξ ) then for any ε > 0 there is F such that F (r) ∈ ξ for all r such that 1F T < ε. So if we fix r and take G = F (r) ∈ ξ then G ∈ ξ and 1Bx (r) T < ε for all x ∈ G. Thus T ∈ Gξ . Clearly Jξ is a closed right ideal in E . That it is an ideal if ξ is coarse follows from Lemma 5.1. 2 Proposition 5.3. If ξ is a coarse filter on X then Jξ is an ideal of E and we have Jξ = Iξ E = E Iξ .
(5.30)
Proof. We prove the first equality in (5.30) (the second one follows by taking adjoints). Clearly ϕ ∈ Iξ if and only if for each ε > 0 there is F ∈ ξ such that 1F ϕ < ε hence if and only if infF ∈ξ 1F ϕ = 0. This implies Iξ E ⊂ Jξ and so it remains to be shown that for each T ∈ Jξ there are ϕ ∈ Iξ and S ∈ E such that T = ϕS. If ξ is trivial this is clear, so we may suppose that ξ is finer than ∞. Choose a point o ∈ X and let Kn = Bo (n) for n 1 integer. We get an increasing sequence of compact sets such that n Kn = X and Knc ∈ ξ . We construct by induction a sequence F1 ⊃ G1 ⊃ F2 ⊃ G2 ⊃ · · · of sets in ξ such that: Fn ⊂ Knc ,
1Fn T n−2 ,
d Gn , Fnc > 1,
d Fn+1 , Gcn > 1.
We start with F1 ∈ ξ such that 1F1 T 1, we set F1 = F1 ∩ K1c and then we choose G1 ∈ ξ such that d(G1 , F1c ) > 1. Next, we choose F2 ∈ ξ with 1F2 T 1/4 and G 1 ∈ ξ with G 1 ⊂ G1 and d(G 1 , Gc1 ) > 1. We take F2 = F2 ∩ G 1 ∩ K2c , so d(F2 , Gc1 ) > 1, and then we choose G2 ∈ ξ with G2 ⊂ F2 such that d(G2 , F2c ) > 1, and so on. Now we use Lemma 4.4 and for each n we construct a function θn ∈ C such that 1Gn θn 1Fn and |θn (x) − θn (y)| 3d(x, y). Then either Ba ∩ F1 = ∅ or there is a unique m such that Ba ∩ Fm = ∅ and Ba ∩ Fm+1 = ∅ and in this case θn = 1 on Ba if n < m and θn = 0 on Ba if n > m. Let θ (x) = n θn (x). Then θ (x) = 0 on F1c and if Ba ∩ Fm = ∅ and Ba ∩ Fm+1 = ∅ we get θ (x) =
θn (x) = m − 1 + θm (x).
(5.31)
nm
¯ + is well defined and for d(x, y) < 1 and a conveniently chosen m we have Thus θ : X → R θ (x) − θ (y) = θm (x) − θm (y) 3d(x, y). On the other hand θn T 1Fn T n−2 . Thus if θ0 = 1 then the limit of m → ∞ exists in norm and defines an element S of E . Then T=
nm
θn
−1 nm
θn T → (1 + θ )−1 S
nm θn T
as
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1753
because ( nm θn )−1 → (1 + θ )−1 strongly on L2 (X). If ϕ := (1 + θ )−1 then 0 ϕ 1 and ϕ(x) − ϕ(y) θ (x) − θ (y) 3d(x, y) if d(x, y) < 1. Thus ϕ ∈ C. If x ∈ Ba with Ba ∩ Fm = ∅ and Ba ∩ Fm+1 = ∅ then (5.31) gives −1 1/m ϕ(x) = 1 + m − 1 + θm (x) hence ϕ(x) 1/m on Fm . Thus limξ ϕ = 0 and T = ϕS with ϕ ∈ I and S ∈ E .
2
We make now more precise the relation between Jξ and Gξ . Lemma 5.4. If (2.4) holds, T ∈ E is controlled, ξ is coarse, and limx→ξ 1Bx T = 0, then T ∈ Jξ . Proof. Assume (2.4) is satisfied and let T ∈ B(X) be a controlled operator. Let Z be as in Lemma 3.5 and let us set a = d(T ) + 1, so that 1Bx T = 1Bx T 1Bx (a) for all x. If F is a measurable set and if we denote Z(F ) the set of z ∈ Z such that Bz ∩ F = ∅ then for any f ∈ L2 (X) we have 1F Tf 2
1Bz Tf 2 =
z∈Z(F )
1Bz T 1Bz (a) f 2
z∈Z(F )
sup 1Bz T
2
z∈Z(F )
1Bz (a) f 2 sup 1Bx T 2 N (a)f 2 x∈F(1)
z∈Z(F )
so 1F T N (a)1/2 supx∈F(1) 1Bx T . Thus for any controlled operator we have infF ∈ξ 1F T = 0 if limx→ξ 1Bx T = 0. If T ∈ E (X) this means T ∈ Jξ . 2 Proposition 5.5. If X is a class A space then for any filter ξ finer than Fréchet we have Jco(ξ ) ⊂ Gξ . If ξ is coarse and T ∈ E then T ∈ Jξ
⇔
lim T 1Bx = 0
x→ξ
⇔
lim 1Bx T = 0.
x→ξ
(5.32)
Proof. We use the same techniques as in the proof of Theorem 3.12. Let T ∈ E (X) and let us assume that limx→ξ T 1Bx = 0. Then as we saw in Section 3 we have (T 1Bx )φ = Tφ 1Bx hence for conveniently chosen φ the operator Tφ ∈ E (X) is controlled and limx→ξ Tφ 1Bx = 0. From Lemma 5.4 we get Tφ ∈ Jξ (X) which is closed, so since Tφ → T in norm as φ → 1, we get T ∈ Jξ (X). 2 Remark 5.6. The relation (5.32) is not true in general if Property A is not satisfied. Indeed, if we take ξ = ∞ then this would mean K = G , which does not hold in general. We now seek for a more convenient description of Jco(ξ ) for not coarse filters. Remark 5.7. The following observations are easy to prove and will be useful below. Let F be any subset of X and let r, s > 0. Then F (r+s) ⊂ (F (r) )(s) and if 0 < r < s then F (s) ⊂ F (r) and F ⊂ (F(s) )(r) .
1754
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
Proposition 5.8. Assume that (2.4) is satisfied and let T be a controlled operator and ξ a filter finer than the Fréchet filter. Then infF ∈co(ξ ) 1F T = 0 if and only if limx→ξ 1Bx (r) T = 0 for all r > 0. Proof. If T ∈ B(X) and infF ∈co(ξ ) 1F T = 0 then the first few lines of the proof of Lemma 5.4 give limx→co(ξ ) 1Bx (r) T = 0 for all r > 0, which is more than required. Now let T be a controlled operator and let us set a = d(T ) + 1. If F is a measurable set and Z(F ) is as in the proof of Lemma 5.4 then d(F, Z(F )) 1 hence for any r > 0 we have Bz (r + 1) F(r) ⊂ Z(F )(r+1) = z∈Z(F )
hence for any f ∈ L2 we have 1Bz (r+1) Tf 2 = 1Bz (r+1) T 1Bz (r+a) f 2 1F(r) Tf 2 z∈Z(F )
z∈Z(F )
sup 1Bz (r+1) T 2 z∈Z(F )
1Bz (r+a) f 2 sup 1Bx (r+1) T 2 N (r + a)f 2 . x∈F(1)
z∈Z(F )
If x ∈ F(1) and y ∈ F is such that d(x, y) 1 then Bx (r + 1) ⊂ By (r + 2) hence we obtain 1F(r) T N (r + a)1/2 sup 1Bx (r+2) T .
(5.33)
x∈F
Observe also that for an arbitrary measurable set G we have the estimate 1G T N (a)1/2 sup 1G∩Bx T .
(5.34)
x∈X
This follows from Lemma 3.6 after noticing that d(1G T ) d(T ). Now assume that limx→ξ 1Bx (r) T = 0 for all r > 0 and let us fix ε > o. Then for each r > 0 there is F r ∈ ξ such that 1Bx (r+2) T εN (r + a)−1/2 N (a)−1/2 ,
∀x ∈ F r .
For each f ∈ L2 and each number s > 0 the map x → 1Bx (s) f ∈ L2 is strongly continuous, hence the function x → 1Bx (r+2) T is lower semi-continuous, so we may assume that F r is r ∈ ξ is closed and 1 T εN (a)−1/2 because closed, hence measurable. Then the Gr := F(r) Gr (α)
(α)
of (5.33). Moreover, if α < r then Gr ≡ (Gr )(α) ⊃ F r hence Gr ∈ ξ . Now fix α > 1 and let (α) (α) G = r>α Gr . This is a union of open set hence it is open and contains all the Gr , which (s) ⊃ belong to ξ , hence belongs to ξ . If s > 0 and we choose some r > s + α then G(s) ⊃ (G(α) r ) (α+s) (s) Gr ∈ ξ (Remark 5.7). Thus we see that G ∈ ξ for all s > 0, which means that G ∈ co(ξ ). In order to estimate the norm of 1G T we use (5.34) and observe that if G ∩ Bx = ∅ the there is (α) (α) (α) r > α such that Gr ∩ Bx = ∅ hence Bx ⊂ (Gr )(1) . But it is easy to check that (Gr )(1) ⊂ Gr because α > 1, hence Bx ⊂ Gr , and then 1G∩Bx T 1Bx T 1Gr T εN (a)−1/2 . Finally, from (5.34) we get 1G T ε.
2
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1755
Theorem 5.9. Let X be a class A space and let ξ be a filter finer than Fréchet on X. If T ∈ E then T ∈ Jco(ξ )
⇔ ⇔
lim T 1Bx (r) = 0,
∀r > 0,
lim 1Bx (r) T = 0,
∀r > 0.
x→ξ x→ξ
(5.35)
Proof. This is a repetition of the proof of Proposition 5.5. For example, let limx→ξ 1Bx (r) T = 0 for all r > 0. Since (1Bx (r) T )φ = 1Bx (r) Tφ for all r, we see that for conveniently chosen φ the operator Tφ ∈ E (X) is controlled and limx→ξ Tφ 1Bx (r) = 0 for all r. From Proposition 5.8 we clearly get Tφ ∈ Jco(ξ ) which is closed. So T ∈ Jco(ξ ) because Tφ → T in norm as φ → 1. 2 The ideals of E (X) which are of real interest in our context are defined as follows ∈ δ(X)
⇒
E() (X) := Jco() (X) = T ∈ E (X)
inf 1F T = 0 .
F ∈co()
(5.36)
By Proposition 5.3 this can be expressed in terms of the ideals of C(X) introduced in (4.25) as follows: E() (X) = C() (X)E (X) = E (X)C() (X).
(5.37)
Prof of Theorem 2.5. Assume that T ∈ E() for all ∈ δ(X); we have to show that T is a compact operator (the converse being obvious). If ∈ δ(X) and r > 0 then for any ε > 0 there is F ∈ co() such that 1F T < ε and there is G ∈ such that G(r) ⊂ F , hence for any x ∈ G we have 1Bx (r) T < ε. This proves that limx→ 1Bx (r) T = 0. Now define θ (x) = 1Bx (r) T , we obtain a bounded function on X such that lim θ = 0 for any ∈ δ(X). The continuous extension β(θ ) : β(X) → R has the property β(θ )() = lim θ thus β(θ ) is zero on the compact subset δ(X) = ∞† of β(X) hence we have lim∞ θ = 0 according to a remark from Section 4.1. Thus we have limx→∞ 1Bx (r) T = 0, which means that T belongs to the ghost ideal G . Now the compactness of T follows from Theorem 3.12. 2 We end this section with some remarks on the case of discrete spaces with bounded geometry. Assume that X is an infinite set equipped with a metric d such that the number of points in a ball is bounded by a number independent of the center of the ball. We equip X with the counting measure, so L2 (X) = 2 (X), and embed X ⊂ 2 (X) by identifying x = 1{x} ≡ 1x , so X becomes the canonical orthonormal basis of 2 (X). Then any operator T ∈ B(X) has a kernel kT (x, y) = x|T y and E (X) is the closure of set of T such that x|T y = 0 if d(x, y) > r(T ) (this is the uniform Roe algebra). Observe that for each T ∈ E and each ε > 0 there is an r such that |x|T y| < ε if d(x, y) > r. If ξ is a filter on X and f : X 2 → C we write limx,y→ξ f (x, y) = 0 if for each ε > 0 there is F ∈ ξ such that |f (x, y)| < ε if x, y ∈ F .
1756
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
Proposition 5.10. Let X be discrete with bounded geometry. Then if ξ is a filter and T ∈ E we have T ∈ Gξ
⇔
lim
sup y|T z = 0,
x→ξ y,z∈Bx (r)
∀r > 0.
(5.38)
Moreover, if ξ is coarse then
Gξ = T ∈ E lim x|T y = 0 .
(5.39)
x,y→ξ
Proof. By definition, we have T ∈ Gξ if and only if limx→ξ T 1Bx (r) = 0 for all r. Since the norm of the operator T 1y is equal to the norm of the vector T y, we have sup T y T 1Bx (r)
y∈Bx (r)
T y V (r) sup T y.
y∈Bx (r)
y∈Bx (r)
Thus T ∈ Gξ is equivalent to limx→ξ supy∈Bx (r) T y = 0 for all r, in particular the property from the right-hand side of (5.38) is satisfied. Conversely, let T ∈ E satisfying this condition and let ε > 0. Choose an operator S such that S− T < ε and such that x|Sy = 0 if d(x, y) > R for some fixed R. Then we have |Sy|a| z |Sy|z||z|a| S z∈By (R) |z|a| hence z|T y T y2 = y T ∗ T y εT + Sy|T y εT + S εT + SV (R) sup z|T y.
z∈By (R)
z∈By (R)
So for each ε > 0 there are C, R < ∞ with T y2 εT + C supz∈By (R) |z|T y| for all y. Hence:
sup T y2 εT + C z|T y y ∈ Bx (r), z ∈ By (R) y∈Bx (r)
εT + C sup z|T y y, z ∈ Bx (r + R) .
This proves the converse implication in (5.38). Now assume that ξ is coarse. If T is as in the right-hand side of (5.39) then for each ε > 0 there is F ∈ ξ such that |y|T z| < ε if y, z ∈ F and for each r there is G ∈ ξ such that G(r) ⊂ F . Then if x ∈ G we have Bx (r) ⊂ F hence supy,z∈Bx (r) |y|T z| ε so T ∈ Gξ by (5.38). Reciprocally, let T ∈ Gξ and let ε, r > 0. By (5.38), there is F ∈ ξ such that if y, z ∈ Bx (r) for some x ∈ F then |y|T z| ε. Let us choose r such that |y|T z| < ε if d(y, z) > r and let G ∈ ξ such that G(r) ⊂ F . If y, z ∈ G then either d(y, z) > r and then |y|T z| < ε, or d(y, z) r and then |y|T z| < ε because y, z ∈ By (r) and y, z ∈ G ⊂ F . Thus we found G ∈ ξ such that |y|T z| < ε if y, z ∈ G. 2 Finally, for the convenience of the reader we sketch the construction of the ghost projection of Higson, Laforgue, and Skandalis. Note that G (X) is a C ∗ -algebra of operators on 2 (X) independent of the metric of X. Assume that X is a disjoint union of finite sets Xn with 1 n ∞
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1757
2 such that the number vn of elements of Xn tends to infinity with n.Then 2 (X) = n 2 (Xn ), the vector en = x∈Xn x/vn is a unit vector in 2 (Xn ), and π := n |en en | is an orthogonal projection in 2 (X) such that x|πy = 0 if x, y belong to different sets Xn and x|πy = vn−2 if x, y ∈ Xn . Thus π is an infinite rank projection and π ∈ G (X). All this is easy, but the choice of the metric is not: for this we refer to p. 348 in [20]. 6. Locally compact groups 6.1. Crossed products In this section we assume that X is a locally compact topological group with neutral element e and μ is a left Haar measure. We write dμ(x) = dx and denote the modular function defined by d(xy) = (y) dx or dx −1 = (x)−1 dx (with slightly formal notations). There are left and right actions of X on functions ϕ defined on X given by (a.ϕ)(x) = ϕ(a −1 x) and (ϕ.a)(x) = ϕ(xa). √ The left and right regular representation of X are defined by λa f = a.f and ρa f = (a)f.a for f ∈ L2 (X). Then λa and ρa are unitary operators on L2 (X) which induce unitary representation of X on L2 (X). These representations commute: λa ρb = ρb λa for all a, b ∈ X. Moreover, for ϕ ∈ L∞ (X) we have λa ϕ(Q)λ∗a = (a.ϕ)(Q) and ρa ϕ(Q)ρa∗ = (ϕ.a)(Q). The convolution of two functions f, g on X is defined by (f ∗ g)(x) =
f (y)g y
−1
x dy =
f xy −1 (y)−1 g(y) dy.
For ψ ∈ L1 (X) let λψ = ψ(y)λy dy ∈ B(X). Then λψ ψL1 and ψ ∗ g = λψ g for g ∈ L2 . We recall the definition of the ∗-algebra L1 (X): the product is the convolution product f ∗ g and the involution is given by f ∗ (x) = (x)−1 f¯(x −1 ); the factor −1 ensures that f ∗ L1 = f L1 . The enveloping C ∗ -algebra of L1 (G) is the group C ∗ -algebra C ∗ (X). The norm closure in B(X) of the set of operators λψ with ψ ∈ L1 (X) is the reduced group C ∗ algebra Cr∗ (X). There is a canonical surjective morphism C ∗ (X) → Cr∗ (X) which is injective if and only if X is amenable. Lemma 6.1. If T ∈ Cr∗ (X) then ρa T = T ρa , ∀a ∈ X. If X is not compact then Cr∗ (X) ∩ K (X) = {0}. Proof. The first assertion is clear because ρa λb = λb ρa . If X is not compact, then ρa → 0 weakly on L2 (X) hence if T ∈ Cr∗ (X) is compact Tf = T ρa f → 0 hence Tf = 0 for all f ∈ L2 (X). 2 In what follows by uniform continuity we mean “right uniform continuity”, so ϕ : X → C is uniformly continuous if for any ε > 0 there is a neighborhood V of e such that xy −1 ∈ V ⇒ |ϕ(x) − ϕ(y)| < ε (see p. 60 in [29]). Let C(X) be the C ∗ -algebra of bounded uniformly continuous complex functions. If ϕ : X → C is bounded measurable then ϕ ∈ C(X) if and only if λa ϕ(Q)λ∗a − ϕ(Q) → 0 as a → e. We consider now crossed products of the form A X where A ⊂ C(X) is a C ∗ -subalgebra stable under (left) translations (so a.φ ∈ A if φ ∈ A; only the case A = C(X) is of interest later).
1758
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
We refer to [35] for generalities on crossed products. The C ∗ -algebra A X is the enveloping C ∗ -algebra of the Banach ∗-algebra L1 (X; A), where the algebraic operations are defined as follows: (f ∗ g)(x) = f (y)y.g y −1 x dy, f ∗ (x) = (x)−1 x.f¯ x −1 . Thus C ∗ (X) = C X. If we define Λ : L1 (X; A) → B(X) by Λ(φ) = φ(a)λa da it is easy to check that this is a continuous ∗-morphism hence it extends uniquely to a morphism A X → B(X) for which we keep the same notation Λ. A short computation gives for φ ∈ Cc (X; A) and f ∈ L2 (X) Λ(φ)f (x) = φ x, xy −1 (y)−1 f (y) dy where for an element φ ∈ Cc (X; A) we set φ(x, a) = φ(a)(x). Thus Λ(φ) is an integral operator with kernel k(x, y) = φ(x, xy −1 )(y)−1 or Λ(φ) = Op(k) with our previous notation. The next simple characterization of Λ follows from the density in Cc (X; A) of the algebraic tensor product A ⊗alg Cc (X): there is a unique morphism Λ : A X → B(X) such that Λ(ϕ ⊗ ψ) = ϕ(Q)λψ for ϕ ∈ A and ψ ∈ Cc (X). Here we take φ = ϕ ⊗ ψ with ϕ ∈ A and ψ ∈ Cc (X), so φ(a) = ϕψ(a). Note that the kernel of the operator ϕ(Q)λψ is k(x, y) = ϕ(x)ψ(xy −1 )(y)−1 . The reduced crossed product A r X is a quotient of the full crossed product A X, the precise definition is of no interest here. Below we give a description of it which is more convenient in our setting. As usual, we embed A ⊂ B(X) by identifying ϕ = ϕ(Q) and if M , N are subspaces of B(X) then M · N is the closed linear subspace generated by the operators MN with M ∈ M and N ∈ N . Theorem 6.2. The kernel of Λ is equal to that of A X → A r X, hence Λ induces a canonical embedding A r X ⊂ B(X) whose range is A · Cr∗ (X). This allows us to identify A r X = A · Cr∗ (X). We thank Georges Skandalis for showing us that this is an easy consequence of results from the thesis of Athina Mageira. Indeed, it suffices to take A = A and B = Co (X) in [23, Proposition 1.3.12] by taking into account that the multiplier algebra of Co (X) is Cb (X), and then to use Co (X) X = K (X) (Takai’s theorem, cf. [23, Example 1.3.4]) and the fact that the multiplier algebra of K (X) is B(X). The crossed product of interest here is C(X) r X = C(X) · Cr∗ (X). Obviously we have K (X) = Co (X) r X ⊂ C(X) r X, the first equality being a consequence of Takai’s theorem but also of the following trivial argument: if ϕ, ψ ∈ Cc (X) then the kernel ϕ(x)ψ(xy −1 )(y)−1 of the operator ϕ(Q)λψ belongs to Cc (X 2 ) hence ϕ(Q)λψ is a Hilbert–Schmidt operator. We recall that the local topology on C(X) r X (see Definition 3.3 here and [17, p. 447]) is defined by the family of seminorms of the form T Λ = 1Λ T + T 1Λ with Λ ⊂ X compact. The following is an extension of [17, Proposition 5.9] in the present context (see also pp. 30–31 in the preprint version of [15] and [31]). Recall that any bounded function ϕ : X → C extends to a continuous function β(ϕ) on β(X). If ∈ β(X) we define ϕ : X → C by ϕ (x) = β x −1 ϕ () = lim ϕ(xa). (6.40) a→
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1759
Lemma 6.3. If ϕ ∈ C(X) then for any θ ∈ Co (X) the set {θ ϕ.a | a ∈ X} is relatively compact in Co (X) and the map a → θ ϕa ∈ Co (X) is norm continuous. In particular, for any ∈ β(X) the limit in (6.40) exists locally uniformly in x and we have ϕ ∈ C(X). Proof. By the Ascoli–Arzela theorem, to show the relative compactness of the set of functions of the form θ ϕ.a it suffices to show that the set is equicontinuous. For each ε > 0 there is a neighborhood V of e such that |ϕ(x) − ϕ(y)| < ε if xy −1 ∈ V . Then |ϕ(xa) − ϕ(ya)| < ε for all a ∈ X, which proves the assertion. In particular, lima→ θ ϕ.a exists in norm in Co (X), hence the limit in (6.40) exists locally uniformly in x. Moreover, we shall have |ϕ (x) − ϕ (y)| < ε so ϕ belongs to C(X). Finally, we show that for any compact set K and any ε > 0 there is a neighborhood V of e such that supK |ϕ(xa) − ϕ(x)| < ε for all a ∈ V . For this, let U be an open cover of K such that the oscillation of ϕ over any U ∈ U is < ε and note that there is a neighborhood V of e such that for any x ∈ K there is U ∈ U such that xV ⊂ U (use the Lebesgue property for the left uniform structure). 2 Proposition 6.4. For each T ∈ C(X) r X and each a ∈ X we have τa (T ) := ρa T ρa∗ ∈ C(X) r X and the map a → τa (T ) is locally continuous on X and has locally relatively compact range. For each ultrafilter ∈ β(X) and each T ∈ C(X) r X the limit τ (T ) := lima→ τa (T ) exists in the local topology of C(X) r X. The so defined map τ : C(X) r X → C(X) r X is a morphism uniquely determined by the property τ (ϕ(Q)λψ ) = ϕ (Q)λψ . Proof. If T = ϕ(Q)λψ then ρa T ρa∗ = (ϕ.a)(Q)λψ is an element of C(X) r X and so τa is an automorphism of C(X) r X. If we take ψ with compact support and Λ is a compact set then λψ 1Λ = 1K λψ 1Λ where K = (supp ψ)Λ is also compact. Then τa (T )1Λ = (ϕ.a)(Q)1K λψ 1Λ and the map a → (ϕ.a)(Q)1K is norm continuous, cf. Lemma 6.3. This implies that a → τa (T ) is locally continuous on X for any T . To show that the range is relatively compact, it suffices again to consider the case T = ϕ(Q)λψ with ψ with compact support and to use τa (T )1Λ = (ϕ.a)(Q)1K λψ 1Λ and the relative compactness of the {(ϕ.a)(Q)1K | a ∈ X} established in Lemma 6.3. The other assertions of the proposition follow easily from these facts. 2 6.2. Elliptic C ∗ -algebra Let X be a locally compact non-compact topological group. Since we do not require that X be metrizable, we have to adapt some of the notions used in the metric case to this context. Of course, we could use the more general framework of coarse spaces [30] to cover both situations, but we think that the case of metric groups is already sufficiently general. So the reader may assume that X is equipped with an invariant proper distance d. Our leftist bias in Section 6.1 forces us to take d right invariant, i.e. d(x, y) = d(xz, yz) for all x, y, z. If we set |x| = d(x, e) then we get a function | · | on X such that |x −1 | = |x|, |xy| |x| + |y|, and d(x, y) = |xy −1 |. The balls B(r) defined by relations of the form |x| r are a basis of compact neighborhoods of e, a function on X is d-uniformly continuous if and only if it is right uniformly continuous, etc. Note that Bx (r) = B(r)x so in the non-metrizable case the role of the balls Bx (r) is played by the sets V x with V compact neighborhoods of e. Recall that the range of the modular function is a subgroup of the multiplicative group ]0, ∞[ hence it is either {1} or unbounded. Since μ(V x) = μ(V )(x) our assumption (2.3) is satisfied only if X is unimodular and in this case we have μ(V x) = μ(V ) for all x.
1760
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
We emphasize the importance of the condition that the metric be proper. Fortunately, it has been proved in [18] that a locally compact group is second countable if and only if its topology is generated by a proper right invariant metric. For coherence, in the non-metrizable case we are forced to say that a kernel k : X 2 → C is / K. The symbol d(k) controlled if there is a compact set K ⊂ X such that k(x, y) = 0 if xy −1 ∈ should be defined now as the smallest compact set K with the preceding property. On the other hand, k is uniformly continuous if it is right uniformly continuous, i.e. if for any ε > 0 there is a neighborhood V of e such that |k(ax, by) − k(x, y)| < ε for all a, b ∈ V and x, y ∈ X. Then the Schur estimate (3.15) gives Op(k) sup |k| supa μ(Ka) so only if X is unimodular we have a simple estimate Op(k) μ(K) sup |k|. To summarize, if X is unimodular then Ctrl (X 2 ) is well defined and Lemma 3.1 remains valid if we set V (d(k)) = μ(d(k)) so we may define the elliptic algebra E (X) as in (2.5). But in fact, what we get is just a description of the crossed product C(X) r X independent of the group structure of X: Proposition 6.5. If X is unimodular then E (X) = C(X) r X = C(X) · Cr∗ (X). Proof. From the results presented in Section 6.1 and the fact that = 1 we get that C(X) X is the closed linear space generated by the operators Op(k) with kernels k(x, y) = ϕ(x)ψ(xy −1 ), where ϕ ∈ C(X) and ψ ∈ Cc (X). Thus C(X) X ⊂ E (X). To show the converse, let k ∈ Ctrl (X 2 ) and let k(x, y) = k(x, y −1 x) hence k(x, y) = k(x, xy −1 ). If K = K −1 ⊂ X is a compact set such −1 that k(x, y) = 0 ⇒ xy ∈ K then supp k ⊂ X × K. Fix ε > 0 and let V be a neighborhood of the originsuch that | k(x, y) − k(x, z)| < ε if yz−1 ∈ V . Then let Z ⊂ K be a finite set such that K ⊂ z∈Z V z and let {θz } be a partition of unity subordinated to this covering. If l(x, y) = (y) or l = then k(x, z)θ k(·, z) ⊗ θ z z z∈Z z∈Z k(x, y) − l(x, y) = k(x, y) − k(x, z) θz (y) k(x, y) − k(x, z)θz (y) ε z∈Z
z∈Z
l(x, xy −1 )= z∈Z because supp θz ⊂ V z. Now let us set l(x, y) = k(x, z)θz (xy −1 ). If l(x, y) = 0 then θz (xy −1 ) = 0 for some z hence xy −1 ∈ V z ⊂ V K. In this construction we may choose V ⊂ U where U is a fixed compact neighborhood of the origin. Then we will have l(x, y) = 0 ⇒ xy −1 ⊂ U K which is a compact set independent of l and from (3.16) we get Op(k) − Op(l) C sup |k − l| Cε for some constant C independent of ε. But clearly Op(l) ∈ C(X) r X. 2 Thus if X is a unimodular group then we may apply Proposition 6.4 and get endomorphisms τ of E (X) indexed by ∈ δ(X). These will play an important role in the next subsection. We make now some comments on the relation between amenability and Property A in the case of groups. First, the Property A is much more general than amenability, cf. the discussion in [24] for the case of discrete groups. To show that amenability implies Property A we choose from the numerous known equivalent descriptions that which is most convenient in our context [25, p. 128]: X is amenable if and only if for any ε > 0 and any compact subset K of X there is a positive function ϕ ∈ Cc (X) with ϕ = 1 such that ρa ϕ − ϕ < ε for all a ∈ K. Now let us set φ(x) = ρx∗ ϕ, so φ(x)(z) = (x)−1/2 ϕ(zx −1 ). We get a strongly continuous function φ : X → L2 (X) such that φ(x) = 1, supp φ(x) = (supp ϕ)x, and φ(x) − φ(y) = ρxy −1 ϕ − ϕ ε if xy −1 ∈ K. In the metric case we get a function as in Definition 2.1, so the metric version of the Property A is satisfied.
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1761
6.3. Coarse filters in groups A filter ξ on a locally compact non-compact group X is called round if the sets of the form V G = {xy | x ∈ V , y ∈ G}, where V runs over the set of neighborhoods of e and G over ξ , are a basis of ξ . And ξ is (left) invariant if x ∈ X, F ∈ ξ ⇒ xF ∈ ξ . Naturally, ξ is coarse if for any F ∈ ξ and any compact set K ⊂ X there is G ∈ ξ such that KG ⊂ F . The simplicity of the next proof owes much to a discussion with H. Rugh. In our initial argument Proposition 6.6 was a corollary of Proposition 4.5. Proposition 6.6. A filter is coarse if and only if it is round and invariant. Proof. Note first that ξ is invariant if and only if for each H ∈ ξ and each finite N ⊂ X there is G ∈ ξ such that H ⊃ N G. This is clear because N G ⊂ H is equivalent to G ⊂ x∈N x −1 H . Now assume that ξ is also round. Then for any F ∈ ξ there is a neighborhood V of e and a set H ∈ ξ such that F ⊃ V H . If K is any compact set then there is a finite set N such that V N ⊃ K. Then there is G ∈ ξ such that H ⊃ N G. So F ⊃ V N G ⊃ KH . 2 Proposition 6.7. Let X be unimodular and let ξ be a coarse filter. Then for any T ∈ Jξ (X) we have lima→ξ τa (T ) = 0 locally. If X is amenable then the converse assertion holds, so
Jξ (X) = T ∈ E (X) lim τa (T ) = 0 locally a→ξ
= T ∈ E (X) τ (T ) = 0, ∀ ∈ ξ † .
(6.41)
Moreover, if X is amenable then for any compact neighborhood V of e and any T ∈ E (X) we have T ∈ Jξ (X)
⇔
lim T 1V a = 0
a→ξ
⇔
lim τa (T )1V = 0.
a→ξ
(6.42)
Proof. We have 1V a (Q) = ρa∗ 1V (Q)ρa hence T 1V a = T ρa∗ 1V (Q)ρa = τa (T )1V (Q) hence for T ∈ Jξ (X) we have lima→ξ τa (T ) = 0 locally. If X is amenable then Proposition 5.5 in the metric case and a suitable modification in the non-metrizable group case gives (6.41). Then (6.42) is easy. 2 Theorem 6.8. Let X be a unimodular amenable locally compact group. Then for each ∈ δ(X) and for each T ∈ E (X) the limit τ (T ) := lima→ ρa T ρa∗ exists in the local topology of E (X), in particular in the strong operator topology of B(X). The maps τ are endomorphisms of E (X) and χ∈δ(X) ker τχ = K (X). In particular, the map T → (τ (T )) is a morphism E (X) → ∈δ(X) E (X) with K (X) as kernel, hence the essential spectrum of any normal oper ator H ∈ E (X) or any observable H affiliated to E (X) is given by Spess (H ) = Sp(τ (H )). Proof. We have seen in Section 4.4 that E() (X) =
χ∈
= δ(X) ∈δ(X)
ker τχ
and from (6.41) we get
for each ∈ δ(X).
(6.43)
1762
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
On the other hand, we have shown before that Property A, hence of amenability. 2
∈δ(X) E() (X)
= K (X) is a consequence of
Remark 6.9. Recall that after (2.9) we defined the localization .T at ∈ δ(X) of some T ∈ E as the quotient of T in E = E /E() . If T is normal then from (6.43) we get Sp(.T ) = χ∈ Sp(τχ (T )) but many of the operators τχ (T ) which appear here are unitary equivalent, in particular have the same spectrum. Indeed, note that there is a natural (left) action of X on β(X) which leaves δ(X) invariant and is the minimal closed invariant subset of δ(X) which contains . And if χ ∈ δ(X) and a ∈ X then by using aχ = limb→χ ab we get τaχ (T ) = ρa τχ (T )ρa∗ . 7. Quasi-controlled operators In this section we describe briefly other C ∗ -algebras of operators which are analogs of E (X). We emphasize that our choice of E (X) was determined by our desire to mimic the crossed product C(X) X which is a very natural object in the abelian group case, but there are of course many other possibilities. For example, we could allow bounded Borel (instead of uniformly continuous) kernels in (3.14). The C ∗ -algebra generated by such kernels is strictly larger than E (even if we require the kernels to be continuous, see Example 7.2) but an analogue of Theorem 2.5 remains true. It is not clear to us if this algebra is really significant in applications, the set of observables affiliated to E being already very large. We now consider the C ∗ -algebra obtained as norm closure of the set of controlled operator. This notion has been introduced in the metric case in Section 3 but in fact it makes sense in the general framework of coarse spaces X and geometric Hilbert X-modules [30]. In particular, if X is a locally compact group an operator T ∈ B(X) is controlled if there is a compact set Λ ⊂ X such that if F, G are closed subsets of X with F ∩ (ΛG) = ∅ then 1F T 1G = 0. If X is a metric group with a metric as in Section 6.2 this is equivalent to the definition of Section 3. We denote C (X) the norm closure of the set of controlled operators and we call quasi-controlled operators its elements. If X is a proper metric space this is the “standard algebra” from [12]. If X is a discrete metric space with bounded geometry then C (X) = E (X) is the “uniform Roe C ∗ -algebra” from [30,7,8,34]. Clearly C (X) ⊃ E (X). One may define analogs of the ideals Jξ and Gξ . Indeed, form the proof of Lemma 5.1 it follows that if ξ is a coarse filter on X then the set Jξ (X) of T ∈ C (X) such that infF ∈ξ 1F T = 0 is an ideal of C (X). And if ξ is an arbitrary filter then the set Gξ (X) of T ∈ C (X) such that limx→ξ 1Λx T = 0 for each compact set Λ is also an ideal of C (X). But if X is not discrete this class of ideals is too small to allow one to describe the quotient C (X)/K (X) even in simple cases. For example, if X = R then the operators in C may have an anisotropic behavior in momentum space (see Proposition 7.4 and [16]). In order to clarify the difference between E (X) and C (X) we consider the case when X is an abelian group. We first recall a result from [17]. Let X ∗ be the dual group and for p ∈ X ∗ let νp be the unitary operator on L2 (X) given by (νp f )(x) = p(x)f (x). To any Borel function ψ on X ∗ we associate an operator ψ(P ) = F −1 Mψ F on L2 (X), where Mψ is the operator of multiplication by ψ on L2 (X ∗ ) and F is the Fourier transformation. Proposition 7.1. If X is an abelian group then E (X) = C(X) X = C(X) r X is the set of operators T ∈ B(X) such that νp T νp∗ − T → 0 and (λa − 1)T (∗) → 0 if p → e in X ∗ and a → e in X.
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1763
The equality E (X) = C(X) X has been proved before in a more general setting. Proposition 7.1 gives in fact a description of the crossed product C(X) X if X is abelian. If we accept it, then we get the following easy proof of the inclusion E (X) = C(X) X. The operators νp Op(k)νp∗ and λa Op(k) have kernels p(x)k(x, y)p(y) ¯ = p(xy −1 )k(x, y) and k(xa −1 , y). Hence from (3.16) we get νp Op(k)ν ∗ − Op(k) sup p xy −1 − 1k(x, y)μ(K) p xy −1 ∈K
which tends to zero as p → e in X ∗ . Similarly (λa − 1) Op(k) → 0 as a → e in X. Hence Op(k) ∈ C(X) X for each k ∈ Ctrl (X 2 ). The next example shows the role played by the uniform continuity condition in the definition of E (X). Example 7.2. If X = R then we identify X ∗ = R by setting p(x) = eipx . Then the elliptic algebra can be described in very simple terms. Indeed, if λa , νa are the unitary operators on L2 (R) given by (λa f )(x) = f (x − a) and (νa f )(x) = eiax f (x), we have
E (R) = T ∈ B(R) (λa − 1)T (∗) → 0 and νa T νa∗ − T → 0 as a → 0 . Here T (∗) means that the relation holds for T and T ∗ . If we take k(x, y) = ϕ(x)θ (x − y) with ϕ ∈ C(R) and θ ∈ Cc (R) then Op(k) = ϕ(Q)ψ(P ) ∈ E (R) with ψ the Fourier transform (conveniently normalized) of θ . The advantage now is that we can see what happens if ϕ is only bounded and continuous. Then it is easy to check that ϕ(Q)ψ(P ) ∈ E (R) if and only if 2 (ϕ(Q + a) − ϕ(Q))ψ(P ) → 0 when a → 0. For example, if ϕ(x) = eix the last condition is equivalent to (eiaQ − 1)ψ(P ) → 0, which is equivalent to ψ(P ) = η(Q)S for some η ∈ Co (R) and S ∈ B(R). But then ψ(P ) is compact as a norm limit of operators of the form ζ (Q)ψ(P ) with ζ ∈ Co (R), which is not true if ψ = 0. Thus, the operator associated to a kernel of the form 2 k(x, y) = eix θ (x − y) with θ ∈ Cc∞ (R) and not zero does not belong to E (R). To describe C (X), we need an analogue of Lemma 3.5 in the group context. Lemma 7.3. Let ω be a compact neighborhood of e and Z a maximal ω-separated subset of X (i.e. if a, b are distinct elements of Z then (ωa) ∩ (ωb) = ∅). Then for any compact set K ⊃ ω−1 ω we have KZ = X and for any a ∈ Z the number of z ∈ Z such that (Kz) ∩ (Ka) = ∅ is at most μ(ωK −1 K)/μ(ω). Proof. That such maximal Z exist follows from Zorn lemma. By maximality, (ωx) ∩ (ωZ) = ∅ for any x, hence x ∈ ω−1 ωZ, so X = KZ if K ⊃ ω−1 ω. Now fix a ∈ Z and let N be the number of points z ∈ Z such that (Kz) ∩ (Ka) = ∅. For each such z we have z ∈ K −1 Ka hence ωz ⊂ ωK −1 Ka. But the sets ωz are pairwise disjoint and have the same measure μ(ω) so Nμ(ω) μ(ωK −1 Ka) = μ(ωK −1 K). 2 If X is an abelian group then a Q-regular operator is an operator T ∈ B(X) which satisfies only the first condition from Proposition 7.1, i.e. is such that the map p → νp T νp∗ is norm continuous. These operators form a C ∗ -algebra which contains E (X), strictly if X is not discrete,
1764
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
which seems to depend on the group structure of X. But in fact this is not the case, it depends only on the coarse structure of X. Proposition 7.4. If X is an abelian group then C (X) = {T ∈ B(X) | limp→e νp T νp∗ − T = 0}. For the proof, it suffices to use [14, Propositions 4.11 and 4.12] (arXiv version) and Lemma 7.3. Now let L C (X) be the set of locally compact operators in C (X). Obviously L C is a C ∗ algebra and E ⊂ L C ⊂ C strictly in general. Indeed, let X be an abelian group, ϕ a bounded continuous function on X, and ψ ∈ C(X ∗ ). Then φ(Q)ψ(P ) belongs to C but not to L C in general, and if ψ ∈ Co (X ∗ ) it belongs to L C but not to C in general, cf. Example 7.2. Note that an operator T ∈ C is locally compact if and only if lima→e λa T (∗) = T (∗) in the local topology of C . Finally, we mention another C ∗ -algebra which is of a similar nature to C (X) and makes sense and is useful in the context of arbitrary locally compact spaces X and arbitrary geometric Hilbert X-modules, see [14,30]. Let us say that S ∈ B(H) is quasilocal (or “decay preserving”) if for each ϕ ∈ Co (X) there are operators S1 , S2 ∈ B(H) and functions ϕ1 , ϕ2 ∈ Co (X) such that Sϕ(Q) = ϕ1 (Q)S1 and ϕ(Q)S = S2 ϕ2 (Q). The set of quasilocal operators is a C ∗ -algebra which contains strictly C (X) if X is a locally compact non-compact abelian group. Indeed, if ψ ∈ L∞ (X ∗ ) has compact support then ψ(P ) is quasilocal (because ψ(P )ϕ(Q) and ϕ(Q)ψ(P ) are compact) but it belongs to C (X) if and only if ψ is continuous. Acknowledgments I am grateful to Hans-Henrik Rugh, Armen Shirikyan and Georges Skandalis, several discussions with them were very helpful. References [1] W. Amrein, A. Boutet de Monvel, V. Georgescu, C0 -Groups, Commutator Methods and Spectral Theory of N -Body Hamiltonians, Birkhäuser, 1996. [2] J. Bellissard, Gap labelling theorems for Schrödinger operators, in: J.M. Luck, P. Moussa, M. Waldschmidt (Eds.), From Number Theory to Physics, Les Houches, 1989, Springer, 1993, pp. 538–630. [3] J. Bellissard, Non Commutative Methods in Semiclassical Analysis, Lecture Notes in Math., vol. 1589, Springer, 1994. [4] A. Boutet de Monvel, V. Georgescu, Graded C ∗ -algebras in the N -body problem, J. Math. Phys. 32 (1991) 3101– 3110. [5] A. Boutet de Monvel, V. Georgescu, Graded C ∗ -algebras associated to symplectic spaces and spectral analysis of many channel Hamiltonians, in: Dynamics of Complex and Irregular Systems, Bielefeld, 1991, in: Bielefeld Encount. Math. Phys., vol. 8, Oxford Science Publications, River Edge, NJ, 1993, pp. 22–66. [6] S.N. Chandler-Wilde, M. Lindner, Limit operators, collective compactness, and the spectral theory of infinite matrices, available at http://www.reading.ac.uk/maths/research/maths-preprints.aspx. [7] X. Chen, Q. Wang, Ideal structure of uniform Roe algebras of coarse spaces, J. Funct. Anal. 216 (2004) 191–211. [8] X. Chen, Q. Wang, Ghost ideal in uniform Roe algebras of coarse spaces, Arch. Math. 84 (2005) 519–526. [9] H.O. Cordes, Spectral Theory of Linear Differential Operators and Comparison Algebras, Cambridge University Press, 1987. [10] M. Damak, V. Georgescu, Self-adjoint operators affiliated to C ∗ -algebras, Rev. Math. Phys. 16 (2004) 257–280, this is part of 99–481 at http://www.ma.utexas.edu/mp_arc/. [11] M. Damak, V. Georgescu, On the spectral analysis of many-body systems, J. Funct. Anal. (February 2010), preprint, available at arXiv:0911.5126v1, http://arxiv.org.
V. Georgescu / Journal of Functional Analysis 260 (2011) 1734–1765
1765
[12] E.B. Davies, Decomposing the essential spectrum, J. Funct. Anal. 257 (2009) 506–536, http://arxiv.org/abs/ 0809.5130. [13] V. Georgescu, On the spectral analysis of quantum field Hamiltonians, J. Funct. Anal. 245 (2007) 89–143, preprint, available at arXiv:math-ph/0604072v1, http://arXiv.org. [14] V. Georgescu, S. Golénia, Decay preserving operators and stability of the essential spectrum, J. Operator Theory 59 (2008) 115–155, a more detailed version is http://arxiv.org/abs/math/0411489. [15] V. Georgescu, A. Iftimovici, Crossed products of C ∗ -algebras and spectral analysis of quantum Hamiltonians, Comm. Math. Phys. 228 (2002) 519–560, see also 00-521 at http://www.ma.utexas.edu/mp_arc/. [16] V. Georgescu, A. Iftimovici, C ∗ -algebras of quantum Hamiltonians, in: J.-M. Combes, J. Cuntz, G.A. Elliot, G. Nenciu, H. Siedentop, S. Stratila (Eds.), Operator Algebras and Mathematical Physics, Proceedings of the Conference Operator Algebras, Mathematical Physics, Constanta, 2001, Theta, 2003, pp. 123–167, and preprint 02-410 at http://www.ma.utexas.edu/mp_arc/. [17] V. Georgescu, A. Iftimovici, Localizations at infinity and essential spectrum of quantum Hamiltonians: I. General theory, Rev. Math. Phys. 18 (2006) 417–483, see also http://arxiv.org/abs/math-ph/0506051. [18] U. Haagerup, A. Przybyszewska, Proper metrics on locally compact groups, and proper affine isometric actions on Banach spaces, preprint, available at http://www.imada.sdu.dk/haagerup/, 2006. [19] B. Helffer, A. Mohamed, Caractérisation du spectre essentiel de l’opérateur de Schrödinger avec un champ magnétique, Ann. Inst. Fourier (Grenoble) 38 (2) (1988) 95–112. [20] N. Higson, V. Laforgue, G. Skandalis, Counterexamples to the Baum–Connes conjecture, Geom. Funct. Anal. 12 (2002) 330–354. [21] N. Higson, E.K. Pedersen, J. Roe, C ∗ -algebras and controlled topology, K-Theory 11 (1997) 209–239. [22] Y. Last, B. Simon, The essential spectrum of Schrödinger, Jacobi, and CMV operators, J. Anal. Math. 98 (2006) 183–220, and preprint 05-112 at http://www.ma.utexas.edu/mp_arc/. [23] A. Mageira, C ∗ -algèbres graduées par un semi-treillis, thèse Université Paris 7, Février 2007, also available as preprint number arXiv:0705.1961v1 at http://arxiv.org. [24] P. Nowak, G. Yu, What is Property A? Notices Amer. Math. Soc. 55 (2008) 474–475. [25] A.T. Paterson, Amenability, Math. Surveys Monogr., vol. 29, Amer. Math. Soc., Providence, RI, 1988. [26] G. Pisier, Similarity Problems and Completely Bounded Maps, second ed., Lecture Notes in Math., vol. 1618, Springer, 2001. [27] V.S. Rabinovich, S. Roch, J. Roe, Fredholm indices of band-dominated operators, Integral Equations Operator Theory 49 (2004) 221–238. [28] V.S. Rabinovich, S. Roch, B. Silbermann, Limit Operators and Their Applications in Operator Theory, Oper. Theory Adv. Appl., vol. 150, Birkhäuser, 2004. [29] H. Reiter, J. Stegman, Classical Harmonic Analysis and Locally Compact Groups, Oxford Science Publications, 2000. [30] J. Roe, Lectures on Coarse Geometry, Am. Math. Soc., 2003. [31] J. Roe, Band-dominated Fredholm operators on discrete groups, Integral Equations Operator Theory 51 (2005) 411–416. [32] G. Skandalis, J.-L. Tu, G. Yu, The coarse Baum–Connes conjecture and groupoids, Topology 41 (2002) 807–834. [33] J.-L. Tu, Remarks on Yu’s Property A for discrete metric spaces and groups, Bull. Soc. Math. France 129 (2001) 115–139. [34] Q. Wang, Remarks on ghost projections and ideals in the Roe algebras of expander sequences, Arch. Math. 89 (2007) 459–465. [35] D.P. Williams, Crossed Products of C ∗ -Algebras, Amer. Math. Soc., 2007. [36] G. Yu, The coarse Baum–Connes conjecture for spaces which admit a uniform embedding into Hilbert spaces, Invent. Math. 139 (2000) 201–240.
Journal of Functional Analysis 260 (2011) 1766–1794 www.elsevier.com/locate/jfa
Two-body threshold spectral analysis, the critical case Erik Skibsted a,∗ , Xue Ping Wang b,1 a Institut for Matematiske Fag, Aarhus Universitet, Ny Munkegade 8000 Aarhus C, Denmark b Laboratoire de Mathématiques Jean Leray, UMR CNRS 6629, Université de Nantes, 44322 Nantes Cedex, France
Received 9 June 2010; accepted 15 December 2010 Available online 22 December 2010 Communicated by J. Bourgain
Abstract We study in dimension d 2 low-energy spectral and scattering asymptotics for two-body d-dimensional Schrödinger operators with a radially symmetric potential falling off like −γ r −2 , γ > 0. We consider angular momentum sectors, labelled by l = 0, 1, . . . , for which γ > (l + d/2 − 1)2 . In each such sector the reduced Schrödinger operator has infinitely many negative eigenvalues accumulating at zero. We show that the resolvent has a non-trivial oscillatory behaviour as the spectral parameter approaches zero in cones bounded away from the negative half-axis, and we derive an asymptotic formula for the phase shift. © 2010 Elsevier Inc. All rights reserved. Keywords: Threshold spectral analysis; Schrödinger operator; Critical potential; Phase shift
Contents 1. 2.
3.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Model asymptotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1. Model operator and construction of model resolvent . . . . . . 2.2. Asymptotics of model resolvent . . . . . . . . . . . . . . . . . . . . Asymptotics for full Hamiltonian, compactly supported perturbation 3.1. Construction of resolvent . . . . . . . . . . . . . . . . . . . . . . . . . 3.2. Asymptotics of resolvent . . . . . . . . . . . . . . . . . . . . . . . . . 3.3. d-dimensional Schrödinger operator . . . . . . . . . . . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
* Corresponding author.
E-mail addresses: [email protected] (E. Skibsted), [email protected] (X.P. Wang). 1 Supported in part by the French National Research Agency under the project No. ANR-08-BLAN-0228-01.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.014
. . . . . . . .
1767 1771 1771 1773 1774 1776 1778 1780
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
4. Asymptotics for full Hamiltonian, more general perturbation . . . . . . . . 5. Regular positive energy solutions and asymptotics of phase shift . . . . . . 6. Asymptotics of physical phase shift for a potential like −γ χ (r > 1)r −2 . Appendix A. Regular zero energy solutions . . . . . . . . . . . . . . . . . . . . . . . Appendix B. Case (d, l) = (2, 0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
1767
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
1783 1785 1790 1791 1792 1793
1. Introduction The low-energy spectral and scattering asymptotics for two-body Schrödinger operators depend heavily on the decay of the potential at infinity. The most well-studied class is given by potentials decaying faster than r −2 (see for example [6] and references there). The expansion of the resolvent is in this case in terms of powers of dimension-dependent modifications of the spectral parameter and it depends on possible existence of zero-energy bound states and/or zeroenergy resonance states. Classes of negative potentials decaying slower than r −2 were studied in [5,7,16]. In that case the resolvent is more regular at zero energy. It has an expansion in integer powers of the spectral parameter and there are no zero-energy bound states nor resonance states. Moreover, the nature of the expansion is “semi-classical”. For general perturbations of critical decay of the order r −2 and with an assumption related to the Hardy inequality, the threshold spectral analysis is carried out in [13,14]. It is shown that for this class of potentials the zero resonance may appear in any space dimension with arbitrary multiplicity. Recall that for potentials decaying faster than r −2 , the zero resonance is absent if the space dimension d is bigger than or equal to five and its multiplicity is at most one when d is equal to three or four. The goal of this paper is to treat a class of radially symmetric potentials decaying like −γ r −2 at infinity, where γ > 0 is big such that the condition used in [13,14] is not satisfied. In this case, there exist infinitely many negative eigenvalues (see (1.3) for a precise condition). We will give a resolvent expansion as well as an asymptotic formula for the phase shift. These expansions are to our knowledge not semi-classical even though there are common features with the more slowly decaying case. Consider for d 2 the d-dimensional Schrödinger operator H v = (− + W )v = 0, for a radial potential W = W (|x|) obeying Condition 1.1. 1) 2) 3) 4)
W (r) = W1 (r) + W2 (r); W1 (r) = − rγ2 χ(r > 1) for some γ > 0, W2 ∈ C(]0, ∞[, R), ∃1 , C1 > 0: |W2 (r)| C1 r −2−1 for r > 1, ∃2 , C2 > 0: |W2 (r)| C2 r 2 −2 for r 1.
Here the function χ(r > 1) is a smooth cutoff function taken to be 1 for r 2 and 0 for r 1 (see the end of this introduction for the precise definition). Under Condition 1.1 H is self-adjoint as defined in terms of the Dirichlet form on H 1 (Rd ). Let Hl , l = 0, 1, . . . , be the corresponding
1768
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
reduced Hamiltonian on L2 (R+ ) corresponding to the eigenvalue l(l + d − 2) of the Laplace– Beltrami operator on S d−1 Hl u = −u + (V∞ + V )u.
(1.1)
Here ν 2 − 1/4 V∞ (r) = χ(r > 1); r2 V (r) = W2 (r) +
(l +
d 2
d ν = l+ −1 2 2
2 − γ,
− 1)2 − 1/4 1 − χ(r > 1) . 2 r
(1.2a) (1.2b)
Notice that V is small at infinity compared to V∞ . We are interested in spectral and scattering properties of Hl at zero energy in the case 2 d γ > l+ −1 . 2
(1.3)
This condition is equivalent to having ν in (1.2a) purely imaginary (for convenience we fix it in this case as ν = −iσ , σ > 0), and it implies the existence of a sequence of negative eigenvalues of Hl accumulating at zero energy. Our first main result is on the expansion of the resolvent −1 Rl (k) := Hl − k 2
for k ∈ Γθ± ,
where here (for any θ ∈ ]0, π/2[) Γθ+ = {k = 0 | 0 < arg k θ },
(1.4a)
Γθ− = {k = 0 | π − θ arg k < π}.
(1.4b)
We say that a solution u to the equation −u (r) + V∞ (r) + V (r) u(r) = 0
(1.5)
is regular if the function r → χ(r < 1)u(r) belongs to D(Hl ). For any t ∈ R we introduce the weighted L2 -space Ht := r−t L2 (R+ ); r = (1 + r 2 )1/2 . Theorem 1.2. Suppose Condition 1.1 and (1.3) for some (fixed) l ∈ N ∪ {0}. Let θ ∈ ]0, π/2[. There exist (finite) rational functions f ± in the variable k 2ν for k ∈ Γθ± for which lim
Γθ± k→0
Im f ± k 2ν do not exist,
(1.6)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1769
there exist Green’s functions for Hl at zero energy, denoted by R0± , and there exists a real nonzero regular solution to (1.5), denoted by u, such that the following asymptotics hold. For all s > s > 1, s 1 + 1 /2, s 3: lim sup |k|1−s Rl (k) − R0± − f ± k 2ν |u u|B(H ,H ) < ∞. s −s ±
(1.7)
Γθ k→0
Due to (1.6) the rank-one operators f ± (k 2ν )|u u| in (1.7) are non-trivially oscillatory. This phenomenon does not occur for low-energy resolvent expansions for potentials either decaying faster or slower than r −2 (cf. [6] and [5,16], respectively), nor for sectors where (1.3) is not fulfilled (cf. [14]). Combining Theorem 1.2 and the results of [14], we can deduce the resolvent asymptotics near threshold for d-dimensional Schrödinger operators with critically decaying, spherically symmetric potentials, see Theorem 3.7. An advantage to work with spherically symmetric potentials is that we can diagonalise the operator in spherical harmonics and explicitly calculate some subtle quantities. For example, one can easily show that if zero is a resonance of H , then its multiplicity is equal to (m + d − 3)! (m + d − 2)! + (d − 2)!(m − 1)! (d − 2)!m! where m ∈ N ∪ {0} is such that (m + d−2 2
d 2
− 1)2 − γ ∈ ]0, 1]. This shows that multiplicity of zero
resonance grows like γ when γ is big and d 3. To study the resolvent asymptotics for nonspherically symmetric potential W (x) behaving like q(θ) at infinity (x = rθ with r = |x|), one r2 is led to analyse the interactions between different oscillations and resonant states. This is not carried out in the present work. Our second main result is on the asymptotics of the phase shift. Let ul be a regular solution to the reduced Schrödinger equation −u + (V∞ + V )u = λu;
λ > 0.
Write √ lim ul (r) − C sin( λr + Dl ) = 0.
r→∞
The standard definition of the phase shift (coinciding with the time-depending definition) is phy
σl
(λ) = Dl +
d − 3 + 2l π. 4
The notation σ per = σ per (t) signifies below the continuous real-valued 2π -periodic function determined by
σ per (0) = 0, per eπσ e−it − eit = r(t)ei(σ (t)−t) ;
r(t) > 0, t ∈ R.
1770
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
Theorem 1.3. Suppose Condition 1.1 and (1.3) for some l ∈ N ∪ {0}. Let σ=
2 d γ − l+ −1 2
(recall ν = −iσ ). There exist C1 , C2 ∈ R such that phy
σl
√ √ (λ) + σ ln λ − σ per (σ ln λ + C1 ) → C2
for λ ↓ 0.
(1.8)
√ Whence the leading term in the asymptotics of the phase shift is linear in ln λ while the next term is oscillatory in the same quantity. The (positive) sign agrees with the well-known Levinson theorem (cf. [8, (12.95) and (12.156)]) valid for potentials decaying faster than r −2 . Also the qualitative behaviour of these terms as σ → 0 (i.e. finiteness in the limit) is agreeable to the case where (1.3) is not fulfilled (studied in [1] from a different point of view). The bulk of this paper concerns somewhat more general one-dimensional problems than discussed above. In particular we consider for (d, l) = (2, 0) a model with a local singularity at r = 0 that is more general than specified by Condition 1.1 4) and (1.2b). This extension does not contribute by any complication and is therefore naturally included. It would be possible to extend our methods to certain types of more general local singularities, however this would add some extra complication that we will not pursue. Our methods rely heavily on explicit properties of solutions to the Bessel equation as well as ODE techniques. These properties compensate for the fact that, at least to our knowledge, semi-classical analysis is not doable in the present context (for instance the semi-classical formula (6.8) for the asymptotics of the phase shift for slowly decaying potentials is not correct under Condition 1.1). See however [2] in the case the potential is positive. One of our motivations for studying a potential with critical fall off comes from an N -body problem: Consider a 2-cluster N -body threshold under the assumption of Coulomb pair interactions, this could be given by two atoms each one being confined in a bound state. Suppose one atom is charged while the other one is neutral. The effective intercluster potential will in this case in a typical situation (given by nonzero moment of charge of the bound state of the neutral atom) have r −2 decay although with some angular dependence (the so-called dipole approximation). Whence we expect (due to the present work) that the N -body resolvent will have some oscillatory behaviour near the threshold in question. Proving this (and related spectral and scattering properties) would, in addition to material from the present paper, rely on a reduction scheme not to be discussed here. We plan to study this problem in a separate future publication. In this paper we consider parameters ±ν, z ∈ C satisfying ν = −iσ where σ > 0 and z ∈ C \ {0} with Im z 0. Powers of z are throughout the paper defined in terms of the argument function fixed by the condition arg z ∈ [0, π]. We shall use the standard notation z := (1 + |z|2 )1/2 . For any given c > 0 we shall use the notation χ(r > c) to denote a given real-valued function χ ∈ C ∞ (R+ ) with χ(r) = 0 for r c and χ(r) = 1 for r 2c. We take it such that there exists a real-valued function χ< ∈ C ∞ (R+ ), denoted by χ< = χ(· < c), such that χ 2 + χ<2 = 1. Let for θ ∈ [0, π/2[ and > 0
Γθ, = {k = 0 | 0 arg k θ or π − θ arg k π} ∩ |k| , ± Γθ, = Γθ, ∩ {± Re k > 0}.
(1.9) (1.10)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1771
2. Model asymptotics In this section, we give the resolvent asymptotics at zero for a model operator under the condition (1.3). See [13] when (1.3) is not satisfied. Recall firstly some basic formulas for Bessel and Hankel functions from [11, pp. 228–230] and [12, pp. 126–127, 204] (or see [15]): (z/2)ν Jν (z) = Γ (1/2)Γ (ν + 1/2) 1 −1
1
ν−1/2 izt 1 − t2 e dt,
(2.1a)
−1
ν−1/2 Γ (1/2)Γ (ν + 1/2) , 1 − t2 dt = Γ (ν + 1)
J−ν (z) − e−iνπ Jν (z) , i sin(νπ) 1/2 i(z−νπ/2−π/4) ∞ t ν−1/2 e 2 (1) Hν (z) = e−t t ν−1/2 1 − dt. πz Γ (ν + 1/2) 2iz Hν(1) (z) =
(2.1b)
(2.1c)
(2.1d)
0
(1)
The functions Jν and Hν
solve the Bessel equation
d2 ν 2 − 1/4 − 1 z1/2 u(z) = 0. z−1/2 − 2 + dz z2
(2.2)
We have Jν (z) = eiνπ Jν¯ (−¯z),
(2.3a)
Hν(1) (z) = e−iνπ H−ν (z) = −H−¯ν (−¯z). (1)
(1)
(2.3b)
2.1. Model operator and construction of model resolvent Consider HD = −
d2 ν 2 − 1/4 + dr 2 r2
on HD = L2 [1, ∞[
(2.4)
with Dirichlet boundary condition at r = 1. Let for any ζ ∈ C, φ = φζ be the (unique) solution to ⎧ ν 2 − 1/4 ⎪ ⎪ φ(r) = ζ φ(r), ⎨ −φ (r) + r2 φ(1) = 0, ⎪ ⎪ ⎩ φ (1) = 1.
(2.5)
1772
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
This solution φζ is entire in ζ , and r 1/2+ν − r 1/2−ν . 2ν
(2.6)
π r 1/2 Jν¯ (k)Jν (kr) − Jν (k)Jν¯ (kr) . 2 sin(νπ)
(2.7)
φ0 (r) = In fact, cf. [11, (3.6.27)], φk 2 (r) =
(1)
Let for k ∈ C \ {0} with Im k 0 and Hν (k) = 0 φk+ (r) = r 1/2
(1)
Hν (kr) Hν(1) (k)
.
(2.8)
Due to (2.3b) the dependence of ν in φk+ is through ν 2 only, i.e. replacing ν → ν¯ yields the same expression (obviously this is also true for φk 2 ). Notice also that φk 2 and φk+ solve the equation −φ (r) +
ν 2 − 1/4 φ(r) = k 2 φ(r). r2
(2.9)
The kernel RkD (r, r ) of (H D − k 2 )−1 for k with Im k > 0 and Hν(1) (k) = 0 is given by RkD r, r = φk 2 (r< )φk+ (r> );
(2.10)
here and henceforth r< := min(r, r ) and r> := max(r, r ). (The fact that the right-hand side of (2.10) defines a bounded operator on HD follows from the Schur test and the bounds (2.15) (1) and (2.21) given below.) The condition Hν (k) = 0 is fulfilled for k ∈ {Im k > 0} \ iR+ since 2 otherwise k would be a non-real eigenvalue of H D . The zeros in iR+ correspond to the negative eigenvalues of H D . They constitute a sequence accumulating at zero. We have the properties, cf. (2.3b), D r, r = R D r , r . RkD r, r = R− k ¯k
(2.11)
In the regime where |k| is very small and stays away from the imaginary axis, more precisely in (1) Γθ, for any θ ∈ [0, π/2[ and > 0, we can derive a lower bound of |Hν (k)| as follows: From (2.1a) and (2.1b) we obtain that Jν (z) =
(z/2)ν 1 + O z2 . Γ (ν + 1)
(2.12)
Whence (recall that ν = −iσ where σ > 0) we obtain with Cν := |Γ (ν + 1) sin(νπ)| (1) −σ arg k H (k) e − e−σ π eσ arg k − O |k|2 Cν ν e−σ θ 1 − e−σ (π−2θ) Cν − O |k|2 for all k ∈ Γθ, .
(2.13)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
In particular for > 0 small enough (depending on θ ) ∀k ∈ Γθ, : Hν(1) (k) e−σ π/2 1 − e−σ (π−2θ) Cν .
1773
(2.14)
Note that the bound (2.14) implies that there is a limiting absorption principle at all real E = k 2 with k ∈ Γθ, . In particular H D does not have small positive eigenvalues. 2.2. Asymptotics of model resolvent Let us note the following global bound (cf. (2.1d)) + φ (r) C
k
r
kr
1/2
e−(Im k)r
for all k ∈ Γθ, and r 1.
(2.15)
Let Dν = 2−ν /Γ (ν + 1).
(2.16)
Notice that D¯ ν = D−ν . By (2.1c) and (2.12) we obtain the following asymptotics of φk+ as k → 0 in Γθ, : φk+ (r) = r 1/2
D¯ ν r −ν k −ν − e−σ π Dν r ν k ν + O((kr)2 ) . D¯ ν k −ν − e−σ π Dν k ν + O(k 2 )
(2.17)
Introducing ζ (k) =
2iσ e−σ π Dν k 2ν , D¯ ν − Dν e−σ π k 2ν
(2.18)
we can slightly modify (2.17) (in terms of (2.6) and by using (2.15)) as φk+ (r) = r 1/2−ν
+ ζ (k)φ0 (r) + r
1/2
2
O (kr)
r +
kr
1/2
e−(Im k)r O k 2 .
(2.19)
There is a “global” bound of the third term (due to (2.15)): 2 1/2 r O (kr)2 Cr 1/2 |kr|
kr2
for all k ∈ Γθ, and r 1.
(2.20)
As for φk 2 we first note the following global bound (cf. (2.1a), (2.7) and [9, Theorem 4.6.1]) φ 2 (r) C k
r
kr
1/2 e(Im k)r
for all k ∈ Γθ, and r 1.
(2.21)
Using (2.21) we obtain similarly φk 2 (r) = φ0 (r) + r 1/2 O (kr)2 +
r
kr
1/2
e(Im k)r O k 2 .
(2.22)
1774
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
There is a global bound of the second term: 2 1/2 r O (kr)2 Cr 1/2 |kr| e(Im k)r
kr2
for all k ∈ Γθ, and r 1.
(2.23)
Whence in combination with (2.10) we obtain uniformly in k ∈ Γθ, and r, r 1 1/2 Ek r, r ; RkD r, r = R0D r, r + ζ (k)T r, r + r 1/2 r 1/2−ν R0D r, r = φ0 (r< )r> , T r, r = φ0 (r)φ0 r , 2 Ek r, r C |k|r> .
kr>
(2.24a) (2.24b) (2.24c) (2.24d)
Clearly T = |φ0 φ0 | is a rank-one operator and the function ζ has a non-trivial oscillatory behaviour. The error estimate can be replaced by: (2.25) ∃C > 0 ∀δ ∈ [0, 2]: Ek r, r C|kr> |δ for all k ∈ Γθ, and r, r 1. In particular introducing weighted spaces HsD = r−s HD , we obtain ∀s > 1:
lim
D R − R D − ζ (k)T
Γθ, k→0
k
0
D ) B(HsD ,H−s
= 0.
(2.26)
In fact we deduce from (2.24a)–(2.24d) the following more precise result: Lemma 2.1. For all s > s > 1, s 3, there exists C > 0: D s −1 H − i R D − R D − ζ (k)T k 0 B(HD ,HD ) C|k| s
−s
for all k ∈ Γθ, .
(2.27)
3. Asymptotics for full Hamiltonian, compactly supported perturbation Consider with V∞ (r) :=
ν 2 −1/4 χ(r r2
H =−
> 1)
d2 + V∞ + V dr 2
on H := L2 ]0, ∞[
(3.1)
with Dirichlet boundary condition at r = 0. As for the potential V we impose in this section Condition 3.1. 1) V ∈ C(]0, ∞[, R), 2) ∃R > 3: V (r) = 0 for r R, 3) ∃C1 , C2 > 0 ∃κ > 0: C1 (r −2 + 1) V (r) (κ 2 − 1/4)r −2 − C2 .
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1775
Notice that the operator H is defined in terms of the (closed) Dirichlet form on the Sobolev space H01 (R+ ) (i.e. H is the Friedrichs extension), cf. [3, Lemma 5.3.1]. For the limiting cases C1 = ∞ and/or κ = 0 in 3) it is still possible to define H as the Friedrichs extension of the action on Cc∞ (R+ ) however the form domain of the extension might be different from H01 (R+ ) and some arguments of this paper would be more complicated. An example of this type (with κ = 0) is discussed in Appendix B. If V (r) 3/4r −2 − C the operator H is essentially self-adjoint on Cc∞ (R+ ), cf. [10, Theorem X.10]. In terms of the resolvent RkD considered in Section 2 and cutoffs χ1 = χ1 (r < 7) and χ2 = χ2 (r > 7) we introduce for k ∈ Γθ, Re k −1 i Gk = χ1 H − χ1 + χ2 RkD χ2 . |Re k|
(3.2)
Let −1 D G± 0 = χ1 (H ∓ i) χ1 + χ2 R0 χ2
(3.3)
K ± = H G± 0 − I.
(3.4)
and
Notice that the operators K ± are compact on Hs := r−s H for s > 1. Due to Lemma 2.1 we have the following expansions in B(Hs ) (with s > s > 1 and s 3) ± : ∀k ∈ Γθ,
H − k 2 Gk = I + K ± + ζ (k)|ψ0 χ2 φ0 | + O |k|s −1 ;
ψ0 := H χ2 φ0 .
(3.5)
± Lemma 3.2. For all k ∈ Γθ, the following form inequality holds (on Hs for any s > 1)
± Im Gk χ1 (H ± i)−1 (H ∓ i)−1 χ1 . Proof. This is obvious from the fact that ± Im RkD 0.
(3.6)
2
Proposition 3.3. For all s > 1 the operators I + K ± ∈ B(Hs ) have zero null space, i.e. Ker I + K ± = {0}.
(3.7)
Proof. We prove only (3.7) for the superscript “+ case”. The “− case” is similar. Suppose 0 = + H G+ 0 f for some f ∈ Hs . We shall show that f = 0. Let u0 = G0 f . Integrating by parts yields 0 = Im u0 , −H u0 = lim Im u¯ 0 u0 (r) r→∞
2 = lim Im (1/2 − ν)|u0 |2 (r)/r = σ χ2 φ0 , f . r→∞
(3.8)
So
χ2 φ0 , f = 0,
(3.9)
1776
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
and therefore (seen again by using the explicit kernel of R0D and by estimating by the Cauchy– Schwarz inequality) u0 = O r 3/2−s
and u0 = O r 1/2−s for r → ∞.
(3.10)
From (3.10) we can conclude that u0 = 0;
(3.11)
this can be seen by writing u0 as a linear combination of r 1/2+ν and r 1/2−ν at infinity, deduce that u0 vanishes at infinity and then invoke unique continuation. For a more general result (with detailed proof) see Lemma 4.2. Using Lemmas 2.1 and 3.2, (3.9) and (3.11) we compute 2 Im f, Gk f (H − i)−1 χ1 f .
(3.12)
χ1 f = 0.
(3.13)
R0D χ2 f = 0 on supp(χ2 ).
(3.14)
0 = Im f, u0 =
lim
+ Γθ,
k→0
We conclude that
D So 0 = G+ 0 f = χ2 R0 χ2 f , and therefore
We apply H D to (3.14) and conclude that χ2 f = 0, so indeed f = 0.
(3.15)
2
3.1. Construction of resolvent Due to Proposition 3.3 we can write, cf. (3.5), −1 H − k 2 Gk I + K ± = I + ζ (k)|ψ0 φ ± + O |k|s −1 ,
(3.16)
± for k ∈ Γθ, , where
φ ± :=
−1 ∗ I + K± χ2 φ0 .
(3.17)
We have −1 ζ (k) = I − ± |ψ0 φ ± ; I + ζ (k)|ψ0 φ ± η (k)
η± (k) := 1 + ζ (k) φ ± , ψ0 .
(3.18)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1777
Of course this is under the condition that η± (k) = 0.
(3.19)
± Lemma 3.4. For all k ∈ Γθ, the condition (3.19) is fulfilled.
Proof. Let us prove (3.19) for the superscript “+ case”. The “− case” is similar. + Suppose on the contrary that η+ (k) = 0 for some k ∈ Γθ, . Then k 2ν =
eσ π D¯ ν . Dν 1 − 2iσ φ + , ψ0
(3.20)
+ k 2ν is oscillatory, the set of all solutions of (3.20) in Γθ, constitutes a sequence converging to + zero. In particular we can pick a sequence Γθ, kn → 0 with 0 = η+ (kn ) → 0. We apply (3.16) and (3.18) to this sequence {kn }. Substituting (3.18) into (3.16) and multiplying the equation obtained by η(kn ), we get
−1 + H − kn2 Gkn I + K + η (kn ) − ζ (kn )|ψ0 φ + = η+ (kn ) 1 + +O |kn |s −1 . Taking the limit n → ∞, this leads to + −1 −ζ (∞)H G+ |ψ0 φ + = 0. ∞ I +K
(3.21)
Here ζ (∞) := limn→∞ ζ (kn ) can be computed by substituting k 2ν given by (3.20) in the expression for ζ (k) (this is the limit and one sees that it is nonzero), and similarly for G+ ∞ := limn→∞ Gkn . We learn that H u+ = 0;
+ + + −1 u+ := G+ ψ0 . ∞ f , f := I + K
(3.22)
Now, the argument of integration by parts used in (3.8) applied to u+ leads to 2 ζ (∞) 2 ζ (∞) 2 χ2 φ0 , f + . − 0 = σ 1 − 2ν 2ν
(3.23)
We claim that
χ2 φ0 , f + = 0.
(3.24)
2 2 1 − ζ (∞) ζ (∞) = eσ π k −2ν 2 = e2σ (π−2 arg k) > 1, 2ν 2ν
(3.25)
+ In fact for any k ∈ Γθ, obeying (3.20),
whence indeed (3.24) follows from (3.23). Using (3.24) we can mimic the rest of the proof of Proposition 3.3 and eventually conclude that f + = 0. This is a contradiction since ψ0 = 0. 2
1778
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
Combining (3.16)–(3.19) we obtain (possibly by taking > 0 smaller) ± : ∀k ∈ Γθ,
−1 ζ (k) I − ± |ψ0 φ ± I + O |k|s −1 = I. H − k 2 Gk I + K ± η (k)
(3.26)
In particular we have derived a formula for the resolvent. 3.2. Asymptotics of resolvent Let u be any nonzero regular solution to the equation −u (r) + V∞ (r) + V (r) u(r) = 0.
(3.27)
By regular solution, we mean that the function r → χ(r < 1)u(r) belongs to D(H ). It will be shown in Appendix A that the regular solution u is fixed up to a constant and can be chosen real-valued. See (3.33c) for a formula and for further elaboration. Let −1 R(k) := H − k 2
± for all k ∈ Γθ, ∩ {Im k > 0}.
(3.28)
± for which Theorem 3.5. There exist (finite) rational functions f ± in the variable k 2ν for k ∈ Γθ,
lim
± Γθ,
k→0
Im f ± k 2ν do not exist,
(3.29)
there exist Green’s functions for H at zero energy, denoted by R0± , and there exists a real nonzero regular solution to (3.27), denoted by u, such that the following asymptotics hold. For all s > s > 1, s 3, there exists C > 0: ± ∀k ∈ Γθ, ∩ {Im k > 0}: s −1 (H − i) R(k) − R ± − f ± k 2ν |u u| . 0 B(Hs ,H−s ) C|k|
(3.30)
Here ∀s > 1:
(H − i)R0± = I − iR0± ∈ B(Hs , H−s )
and (H − i)u = −iu ∈ H−s .
(3.31)
Proof. By (3.26) −1 ζ (k) I − ± |ψ0 φ ± I + O |k|s −1 R(k) = Gk I + K ± η (k)
± for k ∈ Γθ, . We expand the product yielding up to errors of order O(|k|s −1 )
(3.32)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
ζ (k) ± ± u u ; η± (k) 1 2 ± −1 R0± = G± , 0 I +K
R(k) ≈ R0± +
where
1779
(3.33a) (3.33b)
± u± 1 = −R0 ψ0 + χ2 φ0 , ± ± −1 ∗ u± χ2 φ0 . 2 =φ = I +K
(3.33c) (3.33d)
± ± Clearly, u± 2 = 0. According to (3.5), H u1 = −ψ0 + H (χ2 φ0 ) = 0. In addition, u1 = 0. In fact for r > 14 (ensuring that χ2 (r) = 1) one has D ± u± 1 = −R0 f + φ0 ,
−1 with f ± = χ2 1 + K ± ψ0 ∈ Hs , s > 1.
Using then (2.24b) and (2.6) we compute
r
−1/2−ν
∞ 1 d ± r − (1/2 − ν) u1 (r) = 1 − τ 2 −ν f ± (τ ) dτ, dr r
showing that u± 1 (r) = 0 for all r large enough. By the uniqueness of regular solutions, there ± exist constants b± = 0 such that u± 1 = b u, where u is a real-valued nonzero regular solution to (3.27). Combining the duality relation R(k)∗ = R(k) and (3.33a), we obtain that ± ∓ ± ∓ u± 2 = c u1 = c b u
for some constants c± = 0.
(3.34)
ζ (k) and f ± k 2ν = C ± ± , η (k)
(3.35)
Whence indeed (3.30) holds with ± −1 R0± = G± 0 I +K
where the constants C ± = c± b∓ b± are nonzero. Whence indeed (3.29) holds. The properties (3.31) follow from the expressions (3.33b) and (3.33c). 2 Corollary 3.6. There is a limiting absorption principle at energies in ]0, 2 ]: ∀k ∈ [−, ] \ {0} ∀s > 1:
R k :=
lim
Γθ, ∩{Im k>0} k→k
R(k) exists in B(Hs , H−s ).
(3.36)
In particular ]0, 2 ] ∩ σpp (H ) = ∅. ± Moreover the bounds (3.30) extend to Γθ, . Introducing the spectral density as an operator in B(Hs , H−s ), s > 1,
R(k) − R(−k) δ H − k 2 := 2πi
for 0 < k ,
(3.37)
1780
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
we have lim δ H − k 2 does not exist.
k0
(3.38)
Proof. Only (3.38) needs a comment: We represent R(−k) = R(k)∗ and use (3.30) yielding ∗ Im f + (k 2ν ) δ H − k 2 ≈ (2πi)−1 R0+ − R0+ + |u u|. π The right-hand side does not converge, cf. (3.29).
2
3.3. d-dimensional Schrödinger operator As another application of Theorem 3.5, we consider a d-dimensional Schrödinger operator with spherically symmetric potential of the form H = − + W |x| γ in L2 (Rd ), d 2, where W is continuous and W (|x|) = − |x| 2 for x outside some compact set
and γ > ( d2 − 1)2 . Assume that
2 d γ = l + − 1 , 2
l ∈ N.
(3.39)
Denote Nγ = {l ∈ N ∪ {0} | (l + d2 − 1)2 < γ }. Let πl denote the spectral projection associated to the eigenvalue l(l + d − 2), l ∈ N ∪ {0}, of the Laplace–Beltrami operator on Sd−1 (and also its natural extension as operator on H = L2 (Rd )). Then H can be decomposed into a direct sum H=
∞
l πl , H
l=0
where 2 l = − d − d − 1 d + l(l + d − 2) + W (r) H r dr dr 2 r2
:= L2 (R+ ; r d−1 dr). When l ∈ Nγ , we can apply Theorem 3.5 with ν = νl , ν 2 = (l + on H l d 2 − γ < 0, to expand the resolvent (H l − k 2 )−1 up to O(|k| ) (see Section 6 for a relevant − 1) 2 l − k 2 )−1 may have singularities at zero, l used here). For l ∈ / Nγ , the resolvent (H reduction of H l (defined below). according to whether zero is an eigenvalue and/or a resonance of H −s −s Denote Hs = r H and Hs = x H, s ∈ R. Under the condition (3.39), we say that 0 is a resonance of H if there exists u ∈ H−1 \ H such that H u = 0. We call such function u a resonance function. (If the condition (3.39) is not satisfied, the definition of zero resonance has to be modified.) The number 0 is called a regular point of H if it is neither an eigenvalue nor Clearly Lemma 4.2 stated below l on H. a resonance of H . The same definitions apply for H
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1781
shows that for any resonance function u necessarily πl u = 0 for all l ∈ Nγ . In fact Lemma 4.2 l , l ∈ Nγ . shows that 0 is a regular point of H If H u = 0 and u ∈ H−1 , then by expanding u in spherical harmonics, one can show that (cf. Theorem 4.1 of [13]) u(rθ ) =
ψ(θ ) r
d−2 2 +μ
+ v,
(3.40a)
where v ∈ L2 (|x| > 1),
2 d m + − 1 − γ , m = min N \ Nγ , μ= 2 nμ 1 γ − d−2 +μ (j ) (j ) 2 W + 2 u, |y| ψ(θ ) = − ϕμ ϕμ (θ ). 2μ |y|
(3.40b)
(3.40c)
j =1
(j )
Here {ϕμ , 1 j nμ } is an orthonormal basis of the eigenspace of −Sd−1 with eigenvalue m(m + d − 2) and nμ its multiplicity (cf. [12]): nμ =
(m + d − 3)! (m + d − 2)! + . (d − 2)!(m − 1)! (d − 2)!m!
(3.40d)
The expansion (3.40a) implies that a solution u to H u = 0 with u ∈ H−1 is a resonance function of H if and only if μ ∈ ]0, 1] and ψ = 0 and that if zero is a resonance, its multiplicity (cf. [6,13] for the definition) is at most nμ . Conversely, if the equation H u = 0 has a solution u ∈ H−1 \ H, then the equation m g = 0 H −1 decaying like 1/(r 2 +μ ) at infinity. It follows that has a nonzero regular solution g ∈ H (j ) uj = g ⊗ ϕμ , 1 j nμ , are all resonance functions of H . This proves that if 0 is a resonance of H its multiplicity is equal to nμ . Now let us come back to the asymptotics of the resolvent R(k) = (H − k 2 )−1 near 0. If 0 is a regular point of H (this is a generic condition and concerns by the discussion above only sectors l with l ∈ l with l ∈ / Nγ ), then it is a regular point for all H / Nγ . One deduces easily that there H (l) s , H −s ) for all s > 1, such that for any such s there exists > 0: exists R0 ∈ B(H d−2
l − k 2 −1 = R (l) + Ol |k| H 0
s , H −s ) for |k| small and k 2 ∈ in B(H / [0, ∞[.
(3.41)
The error term can be uniformly estimated in l as in [13], yielding an expansion for R(k). If 0 is l with l ∈ a resonance but not an eigenvalue of H , then 0 is a regular point for all H / Nγ ∪ {m} and m − k 2 )−1 contains a singularity the expansion (3.41) remains valid for such l. When l = m, (H at 0 which can be calculated as in [14]. Let kμ =
k 2μ ,
if μ ∈ ]0, 1[,
k 2 ln(k 2 ),
if μ = 1.
(3.42)
1782
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
−1 \ H verifying H m g = 0, a rank-one operator-valued entire function Then there exist g ∈ H (m) s , H −s ), s > 3, such ζ → Fm (ζ ) ∈ B(Hs , H−s ), s > 1, verifying Fm (0) = 0 and R0 ∈ B(H that for any s > 3 2 2 k eiμ π 1 |k| (m) 2 −1 s , H −s ), + R0 + O in B(H Hm − k = |g g| + Fm kμ kμ kμ |kμ |
(3.43)
where μ is the fractional part of μ: μ = μ if μ ∈ ]0, 1[ and μ = 0 if μ = 1. Note that the sign “−” is missing in the constant c1 corresponding to μ = 1 given in (4.19) of [14]. In particular if μ ∈ ]0, 12 ] one has iμπ m − k 2 −1 = e |g g| + R (m) + O |k| H 0 kμ
s , H −s ), s > 3, in B(H
while in the “worse case”, μ = 1, the error term in (3.43) is of order O(|ln k|−1 ). Summing up we have proved the following γ Theorem 3.7. Assume that W (|x|) is continuous and W (|x|) = − |x| 2 outside some compact set
with γ > ( d2 − 1)2 satisfying (3.39).
i) Suppose that zero is a regular point of H . Then there exist R0± ∈ B(Hs , H−s ) and vl ∈ −s \ {0} for all s > 1 and l ∈ Nγ , such that for any s > 1 there exists > 0: H fl± k 2νl |vl vl | ⊗ πl R(k) = l∈Nγ
+ R0± + O |k| in B(Hs , H−s ) for k ∈ Γθ± .
(3.44)
Here fl± (k 2νl ) are the oscillatory functions given in Theorem 3.5 with ν = νl = −i γ − (l + d2 − 1)2 , l ∈ Nγ . ii) Suppose that zero is a resonance of H . Let m and μ be defined by (3.40b). Then μ ∈ ]0, 1] and the multiplicity of the zero resonance of H is equal to (m + d − 3)! (m + d − 2)! + . (d − 2)!(m − 1)! (d − 2)!m! −1 \ H with Suppose in addition that zero is not an eigenvalue of H . Then there exist g ∈ H Hm g = 0, a rank-one operator-valued analytic function ζ → Fm (ζ ) ∈ B(Hs , H−s ), s > 1, defined for ζ near 0 verifying Fm (0) = 0, and R1± ∈ B(Hs , H−s ), s > 3, such that for any s>3 2 iμ π k 1 e ⊗ πm + |g g| + Fm fl± k 2νl |vl vl | ⊗ πl R(k) = kμ kμ kμ + R1± + O |ln k|−1 Here fl± and vl are the same as in i).
l∈Nγ
in B(Hs , H−s ) for k ∈ Γθ± .
(3.45)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1783
The case that 0 is an eigenvalue of H can be studied in a similar way. The zero eigenfunctions of H may have several angular momenta l > m and the asymptotics of R(k) up to o(1) as k → 0 contains many terms and we do not give details here. Note that if (3.39) is not satisfied and l − k 2 )−1 may contain a term of the order ln k as γ = (l + d2 − 1)2 for some l ∈ N ∪ {0}, (H k → 0. 4. Asymptotics for full Hamiltonian, more general perturbation We shall “solve” the equation −u (r) + V∞ (r) + V (r) u(r) = 0
(4.1)
on the interval I = ]0, ∞[ for a class of potentials V with faster decay than V∞ at infinity (re2 call V∞ (r) = ν −1/4 χ(r > 1)). In particular we shall show absence of zero eigenvalue for a r2 more general class of perturbations than prescribed by Condition 3.1. Explicitly we keep Conditions 3.1 1) and 3) but modify Condition 3.1 2) as 2) V (r) = O(r −2− ), > 0. This means that we now impose Condition 4.1. 1) V ∈ C(]0, ∞[, R), 2) V (r) = O(r −2− ), > 0, 3) ∃C1 , C2 > 0 ∃κ > 0: C1 (r −2 + 1) V (r) (κ 2 − 1/4)r −2 − C2 . Lemma 4.2. Under Condition 4.1 suppose u is a distributional solution to (4.1) obeying one of the following two conditions: 1) u ∈ L2−1 (at infinity). √ √ 2) u(r)/ r → 0 and u (r) r → 0 for r → ∞. Then u = 0.
(4.2)
Proof. Let φ ± (r) = r 1/2±ν . Then φ ± are linear independent solutions to the equation −u (r) + V∞ (r)u(r) = 0;
r > 2.
(4.3)
First we shall show that u = O r 1/2− and u = O r −1/2− .
(4.4)
Note that under the condition 1) in fact u ∈ L2 (at infinity) due to a standard ellipticity argument.
1784
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
We shall apply the method of variation of parameters. Specifically, introduce “coefficients” a2+ and a2− of the ansatz u = a+φ+ + a−φ−.
(4.5)
Using the differential equations for a + and a − we shall derive estimates of these quantities. The equations read
φ+ d + dτ φ
φ− d − dτ φ
d dτ
a+ a−
=V
0 φ+
0 φ−
a+ a−
.
(4.6)
Note that the Wronskian W (φ − , φ + ) = φ − drd φ + − φ + drd φ − = 2ν. (4.6) can be transformed into d dr
a+
a−
=N
a+
a−
,
where V N= 2ν
φ−φ+ −(φ + )2
(φ − )2 −φ − φ +
.
Clearly for V obeying Condition 4.1 the quantity N = O(r −1− ) and whence it can be integrated to infinity. Whence there exist a ± (∞) = lim a ± (r); r→∞
in fact a ± (∞) − a ± (r) = O r − .
(4.7)
a ± (∞) = 0.
(4.8)
We need to show that
Note that
φ+
φ−
d + dτ φ
d − dτ φ
a+ a−
=
u u
.
(4.9)
We solve for (a + , a − ) and multiply the result by r −1/2 . Under the condition 1) each component of the right-hand side of the resulting equation is in L2 . Whence also a ± (∞)/r 1/2 ∈ L2 and (4.8) and therefore (4.4) follow. We argue similarly under the condition 2). To show (4.2) note that the considerations preceding (4.8) hold for all solutions distributional u (not only a solution u obeying 1) or 2)) yielding without 1) nor 2) the bounds (4.4) with = 0. In particular for a solution u˜ with W (u, u) ˜ = 1 (assuming conversely that u = 0) we have
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
r
1785
−1 W (u, u)(x)x ˜ dx = ln r.
1
The right-hand side diverges while the left-hand side converges due to (4.4), and (4.2) follows. 2 2
Using Lemma 4.2 we can mimic Section 3 and obtain similar results for H = − drd 2 + V∞ + V with V satisfying (the more general) Condition 4.1. In particular Theorem 3.5 and Corollary 3.6 hold under Condition 4.1 provided that we in Theorem 3.5 impose the additional condition s 1 + /2.
(4.10)
This is here needed to guarantee that the operators K ± of (3.4) are compact on Hs . Also Theorem 3.7 has a similar extension. We leave out further elaboration. 5. Regular positive energy solutions and asymptotics of phase shift Under Condition 3.1, or in fact more generally under Condition 4.1, we can define the notion of regular positive energy solutions as follows: Let k ∈ R+ . A solution u to the equation −u (r) + V∞ (r) + V (r) u(r) = k 2 u(r)
(5.1)
is called regular if the function r → χ(r < 1)u(r) belongs to D(H ). Notice that this definition naturally extends the one applied in Section 3 in the case k = 0. Again we claim that the regular solution u is fixed up to a constant (and hence in particular can be taken real-valued): For the uniqueness we may proceed exactly as in Appendix A (uniqueness at zero energy). For the existence part we use the zero energy Green’s function R0+ and the regular zero energy solution u appearing in Theorem 3.5. Consider the equation uk 2 = u + k 2 R0+ χ(· < 1)uk 2 .
(5.2)
Notice that a solution to (5.2) indeed is a solution to (5.1) for r < 1 and hence it can be extended to a global solution u˜ k 2 . Clearly χ(· < 1)u˜ k 2 ∈ D(H ) so u˜ k 2 is a regular solution. It remains to solve (5.2) for some nonzero uk 2 . For that we let K = R0+ χ(· < 1) and note that K is compact on H−s for any s > 1. Whence we have −1 u, uk 2 = I − k 2 K
(5.3)
Ker I − k 2 K = {0}.
(5.4)
provided that
We are left with showing (5.4). So suppose u0 = k 2 Ku0 for some u0 ∈ s>1 H−s , then we need to show that u0 = 0. Notice that (H − k 2 χ(· < 1))u0 = 0 and that here the second term can be absorbed into the potential V . The computation (3.8) shows that also in the present context
1786
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
0 = lim Im u¯ 0 u0 (r) = lim Im (1/2 − ν)|u0 |2 (r)/r . r→∞
r→∞
(5.5)
From (5.5) we deduce the condition of Lemma 4.2 1) with u → u0 and whence from the conclusion of Lemma 4.2 that indeed u0 = 0. Now let uk 2 denote any nonzero real regular solution. By using the variation of parameters formula, more specifically by replacing the functions φ ± in the proof of Lemma 4.2 by cos(k·) and sin(k·) and repeating the proof (see Step I of the proof of Theorem 5.3 stated below for the details), we find the asymptotics lim uk 2 (r) − C sin kr + σ sr = 0.
r→∞
(5.6)
Here C = C(k) = 0. Assuming (without loss of generality) that C > 0 the (real) constant σ sr = σ sr (k) is determined modulo 2π . Definition 5.1. The quantity σ sr = σ sr (k) introduced above is called the phase shift at energy k 2 . Definition 5.2. The notation σ per = σ per (t) signifies the continuous real-valued 2π -periodic function determined by
σ per (0) = 0, per eπσ e−it − eit = r(t)ei(σ (t)−t) ;
t ∈ R, r(t) > 0.
(5.7)
Theorem 5.3. Suppose Condition 4.1. The phase shift σ sr (k) can be chosen continuous in k ∈ R+ . Any such choice obeys the following asymptotics as k ↓ 0: There exist C1 , C2 ∈ R such that σ sr (k) + σ ln k − σ per (σ ln k + C1 ) → C2
for k ↓ 0.
(5.8)
Proof. Step I. We shall show the continuity. From (5.2) and (5.3) we see that for any r > 0 the functions ]0, ∞[ k → uk 2 (r) and ]0, ∞[ k → uk 2 (r) are continuous. Similar statements hold upon replacing uk 2 → Re uk 2 and uk 2 → Im uk 2 which are both real-valued regular solutions (solving (5.1) for r < 1). Since uk 2 = 0 one of these functions must be nonzero. Without loss of generality we can assume that uk 2 is a real-valued nonzero regular solution obeying that for r = 1/2 the functions ]0, ∞[ k → uk 2 (r) and ]0, ∞[ k → uk 2 (r) are continuous. By a standard regularity result for linear ODE’s with continuous coefficients these results then hold for any r > 0 too. Moreover (to used in Step II) we have (again for r > 0 fixed) uk 2 (r) − u(r) = O k 2 uk 2 (r) − u (r) = O k 2
for k ↓ 0,
(5.9a)
for k ↓ 0.
(5.9b)
We introduce φ + (r) = cos kr Mimicking the proof of Lemma 4.2 we write
and φ − (r) = sin kr.
(5.10)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
uk 2 = a + φ + + a − φ − .
1787
(5.11)
Noting that the Wronskian W (φ − , φ + ) = −k we have d dr
a+
=N
a−
a+
(5.12)
,
a−
where N = −k −1 (V∞ + V )
φ−φ+ −(φ + )2
(φ − )2 −φ − φ +
.
(5.13)
Since N = O(r −2 ) there exist a ± (∞) = lim a ± (r).
(5.14)
r→∞
By the same argument as before either a + (∞) = 0 or a − (∞) = 0. We write + a (∞), a − (∞) a + (∞)2 + a − (∞)2 = sin σ sr , cos σ sr
(5.15)
and conclude the asymptotics (5.6) with some C = 0. It remains to see that a ± (∞) are continuous in k (then by (5.15) σ sr can be chosen continuous too). For that we use the “connection formula”
uk 2 uk 2
=
φ+
φ−
φ−
φ+
a+
a−
which is “solved” by
a+ a−
= −k −1
φ− −φ +
−φ − φ+
uk 2 uk 2
.
(5.16)
We use (5.16) at r = 1/2. By the comments at the beginning of the proof the right-hand side is continuous in k and therefore so is the left-hand side. Solving (5.12) by integrating from r = 1/2 and noting that (5.13) is continuous in k we then conclude that a ± (r) are continuous in k for any r > 1/2. Since the limits (5.14) are taken locally uniformly in k > 0 we consequently deduce that indeed a ± (∞) are continuous in k. Step II. We shall show (5.8) under Condition 3.1. We shall mimic Step I with (5.10) replaced by φ + (r) = r 1/2 Hν(1) (kr)
and φ − (r) = r 1/2 H−ν (kr). (1)
(5.17)
For completeness of presentation note that in terms of another Hankel function, cf. [11, (3.6.31)], (2) φ − (r) = r 1/2 Hν (kr). We compute the Wronskian W (φ − , φ + ) = 4i/π , cf. (2.1c) and [11, (3.6.27)]. Since V (r) = 0 for r R a ± (r) = a ± (∞)
for r R.
(5.18)
1788
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
Moreover (5.16) reads
a+ a−
π = 4i
φ− −φ +
−φ − φ+
uk 2 uk 2
(5.19)
.
We will use (5.19) at r = R. Clearly the right-hand side is continuous in k > 0 and therefore so is the left-hand side. From the asymptotics
2 1/2 ikr e → 0 for r → ∞, πk 1/2 2 φ − (r) − C−ν e−ikr → 0 for r → ∞; πk φ + (r) − Cν
(5.20)
Cν := e−iπ(2ν+1)/4 ,
(5.21)
we may readily rederive the continuity statement shown more generally in Step I. The point is that now we can “control” the limit k → 0. To see this we need to compute the asymptotics of the matrix in (5.19) as k → 0 (with r = R). Using (2.1c) we compute ν 1 −ν 1 2 R2 2−ν R 2 +ν ν 1 (5.22a) k −ν − e−σ π k + O k2 , i sin(νπ) Γ (1 − ν) Γ (1 + ν) ν 1 −ν −ν 21 +ν 2 2 R2 1 − −ν σπ 2 R ν φ (R) = k −e k +O k , (5.22b) −i sin(νπ) Γ (1 − ν) Γ (1 + ν) 1 1 −1 2ν R − 2 −ν −ν 2−ν R − 2 +ν ν 1 2 −ν k − e−σ π 2−1 + ν k + O k2 , φ + (R) = i sin(νπ) Γ (1 − ν) Γ (1 + ν) φ + (R) =
φ − (R) =
1 −i sin(νπ)
2−1 − ν
1 2ν R − 2 −ν
Γ (1 − ν)
k −ν − eσ π 2−1 + ν
1 2−ν R − 2 +ν
Γ (1 + ν)
(5.22c) kν + O k2 . (5.22d)
We combine (5.9a) and (5.9b) for r = R with (5.18)–(5.22d) and obtain 1/2
π Cν σ π ν e Dk − Dk −ν + O k 2 eikr + h.c. + o r 0 ; 4i i sin(νπ) 1 2ν R 2 −ν 2−1 − ν u(R) − u (R) . D := (5.23) Γ (1 − ν) R
uk 2 (r) =
2 πk
Here the term O(k 2 ) depends on R but not on r and the term o(r 0 ) depends on k. The second term, denoted by h.c., is given as the hermitian (or complex) conjugate of the first term. Note that D = 0. We write D = |D|eiθ0 yielding per eσ π Dk ν − Dk −ν = eσ π Dk ν − Dk −ν ei(σ (σ ln k+θ0 )−(σ ln k+θ0 )) .
(5.24)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1789
Next we substitute (5.24) into (5.23), use that Cν = |Cν |e−iπ/4 and conclude (5.8) with C1 = θ 0
and C2 = π/4 − θ0 + 2πp
for some p ∈ Z.
(5.25)
Step III. We shall show (5.8) under Condition 4.1. This is done by modifying Step II using the proof of Step I too. Explicitly using again the functions φ ± of (5.17) “the coefficients” a ± need to be constructed. Since V is not assumed to be compactly supported these coefficients will now depend on r. We first construct them at any large R, this is by the formula (5.19) (at r = R). Then the modification of (5.12) + a d a+ = N , (5.26) dr a − a− with N=
π V 4i
φ−φ+ −(φ + )2
(φ − )2 −φ − φ +
(5.27)
,
is invoked. We integrate to infinity using that N = O(r −1− ) uniformly in k > 0. This leads to a ± (r) = a ± (∞) + O r − , a ± (R) = a ± (∞) + O R − ,
(5.28a) (5.28b)
with the error estimates being uniform in k > 0. In particular for r R a ± (r) = a ± (R) + O R − + O r −
(5.29)
uniformly in k > 0. From (5.29) we obtain the following modification of (5.23) 1/2
2 − ikr π Cν σ π ν −ν uk 2 (r) = e Dk − Dk +O k +O R e 4i i sin(νπ) + h.c. + o r 0 ; 1 2ν R 2 −ν 2−1 − ν u(R) − u (R) . D = D(R) := Γ (1 − ν) R
2 πk
The term O(k 2 ) depends on R, and the term O(R − ) depends on k but it is estimated uniformly in k > 0. By Lemma 4.2 there exist δ > 0 and a sequence Rn → ∞ such that D(Rn ) δ
for all n.
(5.30)
Using these values of D in (5.24) we can write per eσ π Dk ν − Dk −ν = eσ π Dk ν − Dk −ν ei(σ (σ ln k+θ)−(σ ln k+θ)) ; D = D(Rn ),
θ = θn ∈ [0, 2π[.
(5.31)
1790
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
We can assume that for some θ0 ∈ [0, 2π] θn → θ0
for n → ∞.
Using this number θ0 we obtain again (5.8) with C1 and C2 given as in (5.25).
(5.32) 2
6. Asymptotics of physical phase shift for a potential like −γ χ(r > 1)r −2 We shall reduce a d-dimensional Schrödinger equation to angular momentum sectors and discuss the asymptotics of the “physical” phase shift for small angular momenta in the low energy regime. We consider for d 2 the stationary d-dimensional Schrödinger equation H v = (− + W )v = λv;
λ > 0,
for a radial potential W = W (|x|) obeying Condition 6.1. 1) 2) 3) 4)
W (r) = W1 (r) + W2 (r); W1 (r) = − rγ2 χ(r > 1) for some γ > 0, W2 ∈ C(]0, ∞[, R), ∃1 , C1 > 0: |W2 (r)| C1 r −2−1 for r > 1, ∃2 , C2 > 0: |W2 (r)| C2 r 2 −2 for r 1.
Under Condition 6.1 H = − + W is self-adjoint as defined in terms of the Dirichlet form on H 1 (Rd ), cf. [4]. Let Hl , l = 0, 1, . . . , be the corresponding reduced Hamiltonian corresponding to an eigenvalue l(l + d − 2) of the Laplace–Beltrami operator on Sd−1 Hl u = −u + (V∞ + V )u.
(6.1)
Here V∞ (r) =
ν 2 − 1/4 χ(r > 1); r2
V (r) = W2 (r) +
(l +
d 2
2 d ν2 = l + − 1 − γ , 2
− 1)2 − 1/4 1 − χ(r > 1) , 2 r
(6.2a) (6.2b)
and the stationary equation reads −u + (V∞ + V )u = λu.
(6.3)
Notice that for
d γ > l+ −1 2 and
2 ,
(6.4)
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
(d, l) = (2, 0),
1791
(6.5)
indeed Condition 4.1 is fulfilled and Hl coincides with the Hamiltonian given by the construction of Section 4. The case (d, l) = (2, 0) needs a separate consideration which is given in Appendix B. Under the conditions (6.4) and (6.5) let ul be a regular solution to the reduced Schrödinger equation (6.3). Write √ lim ul (r) − C sin( λr + Dl ) = 0.
(6.6)
r→∞
The standard definition of the phase shift (coinciding with the time-depending definition) is phy
σl
(λ) = Dl +
d − 3 + 2l π. 4
(6.7)
It is known from [16,4] that for a potential W (r) behaving at infinity like −γ r −μ with γ > 0 and μ ∈ ]1, 2[ ∃σ0 ∈ R:
phy σl (λ) −
∞ √ λ − λ − W (r) dr → σ0
for λ ↓ 0.
(6.8)
R0
Here R0 is any sufficiently big positive number, and the integral does not have a (finite) limit as λ ↓ 0. In the present case, μ = 2, (6.8) indicates a logarithmic divergence. This is indeed occurring although (6.8) is incorrect for μ = 2. The correct behaviour of the phase shift under the conditions (6.4) and (6.5) follows directly from Section 5: Theorem 6.2. Suppose Condition 6.1 and (6.4) for some l ∈ N ∪ {0}. Let σ=
2 d γ − l+ −1 . 2
(6.9)
phy
The phase shift σl (λ) can be chosen continuous in λ ∈ R+ . Any such choice obeys the following asymptotics as λ ↓ 0: There exist C1 , C2 ∈ R such that phy
σl
√ √ (λ) + σ ln λ − σ per (σ ln λ + C1 ) → C2
for λ ↓ 0.
(6.10)
Note that we have included the case (d, l) = (2, 0) in this result. The necessary modifications of Section 5 for this case are outlined in Appendix B. Appendix A. Regular zero energy solutions We shall elaborate on the notion of regular solutions as used in Sections 3 and 4. Recall from the discussion around (3.27) that we call a solution u to (3.27) for regular if r → χ(r < 1)u(r) belongs to D(H ) where H is defined in terms of a potential V satisfying Condition 3.1 (or Condition 4.1). The existence of a (nonzero) regular solution is shown explicitly by the formula (3.33c).
1792
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
We shall show that the regular solution is unique up to a constant. Notice that as a consequence of this uniqueness result a regular solution is real-valued up to constant. Suppose conversely that all solutions are regular. Due to [10, Theorem X.6(a)] there exists a nonzero solution v to −v (r) + V∞ (r) + V (r) v(r) = iv(r)
(A.1)
which is in L2 at infinity. By the variation of parameter formula now based on the basis of regular solutions to (3.27), cf. the proof of [10, Theorem X.6(b)], we conclude that v ∈ D(H ) and that (H − i)v = 0. This violates that H is self-adjoint. Appendix B. Case (d, l) = (2, 0) For (d, l) = (2, 0) Condition 4.1 fails for the operator Hl of Section 6 (this example would require κ = 0 in Condition 4.1 3)). The form domain is not H01 (R+ ) in this case. The form is given as follows: 1 D(Q) = f ∈ L2 (R+ ) g ∈ L2 (R+ ) where g(r) = f (r) − f (r) , 2r ∞ f (r) − 1 f (r)2 + W (r)f (r)2 dr; f ∈ D(Q). Q(f ) = 2r
(B.1a)
(B.1b)
0
This is a closed semi-bounded quadratic form and the domain D(H ) of the corresponding operator H (cf. [3,10]) is characterised as the subset of f ’s in D(Q) for which h ∈ L2 (R+ )
d2 1 where h(r) := − 2 − 2 + W (r) f (r) as a distribution on R+ , dr 4r
(B.2)
and for f ∈ D(H ) we have d2 1 (Hf )(r) = − 2 − 2 + W (r) f (r). dr 4r
(B.3)
To see the connection to the two-dimensional Hamiltonian of Section 6 defined with form domain H 1 (R2 ) let us note the alternative description of Q:
D(Q) = f ∈ L2 (R+ ) g˜ | · | ∈ H 1 R2 where g(r) ˜ = r −1/2 f (r) , −1/2 2 2 ∇ |x| f |x| + W |x| |x|−1/2 f |x| dx Q(f ) = (2π)−1
(B.4a) for f ∈ D(Q).
R2
(B.4b) Clearly the integral to the right in (B.4b) is the form of the two-dimensional Hamiltonian (applied to radially symmetric functions).
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
1793
We also note that H01 (R+ ) ⊆ D(Q) and that Cc∞ (R+ ) + span(f0 );
f0 (r) := r 1/2 χ(r < 1)
/ H01 (R+ ), the set Cc∞ (R+ ) is actually a core for Q. Whence is a core for Q. In fact, although f0 ∈ H is the Friedrichs extension of the action (B.3) on Cc∞ (R+ ). Due to (B.1b) and the description in (B.2) of the domain D(H ) we can show the uniqueness of regular solutions exactly as in Appendix A. The existence of (nonzero) regular solutions follows from the previous scheme too. Indeed the basic operators K ± of (3.4) are again compact on B(Hs ). To see this we need to see that various terms are compact. Let us here consider the contribution from the first term of (3.3) d (H ∓ i)−1 χ1 + χ1 (±i)(H ∓ i)−1 χ1 =: K1± + K2± . − χ1 + 2χ1 dr (The contribution from the second term of (3.3) is treated in the same way as before.) We decompose using any C > 0 such that H 0 C + 1 K1± = B ± K; 1 d 1 ± (H ∓ i)−1 (H − C)1/2 , B = − χ1 (r) + 2χ1 (r) + 2χ1 (r) − 2r dr 2r K = (H − C)−1/2 χ1 . The operator B ± is bounded and the operator K is compact (the latter may be seen easily by going back to the space L2 (R2 ) and there invoking standard Sobolev embedding); whence K1± is compact. Clearly also K2± is compact. References [1] G. Carron, Le saut en zero de la fonction de decalage spectral, J. Funct. Anal. 212 (2004) 222–260. [2] O. Costin, W. Schlag, W. Staubach, S. Tanveer, Semiclassical analysis of low and zero energy scattering for onedimensional Schrödinger operators with inverse square potentials, J. Funct. Anal. 255 (2008) 2321–2362. [3] E.B. Davies, Spectral Theory and Differential Operators, Cambridge University Press, Cambridge, 1995. [4] J. Derezi´nski, E. Skibsted, Scattering at zero energy for attractive homogeneous potentials, Ann. Henri Poincaré 10 (2009) 549–571. [5] S. Fournais, E. Skibsted, Zero energy asymptotics of the resolvent for a class of slowly decaying potentials, Math. Z. 248 (2004) 593–633. [6] A. Jensen, G. Nenciu, A unified approach to resolvent expansions at thresholds, Rev. Math. Phys. 13 (6) (2001) 717–754. [7] S. Nakamura, Low energy asymptotics for Schrödinger operators with slowly decreasing potentials, Comm. Math. Phys. 161 (1) (1994) 63–76. [8] R.G. Newton, Scattering Theory of Waves and Particles, Springer, New York, 1982. [9] F.W.J. Olver, Asymptotics and Special Functions, Academic Press, New York/London, 1974. [10] M. Reed, B. Simon, Methods of Modern Mathematical Physics I–IV, Academic Press, New York, 1972–1978. [11] M. Taylor, Partial Differential Equations, Basic Theory, Springer, New York, 1996; corrected second printing 1999. [12] M. Taylor, Partial Differential Equations II, Qualitative Studies of Linear Equations, Springer, New York, 1996; corrected second printing 1997.
1794
E. Skibsted, X.P. Wang / Journal of Functional Analysis 260 (2011) 1766–1794
[13] X.P. Wang, Threshold energy resonance in geometric scattering, Mat. Contemp. 26 (2004) 135–164. [14] X.P. Wang, Asymptotic expansion in time of the Schrödinger group on conical manifolds, Ann. Inst. Fourier (Grenoble) 56 (6) (2006) 1903–1945. [15] G.N. Watson, A Treatise on the Theory of Bessel Functions, Cambridge University Press, 1952. [16] D. Yafaev, The low energy scattering for slowly decreasing potentials, Comm. Math. Phys. 85 (2) (1982) 177–196.
Journal of Functional Analysis 260 (2011) 1795–1823 www.elsevier.com/locate/jfa
Sums of Laplace eigenvalues—rotationally symmetric maximizers in the plane R.S. Laugesen ∗ , B.A. Siudeja Department of Mathematics, University of Illinois, Urbana, IL 61801, USA Received 24 June 2010; accepted 20 December 2010 Available online 28 December 2010 Communicated by Gilles Godefroy
Abstract The sum of the first n 1 eigenvalues of the Laplacian is shown to be maximal among triangles for the equilateral triangle, maximal among parallelograms for the square, and maximal among ellipses for the disk, provided the ratio (area)3 /(moment of inertia) for the domain is fixed. This result holds for both Dirichlet and Neumann eigenvalues, and similar conclusions are derived for Robin boundary conditions and Schrödinger eigenvalues of potentials that grow at infinity. A key ingredient in the method is the tight frame property of the roots of unity. For general convex plane domains, the disk is conjectured to maximize sums of Neumann eigenvalues. © 2010 Elsevier Inc. All rights reserved. Keywords: Isoperimetric; Membrane; Tight frame
1. Introduction Eigenvalues of the Laplacian represent frequencies in wave motion, rates of decay in diffusion, and energy levels in quantum mechanics. Eigenvalues are challenging to understand: they are known in closed form on only a handful of domains. This difficulty has motivated considerable work on estimating eigenvalues in terms of simpler, geometric quantities such as area and perimeter.
* Corresponding author.
E-mail addresses: [email protected] (R.S. Laugesen), [email protected] (B.A. Siudeja). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.018
1796
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
We will obtain a sharp bound on the sum of the first n 1 eigenvalues of linear images of rotationally symmetric domains. Our methods apply equally well to Dirichlet, Robin, and Neumann boundary conditions. Write λ1 , λ2 , λ3 , . . . for the Dirichlet eigenvalues of the Laplacian on a plane domain. Let A be the area of the domain and I be its moment of inertia about the center of mass. We will prove that for each n 1, the normalized, scale invariant eigenvalue sum (λ1 + · · · + λn )
A3 I
(1.1)
is maximal among triangular domains for the equilateral triangle. Among parallelograms the maximizer is the square, and the disk is the maximizer among ellipses. The only case known previously was the fundamental tone, n = 1, due to Pólya [45]. An analogous result will be shown for the sum of Neumann eigenvalues, (μ1 + · · · + μn )
A3 , I
(1.2)
and then for Robin and Schrödinger eigenvalues too. These latter results are new even for n = 1. See Section 3. Our work suggests conjectures for general convex domains. Is the Dirichlet eigenvalue sum (1.1) maximal for the disk? Not when n = 1, curiously, because any rectangle or equilateral triangle gives a larger value for the fundamental tone. We conjecture that those domains maximize λ1 A3 /I . For the Neumann eigenvalue sum (1.2) it does seem plausible to conjecture maximality for the disk, as we discuss in Section 4. Central to the paper is a new technique we call the “Method of Rotations and Tight Frames”. The idea is to linearly transplant the eigenfunctions of the extremal domain and then average with respect to allowable rotations of that domain. This averaging of the Rayleigh quotient is accomplished using a “tight frame” or Parseval identity for the root-of-unity vectors. The Hilbert–Schmidt norm of the linear transformation arises naturally in such averaging, and is then represented in terms of the moment of inertia about the centroid. 1.1. Intuition The eigenvalue sum (1.1) can be written as a product of two scale invariant factors, as (λ1 + · · · + λn )A ·
A2 . I
The first factor, (λ1 + · · · + λn )A, is normalized by the area of the domain, and so can be thought of as a generalized “Faber–Krahn” term (although the Faber–Krahn theorem says λ1 A is minimal for the disk, not maximal). The second factor, A2 /I , is purely geometric and measures the “deviation from roundness” of the domain. This factor is small when the domain is elongated, and hence it balances the largeness of the first factor on such domains.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1797
The motivating intuition is that for a domain with characteristic length scales a and b, we have λ1
1 1 ab(a 2 + b2 ) I + = 3. 2 2 3 a b (ab) A
This rough calculation is exact for rectangles, up to constant factors. The first inequality in the calculation extends readily to higher dimensions, but the algebraic identity in the middle becomes more complicated. Thus in higher dimensions it seems that the moment of inertia should be evaluated instead on some kind of “reciprocal” domain that has length scales 1/a and 1/b and so on. Higher dimensional results of this nature will be developed in a later paper [36]; the maximizing domains are regular tetrahedra, cubes, and other Platonic solids. 1.2. Related work The major contribution of this paper is that it proves upper bounds that are geometrically sharp, on eigenvalue sums of arbitrary length. We do not know any similar results in the literature. Some results of a different type are known, as we now describe. A bound due to Kröger [27] for Neumann eigenvalues says that (μ1 + · · · + μn )A/n2 2π . The inequality is asymptotically sharp for each domain, because μn A ∼ 4πn by the Weyl asymptotics. But Kröger’s bound is not geometrically sharp for fixed n, because there are no domains for which equality holds. Kröger’s result should be viewed as a weak version of the Pólya conjecture. That conjecture asserts that the Weyl asymptotic estimate is in fact a strict upper bound on each Neumann eigenvalue. It has been proved for tiling domains by Kellner [25], and up through the third eigenvalue for simply connected plane domains by Girouard, Nadirashvili and Polterovich [19], but it remains open in general. Kröger also proved an upper bound on Dirichlet eigenvalue sums, involving ε-neighborhoods of the boundary [28]. This bound is again not geometrically sharp. Kröger’s estimates were generalized to domains in homogeneous spaces by Strichartz [54]. Weak versions of Pólya’s conjectured lower bound for Dirichlet eigenvalues [47] are due to Berezin [9] and Li and Yau [38], with later developments by Laptev [30] and others using Riesz means and “universal” inequalities, as surveyed by Ashbaugh [5]. Useful upper bounds on eigenvalue sums in terms of other eigenvalue sums have lately been obtained this way, by Harrell and Hermi [21, Corollary 3.1]. Note Pólya’s lower bound has been investigated also for eigenvalues under a constant magnetic field, by Frank, Loss and Weidl [13]. There is considerable literature on low eigenvalues of domains constrained by perimeter, inradius, or conformal mapping radius, rather than moment of inertia. We summarize this literature in Section 8. Eigenvalues of triangular domains have been studied a lot, in recent years [1–3,14–16,33,34, 39,51,52], and this paper extends the theory of their upper bounds. Lower bounds on Dirichlet eigenvalues of triangles are proved in a companion paper [35]: there the triangles are normalized by diameter (rather than area and moment of inertia) and equilateral triangles are shown to minimize (rather than maximize) the eigenvalue sums. For broad surveys of isoperimetric eigenvalue inequalities, one can consult the monographs of Bandle [8], Henrot [22], Kesavan [26] and Pólya and Szeg˝o [49], and the survey paper by Ashbaugh [4].
1798
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
2. Assumptions and notation 2.1. Eigenvalues For a bounded plane domain D, we denote the Dirichlet eigenvalues of the Laplacian by λj (D), the Robin eigenvalues by ρj (D; σ ) where the constant σ > 0 is the Robin parameter, and the Neumann eigenvalues by μj (D). In the Robin and Neumann cases we make the standing assumption that the domain has Lipschitz boundary, so that the spectra are well defined. Denoting the eigenfunctions by uj in each case, we have
−uj = λj uj uj = 0
in D, on ∂D,
−uj = ρj uj in D, ∂uj + σ uj = 0 on ∂D, ∂n
−uj = μj uj ∂uj =0 ∂n
in D, on ∂D
and 0 < λ1 < λ 2 λ 3 · · · ,
0 < ρ1 < ρ2 ρ3 · · · ,
0 = μ1 < μ2 μ3 · · · .
The Robin case reduces to Neumann when σ = 0, and formally reduces to the Dirichlet case when σ = ∞. The corresponding Rayleigh quotients are
|∇u|2 dx 2 D u dx
Dirichlet: R[u] = D Robin: R[u] =
for u ∈ H01 (D),
+ σ ∂D u2 ds 2 D u dx
2 D |∇u| dx
|∇u|2 dx 2 D u dx
Neumann: R[u] = D
for u ∈ H 1 (D),
for u ∈ H 1 (D).
The Rayleigh–Poincaré principle [8, p. 98] characterizes the sum of the first n 1 eigenvalues as λ1 + · · · + λn = min R[v1 ] + · · · + R[vn ]: v1 , . . . , vn ∈ H01 (D) are pairwise orthogonal in L2 (D) in the Dirichlet case, and similarly in the Robin and Neumann cases (using trial functions in H 1 instead of H01 ). 2.2. Geometric quantities Let A = area, I = moment of inertia (about the centroid).
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1799
Fig. 1. A domain D with rotational symmetry, and its image under a linear map T .
That is, |x − x|2 dx
I (D) = D
1 where the centroid is x = A(D) D x dx. Given a matrix M, write its Hilbert–Schmidt norm as MHS =
1/2 Mj2k
1/2 = tr MM †
j,k
where M † denotes the transposed matrix. 3. Sharp upper bounds on eigenvalue sums 3.1. Dirichlet and Neumann eigenvalues Our first result examines the effect on eigenvalues of linearly transforming a rotationally symmetric domain, like in Fig. 1. Theorem 3.1. If D has rotational symmetry of order greater than or equal to 3, then
2 1 (λ1 + · · · + λn )|T (D) T −1 HS (λ1 + · · · + λn )|D 2
(3.1)
for each n 1 and each invertible linear transformation T of the plane. The same inequality holds for the Neumann eigenvalues. Equality holds in (3.1) for the first Dirichlet eigenvalue (n = 1) if and only if either (i) T is a scalar multiple of an orthogonal matrix, or (ii) D is a square and T (D) is a rectangle ( possibly with sets of capacity zero removed). Equality holds for the second Neumann eigenvalue (n = 2) if and only if T is a scalar multiple of an orthogonal matrix.
1800
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
The proof is in Section 6. Notice equality does hold in the theorem when T is a scalar multiple of an orthogonal matrix, because if T = rS where S is orthogonal, then λj (T (D)) = r −2 λj (D) by rescaling and rotation, and 12 T −1 2HS = r −2 . The rotationally symmetric domain D in the theorem need not be convex, need not be a regular polygon, and need not have any axis of symmetry. For example, it could be shaped like a three-bladed propeller. Pólya obtained the theorem for n = 1 (the Dirichlet fundamental tone), although with no equality statement. He stated this result in [45], and Pólya and Schiffer proved it along with results for torsional rigidity and capacity in [48, Chapter IV]. Our method differs subtly from theirs, as we explain in Section 6, and this difference allows us to handle higher eigenvalue sums and Neumann eigenvalues too. To express the theorem more geometrically, we observe that the Hilbert–Schmidt norm of the transformation T −1 can be expressed in terms of moment of inertia and area (Lemma 5.3). Hence in particular: Corollary 3.2. Among triangles, the normalized Dirichlet eigenvalue sum (λ1 + · · · + λn )
A3 I
(3.2)
is maximal for the equilateral triangle, for each n 1. When n = 1, every maximizer is equilateral. Among parallelograms, the quantity (3.2) is maximal for the square. When n = 1, every maximizer is a rectangle and every rectangle is a maximizer. Among ellipses, the quantity (3.2) is maximal for the disk. When n = 1, every maximizer is a disk. The normalized Neumann eigenvalue sum (μ2 + · · · + μn )
A3 I
is maximal among triangles for the equilateral triangle, among parallelograms for the square, and among ellipses for the disk, for each n 2. When n = 2, every maximizer is an equilateral triangle, square, or disk, respectively. The Neumann case with n = 1 is not interesting, because the first eigenvalue equals 0 for each domain. Remarks. 1. The method extends to linear images of regular N -gons for any N , but the most interesting cases are triangles and parallelograms (N = 3 and N = 4), as considered in the corollary. 2. For triangles, the moment of inertia can be calculated in terms of the side lengths l1 , l2 , l3 as I=
A2 l + l22 + l32 . 36 1
(3.3)
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1801
For a parallelogram with adjacent side lengths l1 , l2 , the moment of inertia equals I=
A2 l1 + l22 . 12
(3.4)
3. The eigenvalues and eigenfunctions of the extremal domains (the equilateral triangle, square and disk) are not used in our proofs. The eigenvalues are stated anyway in Appendix A, for reference. It is interesting to substitute them into Corollary 3.2 and obtain explicit estimates on eigenvalue sums. For example, for the Dirichlet fundamental tone (n = 1) one obtains that ⎧ 12π 2 A3 ⎨ 12π 2 λ1 ⎩ 2 2 I 2j0,1 π 11.5π 2
for triangles, with equality for equilaterals, for parallelograms, with equality for rectangles, for ellipses, with equality for disks.
(3.5)
All three inequalities were obtained by Pólya [45], [48, pp. 308, 328]. The first inequality, for triangles, was rediscovered with a different proof by Freitas [14, Theorem 1]. The second inequality was rediscovered for the special case of rhombi by Hooker and Protter [24, §5] and for all parallelograms by Hersch [23, formula (5)], again with different proofs. These authors stated their results in terms of side lengths, as (l12 + l22 + l32 )π 2 /3A2 for triangles, (3.6) λ1 (l12 + l22 )π 2 /A2 for parallelograms. These inequalities are equivalent to Pólya’s by formulas (3.3) and (3.4) for the moment of inertia. For the first nonzero Neumann eigenvalue we find from Corollary 3.2 and Appendix A that ⎧ 2 4π A3 ⎨ 2 6π μ2 ⎩ I )2 π 2 6.8π 2 2(j1,1
for triangles, with equality for equilaterals, for parallelograms, with equality for squares, for ellipses, with equality for disks.
(3.7)
These inequalities too can be stated in terms of side lengths. For stronger inequalities on μ2 , see Section 8. For n = 3, the corollary says (μ2 +μ3 )A3 /I is maximal for the equilateral triangle. This result was proved recently by the authors using a different method with explicit trial functions [33, Theorem 3.5]. 4. Corollary 3.2 becomes false when applied to individual eigenvalues instead of eigenvalue sums. For example, λ3 A3 /I is not maximal for the square among rectangles: to the contrary, it is locally minimal. The underlying reason is that a square has a double eigenvalue λ2 = λ3 that “splits” when the square is deformed into a rectangle of the same area; the second eigenvalue decreases and the third increases, while the moment of inertia varies only at second order. 5. The corollary also holds for moment of inertia about an arbitrary center, provided the moment of inertia of the equilateral triangle is taken about its centroid, since the moment is minimal when taken about the centroid. 3.2. Robin eigenvalues In the next theorem we normalize the Robin parameter in terms of T −1 , in order to obtain a scale invariant expression.
1802
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
Theorem 3.3. If D has rotational symmetry of order greater than or equal to 3, then (ρ1 + · · · + ρn )
A3 A3 (ρ + · · · + ρ ) 1 n I σ T −1 HS /√2,T (D) I σ,D
for each n 1 and each invertible linear transformation T of the plane. Equality holds for the first Robin eigenvalue (n = 1) if and only if T is a scalar multiple of an orthogonal matrix. The subscript “σ, D” on the right side of the inequality specifies the domain where the eigenvalues and geometric quantities are to be evaluated, and also the value of the Robin parameter to be used. The subscript on the left √ side of the inequality similarly specifies the domain T (D) and the Robin parameter σ T −1 HS / 2 to be used there. Corollary 3.4. Fix the Robin parameter σ > 0. Among all triangles of the same area, the quantity (ρ1 + · · · + ρn )
A3 I
is maximal for the equilateral triangle. When n = 1, every maximizer is equilateral. Analogous results hold among parallelograms and ellipses, with squares and disks being the maximizers, respectively. 3.3. Schrödinger eigenvalues Consider the Schrödinger eigenvalue problem −h¯ 2 u + W u = Eu 2 in the plane, with Planck constant h¯ > 0 and real-valued potential W ∈ L∞ loc (R ) that tends to +∞ as |x| → ∞. The spectrum is discrete [50, Theorem XIII.67], and the eigenvalues Ej are characterized in the usual way by the Rayleigh quotient
R[u] =
h¯
R2
|∇u|2 dx + R2 W u2 dx , 2 R2 u dx
u ∈ H 1 R2 ∩ L2 (W ).
Here L2 (W ) denotes the weighted space with measure |W | dx. Once more we show that a rotationally symmetric situation maximizes the sum of eigenvalues. Theorem 3.5. If W has rotational symmetry of order greater than or equal to 3, then (E1 + · · · + En )|√2h¯ /T −1 HS ,W ◦T −1 (E1 + · · · + En )|h¯ ,W for each n 1 and each invertible linear transformation T of the plane. When n = 1, equality holds if and only if T is a scalar multiple of an orthogonal matrix.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1803
The subscript “h¯ , W ” on the right side of the inequality specifies the potential to be used and the value of the Planck constant, and similarly for the subscript on the left side of the inequality. This Schrödinger result formally implies the Dirichlet√ result in Theorem 3.1, by taking W = 0 on D and W = +∞ off D, and choosing h¯ = T −1 HS / 2. 3.4. More general quadrilaterals Among quadrilaterals we have so far handled only the special class of parallelograms. Now we show how to handle a larger class of quadrilaterals having two “halves” of equal area. To construct such domains, first write the upper and lower halfplanes as R2+ = (x1 , x2 ): x2 > 0 , R2− = (x1 , x2 ): x2 < 0 . Choose two linear transformations T+ and T− that agree on the x1 -axis, with T± mapping R2± onto itself. Then the map T (x) =
T+ x
if x ∈ R2+ ,
T− x
if x ∈ R2− ,
defines a piecewise linear homeomorphism of the plane mapping the upper and lower halfplanes to themselves. Assume also det T+ = det T− , so that T distorts areas by the same factor in the upper and lower halfplanes. We will not need explicit formulas for the linear transformations T+ and T− , but for the sake of concreteness we present them anyway:
a c± T± = 0 b where a = 0, b > 0 and c± ∈ R. Let D be the square with vertices at (±1, 0), (0, ±1). Our goal is to show that this square maximizes eigenvalue sums among quadrilaterals of the form E = T (D). These quadrilaterals have two vertices on the x1 -axis and have upper and lower halves of equal area. Write I0 (E)= |x|2 dx E
for the moment of inertia about the origin, for a domain E. Theorem 3.6 (Quadrilaterals with equal-area halves). Let D be the square with vertices at (±1, 0), (0, ±1). Then for every map T constructed as above, (λ1 + · · · + λn )
A3 A3 (λ + · · · + λ ) 1 n I0 T (D) I 0 D
for each n 1. The inequality holds also for Neumann eigenvalues.
1804
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
The moment I0 is generally greater than the moment of inertia I for the domain T (D), because the centroid of T (D) need not be at the origin. For example, if both T+ and T− are shear transformations towards the right, then the centroid of T (D) will lie on the positive x1 -axis, to the right of the origin. Meanwhile, the centroid of the rotationally symmetric domain D will always lie at the origin, so that I (D) = I0 (D). We conjecture that Theorem 3.6 can be strengthened to use I instead of I0 . For the first eigenvalue (n = 1), Freitas and Siudeja [16] showed recently with a computerassisted proof that
λ1
l12
+ l22
A2 + l32 + l42
is maximal for rectangles among all quadrilaterals, not just among quadrilaterals with halves of equal area. For parallelograms, this result and Theorem 3.6 give the same information (see formula (3.6)). For general quadrilaterals we cannot easily compare the two results, because the relationship between the sum of squares of side lengths and the moment of inertia is unclear. 4. Open problems for general convex domains For the Dirichlet fundamental tone we raise: Conjecture 4.1. Suppose Ω is a bounded convex plane domain. Then 9 2 A3 π < λ1 12π 2 2 I Ω with equality on the right for equilateral triangles and all rectangles, and asymptotic equality on the left for degenerate acute isosceles triangles and sectors. The convexity assumption is necessary on the right side of the conjecture because otherwise one could drive the eigenvalue to infinity without affecting the area or moment of inertia, by removing sets of measure zero (such as curves) from the domain. The maximizer cannot be the disk in the last conjecture because triangles and rectangles yield a larger value, as we observed already in (3.5). As evidence for the conjecture, we note that λ1 A3 /I is bounded above and below on convex domains by an Inclusion Lemma, as was shown by Pólya and Szeg˝o [49, §1.19, 5.11b]. They further evaluated λ1 A3 /I for a variety of triangles, sectors, degenerate ellipses and degenerate sectors [49, p. 267]. Asymptotic expansions can be obtained also for degenerate triangles [15]. We examine the family of isosceles triangles in Fig. 2. All this evidence is consistent with Conjecture 4.1. For the first nonzero Neumann eigenvalue, we know μ2 A3 /I is definitely maximal for the disk among all bounded domains, by an inequality of Szeg˝o and Weinberger (see Section 8). This quantity has no minimizer because it approaches zero for a degenerate rectangle.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1805
Fig. 2. Numerical plot of the normalized Dirichlet fundamental tone λ1 A3 /I for isosceles triangles of aperture α ∈ (0, π ). The maximizer is equilateral (α = π/3), and the minimizer is degenerate acute (α → 0).
Now consider sums of eigenvalues. Conjecture 4.2. Suppose Ω is a bounded convex plane domain. Then for the Neumann eigenvalues, A3 (μ2 + · · · + μn ) I Ω is maximal when Ω is a disk, for each n 2. The conjecture is true for the special case of ellipses by Corollary 3.2. For Dirichlet eigenvalues, the conjecture fails because the square gives a larger value than the disk for (λ1 + · · · + λn )A3 /I when n = 1, 2, 3, 5, 6, 9, 10, 12; the disk does give a larger value for all other n 50, and we suspect for n > 50 as well. 5. Consequences of symmetry: tight frames, and moment matrices In this section we recall the tight frame property of rotationally symmetric systems of vectors, and develop a moment of inertia formula for the linear image of a rotationally symmetric domain. These elementary consequences of symmetry will be used in proving Theorem 3.1. 5.1. Tight frames Let N 3 and write Um for the matrix representing rotation by angle 2πm/N , for m = 1, . . . , N . For each nonzero y ∈ R2 , the rotations generate a rotationally symmetric system {U1 y, . . . , UN y} in the plane. For example, the system consists of the N th roots of unity when y = 10 . We start with a well-known Plancherel-type identity for such systems. Lemma 5.1. Let N 3. For all column vectors x, y ∈ R2 one has N 2 1 1 x · (Um y) = |x|2 |y|2 . N 2 m=1
1806
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
Fig. 3. The “Mercedes–Benz” tight frame (N = 3) in the plane.
Proof. We may suppose x and y have length 1 and lie at angles θ and φ to the positive horizontal axis, respectively. Then N N 2 1 1 x · (Um y) = cos2 (θ − φ − 2πm/N ) N N m=1
m=1
N 1 1 + cos 2(θ − φ − 2πm/N ) 2 2N m=1 N −i4π/N m 1 1 i2(θ−φ) Re e e = + 2 2N
=
m=1
1 = 2 as desired. The assumption N 3 ensures that e−i4π/N = 1 when summing the geometric series, in the last step. 2 Fig. 3 illustrates the lemma for N = 3: it shows the projection formula 3m=1 (x · Um y)Um y = 0 3 2 2 x for a typical x ∈ R , where y = 1 is the vertical unit vector and Um denotes rotation by 2πm/3. Dotting the projection formula with x yields the Parseval-type identity in Lemma 5.1. The lemma says that the rotationally symmetric system {U1 y, . . . , UN y} forms a tight frame. Readers who want to learn about frames and their applications in Hilbert spaces may consult the monograph by Christensen [11] or the text by Han et al. [20]. We next deduce a tight frame identity in which the vector y is replaced by a matrix. Lemma 5.2. Let N 3, K 1. For all row vectors x ∈ R2 and all 2 × K real matrices Y one has N 1 1 |xUm Y |2 = |x|2 Y 2HS . N 2 m=1
Proof. Write y1 , . . . , yK for the column vectors of Y , so that |xUm Y |2 = apply Lemma 5.1. 2
K
2 k=1 |xUm yk | .
Now
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1807
5.2. Hilbert–Schmidt norms and moment of inertia When proving Corollary 3.2, we will need to evaluate the Hilbert–Schmidt norm of T −1 in terms of moment of inertia and area. Lemma 5.3. If the bounded plane domain D has rotational symmetry of order N 3, and T is an invertible 2 × 2 matrix, then
1
T −1 2 = I (T D)/ I (D). HS 2 A3 A3 Proof. The centroid of D lies at the origin, in view of the rotational symmetry of D. Thus the centroid of T D also lies at the origin. The moment matrix of D is defined to be M(D) = [ D xj xk dx]j,k . We show it equals a scalar multiple of the identity, as follows. Let U denote the matrix for rotation by 2π/N . The rotational invariance of D under U implies that M(D) = U M(D)U † , so that if x is an eigenvector of M(D) then so is U x, with the same eigenvalue. Since x and U x span R2 (using here that N 3), we conclude every vector in R2 is an eigenvector with that same eigenvalue. Thus M(D) is a multiple of the identity. In particular, the diagonal entries in M(D) are equal. Since they sum to the moment of inertia I (D), we have
1 1 0 M(D) = I (D) . 0 1 2
(5.1)
The moment of inertia of T (D) can now be computed as I (T D) = tr M(T D) = tr T M(D)T † |det T | 1 = I (D) tr T T † |det T | by (5.1) 2 1 = I (D)T 2HS |det T |. 2
(5.2)
This formula gives us the Hilbert–Schmidt norm of T , whereas we want the Hilbert–Schmidt norm of T −1 . Fortunately, the two are related, with
−1 2
T = T 2 /|det T |2 HS HS
(5.3)
by the explicit formula for T −1 in terms of the matrix entries, in two dimensions. Hence
2
1 I (T D) = I (D) T −1 HS |det T |3 , 2 from which the lemma follows easily.
2
(5.4)
1808
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
An interesting consequence of the last lemma is that the moment of inertia of a linear image of a rotationally symmetric domain equals the moment of inertia of its inverse image, after normalizing by the area. Lemma 5.4. If the bounded plane domain D has rotational symmetry of order N 3, and T is an invertible 2 × 2 matrix, then I I (T D) = 2 T −1 D . 2 A A Proof. By (5.2), and then using (5.4) with T replaced by T −1 , we find I (T D) I (T −1 D) 1 I (D) T 2HS = = . A(T D)2 2 A(D)2 |det T | A(T −1 D)2
2
The lemma holds also with T −† D instead of T −1 D, since T † and T have the same Hilbert– Schmidt norm and determinant. 6. Proof of Theorem 3.1 We prove the Dirichlet case of the theorem. The idea is to construct trial functions on the domain T (D) by linearly transplanting eigenfunctions of D, and then to average with respect to the rotations of D. The Neumann proof is identical, except using Neumann eigenfunctions. Let u1 , u2 , u3 , . . . be orthonormal eigenfunctions on D corresponding to the Dirichlet eigenvalues λ1 , λ2 , λ3 , . . . . Consider an orthogonal matrix U ∈ O(2) that fixes D, so that U (D) = D. Define trial functions vj = uj ◦ U ◦ T −1 on the domain E = T (D), noting vj ∈ H01 (E) because uj ∈ H01 (D). The functions vj are pairwise orthogonal, since vj vk dx = uj uk dx · det T U −1 = 0 E
D
when j = k. Thus by the Rayleigh–Poincaré principle, we have n
λj (E)
j =1
n
2 E |∇vj | dx 2 . v dx j E j =1
(6.1)
For each function v = vj we evaluate the Rayleigh quotient as
2 E |∇v| dx 2 E v dx
= = D
T D |(∇u)(x)U 2 D u dx
−1 |2 dx
· |det T U −1 | · |det T U −1 |
(∇u)U T −1 2 dx,
(6.2)
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1809
where the gradient ∇u is regarded as a row vector. In the last line we used that u = uj is normalized in L2 (D). Since D has N -fold rotational symmetry for some N 3, we may choose U to be the matrix Um representing rotation by angle 2πm/N , for m = 1, . . . , N . By averaging (6.1) and (6.2) over these rotations we find n
λj (E)
j =1
n j =1 D
=
m=1
n j =1 D
N 1 2 (∇uj )Um T −1 dx N
1 2 −1 2 dx |∇uj | T HS 2
by Lemma 5.2
n
2 1 = T −1 HS λj (D), 2 j =1
which proves the inequality in Theorem 3.1. 6.0.1. Equality statement for Dirichlet fundamental tone, n = 1 Suppose equality holds in the theorem for the first Dirichlet eigenvalue. That is, suppose
2 1 λ1 T (D) = T −1 HS λ1 (D). 2
(6.3)
We reduce to T being diagonal, as follows. The singular value decomposition of T can be written T = QRS where Q and S are orthogonal matrices with det S = 1 (so that S is a rotation matrix) and R = r01 r02 is diagonal with r1 , r2 > 0. If r1 = r2 then T is a scalar multiple of an orthogonal matrix. So suppose from now on that r1 = r2 . and = S(D), so that D has rotational symmetry of order N . Note λ1 (D) = λ1 (D), Write D that T (D) = QR(D) so that . λ1 T (D) = λ1 R(D) Also
−1 2
T = R −1 2 = r −2 + r −2 . 1 2 HS HS Hence equality in (6.3) implies = 1 r −2 + r −2 λ1 (D), λ1 R(D) 1 2 2 under the diagonal linear transformawhich means that equality holds in (3.1) for the domain D tion R. so that Write u = u1 for a first Dirichlet eigenfunction on D, ux1 x1 + ux2 x2 = −λ1 (D)u.
(6.4)
1810
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
is Inspecting the proof of the theorem, above, we see that one of the trial functions on R(D) v = u ◦ R −1 , in other words v(x1 , x2 ) = u(x1 /r1 , x2 /r2 ). Since equality holds in the Rayleigh principle (6.1) with n = 1, we deduce that this trial function must actually be a first eigenfunction That is, on R(D). v, v = −λ1 R(D) which means r1−2 ux1 x1 + r2−2 ux2 x2 = −
1 −2 r + r2−2 λ1 (D)u. 2 1
(6.5)
By solving the simultaneous linear equations (6.4) and (6.5) (which is possible since r1 = r2 ) we find that 1 ux1 x1 = ux2 x2 = − λ1 (D)u. 2
(6.6)
This last formula must apply also if we rotate u through angle 2π/N , because that rotate of u was used in one of the trial functions in the proof of the theorem above. Hence the second directional That second derivative is derivative of u in direction θ = 2π/N must equal − 12 λ1 (D)u. 2 cos θ ux1 x1 + 2(cos θ sin θ )ux1 x2 + sin2 θ ux2 x2 , + sin(2θ )ux1 x2 by (6.6). We conclude sin(2θ )ux1 x2 = 0. which equals − 12 λ1 (D)u Then u = F1 (x1 ) + Suppose N = 4. Then sin(2θ ) = sin(4π/N) = 0, and so ux1 x2 = 0 in D. F2 (x2 ) for some functions F1 and F2 , and substituting this formula into (6.6) gives that F1 (x1 ) = 1 (x1 ) + F2 (x2 )]. Taking the x2 derivative shows that F2 is constant. Similarly F1 is − 12 λ1 (D)[F constant, and so u is constant, animpossibility. Eqs. (6.6) say ux1 x1 = ux2 x2 = −ω2 u, and so Therefore N = 4. Write ω = λ1 (D)/2. u(x1 , x2 ) = A cos(ωx1 ) cos(ωx2 ) + B sin(ωx1 ) sin(ωx2 ) + C cos(ωx1 ) sin(ωx2 ) + D∗ sin(ωx1 ) cos(ωx2 ) for some constants A, B, C, D∗ . The 4-fold rotational symmetry of the domain further on D, implies that each of the four terms A cos(ωx1 ) cos(ωx2 ),
(6.7)
B sin(ωx1 ) sin(ωx2 ), 2 C + D∗2 cos(ωx1 ) sin(ωx2 ), 2 C + D∗2 sin(ωx1 ) cos(ωx2 )
(6.8) (6.9) (6.10)
with eigenvalue 2ω2 = λ1 (D), or else is identically zero, as is by itself a Dirichlet mode for D we will now show. First, by adding and subtracting u(x1 , x2 ) and u(−x1 , −x2 ) (its rotation by π ) we find that the functions f (x1 , x2 ) = A cos(ωx1 ) cos(ωx2 ) + B sin(ωx1 ) sin(ωx2 )
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1811
and g(x1 , x2 ) = C cos(ωx1 ) sin(ωx2 ) + D∗ sin(ωx1 ) cos(ωx2 ) (or else are identically zero). By adding and subtracting f (x1 , x2 ) are each eigenfunctions on D and f (−x2 , x1 ) (rotation by π/2) we find that (6.7) and (6.8) are each eigenfunctions (or else are identically zero). By considering Cg(x1 , x2 ) − D∗ g(−x2 , x1 ) and D∗ g(x1 , x2 ) + Cg(−x2 , x1 ) we learn that (6.9) and (6.10) are each eigenfunctions (or else are identically zero). The fundamental Dirichlet mode does not change sign. The nodal domains for each of the must lie within one of those squares. For (6.8), functions (6.7)–(6.10) are squares, and so D (6.9) and (6.10), rotation by angle π maps each nodal square to a completely disjoint square, cannot have 2-fold rotational symmetry, let alone 4-fold symmetry. Hence which means that D (6.8), (6.9) and (6.10) must not be eigenfunctions, and so necessarily B = C = D∗ = 0. Thus the eigenfunction is (6.7). Taking A = 1, we have u = cos(ωx1 ) cos(ωx2 ). Rotation by π rules out every nodal square except the one centered at the origin, which is is contained in this square. (−π/2ω, π/2ω)2 . Hence D Thus D must fill the whole The square has first Dirichlet eigenvalue 2ω2 , which equals λ1 (D). square (except perhaps omitting a set of capacity zero, which does not affect the fundamental is a square and T (D) = QR(D) is a is a rectangle, and D = S −1 (D) tone [17]). Then R(D) rectangle. This completes the proof of the “only if” part of the proof of the equality statement. For the “if” part of the equality statement, suppose D is a square and T (D) is a rectangle (possibly with sets of capacity zero removed). By rotating and reflecting D and T (D) suitably, we can suppose they have sides parallel to the coordinate axes and that T = r01 r02 for some r1 , r2 > 0. Writing L for the side length of the square, we have λ1 (D) = 2(π/L)2 ,
2 1 λ1 T (D) = (π/r1 L)2 + (π/r2 L)2 = T −1 HS λ1 (D), 2
so that equality holds in (3.1) with n = 1. 6.0.2. Equality statement for second Neumann eigenvalue, n = 2 Suppose equality holds in the theorem for the second Neumann eigenvalue. Most of the preceding argument in the Dirichlet equality case applies without change, simply replacing λ1 with μ2 and the Dirichlet eigenfunction u1 with the Neumann eigenfunction u2 , and replacing the word “Dirichlet” with “Neumann”. The argument works because the first Neumann eigenvalue is zero, with constant eigenfunction u1 ≡ const., and so the trial function v1 = u1 ◦ U ◦ R −1 of D Thus if equality holds in the Rayleigh is also constant and hence is a first eigenfunction on R(D). principle (6.1) for n = 2 then the trial function v2 = u2 ◦ U ◦ R −1 is a second eigenfunction on R(D). The significant difference from the Dirichlet proof begins at the sentence “The fundamental Dirichlet mode does not change sign”. The second Neumann eigenfunction u = u2 does change it has exactly two nodal domains {u > 0} and {u < 0}, each of which is connected. (We sign on D: know the eigenfunction has at least two nodal domains because u is orthogonal to the constant eigenfunction; it has at most two by Courant’s nodal domain theorem [8, p. 112].)
1812
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
Consider each of the four possible forms of u in turn, namely (6.7)–(6.10). Each one has must be subsets of such squares. square nodal domains, and the two nodal domains of u in D intersects exactly two of the squares. At the same time, D has 4-fold rotational symmeHence D because if D intersected try. These requirements prevent (6.7) from being an eigenfunction for D, two of the nodal squares, then it would have to intersect at least five of them. Hence A = 0. Similarly (6.8) cannot be an eigenfunction, and so B = 0. Next we deal with (6.9). (The argument is similar for (6.10).) Suppose C 2 + D∗2 > 0 in (6.9), so that we may take u = cos(ωx1 ) sin(ωx2 ).
(6.11)
to intersect exactly two of the nodal squares, they must be the squares Then in order for D adjacent to the origin, so that ⊂ (−π/2ω, π/2ω) × (−π/ω, π/ω). D
(6.12)
We will deduce a contradiction below, so that necessarily C 2 + D∗2 = 0. Hence none of the functions (6.7)–(6.10) is an eigenfunction, and so the case N = 4 cannot occur. Therefore the only way for equality to hold is to have r1 = r2 , so that T is a scalar multiple of an orthogonal matrix. To obtain the desired contradiction, we will examine how the Neumann boundary condition is has Lipschitz boundary, there exists an affected by the linear transformation. Since the domain D outward normal vector (n1 , n2 ) at almost every boundary point (with respect to arclength mea we know u satisfies the Neumann (or natural) boundary sure). At each such point (x1 , x2 ) ∈ ∂ D, condition 0 = ∇u · (n1 , n2 ) = ux1 n1 + ux2 n2 ; here we used that u as defined by (6.11) is globally smooth. Further, the point (r1 x1 , r2 x2 ) ∈ has an outward normal vector (n1 /r1 , n2 /r2 ). Since v(x1 , x2 ) = u(x1 /r1 , x2 /r2 ) is a ∂R(D) it satisfies the Neumann boundary condition: smooth eigenfunction on the closure of R(D), 0 = ∇v · (n1 /r1 , n2 /r2 ) = ux1 n1 /r12 + ux2 n2 /r22 . Recalling that r1 = r2 , these simultaneous equations imply ux1 n1 = 0 and ux2 n2 = 0. Recalling the formula (6.11) for u and the conHence either ux1 = 0 or ux2 = 0, a.e. on ∂ D. straint (6.12) on D, we deduce that almost every boundary point is contained in the lines {x1 = 0, ±π/2ω}, {x2 = 0, ±π/2ω, ±π/ω}. Furthermore, we can rule out the vertical lines {x1 = ±π/2ω} because on those lines ux1 = 0 and so n1 = 0, which means the normal would be vertical and the tangent horizontal, so that the boundary would depart the given vertical lines. must lie in Similarly we rule out the horizontal lines {x2 = 0, ±π/ω}. Hence the boundary of D the union of the lines {x1 = 0}, {x2 = ±π/2ω}. Since these lines fail to bound a domain, we have arrived at a contradiction, as desired.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1813
6.1. Why did Pólya not prove our theorem? Pólya proved Theorem 3.1 for the first Dirichlet eigenvalue λ1 , except that he proved no equality statement. His result appeared in [45] and its proof in [48, Chapter IV]. Why did he not prove the theorem for sums of eigenvalues, or for Neumann eigenvalues, as we do in this paper? Or for higher dimensions as we do in a forthcoming paper [36]? A possible reason is that our method is subtly different from Pólya’s. We use rotational symmetry at a later stage in the argument. This delay permits us to handle more than just the first eigenvalue, and to handle Neumann eigenvalues too. Let us explain in more detail. Pólya began by using rotational symmetry of the domain to obtain rotational symmetry of the fundamental Dirichlet eigenfunction u1 : he observed that the rotate of u1 is itself a positive eigenfunction and so must equal u1 . Then Pólya deduced that D
∂u1 ∂x1
2
dx = D
∂u1 ∂x2
2 dx =
1 2
|∇u1 |2 dx, D
D
∂u1 ∂u1 dx = 0. ∂x1 ∂x2
Hence his linearly transplanted trial function u1 ◦ T −1 has Rayleigh quotient −1 )|2 dx −1 |2 dx 2
1 −1 2 E |∇(u1 ◦ T D |(∇u1 )(x)T D |∇u1 | dx
T = = HS 2 2 −1 )2 dx 2 E (u1 ◦ T D u1 dx D u1 dx as desired. The difficulty when trying to extend Pólya’s approach to sums of eigenvalues is that the higher eigenfunctions are usually not symmetric under rotations, because of sign changes. The insight that permits us to prove Theorem 3.1 is that while the rotate of a higher eigenfunction need not equal itself, it must still be an eigenfunction with the same eigenvalue, and thus can still be used to generate trial functions by linear transplantation. Our proof uses the whole family of rotations to generate many trial functions, and then averages over the resulting family of inequalities. This approach applies (without change!) to the Neumann eigenvalues too. 7. Proofs of other results 7.1. Proof of Corollary 3.2 Every triangle can be written (after translation) as the image under a linear transformation T of an equilateral triangle centered at the origin. Hence the inequality for triangles in Corollary 3.2 follows from Theorem 3.1 and Lemma 5.3. The statements about parallelograms and ellipses are proved similarly. 7.1.1. Remark on Dirichlet maximizers when n 2 It is not clear how to determine all maximizing domains for sums of eigenvalues beyond the first. For example, some (but not all) non-square rectangles can maximize (λ1 + · · · + λn )A3 /I when n 2, as we now show. Consider a rectangle with side lengths l1 , l2 , so that the area is A = l1 l2 , the moment of inertia is I = l1 l2 (l12 + l22 )/12 and 12 A3 = −2 . I l1 + l2−2
1814
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
The fundamental tone is λ1 = π 2 l1−2 + l2−2 . Notice λ1 A3 /I = 12π 2 for every rectangle (not just for the square), as we have observed before. Thus every rectangle is a maximizer when n = 1. Now fix n 2, and fix the side length l2 . For l1 sufficiently large, we have eigenvalues λj = π 2 (j 2 l1−2 + l2−2 ) for j = 1, . . . , n, and so lim (λ1 + · · · + λn )
l1 →∞
A3 = 12π 2 n. I
Meanwhile, the square satisfies (λ1 + · · · + λn )
A3 A3 > nλ1 = 12π 2 n. I I
Hence for sufficiently large l1 , the rectangle with side lengths l1 and l2 is not a maximizer. Nonetheless, the rectangle can be a maximizer for some values of l1√and n. For example, let n = 3 and suppose the side lengths of the rectangle satisfy l2 l1 8/3l2 . Then by simple comparisons we find λ1 = π 2 l1−2 + l2−2 , λ2 = π 2 22 l1−2 + l2−2 , λ3 = π 2 l1−2 + 22 l2−2 , and so (λ1 + λ2 + λ3 )
A3 = 72π 2 . I
This value is the same as achieved for the square (l1 = l2 ), and so there are many non-square maximizers when n = 3. The idea behind this construction is to identify a range of (l1 , l2 ) values for which the eigenvalues λ1 , λ2 , λ3 have values π 2 (j 2 l1−2 + k 2 l2−2 ) for (j, k) = (1, 1), (2, 1), (1, 2). This set of index pairs in Z2 is invariant with respect to interchanging j and k. Hence λ1 + λ2 + λ3 is proportional to l1−2 + l2−2 , which allows us to cancel the denominator in A3 /I and obtain an expression independent of the side lengths. This construction can of course be extended to arbitrarily large values of n, if desired. 7.2. Proof of Theorem 3.3 The proof goes exactly as for the Dirichlet and Neumann cases in the proof of Theorem 3.1, except that for the Robin eigenvalues we must take account also of a boundary integral in the Rayleigh quotient:
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
v ∂E
2 ds(x)
Ev
2 dx
= =
u(U T ∂E
1815
−1 x)2 ds(x)
E u(U T
−1 x)2 dx
u(U x)2 |T τ (x)| ds(x) ∂D 2 D u(U x) dx · |det T |
by x → T x, where τ (x) denotes the unit tangent vector to ∂D at x. Geometrically, |T τ (x)| is the factor by which T stretches the tangent direction to ∂D at x. The symmetry of D implies that the tangent vectors rotate according to τ (U −1 x) = U −1 τ (x), and so replacing x with U −1 x in the last integral gives v 2 ds(x) ∂E −1 2 −1 ds(x). T U = |det T | u(x) τ (x) 2 E v dx ∂D
Choose U to be the matrix Um representing rotation by angle 2πm/N , for m = 1, . . . , N . Averaging the preceding quantity over m and applying Cauchy–Schwarz gives the upper estimate −1
|det T |
∂D
2
u(x)
N 2 1 T Um−1 τ (x) N
1/2 ds(x)
m=1
1 = |det T |−1 √ T HS 2
u(x)2 ds(x)
(7.1)
∂D
√ by Lemma 5.2, since |τ (x)| = 1. Multiplying by σ T −1 HS / 2 gives
1
T −1 2 σ u(x)2 ds(x) HS 2 ∂D
by (5.3). With the aid of this last estimate we can straightforwardly adapt the proof of Theorem 3.1 to the Robin situation, and then call on Lemma 5.3 to interpret the Hilbert–Schmidt norm of T −1 in terms of moment of inertia. 7.2.1. Equality statement for Robin fundamental tone, n = 1 The proof of the equality statement follows the Dirichlet case in Theorem 3.1 up to the point where N = 4 and u = cos(ωx1 ) cos(ωx2 ), contained in the open square S = (−π/2ω, π/2ω)2 . We want to deduce a contradiction, and D so that the only way for equality to hold when n = 1 is for T to be a scalar multiple of an orthogonal matrix. Equality must hold in the application of Cauchy–Schwarz at (7.1), except using R instead instead of D. Hence of T and using D RU −1 τ (x) = RU −1 τ (x) = RU −1 τ (x) = RU −1 τ (x) (7.2) 1 2 3 4
1816
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
here we use that u(x)2 > 0 for almost every (with respect to arclength measure) x ∈ S ∩ ∂ D; on S. Consider x-value and write τ1 and τ2 for the components of the tangent vector τ (x). τ such an −τ Then |R τ12 | = |R τ12 | by (7.2), or (r1 τ1 )2 + (r2 τ2 )2 = (−r1 τ2 )2 + (r2 τ1 )2 . Since r12 = r22 , we can simplify to τ12 = τ22 . Thus the tangent line at x has slope ±1, and hence so does the normal vector. √ The four possible normal vectors are n(x) = (ε1 , ε2 )/ 2 where ε1 , ε2 ∈ {−1, 1}. Thus the Robin boundary condition ∂u ∂n + σ u = 0 says ε1 ux1 + ε2 ux2 +
√ 2σ u = 0.
Substituting u = cos(ωx1 ) cos(ωx2 ) yields that ε1 tan(ωx1 ) + ε2 tan(ωx2 ) =
√ 2σ/ω.
lies on one of these four curves. We conclude that every point x ∈ S ∩ ∂ D These curves have slope ±1 at only finitely many points in the square S, and so we conclude lie in that square. Hence ∂ D lies entirely in the boundary of the square S. that no points of ∂ D The Robin condition fails on ∂S, though, because u = 0 there while ∂u ∂n = 0. This contradiction completes the proof. 7.3. Proof of Corollary 3.4 Take D to be a domain with rotational symmetry of order at least 3 and assume the linear transformation T has |det T | = 1, so that T (D) has the same area as D. The corollary now follows from Theorem 3.3 and the elementary inequality T −1 2HS 2|det T −1 |. 7.4. Proof of Theorem 3.5 The proof proceeds as for the Dirichlet case in Theorem 3.1, except that we must consider also the potential term in the numerator of the Rayleigh quotient. The key observation is that
−1 )v 2 dx E (W ◦ T 2 E v dx
= =
−1 2 −1 D (W ◦ U )u dx · |det T U | 2 −1 D u dx · |det T U |
W u2 dx D
by the rotational symmetry of W . The proof is now easily completed. Incidentally, the assumption in the theorem that the potential W should grow at infinity can be significantly weakened [37].
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1817
7.4.1. Equality statement for Schrödinger fundamental tone, n = 1 Just like in the Dirichlet case, the singular value decomposition allows us to reduce to T being diagonal. The analogues of Eqs. (6.4) and (6.5) are that − E1 (W ) u, h¯ 2 (ux1 x1 + ux2 x2 ) = W
2h¯ 2
r1−2
+ r2−2
− E1 (W ) u. r1−2 ux1 x1 + r2−2 ux2 x2 = W
(These equations hold pointwise a.e. by elliptic regularity theory, since the potential is locally bounded [18, Theorem 8.8].) Solving these simultaneous equations, we deduce (since r1 = r2 ) that ux1 x1 = ux2 x2 =
1 ) u. W − E1 (W 2 2h¯
(7.3)
(x) is assumed to tend to ∞ as |x| → ∞, and so W − E1 > 0 whenever |x| The potential W is sufficiently large. Multiplying (7.3) by u and integrating in the x1 direction, we deduce that − R u2x1 dx1 0 when |x2 | is sufficiently large, so that u(x1 , x2 ) = 0 for almost every x1 . Since (7.3) says that u satisfies the one-dimensional wave equation with x2 playing the role of time variable and x1 playing the role of space variable, we conclude that u = 0 a.e. in R2 . This contradiction completes the proof. 7.5. Proof of Theorem 3.6 We prove a generalization of Theorem 3.1, namely that (λ1 + · · · + λn )(T D)
1
T −1 2 + T −1 2 (λ1 + · · · + λn )(D) + − HS HS 4
(7.4)
for any bounded D having rotational symmetry of order N 4 with N even. The proof of Theorem 3.1 requires some modifications. First we show that pairwise orthogonality of the vj remains valid. Decomposing D and E = T (D) into their upper and lower halves D± = D ∩ R2± and E± = E ∩ R2± , we compute
uj uk dx · det T± U −1 .
vj vk dx = E±
D±
These upper and lower terms sum to zero because det T+ = det T− and sumption, when j = k. Thus E vj vk dx = 0. Next we consider the Rayleigh quotient of v. We decompose it as
2 E |∇v| dx 2 E v dx
=
±
D uj uk dx
= 0 by as-
(∇u)(x)U T −1 2 dx, ±
U (D± )
where in this calculation we use once more that the determinants of T+ and T− agree.
(7.5)
1818
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
Since N is even, UN/2 represents rotation by π , so that Um+N/2 (D± ) = Um (D∓ ) and Um+N/2 = −Um . Hence when we average (7.5) over the rotations U = Um we obtain
N 1 N ± m=1
=
(∇u)(x)Um T −1 2 dx ±
Um (D± )
N/2 1 N ±
+
m=1 U (D ) m ±
(∇u)(x)Um T −1 2 dx ±
Um (D∓ )
N/2 1 (∇u)(x)Um T −1 2 dx = ± N ±
=
± D
since Um (D) = D
m=1
D
N 2 1 (∇u)(x)Um T±−1 dx 2N m=1
1
−1 2
= T± HS |∇u|2 dx 4 ± D
by Lemma 5.2. Now complete the proof of (7.4) by recalling u = uj and summing over j . Then the theorem follows from (7.4) and the evaluation of the Hilbert–Schmidt norms in the next lemma. Lemma 7.1. Let T be the piecewise linear homeomorphism in Theorem 3.6. If the bounded plane domain D has rotational symmetry of order N 4, with N even, then
1
T −1 2 + T −1 2 = I0 (T D)/ I0 (D). + − HS HS 4 A3 A3 Recall I0 denotes the moment of inertia about the origin. Proof. The moment integrals over the upper and lower halves of D agree, with
xj xk dx = D+
xj xk dx,
j, k = 1, 2,
D−
because D+ maps to D− under rotation by π (that is, x → −x). Here we use evenness of the order of rotation. Hence moment matrices satisfy M(D+ ) = M(D− ) = M(D)/2. Since M(D) = 1 0the 1 2 I0 (D) 0 1 , as shown in the proof of Lemma 5.3, we deduce
1 1 0 M(D± ) = I0 (D) . 0 1 4
(7.6)
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1819
Now the moment of inertia of T D about the origin can be computed as I0 (T D) = tr M(T D) = tr M(T+ D+ ) + tr M(T− D− ) tr T± M(D± )T±† · |det T± | = ±
1 = I0 (D) tr T± T±† · |det T± | 4 ±
by (7.6)
1 = I0 (D) T+ 2HS + T− 2HS |det T± |, 4 where in the last step we used that det T+ = det T− . The Hilbert–Schmidt norm of the inverse T±−1 is related to the Hilbert–Schmidt norm of T± by (5.3), and so
2
2 1 I0 (T D) = I0 (D) T+−1 HS + T−−1 HS |det T± |3 , 4 from which the lemma follows.
2
8. Literature on maximizing low eigenvalues under area, perimeter, inradius or conformal mapping normalization This paper gives sharp upper bounds on the sum of the first n 1 eigenvalues, normalized by A3 /I . To help put these results in context, we now describe results and conjectures that apply to the low eigenvalues (n = 1, 2, 3). 8.1. Dirichlet eigenvalues The quantity λ1 A2 /L2 (where L is the perimeter) is maximal among triangles for the equilateral triangle, by work of Siudeja [51]. This result is stronger than Pólya’s upper bound (3.5) on λ1 A3 /I , because AL2 /I = 36(l1 + l2 + l3 )2 /(l12 + l22 + l33 ) by (3.3) and this ratio is maximal for the equilateral triangle (when l1 = l2 = l3 ). Further, the normalized spectral gap (λ2 − λ1 )A2 /L2 is maximal among triangles for the equilateral, by more recent work of Siudeja [52], and thus λ2 A2 /L2 is maximal for the equilateral also. Hence (λ2 − λ1 )A3 /I and λ2 A3 /I are maximal for the equilateral, which improves on Corollary 3.2 for n = 2. Among general convex domains, λ1 A2 /L2 is maximal for degenerate rectangles by work of Pólya [46]. That result differs from our Conjecture 4.1 on λ1 A3 /I , where the equilateral triangle should also be a maximizer. Turning now to the inradius R, it is easy to see for triangles (or any polygon with an inscribed circle) that A/L is proportional to R. Hence the preceding upper bounds for eigenvalues of triangles using A2 /L2 can be restated using a normalizing factor of inradius squared. In particular, λ1 R 2 is maximal for the equilateral triangle. A more general result is due to Solynin [53]:
1820
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
among all N -gons with an inscribed circle, λ1 R 2 is maximal for the regular N -gon. Of course, among general domains the maximizer of λ1 R 2 is simply the disk, by domain monotonicity. For area normalization, Antunes and Freitas [2, Conjecture 6.1] conjecture that the Faber– Krahn lower bound on λ1 A has a sharp upper analogue that includes an isoperimetric correction term: they conjecture that among simply connected plane domains, 2 λ1 A πj0,1
π 2 L2 − 4π + 4 A
with equality for the disk and (in a limiting sense) for degenerate rectangles. Under a conformal mapping normalization, Pólya and Schiffer proved lower bounds on sums of reciprocal eigenvalues 1/λ1 + · · · + 1/λn , with the disk being extremal [48]. Extensions to surfaces with bounded curvature were proved by Bandle [8, p. 120], and to spectral zeta functions and doubly connected surfaces by Laugesen and Morpurgo [31,32]. Lastly, the scale invariant ratio λ2 /λ1 is maximal for the equilateral triangle among acute triangles, by work of Siudeja [52]. The conjecture remains open for obtuse triangles. For general domains, this Payne–Pólya–Weinberger functional is known to be maximal for the disk, by Ashbaugh and Benguria [6]. 8.2. Neumann eigenvalues Stronger inequalities are known than the one we found for μ2 A3 /I in (3.7) (which is the case n = 2 of Corollary 3.2). In fact, μ2 A is maximal for the equilateral triangle among triangles, and for the square among parallelograms, and for the disk among all bounded plane domains. The first of these stronger inequalities was proved recently by the authors [33, Theorem 3.1]. The second, for parallelograms, is unpublished work of the authors. The third inequality is a result of Szeg˝o and Weinberger [55,56]. These inequalities for μ2 A are stronger because A2 /I is maximal for the equilateral triangle among triangles, for the square among parallelograms, and for the disk among all domains. Our inequalities in Corollary 3.2 hold for all n 2. In contrast, the stronger inequalities fail to extend to n = 3. The maximizing domains are instead somewhat elongated: the “arithmetic mean” (μ2 + μ3 )A seems to be maximal among isosceles triangles for an aperture slightly greater than π/6 (according to numerical work), rather than for the equilateral triangle with aperture π/3; and (μ2 +μ3 )A seems to be maximal among parallelograms for the 2:1 rectangle rather than the square (see [7, §5] for comments on rectangles). The maximizer among convex domains is apparently not known. The only positive result is that the disk is maximal among 4-fold sym√ metric domains [7, §4]. Incidentally, it is open to maximize the geometric mean μ2 μ3 A. The disk is conjectured to be extremal, by I. Polterovich. Among convex plane domains, it is open to maximize μ2 L2 . The disk is not the maximizer, because the equilateral triangle and the square have a larger value (in fact, the same value). The maximizer for μ2 D 2 , where D is diameter, is known to be the degenerate obtuse isosceles triangle by work of Cheng [10, Theorem 2.1], [34, Proposition 3.6]. For the problems mentioned above, and for related conjectures on triangles, see [33, §IX]. Sums of reciprocal Neumann eigenvalues were minimized by Dittmar [12], under conformal mapping normalization.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1821
8.3. Lower bounds Sharp lower bounds on Dirichlet eigenvalue sums for triangles are proved in a companion paper [35], under diameter normalization. Lower bounds for the Neumann eigenvalue μ2 are found in an earlier work [34]. References to other lower bounds can be found in those papers. Acknowledgment We are grateful to Mark Ashbaugh for guiding us to relevant literature. Appendix A. Eigenvalues of equilateral triangles, rectangles, disks The Dirichlet eigenfunctions of equilateral triangles were derived about 150 years ago by Lamé [29, pp. 131–135]. (See the treatment in the text of Mathews and Walker [40, pp. 237–239] or in the paper by Pinsky [44]. Note also the recent exposition by McCartin [41].) Dirichlet eigenfunctions of rectangles and disks are well known too [8]. The eigenvalues are: 16π 2 /9 j12 + j1 j2 + j22 : j1 , j2 1 for an equilateral triangle of side 1, 2 π (j1 / l1 )2 + (j2 / l2 )2 : j1 , j2 1 for a rectangle of side lengths l1 , l2 , 2 jm,p : m 0, p 1 for the unit disk, where jm,p is the pth zero of the Bessel function Jm . The Neumann eigenvalues are: 16π 2 /9 j12 + j1 j2 + j22 : j1 , j2 0 for an equilateral triangle of side 1, 2 π (j1 / l1 )2 + (j2 / l2 )2 : j1 , j2 0 for a rectangle of side lengths l1 , l2 , 2 jm,p : m 0, p 1 for the unit disk, where jm,p is the pth zero of the Bessel derivative Jm . See [8,42]. The Robin eigenvalues of rectangles and disks can be found by separation of variables. The eigenvalues are known also for the equilateral triangle [43].
References [1] P. Antunes, P. Freitas, New bounds for the principal Dirichlet eigenvalue of planar regions, Experiment. Math. 15 (2006) 333–342. [2] P. Antunes, P. Freitas, A numerical study of the spectral gap, J. Phys. A 41 (2008) 055201, 19 pp. [3] P. Antunes, P. Freitas, On the inverse spectral problem for Euclidean triangles, Proc. Roy. Soc. A (2010), online. [4] M.S. Ashbaugh, Isoperimetric and universal inequalities for eigenvalues, in: Spectral Theory and Geometry, Edinburgh, 1998, in: London Math. Soc. Lecture Note Ser., vol. 273, Cambridge Univ. Press, Cambridge, 1999, pp. 95–139. [5] M.S. Ashbaugh, The universal eigenvalue bounds of Payne–Pólya–Weinberger, Hile–Protter, and H.C. Yang, in: Spectral and Inverse Spectral Theory, Goa, 2000, Proc. Indian Acad. Sci. Math. Sci. 112 (2002) 3–30. [6] M.S. Ashbaugh, R.D. Benguria, A sharp bound for the ratio of the first two eigenvalues of Dirichlet Laplacians and extensions, Ann. of Math. (2) 135 (1992) 601–628. [7] M.S. Ashbaugh, R.D. Benguria, Universal bounds for the low eigenvalues of Neumann Laplacians in n dimensions, SIAM J. Math. Anal. 24 (1993) 557–570.
1822
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
[8] C. Bandle, Isoperimetric Inequalities and Applications, Pitman, Boston, MA, 1979. [9] F. Berezin, Covariant and contravariant symbols of operators, Izv. Akad. Nauk SSSR 37 (1972) 1134–1167 (in Russian); English transl. in: Math. USSR-Izv. 6 (1972) (1973) 1117–1151. [10] S.Y. Cheng, Eigenvalue comparison theorems and its geometric applications, Math. Z. 143 (1975) 289–297. [11] O. Christensen, An Introduction to Frames and Riesz Bases, Birkhäuser, Boston, 2003. [12] B. Dittmar, Free membrane eigenvalues, Z. Angew. Math. Phys. 60 (2009) 565–568. [13] R.L. Frank, M. Loss, T. Weidl, Pólya’s conjecture in the presence of a constant magnetic field, J. Eur. Math. Soc. (JEMS) 11 (2009) 1365–1383. [14] P. Freitas, Upper and lower bounds for the first Dirichlet eigenvalue of a triangle, Proc. Amer. Math. Soc. 134 (2006) 2083–2089. [15] P. Freitas, Precise bounds and asymptotics for the first Dirichlet eigenvalue of triangles and rhombi, J. Funct. Anal. 251 (2007) 376–398. [16] P. Freitas, B. Siudeja, Bounds for the first Dirichlet eigenvalue of triangles and quadrilaterals, ESAIM Control Optim. Calc. Var. 16 (3) (2010) 648–676. [17] F. Gesztesy, Z. Zhao, Domain perturbations, Brownian motion, capacities, and ground states of Dirichlet Schrödinger operators, Math. Z. 215 (1994) 143–150. [18] D. Gilbarg, N.S. Trudinger, Elliptic Partial Differential Equations of Second Order, Classics Math., Springer-Verlag, Berlin, 2001, reprint of the 1998 edition. [19] A. Girouard, N. Nadirashvili, I. Polterovich, Maximization of the second positive Neumann eigenvalue for planar domains, J. Differential Geom. 83 (2009) 637–662. [20] D. Han, K. Kornelson, D. Larson, E. Weber, Frames for Undergraduates, Stud. Math. Libr., vol. 40, American Mathematical Society, Providence, RI, 2007. [21] E.M. Harrell II, L. Hermi, Differential inequalities for Riesz means and Weyl-type bounds for eigenvalues, J. Funct. Anal. 254 (2008) 3173–3191. [22] A. Henrot, Extremum Problems for Eigenvalues of Elliptic Operators, Front. Math., Birkhäuser Verlag, Basel, 2006. [23] J. Hersch, Contraintes rectilignes parallèles et valeurs propres de membranes vibrantes, Z. Angew. Math. Phys. 17 (1966) 457–460. [24] W. Hooker, M.H. Protter, Bounds for the first eigenvalue of a rhombic membrane, J. Math. Phys. 39 (1960/1961) 18–34. [25] R. Kellner, On a theorem of Pólya, Amer. Math. Monthly 73 (1966) 856–858. [26] S. Kesavan, Symmetrization & Applications, Ser. Anal., vol. 3, World Scientific Publishing, Hackensack, NJ, 2006. [27] P. Kröger, Upper bounds for the Neumann eigenvalues on a bounded domain in Euclidean space, J. Funct. Anal. 106 (1992) 353–357. [28] P. Kröger, Estimates for sums of eigenvalues of the Laplacian, J. Funct. Anal. 126 (1994) 217–227. [29] M.G. Lamé, Leçons sur la Théorie Mathématique de L’Élasticité des Corps Solides, Deuxième édition, Gauthier– Villars, Paris, 1866. [30] A. Laptev, Dirichlet and Neumann eigenvalue problems on domains in Euclidean spaces, J. Funct. Anal. 151 (1997) 531–545. [31] R.S. Laugesen, Eigenvalues of the Laplacian on inhomogeneous membranes, Amer. J. Math. 120 (1998) 305–344. [32] R.S. Laugesen, C. Morpurgo, Extremals for eigenvalues of Laplacians under conformal mapping, J. Funct. Anal. 155 (1998) 64–108. [33] R.S. Laugesen, B.A. Siudeja, Maximizing Neumann fundamental tones of triangles, J. Math. Phys. 50 (2009) 112903. [34] R.S. Laugesen, B.A. Siudeja, Minimizing Neumann fundamental tones of triangles: an optimal Poincaré inequality, J. Differential Equations 249 (2010) 118–135. [35] R.S. Laugesen, B.A. Siudeja, Dirichlet eigenvalue sums on triangles are minimal for equilaterals, Preprint, 2010, arXiv:1008.1316. [36] R.S. Laugesen, B.A. Siudeja, Sums of Laplace eigenvalues—rotations and tight frames in higher dimensions, Preprint, 2010, http://www.math.uiuc.edu/~laugesen/. [37] D. Lenz, P. Stollman, D. Wingert, Compactness of Schrödinger semigroups, Math. Nachr. 283 (2010) 94–103. [38] P. Li, S.-T. Yau, On the Schrödinger equation and the eigenvalue problem, Comm. Math. Phys. 88 (1983) 309–318. [39] Z. Lu, J. Rowlett, The fundamental gap conjecture on polygonal domains, Preprint, arXiv:0810.4937, 2008. [40] J. Mathews, R.L. Walker, Mathematical Methods of Physics, second ed., W.A. Benjamin, New York, 1970. [41] B.J. McCartin, Eigenstructure of the equilateral triangle. I. The Dirichlet problem, SIAM Rev. 45 (2003) 267–287. [42] B.J. McCartin, Eigenstructure of the equilateral triangle. II. The Neumann problem, Math. Probl. Eng. 8 (2002) 517–539.
R.S. Laugesen, B.A. Siudeja / Journal of Functional Analysis 260 (2011) 1795–1823
1823
[43] B.J. McCartin, Eigenstructure of the equilateral triangle. III. The Robin problem, Int. J. Math. Math. Sci. (2004) 807–825. [44] M.A. Pinsky, Completeness of the eigenfunctions of the equilateral triangle, SIAM J. Math. Anal. 16 (1985) 848– 851. [45] G. Pólya, Sur le rôle des domaines symétriques dans le calcul de certaines grandeurs physiques, C. R. Acad. Sci. Paris 235 (1952) 1079–1081. [46] G. Pólya, Two more inequalities between physical and geometrical quantities, J. Indian Math. Soc. (N.S.) 24 (1960) (1961) 413–419. [47] G. Pólya, On the eigenvalues of vibrating membranes, Proc. Lond. Math. Soc. (3) 11 (1961) 419–433. [48] G. Pólya, M. Schiffer, Convexity of functionals by transplantation, J. Anal. Math. 3 (1953–1954) 245–345, reprinted in: George Pólya: Collected Papers, vol. 3, MIT Press, Cambridge, MA, 1984, pp. 290–390. [49] G. Pólya, G. Szeg˝o, Isoperimetric Inequalities in Mathematical Physics, Princeton University Press, Princeton, NJ, 1951. [50] M. Reed, B. Simon, Methods of Modern Mathematical Physics. IV. Analysis of Operators, Academic Press (Harcourt Brace Jovanovich Publishers), New York, 1978. [51] B. Siudeja, Sharp bounds for eigenvalues of triangles, Michigan Math. J. 55 (2007) 243–254. [52] B. Siudeja, Isoperimetric inequalities for eigenvalues of triangles, Indiana Univ. Math. J. 59 (2010) 1087–1120. [53] A.Yu. Solynin, Isoperimetric inequalities for polygons and dissymetrization, Algebra i Analiz 4 (1992) 210–234 (in Russian); translation in: St. Petersburg Math. J. 4 (1993) 377–396. [54] R.S. Strichartz, Estimates for sums of eigenvalues for domains in homogeneous spaces, J. Funct. Anal. 137 (1996) 152–190. [55] G. Szeg˝o, Inequalities for certain eigenvalues of a membrane of given area, J. Ration. Mech. Anal. 3 (1954) 343– 356. [56] H.F. Weinberger, An isoperimetric inequality for the N -dimensional free membrane problem, J. Ration. Mech. Anal. 5 (1956) 633–636.
Journal of Functional Analysis 260 (2011) 1824–1835 www.elsevier.com/locate/jfa
On a probabilistic approach to the Schrödinger equation with a time-dependent potential Halim Doss Université de Paris-Dauphine CEREMADE, UMR CNRS no 7534, Place du Maréchal de Lattre de Tassigny, 75775, Paris cedex 16, France Received 7 July 2010; accepted 1 December 2010 Available online 22 December 2010 Communicated by Daniel W. Stroock
Abstract We study, by probabilistic methods, some classes of Schrödinger equations related to time-dependent potentials, analytic with respect to the space variable. © 2010 Elsevier Inc. All rights reserved. Résumé On étudie, par des méthodes probabilistes, certaines classes d’Équations de Schrödinger associées à des potentiels dépendant du temps, analytiques en la variable d’espace. © 2010 Elsevier Inc. All rights reserved. Keywords: Schrödinger equation; Time-dependent potentials; Analytic functions; Brownian motion; Stochastic differential equations
Consider the Schrödinger equation: ⎧ ⎨
h2 ∂Ψ (t, x) = − Ψ (t, x) + V (t, x)Ψ (t, x), 2m ⎩ ∂t Ψ (0, x) = f (x) ıh
(1)
where t ∈ R+ , x ∈ Rn , ı 2 = −1, V (resp. f ) is a sufficiently regular map from R+ × Rn E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.007
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
(resp. Rn ), to the complex numbers C, h > 0, m > 0 are constants, =
1825
n
∂2 l=1 ∂x 2 l
is the usual
Laplacian. First of all, we introduce, for each p ∈ R∗ , a small perturbation p of the operator (p “tends” to 0 = , when p → 0) such that, if the potential V = (V (t, x)) and the initial condition f = (f (x)) admit continuous extensions to R+ × Cn and Cn respectively, holomorphic with respect to the space variable x, without any growth condition at infinity, then problem (1) (associated to p ), admits a unique strong solution Ψ = (Ψ (t, x)) which can be extended as a C 1 map from R+ × Cn to C, analytic with respect to x ∈ Cn . Moreover we have, under these conditions, a Feynman–Kac type stochastic representation of the solution Ψ . When the parameter p is equal to zero, we remark that problem (1) admits similarly a unique “regular” solution, by the same method and under some analyticity and growth conditions at infinity, also expressed in [7]. The present work is therefore a natural extension of the results established in [7,8] (see also [13,14]) to the case where the potential is time-dependent. It may also be related to the numerous studies devoted to the same problem and using the Feynman Integral developed, for instance, in [1–3,9–12] and references therein. However and to the best of our knowledge, the class of time-dependent potentials that we are able to handle here is totally new. In the sequel, we assume, without loss of generality, that the constant m, in problem (1), is equal to 1. Assumption (I). from R+ × Cn to C such that, for each t ∈ R+ , the partial 1. There exists a continuous map V n |R+ ×Rn = V . map: x ∈ C → V (t, x) ∈ C is holomorphic and V n 2. There exists a holomorphic map f from C to C such that f|Rn = f . We introduce a filtered probability space: (Ω, F , (Ft )t0 , P ) satisfying the usual conditions, and an Ft -Brownian motion (B t )t0 = (B1 (t), . . . , Bn (t), Bn+1 (t))t0 with values in Rn+1 such that B 0 = 0 a.s. All the proofs in the sequel are based on the following Itô formula, valid for holomorphic functions. Lemma 1. Consider (Z1 (t))t0 , . . . , (Zd (t))t0 , d complex-valued continuous Ft -semi-martingales and ϕ = (ϕ(t, x))t0, x∈Cd a C 1 map from R+ × Cd to C such that, for each t 0, the map: x ∈ Cd → ϕ(t, x) ∈ C is holomorphic. If Zt = (Z1 (t), . . . , Zd (t)), then we have, a.s., for every t 0: t ϕ(t, Zt ) = ϕ(0, Z0 ) + 0
∂ϕ (s, Zs ) ds + ∂t d
t
l=1 0
∂ϕ (s, Zs ) dZl (s) ∂xl
d t
∂ 2ϕ 1 (s, Zs ) d Z l , Z k s + 2 ∂xl ∂xk l,k=1 0
where
(2)
1826
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
Z l , Z k = Z l + ı Z l , Z k + ı(Zk )
= Z l , Z k − Z l , (Zk ) + ı Z l , Z k + Z l , (Zk ) .
Proof. Immediate, using the standard Itô formula and the analyticity condition, cf. [7].
2
1. Perturbations p , p = 0, of the Laplacian For each p ∈ R∗ and x = (x1 , x2 , . . . , xn ) ∈ Cn , we define n √ ∂2 (1 + ıpxl )2 2 p (x) = ∂xl l=1
(∗)
√ √ , ı 2 = −1. where ı = 1+ı 2 First, we study problem (1) by substituting by p . Theorem 1. Let p ∈ R∗ . Consider the Cauchy problem: ⎧ ⎨
h2 ∂ Ψ (t, x) = − p Ψ (t, x) + V (t, x)Ψ (t, x), 2 ⎩ ∂t Ψ (0, x) = f (x), t 0, x ∈ Rn ıh
(3)
where the data V and f satisfy Assumption (I). The problem (3) admits then a unique strong solution Ψ = (Ψ (t, x))t0,x∈Rn which can be extended as a C 1 map from R+ × Cn to C, analytic, for each t 0, with respect to the space variable x ∈ Cn . In addition, one has the following representation, for each (t, x) ∈ R+ × Cn :
t x 1 x Ψ (t, x) = E f Xt exp V t − s, Xs ds ıh
(4)
0
where (Xsx )s0 = (X1 (s), . . . , Xn (s))s0 is a diffusion process with values in Cn , given by ⎧ √ 1 1 2 1 ⎨ X (s) = exp ıp p hB (s) + hs − √ , + x √ l l l 2 p ı p ı ⎩ n l ∈ {1, 2, . . . , n}, s 0, x = (x1 , x2 , . . . , xn ) ∈ C .
(5)
Proof. Let x ∈ Cn , y ∈ C and 0 s u be fixed. Consider the solution Zt = Zts (x, y), s t u, of the following S.D.E. in Cn × C Cn+1 : t t x Zt = + σ (Zv ) dB v + b(v, Zv ) dv, y s
t ∈ [s, u]
(6)
s
where, for each z = (z1 , . . . , zn , zn+1 ) ∈ Cn+1 , v ∈ [s, u], σ (z) is the (n + 1, n + 1) complex diagonal matrix given by
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
σl,l (z) =
√ √ ıh 1 + p ızl ,
1827
l = 1, 2, . . . , n,
σn+1,n+1 (z) = 0 and ⎧ ⎨ b(v, z) = bl (v, z) l=1,2,...,n+1 , ⎩ bn+1 (v, z) = 1 V (u − v, z), bl (v, z) = 0 if l ∈ {1, 2, . . . , n}. ıh A simple computation shows that the Cn+1 -valued process Zt = Zts (x, y) (s t u), is given by the explicit formulae: ⎧ Zt = Z1 (t), . . . , Zn (t), Zn+1 (t) , where for l ∈ {1, 2, . . . , n}: ⎪ ⎪ ⎪ ⎪ √ 1 2 ⎪ 1 1 ⎪ ⎪ √ + xl exp ıp h Bl (t) − Bl (s) + p h(t − s) − √ , ⎨ Zl (t) = 2 p ı p ı ⎪ t ⎪ ⎪ 1 ⎪ ⎪ u − v, Z1 (v), . . . , Zn (v) dv. ⎪ Zn+1 (t) = y + V ⎪ ⎩ ıh
and (7)
s
Note that the diffusion process (Zts [(x, y), •])t∈[s,u] given by (6) and (7) is such that, for almost all ω ∈ Ω, the map (x, y) ∈ Cn+1 → Zts [(x, y), ω] ∈ Cn+1 is analytic, and we have, furthermore, the following remarkable property: ⎧ for each compact set K ⊆ Cn+1 , T > 0, (α, β) ∈ N × N: ⎪ ⎪ ⎪ α+β ⎪ ⎨ ∂ s C (x, y), ω Z Sup ω∈Ω t 0stuT ∂x α ∂y β ⎪ ⎪ ⎪ K (x,y)∈ ⎪ ⎩ where C = CK,T ,(α,β) is a positive constant
(8)
and | • | is the usual norm on Cn+1 . Now, let us denote by H the set of holomorphic maps from Cn+1 to C. For each r ∈ H, 0 s t u and (x, y) ∈ Cn × C, we put
Π(s,t) r(x, y) = E r Zts (x, y), • .
(9)
Remark, thanks to property (8), that Π(s,t) r(x, y) is well defined and holomorphic with respect to (x, y) ∈ Cn+1 . Lemma 2. Given the preceding definitions, Π(s,t) r(x, y) has a continuous derivative with respect to the variables s and t, under the condition 0 s t u. Proof. We know, by the Markov property, that for every 0 s t u and (x, y) ∈ Cn × C,
E r Zus (x, y) /Ft = Π(t,u) r Zts (x, y) ,
a.s.
(10)
1828
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
and so
Π(s,u) r(x, y) = E Π(t,u) r Zts (x, y) .
(11)
Let us denote by Lt the “infinitesimal generator” of the diffusion process (Zts (x, y)): ⎧ for every (x, y) ∈ Cn × C, t ∈ [s, u], and r ∈ H: ⎪ ⎨ n 2 √ ıh 1 ∂ 2 ∂ r(x, y). L r(x, y) = (1 + ıpx ) + V (u − t, x) ⎪ l ⎩ t 2 ∂y ∂xl2 ıh
(12)
l=1
Applying Lemma 1, we see, first, that for every t ∈ [s, u]:
Π(s,t) r(x, y) = E r Zts (x, y) = r(x, y) +
t
E Lv r Zvs (x, y) dv
(13)
s
since E
n t √ ∂r s √ Z ıh 1 + p ıZl (v) dBl (v) = 0 ∂xl v l=1 s
the integrability conditions justifying these computations are satisfied, by the estimations (8). We conclude, by (13), that the map: t ∈ [s, u] → Π(s,t) r(x, y) has a continuous derivative on [s, u]. Let us now study the derivative with respect to s, using formula (11) and putting θ (s) = Π(s,u) r(x, y)
for s ∈ [0, u[.
It follows from Lemma 1 and (8), that if t ∈ [s, u],
θ (s) = E Π(t,u) r Zts (x, y) t = Π(t,u) r(x, y) +
E Lv Π(t,u) r Zvs (x, y) dv.
s
Therefore, if 0 s < t < u: θ (s) − θ (t) 1 =− (s − t) (t − s) and we have, by continuity:
t s
E Lv [Π(t,u) r] Zvs (x, y) dv,
(14)
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
lim
θ (s) − θ (t) = −Lt [Π(t,u) r](x, y) (s − t)
lim
θ (s) − θ (t) = −Ls [Π(s,u) r](x, y). (s − t)
s→t s
1829
and
t→s t>s
So, the left and right derivatives of the function θ , defined by (14), exist and are equal and continuous on [0, u[. We conclude, by the preceding computations that for every 0 t u, (x, y) ∈ Cn × C and r ∈ H, the map s ∈ [0, t] → Π(s,t) r(x, y) has a continuous derivative on [0, t] given by ∂ Π(s,t) r(x, y) = −Ls [Π(s,t) r](x, y). ∂s
2
(15)
End of the proof (Theorem 1): For every (x, y) ∈ Cn × C, let us denote r(x, y) = f(x) exp(y) where f satisfy Assumption (I). Consider, for each t ∈ [0, u] t (x, y) = Π(u−t,u) r(x, y). Ψ
(16)
t (x, y) is holomorphic with respect to The preceding considerations (Lemma 2) show that Ψ (x, y), C 1 with respect to t and we see, substituting in formula (15), t by u and s by u − t, is a solution of the following problem: respectively, that Ψ ⎧ ⎨ ∂Ψ t (x, y) = Lu−t [Ψ t ](x, y), ∂t ⎩ Ψ0 (x, y) = r(x, y) = f(x) exp(y);
(17) (x, y) ∈ Cn × C, t ∈ [0, u];
but t ](x, y) = Lu−t [Ψ
n 2 ∂ √ ıh 1 2 ∂ t (x, y) Ψ (1 + ıpxl ) + V u − (u − t), x 2 ∂y ∂xl2 ıh l=1
and
t (x, y) = E r Zuu−t (x, y) = E f Z1 (u), . . . , Zn (u) exp Zn+1 (u) Ψ
(18)
1830
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
where, for each l ∈ {1, 2, . . . , n} and v u − t: Zl (v) is given by formula (7) where we substitute t by v and s by u − t respectively; furthermore 1 Zn+1 (u) = y + ıh
u
u − v, Z1 (v), . . . , Zn (v) dv V
u−t
1 =y+ ıh
t
t − w, Z1 (w + u − t), . . . , Zn (w + u − t) dw. V
0
We remark then, by homogeneity, that the processes (Z1 (w + u − t), . . . , Zn (w + u − t))w0 x) x and (Xw w0 have the same law, where (Xw )w0 is given by formula (5). So, if Ψ (t, x) and Ψt (x, y) are defined by formulae (4) and (16) respectively, we have the following relation: t (x, y) = Ψ (t, x) exp(y) Ψ
(19)
and, coming back to Eqs. (17) and (18), we see that (Ψ (t, x))t0, x∈Cn gives us a strong solution of the Cauchy problem (3), satisfying the conditions imposed in Theorem 1. Uniqueness: Let (X (t, x)) be a strong solution of the Cauchy problem (3), satisfying the conditions imposed in Theorem 1. For each (x, y) ∈ Cn × C and t 0 define t (x, y) = X (t, x) exp(y). X
(20)
Let u ∈ R∗+ and consider (Zt )t∈[0,u] the process solving S.D.E. (6) (where we fix s = 0), given by (7). Introduce, for every t ∈ [0, u]: u−t (Zt ) = X u − t, Z1 (t), . . . , Zn (t) exp Zn+1 (t) . ϕ(t) = X We see, thanks to Lemma 1 and using the notation of Theorem 1, that ϕ(u) = f Z1 (u), . . . , Zn (u) exp Zn+1 (u) u x 1 x = f Xu exp y + V u − s, Xs ds ıh 0
u ∂ = ϕ(0) + Mu + − Xu−v (Zv ) + Lv Xu−v (Zv ) dv ∂u 0
u (x, y) + Mu =X
(21)
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
1831
where Mu is a square integrable stochastic integral, such that E{Mu } = 0 (thanks to estimations (8)) and Lv is the “infinitesimal generator” given by (12) (substituting t by v in that formula). Taking expectations on both sides of (21), we conclude that for every u > 0 and (x, y) ∈ Cn × C, we have u x 1 x Xu (x, y) = E f Xu exp y + V u − s, Xs ds ıh 0
= Ψ (u, x) exp(y) = X (u, x) exp(y) and hence, for every u 0 and x ∈ Cn : X (u, x) = Ψ (u, x).
2
Remark 1. Let us come back to formula (10) (Markov property); we see that the process:
Π(t,u) r Zts (x, y) , t ∈ [s, u]
is a continuous Ft -martingale on [s, u]. Moreover, knowing that Π(t,u) r(x, y) has a continuous derivative with respect to t (on [s, u]), and is analytic with respect to (x, y) ∈ Cn × C, we can apply again Lemma 1: ⎧ a.s., for every t ∈ [s, u], ⎪ ⎪ s ⎪ ⎪ ⎪ ⎨ Π(t,u) r Zt (x, y) = Π(s,u) r(x, y) + Nt t ⎪ s s ∂ ⎪ ⎪ Π(v,u) r Zv (x, y) + Lv r Zv (x, y) dv + ⎪ ⎪ ⎩ ∂v
(22)
s
where Lv is given in (12) and (Nt )t∈[s,u] is a continuous Ft -martingale. Appealing to classical theory (cf. e.g. [7]), we deduce from (22) that ⎧ ⎨ a.s., for every v ∈ [s, u], ∂ ⎩ Π(v,u) r Zvs (x, y) + Lv r Zvs (x, y) = 0 ∂v
(23)
and, if v = s: ∂ Π(s,u) r(x, y) + Ls r(x, y) = 0, ∂s recovering formula (15). Remark 2. Let us clarify, from a probabilistic point of view, in what sens the operator p , p = 0, given by (∗), converges to , when p → 0.
1832
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
For each p ∈ R∗ and x ∈ Cn , consider x p,x Xs s0 = Xs s0 = X1 (s), . . . , Xn (s) s0 the diffusion process with values in Cn , given by (5), appearing in the Feynman–Kac formula (4) (see Theorem 1). We see that, for each l ∈ {1, 2, . . . , n}, (Xl (s))s0 is a solution of the following S.D.E.: √ √ Xl (s) = xl + ıh 1 + ıpXl (s) dBl (s) s
(24)
0
(cf. [7,6]) and we deduce from (24), using classical estimations, that: for each T > 0 and compact K ⊆ Cn , there exists a constant C = CT ,K > 0 such that for every p ∈ ([−1, +1]\{0}): √ 2 p,x
Supx∈K E Supt∈[0,T ] Xt − (x + ıhBt ) p 2 C − −−→ 0 p→0
(25)
where (Bt )t0 = (B1 (t), . . . , Bn (t))t0 . p,x
Therefore, the diffusion process (Xt )t0 , related to the operator ıh 2 p (via Theorem 1), √ (cf. Theorem 2, below). “converges”, when p → 0, to the process (x + ıhBt )t0 , related to ıh 2 2. Study of the limit case p = 0 Let be a non-empty open set of Rn and V (resp. f ), a sufficiently regular map from R+ × (resp. ), to the complex numbers C. As in [7], we study here, under analyticity conditions, the Schrödinger equation: ⎧ ⎨
∂Ψ h2 (t, x) = − Ψ (t, x) + V (t, x)Ψ (t, x), 2 ⎩ ∂t Ψ (0, x) = f (x) ıh
(26)
where (t, x) ∈ R+ × , ı 2 = −1. Consider D = D the open set of Cn given by
√ D = x + ıy where x ∈ , y ∈ Rn .
(27)
Assumption (I ). from R+ × D to C such that, for each t ∈ R+ , the partial 1. There exists a continuous map V (t, •) : x ∈ D → V (t, x) ∈ C is holomorphic and V |R+ × = V . map V 2. There exists a holomorphic map f from D to C such that f| = f . We are going to formulate a theorem analogous to Theorem 1, and which corresponds to the p,x limit case p = 0. Note, however, that the diffusion process (Xtx )t0 = (Xt )t0 related to the
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
1833
operator ıh 2 p , which satisfies estimations (8), when p = 0, must be substituted, when p = 0 by the simple process (Xt0,x )t0 where Xt0,x = x +
√ ıhBt
(28)
and since the latter process doesn’t satisfy estimations (8), we shall introduce, as in [7], for and f. integrability reasons, some growth conditions at infinity concerning the data V The open set D = D ⊆ Cn being given by (27), we introduce the space: (∗∗) T = {ϕ : D → C satisfying: for each x o ∈ , there exists an open neighbourhood Ux o ⊆ of x o and positive√constants αx o and βx o such that, if (x, y) ∈ Ux o × Rn , we have the inequality |ϕ(x + ıy)| exp(αx o + βx o .|y|)}. Assumption (II). Assumption (I ) being satisfied, we assume furthermore that (t, •)} ∈ T where V is the imaginary part of V . 1. For every T > 0: Supt∈[0,T ] exp{V 2. f ∈ T . Theorem 2. Under Assumption (II) about the data f and V , the problem (26) admits a unique strong solution Ψ = (Ψ (t, x))(t,x)∈R+ × which can be extended as a C 1 map from R+ × D to C, analytic with respect to x, x ∈ D, and such that, for every T > 0: Supt∈[0,T ] |Ψ (t, •)| ∈ T . Moreover, one has the following representation, for each (t, x) ∈ R+ × D: Ψ (t, x) = E f(x +
√
1 ıhBt ) exp ıh
t
√ (t − s, x + ıhBs ) ds V
.
(29)
0
Proof. It follows, step by step, the proof of Theorem 1, as the random variables involved in this context are integrable, thanks to Assumption (II); cf. [7]. 2 Examples. Let v be continuous a map from R+ × C to C such that, for every t 0, the partial map: x ∈ C → v(t, x) ∈ C is holomorphic. (1) Given l = (l1 , l2 , . . . , ln ) ∈ Rn \{0} and c ∈ R, we consider the open set of Rn :
= x = (x1 , x2 , . . . , xn ) ∈ Rn such that l.x + c = 0 where l.x =
n
j =1 lj xj ,
and the map V : R+ × → C defined by
V (t, x) = v t,
1 , |l.x + c|r
for every (t, x) ∈ R+ ×
(30)
where r > 0 is fixed. We introduce the open set of Cn D = D , given by (27). Let f be an analytic map from D to C, belonging to the space T , defined by (∗∗).
1834
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
Proposition 3. With the preceding notations and assumptions about the data V and f , consider the Schrödinger equation: ⎧ ⎨
h2 1 ∂Ψ Ψ (t, x), (t, x) = − Ψ (t, x) + v t, ıh ∂t 2 |l.x + c|r ⎩ Ψ (0, x) = f (x), where (t, x) ∈ R+ × .
(31)
The problem (31) admits a unique strong solution, Ψ = (Ψ (t, x))(t,x)∈R+ × , which can be extended as a C 1 map from R+ × D to C, analytic with respect to x, x ∈ D, and such that for every T > 0, Supt∈[0,T ] |Ψ (t, •)| ∈ T . For (t, x) ∈ R+ × D, the solution is given by the formula Ψ (t, x) = E f (x +
√
1 ıhBt ) exp ıh
t √ r 2 ds v t − s, exp − log (l.x + c + ıhl.Bs ) 2 0
(32) where the symbol log[ ] represents the principal complex determination of the logarithmic function extended to C\J , where J = ıR+ . Proof. One can easily prove, using the estimations established in [7, Proposition 4], that the potential V given in (30), and the initial function f satisfy Assumption (II). Therefore Proposition 3 follows from a direct application of Theorem 2. 2 (2) With the notations of Example 1, one can handle similarly other potentials given, for instance, by ⎧ ⎪ ⎨ V (t, x) = v t,
1 , t 0; r ∈ N∗ fixed, (sin(l.x + c))r ⎪ ⎩ x ∈ = x ∈ Rn : l.x + c = kπ, for every k ∈ Z, r V (t, x) = v t, tan(l.x + c) , t 0; r ∈ N∗ fixed,
x ∈ = x ∈ Rn : l.x + c = π2 + kπ, for every k ∈ Z , V (t, x) = v t, P (x) , t 0, x ∈ Rn
(33)
(34) (35)
where P (•) is a polynomial function on Cn of degree d ∈ N∗ , P (x) = a0 + a1 .x + · · · + ad .x d , with the following conditions: • al , l = 0, 1, . . . , d is a symmetric multilinear map from (Cn )l to C such that al [(Rn )l ] ⊆ R; • d = 2 + 4k, k ∈ N and (−1)k .ad < 0. The previous examples illustrate the fact that, by Theorem 2, one can solve the Schrödinger equation with time-dependent potentials admitting strong singularities.
H. Doss / Journal of Functional Analysis 260 (2011) 1824–1835
1835
Remark 3. Consider the solution Ψ = (Ψh (t, x)) of the Schrödinger equation (3) (given by Theorem 1), or (26) (given by Theorem 2). We can prove, using the results established in [4,8], for “small” t, when h → 0, semi-classical asymptotic expansions, for every N ∈ N∗ :
ı Ψh (t, x) = exp S(t, x) b0 (t, x) + b1 (t, x)h + · · · + bN (t, x)hN + ◦ hN h
(36)
where the functions S(t, x) and bl (t, x), l ∈ N, have explicit expressions with the help of Wiener integrals “around” a “critical” trajectory γ (t,x) . P.S. Our motivation for studying Schrödinger equation stems from the work of [5]. References [1] S. Albeverio, Z. Brzezniak, Z. Haba, On the Schrödinger equation with potentials which are Laplace transforms of measures, Potential Anal. 9 (1) (1998) 65–82. [2] S. Albeverio, R. Høegh-Krohn, S. Mazzuchi, Mathematical Theory of Feynman Path Integrals. An Introduction, second and enlarged edition, Lecture Notes in Math., vol. 523, Springer-Verlag, Berlin/Heidelberg, 2008. [3] S. Albeverio, S. Mazzuchi, The time-dependent quartic oscillator—a Feynman path integral approach, J. Funct. Anal. 238 (2) (2006) 471–488. [4] R. Azencott, H. Doss, L’Équation de Schrödinger quand h tend vers zéro : une approche probabiliste, in: Stochastic Aspects of Classical and Quantum Systems, Marseille, 1983, in: Lecture Notes in Math., vol. 1109, Springer, Berlin, 1985, pp. 1–17. [5] L. de Broglie, Recherches d’un demi siècle, Albin Michel, Paris, 1976. [6] H. Doss, Liens entre équations différentielles stochastiques et ordinaires, Ann. Inst. H. Poincaré XIII (2) (1977) 99–125. [7] H. Doss, Sur une Résolution Stochastique de l’Équation de Schrödinger à Coefficients Analytiques, Comm. Math. Phys. 73 (1980) 247–264. [8] H. Doss, Démonstration probabiliste de certains développements asymptotiques quasi-classiques, Bull. Sci. Math. (2) 109 (1985) 179–208. [9] M. Grothaus, L. Streit, A. Vogel, Feynman integrals as Hida distributions – the case of non-perturbative potentials, Asterisque 327 (2010) 55–68. [10] G.W. Johnson, M.L. Lapidus, The Feynman integral and Feynman’s operational calculus, Oxford Math. Monogr. (2002). [11] T. Kuna, L. Streit, W. Westerkamp, Feynman integrals for a class of exponentially growing potentials, J. Math. Phys. 39 (9) (1998) 4476–4491. [12] S. Mazzuchi, Functional integral solution for the Schrödinger equation with polynomial potential: a white noise approach, Technical Report UTM736, Mathematica, Dept. Math., Univ. of Trento, 2010. [13] H. Thaler, Solutions of Schrödinger equations on compact Lie groups via probabilistic methods, Potential Anal. 18 (2003) 119–140. [14] H. Thaler, The Doss trick on symmetric spaces, Lett. Math. Phys. 72 (2005) 115–127.
Journal of Functional Analysis 260 (2011) 1836–1885 www.elsevier.com/locate/jfa
Resonance free regions in magnetic scattering by two solenoidal fields at large separation Ivana Alexandrova a,∗,1 , Hideo Tamura b a 124 Austin Building, Department of Mathematics, East Carolina University, Greenville, NC 27858, USA b Department of Mathematics, Okayama University, Okayama, 700-8530, Japan
Received 11 July 2010; accepted 6 December 2010 Available online 22 December 2010 Communicated by L. Gross
Abstract We consider the problem of quantum resonances in magnetic scattering by two solenoidal fields at large separation in two dimensions. This system has trapped trajectories oscillating between two centers of the fields. We give a sharp lower bound on resonance widths when the distance between the two centers goes to infinity. The bound is described in terms of backward amplitudes calculated explicitly for scattering by each solenoidal field. The study is based on a new type of complex scaling method. As an application, we also discuss the relation to semiclassical resonances in scattering by two solenoidal fields. © 2010 Elsevier Inc. All rights reserved. Keywords: Resonances; Magnetic scattering; Solenoidal fields; Aharonov–Bohm effect
1. Introduction In the present paper we study the problem of quantum resonances in magnetic scattering by two solenoidal fields at large separation. We work in two dimensions R 2 throughout the entire discussion. We write H (A) = (−i∇ − A)2 =
2 (−i∂j − aj )2 ,
∂j = ∂/∂xj
j =1
* Corresponding author.
E-mail addresses: [email protected] (I. Alexandrova), [email protected] (H. Tamura). 1 Current address: 1400 Washington Avenue, ES 110, State University of New York, Albany, NY 12222, USA.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.005
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1837
for the magnetic Schrödinger operator with potential A = (a1 , a2 ) : R 2 → R 2 . The magnetic field b : R 2 → R associated with the vector potential A is defined by b(x) = ∇ × A(x) = ∂1 a2 − ∂2 a1 and the magnetic flux of b is defined by α = (2π)−1 b(x) dx, where the integration with no domain attached is taken over the whole space. Let Φ : R 2 → R 2 be the potential defined by Φ(x) = −x2 /|x|2 , x1 /|x|2 = −∂2 log |x|, ∂1 log |x| ,
(1.1)
which generates the point-like field (solenoidal field) ∇ × Φ = ∂1 ∂1 log |x| + ∂2 ∂2 log |x| = log |x| = 2πδ(x) with center at the origin. The quantum particle moving in the solenoidal field 2παδ(x) with α as a magnetic flux is governed by the energy operator Pα = H (αΦ).
(1.2)
This is symmetric over C0∞ (R 2 \ {0}), but it is not necessarily essentially self-adjoint in the space L2 = L2 (R 2 ) because of the strong singularity at the origin of Φ. We know [1,8] that it is a symmetric operator with type (2, 2) of deficiency indices. The self-adjoint extension is realized by imposing a boundary condition at the origin. Its Friedrichs extension denoted by the same notation Pα has the domain D(Pα ) = u ∈ L2 : (−i∇ − αΦ)2 u ∈ L2 , lim u(x) < ∞ , |x|→0
(1.3)
where (−i∇ − αΦ)2 u is understood in D (R 2 \ {0}) (in the sense of distribution). The energy operator which governs quantum particles moving in a solenoidal field is often called the Aharonov–Bohm Hamiltonian in the physics literatures. This model was employed by Aharonov and Bohm [4] in 1959 in order to convince us theoretically that a magnetic potential itself has a direct significance in quantum mechanics. This phenomenon, unexplainable from a classical mechanical point of view, is now called the Aharonov–Bohm effect, which is known as one of the most remarkable quantum phenomena. The scattering by one solenoidal field is also known as one of the exactly solvable quantum systems. We give a quick review of it in Section 2. In particular, the amplitude fα (θ → ω; E) for scattering from the initial direction ω ∈ S 1 to the final direction θ at energy E > 0 is explicitly calculated as fα (ω → θ ; E) = (2/π)1/2 eiπ/4 E −1/4 sin(απ)ei[α](θ−ω)
ei(θ−ω) , 1 − ei(θ−ω)
(1.4)
where the Gauss notation [α] denotes the greatest integer not exceeding α and the coordinates over the unit circle S 1 are identified with the azimuth angles from the positive x1 axis. We also
1838
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
note that there are no resonances in the case of scattering by one solenoidal field, as seen in Section 2 below. We formulate the problem which we want to discuss in this paper. We consider the energy operator Hd = H (Φd ),
Φd (x) = α1 Φ(x − d1 ) + α2 Φ(x − d2 ),
(1.5)
which describes the quantum particle moving in the two solenoids 2πα1 δ(x − d1 ) and 2πα2 δ(x − d2 ). The operator Hd becomes self-adjoint under the boundary conditions lim|x−dj |→0 |u(x)| < ∞ for j = 1, 2, and the resolvent R(ζ ; Hd ) = (Hd − ζ )−1 : L2 → L2 ,
ζ = E + iη, E > 0, η > 0,
is meromorphically continued over the lower half of the complex plane across the positive real axis where the spectrum of Hd is located. Then R(ζ ; Hd ) with Im ζ 0 is well defined as an operator from L2comp to L2loc in the sense that χR(ζ ; Hd )χ : L2 → L2 is bounded for every χ ∈ C0∞ (R 2 ), where L2comp and L2loc denote the spaces of square integrable functions with compact support and of locally square integrable functions over R 2 , respectively. We refer to [14, Section 7] for the spectral properties of Hd : Hd has no bound states and the spectrum is absolutely continuous on [0, ∞). The meromorphic continuation of R(ζ ; Hd ) over the unphysical sheet (the lower-half plane) follows as an application of the analytic perturbation theory of Fredholm for compact operators. For completeness, we shall show it in Appendix A. The resonances of Hd are defined as the poles of the meromorphic function with values in operators from L2comp to L2loc . Our aim is to study to what extent R(ζ ; Hd ) can be analytically extended across the positive real axis as the distance |d| = |d2 − d1 | goes to infinity. We give a sharp lower bound on the resonance widths (imaginary parts of resonances) in terms of the backward amplitude fj (ω → −ω; E) for scattering by each solenoidal field 2παj δ(x). As is seen from (1.4), the backward amplitude takes the form fj (ω → −ω; E) = (2π)−1/2 eiπ/4 E −1/4 (−1)[αj ]+1 sin(αj π), which is independent of the direction ω. The main theorem is as follows. Theorem 1.1. Let the notation be as above and let E > 0. Assume that neither the flux α1 nor α2 is an integer. Set dˆ = d/|d| for d = d2 − d1 . Then, for any ε > 0 small enough, there exists dε (E) 1 large enough such that ζ = E − iη with 0 < η < ηεd (E) is not a resonance of Hd for |d| > dε (E), where ηεd (E) =
E 1/2 ˆ E)f2 (dˆ → −d; ˆ E) − ε . log |d| − logf1 (−dˆ → d; |d|
Remark 1.1. If either of the two fluxes α1 and α2 is an integer, Hd is easily seen to be unitarily equivalent to the Hamiltonian with one solenoidal field, and hence Hd has no resonances. Since the scattering amplitude vanishes for an integer flux, Theorem 1.1 remains true in this special case also.
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1839
Remark 1.2. A slightly modified argument applies to magnetic Schrödinger operators with fields with compact supports at large separation. For example, such an argument applies to the operator Hd = (−i∇ − Bd )2 ,
Bd (x) = A1 (x − d1 ) + A2 (x − d2 ),
where Aj ∈ C ∞ (R 2 → R 2 ) has the fields bj = ∇ × Aj ∈ C0∞ (R 2 → R). The result of Theorem 1.1 remains true with the backward amplitude for scattering by the fields bj . Corollary 1.1. Assume that the same assumptions as in Theorem 1.1 are fulfilled. If ζd (E) = E + i Im ζd (E) is a resonance of Hd , then, for any ε > 0 small enough, there exists dε (E) 1 such that the resonance width − Im ζd (E) satisfies − Im ζd (E) > ηεd (E) for |d| > dε (E). We make a comment on how to determine the constant ηεd (E) in the theorem. It is determined so that 2ik|d| e ˆ ˆ ˆ ˆ |d| f1 (−d → d; E)f2 (d → −d; E) < 1 − ε/2,
k = ζ 1/2
(1.6)
for |d| 1, provided that ζ = E − iη satisfies 0 < η < ηεd (E). We shall explain here from a heuristic point of view how sharp the bound in the theorem is and how reasonable ρ0 =
e2ik|d| ˆ E)f2 (dˆ → −d; ˆ E) = 1 f1 (−dˆ → d; |d|
(1.7)
is as an approximate relation to determine the location of the resonances near the real axis. We first consider the scattering by the solenoidal filed 2παδ(x). As stated in Proposition 5.1 in Section 5, the Green function Rα (x, y; ζ ) of the resolvent R(ζ ; Pα ) = (Pα − ζ )−1 with ζ = E − iη in the lower-half plane behaves like −1/2 Rα (x, y; ζ ) ∼ eik|x−y| |x − y|−1/2 + eik(|y|+|x|) |y||x| fα (−yˆ → x; ˆ E)
(1.8)
with yˆ = y/|y| and xˆ = x/|x| when |x|, |y| 1 and |x − y| 1, where k = ζ 1/2 and some numerical factors are ignored for brevity. The first term on the right side corresponds to the free trajectory which goes from y to x directly without being scattered at the origin, while the second term comes from the scattering trajectory which starts from y and arrives at x after being scattered by 2παδ(x). We now turn to scattering by the two solenoidal fields 2πα1 δ(x) and 2πα2 δ(x − d) with the origin and d ∈ R 2 as centers. We denote by fj (ω → θ ) the amplitude for scattering from the direction ω to θ by 2παj δ(x), and in particular, we write simply f1 and f2 for the backward ˆ and f2 (dˆ → −d), ˆ respectively. According to the asymptotic formula amplitudes f1 (−dˆ → d) (1.8), the quantity associated with the trajectory starting from the origin and coming back to the origin after being scattered by 2πα2 δ(x − d) takes the form (e2ik|d| /|d|)f2 , which is seen by setting x = y = −d in the second term on the right side of (1.8). Let τ0 (x, y) be the trajectory which starts from y, hits the origin and arrives at x from the origin after oscillating between the origin and d several times. Then the contribution from τ0 (x, y) to the asymptotic form of the Green function is formally given by the series
1840
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
−1/2 eik|x−y| |x − y|−1/2 + eik(|y|+|x|) |y||x| f1 (−yˆ → x) ˆ ∞
2ik|d| ˆ + eik|y| |y|−1/2 f1 (−yˆ → d) ρn /|d| f2 f1 (−dˆ → x)e ˆ ik|x| |x|−1/2 , e 0
n=0
where ρ0 is defined by (1.7). For example, the term with ρ0n describes the contribution from the trajectory oscillating n + 1 times. Thus the location of the resonance is approximately determined by the relation ρ0 = 1, and this intuitive idea clarifies the mechanism by which trapping trajectories generate the resonances near the real axis. The rigorous proof of Theorem 1.1 is based on a new type of complex scaling method. The details are explained in Section 3 where we prove the theorem, accepting some lemmas as proved, and Sections 4, 5 and 6 are devoted to proving those lemmas. One of the difficulties in the resonance problem is that we have to control quantities growing exponentially at infinity. Such quantities cannot be controlled simply by integration by parts using oscillatory properties. We use a new method of complex scaling to avoid these difficulties. We discuss the relation to the semiclassical theory for quantum resonances in scattering by two solenoidal fields. We now consider the self-adjoint operator H˜ h = (−ih∇ − Ψ )2 ,
Ψ (x) = α1 Φ(x − p1 ) + α2 Φ(x − p2 ),
0 < h 1,
under the boundary conditions lim|x−pj |→0 |u(x)| < ∞ at the two centers p1 and p2 . We denote by γ (x) the azimuth angle from the positive x1 axis to xˆ = x/|x| and define the two unitary operators (U1 f )(x) = h−1 f h−1 x ,
(U2 f )(x) = exp igh (x) f (x)
acting on L2 , where gh = [α1 / h]γ (x − d1 ) + [α2 / h]γ (x − d2 ) with dj = pj / h. Since ∇γ (x) = Φ(x), gh (x) satisfies ∇gh = [α1 / h]Φ(x − d1 ) + [α2 / h]Φ(x − d2 ), and exp(igh (x)) is well defined as a single valued function. Then H˜ h turns out to be unitarily equivalent to H (Ψd ) = (U1 U2 )∗ H˜ h (U1 U2 ), where Ψd (x) = β1 Φ(x − d1 ) + β2 Φ(x − d2 ),
βj = αj / h − [αj / h],
dj = pj / h.
Thus the semiclassical resonance problem in scattering by two solenoidal fields is reduced to the resonance problem for magnetic Schrödinger operators with two solenoidal fields with centers at large separation |d| = |d2 − d1 | = |p2 − p1 |/ h = |p|/ h 1. We denote by f˜j (ω → −ω; E), j = 1, 2, the amplitude for the backward scattering by the field 2πβj δ(x) at energy E > 0 and by f˜hj (ω → −ω; E) the semiclassical amplitude for the scattering by the field 2παj δ(x). The two amplitudes are related through f˜hj (ω → −ω; E) =
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1841
h1/2 f˜j (ω → −ω; E) by (1.4) with E and α replaced by E/ h2 and α/ h, respectively, and hence it follows that ˆ E)f˜2 (pˆ → −p; ˆ E) = logf˜h1 (−pˆ → p; ˆ E)f˜h2 (pˆ → −p; ˆ E) − log h. logf˜1 (−pˆ → p; The fluxes β1 and β2 vary with h. If at least one of the two fluxes β1 and β2 is an integer, then ˆ E)f˜2 (pˆ → −p; ˆ E) = ∞, − logf˜1 (−pˆ → p;
pˆ = p/|p|,
because the scattering amplitude vanishes for an integer flux. The choice of dε (E) in Theorem 1.1 depends on the fluxes α1 and α2 as well as on the energy E > 0. We require the additional assumption that β1 and β2 stay away from 0 and 1 uniformly in h; c < β1 , β2 < 1 − c for some 0 < c < 1/2. Then we obtain the following result as an immediate consequence of Theorem 1.1. Corollary 1.2. Let the notation be as above. Assume that βj = αj / h − [αj / h], j = 1, 2, fulfills the flux condition above. Then, for any ε > 0 small enough, there exists hε (E) > 0 such that ζ = E − iη with 0<η<
E 1/2 h − logf˜h1 (−pˆ → p; ˆ E)f˜h2 (pˆ → −p; ˆ E) + log |p| − ε |p|
is not a resonance of H˜ h for 0 < h < hε (E) 1. The resonance problem is one of the most active subjects in scattering theory at the present. There is a large number of works devoted to the semiclassical theory of resonances near the real axis generated by closed classical trajectories. An extensive list of references can be found in the book [12], and the paper [19] of Sjöstrand is an excellent exposition on this subject. In particular, the semiclassical problem of shape resonances has been studied in detail, and upper or lower bounds on the resonance width and its asymptotic expansion in h have been obtained by many authors [6,7,9–12,15] under various assumptions. Among these works is the one by Martinez [15] where he has established the following result in potential scattering: For any M 1, there exists hM (E) such that ζ = E − iη with η < −Mh log h is not a resonance of −h2 + V for 0 < h < hM (E), if E is in the nontrapping energy range. As far as we know, there are no works dealing with the semiclassical bounds on resonance widths for scattering systems by solenoidal fields. Corollary 1.2 gives a new type of lower bound in which backward scattering amplitudes are involved, and it suggests the existence of resonances with the width of order O(h| log h|) in the trapping energy range. We end this section by referring to the possibility of generalizing the results here to the case of scattering by several solenoidal fields. It seems to be possible to extend our ideas to such cases, although much more elaborate arguments are required. The results would depend heavily on the location of the centers of the fields, and the Aharonov–Bohm quantum effect is closely related to the bound on the resonance widths. If, for example, the three centers d1 , d2 and d3 are collinear with d2 as the middle point, then the bound on the resonance width is determined by the longest trajectory oscillating between d1 and d3 , but the potential α2 Φ(x − d2 ) generated by the field 2πα2 δ(x − d2 ) with the middle point d2 as a center has a direct significance on the trajectory oscillating between the two centers d1 and d3 by the Aharonov–Bohm effect. It seems to be an
1842
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
interesting problem to study how the Aharonov–Bohm effect is reflected in the location of the resonances in scattering by several solenoidal fields. 2. The scattering amplitude by one solenoidal field Here we make a brief review of the scattering by one solenoidal field. As stated in the previous section, the scattering by such a field is known as one of the exactly solvable models in quantum mechanics. We refer to [1,2,4,8,17] for more detailed expositions. Let Pα be the self-adjoint operator defined by (1.2) with domain (1.3). We calculate the generalized eigenfunction of the problem Pα ϕ = Eϕ with energy E > 0 as an eigenvalue. Since Pα is rotationally invariant, we work in the polar coordinate system (r, θ ). Let U be the unitary mapping defined by (U u)(r, θ ) = r 1/2 u(rθ ) : L2 → L2 (0, ∞); dr ⊗ L2 S 1 .
We write l for the summation ranging over all integers l. Then U enables us to decompose Pα into the partial wave expansion Pα U Pα U ∗ =
⊕(Plα ⊗ Id),
(2.1)
l
where Id is the identity operator and Plα = −∂r2 + ν 2 − 1/4 r −2 ,
ν = |l − α|
is self-adjoint in L2 ((0, ∞); dr) under the boundary condition limr→0 r −1/2 |u(r)| < ∞ at r = 0. We denote by γ (x; ω) the azimuth angle from ω ∈ S 1 to xˆ = x/|x| and use the notation · to denote the scalar product in R 2 . Then the outgoing eigenfunction ϕ+ (x; ω, E) with ω as an incident direction at energy E > 0 is calculated as ϕ+ (x; ω, E) =
exp(−iνπ/2) exp ilγ (x; −ω) Jν E 1/2 |x|
(2.2)
l
with ν = |l − α|, where Jμ (z) denotes the Bessel function of order μ. The eigenfunction ϕ+ behaves like ϕ+ (x; ω, E) ∼ ϕ0 (x; ω, E) = exp iE 1/2 x · ω as |x| → ∞ in the direction −ω (x = −|x|ω), and the difference ϕ+ − ϕ0 satisfies the outgoing radiation condition at infinity. We decompose ϕ+ (x; ω, E) into the sum ϕ+ = ϕin + ϕsc of incident and scattering waves to calculate the scattering amplitude through the asymptotic behavior at infinity of the scattering wave ϕsc (x; ω, E). The idea is due to Takabayashi [16]. If we set σ = σ (x; ω) = γ (x; ω) − π , then ϕ+ =
l
e−iνπ/2 eilσ Jν E 1/2 |x| ,
ν = |l − α|.
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1843
If we further make use of the formula e−iμπ/2 Jμ (iw) = Iμ (w) for the Bessel function π Iμ (w) = (1/π)
∞ ew cos ρ cos(μρ) dρ − sin(μπ)
0
e−w cosh p−μp dp
(2.3)
0
with Re w 0 [22, p. 181], then ϕ+ (x; ω, E) takes the form ϕ+ = (1/π)
π e
l
− (1/π)
e−i
ilσ
√
E|x| cos ρ
cos(νρ) dρ
0
∞
e
ilσ
ei
sin(νπ)
l
√ E|x| cosh p −νp
e
(2.4)
dp.
0
We take ϕin (x; ω, E) as ϕin = eiασ ϕ0 (x; ω, E) = eiασ ei
√ E|x| cos γ (x;ω)
= eiασ e−i
√
E|x| cos σ
,
which is different from the usual plane wave ϕ0 (x; ω, E). The modified factor eiασ appears because of the long-range property of the potential Φ(x) defined by (1.1). The incident wave admits the Fourier expansion ϕin (x; ω, E) = (1/π)
π l
e
√ −i E|x| cos ρ
cos(νρ) dρ eilσ (x;ω) .
0
This, together with (2.4), yields ϕsc (x; ω, E) = −(1/π)
∞ e
ilσ
ei
sin(νπ)
l
√ E|x| cosh p −νp
e
dp.
0
We compute the series
e
ilσ −νp
e
sin(νπ) =
l
l[α]
eilσ e−νp sin(νπ) + l[α]+1
= sin(απ)(−1)[α]
e−αp (eiσ ep )[α] eαp (eiσ e−p )[α] + 1 + e−iσ e−p 1 + e−iσ ep
for |σ | < π . Thus we have sin(απ) ϕsc = − (−1)[α] ei[α]σ (x;ω) π
∞
−∞
ei
√ E|x| cosh p
e−βp dp 1 + e−iσ e−p
1844
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
with β = α − [α]. We apply the stationary phase method to the integral on the right side. Since eiσ (x;ω) = ei(γ (x;ω)−π) = −ei(θ−ω) by identifying θ = x/|x| = xˆ ∈ S 1 with the azimuth angle θ , we see that ϕsc (x; ω, E) obeys ˆ E)ei ϕsc = fα (ω → x;
√ E|x|
|x|−1/2 + o |x|−1/2 ,
|x| → ∞.
Here fα (ω → θ ; E) defined by (1.4) for θ = ω is called the amplitude for scattering from the initial direction ω ∈ S 1 to the final one θ at energy E > 0. If, in particular, α is an integer, then fα (ω → θ ; E) vanishes. We calculate the Green function of the resolvent R(ζ ; Pα ) = (Pα − ζ )−1 with Im ζ > 0. Let k = ζ 1/2 , Im k > 0, and let Plα be as in (2.1). Then the equation (Plα − ζ )u = 0 has {r 1/2 Jν (kr), r 1/2 Hν (kr)} with Wronskian 2i/π as a pair of linearly independent solutions, (1) where Hμ (z) = Hμ (z) denotes the Hankel function of the first kind. Thus (Plα − ζ )−1 has the integral kernel Rlα (r, ρ; ζ ) = (iπ/2)r 1/2 ρ 1/2 Jν k(r ∧ ρ) Hν k(r ∨ ρ) ,
ν = |l − α|,
where r ∧ ρ = min(r, ρ) and r ∨ ρ = max(r, ρ). Hence the Green function Rα (x, y; ζ ) of R(ζ ; Pα ) is given by Rα (x, y; ζ ) = (i/4)
eil(θ−ω) Jν k |x| ∧ |y| Hν k |x| ∨ |y| ,
(2.5)
l
where x = (|x| cos θ, |x| sin θ ) and y = (|y| cos ω, |y| sin ω) in the polar coordinates. This makes sense even for ζ in the lower half of the complex plane by analytic continuation. Then R(ζ ; Pα ) with Im ζ 0 is well defined as an operator from L2comp to L2loc . Thus R(ζ ; Pα ) does not have any poles as a function with values in operators from L2comp to L2loc . We can say that Pα with one solenoidal field 2παδ(x) has no resonances. We do not discuss the possibility of resonances at zero energy. 3. Proof of Theorem 1.1 by the complex scaling method The proof of Theorem 1.1 is based on the complex scaling method initiated by [3,5] and further developed by [18,20] (see [12] also). In this section we complete the proof of Theorem 1.1, accepting the five lemmas (Lemmas 3.1–3.5) formulated in the course of the proof as proved. We first reformulate the problem to which the complex scaling method can be applied in a more convenient way and fix some basic notation used throughout the entire discussion in the sequel. We work in the coordinate system in which the two centers d1 and d2 are represented as d1 = d− = (−d/2, 0),
d2 = d+ = (d/2, 0),
d 1,
and we set α− = α1 and α+ = α2 for two given fluxes α1 and α2 . Then the operator Hd = H (Φd ) under consideration is self-adjoint with domain D = u ∈ L2 : (−i∇ − Φd )2 u ∈ L2 ,
lim
|x−d± |→0
u(x) < ∞ at d− and d+
(3.1)
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1845
and the potential Φd (x) takes the form Φd (x) = Φ−d (x) + Φ+d (x) = α− Φ(x − d− ) + α+ Φ(x − d+ ).
(3.2)
We denote by H0 = − the free Hamiltonian with domain H 2 (R 2 ) (Sobolev space of order two) and define the auxiliary operators by H±d = H (Φ±d ),
(3.3)
which are self-adjoint with domain D± = u ∈ L2 : (−i∇ − Φ±d )2 u ∈ L2 ,
lim
|x−d± |→0
u(x) < ∞ .
(3.4)
We fix E0 > 0. We always assume that ζ is restricted to the complex neighborhood
1/2 Dd = ζ = E + iη ∈ C: |E − E0 | < δE0 , |η| < 2E0 (log d)/d
(3.5)
with 0 < δ 1 small enough, and we set D±d = Dd ∩ {ζ ∈ C: ± Im ζ > 0}. We also introduce smooth cut-off functions χ0 , χ∞ and χ± over the real line R = (−∞, ∞) with the following properties: 0 χ0 , χ∞ , χ± 1 and χ0 (t) = 1 for |t| 1,
χ0 (t) = 0
for |t| 2,
χ∞ (t) = 1 − χ0 (t),
χ+ (t) = 1 for t 1,
χ+ (t) = 0
for t −1,
χ− (t) = 1 − χ+ (t).
We often use these functions without further references throughout the future discussion. We define jd (x) : R 2 → C 2 by jd (x1 , x2 ) = x1 , x2 + iηd (x2 )x2 , −1/2
with η0d = 5E0
ηd (t) = η0d χ∞ (t/d),
(3.6)
(log d)/d and consider the complex scaling mapping 1/2 f jd (x) (Jd f )(x) = det(∂jd /∂x)
associated with jd (x). The Jacobian det(∂jd /∂x) of jd (x) does not vanish for d 1, and therefore Jd is invertible. Since the coefficients of Hd are analytic in R 2 \ {d− , d+ }, we can define the operator Kd = Jd Hd Jd−1 .
(3.7)
This becomes a closed operator under the same boundary condition as in (3.1), but it is not necessarily self-adjoint. The domain of Kd coincides with D. We do not require the explicit form of Kd in the future discussion.
1846
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
We define the complex scaled operator as above for the auxiliary operators H±d defined by (3.3). Recall that γ (x; ω) denotes the azimuth angle from ω ∈ S 1 to xˆ = x/|x|. The potential Φ(x) defined by (1.1) satisfies the relation Φ(x) = ∇γ (x; ω). Hence it follows that Φ±d (x) = α± Φ(x − d± ) = α± ∇γ (x − d± ; ω± ),
ω± = (±1, 0).
The angle function γ (x; ω+ ) is represented as γ (x; ω+ ) = −(i/2) log (x1 + ix2 )/(x1 − ix2 ) + π, so that it is well defined for complex variables also. We take arg z, 0 arg z < 2π , to be a single valued function over the complex plane slit along the direction ω+ and define 1/2 1 γ jd (x); ω+ = arg b+d (x) − arg b−d (x) + π − i logbd (x) , 2
(3.8)
where bd (x) = b+d (x)/b−d (x) and b+d (x) = x1 − ηd (x2 )x2 + ix2 ,
b−d (x) = x1 + ηd (x2 )x2 − ix2 .
The function γ (jd (x); ω− ) is similarly defined by taking arg z to be a single valued function over the complex plane slit along the direction ω− . We define g±d by g±d (x) = α± χ∓ 32(x1 ∓ 13d/32)/d γ jd (x) − d± ; ω±
(3.9)
g0d (x) = χ0 (4x1 /d) α− γ jd (x) − d− ; ω− + α+ γ jd (x) − d+ ; ω+ .
(3.10)
and g0d by
By definition, supp g−d ⊂ {x: x1 > −7d/16} and g−d = α− γ (jd (x) − d− ; ω− ) on Π+ = {x: x1 > −3d/8}. Hence exp(ig−d ) acts as exp(ig−d )f (x) = Jd exp iα− γ (x − d− ; ω− ) Jd−1 f (x) on functions f (x) with support in Π+ . On the other hand, g+d (x) has support in {x: x1 < 7d/16} and g+d = α+ γ (jd (x) − d+ ; ω+ ) on Π− = {x: x1 < 3d/8}, so that exp(ig+d ) acts as exp(ig+d )f (x) = Jd exp iα+ γ (x − d+ ; ω+ ) Jd−1 f (x) on functions f (x) with support in Π− . We take into account these relations to define the following closed operator K±d = exp(ig∓d ) Jd H±d Jd−1 exp(−ig∓d ) with the same boundary condition as in (3.4). Since K+d = Jd H α− ∇γ (x − d− ; ω− ) + Φ+d Jd−1
(3.11)
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1847
on Π+ , we have K+d = Kd
on Π+ = {x: x1 > −3d/8}.
(3.12)
on Π− = {x: x1 < 3d/8}.
(3.13)
Similarly we have K−d = Kd
The function g0d (x) defined by (3.10) has support in {x: |x1 | < d/2} and satisfies g0d = α− γ jd (x) − d− ; ω− + α+ γ jd (x) − d+ ; ω+ on Π0 = {x: |x1 | d/4}. If we define the operator K0d by K0d = exp(ig0d ) Jd H0 Jd−1 exp(−ig0d ),
(3.14)
then we obtain K0d = K±d = Kd
on Π0 = x: |x1 | d/4 .
(3.15)
We make some comments on the complex scaling mapping Jd defined above before going into the proof of the theorem. This mapping takes a form different from the standard mapping 1/2 (J˜θ f )(x) = det 1 + iθ dF (x) f x + iθ F (x) ,
θ > 0,
used in the existing complex scaling method (for example see [12]), where F : R 2 → R 2 is a smooth vector field satisfying F (x) = x for |x| 1. If we define K˜ dθ = J˜θ Hd J˜θ−1 , then it follows by the Weyl perturbation theorem that the essential spectrum of K˜ dθ is given by
σess (K˜ dθ ) = ζ ∈ C: arg ζ = −2 arg(1 + iθ ) , and the resonances of Hd in question are defined as eigenvalues near the positive real axis of the distorted operator K˜ dθ . The spectrum σ (K˜ dθ ) is discrete in the sector
Sθ = ζ ∈ C: Re ζ > 0, −2 arg(1 + iθ ) < arg ζ 0 and it is known that σ (K˜ dθ ) ∩ Sθ is independent of the vector field F and of θ . On the other hand, the distorted operator Kd = Jd Hd Jd−1 defined by the mapping Jd has its essential spectrum in the region
σess (Kd ) = ζ ∈ C: −2 arg(1 + iη0d ) arg ζ 0 ,
−1/2
η0d = 5E0
(log d)/d,
and has no discrete eigenvalues in this sector. This follows from the Weyl perturbation theorem, if we consider Kd as a perturbation of the operator −∂12 − (1 + iη0d )−2 ∂22 . Hence we have to define the resonances of Hd directly as the poles of the resolvent R(ζ ; Hd ) continued analytically over the unphysical sheet and not as the eigenvalues of Kd . It seems to be difficult to apply the
1848
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
standard complex scaling method to our resonance problem in scattering by two solenoidal fields with centers at large separation. In particular, it is difficult to separate the two centers from each other without introducing auxiliary operators such as K±d with one solenoidal field. For this reason, we develop the new type of complex scaling method which changes only the variable x2 into the complex variable to separate the two centers from each other. We note that Wang [21] has already studied resonances in strong uniform magnetic fields in three dimensions by making use of a complex scaling method depending only on one variable (direction perpendicular to the magnetic field). However it seems that the motivation in the background is different from that in the present work. In particular, our complex scaled operator has a quite different structure in the essential spectrum. With the notation above, we are now in a position to prove the main theorem. Proof of Theorem 1.1. The proof is divided into five steps. Throughout the proof, we use the notation R(ζ ; K) to denote the resolvent (K − ζ )−1 of K, where K is not necessarily assumed to be self-adjoint. We also denote by the same notation R(ζ ; K) the resolvent obtained by analytic continuation. Step 1. At first we assume that ζ = E + iη ∈ D+d . Let H± = H (α± Φ) be the self-adjoint operator with the boundary condition (1.3) at the origin and let R± (x, y; ζ ) be the kernel of the resolvent R(ζ ; H± ). Then the kernel of the resolvent R(ζ ; H±d ) is given by R± (x − d± , y − d± ; ζ ). We now consider the integral operator R˜ ±d (ζ ) with the kernel R˜ ±d (x, y; ζ ) = j˜d (x, y)R± jd (x) − d± , jd (y) − d± ; ζ ,
(3.16)
where 1/2 1/2 det ∂jd (y)/∂y . j˜d (x, y) = det ∂jd (x)/∂x If we set H˜ ±d = Jd H±d Jd−1 , then H˜ ±d becomes a closed operator with the boundary condition as in (3.4) and a formal argument using a change of variables shows that R˜ ±d (ζ ) = Jd R(ζ ; H±d )Jd−1 = R(ζ ; H˜ ±d ). The rigorous justification is based on the density of analytic vectors in L2 . The first step is to show the following lemma. Lemma 3.1. Assume that ζ ∈ D+d . Let H˜ ±d and R˜ ±d (ζ ) be as above. Then R˜ ±d (ζ ) : L2 → L2 is bounded, and ζ belongs to the resolvent set of H˜ ±d with R˜ ±d (ζ ) as a resolvent. Remark 3.1. We can show that the adjoint operator R˜ ±d (ζ )∗ : L2 → L2 is similarly obtained from the resolvent R(ζ ; H±d ) : L2 → L2 with ζ ∈ D+d and coincides with the resolvent ∗ ). R(ζ ; H˜ ±d Since g±d (x) defined by (3.9) is a bounded function, the lemma, together with (3.11), implies that ζ ∈ D+d belongs to the resolvent set of K±d and the resolvent R(ζ ; K±d ) is given by
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1849
R(ζ ; K±d ) = exp(ig∓d )R˜ ±d (ζ ) exp(−ig∓d ) : L2 → L2 for ζ ∈ D+d . Step 2. The second step is to show that ζ ∈ D+d is also in the resolvent set of Kd and to derive the representation for the resolvent R(ζ ; Kd ) in terms of R(ζ ; K±d ). To see this, we define Λd (ζ ) by Λd (ζ ) = χ−d R(ζ ; K−d ) + χ+d R(ζ ; K+d ) : L2 → L2 , where χ±d (x) = χ± (16x1 /d). Since Kd = K±d on supp χ±d by (3.12) and (3.13), we compute (Kd − ζ )Λd (ζ ) = (K−d − ζ )χ−d R(ζ ; K−d ) + (K+d − ζ )χ+d R(ζ ; K+d ) = Id + [K−d , χ−d ]R(ζ ; K−d ) + [K+d , χ+d ]R(ζ ; K+d ). has support in The function χ±d depends on x1 only, and the derivative χ±d
Σ0 = x = (x1 , x2 ): |x1 | < d/16 .
(3.17)
By (3.15), K±d = K0d on Π0 , so that the two commutators [K−d , χ−d ] and [K+d , χ+d ] on the right side equal [K0d , χ−d ] and −[K0d , χ−d ], respectively. Hence we have (Kd − ζ )Λd (ζ ) = Id + X R(ζ ; K−d ) − R(ζ ; K+d ) ,
(3.18)
where X = [K0d , χ−d ],
χ−d = χ− (16x1 /d).
(3.19)
We further compute the operator on the right side of (3.18). If we set χ0d (x) = χ0 (8x1 /d), then χ0d = 1 on Σ0 and K±d = K0d on supp χ0d by (3.15). Hence it equals Td (ζ ) := X R(ζ ; K−d ) − R(ζ ; K+d ) = XR(ζ ; K+d )Y R(ζ ; K−d )
(3.20)
as an operator acting on L2 (Σ0 ), where Y = [K0d , χ0d ],
χ0d = χ0 (8x1 /d).
(3.21)
Then we can prove the following lemma. Lemma 3.2. Assume that ζ ∈ D+d . If Td (ζ ) is considered as an operator from L2 (Σ0 ) into itself, then Id + Td (ζ ) : L2 (Σ0 ) → L2 (Σ0 ) has a bounded inverse.
1850
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
We shall show that ζ ∈ D+d belongs to the resolvent set of Kd . Let L2comp (Σ0 ) denote the set of L2 functions with support in Σ0 . We often identify L2comp (Σ0 ) with L2 (Σ0 ), including its topology. It follows from (3.18) and (3.20) that (Kd − ζ )Λd (ζ ) = Id + Td (ζ ) on L2comp (Σ0 ). Hence Lemma 3.2 implies that −1 (Kd − ζ )Λd (ζ ) Id + Td (ζ ) f = f for f ∈ L2comp (Σ0 ), so that the operator R(ζ ) defined by −1 R(ζ ) = Λd (ζ ) − Λd (ζ ) Id + Td (ζ ) X R(ζ ; K−d ) − R(ζ ; K+d ) : L2 → L2 satisfies (Kd − ζ )R(ζ )f = f on L2 . Thus we have that the range Ran(Kd − ζ ) of Kd − ζ coincides with L2 . Similarly we can prove that Ran(Kd∗ − ζ ) = L2 (see Remark 3.1). This shows that ζ ∈ D+d belongs to the resolvent set of Kd , and R(ζ ; Kd ) is represented as −1 R(ζ ; Kd ) = Λd (ζ ) − Λd (ζ ) Id + Td (ζ ) X R(ζ ; K−d ) − R(ζ ; K+d ) .
(3.22)
Step 3. We still assume that ζ ∈ D+d . Let Ω0 = {x: |x1 | < d, |x2 | < r0 }
(3.23)
for r0 1 fixed large enough but independently of d. If f ∈ L2comp (Ω0 ) is an L2 function with support in Ω0 , then R(ζ ; Hd )f is analytic outside Ω0 , because the coefficients of Hd are analytic there. We can prove the following lemma. Lemma 3.3. Assume that ζ ∈ D+d . If f ∈ L2comp (Ω0 ), then Jd R(ζ ; Hd )f ∈ L2 . Since Jd acts as the identity operator on L2comp (Ω0 ), Jd R(ζ ; Hd )f with f ∈ L2comp (Ω0 ) satisfies the boundary conditions in (3.4) and solves the equation (Kd − ζ )Jd R(ζ ; Hd )f = Jd (Hd − ζ )R(ζ ; Hd )f = f by (3.7). Since such a solution is unique in L2 , we have Jd R(ζ ; Hd ) = R(ζ ; Kd ) on L2comp (Ω0 ) for ζ ∈ D+d . Thus we obtain −1 R(ζ ; Hd ) = Λd (ζ ) − Λd (ζ ) Id + Td (ζ ) X R(ζ ; K−d ) − R(ζ ; K+d )
(3.24)
from (3.22), when considered as an operator from L2comp (Ω0 ) into itself. Step 4. The relation (3.24) plays a basic role in studying the analytic continuation of R(ζ ; Hd ) as a function of ζ with values in operators from L2comp (Ω0 ) into itself over the lower-half plane. As stated above, L2comp (Ω0 ) is identified with L2 (Ω0 ) together with its topology, and similarly for L2comp (Σ0 ). We can prove the following two lemmas.
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1851
Lemma 3.4. Let ζ ∈ Dd . Then R(ζ ; K±d ) is bounded when it is considered as an operator from L2comp (Ω0 ) into L2 (Σ0 ) or from L2comp (Σ0 ) into L2 (Ω0 ), and it depends analytically on ζ ∈ Dd . Lemma 3.5. Let Td (ζ ) be defined by (3.20). Assume that ζ = E − iη fulfills the assumption 0 η < ηεd (E) in the theorem. Then Id + Td (ζ ) : L2 (Σ0 ) → L2 (Σ0 ) has a bounded inverse. The operator R(ζ ; K±d ) depends analytically on ζ when considered as an operator from L2comp (Ω0 ) into itself. The two lemmas above, together with (3.24), imply that R(ζ ; Hd ) is analytically continued as a function of ζ with values in operators from L2comp (Ω0 ) into itself over the region
Dεd = ζ = E − iη ∈ Dd : 0 η < ηεd (E) in the lower half-plane. Step 5. The proof is completed in this step. Once the analytic continuation of R(ζ ; Hd ) : L2comp (Ω0 ) → L2comp (Ω0 ) is established, we can show that R(ζ ; Hd ) is analytically continued as a function of ζ with values in operators from L2comp to L2loc over the above region Dεd . To see this, we introduce the auxiliary operator P0 = H (α0 Φ) with α0 = α− + α+ , the self-adjoint extension (Friedrichs extension) of which is realized by imposing the boundary condition lim|x|→0 |u(x)| < ∞ at the origin. We use the same notation P0 to denote this self-adjoint realization. As is easily seen, the line integral
Φd (x) − α0 Φ(x) · dx = 0
C
vanishes along any curve C outside Ω0 by the Stokes formula. This makes it possible to construct a smooth real function g(x) in such a way that Φd (x) = α0 Φ(x) + ∇g(x)
(3.25)
outside Ω0 . In fact, it is given by the line integral ∞ Φd (tx) − α0 Φ(tx) · xˆ dt, g(x) = −
xˆ = x/|x|,
1
for |x| 1 and obeys g(x) = O(|x|−1 ) as |x| → ∞. This function g(x) is also analytic outside Ω0 , because g solves g = ∇ · (Φd − α0 Φ)
1852
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
and the function on the right side is analytic there. Let {ψ0 , ψ1 } be a smooth partition of unity over R 2 such that ψ0 + ψ1 = 1,
supp ψ0 ⊂ Ω0 ,
and let ψ2 be a smooth function such that it has a slightly wider support than ψ1 and satisfies ψ2 ψ1 = ψ1 . We may assume that (3.25) remains true on supp ψ2 (and hence on supp ψ1 also). If we define Pˆ0 = eig P0 e−ig , then it follows that Hd = Pˆ0
on supp ψ2 .
(3.26)
This relation enables us to decompose R(ζ ; Hd ) = R(ζ ; Hd )(ψ0 + ψ1 ) into the sum of three terms as follows: R(ζ ; Hd ) = R(ζ ; Hd )ψ0 + ψ2 R(ζ ; Pˆ0 )ψ1 − R(ζ ; Hd )[Pˆ0 , ψ2 ]R(ζ ; Pˆ0 )ψ1 . Since R(ζ ; Pˆ0 ) : L2comp → L2loc depends analytically on ζ and since the commutator [Pˆ0 , ψ2 ] vanishes outside Ω0 , we see that R(ζ ; Hd ) : L2comp → L2comp (Ω0 ) depends analytically on ζ . Similarly we obtain the relation R(ζ ; Hd ) = ψ0 R(ζ ; Hd ) + ψ1 R(ζ ; Pˆ0 )ψ2 + ψ1 R(ζ ; Pˆ0 )[Pˆ0 , ψ2 ]R(ζ ; Hd ) on L2comp . This yields the analytic dependence on ζ of R(ζ ; Hd ) : L2comp → L2loc and the proof of the theorem is now complete. 2 The proofs of the five lemmas which remain unproved are all based on the asymptotic analysis of the behavior at infinity of the Green function for the Schrödinger operator with one solenoidal field. In particular, the proof of Lemma 3.5, which has played an essential role in proving the theorem, occupies the main body of the paper. 4. Proof of Lemmas 3.1 and 3.3 The present section is devoted to proving Lemmas 3.1 and 3.3 among the five lemmas. 4.1. Preliminary proposition and lemmas We begin by introducing the new notation 2 2 rd (x, y)2 = jd (x) − jd (y) , rd (x)2 = rd (x, 0)2 = jd (x) , θd (x, y) = γ jd (x); ω+ − γ jd (y); ω+ , ω+ = (1, 0),
(4.1) (4.2)
where |z|2 = x12 + (x2 + iy2 )2 for z = (x1 , x2 + iy2 ) ∈ R × C. The branch rd (x, y) of rd (x, y)2 is taken in such a way that Re rd (x, y) > 0. We recall that the kernel Rα (x, y; ζ ) of the resolvent R(ζ ; Pα ) with Im ζ > 0 is given by (2.5) for the self-adjoint operator Pα = H (αΦ) defined by (1.2) with domain (1.3). The argument here is based on the following proposition.
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1853
Proposition 4.1. Assume that ζ ∈ D+d . Let Rα (x, y; ζ ) be the kernel of the resolvent R(ζ ; Pα ). Set k = ζ 1/2 with Im k > 0. If x2 > c and y2 > c for some c > 1, then −L Rα jd (x), jd (y); ζ = (i/4)eiαθd (x,y) H0 krd (x, y) + O |x| + |y| (1)
as |x| + |y| → ∞ for any L 1, where H0 (z) = H0 (z) denotes the Hankel function of the first kind, and the order estimate depends on ζ . A similar relation holds true in the case where x2 < −c and y2 < −c. We prove the proposition at the end of this section. We complete the proof of the two lemmas in question after showing two preliminary lemmas. We define R˜ αd (ζ ) = Jd R(ζ ; Pα )Jd−1 as the integral operator with kernel R˜ αd (x, y; ζ ) = j˜d (x, y)Rα jd (x), jd (y); ζ , where j˜d (x, y) is defined in (3.16). Lemma 4.1. If q± ∈ C ∞ (R 2 ) is a bounded function with support in {x: ±x2 > c} for some c > 1, then q+ R˜ αd (ζ )q+ ,
q− R˜ αd (ζ )q− : L2 → L2
is bounded. Proof. Let ηd (t) be defined in (3.6) and set η˜ d (t) = ηd (t)t. We may assume that η˜ d (t) 0. According to (4.1), we calculate 2 rd (x, y)2 = (x1 − y1 )2 + 1 + iηd (x2 , y2 ) (x2 − y2 )2 , where 1 ηd (x2 , y2 ) =
η˜ d y2 + s(x2 − y2 ) ds 0
0
and ηd (x2 , y2 ) = O((log d)/d). Hence we have Im krd (x, y) cη1/2 |x − y|,
|x − y| 1,
for some c > 0, so that the Hankel function H0 (krd (x, y)) falls off exponentially as |x −y| → ∞. This, together with Proposition 4.1, proves the lemma. 2 We denote by P˜αd = Jd Pα Jd−1 the complex scaled operator obtained from Pα . The coefficients of Pα are analytic in R 2 \ {0}. Hence P˜dα has coefficients smooth in R 2 \ {0} and becomes a closed operator under the same boundary condition as in (1.3). Let A be the dense space in L2 spanned by all functions of the form
1854
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
f (x1 , x2 ) = h(x1 )p(x2 ) exp −cx22 ,
c > 0,
where h ∈ C0∞ (R) and p(x2 ) is a polynomial. According to [12, Proposition 17.10], we know that Jd A is also dense in L2 . If f ∈ Jd A, then R˜ αd (ζ )f satisfies the boundary condition in (1.3) and the relation (P˜αd − ζ )R˜ αd (ζ ) = Id
(4.3)
holds on the dense set Jd A. This is shown by making a change of variables and by deforming the contour by analyticity. Lemma 4.2. Assume that ζ ∈ D+d . Let P˜αd and R˜ αd (ζ ) be as above. Then R˜ αd (ζ ) is bounded on L2 , and ζ belongs to the resolvent set of P˜αd with R˜ αd (ζ ) as a resolvent. Proof. Let {u− , u0 , u+ } be a nonnegative smooth partition of unity such that u− (x2 ) + u0 (x2 ) + u+ (x2 ) = 1 and supp u0 ⊂ (−2c, 2c),
supp u+ ⊂ (3c/2, ∞),
supp u− ⊂ (−∞, −3c/2)
for c > 1 fixed. We shall show that R˜ αd (ζ )u0 and R˜ αd (ζ )u± are bounded on L2 . We first consider R˜ αd (ζ )u0 . If v0 ∈ C0∞ (R) has support in {|x2 | < 4c}, then we have v0 R˜ αd (ζ )u0 = v0 R(ζ ; Pα )u0 , and v0 R˜ αd (ζ )u0 is bounded. Let v+ and v˜+ be smooth functions of x2 such that they have support in (3c, ∞), and v+ = 1 on [4c, ∞), v˜+ = 1 on supp v+ . Then u0 vanishes on supp v+ and Jd−1 v+ Jd = v+ for d 1. Thus we can calculate v+ R˜ αd (ζ )u0 = v˜+ R˜ αd (ζ )(P˜αd − ζ )v+ R˜ αd (ζ )u0 = v˜+ R˜ αd (ζ )[P˜αd , v+ ]R˜ αd (ζ )u0 on the dense set Jd A, and it follows from Lemma 4.1 that v+ R˜ αd (ζ )u0 is bounded on L2 . A similar argument applies to v− R˜ αd (ζ )u0 , where v− is supported in (−∞, 3c) and has properties similar to v+ . Hence we obtain that R˜ αd (ζ )u0 is bounded. Next we show that R˜ αd (ζ )u+ is bounded. The boundedness of R˜ αd (ζ )u− is shown in a similar way. Let {w− , w0 , w+ } be a nonnegative smooth partition of unity such that w− (x2 ) + w0 (x2 ) + w+ (x2 ) = 1 and supp w0 ⊂ (−c/2, c/2),
supp w+ ⊂ (c/3, ∞),
supp w− ⊂ (−∞, −c/3).
By Lemma 4.1, w+ R˜ αd (ζ )u+ is bounded. Let u˜ + ∈ C ∞ (R) be a function such that supp u˜ + ⊂ (3c/4, ∞) and it satisfies u˜ + u+ = u+ . Then we have the relation w0 R˜ αd (ζ )u+ = w0 R˜ αd (ζ )u+ (P˜αd − ζ )R˜ αd (ζ )u˜ + = w0 R˜ αd (ζ )[u+ , P˜αd ]R˜ αd (ζ )u˜ + on Jd A. This, together with Lemma 4.1, implies that w0 R˜ αd (ζ )u+ is bounded. We repeat the commutator calculus on Jd A to obtain w− R˜ αd (ζ )u+ = w˜ − R˜ αd (ζ )[P˜αd , w− ]R˜ αd (ζ )[u+ , P˜αd ]R˜ αd (ζ )u˜ + , where w˜ − ∈ C ∞ (R) has support in (−∞, −c/4) and satisfies w˜ − w− = w− . Hence Lemma 4.1 again shows that w− R˜ αd (ζ )u+ is bounded. Thus we have shown that R˜ αd (ζ ) is bounded on L2 .
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1855
Since P˜αd is a closed operator, it follows from (4.3) that the range Ran(P˜αd − ζ ) coincides ∗ − ζ ) = L2 for the adjoint operator P˜ ∗ (see Remark 3.1). with L2 . We can also obtain Ran(P˜αd αd This shows that ζ is in the resolvent set of P˜αd and that the resolvent R(ζ ; P˜αd ) equals R˜ αd (ζ ), and the proof is complete. 2 4.2. Proof of Lemmas 3.1 and 3.3 We prove Lemmas 3.1 and 3.2. Proof of Lemma 3.1. If we apply Lemma 4.2 to H±d = H (Φ±d ) with Φ± (x) = α± Φ(x − d± ), then R˜ ±d (ζ ) = Jd R(ζ ; H±d )Jd−1 with ζ ∈ D+d is bounded on L2 . Since g∓d (x) defined by (3.9) is bounded, it follows from (3.11) that R(ζ ; K±d ) = exp(ig∓d )R˜ ±d (ζ ) exp(−ig∓d ) turns out to be the resolvent of K±d for ζ ∈ D+d . This proves the lemma.
2
Proof of Lemma 3.3. We use the notation with the same meaning as ascribed in Step 5 of the proof of Theorem 1.1. In particular, g satisfies (3.25). In addition, we introduce a smooth function ψ3 ∈ C ∞ (R 2 ) such that ψ3 ψ2 = ψ2 . We may assume that (3.25) remains true on supp ψ3 also. We decompose R(ζ ; Hd )f = (ψ0 + ψ1 )R(ζ ; Hd )f with f ∈ L2comp (Ω0 ) into the sum of three terms in the following way: R(ζ ; Hd )f = ψ0 R(ζ ; Hd )f + ψ1 R(ζ ; Hd )ψ2 f + ψ1 R(ζ ; Hd )[Hd , ψ2 ]R(ζ ; Hd )f. The first term on the right side fulfills Jd ψ0 R(ζ ; Hd )f = ψ0 R(ζ ; Hd )f ∈ L2 . If we take the relation (3.26) into account, then the second term on the right side is further calculated as ψ1 R(ζ ; Hd )ψ2 f = ψ1 R(ζ ; Pˆ0 )ψ2 f + ψ1 R(ζ ; Pˆ0 )[Pˆ0 , ψ3 ]R(ζ ; Hd )ψ2 f. We note that Jd exp ±ig(x) Jd−1 = exp ±ig jd (x) : L2 → L2 is bounded and [Pˆ0 , ψ3 ]R(ζ ; Hd )ψ2 f ∈ L2comp (Ω0 ). Since Jd ψ1 = ψ1 Jd and Jd ψ2 f = ψ2 f for f ∈ L2comp (Ω0 ), Lemma 4.2 with Pα = P0 yields that Jd ψ1 R(ζ ; Hd )ψ2 f is in L2 . Since ψ3 = 1 both on supp ψ1 and on supp ∇ψ2 , a similar argument applies to the third term, and we obtain Jd ψ1 R(ζ ; Hd )[ψ2 , Hd ]R(ζ ; Hd )f ∈ L2 . Thus the proof is complete.
2
1856
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
4.3. Proof of Proposition 4.1 Before going into the proof, we derive the integral representation for the kernel Rα (x, y; ζ ). The derivation is based on the following formula
Hμ (Z)Jμ (z) =
1 iπ
Zz dt Z 2 + z2 t − Iμ , exp 2 2t t t
κ+i∞
|z| |Z|,
0
for the product of Bessel functions [22, p. 439], where the contour is taken to be rectilinear with corner at κ + i0, κ > 0 being fixed arbitrarily. We apply to (2.5) this formula with Z = k(|x| ∨ |y|) and z = k(|x| ∧ |y|), where Im k = Im ζ 1/2 > 0. If we write x = (|x| cos θ, |x| sin θ ) and y = (|y| cos ω, |y| sin ω) in polar coordinates, then Rα (x, y; ζ ) is represented as κ+i∞ ζ |x||y| dt ζ (|x|2 + |y|2 ) 1 ilψ t − Iν Rα = e exp 4π 2 2t t t l
(4.4)
0
with ν = |l − α|, where ψ = θ − ω. If, in particular, α = 0, then the resolvent (H0 − ζ )−1 of the free Hamiltonian H0 has the kernel (i/4)H0 (k|x − y|) represented as the integral κ+i∞ ζ |x||y| dt ζ (|x|2 + |y|2 ) i 1 ilψ t H0 k|x − y| = − Il , e exp 4 4π 2 2t t t l
0
π where Il (w) = I|l| (w) is defined by Il (ω) = (1/π) 0 ew cos ρ cos(lρ) dρ (see (2.3)). Since the
ilψ series l e Il (w) converges to ew cos ψ by the Fourier expansion and since |x − y|2 = |x|2 + |y|2 − 2|x||y| cos ψ, the kernel (i/4)H0 (k|x − y|) has the integral representation i 1 H0 k|x − y| = 4 4π
ζ |x − y|2 dt t − . exp 2 2t t
κ+i∞
(4.5)
0
We are now in a position to prove the proposition. Proof of Proposition 4.1. We consider only the case when x2 > c and y2 > c and assume throughout the proof that ζ ∈ D+d . The proof is divided into three steps. (i) Let w = Zz/t = ζ |x||y|/t with Z = k(|x| ∨ |y|) and z = k(|x| ∧ |y|). Then Re w 0 for t on the contour in the integral (4.4), and the integral representation (2.3) for Iν (w) is well defined.
We make use of this representation to calculate the series l eilψ Iν (w) in the integral. Then it admits the decomposition l
eilψ Iν (w) =
l
eilψ Ifr,ν (w) +
l
eilψ Isc,ν (w),
(4.6)
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1857
where Ifr,ν (w) and Isc,ν (w) are defined by 1 Ifr,ν (w) = π
π e
w cos ξ
sin(νπ) Isc,ν (w) = − π
cos(νξ ) dξ,
0
∞
e−w cosh p−νp dp
0
with ν = |l − α|. A simple calculation yields Ifr,ν (w) = (2π)−1
π
ew cos ξ eiαξ e−ilξ dξ
−π
and hence we have Ifr (w, ψ) =
eilψ Ifr,ν (w) = ew cos ψ eiαψ ,
|ψ| < π,
(4.7)
l
by the Fourier expansion. On the other hand, the second series on the right side of (4.6) is computed in the same way as in Section 2, and we see that it converges to sin(απ) i[α](ψ+π) e Isc (w, ψ) = − π
∞
−∞
e−w cosh p
e(1−β)p dp ep + e−iψ
(4.8)
with β = α − [α], 0 < β < 1. By assumption, x2 > c and y2 > c, so that 0 < θ, ω < π . This implies that −π < ψ = θ − ω < π , and hence the denominator ep + e−iψ in (4.8) never vanishes even for p = 0. Thus Rα (x, y; ζ ) admits the decomposition Rα (x, y; ζ ) = Rfr,α (x, y; ζ ) + Rsc,α (x, y; ζ ), where Rfr,α and Rsc,α are defined by eiαψ Rfr,α (x, y; ζ ) = 4π
ζ |x − y|2 dt ieiαψ t − = H0 k|x − y| , exp 2 2t t 4
κ+i∞
0
1 Rsc,α (x, y; ζ ) = 4π
dt t ζ |x||y| ζ (|x|2 + |y|2 ) − ,ψ . exp Isc 2 2t t t
κ+i∞
0
The function Rα (jd (x), jd (y); ζ ) in question also admits the corresponding decomposition Rα jd (x), jd (y); ζ = Rfr,α jd (x), jd (y); ζ + Rsc,α jd (x), jd (y); ζ .
(4.9)
If we recall the notation in (4.1) and (4.2), the functions on the right side are defined with |x|, |y| and ψ replaced by rd (x), rd (y) and θd (x, y), respectively. In fact, if x2 > c > 0 and y2 > c > 0, then ψ equals
1858
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
ψ = γ (x; −y) ˆ − π = γ (x; ω+ ) − γ (y; ω+ ) and it is changed into θd (x, y). In particular, we have Rfr,α jd (x), jd (y); ζ = (i/4)eiαθd (x,y) H0 krd (x, y) .
(4.10)
(ii) We prove that Rsc,α (jd (x), jd (y); ζ ) obeys Rsc,α jd (x), jd (y); ζ = O |x| + |y| −L ,
|x| + |y| → ∞.
(4.11)
By definition, Rsc,α (jd (x), jd (y); ζ ) is written as 1 4π
ζ (rd (x)2 + rd (y)2 ) t dt − Isc (t, x, y; ζ ) , exp 2 2t t
κ+i∞
(4.12)
0
and Isc (t, x, y; ζ ) = Isc (ζ rd (x)rd (y)/t, θd (x, y)) takes the form Isc (t, x, y; ζ ) = −
sin(απ) i[α](θd (x,y)+π) e Lsc (t, x, y; ζ ) π
by (4.8), where Lsc (t, x, y; ζ ) is defined by ∞ Lsc (t, x, y; ζ ) =
e−(ζ rd (x)rd (y)/t) cosh p
−∞
e(1−β)p dp. ep + e−iθd (x,y)
(4.13)
We prove the two lemmas below after completing the proof of the proposition. Lemma 4.3. Assume that x2 > c and y2 > c for some c > 0. If x1 1 and y1 −1 or if x1 −1 and y1 1, then there exists c1 > 0 such that Im e−iθd (x,y) c1 |x1 | + |y1 | −1 ,
|x1 | + |y1 | 1.
Lemma 4.4. If 0 < t < κ, then exp −ζ rd (x)2 + rd (y)2 /2t exp −c2 |x|2 + |y|2 /t ,
|x| + |y| 1,
for some c2 > 0, and if 0 < s < M(|x| + |y|) for t = κ + is, M 1 being fixed, then exp −ζ rd (x)2 + rd (y)2 /2t exp −c3 |x| + |y| , for some c3 > 0, where c3 may depend on η.
|x| + |y| 1,
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1859
The denominator ep + e−iθd (x,y) in the integral (4.13) does not vanish, but it can take values close to zero around p = 0, provided that θd (x, y) ∼ ±π . This is the case where x1 1 and y1 −1 or where x1 −1 and y1 1. However, Lemma 4.3 implies that |Lsc (t, x, y; ζ )| = O(|x| + |y|), and hence it follows from Lemma 4.4 that κ+iM ζ (rd (x)2 + rd (y)2 ) t dt − Isc (t, x, y; ζ ) exp 2 2t t
−L . = O |x| + |y|
0
(iii) The proof is completed in this step by showing that the integral
κ+i∞
χM (t, x, y) exp
ζ (rd (x)2 + rd (y)2 ) t dt − Isc (t, x, y; ζ ) 2 2t t
κ+i0
obeys O((|x| + |y|)−L ), where χM (t, x, y) = χ∞ s/ M |x| + |y| ,
|x| + |y| 1,
for s = Im t. To see this, we decompose Lsc (t, x, y; ζ ) defined by (4.13) into the sum Lsc (t, x, y, ; ζ ) =
χ0 (p) + χ∞ (p) e−(ζ rd (x)rd (y)/t) cosh p
e(1−β)p dp. ep + e−iθd (x,y)
If we set a0 (t, x, y) = t/2 − ζ (rd (x)2 + rd (y)2 )/2t and a1 (t, x, y, p) = a0 (t, x, y) − ζ rd (x)rd (y)/t cosh p,
|p| < 2,
then we can take M 1 so large that |∂t a0 | c and |∂t a1 | c for some c > 0. The desired bound is obtained by partial integration. We use |∂t a1 | c for the integral with χ0 (p). On the other hand, we make use of |∂t a0 | c and of the relation ∂t e−(ζ rd (x)rd (y)/t) cosh p = −t −1 (cosh p/ sinh p)∂p e−(ζ rd (x)rd (y)/t) cosh p ,
|p| > 2,
to evaluate the integral with χ∞ (p). Thus (4.11) is obtained, and the proposition follows from (4.9), (4.10) and (4.11). 2 We end the section by proving Lemmas 4.3 and 4.4. Proof of Lemma 4.3. We consider only the case when x1 1 and y1 −1, so that θd (x, y) behaves like θd ∼ −π . We write Im e−iθd (x,y) = eIm θd (x,y) sin Re θd (x, y) . We recall the representation (3.8) for γ (jd (x); ω+ ). We note that ηd (t) defined in (3.6) satisfies ηd (t) 0 and ηd (t) = O((log d)/d) uniformly in t. If x2 > c and y2 > c and if x1 1 and
1860
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
y1 −1, then it follows that Re γ (jd (x); ω+ ) c1 /x1 and Re γ (jd (y); ω+ ) π + c1 /y1 for some c1 > 0. Hence we have −1 Re θd (x, y) = Re γ jd (x); ω+ − γ jd (y); ω+ −π + c1 |x1 | + |y1 | . This shows that | sin(Re θd (x, y))| c1 (|x1 | + |y1 |)−1 . As is easily seen from (3.8), Im γ jd (x); ω+ = O (log d)/d
(4.14)
uniformly in x with |x| > c2 > 0, and hence we have eIm θd (x,y) c3 for some c3 > 0. Thus the lemma is verified. 2 Proof of Lemma 4.4. By (4.1), we have rd (x)2 = x12 + 1 + 2iηd (x2 ) − ηd (x2 )2 x22 . Since ηd (t) = O((log d)/d), we can easily see that Re rd (x)2 + rd (y)2 /t c |x|2 + |y|2 /t,
c > 0,
for 0 < t < κ. Thus the first statement is obtained. If we compute −1 ζ /t = κ 2 + s 2 (Eκ + ηs) + i(ηκ − Es) by setting t = κ + is and ζ = E + iη, then we have Re (ζ /t) rd (x)2 + rd (y)2 c (1 + ηs)/ 1 + s 2 |x|2 + |y|2 for some c > 0. This proves the second statement for 0 < s < M(|x| + |y|), and the proof is complete. 2 5. Proof of Lemmas 3.2 and 3.5 In this section we prove Lemmas 3.2 and 3.5. The proof of both the lemmas is based on the same idea, but Lemma 3.5 is much more difficult to prove than Lemma 3.2. We give a detailed proof for Lemma 3.5 and only a sketch for Lemma 3.2. 5.1. Preliminary proposition and lemmas We begin by formulating the proposition which plays an important role in proving Lemma 3.5. Proposition 5.1. Let Rα (x, y; ζ ) be the kernel of the resolvent R(ζ ; Pα ) with ζ ∈ D −d , D −d being the closure of D−d , and let N 1 be fixed arbitrarily but large enough. Set k = ζ 1/2 with Im k 0. Assume that −3d/4 < x1 , y1 < −d/4, for some c > 0. Then we have the following statements:
|x1 − y1 | > cd
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1861
(1) If |x2 | + |y2 | N d, then Rα (jd (x), jd (y); ζ ) behaves like −σ N Rα jd (x), jd (y); ζ = (i/4)eiαθd (x,y) H0 krd (x, y) + O |x| + |y| for some σ > 0 independent of N . (2) Let c(E) be the constant defined by c(E) = (8π)−1/2 eiπ/4 E −1/4 .
(5.1)
If |x2 | + |y2 | N d, then Rα (jd (x), jd (y); ζ ) admits the decomposition Rα jd (x), jd (y); ζ = (i/4)eiαθd (x,y) H0 krd (x, y) + Gα (x, y; ζ ) + O d −N and Gα (x, y; ζ ) takes the asymptotic form −1/2 Gα = c(E)eik(rd (x)+rd (y)) rd (x)rd (y) fα (−ω → θ ; E) + eN (x, y; ζ ) , where fα (−ω → θ ; E) is the amplitude defined by (1.4) for scattering from −ω = −y/|y| to θ = x/|x| at energy E by the field 2παδ(x), and eN (x, y; ζ ) obeys ∂xn ∂ym eN = O (log d)2 d −1−|n|−|m| uniformly in x, y and ζ . (3) Similar asymptotic formulas remain true for the derivatives ∂Rα jd (x), jd (y); ζ /∂xj ,
∂Rα jd (x), jd (y); ζ /∂yj ,
j = 1, 2,
with natural modification in both the cases (1) and (2) above. Remark 5.1. If x1 and y1 satisfy d/4 < x1 , y1 < 3d/4, then the same results remain true with θd (x, y) replaced by θ˜d (x, y) = γ (jd (x); ω− ) − γ (jd (y); ω− ), where ω− = (−1, 0). We prove the proposition at the end of the section. We proceed with the argument, accepting the proposition as proved. We apply this proposition to the kernel F± (x, y; ζ ) of the resolvent R(ζ ; K±d ) with ζ ∈ D −d for the operator K±d defined by (3.11). Let H± = H (α± Φ) be the selfadjoint operator with the boundary condition (1.3) at the origin and let R± (x, y; ζ ) be the kernel of the resolvent R(ζ ; H± ) analytically continued over D −d . Then the kernel of R(ζ ; H±d ) is given by R± (x − d± , y − d± ; ζ ) with d± = (±d/2, 0) for the auxiliary operator H±d = H (Φ±d ), and it follows from (3.11) that F± (x, y; ζ ) = j˜d (x, y)ei(g∓d (x)−g∓d (y)) R±d (x, y; ζ ), where R±d (x, y; ζ ) = R± jd (x) − d± , jd (y) − d± ; ζ
1862
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
and g±d (x) is defined by (3.9). According to (4.1), it is obvious that rd (x − d± , y − d± ) = rd (x, y). Let X and Y be the commutators defined by (3.19) and (3.21), respectively. The coefficients of X have support in Σ0 (see (3.17)). On the other hand, the support of the coefficients of Y is divided into the two regions Σ− = {x: −d/4 < x1 < −d/8},
Σ+ = {x: d/8 < x1 < d/4}.
(5.2)
We assume that x ∈ Σ0 and y ∈ Σ = Σ− ∪ Σ+ . Then −9d/16 < x1 − d/2 < −7d/16,
−3d/4 < y1 − d/2 < −d/4
and d/16 < |x1 − y1 | < 5d/16. If |x2 | + |y2 | N d for N 1 fixed, then we have −σ N R+d (x, y; ζ ) = (i/4)eiα+ θ+d (x,y) H0 krd (x, y) + O |x| + |y| by Proposition 5.1(1), where θ+d (x, y) = γ jd (x) − d+ ; ω+ − γ jd (y) − d+ ; ω+ . We write r±d (x) for rd (x, d± ) and xˆ±d for (x − d± )/|x − d± |. Let f± (ω → θ ; E) denote the amplitude for scattering from ω to θ by the field 2πα± δ(x). If |x2 | + |y2 | N d, then it follows from Proposition 5.1(2) that R+d (x, y; ζ ) behaves like R+d (x, y; ζ ) = (i/4)eiα+ θ+d (x,y) H0 krd (x, y) + G+d (x, y; ζ ) + O d −N and G+d (x, y; ζ ) takes the form −1/2 f+ (−yˆ+d → xˆ+d ; E) + e+N , G+d = c(E)eik(r+d (x)+r+d (y)) r+d (x)r+d (y) where e+N = e+N (x, y; ζ ) obeys the same bound as eN in Proposition 5.1. We can derive a similar asymptotic form for R−d (x, y; ζ ). Assume that x ∈ Σ = Σ+ ∪ Σ− and y ∈ Σ0 . If |x2 | + |y2 | Nd, then −σ N R−d (x, y; ζ ) = (i/4)eiα− θ−d (x,y) H0 krd (x, y) + O |x| + |y| , where θ−d (x, y) = γ jd (x) − d− ; ω− − γ jd (y) − d− ; ω− . If |x2 | + |y2 | N d, then R−d (x, y; ζ ) = (i/4)eiα− θ−d (x,y) H0 krd (x, y) + G−d (x, y; ζ ) + O d −N and G−d (x, y; ζ ) takes the form −1/2 f− (−yˆ−d → xˆ−d ; E) + e−N . G−d = c(E)eik(r−d (x)+r−d (y)) r−d (x)r−d (y)
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1863
We summarize the asymptotic properties of the kernel F± (x, y; ζ ) of R(ζ ; K±d ) with ζ ∈ D −d in the lemma below. Lemma 5.1. Define F±0 (x, y; ζ ) = (i/4)j˜d (x, y)ei(g∓d (x)−g∓d (y)) eiα± θ±d (x,y) H0 krd (x, y) and set F±1 (x, y; ζ ) = j˜d (x, y)ei(g∓d (x)−g∓d (y)) G±d (x, y; ζ ) for G±d (x, y; ζ ) as above. (1) Assume that x ∈ Σ0 and y ∈ Σ = Σ− ∪ Σ+ . If |x2 | + |y2 | N d for N 1, then −σ N , F+ (x, y; ζ ) = F+0 (x, y; ζ ) + O |x| + |y| and if |x2 | + |y2 | N d, then F+ (x, y; ζ ) = F+0 (x, y; ζ ) + F+1 (x, y; ζ ) + O d −N . These relations hold true in the C 1 topology. (2) Assume that x ∈ Σ and y ∈ Σ0 . If |x2 | + |y2 | N d for N 1, then −σ N F− (x, y; ζ ) = F−0 (x, y; ζ ) + O |x| + |y| , and if |x2 | + |y2 | N d, then F− (x, y; ζ ) = F−0 (x, y; ζ ) + F−1 (x, y; ζ ) + O d −N . We prove two preliminary lemmas. Lemma 5.2. Assume that |x1 | d/2 and |y1 | d/2. If ζ ∈ D −d , then there exist μ > 0 and c > 0 such that ikr (x,y) e d = O d μ exp −c (log d)/d |x2 − y2 | for k = ζ 1/2 , and in particular, one has |eikr−d (x) | + |eikr+d (x) | = O(d μ ). Proof. Let ηd (t) be defined in (3.6). We set η˜ d (t) = ηd (t)t. For brevity, we assume that y2 x2 . Then we compute rd (x, y)2 = |x − y|2 + 2i η˜ d (z2 ) + O (log d)2 /d 2 (x2 − y2 )2
1864
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
for some z2 with y2 z2 x2 , where η˜ d (z2 ) = O((log d)/d). If ζ = E − iη ∈ D −d , then 0 1/2 η 2E0 (log d)/d and k = ζ 1/2 = E 1/2 − iE −1/2 η/2 + O (log d)2 /d 2 ,
d 1.
(5.3)
Hence we have 2 Im krd (x, y) ∼ E 1/2 η˜ d (z2 ) (x2 − y2 )/|x − y| − E −1/2 η/2 |x − y| for d 1. We can take c1 > 0 in such a way that −1/2 η˜ d (z2 ) = η˜ d (x2 ) − η˜ d (y2 ) /(x2 − y2 ) 4E0 (log d)/d when |x2 | + |y2 | > c1 d. If |x2 − y2 | > d and |x2 | + |y2 | > c1 d, then 1/2 E η˜ d (z2 ) − E −1/2 η /2 2(E/E0 )1/2 − (E0 /E)1/2 (log d)/d c(log d)/d for some c > 0. This implies that ikr (x,y) e d = e−Im(krd (x,y)) e−c((log d)/d)|x2 −y2 | for x and y as above. On the other hand, if |x2 − y2 | < d or if |x2 | + |y2 | < c1 d, then we have |Im(krd (x, y))| = O(log d), and hence the estimate in the lemma is obtained. Thus the proof is complete. 2 Lemma 5.3. Assume that ζ ∈ D −d . Let u(x) be a smooth function such that u has support in {d/8 < |x1 | < d/4} and satisfies ∂xn u = O(d −|n| ). Define U (x, y) by U (x, y) =
eikrd (x,ξ ) u(ξ )eikrd (ξ,y) dξ
for k = ζ 1/2 . If x and y are in Σ0 , then there exists c > 0 such that U (x, y) = O d −L exp −c (log d)/d |x2 − y2 | for any L 1. Proof. The proof is based on the property that exp(ikrd (x, y)) oscillates highly in the x1 variable and falls off exponentially in the x2 variable. By Lemma 5.2, we have ikr (x,ξ ) ikr (ξ,y) = O d 2μ exp −c (log d)/d |x2 − ξ2 | + |ξ2 − y2 | e d e d for some c > 0. In particular, if |x2 − ξ2 | > Ld for L 1 fixed arbitrarily, then it follows from Lemma 5.2 that ikr (x,ξ ) = O d −σ L exp −c (log d)/d |x2 − ξ2 | e d
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1865
with some σ > 0 independent of L. Since |x2 − ξ2 | + |ξ2 − y2 | > |x2 − y2 | and since
exp −c (log d)/d |ξ2 − y2 | dξ2 = O(d/ log d),
the desired bound is obtained for the integral over the interval |ξ2 − x2 | > Ld. A similar argument applies to the integral over the interval |ξ2 − y2 | > Ld. We assume that |ξ2 − x2 | < Ld and |ξ2 − y2 | < Ld. If x and y are in Σ0 , then |x1 | < d/16 and |y1 | < d/16, and hence it follows that |x1 − ξ1 | > d/16 and |y1 − ξ1 | > d/16 for ξ ∈ supp u. We consider the function ξ1 → rd (x, ξ ) + rd (ξ, y) = |x − ξ | + |ξ − y| + O(log d). Since |x2 − y2 | < 2Ld and since (∂/∂ξ1 ) |x − ξ | + |ξ − y| > c > 0 for ξ ∈ supp u, we make repeated use of partial integration to obtain the desired bound for the integral over the interval where |ξ2 − x2 | < Ld and |ξ2 − y2 | < Ld. This completes the proof. 2 5.2. Proof of Lemmas 3.2 and 3.5 The proof of Lemma 3.5 is done through a series of lemmas. We begin by recalling that Td (ζ ) is defined by Td (ζ ) = XR(ζ ; K+d )Y R(ζ ; K−d ) : L2 (Σ0 ) → L2 (Σ0 ) for ζ = E − iη ∈ D −d (see (3.20)). The commutators X and Y are defined by X = [K0d , χ−d ] with χ−d = χ− (16x1 /d) and by Y = [K0d , χ0d ] with χ0d = χ0 (8x1 /d), where K0d = eig0d (Jd H0 Jd−1 )e−ig0d (see (3.14), (3.19) and (3.21)). By definition, the map Jd commutes with operators depending only on the x1 variable. Hence X is calculated as X = eig0d Jd −∂12 , χ−d Jd−1 e−ig0d = eig0d −∂12 , χ−d e−ig0d
(5.4)
and similarly we have Y = eig0d [−∂12 , χ0d ]e−ig0d . We may write χ0d as the product χ0d (x1 ) = χ+ (16x1 + 3d)/d χ− (16x1 − 3d)/d = χ˜ +d (x1 )χ˜ −d (x1 ), so that Y takes the form Y = eig0d
2
−∂1 , χ˜ +d + −∂12 , χ˜ −d e−ig0d = Y − + Y + ,
(5.5)
where the coefficients of Y ± have support in Σ± defined by (5.2). We note that the function g0d (x) defined by (3.10) satisfies ∂xn g0d = O(d −|n| ) and similarly for g±d (x) and det(∂jd (x)/∂x). We now consider the equation ϕ + Td (ζ )ϕ = h,
(5.6)
1866
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
for a given h ∈ L2 (Σ0 ). We show that this equation is solvable in L2 (Σ0 ), provided that η satisfies the assumption 0 η < ηεd (E) in Theorem 1.1. We fix N 1 large enough and take ρ > 1/2 close enough to 1/2. Let {u1 , u2 , u3 } be the partition of unity defined by u1 = χ0 x2 /d ρ ,
u2 = χ∞ x2 /d ρ χ0 (x2 /N d),
u3 = χ∞ (x2 /N d).
(5.7)
We further introduce smooth functions u˜ j such that u˜ j has a slightly larger support than uj and satisfies the relation u˜ j uj = uj for j = 1, 2, 3 and that all their derivatives obey the same bounds as those of uj for d 1. We decompose ϕ into ϕ = ϕ1 + ϕ2 + ϕ3 = (u1 + u2 + u3 )ϕ and similarly for h. Then (5.6) is written in the matrix form
Id + S11 S21 S31
S12 Id + S22 S32
S13 S23 Id + S33
ϕ1 ϕ2 ϕ3
=
h1 h2 h3
,
where Sj k = Sj k (ζ ) = uj Td (ζ )u˜ k , 1 j, k 3. We use the notation · to denote the norm of a bounded operator acting on L2 (Σ0 ). Lemma 5.4. We have S33 (ζ ) = O(d −σ N ) for some σ > 0 independent of N . Proof. We show that the kernel S33 (x, y; ζ ) of S33 (ζ ) satisfies S33 (x, y; ζ ) = O d −N exp −c (log d)/d |x2 − y2 | −cN + O |x2 | + d exp −c (log d)/d |y2 | −cN + O |y2 | + d exp −c (log d)/d |x2 | −cN + O |x2 | + |y2 | + d for some c > 0. If x ∈ Σ0 and ξ ∈ Σ = Σ+ ∪ Σ− , then |x − ξ | > d/16. Hence the Hankel function H0 (krd (x, ξ )) takes the asymptotic form H0 krd (x, ξ ) =
1/2 −iπ/4 ikrd (x,ξ ) e e 2 1 + O |rd (x, ξ )|−1 π (krd (x, ξ ))1/2
(5.8)
for |rd (x, ξ )| 1 by formula, and similarly for H0 (krd (ξ, y)) with ξ ∈ Σ and y ∈ Σ0 . Thus the first bound on the right side is obtained by applying Lemma 5.3 to the integral u3 (x2 ) XF+0 (x, ξ )Y F−0 (ξ, y) dξ u˜ 3 (y2 ). The other bounds are obtained by evaluating integrals such as
−cN |x| + |ξ | + d Y F−0 (ξ, y)u˜ 3 (y2 ) dξ,
−cN −cN |ξ | + |y| + d |x| + |ξ | + d dξ.
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1867
If |y2 − ξ2 | < |y2 |/2, then |x2 | + |ξ2 | ∼ |x2 | + |y2 |, and if |y2 − ξ2 | > |y2 |/2, then ikr (ξ,y) = O d μ exp −c (log d)/d |y2 | e d by Lemma 5.2. If we take these facts into account, then we can establish the above bound on S33 (x, y; ζ ), and hence the lemma is proved. 2 Lemma 5.5. The operators S32 (ζ ), S23 (ζ ), S31 (ζ ) and S13 (ζ ) obey S32 + S23 + S31 + S13 = O d −σ N for some σ > 0 independent of N . Proof. The lemma is verified in almost the same way as Lemma 5.4. For example, we consider the kernel S32 (x, y; ζ ) of S32 (ζ ). Let {vN 0 , vN ∞ } be the partition of unity defined by vN 0 = χ0 (4x2 /Nd) and vN ∞ = χ∞ (4x2 /Nd). Then the integral u3 (x2 ) XF+ (x, ξ ; ζ )vN ∞ Y F− (ξ, y; ζ ) dξ u˜ 2 (y2 ) is shown to obey the same bound as S33 (x, y; ζ ) in the proof of Lemma 5.4. Let F±0 (x, y; ζ ) and F±1 (x, y; ζ ) be as in Lemma 5.1. We apply Lemma 5.3 to the integral V0 (x, y; ζ ) = u3 (x2 ) XF+0 (x, ξ ; ζ )vN 0 Y F−0 (ξ, y; ζ ) dξ u˜ 2 (y2 ) and Lemma 5.2 to the integral V1 (x, y; ζ ) = u3 (x2 ) XF+0 (x, ξ ; ζ )vN 0 Y F−1 (ξ, y; ζ ) dξ u˜ 2 (y2 ). Since |x2 − ξ2 | > N d/2 for ξ2 ∈ supp vN 0 , it follows from Lemma 5.2 that u3 (x2 )XF+0 (x, ξ ; ζ ) |x2 | + d −σ N ,
ξ2 ∈ supp vN 0 ,
for some σ > 0 independent of N , and we also have vN 0 (ξ2 )Y F−1 (ξ, y; ζ )u˜ 2 (y2 ) = O d μ for some μ > 0 independent of N . Thus we make use of these lemmas to obtain V0 (x, y; ζ ) = O d −σ N exp −c (log d)/d |x2 − y2 | and V1 (x, y; ζ ) = O((|x2 | + d)−σ N )u˜ 2 (y2 ). This yields S32 = O(d −σ N ). The other operators are also dealt with in a similar way. We skip the details. 2
1868
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
By Lemmas 5.4 and 5.5, the problem is now reduced to the solvability of equation
Id + S11 S21
S12 Id + S22
ϕ1 ϕ2
=
h1 h2
(5.9)
with another h1 and h2 in L2 (Σ0 ). Lemma 5.6. We have S22 (ζ )2 = O(d −L ) for any L 1. Proof. We present only an outline of the proof. A similar but more refined argument is used for proving Lemma 5.8 below. We evaluate the kernel of the operator S22 (ζ )2 = u2 XR(ζ ; K+d )Y R(ζ ; K−d )u2 XR(ζ ; K+d )Y R(ζ ; K−d )u˜ 2 . The idea is based on the fact that a particle which starts from supp u˜ 2 and passes over supp u2 again after being scattered by the fields 2πα± δ(x − d± ) never returns to supp u2 . Let Y ± be as in (5.5) and let F±0 and F±1 be as in Lemma 5.1. Then S22 admits the decomposition + − + S22 , S22 = S22
± S22 = u2 XR(ζ ; K+d )Y ± R(ζ ; K−d )u˜ 2
and it is shown in almost the same way as in the proof of Lemma 5.4 that the asymptotic form of ± (x, y; ζ ) is determined by the sum of the integrals the kernel S22 Uj±k (x, y; ζ ) = u2 (x2 ) XF+j (x, ξ ; ζ )vL0 Y ± F−k (ξ, y; ζ ) dξ u˜ 2 (y2 ) with 0 j, k 1, where vL0 (x2 ) is defined by vL0 = χ0 (x2 /Ld) for L 1 fixed arbitrarily. We − + ± , U01 and U00 . If make use of partial integration in the ξ1 variable to evaluate the integrals U10 ξ = (ξ1 , ξ2 ) ∈ Σ− with ξ2 ∈ supp vL0 and y = (y1 , y2 ) ∈ Σ0 with y2 ∈ supp u˜ 2 , then y1 > ξ1 and (∂/∂ξ1 ) |d+ − ξ | + |ξ − y| > c > 0 − + ± and hence it follows that U10 (x, y; ζ ) = O(d −L ). A similar argument applies to U01 and U00 . On the other hand, we make use of the stationary phase method in the ξ2 variable to evaluate the − (x, y; ζ ) for x = (x1 , x2 ) ∈ Σ0 with x2 ∈ supp u2 . We recall the other integrals. We consider U01 behavior of F+0 (x, ξ ; ζ ) and F−1 (ξ, y; ζ ) from Lemma 5.1. The phase function takes the form
ξ2 → r−d (ξ ) + rd (ξ, x) = |ξ − d− | + |x − ξ | + O(log d) for ξ and x as above. For each ξ1 fixed, the stationary point is attained at ξ = (ξ1 , ξ2 ) on the segment joining x and d− . We see that the stationary point ξ2 is non-degenerate and |x − ξ | + − (x, y; ζ ) takes the asymptotic form |ξ − d− | = |x − d− | at the point ξ = (ξ1 , ξ2 ). Thus U01 − U01 (x, y; ζ ) ∼ eik(|x−d− |+|y−d− |) u− 01 (x, y; ζ ) n m − μ−ρ(|n|+|m|) ) for some μ > 0, where ρ > 1/2 is as in and u− 01 (x, y; ζ ) obeys ∂x ∂y u01 = O(d (5.7). The explicit representation for the leading term of u− 01 does not matter in the proof of the
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1869
+ ± + lemma. A similar argument applies to U10 and U11 . For the integral U10 (x, y; ζ ), the stationary point is attained at the point ξ = (ξ1 , ξ2 ) ∈ Σ+ on the segment joining the two points y and d+ for each ξ1 fixed, and the integral takes the asymptotic form + U10 (x, y; ζ ) ∼ eik(|x−d+ |+|y−d+ |) u+ 10 (x, y; ζ ), − where u+ 10 (x, y; ζ ) satisfies the same type of estimates as u01 (x, y; ζ ). For the integral ± U11 (x, y; ζ ), the stationary point is attained at the point ξ = (ξ1 , 0) ∈ Σ± , and we have ± (x, y; ζ ) ∼ eik(|x−d+ |+|y−d− |) u± U11 11 (x, y; ζ ).
evaluate the kernel of the iterated operator S22 (ζ )2 . For example, we consider the integral We − + U01 (x, ξ ; ζ )U10 (ξ, y; ζ ) dξ . If ξ2 ∈ supp u2 , then |ξ2 | > d ρ , and we have (∂/∂ξ2 ) |ξ − d− | + |ξ − d+ | > cd −1+ρ for some c > 0. Since ρ > 1 − ρ, we see by partial integration that the integral obeys the bound O(d −L ). A similar argument applies to other terms, and the proof is complete. 2 It follows from Lemma 5.6 that Id + S22 is invertible on L2 (Σ0 ), and we have 2 −1 (Id + S22 )−1 = Id − S22 (Id − S22 ). Hence the first component ϕ1 of Eq. (5.9) solves Id + S11 − S12 (Id + S22 )−1 S21 ϕ1 = h˜ 1 , where h˜ 1 = h1 − S12 (Id + S22 )−1 h2 . Lemma 5.7. S12 (Id + S22 )−1 S21 = O d −L for any L 1. Proof. We write (Id + S22 )−1 = Id − S22 + S22 (Id + S22 )−1 S22 . Then we have S12 (Id + S22 )−1 S21 = S12 S21 − S12 S22 S21 + S12 S22 (Id + S22 )−1 S22 S21 . For the same reason as in the proof of Lemma 5.6, we can show that S12 S21 + S12 S22 = O d −L . This proves the lemma.
2
1870
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
By Lemma 5.7, the solvability of (5.9) is obtained from the lemma below. Lemma 5.8. Let ηεd (E) be as in Theorem 1.1. If ζ = E − iη ∈ D −d satisfies 0 η < ηεd (E), then Id + S11 (ζ ) : L2 (Σ0 ) → L2 (Σ0 ) has a bounded inverse for d 1. Proof. As in the proof of Lemma 5.6, we decompose S11 into the sum + − + S11 , S11 = S11
± S11 = u1 XR(ζ ; K+d )Y ± R(ζ ; K−d )u˜ 1 .
± Then the asymptotic form of the kernel S11 (x, y; ζ ) is determined by the sum of the integrals
Q± j k (x, y; ζ ) = u1 (x2 )
XF+j (x, ξ ; ζ )vL0 Y F−k (ξ, y; ζ ) dξ u˜ 1 (y2 ) ±
with 0 j, k 1, where vL0 is again defined by vL0 (x2 ) = χ0 (x2 /Ld). Among these kernels, + ± Q− 10 , Q01 and Q00 obey − Q (x, y; ζ ) + Q+ (x, y; ζ ) + Q+ (x, y; ζ ) + Q− (x, y; ζ ) = O d −L . 10
01
00
00
The asymptotic behaviors as d → ∞ of the other kernels are analyzed by use of the stationary phase method in the ξ2 variable. We analyze the behavior of Q− 01 (x, y; ζ ) in some detail. Assume that x = (x1 , x2 ) ∈ Σ0 with x2 ∈ supp u1 and y = (y1 , y2 ) ∈ Σ0 with y2 ∈ supp u˜ 1 . Let ξ = (ξ1 , ξ2 ) ∈ Σ− with ξ2 ∈ supp vL0 . For each ξ1 fixed, the stationary point of the phase function ξ2 → |ξ − d− | + |x − ξ | is attained at ξ = (ξ1 , ξ2 ) on the segment joining x and d− . We note that |ξ1 + d/2|/|ξ − d− | = |x1 − ξ1 |/|x − ξ | = |x1 + d/2|/|x − d− | and |ξ − d− | + |x − ξ | = |x − d− | at ξ = (ξ1 , ξ2 ) with the stationary point ξ2 . Thus Q− 01 (x, y; ζ ) takes the asymptotic form ik(|x−d− |+|y−d− |) − q01 (x, y; ζ ). Q− 01 (x, y; ζ ) ∼ e − (x, y; ζ ). The Hessian is calculated as We analyze the behavior as d → ∞ of q01
(ξ1 + d/2)2 (x1 − ξ1 )2 + = |ξ − d− |3 |x − ξ |3
x1 + d/2 |x − d− |
so that the contribution from the Hessian turns out to be
2
|x − d− | , |ξ − d− ||x − ξ |
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1/2 iπ/4 −1/2
(2π)
e
k
1871
|ξ − d− ||x − ξ | 1/2 |x − d− |/(x1 + d/2) |x − d− |
according to the stationary phase method [13, Theorem 7.7.5]. Since k = ζ 1/2 = E 1/2 + O((log d)/d) and since |x − d− |/(x1 + d/2) = 1 + O d −2+2ρ , the above quantity behaves like 1/2 (2π)1/2 eiπ/4 E −1/4 |ξ − d− ||x − ξ | |x − d− |−1/2 1 + O d −1+ρ .
(5.10)
We recall the behaviors of F+0 (x, ξ ; ζ ) and of F−1 (ξ, y; ζ ) from Lemma 5.1 to calculate XF+0 (x, ξ ; ζ ) and Y − F−1 (ξ, y; ζ ) when ξ is on the segment joining d− and x. We have j˜d (x, ξ ) = 1 and eiα+ θ+d (x,ξ ) = 1 + O d −1+ρ ,
ei(g−d (x)−g−d (ξ )) = 1 + O d −1+ρ .
We further have F+0 (x, ξ ; ζ ) = c(E)eik|x−ξ | |x − ξ |−1/2 1 + O d −1+ρ (x )∂ by (5.1) and (5.8). It follows from (5.4) and (5.5) that X and Y ± take the forms X ∼ −2χ−d 1 1 ± and Y ∼ −2χ˜ ∓d (x1 )∂1 . Since x1 > ξ1 for x ∈ Σ0 and ξ ∈ Σ− , we have ∂1 |x − ξ | = 1 + O(d −1+ρ ). Thus XF+0 (x, ξ ; ζ ) behaves like
XF+0 = −2iE 1/2 c(E)eik|x−ξ | |x − ξ |−1/2 χ−d (x1 ) + O d −2+ρ .
(5.11)
We consider Y − F−1 (ξ, y; ζ ). Let ξ ∈ Σ− be as above. Assume that y ∈ Σ0 with y2 ∈ supp u˜ 1 . Then the amplitude f− (−yˆ−d → ξˆ−d ; E) for the scattering by the field 2πα− δ(x) satisfies the relation f− (−yˆ−d → ξˆ−d ; E) = f− (ω− → ω+ ; E) + O d −1+ρ ,
ω± = (±1, 0).
Since ∂1 |ξ − d− | = 1 + O(d −1+ρ ), we repeat a similar computation to obtain that Y − F−1 (ξ, y; ζ ) behaves like −1/2 −2iE 1/2 c(E)eik(|ξ −d− |+|y−d− |) |ξ − d− ||y − d− | χ˜ +d (ξ1 )f− + O d −2+ρ with f− = f− (ω− → ω+ ; E). We now note that −2iE 1/2 c(E)(2π)1/2 eiπ/4 E −1/4 = 1 by the definition (5.1) of c(E) and that χ˜ +d (ξ1 ) dξ1 = 1. Then we combine the above behavior of Y − F−1 with (5.10) and (5.11) to see that Q− 01 (x, y; ζ ) takes the form
1872
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885 ik(|x−d− |+|y−d− |) − Q− q01 (x, y; ζ ), 01 = e
− (x, y; ζ ) behaves like where q01
−1/2 − q01 = −2iE 1/2 c(E)u1 (x2 ) |x − d− ||y − d− | u˜ 1 (y2 ) χ−d (x1 )f− + O d −2+ρ . ± The other integrals Q+ 10 (x, y; ζ ) and Q11 (x, y; ζ ) are dealt with in a similar way. Since χ˜ −d (ξ1 ) dξ1 = −1 and ∂1 |x − d+ | = −1 + O(d −1+ρ ), Q+ 10 (x, y; ζ ) takes the form ik(|x−d+ |+|y−d+ |) + Q+ q10 (x, y; ζ ), 10 = e + (x, y; ζ ) behaves like where q10
−1/2 + = −2iE 1/2 c(E)u1 (x2 ) |x − d+ ||y − d+ | u˜ 1 (y2 ) χ−d (x1 )f+ + O d −2+ρ q10 if we take into account the relations with f+ = f+ (ω+ → ω− ; E). On the other hand, χ˜ ±d (ξ1 ) dξ1 = ±1 and ∂1 |x − d+ | = −1 + O(d −1+ρ ), we can show that Q± 11 (x, y; ζ ) takes the form ik(|x−d+ |+|y−d− |) ± q11 (x, y; ζ ), Q± 11 = e ± where q11 (x, y; ζ ) behaves like
−1/2 ∓2iE 1/2 c(E)eikd d −1/2 u1 |x − d+ ||y − d− | u˜ 1 χ−d (x1 )f− f+ + O d −2+ρ . + Hence it follows that the sum Q− 11 (x, y; ζ ) + Q11 (x, y; ζ ) behaves like
−1/2 eik(|x−d+ |+|y−d− |) u1 (x2 )χ−d (x1 ) |x − d+ ||y − d− | u˜ 1 (y2 )O d −2+ρ , because |eikd d −1/2 | = O(1) is bounded uniformly in d 1 when ζ = E − iη satisfies 0 η < ηεd (E) (see (1.6)). We evaluate the norm of the integral operator with the remainder term −1/2 u˜ 1 (y2 )O d −2+ρ r(x, y; ζ ) = eik(|x−d− |+|y−d− |) u1 (x2 ) |x − d− ||y − d− | 2ikd /d| = O(1), it follows of Q− 01 (x, y; ζ ) as a kernel. Since 7d/16 < |x − d− | < 9d/16 and |e 2ik|x−d | 1−μ − that |e | = O(d ) for some μ > 0. If we note that |x2 | = O(d ρ ) on the support of u1 , then we have r(x, y; ζ )2 dx dy = O d −2−2μ+4ρ . Σ0 Σ0
We can take ρ > 1/2 so close to 1/2 that the norm of the integral operator under consideration obeys the bound o(1) as d → ∞. A similar argument applies to the remainder term
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1873
− of Q+ 10 (x, y; ζ ), and also the norm of the integral operator with the kernel Q11 (x, y; ζ ) + Q+ 11 (x, y; ζ ) obeys the bound o(1) as d → ∞. We now combine all the results obtained above to see that the kernel of the operator S11 behaves like
S11 (x, y; ζ ) ∼ −2iE 1/2 c(E) f− s− (x) × s˜− (y) + f+ s+ (x) × s˜+ (y) + R(x, y; ζ ) with f− = f− (ω− → ω+ ; E) and f+ = f+ (ω+ → ω− ; E), where s± = χ−d (x1 )eik|x−d± | |x − d± |−1/2 u1 (x2 ),
s˜± = eik|x−d± | |x − d± |−1/2 u˜ 1 (x2 )
and the error term O((|x| + |y|)−N ) is negligible. The remainder term R(x, y; ζ ) on the right side takes the form −1/2 R(x, y; ζ ) = u1 (x2 ) eik(|x−d− |+|y−d− |) |x − d− ||y − d− | r− (x, y; ζ ) −1/2 + eik(|x−d+ |+|y−d+ |) |x − d+ ||y − d+ | r+ (x, y; ζ )
−1/2 + eik(|x−d+ |+|y−d− |) |x − d+ ||y − d− | r0 (x, y; ζ ) u˜ 1 (y2 ), where r0 (x, y; ζ ) satisfies ∂xm ∂yn r0 = O(d −2+ρ−ρ(|m|+|n|) ) and similarly for r± . We denote by R the integral operator with the kernel R(x, y; ζ ) and consider the operator S0 : L2 (Σ0 ) → L2 (Σ0 ) with the kernel S0 (x, y; ζ ) = −2iE 1/2 c(E) f− sˆ− (x) × s˜− (y) + f+ sˆ+ (x) × s˜+ (y) , where sˆ± = (Id + R)−1 s± = s± − (Id + R)−1 e± ,
e± = Rs± .
We claim that Id + S0 has a bounded inverse. Then we obtain that the operator Id + S11 in question also has a bounded inverse. We analyze the behavior of sˆ+ (x)˜s+ (x) dx and sˆ+ (x)˜s− (x) dx. As stated above, |e2ik|x−d± | | = O(d 1−μ ) for some μ > 0. This implies that the L2 norms of s± and s˜± obey s± 2 = O d −μ/2+ρ/2−1/2 ,
˜s± 2 = O d −μ/2+ρ/2+1/2 .
We also have
e+ (x) = u1 (x2 ) eik|x−d− | |x − d− |−1/2 + eik|x−d+ | |x − d+ |−1/2 O d −2+ρ + O d −L by making use of the stationary phase method for the integral with respect to the x2 variable, and hence it follows that e+ 2 = O d −μ/2+ρ/2−1/2 O d −1+ρ
1874
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
and similarly for e− . We can take ρ > 1/2 so close to 1/2 that
sˆ+ (x)˜s+ (x) dx = O d −L + O d −μ O d 2ρ−1 = o(1),
d → ∞,
and the stationary phase method applied to the integral with respect to the x2 variable yields
−1/2 ikd −1/2 e d + o(1). sˆ+ (x)˜s− (x) dx = − E 1/2 /2πi
A similar argument applies to the integrals sˆ− (x)˜s+ (x) dx and sˆ− (x)˜s− (x) dx. The eigenfunction of S0 takes the form c− sˆ− + c+ sˆ+ with |c− | + |c+ | = 0. Since −1/2 −2iE 1/2 c(E) E 1/2 /2πi = 1, t (c
− , c+ )
is approximately calculated as an eigenvector of the matrix
o(1) −eikd d −1/2 f+ + o(1) . o(1) −eikd d −1/2 f− + o(1)
When ζ = E − iη satisfies 0 η < ηεd (E), we can take dε (E) 1 so large that 2ikd −1 e d f− f+ < 1 − ε/2 for d > dε (E) (see (1.6)). This implies that Id + S0 is invertible, and the proof of the lemma is now complete. 2 We are now in a position to complete the proof of Lemma 3.5 in question. Proof of Lemma 3.5. We combine Lemmas 5.4–5.8 to conclude that Id + Td (ζ ) has a bounded inverse on L2 (Σ0 ) for d 1, provided that ζ = E − iη ∈ D −d satisfies 0 η < ηεd (E). This completes the proof. 2 We make only a brief comment on the proof of Lemma 3.2. Proof of Lemma 3.2. Proposition 5.1 remains true for ζ = E + iη ∈ D+d . Since Im k = Im ζ 1/2 > 0, |e2ikd /d| → 0 as d → ∞. Hence it can be shown that Id + Td (ζ ) has a bounded inverse on L2 (Σ0 ) for d 1. This proves the lemma. 2 5.3. Proof of Proposition 5.1 We end the section by proving Proposition 5.1 which has played a central role in the proof of Lemma 3.5. Proof of Proposition 5.1. (1) We prove the first statement. By assumption, |x1 | 3d/4,
|y1 | 3d/4,
|x2 | + |y2 | N d
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1875
for N 1. Let t be on the contour of the line integral in (4.4). Then the following three lemmas enable us to prove the statement in almost the same way as Proposition 4.1. Lemma 5.9. One has Re(ζ rd (x)rd (y)/t) > 0 for ζ = E − iη ∈ D −d . Lemma 5.10. One has | Im e−iθd (x,y) | c(|x2 | + |y2 |)−1 for some c > 0. Lemma 5.11. If 0 < t < κ, then Re ζ rd (x)2 + rd (y)2 /t c |x|2 + |y|2 /t,
c > 0,
and if 0 < s < M(|x2 | + |y2 |) for t = κ + is, M 1 being fixed arbitrarily, then there exists σ > 0 independent of N such that Re ζ rd (x)2 + rd (y)2 /t σ N log |x2 | + |y2 | . We complete the proof of statement (1), accepting these lemmas as proved. Lemma 5.9 makes it possible for us to decompose Rα (jd (x), jd (y); ζ ) into the sum Rα jd (x), jd (y); ζ = (i/4)eiαθd (x,y) H0 krd (x, y) + Rsc,α jd (x), jd (y); ζ as in (4.9), and Lemmas 5.10 and 5.11 enable us to show in almost the same way as in the proof of Proposition 4.1 that Rsc,α jd (x), jd (y); ζ = O |x2 | + |y2 | −σ N . Thus (1) is obtained. Proof of Lemma 5.9. We set w = ζ rd (x)rd (y)/t. We compute 2 2 rd (x)2 = |x|2 1 + 2iηd (x2 ) |x2 |/|x| + O (log d)/d
(5.12)
and similarly for rd (y)2 , where ηd (t) obeys ηd (t) = O((log d)/d). Hence we have 2 2
rd (x)rd (y) ∼ |x||y| 1 + i ηd (x2 ) x2 /|x| + ηd (y2 ) y2 /|y|
(5.13)
for d 1. If 0 < t < κ, then it is easy to see that Re w > 0. If t = κ + is with s > 0, then we have −1 ζ /t = κ 2 + s 2 (Eκ − ηs) − i(Es + ηκ) , and hence Re w behaves like |x||y| Re w ∼ 2 κ + s2
2 2 x2 y2 E ηd (x2 ) − η s + Eκ + ηd (y2 ) |x| |y|
for d 1. It follows from the definition of ηd (t) that
(5.14)
1876
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885 −1/2
ηd (x2 ) = 5E0
(log d)/d
or
−1/2
ηd (y2 ) = 5E0
(5.15)
(log d)/d
1/2
for |x2 | + |y2 | N d. Since 0 η 2E0 (log d)/d for ζ = E − iη ∈ D −d , we have that Re w > 0 for t = κ + is also. 2 Proof of Lemma 5.10. The denominator ep + e−iθd (x,y) of the integrand in (4.13) never vanishes but takes values close to 0 around p = 0, provided that θd (x, y) ∼ ±π . This is the case when x2 1 and y2 −1 or when x2 −1 and y2 1. We consider only the former case. We compute Re θd (x, y) as in the proof of Lemma 4.3. If x1 and y1 fulfill the assumption in the proposition and if x2 1 and y2 −1, then Re γ jd (x); ω+ π/2 + c1 /x2 ,
Re γ jd (y); ω+ 3π/2 + c1 /y2
for some c1 > 0, so that Re θd (x, y) −π + c1 (|x2 | + |y2 |)−1 . This, together with (4.14), implies that Im e−iθd (x,y) c |x2 | + |y2 | −1 for some c > 0. Hence the desired bound is obtained.
2
Proof of Lemma 5.11. We set w = (ζ /t)(rd (x)2 + rd (y)2 ). If 0 < t < κ, then it is easy to see that Re w > c(|x|2 + |y|2 )/t for some c > 0. Assume that t = κ + is with 0 < s < M(|x2 | + |y2 |). If we take (5.12), (5.14) and (5.15) into account, then a simple computation yields Re w > c((log d)/d)(|x2 | + |y2 |) for another c > 0. Since (log p)/p is decreasing for p 1, we have log |x2 | + |y2 | / |x2 | + |y2 | log(Nd)/(N d) (2/N ) × (log d)/d for |x2 | + |y2 | N d. This implies that Re w σ N log(|x2 | + |y2 |) for some σ > 0, and hence the lemma follows at once. 2 (2) We proceed to the second statement. We assume that |x2 | + |y2 | N d for N 1 fixed above. The kernel Rα (x, y; ζ ) is represented by the line integral (4.4) even for ζ = E −iη ∈ D −d . However, the integral representation (2.3) for Iν (ζ |x||y|/t) with ν = |l − α| does not make sense any longer. In fact, Re ζ |x||y|/t ∼ −η|x||y|/s < 0 for t = κ + is with s 1. For this reason, we make use of the different representation formula for Iν (ζ |x||y|/t) when Re(ζ |x||y|/t) < 0. The proof of the statement is divided into four steps. (i) We begin by decomposing Rα (jd (x), jd (y); ζ ) into the sum of three terms. To do this, we take κ as κ = M 2 log d,
M 1, 2
in the line integral (4.4), so that et is at most of polynomial growth |et | = O(d M ) as d → ∞ on the contour (0, κ) ∪ (κ + i0, κ + i∞). We set χM0 (t) = χ0 (s/Md) and χM∞ (t) = χ∞ (s/Md) for s = Im t 0 and decompose Rα (x, y; ζ ) into the sum
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1877
Rα (x, y; ζ ) = R(x, y; ζ ) + R∞ (x, y; ζ ), where R=
κ+i∞ ζ |x||y| dt ζ (|x|2 + |y|2 ) t 1 ilψ − Iν , e χM0 (t) exp 4π 2 2t t t l
0
κ+i∞ ζ |x||y| dt ζ (|x|2 + |y|2 ) 1 ilψ t R∞ = − Iν e χM∞ (t) exp 4π 2 2t t t l
0
with ν = |l − α|, and ψ is defined by ψ = θ − ω for x = (|x| cos θ, |x| sin θ ) and y = (|y| cos ω, |y| sin ω). We note that the choice of M depends on N and that Re(ζ |x||y|/t) > 0 for 0 < s < 2Md, which is seen from (5.14). Hence, by formula (2.3), the first term R(x, y; ζ ) on the right side is further decomposed into the sum of two terms R(x, y; ζ ) = Rfr (x, y; ζ ) + Rsc (x, y; ζ ) after calculating the series
eiαψ Rfr (x, y; ζ ) = 4π
le
ilψ I
ν (ζ |x||y|/t)
as in the proof of Proposition 4.1, where
ζ |x − y|2 dt t − , χM0 (t) exp 2 2t t
κ+i∞
0
Rsc (x, y; ζ ) =
1 4π
ζ |x||y| ζ (|x|2 + |y|2 ) dt t − Isc ,ψ χM0 (t) exp 2 2t t t
κ+i∞
0
and Isc (w, ψ) is defined by (4.8). 1/2 We make a similar decomposition for Rα (jd (x), jd (y); ζ ). Since 0 η 2E0 (log d)/d for ζ = E − iη ∈ D −d , we can take M so large that −1 Re w = Re ζ rd (x)rd (y)/t ∼ κ 2 + s 2 (Eκ − ηs)|x||y| > 0
(5.16)
for 0 < s < 2Md. Thus the integral representation (2.3) still makes sense for w as above, and we have Rα jd (x), jd (y); ζ = Gfr (x, y; ζ ) + Gsc (x, y; ζ ) + G∞ (x, y; ζ ), where Gfr (x, y; ζ ) = Rfr (jd (x), jd (y); ζ ) and similarly for Gsc and G∞ . If we use the new notation pd (x) = rd (x)2 + rd (y)2 ,
qd (x, y) = rd (x)rd (y),
then these three terms have the following representations:
1878
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
t ζ rd (x, y)2 dt − , χM0 (t) exp 2 2t t
κ+i∞
eiαθd (x,y) Gfr = 4π
0
Gsc =
1 4π
κ+i∞
χM0 (t) exp
ζ qd (x, y) ζpd (x, y) t dt − Isc , θd (x, y) , 2 2t t t
0 κ+i∞ ζ qd (x, y) dt ζpd (x, y) 1 ilθd (x,y) t G∞ = − Iν . e χM∞ (t) exp 4π 2 2t t t l
0
Statement (2) is obtained by showing that: G∞ = O d −N , Gfr = (i/4)eiαθd (x,y) H0 krd (x, y) + O d −N , Gsc = c(E)eik(rd (x)+rd (y)) qd (x, y)−1/2 (fα + eN ) + O d −N ,
(5.17) (5.18) (5.19)
where fα = fα (−ω → θ ; E) with θ = x/|x| and ω = y/|y|, and eN = eN (x, y; ζ ) satisfies the estimate in the proposition. (ii) To prove (5.17), we employ the formula e−iμπ/2 Iμ (w) = π
π cos(μρ − iw sin ρ) dρ − sin(μπ) 0
∞ e
−iw sinh p−μp
dp
0
for Im w 0, which follows as an immediate consequence of the relation Iμ (w) = e−iμπ/2 Jμ (iw) [22, p. 176]. We note that Im(ζ qd (x, y)/t) < 0 for t = κ + is with s > Md, M 1, which is seen from (5.13) and (5.14). We insert Iν (ζ qd (x, y)/t) into the integral representation for G∞ (x, y; ζ ) and evaluate the resulting integral by partial integration for each l with |l| < d. If M 1, then ∂t t − ζpd (x, y)/t ± ζ qd (x, y)/t sin ρ > c > 0, ∂t t − ζpd (x, y)/t − 2i ζ qd (x, y)/t sinh p > c > 0 for t = κ + is with s > Md uniformly in ρ, 0 < ρ < π , and in p, 0 < p < 1. If p > 1, then we use |∂t (t − ζpd (x, y)/t)| > c > 0 and ∂t e−i(ζ qd (x,y)/t) sinh p = −t −1 (sinh p/ cosh p)∂p e−i(ζ qd (x,y)/t) sinh p . We take into account these relations to repeat the integration by parts. Since Im θd (x, y) = O((log d)/d) as is seen from (4.14), the sum of the integrals with |l| < d obeys O(d −N ). To see that the sum over l with |l| > d is of order O(d −N ), we make use of the other representation formula
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
(w/2)μ Iμ (w) = Γ (μ + 1/2)Γ (1/2)
1
μ−1/2 e−wρ 1 − ρ 2 dρ
1879
(5.20)
−1
for Iμ (w) with μ 0 [22, p. 172]. Since |x| + |y| = O(d), we have |ζ qd (x, y)/t| = M −1 O(d) for s = Im t > Md and −wρ = O e|Re(ζ qd (x,y)/t)| = O ed , e
|ρ| < 1,
for w = ζ qd (x, y)/t. Since Γ (μ) behaves like Γ (μ) ∼ (2π)1/2 e−μ μμ−(1/2) for μ 1 by the Stirling formula, we can take M 1 so large that ilθ (x,y) ν e d w /Γ (ν) (1/2)|l| ,
|l| > d.
Hence the sum of integrals with l with |l| > d also obeys O(d −N ), and (5.17) is proved. (iii) (5.18) is easy to prove. By (4.5), we have Gfr (x, y; ζ ) = (i/4)eiαθd (x,y) H0 krd (x, y) + G(x, y; ζ ), where κ+i∞
eiαθd (x,y) G= 4π
χM∞ (t) exp
ζ rd (x, y)2 dt t − . 2 2t t
0
Since |∂t (t − ζ rd (x, y)2 /t)| > c > 0 for s > Md, we have G(x, y; ζ ) = O(d −N ) by partial integration, and hence (5.18) is established. (iv) The proof of (5.19) uses the stationary phase method. By (4.8), we have Isc ζ qd (x, y)/t, θd (x, y) = −Cα ei[α](θd (x,y)+π) Lsc (t, x, y; ζ ), where Cα = sin(απ)/π and ∞ Lsc (t, x, y; ζ ) = −∞
ei(iζ qd (x,y)/t) cosh p
e(1−β)p dp ep + e−iθd (x,y)
with β = α − [α], 0 < β < 1. By (5.16), Re(ζ qd (x, y)/t) > 0. Since d/4 |x1 |, |y1 | 3d/4 and |x2 | + |y2 | N d by assumption, θd (x, y) stays away from ±π uniformly in x, y and ζ ∈ D−d , so that Isc (ζ qd (x, y)/t, θd (x, y)) is bounded uniformly in x, y and ζ as above. If 0 < t < κ, then exp t/2 − ζpd (x, y)/2t exp −cd 2 /t ,
c > 0,
and if 0 < s < d/M for t = κ + is, then it follows from (5.14) that Re(ζ /t) behaves like Re(ζ /t) ∼ M 4 (log d)/d 2 for d 1. Hence we have exp t/2 − ζpd (x, y)/2t = O exp M 2 − cM 4 log d = O d −N −1
1880
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
for M 1. Thus the integral over the intervals (0, κ) and (κ +i0, κ +id/M) is negligible. We assume that d/M < s < 2Md. We apply the stationary phase method [13, Theorem 7.7.5] to the integral Lsc (t, x, y; ζ ) above. The stationary point is given by p = 0, and Isc (ζ qd (x, y)/t, θd (x, y)) is seen to take the asymptotic form Isc = e−ζ qd (x,y)/t b0 (t, x, y; ζ ) + bL (t, x, y; ζ ) + O d −L for any L 1, where −1 −1/2 b0 = −Cα (2π)1/2 ei[α](θd (x,y)+π) ζ qd (x, y)/t 1 + e−iθd (x,y) and bL obeys |∂xn ∂ym ∂t bL | = O(d −3/2−|n|−|m|−j ). The phase term is calculated as j
2 t/2 − ζ pd (x, y) + 2qd (x, y) /2t = t/2 − ζ rd (x) + rd (y) /2t. If s = Im t satisfies d/M < s < 2d/M or Md < s < 2Md, then ∂t t/2 − ζ rd (x) + rd (y) 2 /2t > c > 0 for 0 < Re t < κ. Hence we deform the contour to the imaginary axis by analyticity and repeat integration by parts to obtain that the leading term comes from the integral ∞ a0 (x, y; ζ ) =
s ζ (rd (x) + rd (y))2 ds + b0 (is, x, y; ζ ) , χM (s) exp i 2 2s s
0
where χM (s) = χ∞ (2Ms/d)χ0 (2s/Md). We now set λd (x, y) = Re k rd (x) + rd (y) ,
μd (x, y) = Im k rd (x) + rd (y)
for k = ζ 1/2 . Then λd (x, y) behaves like λd (x, y) ∼ d and μd (x, y) obeys μd (x, y) = O(log d). If we make a change of variable s = λd (x, y)τ , then a0 (x, y; ζ ) takes the form ∞ a0 =
dτ 1 τ + eiσd (τ,x,y) χ˜ M (τ )b0 iλd (x, y)τ, x, y; ζ exp iλd (x, y) 2 2τ τ
0
where χ˜ M (τ ) = χM (λd (x, y)τ ) and σd (τ, x, y) =
ζ (rd (x) + rd (y))2 − λd (x, y)2 iμd (x, y) = + O (log d)2 /d . 2λd (x, y)τ τ
We apply the stationary phase method to the above integral with τ = 1 as a stationary point to derive the asymptotic form of a0 (x, y; ζ ). We have λd (x, y) + σd (1, x, y) = k rd (x) + rd (y) + O (log d)2 /d
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1881
and b0 (iλd (x, y)τ, x, y; ζ ) takes the value −1 −1/2 λd (x, y)1/2 1 + e−iθd (x,y) b0 = −Cα (2πi)1/2 ei[α](θd (x,y)+π) ζ qd (x, y) at τ = 1. We also have ζ = E + O((log d)/d) and θd (x, y) = ψ + O (log d)/d = θ − ω + O (log d)/d . We recall that the amplitude fα (ω → θ ; E) is defined by (1.4) and the constant c(E) is defined by (5.1). We take into account the contribution (λd (x, y)/2πi)−1/2 from the Hessian at the stationary point τ = 1 and compute −Cα (2πi)ei[α](ψ+π) E −1/2 eiψ / 1 + eiψ
= 4πc(E)(2/π)1/2 eiπ/4 E −1/4 sin(απ)ei[α](ψ+π) ei(ψ+π) / 1 − ei(ψ+π) = 4πc(E)fα (−ω → θ ; E).
Since σd (1, x, y) satisfies n m −iσ j iσ ∂ ∂ e d ∂ e d = O (log d)j d −|n|−|m| , x y
τ
we see that a0 (x, y; ζ ) takes the asymptotic form a0 = 4πc(E)eik(rd (x)+rd (y)) qd (x, y)−1/2 fα (−ω → θ ; E) + eN + O d −N , where eN (x, y; ζ ) satisfies the remainder estimate in the proposition. A similar argument applies to the integral associated with bL (t, x, y; ζ ). It takes the form 4πc(E)eik(rd (x)+rd (y)) qd (x, y)−1/2 O d −1 + O d −N and is regarded as a remainder term. Thus (5.19) is established. (3) Finally we make only a brief comment on the asymptotic form of derivatives such as ∂Rα (jd (x), jd (y); ζ )/∂xj . If we take a careful look at the proof of statements (1) and (2), then we see that the asymptotic forms obtained in (1) and (2) remain true in the C 1 topology. We skip the details. The proof of the proposition is now complete. 2 6. Proof of Lemma 3.4 The last section is devoted to proving Lemma 3.4. The proof is based on the following proposition. Proposition 6.1. Let Dd be defined by (3.5) and let Rα (x, y; ζ ) be the kernel of the resolvent R(ζ ; Pα ) with ζ ∈ Dd . If d/c < |x1 | < cd, for some c > 1 or if
|x2 | > d/c,
|y1 | < cd,
|y2 | < c
(6.1)
1882
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
|x1 | < cd,
|x2 | < c,
d/c < |y1 | < cd,
|y2 | > d/c,
then −L , Rα jd (x), jd (y); ζ = O |x2 | + |y2 |
|x2 | + |y2 | 1,
for any L 1, where the order estimate depends on d but is uniform in ζ . The derivative ∂Rα (jd (x), jd (y); ζ )/∂ζ also obeys a similar bound. Proof of Proposition 6.1. The proof uses formula (5.20) to evaluate the kernel. We consider only the case when x and y fulfill (6.1). In this case, we have that Rα (jd (x), jd (y); ζ ) equals Rα (jd (x), y; ζ ). The dependence on d does not matter in the proof of the proposition. We only look at the dependence on x2 with |x2 | 1. We write y = (|y| cos ω, |y| sin ω) and set θd (x) = γ (jd (x); ω+ ). Then we can represent Rα (jd (x), y; ζ ) as 1 Rα = 4π
ζ rd (x)2 ζ |y|2 dt t − exp − S(t, x, y; ζ ) exp 2 2t 2t t
κ+i∞
0
by the line integral (4.4), where S(t, x, y; ζ ) =
eil(θd (x)−ω) Iν
l
ζ rd (x)|y| , t
ν = |l − α|.
Since Im θd (x) = O((log d)/d) uniformly in x with |x2 | 1, we make use of (5.20) to obtain that S(t, x, y; ζ ) has the following properties: S(t, x, y; ζ ) exp c|x2 |/|t| , m ∂ S(t, x, y; ζ ) |t|−m exp σm |x2 |/|t| , t
(6.2) (6.3)
where c > 0 and σm > 0 depend on d but are independent of ζ ∈ Dd and x2 . If ζ = E + iη ∈ Dd , then −1 (Eκ + ηs) − i(Es − ηκ) ζ /t = κ 2 + s 2 1/2
for t = κ + is on the contour of the line integral above. Since |η| 2E0 (log d)/d for ζ ∈ Dd and since rd (x)2 behaves like rd (x)2 ∼ 1 − O (log d)2 /d 2 x22 + 2iη0d x22 , −1/2
with η0d = 5E0
|x2 | 1,
(log d)/d, we have Re ζ rd (x)2 /t c1 |x2 |2 /|t|
(6.4)
for some c1 > 0. We divide the line integral into the sum of two parts by use of the cutoff functions χM0 (t) = χ0 (s/M|x2 |) and χM∞ (t) = χ∞ (s/M|x2 |). We can take M 1 so
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1883
large that |∂t (t − ζ rd (x)2 /t)| > c2 > 0 for s > M|x2 |/2. This, together with (6.3), enables us to repeat the partial integration, and we can obtain the bound O(|x2 |−L ) for the line integral cut off by χM∞ (t). On the other hand, we see from (6.2) and (6.4) that the line integral cut off by χM0 (t) also obeys the desired bound. A similar argument applies to the derivative ∂Rα (jd (x), jd (y); ζ )/∂ζ . Thus the proof is complete. 2 Lemma 6.1. Let
Σ = x: d/c < |x1 | < cd ,
Ω = x: |x1 | < cd, |x2 | < c
for some c > 1. Then the resolvent R(ζ ; P˜αd ) of the closed operator P˜αd = Jd Pα Jd−1 is analytic as a function of ζ ∈ Dd with values in bounded operators from L2 (Σ) to L2 (Ω) or from L2 (Ω) to L2 (Σ). Proof. We know that R(ζ ; Pα ) : L2comp → L2loc is well defined. If we set Σ = {x ∈ Σ: |x2 | < d/c}, then R(ζ ; P˜αd ) = R(ζ ; Pα ) : L2 Σ → L2 (Ω),
L2 (Ω) → L2 Σ
is bounded. Hence the lemma is obtained as an immediate consequence of Proposition 6.1.
2
Proof of Lemma 3.4.. The operator H±d has the solenoidal field 2πα± δ(x − d± ) with d± = (±d/2, 0) as a center. Since the relations Σ0 = {7d/16 < x1 + d/2 < 9d/16} = {−9d/16 < x1 − d/2 < −7d/16} and Ω0 ⊂ {|x1 ± d/2| < 3d/2, |x2 | < r0 } hold true for Σ0 and Ω0 , the lemma is obtained by applying Lemma 6.1 to R(ζ ; K±d ) = exp(ig∓d )R˜ ±d (ζ ) exp(−ig∓d ) with R˜ ±d (ζ ) = Jd R(ζ ; H±d )Jd−1 .
2
Acknowledgment The first author gratefully acknowledges the partial support from NSF grant DMS 0801158. Appendix A We shall prove that the resolvent of the magnetic Schrödinger operator with two solenoidal fields has the meromorphic continuation over the lower-half plane as a function of the spectral parameter ζ with values in operators from L2comp to L2loc . The resolvent is shown to be meromorphically continued over the complex plane C \ (−∞, 0] slit along the negative real axis across the positive real axis where the spectrum of the operator is located. The argument here extends to the case of several solenoidal fields without any essential changes.
1884
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
We consider the operator H = H (Ψ ) = (−i∇ − Ψ )2 with two solenoidal fields 2πα+ δ(x − p+ ) and 2πα− δ(x − p− ), where Ψ (x) = Φ+ (x) + Φ− (x) = α+ Φ(x − p+ ) + α− Φ(x − p− ). The operator H becomes self-adjoint on L2 = L2 (R 2 ) under the boundary condition lim|x−p± |→0 |u(x)| < ∞ at both the centers p+ = (p, 0) and p− = (−p, 0) for p > 0. We cover the whole space with the three regions
X± = x: |x1 ∓ p| < 3p/2, |x2 | < 3p/2 ,
X0 = R 2 \ x: |x1 | < 2p, |x2 | < p
and approximate H by operators with one solenoidal field over each region. To do this, we define the three operators P± = H (Φ± ) and P = H (Φ0 ), where Φ0 (x) = α0 Φ(x) with α0 = α+ + α− . These auxiliary operators become self-adjoint by imposing the boundary condition as in (1.3) at the center of the solenoidal field. We can construct real smooth bounded functions g± (x) and g0 (x) such that H = eig± P± e−ig± over X± and H = eig0 P0 e−ig0 over X0 . We set Pˆ± = eig± P± e−ig± ,
Pˆ0 = eig0 P0 e−ig0
and introduce a smooth nonnegative partition of unity {u+ , u− , u} such that u± and u have support in X± and X0 , respectively. Then we define the bounded operator G(ζ ) = u+ R(ζ ; Pˆ+ ) + u− R(ζ ; Pˆ− ) + u0 R(ζ ; Pˆ0 ) : L2 → L2 for ζ ∈ C + = {ζ ∈ C: Im ζ > 0}. This operator satisfies (H − ζ )G(ζ ) = Id + Q(ζ ), where Q(ζ ) = [Pˆ+ , u+ ]R(ζ ; Pˆ+ ) + [Pˆ− , u− ]R(ζ ; Pˆ− ) + [Pˆ0 , u0 ]R(ζ ; Pˆ0 ). The commutators above vanish outside the region X = {x: |x1 | < 3p, |x2 | < 3p}. For the Hamiltonians P± and P0 with one solenoidal field, the resolvents R(ζ ; Pˆ± ) and R(ζ ; Pˆ0 ) are continued as analytic functions of ζ with values in operators from L2comp to L2loc over the lowerhalf plane across the positive real axis. If we consider Q(ζ ) as an operator from L2 (X) into itself, then Q(ζ ) turns out to be an analytic function of ζ ∈ C \ (−∞, 0] with values in compact operators. Hence it follows from the analytic perturbation theory of Fredholm that the inverse (Id + Q(ζ ))−1 : L2 (X) → L2 (X) has the meromorphic continuation over C \ (−∞, 0]. Thus R(ζ ; H ) is represented as −1 R(ζ ; H ) = G(ζ ) − G(ζ )Q(ζ ) Id + Q(ζ ) and is defined as a meromorphic function over C \ (−∞, 0] with values in operators from L2comp (X) to L2loc . Once this is established, we can show in almost the same way as in the proof of Theorem 1.1 (Step 5) that R(ζ ; H ) becomes a meromorphic function over C \ (−∞, 0] with values in operators from L2comp to L2loc .
I. Alexandrova, H. Tamura / Journal of Functional Analysis 260 (2011) 1836–1885
1885
References [1] R. Adami, A. Teta, On the Aharonov–Bohm Hamiltonian, Lett. Math. Phys. 43 (1998) 43–53. [2] G.N. Afanasiev, Topological Effects in Quantum Mechanics, Kluwer Academic Publishers, 1999. [3] J. Aguilar, J.M. Combes, A class of analytic perturbations for one-body Schrödinger Hamiltonians, Comm. Math. Phys. 22 (1971) 269–279. [4] Y. Aharonov, D. Bohm, Significance of electromagnetic potential in the quantum theory, Phys. Rev. 115 (1959) 485–491. [5] E. Balslev, J.M. Combes, Spectral properties of many body Schrödinger operators with dilation analytic interactions, Comm. Math. Phys. 22 (1971) 280–294. [6] N. Burq, Lower bounds for shape resonances widths of long range Schrödinger operators, Amer. J. Math. 124 (2002) 677–735. [7] J.M. Combes, P. Duclos, M. Klein, R. Seiler, The shape resonance, Comm. Math. Phys. 110 (1987) 215–236. [8] L. Dabrowski, P. Stovicek, Aharonov–Bohm effect with δ-type interaction, J. Math. Phys. 39 (1998) 47–62. [9] C. Fernández, R. Lavine, Lower bounds for resonances width in potential and obstacle scattering, Comm. Math. Phys. 128 (1990) 263–284. [10] S. Fujiié, A. Lahmar-Benbernou, A. Martinez, Width of shape resonances for non globally analytic potentials, J. Math. Soc. Japan, in press. [11] B. Helffer, J. Sjöstrand, Résonances en limite semi-classique, Mém. Soc. Math. Fr. (N.S.) 24/25 (1986). [12] P.D. Hislop, I.M. Sigal, Introduction to Spectral Theory. With Applications to Schrödinger Operators, SpringerVerlag, 1996. [13] L. Hörmander, The Analysis of Linear Partial Differential Operators I, Springer-Verlag, 1983. [14] H.T. Ito, H. Tamura, Aharonov–Bohm effect in scattering by point-like magnetic fields at large separation, Ann. H. Poincaré 2 (2001) 309–359. [15] A. Martinez, Resonance free domains for non globally analytic potentials, Ann. H. Poincaré 3 (2002) 739–756, Erratum; Ann. H. Poincaré 8 (2007) 1425–1431. [16] Y. Ohnuki, Aharonov–Bohm k¯oka, Butsurigaku saizensen, vol. 9, Ky¯oritsu syuppan, 1984 (in Japanese). [17] S.N.M. Ruijsenaars, The Aharonov–Bohm effect and scattering theory, Ann. Physics 146 (1983) 1–34. [18] B. Simon, The definition of molecular resonance curves by the method of exterior complex scaling, Phys. Lett. A 71 (1979) 211–214. [19] J. Sjöstrand, Quantum resonances and trapped trajectories, in: Long Time Behaviour of Classical and Quantum Systems, Bologna, 1999, in: Ser. Concr. Appl. Math., vol. 1, World Sci. Publ., River Edge, NJ, 2001, pp. 33–61. [20] J. Sjöstrand, M. Zworski, Complex scaling and the distribution of scattering poles, J. Amer. Math. Soc. 4 (1991) 729–769. [21] X.P. Wang, Barrier resonances in strong magnetic fields, Comm. Partial Differential Equations 17 (1992) 1539– 1566. [22] G.N. Watson, A Treatise on the Theory of Bessel Functions, 2nd edition, Cambridge University Press, 1995.
Journal of Functional Analysis 260 (2011) 1886–1901 www.elsevier.com/locate/jfa
Extrapolation of weights revisited: New proofs and sharp bounds Javier Duoandikoetxea Departamento de Matemáticas, Universidad del País Vasco-Euskal Herriko Unibertsitatea, Apartado 644, 48080 Bilbao, Spain Received 14 July 2010; accepted 16 December 2010 Available online 24 December 2010 Communicated by Gilles Godefroy
Abstract We use an appropriate factorization of the Ap weights to give another proof of the extrapolation theorem of Rubio de Francia. It provides sharp bounds in terms of the Ap -constant of the weights. Then we extend the result to more general settings including off-diagonal and partial range extrapolation. Among the applications, we prove by iteration a multivariable extrapolation theorem and give a sharp bound for Calderón–Zygmund operators on Lp (w) for weights in Aq (q < p). © 2010 Elsevier Inc. All rights reserved. Keywords: Weighted inequalities; Extrapolation; Sharp bounds; Multilinear operators; Muckenhoupt bases
1. Introduction A weight is a nonnegative locally integrable function. A weight is in Ap (Rn ) for p > 1 if
[w]Ap
p−1 1 1 1−p := sup w w < +∞, |Q| |Q| Q Q
(1.1)
Q
where the supremum is taken over all cubes Q in Rn . The value [w]Ap is the Ap -constant of w. For p = 1, we say that w is in A1 (Rn ) if Mw(x) Cw(x) a.e., where M is the Hardy–Littlewood E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.015
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1887
maximal function. The A1 -constant of w, [w]A1 , is the essential supremum of Mw/w. In what follows we write simply Ap instead of Ap (Rn ). These classes of weights were introduced by B. Muckenhoupt [23], who proved the following well-known fundamental result: M is bounded on Lp (w) if and only if w ∈ Ap (1 < p < ∞), and is of weak-type (p, p) with respect to the measure w(x) dx if and only if w ∈ Ap (1 p < ∞). For more information on Ap weights the reader can consult [13,9] or [14], among other references. An important property of the Ap weights is the extrapolation theorem of Rubio de Francia, announced in [25] and given with a detailed proof in [26]. In its first version the extrapolation theorem says that if for some p0 a sublinear operator is bounded from Lp0 (w) to Lp0 (w) for all w ∈ Ap0 /λ with 1 λ < ∞ and λ p0 < ∞, then it is bounded from Lp (w) to Lp (w) for all w ∈ Ap/λ and λ < p < ∞. The second proof of the theorem was later supplied by J. GarcíaCuerva in [12], reproduced in [13, Chapter 4, Theorem 5.19]. Another version of the proof is in [9, Theorem 7.8]. In all those proofs there are two cases depending on whether p is smaller or greater than p0 . A unified approach treating both cases together is due to Cruz-Uribe, Martell and Pérez (see [5]). More recently, due to the interest in studying the sharp dependence of the norms of several operators in terms of the Ap -constant of the weights, O. Dragiˇcevi´c, L. Grafakos, M.C. Pereyra, and S. Petermichl gave in [7] a version of the extrapolation theorem with sharp bounds following the approach of García-Cuerva. A different version of the proof is in [14, Theorem 9.5.3]. Although originally given for sublinear operators, it was realized that sublinearity was not necessary. Actually even the operator itself does not play any role and all the statements can be given in terms of families of pairs of nonnegative measurable functions. This was observed in [6, Remark 1.11] and is the setting adopted in [4]. In this paper we also stick to this point of view and write the theorems for pairs of functions. The fact that uv 1−p is an Ap weight for u, v ∈ A1 has been used in a crucial way in the proofs of the extrapolation theorems. We use a different way of factorizing weights to give in Section 3 a proof that provides sharp bounds. Previously, in Section 2, we introduce the three basic ingredients of the proof: factorization, construction of A1 weights and sharp bounds for the Hardy–Littlewood maximal function. Since Aq ⊂ Ap for q < p with [w]Ap [w]Aq , we can expect a better exponent in the bound of the norm in terms of [w]Aq . We consider this question in Section 4 in two ways, depending on whether the basic estimate is for p0 > p or for p0 < p. In particular, for Calderón–Zygmund operators, we extend to Aq weights an estimate for A1 weights due to Lerner, Ombrosi and Pérez [22]. In Section 5 we generalize the extrapolation to the off-diagonal case in which the inequalities are from Lp (w p ) to Lq (w q ) for appropriate w and possibly different values for p and q. It seems that only the case p q appears in the literature but there is no reason for such a restriction. Even more, we show that any q > 0 is acceptable and that in fact q does not play any role in the statement, except for defining the right exponent in terms of p. The interest of the generalization to the off-diagonal case for any q > 0 will be apparent in Section 6 where it is used to obtain by iteration a multivariable extrapolation theorem of Grafakos and Martell [15]. In Section 7 we consider another version of the extrapolation theorem, the limited-range extrapolation considered in [1] (and also to some extent in [10] and [18]). Although the classical extrapolation theorem is a particular case of both Theorems 5.1 and 7.1, we consider that it is worth writing its proof independently because even without taking care of
1888
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
the size of the bounds, the proof we propose seems simpler and more direct than the previous ones. Rubio de Francia’s original paper already proposed a setting more general than the Ap weights of Muckenhoupt. An account of several extensions is in [5]. In Section 8, we shall focus on two of the possible extensions. 2. Preliminaries The proofs of the theorems in Sections 3, 5 and 7 will be based on three results: factorization, construction of A1 weights, and sharp bounds for the Hardy–Littlewood maximal operator on Lp (w). They are contained in the three lemmas we present in this section. The (usual) factorization theorem for Ap weights states that w is in Ap if and only if w = uv 1−p for some u, v ∈ A1 . The “if” part is easily obtained from the definition (1.1), while the “only if” part is harder and was first proved by P. Jones. From this factorization theorem it is easy to deduce that one can multiply Ar and As weights each one raised to an appropriate power to get Ap weights. In the following lemma we give the two factorization results needed in our proofs. We remark that only the easy part of the factorization is used to prove the extrapolation theorems. Lemma 2.1 (Factorization). (a) Let 1 p < p0 < ∞. If w ∈ Ap and u ∈ A1 , then wup−p0 is in Ap0 and p−p 0 wu A
p0
p −p
[w]Ap [u]A01
(2.1)
. 1
(b) Let 1 < p0 < p < ∞. If w ∈ Ap and u ∈ A1 , then (w p0 −1 up−p0 ) p−1 is in Ap0 and p −1 p−p 1/(p−1) 0 w 0 u A
p0
p0 −1
p−p0
[w]Ap−1 [u]Ap−1 . p 1
Proof. Use the definition, Hölder’s inequality and the fact that 1 u Mu(x) [u]A1 u(x) for almost every x ∈ Q. |Q|
(2.2)
2
Q
J.L. Rubio de Francia introduced in [26] a construction of A1 weights, now known as Rubio de Francia algorithm. Lemma 2.2 (Rubio de Francia algorithm). Let p > 1. Let f be a nonnegative function in Lp (w) and w ∈ Ap . Let M k be the k-th iterate of M, M 0 f = f , and MLp (w) be the norm of M as a bounded operator on Lp (w). Define Rf (x) =
∞ k=0
M k f (x) . (2MLp (w) )k
(2.3)
Then f (x) Rf (x) a.e., Rf Lp (w) 2f Lp (w) , and Rf is an A1 weight with constant [Rf ]A1 2MLp (w) .
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1889
Proof. The first property is immediate. For the second one, use the fact that M k Lp (w) MkLp (w) and sum a geometric series. For the last one observe that ∞ ∞ M k+1 f (x) M k f (x) p M Rf (x) 2M . L (w) k (2MLp (w) ) (2MLp (w) )k k=0
2
k=1
Lemma 2.3. Let f ∈ Lp (w) with p > 1 and w ∈ Ap . Then 1/(p−1)
Mf Lp (w) C[w]Ap
f Lp (w) ,
(2.4)
where C depends only on p and the dimension. If q < p and w ∈ Aq , then 1/p
Mf Lp (w) C[w]Aq f Lp (w) ,
(2.5)
where C depends only on p, q and the dimension. The bound (2.4) was obtained by S. Buckley in [2]; a simple proof was given by A. Lerner in [20]. The improvement of the exponent for w ∈ Aq also appears in [2]. It is a consequence of 1/p the fact that the weak-type inequality corresponding to (2.4) holds with constant C[w]Ap [23,2] together with the Marcinkiewicz interpolation theorem. 3. The extrapolation theorem of Rubio de Francia with sharp bounds Theorem 3.1. Assume that for some family of pairs of nonnegative functions, (f, g), for some p0 ∈ [1, ∞), and for all w ∈ Ap0 we have g p0 w
1/p0
1/p0 CN [w]Ap0 f p0 w ,
Rn
(3.1)
Rn
where N is an increasing function and the constant C does not depend on w. Then for all 1 < p < ∞ and all w ∈ Ap we have
1/p gp w
1/p CK(w) f pw ,
Rn
Rn
where K(w) =
⎧ ⎨ N ([w]Ap (2MLp (w) )p0 −p ), ⎩ N ([w]
p0 −1 p−1
Ap
(2MLp (w1−p ) )
max(1,
In particular, K(w) C1 N (C2 [w]Ap
p0 −1 p−1 )
p−p0 p−1
) for w ∈ Ap .
if p < p0 ; (3.2) ),
if p > p0 .
1890
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
Proof. Case p < p0 . For f ∈ Lp (w) we built the A1 weight Rf given by the Rubio de Francia algorithm as in (2.3). Then
p
g w= p
Rn
g p w(Rf ) p 0
(p−p0 )
p
(Rf ) p 0
(p0 −p)
Rn
p
p0
p0
p−p0
g w(Rf )
1− p
p0
p
(Rf ) w
Rn
Rn
p CN w(Rf )p−p0 A
p f
p0
p −p p CN [w]Ap [Rf ]A01
p0
1− p
p0
p−p0
w(Rf )
Rn
|f | w p
p0
Rn
|f |p w Rn
p −p p CN [w]Ap 2MLp (w) 0
|f |p w, Rn
where we applied Hölder’s inequality, part (a) of the Factorization Lemma 2.1, the inequality f (x) Rf (x) (in the form Rf (x)−1 f (x)−1 ), (2.1), and [Rf ]A1 2MLp (w) . This gives (3.2) for p < p0 . We can use then (2.4) from Lemma 2.3 to obtain the bound p0 −1
). C1 N (C2 [w]Ap−1 p Case p > p0 . We use duality to write
p = sup g p0 hw : h ∈ L p−p0 (w) with norm 1 .
p0 p
p
g w Rn
Rn
Fix such a function h, which we can assume nonnegative, and define H such that H p w 1−p = p
h p−p0 w. Then H is in Lp (w 1−p ) with norm 1. Building the A1 weight RH given by the Rubio de Francia algorithm and using the pointwise inequality H (x) RH(x) a.e., we have
g p0 hw Rn
g p0 w
p0 −1 p−1
(RH)
p−p0 p−1
Rn p−p0 p0 p0 −1 CN w p−1 (RH) p−1 A
f p0 w
p0
p0 −1 p−1
(RH)
p−p0 p−1
Rn p0 −1 p−p0 p0 p−1 2M CN [w]Ap−1 p 1−p L (w ) p
f w Rn
·
(RH)p w 1−p Rn
p 1− p0
,
p0 p
p
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1891
where we applied part (b) of the Factorization Lemma 2.1, the A1 constant of RH given by Lemma 2.2, (2.2), and Hölder’s inequality. Note that the case p0 = 1 is simpler because several terms disappear. This gives the case p > p0 of (3.2) and we obtain from (2.4) the bound in terms of [w]Ap . 2 The sharp form of the extrapolation theorem in terms of [w]Ap is useful to deduce the sharp dependence of the Ap -constants for the norms of several classical operators like the Hilbert, Riesz and Beurling transforms. See [7] for examples and references. 4. Lp (w) bounds for w ∈ Aq with q < p p /p
Let q < p. When we insert the bound (2.5) into (3.2) we get K(w) C1 N (C2 [w]A0q ). Nevertheless, in the case p < p0 , we can get a better bound by modifying the previous proof. For this, we shall consider another way of building A1 weights, namely, that if Mf (x) is finite almost everywhere and s > 1, then (Mf )1/s is an A1 weight with constant depending on s but not on f (see [9, Theorem 7.7]). Theorem 4.1. Under the hypotheses of Theorem 3.1, if w ∈ Aq for some q < p < p0 we have
1/p gp w
1 1 p−p C1 N C2 [w]Aq [w]Aq 0
Rn
1/p f pw
.
Rn
Proof. In the first part of the proof of Theorem 3.1 instead of Rf we use Mf to get
g w p
Rn
p g0 w(Mf )p−p0
p p 0
1− p p
(Mf ) w
Rn
p0
(4.1)
.
Rn
Set u = (Mf )(p0 −p)/(p0 −q) . Since p0 − p < p0 − q, u is an A1 weight with constant independent of f . Then wuq−p0 is an Ap0 weight with constant bounded by C(p, q)[w]Aq . Inserting this into (4.1) we get
p g w CN wuq−p0 A
p f0 w(Mf )p−p0
p
p0
Rn
Rn
p CN C(p, q)[w]Aq MLp (w) 0
p(1− pp )
p CN C(p, q)[w]Aq [w]
1− pp 0 Aq
p p0
1− p |Mf | w p
p0
Rn
|f |p w
Rn
|f |p w.
2
Rn
When the function N appearing in (3.1) is of the form N (t) = t α , then from (3.2) we get αp /p C[w]Aq0 , while Theorem 4.1 gives the exponent α + 1/p − 1/p0 , which is better if αp0 > 1. This condition is satisfied at least in all the examples for which the sharp bound is known.
1892
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
Since Ap is the union of Aq for q < p, the proof of Theorem 4.1 also serves as a proof of the extrapolation theorem for Ap weights, regardless of the size of the constants. The (apparently) more general statement of Rubio de Francia in [25] in which (3.1) is assumed only for w ∈ Ap0 /λ for some λ 1 can be obtained as a corollary to Theorem 3.1. Corollary 4.2. Let 1 λ < ∞ and λ p0 < ∞. Assume that for w ∈ Ap0 /λ we have p0
1/p0
g w
1/p0 p0 CN [w]Ap0 /λ f w .
Rn
(4.2)
Rn
Then for λ p < ∞ and w ∈ Ap/λ we have
1/p gp w
1/p p −λ max(1, 0 ) C1 N C2 [w]Ap/λ p−λ f pw .
Rn
Rn
To prove this corollary it is enough to write g p0 = (g λ )p0 /λ and f p0 = (f λ )p0 /λ in (3.1), and apply Theorem 3.1 with p0 /λ as the starting exponent. As an application of Corollary 4.2 we obtain an estimate for Lp (w) norms with Aq weights, q < p. Applied to Calderón–Zygmund operators, this answers a conjecture of Lerner and Ombrosi in [21] (Conjecture 1.3). Corollary 4.3. Let T be an operator such that Tf Lp (w) CN [w]A1 f Lp (w) ,
(4.3)
for all w ∈ A1 and all 1 < p < ∞, with C independent of w. Then we have Tf Lp (w) CN [w]Aq f Lp (w)
(4.4)
for all w ∈ Aq and 1 q < p < ∞, with C independent of w. In particular, (4.4) holds with N (t) = t if T is a Calderón–Zygmund operator. Proof. Given q ∈ (1, p), set p0 = p/q. Then (4.2) holds for λ = p0 . Applying Corollary 4.2 we obtain (4.4). For Calderón–Zygmund operators, the estimate (4.3) was proved in [22] with N (t) = t. Then (4.4) holds linearly in [w]Aq . 2 5. Off-diagonal extrapolation Muckenhoupt and Wheeden proved in [24] that the fractional integral Iα (convolution with |x|α−n ) is bounded from Lp (w p ) to Lq (w q ) for 1/q = 1/p − α/n if and only if w satisfies [w]Ap,q
q/p 1 1 q −p := sup w w < +∞, |Q| |Q| Q Q
Q
(5.1)
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1893
where the supremum is taken over all cubes in Rn . The class of weights satisfying this condition is called Ap,q and [w]Ap,q given by (5.1) is the Ap,q constant of w. It is convenient to observe that w ∈ Ap,q is equivalent to w q ∈ A1+q/p with the same constants. The extrapolation theorem of Rubio de Francia was extended by Harboure, Macías and Segovia to these classes of weights in [16]: if an operator is bounded from Lp0 (w p0 ) to Lq0 (w q0 ) for some couple (p0 , q0 ) and all w ∈ Ap0 ,q0 , then it is bounded from Lp (w p ) to Lq (w q ) whenever 1 < p, q < ∞, 1/q − 1/p = 1/q0 − 1/p0 and w ∈ Ap,q . The sharp dependence on the Ap,q constant of the weight for the boundedness of Iα was settled by Lacey, Moen, Pérez and Torres in [19]. In their approach they needed and proved the extrapolation theorem of Harboure, Macías and Segovia with sharp bounds. We shall write the proof of the extrapolation theorem for Ap,q classes using the method of the previous section. Actually, we prove it in a more general setting than that of [16] and [19], in the sense that it holds for any q > 0 and we allow different values for the exponent in the target space and the second index in the weight class. The advantage of this generalization is that we want to apply the theorem in two different situations: fractional integrals and multivariable extrapolation (see the next section). Theorem 5.1. Let 1 p0 < ∞ and 0 < q0 , r0 < ∞. Assume that for some family of nonnegative couples (f, g) and for all w ∈ Ap0 ,r0 we have q0
g w
q0
1/q0
1/p0 p0 p0 CN [w]Ap0 ,r0 f w ,
Rn
(5.2)
Rn
where N is an increasing function and the constant C does not depend on w. Set γ = 1/r0 + 1/p0 . Then for all 1 < p < ∞ and 0 < q, r < ∞, such that 1 1 1 1 1 1 − = − = − , q q0 r r0 p p0
(5.3)
and all w ∈ Ap,r we have 1/q
gq wq
1/p CK(w) f p wp ,
Rn
Rn
where K(w) =
⎧ ⎨ N ([w]Ap,r (2MLγ r (wr ) )γ (r−r0 ) ), ⎩ N ([w]
γ r0 −1 γ r−1
Ap,r
(2MLγp (w−p ) )
max(1,
In particular, K(w) C1 N (C2 [w]Ap,r
r0 p ) rp0
γ (r−r0 ) γ r−1
if q < q0 ; ),
if q > q0 .
) for w ∈ Ap,r .
The condition 1/q − 1/p = 1/q0 − 1/p0 imposes some restrictions on the values of p when 1/q0 − 1/p0 is positive.
1894
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
Proof of Theorem 5.1. With γ as defined, [w]Ap0 ,r0 = [w r0 ]Ar0 γ . The couples (p, r) obtained in the theorem also satisfy γ = 1/r + 1/p , and [w]Ap,r = [w r ]Arγ . Case q < q0 (p < p0 , r < r0 ). Let f be in Lp (w p ). Define H so that H rγ w r = f p w p . Then H is in Lrγ (w r ). Built the weight RH given by the Rubio de Francia algorithm and use Hölder’s inequality to write
g q w q (RH)qγ (r−r0 )/r0 (RH)qγ (r0 −r)/r0
g w = q
q
Rn
Rn
q0 g w r (RH)γ (r−r0 ) r0 q0
q/q0
γr
(RH) w
Rn
r
1−q/q0 (5.4)
.
Rn
(In the last term we use the first equality of (5.3).) Part (a) of the Factorization Lemma 2.1 implies that w r (RH)γ (r−r0 ) is in Ar0 γ and r w (RH)γ (r−r0 ) A
r0 γ
γ (r −r) w r A [RH]A1 0 . rγ
Using the hypothesis (5.2) we obtain
q0 g q0 w r (RH)γ (r−r0 ) r0
1/q0
CN w r (RH)γ (r−r0 ) A
r0 γ
Rn
·
f
p0
r p0 w (RH)γ (r−r0 ) r0
1/p0 .
Rn
We insert this bound into (5.4) and use the properties of the Rubio de Francia algorithm: p/rγ (RH)−1 H −1 , RHLγ r (wr ) 2H Lγ r (wr ) = 2f Lp (wp ) , [RH]A1 2MLγ r (wr ) . Thus we get
1/q gq wq
1/p γ (r−r0 ) CN w r A 2MLγ r (wr ) f p wp . rγ
Rn
Rn
r0 γ −1
Using (2.4) we obtain the bound
N ([w r ]Arγrγ−1
r0 p
rp ) = N ([w r ]Arγ0
) for w r ∈ Arγ . q
Case q > q0 (p > p0 , r > r0 ). To use duality, consider a nonnegative function h in L q−q0 (w q ) with unit norm. p γ −1 Observe that w ∈ Ap,r is also equivalent to w −p ∈ Ap γ and [w]Ap,r = [w −p ]A . Define
pγ
H ∈ Lp γ (w −p ) by setting H p γ w −p = hq/(q−q0 ) w q . Then we can built the A1 weight RH given by the Rubio de Francia algorithm and use H RH to get
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
q−q0 g q0 H p γ w −(p +q) q w q
g hw = q0
q
Rn
1895
Rn
rγ (q−q0 )
g q0 w q0 p /p0 (RH) q(rγ −1) . Rn
The weight in the last integral is the q0 /r0 power of an Ar0 γ weight. Indeed, from (5.3) and the definition of γ we can see that it is the q0 /r0 power of
w
p r0 p0
(RH)
p γ (r−r0 ) r
γ (r−r0 ) r0 γ −1 = w r rγ −1 (RH) rγ −1 ,
which is in Ar0 γ according to part (b) of the Factorization Lemma 2.1. Moreover, (r−r0 )γ r r0 γ −1 w rγ −1 (RH) rγ −1 A
r0 γ
(r−r0 )γ r0 γ −1 −1 w r Arγrγ−1 [RH]Arγ . 1
(5.5)
Then we can apply the hypothesis (5.2) to get g q0 hw q CN
(r−r0 )γ r r0 γ −1 w rγ −1 (RH) rγ −1 A
q0
r0 γ
Rn
·
f
p0
w
p (p0 −1)
(RH)
p0 γ (r−r0 ) r0 (rγ −1)
q0
p0
.
Rn
Using Hölder’s inequality with exponents p/p0 and its dual, inserting the bound from (5.5), and taking into account that [RH]A1 MLp γ (w−p ) we get the second part of the theorem. Finally, we can use Lemma 2.3 to get K(w) C1 N (C2 [w r ]Arγ ). 2 In the theorem of Harboure, Macías and Segovia, r = q > p. In the next section we shall need the case r = p > q. 6. Multivariable weighted inequalities L. Grafakos and J.M. Martell proved in [15] an extrapolation theorem for multivariable operators (see also [3] for a two variable version). We give another proof of the theorem by iterating the off-diagonal extrapolation of the previous section. Theorem 6.1. Let T be an operator defined on m-tuples of functions. Let 1 r1 , . . . , rm < ∞ and 1/r = 1/r1 + · · · + 1/rm . Assume that T (f1 , f2 , . . . , fm )
r ) Lr (w1r ···wm
C
m j =1
fj Lrj (wrj ) j
(6.1)
1896
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901 r
rm holds for all functions fj ∈ Lrj (wjj ) and for all tuples of weights (w1r1 , . . . , wm ) ∈ (Ar1 , r
. . . , Arm ), with a constant C depending on the values of [wjj ]Arj , but not otherwise on the weights. Then, for every 1 < p1 , . . . , pm < ∞, there exists a constant K such that T (f1 , f2 , . . . , fm )
p p Lp (w1 ···wm )
m
K
j =1
fj Lpj (wpj )
(6.2)
j
p
p
holds with 1/p = 1/p1 + · · · + 1/pm , for all tuples of weights (w1 , . . . , wm ) ∈ (Ap1 , . . . , Apm ) p and all functions fj ∈ Lpj (wj j ). Proof. Fix the functions f2 , . . . , fm , the exponents r2 , . . . , rm , and the weights w2 , . . . , wm . Define the operator T (1) as follows: T (1) (g) = T (g, f2 , . . . , fm )w2 · · · wm
m j =2
fj −1rj
rj
L (wj )
.
Then (6.1) says that T (1) satisfies (1) T (g)
Lr (w1r )
for w1r1 ∈ Ar1 and for that T (1) is bounded
CgLr1 (wr1 ) 1
[w1r1 ]Ar1 .
some constant C depending on We apply Theorem 5.1 to deduce p p p from Lp1 (w1 1 ) to Lp (w1 ) when 1 < p1 < ∞ and w1 1 is in Ap1 , with 1/p = 1/p1 + 1/r2 + · · · + 1/rm . Iterating this process for the other components we get the full range of exponents 1 < p1 , . . . , pm < ∞. 2
Remark 6.1. We can use the bound given by Theorem 5.1 to estimate K of (6.2) in terms of C of (6.1) in the following sense: if there exist functions Nj such that C C0
m j =1
r N j w jj A , rj
with C0 independent of the weights, then K K0
m j =1
r −1
pj max(1, pjj −1 ) . Nj Kj wj Ap j
7. Limited range extrapolation For operators that are unbounded outside a range of the form (p− , p+ ) with 1 < p− < p+ < ∞ we cannot expect the assumptions (3.1) or (4.2) to hold. Instead, we could have weighted inequalities for weights satisfying conditions of the type w α0 ∈ Aq0 for some α0 > 1, for instance. We treat such situation in the following extrapolation theorem, although the statement is more general and even values of p smaller than 1 are allowed.
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1897
Theorem 7.1. Let p0 ∈ (0, ∞), q0 ∈ [1, ∞) and α0 1. Assume that for some family of nonnegative couples (f, g) and for all w such that w α0 is in Aq0 we have p0
1/p0
g w
C
f
Rn
p0
1/p0 w
(7.1)
,
Rn
where C depends on [w α0 ]Aq0 , but not otherwise on w. Let qp and αp be defined by p0 q0 −1 and − 1 = α0 qp p
αp α0 p0 . = qp q0 p
(7.2)
α0 p0 . α0 − 1
(7.3)
Set p− =
α0 p0 α0 + q0 − 1
and p+ =
Then for p− < p < p+ and all w such that w αp is in Aqp we have 1/p
p
g w
C
1/p p
f w
Rn
(7.4)
.
Rn
Proof. We shall not assume the values of αp and qp of (7.2) as given, but as part of the conclusion of the theorem. The proof will show how they are deduced. Case p < p0 . Let qp > 1 and let w be a weight such that w αp is in Aqp . Let f be in Lp (w). Define H as H qp w αp = f p w so that H is in Lqp (w αp ). Thus we can built the A1 weight RH using the Rubio de Francia algorithm. On the other hand, since w αp is in Aqp , Lemma 2.1 implies that w αp (RH)qp −q0 is in Aq0 , so that this weight to the power 1/α0 can be used in (7.1). Thus we write qp −q0 p pα q0 −qp p αp 1− p g p w = g p w α0 (RH) α0 p0 w p0 α0 (RH) α0 p0 Rn
Rn
αp
g p0 w α0 (RH)
qp −q0 α0
p
Rn
p0
(q0 −qp )p
(RH) α0 (p0 −p) w
α0 p0 −pαp α0 (p0 −p)
1− p
p0
Rn
where we applied Hölder’s inequality. We use (7.1), RH −1 H −1 , and RHLqp (wαp ) 2H Lqp (wαp ) . This gives (7.4) if the exponents match. Since H = (f p w 1−αp )1/qp , we see that this holds if p qp − q0 = p − p0 qp α0
and
αp 1 − αp qp − q0 + = 1, α0 qp α0
which are the conditions in (7.2). On the other hand, we need qp > 1 and this is achieved if p > p− , for the value of p− given in (7.3).
1898
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901 p
Case p > p0 . Let h be a nonnegative function in L p−p0 (w) with unit norm, for w αp ∈ Aqp . αp
αp
p
Since w 1−qp is in Aqp , we define H such that H qp w 1−qp = h p−p0 w, so that the Rubio de Francia algorithm yields the A1 weight RH. Then
αp −1 p−p0 g p0 w 1−qp (RH)qp p w.
g hw p0
Rn
(7.5)
Rn
Let us observe that according to part (b) of Lemma 2.1, q −1
w
αp qp0 −1
qp −q0
(RH) qp −1 ∈ Aq0 .
We identify this weight raised to the power 1/α0 with the weight appearing in (7.5) so that (7.1) can be applied. This requires p − p0 qp p
1 qp − q0 = α0 qp − 1
and
αp p − p0 αp q0 − 1 = , −1 1 − qp p α0 qp − 1
which gives again (7.2). After applying (7.1), use Hölder’s inequality and the properties of RH to end the proof. The condition qp < ∞ demands p < p+ for the value of p+ appearing in (7.3). 2 Remark 7.1. This theorem was proved by P. Auscher and J.M. Martell in [1, Theorem 4.9], although their statement looks different because it is given in terms of reverse Hölder inequalities. The equivalence with powers of weights in the corresponding Ap classes is mentioned in [1] and was obtained by R. Johnson and C. Neugebauer in [18]. It reads Asr = A1+ r−1 ∩ RH s , s
where Asr = {w: w s ∈ Ar }. Here we say that w ∈ RH s for s > 1 if there exists C such that for every cube Q
1 |Q|
1
w
s
s
Q
C |Q|
α
α
w. Q
We easily check that Aq00 = A p0 ∩ RH ( p+ ) and Aqpp = A p−
p0
The particular case p0 = q0 = 2 was proved in [10].
p p−
∩ RH ( p+ ) , as stated in [1]. p
Remark 7.2. It is apparent from the proof that we can keep track of the bounds in terms of the constants of the weights as in the previous theorems.
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1899
8. Weights from Muckenhoupt bases and rough operators The extrapolation theorems obtained in the paper are based on the lemmas given in Section 2, but Lemma 2.3 is only needed to give precise bounds in terms of the Ap -constant. The extrapolation results can be adapted to any situation in which factorization and the Rubio de Francia algorithm are available. Several possible extensions can be found in [5]. We show in this section two examples: weights associated to Muckenhoupt bases and to rough operators. 8.1. Muckenhoupt bases Let B be a collection of open sets in Rn (a basis). Define the maximal operator associated to B as 1 |f | MB f (x) = sup x∈B∈B |B| B
if x belongs to some set in B, and MB f (x) = 0 otherwise. The theory of weights for maximal operators associated to bases was studied by B. Jawerth in [17]. The weights associated to B are defined as the usual Ap weights: w ∈ Ap,B if
[w]Ap,B
1 := sup |B| B∈B
w B
1 |B|
w
1−p
p−1 < +∞,
(8.1)
B
and w ∈ A1,B if MB w(x) Cw(x) a.e. In this case, [w]A1,B is the smallest constant fulfilling the inequality. With these definitions it is immediate to see that the Factorization Lemma 2.1 holds. We say that a basis is a Muckenhoupt basis if MB is bounded on Lp (w) whenever w ∈ Ap,B , for all 1 < p < ∞. Then the Rubio de Francia algorithm (Lemma 2.2) can be carried out for Muckenhoupt bases. With both lemmas we can obtain the extrapolation theorem corresponding to Theorem 3.1 with bounds similar to (3.2). We cannot use the bounds of Lemma 2.3, because they are specific to the usual Hardy–Littlewood maximal operator. Similarly, Theorems 5.1, 6.1 and 7.1 can be written in terms of Ap,B weights. 8.2. Rough operators Weighted inequalities for rough operators such as homogeneous singular integrals, Hilbert transforms and maximal functions along curves, and the dyadic spherical maximal function were studied by D. Watson in [28]. An abstract formulation is in [8]. The extrapolation theorems given by D. Watson follows the method of [12]; in [8], the theorem is stated but no proof is supplied. The setting can be described as follows. There exist sublinear positive operators M and M∗ , bounded on L∞ and such that 1/p p 1/p M(uv) M up M v for 1 < p < ∞, with a similar property for M∗ . Define W1 = w: M∗ w(x) Cw(x) a.e. ,
1900
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
and, for 1 < p < ∞, Wp = w: M is bounded on Lp (w) , and similarly Wp∗ (1 p < ∞). Note that M∗ appears in the definition of W1 , and conversely. Let AW p be the subset of non-extremal weights in Wp , that is, AW p = w ∈ Wp : w s ∈ Wp for some s > 1 . The class AW p can be strictly contained in Wp , as is the case for the dyadic spherical maximal operator [11]. For the rough operators considered in [28] and [8], M is the sum of the Hardy–Littlewood maximal operator and a rough maximal operator given as the supremum of convolutions with positive measures, and M∗ is analogous to M but with the adjoints of such convolutions. Then the following factorization result holds: w is in AW p if and only if there exist w0 ∈ AW ∗1 and w1 ∈ 1−p AW 1 such that w = w0 w1 . Even without a description like (8.1), this is enough to factorize AW p weights as in Lemma 2.1 (without considering (2.1) and (2.2), of course). On the other hand, we need the Rubio de Francia algorithm to build AW 1 and AW ∗1 weights rather than W1 and W1∗ weights. This can be done as follows. From the non-extremality of the weights it follows that if w ∈ AW p , then w ∈ AW p/s for some s > 1. Given f ∈ Lp (w), define Ms f = (Mf s )1/s and built the weight Rf given by the algorithm when applied with the iterations of Ms . We get Ms (Rf ) C Rf , that is, Rf ∈ AW ∗1 . Once the lemmas are available, we can prove the extrapolation theorem for AW p weights (Theorem 3 of [28]). Theorems like those in Sections 5 and 7, for instance, are also feasible. Remark 8.1. For other examples of the presence of two positive operators in the factorization and extrapolation of weights, the reader can consult [5, Section 2.5]. The weights associated to the one-sided Hardy–Littlewood maximal operator (see [27]) yield a familiar example. Acknowledgments Research supported in part by the grant MTM2007-62186 of the Ministerio de Ciencia e Innovación (Spain) and FEDER. References [1] P. Auscher, J.M. Martell, Weighted norm inequalities, off-diagonal estimates and elliptic operators. I. General operator theory and weights, Adv. Math. 212 (2007) 225–276. [2] S. Buckley, Estimates for operator norms on weighted spaces and reverse Jensen inequalities, Trans. Amer. Math. Soc. 340 (1) (1993) 253–272. [3] M.J. Carro, J. Soria, R.H. Torres, Rubio de Francia extrapolation theory: estimates for distribution functions, preprint. [4] D. Cruz-Uribe, J.M. Martell, C. Pérez, Extrapolation from A∞ weights and applications, J. Funct. Anal. 213 (2004) 412–439. [5] D. Cruz-Uribe, J.M. Martell, C. Pérez, Weights, Extrapolation and the Theory of Rubio de Francia, Oper. Theory Adv. Appl., vol. 215, Birkhäuser Verlag, Basel, 2011. [6] D. Cruz-Uribe, C. Pérez, Two weight extrapolation via the maximal operator, J. Funct. Anal. 174 (2000) 1–17. [7] O. Dragiˇcevi´c, L. Grafakos, M.C. Pereyra, S. Petermichl, Extrapolation and sharp norm estimates for classical operators on weighted Lebesgue spaces, Publ. Mat. 49 (2005) 73–91.
J. Duoandikoetxea / Journal of Functional Analysis 260 (2011) 1886–1901
1901
[8] J. Duoandikoetxea, Almost-orthogonality and weighted inequalities, Contemp. Math. 189 (1995) 213–226. [9] J. Duoandikoetxea, Fourier Analysis, Grad. Stud. Math., vol. 29, American Mathematical Society, Providence, RI, 2001. [10] J. Duoandikoetxea, A. Moyua, O. Oruetxebarria, E. Seijo, Radial Ap weights with applications to the disc multiplier and the Bochner–Riesz operators, Indiana Univ. Math. J. 57 (2008) 1261–1281. [11] J. Duoandikoetxea, L. Vega, Spherical means and weighted inequalities, J. Lond. Math. Soc. (2) 53 (1996) 343–353. [12] J. García-Cuerva, An extrapolation theorem in the theory of Ap weights, Proc. Amer. Math. Soc. 87 (1983) 422– 426. [13] J. García-Cuerva, J.L. Rubio de Francia, Weighted Norm Inequalities and Related Topics, North-Holland, Amsterdam, 1985. [14] L. Grafakos, Modern Fourier Analysis, second ed., Grad. Texts in Math., vol. 250, Springer, New York, 2009. [15] L. Grafakos, J.M. Martell, Extrapolation of weighted norm inequalities for multivariable operators and applications, J. Geom. Anal. 14 (2004) 19–46. [16] E. Harboure, R. Macías, C. Segovia, Extrapolation results for classes of weights, Amer. J. Math. 110 (1988) 383– 397. [17] B. Jawerth, Weighted inequalities for maximal operators: linearization, localization and factorization, Amer. J. Math. 108 (1986) 361–414. [18] R. Johnson, C.J. Neugebauer, Change of variable results for Ap and reverse Hölder RH r -classes, Trans. Amer. Math. Soc. 328 (1991) 639–666. [19] M.T. Lacey, K. Moen, C. Pérez, R.H. Torres, Sharp weighted bounds for fractional integral operators, J. Funct. Anal. 259 (2010) 1073–1097. [20] A. Lerner, An elementary approach to several results on the Hardy–Littlewood maximal operator, Proc. Amer. Math. Soc. 136 (2008) 2829–2833. [21] A. Lerner, S. Ombrosi, An extrapolation theorem with applications to weighted estimates for singular integrals, preprint. [22] A. Lerner, S. Ombrosi, C. Pérez, A1 bounds for Calderón–Zygmund operators related to a problem of Muckenhoupt and Wheeden, Math. Res. Lett. 16 (2009) 149–156. [23] B. Muckenhoupt, Weighted norm inequalities for the Hardy maximal function, Trans. Amer. Math. Soc. 165 (1972) 207–226. [24] B. Muckenhoupt, R. Wheeden, Weighted norm inequalities for fractional integrals, Trans. Amer. Math. Soc. 192 (1974) 261–274. [25] J.L. Rubio de Francia, Factorization and extrapolation of weights, Bull. Amer. Math. Soc. (N.S.) 7 (1982) 393–395. [26] J.L. Rubio de Francia, Factorization theory and Ap weights, Amer. J. Math. 106 (1984) 533–547. [27] E. Sawyer, Weighted inequalities for the one-sided Hardy–Littlewood maximal functions, Trans. Amer. Math. Soc. 297 (1986) 53–61. [28] D.K. Watson, Vector-valued inequalities, factorization and extrapolation for a family of rough operators, J. Funct. Anal. 121 (1994) 389–415.
Journal of Functional Analysis 260 (2011) 1903–1924 www.elsevier.com/locate/jfa
Time-frequency partitions and characterizations of modulation spaces with localization operators ✩ Monika Dörfler, Karlheinz Gröchenig ∗ Institut für Mathematik, Universität Wien, Alserbachstrasse 23 A-1090 Wien, Austria Received 7 December 2009; accepted 21 December 2010 Available online 6 January 2011 Communicated by G. Godefroy
Abstract We study families of time-frequency localization operators and derive a new characterization of modulation spaces. This characterization relates the size of the localization operators to the global time-frequency distribution. As a by-product, we obtain a new proof for the existence of multi-window Gabor frames and extend the structure theory of Gabor frames. © 2011 Elsevier Inc. All rights reserved. Keywords: Phase-space localization; Short-time Fourier transform; Modulation space; Localization operator; Gabor frame
1. Introduction A time-frequency representation transforms a function f on Rd into a function on the timefrequency space Rd × Rd . The goal is to obtain a description of f that is local both in time and in frequency [5,20]. The standard time-frequency representations, such as the short-time Fourier transform and its various modifications known as Wigner distribution, radar ambiguity function, Gabor transform, all encode time-frequency information. However, the pointwise interpretation of such a time-frequency representation meets difficulties because, by the uncertainty principle, a small region in the time-frequency plane does not possess a physical meaning. Therefore ✩
M.D. was supported by the FWF Grant T 384-N13. K.G. was supported by the Marie-Curie Excellence Grant MEXTCT-2004-517154 and in part by the National Research Network S106 SISE of the Austrian Science Foundation (FWF). * Corresponding author. E-mail addresses: [email protected] (M. Dörfler), [email protected] (K. Gröchenig). 0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.021
1904
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
the question arises in which sense the short-time Fourier transform describes the local properties of a function and its Fourier transform. Following Daubechies [10], we use time-frequency localization operators to give meaning to the local time-frequency content. By investigating a whole family of localization operators and glueing together the local pieces, we are able to characterize the global time-frequency distribution of a function. In more technical terms, our main result provides a new characterization of modulation spaces. We define the short-time Fourier transform (STFT) of a function f ∈ L2 (Rd ) with respect to a window function ϕ ∈ L2 (Rd ) as Vϕ f (x, ω) =
f (t)ϕ(t ¯ − x)e−2πiω·t dt,
for all z = (x, ω) ∈ R2d .
(1)
Rd
The STFT Vϕ f (z) is a measure of the time-frequency content near the point z in the timefrequency plane R2d . However, the STFT cannot be supported on a set of finite measure by results in [27,29,37]. This fact complicates the interpretation of local information obtained from the STFT. In particular, it is impossible to construct a projection operator that satisfies Vϕ (PΩ f ) = χΩ · Vϕ f . As a remedy one resorts to the following definition of localization operators. We denote translation operators by Tx f (t) = f (t − x) and time-frequency shifts by π(z)f (t) = e2πiω·t f (t − x) for x, ω, t ∈ Rd . Fix a non-zero function ϕ ∈ L2 (R2d ) (a so-called window function) and a symbol σ ∈ L1 (R2d ). Then the time-frequency localization operator Hσ acting on a function f is defined as Hσ f =
σ (z)Vϕ f (z)π(z)ϕ dz.
R2d
The integral is defined strongly on many function spaces, in particular on L2 (Rd ). A useful alternative definition of Hσ is the weak definition Hσ f, gL2 (Rd ) = σ Vϕ f, Vϕ gL2 (R2d ) .
(2)
This definition can be easily extended to distributional symbols σ ∈ S (R2d ). The subtleties of the definition and boundedness properties between various spaces have been investigated in many papers, see [7,36,38] for a sample of results. If σ is non-negative and has compact support in Ω ⊆ Rd , then Hσ f can be interpreted as the part of f that lives essentially on Ω in the time-frequency plane, and so Hσ may be taken as a substitute for the non-existing projection onto the region Ω in the time-frequency plane. In this paper we investigate the behavior of an entire collection of localization operators. Namely, given a lattice Λ ⊆ R2d of the time-frequency plane, we consider the collection of operators {HTλ σ : λ ∈ Λ} and the mapping f → {HTλ σ f }. If the supports of Tλ σ cover R2d , then {HTλ σ f, λ ∈ Λ} should contain enough information to recover f from its local components. In particular, the set {HTλ σ f : λ ∈ Λ} should carry the complete information about the global time-frequency properties of f . We make this intuition precise and derive a new characterization of modulation spaces from it. Similar to Besov spaces, modulation spaces are smoothness spaces, but the smoothness is measured by means of time-frequency distribution rather than
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1905
differences and derivatives. Here, we establish a correspondence between the behavior of the sequence HTλ σ f 2 , λ ∈ Λ, and the membership of f in a modulation space. As a special case of our main theorem we formulate the following result. Theorem 1. Fix a non-zero function ϕ in the Schwartz space S(Rd ) and a weight function m on R2d that satisfies m(z1 + z2 ) C(1 + |z1 |)N m(z2 ) for some constants C, N 0 and all z1 , z2 ∈ R2d . Then a tempered distribution f satisfies
Vϕ f (z)p m(z)p dz
1/p < ∞,
(3)
R2d
if and only if
p HTλ σ f 2 m(λ)p
1/p < ∞.
(4)
λ∈Λ p
The expression in (3) is just the norm of f in the modulation space Mm (Rd ). Our main result shows that the expression in (4) (using the time-frequency components of f ) is an equivalent p norm on the modulation space Mm (Rd ). In pseudodifferential calculus one often defines spaces by conditions on their time-frequency components. For instance, Bony, Chemin, and Lerner [3,4] introduced a Sobolev-type space H (m) by using Weyl operators instead of localization operators. For the (extremely simplified) case of a constant Euclidean metric on the time-frequency plane, a distribution f belongs to H (m), whenever for some test function ψ on R2d f 2H (m) =
(TY ψ)w f 2 m(Y ) dY, 2
(5)
R2d
is finite, where σ w is the Weyl operator corresponding to the symbol σ . The only difference between (5) and (4) is the use of Weyl calculus instead of time-frequency localization operators and a continuous definition instead of a discrete one. It was understood only recently that H (m) 2 (Rd ) and that (5) is an equivalent norm on M 2 (Rd ) [25]. coincides with the modulation space Mm m Thus Theorem 1 can be interpreted as an extension of [3] to Lp -like spaces. Let us also mention that in the language of [35], the operators {HTλ σ , λ ∈ Λ} form a g-frame for L2 (Rd ). Our construction seems to be one of the few non-trivial examples of g-frames that are not frames. In this paper we prove the norm equivalence of Theorem 1 for a large class of modulation spaces and arbitrary time-frequency lattices. For a rather restricted class of lattices, namely lattices with integer oversampling, an analogous result was derived in [12] for unweighted modulation spaces. The main arguments for the integer lattice were based on Zak transform methods and interpolation. For a general lattice, these methods are no longer available, and we have to develop a completely new approach to some of the key arguments.
1906
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
As a by-product of the new techniques we have found several results of independent interest. • We formulate several structural results and characterizations of Gabor frames for multiwindow Gabor frames. • We prove a finite intersection property for time-frequency invariant subspaces of the distribution space M∞ (Rd ). This property resembles the finite intersection property that characterizes compact sets. • We give a new, independent proof for the existence of multi-window Gabor frames with well-localized windows. Previous proofs were based on coorbit theory [15] and the theory of projective modules [32]. Our proof provides additional insight how the windows can be chosen. • We derive precise estimates for the localization of the eigenfunctions of a localization operator. This paper is organized as follows. In Section 2 we recall necessary facts from time-frequency analysis. On the one had, we introduce modulation spaces and explain their characterization by means of multi-window Gabor frames. On the other hand, we state and prove several properties of localization operators. In Section 3, we formulate and prove our main result (Theorem 8). In Section 3.4 we analyze some of the consequences of Theorem 8 and its proof. In Appendix A we collect and sketch the proofs of some of the structural results on Gabor frames. 2. Time-frequency analysis of functions and operators 2.1. Modulation spaces Modulation spaces are a class of function spaces associated to the short-time Fourier transform (1). Note that for a suitable test function ϕ, the short-time Fourier transform can be extended to distribution spaces by duality and Vϕ f (z) = f, π(z)ϕ. For the standard definition of modulation spaces, we fix a non-zero “window function” g ∈ S(Rd ) and consider moderate weight functions m of polynomial growth, i.e., m satisfies m(z1 + z2 ) C(1 + |z1 |)s m(z2 ), z1 , z2 ∈ R2d for some C, s 0. Given a moderate weight m p,q and 1 p, q ∞, the modulation space Mm (Rd ) is defined as the space of all tempered disp,q tributions f ∈ S (Rd ) with Vg f ∈ Lm (R2d ), with norm f Mp,q d = Vg f Lp,q (R2d ) . m (R ) m p
(6)
If p = q, we write Mm (Rd ). For weight functions of faster growth we have to resort to different spaces of test functions and distributions. Let g(t) = e−πt·t be the Gaussian window and H0 = span{π(z)g: z ∈ R2d } be the linear space of all finite linear combinations of time-frequency shifts of the Gaussian. Let ν be a submultiplicative even weight function on R2d and m be a ν-moderate function; this means that ν(z1 + z2 ) ν(z1 )ν(z2 ), ν(z) = ν(−z) and m(z1 + z2 ) ν(z1 )m(z2 ) for all p,q z, z1 , z2 ∈ R2d . For 1 p, q < ∞ the modulation space Mm (Rd ) is then defined as the closure ∗ of H0 in the norm f Mp,q d as in (6). If p = ∞ or q = ∞, we take a weak -closure of H0 . m (R ) These general modulation spaces possess the following properties. Assume that m is ν-moderate
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1907
and 1 p, q ∞, then d ∗ p,q ∞ M1ν Rd ⊆ Mm Rd ⊆ M1/ν R = M1ν Rd .
(7)
Further, if ϕ ∈ M1ν (Rd ), then Vϕ f Lp,q Vg f Lp,q = f Mp,q , m m m
(8)
p,q
thus different windows in M1ν (Rd ) yield equivalent norms on Mm . d The embedding (7) says that M1ν (Rd ) may serve as a space of test functions and M∞ 1/ν (R ) as p,q a space of distributions for all modulation spaces Mm with a ν-moderate weight m. If νs (z) = (1 + |z|)s , s 0 and m is νs -moderate, then we have d d p,q S Rd ⊆ M1νs Rd ⊆ Mm Rd ⊆ M∞ 1/νs R ⊆ S R , b
in agreement with the standard definition, but for ν(z) = ea|z| with a > 0 and 0 < b 1 we have d M1ν Rd ⊆ S Rd ⊆ S Rd ⊆ M∞ 1/ν R . d In the sequel we will start with a submultiplicative weight ν and take M∞ 1/ν (R ) as the appropriate distribution space. Our results hold for arbitrary submultiplicative weights ν. For the detailed theory of modulation spaces we refer to [21, Chapters 11–13], for a discussion of weights and possible distribution spaces see [23].
Sequence space norms. Recall that a time-frequency lattice Λ is a discrete subgroup of R2d of the form Λ = AZ2d for some invertible real-valued 2d × 2d-matrix A. Given a lattice Λ ⊆ R2d with relatively compact fundamental domain Q, the discrete space p,q m (Λ) consists of all sequences a = (aλ )λ∈Λ for which the norm a p,q m
= |aλ |χλ+Q λ∈Λ
(9)
p,q
Lm
p,q
is finite. If Λ = aZd × bZd , then this definition reduces to the usual mixed-norm space m (Z2d ) with norm a p,q = m
n∈Zd
q/p 1/q |akn |p m(ak, bn)p
.
k∈Zd
As a technical tool we will need amalgam spaces (in one place only). A measurable function p,q F on R2d belongs to the (Wiener) amalgam space W (Lm ), if the sequence of local suprema akn = ess supx,w∈[0,1]d F (x + k, ω + n) = F · T(k,n) χ ∞ p,q
p,q
belongs to m (Z2d ). The norm on W (Lm ) is F W (Lp,q = a p,q . See [26] for an introducm ) m tory article. We need their behavior under convolution and their properties under sampling.
1908
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
(a) Convolution in Wiener amalgam spaces: Let 1 p, q ∞ and let m be a ν-moderate weight. Then C F W (Lp,q G L1ν . F ∗ G W (Lp,q m ) m )
(10)
p,q
(b) Sampling in Wiener amalgam spaces: For F ∈ W (Lm ) the following sampling property holds: CΛ F W (Lp,q . F |Λ p,q m m )
(11)
These statements are proved in [26] or [21, Proposition 11.1.4, Theorem 11.1.5]. 2.2. Gabor frames Gabor frames are closely linked to modulation spaces. They constitute “basis-like” sets for modulation spaces and are used to characterize the membership in a modulation space by the magnitude of coefficients in the corresponding series expansion. For a given lattice Λ ⊆ R2d and a window function ϕ ∈ L2 (Rd ), let G(ϕ, Λ) denote the set of functions {π(λ)ϕ: λ ∈ Λ} in L2 (Rd ). The operator Sϕ f =
f, π(λ)ϕ π(λ)ϕ
λ∈Λ
is the frame operator corresponding to G(ϕ, Λ). If Sϕ is bounded and invertible on L2 (Rd ), then G(ϕ, Λ) is called a Gabor frame for L2 (Rd ). This property is equivalent to the existence of two constants A, B > 0 such that A f 22
f, π(λ)g 2 = Sϕ f, f B f 2
for all f ∈ L2 Rd .
2
(12)
λ∈Λ
Using several windows ϕ = (ϕ1 , . . . , ϕn ), we say that the union window Gabor frame, if the associated frame operator given by Sϕ f =
n
j =1 G(ϕj , Λ)
n
n f, π(λ)ϕj π(λ)ϕj = Sϕj f
j =1 λ∈Λ
is a multi-
(13)
j =1
is invertible on L2 (Rd ). The frame operator can be expressed as the composition of the analysis operator Cϕ,Λ defined by
Cϕ,Λ (f )(λ, j ) = f, π(λ)ϕj ,
λ ∈ Λ, j = 1, . . . , n
and the synthesis operator Dϕ,Λ defined by Dϕ,Λ (c) = Dϕ,Λ ◦ Cϕ,Λ .
λ∈Λ
n
j =1 cλ,j π(λ)ϕj .
Then Sϕ,Λ =
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1909
2.3. Characterization of modulation spaces with Gabor frames The following characterization of modulation spaces by means of multi-window Gabor frames is a central result in time-frequency analysis and useful in many applications. It is crucial for the proof of our main theorem (Theorem 8). Theorem 2. Let ν be a submultiplicative weight on R2d satisfying the condition limn→∞ ν(nz)1/n = 1 for all z ∈ R2d and let m be a ν-moderate weight and 1 p, q ∞. Assume further that nj=1 G(ϕj , Λ) is a multi-window Gabor frame and that ϕj ∈ M1ν (Rd ) for j = 1, . . . , n. p
p
(i) A distribution f belongs to Mm (Rd ), if and only if Cϕj f ∈ m for j = 1, . . . , n. In this case p there exist constants A, B > 0, such that, for all f ∈ Mm (Rd ), A f Mpm
λ∈Λ
n
f, π(λ)ϕj 2
p/2
1/p B f Mpm .
m(λ)p
j =1
(ii) Assume in addition that Λ = aZd × bZd is a separable lattice. Then a distribution f bep,q longs to Mm (Rd ) if and only if each sequence Cϕj f (ak, bl) = f, π(ak, bl)ϕj belongs p,q to m (Z2d ). In this case there exist constants A and B depending on p, q, m such that, for p,q all f ∈ Mm A f Mp,q m
n p/2 q/p 1/q
p f, π(ak, bl)ϕj 2 m(ak, bl) l∈Z
k∈Z
j =1
B f Mp,q . m
(14)
(iii) Let Λ ⊆ R2d be an arbitrary lattice and Q be a relatively compact fundamental dop,q main of Λ. Then a distribution f belongs to Mm (Rd ), if and only if the function
p,q n 2 1/2 χλ+Q belongs to Lm (R2d ). In this case there exist conλ∈Λ ( j =1 |f, π(λ)ϕj | ) p,q stants A, B > 0, such that, for all f ∈ Mm (R2d ), A f Mp,q m
n 1/2
2 f, π(λ)ϕj χλ+Q λ∈Λ
j =1
p,q Lm
B f Mp,q . m
d d
Note that (ii) follows from (iii), since for Q = [0, a] × [0, b] the norm equivalence k,l∈Z2d akl χ(ak,bl)+Q Lp,q a p,q holds. m m Theorem 2 has a long history. It extends the basic characterizations of modulation spaces by Gabor frames to multi-window Gabor frames. For Gabor frames with a single window and lattices of the form Λ = aZd × bZd with ab ∈ Q Theorem 2 was proved in [16]. For general lattices it follows from the main result in [24] and the techniques in [16]. See also the discussion in [21, Chapter 13]. The proofs for multi-window Gabor frames require only few modifications, we therefore postpone a discussion to Appendix A.
1910
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
2.4. A new characterization of multi-window Gabor frames The proof of our main statement relies on a characterization of multi-window Gabor frames without using inequalities. The following lemma is a generalization of [22] from Gabor frames to multi-window Gabor frames. Lemma 3. Assume that ϕj ∈ M1 (Rd ) for j = 1, . . . , n. Then the following properties are equivalent. (i) nj=1 G(ϕj , Λ) is a multi-window Gabor frame for L2 (Rd ). (ii) The analysis operator Cϕ,Λ is one-to-one from M∞ (Rd ) to ∞ (Λ, Cn ). The idea of the proof will be given in Appendix A, where we will also list many more equivalent conditions. 2.5. Properties of localization operators We next recall some elementary properties of the localization operators HTλ σ . Time-frequency localization operators have been introduced and studied by Daubechies [11,10] and Ramanathan and Topiwala [33], and are also called STFT multipliers, time-frequency Toeplitz operators, Wick operators, time-frequency filters, etc. They are a popular tool in signal analysis for timefrequency filtering or nonstationary filtering [31,34], in quantization procedures in physics [1], or in the approximation of pseudodifferential operators [9,30]. For a detailed account of the early theory we refer to Wong’s book [38], for a study of boundedness and Schatten class properties to [7,8,18,36]. Lemma 4 (Intertwining property). If σ ∈ L∞ (R2d ), ϕ ∈ L2 (Rd ), and λ ∈ Λ, then π(λ)Hσ π(λ)∗ = HTλ σ . The proof consists of a simple calculation, see [12, Lemma 2.6]. For estimates of the STFT of Hσ f we introduce the formal adjoint of Vϕ , namely Vϕ∗ F =
F (z)π(z)ϕ dz,
R2d
which maps functions on R2d to functions or distributions on Rd . With this notation we can write the localization operator Hσ as Hσ f = Vϕ∗ (σ Vϕ f ). The STFT of Vϕ∗ F satisfies a fundamental pointwise estimate [21, Proposition 11.3.2]: ∗ Vϕ V F (z) |Vϕ ϕ| ∗ |F | (z), ϕ
∀z ∈ R2d .
(15)
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1911
We note that for F = σ Vϕ f this estimate becomes Vϕ (Hσ f )(z) = Vϕ V ∗ (σ Vϕ f ) (z) |Vϕ ϕ| ∗ σ |Vϕ f | (z). ϕ
(16)
Thus the short-time Fourier transform of Hσ is a so-called product-convolution operator. The standard boundedness results for localization operators can be easily deduced from the well established results for product convolution operators [6]. Estimate (16) is quite useful for the derivation of norm estimates. In the following, we fix a non-negative symbol σ and investigate the set of operators {HTλ σ : λ ∈ Λ}. To simplify notation we will write Hλ instead of HTλ σ , and sometimes H0 = Hσ by some abuse of notation. Lemma 5. (i) Assume that σ ∈ L1 (R2d ), σ 0 and that ϕ ∈ L2 (Rd ). Then each Hλ , λ ∈ Λ, is a positive trace-class operator. (ii) If, in addition, ϕ ∈ M1ν (Rd ) and σ ∈ L1ν (R2d ), then each Hλ is bounded from M∞ (Rd ) into M1ν (Rd ). In particular, all eigenfunctions ϕj of Hσ belong to M1ν (Rd ). d (iii) Furthermore, if ϕ ∈ M1ν (Rd ) and σ ∈ L1ν (R2d ), then each Hλ is bounded from M∞ 1/ν (R ) into L2 (Rd ). Proof. Statement (i) is well known, see, e.g., [2,17,38]. To show (ii), we use (16) to obtain, for f ∈ M∞ (Rd ), Hσ f M1ν = Vϕ (Hσ f )L1 = Vϕ Vϕ∗ (σ Vϕ f )L1 ν ν |Vϕ ϕ| ∗ |σ Vϕ f | L1 ν
Vϕ ϕ L1ν σ Vϕ f L1ν ,
(17)
where we have used Young’s inequality. Since ϕ ∈ M1ν (Rd ) if and only if Vϕ ϕ ∈ L1ν (R2d ) by [21, Proposition 12.1.2], we find that Hσ f M1ν Vϕ ϕ L1ν σ L1ν Vϕ f L∞ C σ L1ν f M∞ , and thus Hσ is bounded from M∞ (Rd ) to M1ν (Rd ). d The proof of (iii) is similar. Again, we apply (16) to obtain for f ∈ M∞ 1/ν (R ): Hσ f L2 |Vϕ ϕ| ∗ |σ Vϕ f |L2 Vϕ ϕ L2 σ Vϕ f L1 . Hence, the result follows from σ Vϕ f L1 =
1 dz σ (z)Vϕ f (z)ν(z) ν(z)
R2d
σ L1ν f M∞ . 1/ν
2
1912
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
The spectral theorem for compact self-adjoint operators provides the following spectral representation of Hλ . Corollary 6. Assume ϕ ∈ M1ν (Rd ) and σ ∈ L1ν (R2d ). Then there exists a positive sequence of eigenvalues c = (cj ) ∈ 1 and an orthonormal system of eigenfunctions ϕj ∈ M1ν (Rd ), such that Hσ f =
∞
cj f, ϕj ϕj .
(18)
j =1
It follows that Hλ f = HTλ σ f = π(λ)Hσ π(λ)∗ f =
∞
cj f, π(λ)ϕj π(λ)ϕj ,
(19)
j =1
and {π(λ)ϕj , j ∈ N} is an orthonormal system of eigenfunctions of Hλ . A priori, the spectral representation of Hλ holds only for f ∈ L2 (Rd ). The next corollary d extends the spectral representation to all of M∞ 1/ν (R ). d Corollary 7. The expansion for Hλ f given in (19) is well defined on M∞ 1/ν (R ) and converges d to Hλ f in L2 for all f ∈ M∞ 1/ν (R ).
Proof. Without loss of generality, we assume λ = 0 and set H = Hσ . Since Hf ∈ L2 (Rd ) for d every f ∈ M∞ 1/ν (R ) by Lemma 5(iii), we can expand Hf with respect to the orthonormal system of eigenfunctions of H and obtain that Hf =
∞ Hf, ϕj ϕj + r
(20)
j =1
for some r ∈ L2 (Rd ) in the orthogonal complement of span{ϕj : j ∈ N}. As H is self-adjoint on L2 (Rd ), we also have Hf, ϕj = f, H ϕj = cj f, ϕj , and consequently Hf =
∞
cj f, ϕj ϕj + r.
(21)
j =1
We need to show that r = 0. Since r ∈ L2 (Rd ) is orthogonal to all eigenfunctions ϕj , we find that Hf, r = r 22 . To show r = 0, we first observe that H h, r = 0 for all h ∈ L2 (Rd ) by (18). Since L2 (Rd ) d 2 d is w ∗ -dense in M∞ 1/ν (R ), we may choose an approximating sequence fn ∈ L (R ) such that ∗
w d −→ f ∈ M∞ fn − 1/ν (R ). For instance, fn may be chosen as
fn = R2d
χBn (z)Vg f (z)π(z)g dz,
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1913
∗
w where Bn is the ball with radius n and centered at 0. Furthermore, since fn − −→ f , we obtain in particular that Vϕ fn converges to Vϕ f uniformly on compact sets [13, Theorem 4.1]. Consequently
0 = Hfn , r =
σ (z)Vϕ fn (z)Vϕ r(z) dz →
R2d
σ (z)Vϕ f (z)Vϕ r(z) dz = Hf, r = r 22 .
R2d
d This shows that r = 0 and so the series (19) represents Hf for all f ∈ M∞ 1/ν (R ).
2
3. From local information to global information p
We first state and prove the main result for the modulation spaces Mm (Rd ). The generalizap,q tions to Mm (Rd ) will be discussed later. As always, ν denotes a submultiplicative, even weight function on R2d satisfying the condition limn→∞ ν(nz)1/n = 1 for all z ∈ R2d . Theorem 8. Let σ ∈ L1ν (R2d ) be a non-negative symbol satisfying the condition A
Tλ σ B,
a.e.
(22)
λ∈Λ
for two constants A, B > 0. Assume that ϕ ∈ M1ν (Rd ). Then for every ν-moderate weight m and p d d 1 p < ∞ the distribution f ∈ M∞ 1/ν (R ) belongs to Mm (R ), if and only if
p Hλ f 2 m(λ)p
1/p < ∞,
(23)
λ∈Λ p
and the expression in (23) is an equivalent norm on Mm (Rd ). Similarly, for p = ∞ we obtain the norm equivalence sup Hλ f 2 m(λ). f M∞ m
(24)
λ∈Λ
The norm equivalence supports the interpretation that Hλ f carries the local time-frequency information about f near λ ∈ R2d . By combining the local pieces Hλ f , one obtains the global time-frequency information as it is measured by modulation space norms. The proof of Theorem 8 requires some preparations. We first show that finitely many eigenfunctions of H0 = Vϕ∗ σ Vϕ generate a multi-window Gabor frame for L2 (Rd ). With this crucial step in place, Theorem 8 can then be deduced from the characterization of modulation spaces by means of Gabor frames. 3.1. Multi-window Gabor frames
Lemma 9. Assume that σ ∈ L1 (R2d ) and λ∈Λ Tλ σ 1, and that ϕ ∈ M1ν (Rd ). Let {ϕj : j ∈ N} be the orthonormal system of eigenfunctions of H0 . Then there exists n ∈ N, such that the finite union nj=1 G(ϕj , Λ) is a multi-window Gabor frame for L2 (Rd ).
1914
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
An analogous statement was proved and used in [12] for the lattice Λ = Z2d and rational lattices by means of Zak transform methods. In the case of general lattices we cannot apply Zak-transform methods. As a substitute, we will use a finite intersection property for Λ-invariant subspaces of M∞ . The following statement may be of interest in its own right. Lemma 10. Assume that Wn is a sequence of w -closed subspaces in M∞ (Rd ) such that (i) Wn ⊇ Wn+1 = {0} for all n ∈ N, and (ii) Wn is invariant under all operators π(λ) for λ ∈ Λ. Then
n1 Wn
= {0}.
Proof. Let Q be the closure of a relatively compact fundamental domain of Λ, for instance, if Λ = AZ2d , then Q = A[0, 1]2d . We first choose a sequence hn ∈ Wn with hn M∞ = supz∈R2d |Vϕ hn (z)| = 1. Then there exists a sequence of points λn in Λ, such that sup Vϕ π(λn )hn (z) = 1. z∈Q
Since Wn is invariant under all π(λ), λ ∈ Λ, the distribution fn = π(λn )hn is in Wn . Next we show that the set of restrictions {Vϕ fn |Q } is equicontinuous. We have Vϕ fn (z) − Vϕ fn (ξ ) = fn , π(z) − π(ξ ) ϕ fn M∞ · π(z) − π(ξ ) ϕ 1 . M
(25)
Since fn M∞ = π(λn )hn M∞ = 1, the equicontinuity follows from the strong continuity of time-frequency shifts on M1 (Rd ). We next choose zn ∈ Q with |Vϕ fn (zn )| 12 . Since the unit ball in M∞ (Rd ) is w -compact, there exists a subsequence fnk that converges to some f ∈ M∞ (Rd ) in the w -sense. Furthermore, by compactness of Q, there also exists a subsequence z of znk , such that z → z ∈ Q. Hence, by equicontinuity, Vϕ f (z ) → Vϕ f (z). Since |Vϕ f (z )| 1/2, we conclude that also |Vϕ f (z)| 1/2, and consequently f = 0. By construction, f ∈ Wm for every m, hence we obtain f = w ∗ − lim →∞ f ∈ Wm for all m, because Wm is w -closed. To summarize, we have constructed a non-zero f ∈ M∞ (Rd ) that is in Wm for all m. 2 Proof of Lemma 9. To prove that finitely many eigenfunctions generate a multi-window Gabor frame with respect to the lattice Λ, we assume on the contrary that nj=1 G(ϕj , Λ) is not a frame for every n ∈ N. Using Lemma 10 and Lemma 3, we will derive a contradiction to the assumption that A λ∈Λ Tλ σ B. We use the criterion of Lemma 3. Let ϕ n = (ϕ1 , . . . , ϕn ) be the vector-valued function consisting of the first n eigenfunctions of H0 , and
Wn = ker(Cϕ n ,Λ ) = f ∈ M∞ Rd : f, π(λ)ϕj = 0, ∀λ ∈ Λ, j = 1, . . . , n be the kernel of the coefficient operator Cϕ n ,Λ in M∞ (Rd ).
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1915
If nj=1 G(ϕj , Λ) is not a frame, then Wn is a non-trivial subspace of M∞ (Rd ) by Lemma 3. By construction, the Wn ’s form a nested sequence of w ∗ -closed subspaces of M∞ (Rd ), and they are also invariant and we under π(λ), λ ∈ Λ. Thus the assumptions of Lemma 10 are∞satisfied, d ), such that W = {0}. This means that there exists a non-zero f ∈ M (R conclude that ∞ n n=1
f, π(λ)ϕj = 0 for all λ ∈ Λ and all j ∈ N.
(26)
We now consider Hλ f . Since Hλ f ∈ M1 (Rd ) by Lemma 5, the bracket Hλ f, f is well defined and given by Hλ f, f =
2 σ (z − λ)Vϕ f (z) dz.
(27)
R2d
On the other hand, the extended spectral representation of Lemma 7 and (26) imply that Hλ f =
∞
cj f, π(λ)ϕj π(λ)ϕj = 0.
(28)
j =1
2 vanishes on Consequently Hλ f, f = 0 for all λ ∈ Λ, and |Vϕ f (z)| λ∈Λ supp Tλ σ . T σ A > 0 almost everywhere, According to the crucial assumption (22) we have λ∈Λ λ and thus λ∈Λ supp(Tλ σ ) = R2d . Therefore, (27) and (28) imply thatVϕ f = 0, from which f = 0 follows. This is a contradiction to f being a non-zero element in ∞ n=1 Wn . This contradiction shows that there exists an n ∈ N, such that nj=1 G(ϕj , Λ) is a multiwindow Gabor frame, and we are done. 2 Remark 1. Note that for finite-rank operators H0 , it can be seen directly that the finite set of eigenvectors generates a multi-window Gabor frame for Λ. 3.2. Proof of Theorem 8 d We are now ready to prove the main theorem. We observe that for f ∈ M∞ 1/ν (R ), Hλ f ∈ L2 (Rd ) by Lemma 5(iii). Thus the terms in (23) are well defined. p d 1 d First assume that p < ∞ and f ∈ Mm (Rd ) ⊆ M∞ 1/ν (R ). Using the embedding M (R ) → L2 (Rd ) and the estimate (17) with ν ≡ 1, we majorize Hλ f 2 as follows
Hλ f 2 Cϕ Hλ f M1 Cϕ (Tλ σ ) · Vϕ f 1 Vϕ ϕ 1 = Cϕ C σ (z − λ) · Vϕ f (z) dz R2d
= Cϕ C |Vϕ f | ∗ σ ∨ (λ),
(29)
where σ ∨ (z) = σ ∨ (−z). Thus Hλ f 2 is majorized by a sample of |Vϕ f | ∗ σ ∨ . To proceed furp ther, we use the fact that Vϕ f ∈ W (Lm ) and Vϕ f W (Lpm ) C0 ϕ M1ν f Mpm for ϕ ∈ M1ν (Rd )
1916
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924 p
and f ∈ Mm (Rd ) by [21, Theorem 12.2.1]. Now the convolution relation (10) and the sampling inequality (11) imply that
p p Hλ f 2 m(λ)p Cϕ C σ ∨ ∗ |Vϕ f | Λ p
m
λ
p Cϕ CCΛ σ ∨ ∗ |Vϕ f |W (Lp ) m
p
p
p
p
Cϕ CCΛ σ L1 Vϕ f W (Lp ) Cϕ CCΛ σ L1 f Mp . m
ν
ν
m
(30)
The same argument yields supλ∈Λ Hλ f 2 m(λ) C f M∞ . m p p Hence, for 1 p ∞, the mapping f → ( Hλ f 2 )λ∈Λ is bounded from Mm (Rd ) to m (Λ). Conversely, assume that p < ∞ and
p
Hλ f 2 m(λ)p < ∞.
λ p
We need to show that f ∈ Mm (Rd ). Since Hλ f 2 = sup g 2 =1 |Hλ f, g|, we have the inequality p Hλ f, gλ p m(λ)p Hλ f m(λ)p < ∞ 2
λ
λ
for arbitrary sequences gλ ∈ L2 (Rd ) with gλ 2 = 1. Applying the eigenfunction expansion of Corollary 6, we obtain ∞ p
p cj f, π(λ)ϕj π(λ)ϕj , gλ m(λ)p Hλ f 2 m(λ)p < ∞. λ
j =1
(31)
λ
Now fix j0 ∈ N and set gλ = π(λ)ϕj0 for λ ∈ Λ. Since the eigenfunctions of Hλ are orthonormal, the sum over j collapses to a single term, and (31) becomes
p Hλ f, gλ p m(λ)p = cj f, π(λ)ϕj p m(λ)p Hλ f 2 m(λ)p < ∞. 0 0 λ
λ
λ
The last inequality holds for every j0 ∈ N. After summing over finitely many j0 and switching to the 2 -norm on Cn , we obtain the inequality n 1/2 n
f, π(λ)ϕj 2 f, π(λ)ϕj p m(λ)p m(λ)p λ
j =1
j =1 λ
n 1 p c j =1 j
λ
p
Hλ f 2 m(λ)p < ∞.
(32)
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1917
We now apply Lemma 9 and choose an n ∈ N, such that nj=1 G(ϕj , Λ) is a multi-window Gabor frame for L2 (Rd ). Since all ϕj are in M1ν (Rd ), the fundamental characterization of modulation p spaces (Section 2.3) is valid. Thus Theorem 2(i) implies that f ∈ Mm (Rd ). If p = ∞ and supλ∈Λ Hλ f 2 m(λ) < ∞, then, by choosing gλ as before, we find
cj0 sup f, π(λ)ϕj0 m(λ) sup Hλ f 2 m(λ) < ∞ λ
λ
for every j0 . Arguing as above, Theorem 2 says that
f M∞ C max sup f, π(λ)ϕj m(λ) m j =1,...,n λ
1 j =1,...,n cj
sup Hλ f 2 m(λ) < ∞,
max
λ
2d and f ∈ M∞ m (R ).
p Combining (30) and (32), we have shown that f Mpm and ( λ∈Λ Hλ f 2 m(λ)p )1/p for p 1 p < ∞ (or supλ∈Λ Hλ f 2 m(λ) for p = ∞) are equivalent norms on Mm (Rd ).
3.3. Variations of Theorem 8 In order to formulate our main result for mixed-norm spaces and arbitrary lattices, we have to resort to the theory of coorbit spaces, as introduced in [13,14]. In particular, for
arbitrary lattices, p,q a sequence (cλ )λ∈Λ is in the sequence spaces associated with Lm (R2d ), if λ∈Λ cλ χλ+Q is in p,q Lm (R2d ) for some fundamental domain Q of Λ. With this definition, we may give the following characterization. Theorem 11. Let Λ be an arbitrary lattice in R2d and Q be a relatively compact fundamental domain Q. Assume the same conditions on σ and ϕ as in Theorem 8. Then a distribution p,q d d f ∈ M∞ 1/ν (R ) belongs to Mm (R ), 1 p, q ∞, if and only if
p,q 2d
Hλ f 2 χλ+Q ∈ Lm
R
(33)
,
λ∈Λ
and
λ∈Λ Hλ f 2 χλ+Q Lm
p,q
f Mp,q . m
Proof. The proof is almost identical to the proof of Theorem 8. The only modifications occur in (30), which has to be replaced by H f χ λ 2 λ+Q λ∈Λ
p,q
Lm
Vϕ f ∗ σˇ (λ)χλ+Q
p,q
Lm
λ∈Λ p
C Vϕ f ∗ σˇ W(Lp,q . m ) p,q
Likewise, in (32) we replace the weighted Lm -norm by the general Lm -norm. p,q
2
For a separable lattice Λ = aZd × bZd the norm in (33) is just the m˜ -norm on Z2d with m(k, ˜ n) = m(ak, bn). In this case, λ = (ka, nb), k, n ∈ Zd and we may write Hλ f = Hk,n f .
1918
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
Corollary 12. Let Λ = aZd × bZd be a separable lattice and assume the same conditions p,q d d on σ and ϕ as in Theorem 8. Then a distribution f ∈ M∞ 1/ν (R ) belongs to Mm (R ) for 1 p, q < ∞, if and only if n∈Zd
p Hk,n f 2 m(ka, nb)p
q/p 1/q < ∞,
(34)
k∈Zd p,q
and (34) defines an equivalent norm on Mm (Rd ). The result holds for p = ∞ or q = ∞ with the usual modifications. 3.4. Existence of multi-window Gabor frames and properties of the eigenfunctions ϕj We finally point out some immediate consequences of our results and methods. The intermediate results leading to Theorem 8 also imply the existence of multi-window Gabor frames for general lattices. Theorem 13. Let Λ be an arbitrary lattice and ν a submultiplicative weight on R2d . Then there n 1 d exist finitely many functions ϕj ∈ Mν (R ), such that j =1 G(ϕj , Λ) is a multi-window Gabor frame for L2 (Rd ).
Proof. Choose σ ∈ L1ν (R2d ) such that λ∈Λ Tλ σ 1 and fix a window ϕ ∈ M1ν (Rd ). For instance, one may choose the characteristic function χQ of a (relatively compact) fundamental domain of Λ and the Gaussian window ϕ(t) = e−πt·t . Now consider the localization operator H0 = Vϕ∗ σ Vϕ . According to Lemma 5(ii), all eigenfunctions ϕj of H0 belong to M1ν (Rd ). Lemma 9 states that for some finite n ∈ N the set n 2 d j =1 G(ϕj , Λ) is a multi-window Gabor frame for L (R ). 2 The existence of multi-window Gabor frames for general lattices was known before. On the one hand, it is an immediate consequence of coorbit theory applied to the Heisenberg group. To be more precise, according to [15, Theorem 7] for every lattice Λ and every non-zero g ∈ M1ν (Rd ) there exists n ∈ N, such that the set G(g, n1 Λ) is a Gabor frame for L2 (Rd ). Us 1 1 ing a coset decomposition n Λ = (μ + Λ) for suitable μ ∈ Λ, one sees that G(g, n Λ) = G(π(μ)g, Λ) is a multi-window Gabor frame with all windows π(μ)g derived from a single window g. Recently Luef [32] proved the existence of multi-window Gabor frames by exploiting a connection between Gabor analysis and non-commutative geometry. Our methods provide a third, independent proof for this interesting result. The construction of multi-window Gabor frames in Proposition 13 yields more detailed information about the frame generators, since they are eigenfunctions of a localization operator. Intuitively the eigenfunctions corresponding to the largest eigenvalues of a localization operator concentrate their energy on the essential support of the symbol σ of H0 . For the special case of compactly supported σ , this intuition is made precise by the following result. Proposition 14. Let the non-negative function σ ∈ L1 (R2d ) be supported in a compact set Ω in R2d with 0 σ (z) Cσ < ∞ for z ∈ Ω. Consider the localization operator given by Hσ f = Vϕ∗ σ Vϕ f with ϕ ∈ M1 (Rd ), ϕ 2 = 1 and spectral representation as in Corollary 6.
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1919
Then the eigenfunctions ϕj of Hσ satisfy the following time-frequency concentration Ω
Vϕ ϕj (z)2 dz cj . Cσ
(35)
Equality holds, if and only if σ (z)/Cσ = χΩ (z) is the characteristic function of Ω. Proof. Using the weak interpretation of Hσ from (2), we obtain Ω
Vϕ ϕj (z)2 dz 1 Cσ
2 σ (z)Vϕ ϕj (z) dz
Ω
cj cj 1 = Hσ ϕj , ϕj = ϕj 22 = . Cσ Cσ Cσ
2
Appendix A. Characterizations of modulation spaces and multi-window Gabor frames In the appendix, we will sketch the proof of Theorem 2 and formulate a series of new characterizations of multi-window Gabor frames. These statements generalize well-known facts from Gabor analysis and the results about Gabor frames without inequalities in [22]. For the investigation of multi-window Gabor frames we need the dual concept of vectorvalued Gabor systems. In this case we consider the Hilbert space H = L2 (Rd , Cn ) consisting of all vector-valued functions f(t) = (f1 (t), . . . , fn (t)) with the inner product f, ϕL2 (Rd ,Cn ) =
n
fj (t)ϕj (t) dt =
j =1
n
fj , ϕj L2 (Rd ) .
(A.1)
j =1
Time-frequency-shifts act coordinate-wise on f. The vector-valued Gabor system G(ϕ, Λ) = {π(λ)ϕ: λ ∈ Λ} is a Riesz sequence in L2 (Rd , Cn ), if there exist constants 0 < A, B < ∞ such that for all finitely supported sequences c, A c 22
2 cμ π(λ)ϕ 2 λ∈Λ
L (Rd ,Cn )
B c 22 .
(A.2)
We now proceed to the proof of Theorem 2. The crucial step is to show the invertibility of the frame operator on M1ν (Rd ). This step requires a special representation of the frame operator due to Janssen [28] and at its core uses “Wiener’s lemma for twisted convolution” [24]. For ϕj , φj in M1 (Rd ), j = 1, . . . , n, we denote frame-type operators by Sϕ,ψ f =
n
n f, π(λ)ϕj π(λ)ψj = Sϕj ,ψj .
λ∈Λ j =1
j =1
The frame operator of the Gabor system nj=1 G(ϕj , Λ) is S = Sϕ,ϕ . We usually omit the reference to the lattice Λ and the windows ϕj .
1920
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
The volume s(Λ) of a lattice Λ = AZ2d is defined as the measure of a fundamental domain of Λ and is |det(A)|. The adjoint lattice of Λ is Λ◦ = {μ ∈ R2d : π(λ)π(μ) = π(μ)π(λ) for all λ ∈ Λ}. Lemma 15 (Janssen’s representation). Assume that ϕj , ψj ∈ M1 (Rd ) for all j = 1, . . . , n. Then n the frame type operator associated to j =1 G(ϕj , Λ) and nj=1 G(ψj , Λ) can be written as n
ϕj , π(μ)ψj π(μ)f
Sϕ,ψ f = s(Λ)−1
(A.3)
μ∈Λ◦ j =1
with unconditional convergence in the operator norm on L2 . Proof. By Janssen’s result [28] the representation holds for a single Sϕj ,ψj and (A.3) follows by taking a sum. 2 The canonical dual frame is defined to be γj,λ = π(λ)S −1 ϕj . Since the frame operator S = Sϕ,ϕ commutes with time-frequency shifts on Λ, we obtain the reconstruction formulas f = S −1 Sf =
n
f, π(λ)ϕj π(λ)γj
λ∈Λ j =1
= SS −1 f =
n
f, π(λ)γj π(λ)ϕj
λ∈Λ j =1
= Dϕ,Λ Cγ ,Λ f = Dγ ,Λ Cϕ,Λ f. As a general principle the localization of a frame is inherited by the dual frame [19]. The following statement is a generalization of [24, Theorem 9] to multi-window Gabor frames on general lattices. 2d satisfying Lemma 16. Assume that ν is a submultiplicative, even nweight on R 1/n 2d limn→∞ ν(nz) = 1 for all z ∈ R . Assume further that j =1 G(ϕj , Λ) is a frame for 2 d L (R ) and that ϕj ∈ M1ν (Rd ). Then the frame operator S is invertible on M1ν (Rd ) and γj = S −1 ϕj ∈ M1ν (Rd ) for j = 1, . . . , n.
Proof. Janssen’s representation (A.3) implies that S = Sϕ,ϕ = s(Λ)−1
cμ π(μ),
(A.4)
μ∈Λ◦
with a coefficient sequence cμ = nj=1 ϕj , π(μ)ϕj . The hypothesis ϕj ∈ M1ν (Rd ) guarantees that μ∈Λ◦ |ϕj , π(μ)ϕj |ν(μ) < ∞ for each j , see [21, Corollary 12.1.12], and therefore the coefficient sequence (cμ ) is in 1ν (Λ◦ ). Since nj=1 G(ϕj , Λ) is a frame, the frame operator Sϕ,ϕ is invertible on L2 (Rd ). It follows from [24, Theorem 3.1] that the inverse frame operator
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1921
S −1 is again of the form S −1 = μ∈Λ◦ dμ π(μ) with a coefficient sequence d in 1ν (Λ◦ ). This representation implies that S −1 is bounded on M1ν (Rd ) and that γj M1ν = S −1 ϕj M1 C ϕj M1ν .
(A.5)
ν
Therefore the dual windows γj , j = 1, . . . , n are in M1ν (Rd ) as claimed.
2
Once the invertibility of the multi-window frame operator on M1ν (Rd ) is established, the proof of Theorem 2 is straight-forward by using the following boundedness properties of the coefficient operator Cϕ,Λ and Dϕ,Λ from [21, Theorems 12.2.3 and 12.3.4]. If ϕj ∈ M1ν (Rd ) p,q p,q and γj ∈ M1ν (Rd ), then both Cϕ,Λ and Cγ ,Λ are bounded from Mm (Rd ) into m (Λ, Cn ) for 1 p, q ∞ and for every ν-moderate weight m. Likewise Dϕ,Λ and Dγ ,Λ are bounded from p,q p,q p,q For the m (Λ, Cn )-norm we use the Euclidean norm on Cn , so m (Λ, Cn ) into Mm (Rd ). n 2 1/2 χ . that c p,q n = λ+Q Lp,q λ∈Λ ( j =1 |cλ,j | ) m (Λ,C ) m As a consequence, the reconstruction formula f = Dϕ,Λ Cγ ,Λ f = Dγ ,Λ Cϕ,Λ f holds for p,q f ∈ Mm (Rd ) with the correct norm estimates. The norm equivalence stated in Theorem 2 then follows from f Mp,q d = Dγ ,Λ Cϕ,Λ f Mp,q (Rd ) Dγ ,Λ op Cϕ,Λ f p,q (Λ,Cn ) m (R ) m m Dγ ,Λ op Cϕ,Λ op f Mp,q d . m (R ) Next we come to the characterization of multi-window Gabor frames (Lemma 3) and extend the list of equivalent conditions. For the formulation of the dual conditions on the adjoint lattice Λ◦ we need the vector-valued versions of the analysis and synthesis operators. For f = (f1 , . . . , fn ) ∈ M∞ (Rd , Cn ) and ϕ = (ϕ1 , . . . , ϕn ) ∈ M1 (Rd , Cn ) the coefficient op◦ ◦ erator is defined
to be Cϕ,Λ (f)(μ) = (f, π(μ)ϕ), μ ∈ Λ , and the synthesis operator is ϕ,Λ◦ D ϕ,Λ◦ is defined on seDϕ,Λ◦ (c) = μ∈Λ◦ cμ π(μ)ϕ. The Gramian operator Gϕ,Λ◦ = C ◦ quences indexed by Λ . Lemma 17. Assume that ϕj ∈ M1 (Rd ) for j = 1, . . . , n. The following are equivalent for the multi-window Gabor system nj=1 G(ϕj , Λ): (i) nj=1 G(ϕj , Λ) is a frame for L2 (Rd ). (ii) Wexler–Raz biorthogonality: There exist γj ∈ M1 (Rd ), j = 1, . . . , n, such that s(Λ)−1
n
ϕj , π(μ)γj = δμ,0
for μ ∈ Λ◦ .
(A.6)
j =1
Ron–Shen duality: G(ϕ, Λ◦ ) is a Riesz sequence in L2 (Rd , Cn ). Sϕ,ϕ is invertible on M1 (Rd ). Sϕ,ϕ is invertible on M∞ (Rd ). Sϕ,ϕ is one-to-one on M∞ (Rd ). The analysis operator Cϕ,Λ : M∞ (Rd ) → ∞ (Λ, Cn ) is one-to-one from M∞ (Rd ) to ∞ (Λ, Cn ). (viii) The synthesis operator Dϕ,Λ defined on 1 (Λ, Cn ) has dense range in M1 (Rd ). (iii) (iv) (v) (vi) (vii)
1922
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
(ix) Dϕ,Λ is surjective from 1 (Λ, Cn ) onto M1 (Rd ). ϕ,Λ◦ defined on ∞ (Λ◦ ) is one-to-one from ∞ (Λ◦ ) to (x) The synthesis operator D M∞ (Rd , Cn ). ϕ,Λ◦ defined on M1 (Rd , Cn ) has dense range in 1 (Λ◦ ). (xi) The analysis operator C ϕ,Λ◦ is surjective from M1 (Rd , Cn ) onto 1 (Λ◦ ). (xii) C (xiii) Gϕ,Λ◦ is invertible on 1 (Λ◦ ). (xiv) Gϕ,Λ◦ is invertible on ∞ (Λ◦ ). (xv) Gϕ,Λ◦ is one-to-one on 1 (Λ◦ ). The equivalence (i) ⇔ (vii) is claimed in Lemma 3 and is all we need for the main results of our paper. Proof. The implication (i) ⇒ (iv) was sketched in Lemma 16. (i) ⇔ (ii): Time-frequency
shifts on a lattice are linearly independent in the following sense: if c = (cμ )μ∈Λ◦ ∈ ∞ and μ∈Λ◦ cμ π(μ) = 0 (as an operator from M1 (Rd ) to M∞ (Rd )), then cμ = 0 for all μ ∈ Λ◦ , see [22]. Now, if f = Sϕ,γ f for all f ∈ M1 (Rd ), then by Janssen’s representation (A.3) we have f = s(Λ)−1
n
ϕj , π(μ)γj π(μ)f.
μ∈Λ◦ j =1
The linear independence of time-frequency shifts implies (A.6). The converse is obvious. (ii) ⇔ (iii): Assume first that nj=1 G(ϕj , Λ) is a multi-window Gabor frame for L2 (Rd ). The ϕ on L2 (Rd ). To upper bound in (A.2) follows from the boundedness of the synthesis operator D show the existence of a lower bound, we apply the Wexler–Raz relations. Since nj=1 G(ϕj , Λ) is a frame with dual nj=1 G(γj , Λ) and γj ∈ M1 (Rd ) for all j , we have ϕ, π(μ)γ =
n ◦ ◦ j =1 ϕj , π(μ)γj = s(Λ)δμ,0 , and G(ϕ, Λ ) and therefore G(γ , Λ ) are biorthogonal systems
in L2 (Rd , Cn ). If f = μ∈Λ◦ cμ π(μ)ϕ, then cμ = s(Λ)−1 f, π(μ)γ L2 (Rd ,Cn ) and ϕ,Λ◦ f, c = s(Λ)−1 C from which the lower bound in (A.2) follows. Conversely, assume that G(ϕ, Λ◦ ) is a Riesz sequence in L2 (Rd , Cn ). Then there exists a biorthogonal basis of the form {π(μ)γ : μ ∈ Λ◦ } contained in K = span(G(ϕ, Λ◦ )). It can be shown that γ ∈ M1 (Rd , Cn ). The frame property of G(ϕj , Λ) follows from the Wexler–Raz relations (A.6). With three classical statements (A.3) and (ii), (iii) for multi-window Gabor frames the remaining equivalences follow exactly as in [22]. 2 References [1] F.A. Berezin, Wick and anti-Wick symbols of operators, Mat. Sb. (N.S.) 86 (128) (1971) 578–610. [2] P. Boggiatto, E. Cordero, Anti-Wick quantization with symbols in Lp spaces, Proc. Amer. Math. Soc. 130 (9) (2002) 2679–2685 (electronic). [3] J.-M. Bony, J.-Y. Chemin, Functional spaces associated with the Weyl–Hörmander calculus (Espaces fonctionnels associés au calcul de Weyl–Hörmander), Bull. Soc. Math. France 122 (1) (1994) 77–118.
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
1923
[4] J.-M. Bony, N. Lerner, Quantification asymptotique et microlocalisations d’ordre supérieur. I, Ann. Sci. École Norm. Sup. (4) 22 (3) (1989) 377–433. [5] K. Brandenburg, M. Kahrs (Eds.), Applications of Digital Signal Processing to Audio and Acoustics, Engineering and Computer Science/Kluwer Academic Publishers, 2003. [6] R.C. Busby, H.A. Smith, Product-convolution operators and mixed-norm spaces, Trans. Amer. Math. Soc. 263 (2) (1981) 309–341. [7] E. Cordero, K. Gröchenig, Time-frequency analysis of localization operators, J. Funct. Anal. 205 (1) (2003) 107– 131. [8] E. Cordero, K. Gröchenig, L. Rodino, Localization operators and time-frequency analysis, in: N.M. Chong, et al. (Eds.), Harmonic, Wavelet and p-Adic Analysis, World Scient. Publ., 2007, pp. 83–109, 2006. [9] A. Córdoba, C. Fefferman, Wave packets and Fourier integral operators, Comm. Partial Differential Equations 3 (11) (1978) 979–1005. [10] I. Daubechies, Time-frequency localization operators: a geometric phase space approach, IEEE Trans. Inform. Theory 34 (4) (1988) 605–612. [11] I. Daubechies, The wavelet transform, time-frequency localization and signal analysis, IEEE Trans. Inform. Theory 36 (5) (1990) 961–1005. [12] M. Dörfler, H.G. Feichtinger, K. Gröchenig, Time-frequency partitions for the Gelfand triple (S0 , L2 , S0 ), Math. Scand. 98 (1) (2006) 81–96. [13] H.G. Feichtinger, K. Gröchenig, Banach spaces related to integrable group representations and their atomic decompositions. I, J. Funct. Anal. 86 (2) (1989) 307–340. [14] H.G. Feichtinger, K. Gröchenig, Banach spaces related to integrable group representations and their atomic decompositions. II, Monatsh. Math. 108 (2–3) (1989) 129–148. [15] H.G. Feichtinger, K. Gröchenig, Gabor wavelets and the Heisenberg group: Gabor expansions and short time fourier transform from the group theoretical point of view, in: C.K. Chui (Ed.), Wavelets: A Tutorial in Theory and Applications, Academic Press, Boston, MA, 1992, pp. 359–398. [16] H.G. Feichtinger, K. Gröchenig, Gabor frames and time-frequency analysis of distributions, J. Funct. Anal. 146 (2) (1997) 464–495. [17] H.G. Feichtinger, K. Nowak, A first survey of Gabor multipliers, in: Advances in Gabor Analysis, in: Appl. Numer. Harmon. Anal., Birkhäuser Boston, Boston, MA, 2003, pp. 99–128. [18] C. Fernandez, A. Galbis, Compactness of time-frequency localization operators on L2 (R), J. Funct. Anal. 233 (2) (2006) 335–350. [19] M. Fornasier, K. Gröchenig, Intrinsic localization of frames, Constr. Approx. 22 (3) (2005) 395–415. [20] S.J. Godsill, P.J.W. Rayner, Digital Audio Restoration, Springer, 1998. [21] K. Gröchenig, Foundations of Time-Frequency Analysis, Appl. Numer. Harmon. Anal., Birkhäuser, Boston, 2001. [22] K. Gröchenig, Gabor frames without inequalities, Int. Math. Res. Not. (2007), 2007, Article ID rnm111, 21 pp. [23] K. Gröchenig, Weight functions in time-frequency analysis, in: L. Rodino, M.-W. Wong, et al. (Eds.), Pseudodifferential Operators: Partial Differential Equations and Time-Frequency Analysis, in: Fields Inst. Commun., vol. 23, 2007, pp. 343–366. [24] K. Gröchenig, M. Leinert, Wiener’s lemma for twisted convolution and Gabor frames, J. Amer. Math. Soc. 17 (2004) 1–18. [25] K. Gröchenig, J. Toft, Isomorphism properties of Toeplitz operators and pseudo-differential operators between modulation spaces, J. Anal. Math., in press. [26] C. Heil, An introduction to weighted Wiener amalgams, in: M. Krishna, R. Radha, S. Thangavelu (Eds.), Wavelets and Their Applications, Chennai, January 2002, Allied Publishers, 2003, pp. 183–216. [27] P. Jaming, Principe d’incertitude qualitatif et reconstruction de phase pour la transformée de Wigner, C. R. Acad. Sci. Paris Sér. I Math. 327 (1998) 249–254. [28] A.J.E.M. Janssen, Duality and biorthogonality for Weyl–Heisenberg frames, J. Fourier Anal. Appl. 1 (4) (1995) 403–436. [29] A.J.E.M. Janssen, Proof of a conjecture on the supports of Wigner distributions, J. Fourier Anal. Appl. 4 (6) (1998) 723–726. [30] N. Lerner, The Wick calculus of pseudo-differential operators and some of its applications, Cubo Mat. Educ. 5 (1) (2003) 213–236. [31] P. Louizou, Speech Enhancement: Theory and Practice, CRC Press, 2007. [32] F. Luef, Projective modules over non-commutative tori are multi-window Gabor frames for modulation spaces, J. Funct. Anal. 257 (6) (2009) 1921–1946. [33] J. Ramanathan, P. Topiwala, Time-frequency localization via the Weyl correspondence, SIAM J. Math. Anal. 24 (5) (1993) 1378–1393.
1924
M. Dörfler, K. Gröchenig / Journal of Functional Analysis 260 (2011) 1903–1924
[34] C. Roads, The Computer Music Tutorial, MIT Press, 1998. [35] W. Sun, G-frames and g-Riesz bases, J. Math. Anal. Appl. 322 (October 2006) 437–452. [36] J. Toft, Continuity properties for modulation spaces, with applications to pseudo-differential calculus. I, J. Funct. Anal. 207 (2) (2004) 399–429. [37] E. Wilczock, Zur Funktionalanalysis der Wavelet- und Gabortransformation, thesis, TU München, 1998. [38] M.-W. Wong, Wavelet Transforms and Localization Operators, Oper. Theory Adv. Appl., vol. 136, Birkhäuser, Basel, 2002.
Journal of Functional Analysis 260 (2011) 1925–1943 www.elsevier.com/locate/jfa
On the double commutant of Cowen–Douglas operators Li Chen a,∗ , Ronald G. Douglas b,1 , Kunyu Guo c,2 a Department of Mathematics, Tianjin University, Tianjin 300072, China b Department of Mathematics, Texas A&M University, College Station, TX 77843, United States c School of Mathematics Science, Fudan University, Shanghai 200433, China
Received 27 December 2009; accepted 28 December 2010 Available online 8 January 2011 Communicated by Gilles Godefroy
Abstract Let T be a Cowen–Douglas operator. In this paper, we study the von Neumann algebra V ∗ (T ) consisting of operators commuting with both T and T ∗ from a geometric viewpoint. We identify operators in V ∗ (T ) with connection-preserving bundle maps on E(T ), the holomorphic Hermitian vector bundle associated to T . By studying such bundle maps, the structure of V ∗ (T ) as well as information on reducing subspaces of T can be determined. © 2010 Elsevier Inc. All rights reserved. Keywords: Cowen–Douglas operator; Von Neumann algebra; Reducing subspace; Connection
1. Introduction Let H be a separable Hilbert space. Given a domain (connected open subset) Ω in C and a positive integer n, M.J. Cowen and the second author [2] introduced the operator class Bn (Ω), consisting of operators T on H satisfying: * Corresponding author.
E-mail addresses: [email protected] (L. Chen), [email protected] (R.G. Douglas), [email protected] (K. Guo). 1 Research supported in part by a grant from the National Science Foundation (US). 2 This work is partially supported by Laboratory of Mathematics for Nonlinear Science, Fudan University, and NSFC (10525106), NKBRPC (2006CB805905). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.030
1926
(i) (ii) (iii) (iv)
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Ω ⊆ σ (T ); ran(T − w) = H for w in Ω; w∈Ω ker(T − w) = H; dim ker(T − w) = n for w in Ω.
Given an operator T in Bn (Ω), the mapping w → ker(T − w) defines a rank n holomorphic Hermitian vector bundle over Ω, which we denote by E(T ). An important observation in [2] is that invariants of T can be revealed by investigating their geometric counterparts in E(T ). Our main aim in this paper is to study the von Neumann algebra V ∗ (T ) of operators commuting with both T and T ∗ for T in Bn (Ω). There are several motivations for our investigation. For one thing, Bn (Ω) contains many important classes of operators and characterizing reducing subspaces of these operators is an interesting topic in operator theory. Our investigation arises from the study of multiplication operators on Hilbert spaces consisting of holomorphic functions. For a typical example we mention the multiplication operator MB on the Bergman space where B is a finite Blaschke product. In this case, the adjoint of Mφ is a Cowen–Douglas operator. An open conjecture is that if B is a Blaschke product of order n, then MB has at most n distinct minimal reducing subspaces, or in language of operator algebra, the von Neumann algebra V ∗ (MB ) has at most n minimal projections. The algebra V ∗ (MB ) is finite dimensional (see [4]), and using general theory of finite dimensional von Neumann algebras, one can show that the conjecture is equivalent to the statement that V ∗ (MB ) is abelian (see [4,7] for detailed discussions). Progress along this line can also be found in [9,10,14]. For further discussion on the relation between operator theory on function spaces and von Neumann algebras, see [6] and [8]. We will not go any further on concrete problems, which however, suggest that it is worthwhile to have a conceptual understanding of V ∗ (T ) for an arbitrary Cowen–Douglas operator T . Another reason for studying V ∗ (T ) lies in its close relation to the differential geometry of the bundle E(T ). Recall that if S is an operator commuting with T , then S ker(T − w) ⊆ ker(T − w), and hence S induces a holomorphic bundle map on E(T ) which we denote by Γ (S). If S lies in V ∗ (T ), then Γ (S) is not only holomorphic, but also connection-preserving, as we shall see later. Projections in V ∗ (T ), or reducing subspaces of T , are in one-to-one correspondence with reducing subbundles of E(T ). (We say a subbundle F of a holomorphic Hermitian vector bundle E is a reducing subbundle if both F and its orthogonal complement F ⊥ in E are holomorphic subbundles.) Now we briefly describe this correspondence (see [2] for details): If H1 is a reducing subspace for T in Bn (Ω) and H2 = H1⊥ , then T |H1 and T |H2 are both Cowen–Douglas operators. In this case, E(T |H1 ) and E(T |H2 ) are mutually orthogonal holomorphic subbundles such that E(T ) = E(T |H1 ) ⊕ E(T |H2 ). Conversely, if E(T ) can be decomposed into an orthogonal direct sum of two holomorphic exist reducing subspaces H1 and H2 such that H = H1 ⊕ H2 subbundles E1 and E2 , then there with H1 = w∈Ω E1w and H2 = w∈Ω E2w , where Ei w denotes the fibre of Ei at w. Two reducing subspaces H1 and H2 for T are said to be unitarily equivalent if there exists a unitary operator U : H1 → H2 such that U T |H1 = T |H2 U . A key result in [2], which we restate in the following, asserts that H1 and H2 are unitarily equivalent if and only if there exists an isomorphic holomorphic bundle map between E(T |H1 ) and E(T |H2 ).
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1927
Theorem 1.1. (See [2].) Two Cowen–Douglas operators T1 and T2 in Bn (Ω) are unitarily equivalent if and only if there exists a local isometric holomorphic bundle map Φ from E(T1 ) to E(T2 ). In this case, Φ = Γ (U ) where U is the intertwining unitary operator. Remark 1.2. We say that two holomorphic Hermitian vector bundles over Ω are locally equivalent if there exists an isometric holomorphic bundle map Φ defined on an open subset in Ω between them. The theorem says that the bundle map Φ defined on can be extended to a globally defined map Γ (U ); in other words, local equivalence implies global equivalence. This arises from the uniqueness of analytic continuation and the well-known spanning property (see [2] for a proof) that
ker(T − w) = H,
w∈
for any open subset in Ω. Given a Cowen–Douglas operator T , Theorem 1.1 asserts that holomorphic isometric bundle maps on E(T ) are in one-to-one correspondence with unitary operators in V ∗ (T ). In Section 3, we generalize this correspondence to connection-preserving bundle maps on E(T ) and V ∗ (T ) (holomorphic isometric bundle maps are necessarily connection-preserving, as we shall see in the next section). Our result is stated as follows: Theorem 1.3. Let T be a Cowen–Douglas operator in Bn (Ω) and Φ be a bundle map on E(T ). There exists an operator TΦ in V ∗ (T ) such that Φ = Γ (TΦ ) if and only if Φ is connectionpreserving. Consequently, the map Γ is a ∗-isomorphism from V ∗ (T ) to connection-preserving bundle maps on E(T ). In Section 4, by studying connection-preserving bundle maps on E(T ), we show that V ∗ (T ) is isomorphic to the commutant of a matrix algebra. This matrix algebra represents the algebra of bundle maps on E(T ) generated by curvature and its covariant derivatives to all orders. Our discussions are based on a result called “block diagonalization of connections” established by Cowen and the second author [3] where they studied the equivalence problem of C ∞ Hermitian vector bundles. We will also use this result to study reducing subbundles of E(T ), which provides a canonical decomposition of H into the direct sum of minimal reducing subspaces. As a complementary example, we discuss a typical kind of Cowen–Douglas operators, called the bundle shifts, which represent a large class of subnormal operators related to multiply-connected domains [1]. 2. Preliminaries on Hermitian vector bundles In this section, we provide necessary preliminaries on Hermitian vector bundles, which are mainly extracted from [2]. General references can be found in [11,13]. Given a domain Ω in C, a rank n holomorphic vector bundle over Ω is a complex manifold E with a holomorphic map π from E onto Ω such that each fibre Eλ = π −1 (λ) is a copy of Cn and for each λ0 in Ω, there exists a neighborhood of λ0 and holomorphic functions s1 , . . . , sn from to E such that Eλ = {s1 (λ), . . . , sn (λ)}. The n-tuple of functions {s1 , . . . , sn } is called
1928
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
a holomorphic frame over . A section is a map s from an open subset of Ω to E such that π(s(λ)) = λ. A bundle map between two bundles E1 and E2 defines a linear transformation from E1λ to E2λ for λ in Ω. Locally a bundle map can be represented by a matrix-valued function relative to the local frames of the two bundles. A bundle map between two holomorphic vector bundles is holomorphic if its representing matrix function relative to holomorphic frames is holomorphic. A holomorphic bundle map is determined by its restriction on any open subset in Ω. A Hermitian vector bundle is a vector bundle E such that each fibre Eλ is an inner product space. Given a bundle map Φ from a Hermitian vector bundle E1 to E2 , we can define its adjoint to be a bundle map Φ ∗ from E2 to E1 satisfying Φs(λ), t (λ) E = s(λ), Φ ∗ t (λ) E
2λ
1λ
for any sections s and t of E1 and E2 , respectively. For a separable Hilbert space H and a positive integer n, let Gr(n, H) denote the Grassmann manifold of all n-dimensional subspaces of H. A map f : Ω → Gr(n, H) is called a holomorphic neighborhood of λ0 and n holomorphic H-valued curve if for any point λ0 in Ω, there exists a functions s1 , . . . , sn on such that f (λ) = {s1 (λ), . . . , sn (λ)}. A holomorphic curve naturally gives a Hermitian holomorphic vector bundle Ef over Ω. The fibre of Ef at a point λ is f (λ) and the metric at each fibre is inherited from the inner product on H. The local holomorphic functions s1 , . . . , sn form a holomorphic frame over . It is shown in [2] that if T is a Cowen– Douglas operator in Bn (Ω), the map w → ker(T − w) is a holomorphic curve and the resulting bundle is E(T ). In this paper, we concentrate on unitary invariants of holomorphic curves, while we would like to mention the work of Jiang and Ji [12], who studied the similarity questions rather than unitary ones and some of their methods are related to ours. Let E(Ω) denote the algebra of C ∞ functions on Ω and let E p (Ω) denote the C ∞ differential forms of degree p on Ω. Then we have E 0 (Ω) = E(Ω), E 1 (Ω) = {f dz + g dz: f, g ∈ E(Ω)} and E 2 (Ω) = {f dz dz: f ∈ E(Ω)}. For a C ∞ vector bundle E over Ω, let E p (Ω, E) denote the differential forms of degree p with coefficients in E, then E 0 (Ω, E) are just C ∞ sections of E on Ω. A connection on E is a first order differential operator D : E 0 (Ω, E) → E 1 (Ω, E) such that D(f σ ) = df ⊗ σ + f D(σ ) for f in E(Ω) and σ in E 0 (Ω, E). The connection D is called metric-preserving if dσ1 , σ2 = Dσ1 , σ2 + σ1 , Dσ2 , for σ1 , σ2 in E 0 (Ω, E). Locally, D can be represented by a connection matrix. Let s = {s1 , . . . , sn } be a local frame on , then the connection matrix Θ(s) = [Θij ] relative to the frame s is a matrix with 1-form entries Θij defined on such that D(si ) = Σjn=1 Θij ⊗ sj . The connection D can be extended to a differential operator from E 1 (Ω, E) to E 2 (Ω, E) so that
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1929
D(σ ⊗ α) = Dσ ∧ α + σ ⊗ dα for σ in E(Ω, E) and α in E 1 (Ω). It is well known that D 2 is C ∞ linear so we have for any σ in E(Ω, E), that D 2 σ = Kσ dz dz, where K is a bundle map on E which is uniquely determined by D 2 . Thus D 2 can be identified with K and we call K the curvature of (E, D). For a Hermitian vector bundle on a domain in C, the curvature K is always self-adjoint provided that its defining connection D is metric-preserving (Section 2.15, [2]). The matrix of D 2 relative to a frame s is given by D 2 (s) = dΘ(s) + Θ(s) ∧ Θ(s).
(2.1)
Note that D is not a bundle map since it is not C ∞ linear, while it can be shown that the commutator of D with a bundle map is still a bundle map (Lemma 2.10, [2]). Thus for the bundle map Φ on E, there exists bundle maps Φz and Φz satisfying [D, Φ] = DΦ − ΦD = Φz ⊗ dz + Φz ⊗ dz. Then Φz and Φz are called covariant derivative of Φ relative to the connection D. Since covariant derivatives are also bundle maps, we can continue this procedure to define higher order covariant derivatives Φzi zj for all positive integers i, j . The covariant derivatives of Φ and Φ ∗ are related as follows (Lemma 2.12, [2]): (Φz )∗ = Φ ∗ z , (Φz )∗ = Φ ∗ z .
(2.2)
A bundle map Φ is called connection preserving if [D, Φ] = 0 or equivalently, Φz = Φz = 0. By an easy computation (or see [3]), the matrix of [D, Φ] relative to a local frame s is dΦ(s)+ [Θ(s), Φ(s)]. Thus a bundle map is connection-preserving if and only if its matrix satisfies dΦ(s) + Θ(s), Φ(s) = 0.
(2.3)
An induction argument shows that a connection-preserving bundle map Φ necessarily preserves curvature as well as its covariant derivatives to all orders, i.e. ΦKzi zj = Kzi zj Φ for all 0 i, j < ∞ (Remark 2.16, [2]).
1930
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Now we turn to holomorphic vector bundles. If E is a holomorphic Hermitian vector bundle, it is well known that there exists a unique canonical connection Θ on E, called the Chern connection, which is metric-preserving and compatible with the holomorphic structure. Locally, given a holomorphic frame s = {s1 , . . . , sn } with metric matrix h = (si , sj ), Θ(s) = ∂hh−1 .
(2.4)
D 2 (s) = ∂ ∂hh−1 .
(2.5)
The matrix of D 2 is given by
The matrix of the covariant derivatives of a bundle map Φ relative to this canonical connection is given by (sec 2.18, [2]): Φz (s) = ∂Φ(s) + ∂hh−1 , Φ(s)
and Φz (s) = ∂Φ(s).
Thus the matrix of Φz is just the usual ∂ derivative of its matrix Φ(s) relative to the holomorphic frame s. Hence a bundle map Φ is holomorphic if and only if Φz = 0. Recall that Φ is connection-preserving if Φz = Φz = 0, and combining this with (2.2), we have: Proposition 2.1. A bundle map Φ on a holomorphic Hermitian vector bundle E over a domain in C preserves the canonical connection if and only if both Φ and Φ ∗ are holomorphic. An isometric holomorphic bundle map Φ is connection-preserving since Φ ∗ = Φ −1 , which is necessarily holomorphic. Given two Hermitian vector bundles E1 and E2 with connections D1 and D2 ; respectively, let Φ be a bundle map from E1 to E2 . We say Φ is connection-preserving if D2 Φ = ΦD1 . Fix local frames s1 and s2 for E1 and E2 ; respectively. Then Φ is connection-preserving if its matrix Φ relative to the two frame satisfies dΦ + Θ2 (s2 )Φ − ΦΘ1 (s1 ) = 0,
(2.6)
where Θi (si ) is the connection matrix of Di with respect to the frame si . For a bundle map between two Hermitian vector bundles, one can define its covariant derivative analogously, and Proposition 2.1 still holds (see [2] for details). 3. Geometric realization of V ∗ (T ) This section is devoted to establishing Theorem 1.3. Throughout this section, a connection means the canonical connection on a given holomorphic Hermitian vector bundle. The following technical lemma (Proposition 1, [5]) is useful in this section.
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1931
Lemma 3.1. Let Ω be a domain in C and f (z, w) be a function on Ω×Ω which is holomorphic in z and anti-holomorphic in w. Then f (z, z) = 0 for all z in Ω if and only if f vanishes identically on Ω × Ω. Corollary 3.2. Let S1 , S2 be two operators commuting with T , then Γ S1 = (Γ S2 )∗ if and only if S1 = S2∗ . Proof. Sufficiency follows from the definition of Γ and it remains to show Γ S1 = (Γ S2 )∗ implies S1 = S2∗ . Takea holomorphic frame {σi (z)} for E(T ) over an open subset . Then by the spanning property λ∈ E(T )λ = H, it suffices to show that S1 σi (z), σj (w) = σi (z), S2 σj (w)
for all i, j and z, w in . Since the frame is holomorphic, both sides of the identity above is holomorphic in z and anti-holomorphic in w, and Γ S1 = (Γ S2 )∗ implies that the identity holds for z = w, so Lemma 3.1 can be applied and we are done. 2 In general, a holomorphic Hermitian bundle does not admit a holomorphic orthonormal frame, but in the special case of holomorphic curves, there always exists a local holomorphic frame which is “normal” at one point (see Lemma 2.4 in [2]). Lemma 3.3. (See [2].) Given a holomorphic curve f over Ω and a point z0 in Ω, there exists a holomorphic frame {σi (z)} for Ef in a neighborhood of z0 such that (σi (z), σj (z0 ) ) is the identity matrix for all z in . The local frame {σi } given by Lemma 3.3 is called a normal frame. The matrix of a connection-preserving bundle map relative to a normal frame is very well behaved. Proposition 3.4. Let f be a holomorphic curve over a domain Ω in C and {σi } be a normal frame over an open subset at a point z0 . If Φ is a connection-preserving bundle map on Ef , then its matrix relative to {σi } is a constant matrix which commutes with the metric matrix (σi (z), σj (w) ) for all z, w in . Proof. By Proposition 2.1, both Φ and Φ ∗ are holomorphic. If we denote by Φ(z) and Ψ (z) the matrix of Φ and Φ ∗ relative to base {σi (z)} of the fibre at z, then Φ(z) and Ψ (z) are both holomorphic matrix-valued functions. If we set h(z, w) = (σi (z), σj (w) ), then h is holomorphic in z and anti-holomorphic in w such that h(z, z0 ) = I . By elementary linear algebra we have Ψ (z) = h(z, z)Φ ∗ (z)h−1 (z, z). Combining this with Lemma 3.1, we have Ψ (z) = h(z, w)Φ ∗ (w)h−1 (z, w).
(3.1)
1932
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Let w = z0 , we see that Ψ (z) = Φ ∗ (z0 ). Thus Ψ (z) is constant which we denote by Ψ . Our original identity becomes Ψ = h(z, z)Φ ∗ (z)h−1 (z, z), taking adjoints we get Ψ ∗ = h−1 (z, z)Φ(z)h(z, z). Another application of Lemma 3.1 yields Ψ ∗ = h−1 (z, w)Φ(z)h(z, w). Taking w = z0 again, we have Ψ ∗ = Φ(z). Thus Φ(z) is constant (which we also denote by Φ) and Φ ∗ = Ψ . By (3.1), both Φ and Ψ commute with h(z, z), and thus commutes with h(z, w) as well, in light of Lemma 3.1. 2 Remark 3.5. From the proof of the above proposition, we see that if we fix a normal frame and a connection-preserving bundle map Φ, the matrix of Φ ∗ is just the adjoint of the matrix of Φ. Recall that a connection-preserving bundle map is necessarily holomorphic, and thus is determined by its restriction to any open subset . Therefore the mapping defined by sending a connection-preserving bundle map to its matrix relative to a local normal frame is an injective ∗-homomorphism. Now we complete the proof of Theorem 1.3. Proof of Theorem 1.3. One direction is easy. For an operator S in V ∗ (T ), both S and S ∗ commutes with T and (Γ (S))∗ = Γ (S ∗ ). Thus the condition of Proposition 2.1 is satisfied and Γ (S) is connection-preserving. We now establish the other direction: any connection preserving bundle map is induced by an operator in V ∗ (T ). As before, we fix an open subset and a local holomorphic frame {σi (z)} for the holomorphic curve E(T ) normalized at a point z0 in . By the previous proposition, the matrix of the connection-preserving bundle map relative to this frame is a constant matrix which we also denote by Φ such that Φh(z, w) = h(z, w)Φ, where h(z, w) = (σi (z), σj (w) ). For any z in , the bundle map defines a linear operator on the fibre ker(T − z) whose matrix relative to the base {σi (z)} is Φ. Since eigenvectors belonging to different eigenvalues are linearly
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1933
independent, these fibre maps together give a well-defined linear transform TΦ on their algebraic linear span H0 = spanz∈ ker(T − z), which is a dense subspace of H. For any z in , TΦ ker(T − z) ⊆ ker(T − z) by our construction, which implies that TΦ commutes with T on ker(T − z), and thus on H0 as well. We claim that TΦ is bounded. To this end, let us take an arbitrary vector f in H0 . For such an f , there exist vectors f1 , . . . , fm with fi ∈ ker(T − zi ) for some z1 , . . . , zm in such that f = f1 + · · · + fm . Since {σi } is a frame, there exist mn complex numbers aij , 1 i m, 1 j n, such that fi =
n
aij σj (zi )
j =1
for any 1 i m. To simplify notation, we write ai = (ai1 , ai2 , . . . , ain ) and T σ (z) = σ1 (z), σ2 (z), . . . , σn (z) . Then fi = ai σ (zi ) and f = a1 σ (z1 ) + · · · + am σ (zm ). Now f 2 = a1 σ (z1 ) + · · · + am σ (zm ), a1 σ (z1 ) + · · · + am σ (zm ) =
m
ai h(zi , zj )a∗j
i,j =1
= (a1 , . . . , am ) h(zi , zj ) (a1 , . . . , am )∗ . Here (a1 , . . . , am ) is a row of mn complex numbers and [h(zi , zj )] is an mn × mn matrix whose n × n block at the (i, j ) place is the matrix h(zi , zj ). For example, if m = 2, there are only two points z1 and z2 involved and h(zi , zj ) = On the other hand,
h(z1 , z1 ) h(z2 , z1 )
h(z1 , z2 ) h(z2 , z2 )
.
1934
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
TΦ f 2 = a1 Φσ (z1 ) + · · · + am Φσ (zm ), a1 Φσ (z1 ) + · · · + am Φσ (zm ) =
m
ai Φh(zi , zj )Φ ∗ a∗j
i,j =1
= (a1 , . . . , am )(Φ ⊗ Im ) h(zi , zj ) Φ ∗ ⊗ Im (a1 , . . . , am )∗ where Φ ⊗ Im is a block-diagonal matrix with Φ repeated m times on the diagonal. Recall that Φh(zi , zj ) = h(zi , zj )Φ, which implies (Φ ⊗ Im ) h(zi , zj ) = h(zi , zj ) (Φ ⊗ Im ). Note that [h(zi , zj )] is a positive matrix, so we have 1 1 (Φ ⊗ Im ) h(zi , zj ) 2 = h(zi , zj ) 2 (Φ ⊗ Im ), and ∗ 1 1 Φ ⊗ Im h(zi , zj ) 2 = h(zi , zj ) 2 Φ ∗ ⊗ Im . Consequently 1 1 (Φ ⊗ Im ) h(zi , zj ) Φ ∗ ⊗ Im = h(zi , zj ) 2 (Φ ⊗ Im ) Φ ∗ ⊗ Im h(zi , zj ) 2 , thus (Φ ⊗ Im ) h(zi , zj ) Φ ∗ ⊗ Im Φ ⊗ Im 2 h(zi , zj ) = Φ2 h(zi , zj ) which implies that TΦ f Φf . Here Φ is the standard matrix norm of Φ which dose not depend on f , hence the claim is proved. Since H0 is dense, TΦ extends to a bounded operator on H and the extended operator still commutes with T . By our construction, Φ = Γ (TΦ ) for the extended TΦ . We further claim that (TΦ )∗ commutes with T , which means TΦ is in V ∗ (T ) and the proof of the theorem will be complete. Let Ψ be the adjoint of the bundle map Φ, then as in the proof of Proposition 3.4, its matrix relative to the normal frame is also a constant matrix Ψ and Ψ h(z, w) = h(z, w)Ψ for all z, w in . Therefore, using the same argument, there exists a bounded operator TΨ commuting with T such that Ψ = Γ (TΨ ). By Corollary 3.2, (TΦ )∗ = TΨ , hence TΦ is in V ∗ (T ). 2 Just as in Remark 1.2, we have: Remark 3.6. For a Cowen–Douglas operator T , a local connection-preserving bundle map on E(T ) can be extended to a global connection-preserving bundle map induced by an operator in V ∗ (T ).
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1935
For a C ∞ vector bundle E on a planar domain with a given connection, bundle maps on E can be seen as sections of the tensor bundle E ⊗ E ∗ and a bundle map Φ is connectionpreserving if and only if it is a parallel section of E ⊗ E ∗ . Thus a connection-preserving bundle map is determined by its action on any fibre. In the case of holomorphic curves with canonical connection, this follows immediately from Proposition 3.4. Consequently, for a Cowen–Douglas operator T in Bn (Ω) and any point w0 in Ω, an operator in V ∗ (T ) is determined by its action on ker(T − w0 ). In particular, we have: Corollary 3.7. For a Cowen–Douglas operator T , V ∗ (T ) is finite dimensional. We end this section with a straightforward proof of this corollary in operator theory, which is of independent interest. Proof. Without loss of generality, we assume w = 0. Since ker T is finite dimensional, it suffices to show that if S is an operator in V ∗ (T ) such that S|ker T = 0, then S = 0. In fact, since H = ker T ⊕ ran T ∗ (note that ran T ∗ is closed in this case), we have ∞
2 k SH = ST ∗ H = T ∗ SH = T ∗ ST ∗ H = T ∗ SH = · · · ⊆ ran T ∗ . k=1
Note that the spanning property implies that ∞ ∗ k k=1 ran(T ) = 0, as desired. 2
∞
k=1 ker T
k
= H (Section 1.7, [2]), hence
4. Connection-preserving bundle maps on E(T ) In this section, we study connection-preserving bundle maps on E(T ) and provide a characterization of V ∗ (T ) in terms of geometric invariants. Before proceeding, we would like to say more about reducing subbundles of holomorphic Hermitian vector bundles. Let E be a holomorphic Hermitian vector bundle with canonical connection D. Given a reducing subbundle E of E, we can chose holomorphic frames s and s of E and E ⊥ ; respectively such that s = {s , s } forms a holomorphic frame for E. Relative to this frame, the metric matrix of E decomposes into two blocks. Therefore by (2.4), (2.5) the matrices of the canonical connection D and curvature K also decompose into two blocks. By the following representation of covariant derivatives: Kz (s) = ∂K(s) + ∂hh−1 , K(s) , Kz (s) = ∂K(s), we see that the matrices of the covariant derivatives of the curvature to all orders also decompose into two blocks relative to this frame. In particular, reducing subbundles are D-invariant. The following result (see Proposition 4.18, Chapter 1 in [11]) asserts that the converse is also true, which can be used to identify reducing subbundles of holomorphic Hermitian vector bundles. We include the proof for the convenience of the readers. Proposition 4.1. (See [11].) Let E be a holomorphic Hermitian vector bundle and D the canonical connection. Let E be a C ∞ subbundle and E be the orthogonal complement of E in E.
1936
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
If E is invariant under D, both E and E are D-invariant holomorphic subbundles of E and they give a holomorphic orthogonal decomposition: E = E ⊕ E . Proof. As is well known, the canonical connection D can be decomposed as D = D + ∂ with D : E 0 (Ω, E) → E 1,0 (Ω, E), ∂ : E 0 (Ω, E) → E 0,1 (Ω, E). Since E is invariant under D, so is E because D is metric preserving. Let s be a holomorphic section of E and s = s + s be its C ∞ decomposition with respect to E = E ⊕ E . It suffices to show s and s are holomorphic sections. Since D = D + ∂ and s is holomorphic, we have Ds = D s. On the other hand, Ds = Ds + Ds and D s = D s + D s , which implies Ds = D s and Ds = D s . Therefore ∂s = 0 and ∂s = 0, as desired. 2 Since the canonical connection on a holomorphic Hermitian vector bundle is unique, the canonical connection on a reducing subbundle is just the restriction of the original one. As stated in the introduction, our investigation is based on a representation theorem of Cowen and the second author, called the C ∞ block diagonalization of connections. We begin with some necessary terminologies before introducing this result. Let E be a C ∞ Hermitian vector bundle of rank n over a domain Ω in C with metricpreserving connection D and curvature K. We denote by A the algebra of bundle maps generated by the curvature K and its covariant derivatives Kzi zj to all orders. Since K is self-adjoint and the identity (2.2) holds, A is self-adjoint. Let s be a C ∞ orthonormal frame of E over an open subset of Ω. For a bundle map Φ on E and z in , let Φ(z) be the induced fibre map on the fibre Ez and Φ(s)(z) be the matrix of Φ(z) relative to the base s(z). We denote by A (z) the set of linear transforms on the fibre Ez induced by bundle maps in A and A (s)(z) the matrix algebra generated by the matrices Φ(s)(z) for Φ in A , then A (s)(z) is a self-adjoint matrix algebra in Mn (C) since s is orthonormal. It is well known that any self-adjoint matrix algebra is the direct sum of full matrix algebras with multiplicity. More precisely, for any self-adjoint matrix algebra, there exist two tuples of positive integers M = (m1 , . . . , mr ) and N = (n1 , . . . , nr ), such that the algebra consists of matrices of the form A1 ⊗ Im1 ⊕ · · · ⊕ Ar ⊗ Imr , where Ai is an ni × ni matrix repeated mi times on the diagonal, we denote such an algebra by M(N , ⊗M ). For example, M((n1 , n2 ), ⊗(2, 1)) is the algebra of matrices of the form ⎛
A1 A1 ⊗ I2 ⊕ A2 ⊗ I1 = ⎝ 0 0
0 A1 0
where A1 is an n1 × n1 matrix and A2 is an n2 × n2 matrix.
⎞ 0 0 ⎠, A2
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1937
Now we can state the theorem on block diagonalization of connections (see Proposition 2.5 in [3], also see Lemma 3.2 in [2] for a special case). Theorem 4.2. (See [3].) Let E be a C ∞ Hermitian vector bundle of rank n over an open subset Ω in C, with metric-preserving connection D. For any point z0 off a non-where dense subset of Ω, there exist two tuples of integers M = (m1 , . . . , mr ), N = (n1 , . . . , nr ), a neighborhood Ω0 of z0 and a C ∞ orthonormal frame s for E over Ω0 with the properties: A (s)(z) = M(N , ⊗M ) for all z in Ω0 , where A is the algebra of bundle maps generated by the curvature K, and its covariant derivatives Kzi zj to all orders. Moreover, Θ(s) = Θ1 ⊗ Im1 ⊕ · · · ⊕ Θr ⊗ Imr , where Θ(s) is the matrix of connection 1-forms of D relative to the frame s and Θi are C ∞ ni × ni matrices with 1-form entries defined on Ω0 . Remark 4.3. There are various ways to understand this theorem. (i) The algebra A (s)(z) does not depend on the point z in Ω0 . (ii) The theorem asserts that the connection matrix has a block diagonal form, thus each block corresponds to a subbundle invariant under D. Explicitly, for any 1 i r, the block Θi ⊗ Imi corresponds to mi D-invariant subbundles of rank ni . We denote these subbundles by Ei1 , . . . , Eimi . With respect to this decomposition, the frame s can be written as s = {sij } where sij is an orthonormal frame for Eij . (iii) By definitions, the curvature as well as its partial derivatives are determined by the connections, while the theorem implies that the connection can be determined by the curvature in some sense. If E is a holomorphic Hermitian vector bundle with canonical connection D, then D-invariant subbundles are actually reducing subbundles for E by Proposition 4.1. Therefore we can apply Theorem 4.2 to obtain a collection of mutually orthogonal reducing subbundles {Eij }, 1 i r, 1 j mi with rank Eij = ni , such that E = E11 ⊕ · · · ⊕ E1m1 ⊕ · · · ⊕ Er1 ⊕ · · · ⊕ Ermr . If we apply the theorem to the bundle E(T ) with canonical connection for a Cowen–Douglas operator T , then {Eij } correspond to reducing subspaces {Hij } such that H = H11 ⊕ · · · ⊕ H1m1 ⊕ · · · ⊕ Hr1 ⊕ · · · ⊕ Hrmr .
(4.1)
We will show that Hij are minimal and (4.1) gives a canonical decomposition of H into minimal reducing subspaces. To get a full understanding of that, we first recall some elementary facts on von Neumann algebras. In light of Corollary 3.7, we concentrate on the finite dimensional case.
1938
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Given a von Neumann algebra M, we denote its center by Z(M) and its identity by 1M . Two projections p and q in M are said to be equivalent if there exists an element u in M such that u∗ u = p, uu∗ = q. A projection p in M is said to be minimal if for any projection q in M, q p implies q = 0 or q = p. If M is a finite dimensional von Neumann algebra, there exists finitely many mutually orthogonal minimal projections q1 , . . . , qk in M such that 1M = q1 + · · · + qk .
(4.2)
The center Z(M) is also finite dimensional, thus there are finitely many mutually orthogonal minimal central projections (i.e. minimal projections in Z(M)) p1 , . . . , pr , such that 1 M = p 1 + · · · + pr . One can show, as a routine exercise, that (i) for any minimal projection q in M, there exist exactly one index i such that qpi = q (equivalently, q pi ) and qpj = 0 for j = i, (ii) two minimal projections in M are equivalent if and only if they are dominated by the same minimal central projection. By (i), we can rearrange the minimal projections in (4.2) such that 1M = q11 + · · · + q1m1 + · · · + qr1 + · · · + qrmr
(4.3)
with qi1 + · · · + qimi = pi , and by (ii), qij and qi j are equivalent if and only if i = i . We call (4.3) a canonical decomposition. Now we go back to the Cowen–Douglas operator T . Reducing subspaces of T can be identified with projections in V ∗ (T ) and it is easy to check that two reducing subspaces H1 and H2 are unitarily equivalent if and only if the their corresponding projections in V ∗ (T ) are equivalent. The following theorem says (4.1) is a canonical decomposition in the sense we discussed above, while the proof is geometric. Theorem 4.4. Let T be a Cowen–Douglas operator and E(T ) be its associated holomorphic Hermitian vector bundle with reducing subbundles {Eij } given by the block diagonalization of the canonical connection. Let {Hij } be the corresponding reducing subspaces. Then: (i) The reducing subspaces {Hij } are minimal. (ii) Hij and Hi j are unitarily equivalent if and only if i = i . Proof. (i) It suffices to show the bundle Eij is irreducible. Suppose conversely that Eij = F1 ⊕ F2 for two orthogonal holomorphic subbundles F1 and F2 , then Eij admits a holomorphic frame s = { s1 , s2 }, where si is a holomorphic frame for Fi . Let A (Eij ) be the restriction of A on Eij , then as mentioned in the beginning of the section, for z in Ω0 , the matrix of any linear map in s(z) = { s1 (z), s2 (z)} for the A (Eij )(z) should take a block diagonal form relative to the base fibre Eij z . While on the other hand, A (Eij )(z) contains all linear transformations on the fibre
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1939
Eij z since by Theorem 4.2, A (Eij )(sij )(z) is the full matrix algebra Mni (C) relative to the frame sij mentioned in Remark 4.3, a contradiction. (ii) Without loss of generality, we prove the statement for r = 2, m1 = 2, m2 = 1. In this case, relative to the frame s in Theorem 4.2, we have a decomposition E(T ) = E11 ⊕ E12 ⊕ E21 . Here s = {s11 , s12 , s21 } where s11 , s12 , s21 are orthonormal frames for E11 , E12 , E21 respectively as in Remark 4.3. The matrix algebra A (s)(z) contains all matrices of the form ⎛
A1 ⎝ 0 0
0 A1 0
⎞ 0 0 ⎠ A2
and the connection matrix is of the form ⎛ Θ1 ⎝ 0 0
0 Θ1 0
⎞ 0 0 ⎠. Θ2
In light of Theorem 1.1, it suffices to show that E11 and E12 are equivalent while E12 and E21 are not equivalent. That E11 and E12 are equivalent is straightforward. We define an isometric bundle map by sending the orthonormal frame s11 to s12 . We claim that this bundle map is holomorphic, and hence implements an equivalence of the two bundles. In fact, by Proposition 2.1, it suffices to show this bundle map is connection preserving. Since the matrix of this bundle map relative to the frames s11 and s12 is the constant identity matrix and the connection matrices relative to the two frames are the same, we see that (2.6) holds. Hence the claim follows. Next we show that there exists no isometric connection-preserving bundle map from E12 to E21 . If there exists such a bundle map Φ, then E12 and E21 are of the same rank and by the discussions in Section 2, Φ preserves the curvatures as well as their covariant derivatives to all orders. Hence Φ commutes with the restriction of A to E12 and E21 . Suppose rank E12 = rank E21 = k, then by Theorem 4.2, for any fixed z in Ω0 and any two k × k matrices A1 and A2 , there exists a bundle map in A such that the matrices of its restriction to E12 (z) and E21 (z) relative to the base s11 (z) and s12 (z) are A1 and A2 respectively. So if Φ(z) is the matrix of Φ relative to the bases s11 (z) and s12 (z), then Φ(z)A1 = A2 Φ(z), which forces Φ(z) to be zero since A1 and A2 can be arbitrarily chosen.
2
We give the promised geometrical characterization of V ∗ (T ). Theorem 4.5. For a Cowen–Douglas operator T in Bn (Ω), the von Neumann algebra V ∗ (T ) is isomorphic to the commutant of the matrix algebra M(N , ⊗M ) in Mn (C), where M(N , ⊗M ) is given by the block diagonalization of the canonical connection on E(T ).
1940
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Proof. By Theorem 1.3, it suffices to identify connection-preserving bundle maps on E(T ) with the commutant of M(N , ⊗M ). Denote the algebra of connection-preserving bundle maps on E(T ) by V. We claim that for any bundle map Φ in V, the matrix of Φ relative to the orthonormal frame s given in Theorem 4.2 is a constant matrix and lies in M (N , ⊗M ). In fact, for a fixed z in Ω0 , let Φ(z) be the matrix of Φ relative to the base s(z), then since Φ is connection-preserving, it commutes with every bundle map in A , thus by Theorem 4.2, Φ(z) commutes with every matrix in M(N , ⊗M ). Moreover, Φ(z) commutes with the connection matrix Θ(z) since Θ(z) is just a matrix in M(N , ⊗M ) tensored with a 1-form, so Θ(z), Φ(z) = 0. Recall that the matrix of a connection-preserving bundle map satisfies dΦ(z) + Θ(z), Φ(z) = 0, therefore dΦ(z) = 0, and Φ(z) is constant. Now we have a map Λ from V to M (N , ⊗M ) sending a connection-preserving bundle map to its matrix relative to the frame s, which is well defined. Note that since the frame is orthonormal, Λ is a ∗-homomorphism. Moreover, Λ is injective since a connection-preserving bundle map is determined by its action on any open subset. Λ is surjective since any constant matrix in M (N , ⊗M ) satisfies (2.3). Thus a local bundle map given by such a matrix relative to the frame s is connection-preserving on Ω0 . By Remark 3.6, this local bundle map can be extended to a connection-preserving bundle map on all Ω, completing the proof. 2 The commutant of M(N , ⊗M ) consists of matrices of the form In1 ⊗ B1 ⊕ · · · ⊕ Inr ⊗ Br , where Bi is an mi × mi matrix. We see that M (N , ⊗M ) is abelian if and only if mi = 1 for all i. Thus we have the following Corollary 4.6. The von Neumann algebra V ∗ (T ) is abelian if and only if there is no multiplicity in the block diagonalization of the canonical connection on E(T ). In general, it is not easy to compute the matrix algebra M(N , ⊗M ) explicitly for an arbitrary Cowen–Douglas operator. We discuss a special kind of operator TE , called the bundle shift. The adjoint of TE lies in the Cowen–Douglas class and V ∗ (TE ) can be identified via the topological construction of a certain flat unitary bundle E. The bundle shift TE was introduced in [1] and we give a quick review of its definition. Let Ω be a bounded domain in C whose boundary consists of finitely many analytic Jordan curves. A flat unitary bundle over Ω is a holomorphic Hermitian vector bundle which locally admits orthonormal holomorphic frames (or equivalently, the transition functions are constant unitary matrices). It is well known that any flat unitary bundle over Ω is equivalent to a canonical flat bundle arising from a unitary representation of the fundamental group π1 (Ω). Let us briefly recall this construction.
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1941
By the uniformization theorem, there is a holomorphic covering map π : D → Ω where D is the unit disc. Let U (n) be the group of unitary operators on Cn and a unitary representation of π1 (Ω) is a homomorphism α : π1 (Ω) → U (n). Define an action of π1 (Ω) on D × Cn by A : (z, ξ ) → Az, α(A)ξ for A ∈ π1 (Ω), z ∈ D, and ξ ∈ Cn . (We identify π1 (Ω) with the covering transformation group acting on D.) Then the quotient space D × Cn /π1 (Ω) of this action with the obvious projection onto Ω gives a flat unitary bundle of rank n over Ω. Given a flat unitary bundle E over Ω, one can construct a Hilbert space HE2 consisting of holomorphic sections f of E such that f (z)2Ez has a harmonic majorant. The bundle shift TE is defined on HE2 by TE (f ) = zf . One can show that TE∗ lies in Bn (Ω ∗ ), where Ω ∗ is the complex conjugate of Ω (Theorem 3, [1]). A fundamental result on the bundle shift is the following (Theorem 6, [1]). Theorem 4.7. (See [1].) If E and F are flat unitary bundles over Ω, then the bundle shifts TE and TF are unitarily equivalent if and only if E and F are equivalent. Remark 4.8. Any two flat unitary bundles of the same rank are locally equivalent since they admit local orthonormal holomorphic frames, while the theorem requires that the isometric holomorphic bundle map can be defined globally. Moreover, we have a characterization of the von Neumann algebra V ∗ (TE ) (Theorem 7, [1]): Theorem 4.9. (See [1].) For a rank n flat unitary bundle E over Ω arising from a unitary representation α of π1 (Ω), the von Neumann algebra V ∗ (TE ) is isomorphic to the commutant of C ∗ (α) in Mn (C), where C ∗ (α) is the C ∗ algebra generated by the range of α. A geometric interpretation of Theorem 4.9 in terms of bundle maps, which is related to our investigation, is the following: Corollary 4.10. For a rank n flat unitary bundle E over Ω arising from a unitary representation α of π1 (Ω), any operator in V ∗ (TE ) is induced by a (global)connection-preserving bundle map on E. Proof. For one thing, the connection matrix Θ(s) is zero for any local orthonormal holomorphic frame s by (2.4). Thus for a fixed matrix Φ in Mn (C), a local bundle map defined by this constant matrix relative to the frame s satisfies (2.3). On the other hand, one can check that the transition matrix of two different local orthonormal holomorphic frames whenever their defining domains overlap is nothing but α(A) for some A ∈ π1 (Ω) (in fact, the local holomorphic orthonormal frames arise from branches of local inverses of the covering map), therefore when Θ lies in the commutant of C ∗ (α), Φ = α −1 (A)Φα(A), which is exactly the condition assuring that the locally defined connection-preserving bundle maps glue to a global one. That such a bundle map induces an operator in V ∗ (TE ) follows by tracing back the original proof of Theorem 4.9 and is omitted here. 2 The following consequence of Theorem 4.9 can be seen as a complement of our main results.
1942
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
Corollary 4.11. For any self-adjoint subalgebra A of Mn (C), there exists a Cowen–Douglas operator T such that V ∗ (T ) A. Proof. It follows from general theory of self-adjoint matrix algebras that the commutant algebra A of A can be generated by finitely many, say, k unitary matrices. Take a planar domain Ω with k holes so that π1 (Ω) is a free group of k generators. The map α defined by taking each generator of π1 (Ω) to one of the unitary matrices generating A extends to a unitary representation α of π1 (Ω) with C ∗ (α) = A . By Theorem 4.9, V ∗ (TE ) A = A, where E is the flat unitary bundle arising from α. 2 Appendix A To better understand the block diagonalization theorem, we describe an alternative proof of the sufficiency part of Theorem 1.3, which is based on the discussions in Section 4. The idea is to replace the normal frame given by Lemma 3.3 by the orthonormal frame given in Theorem 4.2. If we can verify Proposition 3.4 and Remark 3.5 for this orthonormal frame, then all the arguments in the proof of Theorem 1.3 remain valid and we have the same conclusion. By the proof of Theorem 4.5, the matrix Φ of the connection-preserving bundle map relative to the orthonormal frame s in Theorem 4.2 is constant and lies in the commutant of M(N , ⊗M ). We write s = {s1 , . . . , sn } for n C ∞ sections s1 , . . . , sn . To verify Proposition 3.4, we only need to check that for any z, w in , the matrix (si (z), sj (w) ) lies in M(N , ⊗M ). Note that we cannot apply Lemma 3.1 for the non-holomorphic frame s. Without loss of generality, we assume r = 2, m1 = 2, m2 = 1 as in the proof of Theorem 4.4 so that the bundle E(T ) has the decomposition E(T ) = E11 ⊕ E12 ⊕ E21 . We need to show that the matrix (si (z), sj (w) ) is of the form ⎛
A1 ⎝ 0 0
0 A1 0
⎞ 0 0 ⎠. A2
Write {si } = {μi } ∪ {ηi } ∪ {νi } where {μi }, {ηi } and {νi } are orthonormal frames for E11 , E12 and E21 respectively. Take arbitrary sections f1 , f1 and f3 of E11 , E12 and E21 ; respectively. Since f1 (z) ∈ H11 , f2 (w) ∈ H12 and H11 and H12 are mutually orthogonal reducing subspaces, f1 (z), f2 (w) = 0. Similarly, we have f1 (z), f3 (w) = 0 and f2 (z), f3 (w) = 0. This implies that (si (z), sj (w) ) is of the form ⎛
A1 ⎝ 0 0
0 A2 0
⎞ 0 0 ⎠. A3
We claim that A1 = A2 , which gives the desired form. In fact, by Theorem 4.4, the bundle map defined by sending {μi } to {ηi } is induced by a unitary operator from H11 to H12 , and thus
L. Chen et al. / Journal of Functional Analysis 260 (2011) 1925–1943
1943
μi (z), μj (w) = ηi (z), ηj (w)
as desired. Since the frame is orthonormal and the commutant of M(N , ⊗M ) is a self-adjoint algebra, Remark 3.5 is trivial for this frame. References [1] M.B. Abrahamse, R.G. Douglas, A class of subnormal operators related to multiply-connected domains, Adv. Math. 19 (1976) 106–148. [2] M.J. Cowen, R.G. Douglas, Complex geometry and operator theory, Acta Math. 141 (1978) 187–261. [3] M.J. Cowen, R.G. Douglas, Equivalence of connections, Adv. Math. 56 (1985) 39–61. [4] R.G. Douglas, S. Sun, D. Zheng, Multiplication operators on the Bergman space via analytic continuation, arXiv:0901.3787v1. [5] M. Englis, Density of algebras generated by Toeplitz operator on Bergman spaces, Ark. Mat. 30 (1992) 227–243. [6] K. Guo, Operator theory and von Neumann algebras, preprint. [7] K. Guo, H. Huang, On multiplication operators of the Bergman space: Similarity, unitary equivalence and reducing subspaces, J. Operator Theory, in press. [8] K. Guo, H. Huang, Multiplication operators defined by covering maps on the Bergman space: The connection between operator theory and von Neumann algebras, J. Funct. Anal. 260 (4) (2011) 1219–1255. [9] K. Guo, S. Sun, D. Zheng, C. Zhong, Multiplication operators on the Bergman space via the Hardy space of the bidisk, J. Reine Angew. Math. 628 (2009) 129–168. [10] J. Hu, S. Sun, X. Xu, D. Yu, Reducing subspace of analytic Toeplitz operators on the Bergman space, Integral Equations Operator Theory 49 (2004) 387–395. [11] S. Kobayashi, Differential Geometry of Complex Vector Bundles, Princeton University Press and Iwanami Shoten, 1987. [12] C. Jiang, K. Ji, Similarity classification of holomorphic curves, Adv. Math. 215 (2007) 446–468. [13] R. Wells, Differential Analysis on Complex Manifolds, Springer, New York, 1973. [14] K. Zhu, Reducing subspaces for a class of multiplication operators, J. Lond. Math. Soc. 62 (2000) 553–568.
Journal of Functional Analysis 260 (2011) 1944–1968 www.elsevier.com/locate/jfa
Continuity of magnetic Weyl calculus Ingrid Belti¸ta˘ , Daniel Belti¸ta˘ ∗ Institute of Mathematics “Simion Stoilow” of the Romanian Academy, P.O. Box 1-764, Bucharest, Romania Received 11 June 2010; accepted 4 January 2011
Communicated by Gilles Godefroy
Abstract We investigate continuity properties of the operators obtained by the magnetic Weyl calculus on nilpotent Lie groups, using modulation spaces associated with unitary representations of certain infinite-dimensional Lie groups. © 2011 Elsevier Inc. All rights reserved. Keywords: Weyl calculus; Magnetic field; Lie group; Modulation spaces
1. Introduction There are three main themes that occur in the present paper: – The pseudo-differential Weyl calculus that takes into account a magnetic field on Rn , which has been recently developed by techniques of hard analysis, with motivation coming from quantum mechanics; some references in this connection include [24,22,25]. – The modulation spaces from the time-frequency analysis, which have become an increasingly useful tool in the classical pseudo-differential calculus on Rn ; see for instance the seminal papers [11] and [19]. – The theory of locally convex Lie groups and their representations, recently surveyed in [28]. See also [29]. * Corresponding author.
E-mail addresses: [email protected] (I. Belti¸ta˘ ), [email protected] (D. Belti¸ta˘ ). 0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2011.01.004
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1945
There is a huge literature devoted to various aspects of magnetic fields. From the point of view of the present paper, it is relevant to mention that some spectral properties of Schrödinger operators with magnetic fields were established by using representation theory for nilpotent Lie groups; see for instance [23,21,26]. However, the magnetic Weyl calculus has been rather recently developed. It gives a functional calculus for the operators of position and magnetic momentum in just the same way in which the classical Weyl calculus is an operator calculus for the positions and momenta, and its key feature is that it is gauge covariant. It follows by our earlier papers [1] and [3] that some of the very basic ideas of infinite-dimensional Lie theory prove to be very useful for understanding the aforementioned magnetic Weyl calculus as a Weyl quantization of a certain coadjoint orbit of a semi-direct product group M = F Rn . Here F is a suitable translation-invariant space of smooth functions on Rn and the coadjoint orbit is associated with a natural unitary representation of M on L2 (Rn ). This representation theoretic approach to the magnetic Weyl calculus is further developed in the present paper by using the second of the themes mentioned above. Specifically, we introduce appropriate versions of modulation spaces and use them for describing the continuity properties of the magnetic pseudo-differential operators. We recall from [1] that our approach to the magnetic Weyl calculus actually allows us to extend the constructions of [24] from the abelian group (Rn , +) to any simply connected nilpotent Lie group, and this will also be the setting of some of the main results of the present paper. However, the proofs are greatly helped by a more general framework that we develop, in the first sections of the paper, for the so-called localized Weyl calculus for representations of locally convex Lie groups that satisfy suitable smoothness conditions. In order to develop this abstract setting we provide infinite-dimensional extensions of some ideas and constructions related to irreducible representations of finite-dimensional nilpotent Lie groups, which we had developed in [2]. These extensions may also be interesting on their own, however their importance consists in pointing out that the magnetic Weyl calculus of [24] and the Weyl–Pedersen calculus initiated in [30] are merely different shapes of the same phenomenon. We now briefly present the structure of the paper. The aim of Sections 2 and 3 is to give general conditions on representations of locally convex Lie groups that ensure good properties of a Weyl calculus and related objects, as Wigner distributions and modulation spaces. In fact, in this way we set up a rather general and systematic procedure for constructing spaces of symbols associated with a group representation and eventually proving continuity of the operators obtained by the Weyl calculus, and of the Weyl calculus itself. The main technical result of the paper could thus be considered the continuity property of the cross-Wigner distributions (Theorem 3.16). A special case of this procedure, that motivated the present paper, appeared in our earlier work [2] on Weyl–Pedersen calculus for irreducible representations of finite-dimensional nilpotent Lie groups. The developments in this paper allow us to treat the magnetic Weyl calculus as a particular case. In Section 4 we show that the conditions in Sections 2 and 3 are met in this case, and continuity/trace-class results are thus derived. 1.1. Notation Throughout the paper we denote by S(V) the Schwartz space on a finite-dimensional real vector space V. That is, S(V) is the set of all smooth functions that decay faster than any polynomial together with their partial derivatives of arbitrary order. Its topological dual—the space ∞ (V) for the space of tempered distributions on V—is denoted by S (V). We use the notation Cpol of smooth functions that grow polynomially together with their partial derivatives of arbitrary
1946
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
order; the natural locally convex topology of this function space along with some of its special properties are discussed in [31]. For every complex vector space Y we denote by Y the complex vector space defined by the conditions that Y and Y have the same underlying real vector space, and the identity mapping Y → Y is antilinear. If Y is a topological vector space, then Y will always denote the weak topological dual of Y, that is, the space of continuous linear functionals on Y endowed with the topology of uniform convergence on the compact subsets. · the completed projective tensor product of locally convex We shall always denote by · ⊗ ¯ · the natural tensor product of Hilbert spaces. Our references for topological spaces and by · ⊗ tensor products are [10,32,35]. We shall also use the convention that the Lie groups are denoted by upper case Latin letters and the Lie algebras are denoted by the corresponding lower case Gothic letters. 2. Smooth unitary representations of locally convex Lie groups Let M be a locally convex Lie group with a smooth exponential mapping expM : L(M) = m → M (see [28]). Assume that π : M → B(H) is a unitary representation. We denote by H∞ the space of smooth vectors for the representation π , that is, H∞ := φ ∈ H π(·)φ ∈ C ∞ (M, H) . We note that π(M)H∞ = H∞ and, as proved in [27, Sect. IV], the derived representation dπ : m → End(H∞ ) is well defined and is given by (∀X ∈ m)(∀φ ∈ H∞ )
d dπ(X)φ = π expM (tX) φ. dt t=0
Remark 2.1. If we denote by U(mC ) the universal enveloping algebra of the complexified Lie algebra mC , then the homomorphism of Lie algebras dπ extends to a unique homomorphism of unital associative algebras dπ : U(mC ) → End(H∞ ). The space of smooth vectors H∞ will always be considered endowed with the locally convex topology defined by the family of seminorms {pu }u∈U(mC ) , where for every u ∈ U(mC ) we define pu : H∞ → [0, ∞),
pu (φ) = dπ(u)φ .
The inclusion mapping H∞ → H is continuous and, for all u ∈ U(mC ) and m ∈ M, the linear operators dπ(u) : H∞ → H∞ and π(m) : H∞ → H∞ are continuous as well. Definition 2.2. Assume the above setting. If the linear subspace of smooth vectors H∞ is dense in H, then the unitary representation π : M → B(H) is said to be smooth. If this is the case, then π is necessarily continuous, in the sense that the group action M × H → H, (m, f ) → π(m)f , is continuous. The representation π is said to be nuclearly smooth if the following conditions are satisfied:
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1947
(1) π is a smooth representation; (2) H∞ is a nuclear Fréchet space; (3) both mappings M × H∞ → H∞ , (m, φ) → π(m)φ, and m × H∞ → H∞ , (X, φ) → dπ(X)φ are continuous. Let B(H)∞ be the space of smooth vectors for the unitary representation π ⊗ π¯ : M × M → B S2 (H) ,
−1 (π ⊗ π)(m ¯ 1 , m2 )T = π(m1 )T π(m2 ) .
We shall say that the representation π : M → B(H) is twice nuclearly smooth if it satisfies the following conditions: (1) The representation π is nuclearly smooth. (2) There exists the commutative diagram H∞ H∞ ⊗
¯ H H⊗
B(H)∞
S2 (H)
(2.1)
where the vertical arrow on the left is a linear topological isomorphism, while the vertical arrow on the right is the natural unitary operator defined by (φ1 , φ2 ) → φ1 ⊗ φ¯ 2 := (· | φ2 )φ1 . Remark 2.3. Note that there can exist at most one Fréchet topology on H∞ such that the inclusion H∞ → H be continuous, as a direct consequence of the closed graph theorem. Remark 2.4. Let π be a smooth representation and denote by H−∞ the strong dual of H∞ . Equivalently, H−∞ can be described as the space of continuous antilinear functionals on H∞ endowed with the topology of uniform convergence on the bounded subsets of H∞ . Then there exist the dense embeddings H∞ → H → H−∞ , and the duality pairing (· | ·) : H−∞ × H∞ → C extends the scalar product of H. Proposition 2.5. If the unitary representation π : M → B(H) is twice nuclearly smooth, then it also has the following properties: (1) The representation π ⊗ π¯ : M × M → B(S2 (H)) is nuclearly smooth. (2) We have L(H−∞ , H∞ ) B(H)∞ → S1 (H) and there exists the commutative diagram B(H)
L(H∞ , H−∞ )
S1 (H)
L(H−∞ , H∞ )
1948
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
where the vertical arrow on the left is the natural linear topological isomorphism defined by the trace duality, and the vertical arrow on the right is also a linear topological isomorphism. Proof. (1) The representation π is twice nuclearly smooth, hence H∞ is a nuclear Fréchet space H∞ B(H)∞ . Then B(H)∞ is in turn a nuclear Fréchet space (see for instance [35, and H∞ ⊗ Props. 50.1 and 50.6]). Moreover, since H∞ is dense in H, it follows that B(H)∞ is dense in S2 (H). To complete the proof of the fact that π ⊗ π¯ is twice nuclearly smooth, we still have to check that the mappings M × M × B(H)∞ → B(H)∞ ,
(m1 , m2 , T ) → π(m1 )T π(m2 )−1
and m × m × B(H)∞ → B(H)∞ ,
(X1 , X2 , T ) → dπ(X1 )T − T dπ(X2 )
H∞ B(H)∞ and both mappings are continuous. To this end use again the fact that H∞ ⊗ M × H∞ → H∞ , (m, φ) → π(m)φ, and m × H∞ → H∞ , (X, φ) → dπ(X)φ are continuous. (2) Since H∞ is a nuclear Fréchet space, we get H∞ B(H)∞ L(H−∞ , H∞ ) = L H∞ , H∞ H∞ ⊗ (see [35, Eq. (50.17)]). Moreover, for every T ∈ B(H)∞ we have T H ⊆ H∞ . Therefore one can prove (as in [4], for instance) that B(H)∞ ⊆ S1 (H). Moreover, by considering the duals of the above topological linear isomorphisms, we get H∞ ) L H∞ , H∞ L(H∞ , H−∞ ) L(H−∞ , H∞ ) (H∞ ⊗ (see [35, Eqs. (50.19) and (50.16)]), and these isomorphisms agree with the isomorphism S1 (H) B(H) in the sense of the commutative diagram in the statement. 2 Remark 2.6. For every f1 , f2 ∈ H we denote by f1 ⊗ f¯2 ∈ B(H) the rank-one operator f → (f | f2 )f1 . If the representation π ⊗ π¯ is twice nuclearly smooth, then for any f1 , f2 ∈ H−∞ we can use Proposition 2.5 to define the continuous antilinear functional f1 ⊗ f¯2 : B(H)∞ → C by (f1 ⊗ f¯2 )(T ) = (f1 | Tf2 ) for every T ∈ B(H)∞ . 2.1. Group square Definition 2.7. The group square of M, denoted by M M, is the semi-direct product defined by the action of M on itself by inner automorphisms. That is, M M is a locally convex Lie group whose underlying manifold is M × M and the group operation is (m1 , m2 )(n1 , n2 ) = m1 n1 , n−1 1 m2 n1 n2 for all m1 , m2 , n1 , n2 ∈ M.
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1949
Lemma 2.8. The following assertions hold: (1) The mapping μ : M M → M × M,
(m1 , m2 ) → (m1 m2 , m1 )
is an isomorphism of Lie groups with tangent map L(μ) : m m → m × m,
(X, Y ) → (X + Y, X).
(2) The Lie group M M has a smooth exponential map expMM : m m → M M,
(X, Y ) → expM X, expM (−X) expM (X + Y ) .
Proof. The arguments of Ex. 2.3 in [2] carry over to the present setting.
2
Definition 2.9. We introduce the continuous unitary representation π : M M → B S2 (H) ,
π (m1 , m2 )T = π(m1 m2 )T π(m1 )−1 .
To see that π is a representation, one can use a direct computation or the fact that so is π ⊗ π¯ and we have π = (π ⊗ π¯ ) ◦ μ,
(2.2)
where μ : M M → M × M is the group isomorphism of Lemma 2.8. 3. Localized Weyl calculus and modulation spaces The localized Weyl calculus (see Definition 3.10 below) was introduced in [1] as a tool for dealing with the magnetic Weyl calculus on nilpotent Lie groups. In the present section we further develop that circle of ideas by introducing the modulation spaces and extending some related techniques of [2] to the general framework provided by the localized Weyl calculus for representations of infinite-dimensional Lie groups. Here we single out fairly general conditions that allow for a Weyl calculus to be defined, modulation spaces to be considered and continuity properties in these spaces to hold as in the classical time-frequency analysis; see [11,17,18] and the references therein. All of these conditions are satisfied in at least two important situations: the Weyl–Pedersen calculus for irreducible representations of finite-dimensional nilpotent Lie groups (see [2]) and the magnetic Weyl calculus of [1] to be treated in the last section. 3.1. Ambiguity functions and Wigner distributions Setting 3.1. Throughout this section we keep the following notation: (1) M is a locally convex Lie group (see [28]) with a smooth exponential mapping expM : L(M) = m → M.
1950
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
(2) π : M → B(H) is a nuclearly smooth unitary representation. (3) Ξ and Ξ ∗ are real finite-dimensional vector spaces with a duality pairing ·,· : Ξ ∗ ×Ξ → R and with Lebesgue measures on Ξ and Ξ ∗ suitably normalized for the Fourier transform · : L (Ξ ) → L Ξ ∗ , ∞
1
b(·) → b(·) =
e−i ·,x b(x) dx
Ξ
to give a unitary operator L2 (Ξ ) → L2 (Ξ ∗ ). The inverse of this transform will be denoted by a → a. ˇ Definition 3.2. Let θ : Ξ → m be a linear mapping. (a) Orthogonality relations. If either φ ∈ H∞ and f ∈ H−∞ , or φ, f ∈ H, then we define the ambiguity function along the mapping θ , Aπ,θ φ f : Ξ → C,
π,θ Aφ f (·) = f π expM θ (·) φ .
Note that this is a continuous function on Ξ . We say that the representation π satisfies the orthogonality relations along the mapping θ if π,θ π,θ Aφ1 f1 Aφ2 f2 L2 (Ξ ) = (f1 | f2 )H · (φ2 | φ1 )H
(3.1)
2 for arbitrary φ1 , φ2 , f1 , f2 ∈ H. In particular, Aπ,θ φ f ∈ L (Ξ ) for all φ, f ∈ H. (b) Modulation spaces. Consider any direct sum decomposition Ξ = Ξ1 Ξ2 and r, s ∈ [1, ∞]. For arbitrary f ∈ H−∞ define
f M r,s (π,θ) =
π,θ A f (X1 , X2 )r dX1 φ
φ
Ξ2
s/r
1/s dX2
∈ [0, ∞]
Ξ1
with the usual conventions if r or s is infinite. The space Mφr,s (π, θ ) := f ∈ H−∞ f M r,s (π,θ) < ∞ φ
is called a modulation space for the unitary representation π : M → B(H) with respect to the linear mapping θ : Ξ → m, the decomposition Ξ Ξ1 × Ξ2 , and the window vector φ ∈ H∞ \ {0}. In connection with the above definition, we note that more general “co-orbit spaces” Xφ (π, θ ) can be defined in H−∞ by using any Banach space X of functions on Ξ instead of the mixednorm Lebesgue spaces Lr,s (Ξ1 × Ξ2 ). More specifically, one can define for any window vector φ ∈ H∞ , Xφ (π, θ ) = f ∈ H−∞ Aπ,θ φ f ∈X . A systematic investigation of these spaces can be done in a broader context (see [5]). However, the modulation spaces Mφr,s (π, θ ) introduced in Definition 3.2 above will suffice for the purposes
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1951
of the present paper. See [12–14] for these constructions in the case of representations of locally compact groups. There could be two sources for the intuition underlying the direct sum decomposition Ξ = Ξ1 + Ξ2 : Firstly, the spaces of symbols are associated to a representation of the group G G, which gives rise to such a decomposition with Ξ1 = Ξ2 is a linear subspace of the Lie algebra of G; this is the case in both examples in the paper. Secondly, there is the case of the modulation spaces of functions on which the operators act, and which are defined in terms of the representation of the group G. In this case the decomposition Ξ = Ξ1 + Ξ2 corresponds to canonical coordinates for the symplectic structure on the coadjoint orbit associated with the representation. This is the phase space decomposition, on which we did not focus in the present paper; see however [1] for some more details on the coadjoint orbits relevant for the magnetic case. Another natural question concerns the independence of the modulation spaces on the choice of a window vector. We have discussed this issue in [2, Subsect. 3.1] for square-integrable representations of nilpotent Lie groups, which covers the case of time-frequency analysis. So far we have no such result in any other case. Remark 3.3. If the representation π satisfies the orthogonality relations along the linear mapping θ : Ξ → m, then for any decomposition Ξ = Ξ1 Ξ2 and any choice of the window vector φ ∈ H∞ \ {0}, we have Mφ2,2 (π, θ ) = H. Remark 3.4. Let V : H → H1 be a unitary operator and consider the unitary representation π1 : M → B(H1 ) such that V π(m) = π1 (m)V for every m ∈ M. Denote by H1,∞ the space of smooth vectors for π1 and let H1,−∞ be the strong dual of H1,∞ . Then there exist the linear topological isomorphisms V |H∞ : H∞ → H1,∞ and V−∞ : H−∞ → H1,−∞ , where V−∞ f = f ◦ V ∗ |H1,∞ for every f ∈ H−∞ . It is easy to check that for every linear mapping θ : Ξ → m π1 ,θ and arbitrary φ ∈ H∞ and f ∈ H−∞ we have Aπ,θ φ f = AV φ (V−∞ f ). Therefore V−∞ naturally gives rise to isometric isomorphisms from the modulation spaces of the representation π onto the corresponding modulation spaces of the representation π1 . Definition 3.5 (Growth condition). We say that the representation π satisfies the growth condition along the linear mapping θ : Ξ → m if Aπ,θ φ2 φ1 ∈ S(Ξ ),
for all φ1 , φ2 ∈ H∞ .
(3.2)
Note that (3.2) implies that the sesquilinear map Aπ,θ : H∞ × H∞ → S(Ξ ),
(φ1 , φ2 ) → Aπ,θ φ2 φ1
is separately continuous as a straightforward application of the closed graph theorem, and then it is jointly continuous by [32, Cor. 1 to Th. 5.1 in Ch. III]. If the representation π satisfies the orthogonality relations along the mapping θ , and φ, f ∈ H, 2 2 ∗ then Aπ,θ φ f ∈ L (Ξ ), hence we can define the cross-Wigner distribution W(f, φ) ∈ L (Ξ ) by φ) := Aπ,θ f . the condition W(f, φ
Definition 3.6 (Density condition). The representation π is said to satisfy the density condition 2 along the linear mapping θ : Ξ → m if {Aπ,θ φ f | φ, f ∈ H} is a total subset of L (Ξ ), in the sense that it spans a dense linear subspace.
1952
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
Remark 3.7. If the representation π satisfies the orthogonality relations along θ , then it follows 2 in particular that {Aπ,θ φ f | φ, f ∈ H} ⊆ L (Ξ ), however it is not clear in general that this subset of L2 (Ξ ) is total. Similarly, if π satisfies the growth condition along θ , then {Aπ,θ φ f | φ, f ∈ 2 2 H∞ } ⊆ S(Ξ ) ⊆ L (Ξ ), however in this way we may not get a total subset of L (Ξ ). Lemma 3.8. If the representation π satisfies the orthogonality relations along the linear mapping θ : Ξ → m, then the following assertions hold: (1) The representation π ⊗ π¯ satisfies the orthogonality relations along the linear mapping θ × θ : Ξ × Ξ → m × m. (2) The representation π satisfies the orthogonality relations along each of the linear mappings L(μ)−1 ◦ (θ × θ ) : Ξ × Ξ → m m and θ × θ : Ξ × Ξ → m m. Proof. To see that assertion (1) holds, first prove the orthogonality relations for rank-one operators in S2 (H), then extend them by sesquilinearity to the finite-rank operators, and eventually extend them by continuity to arbitrary Hilbert–Schmidt operators. Then assertion (2) on L(μ) ◦ (θ × θ ) follows by assertion (1) along with Eq. (2.2). Then, to see that also the representation π satisfies the orthogonality relations along the mapping θ × θ : Ξ × Ξ → m m, just note that L(μ)−1 ◦ (θ × θ ) (X, Y ) = θ (Y ), θ (X) − θ (Y ) = (θ × θ )(Y, X − Y ) and the linear mapping Ξ × Ξ → Ξ × Ξ , (X, Y ) → (Y, X − Y ), has the Jacobian identically equal to 1. 2 Lemma 3.9. If the representation π satisfies the growth condition along the linear mapping θ : Ξ → m, then the following assertions hold: (1) The representation π ⊗ π¯ satisfies the growth condition along the linear mapping θ ×θ : Ξ × Ξ → m × m. (2) The representation π satisfies the growth condition along each of the linear mappings L(μ)−1 ◦ (θ × θ ) : Ξ × Ξ → m m and θ × θ : Ξ × Ξ → m m. Proof. The growth condition for the representation π along θ implies that the bilinear map Aπ,θ : H∞ × H∞ → S(Ξ ) is continuous, hence extends to a continuous linear map H∞ → S(Ξ ). Aπ,θ : H∞ ⊗ By complex conjugation we also have H∞ = H∞ ⊗ H∞ → S(Ξ ). Aπ,θ : H∞ ⊗ Thus we get the continuous mapping S(Ξ ) = S(Ξ × Ξ ). Aπ,θ : H∞ ⊗ H∞ ⊗ H∞ ⊗ H∞ → S(Ξ ) ⊗ Aπ,θ ⊗
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1953
By composing this with the permutation (f1 , φ1 , f2 , φ2 ) → (f1 , f2 , φ1 , φ2 ) and using the iso H∞ B(H)∞ , we get a continuous operator B(H)∞ ⊗ B(H)∞ → S(Ξ × Ξ ) morphism H∞ ⊗ ¯ , since which extends Aπ⊗π,θ×θ π,θ×θ ¯ π,θ Aπ⊗ (f1 ⊗ f¯2 ) = Aπ,θ φ1 f1 ⊗ Aφ2 f2 . φ ⊗φ¯ 1
2
The second part in the growth condition can be checked similarly, by using that H−∞ is nuclear, H−∞ (H∞ ⊗ H∞ ) B(H)∞ . like H∞ (see [32, Ch. IV, Th. 9.6]), and noting that H−∞ ⊗ Assertion (2) on L(μ) ◦ (θ × θ ) follows by assertion (1) along with Eq. (2.2). Then, to see that also the representation π satisfies the growth condition along θ × θ , just note that L(μ)−1 ◦ (θ × θ ) (X, Y ) = θ (Y ), θ (X) − θ (Y ) = (θ × θ )(Y, X − Y ) and the linear mapping Ξ × Ξ → Ξ × Ξ , (X, Y ) → (Y, X − Y ), is invertible.
2
3.2. Localized Weyl calculus and its continuity properties Definition 3.10. Let θ : Ξ → m be a linear mapping. 1 (Ξ ) → B(H) given by The localized Weyl calculus for π along θ is the mapping Opθ : L Op (a) = θ
a(X)π ˇ expM θ (X) dX
(3.3)
Ξ 1 (Ξ ) where we use weakly convergent integrals. for a ∈ L The localized Weyl calculus for π along θ is said to be regular if
• π satisfies the growth condition along the mapping θ , • π is twice nuclearly smooth, and • Opθ (a) ∈ B(H)∞ whenever a ∈ S(Ξ ∗ ). Note that the closed graph theorem then implies that Opθ : S(Ξ ∗ ) → B(H)∞ is a continuous linear mapping. If the representation π satisfies the growth condition along the mapping θ , then one can think of (3.3) in the distributional sense in order to define the localized Weyl calculus Opθ : S (Ξ ∗ ) → L(H∞ , H−∞ ). More specifically, for every a ∈ S (Ξ ∗ ) and φ, ψ ∈ H∞ we have θ
ˇ Aπ,θ Op (a)φ ψ = a, φ ψ
(3.4)
where ·,· : S (Ξ ) × S(Ξ ) → C is the usual duality pairing. Remark 3.11. If the localized Weyl calculus for π along θ is regular and moreover defines a linear topological isomorphism Opθ : S(Ξ ∗ ) → B(H)∞ (see Proposition 3.12 for sufficient conditions), then we also have the linear topological isomorphism Opθ : S (Ξ ∗ ) → L(H∞ , H−∞ )
1954
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
by Proposition 2.5(2). Therefore, by using Remark 2.6, we see that there exist the sesquilinear mappings Aπ,θ : H−∞ × H−∞ → S (Ξ )
and W : H−∞ × H−∞ → S Ξ ∗
(3.5)
such that Opθ W(f1 , f2 ) = f1 ⊗ f¯2 π,θ and W(f 1 , f2 ) = Af2 f1 for all f1 , f2 ∈ H−∞ . In addition, it follows by (3.4) and the definition of the Fourier transform for tempered distributions that for every a ∈ S (Ξ ∗ ) and φ, ψ ∈ H∞ we have
Opθ (a)φ ψ = a W(ψ, φ) .
(3.6)
If moreover the representation π satisfies the orthogonality relations along the linear mapping θ , then it follows by Proposition 3.12 below that the mappings (3.5) agree with the ambiguity functions and the cross-Wigner distributions (see Definition 3.5). Proposition 3.12. If π satisfies the orthogonality relations along the linear mapping θ : Ξ → m, then the following assertions are equivalent: (1) The representation π satisfies the density condition along θ . (2) There exists a unique unitary operator Opθ : L2 (Ξ ∗ ) → S2 (H) which agrees with the localized Weyl calculus for π along θ . If these assertions hold true, then we have (∀f, φ ∈ H)
¯ Opθ W(f, φ) = f ⊗ φ.
(3.7)
If moreover the localized Weyl calculus for π along θ is regular, then the mapping Opθ : S(Ξ ∗ ) → B(H)∞ is a linear topological isomorphism. Proof. We begin with some general remarks. Since we have a unitary Fourier transform L2 (Ξ ) → L2 (Ξ ∗ ), it follows by the orthogonality relations along with (3.4) that for arbitrary f, φ ∈ H we have Opθ W(f, φ) = f ⊗ φ¯
¯ S (H ) . and W(f, φ)L2 (Ξ ∗ ) = f · φ = f ⊗ φ 2
(3.8)
Moreover, span {f ⊗ φ¯ | f, φ ∈ H} is dense in S2 (H). We now come back to the proof.
(3.9)
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1955
“(1) ⇒ (2)” Let π satisfy the density condition along θ . Since the Fourier transform L2 (Ξ ) → L2 (Ξ ∗ ) is unitary, it follows that span({W(f, φ) | f, φ ∈ H}) is a dense linear subspace of L2 (Ξ ∗ ). Therefore, by using (3.8) and (3.9), we see that Opθ uniquely extends to a unitary operator L2 (Ξ ∗ ) → S2 (H). “(2) ⇒ (1)” If the operator Opθ : L2 (Ξ ∗ ) → S2 (H) is unitary, then it follows by (3.8) and (3.9) that span({W(f, φ) | f, φ ∈ H}) is a dense linear subspace of L2 (Ξ ∗ ). Then, by using again the fact that the Fourier transform L2 (Ξ ) → L2 (Ξ ∗ ) is unitary, we can see that span({Aπ,θ φ f | 2 f, φ ∈ H}) is a dense linear subspace of L (Ξ ), that is, π satisfies the density condition along θ . Now assume that the assertions (1) and (2) in the statement are satisfied and the localized Weyl calculus for π along θ is regular. Then π satisfies the growth condition along θ , hence the ambiguity function defines a continuous sesquilinear mapping Aπ,θ : H∞ × H∞ → S(Ξ ) (see Definition 3.5). Since the Fourier transform is a linear topological isomorphism S(Ξ ) → S(Ξ ∗ ), the cross-Wigner distributions also define a continuous sesquilinear mapping W : H∞ × H∞ → S(Ξ ∗ ). H∞ → S(Ξ ∗ ), which further induces a continuous linear mapping W : H∞ ⊗ On the other hand, the condition that the localized Weyl calculus for π along θ is regular (see Definition 3.10) includes the assumption that the representation π is twice nuclearly smooth, H∞ B(H)∞ . hence we have a topological linear isomorphism H∞ ⊗ We thus eventually get a continuous linear mapping W : B(H)∞ → S(Ξ ∗ ) which, by (3.8), has the property Opθ ◦ W = id on B(H)∞ . In other words, W = (Opθ )−1 |B(H)∞ . Thus the unitary operator Opθ : L2 (Ξ ∗ ) → S2 (H) restricts to a continuous linear map S(Ξ ∗ ) → B(H)∞ (since the localized Weyl calculus for π along θ is regular), while its inverse (Opθ )−1 restricts to a continuous linear map W : B(H)∞ → S(Ξ ∗ ). It then follows that Opθ : S(Ξ ∗ ) → B(H)∞ is a linear topological isomorphism (whose inverse is W). 2 Definition 3.13. Assume that the localized Weyl calculus for π along the linear mapping θ : Ξ → m is regular and the representation π satisfies both the density condition and the orthogonality relations along θ . It follows by Proposition 3.12 that the localized Weyl calculus Opθ defines a unitary operator L2 (Ξ ∗ ) → S2 (H), and also linear topological isomorphisms S(Ξ ∗ ) → B(H)∞ L(H−∞ , H∞ ) and S (Ξ ∗ ) → L(H∞ , H−∞ ). Hence we can introduce the following notions: (1) If a, b ∈ S (Ξ ∗ ) and the operator product Opθ (a)Opθ (b) ∈ L(H∞ , H−∞ ) is well defined, then Remark 3.11 shows that the Moyal product a#θ b ∈ S (Ξ ∗ ) is uniquely determined by the condition Opθ a#θ b = Opθ (a)Opθ (b). Thus the Moyal product defines bilinear mappings S(Ξ ∗ )×S(Ξ ∗ ) → S(Ξ ∗ ) and L2 (Ξ ∗ )× L2 (Ξ ∗ ) → L2 (Ξ ∗ ). (2) We define the unitary representation π # : M M → B(L2 (Ξ ∗ )) such that for every m ∈ M M there exists the commutative diagram L2 (Ξ ∗ )
π # (m)
Opθ
S2 (H)
L2 (Ξ ∗ ) Opθ
π (m)
S2 (H)
1956
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
These constructions provide extensions of some notions introduced in [2]. Remark 3.14. In the setting of Definition 3.13 we note the following facts: (1) For every m1 , m2 ∈ M and f ∈ L2 (Ξ ∗ ) we have −1 −1 −1 π # (m1 , m2 )f = Opθ π(m1 m2 ) #θ f #θ Opθ π(m1 ) . (2) For every X1 , X2 ∈ Ξ we have Opθ (ei ·,Xj ) = π(expM (θ (Xj ))) for j = 1, 2, whence by Lemma 2.8(2) π # expMM θ (X1 ), θ (X2 ) f = π # expM θ (X1 ) , expM −θ (X1 ) expM θ (X1 + X2 ) f = ei ·,X1 +X2 #θ f #θ e−i ·,X1 whenever f ∈ L2 (Ξ ∗ ). Proposition 3.15. Assume that the representation π is twice nuclearly smooth. If we have either φ1 , φ2 , f1 , f2 ∈ H, or φ1 , φ2 ∈ H∞ and f1 , f2 ∈ H−∞ , then (∀X, Y ∈ Ξ )
π,θ π ,θ×θ Aφ ⊗φ¯ (f1 ⊗ f¯2 ) (X, Y ) = Aπ,θ φ1 f1 (X + Y ) · Aφ2 f2 (X). 1
2
If moreover the localized Weyl calculus for π along θ is regular and the representation π satisfies both the density condition and the orthogonality relations along θ , then (∀X, Y ∈ Ξ )
π # ,θ×θ π,θ AW (φ1 ,φ2 ) W(f1 , f2 ) (X, Y ) = Aπ,θ φ1 f1 (X + Y ) · Aφ2 f2 (X).
Proof. It follows at once by definition that π,θ×θ ¯ π,θ Aπ⊗ (f1 ⊗ f¯2 ) = Aπ,θ φ1 f1 ⊗ Aφ2 f2 . φ ⊗φ¯ 1
2
On the other hand, we easily get by (2.2) (∀X, Y ∈ Ξ )
π ,θ×θ π¯ ,θ×θ Aφ ⊗φ¯ (f1 ⊗ f¯2 ) (X, Y ) = Aπ⊗ (f1 ⊗ f¯2 ) (X + Y, X). φ ⊗φ¯ 1
2
1
2
For the second part of the statement, just recall that Opθ (W(f1 , f2 )) = f1 ⊗ f¯2 and use Proposition 3.12 along with Remark 3.4. 2 Now we are ready to give one of the main technical results of the present paper. It extends a result in [2] (which is recovered for representations of finite-dimensional nilpotent Lie groups). The general lines of the proof go back to [34] (which is recovered for Heisenberg groups); see also [7].
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1957
Theorem 3.16. Let φ1 , φ2 ∈ H∞ \ {0}, and assume the following hypotheses: (1) The representation π satisfies both the density condition and the orthogonality relations along the linear mapping θ : Ξ → m. (2) The localized Weyl calculus for the representation π along θ is regular. Let Ξ = Ξ1 Ξ2 be any direct sum decomposition. If 1 r s ∞ and r1 , r2 , s1 , s2 ∈ [r, s] satisfy the equations r11 + r12 = s11 + s12 = 1r + 1s , then the cross-Wigner distribution defines a continuous sesquilinear map # r,s W(·,·) : Mφr11,s1 (π, θ ) × Mφr22,s2 (π, θ ) → MW (φ1 ,φ2 ) π , θ × θ . Proof. The assertion follows from Proposition 3.15 along the same lines as in the proof of [2, Th. 2.22]. 2 The next corollary records a standard consequence of the continuity of cross-Wigner distributions; see [19,34,18]. Corollary 3.17. Let φ1 , φ2 ∈ H∞ \ {0}, and assume the following hypotheses: (1) The representation π satisfies both the density condition and the orthogonality relations along the linear mapping θ : Ξ → m. (2) The localized Weyl calculus for the representation π along θ is regular. Now let Ξ = Ξ1 Ξ2 be any direct sum decomposition. If r, s, r1 , s1 , r2 , s2 ∈ [1, ∞] satisfy the conditions r s,
r2 , s2 ∈ [r, s],
and
1 1 1 1 1 1 − = − =1− − , r1 r2 s1 s2 r s
r,s # then for every symbol a ∈ MW (φ1 ,φ2 ) (π , θ × θ ) we have a bounded linear operator
Opθ (a) : Mφr11,s1 (π, θ ) → Mφr22,s2 (π, θ ). Moreover, the linear mapping # r1 ,s1 r2 ,s2 r,s Opθ : MW (φ1 ,φ2 ) π , θ × θ → B Mφ1 (π, θ ), Mφ2 (π, θ ) is continuous. Proof. The assertion follows from Theorem 3.16 along the same lines as in the proof of [2, Cor. 2.24]. We just recall that the conditions on the parameters come from Hölder’s inequality and duality theory for the mixed-norm Lebesgue spaces; see [19,34,18] again. 2
1958
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
Corollary 3.18. Let φ1 , φ2 ∈ H∞ \ {0}, and assume the following hypotheses: (1) The representation π satisfies both the density condition and the orthogonality relations along the linear mapping θ : Ξ → m. (2) The localized Weyl calculus for the representation π along θ is regular. ∞,1 θ θ # Then for every a ∈ MW (φ1 ,φ2 ) (π ) we have Op (a) ∈ B(H), and the linear mapping Op : ∞,1 # MW (φ1 ,φ2 ) (π , θ × θ ) → B(H) is continuous.
Proof. This is the special case of Corollary 3.17 with r1 = s1 = r2 = s2 = 2, r = 1, and s = ∞, (π, θ ) = H for j = 1, 2. 2 since Remark 3.3 shows that Mφ2,2 j ∞,1 # We note that MW (φ1 ,φ2 ) (π ) is precisely Sjöstrand’s algebra introduced in [33] in the case of the Heisenberg groups and their Schrödinger representations; see [2, Sect. 4].
3.3. Trace-class operators obtained by localized Weyl calculus In this subsection we give a standard sufficient condition for a pseudo-differential operator to belong to the trace class. In the special case of the Schrödinger representation of a Heisenberg group, this result goes back to [33]. A proof for this result was also provided in [16], was extended to arbitrary nilpotent Lie groups in [2], and will be adapted below to the present setting. Lemma 3.19. Let the representation π : M → B(H) satisfy the orthogonality relations along the linear mapping θ : Ξ → m, and pick φ0 ∈ H∞ with φ0 = 1. Then the following assertions hold: π,θ 2 (1) The operator Aπ,θ φ0 : H → L (Ξ ), f → Aφ0 f , is an isometry whose image is the reproducing kernel Hilbert space associated with the reproducing kernel
K : Ξ × Ξ → C,
K(X1 , X2 ) = π expM θ (X1 ) φ0 π expM θ (X2 ) φ0 .
The orthogonal projection from L2 (Ξ ) onto Ran Aπ,θ φ0 is just the integral operator defined by the integral kernel K. (2) For every φ, f ∈ H we have
π,θ Aφ0 f (X) · π expM θ (X) φ dX = (φ | φ0 )f.
Ξ
In particular, for every f ∈ H we have
π,θ Aφ0 f (X) · π expM θ (X) φ0 dX = f,
Ξ
where the integral is weakly convergent in H.
(3.10)
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1959
Assume that the representation π satisfies the growth condition along θ . Also, assume that for every u ∈ U(mC ) the function dπ(u)π(expM (θ (·)))φ0 has polynomial growth, then moreover we have: (3) If f ∈ H∞ , then the integral in (3.10) is convergent with respect to the topology of H∞ . (4) If f ∈ H−∞ , then (3.10) holds with the integral convergent in the w ∗ -topology. (5) We have H∞ = {f ∈ H−∞ | Aπ,θ φ0 f ∈ S(Ξ )}. Proof. Assertion (1) follows at once by the orthogonality relations along with [15, Prop. 2.12]. Then assertion (2) follows by an application of [15, Prop. 2.11]. The proof for assertions (3)–(5) can be supplied by adapting the method of proof of [2, Cor. 2.9]. We omit the details. 2 Remark 3.20. We note here that in the setting of Lemma 3.19, the condition that for all u ∈ U(mC ) and φ ∈ H∞ the function dπ(AdU(mC ) (expM (θ (·)))u)φ has polynomial growth on Ξ implies that for all f ∈ H−∞ , φ ∈ H∞ , the function Aπ,θ φ f has polynomial growth as well. In fact, if f ∈ H−∞ , then there exists u ∈ U(mC ) such that for every ψ ∈ H∞ we have |(f | ψ)| dπ(u)ψ. (See Remark 2.1.) Then we have π,θ A f (·) = f π exp θ (·) φ dπ(u)π exp θ (·) φ M M φ = dπ AdU(mC ) expM θ (·) u φ and the latter function has polynomial growth by assumption. By using the method of proof of [2, Prop. 2.27] we can now obtain the following sufficient condition for a symbol to give rise to a trace-class operator. Proposition 3.21. Let φ1 , φ2 ∈ H∞ such that φj = 1 and for every u ∈ U(mC ) the function dπ(u)π(expM (θ (·)))φj has polynomial growth, for j = 1, 2, and assume the following hypotheses: (1) The representation π satisfies both the density condition and the orthogonality relations along the linear mapping θ : Ξ → m. (2) The localized Weyl calculus for the representation π along θ is regular. 1,1 θ # Then for every a ∈ MW (φ1 ,φ2 ) (π , θ × θ ) we have Op (a) ∈ S1 (H), and the linear mapping 1,1 # Opθ : MW (φ1 ,φ2 ) (π , θ × θ ) → S1 (H) is continuous.
Proof. It follows by Lemmas 3.8(2), 3.9(2) and Remark 3.4 that the representation π # : M M → B(L2 (Ξ ∗ )) satisfies both the orthogonality relations and the growth condition along the linear mapping θ × θ : Ξ × Ξ → m m. Moreover, it is easily seen that the function Φ0 := W(φ1 , φ2 ) ∈ S(Ξ ∗ ) has the property that for every u ∈ U((m m)C ) the norm of dπ # (u)π # (expMM ((θ × θ )(·)))Φ0 has polynomial growth on Ξ × Ξ , since a similar property has the rank-one operator Opθ (Φ0 ) = (· | φ2 )φ1 ∈ S2 (H) with respect to the representation π , as a direct consequence of the calculation (3.12) below. Therefore we can use Lemma 3.19(4) for the representation π # to see that for arbitrary a ∈ S (Ξ ∗ ) we have
1960
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
a=
π # ,θ×θ AΦ0 a (X, Y ) · π # expMM θ (X), θ (Y ) Φ0 dX dY,
Ξ ×Ξ
whence by (3.6) we get π # ,θ×θ AΦ0 a (X, Y ) · Opθ π # expMM θ (X), θ (Y ) Φ0 dX dY Opπ (a) =
(3.11)
Ξ ×Ξ
where the latter integral is weakly convergent in L(H∞ , H−∞ ) ( L(H−∞ , H∞ ) by Proposition 2.5(2)). On the other hand, for arbitrary X, Y ∈ Ξ we get by Remarks 3.14 and 3.11 Opθ π # expMM θ (X), θ (Y ) Φ0 −1 = π expM θ (X) + θ (Y ) ◦ Opθ (Φ0 ) ◦ π expM θ (X) = · π expM θ (X) φ2 π expM θ (X + Y ) φ1 .
(3.12)
In particular, Opθ (π # (expMM (θ (X), θ (Y )))Φ0 ) ∈ S1 (H) and θ # Op π exp MM θ (X), θ (Y ) Φ0 1 = π expM θ (X + Y ) φ1 · π expM θ (X) φ2 = 1. It then follows that the integral in (3.11) is absolutely convergent in S1 (H) for every symbol 1,1 # (π , θ × θ ) and moreover we have a ∈ MΦ 0 θ Op (a) 1
π # ,θ×θ A a (X, Y ) dX dY = aM 1,1 (π # ,θ×θ) Φ0 Φ
Ξ ×Ξ
which concludes the proof.
2
4. Applications to the magnetic Weyl calculus We proved in [1] that the magnetic Weyl calculus on Rn constructed in [24] can be alternatively described as the localized Weyl calculus for a suitable representation. This point of view actually allowed us to construct magnetic Weyl calculi on any simply connected nilpotent Lie group G, by using an appropriate representation π : M = F G → B(L2 (G)) and linear mappings θ A : g × g∗ → m. We shall see in the present section that all of the conditions studied in Sections 2 and 3 are met by π and θ A (see Corollary 4.7 below), provided the coefficients of the magnetic potential A ∈ Ω 1 (G) have polynomial growth. Therefore, the abstract results of the previous sections can be used for obtaining continuity and nuclearity properties for the magnetic Weyl calculus (see Corollaries 4.8–4.10 below). Notation 4.1. For any Lie group G we denote by λ : G → End(C ∞ (G)), g → λg , the left regular representation defined by (λg φ)(x) = φ(g −1 x) for every x, g ∈ G and φ ∈ C ∞ (G). Moreover, we denote by 1 the constant function which is identically equal to 1 on G. (This should not be confused with the unit element of G, which is denoted in the same way.)
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1961
We now recall the following notion from [1]. Definition 4.2. Let G be a finite-dimensional Lie group. A linear space F of real functions on G is said to be admissible if it is endowed with a sequentially complete, locally convex topology and satisfies the following conditions: (1) The linear space F is invariant under the representation of G by left translations, that is, if φ ∈ F and g ∈ G then λg φ ∈ F . (2) We have a continuous inclusion mapping F → C ∞ (G). (3) The mapping G × F → F , (g, φ) → λg φ is smooth. For every φ ∈ F we denote by ˙ λ(·)φ : g → F the differential of the mapping g → λg φ at the point 1 ∈ G. (4) For every g1 , g2 ∈ G with g1 = g2 there exists φ ∈ F with φ(g1 ) = φ(g2 ). (5) We have {φg | φ ∈ F } = Tg∗ G for every g ∈ G. For instance, the function space CR∞ (G) is admissible. Proposition 4.3. Let G be a finite-dimensional simply connected nilpotent Lie group with the inverse of the exponential map denoted by logG : G → g. If we define FG := spanR λg (ξ ◦ logG ) ξ ∈ g∗ , g ∈ G ,
(4.1)
then the following assertions hold: (1) FG is a finite-dimensional linear subspace of C ∞ (G) which is invariant under the left regular representation and contains the constant functions. (2) The semi-direct product M0 := FG λ G is a finite-dimensional simply connected nilpotent Lie group. Proof. Since G is a simply connected nilpotent Lie group, we may assume that G = (g, ∗). (1) It is clear that the linear space FG is invariant under the left regular representation. On the other hand, for every V , X ∈ g and ξ ∈ g∗ we have
1 (λV ξ )(X) = ξ, (−V ) ∗ X = ξ, −V + X + [−V , X] + · · · . 2 Thus, if we denote by N the nilpotency index of g, then we see that FG consists of polynomial functions on g of degree N , hence dim FG < ∞. Moreover, if z denotes the center of g and we pick V ∈ z and ξ ∈ g∗ , then λV ξ = − ξ, V 1 + ξ . We thus see that the constant functions belong to FG . (2) On the Lie algebra level we have m0 := FG λ˙ g, and both FG and g are nilpotent Lie algebras. Therefore Engel’s theorem shows that, for proving that m0 is nilpotent, it is enough to check that the adjoint action adm0 gives a representation of g on FG by nilpotent endomorphisms. This representation is just λ˙ : g → End(FG ) hence, by the theorem on weight space decompositions for representations of nilpotent Lie algebras (see for instance [6, Th. 2.9]), it suffices to prove ˙ the following fact: If α ∈ g∗ , φ ∈ FG \ {0}, and for every X ∈ g we have λ(X)φ = α(X)φ, then α = 0.
1962
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
˙ 0 )φ = α(X0 )φ, it follows that for every Y ∈ g and To this end, let X0 ∈ g arbitrary. Since λ(X t ∈ R we have φ((−tX0 )∗Y ) = etα(X0 ) φ(Y ). We have seen above that FG consists of polynomial functions on g of degree N , therefore for every Y ∈ g there exists a constant Cφ,Y > 0 such that N 2 (∀t ∈ R) etα(X0 ) φ(Y ) = φ (−tX0 ) ∗ Y Cφ,Y 1 + |t| . On the other hand, since φ ∈ FG \ {0}, there exists Y ∈ g such that φ(Y ) = 0, and then the above inequality shows that α(X0 ) = 0. This holds for arbitrary X0 ∈ g, hence α = 0, as we wished for. 2 Theorem 4.4. Let G be a finite-dimensional simply connected nilpotent Lie group with an admis∞ (G), sible function space F such that there exist the continuous inclusion maps g∗ → F → Cpol where the embedding g∗ → F is given by ξ → ξ ◦ logG . Denote M = F λ G, fix ∈ R \ {0}, and consider the unitary representation π : M → B(L2 (G)), π(φ, g)f = ei φ λg f for all φ ∈ F , g ∈ G, and f ∈ L2 (G). Then π is a nuclearly smooth representation and its space of smooth vectors is the Schwartz space S(G). Proof. Let us denote H = L2 (G) and let H∞ be the space of smooth vectors for the representation π . We first check that S(G) = H∞ . ∞ (G), it follows at once For proving that S(G) ⊆ H∞ , let f ∈ S(G) arbitrary. Since F → Cpol ∞ that for every φ ∈ F and g ∈ G we have π(φ, ·)f ∈ C (G, H) and π(·, g)f ∈ C ∞ (F , H). It then follows by [27, Sect. I] (see also [20, Th. 3.4.3]) that π(·)f ∈ C ∞ (M, H), hence f ∈ H∞ . To prove the converse inclusion S(G) ⊆ H∞ we need the function space FG defined in (4.1). Since F contains {ξ ◦ logG | ξ ∈ g∗ } and is invariant under the left regular representation of G, we get FG → F . Now Proposition 4.3 shows that M0 := FG G is a finite-dimensional nilpotent Lie group. Since g∗ → FG , it is easily seen that the unitary representation π0 := π|M0 : M0 → B(H) is irreducible. Let H∞,π0 be its space of smooth vectors. If δ1 : C ∞ (G) → C is the Dirac distribution at 1 ∈ G, then the discussion in [1, Subsect. 2.4] shows that FG × {0} is a polarization for the functional (δ1 |FG , 0) ∈ m∗0 , and the corresponding induced representation is just π0 . Now H∞,π0 = S(G) by [9, Cor. to Th. 3.1]. Therefore we get the continuous inclusion H∞ → S(G), which completes the proof for the equality S(G) = H∞ . Furthermore, it easily follows by [8, Cor. A.2.4] that H∞ = S(G) = S(g) as locally convex spaces. On the other hand, it is well known that S(g) is a nuclear Fréchet space; see for instance [35]. Finally, both mappings M × S(G) → S(G), (m, φ) → π(m)φ, and m × S(G) → S(G), (X, φ) → dπ(X)φ are continuous as a direct consequence of [8, Th. A.2.6], and this concludes the proof of the fact that π is a nuclearly smooth representation. 2 We now prove that the conclusion of Theorem 4.4 actually holds under a much stronger form. Corollary 4.5. In the setting of Theorem 4.4, the unitary representation π is twice nuclearly smooth. Proof. The proof has two stages. For the sake of simplicity we assume = 1, however it is clear that the following reasonings carry over to the general case.
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1963
1◦ We first make the following remark: For j = 1, 2, let Gj be a finite-dimensional simply connected nilpotent Lie group with an admissible function space Fj such that g∗j → Fj → ∞ (G ) as in Theorem 4.4. Also define the group M = F G and the unitary representation Cpol j j j λ j j −1
πj : Mj → B(L2 (Gj )), πj (φ, g)f = ei(−1) φ λg f for all φ ∈ Fj , g ∈ Gj , and f ∈ L2 (Gj ). Now consider the direct product group G0 := G1 × G2 , the function space ∞ F0 := (F1 ⊗ 1) + (1 ⊗ F2 ) → Cpol (G0 ),
and the representation π0 : M0 → B(L2 (G0 )), π0 (φ, g)f = eiφ λg f for all φ ∈ F0 , g ∈ G0 , and f ∈ L2 (G0 ), where M0 := F0 λ G0 . Then F0 is an admissible function space on G0 and there exists a 1-dimensional central subgroup N ⊆ M1 × M2 such that N ⊆ Ker(π1 ⊗ π2 ), and we have M0 = (M1 × M2 )/N . Moreover, the representation π0 is equal to π1 ⊗ π2 factorized modulo N . In fact, let us define the linear map : F1 × F2 → F0 ,
(φ1 , φ2 ) → φ1 ⊗ 1 − 1 ⊗ φ2 .
Then Ran = F0 and Ker = {(t1, t1) | t ∈ R} R, hence we get a linear isomorphism F0
(F1 × F2 )/ Ker , and this can be used to define the topology of F0 . Moreover, it is clear that Ker is contained in the center of m1 × m2 m0 and Ker ⊆ Ker(d(π1 ⊗ π2 )), hence the above remark holds for N = expM0 (Ker ). 2◦ We now come back to the proof of the corollary. We already know from Theorem 4.4 that the representation π is nuclearly smooth. Moreover, by using the remark of stage 1◦ for G1 = G2 = G along with Theorem 4.4 for the group G × G, we easily see that the space of smooth vectors for the representation π ⊗ π¯ is linear and topologically isomorphic to S(G × G), S(G) (see for instance [35]). On the other hand, S(G) is which in turn is isomorphic to S(G) ⊗ the space of smooth vectors for π , by Theorem 4.4. Thus the representation π also satisfies the second condition in the definition of a twice nuclearly smooth representation (see Definition 2.2), and we are done. 2 Notation 4.6. Let G be any Lie group with the Lie algebra g and with the space of globally defined smooth vector fields (that is, global sections in its tangent bundle) denoted by X(G) and the space of globally defined smooth 1-forms (that is, global sections in its cotangent bundle) denoted by Ω 1 (G). Then there exists a natural bilinear map
·,· : Ω 1 (G) × X(G) → C ∞ (G) defined as usually by evaluations at every point of G. Moreover, for arbitrary g ∈ G, we denote the corresponding right-translation mapping by Rg : G → G, h → hg. Then we define the injective linear mapping ιR : g → X(G) by (ιR X)(g) = (T1 (Rg ))X ∈ Tg G for all g ∈ G and X ∈ g.
1964
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
Corollary 4.7. Assume the setting of Theorem 4.4. If we have A ∈ Ω 1 (G) such that A, ιR X ∈ F whenever X ∈ g, then we define the linear mapping
(X, ξ ) → ξ ◦ logG + A, ιR X , X .
θ A : g × g∗ → m = F λ˙ g,
Then for every ∈ R \ {0} the representation π : M → B(L2 (G)) has the following properties: (1) The representation π satisfies the orthogonality relations along the mapping θ A . (2) The representation π satisfies the growth condition along θ A . (3) The localized Weyl calculus for π along θ A is regular and defines a unitary operator A Opθ : L2 (g × g∗ ) → S2 (L2 (G)). (4) If u ∈ U(mC ) and φ ∈ S(G), the function dπ(AdU(mC ) (expM (θ A (·)))u)φ has polynomial growth on g × g∗ . Proof. Throughout the proof we assume = 1 and we denote π1 = π for the sake of simplicity. The case of an arbitrary ∈ R \ {0} can be handled by a similar method. Since G is simply connected, we may assume G = (g, ∗). Then the space of smooth vectors for π is equal to S(g) by Theorem 4.4. (1) The assertion follows by [3, Th. 2.8(1)]. (2) To check the growth condition (3.2) we shall denote for every X ∈ g, 1 ΨX : g → g,
ΨX (Y ) =
Y ∗ (sX) ds 0
and also 1
R τA (X, Y ) = exp i A, ι X (−sX) ∗ Y ds 0
for X, Y ∈ g. It then follows by [3, Prop. 2.9(1)] that for every f, φ ∈ S(g) we have π,θ A Aφ f (X, ξ ) =
ei ξ,Y τA X, −ΨX−1 (Y ) f −ΨX−1 (Y ) φ (−X) ∗ −ΨX−1 (Y ) dY.
g A
f : g × g∗ → C is a partial inverse Fourier transform of the function Therefore the function Aπ,θ φ defined on g × g by (X, Y ) → τA X, −ΨX−1 (Y ) f −ΨX−1 (Y ) φ (−X) ∗ −ΨX−1 (Y ) : g → C. On the other hand, it was noted in the proof of [1, Th. 4.4(4)] that each of the mappings Σ1 , Σ2 : g × g → g × g defined by Σ1 (Y, Z) = −Y, Y ∗ (−Z)
and Σ2 (V , W ) = −ΨW (V ), W
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1965
is a polynomial diffeomorphism whose inverse is a polynomial. Since Σ2−1 (Y, X) = ΨX−1 (−Y ), X ∞ (g × g), it then easily follows by [8, Lemma A.2.1(a)] that we have a well-defined and τA ∈ Cpol continuous sesquilinear mapping
S(g) × S(g) → S g × g∗ ,
A
(f, φ) → Aπ,θ f. φ
Thus the representation π satisfies the growth condition along the mapping θ A . (3) Use the above assertion (3) along with [1, Th. 4.4(4)]. (4) The assertion follows as a direct consequence of [3, Lemma 2.5]. 2 In the next corollaries we denote by π the representation π in Theorem 4.4 for = 1. Recall that we work with a finite-dimensional simply connected nilpotent Lie group G with an admis∞ (G), sible function space F such that there exist the continuous inclusion maps g∗ → F → Cpol ∗ where the embedding g → F is given by ξ → ξ ◦ logG . Moreover M = F λ G, and the aforementioned unitary representation π : M → B(L2 (G)) is defined by π(φ, g)f = eiφ λg f for all φ ∈ F , g ∈ G, and f ∈ L2 (G). If we have A ∈ Ω 1 (G) such that A, ιR X ∈ F whenever X ∈ g, and we define the linear mapping θ A : g × g∗ → m = F λ˙ g,
(X, ξ ) → ξ ◦ logG + A, ιR X , X
as in Corollary 4.7, then one can consider the modulation spaces of symbols for the localized Weyl calculus for the representation π along the linear mapping θ A . These are just the modulation spaces for the representation π # : M M → B(L2 (g × g∗ )) with respect to the linear mapping (θ A , θ A ) : (g × g∗ ) × (g × g∗ ) → m m. It follows by Remark 3.14 that for arbitrary Φ ∈ S(g × g∗ ) and F ∈ S (g × g∗ ) the corresponding ambiguity function # A A AπΦ ,θ ×θ F : (g × g∗ ) × (g × g∗ ) → C is given by the formula π # ,θ A ×θ A AΦ F (X1 , ξ1 ), (X2 , ξ2 ) = π # expMM θ A (X1 , ξ1 ), θ A (X2 , ξ2 ) F Φ L2 (g×g∗ ) i ·,(X +X ,ξ +ξ ) θ A θ A −i ·,(X ,ξ ) 1 2 1 2 # 1 1 e = F# e Φ(·) g×g∗
where #θ stands for the Moyal product on g × g∗ defined by means of the magnetic potential A. For r, s ∈ [1, ∞] and the window function Φ ∈ S(g × g∗ ) we have the modulation space of symbols A
# A A r,s # A MΦ π , θ × θ A = F ∈ S g × g∗ AπΦ ,θ ×θ F ∈ Lr,s g × g∗ × g × g∗ . Corollary 4.8. In the above setting, pick φ1 , φ2 ∈ S(G) \ {0}. If r, s, r1 , s1 , r2 , s2 ∈ [1, ∞] satisfy the conditions
1966
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
r s,
r2 , s2 ∈ [r, s],
and
1 1 1 1 1 1 − = − =1− − , r1 r2 s1 s2 r s
r,s # A A then for every symbol a ∈ MW (φ1 ,φ2 ) (π , θ × θ ) we have a bounded linear operator
A Opθ (a) : Mφr11,s1 π, θ A → Mφr22,s2 π, θ A . Moreover, the linear mapping # A A r,s A Opθ : MW → B Mφr11,s1 π, θ A , Mφr22,s2 π, θ A (φ1 ,φ2 ) π , θ × θ is continuous. Proof. It follows by Theorem 4.4 that the space of smooth vectors for the representation π is the Schwartz space S(G). Moreover, Corollary 4.7 shows that we can apply Corollary 3.17 for the representation π . Now the conclusion follows by using the latter corollary. 2 Corollary 4.9. Assume the setting of Corollary 4.7, let φ1 , φ2 ∈ S(G) \ {0}, and r, s ∈ [1, ∞] r,s θA # A A 2 such that 1r + 1s = 1. Then for every a ∈ MW (φ1 ,φ2 ) (π , θ × θ ) we have Op (a) ∈ B(L (G)). A
r,s # A A 2 Moreover, Opθ : MW (φ1 ,φ2 ) (π , θ × θ ) → B(L (G)) is a continuous linear mapping.
Proof. This is the special case of Corollary 4.8 with r1 = s1 = r2 = s2 = 2, since Remark 3.3 (π, θ A ) = L2 (G) for j = 1, 2. 2 shows that Mφ2,2 j Corollary 4.10. Assume the setting of Corollary 4.7 and let φ1 , φ2 ∈ S(G) \ {0}. Then for 1,1 θ # A A 2 every a ∈ MW (φ1 ,φ2 ) (π , θ × θ ) we have Op (a) ∈ S1 (L (G)), and the linear mapping A
1,1 # A A 2 Opθ : MW (φ1 ,φ2 ) (π , θ × θ ) → S1 (L (G)) is continuous.
Proof. Recall from Theorem 4.4 that the space of smooth vectors for the representation π is the Schwartz space S(G). Moreover, Corollary 4.7 shows that we can use Proposition 3.21, and the conclusion follows. 2 Remark 4.11. In the special case when G is the abelian group (Rn , +) and we have the magnetic potential A ∈ Ω 1 (Rn ), the magnetic Weyl calculus ∗ A Opθ : S Rn × Rn → L S Rn , S Rn is just the one constructed in [24]. In this setting, we note the following: (1) In the case when the coefficients of the magnetic field B := dA ∈ Ω 2 (Rn ) belong to the Fréchet space BC∞ (Rn ) of smooth functions on Rn which are bounded along with all of their partial derivatives, one established in [22] some sufficient conditions on a symbol A a ∈ S (Rn × (Rn )∗ ) that ensure that the magnetic pseudo-differential operator Opθ (a) is bounded on L2 (Rn ). In this connection, we note that the previous Corollary 4.9 provides another type of sufficient conditions for L2 -boundedness when the coefficients of the mag∞ (Rn ) of smooth functions on Rn that grow netic field B belong to the larger LF-space Cpol
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
1967
polynomially together with their partial derivatives of arbitrary order. This follows since for ∞ (Rn ), one can construct every closed 2-form B ∈ Ω 2 (Rn ) whose coefficients belong to Cpol ∞ (Rn ) again such that 1 n in the usual way a 1-form A ∈ Ω (R ) whose coefficients belong to Cpol dA = B. (2) It follows by the comments preceding Corollary 4.8 that the modulation spaces of symbols r,s MΦ (π # , θ A × θ A ) can be alternatively described in terms of the modulation mapping which was introduced in [25] in the case of the abelian group G = (Rn , +) by using the magnetic Moyal product #A . It had been already noted in [24] that the magnetic Moyal product on (Rn , +) actually depends only on the magnetic field B = dA. This assertion holds true for the two-step nilpotent Lie groups, as an easy consequence of the formula established in Th. 4.7 in [1]. Acknowledgment We wish to thank the referee for interesting comments and suggestions that helped us to improve the presentation. The second-named author acknowledges partial financial support from Project MTM2010-16679, DGI-FEDER, of the MCYT, Spain, and from the CNCSIS grant PNII – Programme “Idei” (code 1194). References [1] I. Belti¸ta˘ , D. Belti¸ta˘ , Magnetic pseudo-differential Weyl calculus on nilpotent Lie groups, Ann. Global Anal. Geom. 36 (3) (2009) 293–322. [2] I. Belti¸ta˘ , D. Belti¸ta˘ , Modulation spaces of symbols for representations of nilpotent Lie groups, J. Fourier Anal. Appl., doi:10.1007/s00041-010-9143-4, in press; preprint arXiv:0908.3917v2 [math.AP]. [3] I. Belti¸ta˘ , D. Belti¸ta˘ , Uncertainty principles for magnetic structures on certain coadjoint orbits, J. Geom. Phys. 60 (1) (2010) 81–95. [4] I. Belti¸ta˘ , D. Belti¸ta˘ , Smooth vectors and Weyl–Pedersen calculus for representations of nilpotent Lie groups, An. Univ. Bucure¸sti Mat. 1 (LIX) (1) (2010) 17–46. [5] I. Belti¸ta˘ , D. Belti¸ta˘ , Operator Calculus for Lie Group Representations, monograph, forthcoming. [6] R.W. Carter, Lie Algebras of Finite and Affine Type, Cambridge Stud. Adv. Math., vol. 96, Cambridge University Press, Cambridge, 2005. [7] E. Cordero, K. Gröchenig, Time-frequency analysis of localization operators, J. Funct. Anal. 205 (1) (2003) 107– 131. [8] L.J. Corwin, F.P. Greenleaf, Representations of Nilpotent Lie Groups and Their Applications. Part I (Basic Theory and Examples), Cambridge Stud. Adv. Math., vol. 18, Cambridge University Press, Cambridge, 1990. [9] L. Corwin, F.P. Greenleaf, R. Penney, A general character formula for irreducible projections on L2 of a nilmanifold, Math. Ann. 225 (1) (1977) 21–32. [10] R. Douady, Produits tensoriels topologiques et espaces nucléaires, in: A. Douady, J.-L. Verdier (Eds.), Quelques Problèmes de Modules, Sém. Géom. Anal. École Norm. Sup., Paris, 1971–1972, in: Astérisque, vol. 16, Soc. Math. France, Paris, 1974, pp. 7–32. [11] H.G. Feichtinger, Modulation spaces on locally compact abelian groups, in: Proceedings of “International Conference on Wavelets and Applications” 2002, Chennai, India, Allied Publishers, 2003, pp. 99–140; Updated version of a technical report, University of Vienna, 1983. [12] H.G. Feichtinger, K. Gröchenig, A unified approach to atomic decompositions via integrable group representations, in: Function Spaces and Applications, Lund, 1986, in: Lecture Notes in Math., vol. 1302, Springer, Berlin, 1988, pp. 52–73. [13] H.G. Feichtinger, K. Gröchenig, Banach spaces related to integrable group representations and their atomic decompositions. I, J. Funct. Anal. 86 (2) (1989) 307–340. [14] H.G. Feichtinger, K. Gröchenig, Banach spaces related to integrable group representations and their atomic decompositions. II, Monatsh. Math. 108 (2–3) (1989) 129–148.
1968
I. Belti¸ta˘ , D. Belti¸ta˘ / Journal of Functional Analysis 260 (2011) 1944–1968
[15] H. Führ, Abstract Harmonic Analysis of Continuous Wavelet Transforms, Lecture Notes in Math., vol. 1863, Springer-Verlag, Berlin, 2005. [16] K. Gröchenig, An uncertainty principle related to the Poisson summation formula, Studia Math. 121 (1) (1996) 87–104. [17] K. Gröchenig, Foundations of Time-Frequency Analysis, Appl. Numer. Harmon. Anal., Birkhäuser Boston, Inc., Boston, MA, 2001. [18] K. Gröchenig, A pedestrian’s approach to pseudodifferential operators, in: Harmonic Analysis and Applications, in: Appl. Numer. Harmon. Anal., Birkhäuser Boston, Boston, MA, 2006, pp. 139–169. [19] K. Gröchenig, C. Heil, Modulation spaces and pseudodifferential operators, Integral Equations Operator Theory 34 (4) (1999) 439–457. [20] R.S. Hamilton, The inverse function theorem of Nash and Moser, Bull. Amer. Math. Soc. (N.S.) 7 (1) (1982) 65– 222. [21] B. Helffer, A. Mohamed, Sur le spectre essentiel des opérateurs de Schrödinger avec champ magnétique, Ann. Inst. Fourier (Grenoble) 38 (2) (1988) 95–112. [22] V. Iftimie, M. M˘antoiu, R. Purice, Magnetic pseudodifferential operators, Publ. Res. Inst. Math. Sci. 43 (3) (2007) 585–623. [23] P.E.T. Jorgensen, W.H. Klink, Quantum mechanics and nilpotent groups. I. The curved magnetic field, Publ. Res. Inst. Math. Sci. 21 (5) (1985) 969–999. [24] M. M˘antoiu, R. Purice, The magnetic Weyl calculus, J. Math. Phys. 45 (4) (2004) 1394–1417. [25] M. M˘antoiu, R. Purice, The modulation mapping for magnetic symbols and operators, Proc. Amer. Math. Soc. 138 (8) (2010) 2839–2852. [26] A. Mohamed, J. Nourrigat, Encadrement du N (λ) pour un opérateur de Schrödinger avec un champ magnétique et un potentiel électrique, J. Math. Pures Appl. (9) 70 (1) (1991) 87–99. [27] K.-H. Neeb, Infinite-dimensional groups and their representations, in: A. Huckleberry, T. Wurzbacher (Eds.), Infinite Dimensional Kähler Manifolds, Oberwolfach, 1995, in: DMV Sem., vol. 31, Birkhäuser, Basel, 2001, pp. 131–178. [28] K.-H. Neeb, Towards a Lie theory of locally convex groups, Jpn. J. Math. 1 (2) (2006) 291–468. [29] K.-H. Neeb, On differentiable vectors for representations of infinite dimensional Lie groups, J. Funct. Anal. 259 (11) (2010) 2814–2855. [30] N.V. Pedersen, Matrix coefficients and a Weyl correspondence for nilpotent Lie groups, Invent. Math. 118 (1) (1994) 1–36. [31] B. Roider, Die metrisierbaren linearen Teilräume des Raumes OM von L. Schwartz, Monatsh. Math. 79 (4) (1975) 325–332. [32] H.H. Schaefer, Topological Vector Spaces, The Macmillan Co., New York, 1966, Collier–Macmillan Ltd., London, 1966. [33] J. Sjöstrand, An algebra of pseudodifferential operators, Math. Res. Lett. 1 (2) (1994) 185–192. [34] J. Toft, Continuity properties for modulation spaces, with applications to pseudo-differential calculus. I, J. Funct. Anal. 207 (2) (2004) 399–429. [35] F. Trèves, Topological Vector Spaces, Distributions and Kernels, Academic Press, New York, London, 1967.
Journal of Functional Analysis 260 (2011) 1969–2003 www.elsevier.com/locate/jfa
Composition operators on the polydisk induced by affine maps Frédéric Bayart Clermont Université, Université Blaise Pascal, Laboratoire de Mathématiques, BP 10448, F-63000 Clermont-Ferrand – CNRS, UMR 6620, Laboratoire de Mathématiques, F-63177 Aubiere, France Received 12 July 2010; accepted 20 December 2010 Available online 7 January 2011 Communicated by Gilles Godefroy
Abstract We study the continuity of composition operators on the classical Hardy and weighted Bergman spaces of the polydisk. We show that this problem involves some delicate properties of the derivative of the symbol. In particular, we characterize continuity when the symbol is a linear self-map of the polydisk. © 2011 Elsevier Inc. All rights reserved. Keywords: Composition operators; Polydisk; Carleson measures
1. Introduction If X is a Banach space of holomorphic functions on a domain U and if φ is a (holomorphic) self-map of U , the composition operator associated to φ is defined by Cφ (f ) = f ◦ φ for any f ∈ X. The study of composition operators consists in the comparison of the properties of the operator Cφ with that of the function φ itself, which is called the symbol of Cφ . It is a very active field in analysis (at time of writing, MathSciNet refers more than 1100 papers with “composition operators” in their title). The first problem to tackle is often that of continuity: given X, for which symbols φ the composition operator Cφ defines a bounded operator on X? The answer is rather easy when X is the Hardy space or a weighted Bergman space of the disk: every symbol defines a bounded composition operator. This is the Littlewood subordination principle, which goes back to 1925. E-mail address: [email protected]. 0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.019
1970
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
In several complex variables, the situation is much more involved. Let Bn be the euclidean ball of Cn and let Sn be its boundary, namely the unit sphere. Let also dz be the Lebesgue measure on Bn and let dσ be the normalized surface measure on Sn . The Hardy space H p (Bn ), 1 p < +∞ consists of the holomorphic functions f in Bn such that
p
f H p (Bn ) = sup
0
f (rz)p dσ (z) < +∞.
Sn p
For β > −1 and p ∈ [1, +∞), the Bergman space Aβ (Bn ), 1 p < +∞, is the space of all functions f holomorphic in Bn such that
p
f Ap (B ) = β
n
f (rz)p 1 − z2 β dz < +∞,
Bn
where z means here the euclidean norm of z. J. Shapiro (unpublished, see also [4,9]) gave the first example of a self-map φ of B2 such that Cφ is not continuous on the Hardy space H 2 (B2 ). This example is very easy: φ(z1 , z2 ) = (2z1 z2 , 0). In his seminal paper [11], W. Wogen gave a complete characterization of those holomorphic self-maps φ ∈ C 3 (Bn ) inducing a bounded composition operator on H p (Bn ). To state his result, let us write Dξ =
n k=1
ξk
∂ , ∂ξk
φξ (z) = φ(z), ξ
where z ∈ Bn , ξ ∈ ∂Bn and ·,· denotes the canonical inner product in Cn . Theorem 1.1. Let φ : Bn → Bn be holomorphic and suppose that φ ∈ C 3 (Bn ). Then Cφ defines a bounded composition operator on H 2 (Bn ) iff Dξ φη (ξ ) > |Dτ Dτ φη (ξ )| for all ξ and τ ∈ ∂Bn with ξ, τ = 0 and φ(ξ ) = η. This theorem was later extended to weighted Bergman spaces in [7]. In particular, when φ ∈ C 3 (Bn ), the continuity of Cφ does not depend on the Hardy or on the weighted Bergman space where we work: Cφ is continuous on H 2 (Bn ) iff Cφ is continuous on A2β (Bn ) for some β > −1 iff Cφ is continuous on A2β (Bn ) for all β > −1. In this paper, we investigate similar statement for composition operators on the polydisk. We use dA to denote the normalized area measure on the unit disk D and for β > −1, we write β dAβ (z) = (β + 1) 1 − |z|2 dA(z). More generally, let Dn be the unit polydisk in Cn and for β > −1, let dVβ (z) = dAβ (z1 ) . . . dAβ (zn ),
z = (z1 , . . . , zn ). p
For p 1 and β > −1, the weighted Bergman space Aβ (Dn ) consists of all holomorphic func-
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1971
tions f in Dn such that p f Ap β
=
f (z)p dVβ (z) < ∞.
Dn
Sometimes, the unweighted Bergman space will be more simply denoted by Ap (Dn ) = p A0 (Dn ). We also consider the Hardy spaces H p (Dn ), p 1, which is the space of all g ∈ H (Dn ) for which p g(rξ )p dσ (ξ ) < ∞, gH p = sup 0
where dσ is the normalized surface measure on Tn . Here, Tn is the n-dimensional torus (the distinguished boundary of Dn ). The following theorem was announced in [8]. Theorem 1.2. Suppose φ : Dn → Dn is holomorphic, φ ∈ C 2 (Dn ), p 1 and β > −1. Then Cφ p is bounded on Aβ (Dn ) or on H p (Dn ) iff dφ(ξ ) is invertible for all ξ ∈ Tn with φ(ξ ) ∈ Tn . This result has a very pleasant form. Unfortunately, it is false (precisely its sufficient part is false for n 3) as the following example indicates: Example 1.3. Let φ : D3 → D3 be defined by φ(z) = (z1 , z1 , 0). Then Cφ is not continuous on H 2 (D3 ). However, the assumption of Theorem 1.2 is satisfied since φ(T3 ) ∩ T3 = ∅! Proof. Let fn (z) = z1n + z1n−1 z2 + · · · + z2n . Then fn H 2 = n1/2 . Now, fn ◦ φ = nz1n so that fn ◦ φH 2 = n. 2 Our ambition in this paper is to show that the study of continuity of composition operators on the polydisk is a difficult problem (the mistake made in the proof of Theorem 1.2 is rather subtle). First, in Section 3, we will correct the proof of the sufficient part of Theorem 1.2 in the context of the unweighted Bergman space. Of course, the statement will change and we will obtain a sufficient condition which is not yet necessary for n 3. However it will be powerful enough to characterize continuous composition operators on the Bergman space of the bidisk when the symbol is smooth up to the boundary. Next, in Section 4, we will try to understand the difficulties which arise on the polydisk by studying intensively two examples. More precisely, we will exhibit two linear maps φ and ψ mapping D7 into itself and which have a very similar definition. One will induce a bounded composition operator on A2 (Dn ) whereas the other one will induce an unbounded one. φ and ψ will share many properties and our intention is to convince the reader that a theorem characterizing continuity of composition operators on the Hardy or Bergman spaces of the polydisk
1972
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
cannot have an easy formulation. Moreover, their study will be a guide in order to get a general statement. In the last sections of this paper, we turn back to the general case. We describe in Section 5 a condition to testify if a composition operator is continuous on A2 (Dn ). This condition is necessary when φ is smooth up to the boundary. It is also sufficient when φ is linear. This condition uses combinatoric considerations. It gives a valuable algorithm which can be used to testify whether Cφ is bounded or not. Sections 6 and 7 are devoted to the proof of this main result. In Section 5, for the sake of simplicity, we restrict ourselves to the unweighted Bergman space. With the same method, in Section 8, we give a (different) condition for the spaces A2β (Dn ). As a corollary, for any β1 > β2 > −1 we find and integer n and a linear map φ : Dn → Dn such that Cφ is continuous on A2β1 (Dn ) and such that Cφ is not continuous on A2β2 (Dn ). This is completely different from what happens on the unit ball. In Section 9, we turn to the study of the continuity of composition operators on the Hardy space of the polydisk. The difficulty is that our main tool, Carleson measures, is less tractable in H 2 (Dn ) than in A2β (Dn ). Nevertheless, we will be able to obtain a similar statement on H 2 (Dn ), using an indirect strategy, and a very close look to the constants which appear when we are proving the continuity on the Bergman spaces. The arguments used throughout this paper are rather classical: Carleson measures, Julia– Caratheodory theorem, . . . . A short survey of what is needed is the content of the next section. Notations. All proofs in this paper will rely on volume estimation arguments. To avoid unuseful complications, the sentence “the volume of E(x) is less than f (x)” will always mean that V E(x) Cf (x) for some constant C which does not depend on x. Moreover, e will denote e = (1, . . . , 1). For φ : Dn → Dn and I = {i1 , . . . , iq } ⊂ {1, . . . , n}, φI denotes (φi1 , . . . , φiq ) and |I | denotes the cardinal number of I . For w ∈ C and δ > 0, R(w, δ) and D(w, δ) mean respectively
R(w, δ) = z ∈ D; e(1 − wz) ¯ <δ ,
D(w, δ) = z ∈ D; |z − w| < δ . 2. Preliminaries 2.1. Carleson measures and volume For any ξ ∈ Tn and any δ = (δ1 , . . . , δn ) ∈ (0, 2)n , we define
S(ξ, δ) = (z1 , . . . , zn ) ∈ Dn ; |zk − ξk | < δk , 1 k n . S(ξ, δ) will be called a Carleson box at ξ . It is not difficult to see that C −1 (δ1 . . . δn )2+β Vβ S(ξ, δ) C(δ1 . . . δn )2+β
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1973
for all δ ∈ (0, 2)n and all ξ ∈ Tn . Carleson boxes are useful to define Carleson measures and these measures give characterizations of bounded composition operators on Dn . Here is the statement that we need (see [6]): p
p
Lemma 2.1. Let β > −1 and let φ : Dn → Dn be holomorphic. Then Cφ : Aβ (Dn ) → Aβ (Dn ) is bounded if and only if there exists C > 0 such that Vβ φ −1 S(ξ, δ) CVβ S(ξ, δ)
(1)
for all δ ∈ (0, 2)n and all ξ ∈ Tn . Let us comment this statement. Our results in this paper will all ultimately rely on it. It was also used by the authors of [8] when they tried to prove Theorem 1.2. The mistake that they have made there is that they proved (1) only when all δk are small. They do not prove it when some δk are small and some are large. Let us also mention that the characterization of Carleson measures on the Hardy space of the polydisk is more difficult. See Section 9 for details, as well as for a proof of Lemma 2.1 with a precise study of the constants which are involved there. To apply Lemma 2.1, we shall need to estimate the volume of subsets of Dn . Here are the results that we need. Lemma 2.2. Let u ∈ T and δ ∈ (0, 2). Then C −1 δ 3/2 V
z ∈ D; e(1 − uz) ¯ <δ
Proof. This is easy, the key point being | m(uz)| ¯ (2δ)1/2 .
Cδ 3/2 .
2
Lemma 2.3. Let u ∈ T, v ∈ C, δ ∈ (0, 2) and α > 0. Then
z ∈ D; e(1 − uz) ¯ < δ and |v − z| < δ α has volume less than min(δ 3/2 , δ 1+α ). Proof. The first estimation is already contained in the previous lemma. For the second one we have just to observe that our set is contained in a rectangle whose sides have respective length δ and δ α . 2 Lemma 2.4. There exists ε > 0 such that, for every δ ∈ (0, 2), for every w ∈ C satisfying 1 − εδ e(w) 1 + εδ
√ and m(w) εδ
the set {z ∈ D; |z − w| < δ} has volume greater than δ 2 . Proof. Let w0 = w − δ, w1 = w − 2δ , w2 = w − 2δ + i 4δ . It is easy to verify that w0 , w1 and w2 1 all belong to D ∩ D(w, δ), provided ε is small enough (for instance, ε = 10 works). This triangle 2 has volume greater than δ . 2
1974
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
In particular, √ one can apply Lemma 2.4 for w ∈ D satisfying e(w) 1 − εδ, since in that case | m(w)| 2εδ. At this stage, we can point out a crucial idea. Linear forms ψ on Dn such that supz∈Dn |ψ(z)| = 1 may approach an extreme point on sets with different volumes. Consider for instance z → z1 and z → (z1 + z2 )/2. By the above lemma, we get
z ∈ D; |z1 − 1| < δ Cδ 2 ,
C −1 δ 2+3/2 V z ∈ D; |z1 − 1| < δ Cδ 2+3/2 , C −1 δ 2 V
the last inequality coming from the fact that e(z) 1 − δ. 2.2. The Julia–Caratheodory theorem The Julia–Caratheodory theorem is a geometric statement explaining the behaviour of an analytic self-map of D near a boundary fixed point (see [10] for a beautiful exposition). Since we will consider only smooth maps, we just need it in the following form: Lemma 2.5. Let φ : D → D be holomorphic which in C 1 in D ∪ {ξ } with ξ ∈ T. Suppose moreover that φ(ξ ) = ξ . Then φ (ξ ) ∈ (0, +∞). This result was later extended to the polydisk by Abate [1] in the following form: Lemma 2.6. Let f : Dn → D be a holomorphic function and let ξ ∈ ∂Dn . Assume there is α > 0 such that lim inf w→ξ
1 − |f (w)| = α. 1 − w∞
(2)
Then there exists τ ∈ T such that f has K-limit τ at ξ and df (z)(ξ ) has restricted K-limit ατ at ξ . It is not hard to check that, if f is C 1 at ξ and if f maps ξ onto a point of T, then (2) is fulfilled (it suffices to consider radial limits). In particular, the linear map df (ξ ) is non-zero. We use these versions of the Julia–Caratheodory theorem in order to obtain informations on the Taylor expansion of maps from Dn to D: Corollary 2.7. Let u : Dn → D be holomorphic in a neighbourhood of Dn . Suppose that u(e) = 1. Then aj (zj − 1) + O |zj − 1|2 . u(z) = 1 + j n
j n aj =0
Proof. Since u is C 2 at e, we can write directly u(z) = 1 +
j n
aj (zj − 1) + O
j n
|zj − 1|
2
.
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1975
Our task is to delete certain terms in the last sum. Let J = {j ; aj = 0} and suppose for simplicity that J = {1, . . . , m}. We can write around e u(z) = 1 +
aj (zj − 1) + H (zm+1 , . . . , zn ) +
j m
+O
(zj − 1)Gj (zm+1 , . . . , zn )
j m
|zj − 1|
2
j m
with dH (e) = 0 and Gj (e) = 0 for j m. We want to prove that H = Gj = 0. Consider first v(zm+1 , . . . , zn ) = u(1, . . . , 1, zm+1 , . . . , zn ) = 1 + H (zm+1 , . . . , zn ). v is a holomorphic map from Dn−m into D. If v were not constant, it would map Dn−m into D with v(e) = 1 and dv(e) = 0, in contradiction with Lemma 2.6. Hence H is zero. Suppose now that some Gj is not zero. It is a non-constant holomorphic map, hence it is open and one can find ξm+1 , . . . , ξn such that Gj (ξm+1 , . . . , ξn ) ∈ / R. Consider now w(zj ) = u(1, . . . , zj , . . . , 1, ξm+1 , . . . , ξn ) = 1 + aj + Gj (ξm+1 , . . . , ξn ) (zj − 1) + O |zj − 1|2 . w maps D into D and satisfies w (1) ∈ / R. This contradicts again the Julia–Caratheodory theorem. 2 3. A general sufficient condition In this section, we give a general sufficient condition to ensure that a smooth map φ : Dn → Dn induces a bounded composition operator on A2 (Dn ). This will give a necessary and sufficient statement for the bidisk. Theorem 3.1. Let φ : Dn → Dn be such that φ ∈ C 2 (Dn ). Suppose that, for any q 1, for any I ⊂ {1, . . . , n}, |I | = q, for any ξ ∈ Dn with φI (ξ ) ∈ Tq , the derivative dφI (ξ ) has rank q. Then φ maps continuously Ap (Dn ) into itself. Proof. Let I = {i1 , . . . , iq } ⊂ {1, . . . , n} and let FI = {ξ ∈ Dn ; φI (ξ ) ∈ Tq }. Let also ξ ∈ FI . Since dφI (ξ ) has rank q, one can find J = {j1 , . . . , jq } ⊂ {1, . . . , n} such that Mφ (I, J, ξ ) =
∂φi (ξ ) ∂zj i∈I, j ∈J
is invertible. Since φ is C 1 , this property remains true for any z in a neighbourhood VI (ξ ) = VI (ξ ) × VI (ξ ) of ξ . Here, we write Cn = Cq × Cn−q , the q first coordinates corresponding to (j1 , . . . , jq ).
1976
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
FI is compact and FI ⊂ ξ ∈FI VI (ξ ). By compactness, we can extract a finite covering
mI FI ⊂ GI := l=1 VI (ξl ). By the compactness of Dn \GI , one can find εI > 0 such that ξ∈ / GI
⇒
max 1 − φi (ξ ) εI . i∈I
We then define: • • • •
ε := minI εI ; MI := maxz∈GI det(Mφ−1 (I, J, z)); M := maxI MI ; m = maxI mI ,
where I runs over all subsets of {1, . . . , n} such that there exists ξ ∈ Dn with φI (ξ ) ∈ Tq . We now pick any ζ ∈ Tn and δ ∈ (0, +∞)n and let us estimate V (φ −1 (S(ζ, δ))). We set I := {1 i n; δi < ε}, |I | = q. It is enough to show that V φ −1 S(ζ, δ) C δi2 . i∈I −1 −1 Now, the definition
mI of ε ensures that either φ (S(ζ, δ)) is empty or that φ (S(ζ, δ)) is contained in GI = l=1 VI (ξl ). Let us denote
Ul = z ∈ Dn ; φi (z) − ζi < δi for all i ∈ I ∩ VI (ξl ). One has to control V (Ul ). Let J be coordinates such that Mφ (I, J, ξl ) is invertible. We write any z ∈ Dn as z = (zJ , zJ ) so that Fubini’s theorem yields V (Ul )
1VI (ξl ) zJ V zJ ∈ Dq ; φi zJ , zJ − ζi < δi for all i ∈ I dzJ .
Dn−q
For a fixed zJ , because of the change of variables formula, the volume inside the integral is less than M i∈I δi2 . This implies V (φ −1 (S(ζ, δ))) mM i∈I δi2 which allows us to conclude. 2 Unfortunately, the condition which appears in Theorem 3.1 is not necessary. Indeed, if we consider φ(z) = ((z1 + z2 + z3 )/3, (z1 + z2 + z3 )/3, 0), then it is clear that φ does not satisfy the assumptions of the theorem. However, we will see later that Cφ is continuous on A2 (D3 ). Observe that this example is given on D3 . Such an example cannot exist on the bidisk: Theorem 3.2. Let φ : D2 → D2 be such that φ defines a holomorphic map on a neighbourhood of D2 . Then Cφ is continuous on A2 (D2 ) if and only if, for any ξ ∈ T2 with φ(ξ ) ∈ T2 , dφ(ξ ) is invertible. That is Theorem 1.2 is correct on the bidisk (except that our assumption on the regularity of φ is slightly stronger).
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1977
Proof of Theorem 3.2. The condition is necessary by Theorem 1.2 (we apply its correct part). To prove that the condition is sufficient, we shall apply Theorem 3.1. So, let q ∈ {1, 2}, I ⊂ {1, 2} with |I | = q and ξ ∈ D2 such that φI (ξ ) ∈ Tq . When |I | = 1, we may suppose I = {1}. By the maximum modulus principle, ξ ∈ ∂D2 . By Lemma 2.6, dφ1 (ξ ) is a non-zero linear functional, hence has rank 1. When |I | = 2, ξ belongs to T2 otherwise φ would not depend on one of the two variables, say z2 and this would contradict φ(ξ1 , 1) ∈ T2 and dφ(ξ1 , 1) is invertible. Thus the assumptions of Theorem 3.2 imply that of Theorem 3.1, and Cφ is continuous. 2 Remark 3.3. We can weaken the assumptions of the previous theorem. A look at the proof of it shows that we just need that φ ∈ C 2 (D2 ) and the maps φ(u, ·) and φ(·, u) are holomorphic for any u ∈ T. 4. Two examples In this section, which is purely expository, we intend to study completely the continuity on A2 (D7 ) of two composition operators. Our aim is twofold. Firstly, we want to convince the reader that continuity is a difficult problem: the two symbols will have a very similar definition. One will induce a bounded composition operator while the other one will induce an unbounded composition operator. Secondly, we think that it is a good idea to exhibit on a particular example the methods which will also work in the general case. Example 4.1. Let u(z) = (z1 + · · · + z5 )/5 and let φ(z) = u(z), u(z), u(z), u(z), (z6 + z7 )/2, (z1 + 2z6 + z7 )/4, 0 , ψ(z) = u(z), u(z), u(z), u(z), (z6 + z7 )/2, (2z1 + z6 + z7 )/4, 0 . Then Cφ is continuous on A2 (D7 ) whereas Cψ is not continuous on A2 (D7 ). Proof. We first show that Cψ is not continuous. Let δ > 0 and let δ = (δ, δ, δ, δ, δ 1/2 , δ 1/2 , 2). The volume of S(e, δ) behaves like δ 10 . We will show that the volume of ψ −1 (S(e, δ)) is greater than δ 9+3/4 , showing by Lemma 2.1 that Cψ is not continuous. z belongs to ψ −1 (S(e, δ)) iff ⎧ ⎨ |z1 + z2 + z3 + z4 + z5 − 5| < 5δ, |z6 + z7 − 2| < 2δ 1/2 , ⎩ |2z1 + z6 + z7 − 4| < 4δ 1/2 . Let ε > 0 be small but independent of δ, let R = {z ∈ D; e(z) 1 − εδ}, R 1/2 = {z ∈ D; e(z) 1 − εδ 1/2 } and R = R × R × R × R. Let also, for z = (z1 , . . . , z4 ) ∈ R and for z7 ∈ R 1/2 , Uz = z5 ∈ D; Uz7 = z6 ∈ D;
z5 − (5 − z1 − z2 − z3 − z4 ) < δ ,
z6 − (2 − z7 ) < δ 1/2 .
By Fubini’s theorem, Lemma 2.2 and Lemma 2.4, the volume of the elements z ∈ D7 satisfying
1978
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
(z1 , . . . , z4 ) ∈ R, 3
3
z5 ∈ Uz , z7 ∈ R 1/2 , z6 ∈ Uz7
(3)
3
is greater than δ 2 ×4 δ 2 δ 4 δ = δ 9+ 4 , provided ε is small enough. Moreover, any z ∈ D7 satisfying (3) belongs to ψ −1 (S(e, δ)). The only non-trivial inequality is |2z1 + z6 + z7 − 4| < 4δ 1/2 . By the triangle inequality, |2z1 + z6 + z7 − 4| 2|z1 − 1| + |z6 + z7 − 2|. √ Now, because 1 e(z1 ) 1 − εδ for any z1 ∈ R, one also deduces | m(z1 )| 2εδ and thus |z1 − 1| 3εδ 1/2 showing that z ∈ ψ −1 (S(e, δ)). This proves that Cψ is not continuous, the main reason being that, when we look at z ∈ ψ −1 (S(e, δ)), the last line |2z1 + z6 + z7 − 4| < 4δ 1/2 does not add any constraint on z1 , z6 or z7 . It is a consequence of the two previous inequalities. We also point out that the choice of δ is crucial. For instance, for δ = (δ, δ, δ, δ, 1, 1, 2) or for δ = (δ, δ, δ, δ, δ, δ, 2), the estimation V (ψ −1 (S(e, δ))) CV (S(e, δ)) is valid. Let us now explain why Cφ is continuous. If we look at the z ∈ D7 belonging to φ −1 (S(e, δ)) for the same value of δ, then the last line becomes |z1 + 2z6 + z7 − 4| < 4δ 1/2 and it now adds informations. Indeed, if we combine it with |z6 + z7 − 2| < 2δ 1/2 , they imply |z1 − z7 | < 6δ 1/2 . In particular, we can replace the condition z7 ∈ R 1/2 (which gives a volume δ 3/4 ) by the condition z7 belongs to some disk of radius δ 1/2 (which gives a volume δ). Thus, we gain a factor δ 1/4 which was exactly the missing part to ensure continuity. Of course, we have just prove (1) for a very particular value of ξ and of δ. We have to proceed with the general case. Let ξ ∈ T7 and let δ ∈ (0, 2)7 . Without loss of generality, we may assume that δ1 = min(δ1 , δ2 , δ3 , δ4 ). Furthermore, for φ −1 (S(ξ, δ)) to be non-empty, it is necessary that δ7 is far away from zero. Hence, we just need to prove that V (φ −1 (ξ, δ)) is less than δ18 δ52 δ62 . We try to find an upper bound for the volume of the set of z ∈ D7 with φ(z) ∈ S(ξ, δ), namely satisfying the three following conditions: ⎧ ⎨ |z1 + z2 + z3 + z4 + z5 − 5ξ1 | < 5δ1 , |z6 + z7 − 2ξ5 | < 2δ5 , ⎩ |z1 + 2z6 + z7 − 4ξ6 | < 4δ6 . We split the proof into several cases. Case 1: δ1 δ5 δ6 . We first analyze the condition |z1 + · · · + z5 − 5ξ1 | < 5δ1 . It implies zi ∈ R(ξ1 , 5δ1 ) for i = 1, . . . , 4 and, when z = (z1 , . . . , z4 ) has been fixed, z5 belongs to some disk D(C(z ), 5δ1 ). The two last conditions imply
|z6 + z7 − 2ξ5 | < 2δ5 , z1 − z7 − 4(ξ6 − ξ5 ) < 8δ6 .
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1979
This implies that z7 belongs to some disk D(C(z1 ), 8δ6 ) and that z6 belongs to some disk D(C(z7 ), 2δ5 ). Hence, by Fubini’s theorem and Lemma 2.2, we get that the volume of 3
φ −1 (S(ξ, δ)) is less than δ12
×4 2 2 2 δ1 δ6 δ5 ,
which is exactly equal to δ18 δ53 δ62 .
Case 2: δ1 δ6 δ5 . We do not change anything for z1 , z2 , z3 , z4 . The two last conditions now imply
|2z + z1 + z7 − 4ξ6 | < 4δ6 , 6 z1 − z7 − 4(ξ6 − ξ5 ) < 8δ5
showing that z7 ∈ D(C(z1 ), 6δ5 ) and z6 ∈ D(C(z1 , z7 ), 4δ6 ). The estimation of the volume remains unchanged. Case 3 and Case 4: δ5 δ1 δ6 and δ5 δ6 δ1 . We can proceed exactly like in Case 1, the crucial point being δ5 δ6 . Case 5 and Case 6: δ6 δ1 δ5 and δ6 δ5 δ1 . We can proceed exactly like in Case 2, the crucial point being δ6 δ5 . 2 All the technics of our forthcoming general theorem (estimation of the volumes, triangularization of the conditions, well-ordering of the variables) are already present in this example. We have now to “abstract” them. The difficulty will come from variables which are present in several lines (typically, like z1 in the previous examples). Moreover, the main difference between φ and ψ above is that the restriction of ψ5 and ψ6 to the variables z6 and z7 are equal, which is not the case of φ5 and φ6 . We have to introduce quantities which take this kind of informations into account. This is the content of the next section, where we present our main theorem. 5. Statement of the main result Let φ : Dn → Dn be holomorphic and suppose that φ extends holomorphically in a neighbourhood of Dn . Let ξ ∈ Tn and I ⊂ {1, . . . , n}, |I | = q be such that φI (ξ ) ∈ Tq and I is maximal with respect to this property. Let s be the rank of dφI (ξ ). Let also J = (j (1), . . . , j (s)) be a sequence of I s = I × · · · × I such that (dφj (1) (ξ ), . . . , dφj (s) (ξ )) are independent. For each k ∈ {1, . . . , s}, we introduce the following definitions (we always take the derivatives at ξ ): • rξ,I,J (k) is the number of linear forms in {dφi ; i ∈ I } which are in the subspace span(dφj (1) , . . . , dφj (k) ) and not in span(dφj (1) , . . . , dφj (k−1) ). • qξ,I,J (k) is the number of “new” variables which appear in dφj (k) that is qξ,I,J (k) is the ∂φ ∂φ = 0 whereas ∂zj (m) = 0 for cardinal number of the integers l ∈ {1, . . . , n} such that ∂zj (k) l l m < k. • Eξ,I,J (k) is the set of new variables in dφj (k) . In particular, the cardinal number of Eξ,I,J (k) is qξ,I,J (k). • tξ,I,J (k) is equal to the supremum of the integers t k such that the restriction of dφj (k) to the variables appearing from step t, namely dφj (k)|Eξ,I,J (t)∪···∪Eξ,I,J (k) , does not belong to the span of dφj (t)|Eξ,I,J (t)∪···∪Eξ,I,J (k) , . . . , dφj (k−1)|Eξ,I,J (t)∪···∪Eξ,I,J (k) .
1980
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
More precisely, t being fixed, we can write z = (z , z ) where z corresponds to the variables which appear for the first time in dφj (t) , dφj (t+1) , . . . and z corresponds to the other variables. We write ψj (m) (z ) = dφj (m) (z , 0) and we ask that ψj (k) does not belong to the span of ψj (t) , . . . , ψj (k−1) . If we look at the examples of Section 4, this function tξ,I,J will be that which will quantify that the restriction of ψ5 and ψ6 to the variables z6 and z7 are equal, which is not the case of φ5 and φ6 . Before going further, we comment these definitions. They look rather complicated (at least tξ,I,J ). However, they can be easily computed for each specific choice of φ and ξ using a variant of Gauss algorithm: see the forthcoming examples for detailed computations (the lecture of these examples can also help to understand the definitions). It would be nice if they could be expressed using the Jordan decomposition of dφ(ξ ). Unfortunately, this is not the case. For instance, the maps φ and ψ of Section 4 have similar Jordan reduction, but the functions r, q, E and t take different values. An important point to keep in mind in that the functions r, q, E and t do not depend only on linear algebra properties of dφ(ξ ). Combinatorial properties of the numbers of variables which come in each linear functional are also very important to compute their values. It is worth to notice that tξ,I,J (k) is well-defined. Indeed, E = Eξ,I,J (1) ∪ · · · ∪ Eξ,I,J (k) corresponds exactly to all the variables appearing in dφj (1) , . . . , dφj (k) . Thus, dφj (k)|E does not belong to the span of dφj (1)|E , . . . , dφj (k−1)|E because the linear forms are independent. Observe also that qξ,I,J (k) > 0 implies that tξ,I,J (k) = k since in that case dφj (k) (ξ )|Eξ,I,J (k) is a non-zero linear form. Moreover, if tξ,I,J (k) is equal to t, then qξ,I,J (t) is positive. Indeed, if qξ,I,J (t) is equal to 0, then Eξ,I,J (t) ∪ · · · ∪ Eξ,I,J (k) = Eξ,I,J (t + 1) ∪ · · · ∪ Eξ,I,J (k) =: F and / span(dφj (t)|F , . . . , dφj (k−1)|F ) dφj (k)|F ∈ ⇒
dφj (k)|F ∈ / span(dφj (t+1)|F , . . . , dφj (k−1)|F ).
Finally, we can also control the number of solutions of tξ,I,J (l) = k: Lemma 5.1. Let k ∈ {1, . . . , s} and let F (k) = {l s; tξ,I,J (l) = k}. Then card(F (k)) qξ,I,J (k). Proof. Let l ∈ F (k). By assumption, there exist coefficients βi,l such that ψl = dφj (l) − l−1 i=k+1 βi,j dφj (i) does not depend on the variables appearing in Eξ,I,J (k + 1) ∪ · · · . Moreover, again by the definition of t, the linear forms ψl|Eξ,I,J (k)∪··· , l ∈ F (k) are linearly independent. This implies, because they all vanish on Eξ,I,J (k + 1) ∪ · · · , that the linear forms ψl|Eξ,I,J (k) , l ∈ F (k), are linearly independent. Thus, card(F (k)) card(Eξ,I,J (k)) = qξ,I,J (k). 2 We then define two finite trees Rξ,I,J and Lξ,I,J as follows. A node will be indexed by a finite sequence (l1 , . . . , ls ) with • l1 = 0; • there exists m s such that li+1 − li ∈ {0, 1} for i < m and li = ∞ for i > m. The integer m which appears above can be seen as the depth of the node in the tree. In particular, the node (0, ∞, . . . , ∞) is the root of the tree. To each node, we associate two values (we are defining two trees) as follows. For the root, we define
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1981
1 3 + qξ,I,J (1), 2 2 Rξ,I,J (0, ∞, . . . , ∞) = 2rξ,I,J (1). Lξ,I,J (0, ∞, . . . , ∞) =
If the values of Lξ,I,J (0, l2 , . . . , lm , ∞, . . .) and Rξ,I,J (0, l2 , . . . , lm , ∞, . . .) have been set, then we define the values at the two sons of the node (0, l2 , . . . , lm , ∞, . . .) as follows (recall that lm+1 − lm ∈ {0, 1}): • Rξ,I,J (l1 , . . . , lm+1 , ∞, . . .) = Rξ,I,J (l1 , . . . , lm , ∞, . . .) + • If qξ,I,J (m + 1) > 0, then
1 2lm+1
Lξ,I,J (l1 , . . . , lm+1 , ∞, . . .) = Lξ,I,J (l1 , . . . , lm , ∞, . . .) +
× 2rξ,I,J (m + 1).
1 2lm+1
1 3 + qξ,I,J (m + 1) . 2 2
• If qξ,I,J (m + 1) = 0, then Lξ,I,J (l1 , . . . , lm+1 , ∞, . . .) = Lξ,I,J (l1 , . . . , lm , ∞, . . .) 0 if lm+1 > ltξ,I,J (m+1) , + 1 if lm+1 = ltξ,I,J (m+1) . lm+1 +1 2
It is not very difficult to compute the value of Rξ,I,J at a node (l1 , . . . , ls ). It is exactly Rξ,I,J (l1 , . . . , ls ) =
s 2rξ,I,J (k) k=1
2 lk
.
This is slightly more difficult for Lξ,I,J . The idea is to group together the lines where tξ,I,J (m) = k for the same value of k (observe that qξ,I,J (k) > 0). We then find 1 1 3 q . (k) + Lξ,I,J (l1 , . . . , ls ) = ξ,I,J 2 lk 2 2 k; qξ,I,J (k)>0
t (m)=k lm =lk
Given two trees Lξ,I,J and Rξ,I,J , we say that Lξ,I,J Rξ,I,J if, for each node (l1 , . . . , lm , ∞, . . .), the inequality Lξ,I,J (l1 , . . . , lm , ∞) Rξ,I,J (l1 , . . . , lm , ∞) holds. Our main theorem now reads Theorem 5.2. Suppose that Cφ is continuous on A2 (Dn ). Then for any ξ, I, J as above, one has Lξ,I,J Rξ,I,J . When φ is linear, Cφ is continuous on A2 (Dn ) if and only if, for any ξ, I, J as above, Lξ,I,J Rξ,I,J . The statement of Theorem 5.2 gives an effective algorithm to determine if a linear map induces a bounded composition operator on A2 (Dn ). Here is how it works with the examples of Section 4. Example 5.3. Let u(z) = (z1 + · · · + z5 )/5 and let ψ(z) = u(z), u(z), u(z), u(z), (z6 + z7 )/2, (2z1 + z6 + z7 )/4, 0 . Then Cψ is not continuous on A2 (D7 ).
1982
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
Proof. Let ξ = e, I = {1, 2, 3, 4, 5, 6}. The rank of dφI (ξ ) is equal to 3. We can define J by j (1) = 1, j (2) = 5, j (3) = 6. One can easily compute r(1) = 4, q(1) = 5,
r(2) = 1, q(2) = 2,
EJ (1) = {z1 , z2 , z3 , z4 , z5 }, t (1) = 1,
r(3) = 1, q(3) = 0,
EJ (2) = {z6 , z7 }, t (2) = 2.
EJ (3) = ∅,
For the value of t (3), observe that EJ (2) = {z6 , z7 } and that dψj (3)|EJ (2) = 12 dψj (2)|EJ (2) = z6 +z7 4 . Thus t (3) < 2 and necessarily t (3) = 1. The computation of R is easy. For L, is not hard to show that 1 3 + × 5 = 8, 2 2 1 3 L(0, 0, ∞) = 8 + + × 2 = 11.5, 2 2 1 1 3 L(0, 1, ∞) = 8 + + × 2 = 9.75. 2 2 2
L(0, ∞, ∞) =
To compute the value at the last nodes, we observe that lt (3) = l1 so that L(0, 0, 0) = 11.5 + 0.5 = 12, L(0, 1, 1) = 9.75,
L(0, 0, 1) = 11.5, L(0, 1, 2) = 9.75.
We then get the two following trees: 8
8
11.5
12
9.75
11.5
9.75
10
9.75
12
9
11
10
9.5
Cφ is not continuous because one node of R is greater than the corresponding node of L. Example 5.4. Let u(z) = (z1 + · · · + z5 )/5 and let φ(z) = u(z), u(z), u(z), u(z), (z6 + z7 )/2, (z1 + 2z6 + z7 )/4, 0 . Then Cφ is continuous on A2 (D7 ).
2
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1983
Proof. The only choice for ξ and I is ξ = e and I = {1, 2, 3, 4, 5, 6}. Suppose first that j (1) = 1, j (2) = 5, j (3) = 6 (of course, j (1) ∈ {2, 3, 4} would not change anything). The values of the functions r, q, E, t are now r(1) = 4,
r(2) = 1,
q(1) = 5, EJ (1) = {z1 , z2 , z3 , z4 , z5 }, t (1) = 1,
r(3) = 1,
q(2) = 2, EJ (2) = {z6 , z7 }, t (2) = 2,
q(3) = 0, EJ (3) = ∅, t (3) = 2
(the only change is for the value of t (3) which is now equal to 2 because dφj (3)|EJ (2) = (2z6 + 27 )/4 is not proportional to dφj (2)|EJ (2) = (z6 + z7 )/2). The corresponding trees are now 8
8
11.5
12
9.75
11.5
10
10
9.75
12
9
11
10
9.5
In that case LJ RJ . To conclude, one should (as in Section 4) consider the five other possibilities for J . The easy verifications are left to the reader. 2 Our last example was introduced to point out that the condition which appears in Theorem 3.1 is not necessary for Cφ to be continuous. Example 5.5. Let φ : D3 → D3 be defined by φ(z) = ((z1 + z2 + z3 )/3, (z1 + z2 + z3 )/3, 0). Then Cφ is continuous on A2 (D3 ). Proof. We have to take ξ = e and I = {1, 2}, so that dφI (ξ ) has rank 1. Hence, our trees have only one node! Now, r(1) = 2, q(1) = 3, t (1) = 4 so that R(0) = 4 and L(0) = 32 × 3 + 12 = 5. Thus, L R and Cφ is continuous on A2 (D3 ). 2 6. Proof of the sufficient part In this section, we intend to prove the “sufficient part” of our main theorem. Namely, we start with φ(z) = Az for some matrix A = (ai,j ) ∈ M n (C) satisfying the assumptions of Theorem 5.2. φ maps Dn into Dn iff, for any i ∈ {1, . . . , n}, j |ai,j | 1. We divide the proof into two steps. The first one is to understand how the conditions of Theorem 5.2 can be read on the matrix A. 6.1. Rows with the same direction Definition 6.1. We say that two vectors u ∈ Cn and v ∈ Cn have the same direction if there exists some θ ∈ R such that, for any j ∈ {1, . . . , n}, either vj = 0 or uj = rj eiθ vj for some rj 0.
1984
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
This notion of vectors with the same direction will be relevant for us when applied to the rows of the matrix A. For i ∈ {1, . . . , n}, ai will denote the row vector ai = (ai,1 , . . . , ai,n ). The statement that we need is the following: Proposition 6.2. There exists δ0 > 0 such that the following properties hold: (a) If j |ai,j | < 1, then j |ai,j | < 1 − δ0 . which do not have the same direction, then for any z ∈ Tn , either (b) If ai and al are two rows | j ai,j zj | < 1 − δ0 or | j al,j zj | < 1 − δ0 . (c) If I ⊂ {1, . . . , n} is such that • all rows in I have the same direction, • | j ai,j | = 1 for any i ∈ I , then one can find z ∈ Tn such that | j ai,j zj | = 1 for any i ∈ I . Proof. The proof of the proposition is very easy. (a) is clear, (c) can be proved by induction. n with | To prove (b), pick a and a two rows such that there exists z ∈ T i l j ai,j zj | = 1 and | j al,j zj | = 1. Since j |ai,j zj | 1 and j |al,j zj | 1, one may find θ, φ ∈ R such that, for any j , ai,j zj = |ai,j zj |eiθ , al,j zj = |al,j zj |eiφ . Thus, ai and al c have the same direction.
2
Let us now comment how Theorem 5.2 can be expressed for linear maps. For ξ ∈ Tn with φI (ξ ) ∈ Tq , and I maximal with this property, then (i) two rows in I always have the same direction; (ii) for any i ∈ I , j |ai,j | = 1, and I is maximal with respect to (i) and (ii). Conversely, if I ⊂ {1, . . . , n} satisfies properties (i) and (ii) above and is maximal with respect to these properties, then one can find ξ ∈ Tn with φI (ξ ) ∈ Tq and I is maximal with respect to this last property. Moreover, for a linear map, the derivative is constant. Summarizing this, we have just to compare the trees RI,J and LI,J for those subsets I ⊂ {1, . . . , n} satisfying (i) and (ii) and maximal for ⊂, and for the associated subsets J . Observe in particular that we have to compare a finite number of trees and that this gives rise to a valuable algorithm: given a linear map φ : Dn → Dn , we can decide in a finite number of steps whether Cφ is continuous on A2 (Dn ) or not. 6.2. The proof We start with some ξ ∈ Tn and some δ ∈ (0, +∞)n and we suppose that φ −1 (S(ξ, δ)) is nonempty. δ0 is defined as in Proposition 6.2. We denote by I˜ = {i; δi δ0 }. All vectors ai , i ∈ I˜, have the same direction. Let I ⊂ {1, . . . , n} containing I˜, satisfying (i) and (ii), and maximal with respect to ⊂. We then define J = (j (1), . . . , j (s)), where s is the rank of dφI , as follows: • j (1) is such that δj (1) = min{δi ; i ∈ I };
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1985
• j (2) is such that δj (2) = min{δi ; i ∈ I and φi ∈ / span(φj (1) )}; • more generally, for k s, j (k) is defined by
/ span(φj (1) , . . . , φj (k−1) ) . δj (k) = min δi ; i ∈ I and φi ∈ When several choices are possible, we take arbitrarily one of them. Among our assumptions on the trees, we know that for this specific choice of I and J , LI,J RI,J . For notational simplicity, we will assume that I = {1, . . . , q}, J = {1, . . . , s} and we will set δ1 = δ, δi = δ αi for i ∈ {1, . . . , q}, 1 = α1 α2 · · · αn > 0. From now on, throughout this section, we will forget the subscripts ξ, I, J on all the functions defined in Section 5. Observe that the volume of S(ξ, δ) is comparable to δ12 . . . δq2 (since δi > δ0 for all i > q, and δ0 is defined independently of ξ and δ). Thus, by the very definition of r and J , we just need to prove that V (φ −1 (S(ξ, δ))) is less than δ 2α1 r1 +2α2 r2 +···+2αs rs . To do that, we will just use that
φ −1 S(ξ, δ) ⊂ z ∈ Dn ; φl (z) − ξl < δ αl , l = 1, . . . , s := A1 . Our intention is to estimate the volume by Fubini’s theorem. We will separate the variables as follows. Let l ∈ {1, . . . , s} and let k = t (l). Define ψl exactly as in Lemma 5.1, namely ψl = φl −
l−1
βi,l φi
i=k+1
does not depend on the variables appearing in E(k + 1) ∪ · · · ∪ E(l). Moreover, the linear forms ψl|E (k) , l ∈ F (k), are linearly independent (recall that Fk = {l s; t (l) = k}). The coefficients βi,l do not depend on ξ or on δ and the sequence (αi ) is non-increasing. Thus, one can find C > 0 such that
A1 ⊂ ψl (z) − ωl < Cδ αl , l = 1, . . . , s := A2 for ωl = ξl − l−1 i=t (l)+1 βi,l ξi . Observe that, if q(l) > 0 (or, equivalently, t (l) = l), then ψl = φl and ωl = ξl . Let us now write E(k) = {zk,1 , . . . , zk,p }. Since the linear forms ψl|E (k) , t (l) = k, are independent, we can triangularize them with respect to the variables in E(k). Namely, up to a reordering of the variables in E(k), if we write F (k) = {m1 , . . . , mu } with u p, there exist coefficients γi,j such that u∗mj := ψmj −
γi,j ψmi
i<j
can be written ∗ , u∗mj = θmj zk,j + ∗zk,j +1 + · · · + ∗zk,p + vm j
1986
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
∗ just belong to E(1) ∪ · · · ∪ E(k − 1) and θ where the variables appearing in vm mj is non-zero. j As above,
A2 ⊂ z ∈ Dn ; u∗l (z) − ζl < Cδ αl , l = 1, . . . , s := A3 for some well-chosen constant C > 0 and, as above, when q(l) > 0, then u∗l = φl and ζl = ξl . We will consider A3 in the following form:
A3 =
z ∈ Dn ; u∗l (z) − ζl < Cδ αl .
k; q(k)>0 l∈F (k)
We begin with k = 1 and we write F (1) = {m1 , . . . , mu }, m1 = 1. For notational simplicity, we write E1 = {z1 , . . . , zp }, p = q(1). For z to belong to l∈F (1) {z ∈ Dn ; |u∗l (z) − ζl | < Cδ αl }, it is necessary that ⎧ |a1,1 z1 + · · · + a1,p zp − ζ1 | < Cδ α1 , ⎪ ⎪ ⎪ ⎪ ⎨ |θm2 z2 + ∗| < Cδ αm2 , ⎪ ... ⎪ ⎪ ⎪ ⎩ |θmu zu + ∗| < Cδ αmu . Since
j
|ai,j | = 1 and |ζ1 | = 1, the first line implies that e(1 − ζ1 zj ) Cδ α1 for all j ∈ (j )
{1, . . . , p}. We then define sets V1 by induction: (0)
• V1 = {(zu+1 , . . . , zp ) ∈ Dp−u ; e(1 − ζ1 zj ) Cδ α1 for j = u + 1, . . . , p} (we use here the information given by the first line for the last variables). • Using the first line and the last line, we get information on zu when zu+1 , . . . , zp are fixed: (1) (0) V1 = (zu , . . . , zp ) ∈ Dp−u+1 ; (zu+1 , . . . , zp ) ∈ V1 , e(1 − ζ1 zu ) Cδ α1
and |θmu zu + ∗zu+1 + · · · + ∗zp − ζmu | < Cδ αmu . (2)
(u−1)
• Inductively, we define V1 , . . . , V1 (j +1)
V1
by
(0) = (zu−j , . . . , zp ) ∈ Dp−u+j +1 ; (zu−j +1 , . . . , zp ) ∈ V1 , e(1 − ζ1 zu−j ) Cδ α1
α and |θmu−j zu−j + ∗zu−j +1 + · · · | < Cδ mu−j . (u)
• We finally define V1
by
(u) (u−1) V1 = (z1 , . . . , zp ) ∈ Dp ; (z2 , . . . , zp ) ∈ V1 , e(1 − ξ1 z1 ) Cδ α1
and a1,1 z1 − (· · · + ζ1 ) < Cδ α1 .
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
In particular,
l∈F (1) {z ∈ D
n;
1987
|u∗l (z) − ζl | < Cδ αl } is contained in V1 . Now, by Lemma 2.3 (u)
(u)
and by Fubini’s theorem, it is not difficult to see that the volume of V1 3
δ α1 2 (p−u)
u
is less than
αm 3 α (1+ α i ) 1 . min δ 2 α1 , δ 1
i=1
With the notations introduced in Section 5, this is also equal to 3
δ 2 α1 q(1)
u
α1 min 1, δ αmi − 2
i=1
which is also equal to δ
( 32 α1 q(1)+ t (m)=1,
α αm 21
(αm −
α1 2 ))
(4)
.
Thus, the volume of l∈F (1) {z ∈ Dn ; |u∗l (z) − ζl | < Cδ αl } is less than (4). Let now k2 be the least integer k > 1 with q(k) > 0. We turn to the computation of the volume of l∈F (k2 ) {z ∈ Dn ; |u∗l (z) − ζl | < Cδ αl }. We write E(k2 ) = {zp+1 , . . . , zp }, p − p = q(k2 ), and F (2) = {mp+1 , . . . , mu }, mp+1 = k2 . We want that ⎧ |ak2 ,p+1 zp+1 + · · · + ak2 ,p zp + ak2 ,1 z1 + · · · + ak2 ,p zp − ζk2 | < Cδ αk2 , ⎪ ⎪ ⎪ αm ⎪ ∗ ⎪ ⎨ θmp+2 zp+2 + ∗ + vmp+2 (z1 , . . . , zp ) − ζmp+2 < Cδ p+2 , .. ⎪ ⎪ . ⎪ ⎪ ⎪ ⎩ θ z + ∗ + v ∗ (z , . . . , z ) − ζ < Cδ αmu . m u u p m u m u 1 We will proceed exactly as before, except that we will assume now that the variables (z1 , . . . , zp ) (u) are fixed in V1 . Precisely, we set:
• V2 = {(z1 , . . . , zp , zu +1 , . . . , zp ) ∈ Dp+p −u ; (z1 , . . . , zp ) ∈ V1 and e(1 − ζk2 zj ) Cδ αk2 for j = u + 1, . . . , p }. • Using the first line and the last line, we get informations on zu when zu +1 , . . . , zp are fixed: (0)
(u)
(1) (0) V2 = (z1 , . . . , zp , zu , . . . , zp ) ∈ Dp+p −u +1 ; (z1 , . . . , zp , zu +1 , . . . , zp ) ∈ V2 , e(1 − ζk2 zu ) Cδ αk2 and
θm zu + ∗zu +1 + · · · + ∗zp + v ∗ (z1 , . . . , zp ) − ζm < Cδ αmu . m u u u (u −p−1)
(2)
• In the same vein and inductively, we define V2 , . . . , V2
(u −p)
and finally V2
.
Using Fubini’s theorem and Lemma 2.3, we obtain that
(u ) ( 32 α1 q(1)+ δ V V2
α t (m)=1, αm 21
(αm −
α1 2 ))
×δ
( 32 αk2 q(k2 )+
αk t (m)=k2 , αm 22
(αm −
αk 2 2
))
.
1988
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
The argument is exactly similar for the other values of k with q(k) > 0 and we finally find that V φ −1 S(ξ, δ) δ
3 k; q(k)>0 ( 2 αk q(k)+ t (m)=k, αm αk 2
(αm −
αk 2
))
.
Thus, we would like to prove that 3 αk αm − αk q(k) + 2α1 r1 + · · · + 2αs rs . 2 2
(5)
t (m)=k α αm 2k
k; q(k)>0
It is time to look carefully at the assumption L R. Suppose that αi = 21li where (l1 , . . . , ls ) is the index of a node in these trees, namely l1 = 0, li+1 − li ∈ {0, 1} for i less than or equal to some m, and li = ∞ for i > m + 1. As observed above, L(l1 , . . . , ls ) =
3 αk αk q(k) + , 2 2 t (m)=k lm lk
q; q(k)>0
R(l1 , . . . , ls ) = 2α1 r1 + · · · + 2αs rs . Now, lm = lk iff αm αk /2. Indeed, if lm is not equal to lk , then lm lk + 1 and αm αk /2 (recall that m k if t (m) = k). Moreover, when lm = lk , αk /2 is equal to αm − αk /2. Hence, L(l1 , . . . , ls ) =
3 αk αm − αk q(k) + 2 2
k; q(k)>0
t (m)=k α αm 2k
and the condition L R means that (5) is true when αi = 21li and (l1 , . . . , ls ) is the index of a node in the trees. The general case can be deduced by applying a convexity argument. Precisely, let R ∈ {,}s be an s-uple of or and define
FR = 1 = α1 α2 · · · αs > 0; ∀m ∈ {1, . . . , s}, αm Rm αt (m) /2 . It is clear that {1 = α1 α2 · · · αs 0} is the union of the sets FR , for R describing all choices of inequality signs, { , }s . Thus, it suffices to verify (5) on each FR . So, we may fix some R. FR is convex, and condition (5) is linear in α1 , . . . , αs . Thus, by the Krein–Milman theorem, it suffices to verify (5) at the extreme points of FR . Now, Lemma 6.3 below shows that the extreme points of FR are among the s-uple (α1 , . . . , αs ) with αi = 21li and (l1 , . . . , ls ) is the index of a node in the trees. Since (5) has already been proved in this case and is trivial in the second one, this ends the proof of the sufficient part of Theorem 5.2, provided the proof of the forthcoming lemma. Lemma 6.3. Let s 1, E ⊂ {(i, j ) ∈ {1, . . . , s}2 ; i j } and R = (Ri,j )(i,j )∈E with Ri,j ∈ { , , =}. Let also G be a partition of {1, . . . , s}. Define
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1989
FE,R,G = 1 = α1 · · · αs = 0; ∀(i, j ) ∈ E, αj Ri,j αi /2
∀G ∈ G, ∀(u, v) ∈ G 2 , αu = αv . Then the extreme points of FE,R,G are among the points (α1 , . . . , αs ) with αi = li+1 − li ∈ {0, 1, +∞} for i = 1, . . . , s − 1.
1 2li
, l1 = 0,
Proof. We argue by induction of s, the result being clear for s = 1 or s = 2. Let (α1 , . . . , αs ) be ˜ and G ˜ R ˜ as follows: an extremal point of FE,R,G . Suppose first that αs = αs−1 . We define E, ˜ is defined from G by deleting s in the set which contains it; • G • E˜ = {(i, j ) ∈ E; 1 i j s − 1} ∪ {(t, s − 1); (t, s) ∈ E}; ˜ i,j is defined by • R ˜ i,j = Ri,j if 1 i j s − 2; – R ˜ t,s−1 = Rt,s−1 if (t, s − 1) ∈ E and (t, s) ∈ – R / E or if (t, s − 1) ∈ E, (t, s) ∈ E and Rt,s = Rt,s−1 ; ˜ t,s−1 = Rt,s if (t, s) ∈ E and (t, s − 1) ∈ / E; – R ˜ – Rt,s−1 = “ = ” otherwise, namely when (t, s − 1) and (t, s) belong to E, and Rt,s and Rt,s−1 have different values. The (s − 1)-uple (α1 , . . . , αs−1 ) belong to FE, ˜ ,G ˜ R ˜ (the constraints that we add are automatically satisfied since αs = αs−1 ). Suppose that it is not an extreme point of FE, ˜ ,G ˜ R ˜ . Then (α1 , . . . , αs−1 ) =
1 1 α1 , . . . , αs−1 + α1 , . . . , αs−1 , 2 2
. Then (α , . . . , α ) and (α , . . . , α ) do belong to and αs = αs−1 with α = α. Define αs = αs−1 s s 1 1 ˜ ˜ FE, ˜ ,G ˜ R ˜ (because of the definition of E and R) and (α1 , . . . , αs ) is not extremal, a contradiction. Thus, (α1 , . . . , αs−1 ) is an extreme point of FE, ˜ ,G ˜ R ˜ which implies, by induction hypothesis, that
α1 = 21li for i s − 1 with li+1 − li ∈ {0, 1, +∞} and l1 = 0. Since αs = αs−1 , this proves the lemma in that case. Suppose now that αs = αs−1 , namely that αs < αs−1 . Let
M = t < s; (t, s) ∈ E and αs = αt /2 . ˜ and G ˜ R ˜ as follows: We define E,
˜ is defined from G by gluing together the sets G ∈ G such that there exists t ∈ M ∩ G. Of • G course, we also delete {s}, which appears in G since αs < αs−1 ; • E˜ = {(i, j ) ∈ E; i j s − 1}; ˜ i,j = Ri,j for any (i, j ) ∈ E. ˜ • R As before, we intend to show that (α1 , . . . , αs−1 ) is an extreme point of FE, ˜ ,G ˜ R ˜ (observe that it really belongs to this set). If this is not the case, one can write (α1 , . . . , αs−1 ) =
1 1 α , . . . , αs−1 + α1 , . . . , αs−1 2 1 2
1990
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
) = (α , . . . , α with (α1 , . . . , αs−1 1 s−1 ). If M is empty, the constraints αs Rs,u αu /2 are strictly satisfied for any u with (u, s) ∈ E (namely αs < αu /2 or αs > αu /2). Thus if we choose ) and (α , . . . , α ) above very close to (α , . . . , α (α1 , . . . , αs−1 1 s−1 ), the conditions 1 s−1 α sRs,u αu /2 and α sRs,u αu /2 keep being satisfied. Thus, (α1 , . . . , αs ), (α1 , . . . , αs ) ∈ FE,R,G and
(α1 , . . . , αs ) =
1 1 α1 , . . . , αs + α1 , . . . , αs , 2 2
a contradiction. If M is non-empty, we set αs = αt /2 and αs = αt /2 for any t ∈ M. As above, one can ensure ) that (α1 , . . . , αs ) and (α1 , . . . , αs ) belong to FE,R,G , provided we have chosen (α1 , . . . , αs−1 and (α1 , . . . , αs−1 ) very close to (α1 , . . . , αs−1 ). Thus, in both cases, αi = 21li for i s − 1 with li+1 − li ∈ {0, 1, +∞} and l0 ∈ {0, +∞}. To conclude, we observe that if M is non-empty, αs = αt /2 has the desired form. On the contrary, when M = ∅, every condition on αs is strictly satisfied. This implies that αs = 0. Otherwise, we could write 1 1 (α1 , . . . , αs ) = (α1 , . . . , αs + ε) + (α1 , . . . , αs − ε) 2 2 with (α1 , . . . , αs ± ε) ∈ FE,R,G for ε small enough.
2
Remark 6.4. The sufficient part of Theorem 5.2 remains valid for an affine map with a similar proof. 7. Proof of the necessary part In this section, we intend to prove the “necessary part” of our main theorem. So we start with some φ : Dn → Dn holomorphic in a neighbourhood of Dn . Let ξ ∈ Tn , I, J ⊂ {1, . . . , n} with φI (ξ ) ∈ Tq and such that the condition of our main theorem fails for ξ, I, J . Namely, there exists a node (l1 , . . . , ls ) such that Lξ,I,J (l1 , . . . , ls ) < Rξ,I,J (l1 , . . . , ls ). For notational convenience, we suppose that ξ = e, I = {1, . . . , q}, dφI (ξ ) has rank s, J = {1, . . . , s} and φI (e) = (1, . . . , 1). From now on, we will forget throughout this section 1
the subscript ξ, I, J . Let δ > 0 and set, for i = 1, . . . , s, δi = δ 2li . For k ∈ {s + 1, . . . , q}, δk is defined by 1
δk = δ 2li
provided dφk belongs to span(dφ1 , . . . , dφi ) and does not
belong to span(dφ1 , . . . , dφi−1 ) (observe that dφk belongs to span(dφ1 , . . . , dφs ) for s + 1 k q). For k > q, we set δk = 2 and as usual, δ = (δ1 , . . . , δn ). This part of the proof will be done if we are able to show that lim
δ→0
V (φ −1 (S(e, Cδ))) V (S(e, δ))
= +∞
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1991 s
2ri
for some fixed constant C > 0. It can be observed that V (S(e, δ)) behaves exactly like δ i=1 2li = δ R(l1 ,...,ls ) . Let us now give a lower bound for V (φ −1 (S(e, Cδ))). For i q, using Corollary 2.7, φi writes φi (z) = 1 +
ai,j (zj − 1) + O
j 1
|zj − 1|2
j 1, ai,j =0
with ai,j 0. The condition ai,j = 0 implies that zj belongs to E(1) ∪ · · · ∪ E(i). We then deduce that z ∈ φ −1 (S(e, Cδ)) as soon as, for all i q, δi and a (z − 1) |zj − 1|2 δi i,j j j ∈E (1)∪···∪E (i)
j 1
namely dφi (e)(z1 − 1, . . . , zn − 1) δi
and
|zj − 1|2 δi .
j ∈E (1)∪···∪E (i)
We now triangularize these inequalities like in the “sufficient part” of the proof. Precisely, ψl and u∗l are defined from the linear forms dφi (e), 1 i, l s, like in Section 6 (here, they were defined using φi but φ was linear!). Let us also set
A1 := z ∈ Dn ; dφi (z1 − 1, . . . , zn − 1) δi for all i s . Since we just triangularize the system (each dφi is a linear combination of the linear forms u∗j , with j i), and since the sequence (δi ) is non-decreasing, A1 contains the set
A2 := z ∈ Dn ; u∗i (z1 − 1, . . . , zn − 1) εδi for all i s for ε > 0 small enough (and independent of δ). As before, we write A2 =
z ∈ Dn ; u∗l (z1 − 1, . . . , zn − 1) εδl .
k; q(k)>0 l∈F (k)
Webegin with k = 1 and we write F (1) = {m1 , . . . , mu } and E(1) = {z1 , . . . , zp }. For z to belong to l∈F (1) {z ∈ Dn ; |u∗l (z1 − 1, . . . , zn − 1)| εδl }, it suffices that ⎧ 1 ⎪ l ⎪ ⎪ a1,1 (z1 − 1) + · · · + a1,p (zp − 1) < εδ 2 1 , ⎪ ⎪ ⎪ 1 ⎪ ⎨ θ (z − 1) + ∗ < εδ 2lm2 , m2
2
⎪ .. ⎪ ⎪ ⎪ . ⎪ ⎪ 1 ⎪ ⎩ θmu (zu − 1) + ∗ < εδ 2lmu . We will separate these conditions in two different cases. Let v be the biggest integer such that lmv = l1 . v is equal to the cardinal number of {m; lm = l1 }. For j v + 1 (and j p) we just
1992
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003 1
1
impose that 1 − ηδ 2l1 e(zj ) 1 for some small η > 0. Then |zj − 1| η1/2 δ 2l1 +1 . Hence, the conditions 1 θm (zj − 1) + ∗(zj +1 − 1) + · · · + ∗(zp − 1) < εδ 2lmj j
are automatically satisfied for v + 1 j p. For a fixed j in that interval, observe also that zj 3
×
1
can live in a subset of D of volume δ 2 2l1 . For the other lines, we go backward. We first study 1 θm (zv − 1) + ∗(zv+1 − 1) + · · · + ∗(zp − 1) < εδ 2l1 . v
(6)
1
When zv+1 , . . . , zp have been fixed with the condition 1 − ηδ 2l1 e(zj ) 1, (6) will be satis1
1
fied as soon as zv belongs to some disk of center ω satisfying 1 − Cηδ 2l1 e(ω) 1 + Cηδ 2l1 1
1
and | m(ω)| (Cηδ 2l1 )1/2 and of radius like εδ 2l1 . By Lemma 2.4, these zv can live in a sub2
set of D of volume δ 2l1 , provided η > 0 is small enough. Moreover, it is worth noting that 1
1
1 − Cεδ 2l1 e(zv ) 1. Restricting the radius of the disk to ε δ 2l1 (which does not change the 1
order of growth of its volume), we can always assume that 1 − ε δ 2l1 e(zv ) 1 with ε much smaller than ε. This allows us to do exactly the same thing for the previous line θ m
v−1
1 (zv−1 − 1) + ∗(zv − 1) + · · · + ∗(zp − 1) < εδ 2l1 ,
1
1 e(z ) 1 for j = v, . . . , p. We can carry on this the crucial point being only 1 − ε δ 2l j process to conclude that z belongs to l∈F (1) {z ∈ Dn ; |u∗l (z1 − 1, . . . , zn − 1)| < εδl } as soon as (z1 , . . . , zp ) belongs to some set V(1) satisfying
⎧ 2v 3 p−v 1 3 v 1 3 1 ⎨ V V(1) δ 2l1 δ 2 × 2l1 = δ 2l1 ( 2 p+ 2 ) = δ 2l1 ( 2 q(1)+ t (m)=1, lm =l1 2 ) , 1 ⎩ 1 − ε δ 2l1 e(zj ) 1 for any (z1 , . . . , zp ) ∈ V(1) and any j ∈ {1, . . . , p}. From now on, (z1 , . . . , zp ) will always be considered as fixed in V(1). We now consider k2 the least integer k > 1 with q(k) > 0 and we turn to give a lower bound for the volume of
z ∈ Dn ; u∗l (z1 − 1, . . . , zn − 1) εδl ∩ V(1). l∈F (k2 )
We write E(k2 ) = {zp+1 , . . . , zp } and F (k2 ) = {mp+1 , . . . , mu }. We are looking for (zp+1 , . . . , zp ) such that
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1993
⎧ 1 ⎪ ⎪ ak ,p+1 (zp+1 − 1) + · · · + ak ,p (zp − 1) + ak ,1 (z1 − 1) + · · · + ak ,p (zp − 1) < Cδ 2lk2 , ⎪ 2 2 2 ⎪ 2 ⎪ ⎪ 1 ⎪ ⎪ l ⎨ θmp+2 (zp+2 − 1) + ∗ + ∗(z1 − 1) + · · · + ∗(zp − 1) < Cδ 2 mp+2 , ⎪ ⎪ ⎪ ... ⎪ ⎪ ⎪ ⎪ 1 ⎪ l ⎩ θmu zu + ∗ + ∗(z1 − 1) + · · · + ∗(zp − 1) < Cδ 2 mu . We can argue exactly as before. Indeed, the terms (z1 − 1), . . . , (zp − 1) are unimportant because 1 l
1
we already know that 1 − ε δ 2 k2 1 − ε δ 2l1 e(zm ) 1 for 1 m p. They do not change anything for the last lines (those for which lmj > lk2 l1 ): if we restrict zv +1 , . . . , zu so that they 1 l
satisfy 1 − e(zj ) ηδ 2 k2 , the last inequalities will be satisfied given any (z1 , . . . , zp ) ∈ V(1) 1
1
since |zm − 1| ε δ 2l1 +1 ε δ 2 mj for 1 m p. They just change slightly the center for the first inequalities (those for which lmj = lk2 l1 ). However, the center ω keeps on satisfying l
1 l
1 l
1 l
1 − Cηδ 2 k2 e(ω) 1 + Cηδ 2 k2 and | m(ω)| (Cηδ 2 k2 )1/2 so that this does not affect the volume (Lemma 2.4 remains valid). We can continue this process inductively for each k with q(k) > 0. At the end, we prove that |dφi (e)(z1 − 1, . . . , zn − 1)| δi for all i s provided (z1 , . . . , zn ) belongs to some set V whose volume is greater than
1
δ 2lk
( 32 q(k)+ t (m)=1,
1 lm =l1 2 )
= δ L(l1 ,...,lm ) .
k; q(k)>0
Moreover, for any z ∈ V, one has 1
1 − εδ 2lk e(zj ) 1 provided zj ∈ E(k). In particular, this implies 1
|zj − 1|2 Cδ 2lk
provided zj ∈ E(k).
(7)
(S(e, Cδ)) for some C > 0 when z belongs to V. We have now to deduce that z belongs to φ −1 First of all, when i > s, we know that dφi (e) = j s ∗dφj (e). Since (δi ) is non-decreasing, we obtain immediately that |dφi (e)(z1 − 1, . . . , zn − 1)| Cδi for all i ∈ {1, . . . , q}. Second, we have to verify that, for any i ∈ {1, . . . , q},
|zj − 1|2 Cδi .
j ∈E (1)∪···∪E (i)
Now, if j ∈ E(k) with k i, then by (7), |zj − 1|2 Cδk Cδi . This shows the desired fact and concludes the “necessary part” of Theorem 5.2.
1994
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
8. Weighted Bergman spaces To avoid complications in the statement and in the proof of Theorem 5.2, we just gave it for the unweighted Bergman space. Corresponding theorems are valid for the weighted Bergman spaces. If their proofs are completely similar, they have interesting consequences. As we might think, the crucial point is to estimate the Vβ -measure of some subsets of Dn . We will be more precise than before. This will be very useful in the next section. Lemma 8.1. Let β > −1. There exists Cβ > 0 such that, for any ζ ∈ Tn , for any δ ∈ (0, 2)n , Cβ−1 (δ1 . . . δn )2+β Vβ S(ζ, δ) Cβ (δ1 . . . δn )2+β . Moreover, when β ∈ (−1, 0], the constant Cβ may be choosen independently of β. Proof. By Fubini’s theorem and rotational invariance, one just need to estimate Vβ (Sδ ) where Sδ = {z ∈ D; |1 − z| < δ}. This can be done by polar integration: 1
π
Vβ (Sδ ) (β + 1)
β 1Sδ reiθ 1 − r 2 r dr dθ
r=1/2 θ=−π
1
π
(β + 1)Dβ
1Sδ reiθ (1 − r)β dr dθ
r=1/2 θ=−π
with Dβ = ( 32 )β 23 if β ∈ (−1, 0] and Dβ = ( 12 )β if β 0. Moreover, Sδ contains the set √ √ {reiθ ; 1 − r < δ/ 2 and |θ | < δ/ 2 }. Thus, δ Vβ (Sδ ) (β + 1)Dβ √ 2
1 (1 − r)β dr √ r=min(1/2,1−δ/ 2 )
1 δ β+1 δ Dβ √ min , √ 2 2 2 which proves one inequality. On the other hand, it is clear that there exists some C > 0 such that reiθ ∈ Sδ implies |θ | Cδ. Thus, 1
Cδ
Vβ (Sδ ) (β + 1)Bβ
(1 − r)β dr dθ √ r=1−δ/ 2 θ=−Cδ
with Bβ = ( 12 )β if β < 0 and Bβ = ( 32 )β if β 0. We end up the proof as before.
2
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1995
Lemma 8.2. Let β > −1. There exists Cβ > 0 such that, for any u ∈ T, for any v ∈ C, for any δ > 0 and for any α > 0,
3 ¯ < δ and |v − z| < δ α Cβ min δ 2 +β , δ 1+α+β . Vβ z ∈ D; e(1 − uz) Moreover, when β ∈ (−1, 0], the constant Cβ may be choosen independently of β. Proof. Without loss of generality, we may suppose u = 1. The biggest volume is obtained for v ∈ [0, +∞). In that case, our set is contained in
D ∩ z ∈ D; 1 − δ e(z) 1 and m(z) δ α . This last set is contained in iθ
re ; r > 1 − δ and |θ | Cδ α for some C > 0. We now conclude like in the proof of Lemma 8.3.
2
Our last estimate does not need to be uniform for β ∈ (−1, 0]. We omit its proof which is easy. Lemma 8.3. Let β > −1. There exist Cβ > 0 and ε > 0 such that, for every δ > 0, for every w ∈ C satisfying 1 − εδ e(w) 1 + εδ
√ and m(w) εδ,
then Vβ ({z ∈ D; |z − w| < δ}) Cβ δ 2+β . We have to introduce the trees corresponding to A2β (Dn ). Let φ : Dn → Dn be holomorphic and suppose that φ extends holomorphically in a neighbourhood of Dn . Let ξ, I, J and s like in Section 5. The function r, q, E and t are also defined like in Section 5. We just need to modify β β the definition of the trees to take into account Lemmas 8.1, 8.2 and 8.3. Lξ,I,J and Rξ,I,J are now defined by β
Rξ,I,J (l1 , . . . , ls ) =
s (2 + β)rξ,I,J (k) k=1
β
Lξ,I,J (l1 , . . . , ls ) =
k; q(k)>0
2 lk
1 2 lk
,
1 3 + β qξ,I,J (k) + . 2 2 t (m)=k lm =lk
Our main theorem becomes Theorem 8.4. Suppose that Cφ is continuous on A2β (Dn ). Then for any ξ, I, J as above, one has β
β
Lξ,I,J Rξ,I,J . When φ is linear, Cφ is continuous on A2β (Dn ) if and only if, for any ξ, I, J
1996
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003 β
β
as above, Lξ,I,J Rξ,I,J . More precisely, in that case, there exists Cβ > 0 such that, for any ξ ∈ Tn , for any δ ∈ (0, 2)n , Vβ φ −1 S(ξ, δ) Cβ Vβ S(ξ, δ) . The constant Cβ may be choosen independently of β when β ∈ (−1, 0]. Proof. If we forget the last part of the statement, the proof of Theorem 5.2 can be repeated “mutatis mutandis” here. However, the last assertion needs some comments. We follow the notations of Section 6 and we fix β ∈ (−1, 0]. By Lemma 8.1, we know that Vβ S(ξ, δ) Cδ 2α1 r1 +···+2αs rs +β(r1 +···+rs ) for some C > 0 which does not depend on β ∈ (−1, 0] (of course, C depends on δ0 which is fixed by φ). Next, we find an upper bound for Vβ (φ −1 (S(ξ, δ))). The triangularization process does not depend on β. In particular, the inclusion φ −1 (S(ξ, δ)) ⊂ A3 remains true for every β > −1. Finally, when we compute Vβ (A3 ), we replace everywhere Lemma 2.3 by Lemma 8.2 and we find that
Vβ (A3 ) Cδ
3 k; q(k)>0 ( 2 +β)αk q(k)+ t (m)=k, αm αk 2
(αm −
αk 2
)
for some constant C which does not depend on β. Thus, Vβ φ −1 S(ξ, δ) CVβ S(ξ, δ) 1
when δi = δ 2li , (l1 , . . . , ls ) being the index of a node in the trees and C is independent of β. We can now apply the convexity argument, exactly as before, and the constants which are involved do not depend on β ∈ (−1, 0]. 2 As we mentioned in the introduction, when φ : Bn → Bn is smooth on Bn , Cφ is continuous on some A2β (Bn ) if and only if it is continuous on any A2β (Bn ). This property is far from being true on the polydisk, even if Jafari has proven in [5] that continuity on A2β1 (Dn ) implies continuity on A2β2 (Dn ) for any β2 β1 . The converse does not hold. Example 8.5. Let β1 , β2 ∈ (−1, +∞) be such that β1 < β2 . There exist n 2 and a linear map φ : Dn → Dn such that Cφ is continuous on A2β2 (Dn ) and Cφ is not continuous on A2β1 (Dn ). 3
+β
2 Proof. The function β → 2+β is increasing on (0, +∞). Thus, we may find two integers r and q, with q r, such that
3 + β1 + β2 r −1 < 2 < . 2 + β1 q − 1 2 + β2 3 2
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1997
This translates into
1 3 + β2 q + > (2 + β2 )r 2 2
and
1 3 + β1 q + < (2 + β1 )r. 2 2
(8)
We now consider φ : Dq → Dq defined by φ(z) = u(z), . . . , u(z), 0, . . . , 0 r times
with u(z) = (z1 + · · · + zq )/q. Here, the trees associated to φ are very easy. They have just one node and Lβ (0) =
1 3 +β q + 2 2
whereas R β (0) = (2 + β)r.
The conclusion follows immediately from Theorem 8.4 and inequality (8).
2
In the same vein, it is not hard to check that the composition operator Cφ studied in Example 5.4 is continuous on A20 (D7 ) but is not continuous on any A2β (D7 ) for any β < 0. We may also observe that Example 8.5 cannot be proved for a fixed n ∈ N. For instance, Corollary 8.6. Let φ : D2 → D2 be a linear map. Then Cφ is continuous on some A2β (Dn ) if and only if it is continuous on any A2β (Dn ), β > −1. Proof. We distinguish several cases. When φ1 ∞ < 1 and φ2 ∞ < 1, there is nothing to prove. When φ1 ∞ = 1 and φ2 ∞ < 1, our trees will have just one node, with r(1) = 1, q(1) ∈ {1, 2} and t (1) = 1. The condition of continuity becomes 2+β
1 3 +β q + 2 2
and this condition is always satisfied. When φ1 ∞ = 1 and φ2 ∞ = 1, two subcases may occur. On the one hand, we may have s = 1 (namely φ2 is a multiple of φ1 ). Our trees have also one node, with r(1) = 2, q(1) ∈ {1, 2} and t (1) = 1. The condition now reads 4 + 2β
3 1 +β q + . 2 2
This is never satisfied! On the other hand, we may have s = 2. This implies r(1) = 1, r(2) = 2, q(1) ∈ {1, 2}, q(2) = 2 − q(1), t (1) = 1, t (2) = 2 when q(1) = 1 or t (2) = 1 when q(2) = 2. Thus we get one of the following 3-uple of conditions:
1998
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
⎧ 3 1 ⎪ ⎪ 2 + β + β + , ⎪ ⎪ 2 2 ⎪ ⎪ ⎪ ⎨ 1 3 1 3 +β + + +β + , (2 + β) + (2 + β) ⎪ 2 2 2 2 ⎪ ⎪ ⎪ ⎪ 3 1 1 3 1 1 ⎪ ⎪ ⎩ (2 + β) + (2 + β) +β + + +β + , 2 2 2 2 2 2 ⎧ 3 1 ⎪ ⎪ 2+β +β 2+ , ⎪ ⎪ 2 2 ⎪ ⎪ ⎪ ⎨ 1 1 3 +β 2+ + , (2 + β) + (2 + β) ⎪ 2 2 2 ⎪ ⎪ ⎪ ⎪ 3 1 1 ⎪ ⎪ ⎩ (2 + β) + (2 + β) +β 2+ . 2 2 2 Both 3-uple of conditions are always satisfied! In particular, this proof shows that Cφ is always continuous on A2β (D2 ), φ being linear, except if φ1 ∞ = φ2 ∞ = 1 and φ2 is a multiple of φ1 . Thus, Theorem 3.2 remains valid on A2β (D2 ) for any β > −1 when we just consider linear maps. 2 The last corollary of this section indicates the strategy of the next one! Corollary 8.7. Let β0 ∈ (−1, +∞) and φ : Dn → Dn be linear. Suppose that Cφ is continuous β on A2 (Dn ) for any β > β0 . Then Cφ is continuous on A2β0 (Dn ). β
β
Proof. It suffices to let β to β0 in the inequalities Lξ,I,J Rξ,I,J , valid for β β0 .
2
9. Hardy spaces We conclude this paper by showing that an appropriate version of Theorem 5.2 remains true on the Hardy space H 2 (Dn ). There is one more difficulty in that context: we cannot testify if a measure is a Carleson measure by testing it only on rectangles. Precisely, let I be an interval of T of length δ and center ei(θ0 +δ/2) . S(I ) is defined by S(I ) = {z ∈ D; 1 − δ < r < 1, θ0 < θ < θ0 + δ}. If R = I1 × · · · × In ⊂ Tn is a rectangle of Tn , namely each Ij is an interval of T, S(R) is defined by S(R) = S(I1 ) × · · · × S(In ).
If V is any open set in Tn , S(V ) is equal to S(V ) = α S(Rα ) where (Rα ) runs through all rectangles in V . Let also μ be a Borel measure on Dn . Then Chang [3] has proven that the identity map H 2 (Dn ) → L2 (μ), f → f , is bounded iff there exists C > 0 such that μ S(V ) Cσ (V )
for all connected open sets V ⊂ Tn
(9)
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
1999
where σ is the Lebesgue measure on Tn . Moreover, Carleson [2] has given an example of a measure satisfying (9) for all rectangles R and not for all connected open sets V ⊂ Tn . Keeping this in mind we realize that the difficult part will be to adapt the sufficient part of the proof, because we need to control σ (φ −1 (S(V ))) for any V connected and open and not only for rectangles. However, a similar statement remains true. We keep the notations of Section 8, β β except that we allow our trees Lξ,I,J and Rξ,I,J to be defined also for β = −1. More precisely, −1 (l1 , . . . , ls ) = Rξ,I,J
s rξ,I,J (k) k=1
L−1 ξ,I,J (l1 , . . . , ls ) =
2 lk
k; q(k)>0
1 2 lk
,
1 qξ,I,J (k) + . 2 2 t (m)=k lm =lk
Our main theorem now reads Theorem 9.1. Suppose that Cφ is continuous on H 2 (Dn ). Then for any ξ, I, J as above, one has −1 2 n L−1 ξ,I,J Rξ,I,J . When φ is linear, Cφ is continuous on H (D ) if and only if, for any ξ, I, J as −1 above, L−1 ξ,I,J Rξ,I,J .
The proof of the necessary condition carries on without any new difficulties, replacing Lemma 2.4 by an appropriate analogue, whose proof is left to the reader: Lemma 9.2. There exists ε > 0 such that, for every δ > 0, for every w ∈ C satisfying √ and m(w) εδ,
1 − εδ e(w) 1 + εδ then σ ({z ∈ T; |z − w| < δ}) Cδ.
To prove the sufficient condition, we do not use directly Carleson measures on the Hardy space. We follow an indirect method with two steps: −1 Step 1. We show that L−1 ξ,I,J Rξ,I,J implies Lξ,I,J Rξ,I,J for any β > −1. β
β
Step 2. We fix β ∈ (−1, 0]. By Theorem 8.4, Cφ is continuous on A2β (Dn ). More precisely, we know that there exists C > 0 which does not depend on β such that, for any ξ ∈ Tn , for any δ ∈ (0, 2)n , Vβ φ −1 S(ξ, δ) CVβ S(ξ, δ) . We will prove later that this implies Cφ (f )A2 (Dn ) Df A2 (Dn ) for any f ∈ A2β (Dn ), β β for some constant D > 0 which does not depend on β. Letting β to −1, this implies Cφ (f )H 2 (Dn ) Df H 2 (Dn ) for any f ∈ H 2 (Dn ). Hence, it remains to verify the two above claims to close the proof of Theorem 9.1.
2000
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
9.1. Assumptions on H 2 (Dn ) vs. assumptions on A2β (Dn ) −1 We suppose that L−1 ξ,I,J Rξ,I,J and we try to prove that Lξ,I,J Rξ,I,J for any β > −1. For the sake of clarity, we forget the subscript ξ, I, J . Let (l1 , . . . , ls ) be the index of a node in the trees. One can write 2r(m) 3 1 − Lβ (l1 , . . . , ls ) − R β (l1 , . . . , ls ) = q(k) + 2 2 lm 2lm +1 β
t (m)=k lm =lk
k;q(k)>0
+β
q(k) −
β
t (m)=k
r(m) . 2 lm
t (m)=k
k;q(k)>0
The condition L−1 (l1 , . . . , ls ) − R −1 (l1 , . . . , ls ) 0 will imply Lβ (l1 , . . . , ls ) − R β (l1 , . . . , ls ) 0 as soon as r(m) q(k) − 0. (10) 2 lm t (m)=k
k;q(k)>0
Expanding L−1 (l1 , . . . , ls ) − R −1 (l1 , . . . , ls ) 0 we get
q(k)
2r(m) − δl ,l m k . 2 lm
k;q(k)>0 t (m)=k
k;q(k)>0
Now, r(m) 1 so that 2r(m) − δlm ,lk r(m) which yields immediately (10). 9.2. A precise version of Carleson embedding theorem In Lemma 2.1, we have already recalled that, when φ : Dn → Dn satisfies Vβ φ −1 S(ξ, δ) CVβ S(ξ, δ) for all δ ∈ (0, 2)n and all ξ ∈ Tn , then Cφ (f )
A2β (Dn )
Df A2 (Dn ) β
for every f ∈ A2β (Dn ). It is well known that the constant D may be controlled by C. However, this dependance with respect of β is not clarified. Our strategy requires that D may be controled uniquely by C and n, and in particular that it does not depend on β ∈ (−1, 0]. This is the content of the next proposition. Proposition 9.3. Let β ∈ (−1, 0] and let μ be a finite nonnegative Borel measure on Dn . Suppose that there exists C > 0 such that, for any ξ ∈ Tn and any δ ∈ (0, 2)n , μ S(ξ, δ) Cμ Vβ S(ξ, δ) .
(11)
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
2001
Then for any f ∈ A2β (Dn ),
f (z1 , . . . , zn )2 dμ
1/2 C(n)Cμ f A2 (Dn ) . β
Dn
Proof. We follow the argument of [6] except at the very beginning. Let z ∈ Dn and let δj = 1 − |zj |2 . Consider Wz the polydisk centered at z and with radius δj /2 in the zj -coordinate. Let also Sz be the Carleson box S(ξ, δ) with ξj = zj /|zj |. Then Wz ⊂ Sz . Moreover, for any f ∈ A2β (Dn ), the sub-mean value property for |f | gives, for any γ = (γ1 , . . . , γn ) with γj ∈ (0, δj /2), f (z)
1 (2π)n
f (z1 + γ1 u1 , . . . , zn + γn un ) dσ (u).
u∈Tn
On the other hand, by polar integration,
β f (w) 1 − |wj |2 dA(w) j
Wz δ1 /2
=
δn /2
n β f (z + γ u) γj 1 − |zj + γj uj |2 dσ (u) dγ1 . . . dγn .
...
γ1 =0
j =1
γn =0 u∈Tn
Now, 1 − |zj + γj uj | δj + γj . Taking into account that β 0 and that 1 − |wj |2 2(1 − |wj |), we get
β f (w) 1 − |wj |2 dA(w) j
Wz
δ1 /2
C(n)
...
γ1 =0
C(n)
δn /2
γn =0
δj /2 n j =1 γ =0 j
Now,
j
γj (γj + δj )β
f (z + γ u) dσ (u) dγ1 . . . dγn
u∈Tn
γj (γj + δj )β dγj f (z).
2002
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003 δj /2
δj /2
γj (γj + δj ) dγj
γj (γj + δj )β dγj
β
γj =0
γj =δj /4
δj 1 × × 4 β +1
β+1 β+1 3 5 β+1 δj − 2 4
C β+2 δ β +1 j
where C does not depend on β. We then get
n β f (w) 1 − |wj |2 dA(w) j =1
Wz
n C(n) β+2 f (z) δ j (β + 1)n j =1
so that f (z) C(n) Vβ (Sz )
|f | dVβ Sz
where we have used Lemma 8.1 in its precise formulation. This inequality improves the work done in [6], since we know that the constant C(n) which appears above does not depend on β. From now on, we can follow exactly the proof of Jafari. Let 1 B(f )(z) = sup V S=S(ξ,δ); z∈S(ξ,δ) β (S)
|f | dVβ . S
We have obtained |f (z)| C(n)B(f )(z). In [6], it is shown that, under assumption (11), B defines a bounded operator from L2 (dVβ ) into L2 (μ) with B Cμ D(n), where D(n) just depends on n. This gives exactly what we need. 2 10. Concluding remarks 10.1. Compactness At least for the weighted Bergman spaces, the work that we have done for continuity can be modified to study the compactness of composition operators. Using the fact that in Lemma 2.1, the big-oh condition which characterizes continuity has to be replaced by a little-oh condition to characterize compactness, we obtain: Theorem 10.1. Suppose that Cφ is compact on A2β (Dn ). Then for any ξ, I, J as above, one has β
β
Lξ,I,J > Rξ,I,J . When φ is linear, Cφ is compact on A2β (Dn ) if and only if, for any ξ, I, J as β
β
above, Lξ,I,J > Rξ,I,J .
F. Bayart / Journal of Functional Analysis 260 (2011) 1969–2003
2003
In particular, we obtain linear symbols φ : Dn → Dn generating non-trivial compact composition operators. The term “non-trivial” means here that some coordinate function φi satisfies φi ∞ = 1. For instance, the composition operator which appears in Example 5.5 is compact. Looking at the proof of Wogen’s theorem, it can be shown that continuous composition operators on the ball with a smooth symbol are never compact, except the trivial ones. 10.2. Open questions Our work leads to several interesting questions on composition operators on the polydisk. We just quote two of them. Does Theorem 3.1 remains true for the Hardy space H 2 (Dn )? Is the necessary condition of Theorem 5.2 also sufficient for a larger class of maps than affine self-maps? References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]
M. Abate, The Julia–Wolff–Carathéodory theorem in polydisks, J. Anal. Math. 74 (1998) 275–306. L. Carleson, A counterexample for measures bounded on H p for the bi-disc, Mittag-Leffler Report 7 (1974). A. Chang, Carleson measure on the bi-disc, Ann. of Math. 109 (1979) 613–620. J. Cima, C. Stanton, W. Wogen, On boundedness of composition operators on H 2 (B2 ), Proc. Amer. Math. Soc. 91 (1984) 217–222. F. Jafari, On bounded and compact composition operators in polydiscs, Canad. J. Math. 42 (1990) 869–889. F. Jafari, Carleson measures in Hardy and weighted Bergman spaces of polydiscs, Proc. Amer. Math. Soc. 112 (1991) 771–781. H. Koo, W. Smith, Composition operators induced by smooth self-maps of the unit ball in CN , J. Math. Anal. Appl. 329 (2007) 617–633. H. Koo, M. Stessin, K. Zhu, Composition operators on the polydisc induced by smooth symbols, J. Funct. Anal. 254 (2008) 2911–2925. B. MacCluer, Spectra of automorphism-induced composition operators on H p (BN ), J. London Math. Soc. 30 (1984) 95–104. J.H. Shapiro, Composition Operators and Classical Function Theory, Universitext, Springer, New York, 1993. W. Wogen, The smooth mappings which preserve the Hardy space H 2 (Bn ), in: Contributions to Operator Theory and Its Applications, vol. 35, Mesa, AZ, 1987, Birkhäuser, 1988, pp. 249–263.
Journal of Functional Analysis 260 (2011) 2004–2026 www.elsevier.com/locate/jfa
Regularity estimates of solutions to complex Monge–Ampère equations on Hermitian manifolds Xi Zhang a,∗,1 , Xiangwen Zhang b a Department of Mathematics, Zhejiang University, PR China b Department of Mathematics and Statistics, McGill University, Canada
Received 15 July 2010; accepted 21 December 2010 Available online 5 January 2011 Communicated by I. Rodnianski
Abstract In this paper, we obtain the Bedford–Taylor interior C 2 estimate and local Calabi C 3 estimate for the solutions to complex Monge–Ampère equations on Hermitian manifolds. © 2010 Elsevier Inc. All rights reserved. Keywords: Complex Monge–Ampère equation; Hermitian manifold; Regularity estimates
1. Introduction The complex Monge–Ampère equation is one of the most important partial differential equations in complex geometry. The proof of the Calabi conjecture given by S.T. Yau [18] in 1976 yields significant applications of the Monge–Ampère equation in Kähler geometry. After that, many important geometric results, especially in Kähler geometry, were obtained by studying this equation. It is natural and also interesting to study the complex Monge–Ampère equations in a more general form and in different geometric settings. There are many modifications and generalizations in the existing literature. In [17], Tosatti, Weinkove and Yau gave a partial affirmative answer to a conjecture of Donaldson in symplectic geometry by solving (under additional curvature assumption) the complex Monge–Ampère * Corresponding author.
E-mail addresses: [email protected] (X. Zhang), [email protected] (X. Zhang). 1 The first named author was supported in part by NSF in China, Nos. 10831008 and 11071212.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.024
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2005
equation in an almost Kähler geometric setting. By studying a more general form of the Monge– Ampère equation on non-Kähler manifolds, Fu and Yau [8] gave a solution to the Strominger system which is motived by superstring theory. Another direction worth studying is the corresponding equation on Hermitian manifolds. In such a case the equation is not so geometric, since Hermitian metrics do not represent positive cohomology classes. On the other hand the estimates for Hermitian manifolds are more complicated than the Kähler case because of the non-vanishing torsion. In the eighties and nineties, some results regarding the Monge–Ampère equation in the Hermitian setting were obtained by Cherrier [3,4] and Hanani [10]. For the next few years there was no activity on the subject until very recently, when the results were rediscovered and generalized by Guan and Li [9]. Under additional conditions they generalized the a priori estimates due to Yau [18] from the Kähler case and got some existence results for the solution of the complex Monge–Ampère equation. At the same time, Zhang [19] independently proved similar a priori estimates in the Hermitian setting and he also considered a general form of the complex Hessian equation. Later, Tosatti and Weinkove [15,16] gave a more delicate a priori C 2 -estimate and removed the conditions in [9]. Moreover, Dinew and Kolodziej [6] also studied the equation in the weak sense and obtained the L∞ estimates via suitably constructed pluripotential theory. In this paper, we want to study some other regularity properties of the complex Monge–Ampère equation on Hermitian manifolds: the Bedford–Taylor interior C 2 -estimate and Calabi C 3 -estimate. The interior estimate for the second order derivatives is an important and difficult topic in the study of complex Monge–Ampère equation. It has many fundamental applications in complex geometric problems. In the cornerstone work of Bedford and Taylor [1], by using the transitivity of the automorphism group of the unit ball B ⊂ Cn , they obtained the interior C 2 -estimate for the following Dirichlet problem:
det(ui j¯ ) = f in B, u = φ on ∂B,
1
where φ ∈ C 1,1 (∂B) and 0 f n ∈ C 1,1 (B). Unfortunately for generic domains Ω ⊂ Cn , due to the non-transitivity of the automorphism group of Ω, Bedford and Taylor’s method is not applicable and the analogous estimate is still open. Here, we exploit the method of Bedford and Taylor to study the interior estimate for the Dirichlet problem of the complex Monge–Ampère equation in the unit ball in the Hermitian setting (notice that for local arguments the shape of the domain is immaterial and hence it suffices to consider the balls). We consider the following equation
√ ¯ n = f ωn (ω + −1∂ ∂u) u = φ on ∂B,
in B,
(1)
1
where 0 f n ∈ C 1,1 (B) and ω is a smooth positive (1, 1)-form (not necessarily closed) defined ¯ We denote by PSH(ω, Ω) the set of all integrable, upper semicontinuous functions satisfyon B. √ ¯ 0 in the current sense on the domain Ω. Since ω is not necessarily Kähler, ing (ω + −1∂ ∂u) there are no local potentials for ω, and thus Bedford–Taylor’s method cannot be applied directly in our case. Theorem 1. Let B be the unit ball on Cn and ω be a smooth positive (1, 1)-form (not nec¯ Let u ∈ C(B) ¯ ∩ PSH(ω, B) ∩ C 2 (B) solve the Dirichlet problem (1) with essary closed) on B.
2006
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
φ ∈ C 1,1 (∂B). Then, for arbitrary compact subset B B, there exists a constant C dependent only on ω and dist{B , ∂B} such that 1 u C 2 (B ) C φ C 1,1 (∂B) + C f n C 1,1 (B) . Remark 1. Observe that this estimate is scale and translation invariant i.e. the same constant will work if we consider the Dirichlet problem in any ball with arbitrary small radius (and suitably rescaled set B ). As we have already mentioned, another goal of this paper is to get a local version of the C 3 estimate of the complex Monge–Ampère equation on Hermitian manifolds. Calabi’s C 3 -estimate for the real Monge–Ampère equation was first proved by Calabi himself in [2]. After that many mathematicians paid a lot of attention to this estimate. In Yau’s celebrated work [18] about the Calabi conjecture, he gave a detailed proof of the C 3 -estimate for the complex Monge–Ampère equation on Kähler manifolds, which was generalized to the Hermitian case by Cherrier [3]. All these C 3 -estimates are global. However, in some situations, a local C 3 -estimate is needed. For example Riebesehl and Schulz [14] gave a local version of Calabi’s estimate in order to study the Liouville property of Monge–Ampère equations on Cn . In a recent work by Dinew and the authors [7], aimed to study the C 2,α regularity of solutions to complex Monge–Ampère equation, the local result in [14] also played an important role to get the optimal value of α. Thus, it is also natural to generalize this local estimate to Hermitian manifolds and find some interesting applications. Let (M, g) be a Hermitian manifold. We consider the following complex Monge–Ampère equation (ω +
√
¯ n = ef ωn , −1∂ ∂φ)
(2)
where f (z) ∈ C ∞ (M) and ω is the Hermitian form associated with the metric g. Theorem 2. Let φ(z) ∈ PSH(ω, M) ∩ C 4 (M) be a solution of the Monge–Ampère equation (2), satisfying ¯ ω K. ∂ ∂φ
(3)
Let Ω Ω ⊂ M. Then the third derivatives of φ(z) of mixed type can be estimated in the form ¯ ω C |∇ω ∂ ∂φ|
for z ∈ Ω ,
where C is a constant depending on K, dω ω , R ω , ∇R ω , T ω , ∇T ω , dist(Ω , ∂Ω) and ∇ s f ω , s = 0, 1, 2, 3. Here ∇ is the Chern connection with respect to the Hermitian metric ω, T and R are the torsion tensor and curvature form of ∇. From the detailed proof in Yau’s paper [18] (see also [13]), in the Kähler case, we know that the quantity considered by Calabi ¯
¯
S = g˜ j r¯ g˜ s k g˜ ml φj km ¯ φr¯ s l¯
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2007
satisfies the following elliptic inequality: ˜ −C1 S − C2 . S
(4)
Here φ is a√smooth solution of Eq. (2), g˜ denotes the Hermitian metric with respect to the form ¯ φ ¯ denotes the covariant derivative with respect to the Chern connection ωφ = ω + −1∂ ∂φ, ij k ∇. Riebesehl and Schulz [14] used the above elliptic inequality to get the Lp estimate for S. Then, a standard theorem for linear elliptic equations gave the L∞ estimate. For the Hermitian case, due to the non-vanishing torsion term, the estimates are more complicated. In [3], Cherrier proved the elliptic inequality corresponding to (4) on Hermitian manifolds: ˜ −C1 S 2 − C2 , S 3
(5) ¯
˜ is the canonical Laplacian with respect to the Hermitian metric g˜ (i.e. f ˜ = 2g˜ i j fi j¯ ), where positive constants C1 and C2 depend on K, R ω , ∇R ω , T ω , ∇T ω , and ∇ s f ω , s = 0, 1, 2, 3. By a similar method to that in [14], we obtain the Lp estimate for S, and then use Moser iteration to get the L∞ estimate. The estimates obtained in this paper should be useful for the study of problems on Hermitian manifolds. As a simple application, following the lines of [7], one has the following corollary: Corollary 1. Let Ω be a domain in Cn and ω be a Hermitian form defined on Ω. Let φ(z) ∈ PSH(ω, Ω) ∩ C 2 (Ω) be a solution of the Monge–Ampère equation (ω +
√ ¯ n = ef ωn . −1∂ ∂φ)
Suppose that f ∈ C α (Ω) for some 0 < α < 1. Then φ ∈ C 2,α (Ω). Remark 2. In the proof of Corollary 1, we don’t apply the local Calabi’s C 3 estimate to the original function φ ∈ C 1,1 (Ω) directly. Instead of that, for any point x0 ∈ Ω Ω Ω, we consider an approximation solution
√
¯ k )n = ef (x0 ) ωn −1∂ ∂u uk = φ on ∂B x0 , dρ k ,
(ω +
in B x0 , dρ k ,
where ρ = 12 and d = 12 dist(Ω , ∂Ω ). Since φ is only C 1,1 , we first consider the above Dirichlet problem with smooth boundary condition, i.e. instead of φ by its mollification φ ( ) for small enough and φ ( ) 1,1 → φ 1,1 as → 0. By the main theorem in [9] the solutions uk (we suppress the indice for the sake of readability) with the new boundary data coming from φ ( ) are smooth. Now, by Bedford–Taylor’s interior C 2 estimate, one can get uk C 2 (Bk+1 ) c˜1 φ C 1,1 (Ω ) + sup ef (x) , x∈Ω
where c˜1 is a positive constant depending only on ω. This allows one to apply the complex version of Calabi estimate to the above Dirichlet problem. Thus, for any γ ∈ (0, 1), we have
2008
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
uk C 2,γ (Bk+2 ) c˜2 /ρ kγ , where c˜1 is a positive constant depending only on ω, d, n, φ C 1,1 (Ω ) and supx∈Ω ef (x) . Letting now → 0+ , we obtain that this estimate remains true for the original function uk . Then, using the C α condition on f and following the lines in Ref. [7], we use the regularity of uk to approximate the original φ and obtain a C 2,α estimate of φ. The paper is organized as follows. In Section 2, we prove the interior C 2 -estimate for the complex Monge–Ampère equation. The proof for Calabi’s C 3 -estimate is given in Section 3. In Appendix A, we give a new proof of (5) which follows the idea in Phong, Sesum and Sturm [13], where the authors gave a simpler proof of Calabi’s estimate on Kähler manifolds. 2. Proof of the interior estimates In the proof of interior C 2 -estimates, the comparison theorem will play the key role. Following the same idea as in [5], it’s easy to see that the comparison theorem is still true for the complex Monge–Ampère equation on Hermitian manifold (M, ω). 0 ¯ 2 Lemma √ 1. Let Ω ⊂ M be a bounded set and u, v ∈ C (Ω) ∩ C (Ω), with ω + ¯ > 0 be such that ω + −1∂ ∂v
(ω +
√ ¯ 0, −1∂ ∂u
√ √ ¯ n (ω + −1∂ ∂u) ¯ n −1∂ ∂v)
and vu
on ∂Ω,
¯ then v u in Ω. Proof of Theorem 1. As mentioned above, we will follow the idea of Bedford and Taylor from [1]. For a ∈ B n , let Ta ∈ Aut(B n ) be defined by Ta (z) = Γ (a)
z−a , 1 − a¯ t z
a t a¯ where Γ (a) = 1−v(a) − v(a)I and v(a) = 1 − |a|2 . Note that Ta (a) = 0, T−a = Ta−1 , and Ta (z) is holomorphic in z, and a smooth function in a ∈ B n . For any a ∈ B(0, 1 − η) = {a: |a| < 1 − η} set −1 Ta (z) L(a, h, z) = Ta+h
and U (a, h, z) = L∗1 u(z),
U (a, −h, z) = L∗2 u(z),
Φ(a, h, z) = L∗1 φ(z),
Φ(a, −h, z) = L∗2 φ(z),
for z ∈ ∂B n ,
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2009
where L∗i means the pull-back of Li for i = 1, 2 and L1 = L(a, h, z), L2 = L(a, −h, z). Since U (a, h, z) = Φ(a, h, z) for z ∈ ∂B n , it follows that U ∈ C 1,1 (B(0, 1 − η) × B(0, η) × ∂B n ). Consequently, for a suitable constant K1 , depending on η > 0, we have 1 U (a, h, z) + U (a, −h, z) − K1 |h|2 U (a, 0, z) = φ(z) 2
(6)
for all |a| 1 − η, |h| 12 η, and z ∈ ∂B n . If it can be shown that v(a, h, z) satisfies (ω +
√
¯ n f (z)ωn , −1∂ ∂v)
(7)
where v(a, h, z) =
1
U (a, h, z) + U (a, −h, z) − K1 |h|2 + K2 |z|2 − 1 |h|2 , 2
(8)
then it follows from the comparison theorem in the Hermitian case that v(a, h, z) u(z). Thus, if we set a = z, we conclude that 1
u(z + h) + u(z − h) u(z) + (K1 + K2 )|h|2 2 which would prove the theorem. Let now √ ¯ = F (ω + −1∂ ∂v)
(ω +
√ ¯ n −1∂ ∂v)
√ ( −1)n dz1 ∧ d z¯ 1 ∧ · · · ∧ dzn ∧ d z¯ n 1 = det(gi j¯ + vi j¯ ) n ,
1
n
(9)
where gi j¯ is the local expression of ω under the standard coordinate {zi }ni=1 in Cn . By the concavity of F , we have F (ω +
√
√
¯ ∗1 u + ∂ ∂L ¯ = F ω + −1 ∂ ∂L ¯ ∗2 u + 2K2 |h|2 ∂ ∂|z| ¯ 2 −1∂ ∂v) 2 √ 1 1 ¯ 2 ω − L∗1 ω + ω − L∗2 ω + K2 |h|2 −1∂ ∂|z| =F 2 2
√ √ 1 ¯ ∗1 u + 1 L∗2 ω + −1∂ ∂L ¯ ∗2 u + L∗1 ω + −1∂ ∂L 2 2 √ √ 1 ¯ ∗1 u + 1 F L∗2 ω + −1∂ ∂L ¯ ∗2 u F L∗1 ω + −1∂ ∂L 2 2 √ 1 ¯ 2 . + F ω − L∗1 ω + ω − L∗2 ω + 2K2 |h|2 −1∂ ∂|z| 2
(10)
Since the Hermitian metric ω is smooth, one can find K2 large enough, such that √ ¯ 2 0. ω − L∗1 ω + ω − L∗2 ω + K2 |h|2 −1∂ ∂|z|
(11)
2010
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
On the other hand, since L(a, h, z) is holomorphic in z, it follows from Eq. (1) that √ √ ¯ ∗1 u = F L∗1 (ω + −1∂ ∂u) ¯ F L∗1 ω + −1∂ ∂L √
1 ¯ n n L∗1 (ω + −1∂ ∂u) = √ ( −1)n dz1 ∧ d z¯ 1 ∧ · · · ∧ dzn ∧ d z¯ n
1 n L∗1 (f (z)ωn ) = √ n 1 1 n n ( −1) dz ∧ d z¯ ∧ · · · ∧ dz ∧ d z¯ 1 ∗ 1 = F L1 f n ω = L∗1 f n F L∗1 (ω) .
(12)
Similarly, we can get √ 1 1 ¯ ∗2 u = F L∗2 f n ω = L∗2 f n F L∗2 (ω) . F L∗2 ω + −1∂ ∂L Thus, F (ω +
√ √ 1 1 ¯ 1 F L∗1 f n ω + F L∗2 f n ω + 1 F K2 |h|2 −1∂ ∂|z| ¯ 2 −1∂ ∂v) 2 2 1 1 1 1 1 = F f n ω + F L∗1 f n ω + F L∗2 f n ω − 2F f n ω 2 √ 1 ¯ 2 . + F K2 |h|2 −1∂ ∂|z| 2
(13)
Again, since ω is smooth and f 1/n ∈ C 1,1 , choosing K2 large enough, we have √ 1 1 1 ¯ 2 . F L∗1 f n ω + F L∗2 f n ω − 2F f n ω F K2 |h|2 −1∂ ∂|z|
(14)
Finally, we obtain F (ω + and thus, the inequality (7) follows.
√ 1 ¯ F f nω , −1∂ ∂v)
(15)
2
3. Proof of the Calabi estimate Let (M, J, ω) be a Hermitian manifold and ∇ denote the Chern connection with respect to the √ ¯ metric ω. Let locally ω = −1gi j¯ dzi ∧ dzj , then the local formula for the connection 1-form reads θ = ∂g · g −1 . We also denote θα = ∂α g · g −1 , The torsion tensor of ∇ is defined by
γ
θαβ =
∂gβ δ¯ ∂zα
¯
gγ δ .
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
T
∂ ∂ , β α ∂z ∂z
i.e.,
γ Tαβ
=
=∇
∂gβ δ¯ ∂zα
2011
∂ ∂ ∂ ∂ − ∇ − , ∂ α ∂zβ ∂zα ∂zβ ∂zβ ∂z
∂g ¯ ¯ − αβδ g γ δ . ∂z
∂ ∂zα
Notice that T = 0 ⇐⇒ ω is Kähler (and ∇ is the Levi-Civita connection on M). ¯ = dθ − θ ∧ θ = ∂(∂g ¯ The curvature form of ∇ is defined by R = ∂θ · g −1 ). In local coordinates, we have 2 j ∂g ¯ ∂gt s¯ ¯ ¯ ∂ g ¯ j Riα β¯ = −∂¯β ∂α g · g −1 i = −g j k α i kβ + iαk g j s¯ β g t k , ∂z ∂ z¯ ∂z ∂ z¯ k . Ri j¯α β¯ = gk j¯ Riα β¯
Note that R (2,0) = R (0,2) = 0 and T (1,1) = 0, since the almost complex structure J is integrable and ∇ is the Chern connection. Proof of Theorem 2. By the assumption (3) for the solution of Eq. (2), we know that 1 g gφ λg λ
for some constant λ,
where λ depends√only on K and f C 0 , and gφ denotes the Hermitian metric with respect to the ¯ Thus, form ωφ = ω + −1∂ ∂φ. ¯
¯
¯
¯
j r¯ s k ml S = (gφ )j r¯ (gφ )s k (gφ )ml φj km ¯ φr¯ s l¯ λ(gφ ) (gφ ) g φj km ¯ φr¯ s l¯.
(16)
On the other hand, we have j k¯ ml¯ j k¯ ml¯ ¯ j k¯ gφ g ml φj km ¯ l¯ = gφ g φj km ¯ l¯ − gφ l¯g φj km ¯ ¯
j s¯
¯
¯
= g ml fml¯ + gφ φt s¯l¯gφt k g ml φj km ¯ , where we used Eq. (2) in the last equality above. Thus
j k¯ ¯ S λ gφ g ml φj km ¯ l¯ − f .
(17)
√ ¯ j k¯ ml¯ ¯ is a globally defined quantity, where Λgφ Notice that gφ g ml φj km ¯ l¯ = Λgφ (g ∇l¯∇m ( −1∂ ∂φ)) n−1 n √ ω ωφ is the contraction with ωφ , i.e. (Λgφ θ ) n!φ = θ ∧ (n−1)! for any (1, 1) form θ = −1θi j¯ dzi ∧ d z¯ j , j k¯
in local coordinates, we have Λgφ θ = gφ θj k¯ . Therefore we can estimate for every sufficiently large exponents ρ, σ, and every nonnegative test function η(z) ∈ C01 (Ω): S σ ηp+1 Ω
ωn λ n!
Ω
ωn
j k¯ ¯ . S σ −1 ηp+1 gφ g ml φj km ¯ l¯ − f n!
(18)
2012
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
Now, use the following identity: s t¯ φj km ¯ l¯ = φj k¯ lm ¯ + φs k¯ Rj ml¯ − φj t¯Rkm ¯ l¯ s s t¯ t¯ = φj lm ¯ k¯ + φs l¯Rj mk¯ + φs k¯ Rj ml¯ − φj t¯Rlm ¯ k¯ − φj k¯ Rkm ¯ l¯
= φmlj ¯ k¯ + C1 , where C1 is a constant depending on K and |R|ω . Therefore, we have S σ ηp+1
ωn λ n!
Ω
j k¯
¯
S σ −1 ηp+1 gφ g ml φmlj ¯ k¯
ωn + n!
Ω
S σ −1 ηp+1 (C1 − f )
ωn n!
Ω j k¯
S σ −1 ηp+1 gφ (φ)j k¯
λ
ωn n!
+ C2
Ω
S σ −1 ηp+1
ωn , n!
(19)
Ω
where C2 is a constant depending on C1 and f . Now, using integration by parts, it is easy to see that
ω j k¯ S σ −1 ηp+1 gφ (φ)j k¯
n
n!
=
Ω
j k¯
e−f S σ −1 ηp+1 gφ (φ)j k¯
ωφn n!
Ω
= Ω
= Ω
ωφn−1 √ ¯ e−f S σ −1 ηp+1 −1∂ ∂(φ) ∧ (n − 1)! ωφn−1 √ ¯ −1d e−f S σ −1 ηp+1 ∂(φ) ∧ (n − 1)!
− Ω
ωφn−1 √ ¯ ∧ −1d e−f S σ −1 ηp+1 ∧ ∂(φ) (n − 1)!
=: I − II. Next, we will estimate |I | and |II|. First, I= Ω
ωφn−1 √ ¯ −1d e−f S σ −1 ηp+1 ∂(φ) ∧ (n − 1)!
=− Ω
√
¯ −1e−f S σ −1 ηp+1 ∂(φ) ∧ dωφ ∧
ωφn−2 (n − 2)!
.
By the equivalence of two forms ω and ωφ (i.e., the assumption (3) on φ), we know
(20)
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2013
ωφn−2 ωφn−2 ∂(φ) ¯ ¯ = ∂(φ) ∧ dω ∧ ∧ dωφ ∧ (n − 2)! (n − 2)! n |dω|g ω ¯ C3 ∂(φ) φ gφ n! n 1 ω , C4 S 2 n!
(21)
where C4 is a constant depending on |dω|g , f C 0 and K (for the justification of the last inequality we refer to the formula of S given in Appendix A). This estimate yields |I | C5
1
S σ − 2 ηp+1
ωn n!
(22)
Ω
for some constant C5 dependent on ω, f C 0 and K. Let us now estimate the second term: II = Ω
ωφn−1 √ −f σ −1 p+1 ¯ S −1d e η ∧ ∂(φ) ∧ (n − 1)!
+ (σ − 1) Ω
+ (p + 1) Ω
ωφn−1 √ ¯ −1e−f S σ −2 ηp+1 dS ∧ ∂(φ) ∧ (n − 1)! ωφn−1 √ ¯ −1e−f S σ −1 ηp dη ∧ ∂(φ) ∧ (n − 1)!
Thus, |II| C6
1
S σ − 2 ηp+1
Ω
+ (p + 1)
ωn + (σ − 1) n!
1
S σ − 2 ηp |∇η|
ωn n!
3
S σ − 2 |∇S|ηp+1
ωn n!
Ω
,
Ω
where C6 is a constant depending on f C 1 (ω) and K. By the estimates (22), (23) and using Cauchy’s inequality 3
(σ − 1)ηp+1 S σ − 2 |∇S| we have, for > 0 small enough,
(σ − 1)2 p+1 σ −3 η S |∇S|2 + ηp+1 S σ 4
(23)
2014
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
S σ ηp+1
ωn ωn ωn C7 (σ − 1)2 S σ −3 |∇S|2 ηp+1 + S σ −1 ηp+1 n! n! n!
Ω
+ (p + 1)
Ω
S
σ − 12 p
η |∇η|
ωn n!
Ω
+
Ω
S
σ − 12 p+1 ω
η
n
n!
,
(24)
Ω
where C7 is a constant depending on |dω|ω , |R|ω , K, f C 1 (ω) and f . Now we are in the place to use the elliptic inequality (5) in the introduction. Recall that 3
φ S −CS 2 − C0 .
(25)
Multiplying by S σ −2 ηp+1 on both sides of the above inequality and integrating over Ω, we have
1
S σ − 2 ηp+1
−C
ωn − C0 n!
Ω
S σ −2 ηp+1
ωn n!
Ω
S σ −2 ηp+1 φ S
Ω
The right-hand side of above inequality can be estimated as follows
S σ −2 ηp+1 φ S
ωn n!
Ω
ωφn−1 √ ¯ ∧ e−f S σ −2 ηp+1 −1∂ ∂S (n − 1)!
= Ω
ωφn−1 √ ¯ ∧ −1d e−f S σ −2 ηp+1 ∂S (n − 1)!
= Ω
− Ω
=− Ω
√
ωφn−1 −f σ −2 p+1 ¯ ∧ ∂S ∧ −1d e S η (n − 1)!
ωφn−2 √ ¯ ∧ dω ∧ −1e−f S σ −2 ηp+1 ∂S (n − 2)!
√ − −1
Ω
ωφn−1 −f σ −2 p+1 ¯ S d e η ∧ ∂S ∧ (n − 1)!
− (σ − 2)
√
¯ ∧ −1e−f S σ −3 ηp+1 ∂S ∧ ∂S
Ω
− (p + 1) Ω
√
¯ ∧ −1e−f S σ −2 ηp ∂η ∧ ∂S
ωφn−1 (n − 1)!
ωφn−1 (n − 1)!
ωn . n!
(26)
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
S σ −3 ηp+1 |∇S|2
−C8 (σ − 2)
ωn + C9 n!
Ω
S σ −2 ηp+1 |∇S|
2015
ωn n!
Ω
ωn S σ −2 ηp |∇η||∇S| , n!
+ C9 (p + 1) Ω
for C8 a positive constant. From above inequality, we obtain (σ − 2)
S σ −3 ηp+1 |∇S|2
ωn n!
Ω
ωn ωn + S σ −2 ηp+1 |∇S| C10 (p + 1) S σ −2 ηp |∇η||∇S| n! n! Ω
+
S
σ − 21
ηp+1
ωn n!
+
Ω
S σ −2 ηp+1
Ω
n ω
(27)
.
n!
Ω
Now, by Cauchy’s inequality again, S σ −2 ηp+1 |∇S| |∇S|2 S σ −3 ηp+1 + (p + 1)S σ −2 ηp |∇η||∇S| |∇S|2 S σ −3 ηp+1 +
1 p+1 σ −1 S η 4 (p + 1)2 p−1 σ −1 η S |∇η|2 . 4
These two inequalities, together with (27) and (24) yield S σ ηp+1
ωn n!
Ω
C11 σ (p + 1) 2
2
η
Ω
+
S
σ − 12 p+1 ω
S
σ − 12 p
η |∇η|
Ω
ωn n!
n!
+
1
S σ − 2 ηp+1
Ω
+
n
S
σ −2 p+1 ω
η
Ω
n
S
n!
ωn n!
σ −1 p−1
η
2ω
|∇η|
n
n!
(28)
Ω
for p 2, σ 4. Now, let BR0 (z) Ω be a ball, and let 0 < R r < t R0 , R0 − R 1. By choosing an C appropriate testing function η(z), with 0 η 1, η|Br = 1, η|M/Bt = 0, |∇η| t−r , and putting p = σ − 1, we conclude that (Sη)σ
ωn C12 σ 4 n!
Bt (z)
Bt (z)
+
1 (Sη)σ −2 S (t − r)2
n 1 1 1 ω 1 (Sη)σ −1 S 2 + (Sη)σ − 2 η 2 + (Sη)σ −1 η + (Sη)σ −2 η2 . (29) t −r n!
2016
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
By Young’s inequality ab
aα 1 bβ + β/α , α β
1 1 + = 1. α β
for > 0,
It follows that, σ 1 1 1 (Sη)σ −1 S 2 σ (Sη)σ −1 σ −1 + σ −1 t −r σ σ −1 σ 1 1 σ −2 σ −2 σ −2 (Sη) (Sη) S + σ −2 σ (t − r)2 2 σ2 σ −2 (Sη)σ −2 (Sη)σ −1 1
(Sη)σ − 2
σ (Sη)σ −4 σ −4 +
σ σ −4
σ (Sη)σ −2 σ −2 +
σ σ −2
σ (Sη)σ −1 σ −1 +
σ σ −1
1
σ −4 4
σ −2 2
σ 4
1
1 1 S2 t −r
1 σ −1 σ
;
1 S (t − r)2
σ (Sη)2 4 ; σ
σ 2
σ
(Sη) 2 ;
σ , β = σ, σ −1
σ
2
;
α=
α=
1 σ (Sη) 2 ;
α=
α=
σ σ , β= , σ −2 2
σ σ , β= , σ −4 4
σ σ , β= , σ −2 2
α=
σ , β = σ. σ −1
All the above inequalities combined with (29), lead to
n σ ω 1 ωn 1 σ 2 C13 B( ) S + + 1 S σ n! (t − r)σ n! (t − r) 2 σ
Br (z)
Bt (z)
C13
B( )σ t n (t − r)σ
Sσ
ωn n!
1 2
,
(30)
Bt (z)
where B( ) is a constant depending on which comes from the coefficients in Young’s inequalities above. Now we can apply Meyers’ lemma: Lemma 2. (See [12].) If u = u(x) is a nonnegative, non-decreasing continuous function in the interval [0, d), which satisfies the functional inequality: u(s)
1−α c u(r) , r −s
for any 0 s < r < d,
with α and c being constants (0 < α < 1), then u(0)
2α+1 c (2α − 1)d
1
α
.
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2017
Using (30) and applying Meyers’ lemma with d = R0 − R, s = r − R and Φ(s) = n 1 ( BR+s (z) S σ ωn! ) σ , one can obtain 1
1
C σ B( )R0σ Φ(0) , (R0 − R)2 and thus Sσ
ωn n!
1
BR (z)
σ
1
(CR0 ) σ B( ). (R0 − R)2
(31)
From this, we obtain the Lp estimate of S for arbitrary p. However, by tracking the constant B( ), one can find that B( ) ∼ σ 4 . Thus, we cannot get the estimate for supΩ S by letting σ → ∞. Instead of that, we will use the standard Moser iteration to finish the L∞ estimate for S. Recall that by inequality (27) we have (σ − 2)
S σ −3 ηp+1 |∇S|2
ωn n!
Ω
ωn ωn σ −2 p + S σ −2 ηp+1 |∇S| C10 (p + 1) S η |∇η||∇S| n! n! Ω
+
S
σ − 21
ωn + ηp+1 n!
Ω
Ω
ωn . S σ −2 ηp+1 n!
Ω
Coupling this with Young inequalities S σ −2 ηp+1 |∇S| |∇S|2 S σ −3 ηp+1 + (p + 1)S σ −2 ηp |∇η||∇S| |∇S|2 S σ −3 ηp+1 +
1 p+1 σ −1 η S , 4 (p + 1)2 p−1 σ −1 η S |∇η|2 4
we have (σ − 2)
S σ −3 ηp+1 |∇S|2
ωn n!
Ω
C14 Ω
1 (p + 1)2 p−1 σ −1 ωn 1 S |∇η|2 + η S σ −1 ηp+1 + S σ − 2 ηp+1 + S σ −2 ηp+1 . σ −2 σ −2 n!
(32) Let now q = σ − 1 2, and p = 1, then one obtains
2018
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
S q−2 η2 |∇S|2 Ω
ωn n!
1 1 ωn 1 1 1 S q+ 2 η2 + S q−1 η2 . (33) S q |∇η|2 + S q η2 + 2 2 q −1 q −1 n! (q − 1) (q − 1)
C15 Ω
By the Sobolev inequality
2m
v m−1
ωn n!
m−1
2m
C
|∇v|2
Ω
ωn n!
1 2
+C
Ω
v2
ωn n!
1 2
Ω
q
applied to v = ηS 2 , we conclude that
q 2m ωn ηS 2 m−1 n!
m−1 2m
Ω
q 2 ωn ∇ ηS 2 n!
C16
1 2
+
Ω
ηS
q 2
2 ωn
1 2
n!
Ω
S q |∇η|2 +
C17
1
1 2 ωn 2 ωn 2 q . S q−2 η2 |∇S|2 + η2 S q 2 n! n!
Ω
(34)
Ω
Using the inequality (33), we have
2 q m ωn η S m−1 n!
Ω
m−1 m
C18
|∇η|2 S q + η2 S q + Ω
q2 q2 q 2 S |∇η| + S q η2 (q − 1)2 (q − 1)2
q 2 q+ 1 2 q 2 q−1 2 ωn 2 S S + η + η q −1 q −1 n!
(35)
for any q > 4. Again, let BR0 (z) Ω be a ball, and let 0 < R r1 < r2 R0 , R0 − R 1. By choosing C an appropriate testing function η(z), with 0 η 1, η|Br1 = 1, η|M/Br2 = 0, |∇η| r2 −r , we 1 conclude that
m
S q m−1 Br1 (z)
ωn n!
m−1 m
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
1+
C19 Br2 (z)
qC20 qC21
q2 (q − 1)2
1 +1 (r2 − r1 )2 1 +1 (r2 − r1 )2
2019
1 q 2 q+ 1 q 2 q−1 ωn q 2 + + 1 S + S S q −1 q −1 n! (r2 − r1 )2
1
S q + S q−1 + S q+ 2
ωn n!
Br2 (z)
1
S q+ 2
ωn . n!
(36)
Br2 (z)
Thus,
1 Cq +1 S qm m−1 L (Br1 (z)) (r2 − r1 )2
1 q
S
q+ 21 q q+ 21
L
(37) (Br2 (z))
for any 0 < R r1 < r2 R0 . qk m Let m−1 = qk+1 + 12 and rk = R + (R0 − R)2−k . Then, qk =
m m−1
k +
m−1 , 2
and |rk − rk−1 | = (R0 − R)2−k .
By (37), we have Cqk 1 +
S
q +1 L k+1 2 (Brk+1 (z))
1 qk
qk where ak :=
qk + 12 qk
S
1 (R0 − R)2
qk
S akq
1 k + 2 (B (z)) rk
L
1
qk
2k
2 qk S akq L
1 k + 2 (B (z)) rk
,
(38)
qk+1 + 21 (Brk+1 (z))
L
k
qi C 1 + 1 qi
i=1 qk + 12 qk
=
qk−1 m m−1 qk
k i=1
and thus
C 1+
1
. By iteration, it follows from (38) that
Notice that ak =
1 (rk+1 − rk )2
=
ai =
1 (R0 − R)2
m qk−1 m−1 qk ,
m m−1
k
1
qi
2
2i qi
ki=1 ai S
k
i=1 ai q1 + 21 (Br1 (z))
L
so
q0 qk−1 ··· = q1 qk
m m−1
k
q0 qk
.
(39)
2020
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
lim
k
k→∞
ai = q0 =
i=1
m+1 . 2
Moreover, k
qi C 1 + 1 qi
i=1
1 (R0 − R)2
1
qi
2
2i qi
=
lim
k→∞
qi C 1 + 1 qi
i=1
∞
When k → ∞, it is easy to show that 1 qi log( ∞ i=1 qi ) < ∞. Thus, k
k
1 i=1 qi
qi C 1 + 1 qi
i=1
1 (R0 − R)2 ∞
< ∞ and
1 (R0 − R)2
2i i=1 qi
1
qi
ki=1
1 qi
k
2
2i i=1 qi
.
< ∞. Notice also that
2i
2 qi < ∞.
It follows from (39), by letting k → ∞, S L∞ C S Choosing now σ = q1 +
1 2
=
m m−1
+
m 2
m+1 2 q1 + 21
L
.
(40)
(BR0 (z))
in (31), we finally obtain S L∞ C,
(41)
where C is a positive constant depending on K, |dω|ω , |R|ω , |∇R|ω , |T |ω , |∇T |ω , dist(Ω , ∂Ω) and |∇ s f |ω , s = 0, 1, 2, 3. 2 Acknowledgments The authors would like to thank Prof. Pengfei Guan and Slawomir Dinew for the numerous helpful discussions on this problem. The note was written while the first named author was visiting McGill University. He would like to thank this institution for the hospitality. Finally we wish to thank the referee for his/her valuable comments. Appendix A As mentioned in the introduction, using the idea from [13], we give a new proof for the elliptic inequality (5) in this section. Proof of the elliptic inequality (5).√Let ∇ and ∇˜ denote the Chern connections corresponding ¯ respectively. Define to the Hermitian metrics ω and ω + −1∂ ∂φ h = g˜ · g −1 and j
¯
hi = g˜ i k¯ g j k ,
−1 j ¯ h i = gi k¯ g˜ j k .
(42)
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2021
In fact, h can be thought to be an endomorphism h : T 1,0 (M) → T 1,0 (M), such that g(X, ˜ Y) = g(h(X), Y ). Set ¯
¯
S = g˜ j r¯ g˜ s k g˜ ml φj km ¯ φr¯ s l¯,
(43)
where φj km ¯ = ∇m ∇k¯ ∇j φ. By (42), we have θ˜ = ∂ g˜ · g˜ −1 = ∂(h · g) · g −1 h−1 = ∂h · g · g −1 · h−1 + h · ∂g · g −1 · h−1 = ∂h · h−1 + h · θ · h−1 = ∂h · h−1 + h · θ · h−1 − θ · h · h−1 + θ = θ + ∇ 1,0 h · h−1 . R˜ = ∂¯ θ˜ = ∂¯ θ + ∇ 1,0 h · h−1 = R + ∂¯ ∇ 1,0 h · h−1 .
(44)
(45)
By similar computation, we can get θ = ∂g · g −1 = θ˜ − h−1 ∇˜ 1,0 h , R = R˜ − ∂¯ h−1 · ∇˜ 1,0 h .
(46) (47)
Now, using the definitions, one can see that φj km ˜ j , ∂¯k ) = g˜ j k,m ¯ = (∇m g)(∂ ¯ . Thus, 1,0 2 ¯ ¯ S = g˜ j r¯ g˜ s k g˜ ml φj km ¯ φr¯ s l¯ = ∇ g˜ g˜ . On the other hand, ∇m g˜ = ∇m (h · g) = ∇m h · g =
∂ h + h · θ − θ · h · g, m m ∂zm
so ∂ ∇˜ m h = m h + h · θ˜m − θ˜m · h ∂z ∂ = m h + h · θm − θm · h + h · (∇m h) · h−1 − ∇m h ∂z = h · (∇m h) · h−1 .
(48)
2022
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
Thus, ∇m g˜ = ∇m h · g = h−1 · (∇˜ m h) · h · g = h−1 · (∇˜ m h) · g. ˜ Finally we end up with the formula 2 2 S = ∇ 1,0 g˜ g˜ = h−1 · ∇˜ 1,0 h g˜ = |θ˜ − θ |2g˜
(49)
i.e. S can be thought as the g-norm ˜ of the difference between the two connection 1-forms. Now, we can deduce the elliptic inequality: ˜ = ˜ h−1 · ∇˜ 1,0 h 2 S g˜
¯ = g˜ i j ∂i ∂j¯ h−1 · ∇˜ 1,0 h , h−1 · ∇˜ 1,0 h g˜
¯ = g˜ i j ∂i ∇˜ j¯ h−1 · ∇˜ 1,0 h , h−1 · ∇˜ 1,0 h g˜ + h−1 · ∇˜ 1,0 h , ∇˜ j h−1 · ∇˜ 1,0 h g˜
¯ = g˜ i j ∇˜ i ∇˜ j¯ h−1 · ∇˜ 1,0 h , h−1 · ∇˜ 1,0 h g˜
¯ + g˜ i j h−1 · ∇˜ 1,0 h , ∇˜ i¯ ∇˜ j h−1 · ∇˜ 1,0 h g˜ 2 2 + ∇˜ 1,0 h−1 · ∇˜ 1,0 h g˜ + ∇˜ 0,1 h−1 · ∇˜ 1,0 h g˜ .
(50)
¯ −1 · (∇˜ 1,0 h)), we have Using the relation R = R˜ − ∂(h l ¯ ¯ l l . − Rmt g˜ i j ∇˜ i ∇˜ j¯ h−1 · ∇˜ t1,0 h m = g˜ i j ∇˜ i R˜ mt j¯ j¯
(51)
Recall the Bianchi identities of curvature forms which can be found in [11] (p. 135): R(X, Y )Z = T T (X, Y ), Z + (∇X T )(Y, Z); ∇X R(Y, Z) + R T (X, Y ), Z = 0,
(52) (53)
where X, Y, Z ∈ T M and T is the torsion of the connection ∇ (recall that ∇ is not necessarily the Levi-Civita connection), while denotes the cyclic sum with respect to X, Y , Z. By the first Bianchi identity (52), one obtains ˜ i , ∂ ¯ )∂m + R(∂ ˜ ¯ , ∂m )∂i + R(∂ ˜ m , ∂i )∂ ¯ R(∂ j j j = T˜ T˜ (∂i , ∂j¯ ), ∂m + T˜ T˜ (∂j¯ , ∂m ), ∂i + T˜ T˜ (∂m , ∂i ), ∂j¯ + (∇˜ i T˜ )(∂j¯ , ∂m ) + (∇˜ j¯ T˜ )(∂m , ∂i ) + (∇˜ m T˜ )(∂i , ∂j¯ ). Recall the fact that R˜ 2,0 = R˜ 0,2 = 0, T˜ 1,1 = 0 (since ∇˜ is the Chern connection) and T˜ (∂m , ∂i ) ∈ T 1,0 (M). Also
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2023
T˜ (∂i , ∂j¯ ) = T˜ (∂j¯ , ∂m ) = (∇˜ i T˜ )(∂j¯ , ∂m ) = (∇˜ m T˜ )(∂i , ∂j¯ ) = 0, ˜ m , ∂i )∂ ¯ = 0. R(∂ j Thus, ˜ i , ∂ ¯ )∂m + R(∂ ˜ ¯ , ∂m )∂i = (∇˜ ¯ T˜ )(∂m , ∂i ). R(∂ j j j ˜ i , ∂ ¯ )∂m = R˜ l ∂l and R˜ l = −R˜ l , so we get By definition R(∂ j mi j¯ mi j¯ mj¯i l l l = R˜ im + T˜mi, . R˜ mi j¯ j¯ j¯
(54)
l¯ ˜ l¯ ˜ l¯ . R˜ ki ¯ j¯ = Rj¯i k¯ + Tj¯k,i ¯
(55)
Similarly, one can also obtain
Moreover, by the second Bianchi identity (53) and following the same step as above we have l ˜ l ¯ + R˜ l ¯ = −R˜ T˜ (∂i , ∂t ), ∂ ¯ − R˜ T˜ (∂t , ∂ ¯ ), ∂i − R˜ T˜ (∂ ¯ , ∂i ), ∂t + R R˜ mt ¯ j j j j ,i mj i,t mit,j l and R˜ mit, = 0, T˜ (∂t , ∂j¯ ) = T˜ (∂j¯ , ∂i ) = 0. Thus, j¯ l l l = R˜ mt + T˜its R˜ ms . R˜ mi j¯,t j¯,i j¯
(56)
Now, using the identities (54), (55) and (56), we obtain ¯
¯
¯
¯
l l l l g˜ i j ∇˜ i R˜ mt = g˜ i j R˜ mt = g˜ i j R˜ mi − g˜ i j T˜its R˜ ms j¯ j¯,i j¯,t j¯ ¯
¯
¯
lk ij s ˜ l = g˜ i j R˜ mki ¯ j¯,t g˜ − g˜ T˜it R ms j¯
l k¯ ¯ s i j¯ s ˜ l = g˜ i j R˜ i km ¯ j¯,t + T˜mi,j¯t g˜ s k¯ g˜ − g˜ T˜it R ms j¯ ¯ l k¯ i j¯ l i j¯ s ˜ l = −g˜ i j R˜ kim ¯ j¯,t g˜ + g˜ T˜mi,j¯t − g˜ T˜it R ms j¯ ¯ ¯ ¯ l ¯ l k¯ i j¯ l¯ l = −g˜ i j R˜ j¯imk,t g˜ i l¯g˜ l k + g˜ i j T˜mi, − g˜ i j T˜its R˜ ms ¯ g˜ − g˜ T˜j¯k,mt ¯ j¯t j¯ ¯ ¯ ¯ l ¯ l k¯ i j¯ l¯ l = g˜ i j R˜ i j¯mk,t g˜ i l¯g˜ l k + g˜ i j T˜mi, − g˜ i j T˜its R˜ ms ¯ g˜ − g˜ T˜j¯k,mt ¯ j¯t j¯ ¯
¯
¯
¯
¯
¯
i lk ij ˜ l l l = R˜ im g˜ i l¯g˜ l k + g˜ i j T˜mi, − g˜ i j T˜its R˜ ms . ¯ ¯ g˜ − g˜ Tj¯k,mt k,t j¯t j¯
(57)
From the Monge–Ampère equation (2), it follows that i ˜ i ˜ R˜ im ¯ = ∇t Rimk¯ − ∇t fmk¯ . k,t
(58)
2024
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
In the following, we denote = O(S α ) if there is a constant C depending only on K, |dω|ω , 1 |R|ω , |∇R|ω , |T |ω , |∇T |ω and |∇ s f |ω , s = 0, 1, 2, 3, such that CS α . Note that ∇˜ is O(S 2 ), so 1 i l k¯ 2 + O(1). R˜ im ¯ g˜ = O S k,t
(59)
T˜j¯s¯k,mt = (∂j¯ gnk¯ − ∂k¯ gnj¯ )g˜ n¯s mt ¯ n¯s n¯s = Tj¯kn = ∇˜ t ∇˜ m Tj¯kn ¯ g˜ ¯ g˜ mt n¯s l = ∇˜ t ∇m Tj¯kn ¯ − (θ˜m − θm )n Tj¯kl ¯ g˜ l ˜ t (θ˜m − θm )ln T ¯ ¯ = ∇t (∇m Tj¯kn ¯ ) − (θ˜t − θt )m ∇l Tj¯kn ¯ −∇ j kl n¯s l l s g˜ . − (θ˜t − θt )n ∇m Tj¯kl ¯ − (θ˜m − θm )n ∇t Tj¯kl ¯ − (θ˜t − θt )l Tj¯ks ¯
(60)
For the second term in (57)
Again, by the fact that ∇˜ is O(S 2 ) and |h−1 · (∇˜ 1,0 h)|g˜ is also O(S 2 ), we have 1
i j¯ l¯ g˜ T˜
g˜ i l¯g˜ ¯ j¯k,mt
l k¯
1
1 O S 2 + O(S) + C ∇˜ 1,0 h−1 · ∇˜ 1,0 h + O(1).
(61)
Similarly, we can get the estimate for the last two terms in (57) i j¯ l g˜ T˜
mi,j¯t
O S 12 + O(S) + C ∇˜ 0,1 h−1 · ∇˜ 1,0 h + O(1),
i j¯ s l g˜ T˜ R˜ C ∇˜ 0,1 h−1 · ∇˜ 1,0 h + O(1). it ms j¯
(62) (63)
Putting the above estimates (57)–(63) into (51), we can conclude that i j¯ g˜ ∇˜ i ∇˜ ¯ h−1 · ∇˜ t1,0 h l j m 1 O S 2 + O(S) + C ∇˜ 1,0 h−1 · ∇˜ 1,0 h + C ∇˜ 0,1 h−1 · ∇˜ 1,0 h . One the other hand, ¯ l −1 1,0 ¯ ¯ g˜ i j ∇˜ i¯ ∇˜ j h−1 · ∇˜ 1,0 h = g˜ i j ∇˜ j ∇˜ i¯ h−1 · ∇˜ 1,0 h − g˜ i j R˜ mi # h · ∇˜ h j¯ where i j¯ l −1 1,0 g˜ R˜ mi j¯ # h · ∇˜ h
s l l l s ¯ − h−1 · ∇˜ s1,0 h m R˜ tis j¯ − h−1 · ∇˜ t1,0 h s R˜ mi = g˜ i j h−1 · ∇˜ t1,0 h m R˜ si j¯ j¯ × dzt ⊗ dzm ⊗
∂ ∂zl
(64)
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
2025
and ¯ l ¯ l ¯ l ¯ ¯ ¯ l k¯ i j¯ ˜ l = g˜ i j R˜ im + g˜ i j T˜mi, = g˜ i j R˜ i j¯mk¯ g˜ l k + g˜ i j T˜j¯s¯k,m g˜ i j R˜ mi ¯ g˜ i s¯ g˜ + g˜ Tmi,j¯ . j¯ j¯ j¯
Thus i j¯ l g˜ R˜
mi j¯
O S 12 + O(1).
Hence we conclude that i j¯ g˜ ∇˜ ¯ ∇˜ j h−1 · ∇˜ 1,0 h i ¯ ¯ g˜ i j ∇˜ j ∇˜ ¯ h−1 · ∇˜ 1,0 h + g˜ i j R˜ l i
mi j¯
−1 1,0 # h · ∇˜ h
1 O S 2 + O(S) + C ∇˜ 1,0 h−1 · ∇˜ 1,0 h + C ∇˜ 0,1 h−1 · ∇˜ 1,0 h .
(65)
Finally, by (50) and (64), (65), we obtain the elliptic inequality: ˜ −C1 S 2 − C2 S 3
(66)
where C1 , C2 are positive constants depending only on K, |dω|ω , |R|ω , |∇R|ω , |T |ω , |∇T |ω and |∇ s f |ω , s = 0, 1, 2, 3. 2 References [1] E. Bedford, B.A. Taylor, The Dirichlet problem for a complex Monge–Ampère equation, Invent. Math. 37 (1976) 1–44. [2] E. Calabi, Improper affine hyperspheres and a generalization of a theorem of K. Jörgens, Michigan Math. J. 5 (1958) 105–126. [3] P. Cherrier, Équations de Monge–Ampère sur les variétés Hermitiennes compactes, Bull. Sci. Math. (2) 111 (1987) 343–385. [4] P. Cherrier, Le probléme de Dirichlet pour des équations de Monge–Ampère complexes modifiées, J. Funct. Anal. 156 (1998) 208–251. [5] L. Caffarelli, J. Kohn, L. Nirenberg, J. Spruck, The Dirichlet problem for nonlinear second order elliptic equations, II: Complex Monge–Ampère and uniformly elliptic equations, Comm. Pure Appl. Math. 38 (1985) 209–252. [6] S. Dinew, S. Kolodziej, Pluri-potential estimates on compact Hermitian manifolds, arXiv:0910.3937. [7] S. Dinew, X. Zhang, X.W. Zhang, The C 2,α estimate of complex Monge–Ampere equation, Indiana Univ. Math. J., in press. [8] J. Fu, S.T. Yau, The theory of superstring with flux on non-Kähler manifolds and the complex Monge–Ampère equation, J. Differential Geom. 78 (2008) 369–428. [9] B. Guan, Q. Li, Complex Monge–Ampère equations and totally real submanifolds, Adv. Math. 225 (3) (2010) 1185–1223. [10] A. Hanani, Equations du type de Monge–Ampère sur les variétés hermitiennes compactes, J. Funct. Anal. 137 (1996) 49–75. [11] S. Kobayashi, K. Nomizu, Foundations of Differential Geometry, vol. I, Wiley Classics Lib., John Wiley & Sons, 1963. [12] N.G. Meyers, On a class of non-uniformly elliptic quasi-linear equations in the plane, Arch. Ration. Mech. Anal. 12 (1963) 367–391. [13] D.H. Phong, N. Sesum, J. Sturm, Multiplier ideal sheaves and the Kähler–Ricci flow, Comm. Anal. Geom. 15 (2007) 613–632.
2026
X. Zhang, X. Zhang / Journal of Functional Analysis 260 (2011) 2004–2026
[14] D. Riebesehl, F. Schulz, A priori estimates and a Liouville theorem for complex Monge–Ampère equations, Math. Z. 186 (1984) 57–66. [15] V. Tosatti, B. Weinkove, Estimates for the complex Monge–Ampère equation on Hermitian and balanced manifolds, arXiv:0909.4496. [16] V. Tosatti, B. Weinkove, The complex Monge–Ampère equation on compact Hermitian manifolds, J. Amer. Math. Soc. 23 (4) (2010) 1187–1195. [17] V. Tosatti, B. Weinkove, S.T. Yau, Taming symplectic forms and the Calabi–Yau equation, Proc. Lond. Math. Soc. (3) 97 (2008) 401–424. [18] S.T. Yau, On the Ricci curvature of a compact Kähler manifold and the complex Monge–Ampère equation, Comm. Pure Appl. Math. 31 (1978) 339–411. [19] X.W. Zhang, A priori estimates for complex Monge–Ampère equation on Hermitian manifolds, Int. Math. Res. Not. 2010 (19) (2010) 3814–3836.
Journal of Functional Analysis 260 (2011) 2027–2042 www.elsevier.com/locate/jfa
An additive formula for Samuel multiplicities on Hilbert spaces of analytic functions Guozheng Cheng a,∗ , Xiang Fang b,1 a School of Mathematics, Wenzhou University, Wenzhou, Zhejiang, 325035, China b Department of Mathematics, Kansas State University, Manhattan, KS 6650, United States
Received 21 July 2010; accepted 29 September 2010 Available online 8 October 2010 Communicated by D. Voiculescu
Abstract We establish a short exact sequence to relate the germ model of invariant subspaces of a Hilbert space of vector-valued analytic functions and the sheaf model of the corresponding coinvariant subspaces. As a consequence we obtain an additive formula for Samuel multiplicities. As an application, we give a different proof for a formula relating the fibre dimension and the Samuel multiplicity which is first proved in Fang (2005) [11]. The feature of the new proof is that the analytic arguments in Fang (2005) [11] are now subsumed by algebraic machinery. © 2010 Elsevier Inc. All rights reserved. Keywords: Samuel multiplicity; Fibre dimension; Sheaf model; Germ model
1. Introduction In this paper we prove an additive formula (5) for Samuel multiplicities on Hilbert spaces of analytic functions. To prove the formula we establish a short exact sequence (4) which enables us to capture the information in the much-studied sheaf model [7,16] of a quotient module, by the germ model of a submodule, a model which has received less attention in the past (see Section 4). * Corresponding author.
E-mail addresses: [email protected] (G. Cheng), [email protected] (X. Fang). 1 Partially supported by National Science Foundation Grant DMS 0801174 and Laboratory of Mathematics for
Nonlinear Science, Fudan University. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.09.015
2028
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
In commutative algebra, the additivity of Samuel multiplicities [6, p. 273, p. 279], [14, p. 52] is of fundamental importance for applications in algebraic geometry and a parallel version in operator theory (see (2)) is proved, say, for the Hardy space H 2 (D) and the Dirichlet space D over the unit disk, but not possible for the Bergman space L2a (D) [10]. The obstacle for L2a (D) is largely the fact that the codimension dim(M zM) of an invariant subspace can be arbitrary [1,3]. In several variables, the formula (2) is true for the symmetric Fock space Hd2 [13], but the problem remains open for the Hardy space over the ball or over the polydisc in Cd , d 2. For more details on Samuel additivity on these function spaces, see Section 3. The purpose of this paper is to show that a modification of the Samuel additivity formula holds for natural Hilbert spaces of analytic functions, such as those related to weighted shifts. Namely, we define Samuel multiplicities on coinvariant subspaces by the sheaf model, while on invariant subspaces we use the germ model to define these multiplicities. Then we show that they naturally add up to the total multiplicity. Our motivation is to obtain a conceptual understanding of the following formula (1) from [11], which holds for invariant subspaces M ⊂ H ⊗ CN of a large class of Hilbert spaces of analytic functions, such as the Hardy space or the Bergman space over the unit ball or the polydisc: f d(M) + e M ⊥ = N.
(1)
For explanation of notations, see Theorem 6. In this formula the fibre dimension f d(M), an analytic invariant, is added to the Samuel multiplicity e(M⊥ ), an algebraic invariant. The novelty in our new proof of (1) is probably that many of the analytic and computational arguments in [11] are now replaced by algebraic ones. Because the arguments in this paper have a heavy algebraic and sheaf-theoretic flavor, in order to see the relevance to other problems in operator theory, we recall that the case of the symmetric Fock space allows one to show that the curvature of a pure d-contraction is equal to the Samuel multiplicity [12]. Also formula (1) can be used to calculate Fredholm indices of many Hilbert modules [11]. 2. Definition of Samuel multiplicity in operator theory For a single operator T ∈ B(H ), the Samuel multiplicity is defined to be dim(H /T k H ) , k→∞ k
e(T , H ) = lim
which is well defined and is indeed a finite integer if dim(H /T H ) < ∞ [9]. In general, by a Hilbert module H over the polynomial ring A = C[z1 , . . . , zd ] [4] we mean a complex, separable Hilbert space H which admits an A-module structure such that the action of each zi induces a bounded operator Ti on H . Then let T = (T1 , . . . , Td ). The assumption we will need is that dim(H /T H ) < ∞, where T H T1 H + · · · + Td H. Let I = (z1 , . . . , zd ) ⊂ A be the maximal ideal at the origin. According to results on Hilbert polynomials [5,6,14], the function φH,T (k) = dim H /I k H
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2029
becomes a polynomial when k 0. Moreover, dim(H /I k H ) k→∞ kd
e(H ) = d! · lim
exists, and is an integer, which we define to be the Samuel multiplicity of H with respect to I [8]. This is an important invariant in algebraic geometry and its Hilbert space version has found many connections with operator theory in recent years. Examples of e(·). Let H 2 be the Hardy space or the Bergman space over the unit ball or the polydisc in Cd , and let H = H 2 ⊗ CN , where N ∈ N. Assume that M ⊂ H is a submodule and M⊥ is the associated quotient module, with module actions induced by the multiplication of coordinate functions z1 , . . . , zd . (1) e(H ) = N , which can be checked directly from the definition of e(·). (2) e(M⊥ ) is always finite since we have M⊥ /I M⊥ ∼ = H /(I H + M), which is finite dimensional. Indeed, we have M⊥ /I k M⊥ ∼ = H/ I kH + M ,
∀k ∈ N.
Since the dimension of H /(I k H + M) is at most that of H /I k H , it follows that e M⊥ e(H ) = N. (3) e(M) = dim(M zM) when d = 1. In general, e(M) < ∞ if and only if dim(M/I M) < ∞. (4) When H 2 is the symmetric Fock space Hd2 and M ⊂ H 2 ⊗ CN , e(M) is either at most N or equal to ∞ [13]. Notations and Conventions. In this paper we mainly work with Hilbert modules of analytic functions, as well as their submodules and quotient modules. We always assume that the module actions are induced by the multiplication of coordinate functions. Moreover, we use I = (z1 , . . . , zd ) to denote the maximal idea at the origin, either in the polynomial ring A = C[z1 , . . . , zd ] or in O0 , the local ring of germs of analytic functions around the origin. Samuel multiplicities are always taken with respect to I , unless otherwise specified. Let Iλ = (z1 − λ1 , . . . , zd − λd ) be the maximal ideal of A at λ = (λ1 , . . . , λd ) ∈ Cd . 3. Additivity of Samuel multiplicities Let H be a Hilbert module of analytic functions over a domain Ω ⊂ Cd containing the origin. Let M ⊂ H ⊗ CN be a submodule, and M⊥ be the associated quotient module. Then the Samuel additivity formula concerns whether the following equation holds: e(M) + e M⊥ = e H ⊗ CN .
(2)
2030
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
In case of the Hardy space H = H 2 (D) or the Dirichlet space H = D over the unit disc, where the formula does hold, one has e H ⊗ CN = N, and e(M) = dim(M zM). In particular, the codimension-N property dim(M zM) N follows since e(M⊥ ) 0, Indeed the study of (2) has led the second author to show in [10] that dim(M zM) = sup dim M(λ) N, λ∈D
where M(λ) f (λ): f ∈ M is a subspace of CN . On the other hand, for H = Hd2 , the symmetric Fock space over the unit ball in Cd , the additivity formula (2) holds if and only if dim(M/I M) < ∞ [13]. Lastly, for the Bergman space H = L2a (D), it is well known that e(M) = dim(M zM) can be arbitrarily large [1,3], hence the additivity formula is far from being true. In summary, it appears that the failure of the Samuel additivity (2) is largely due to the fact that dim(M I M) can be too large. In order to rescue the formula, one needs to modify the definition of e(M) on M to ensure its finiteness. 4. Sheaf model vs. germ model The (rather successful) idea of sheafifying a Hilbert module H encodes information about H by algebraic modules and in this vein the standard procedure is to consider the so-called sheaf model H˜ [7,16], H˜ = O(H )/(T − w)O(H ). Here O(H ) denotes the sheaf of H -valued analytic functions, the tuple T = (T1 , . . . , Td ) denotes the module actions of multiplication of z1 , . . . , zd on H , w = (w1 , . . . , wd ) the coordinate functions for the sheave O, and (T − w)O(H ) = (T1 − w1 )O(H ) + · · · + (Td − wd )O(H ). Moreover, we are interested in the stalk H˜ λ at a point λ ∈ Cd , H˜ λ = Oλ (H )/(T − w)Oλ (H ), which is a module over Oλ . For further discussion more notations and conventions are needed. We will write a basic tensor f ∈ O(H ) or O0 (H ) as h⊗g(w), where h ∈ H , w being the variable for the sheaf O, and g being
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2031
an analytic function in w. Then we use f˜ to denote the class of f , either in H˜ or H˜ 0 . Moreover, an element f ∈ O0 (H ) is represented by an H -valued analytic function over a neighborhood of the origin, so we have a power series expansion f=
fi ⊗ w i ,
i0
where fi ∈ H. In several variables, one just replaces the index i by a multi-index I = (i1 , . . . , id ). (There seems to be no danger of confusing it with the ideal I = (z1 , . . . , zd ).) On the other hand, there is another rather naive way to sheafify a submodule M if we assume that elements of M are E-valued analytic functions over a domain Ω ⊂ Cd . Here E is another ˆ generated by elements of M as analytic funcHilbert space. Namely, we consider the sheaf M tions. For the stalk of a function f ∈ M at a point λ ∈ Ω, we send the function directly to its germ f ∈ M → fλ ∈ Oλ (E), ˆ the germ model of M over Ω. Note that this is not a functorial and call the resulting sheaf M ˆ λ is a finite linear combination of elements of the form operation. Also note that an element in M r · fλ , where r ∈ Oλ and f ∈ M. ˆ The sheaf model H˜ has been thoroughly studied [7], while the germ ˜ and M. Comparison of H ˆ ˆ is not a functorial construction, while model M receives less attention, probably because M ˆ from the viewpoint of the sheaf model H˜ is. In particular, H˜ is a right-exact functor. For M, homological algebra, an operation with no exactness and no functoriality is usually of less value. ˆ is that it applies only to submodules. Another serious drawback of M ˆ however, is clearly much easier to define, and one of the main findings The germ model M, ˆ encodes essentially all of this paper is to show that under natural conditions the germ model M ⊥ of the associated quotient module. In particular, for Samuel information in the sheaf model M additivity, we have the following result. Theorem 1. Let H be the Hardy space or the Bergman space over the unit ball or the polydisc in Cd (d ∈ N), and M ⊂ H ⊗ CN (N ∈ N) be an invariant subspace. Then ⊥ = N. ˆ 0) + e M e(M 0
(3)
So this version of Samuel additivity circumvents the difficulty associated with the largeness of dim(M zM). The proof of Theorem 1 is given after Proposition 5. Remarks. (1) Both Samuel multiplicities are taken with respect to I = (z1 , . . . , zd ) ⊂ O0 . (2) Note that e((H ⊗ CN )0 ) = e((H ⊗ CN )0 ) = N . (3) The theorem is not stated in the most general form and follows from Theorem 2.
2032
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
5. Main result Let E be a Hilbert space and let H be a Hilbert module of E-valued analytic functions over a domain Ω ⊂ Cd . We say that H is regular at a point λ ∈ Ω if dim(H /Iλ H ) < ∞. By a natural Oλ -module homomorphism jλ : Hˆ λ → H˜ λ we mean an Oλ -module homomorphism such that jλ (fλ ) = (f ⊗ 1)λ ,
∀f ∈ H.
Recall that fλ ∈ Oλ (E) is the germ at λ of f ∈ H as an E-valued analytic function, and f ⊗ 1 is ˜ denotes a constant function in the space O(H ) of H -valued analytic functions. Moreover, the (·) the class in the sheaf model O(H )/(T − w)O(H ). Remark. To connect the sheaf model H˜ and the germ model Hˆ it is natural to construct homomorphisms between them. We do not know reasonable conditions to guarantee the existence of morphisms in the reverse directions H˜ λ → Hˆ λ , other than isomorphisms. We also do not know the implications that the existence of such morphisms has. Theorem 2. If a Hilbert module H of vector-valued analytic functions over a domain Ω ⊂ Cd satisfies that (1) H is regular at λ ∈ Ω, that is, dim(H /Iλ H ) < ∞, (2) there is a natural Oλ -module homomorphism jλ : Hˆ λ → H˜ λ , extending jλ (fλ ) = (f ⊗ 1)λ for f ∈ H , then for any submodule M ⊂ H , one has a short exact sequence of finitely generated Oλ modules qλ kλ ⊥ → 0. ˆ λ −→ H˜ λ −→ M 0→M λ
(4)
It follows the Samuel additivity formula ⊥ = e(H˜ ). ˆ λ) + e M e(M λ λ
(5)
Here the Samuel multiplicities are taken with respect to Iλ . The map kλ in (4) is the composition ˆ λ → Hˆ λ , which is induced by the inclusion i : M → H , and the natural map of the map iλ : M jλ : Hˆ λ → H˜ λ . Lastly, qλ is induced by the quotient map q : H → H /M ∼ = M⊥ . The existence of jλ is discussed in Section 6. The proof of Theorem 2 is in Section 7. It is ⊥ λ ) admit more operator-theoretic interpretaˆ λ ) and e(M probably natural to ask whether e(M ˆ λ ), as we will see in tion such as that e(M) is just dim(M zM) in one variable. For e(M the proof of Theorem 6, it is equal to the fibre dimension under fairly natural conditions. For ⊥ λ ), although it is not obvious from definition, it is indeed always equal to the Samuel mule(M tiplicity e(M⊥ ) defined by spatial actions directly [13]. These observations form the idea of our
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2033
new proof of formula (1) in Theorem 6. So, in a sense, the short exact sequence (4), as well as (6) below, can be regarded as a lifting of formula (1) to the sheave level. Theorem 2 admits a sheaf version. Theorem 3. If a Hilbert module H of vector-valued analytic functions over a domain Ω ⊂ Cd satisfies that (1) H is regular at any λ ∈ Ω, dim(H /Iλ H ) < ∞, (2) there is a natural O|Ω -module homomorphism of analytic sheaves j : Hˆ |Ω → H˜ |Ω , extend ing jΩ (f |Ω ) = (f ⊗ 1)|Ω for f ∈ H and any open Ω ⊂ Ω, then for any submodule M ⊂ H , one has a short exact sequence of coherent analytic sheaves ⊥ |Ω → 0. ˆ Ω → H˜ |Ω → M 0 → M|
(6)
Proof. By standard results in sheaf theory, the exactness of the above sheave sequence is equivalent to the exactness of the sequence of stalks at each point, which is the conclusion of Theorem 2. 2 ⊥ of M⊥ can So under the conditions of Theorems 2 and 3, the study of the sheaf model M ˆ of M. Next we show that be, in principle, transformed into the study of the germ model M conditions (1) and (2) of Theorem 2 are satisfied for many natural Hilbert modules. 6. On the existence of the natural map jλ : Hˆ λ → H˜ λ and the proof of Theorem 1 Once we know that Hˆ 0 ∼ = H˜ 0 ∼ = O0 when H is the Hardy space or the Bergman space over the unit ball or the polydisc in Cd , Theorem 1 will follow from Theorem 2. Here we prove a more general result. Lemma 4. Let H be a Hilbert module of scalar-valued analytic functions over a domain Ω ⊂ Cd , d ∈ N, obtained by completing the polynomials A = C[z1 , . . . , zd ] with respect to a Hilbert space ¯ norm. That is, H = A. If H is regular at λ ∈ Ω, that is, dim(H /Iλ H ) < ∞, and λ ∈ int(bpe(H )), the interior of the set of bounded point evaluations of H , then Hˆ λ ∼ = H˜ λ ∼ = Oλ . Moreover, the isomorphism between Hˆ λ and H˜ λ can be chosen to be an Oλ -module homomor phism jλ such that jλ (fλ ) = (f ⊗ 1)λ for any f ∈ H . Proof. Without loss of generality we assume that λ = 0, so Iλ = I . The natural isomorphism between Hˆ 0 and O0 is easy: since Hˆ 0 is a submodule of O0 generated by germs f0 , f ∈ H , and Hˆ 0 contains a generator 10 , the germ of the constant function f (z) = 1, the two modules are indeed equal. For H˜ 0 = O0 (H )/(T − w)O0 (H ), we claim that (1) any element x ∈ H˜ 0 can be represented by 1 ⊗ f0 ∈ O0 (H ) for some f0 ∈ O0 ;
2034
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
(2) {1 ⊗ f0 : f0 ∈ O0 } is naturally isomorphic to O0 ; ⊗ 1)0 ∈ H˜ 0 for any f ∈ H . (3) 1 ⊗ f0 = (f For (1), we first show that dim(H /I H ) < ∞ implies dim(H /I H ) = 1. Notice that dim(H /I H ) < ∞ implies that I H is a closed subspace, hence 1C + I H is still closed. On the other hand, 1C + I H contains all polynomials, so 1C + I H = H . dim(H /I H ) be such that {hi + I H } span the space H /I H . By a result of Let {hi ∈ H }i=1 Markoe [15], when H is regular at the origin, the O0 -module H˜ 0 is finitely generated and ⊗ 1)0 is indeed generated by (h i ⊗ 1)0 . Since dim(H /I H ) = 1, 1 + I H spans H /I H . So (1 ˜ forms a generator of H0 and the submodule generated by (1 ⊗ 1)0 is of the form O0 · (1 ⊗ 1)0 = {1 ⊗ f0 (w), f0 ∈ O0 }. Now (1) is verified. ⊗ f0 = 0 for any nonzero f0 ∈ O0 . To show (2), that is, H˜ 0 ∼ = O0 , it suffices to show that 1 f0 (w) = 0 For convenience, we use 1z to denote the constant function 1 in H . Suppose that 1z ⊗ for some f0 ∈ O0 , that is, there are x (1) , . . . , x (d) ∈ O0 (H ) such that 1z ⊗ f0 (w) =
d (Tj − wj )x (j ) .
(7)
j =1
Then it is sufficient to show that f0 = 0. Since f0 and x (j ) are analytic functions around the origin, we can expand them into power series f0 (w) =
and x (j ) (w) =
cI w I
I
(j )
xI ⊗ w I .
I
(j )
Note that cI ∈ C and xI ∈ H . By comparing the coefficients of each w I in (7), we have (1)
(d)
(8)
Tj xI − xI −ej .
(9)
c 0 1 z = T1 x 0 + · · · + Td x 0 , and for each I = (i1 , . . . , id ), cI 1z =
d j =1
(j )
(j )
For each k 0, let Sk =
d j =1 I : |I |=k
(j )
T I xI −ej .
Claim One: I : |I |=k
cI zI = Sk+1 − Sk .
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2035
Proof of Claim One. The case k = 0 is just the above (8) because (1)
(d)
S 1 = T1 x 0 + · · · + Td x 0 (j )
and S0 = 0, since xI −ej are automatically zero. In general, we look at those I ’s such that |I | = k,
cI z I =
I : |I |=k
T I · cI 1z =
I : |I |=k
d (j ) (j ) T I Tj xI − T I xI −ej . j =1 I : |I |=k
The second term yields Sk . The first term is equal to d
T I +ej xI . (j )
j =1 I : |I |=k
For each J with |J | = k + 1, there are d ways to rewrite it J = I + ej for j = 1, . . . , d. For each (j ) rewriting, the vector xI is determined by j , so we have d
T I +ej xI = (j )
j =1 I : |I |=k
d
j =1 J : |J |=k+1
(j )
T J xJ −ej Sk+1 .
Claim Two: Sk = 0 for each k 1. Proof of Claim Two. We will use induction. First, for k = 1, we have (1)
(d)
c0 = S1 = z1 x0 + · · · + zd x0 . Since, as analytic functions around the origin, the left side is a constant and the right side vanishes at the origin, we have both sides to be zero. Hence c0 = 0 and S1 = 0. Now assume that Sk = 0. To deal with Sk+1 , by Claim One, we have
cI zI = Sk+1 .
I : |I |=k
As analytic functions around the origin, the left side is a homogeneous polynomial of degree k and the right side is of vanishing order at least k + 1. It follows that both sides are zero. So Claim Two is proved and so is (2). For (3), by the definition of the sheaf model, one has zf ⊗ r = Tf ⊗ r = f ⊗ wr ⊗ 1)0 = 1 ⊗ p0 for any polynomial p ∈ H . For for any f ∈ H and r ∈ O0 . In particular, (p any f ∈ H , by the polynomial density assumption in the lemma, we can choose a sequence of polynomials {pi } such that pi − f H → 0
as i → ∞.
2036
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
Then, as constant functions in O0 (H ), we have pi ⊗ 1 → f ⊗ 1 as i → ∞, where the convergence is the convergence of analytic functions on any small neighborhood of the origin. It follows (f ⊗ 1)0 = lim (p i ⊗ 1)0 , i→∞
which is equal to (pi )0 . lim 1 ⊗
i→∞
Since pi → f in H -norm and 0 ∈ int (bpe(H )), we have pi → f as functions on some neighborhood of 0. That is, (pi )0 → f0 in O0 . It follows that (pi )0 = 1 ⊗ f0 . lim 1 ⊗
i→∞
2
Next we show that if we drop the polynomial density condition in Lemma 4, then it is possible that there exists no required natural map jλ : Hˆ λ → H˜ λ . Proposition 5. Let H be a C[z]-Hilbert module of scalar-valued analytic functions over a domain Ω ⊂ C. If H is regular at a point λ ∈ Ω, but dim(H /Iλ H ) = 1, then there can be no Oλ -module homomorphism jλ : Hˆ λ → H˜ λ such that jλ (f0 ) = (f ⊗ 1)0 , f ∈ H . Proof. Without loss of generality we assume that λ = 0. Let t = dim(H /I H ) ∈ N. Note that the operator T = Mz , the multiplication by z, is a Fredholm operator on H with a trivial kernel; that is, ker(T ) = {0}. By basic properties of Fredholm operators one has dim H /I k H = kt. It follows that the Samuel multiplicity of H is e(H ) = t. According to Theorem 1 in [13], e(H˜ 0 ) = e(H ) = t > 1. Since H is regular at 0, by [15] H˜ 0 is generated (f 1 ⊗ 1)0 , . . . , (f t ⊗ 1)0 , where f1 + I H, . . . , ft + I H forms a basis for H /I H . If the map j0 exists, then by the assumption on j0 , one has (f i ⊗ 1)0 = j0 ((fi )0 ). It follows that j0 is surjective; that is, j0 (Hˆ 0 ) = H˜ 0 . For Noetherian modules, the Samuel multiplicity of a module is at least the Samuel multiplicity of its image under a module homomorphism, so e(Hˆ 0 ) e(H˜ 0 ).
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2037
Note that this is indeed a consequence of the Samuel additivity formula in algebra. Now one has e(Hˆ 0 ) t. But Hˆ 0 is just a submodule of O0 , so e(Hˆ 0 ) e(O0 ) = 1. Contradiction.
2
Now Theorem 1 follows from Theorem 2, which is proved in the next section. Proof of Theorem 1. We just need to show the existence of the natural module homomorphism j0 which is the identify map according to Lemma 4. Now the proof follows from Theorem 2. 7. Proof of Theorem 2 We first collect some facts about the I -adic topology on a module from [17]. Let R be a Noetherian ring, I ⊂ R be an ideal, and M be an R-module, with a natural filtration {I k M}k1 . Define the I -adic topology on M by declaring the closure of a subset S ⊂ M to be S + I kM . S¯ = k1
This topology is Hausdorff on M if and only if following fact.
k1 I
kM
= {0}. More importantly, we need the
Fact. (See [17, Corollary 4, p. 18].) If I is contained in the radical of R, that is, the intersection of all the maximal ideals of R, then any submodule N of a finitely-generated R-module M is closed under the I -adic topology on M; that is, N¯ = N . For the proof of Theorem 2, we assume without loss of generality that λ = 0. First we show that the map j0 must be injective. Claim. When H is regular at 0, there are finitely many f1 , . . . , fr ∈ H such that (f1 )0 , . . . , (fr )0 generate Hˆ 0 . In particular, Hˆ 0 is finitely generated. Proof of Claim. First note that I Hˆ 0 = (I
H )0 since each is the submodule of Hˆ 0 generated by I H . Next, since H is regular at 0, we can choose f1 , . . . , fr ∈ H , where r = dim(H /I H ), such that H = span{f1 , . . . , fr } + I H. It follows that H )0 . Hˆ 0 = span (f1 )0 , . . . , (fr )0 + (I
Hence the representatives of f1 , . . . , fr span Hˆ 0 /I Hˆ 0 . By Nakayama’s lemma [6, p. 124], the germs of f1 , . . . , fr generate Hˆ 0 . The claim is proved. 2 Now we can write any element of Hˆ 0 as x = s1 · (f1 )0 + · · · + sr · (fr )0 ,
2038
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
for some s1 , . . . , sr ∈ O0 . In particular, the image of si · (fi )0 under j0 is si · f i ⊗ 1 = f i ⊗ si since we assume j0 ((fi )0 ) = fi ⊗ 1 and j0 is an O0 -module homomorphism. If x = 0, we can expand x into a power series around the origin x = x0 + x1 + · · · , where we assume that xj is a homogeneous polynomial of degree j . Assume that x0 = · · · = xK−1 = 0 and xK is the first nonzero term in the expansion. Then we call K = ord(x) the order of x at the origin. Let PK (sj ) denote the Taylor polynomial of sj of degree K. Then we write x = PK (s1 ) · (f1 )0 + · · · + PK (sr ) · (fr )0 + x , and note that ord(x ) K + 1 and j0 (x ) ∈ I K+1 H˜ 0 . Suppose that j0 (x) = 0, that is, there exists h(1) , . . . , h(d) ∈ O0 (H ) such that − w)h, j0 (x) = (T (j ) where (T − w)h = dj =1 (Tj − wj )h(j ) . We can expand h(j ) at the origin to get where hI ∈ H . Since fi ⊗ PK (si ) = PK (s i )f ⊗ 1, if we let f = f1 PK (s1 ) + · · · + fr PK (sr ) ∈ H, then we have d f ⊗1+x = (Tj − wj )h(j ) ,
j =1
where x
∈ I K+1 O0 (H ). In particular, the order of x
at the origin satisfies ord(x
) K + 1. Note that d
(Tj − wj )h(j ) =
j =1
d
(j )
T h0 +
j =1
d (j ) (j ) Tj hI − hI −ej ⊗ w I .
I =(0,...,0) j =1
j th
Here I = (i1 , . . . , id ) ∈ denotes the multi-index and ej = (0, . . . , 0, 1 , 0, . . . , 0) denotes the j th coordinate index for j = 1, . . . , d. If any component it of I is negative, that is, it < 0, (j ) then we assume that hI = 0 for any j . By comparing the coefficients of elements in O0 (H ) in terms of power series of w, one has Zd
f=
d j =1
(j )
Tj h0 ∈ H,
(10)
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2039
and d j =1
(j )
(j )
Tj hI − hI −ej = 0
(11)
for all 1 |I | K. Here |I | = i1 + · · · + id . Claim. For each 1 t K + 1, one has f=
d j =1 |I |=t
(j )
T I hI −ej .
The case t = 1 is just (10). Now assume that the claim is proved for t K and, in order to prove the statement for t + 1, we look at f=
TI
|I |=t
d
(j )
Tj hI =
j =1
T I +ej hI . (j )
I,j
(j )
Note that for each hI , its sup-index and sub-index determines the power of T in each term. Rewrite I = J − ej , we have f=
d j =1 |J |=t+1
(j )
T J hJ −ej .
Since each h ∈ H and each Tj is the multiplication by zj , it follows that ord(f ) K + 1, hence ord(x) K + 1. Contradiction. The injectivity of j0 is proved. ⊗ 1)0 in H˜ 0 . Next we consider the image of j0 ◦ i0 , which is the submodule generated by (f We denote this submodule by N1 ⊂ H˜ 0 . Let N2 ⊂ H˜ 0 be the submodule generated by representatives of O0 (M) ⊂ O0 (H ) in H˜ 0 , and we want to show that N1 = N2 when H is regular at 0. Clearly, N1 ⊂ N2 . Next we prove N1 = N2 by considering their I -adic topology closures in H˜ 0 . When H is regular, H˜ 0 is finitely generated [15]. So any submodule of H˜ 0 is closed in this topology, by the fact at the beginning of this section, since I is equal to the radical of O0 . It follows that, in order to show N1 = N2 , it suffices to show N1 + I k H˜ 0 = N2 + I k H˜ 0 for each k 1 by the definition of the I -adic closure. It is clear that N1 + I k H˜ 0 ⊂ N2 + I k H˜ 0 . For the other direction, we just need to show that f˜0 ∈ N1 + I k H˜ 0
2040
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
for any f ∈ O0 (M). Expand f =
∞
l=0 fl
g=
⊗ w l , with fl ∈ M. Let k−1
zl fl ∈ M,
l=0
then f˜0 = (g ⊗ 1)0 +
∞ fl ⊗ w l ∈ (g ⊗ 1)0 + I k H˜ 0 . l=k
0
Now we have proved N1 = N2 . Next we consider the left exactness of the sheaf model over the short exact sequence 0 → M → H → M⊥ → 0. From this we obtain an exact sequence l ⊥ → 0. → O0 (M)/(T − w)O0 (M) → O0 (H )/(T − w)O0 (H ) → M
We can complete the left end of the above exact sequence by observing that image(l) = O0 (M) + (T − w)O0 (H ) /(T − w)O0 (H ). So we have ⊥ → 0. 0 → O0 (M) + (T − w)O0 (H ) /(T − w)O0 (H ) → O0 (H )/(T − w)O0 (H ) → M Note that image(l) is equal to the submodule N2 of H˜ 0 generated by O0 (M), hence it is also ⊗ 1)0 . equal to the submodule N1 generated by (f ˆ 0 )). Since both j0 and i0 are injective O0 On the other hand, we observe that N1 = j0 (i0 (M module homomorphisms, ˆ0∼ M = image(l), and we have the desired exact sequence j0 ◦i0
⊥ 0 → 0. ˆ 0 −→ H˜ 0 → M 0→M Now the Samuel additivity formula ⊥ = e(H˜ ) ˆ 0) + e M e(M 0 0 follows from standard results on Samuel additivity in algebra [6] since all involved modules are now finitely generated over a Noetherian ring O0 .
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
2041
8. An application In this section we give another proof of the following Theorem 6 which, under slightly different technical assumptions, is proved by rather different methods in [11]. Our proof here is shorter because the bulk of the argument is absorbed by the algebraic version of Samuel additivity. Theorem 6. Let H be a Hilbert module of scalar-valued analytic functions over a domain Ω ⊂ Cd containing the origin, d ∈ N, obtained by completing the polynomials A = C[z1 , . . . , zd ] ¯ with respect to a Hilbert space norm. That is, H = A. If H is regular at 0 ∈ Ω, that is, dim(H /I H ) < ∞, and 0 ∈ int (bpe(H )), the interior of the set of bounded point evaluations of H , then for any submodule M ⊂ H ⊗ CN , N ∈ N, one has f d(M) + e M⊥ = N. Here the fibre dimension is defined as f d(M) = sup dim M(λ) , λ∈Ω
with M(λ) = {f (λ), f ∈ M} ⊂ CN for any λ ∈ Ω. Moreover, the Samuel multiplicity e(M⊥ ) is still taken with respect to I = (z1 , . . . , zd ), the maximal ideal at the origin. ⊥ )0 ), hence by Theorem 2 and Proof. By Theorem 1 in [13] we know that e(M⊥ ) = e((M ˆ 0 ) = f d(M). This is basically a consequence Lemma 4 in this paper, it suffices to show that e(M of properties of coherent analytic sheaves. By the upper-semicontinuity of the codimension function λ → dim(H /Iλ H ), we know that H is regular on a neighborhood of the origin. Without loss of generality, we assume that H is regular on Ω. By the claim at the beginning of the proof of Theorem 2, we know that Hˆ is ˆ as a subsheaf of Hˆ is also coherent. Now we need to recall two coherent on Ω. It follows that M natural ways to localize the coherent analytic sheave Mˆ at a point λ ∈ Ω [2]. First, let C = Cλ be an Oλ -module with the module action given by (f ∈ Oλ , c ∈ C) → f (λ)c, and consider the tensor ˆ λ ⊗O C λ , M λ which is the first localization we need. For the second localization, we consider ˆ M(λ) = g(λ), g ∈ Mλ ˆ with the Oλ -module action given by (f ∈ Oλ , g(λ)) → f (λ)g(λ). Note that M(λ) is a subspace N of C . We claim that there are nowhere dense, analytic subsets S1 , S2 , S3 of Ω such that (1) for λ ∈ Ω \ S1 , f d(M) = dim(M(λ)); ˆ λ ⊗O C λ ∼ ˆ (2) for λ ∈ Ω \ S2 , M = M(λ); λ ˆ ˆ λ. ˆ (3) for λ ∈ Ω \ S3 , e(Mλ ) = dimC Mλ /Iλ M
2042
G. Cheng, X. Fang / Journal of Functional Analysis 260 (2011) 2027–2042
For (1), this is a property of fibre dimension. For (2), this is a property of subsheaves of the locally free sheave O(N ) [2]. For (3), this is a property of any coherent analytic sheaves. For instance, we can choose S3 ˆ is locally free on Ω \ S3 . Then e(Mˆ λ ) is equal to the rank of the locally free such that M ˆ λ /Iλ M ˆ λ . Moreover, e(Mˆ λ ) is independent of λ on sheave, where the rank is equal to dimC M the entire Ω. In particular, e(Mˆ λ ) = e(Mˆ 0 ). Since S1 , S2 , S3 are nowhere dense in Ω, we can choose λ ∈ Ω \ (S1 ∪ S2 ∪ S3 ). Now the ˆ 0 ) = f d(M) can be completed once we observe that proof of e(M ˆ ˆ (a) dim M(λ) = dim M(λ) for any λ ∈ Ω; indeed, we have M(λ) = M(λ) ⊂ CN . ˆ λ , which is a general algebraic fact, true even for non-Noetherian ˆ λ ⊗O C λ ∼ ˆ λ /Iλ M (b) M =M λ modules. 2 Acknowledgments The authors thank Bob Burckel and the referee for helpful suggestions to greatly improve the readability of this paper. References [1] C. Apostol, H. Bercovici, C. Foias, C. Pearcy, Invariant subspaces, dilation theory, and the structure of the predual of a dual algebra, I, J. Funct. Anal. 63 (1985) 369–404. [2] C. Banica, O. Stanasila, Algebraic Methods in the Global Theory of Complex Spaces, John Wiley & Sons Ltd., 1976. [3] H. Bercovici, C. Foias, C. Pearcy, Dual Algebras with Applications to Invariant Subspaces and Dilation Theory, CBMS Reg. Conf. Ser. Math., vol. 56, Amer. Math. Soc., Providence, RI, 1985. [4] R. Douglas, V. Paulsen, Hilbert Modules over Function Algebras, Pitman Res. Notes Math. Ser., vol. 217, Longman, New York, 1989. [5] R. Douglas, K. Yan, Hilbert–Samuel polynomials for Hilbert modules, Indiana Univ. Math. J. 42 (1993) 811–820. [6] D. Eisenbud, Commutative Algebra. With a View toward Algebraic Geometry, Grad. Texts in Math., vol. 150, Springer-Verlag, New York, 1995. [7] J. Eschmeier, M. Putinar, Spectral Decompositions and Analytic Sheaves, London Math. Soc. Monogr. New Ser., vol. 10, Oxford University Press, New York, 1996. [8] X. Fang, Hilbert polynomials and Arveson’s curvature invariant, J. Funct. Anal. 198 (2003) 445–464. [9] X. Fang, Samuel multiplicity and the structure of semi-Fredholm operators, Adv. Math. 186 (2004) 411–437. [10] X. Fang, Invariant subspaces of the Dirichlet space and commutative algebra, J. Reine Angew. Math. 569 (2004) 189–211. [11] X. Fang, The Fredholm index of quotient Hilbert modules, Math. Res. Lett. 12 (2005) 911–920. [12] X. Fang, The Fredholm index of a pair of commuting operators, Geom. Funct. Anal. 16.2 (2006) 367–402. [13] X. Fang, The Fredholm index of a pair of commuting operators, II, J. Funct. Anal. 256 (2009) 1669–1692. [14] R. Hartshorne, Algebraic Geometry, Grad. Texts in Math., vol. 52, Springer-Verlag, New York, 1977. [15] A. Markoe, Analytic families of differential complexes, J. Funct. Anal. 9 (1972) 181–188. [16] M. Putinar, Spectral theory and sheaf theory, II, Math. Z. 192 (1986) 473–490. [17] J.-P. Serre, Local Algebra, Springer Monogr. Math., Springer-Verlag, Berlin, 2000.
Journal of Functional Analysis 260 (2011) 2043–2063 www.elsevier.com/locate/jfa
C 1 linearization for planar contractions ✩ Wenmeng Zhang, Weinian Zhang ∗ Yangtze Center of Mathematics and Department of Mathematics, Sichuan University, Chengdu, Sichuan 610064, PR China Received 26 July 2010; accepted 23 December 2010 Available online 5 January 2011 Communicated by D. Voiculescu
Abstract C 1 linearization is of special interests because it can distinguish characteristic directions of dynamical systems. It is known that planar C 1,α contractions with a fixed point at the origin O admit C 1,β linearization with sufficiently small β > 0 if α = 1 and admit C 1,α linearization if (log |λ1 |/ log |λ2 |) − 1 < α 1, where λ1 and λ2 are eigenvalues of the linear parts of the contractions at O with 0 < |λ1 | |λ2 | < 1. In this paper we improve the lower bound of α to lower the condition of C 1 linearization for planar contractions. Furthermore, we prove that the derivatives of transformations in our C 1 linearization are Hölder continuous and give estimates for the Hölder exponent. Finally, we give a counter example to show that those estimates cannot be improved anymore. © 2010 Elsevier Inc. All rights reserved. Keywords: C 1 linearization; Contractions; Hölder continuous; Regularity; Invariant curve
1. Introduction In the theory of dynamical systems, one of the most fundamental and important problems is linearization. Usually, the C r linearization of a C k diffeomorphism F : Ω → X, where 1 r k ∞, X is a Banach space and Ω ⊂ X is an open set, is to find a C r diffeomorphism Φ from an open set U ⊂ Ω into X such that ✩
Supported by NSFC and MOE research grants.
* Corresponding author.
E-mail addresses: [email protected], [email protected] (W.N. Zhang). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.029
2044
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
Φ F (x) = SΦ(x),
∀x ∈ U,
(1.1)
for a linear mapping S. It has a long history to study linearization. For analytic diffeomorphisms on Cn , the idea of linearization goes back to Poincaré [10], who proved that F can be analytically conjugated to its linear part near a fixed point if all eigenvalues λi (i = 1, . . . , n) of the linear part inside lie m the unit circle S 1 (or outside S 1 ) and satisfy the nonresonant condition, i.e., λi = nj=1 λj j for all i and all (m1 , . . . , mn ) ∈ Zn+ such that m1 + · · · + mn 2. When all eigenvalues lie on S 1 , Siegel [1,14] proved that conclusion also holds if the point (λ1 , . . . , λn ) ∈ Cn is of n Poincaré’s n mj −ν type (c, ν), i.e., |λi − j =1 λj | c( j =1 mj ) for all i and all (m1 , . . . , mn ) ∈ Zn+ such that m1 + · · · + mn 2, where c > 0 and ν > 0. Later, Brjuno [4] extended Siegel’s result in C and proved that all germs of analytic diffeomorphisms with linear part λ = e2πiθ are linearizable if θ log qn+1 < +∞, where (pn /qn )n0 is a Brjuno number, i.e., an irrational number such that ∞ n=0 qn is the sequence of the convergents of θ ’s continued fraction expansion. In 1988 Yoccoz [18] proved that the condition is necessary. Concerning linearization on Rn , a well-known result is the Hartman–Grobman Theorem [8], saying that C 1 diffeomorphisms can be C 0 linearized near the hyperbolic fixed points. This result was generalized to Banach space by Pugh in [11]. Sometimes C 0 linearization is not effective to discuss more details of dynamics, for example, to distinguish a node from a focus. For smooth linearization, Sternberg [15,16] proved that C k (k 1) diffeomorphisms can be C r linearized near the hyperbolic fixed points, where the integer r depends on k and the nonresonant condition. In particular, r = ∞ if k = ∞ and nonresonant conditions of all orders hold. Further efforts were also made to the class C k,α (k 0 is an integer and 0 < α 1 is a real), i.e., the class of all C k mappings F ’s whose derivatives F (k) ’s satisfy that
F (k) (x) − F (k) (y) < ∞. sup x − y α x,y Belitskii [2,3] proved that C k,1 (k 1) diffeomorphisms can be C k linearized locally if the q (1 q n) distinct norms p1 < · · · < pq of their eigenvalues satisfy that the union + − k + k − i<j [pi pj , pj pi ], where pi := max{pi , 1} and pi := min{pi , 1}, does not contain any one of p1 , . . . , pq . His result particularly implies that C 1,1 diffeomorphisms can be C 1 linearized locally if the eigenvalues λ1 , . . . , λn satisfy |λi | · |λj | = |λk | (k = 1, . . . , n) if |λi | < 1 < |λj |. In 1985 Sell [13] extended Sternberg and Belitskii’s results for k 2 and gave some more delicate conditions for C r linearization. In the study of dynamical systems, C 1 linearization is of special interests. Hartman [7] showed that all C 1,1 contractions on Rn admit local C 1,β linearization with small β > 0 depending on the eigenvalues of their linear parts at the fixed point. In the early years of 2000s ElBialy [6] and Rodrigues and Solà-Morales [12] generalized this result to Banach space independently. On the other hand, it is proved in Corollary 1.3.3 in [5] that a C 1,α contraction F on Banach space can be C 1,α linearized near the origin O, which is the fixed point of F , if the constant α ∈ (0, 1] satisfies that −1 1 + α > log ρ F (O)−1 / log ρ F (O) ,
(1.2)
where ρ(F (O)) denotes the spectral radius of F (O). Thus, in either 1-dimensional cases or 2dimensional cases with |λ1 | = |λ2 |, where λ1 and λ2 are eigenvalues of F (O), we can conclude
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2045
that C 1,α contractions admit C 1,α linearization for all α ∈ (0, 1]. In 2-dimensional cases with |λ1 | = |λ2 | condition (1.2) can be written as α > α1 := log |λ1 |/ log |λ2 | − 1.
(1.3)
Further results on the plane were given by Stowe [17] in 1986. He investigated a C k expansion F (x) := Sx + o( x k ), where k 2 is an integer and S := F (O). Let a and b be the modulus of the eigenvalues of S with 1 < a b. Stowe proved that (i) if loga b < k, then the sequence (S n F −n )n∈N converges uniformly in C k norm and that (ii) if loga b k, then F can be trans , which satisfies that formed to another C k expansion F − S)(j ) (x1 , 0) = 0, (F
∀0 j k,
(1.4)
−n )n∈N converges uniformly in C k−1 norm. Acfor all small x1 ∈ R, so that the sequence (S n F k cordingly, he concluded that F admits C and C k−1 linearization in cases (i) and (ii) respectively and estimated the Hölder exponent of Φ (k−1) in case (ii). There are also some results concerning the cases that O is a saddle and r = ∞ in [17]. Since expansions can be discussed similarly, in this paper we investigate C 1 linearization for planar C 1,α (0 < α 1) contractions F near the fixed point O. We discuss under the assumption 0 < |λ1 | < |λ2 | < 1
(1.5)
because the case |λ1 | = |λ2 | was solved in [5] as mentioned above. We give a number α0 which is smaller than min{1, α1 } given by Hartman [7] and Chaperon [5] and prove that F can be linearized by a C 1 transformation provided α > α0 . In the proof the method used in [17] has to be modified because result (1.4) cannot be obtained for C 1,α mappings. Furthermore, we prove that those transformations Φ for the C 1 linearization are not only C 1 but also C 1,β for some β > 0 depending on α. We give estimates for β in various cases and show with a counter example that those estimates cannot be improved anymore. 2. C 1 linearization of F In this section, we aim to find a C 1 diffeomorphism Φ near O such that Eq. (1.1) holds. Thus, replacing Φ in Eq. (1.1) with {Φ (O)}−1 Φ, we may assume that S = F (O). Since λ1 = λ2 by (1.5), we further assume that S is of the diagonal form, i.e.,
S = F (O) =
λ1 0
0 λ2
.
In the following let x := (x1 , x2 ) ∈ R2 and define the norm · as
x := max |x1 |, |x2 | ,
∀x ∈ R2 .
Theorem 1. Let Ω be a neighborhood of the origin O and F : Ω → R2 be a C 1,α (0 < α 1) contraction having O as its a fixed point. Assume that the two eigenvalues λ1 and λ2 of F (O)
2046
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
satisfy (1.5) and that α > α0 := 1 − log |λ2 |/ log |λ1 |.
(2.6)
Then there exist a neighborhood U ⊂ Ω of O and a C 1 diffeomorphism Φ : U → R2 such that Eq. (1.1) holds, i.e., F admits C 1 linearization near O. The number α0 given in Theorem 1 is a lower bound of the Hölder exponent α for C 1 linearization. Obviously, α0 < 1. It follows immediately that planar C 1,1 contractions admit local C 1 linearization, as indicated in [7]. Moreover, one can check that α0 < α1 by (1.5), which implies that our condition (2.6) is also weaker than the condition (1.3). Therefore, our Theorem 1 extends the results given in [5,7] in the case of planar systems. In order to prove the theorem, we need the following lemma on invariant curves of F . Lemma 1. Suppose that F : Ω → R2 is a C 1,ζ (0 < ζ 1) contraction and that the two eigenvalues λ1 and λ2 of F (O) satisfy (1.5). Then there exists a closed disk V ⊂ Ω centered at O such that F has a C 1,ζ invariant curve
Γ := (x1 , x2 ) ∈ V : x1 = g(x2 ) , where g : V ∩ R → R is C 1,ζ and g(0) = g (0) = 0, if the constant ζ satisfies that 0 < ζ < α1 , where α1 is given in (1.3). Proof. This lemma is actually a corollary of Theorem 2.1 in [9]. Let the norm · C 1,ζ be defined as ϕ(x + ) − ϕ(x) − ϕ (x) ϕ C 1,ζ := sup ϕ(x) + sup ϕ (x) + sup 1+ζ x∈R2 x∈R2 x,∈R2 for all C 1,ζ mappings ϕ : R2 → R2 . Let S1 and S2 denote x1 -axis and x2 -axis respectively, which are obviously closed subspaces of R2 invariant under F (O) and satisfy that R2 = S1 ⊕ S2 . Then, one can check that there is a constant a > 1 such that the expansion F −1 satisfies the following: (i) (ii) (iii) (iv)
F −1 (O) = O, F (O)|S1 = |λ1 | < a −(1+ζ ) , (F −1 ) (O)|S2 = |λ2 |−1 < a, and there exists a mapping H : R2 → R2 such that H (x) = F −1 (x) near O and H (x) − H (O)x C 1,ζ is sufficiently small.
In fact, (i) is obvious. Note that |λ1 | < |λ2 |1+ζ since 0 < ζ < α1 . There is a sufficiently small constant ε > 0 such that 1+ζ |λ1 | < |λ2 | − ε
−1 and |λ2 |−1 < |λ2 | − ε .
Then we get (ii) and (iii) by putting a := (|λ2 | − ε)−1 . Conclusion (iv) can be proved obviously, as indicated in the fourth remark in [9], by choosing an appropriate bump function (a smooth
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2047
Fig. 1. Straight up an invariant curve.
function with compact support) on R2 . Thus, by Theorem 2.1 in [9], the mapping H has a C 1,ζ invariant curve on R2 and therefore F −1 has a C 1,ζ invariant curve on a closed disk V ⊂ Ω centered at O, which is tangent to x2 -axis at O. So does F . The proof is completed. 2 Proof of Theorem 1. Since C 1 linearization was proved in [5] for all α1 < α 1 as indicated in (1.3), it suffices to consider α ∈ (α0 , α1 ] ∩ (0, 1]. Noting that C 1,α implies C 1,α˜ near O for α > α, ˜ we only need to prove the C 1 linearization for α = α˜ in (α0 , α1 ) ∩ (0, 1]. In order to simplify the deduction, we flatten F along the x2 -axis by straightening up an invariant curve of F tangent to the x2 -axis, as shown in Fig. 1. By Lemma 1, there is a closed disk V ⊂ Ω centered at O such that F has a C 1,α˜ invariant curve Γ := {(x1 , x2 ) ∈ V : x1 = g(x2 )}, where g : V ∩ R → R is C 1,α˜ and g(0) = g (0) = 0. This curve enables us to make the C 1,α˜ transformation Θ : V → R2 defined by Θ(x) := x1 − g(x2 ), x2
(2.7)
:= Θ ◦ F ◦ Θ −1 instead. Once we can prove the C 1 so that we can consider the mapping F linearization for F , we naturally know the C 1 linearization of F because Θ is a local C 1 diffeomorphism. 1 := π1 F and F 2 := π2 F , where π1 and π2 denote the projecLet F1 := π1 F , F2 := π2 F , F tions onto the x1 -axis and x2 -axis respectively. Direct calculation gives
1 (x1 , x2 ) = F1 x1 + g(x2 ), x2 − g F2 x1 + g(x2 ), x2 , F 2 (x1 , x2 ) = F2 x1 + g(x2 ), x2 . F
(2.8)
Obviously, 1 (0, x2 ) = F1 g(x2 ), x2 − g F2 g(x2 ), x2 = 0, F
∀x2 ∈ V ∩ R,
(2.9)
leaves x2 -axis invariant, since the graph of g is invariant with respect to F . Moreover, F i.e., F has the following properties:
2048
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
Lemma 2. (O) = O and F (O) = S. is C 1,α˜ in V such that F (i) F 1 (x) ∂F α ˜ (ii) |F1 (x)| (|λ1 | + L x )|x1 | and | ∂x2 | L|x1 |α˜ for all x ∈ V , where L > 0 is a constant independent of x. We leave the proof of Lemma 2 after the proof of this theorem. In what follows we claim n ) (x))n∈N near O. If the claim is true then the the uniform convergence of the sequence (S −n (F −n n sequence (S F (x))n∈N also converges uniformly near O because for any m = n ∈ N −m m
S F (x) − S −n F n (x) = S −m F m (x) − S −n F n (x) − S −m F m (O) − S −n F n (O) m
n
(τ1 x) − S −n F (τ1 x) · x , S −m F n defines a := limn→∞ S −n F where τ1 ∈ (0, 1) is a number depending on x. Thus, the limit Φ 1 C mapping near O, which satisfies Eq. (1.1) because = S lim S −(n+1) F n+1 = S Φ. ◦ F Φ n→∞
Moreover, n
(O) = id, (O) = lim S −n F Φ n→∞
is a C 1 diffeomorphism near O. Therewhere id denotes the identity mapping. It implies that Φ 1 admits C linearization near O. fore, F n ) (x))n∈N , we note that F (x) < x In order to prove the uniform convergence of (S −n (F maps a sufficiently small for small x by Lemma 2(i) because S = |λ2 | < 1. It implies that F closed disk U ⊂ V centered at O into itself. For each n ∈ N, let n
(x) := F
an (x) cn (x)
bn (x) , dn (x)
(2.10)
where an , bn , cn , dn : U → R are functions. Moreover, those entries have the following properties: Lemma 3. There is a closed disk U centered at O such that n n a 1 F b 1 F (x) − λ1 M|λ2 |nα˜ , (x) M|λ1 |nα˜ , n n c 1 F d 1 F (x) M|λ2 |nα˜ , (x) − λ2 M|λ2 |nα˜ , bn (x) M|λ1 |n , an (x) M|λ1 |n , dn (x) M|λ2 |n cn (x) M|λ2 |n , for all n ∈ N and for all x ∈ U , where M > 0 is a constant independent of n and x.
(2.11) (2.12) (2.13) (2.14)
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2049
We leave the proof of Lemma 3 after the proof of this theorem. Note that S
−n
n
(x) = F
an (x)/λn1 cn (x)/λn2
bn (x)/λn1 dn (x)/λn2
and n+1
n n
(x) F F (x) = F (x) = F
=
n (x)) a1 (F c1 (F n (x))
n (x))an (x) + b1 (F n (x))cn (x) a1 (F n (x))an (x) + d1 (F n (x))cn (x) c1 (F
n (x)) b1 (F n (x)) d1 (F
an (x) cn (x)
bn (x) dn (x)
n (x))bn (x) + b1 (F n (x))dn (x) a1 (F n (x))bn (x) + d1 (F n (x))dn (x) , c1 (F (2.15)
where (2.10) is used. We apply Lemma 3 to compute n (x)) − λ1 )an (x) + b1 (F n (x))cn (x) M 2 n an+1 (x) an (x) (a1 (F n n+1 − λn = |λ | μ1 + μ2 , n+1 λ1 λ1 1 1 n n (x)) − λ1 )bn (x) + b1 (F (x))dn (x) M 2 n bn+1 (x) bn (x) (a1 (F = μ1 + μn2 , − n n+1 n+1 λ1 |λ1 | λ1 λ1 n (x))an (x) + (d1 (F n (x)) − λ2 )cn (x) M 2 n cn+1 (x) cn (x) c1 (F n n+1 − λn = |λ | μ3 + μ1 , n+1 λ2 λ2 2 2 n n (x))bn (x) + (d1 (F (x)) − λ2 )dn (x) M 2 n dn+1 (x) dn (x) c1 (F = μ3 + μn1 − n n+1 n+1 λ2 |λ2 | λ2 λ2 for all n ∈ N and for all x ∈ U , where μ1 := |λ2 |α˜ ,
μ2 :=
|λ1 |α˜ |λ2 | , |λ1 |
μ3 :=
|λ1 ||λ2 |α˜ . |λ2 |
It follows that −(n+1) n+1
n M 2 S (x) ηn , F (x) − S −n F |λ1 |
∀n ∈ N, ∀x ∈ U,
(2.16)
where ηn := max{μn1 + μn2 , μn3 + μn1 }. We claim that μ1 , μ2 , μ3 ∈ (0, 1).
(2.17)
In fact, μ3 < μ1 < 1 is obvious by (1.5). From the definition (2.6) of α0 and the choice ˜ log |λ1 |, i.e., |λ2 | < |λ1 |1−α˜ , which implies that μ2 < 1. of α˜ we see that log |λ2 | < (1 − α) This the claim (2.17). Therefore, it follows from (2.16) and (2.17) that the series ∞ proves −(n+1) (F n+1 ) (x) − S −n (F n ) (x)} converges uniformly in U , namely, the sequence {S n=1 −n n
(S (F ) (x))n∈N converges uniformly in U . As shown above, the convergence guarantees the ˜ The proof is completed. 2 C 1 linearization for α = α.
2050
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
Proof of Lemma 2. For (i), noting that F and Θ (together with Θ −1 ) are C 1,α˜ since g is C 1,α˜ , we get
F (y) (x) − F
= Θ ◦ F ◦ Θ −1 (x) − Θ ◦ F ◦ Θ −1 (y)
= Θ F ◦ Θ −1 (x) F Θ −1 (x) Θ −1 (x) − Θ F ◦ Θ −1 (y) F Θ −1 (y) Θ −1 (y) Θ F ◦ Θ −1 (x) − Θ F ◦ Θ −1 (y) · F Θ −1 (x) · Θ −1 (x) + Θ F ◦ Θ −1 (y) · F Θ −1 (x) − F Θ −1 (y) · Θ −1 (x)
+ Θ F ◦ Θ −1 (y) · F Θ −1 (y) · Θ −1 (x) − Θ −1 (y) α˜ α˜ L1 F ◦ Θ −1 (x) − F ◦ Θ −1 (y) + L2 Θ −1 (x) − Θ −1 (y) + L3 x − y α˜ L x − y α˜
(2.18)
for all x, y ∈ V , where L1 , L2 , L3 and L are positive constants independent of x and y. This is C 1,α˜ in V . Noting that g(0) = 0 and g (0) = 0 as indicated before (2.7), one implies that F (O) = O and F (O) = S. can verify that F 1 (0, x2 ) = 0 by (2.9). By Lemma 2(i) we have In order to prove (ii), we first note that F 1 (0,0) ∂F = λ1 . Thus, ∂x1 1 (τ2 x1 , x2 ) ∂F F · |x1 | 1 (x1 , x2 ) − F 1 (x) = F 1 (0, x2 ) ∂x1
1 (τ2 x1 , x2 ) ∂ F 1 (0, 0) ∂F |x1 | |λ1 | + − ∂x1 ∂x1 |λ1 | + L x α˜ |x1 |, ∀x ∈ V , where τ2 ∈ (0, 1) is a number depending on x and (2.18) is employed. The first inequality in result (ii) is proved. Furthermore, we have 1 (0, x2 ) ∂F = 0, ∂x2 Otherwise, the continuity of
1 (0,x2 ) ∂F ∂x2
∀x2 ∈ V ∩ R.
(2.19)
in x2 implies that there exists x2∗ ∈ V ∩ R such that ∗
x2 ∂ F1 (0, t) dt = 0. ∂t
(2.20)
0
1 (x1 , x2 ) = x2 ∂ F 1 (x1 ,t) dt + h(x1 ), where h : V ∩ R → R is a function such On the other hand, F 0 ∂t that h(0) = 0 since F1 (0, 0) = 0. It follows from (2.20) that
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2051
∗
1 0, x2∗ = F
x2 ∂ F1 (0, t) dt = 0, ∂t 0
a contradiction to (2.9). Thus, from (2.18) and (2.19) we get ∂F 1 (x1 , x2 ) = ∂ F1 (x1 , x2 ) − ∂ F1 (0, x2 ) L|x1 |α˜ , ∂x2 ∂x2 ∂x2 which proves the second formula given in (ii). The proof is completed.
∀x ∈ V , 2
Proof of Lemma 3. By (2.18) and the second inequality given in Lemma 2(ii), a1 (x) − λ1 = ∂ F1 (x) − ∂ F1 (O) L x α˜ , ∂x ∂x 1 1 b1 (x) = ∂ F1 (x) L|x1 |α˜ , ∂x 2 c1 (x) = ∂ F2 (x) − ∂ F2 (O) L x α˜ , ∂x ∂x 1 1 d1 (x) − λ2 = ∂ F2 (x) − ∂ F2 (O) L x α˜ ∂x ∂x2 2
(2.21) (2.22) (2.23) (2.24)
for all x ∈ V . On the other hand, there is a closed disk U ⊂ V centered at O such that n F (x) M1 |λ2 |n ,
π1 F n (x) M2 |λ1 |n ,
n F (x) M1 |λ2 |n
(2.25)
for all n ∈ N and for all x ∈ U , where M1 , M2 are positive constants independent of n and x. In fact,
F (τ3 x) − F (τ3 x) · x S + F (O) x (x) F |λ2 | + L x α˜ x ,
(2.26)
where τ3 ∈ (0, 1) is a number depending on x. Thus we can inductively prove that there is a closed disk V1 ⊂ V centered at O such that i F (x) |λ2 | + δ i ,
∀i ∈ N, ∀x ∈ V1 ,
where δ := (1 − |λ2 |)/2. Substituting (2.27) in (2.26), we get i+1 i F (x), (x) |λ2 | + L |λ2 | + δ i α˜ F
∀i ∈ N ∪ {0},
(2.27)
2052
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
implying the first inequality given in (2.25) by induction, where ∞ i α˜ L |λ2 | + δ 1+ < ∞. M1 := |λ2 | i=0
Similarly, by the first inequality in Lemma 2(ii) we see that there is a closed disk V2 ⊂ V center at O such that π1 F i+1 (x) |λ1 | + L |λ2 | + δ i α˜ π1 F i (x), ∀i ∈ N ∪ {0}, ∀x ∈ V2 , implying the second inequality given in (2.25) by induction, where ∞ i α˜ L 1+ < ∞. |λ2 | + δ M2 := |λ1 | i=0
We further consider
F (x) − F (x) S + F (O) |λ2 | + L x α˜ . It follows from (2.27) that n n−1 n−1 i α˜ F (x) F F (x) (x) · · · F |λ2 | + L |λ2 | + δ i=0
M1 |λ2 |
n
(2.28)
for all n ∈ N and for all x ∈ V1 , which gives the third inequality given in (2.25). Thus the three inequalities hold in the neighborhood U := V1 ∩ V2 . Let M > 0 be a constant larger than max{LM1α˜ , LM2α˜ , M1 }. Substituting the first two inequalities given in (2.25) in (2.21)–(2.24) correspondingly, we obtain the four inequalities given in (2.11) and (2.12). From the third inequality given in (2.25) we immediately obtain the two inequalities given in (2.14). In order to prove the inequalities given in (2.13), note that i i ai+1 (x) = a1 F (x) ai (x) + b1 F (x) ci (x) i |λ1 | + M|λ2 |i α˜ ai (x) + M 2 |λ1 |α˜ |λ2 | , ∀i ∈ N, (2.29) by (2.11) and (2.14). Choose M > 0 sufficiently large such that |a1 (x)| M 2 . Then, by (2.29), n−1 n−1 an (x) M 2 |λ1 | + M|λ2 |i α˜ + M 2 |λ1 | + M|λ2 |i α˜ |λ1 |α˜ |λ2 | + · · · i=1
+ M2
i=2 n−1
k n−1 |λ1 | + M|λ2 |i α˜ |λ1 |α˜ |λ2 | + · · · + M 2 |λ1 |α˜ |λ2 |
i=k+1
∞
∞
M |λ1 |α˜ |λ2 | j M2 i α˜ 1 |n , 1+ |λ2 | |λ1 |n = M|λ |λ1 | |λ1 | |λ1 | i=1
j =0
∀n ∈ N,
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
where
|λ1 |α˜ |λ2 | |λ1 |
2053
= μ2 < 1, known from (2.17), and therefore ∞
∞
2 M |λ1 |α˜ |λ2 | j := M 1+ < ∞. |λ2 |i α˜ M |λ1 | |λ1 | |λ1 | i=1
j =0
we can prove the first inequality given in (2.13). Thus, without loss of generality, putting M := M The second one given in (2.13) can be proved similarly. The proof is completed. 2 Remark that the equality (1.4), given in Theorem 1 in [17], should be written as is C k , but it cannot be obtained − S)(j ) (0, x2 ) = 0 for all 0 j k in our case, where F (F 1,α (0 < α 1) mappings. In order to overcome the difficulty, we proved the inequality for C n (x))| M|λ1 |nα˜ given in Lemma 3, which has a delicate difference that the constant |b1 (F |λ1 | is smaller than the corresponding constant |λ2 | in other three inequalities given in (2.11) n+1 ) (x) − S −n (F n ) (x)) to be controlled and (2.12). This guarantees the sequence (S −(n+1) (F by the sequence (ηn )n∈N given in (2.16). 3. Regularity of linearization In this section we give the smoothness of the transformation Φ obtained in Theorem 1 and show the regularity of linearization. Theorem 2. Let F be given in Theorem 1 and let the two eigenvalues λ1 and λ2 of F (O) satisfy (1.5). Then, the following assertions hold: (i) If α1 < α 1, then F can be linearized by a transformation of class C 1,α near O. (ii) If α = α1 1, then F can be linearized by a transformation of class C 1,β1 near O for any β1 ∈ (0, α). −1 (iii) If α = 1 but α1 > 1, then F can be linearized by a transformation of class C 1,α1 near O. (iv) If α0 < α < min{1, α1 }, then F can be linearized by a transformation of class C 1,β2 near O, where β2 := α1−1 + 1 α − 1 = α0−1 α − 1 ∈ (0, 1). Proof. The result (i) was proved in [5]. We only need to prove (ii), (iii) and (iv) by estimating the Hölder exponent β of the derivative of the C 1 transformation Φ obtained in Theorem 1. As in the proof of Theorem 1, we first assume that α = α˜ in (α0 , α1 ) ∩ (0, 1] and investigate the , which is defined just below (2.7). Let Φ n and claim that := limn→∞ S −n F reduced mapping F
n
n Φ (x) − S −n F (y) (x) − Φ (y) = lim S −n F K x − y ω n→∞
(3.30)
Then, for some positive constant ω and K, which implies C 1,ω smoothness of the mapping Φ. 1, α ˜ smoothness of Θ given in (2.7) and the relation Φ = Φ ◦ Θ we can use the same from C arguments as in (2.18) to see that the mapping Φ has C 1,β smoothness, where β = min{α, ˜ ω}.
(3.31)
2054
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
In order to compute ω given in (3.30), we have n
n (x) − S −n F (y) lim S −n F n→∞ ∞ n
−n n
−(n+1) n+1
−(n+1) n+1
−n (x) − S (y) S F F F F (x) − S (y) − S n=1
(x) − S −1 F (y) + S −1 F
∞ −(n+1) n+1
n+1 −n n
n S (x) − S −n F (y) F F (x) − S −(n+1) F (y) − S n=1
+ |λ1 |−1 L x − y α˜ for all x, y ∈ V by (2.18), in which ∞ −(n+1) n+1
n+1 −n n
n S (x) − S −n F (y) F F (x) − S −(n+1) F (y) − S n=1
=
an+1 (x) ∞ |( n+1 − λ 1
n=1
(x) |( cn+1 n+1 − λ2
an+1 (y) ) − ( anλ(x) n λn+1 1 1 cn+1 (y) cn (x) ) − ( λn2 λn+1 2
− −
an (y) )| λn1 cn (y) )| λn2
(x) |( bn+1 n+1 − λ1
(x) |( dn+1 n+1 − λ2
bn+1 (y) ) − ( bnλ(x) n λn+1 1 1 dn+1 (y) dn (x) ) − ( λn2 λn+1 2
− −
bn (y) )| λn1 . dn (y) )| λn2
(3.32) Here an , bn , cn , dn are given in (2.10). For the first entry in (3.32), by (2.15) we have
∞
an+1 (x) an+1 (y) an (x) an (y) − − n+1 − n λn1 λ1 λn+1 λ1 1 n=1 =
∞
n
1 n (x) cn (x) a1 F (x) − λ1 an (x) + b1 F n+1 |λ1 | n=1 n
n (y) − λ1 an (y) + b1 F (y) cn (y) − a1 F
Ξ1 (x, y) + Ξ2 (x, y) + Ξ3 (x, y), where Ξ1 (x, y) :=
∞ n=1
Ξ2 (x, y) :=
∞ n=1
1 n a1 F (x) − λ1 · an (x) − an (y), n+1 |λ1 | n 1 n (y) · cn (x), b F F (x) − b 1 1 |λ1 |n+1
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2055
∞
n 1 n (y) · an (y) a1 F (x) − a1 F n+1 |λ | n=1 1 n (y) · cn (x) − cn (y) . + b 1 F
Ξ3 (x, y) :=
Lemma 4. There exist a neighborhood U ⊂ V of O and positive constants K1 , K2 and K3 such that −1 2 α˜
Ξ1 (x, y) K1 x − y α1 Ξ2 (x, y) K2 x − y
,
(α1−1 +1)α−1 ˜
,
Ξ3 (x, y) K3 x − y α˜ for all x, y ∈ U . Remark that the exponent (α1−1 + 1)α˜ − 1 is a positive constant since α˜ > α0 . This lemma is proved by Lemma 3 and will be given after the completion of the proof of this theorem. By Lemma 4,
∞
an+1 (x) an (x) an+1 (y) an (y) − − − λn1 λn1 λn+1 λn+1 1 1 n=1 −1 2 α˜
K1 x − y α1
−1
+ K2 x − y (α1
+1)α−1 ˜
+ K3 x − y α˜ .
(3.33)
The estimate for the second entry in (3.32) is almost the same and therefore we get
∞
bn+1 (x) bn (x) bn+1 (y) bn (y) − − − λn1 λn1 λn+1 λn+1 1 1 n=1 −1 2 α˜
K1 x − y α1
−1
+ K2 x − y (α1
+1)α−1 ˜
+ K3 x − y α˜ .
(3.34)
For the third entry in (3.32), note that for all k ∈ N k k k F y + σk (x − y) α˜ x − y α˜ F (x) − F (y) L F F LM1α˜ |λ2 |k α˜ x − y α˜
(3.35)
by (2.18) and the third inequality in (2.25), where each σk ∈ (0, 1) is a number depending on x and y. Then, by (2.28) and (3.35), n
n F (x) − F (y) n−1 n−1 n−i n−i−1 n−i−1 F F F (y) · · · F (y) · F F F (x) − F (y) i=0
n−i−2 (x) F · F (x) · · · F
2056
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
n−1 n−1 (F n−i (y)) · F (F n−i−1 (x)) · · · F (x) F (F (y)) · · · F
(F n−i−1 (x)) F n−i−1
n−i−1 · F F (x) − F F (y)
i=0
n−1
i=0
M1 |λ2 |n · LM1α˜ |λ2 |(n−i−1)α˜ x − y α˜ (F n−i−1 (x)) F
2 |n x − y α˜ , L|λ
(3.36)
where ∞ −1 (x) LM 1+α˜ := sup F |λ2 |i α˜ < ∞ L 1 x∈U
i=0
is guaranteed by the is a positive constant independent of x, y and n and the boundedness of L
fact that F (O) = |λ2 | = 0. Thus, by (2.12) in Lemma 3, (2.15), (3.35) and (3.36),
∞
cn+1 (x) cn (x) cn+1 (y) cn (y) − − − λn2 λn2 λn+1 λn+1 2 2 n=1
∞
n n 1 n (x) − d1 F (y) · cn (x) c1 F (x) · an (x) − an (y) + d1 F |λ2 |n+1 n=1 n n n (x) − c1 F (y) · an (y) + d1 F (y) − λ2 · cn (x) − cn (y) + c1 F
∞
n
n 1 n n (x) − F (y) c1 F (x) + d1 F (y) − λ2 F |λ2 |n+1 n=1 n n F (x) − F (y) F + cn (x) + an (y) F
K4 x − y α˜ ,
(3.37)
n α˜ ∞ μn }|λ |−1 > 0 is a constant indepen where K4 := {LMM1α˜ ∞ 2 n=1 μ3 + (2LM + LMM1 ) n=1 4 dent of x, y and n. Here μ3 , μ4 ∈ (0, 1), as indicated in (2.17), which guarantees the convergence of the two series in the definition of K4 . The estimate for the fourth entry in (3.32) is almost the same as the third one and therefore we obtain
∞
dn+1 (x) dn (x) dn+1 (y) dn (y) − − n − n K4 x − y α˜ . n+1 n+1 λ λ2 λ λ 2 2 2 n=1
(3.38)
Having estimates (3.33), (3.34), (3.37) and (3.38) for entries in (3.32), we get (3.30), where K = max{K1 , K2 , K3 , K4 } and
ω = min α1−1 α˜ 2 , α1−1 + 1 α˜ − 1, α˜ = α1−1 + 1 α˜ − 1
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2057
since α˜ < α1 . This proves (iii) and (iv) by replacing α˜ with α. For (ii), i.e., α = α1 1, the C 1,α implies that F is C 1,α˜ for any α˜ ∈ (α0 , α1 ). Thus we can apply (iv) to prove (ii) smoothness of F because lim α1−1 + 1 α˜ − 1 = α −1 + 1 α − 1 = α.
α→α ˜
Therefore, the proof is completed.
2
Proof of Lemma 4. Before estimating Ξ1 , we note that either an (x) − an (y) an (x) + an (y) 2M|λ1 |n
(3.39)
by the first inequality given in (2.13) or n
n an (x) − an (y) F (x) − F 2 |n x − y α˜ , (y) L|λ
(3.40)
by (3.36). For each fixed x, y in a sufficiently small U we choose n1 (x, y) :=
− y α˜ )} log{2M/(L x > 1, log(|λ2 |/|λ1 |)
where |λ2 |/|λ1 | > 1 by (1.5). Clearly, n1 is a real number depending on x and y such that the right-hand sides of (3.39) and (3.40) are equal, i.e., 2 |n1 x − y α˜ . 2M|λ1 |n1 = L|λ
(3.41)
It implies that
2 |n x − y α˜ 2M|λ1 |n L|λ 2 |n x − y α˜ 2M|λ1 |n L|λ
if 1 n [n1 ], if n [n1 ] + 1,
(3.42)
where [n1 ] denotes the largest integer not exceeding n1 . On the other hand, by the choice (1.3) −1 of α1 we have |λ2 | = |λ1 |(α1 +1) . It follows from (3.41) that −1
|λ1 |n1 = C1 x − y (1+α1
)α˜
−1
and |λ2 |n1 = C2 x − y α1
α˜
,
(3.43)
where C1 and C2 are both positive constants independent of x and y. Having those preparations, we can estimate Ξ1 . By the definition, Ξ1 (x, y) = Ξ11 (x, y) + Ξ12 (x, y), 1] where Ξ11 (x, y) denotes the sum [n n=1 of the first [n1 ] terms in the sum of Ξ1 (x, y) and Ξ12 (x, y) denotes the remaining sum ∞ n=[n1 ]+1 . Noting (3.42) and applying inequalities (3.39) and (3.40), we obtain
2058
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
Ξ11 (x, y)
[n1 ]
|λ2 |1+α˜ n ML x − y α˜ |λ1 | |λ1 | n=1
=
2 |1+α˜ M L|λ |λ1 |(|λ2 |1+α˜ − |λ1 |)
|λ2 |1+α˜ |λ1 |
[n1 ]
− 1 x − y α˜
and Ξ12 (x, y)
2M 2 |λ1 |
∞
|λ2 |nα˜ =
n=[n1 ]+1
2M 2 |λ2 |([n1 ]+1)α˜ |λ1 |(1 − |λ2 |α˜ )
respectively by the first inequality given in (2.11), where |λ2 |1+α˜ /|λ1 | > 1 since α˜ < α1 . Furthermore, by (3.43), we get
2 |1+α˜ −1 2 M L|λ |λ2 |1+α˜ n1 Ξ11 (x, y) x − y α˜ = K11 x − y α1 α˜ , 1+ α ˜ |λ1 | |λ1 |(|λ2 | − |λ1 |) Ξ12 (x, y)
−1 2 2M 2 |λ2 |n1 α˜ = K12 x − y α1 α˜ , α ˜ |λ1 |(1 − |λ2 | )
where K11 :=
2 |1+α˜ C21+α˜ M L|λ > 0, C1 |λ1 |(|λ2 |1+α˜ − |λ1 |)
K12 :=
2C2 M 2 > 0. |λ1 |(1 − |λ2 |α˜ )
Thus, putting K1 := K11 + K12 we can prove the first inequality in Lemma 4. In order to estimate Ξ2 , we note that either n n n n b 1 F (x) − b1 F (y) b1 F (x) + b1 F (y) 2M|λ1 |nα˜
(3.44)
by the second inequality given in (2.11) or n n n n b 1 F F (x) − b1 F (y) F (x) − F (y) LM α˜ |λ2 |nα˜ x − y α˜ (3.45) F 1 by (3.35). The following procedure is totally similar to the above for Ξ1 . For each fixed x, y in a sufficiently small U we choose n2 (x, y) :=
log{(2M)1/α˜ /(L1/α˜ M1 x − y )} > 1, log(|λ2 |/|λ1 |)
where we note that |λ2 |/|λ1 | > 1 by (1.5). Clearly, n2 is a real number depending on x and y such that the right-hand sides of (3.44) and (3.45) are equal, i.e., 2M|λ1 |n2 α˜ = LM1α˜ |λ2 |n2 α˜ x − y α˜ . Then,
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063 −1
|λ1 |n2 = C3 x − y α1
(α1 +1)
−1
|λ2 |n2 = C4 x − y α1 ,
,
2059
(3.46)
where C3 and C4 are two positive constants independent of x and y. It follows from the first formula in (2.14), (3.44), (3.45) and (3.46) that [n2 ]
MLM1α˜ |λ2 |1+α˜ n 2M 2 Ξ2 (x, y) x − y α˜ + |λ1 | |λ1 | |λ1 | n=1
∞ n=[n2 ]+1
|λ1 |α˜ |λ2 | |λ1 |
n
˜ n2 MLM1α˜ |λ2 |1+α˜ 2M 2 |λ2 |(1+α) |λ1 |α˜ |λ2 | n2 α˜ x − y + |λ1 | |λ1 | |λ1 |(|λ2 |1+α˜ − |λ1 |) |λ1 | − |λ1 |α˜ |λ2 |
−1
K2 x − y (α1
+1)α−1 ˜
,
where K2 :=
C41+α˜ MLM1α˜ |λ2 |1+α˜ 2C4 M 2 + >0 C3 |λ1 |(|λ2 |1+α˜ − |λ1 |) C31−α˜ (|λ1 | − |λ1 |α˜ |λ2 |)
because |λ2 |1+α˜ /|λ1 | > 1 as mentioned before and |λ1 |α˜ |λ2 |/|λ1 | = μ2 < 1 by (2.17). This proves the second inequality in Lemma 4. The estimate for Ξ3 can be given directly from the first inequality in (2.13), the second one in (2.11), (3.35) and (3.36). One can obtain that Ξ3 (x, y) K3 x − y α˜ , where K3 :=
MLM1α˜
∞
μn1
+ ML
n=1
∞
μn2
|λ1 |−1 ∈ (0, +∞),
n=1
since μ1 , μ2 ∈ (0, 1) as shown in (2.17). The proof is completed.
2
4. Sharpness of estimates Our Theorem 2 gives estimates for the regularity of linearization in various cases when the considered contraction has two different eigenvalues in absolute value. If the considered contraction has two eigenvalues with the same absolute value, Chaperon [5] proves that the linearization is of the same regularity as the contraction. In this section, we give a counter example to show that in the case of two different eigenvalues in absolute value our estimates for the regularity of linearization are the best. Suppose that λ1 , λ2 are real numbers satisfying (1.5), i.e., 0 < |λ1 | < |λ2 | < 1, and that x := (x1 , x2 ) ∈ R2 . Let Ω := {x ∈ R2 : −1 < x1 < 1, −1 < x2 < 1} be an open neighborhood of O. Let the function p : R → R be defined by p(s) :=
s 1+α , 0,
s 0, s<0
where α ∈ (0, 1], and the function u : R2 \{O} → R be defined by
(4.47)
2060
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
⎧ ∞ x1 /|x2 | ⎪ ⎨ −∞ q(t) dt/ −∞ q(t) dt, x2 = 0, u(x) := 0, x1 < 0, x2 = 0, ⎪ ⎩ 1, x1 > 0, x2 = 0, where q(x) :=
1
e t (t−1) , 0,
0 < t < 1, other cases.
One can check that p is C 1,α on R and that u is C ∞ on R2 \{O} such that (U1) u(x1 , x2 ) = 1 if x1 |x2 |, (U2) u(x1 , x2 ) = 0 if x1 0, and (U3) ∂u(x)/∂x1 0 and u(r) (x) A x −r for r = 1, 2 and for all x ∈ R2 \{O}, where A is a positive constant. Define a planar mapping F : Ω → R2 by F (x) :=
(λ1 x1 + u(λ1 x1 , λ2 x2 )p(λ2 x2 ), λ2 x2 ),
x ∈ Ω\{O},
O,
x = O.
(4.48)
According to (U3), one can verify that F (x) − diag(λ1 , λ2 )x = o x ,
lim F (x) = diag(λ1 , λ2 )
x→O
and
F (x) − F (y) L x − y α , for a constant L > 0 in a small neighborhood U ⊂ Ω of O, i.e., F is a C 1,α diffeomorphism in U . We claim the following. Fact. For α ∈ (α0 , 1], the mapping F given in (4.48) cannot be linearized near O by a transformation smoother than as provided in cases (i)–(iv) in Theorem 2. For α ∈ (0, α0 ], the mapping F cannot be linearized near O by C 1,β transformations for any β ∈ (0, 1]. Proof. For α ∈ (α0 , 1], the fact is obvious in case (i). In order to prove the fact in cases (ii)–(iv), we suppose that 0 < λ1 < λ2 < 1. When at least one of eigenvalues of F (O) is negative, we can consider the quadratic iterate F 2 instead of F to obtain the same conclusion. Since (4.47) and (U2) imply that the mapping F defined in (4.48) is linear in the second, third and forth quadrants, our discussion will be proceeded in the first quadrant. Fix a real constant ξ ∈ U ∩ (0, +∞) and choose n0 (x2 ) := α1−1 logλ2 (x2 /ξ ) > 1
(4.49)
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2061
for each sufficiently small x2 ∈ U ∩ (0, +∞). We simply let n0 denote n0 (x2 ) when there is no confusion. Clearly, the integer [n0 ], the largest integer not exceeding n0 , is the largest integer in the set {n ∈ N: λn1 ξ λn2 x2 }. Observing (4.48), we get π1 F (x) λ1 x1 ,
∀x ∈ U \{O},
(4.50)
because p(s) 0 for all s ∈ R and u(x) 0 for all x ∈ Ω\{O} by (U2) and the first inequality in (U3). A straightforward computation shows that π2 F n (ξ, x2 ) = λn2 x2 for all n ∈ N and that n−[n0 ]
π1 F [n0 ] (ξ, x2 ) [n 0 ]−1 1+α n−[n0 ] [n ] [n ]−i λ1 0 u λi1 ξ + Ri (x), λi2 x2 λi2 x2 = λ1 λ1 0 ξ +
π1 F n (ξ, x2 ) λ1
i=1
[n ] [n ] [n ] 1+α + u λ1 0 ξ + R[n0 ] (x), λ2 0 x2 λ2 0 x2
(4.51)
for all n [n0 ] by (4.50), where Ri (x) 0 for all x ∈ U \{O} and for all i = 1, . . . , [n0 ] since p(s) 0 and u(x) 0 as mentioned before. Furthermore, by (U1) and the choice of the number n0 given in (4.49), we obtain u λi1 ξ + Ri (x), λi2 x2 = 1, ∀x ∈ U, ∀i = 1, . . . , [n0 ], since λi1 ξ + Ri (x) λi2 x2 . Thus, by (4.51), π1 F
n
n−[n ] (ξ, x2 ) λ1 0
+
[n 0 ]−1
[n ]−i i 1+α λ2 x2 λ1 0
+
[n ] 1+α λ2 0 x2
i=1
= λn1
[n ] λ1 0 ξ
ξ+
[n 0 ]−1
−1 1+α i 1+α −1 1+α [n0 ] 1+α λ1 λ2 x2 + λ 1 λ2 x2
(4.52)
i=1 1+α = 1 by (1.3). Then, by (4.49) for all n [n0 ]. In the case that α = α1 1, we have λ−1 1 λ2 and (4.52),
(4.53) π1 F n (ξ, x2 ) λn1 ξ + [n0 ]x21+α λn1 ξ + α1−1 logλ2 (x2 /ξ ) − 1 x21+α . 1+α In the case of either α = 1 but α1 > 1 or 0 < α < min{1, α1 }, we have λ−1 > 1 by (1.3) 1 λ2 [n0 ]−1 −1 1+α i 1+α and the sum i=1 (λ1 λ2 ) x2 in the last row in (4.52) is positive. Then, using (4.49) and (4.52) again, we get 1+α [n0 ] 1+α π1 F n (ξ, x2 ) λn1 ξ + λ−1 x2 1 λ2 −1 1+α α1 logλ2 (x2 /ξ )−1 1+α x2 λn1 ξ + λ−1 1 λ2
(α −1 +1)α = λn1 ξ + Cx2 1 −(1+α) 1−α −1 α 1
1 because λ1 = λ1+α by (1.3), where C := λ1 λ2 2
ξ
(4.54) > 0.
2062
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
Having those preparations, we can estimate β. For a fixed number β ∈ (0, 1], suppose that Φ : U → R2 is a C 1,β diffeomorphism satisfying Eq. (1.1) in U . Without loss of generality, we assume that Φ(0, x2 ) = (0, x2 ),
Φ(x1 , 0) = (x1 , 0),
Φ (x1 , 0) = Φ (0, x2 ) = id.
(4.55)
: U → R2 defined by Otherwise, we consider another C 1,β diffeomorphism Φ
:= Θ ◦ Φ (O) −1 Φ, Φ ˆ 2 ), x2 ) for all x ∈ U and gˆ is a C 1,β function on U ∩ R whose graph where Θ(x) := (x1 − g(x Γ := {(x1 , x2 ) ∈ U : x1 = g(x ˆ 2 )} is just the image of the x2 -axis under {Φ (O)}−1 Φ. One can commutes with F (O) and check that Φ is a solution of Eq. (1.1) because the transformation Θ that Φ satisfies (4.55). By (4.55), the Taylor expansion of π1 Φ at (ξ, 0) gives π1 Φ(ξ, x2 ) = 1+β ξ + O(x2 ). Substituting x2 with λk2 for all sufficiently large k ∈ N and taking k as variable, we get k(1+β) . (4.56) π1 Φ ξ, λk2 = ξ + O λ2 Let N ∈ N such that N > max{α1−1 , (1 + β)(βα1 + β)−1 }. By (1.1) and (4.56), k(1+β) k k Nk ξ + O λ2 . π1 Φ F N k ξ, λk2 = λN 1 π1 Φ ξ, λ2 = λ1
(4.57)
On the other hand, we can see that F given in (4.48) satisfies the equality (2.9), i.e., π1 F (0, x2 ) = 0 for all x2 ∈ U ∩ (0, +∞). It follows that the second inequality in (2.25) holds for F . Thus, by (4.50), k Nk k λN ξ, λk2 M2 λN (4.58) 1 ξ π1 F 1 ξ, ∀k ∈ N. (N +1)k
The Taylor expansion of π1 Φ at (0, λ2
) gives
+1)k π1 Φ F N k ξ, λk2 = π1 Φ π1 F N k ξ, λk2 , λ(N 2 1+β = π1 F N k ξ, λk2 + O π1 F N k ξ, λk2 N k(1+β) = π1 F N k ξ, λk2 + O λ1 by (4.55) and (4.58). Since N k > n0 (λk2 ) by the choice of N , it follows from (4.53) and (4.54) that k λk(1+α) + O λN kβ ξ + α1−1 k − C π1 Φ F N k ξ, λk2 λN 1 1 2
(4.59)
:= α −1 logλ ξ + 1, and that when α = α1 1, where C 1 2 N kβ k(α −1 +1)α k π1 Φ F N k ξ, λk2 λN ξ + Cλ2 1 + O λ1 1 when either α = 1 but α1 > 1 or 0 < α < min{1, α1 }.
(4.60)
W.M. Zhang, W.N. Zhang / Journal of Functional Analysis 260 (2011) 2043–2063
2063
For the cases (ii)–(iv) in Theorem 2, comparing (4.57) with (4.59) and (4.60) respectively and Nβ 1+β noting that λ1 < λ2 by the choice of N , we get
if α = α1 < 1,
β < α,
β (α1−1 + 1)α − 1, if either α = 1 but α1 > 1 or α0 < α < min{1, α1 }. For α ∈ (0, α0 ], we assume that F can be C 1,β linearized near O for a number β ∈ (0, 1]. Then (4.57) contradicts to (4.60) because 1 + β > 1 α0−1 α = (α1−1 + 1)α, which implies that 1+β
λ2
(α −1 +1)α
< λ2 1 . This completes the proof.
2
Remark. For α ∈ (0, α0 ], the fact only indicates that C 1 linearization will be the best for C 1,α (α ∈ (0, α0 ]) contractions F . It remains interesting to know whether C 1 linearization can be realized for such contractions. Acknowledgment The authors are grateful to the referee for his/her helpful comments and suggestions. References [1] V.I. Arnold, Geometric Methods in the Theory of Ordinary Differential Equations, Springer, New York, 1983. [2] G.R. Belitskii, Functional equations and the conjugacy of diffeomorphism of finite smoothness class, Funct. Anal. Appl. 7 (1973) 268–277. [3] G.R. Belitskii, Equivalence and normal forms of germs of smooth mappings, Russian Math. Surveys 33 (1978) 107–177. [4] A.D. Brjuno, Analytical form of differential equations, Trans. Moscow Math. Soc. 25 (1971) 131–288. [5] M. Chaperon, Invariant manifolds revisited, Tr. Mat. Inst. Steklova 236 (2002) 428–446, dedicated to the 80th anniversary of Academician Evgenii Frolovich Mishchenko, Suzdal, 2000 (in Russian). [6] M.S. ElBialy, Local contractions of Banach spaces and spectral gap conditions, J. Funct. Anal. 182 (2001) 108–150. [7] P. Hartman, On local homeomorphisms of Euclidean spaces, Bol. Soc. Mat. Mexicana 5 (1960) 220–241. [8] P. Hartman, Ordinary Differential Equations, John Wiley & Sons, New York, 1964. [9] R. de la Llave, C.E. Wayne, On Irwin’s proof of the pseudo-stable manifold theorem, Math. Z. 219 (1995) 301–321. [10] H. Poincaré, Sur le problème des trois corps et les équations de la dyanamique, Acta Math. 13 (1890) 1–270. [11] C. Pugh, On a theorem of P. Hartman, Amer. J. Math. 91 (1969) 363–367. [12] H.M. Rodrigues, J. Solà-Morales, Linearization of class C 1 for contractions on Banach spaces, J. Differential Equations 201 (2004) 351–382. [13] G.R. Sell, Smooth linearization near a fixed point, Amer. J. Math. 107 (1985) 1035–1091. [14] C.L. Siegel, Iteration of analytic functions, Ann. Math. 43 (1942) 607–612. [15] S. Sternberg, Local contractions and a theorem of Poincaré, Amer. J. Math. 79 (1957) 809–824. [16] S. Sternberg, On the structure of local homeomorphisms of Euclidean n-space, Amer. J. Math. 80 (1958) 623–631. [17] D. Stowe, Linearization in two dimensions, J. Differential Equations 63 (1986) 183–226. [18] J.-C. Yoccoz, Linéarisation des germes de difféomorphismes holomorphes de (C, 0), C. R. Acad. Sci. Paris 36 (1988) 55–58.
Journal of Functional Analysis 260 (2011) 2064–2085 www.elsevier.com/locate/jfa
Relative index pairing and odd index theorem for even dimensional manifolds Zhizhang Xie 1 Department of Mathematics, The Ohio State University, Columbus, OH 43210-1174, USA Received 27 July 2010; accepted 6 October 2010 Available online 20 October 2010 Communicated by Alain Connes
Abstract We prove an analogue for even dimensional manifolds of the Atiyah–Patodi–Singer twisted index theorem for trivialized flat bundles. We show that the eta invariant appearing in this result coincides with the eta invariant by Dai and Zhang up to an integer. We also obtain the odd dimensional counterpart for manifolds with boundary of the relative index pairing by Lesch, Moscovici and Pflaum. © 2010 Elsevier Inc. All rights reserved. Keywords: APS twisted index theorem; Manifolds with boundary; Relative index pairing
0. Introduction In this article, we will prove an analogue for even dimensional manifolds of the Atiyah– Patodi–Singer twisted index theorem for trivialized flat bundles over odd dimensional closed manifolds [3, Proposition 6.2], and some related results. For notational simplicity, we will restrict the discussion mainly to spin manifolds. However all results can be straightforwardly extended to general manifolds. Unless we specify otherwise, we always fix the Riemannian metric for each manifold in this article and use the associated Levi-Civita connection to define its characteristic classes. E-mail address: [email protected]. 1 The author was partially supported by the US National Science Foundation awards No. DMS-0652167.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.002
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2065
To motivate the subject matter of this paper, we begin by recalling the APS twisted index theorem for odd dimensional closed manifolds in the following form, cf. [12, Corollary 7.9]. For (ps )0s1 ∈ Mk (C ∞ (N )), s ∈ [0, 1], a smooth path of projections over N , one has 1
1 d η(ps Dps ) ds = 2 ds
) ∧ Tch• (ps ). A(N
N
0
) the A-genus Here ps Dps is the Dirac operator twisted by ps , η(ps Dps ) its η-invariant, A(N form of N and Tch• (ps ) is the Chern–Simons transgression form of (ps )0s1 , cf. Section 3. To prove our analogue for even dimensional closed manifolds, we shall replace a path of projections by a path of unitaries. The more interesting issue is what should replace the η-invariant appearing on the left hand side of the above formula. To answer this, let us first consider the case where the manifold in question bounds, that is, it is the boundary of some spin manifold. In this case, the η-invariant by Dai and Zhang [9, Definition 2.2] is the right candidate, cf. Section 6 below. Indeed, suppose the even dimensional manifold Y is the boundary of a spin manifold X and (Us )0s1 is the restriction to Y of a smooth path of unitaries over X. Denote the η-invariant of Dai and Zhang by η(Y, Us ) for each s ∈ [0, 1], then 1 0
1 d η(Y, Us ) ds = 2 ds
) ∧ Tch• (Us ). A(Y
(0.1)
Y
When Y bounds, it follows from the cobordism invariance of the index of Dirac operators that Ind(D + ) = 0, where D + is the restriction of the Dirac operator over Y to the even half of the spinor bundle according to its natural Z2 -grading. The condition Ind(D + ) = 0 is crucial for the definition of the η-invariant by Dai and Zhang, however is often not satisfied by even dimensional closed spin manifolds in general. To cover the general case, we shall use another approach where we lift the data to S1 × Y . The main ingredient of the method of proof is using an explicit formula of the cup product K 1 (S1 ) ⊗ K 1 (Y ) → K 0 (S1 × Y ), inspired by the Powers–Rieffel idempotent construction, cf. [15]. In fact, the formula given for the case when Y = S1 by Loring in [14] also works for all manifolds in general, cf. Section 2 below. Our analogue for even dimensional closed spin manifolds of the APS twisted index theorem (Theorem 4.1 below) is as follows. Theorem (I). Let Y be an even dimensional closed spin manifold and (Us )0s1 ∈ Uk (C ∞ (Y )) a smooth path of unitaries over Y . For s ∈ [0, 1], es ∈ M2k (C ∞ (S1 × Y )) is the projection defined as the cup product of Us with the generator e2πiθ of K 1 (S1 ). Let DS1 ×Y be the Dirac operator over S1 × Y . Then 1 0
1 d η(es DS1 ×Y es ) ds = 2 ds
) ∧ Tch• (Us ). A(Y
(0.2)
Y
The formula of es is given in Section 2. A priori, the η-invariants in the formulas (0.1) and (0.2) appear to be different, we however will show that they are equal to each other modulo Z (Theorem 5.7 below) in the case where Y bounds.
2066
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
Theorem (II). Suppose Y is the boundary of an odd dimensional spin manifold. For U ∈ Uk (C ∞ (Y )) and eU the cup product of U with e2πiθ ∈ K 1 (S1 ), one has η(Y, U ) = η(eU DS1 ×Y eU )
mod Z.
The method of proof is based on a slight generalization of a theorem by Brüning and Lesch [6, Theorem 3.9], see Proposition 5.6 below. In this sense, η(eU DS1 ×Y eU ) can be thought of as the extension to general even dimensional manifolds of the definition of the η-invariant by Dai and Zhang. The same technique used above also allows us to prove the following analogue (Theorem 6.3 below) for odd dimensional manifolds with boundary of the relative index pairing formula by Lesch, Moscovici and Pflaum [12, Theorem 7.6]. Suppose M is an odd dimensional spin manifold with boundary ∂M. By a relative K-cycle [U, V , us ] ∈ K 1 (M, ∂M), we mean U, V ∈ Un (C ∞ (M)) are two unitaries over M with us ∈ Un (C ∞ (∂M)), s ∈ [0, 1], a smooth path of unitaries over ∂M such that u0 = U |∂M and u1 = V |∂M . We denote by TU , resp. TV , the Toeplitz operator on M with respect to U , resp. V (see Section 5 for details). Theorem (III). Let [U, V , us ] be a relative K-cycle in K 1 (M, ∂M). If U and V are constant along the normal direction near the boundary, then us Ind[D] [U, V , us ] = Ind(TV ) − Ind(TU ) + SF u−1 s D[0,1] us ; P0 us −1 where SF(u−1 s D[0,1] us ; P0 ) is the spectral flow of the path of elliptic operators (us D[0,1] us ; us P0 ), s ∈ [0, 1], with Atiyah–Patodi–Singer type boundary conditions determined by P0us as in (5.4).
This uses Dai and Zhang’s Toeplitz index theorem for odd dimensional manifolds with boundary [9]. We shall give the details in Section 6. It should be mentioned that, although the objects we work with are from classical geometry, the spirit of the proofs is very much inspired by methods from noncommutative geometry, cf. [8]. A brief outline of the article is as follows. In Section 1, we recall some results about index pairings for manifolds with boundary. Section 2 is devoted to the explicit formula of the cup product in K-theory mentioned earlier. This allows us to carry out explicit calculations for Chern characters in Section 3. With these preparations, we prove an analogue for even dimensional manifolds of the APS twisted index theorem in Section 4. In Section 5, we show the equality of the two a priori different eta invariants. In the last section, we prove the odd dimensional counterpart of the relative index pairing formula by Lesch, Moscovici and Pflaum [12, Theorem 7.6]. 1. Relative index pairing Let M be a compact smooth manifold with boundary ∂M = ∅. Following [4, Section 2], consider an elliptic first order differential operator D : Cc∞ (M \ ∂M, E) → Cc∞ (M \ ∂M, E) where Cc∞ (M \ ∂M, E) is the space of compactly supported smooth sections of the Hermitian vector bundle E. Such an operator has a number of extensions to become a closed unbounded
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2067
operator on H = L2 (M \ ∂M, E), e.g. Dmin and Dmax the minimum extension and the maximum extension respectively. Consider De a closed extension of D such that Dmin ⊂ De ⊂ Dmax ,
(1.1)
that is, D(Dmin ) ⊂ D(De ) ⊂ D(Dmax ). Let B=
0 De
De∗ 0
and −1/2 Fe = B B 2 + 1 =
0 T
T∗ 0
with T = De (De∗ De + 1)−1/2 and T ∗ = De∗ (De De∗ + 1)−1/2 . Denote by C0 (M \ ∂M) the space of continuous functions vanishing at infinity. Then the ∗-representation of C0 (M \ ∂M) on H ⊕ H given by scalar multiplication, together with Fe , defines an element in KK(C0 (M \ ∂M), C), see [4] for the precise construction. Such a K-homology class turns out to be independent of the choice of a closed extension of D [4, Proposition 2.1], and will be denoted [D]. Similarly for each formally symmetric elliptic operator, one constructs a cycle in KK(C0 (M \ ∂M), Cl1 ) [4, Section 2], where Cl1 is the Clifford algebra with one generator. For each [D] ∈ KK(C0 (M \ ∂M), Cl• ), one has the index pairing map Ind[D] : K • (M \ ∂M) → Z. An element in K 0 (M \ ∂M) is represented by a triple (E, F, α) with E, F vector bundles over M \ ∂M and α : E → F a bundle homomorphism whose restriction near infinity is an isomorphism, cf. [1]. Moreover, we can choose connections over the bundles E and F such that the forms Ch• (E) and Ch• (F ) coincide near infinity. Under this assumption, one can write down an explicit formula for the index pairing map: Ind[D] [E, F, α] =
ωD ∧ Ch• (E) − Ch• (F ) .
M even (M \ ∂M) is the dual of the Chern character of the K-homology class [D], as Here ωD ∈ HdR explained in the introduction of Chap. I in [7]. In the case where M is a spin manifold and D the Dirac operator over M, one has ωD = A(M). Similarly, in the odd case, an element in K 1 (M \ ∂M) consists of two unitaries U and V over M \ ∂M and a homotopy h between U and V near infinity. Moreover, we can assume that U and V are identical near infinity and the homotopy h becomes the identity map near infinity, cf. e.g.
2068
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
[10, Proposition 4.3.14], in which case the index pairing map has the following cohomological expression2 : Ind[D] [V , U, h] = − ωD ∧ Ch• (V ) − Ch• (U ) . M
Note that the boundary data are conspicuously absent in the above formulas. Indeed, by definition, K • (M \ ∂M) is essentially the (reduced) K-group of the one point compactification of M \ ∂M. The information from the boundary is therefore completely eliminated from the picture. In order to recover that, we shall turn to the relative K theory of the pair (M, ∂M), denoted K • (M, ∂M), cf. [12]. A relative K-cycle [p, q, hs ] ∈ K 0 (M, ∂M) is a triple where p, q ∈ Mn (C ∞ (M)) are two projections over M and hs ∈ Mn (C ∞ (∂M)), s ∈ [0, 1], is a path of projections over ∂M such that h0 = p|∂M and h1 = q|∂M . Similarly, a relative K-cycle [U, V , us ] ∈ K 1 (M, ∂M) is a triple where U, V ∈ Un (C ∞ (M)) are two unitaries over M with us ∈ Un (C ∞ (∂M)), s ∈ [0, 1], a smooth path of unitaries over ∂M such that u0 = U |∂M and u1 = V |∂M . First notice that K • (M, ∂M) ∼ = K • (M \∂M). Hence the above index pairing induces • a map Ind[D] : K (M, ∂M) → Z. The issue now is to find an explicit formula which incorporates geometric information of the boundary. For even dimensional manifolds with boundary, this is done by Lesch, Moscovici and Pflaum [12, Theorem 7.6]. We shall give an analogous formula for odd dimensional manifolds with boundary in Section 6. 2. Cup product in K-theory Let A and B be local Fréchet algebras. The cup product between K1 (A) and K1 (B) is defined by × : K1 (B) ⊗ K1 (A) = K0 (SB) ⊗ K0 (SA) → K0 (SB ⊗ SA) ∼ = K0 (B ⊗ A) where SA (resp. SB) is the suspension of A (resp. SB), the isomorphism is the Bott isomorphism and K0 (SB) ⊗ K0 (SA) → K0 (SB ⊗ SA) is given by [p] × [q] = [p ⊗ q].
(2.1)
In the case where B = C ∞ (S1 ), we shall give an explicit formula of this cup product. Since is a generator of K1 (C ∞ (S1 )) ∼ = Z, it suffices to give this formula for [e2πiθ ] × [U ] with U ∈ Uk (A).
e2πiθ
Lemma 2.1. (See also [14].) With the above notation, 2πiθ × [U ] = [eU ] e 2 We adopt the negative sign here in order to be consistent with our sign convention throughout the article.
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
where eU = functions on
f g+hU ∈ M2k (C ∞ (S1 ) ⊗ A) hU ∗ +g 1−f 1 S satisfying the following conditions
2069
is a projection with f, g and h nonnegative
(1) 0 f 1, (2) f (0) = f (1) = 1 and f (1/2) = 0, (3) g = χ[0,1/2] (f − f 2 )1/2 and h = χ[1/2,1] (f − f 2 )1/2 . Proof. It is not difficult to see that × : K1 C ∞ S1 ⊗ K1 (A) → K0 C ∞ S1 ⊗ A is the same as the standard isomorphism [16, Section 7.2] ΘA : K1 (A) → K0 (SA) ⊂ K0 C ∞ S1 ⊗ A after identifying K1 (C ∞ (S1 )) with Z. The inverse of this map is constructed as follows, cf. [10, Proposition 4.8.2], [16, Section 7.2]. The group K0 (SA) is generated by formal differences of normalized loops of projections over A. Such a loop is a projection-valued maps p : [0, 1] → Mn (A) with p(0) = p(1) ∈ Mn (C). For each loop, there is a path of unitaries u : [0, 1] → Un (A) ∗ such that p(t) = u(t)p(1)u(t) and u(0) = 1n . Without loss of generality, we can assume p(0) = 10 p(1) = 0 0 . This implies that u(1) is of the form v0 w0 . Then one checks that [p] → [v] is a well-defined inverse to ΘA . −1 (eU ) = U . To see that our formula agrees with the usual definition, it suffices to show that ΘA 1 0 First notice that eU (0) = eU (1) = 0 0 and eU (θ ) is a projection over A for each θ ∈ S1 = R/Z, hence eU is a normalized loop of projections. Now consider the following path of unitaries over A, U(θ ) =
f1 (θ ) + f2 (θ )U (1 − f )1/2 (θ )
(1 − f )1/2 (θ ) −f1 (θ ) − f2 (θ )U ∗
where f1 = χ[0,1/2] f 1/2 and f2 = χ[1/2,1] f 1/2 . In particular, U(0) = By a direct calculation, one verifies
1 0 01
and U(1) =
U
0 . 0 −U ∗
1 0 eU (θ ) = U(θ ) U(θ )∗ 0 0 from which the lemma follows.
2
We will also make use of the following lemma in Section 3, cf. [14, Lemma 2.2]. Lemma 2.2. For f, g and h nonnegative functions on S1 = R/Z satisfying the following conditions (1) 0 f 1, (2) f (0) = f (1) = 1 and f (1/2) = 0, (3) g = χ[0,1/2] (f − f 2 )1/2 and h = χ[1/2,1] (f − f 2 )1/2 ,
2070
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
we have 1 0
(k − 1)!(k − 1)! . (2 − 4f )h h2k−1 + 4f h2k dθ = (2k − 1)!
Proof. Notice that 1
1
2k
f h dθ = 0
k f (θ ) − f 2 (θ ) df (θ ) =
1/2
1
k x − x 2 dx =
0
k!k! , (2k + 1)!
and integration by parts gives 1
2k−1
(2 − 4f )h h
2 dθ = k
0
1
f h2k dθ.
2
0
3. Chern characters and transgression formulas Throughout this section, although we deal with commutative algebras, we shall use the similar formalism for the Chern character in K-theory as in cyclic homology [7, Chap. II], [13, Chap. VIII]. Let M be a compact smooth manifold with or without boundary. The even (resp. odd) Chern characters of projections (resp. unitaries) in Mn (C ∞ (M)) can be expressed as follows. For p ∈ Mn (C ∞ (M)) such that p 2 = p and p ∗ = p, Ch• (p) := tr(p) +
∞
(−1)k k=1
1 1 even tr p(dp)2k ∈ HdR (M). k (2πi) k!
(3.1)
For U ∈ Un (C ∞ (M)), Ch• (U ) :=
∞
k=0
2k+1 1 k! odd tr U −1 dU ∈ HdR (M). k+1 (2k + 1)! (2πi)
(3.2)
For each U ∈ Un (C ∞ (M)), let eU be the projection as in Lemma 2.1. If no confusion is likely to arise, we also write e instead of eU . Lemma 3.1. Ch• (eU ) = −
∞
k=1
2k−1 1 k 2k 4f h + (2 − 4f )h h2k−1 dθ ∧ tr U −1 · dU . k (2πi) k!
Proof. Notice that de =
f h U ∗ + g
g + h U −f
dθ +
0 h dU ∗
h dU 0
,
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2071
which implies tr e(de)2k = tr
g + hU 1−f
hU ∗ + g j
=2k f + tr hU ∗ + g
0 h dU h dU ∗ 0 0 g + hU 1−f h dU ∗
f
j =1
f g + h U ∗
g + h U −f
dθ
0 h dU ∗
2k
h dU 0
h dU 0
j −1 (3.3)
(2k−j ) .
(3.4)
Since most of the matrices appearing in the above summation only have off diagonal entries, a straightforward calculation gives the following equalities 2k (3.3) = h2k tr U −1 · dU , 2k−1 . (3.4) = −(−1)k k (2 − 4f )h h2k−1 + 4f h2k dθ ∧ tr U −1 · dU On the other hand, 2k 2k−1 tr U −1 · dU = − tr U −1 · dU U −1 · dU from which it follows that (3.3) vanishes. This finishes the proof.
2
As a consequence of Lemma 2.2 and Lemma 3.1, one has the following corollary. From now on, integration along the fiber S1 will be denoted by π∗ . Corollary 3.2. π∗ Ch• (eU ) = −Ch• (U ). Consider a smooth path of unitaries Us ∈ Un (C ∞ (M)) with s ∈ [0, 1], or equivalently U ∈ • (Us ) is given by the formula Un (C ∞ ([0, 1] × M)). The secondary Chern character Ch • (Us ) := Ch
∞
(−1)k k=0
2k 1 k! −1 ˙ tr Us Us Us dU −1 . k+1 (2k)! (2πi)
Then Ch• (U) can be decomposed as • (Us ) Ch• (U) = Ch• (Us ) + ds ∧ Ch • (Us ) do not contain ds. Applying de Rham differential where Ch(Us ) (see (3.2) above) and Ch to both sides gives us the following transgression formula ∂ • (Us ). Ch• (Us ) = d Ch ∂s Similarly, if es ∈ Mm (C ∞ (M)) is a smooth path of projections, or equivalently a projection e ∈ Mm (C ∞ ([0, 1] × M)), then
2072
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
• (es ) Ch• (e) = Ch• (es ) + ds ∧ Ch with • (es ) := Ch
∞
k=0
(−1)k+1
1 1 tr (2es − 1)e˙s (des )2k+1 . k+1 k! (2πi)
Applying Corollary 3.2 to Ch• (U) and Ch• (eU ), one has π∗ Ch• (eU ) = −Ch• (U), which implies • (es ) = ds ∧ Ch • (Us ). ds ∧ π∗ Ch Denote the Chern–Simons transgression forms by 1 Tch• (es )0s1 :=
• (es ), ds ∧ Ch
0
1 Tch• (Us )0s1 :=
• (Us ). ds ∧ Ch
0
We summarize the results of this section in the following proposition. Proposition 3.3. Consider U ∈ Un (C ∞ (M)) and Us ∈ Un (C ∞ (M)) for s ∈ [0, 1]. Let e, resp. es , be the cup product of U , resp. Us , with e2πiθ a generator of K 1 (S1 ) as in Lemma 2.1. Then π∗ Ch• (e) = −Ch• (U ) and π∗ Tch• (es )0s1 = Tch• (es )0s1 . 4. Odd index theorem on even dimensional manifolds In this section, we shall prove our analogue for even dimensional closed manifolds of the APS twisted index theorem. Let us first recall the APS twisted index theorem and fix some notation. Let N be closed odd dimensional spin manifold and D / its Dirac operator. If p is a projection in Mn (C ∞ (N )), then p induces a Hermitian vector bundle, denoted Ep , over N . With the Grassmannian connection on Ep , let p(D ⊗ In )p be the twisted Dirac operator with coefficients in Ep . For notational
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2073
simplicity, we also write pDp instead of p(D ⊗ In )p. Then by [12, Corollary 7.9], for ps ∈ Mk (C ∞ (N )) a smooth path of projections over N , one has ξ(p1Dp / 1 ) − ξ(p0Dp / 0) =
/ s )0s1 A(N) ∧ Tch• (ps ) + SF(psDp
(4.1)
N
where ξ(piDp / i) =
/ i ) + dim ker(piDp / i) η(piDp 2
/ i . Here SF(psDp / s )0s1 is the spectral flow of (psDp / s )0s1 . the reduced eta invariant of piDp Notice that the vector bundle on which psDp / s acts may vary as s moves along [0, 1]. To make sense of the definition of such a spectral flow, we introduce a path of unitaries us ∈ Un (C ∞ (N)) over N with us p0 u∗s = ps so that p0 u∗sDu / s p0 acts on the same vector bundle Ep0 . SF(psDp / s )0s1 is then defined to be SF(p0 u∗sDu / s p0 )0s1 the spectral flow of the family (p0 u∗sDu / s p0 )0s1 . Now by [11, Lemma 3.4], formula (4.1) is equivalent to 1
1 d η(psDp / s ) ds = 2 ds
) ∧ Tch• (ps ). A(N
(4.2)
N
0
Theorem 4.1. Let Y be a closed even dimensional spin manifold and (Us )0s1 ∈ Uk (C ∞ (Y )) a smooth path of unitaries over Y . For s ∈ [0, 1], es ∈ M2k (C ∞ (Y )) the projection defined as the cup product of Us with the generator e2πiθ of K 1 (S1 ). Let DS1 ×Y be the Dirac operator over S1 × Y . Then 1
1 d η(es DS1 ×Y es ) ds = 2 ds
) ∧ Tch• (Us ). A(Y
(4.3)
Y
0
Proof. Applying formula (4.1) to S1 × Y , one has ξ(e1 DS1 ×Y e1 ) − ξ(e0 DS1 ×Y e0 ) =
S1 × Y ∧ Tch• (es ) + SF(es DS1 ×Y es ). A
S1 ×Y
1 ) ∧ π ∗ A(M) 1 ) = 1, where π1 : S1 × M → S1 , resp. 1 × M) = π ∗ A(S and A(S Notice that A(S 1 2 from S1 × M to S1 , resp. M. By Proposition 3.3, the integral π2 : S1 × M → M, is the projection on the right side is equal to Y A(Y ) ∧ Tch• (Us ). Now the formula 1 0
1 d η(es DS1 ×Y es ) ds = 2 ds
Y
) ∧ Tch• (Us ) A(Y
2074
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
follows from the equality [11, Lemma 3.4] 1 ξ(e1 DS1 ×Y e1 ) − ξ(e0 DS1 ×Y e0 ) = SF(es DS1 ×Y es ) +
1 d η(es DS1 ×Y es ) ds. 2 ds
2
0
Remark 4.2. Mod Z, the reduced η-invariant ξ(es DS1 ×Y es ) is equal to the reduced η-invariant ξ(Y, Us ) defined by Dai and Zhang, cf. [9, Definition 2.2], at least when Y bounds. See Theorem 5.7 below. 5. Equivalence of eta invariants Throughout this section, we assume M is an odd dimensional spin manifold with boundary ∂M. Denote by SM the spinor bundle over M. Let D be the Dirac operator over M, then near the boundary d D = c(d/dx) + D∂ dx where D ∂ is the Dirac operator over ∂M and c(d/dx) is the Clifford multiplication by the normal vector d/dx. Then D ⊗ In is the Dirac operator acting on SM ⊗ Cn , when we use the trivial connection on the bundle M × Cn over M. If no confusion is likely to arise, we shall write D instead of D ⊗ In . Now a subspace L of ker D ∂ is Lagrangian if c(d/dx)L = L⊥ ∩ ker D ∂ . In our case, since ∂M bounds M, the existence of such a Lagrangian subspace follows from the cobordism invariance of the index of Dirac operators. Let L2>0 (SM ⊗ Cn |∂M ) be the positive eigenspace of D ∂ , i.e. the L2 -closure of the direct sum of eigenspaces with positive eigenvalues of D ∂ . Then the projection P ∂ := P∂M (L) = P∂M + PL imposes an APS type boundary condition for D, where P∂M , resp. PL , is the orthogonal projection L2 (SM ⊗ Cn |∂M ) → L2>0 (SM ⊗ Cn |∂M ), resp. L2 (SM ⊗ Cn |∂M ) → L. Let us denote the corresponding self-adjoint elliptic operator by DP ∂ . Let L20 (SM ⊗ Cn ; P ∂ ) be the nonnegative eigenspace of DP ∂ and PP ∂ the orthogonal projection PP ∂ : L2 SM ⊗ Cn → L20 SM ⊗ C n ; P ∂ . More generally, for each unitary U ∈ Un (C ∞ (M)) over M, the projection U P ∂ U −1 imposes an APS type boundary condition for D and we shall denote the corresponding elliptic self-adjoint operator by DU P ∂ U −1 . Similarly, let PU P ∂ U −1 be the orthogonal projection PU P ∂ U −1 : L2 SM ⊗ Cn → L20 SM ⊗ Cn ; U P ∂ U −1 where L20 (SM ⊗ Cn ; U P ∂ U −1 ) is the nonnegative eigenspace of DU P ∂ U −1 . With the above notation, we define the Toeplitz operator on M with respect to U as follows, cf. [9, Definition 2.1].
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2075
Definition 5.1. TU := PU P ∂ U −1 ◦ U ◦ PP ∂ . Dai and Zhang’s index theorem for Toeplitz operators on odd dimensional manifolds with boundary [9, Theorem 2.3] states that Ind(TU ) = − A(M) (5.1) ∧ Ch• (U ) − ξ(∂M, U ) + τμ U P ∂ U −1 , P ∂ , PM M
where PM is the Calderón projection associated to the Dirac operator D on M (cf. [5]) and τμ (U P ∂ U −1 , P ∂ , PM ) is the Maslov triple index [11, Definition 6.8]. The reduced η-invariant ξ(∂M, U ) will be defined after the remarks. Remark 5.2. Notice that the integral in (5.1) differs from Dai and Zhang’s by a constant coefficient (2πi)−(dim M+1)/2 . This is due to the fact that our definition of characteristic classes follows 1 k/2 ) are already included. topologists’ convention, i.e. factors such as ( 2πi Remark 5.3. The Maslov triple index τμ (U P ∂ U −1 , P ∂ , PM ) is an integer. For unitaries U, V ∈ Un (C ∞ (M)), if there is a path of unitaries us ∈ Un (C ∞ (∂M)) with s ∈ [0, 1] such that u0 = U |∂M and u1 = V |∂M , one has τμ U P ∂ U −1 , P ∂ , PM = τμ V P ∂ V −1 , P ∂ , PM , cf. [11, Lemma 6.10]. To define ξ(∂M, U ), let us first consider D[0,1] the Dirac operator over [0, 1] × ∂M. If no confusion is likely to arise, we shall write U for both U |∂M and the trivial lift of U |∂M from ∂M to [0, 1] × ∂M. Let D[0,1] := D[0,1] + (1 − ψ)U −1 [D[0,1] , U ] ψ,U
(5.2)
over [0, 1] × ∂M, where ψ is a cut-off function on [0, 1] with ψ ≡ 1 near {0} and ψ ≡ 0 near {1}. With APS type boundary conditions determined by P ∂ on {0} × ∂M and Id −U −1 P ∂ U on {1} × ψ,U ψ,U ∂M, D[0,1] becomes a self-adjoint elliptic operator, denoted (D[0,1] ; P0U ). See Proposition 5.6 for an explanation of the choice of notation. Similarly, D[0,1] (t) := D[0,1] + (1 − tψ)U −1 [D[0,1] , U ]. ψ,U
ψ,U
ψ,U
(5.3)
Denote by (D[0,1] (t); P0U ) the elliptic operator D[0,1] (t) with boundary condition P0U . Note that ψ,U
ψ,U
D[0,1] (1) = D[0,1] . Definition 5.4. (See [9, Definition 2.2].) ψ,U ψ,U η(∂M, U ) := ξ D[0,1] ; P0U − SF D[0,1] (t); P0U 0t1
2076
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
where ψ,U
ψ,U
ψ,U dim ker(D[0,1] ; P0U ) + η(D[0,1] ; P0U ) . ξ D[0,1] = 2 Remark 5.5. η(∂M, U ) is independent of the cut-off function ψ [9, Proposition 5.1]. In order to show the equality ξ(∂M, U ) = ξ(eU DS1 ×∂M eU ) mod Z, we need to relate the ψ,U d operator eU DS1 ×∂M eU to D[0,1] , where DS1 ×∂M = c(d/dθ)( dθ + D ∂ ) is the Dirac operator over S1 × ∂M and eU is the cup product of U with e2πiθ ∈ K 1 (S1 ). Recall that
g + hU f DS1 ×∂M 0 hU ∗ + g 1 − f hU ∗ + g 0 DS1 ×∂M 1 0 1 0 0 ∗ DS1 ×∂M U U∗ =U U 0 0 0 0 0 DS1 ×∂M
eU DS1 ×∂M eU =
f
g + hU 1−f
where U=
1/2
f1
1/2
+ f2 U
(1 − f )1/2 1/2
(1 − f )1/2
−f1
− f2 U ∗ 1/2
with f1 = χ[0,1/2] f and f2 = χ[1/2,1] f . Then viewed as an operator over [0, 1] × ∂M, U ∗ (eU DS1 ×∂M eU )U = D[0,1] + f2 U −1 [D[0,1] , U ] with the boundary condition β(0, x) = Uβ(1, x),
for ∀x ∈ ∂M
and β ∈ Γ [0, 1] × ∂M; S ⊗ Cn .
Let H ∂ := L2 ({0} × ∂M; S ⊗ Cn ) ⊕ L2 ({1} × ∂M; S ⊗ Cn ), then the above boundary condition can be written as 1 1 −U β = 0, for ∀β ∈ H ∂ . 1 2 −U −1 From now on, let us assume ψ = 1 − f2 . In particular, one has U ∗ (eU DS1 ×∂M eU )U = D[0,1] . ψ,U
Now consider PtU =
cos2 tP ∂ + sin2 t (I − P ∂ ) − cos t sin tU −1
− cos t sin tU cos2 t (Id −U −1 P ∂ U ) + sin2 tU −1 P ∂ U
(5.4)
for 0 t π/4 (cf. [11, Equation 5.13], [6, Section 3]). This is a path of projections in B(H ∂ ) such that
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
P0U =
P∂ 0
2077
0
Id −U −1 P ∂ U
and U Pπ/4
1 = 2
1 −U −1
−U 1
.
ψ,U
For each t ∈ [0, π/4], the Dirac operator D[0,1] , with the boundary condition PtU , is a self-adjoint ψ,U
elliptic operator, denoted by (D[0,1] ; PtU ). With the above notation, we have the following slight generalization of a theorem by Brüning and Lesch [6, Theorem 3.9]. Proposition 5.6. d ψ,U U η D[0,1] ; Pt = 0. dt Proof. Following [6, Section 3], we define
0 U 0 U = , U −1 0 U∗ 0 c(d/dθ ) 0 γ˜ := , 0 − c(d/dθ ) ∂ 0
:= D A 0 −U −1 D ∂ U
τ :=
is determined by D ψ,U near the boundary, by noticing that where A [0,1] ψ,U D[0,1]
d ∂ +D = c(d/dθ) dθ
near {0} × ∂M and ψ,U D[0,1]
d −1 ∂ +U D U = c(d/dθ) dθ
near {1} × ∂M. Since c(d/dθ )U = U c(d/dθ ) ∈ End(S ⊗ Cn ), it follows that
+ Aτ
= 0 = τ γ˜ + γ˜ τ, τA
τ 2 = 1, τ = τ ∗ .
Moreover, one verifies by calculation (cf. [6, Eqs. (3.11) to (3.13)]) γ˜ PtU = I − PtU γ˜ ; U 2
= 0; Pt , A
tU .
tU = cos(2t)|A|P PtU AP
2078
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
Then by [6, Theorem 3.9], it suffices to find a unitary μ : H ∂ → H ∂ such that μ2 = −I,
+ Aμ
= 0. μτ + τ μ = μγ˜ + γ˜ μ = μA
Let μ := This finishes the proof.
0 −U −1
U 0
.
2
Now the equality ξ(∂M, U ) = ξ(eU DS1 ×∂M eU ) mod Z follows as a corollary. To be slightly more precise, we have the following result. Theorem 5.7. ψ,U ψ,U ξ(∂M, U ) = ξ(eU DS1 ×∂M eU ) − SF D[0,1] ; PtU − SF D[0,1] (t); P0U 0t1 . In particular, ξ(∂M, U ) = ξ(eU DS1 ×∂M eU )
mod Z.
Proof. By [11, Lemma 3.4], ψ,U ψ,U ξ(eU DS1 ×∂M eU ) − ξ D[0,1] ; P0U = SF D[0,1] ; PtU 0tπ/4 +
π/4
d 1 ψ,U U η D[0,1] ; Pt dt. dt 2
0
The formula now follows from the definition of η(∂M, U ) and the proposition above.
2
6. Relative index pairing for odd dimensional manifolds with boundary In this section, we shall use the Toeplitz index theorem for odd dimensional manifolds with boundary by Dai and Zhang to prove our analogue of the index pairing formula by Lesch, Moscovici and Pflaum [12, Theorem 7.6]. First let us recall the even case. Let X be an even dimensional spin manifold with boundary ∂X. We assume its Riemannian metric has product structure near the boundary. The associated Dirac operator takes of the following form DX =
D+
D−
=
d dx
+ D∂X
d + D∂X − dx
near the boundary, where D∂X is the Dirac operator over ∂X, cf. Appendix A. Definition 6.1. Let P0 = χ[0,∞) (D∂X ) and DP+0 be the elliptic operator D + with the APS boundary condition P0 , cf. [2]. Then IndAPS (D + ) := Ind(DP+0 ).
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2079
Recall that a relative K-cycle in K 0 (X, ∂X) is a triple [p, q, hs ] such that p, q ∈ Mn (C ∞ (X)) are two projections over X and hs ∈ Mn (C ∞ (∂X)), s ∈ [0, 1], is a path of projections over ∂X such that h0 = p|∂X and h1 = q|∂X . If p and q are constant along the normal direction near the boundary, then the relative index pairing by Lesch, Moscovici and Pflaum [12, Theorem 7.6] states that Ind[DX ] [p, q, hs ] = IndAPS qD + q − IndAPS pD + p + SF(hs D∂X hs )0s1 . Now let M be an odd dimensional spin manifold with boundary ∂M. We assume its Riemannian metric has product structure near the boundary. The Dirac operator D over M naturally induces an element in KK(C0 (M \ ∂M), c1 ) ∼ = K1 (M, ∂M), cf. [4, Section 2], from which one has the relative index pairing map Ind[D] : K 1 (M, ∂M) → Z.
(6.1)
As an intermediate step, let us first show a pairing formula by using the lifted data on S1 × M. The method of proof is similar to the one used in proving Theorem 4.1. Denote the Dirac operator and its restriction to the half-spinor bundles by D + . We shall explain in detail over S1 × M by D the structure of D near the boundary in Appendix A. Lemma 6.2. For a relative K-cycle [U, V , us ] ∈ K 1 (M, ∂M), that is, U, V ∈ Un (C ∞ (M)) are two unitaries over M with us ∈ Un (C ∞ (∂M)), s ∈ [0, 1], a smooth path of unitaries over ∂M such that u0 = U |∂M and u1 = V |∂M . If U and V are constant along the normal direction near the boundary, then + eV − IndAPS eU D + eU + SF(eus DS1 ×∂M eus )0s1 . Ind[D] [U, V , us ] = IndAPS eV D Proof. A relative K-cycle [U, V , us ] ∈ K 1 (M, ∂M) naturally induces a relative K-cycle [eU , eV , eus ] ∈ K 0 (M, ∂M). By [12, Theorem 7.6], [U, V , us ] (6.2) + eV ) − IndAPS (eU D + eU ) + SF(eus DS1 ×∂M eus )0s1 IndAPS (eV D is a well-defined map from K 1 (M, ∂M) to Z. We need to show that it does agree with the relative index pairing induced by that of K 1 (M \ ∂M). As before (cf. Section 1 above), we can assume U |[0,)×∂M = V |[0,)×∂M and us = U |∂M = V |∂M , for all s ∈ [0, 1]. It suffices to prove the lemma for representatives of relative K-cycles of this special type. Notice that such a representative also defines an element in K 1 (M \ ∂M) by its restriction to M \ ∂M and recall from Section 1 that the index map (6.1) has the following explicit formula: ∧ Ch• (V ) − Ch• (U ) . Ind[D] [V , U, us ] = − A(M) M
Now by the APS index theorem for manifolds with boundary,
2080
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
+ eU = IndAPS eU D
S1 × M ∧ Ch• (eU ) − ξ(eU DS1 ×∂M eU ) A
(6.3)
A(M) ∧ Ch• (U ) − ξ(eU DS1 ×∂M eU )
(6.4)
S1 ×M
=− M
where the second equality follows from Proposition 3.3. There is a similar equation where we replace U by V . It follows that the image of a representative of the special type as above, under the map (6.2), is equal to
A(M) ∧ Ch• (V ) − Ch• (U ) .
− M
This agrees with the relative index map (6.1).
2
Using this lemma and another two lemmas below, we shall now prove our main result in this section. Theorem 6.3. For a relative K-cycle [U, V , us ] ∈ K 1 (M, ∂M), that is, U, V ∈ Un (C ∞ (M)) are two unitaries over M with us ∈ Un (C ∞ (∂M)), s ∈ [0, 1], a smooth path of unitaries over ∂M such that u0 = U |∂M and u1 = V |∂M . If U and V are constant along the normal direction near the boundary, then us Ind[D] [U, V , us ] = Ind(TV ) − Ind(TU ) + SF u−1 s D[0,1] us ; P0 us −1 where SF(u−1 s D[0,1] us ; P0 ) is the spectral flow of the path of elliptic operators (us D[0,1] us ; us us P0 ), s ∈ [0, 1], with APS type boundary conditions P0 as in (5.4).
Proof. By formula (5.1), we have Ind(TV ) − Ind(TU ) = −
A(M) ∧ Ch• (V ) − ξ(∂M, V ) + τμ V P ∂ V −1 , P ∂ , PM
M
+
A(M) ∧ Ch• (U ) + ξ(∂M, U ) − τμ U P ∂ U −1 , P ∂ , PM
M
=−
A(M) ∧ Ch• (V ) − Ch• (U ) + ξ(∂M, U ) − ξ(∂M, V )
M
since τμ (U P ∂ U −1 , P ∂ , PM ) = τμ (V P ∂ V −1 , P ∂ , PM ) by [11, Lemma 6.10]. Notice that us ξ(∂M, U ) − ξ(∂M, V ) + SF u−1 s D[0,1] us ; P0 0s1 ψ,U ψ,U = ξ(eU DS1 ×∂M eU ) − SF D[0,1] ; PtU − SF D[0,1] (t); P0U − ξ(eV DS1 ×∂M eV ) ψ,V ψ,V us + SF D[0,1] ; PtV + SF D[0,1] (t); P0V + SF u−1 s D[0,1] us ; P0 0s1
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2081
which is equal to ξ(eU DS1 ×∂M eU ) − ξ(eV DS1 ×∂M eV ) + SF(eus DS1 ×∂M eus )0s1 by the lemmas below. Hence us Ind(TV ) − Ind(TU ) + SF u−1 s D[0,1] us ; P0 0s1 = − A(M) ∧ Ch• (V ) − Ch• (U ) M
− ξ(eV DS1 ×∂M eV ) + ξ(eU DS1 ×∂M eU ) + SF(eus DS1 ×∂M eus )0s1 + eV − IndAPS eU D + eU + SF(eus DS1 ×∂M eus )0s1 = IndAPS eV D which is equal to Ind[D] ([U, V , us ]) by Lemma 6.2.
2
Lemma 6.4. ψ,u ψ,V ψ,U SF D[0,1]s ; P0us 0s1 = SF D[0,1] ; PtU − SF D[0,1] ; PtV + SF(eus DS1 ×∂M eus )0s1 . Proof. Consider the (t, s)-parametrized family of operators ψ,us us D[0,1] ; Pt (0tπ/4; 0s1) where Ptus is defined as in Eq. (5.4). Note that P0us =
P∂ 0
0
∂ Id −u−1 s P us
us and Pπ/4 =
1 2
1 −u−1 s
−us 1
.
Hence ψ,u us eus DS1 ×∂M eus = D[0,1]s ; Pπ/4 . Consider the following diagram ψ,V
ψ,V
(D[0,1] ; P0V )
(D[0,1] ;PtV )
ψ,V
V ) (D[0,1] ; Pπ/4
ψ,u
ψ,u
us (D[0,1]s ;Pπ/4 )
(D[0,1]s ;P0us )
ψ,U
ψ,U
(D[0,1] ; P0U )
ψ,U
(D[0,1] ;PtU )
U ) (D[0,1] ; Pπ/4
where the arrows stand for smooth paths connecting the corresponding vertices. Now the lemma follows from the homotopy invariance of the spectral flow. 2
2082
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
Now let D[0,1]s (t) := D[0,1] + (1 − tψ)u−1 s [D[0,1] , us ], ψ,u
then the same argument above proves the following lemma. Lemma 6.5. us SF u−1 s D[0,1] us ; P0 0s1 ψ,V ψ,u ψ,U = SF D[0,1] (t); P0U − SF D[0,1] (t); P0V + SF D[0,1]s ; P0us 0s1 . Proof. Consider the (s, t)-parametrized family of operators ψ,us D[0,1] (t), P0us 0t,s1 , cf. the following diagram ψ,V
(D[0,1] (t);P0V )
ψ,V
(D[0,1] (0); P0V )
ψ,V
(D[0,1] (1); P0V )
ψ,u
ψ,u
(D[0,1]s ,P0us )
(D[0,1]s ;P0us )
ψ,U
ψ,U
(D[0,1] (0); P0U )
ψ,V
(D[0,1] (t);P0U )
(D[0,1] (1); P0U )
Notice that D[0,1]s (1) = D[0,1]s and D[0,1]s (0) = u−1 s D[0,1] us . The lemma follows by the homotopy invariance of the spectral flow. 2 ψ,u
ψ,u
ψ,u
Acknowledgments I am greatly indebted to Henri Moscovici for his continuous support and advice. This paper grew out of numerous conversations with him. I want to thank Nigel Higson for helpful suggestions. I am grateful to Alexander Gorokhovsky for a careful reading of the first version of this paper as well as for many helpful comments. I started working on this problem during my visit at the Hausdorff Center for Mathematics in Bonn, Germany. I want to express my thanks to the center for its hospitality and to Matthias Lesch for the invitation, as well as for generously sharing with me his insights into the subject. Appendix A. Spinor bundles and Dirac on manifolds with boundary The material in this appendix is well known. The purpose is to clarify the relations among various Dirac operators arising in this article for the convenience of the reader. Suppose M is an odd dimensional spin manifold with boundary. Its Riemannian metric assumes a product structure near the boundary. Let S (resp. SM ) be the spinor bundle over S1 × ∂M ( resp. M). Then
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2083
Cl(T∂M ) the Clifford algebra over ∂M is identified with the even part of Cl(TS1 ×∂M ) the Clifford algebra over S1 × ∂M by c∂ (ei ) → c(ei ) · c(d/dθ ) where c∂ (·), resp. c(·), is the Clifford multiplication on S ∂ , resp. S. This way S|∂M , the restriction of S to {0} × ∂M, is identified with S ∂ = S ∂,+ ⊕ S ∂,− the spinor bundle over ∂M. the spinor bundle over [0, 1) × S1 × ∂M, is naturally isomorphic to C2 ⊗ S∂ . Notice that S, 2 + − stands for graded tensor product. Denote the Dirac operator over Here C = C ⊕ C and ⊗ Then [0, 1) × S1 × ∂M by D. = D
d d + i dθ − dx
0 d + i dθ
d dx
0
D∂ . IS ∂ + IC2 ⊗ ⊗
We identify Cl(TS1 ×∂M ) the Clifford algebra over S1 × ∂M with the even part of Cl(TS1 ×M ) the Clifford algebra over S1 × M by c(ei ) → cˆ (ei ) · cˆ (d/dx) From this, one has for ei ∈ TS1 ×∂M , where cˆ (·) is Clifford multiplication on S. S+ = C+ ⊗ S ∂,+ ⊕ C− ⊗ S ∂,− ∼ = S ∂,+ ⊕ S ∂,− ≡ S, S− = C− ⊗ S ∂,+ ⊕ C+ ⊗ S ∂,− ∼ = c(d/dx)S+ . Lemma A.1. With the idenfications of spinor bundles as above, = D
⎛
⎜ ⎜ =⎜ ⎝
d − dx + DS1 ×∂M d dx
+ DS1 ×∂M d d − dx + i dθ
−iD ∂ |S ∂,+ d dx
d + i dθ
iD ∂ |S ∂,+
−iD ∂ |S ∂,+
d dx
iD ∂ |S ∂,−
⎞
d d ⎟ − dx − i dθ ⎟ ⎟ ⎠
d − i dθ
where DS1 ×∂M (resp. D ∂ ) is the Dirac operator over S1 × ∂M (resp. ∂M). In particular, d DS1 ×∂M = c(d/dθ) + D∂ dθ with c(d/dθ ) =
i −i
and D = ∂
D ∂ |S ∂,+
D ∂ |S ∂,−
.
2084
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
Proof. With the identification S− = cˆ (d/dx)S+ , one has
d d −ˆc(d/dx)D|S + = −ˆc(d/dx) cˆ (d/dx) + cˆ (d/dθ ) + cˆ (ei )∇ei dx dθ i
d d − cˆ (d/dx) · cˆ (d/dθ ) − = cˆ (d/dx) · cˆ (ei )∇ei dx dθ i
d d + c(d/dθ ) + c(ei )∇ei dx dθ i
d d ∂ = c (ei )∇ei . + c(d/dθ ) + dx dθ =
i
Similarly,
S − cˆ (d/dx) = cˆ (d/dx) d + cˆ (d/dθ ) d + cˆ (ei )∇ei cˆ (d/dx) D| dx dθ i
d d ∂ =− c (ei )∇ei . + c(d/dθ ) + dx dθ i
d Notice that c(d/dθ)( dθ + D ∂ ) is the Dirac operator over S1 × ∂M, hence
= D
d dx
d − dx + DS1 ×∂M
+ DS1 ×∂M
.
To finish the proof, one notices that c(d/dθ ) = cˆ (d/dθ ) · cˆ (d/dx) = =
0 i i 0
i 0 0 −i
IS ∂ · ⊗
IS ∂ . ⊗
0 −1 1 0
IS ∂ ⊗
2
References [1] M.F. Atiyah, K-Theory, Lecture Notes by D.W. Anderson, W.A. Benjamin, Inc., New York, Amsterdam, 1967. [2] M.F. Atiyah, V.K. Patodi, I.M. Singer, Spectral asymmetry and Riemannian geometry. I, Math. Proc. Cambridge Philos. Soc. 77 (1975) 43–69. [3] M.F. Atiyah, V.K. Patodi, I.M. Singer, Spectral asymmetry and Riemannian geometry. III, Math. Proc. Cambridge Philos. Soc. 79 (1976) 71–99. [4] P. Baum, R.G. Douglas, M.E. Taylor, Cycles and relative cycles in analytic K-homology, J. Differential Geom. 30 (1989) 761–804. [5] B. Booß-Bavnbek, K.P. Wojciechowski, Elliptic Boundary Problems for Dirac Operators, Math. Theory Appl., Birkhäuser Boston Inc., Boston, MA, 1993. [6] J. Brüning, M. Lesch, On the η-invariant of certain nonlocal boundary value problems, Duke Math. J. 96 (1999) 425–468. [7] A. Connes, Noncommutative differential geometry, Publ. Math. Inst. Hautes Études Sci. (1985) 257–360. [8] A. Connes, Noncommutative Geometry, Academic Press Inc., San Diego, CA, 1994.
Z. Xie / Journal of Functional Analysis 260 (2011) 2064–2085
2085
[9] X. Dai, W. Zhang, An index theorem for Toeplitz operators on odd-dimensional manifolds with boundary, J. Funct. Anal. 238 (2006) 1–26. [10] N. Higson, J. Roe, Analytic K-Homology, Oxford Math. Monogr., Oxford University Press, Oxford, 2000, Oxford Sci. Publ. [11] P. Kirk, M. Lesch, The η-invariant, Maslov index, and spectral flow for Dirac-type operators on manifolds with boundary, Forum Math. 16 (2004) 553–629. [12] M. Lesch, H. Moscovici, M.J. Pflaum, Connes–Chern character for manifolds with boundary and eta cochains, http://arxiv.org/abs/0912.0194. [13] J.-L. Loday, Cyclic Homology, Grundlehren Math. Wiss. (Fundamental Principles of Mathematical Sciences), vol. 301, Springer-Verlag, Berlin, 1992, Appendix E by María O. Ronco. [14] T.A. Loring, K-theory and asymptotically commuting matrices, Canad. J. Math. 40 (1988) 197–216. [15] M.A. Rieffel, C ∗ -algebras associated with irrational rotations, Pacific J. Math. 93 (1981) 415–429. [16] N.E. Wegge-Olsen, K-Theory and C ∗ -Algebras, Oxford Sci. Publ., The Clarendon Press/Oxford University Press, New York, 1993, a friendly approach.
Journal of Functional Analysis 260 (2011) 2086–2147 www.elsevier.com/locate/jfa
Factorization of Blaschke products and ideal theory in H ∞ Kei Ji Izuchi a,∗,1 , Yuko Izuchi b a Department of Mathematics, Niigata University, Niigata 950-2181, Japan b Aoyama-shinmachi 18-6-301, Nishi-ku, Niigata 950-2006, Japan
Received 28 July 2010; accepted 19 August 2010 Available online 17 September 2010 Communicated by J. Bourgain
Abstract Let H ∞ be the Banach algebra of bounded analytic functions on the open unit disk D. Let G be the union set of all nontrivial Gleason parts in the maximal ideal space of H ∞ . Let E be a nonvoid compact and totally disconnected subset of G and nE be a bounded numbering function on E. We characterize nE for which there is a closed ideal I in H ∞ such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Let I1 , I2 , . . . , Ik be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for 1 i k. We prove that ki=1 Ii = { ki=1 fi : fi ∈ Ii , 1 i k} is a closed ideal. A local ideal theory in H ∞ plays an important role to prove our results. © 2010 Elsevier Inc. All rights reserved. Keywords: Interpolating Blaschke product; Carleson–Newman Blaschke product; Algebra of bounded analytic functions; Gleason part; Ideal theory; Big disk algebra
1. Introduction Let H ∞ be the Banach algebra of bounded analytic functions on the open unit disk D with the supremum norm · ∞ . We denote by M(H ∞ ) the maximal ideal space of H ∞ , i.e., M(H ∞ ) is the family of nonzero multiplicative linear functionals on H ∞ with the weak∗ -topology. We * Corresponding author.
E-mail addresses: [email protected] (K.J. Izuchi), [email protected] (Y. Izuchi). 1 Partially supported by Grant-in-Aid for Scientific Research (No. 21540166), Japan Society for the Promotion of
Science. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.08.012
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2087
identify a function f in H ∞ with its Gelfand transform f(m) = m(f ), m ∈ M(H ∞ ), so we think of f a continuous function on M(H ∞ ). By the Carleson corona theorem [3], D is dense in M(H ∞ ). For 0 < r < 1, we write Dr = {|z| < r}. Let {an }n be a sequence in D satisfying ∞ n=1 (1 − |an |) < ∞. Associated with it, we have a Blaschke product b(z) =
∞ −a n z − an , |an | 1 − a n z
z ∈ D,
n=1
where if an = 0, we consider that −a n /|an | = 1. We call {an }n and b(z) interpolating if for every bounded sequence {cn }n , there exists f in H ∞ such that f (an ) = cn for every n 1. In [2], Carleson also proved that {an }n is an interpolating sequence in D if and only if ak − an inf 1 − a a k n;n=k
n k
> 0.
We write Z(b) = {x ∈ M(H ∞ ): b(x) = 0} and
|b| < r = x ∈ M H ∞ : b(x) < r ,
0 < r < 1.
A Blaschke product B is called Carleson–Newman if B = ki=1 bi for finitely many interpolating Blaschke products b1 , b2 , . . . , bk . In this case, there are many ways to give such factorization. If k is the smallest number of interpolating Blaschke products, B is called a Carleson–Newman Blaschke product of order k. In this paper, we write a CN Blaschke product instead of a Carleson– Newman Blaschke product. For Blaschke products B1 and B2 , if B1 is a subproduct of B2 , we write B1 ≺ B2 . For x, y ∈ M(H ∞ ), the pseudo-hyperbolic distance is defined by ρ(x, y) = f (x): f (y) = 0, f ∈ H ∞ , f ∞ 1 . The set
P (x) = y ∈ M H ∞ : ρ(x, y) < 1 is called the Gleason part containing x ∈ M(H ∞ ). If P (x) = {x}, P (x) is called nontrivial. We denote by G the union set of all nontrivial Gleason parts in M(H ∞ ). In [14], Hoffman studied the structure of Gleason parts extensively. He proved the following facts (see also [7]). (a) Let x ∈ M(H ∞ ). Then x ∈ G if and only if there is an interpolating Blaschke product b satisfying b(x) = 0, and G is an open subset of M(H ∞ ). (b) For a nontrivial Gleason part P (x), there exists a pseudo-hyperbolic distance preserving continuous, one-to-one and onto map Lx : D → P (x) such that Lx (0) = x and (f ◦ Lx )(z) ∈ H ∞ for every f ∈ H ∞ . The map Lx : D → P (x) is called the Hoffman map at x ∈ G. (c) Let b be an interpolating Blaschke product. For small positive numbers η and ε satisfying some additional conditions, we may define the map γ : Z(b) × D (ξ, z) → γ (ξ, z) ∈ |b| < ε
2088
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
by γ (ξ, z) ∈ Lξ (Dη ) satisfying (b/ε)(γ (ξ, z)) = z. Then γ is a biholomorphically homeomorphic and onto map, and γ can be extended γ : Z(b) × D (ξ, z) → γ (ξ, z) ∈ |b| ε homeomorphically. After Hoffman’s work, interpolating Blaschke products have played an important role in the study of the structure of H ∞ (see [4,7,15,18,22,23]), especially in the study of ideal theory in H ∞ (see [9–11,17,19,21]). It is known that for a Blaschke product B, B is a CN Blaschke product if and only if Z(B) ⊂ G (see [8,12,24]). Our aim is to study closed ideals I in H ∞ satisfying Z(I ) ⊂ G, where Z(I ) =
Z(f ).
f ∈I
It is extremely difficult to make clear the structure of closed ideals I in H ∞ satisfying Z(I ) ⊂ G (see [1]). For x ∈ G and f ∈ H ∞ , by (b) we may define zero’s order of f at x, we write ord(f, x), by zero’s order of the analytic function f ◦ Lx at 0 ∈ D. For x ∈ M(H ∞ ) \ G and f ∈ H ∞ with f (x) = 0, we define ord(f, x) = ∞. We put ord(I, x) = min ord(f, x): f ∈ I ,
x ∈ M H∞ .
For a compact subset E of G, let I (E) = f ∈ H ∞ : f (x) = 0, x ∈ E , which is called the associated primary ideal of E. Generally we have E ⊂ Z(I (E)). In [11], Gorkin, Mortini, and the first author proved the following two theorems for closed ideals I satisfying Z(I ) ⊂ G. In this case, we note that mI := maxx∈Z(I ) ord(I, x) < ∞. The following is given in Theorem 2.2 in [11]. Theorem A. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ G. Then I coincides with the set of f in H ∞ satisfying ord(f, x) ord(I, x) for every x ∈ Z(I ). This is a fairly crucial theorem in ideal theory of H ∞ . By this theorem, for closed ideals I1 , I2 satisfying Z(I1 ) = Z(I2 ) ⊂ G, we have that I1 = I2 if and only if ord(I1 , x) = ord(I2 , x) for every x ∈ Z(I1 ). The following is essentially given in Theorem 3.4 in [11]. Theorem B. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ G and x ∈ Z(I ). Then there is a CN Blaschke product B of order mI in I satisfying ord(B, x) = ord(I, x). In ideal theory of H ∞ , one of the main problems is what is the function ord(I, x) in x ∈ Z(I ). We have also several questions about a closed ideal I in H ∞ satisfying Z(I ) ⊂ G (see [11]). Question 1. Characterize nonvoid compact and totally disconnected subsets E of G satisfying Z(I (E)) = E to use geometrical words in E.
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2089
Question 2. Let E be a nonvoid compact and totally disconnected subset of G. For which bounded numbering function nE : E → {1, 2, . . .}, does there exist a closed ideal I in H ∞ satisfying Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E? Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2, and I1 ⊗ I2 be the tensor product of I1 and I2 . Question 3. Is I1 ⊗ I2 a closed ideal in H ∞ ? In [19], the authors studied these questions for I (E) the associated primary ideal of E. We have another question. Question 4. Is I1 I2 = {f1 f2 : f1 ∈ I1 , f2 ∈ I2 } a closed ideal in H ∞ ? The purpose of this paper is to answer these questions. To study these questions generally, we need to see local versions of these questions. Hoffman’s results (a)–(c) give us many informations about local properties of functions in H ∞ on G. Let x ∈ G. By (a), there is an interpolating Blaschke product b satisfying b(x) = 0. Then the set {|b| < ε} is an open neighborhood of x in G for small ε > 0. And by (c), we may identify {|b| < ε} with the more simpler space Z(b) × D. It ˇ is known that Z(b) is homeomorphic to the Stone–Cech compactification βN of the set of natural numbers N (see [13]). So using the same notation γ in (c), we have a homeomorphic map γ : βN × D → |b| ε which satisfies some additional conditions. Let C(βN × D) be the space of continuous functions on βN × D. For f ∈ C(βN × D) and ξ ∈ βN, we put fξ (z) = f (ξ, z) for z ∈ D. Let A = f ∈ C(βN × D): fξ (z) ∈ A(D), ξ ∈ βN , where A(D) is the disk algebra on D, i.e., A(D) is the space of continuous functions on D which are analytic in D. We call A the big disk algebra. For a closed ideal J in A, let Z(J ) = x ∈ βN × D: f (x) = 0, f ∈ J . For f ∈ A and x = (ξ, z) ∈ βN × D, we may define zero’s order at x, which we write ord(f, x). We put ord(J, x) = min ord(f, x): f ∈ J ,
x ∈ βN × D.
By condition (c), for each ξ ∈ βN, γ maps {ξ } × D biholomorphically onto an open subset γ ({ξ } × D) in P (λ) for some λ ∈ Z(b). Hence we have H ∞ ◦ γ ⊂ A, and for f ∈ H ∞ we have ord(f, x) = ord(f ◦ γ , γ −1 x) for every x ∈ {|b| < ε}.
2090
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Our strategy of the study is the following. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ G. It is known that Z(I ) is a totally disconnected set (see [11]). Let x ∈ Z(I ). Then there is an interpolating Blaschke product b satisfying b(x) = 0. Let ε > 0 be sufficiently small. There is an open and closed subset E of Z(I ) such that x ∈ E ⊂ {|b| < ε}. Then there is a closed ideal I1 in H ∞ such that Z(I1 ) = E and ord(I1 , x) = ord(I, x) for every x ∈ E. We have I1 ◦ γ ⊂ A. Here I1 ◦ γ may not be a closed ideal in A. Let J1 be a closed ideal in A generated by I1 ◦ γ . Then we have Z(J1 ) = γ −1 (E) ⊂ βN × D and ord(J1 , γ −1 (x)) = ord(I1 , x) for every x ∈ E. So in Sections 2–7, we study a closed ideal J in A satisfying Z(J ) ⊂ βN × D. And we shall answer the A-versions of Questions 1–3. In Section 8, applying the results in A we get some local ideal theory in H ∞ . In Section 9, we shall answer Questions 1–4 completely. Without using A we can prove Questions 1–4. But their proofs will be heavily complicated. It is more understandable via the space A. In Section 2, we study basic properties of A. In Section 3, we deal with closed ideals I in A satisfying Z(I ) ⊂ βN × D. In Section 4, for a nonvoid compact and totally disconnected subset E of βN × D we define a tilde function nE of a numbering function nE : E → {1, 2, . . .}. Also we define the associated numbering function NE,∞ which represents a geometrical property of E. We put I (E) = {f ∈ A: f (x) = 0, x ∈ E}. In Section 5, we prove that Z(I (E)) ⊂ βN × D if and only if supx∈E NE,∞ (x) < ∞, which answers the A-version of Question 1. In Section 6, we nE = nE on E if and only if there is a prove that nE is a bounded numbering function satisfying closed ideal I in A satisfying Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E, which answers the A-version of Question 2. In Section 7, we prove that I1 ⊗ I2 is a closed ideal in A, which answers the A-version of Question 3. For topological properties of βN, see [5,25]. 2. The big disk algebra Let X = βN × D. Then X = βN × D and ∂X = βN × ∂D. Let π : X → βN be the projection defined by π(ξ, z) = ξ for (ξ, z) ∈ X. For z1 ∈ D and 0 < r < 1 − |z1 |, let Dr (z1 ) = {|z − z1 | < r} and D r (z1 ) = {|z − z1 | r}. If z1 = 0, we write Dr = Dr (0). Let C(X) be the space of continuous functions on X with the supremum norm f X = maxx∈X |f (x)|. For f ∈ C(X) and ξ ∈ βN, we put fξ (z) = f (ξ, z) for z ∈ D, which we call the slice function of f at ξ . We put fξ D = maxz∈D |fξ (z)|. The following is an elementary fact. Lemma 2.1. Let f ∈ C(X) and ξα → ξ in βN. Then fξα − fξ D → 0 as α → ∞. Let A = f ∈ C(X): fξ ∈ A(D), ξ ∈ βN , where A(D) is the disk algebra on D. It is easy to see that A is a closed subalgera of C(X), which we call the big disk algebra on X. Let W be an open and closed subset of βN and χπ −1 (W ) be the characteristic function for π −1 (W ). Then χπ −1 (W ) ∈ A. Let f (z) ∈ A(D). Identifying f (z) with f (ξ, z) = f (z) for (ξ, z) ∈ βN × D, we may consider f (z) ∈ A, so χπ −1 (W ) f (z) ∈ A. For each f ∈ A, let Z(f ) = x ∈ X: f (x) = 0 .
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2091
For x = (ξ, z) ∈ X, we define the order of zero of f at x by ⎧ ⎨ ord(fξ , z), ord(f, x) = ∞, ⎩ 0,
x ∈ Z(f ) ∩ X, x ∈ Z(f ) ∩ ∂X, x ∈ X \ Z(f ),
where ord(fξ , z) is the usual order of zero of the analytic function fξ at z ∈ D. The following is known as the Hurwitz theorem. Lemma 2.2. Let f ∈ A(D) satisfy Z(f ) = {z0 } ⊂ D. Let {fα }α∈Λ be a net in A(D) such that fα − f D → 0 as α → ∞. Then there exists α0 ∈ Λ such that ord(f, z0 ) =
ord(fα , z): z ∈ Z(fα )
for every α α0 , and the net of sets {Z(fα )}α converges to the one point set {z0 }. By Lemmas 2.1 and 2.2, we have the following. Lemma 2.3. Let f ∈ A and x1 = (ξ1 , z1 ) ∈ Z(f ) ∩ X satisfy ord(f, x1 ) < ∞. Take 0 < r < 1 such that Dr (z1 ) ⊂ D and |fξ1 | > 0 on ∂Dr (z1 ). Then there exists an open and closed neighborhood Wξ1 of ξ1 in βN such that
ord(f, x): x ∈ Z(f ) ∩ {ξ1 } × Dr (z1 )
= ord(f, y): y ∈ Z(f ) ∩ {λ} × Dr (z1 ) for every λ ∈ Wξ1 . Corollary 2.4. For f ∈ A, ord(f, x) is upper semicontinuous on X. For f ∈ A, we put Ordξ (f ) =
ord(f, x): x ∈ Z(f ) ∩ π −1 (ξ ) ,
ξ ∈ βN.
Then Ordξ (f ) is also upper semicontinuous on βN. Corollary 2.5. If f ∈ A and |f | > 0 on ∂X, then sup Ordξ (f ) = sup Ordn (f ) < ∞.
ξ ∈βN
n∈N
Proof. By the assumption, Ordξ (f ) < ∞ for every ξ ∈ βN. Suppose that Ordξα (f ) → ∞ for some net {ξα }α such that ξα → ξ in βN. Then Ordξ (f ) = ∞. But this is a contradiction. The equality follows from Lemma 2.3. 2 The following corollaries also follow from Lemma 2.3.
2092
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Corollary 2.6. If f ∈ A and |f | > 0 on ∂X, then {ξ ∈ βN: Ordξ (f ) = j } is an open and closed subset of βN for every j 1. Corollary 2.7. If f ∈ A and |f | > 0 on ∂X, then Z(f ) is a totally disconnected set. A function ϕ in A is called inner if |ϕ| = 1 on ∂X. If ϕ is inner and Z(ϕ) = ∅, then ϕξ is a unimodular constant for each ξ ∈ βN. If Z(ϕ) = ∅, then by Corollary 2.6 π(Z(ϕ)) is an open and closed subset of βN and π(Z(ϕ)) ∩ N is dense in π(Z(ϕ)). We shall study the structure of inner functions. An inner function b in A is called an IBP (interpolating Blaschke product) if ord(b, x) = 1 for every x ∈ Z(b). An IBP b is called simple if Ordξ (b) = 1 for every ξ ∈ π(Z(b)). If b1 , b2 are IBPs, then b1 b2 is an IBP if and only if Z(b1 ) ∩ Z(b2 ) = ∅. First, we study a simple IBP in A. Let N be a subset of N and η be a unimodular function on N. Let a(n) be a function on N satisfying sup a(n) < 1.
(2.1)
n∈N
We define the function q(n, z) on N × D by q(n, z) =
η(n)
z−a(n) , 1−a(n)z
η(n),
n ∈ N, n ∈ N \ N.
(2.2)
We put W = N βN , where N βN is the closure of N in βN. Then W is an open and closed suba ∈ C(W ) satisfying set of βN and W ∩ N = N . There are η ∈ C(βN) satisfying η|N = η and η| = 1 on βN and maxξ ∈W | a (ξ )| = supn∈N |a(n)| < 1. We define the func a |N = a. Then | tion b(ξ, z) on βN × D by η(ξ ) z− a (ξ ) , ξ ∈ W, 1− a (ξ )z b(ξ, z) = η(ξ ), ξ ∈ βN \ W. Then b is a simple IBP in A and b|N×D = q. We have also Z(b) =
X n, a(n) : n ∈ N .
Conversely, suppose that b is a simple IBP. Let q = b|N×D . Then q has a form in (2.2) and its zeros satisfy condition (2.1). By the above fact, there is a simple IBP b1 in A such that b1 |N×D = b|N×D . Since N × D is dense in X, we have b1 = b. Since a product of finitely many simple IBPs is an inner function, we have the following by the above observation. Theorem 2.8. (i) Let {qn (z)}n be a sequence of finite Blaschke products on D such that
ord qn (z), ζ : ζ ∈ Z qn (z) < ∞ sup n∈N
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2093
D and ∞ n=1 Z(qn (z)) ⊂ D. Then there exists an inner function ϕ in A such that ϕ(n, z) = qn (z) for every (n, z) ∈ N × D. Moreover X
∞
Z(ϕ) = (n, ζ ): ζ ∈ Z qn (z) . n=1
(ii) Let ϕ be an inner function in A satisfying Z(ϕ) = ∅ and m = max Ordξ (ϕ) < ∞. ξ ∈βN
Then there are simple IBPs b1 , b2 , . . . , bm in A such that ϕ =
m
i=1 bi .
Let ϕ1 and ϕ2 be inner functions in A. If there is another inner function ϕ3 such that ϕ2 = ϕ1 ϕ3 , we write ϕ3 = ϕ2 /ϕ1 and ϕ1 is called a subfactor of ϕ2 , and we write ϕ1 ≺ ϕ2 . Corollary 2.9. Let ϕ1 , ϕ2 be inner functions in A. If ord(ϕ1 , x) ord(ϕ2 , x) for every x ∈ Z(ϕ1 ) ∩ (N × D), then ϕ1 ≺ ϕ2 . Proof. For each n ∈ N, ϕ2 (n, z)/ϕ1 (n, z) is a finite Blaschke product on D. By Theorem 2.8(i), there is an inner function ψ in A such that ψ(n, z) = ϕ2 (n, z)/ϕ1 (n, z) for every (n, z) ∈ N × D. Then (ϕ1 ψ)(n, z) = ϕ2 (n, z), so ϕ1 ψ = ϕ2 . 2 Let ϕ be an inner function in A. By Corollary 2.7, Z(ϕ) is a totally disconnected set. Let U be an open subset of X such that Z(ϕ) ∩ U is an open and closed subset of Z(ϕ). Let N = π(Z(ϕ) ∩ U ) ∩ N. We note that the slice function ϕn is a finite Blaschke product for every n ∈ N . For each n ∈ N , let q(n, z) be the subproduct of ϕn with zeros {z ∈ D: (n, z) ∈ Z(ϕ) ∩ U } counting multiplicities. We define the function ψ(n, z) on N × D by ψ(n, z) =
q(n, z), 1,
n ∈ N, n ∈ N \ N.
By Theorem 2.8(i), there is an inner function ϕU in A such that ϕU |N×D = ψ . By Corollary 2.9, we have ϕU ≺ ϕ, Z(ϕU ) = Z(ϕ) ∩ U , ϕU = 1 on X \ π −1 (π(Z(ϕ) ∩ U )) and |ϕ/ϕU | > 0 on U . We call ϕU the subfactor of ϕ with zeros Z(ϕ) ∩ U . If Z(ϕ) ∩ U = ∅, we put ϕU = 1. For f ∈ A and an inner function ψ in A, we write also ψ ≺ f if there is h ∈ A such that f = ψh. In this case, we write h = f/ψ , too. Similarly we have the following. Lemma 2.10. Let f ∈ A and U be an open subset of X such that Z(f ) ∩ U is an open and closed subset of Z(f ). Then there is an inner function ϕ in A such that ϕ ≺ f , Z(ϕ) = Z(f ) ∩ U , ϕ = 1 on X \ π −1 (π(Z(f ) ∩ U )) and |f/ϕ| > 0 on U . We have the following as a corollary of Lemma 2.10. Corollary 2.11. Let f ∈ A satisfy |f | > 0 on ∂X. Then there are an inner function ϕ in A and an invertible function h ∈ A such that f = ϕh.
2094
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Lemma 2.12. Let ϕ be an inner function in A satisfying Z(ϕ) = ∅ and x1 = (ξ1 , z1 ) ∈ Z(ϕ). Let k = ord(ϕ, x1 ). Then there are an open and closed neighborhood Wξ1 of ξ1 in βN, r > 0 satisfying Dr (z1 ) ⊂ D and an inner function ψ such that Z(ψ) ⊂ Wξ1 × Dr (z1 ), ψ ≺ ϕ, Z(ϕ/ψ) ∩ (Wξ1 × D r (z1 )) = ∅ and Ordλ (ψ) = k for every λ ∈ Wξ1 . Proof. Take r > 0 satisfying Z(ϕξ1 ) ∩ D r (z1 ) = {z1 }. Then by Lemma 2.3, there is an open and closed neighborhood Wξ1 of ξ1 in βN such that |ϕ| > 0 on Wξ1 × ∂Dr (z1 ) and k=
ord(ϕ, x): x ∈ Z(ϕ) ∩ {λ} × Dr (z1 ) ,
λ ∈ Wξ1 .
Let ψ be the subfactor of ϕ with zeros Z(ϕ) ∩ (Wξ1 × Dr (z1 )). Then we get the assertion.
2
Let ϕ be an inner function in A satisfying Z(ϕ) = ∅. Let mϕ = max ord(ϕ, x)
and Mϕ = max Ordξ (ϕ). ξ ∈βN
x∈Z(ϕ)
By Corollary 2.5, mϕ Mϕ < ∞. By Theorem 2.8(ii), there are simple IBPs b1 , b2 , . . . , bMϕ Mϕ such that ϕ = i=1 bi . We may write ϕ = kj =1 qj for some IBPs q1 , q2 , . . . , qk satisfying k Mϕ . We say that ϕ is an inner function of order k, which we write order(ϕ) = k, if k is the smallest positive integer giving such factorization of ϕ. Theorem 2.13. Let ϕ be an inner function in A satisfying Z(ϕ) = ∅. Then ϕ is an inner function of order mϕ . Proof. By the definition of order(ϕ), we have mϕ order(ϕ). We shall show the reverse inequality. Let ξ ∈ π(Z(ϕ)) and Z(ϕ) ∩ π −1 (ξ ) = {xξ,1 , xξ,2 , . . . , xξ,jξ },
xξ,i = xξ,
(i = ).
We write xξ,i = (ξ, zξ,i ) for 1 i jξ . We put tξ,i = ord(ϕ, xξ,i ) mϕ . By Lemma 2.12, there are 0 < rξ < 1, an open and closed neighborhood Wξ of ξ in βN and inner functions ψxξ,1 , ψxξ,2 , . . . , ψxξ,jξ such that Drξ (zξ,i ) ∩ Drξ (zξ, ) = ∅,
i = ,
(2.3)
1 i jξ ,
(2.4)
λ ∈ Wξ , 1 i jξ ,
(2.5)
Z(ψxξ,i ) ⊂ Wξ × Drξ (zξ,i ), Ordλ (ψxξ,i ) = tξ,i , jξ
ψxξ,i ≺ ϕ
(2.6)
i=1
and Z j ξ
ϕ
i=1 ψxξ,i
∩ π −1 (Wξ ) = ∅.
(2.7)
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2095
By (2.5) and Theorem 2.8(ii), there are simple IBPs bξ,i,1 , bξ,i,2 , . . . , bξ,i,tξ,i such that ψxξ,i = tξ,i mϕ =1 bξ,i, . If we put bξ,i, = 1 for tξ,i + 1 mϕ , then ψxξ,i = =1 bξ,i, . For each fixed jξ 1 mϕ , by (2.3) and (2.4) i=1 bξ,i, is an IBP, so order
jξ
ψxξ,i
= order
i=1
m ϕ jξ
bξ,i, mϕ .
(2.8)
=1 i=1
ξ1 , ξ2 , . . . , ξs in π(Z(ϕ)) satisfying π(Z(ϕ)) ⊂ sBy the compactness of π(Z(ϕ)), thereexist k−1 W . Let V = W and V = W \ W {V : 1 k s} is a set 1 ξ1 k ξk k=1 ξk j =1 ξj for 2 k s. Then s k of mutually disjoint open and closed subsets of βN and π(Z(ϕ)) ⊂ k=1 Wξk = sk=1 Vk . For jξk each 1 k s, let ϕk be the subfactor of i=1 ψxξk ,i with zeros
Z
jξ k
ψxξk ,i
∩ π −1 (Vk ).
i=1
By (2.8), order(ϕk ) mϕ for every 1 k s. By (2.6) and (2.7), we have ϕ = ϕ0 sk=1 ϕk for some inner function ϕ0 satisfying Z(ϕ0 ) = ∅. Since Z(ϕk ) ∩ Z(ϕj ) = ∅ for k = j , it is easy to see that order(ϕ) mϕ . 2 For a set A, we denote by #(A) the number of elements in A. Let E be a nonvoid compact subset of X. If E ⊂ Z(b) for some simple IBP b, E is called a simple interpolation set. In this case, #(E ∩ π −1 (ξ )) 1 for every ξ ∈ βN. If E ⊂ Z(b) for some IBP b, E is called an interpolation set, and this is an unusual definition. In Theorem 2.19, we shall prove that this is equivalent to the usual definition for an interpolation set. If E is an interpolation set, then E is totally disconnected by Corollary 2.7. We shall study an interpolation set. Lemma 2.14. Let E be a nonvoid compact subset of X such that #(E ∩ π −1 (ξ )) = 1 for every ξ ∈ π(E). Then E is a simple interpolation set. Proof. For each ξ ∈ π(E), let E ∩ π −1 (ξ ) = {(ξ, f (ξ ))}. Then f (ξ ) is a continuous function on π(E) and E = {(ξ, f (ξ )): ξ ∈ π(E)}. Let r = maxξ ∈π(E) |f (ξ )|. Then r < 1. By the Tietze extension theorem, there is a continuous function f on βN such that f |π(E) = f and f (βN) ⊂ Dr . Let b(ξ, z) = (z − f (ξ ))/(1 − f (ξ )z) for every (ξ, z) ∈ βN × D. Then b is a simple IBP and Z(b) =
ξ, f (ξ ) : ξ ∈ βN ⊃ ξ, f (ξ ) : ξ ∈ π(E) = E.
2
For x1 , x2 ∈ X, let ρ(x1 , x2 ) = sup f (x2 ): f ∈ A, f (x1 ) = 0, f X 1 . We put x1 = (ξ1 , z1 ) and x2 = (ξ2 , z2 ). If ξ1 = ξ2 , then ρ(x1 , x2 ) = 1. If ξ1 = ξ2 , then ρ(x1 , x2 ) = |z1 − z2 |/|1 − z2 z1 |. A subset E of X is called ρ-separated if there exists δ > 0 such that ρ(x, y) > δ for every x, y ∈ E with x = y.
2096
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Lemma 2.15. Let E be a nonvoid compact ρ-separated subset of X. Then E is an interpolation set. Proof. By the assumption, m := maxξ ∈π(E) #(E ∩ π −1 (ξ )) < ∞. Since E is ρ-separated, by Lemma 2.12 for each ξ ∈ π(E) there are an open and closed neighborhood W ξ of ξ in βN and continuous maps fξ,1 , fξ,2 , . . . , fξ,m on Wξ to X such that E ∩ π −1 (Wξ ) ⊂ m i=1 fξ,i (Wξ ) and fξ,i (Wξ ) ∩ fξ,j (Wξ ) = ∅ for i = j . By the compactness of π(E), there are ξ1 , ξ2 , . . . , ξk in π(E) j −1 such that π(E) ⊂ kj =1 Wξj . Let V1 = Wξ1 and Vj = Wξj \ =1 Wξ for 2 j k. Then Vj ∩ V = ∅ for j = and W := kj =1 Wj = kj =1 Vj . For each 1 i m, we define a map fi on W by fi (λ) = fmξj ,i (λ) for λ ∈ Vj . Then fi is a continuous map on W , fj (W ) ∩ f (W ) = ∅ for j = and E ⊂ i=1 fi (W ). By Lemma 2.14, there is a simple IBP bi such that Z(bi ) = fi (W ). b . Then b is an IBP and E ⊂ Z(b). 2 Let b = m i=1 i Lemma 2.16. Let E be a nonvoid simple interpolation set in X and ϕ be an IBP in A satisfying E ⊂ Z(ϕ). Then there is a simple IBP b such that E ⊂ Z(b) and b ≺ ϕ. Proof. Let q be a simple IBP satisfying E ⊂ Z(q). Let N = N ∩ π(Z(q)). We have Z(q) ∩ π −1 (n) = {(n, an )} for every n ∈ N and supn∈N |an | < 1. Also we have E ⊂ Z(q) = {(n, an ): n ∈ N}X . Let N1 = N ∩ π(Z(ϕ)). We have π(E) ⊂ N1 βN . For each n ∈ N1 , take (n, cn ) in Z(ϕ) ∩ π −1 (n) such that |cn − an | = min |c − an |: (n, c) ∈ Z(ϕ) ∩ π −1 (n) .
(2.9)
We define the function f (n, z) on N × D by f (n, z) =
z−cn 1−cn z ,
1,
n ∈ N1 , n ∈ N \ N1 .
By Theorem 2.8(i), there exists a simple IBP b such that b|N×D = f . We have b ≺ ϕ. To show E ⊂ Z(b), let x ∈ E. There is a net {nα }α in N1 satisfying (nα , anα ) → x in X. Since ϕ(x) = 0, ϕ(nα , anα ) → 0. By (2.9), we have |cnα − anα | → 0, so (nα , cnα ) → x. Since f (nα , cnα ) = 0, we have x ∈ Z(b). 2 The following is an A-version of Theorem 2.2 in [21]. Lemma 2.17. Let E be a nonvoid interpolation set in X and U be an open and closed subset satisfying E ⊂ U ⊂ X. If ϕ is an inner function satisfying E ⊂ Z(ϕ), then there is an IBP b such that E ⊂ Z(b) ⊂ U and b ≺ ϕ. Proof. By the definition, there is an IBP q such that E ⊂ Z(q). By Theorem 2.8(ii), there are Mq simple IBPs q1 , q2 , . . . , qMq such that q = i=1 qi . Let Ei = E ∩Z(qi ). Since Z(qi )∩Z(qj ) = ∅ for i = j , we have Ei ∩ Ej = ∅ for i = j . Take open subsets Ui , 1 i Mq , such that Ei ⊂ Ui ⊂ U , Z(ϕ) ∩ Ui is open and closed in Z(ϕ) and Ui ∩ Uj = ∅ for i = j . Let ϕi be Mq ϕi ≺ ϕ. By Lemma 2.16, there are simple the subfactor of ϕ with zeros Z(ϕ) ∩ Ui . Then i=1 Mq IBPs b1 , b2 , . . . , bMq such that Ei ⊂ Z(bi ) and bi ≺ ϕi for every 1 i Mq . Let b = i=1 bi . Then b is an IBP, E ⊂ Z(b) ⊂ U and b ≺ ϕ. 2
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2097
Lemma 2.18. If E is a nonvoid simple interpolation set in X, then A|E = C(E). Proof. Let f ∈ C(E) satisfy f E < 1. By the Tietze extension theorem, there is f ∈ C(X) such that f |E = f and f X = f E < 1. Let q be a simple IBP satisfying E ⊂ Z(q). Let N = N ∩ π(Z(q)). For each n ∈ N , there is a unique an ∈ D such that q(n, an ) = 0. We have supn∈N |an | < 1 and E ⊂ {(n, an ): n ∈ N }X . Then there exists cn ∈ D such that (an − cn )/(1 − cn an ) = f (n, an ) for n ∈ N and supn∈N |cn | < 1. We define the function g(n, z) on N × D by g(n, z) =
z−cn 1−cn z ,
1,
n ∈ N, n ∈ N \ N.
By Theorem 2.8(i), there exists a simple IBP b in A such that b|N×D = g. Let x ∈ E. Then there is a net {nα }α in N such that (nα , anα ) → x in X. We have b(nα , anα ) = g(nα , anα ) =
anα − cnα = f (nα , anα ). 1 − cnα anα
Hence b(x) = f (x), so b|E = f |E = f . Thus we get the assertion.
2
The following is an A-version of Theorem 3.1 in [17]. Theorem 2.19. Let E be a nonvoid compact subset of X. Then the following conditions are equivalent. (i) E is an interpolation set. (ii) There are simple interpolation sets E1 , E2 , . . . , Em such that E = m i=1 Ei and Ei ∩Ej = ∅ for i = j . (iii) A|E = C(E). (iv) E is ρ-separated. Proof. (i) ⇒ (ii) follows from Theorem 2.8(ii). (ii) ⇒ (iii). Since Ei is a simple interpolation set, there is a simple IBP bi satisfying Ei ⊂ Z(bi ) for 1 i m. Let Ui , 1 i m, be open subsets of X satisfying Ei ⊂ Ui and Ui ∩Uj = ∅ for i = j . We may assume that Z(bi ) ∩ Ui is open and closed in Z(bi ). Taking the subfactor of bi with zeros Z(bi ) ∩ Ui , we may assume that Z(bi ) ⊂ Ui for 1 i m. Let ϕj = ( m i=1 bi )/bj for 1 j m. Then |ϕj | > 0 on Ej . Since ϕj = 0 on E \ Ej , by Lemma 2.18 we have A|E ⊃
m j =1
(iii) ⇒ (iv) is trivial. (iv) ⇒ (i) follows from Lemma 2.15.
2
ϕj A = C(E). E
2098
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
3. Closed ideals and factorization theorems Let I be a closed ideal in A. We assume that I = {0}. Let Z(I ) =
Z(f ).
f ∈I
For each x ∈ X, we put ord(I, x) = min ord(f, x): f ∈ I . By Corollary 2.4, ord(I, x) is upper semicontinuous on X. In this section, we shall study the structure of closed ideals I in A satisfying Z(I ) ⊂ X. Lemma 3.1. Let I be a closed ideal in A. Then Z(I ) ⊂ X if and only if supx∈Z(I ) ord(I, x) < ∞. Proof. Suppose that Z(I ) ⊂ X. To show supx∈Z(I ) ord(I, x) < ∞, suppose not. Since ord(I, x) is upper semicontinuous, ord(I, x1 ) = ∞ for some x1 = (ξ1 , z1 ) ∈ Z(I ). Then ord(fξ1 , z1 ) = ∞ for every f ∈ I . Since z1 ∈ D, we have fξ1 = 0 on D. Hence π −1 (ξ1 ) ⊂ Z(I ). This contradicts that Z(I ) ⊂ X. Suppose that Z(I ) ⊂ X. Then there is a point x2 in Z(I ) ∩ ∂X, so ord(f, x2 ) = ∞ for every f ∈ I . Thus ord(I, x2 ) = ∞. 2 It is not difficult to see that X coincides with the maximal ideal space of A (see [6]). The following comes from Lemma 1.1 in [11]. I for every 1 i m. If fi = ϕi hi for some Lemma 3.2. Let I bea closed ideal in A and fi ∈ m ϕi , hi ∈ A satisfies ( m Z(h )) ∩ Z(I ) = ∅, then i i=1 i=1 ϕi ∈ I . Let I be a closed ideal in A satisfying Z(I ) ⊂ X and mI = sup ord(I, x). x∈Z(I )
By Lemma 3.1, we have mI < ∞. If ϕ is an inner function in I , then by Theorem 2.13 we have order(ϕ) mI . The following is an A-version of Theorem 2.3 in [9]. Theorem 3.3. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and U be an open subset satisfying Z(I ) ⊂ U ⊂ X. Then I contains an inner function ϕ of order mI satisfying Z(ϕ) ⊂ U , and Z(I ) is a totally disconnected set. Proof. For x ∈ Z(I ), there is fx in I such that ord(fx , x) mI . By Lemma 2.10, there are an open neighborhood Ux of x in U and a factorization fx = ψx hx , where ψx is inner and hx ∈ A satisfying |hx | > 0 on Ux . Since ord(ψx , y) is upper semicontinuous in y, we may assume that ord(ψx , y) mI for every y ∈ Ux . By the compactness of Z(I ), there are x1 , x2 , . . . , xn ∈ Z(I )
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2099
n n such n that Z(I ) ⊂ i=1 Uxi ⊂ U . We have ( i=1 Z(hxi )) ∩ Z(I ) = ∅. By Lemma 3.2, we get 2.7, Z(I ) is totally disconnected. i=1 ψxi ∈ I . By Corollary Let A1 = Z(I ) \ ni=2 Uxi . Then A1 is compact and A1 ⊂ Ux1 . Since Z(I ) is totally disconnected, there is an open and closed subset E1 of Z(I ) such that A1 ⊂ E1 ⊂ Ux1 . We have Z(I ) \ E1 ⊂ ni=2 Uxi . Similarly there is an open and closed subset E2 of Z(I ) \ E1 such that E2 ⊂ Ux2 and Z(I ) \ (E1 ∪ E2 ) ⊂ ni=3 Uxi . Repeating the same argument, we have open and closed subsets E1 , E2 , . . . , En of Z(I ) such that Z(I ) = ni=1 Ei , Ei ⊂ Uxi and Ei ∩ Ej = ∅ for i = j . Hence there exist open 1 , V2 , . . . , Vn such that Ei ⊂ Vi ⊂ Uxi and V i ∩ V j = ∅ subsets V for i = j . We have Z(I ) ⊂ ni=1 Vi ⊂ ni=1 Uxi . We may assume that Z(ψxi ) ∩ Vi is open and closed in Z(ψxi ) for every 1 i n. Let ϕi be the subfactor of ψxi with zeros Z(ψxi ) ∩ Vi . Then
n
Z (ψxi /ϕi )hxi ∩ Z(I ) = ∅. i=1
n Since n fxi = ϕi (ψxi /ϕi )hxi , by Lemma 3.2 n again we get ϕ := i=1 ϕi ∈ I and Z(ϕ) ⊂ i=1 Vi ⊂ U . Let y ∈ Z(ϕ). Since Z(ϕ) ⊂ i=1 Vi , there is a unique i such that y ∈ Vi . Hence ord(ϕ, y) = ord(ϕi , y) = ord(ψxi , y) mI .
2
Corollary 3.4. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. Then I is algebraically generated by inner functions in I . Proof. By Theorem 3.3, there is an inner function ϕ in I . Let f ∈ I satisfy f X < 1. By Corollary 2.11, there are an inner function ψ and an invertible function h ∈ A such that ϕ − f = ψh. Then ψ ∈ I and we get the assertion. 2 The following is essentially an A-version of Theorem B. Corollary 3.5. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. For each x ∈ Z(I ) and an open subset U satisfying Z(I ) ⊂ U ⊂ X, there is an inner function ϕ of order mI in I such that ord(ϕ, x) = ord(I, x) and Z(ϕ) ⊂ U . Proof. By Theorem 3.3, there is an inner function ψ of order mI in I satisfying Z(ψ) ⊂ U . We have also f ∈ I such that ord(f, x) = ord(I, x) and f X < 1. Let r = infy∈X\U |ψ(y)|. By Corollary 2.11, there are an inner function ϕ in A and an invertible function h ∈ A such that ψ − rf = ϕh. We have that ϕ ∈ I , Z(ϕ) ⊂ U and ord(I, x) ord(ϕ, x) min ord(ψ, x), ord(f, x) = ord(I, x). Hence ord(ϕ, x) = ord(I, x). For y ∈ Z(I ), we have ord(I, y) ord(ϕ, y) ord(ψ, y) mI . Hence order(ϕ) = mI .
2
2100
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
For a closed ideal I in A satisfying Z(I ) ⊂ X, let Ordξ (I ) =
ord(I, x): x ∈ Z(I ) ∩ π −1 (ξ ) ,
ξ ∈ βN.
Repeating the same argument as in the proof of Corollary 3.5, we have the following. Corollary 3.6. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. For each ξ1 ∈ βN and an open subset U satisfying Z(I ) ⊂ U ⊂ X, there is an inner function ϕ of order mI in I such that Ordξ1 (ϕ) = Ordξ1 (I ) and Z(ϕ) ⊂ U . Proof. By Theorem 3.3, there is an inner function ψ of order mI in I satisfying Z(ψ) ⊂ U . Put Z(I ) ∩ π −1 (ξ1 ) = {x1 , x2 , . . . , xk }. There is f1 ∈ I satisfying ord(f1 , x1 ) = ord(I, x1 ) and f1 X < 1. Let r1 = infy∈X\U |ψ(y)|. By Corollary 2.11, there are an inner function ψ1 in A and an invertible function h1 ∈ A such that ψ − r1 f1 = ψ1 h1 . We have that ψ1 ∈ I , order(ψ1 ) = mI , Z(ψ1 ) ⊂ U and ord(ψ1 , x1 ) = ord(I, x1 ). Also there is an inner function ψ2 ∈ I such that order(ψ2 ) = mI , Z(ψ2 ) ⊂ U , ord(ψ2 , x1 ) = ord(I, x1 ) and ord(ψ2 , x2 ) = ord(I, x2 ). Repeating the same argument, there is an inner function ψk ∈ I such that order(ψk ) = mI , Z(ψk ) ⊂ U and ord(ψk , xi ) = ord(I, xi ) for every 1 i k. There is an open subset V of X such that Z(I ) ⊂ V , Z(ψk ) ∩ V is open and closed in Z(ψk ), and V ∩ π −1 (ξ1 ) = Z(I ) ∩ π −1 (ξ1 ). Let ϕ be the subfactor of ψk with zeros Z(ψk ) ∩ V . By Lemma 3.2, we have ϕ ∈ I . Also we have order(ϕ) = mI , Z(ϕ) ⊂ U and Ordξ1 (ϕ) =
k i=1
ord(ϕ, xi ) =
k
ord(I, xi ) = Ordξ1 (I ).
2
i=1
Let I be a closed ideal in A. Let {Wi : 1 i m} be open and closed subsets of βN and {fi : 1 i m} ⊂ I . Then we have m i=1 χπ −1 (Wi ) fi ∈ I . For ξ ∈ βN, we put Iξ = {fξ : f ∈ I }. Lemma 3.7. Let I be a closed ideal in A. If f is a function in A satisfying fξ ∈ Iξ for every ξ ∈ βN, then f ∈ I . Proof. For each ξ ∈ βN, by the assumption there is g(ξ ) ∈ I such that fξ = g(ξ )ξ on D. Let ε > 0. By Lemma 2.1, there is an open and closed neighborhood Wξ of ξ in βN such that fλ − fξ D < ε,
λ ∈ Wξ
(3.1)
and g(ξ )λ − g(ξ )ξ < ε, D
λ ∈ Wξ .
(3.2)
By the compactness of βN, there are ξ1 , ξ2 , . . . , ξt in βN such that βN = ti=1 Wξi . Let V1 = Wξ1 j −1 and Vj = Wξj \ i=1 Wξi for 2 j t. Then Vj is open and closed in βN, βN = tj =1 Vj and t Vj ∩ V = ∅ for j = . Let F = j =1 χπ −1 (Vj ) g(ξj ). Then we have F ∈ I . For λ ∈ βN, there is a unique j satisfying λ ∈ Vj ⊂ Wξj , and we have
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2101
fλ − Fλ D = fλ − g(ξj )λ D fλ − fξj D + fξj − g(ξj )λ D < ε + g(ξj )ξj − g(ξj )λ D by (3.1) < 2ε
by (3.2).
Hence f − F X < 2ε. Thus we get f ∈ I .
2
Lemma 3.8. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and ξ ∈ βN. Then Iξ is a closed ideal in A(D). Proof. Trivially Iξ is an ideal in A(D). By Corollary 3.6, there exists an inner function ϕ in I such that Ordξ (ϕ) = Ordξ (I ). Then we have ϕξ A(D) ⊂ Iξ ⊂ I ξ = ϕξ A(D). Hence Iξ is closed.
2
The following is an A-version of Theorem A. Theorem 3.9. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. Then I coincides with the set of f in A such that ord(f, x) ord(I, x) for every x ∈ Z(I ). Proof. Let J be the set of f in A such that ord(f, x) ord(I, x) for every x ∈ Z(I ). Then J is a closed ideal in A, I ⊂ J , Z(J ) = Z(I ) and ord(I, x) = ord(J, x) for x ∈ X. Let ξ ∈ βN. We have ord(Iξ , z) = ord(Jξ , z) for z ∈ D. By Lemma 3.8, we have Iξ = Jξ . By Lemma 3.7, we get I = J. 2 The proof of Theorem A given in [11] is more complicated than the one of Theorem 3.9. Lemma 3.10. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and U be an open subset satisfying Z(I ) ⊂ U ⊂ X. If B is an inner function in I , then there is an inner function ϕ of order mI in I such that ϕ ≺ B and Z(ϕ) ⊂ U . Proof. By Theorem 3.3, thereis an inner function q of order mI in I . Then there are IBPs I q1 , q2 , . . . , qmI such that q = m i=1 qi . Let x1 ∈ Z(I ) satisfy ord(I, x1 ) = mI . Then qi (x1 ) = 0 for every 1 i mI . By Lemma 2.17, there is an IBP ψ1 such that Z(q1 ) ∩ Z(I ) ⊂ Z(ψ1 ) ⊂ U
and ψ1 ≺ B.
Similarly, there is an IBP ψ2 such that Z(q2 ) ∩ Z(B/ψ1 ) ∩ Z(I ) ⊂ Z(ψ2 ) ⊂ U
and ψ2 ≺ B/ψ1 .
Repeating the same argument, for each 3 j mI there is an IBP ψj such that
2102
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
B Z(qj ) ∩ Z j −1 =1
ψ
∩ Z(I ) ⊂ Z(ψj ) ⊂ U
B and ψj ≺ j −1 =1
. ψ
I Let ψ = m j =1 ψj . We note that ψj (x1 ) = 0 for every 1 j mI . Then ψ ≺ B, Z(ψ) ⊂ U and ψ is an inner function of order mI . To show ψ ∈ I , let x ∈ Z(I ). If x ∈ Z(q1 ) ∩ Z(I ), then x ∈ Z(ψ1 ). When x ∈ Z(qj ) ∩ Z(I ) for some 2 j mI , we have two cases. j −1 Case 1. If x ∈ Z(B/ =1 ψ ), then x ∈ Z(ψj ). j −1 Case 2. If x ∈ / Z(B/ =1 ψ ), then ord(B, x) = ord
j −1
ψ , x = ord(ψ, x).
=1
Hence if ord(B, x) = ord(ψ, x), then ord(q, x) ord(ψ, x). Thus we get min ord(B, x), ord(q, x) ord(ψ, x). Since q and B are contained in I , ord(I, x) min ord(B, x), ord(q, x) . Hence ord(I, x) ord(ψ, x) for every x ∈ Z(I ). By Theorem 3.9, we have ψ ∈ I .
2
Theorem 3.11. Let I be a closed ideal in A satisfying Z(I ) ⊂ X, x ∈ Z(I ) and U be an open subset satisfying Z(I ) ⊂ U ⊂ X. If B is an inner function in I , then there is an inner function ϕ of order mI in I such that Z(ϕ) ⊂ U , ϕ ≺ B and ord(ϕ, x) = ord(I, x). Proof. By Theorem 3.3, Z(I ) is totally disconnected. Since ord(I, y) is upper semicontinuous in y, there are open and closed subsets E1 and E2 of Z(I ) such that Z(I ) = E1 ∪ E2 , E1 ∩ E2 = ∅, x ∈ E1 and ord(I, y) ord(I, x) for every y ∈ E1 . Let Ii = f ∈ A: ord(f, y) ord(I, y), y ∈ Ei ,
i = 1, 2.
Then Ii is a closed ideal in A such that Z(Ii ) = Ei and ord(Ii , y) = ord(I, y) for every y ∈ Ei . We have mI1 = ord(I, x) and mI2 mI . Take an open subset Ui satisfying Ei ⊂ Ui ⊂ U for i = 1, 2 and U1 ∩ U2 = ∅. Since B ∈ Ii , by Lemma 3.10 there is an inner function ϕi of order mIi in Ii such that ϕi ≺ B and Z(ϕi ) ⊂ Ui . Let ϕ = ϕ1 ϕ2 . Then Z(ϕ) ⊂ U . Since U1 ∩ U2 = ∅, we have ϕ ≺ B and order(ϕ) = max order(ϕ1 ), order(ϕ2 ) = max{mI1 , mI2 } = mI . We have that ord(ϕ, y) = ord(ϕi , y) ord(Ii , y) for y ∈ Ei . Hence ord(ϕ, y) ord(I, y) for every y ∈ Z(I ). By Theorem 3.9, we have ϕ ∈ I . We have also ord(I, x) ord(ϕ, x) = ord(ϕ1 , x) mI1 = ord(I, x). Hence ord(ϕ, x) = ord(I, x).
2
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2103
The following is a generalized A-version of Theorem 3.5 in [19]. Corollary 3.12. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and B ∈ I be an inner function. Let {ϕα }α be the set of inner functions in I such that ϕα ≺ B. Then I is generated by {ϕα }α as a closed ideal. Proof. Let J be the closed ideal in A generated by {ϕα }α . Then J ⊂ I , so ord(I, x) ord(J, x) for every x ∈ Z(I ). By Theorem 3.11, we have Z(J ) = Z(I ), and for each x ∈ Z(I ) there exists ϕβ ∈ {ϕα }α satisfying ord(ϕβ , x) = ord(I, x). Hence ord(J, x) = ord(I, x) for every x ∈ Z(I ). By Theorem 3.9, we get J = I . 2 Corollary 3.13. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and ξ ∈ π(Z(I )). If B is an inner function in I , then there is an inner function ϕ of order mI in I such that ϕ ≺ B and Ordξ (ϕ) = Ordξ (I ). Proof. Let Z(I ) ∩ π −1 (ξ ) = {x1 , x2 , . . . , xn }. By Theorem 3.11, there is an inner function ϕ1 of order mI in I such that ϕ1 ≺ B and ord(ϕ1 , x1 ) = ord(I, x1 ). By Theorem 3.11 again, there is an inner function ϕ2 in I such that ϕ2 ≺ ϕ1 and ord(ϕ2 , x2 ) = ord(I, x2 ). We note that ϕ2 ≺ B, order(ϕ2 ) = mI and ord(ϕ2 , x1 ) = ord(I, x1 ). Repeating the same argument, there is an inner function ϕn of order mI in I such that ϕn ≺ B and ord(ϕn , xi ) = ord(I, xi ) for every 1 i n. We have Ordξ (ϕn ) =
n
ord(ϕn , xi ) =
i=1
n
ord(I, xi ) = Ordξ (I ).
2
i=1
Corollary 3.14. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. Then Ordξ (I ) is upper semicontinuous in ξ ∈ π(Z(I )). Proof. By Theorem 3.3, I contains an inner function. Let ξ ∈ π(Z(I )). By Corollary 3.13, there is an inner function ϕ in I such that Ordξ (ϕ) = Ordξ (I ). By Corollary 2.6, there is an open neighborhood Wξ of ξ in βN such that Ordλ (ϕ) = Ordξ (ϕ) for every λ ∈ Wξ . Since ϕ ∈ I , we have Ordλ (I ) Ordλ (ϕ) for every λ ∈ π(Z(I )). Hence Ordλ (I ) Ordξ (I ) for λ ∈ Wξ . Therefore we get the assertion. 2 4. Numbering functions Let I be a closed ideal in A satisfying Z(I ) ⊂ X. By Theorem 3.3, Z(I ) is a compact and totally disconnected set, and I contains an inner function. Then maxξ ∈π(Z(I )) #(Z(I ) ∩ π −1 (ξ )) < ∞, where #(A) denotes the number of elements in A. We are interested in the bounded numbering function ord(I, x) for x ∈ Z(I ). So in this section we assume that E is a nonvoid compact and totally disconnected subset of X, and
m := max # E ∩ π −1 (ξ ) < ∞. ξ ∈π(E)
(4.1)
For each ξ ∈ π(E), let k = #(E ∩ π −1 (ξ )) and E ∩ π −1 (ξ ) = {x1 , x2 , . . . , xk }. We put xi = (ξ, zi ), zi ∈ D. Take r0 > 0 such that Dr0 (zi ) ∩ Dr0 (zj ) = ∅ for i = j . Let {Wα (ξ )}α be a set of
2104
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
fundamental open and closed neighborhood of ξ in βN. We define α1 α2 by Wα2 (ξ ) ⊂ Wα1 (ξ ). For each 0 < r r0 , there exists Wα (ξ ) such that E∩π
−1
(λ) ⊂ {λ} ×
k
Dr (zi ) ,
λ ∈ Wα (ξ ).
i=1
Take λα ∈ Wα (ξ ). For each 1 i k, the net of sets E ∩ ({λα } × Dr (zi )) converges to the point (ξ, zi ) in X as α → ∞. Let nE : E → {1, 2, . . .} be a bounded numbering function. Since sup
nE (ζ ): ζ ∈ E ∩ {λ} × Dr (zi )
λ∈Wα (ξ )
decreases as α → ∞, we can define nE (xi ) = lim
sup
α→∞ λ∈W (ξ ) α
nE (ζ ): ζ ∈ E ∩ {λ} × Dr (zi ) ,
and there exists α0 such that
nE (xi ) = sup
nE (ζ ): ζ ∈ E ∩ {λ} × Dr (zi )
λ∈Wα (ξ )
for every α α0 . More generally, for x = (ξ, z) ∈ E we can define nE (x) = lim lim
sup
r→0 α→∞ λ∈Wα (ξ )
nE (ζ ): ζ ∈ E ∩ {λ} × Dr (z) ,
and by the above observation nE (x) = sup
nE (ζ ): ζ ∈ E ∩ {λ} × Dr (z)
λ∈Wα (ξ )
nE on E. Since nE is bounded for every 0 < r r0 and α α0 . By the definition, we have nE on E, by (4.1) nE is bounded on E. Also we have the following. Lemma 4.1. nE (x) is upper semicontinuous on E. Theorem 4.2. Let I be a closed ideal in A satisfying Z(I ) ⊂ X and nZ(I ) (x) = ord(I, x) for nZ(I ) = nZ(I ) on Z(I ). every x ∈ Z(I ). Then nZ(I ) is a bounded numbering function satisfying Proof. By Lemma 3.1, nZ(I ) is bounded on Z(I ). By Theorem 3.3, Z(I ) is totally disconnected. Let x = (ξ, z) ∈ Z(I ). By Corollary 3.5, there is an inner function ϕ in I satisfying ord(ϕ, x) = ord(I, x). By Lemma 2.3, there exist r0 > 0 and α0 such that ord(ϕ, x) =
ord(ϕ, ζ ): ζ ∈ Z(ϕ) ∩ {λ} × Dr (z) ,
λ ∈ Wα (ξ )
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2105
for every 0 < r r0 and α α0 . Then nZ(I ) (x) = ord(ϕ, x)
ord(ϕ, ζ ): ζ ∈ Z(I ) ∩ {λ} × Dr (z)
= nZ(I ) (ζ ): ζ ∈ Z(I ) ∩ {λ} × Dr (z) for every λ ∈ Wα (ξ ), 0 < r r0 and α α0 . By the definition of a tilde function, we have nZ(I ) (x). Thus we get nZ(I ) = nZ(I ) on Z(I ). 2 nZ(I ) (x) nE = nE on E. Let We shall give how to get bounded numbering functions nE satisfying nE,1 is also bounded on E. For a nE,1 be an arbitrary bounded numbering function on E. Then positive integer j with j 2, inductively we can define nE,j (x) = nE,j −1 (x),
x ∈ E.
We have nE,j −1 nE,j , so we may define nE,∞ (x) = lim nE,j (x), j →∞
x ∈ E.
By (4.1), we have nE,1 (x) m max nE,1 (y) < ∞, nE,2 (x) = y∈E
x ∈ E.
Similarly, nE,j (x) mj −1 max nE,1 (y) < ∞, y∈E
x ∈ E.
But it may happen that nE,∞ (x) = ∞ for some x ∈ E. As a special case, let NE,1 (x) = 1 for every x ∈ E. We may define NE,j and NE,∞ (x) = lim NE,j (x), j →∞
x ∈ E.
We call NE,∞ the associated numbering function of the set E. By the definition, NE,2 = NE,1 on E if and only if E is ρ-separated. But generally, the condition nE,2 = nE,1 on E does not imply that E is ρ-separated. The following is a generalized A-version of Lemma 7.4 in [19]. Lemma 4.3. Let x ∈ E and j be a positive integer with j 2. If nE,j (x) < j , then there is an open neighborhood Ux of x in E such that nE,j = nE,j −1 on Ux . Proof. Let j0 = min nE,1 (y) 1. y∈E
(4.2)
2106
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Since j0 nE,1 (x) nE,j (x) < j , we may assume that j j0 + 1. We shall prove the assertion by induction on j with j j0 + 1. Let j = j0 + 1. Suppose that nE,j0 +1 (x) < j0 + 1. Then nE,j0 +1 (x) = j0 . By Lemma 4.1, there is an open neighborhood Ux of x in E such that nE,j0 +1 (y) nE,j0 +1 (x) for every y ∈ Ux . By (4.2), j0 nE,j0 (y) nE,j0 +1 (y) nE,j0 +1 (x) = j0 ,
y ∈ Ux .
Thus we get the assertion for the case j = j0 + 1. Let k j0 + 2. Suppose that the assertion holds for j = k − 1. We shall prove for the case j = k. Suppose that nE,k (x) < k. We have nE,k−1 (x) nE,k (x) k − 1.
(4.3)
We consider two cases separately. Case 1. Suppose that nE,k−1 (x) < k − 1. By the assumption of induction, there exists an open neighborhood Ux of x in E such that nE,k−1 = nE,k−2 on Ux . By the definition of a tilde function, we have that nE,k = nE,k−1 on Ux . Case 2. Suppose that nE,k−1 (x) = k − 1. By Lemma 4.1, Ek := {y ∈ E: nE,k (y) k} is closed. By (4.3), there exists an open neighborhood Ux of x in E such that Ek ∩ Ux = ∅, that is, Ux ⊂ {y ∈ E: nE,k (y) < k}. Since nE,k−1 nE,k k − 1 on Ux , we have Ux = y ∈ Ux : nE,k−1 (y) = k − 1 ∪ y ∈ Ux : nE,k−1 (y) < k − 1 . We have nE,k = nE,k−1 on {y ∈ Ux : nE,k−1 (y) = k − 1}. Let y ∈ Ux satisfy nE,k−1 (y) < k − 1. By the assumption of induction, there exists an open neighborhood Uy of y in E such that nE,k−1 = nE,k−2 on Uy . Hence we have nE,k = nE,k−1 on Uy . Therefore we get nE,k = nE,k−1 on Ux . 2 Corollary 4.4. Suppose that nE,∞ is a bounded function on E. Then there is a positive integer j nE,∞ = nE,∞ on E. such that nE,j +1 = nE,j , so nE,∞ = nE,j and Proof. Let j = maxx∈E nE,∞ (x). Then nE,j +1 (x) < j + 1 for every x ∈ E. By Lemma 4.3, there is an open neighborhood Ux of x in E such that nE,j +1 = nE,j on Ux . Since E is compact, nE,∞ = nE,∞ on E. 2 nE,j +1 = nE,j , so nE,∞ = nE,j and Lemma 4.5. Let nE,1 be a bounded numbering function on E. Then NE,∞ is bounded on E if and only if nE,∞ is bounded on E. Proof. Suppose that NE,∞ is bounded. Let L1 = maxx∈E nE,1 (x) and L2 = maxx∈E NE,∞ (x). Then nE,j L1 NE,j and nE,∞ L1 L2 on E. The converse follows from NE,∞ nE,∞ on E. 2 Let nE,1 be a numbering function on E. For an open and closed subset E0 of E, let nE0 ,1 = nE,1 |E0 . By the definition of a tilde function, we have nE0 ,j = nE,j and nE0 ,∞ = nE,∞ on E0 . We call this fact as the locally stable property of numbering functions.
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2107
Lemma 4.6. If NE,∞ is bounded, then for each x1 ∈ E there is an open and closed neighborhood Ex1 of x1 in E such that max
ξ ∈π(Ex1 )
NEx1 ,∞ (y): y ∈ Ex1 ∩ π −1 (ξ ) = NEx1 ,∞ (x1 ).
Proof. We write x1 = (ξ1 , z1 ). By (4.1), we put E ∩ π −1 (ξ1 ) = (ξ1 , z1 ), (ξ1 , z2 ), . . . , (ξ1 , zk ) ,
zi = zj
(i = j ).
Take r1 > 0 such that Dr1 (zi ) ∩ Dr1 (zi ) = ∅ for i = j . Next, take an open and closed neighborhood W1 of ξ1 in βN such that E ∩ π −1 (W1 ) ⊂
k
W1 × Dr1 (zi ).
i=1
Let Ex1 = E ∩ (W1 × Dr1 (z1 )). We have NEx1 ,∞ = NE,∞ on Ex1 . By Corollary 4.4, Ex ,∞ (x1 ) = NEx ,∞ (x1 ), so retaking smaller W1 we have N 1 1 NEx1 ,∞ (x1 ) = max
ξ ∈W1
NEx1 ,∞ (y): y ∈ Ex1 ∩ π −1 (ξ ) .
2
The following example will help to understand the argument in Sections 5–6. Example 4.7. We give an example of a compact subset E of X such that #(E ∩ π −1 (ξ )) 2 for every ξ ∈ π(E) and NE,∞ (x) = ∞ for some x ∈ E. Let {Ni }i be a family of subsets of N such that N = ∞ i=1 Ni , #(Ni ) = ∞ for every i ∈ N and Ni ∩ Nj = ∅ for i = j . Let {a1,j }j ∈N1 be a sequence in D1/2 with a1,j = 0 for every j ∈ N1 satisfying a1,j → 0 as j → ∞ in N1 . Let X X E1 = (j, 0): j ∈ N1 ∪ (j, a1,j ): j ∈ N1 ⊂ N1 βN × D. Then X E1 = (j, 0): j ∈ N1 ∪ (j, a1,j ): j ∈ N1 and #(E1 ∩ π −1 (ξ )) 2 for every ξ ∈ π(E1 ). Let x = (ξ, z) ∈ E1 . If ξ ∈ N1 , then NE1 ,2 (x) = 1 and #(E1 ∩ π −1 (ξ )) = 2, and if ξ ∈ N1 βN \ N1 , then NE1 ,2 (x) = 2 and #(E1 ∩ π −1 (ξ )) = 1. ∞ Let {N2,j }j be a family of subsets of N2 such that N2 = j =1 N2,j , #(N2,j ) = ∞ for every j ∈ N and N2,j ∩ N2, = ∅ for j = . For each j ∈ N, there are homeomorphisms η1,j : N1 βN → N2,j βN and τ1,j : N1 βN × D → N2,j βN × D
2108
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
such that τ1,j (ξ, z) = (η1,j (ξ ), z) for (ξ, z) ∈ N1 βN × D. Let E2,j = τ1,j (E1 ). Take ξ2,j ∈ N2,j βN \ N2,j . Then NE2,j ,2 (ξ2,j , 0) = 2. Let {a2,j }j be a sequence in D1/2 with a2,j = 0 for every j ∈ N satisfying a2,j → 0 as j → ∞. Let E2 =
∞
X
E2,j ∪ (ξ2,j , a2,j ): j ∈ N .
j =1
Then E2 is a compact subset of X and #(E2 ∩ π −1 (ξ )) 2 for every ξ ∈ π(E2 ). Let ξ2 be a (ξ2 )) = 1 and NE2 ,3 (ξ2 , 0) = 3. cluster point of {ξ2,j }j in βN. Then (ξ2 , 0) ∈ E2 , #(E2 ∩ π −1 Let {N3,j }j be a family of subsets of N3 such that N3 = ∞ j =1 N3,j , #(N3,j ) = ∞ for every j ∈ N and N3,j ∩ N3, = ∅ for j = . For each j ∈ N, there are homeomorphisms η2,j : N2 βN → N3,j βN and τ2,j : N2 βN × D → N3,j βN × D such that τ2,j (ξ, z) = (η2,j (ξ ), z) for (ξ, z) ∈ N2 βN × D. Let E3,j = τ2,j (E2 ). Take ξ3,j ∈ N3,j βN \ N3,j . Then NE3,j ,3 (ξ3,j , 0) = 3. Let {a3,j }j be a sequence in D1/2 with a3,j = 0 for every j ∈ N satisfying a3,j → 0 as j → ∞. Let E3 =
∞
X
E3,j ∪ (ξ3,j , a3,j ): j ∈ N .
j =1
Then E3 is a compact subset of X and #(E3 ∩ π −1 (ξ )) 2 for every ξ ∈ π(E3 ). Let ξ3 be a cluster point of {ξ3,j }j in βN. Then (ξ3 , 0) ∈ E3 , #(E3 ∩ π −1 (ξ3 )) = 1 and NE3 ,4 ((ξ3 , 0)) = 4. Repeating the same argument, we get a sequence {En }n of compact disjoint subsets of X such that En ⊂ Nn βN × D, #(En ∩ π −1 (ξ )) 2 for every ξ ∈ π(En ) and NEn ,n+1 (ξn , 0) = n + 1 for X −1 some ξn ∈ Nn βN \ Nn . Let E = ∞ n=1 En . Then #(E ∩ π (ξ )) 2 for every ξ ∈ π(E) and NE,∞ (x) = ∞ for some x ∈ E. 5. Associated primary ideals For a nonvoid compact subset E of X, let I (E) = f ∈ A: f (x) = 0, x ∈ E . Then I (E) is a closed ideal in A and E ⊂ Z(I (E)). We call I (E) the associated primary ideal of E. In this section, we study E for which Z(I (E)) = E, and characterize ord(I (E), x) for x ∈ E. For a closed ideal I in A satisfying Z(I ) ⊂ X, recall that ord(I, x): x ∈ Z(I ) ∩ π −1 (ξ ) , ξ ∈ βN Ordξ (I ) = and mI = max ord(I, x) < ∞. x∈Z(I )
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2109
Let MI =
max
ξ ∈π(Z(I ))
Ordξ (I ).
By Theorem 3.3, I contains an inner function ϕ, Z(I ) is totally disconnected, ord(I, x) ord(ϕ, x) for x ∈ Z(I ) and by Corollary 2.5 we have MI
max
ξ ∈π(Z(ϕ))
Ordξ (ϕ) < ∞.
Lemma 5.1. Let I be a closed ideal in A and U be an open subset satisfying Z(I ) ⊂ U ⊂ X, and W be an open and closed subset of βN such that π(Z(I )) ⊂ W . Then there is an inner function ϕ of order mI in I such that Z(ϕ) ⊂ U ∩ π −1 (W ) and maxξ ∈π(Z(ϕ)) Ordξ (ϕ) = MI . Proof. By Corollary 3.6, for each ξ ∈ π(Z(I )) there is an inner function ψ(ξ ) of order mI in I such that Ordξ (ψ(ξ ) ) = Ordξ (I ) and Z(ψ(ξ ) ) ⊂ U ∩ π −1 (W ). By Corollary 2.6, there is an open and closed subset Wξ of βN such that ξ ∈ Wξ ⊂ W and Ordλ (ψ(ξ ) ) = Ordξ (ψ(ξ ) ) = Ordξ (I ),
λ ∈ Wξ .
Then there are ξ1 , ξ2 , . . . , ξk ∈ π(Z(I )) such that π(Z(I )) ⊂ ki=1 Wξi ⊂ W . Let V1 = Wξ1 and i−1 Vi = Wξi \ j =1 Wξj for 2 i k. Then {Vi : 1 i k} is a set of mutually disjoint open and closed subsets of βN and ki=1 Vi = ki=1 Wξi ⊂ W . Let V0 = βN \ ki=1 Vi . Then χπ −1 (V0 ) = 0 on Z(I ), and by Theorem 3.9 we have χπ −1 (V0 ) ∈ I . Hence ϕ := χπ −1 (V0 ) +
k
χπ −1 (Vi ) ψ(ξi ) ∈ I,
i=1
ϕ is an inner function and Z(ϕ) ⊂ U ∩ π −1 (W ). Since order(ψ(ξi ) ) = mI , we have order(ϕ) mI . Since ϕ ∈ I , again by Theorem 3.9 we have order(ϕ) mI . Hence order(ϕ) = mI . We have also MI
max
ξ ∈π(Z(ϕ))
Thus we get the assertion.
Ordξ (ϕ) = max Ordξi (ψ(ξi ) ) = max Ordξi (I ) MI . 1ik
1ik
2
If Z(I (E)) ⊂ X, then Z(I (E)) is totally disconnected, so E is totally disconnected. To study E satisfying Z(I (E)) ⊂ X, we may assume that E is totally disconnected. By Theorem 3.3, there is an inner function ϕ satisfying E ⊂ Z(ϕ). So also we may assume that
max # E ∩ π −1 (ξ ) < ∞.
ξ ∈π(E)
Lemma 5.2. Let E be a nonvoid compact and totally disconnected subset of X. Then Z(I (E)) ⊂ X if and only if Z(I (E)) = E.
2110
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Proof. Suppose that Z(I (E)) ⊂ X. By Theorem 3.3, there is an inner function ϕ in I (E). Then E ⊂ Z(ϕ). Let U be an open subset of X such that E ⊂ U and Z(ϕ) ∩ U is open and closed in Z(ϕ). Let ψ be the subfactor of ϕ with zeros Z(ϕ) ∩ U . Then E ⊂ Z(ψ) ⊂ U . This shows that Z(I (E)) = E. 2 Lemma 5.3. Let E be a nonvoid compact and totally disconnected subset of X satisfying Z(I (E)) = E and E1 be a nonvoid open and closed subset of E. Then Z(I (E1 )) = E1 and ord(I (E1 ), x) = ord(I (E), x) for every x ∈ E1 . Proof. We have I (E) ⊂ I (E1 ). Then Z(I (E1 )) ⊂ Z(I (E)) = E ⊂ X. By Lemma 5.2, we have Z(I (E1 )) = E1 . We have also ord(I (E1 ), x) ord(I (E), x) for x ∈ E1 . Suppose that ord(I (E1 ), x1 ) < ord(I (E), x1 ) for some x1 ∈ E1 . Take open subsets U1 , U2 of X satisfying E1 ⊂ U1 , E \ E1 ⊂ U2 and U1 ∩ U2 = ∅. By Corollary 3.5, there is an inner function ϕ1 in I (E1 ) satisfying ord(ϕ1 , x1 ) = ord(I (E1 ), x1 ) and Z(ϕ1 ) ⊂ U1 . We have also Z(I (E \ E1 )) = E \ E1 . Let ϕ2 ∈ I (E \ E1 ) be an inner function satisfying Z(ϕ2 ) ⊂ U2 . Then ϕ1 ϕ2 ∈ I (E) and
ord(ϕ1 ϕ2 , x1 ) = ord(ϕ1 , x1 ) = ord I (E1 ), x1 < ord I (E), x1 . This is a contradiction.
2
We call the above fact the locally stable property of ord(I (E), x), x ∈ E. The following answers the A-version of Question 1 and is a generalized A-version of Theorem 7.6 in [19]. Theorem 5.4. Let E be a nonvoid compact and totally disconnected subset of X, and maxξ ∈π(E) #(E ∩ π −1 (ξ )) < ∞. Then the following conditions are equivalent. (i) Z(I (E)) = E. (ii) NE,∞ is bounded on E. (iii) ord(I (E), x) is bounded in x ∈ E. In this case, we have that ord(I (E), x) = NE,∞ (x) for every x ∈ E. Proof. (i) ⇒ (ii). Suppose that (i) holds. Since NE,1 (x) ord(I (E), x) for every x ∈ E, by Theorem 4.2 we have NE,∞ (x) ord(I (E), x) for every x ∈ E. By Lemma 3.1, we get (ii). (iii) ⇒ (i). Suppose that ord(I (E), x) < ∞ for every x ∈ E. For each x ∈ E, there exists fx ∈ I (E) such that ord(fx , x) < ∞. By Lemma 2.10, there are an open neighborhood Ux of x satisfies |hx | > 0 on Ux . By in X and a factorization fx = ϕx hx , where ϕx is inner and hx ∈ A the compactness of E, there are x1 , x2 , . . . , x ∈ E such that E ⊂ i=1 Uxi . Since fxi ∈ I (E), we have ϕxi = 0 on E ∩ Uxi for 1 i . Hence i=1 ϕxi = 0 on E, so i=1 ϕxi ∈ I (E). We have
Z I (E) ⊂ Z ϕxi ⊂ X. i=1
By Lemma 5.2, we get (i).
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2111
(ii) ⇒ (iii). Suppose that (ii) holds. We shall prove that
ord I (E), x = NE,∞ (x),
x ∈ E.
(5.1)
As a result, we get (iii). For each positive integer k, let Ωk = E: max NE,∞ (x) k . x∈E
(5.2)
We have Ωk ⊂ Ωk+1 . We shall prove (5.1) by induction on k in Ωk . Let E ∈ Ω1 . Then 1 = NE,1 = NE,2 on E, so E is ρ-separated. By Theorem 2.19, there is an IBP b such that E ⊂ Z(b). Hence Z(I (E)) ⊂ Z(b) ⊂ X. Then by Lemma 5.2, we have Z(I (E)) = E. We have also ord(I (E), x) = 1 = NE,∞ (x) for every x ∈ E. Let k 2. Suppose that (5.1) holds for every E ∈ Ωk−1 . Let E ∈ Ωk . If E ∈ Ωk−1 , then by the assumption of induction we have (5.1). So by (5.2), we may assume that maxx∈E NE,∞ (x) = k. We have NE,∞ (x) ord(I (E), x) for x ∈ E. So we need to prove that ord(I (E), x) NE,∞ (x) for every x ∈ E. Let E∞ = x ∈ E: NE,∞ (x) = k . / E∞ , then NE,∞ (x1 ) k − 1. By the locally stable properties of ord(I (E), x) Let x1 ∈ E. If x1 ∈ of E such that x1 ∈ E, ord(I (E), x) = and NE,∞ , there is an open and closed subset E Hence E ∈ Ωk−1 . By the asord(I (E), x) and NE,∞ (x) = NE,∞ (x) k − 1 for every x ∈ E. x1 ) = NE,∞ sumption of induction, we have ord(I (E), (x1 ). Hence ord(I (E), x1 ) = NE,∞ (x1 ). We assume that x1 ∈ E∞ . If ord(I (E ), x1 ) = NE ,∞ (x1 ) for some open and closed neighborhood E of x1 in E, then by the locally stable properties of ord(I (E), x) and NE,∞ , we have that ord(I (E), x1 ) = NE,∞ (x1 ). So by Lemma 4.6, we may assume that max
ξ ∈π(E)
NE,∞ (y): y ∈ E ∩ π −1 (ξ ) = NE,∞ (x1 ) = k.
(5.3)
# E ∩ π −1 π(x) = 1,
(5.4)
This shows that x ∈ E∞ .
E,∞ = NE,∞ on E. So by Lemma 4.1, E∞ is a closed set. By (5.4) By Corollary 4.4, we have N and Lemma 2.14, E∞ is a simple interpolation set, so there is a simple IBP q such that E∞ ⊂ Z(q). Since k 2, we have E ⊂ Z(q). By (5.4) again, we have π(E∞ ) ∩ π(E \ Z(q)) = ∅. Since E \ Z(q) is an Fσ -set, so is π(E \ Z(q)). Hence there is a sequence {Wj }j of open and closed subsets of βN such that Wj ∩ W = ∅,
π E \ Z(q) ⊂
j = , ∞ j =1
and
Wj
(5.5) (5.6)
2112
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
π(E∞ ) ∩
∞
Wj = ∅.
(5.7)
j =1
Let Ej = E ∩ π −1 (Wj ). Then Ej is an open and closed subset of E. By the locally stable property of NE,∞ , we have NEj ,∞ (x) = NE,∞ (x) for x ∈ Ej . By (5.7), maxx∈Ej NEj ,∞ (x) < k, so we have Ej ∈ Ωk−1 . By the assumption of induction, we have ord(I (Ej ), x) = NEj ,∞ (x) for every x ∈ Ej . Since (iii) ⇒ (i) holds, we have Z(I (Ej )) = Ej ⊂ π −1 (Wj ). Hence by (5.3), kj := max ξ ∈Wj
ord I (Ej ), y : y ∈ Ej ∩ π −1 (ξ ) k.
Therefore kj = maxξ ∈π(Ej ) Ordξ (I (Ej )) k. By Lemma 5.1, there is an inner function ϕj ∈ I (Ej ) such that Z(ϕj ) ⊂ π −1 (Wj ) and maxξ ∈π(Z(ϕj )) Ordξ (ϕj ) = kj k. By Theorem 2.8(ii), kj there are simple IBPs ψj,1 , ψj,2 , . . . , ψj,kj such that ϕj = i=1 ψj,i . Let Ej,i =
Ej ∩ Z(ψj,i ), ∅,
1 i kj , kj + 1 i k.
Since Ej ⊂ Z(ϕj ), we have Ej = ki=1 Ej,i . Since Z(ϕj ) ⊂ π −1 (Wj ), we have Ej,i ⊂ π −1 (Wj ). Since ψj,i is a simple IBP, Ej,i is a simple interpolation set. We have E= E
∞
∞
∪
Ej
j =1
Ej .
j =1
∞ By (5.6), we have E \ ∞ j =1 Ej ⊂ Z(q), and since q is a simple IBP, E \ j =1 Ej is a simple interpolation set. By (5.5), ∞ ∞
X
Ej ⊂ E
∞
n=1 j =n
Ej .
(5.8)
j =1
Let Γi = E
∞
∪
Ej
j =1
∞
Ej,i ,
1 i k.
j =1
By (5.8), Γi is closed. Since π E
∞ j =1
Ej
∩π
∞
Ej,i = ∅,
j =1
interpoby (5.5) we have #(Γi ∩ π −1 (ξ )) 1 for every ξ ∈ βN. By Lemma 2.14, Γi is a simple lation set, so there is a simple IBP bi such that Γi ⊂ Z(bi ) for 1 i k. Since E = ki=1 Γi , we have E ⊂ Z( ki=1 bi ). Hence ord(I (E), x) k for every x ∈ E. Since x1 ∈ E∞ , we have
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2113
ord(I (E), x1 ) k = NE,∞ (x1 ). Thus we get ord(I (E), x1 ) = NE,∞ (x1 ). As a result, we have ord(I (E), x) = NE,∞ (x) for every x ∈ E. 2 6. Zero’s order of closed ideals Let I be a closed ideal in A satisfying E := Z(I ) ⊂ X and nE (x) = ord(I, x) for x ∈ E. By Theorem 4.2, nE is a bounded numbering function satisfying nE = nE on E. In this section, we prove the converse of the above assertion. Let {ϕj }j be a sequence of inner functions in A and {Wj }j be a sequence of mutually disjoint open and closed subsets of βN satisfying Z(ϕj ) ⊂ π −1 (Wj ). Suppose that ϕj = 1 on π −1 (βN \ Wj ), ∞
X
Z(ϕj ) ⊂ X
j =1
and supj maxξ ∈Wj Ordξ (ϕj ) < ∞. Then we may define the function ψ on N × D by ψ(n, z) = ∞ j =1 ϕj (n, z) for every (n, z) ∈ N × D. By Theorem 2.8(i), there is an inner function ψ in A | satisfying ψ N×D = ψ . We write = ψ
∞
ϕj .
j =1
The infinite product ∞ j =1 ϕj is the usual infinite product on N × D and Wj , but it is not on X. ∞ −1 Any way j =1 ϕj is an inner function and ∞ j =1 ϕj = ϕj on π (Wj ). Let B be an inner function in A and {Vj }j be a sequence of mutually disjoint open and closed subsets of βN. For each j 1, if Z(B) ∩ π −1 (Vj ) = ∅, put Bj = 1, and if Z(B) ∩ π −1 (Vj ) = ∅, −1 let Bj be the subfactor of B with zeros Z(B) ∩ π −1 (Vj ). have Bj = 1 on We ∞π (βN \ Vj ). ∞ By the last paragraph, we may define the inner function j =1 Bj . We have j =1 Bj ≺ B and ∞ −1 |B/ ∞ j =1 Bj | > 0 on j =1 π (Vj ). Let {ψj }j be a sequence of inner functions in A such that ψj ≺ Bj and ψj =1 on π −1 (βN ∞\ Vj ) for every j 1. We may define the inner func∞ tion ∞ ψ . We have ψ ≺ j =1 j j =1 j j =1 Bj ≺ B. The following theorem answers the A-version of Question 2 in the introduction. Theorem 6.1. Let E be a nonvoid compact and totally disconnected subset of X, and maxξ ∈π(E) #(E ∩ π −1 (ξ )) < ∞. Let nE be a numbering function on E. If nE is bounded and nE = nE on E, then there is a closed ideal I in A such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Proof. We divide the proof into three steps. Step 1. For each positive integer k, let Ωk = (E, nE ): nE is bounded, nE = nE , max nE (x) k . x∈E
2114
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
We have Ωk ⊂ Ωk+1 . For each (E, nE ) ∈ Ωk , we shall prove the existence of a closed ideal I in A such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. We shall prove the assertion by induction on k in Ωk . Suppose that k = 1 and (E, nE ) ∈ Ω1 . Then nE (x) = 1 for every x ∈ E. Since nE = 1, we have NE,∞ = 1 on E. By Theorem 5.4,
ord I (E), x = NE,∞ (x) = 1 = nE (x),
x ∈ E.
Step 2. Let k be a positive integer with k 2. Suppose that for every (E, nE ) ∈ Ωk−1 , there is a closed ideal I in A such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Let (E, nE ) ∈ Ωk . If (E, nE ) ∈ Ωk−1 , by the assumption of induction we have the assertion. So we assume that k = maxx∈E nE (x). Let I = f ∈ A: ord(f, x) nE (x), x ∈ E . Then I is a closed ideal of A satisfying Z(I ) ⊃ E and ord(I, x) nE (x) for x ∈ E. Since NE,∞ nE on E, NE,∞ is bounded on E. By Theorem 5.4, we have Z(I (E)) = E. We have f k ∈ I for every f ∈ I (E). Hence Z(I ) = E. To show that ord(I, x) = nE (x) for x ∈ E, for each x1 ∈ E it is sufficient to show the existence of inner function ϕx1 ∈ I such that ord(ϕx1 , x1 ) = nE (x1 ). We put x1 = (ξ1 , z1 ) ∈ E. Claim. If there are an inner function ψ and an open and closed neighborhood Ux1 of x1 in E such that ord(ψ, x1 ) = nE (x1 ) and ord(ψ, y) nE (y) for every y ∈ Ux1 , then there exists an inner function ϕx1 ∈ I such that ord(ϕx1 , x1 ) = nE (x1 ). Proof. By the locally stable property, NE\Ux1 ,∞ = NE,∞ on E \ Ux1 . By Theorem 5.4, we have Z(I (E \ Ux1 )) = E \ Ux1 . By Theorem 3.3, there is an inner function q ∈ I (E \ Ux1 ) satisfying q(x1 ) = 0. Since k = maxx∈E nE (x), we have ϕx1 := ψq k ∈ I and ord(ϕx1 , x1 ) = ord(ψ, x1 ) = nE (x1 ). 2 We continue the proof of Theorem 6.1. Since maxλ∈π(E) #(E ∩ π −1 (λ)) < ∞, we put E ∩ π −1 (ξ1 ) = {x1 , x2 , . . . , xt },
xi = xj
(i = j ).
We write xi = (ξ1 , zi ). Then there exists r > 0 such that Dr (zi ) ∩ Dr (zj ) = ∅ for i = j , and there is an open and closed neighborhood Wξ1 of ξ1 in βN such that E ∩ π −1 (Wξ1 ) =
t
E ∩ Wξ1 × Dr (zi )
i=1
and E ∩ (Wξ1 × Dr (zi )) is open and closed in E for 1 i t. Let
E1 = E ∩ Wξ1 × Dr (z1 ) . Then x1 ∈ E1 . Let nE1 = nE |E1 . By the locally stable property of a numbering function, we have nE1 (x1 ), taking smaller Wξ1 we may nE1 = nE1 on E1 and (E1 , nE1 ) ∈ Ωk . By the definition of assume that
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
nE1 (x1 )
nE1 (y): y ∈ E1 ∩ π −1 (λ) ,
λ ∈ Wξ1 .
2115
(6.1)
If nE1 (x1 ) k − 1, then (E1 , nE1 ) ∈ Ωk−1 , so by the assumption on induction there is a closed ideal J in A such that Z(J ) = E1 and ord(J, y) = nE1 (y) for every y ∈ E1 . By Corollary 3.5, there is an inner function ψ in J such that ord(ψ, x1 ) = nE1 (x1 ) = nE (x1 ). We have also ord(ψ, y) ord(J, y) = nE1 (y) = nE (y) for every y ∈ E1 . By Claim, there is an inner function ϕx1 ∈ I such that ord(ϕx1 , x1 ) = nE (x1 ). Step 3. Next, suppose that nE1 (x1 ) = k. Then (E1 , nE1 ) ∈ Ωk . Let E∞ = x ∈ E1 : nE1 (x) = k . By Lemma 4.1 and the definition of a tilde function, E∞ is a closed ρ-separated set, so by Theorem 2.19, E∞ is an interpolation set. By (6.1), #(E∞ ∩ π −1 (λ)) = 1 for every λ ∈ π(E∞ ). By Lemma 2.14, there is a simple IBP q such that E∞ ⊂ Z(q). Since E1 \ Z(q) is an Fσ -set, so is π(E1 \ Z(q)). By (6.1) again,
π(E∞ ) ∩ π E1 \ Z(q) = ∅. Then there is a sequence of open and closed subsets {Wj }j of βN such that Wj ∩ Wi = ∅, π(E∞ ) ∩
∞
j = i,
(6.2)
Wj = ∅,
(6.3)
j =1 ∞
π E1 \ Z(q) ⊂ Wj
(6.4)
j =1
and q(x) → 0,
max
x∈E1 ∩π −1 (Wj )
j → ∞.
(6.5)
For each j 1, let E1,j = E1 ∩ π −1 (Wj ). By (6.2), {E1,j }j is a set of mutually disjoint open and closed subsets of E1 , and E1 = E1
∞ j =1
E1,j
∪
∞
E1,j .
j =1
By (6.4), we have
E1
∞ j =1
E1,j ⊂ Z(q).
(6.6)
2116
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
By (6.3), E∞ ∩ E1,j = ∅. Let nE1,j = nE1 |E1,j . Then nE1,j = nE1,j = nE1 on E1,j and maxy∈E1,j nE1,j (y) k − 1, so (E1,j , nE1,j ) ∈ Ωk−1 . By the assumption of induction, there is a closed ideal Ij in A such that Z(Ij ) = E1,j ⊂ π −1 (Wj ) and ord(Ij , y) = nE1,j (y) = nE1 (y),
y ∈ E1,j .
(6.7)
Recall that MI j =
max
λ∈π(Z(Ij ))
ord(Ij , y): y ∈ Z(Ij ) ∩ π −1 (λ) .
By (6.1) and (6.7), MIj = max λ∈Wj
nE1 (y): y ∈ Z(Ij ) ∩ π −1 (λ) nE1 (x1 ) = k.
Let {Uj }j be a sequence of open subsets of X such that E1,j ⊂ Uj ⊂ U j ⊂ X and Uj ⊂ π −1 (Wj ) for every j . By (6.5), we may further assume that max q(x) → 0,
x∈Uj
j → ∞.
(6.8)
By Lemma 5.1, there is an inner function ψj in Ij such that Z(ψj ) ⊂ Uj ⊂ π −1 (Wj ),
max
λ∈π(Z(ψj ))
Ordλ (ψj ) = MIj k,
(6.9)
and ψj = 1 on π −1 (βN \ Wj ). By Theorem 2.8(ii), there are simple IBPs bj,1 , bj,1 , . . . , bj,MIj MI such that ψj = s=1j bj,s and bj,s = 1 on π −1 (βN \ Wj ) for 1 s MIj . Since MIj k, put bj,s = 1 for MIj + 1 s k, then ψj =
k
(6.10)
bj,s .
s=1
By (6.2), (6.8) and (6.9), we may define fixed 1 s k, we may also define
∞
j =1 ψj ,
qs =
∞
and
∞
j =1 ψj
is an inner function. For each
bj,s ,
(6.11)
j =1
and qs is a simple IBP. By (6.6) and (6.8), Γs := E1
∞
E1,j
∪ E1 ∩ Z(qs )
j =1
is a simple interpolation set. So there is a simple IBP ϕs such that Γs ⊂ Z(ϕs ). Let
(6.12)
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
ψx1 =
k
2117
(6.13)
ϕs .
s=1
Then ψx1 is an inner function. By (6.12), ord(ψx1 , x) = k,
x ∈ E1
∞
(6.14)
E1,j .
j =1
Since x1 ∈ E∞ , we have ord(ψx1 , x1 ) = k = nE1 (x1 ) = nE (x1 ). Let y ∈ E1 ∩ π
−1
∞
Wj
=
j =1
∞
E1,j .
j =1
By (6.2), there exists a unique j 1 satisfying y ∈ E1,j . Since Z(Ij ) = E1,j and ψj ∈ Ij , we have nE1 (y) = ord(Ij , y)
by (6.7)
ord(ψj , y) k = ord bj,s , y by (6.10) ord
s=1 k
qs , y
by (6.11)
s=1
ord(ψx1 , y)
by (6.12) and (6.13).
Thus we get ord(ψx1 , y) nE1 (y) = nE (y),
y∈
∞
E1,j .
j =1
By (6.14), ord(ψx1 , y) = k nE1 (y) = nE (y),
y ∈ E1
∞
E1,j .
j =1
By Claim, there is an inner function ϕx1 ∈ I such that ord(ϕx1 , x1 ) = nE (x1 ). This completes the proof. 2 Combining Theorem 6.1 with Theorem 4.2, we have the following.
2118
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Corollary 6.2. Let E be a nonvoid compact and totally disconnected subset of X, and maxξ ∈π(E) #(E ∩ π −1 (ξ )) < ∞. Let nE be a numbering function on E. Then nE is bounded and nE = nE on E if and only if there is a closed ideal I in A such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Let I1 , I2 be closed ideals in A satisfying Z(Ii ) ⊂ X for i = 1, 2. Let I3 = I1 + I2 and E3 = Z(I3 ). Then I3 is a closed ideal and E3 = Z(I1 ) ∩ Z(I2 ). Then for x ∈ E3 , we have ord(I3 , x) = min ord(f1 + f2 , x): f1 ∈ I1 , f2 ∈ I2 = min min ord(f1 , x), ord(f2 , x) : f1 ∈ I1 , f2 ∈ I2 = min ord(I1 , x), ord(I2 , x) . Let I4 = I1 ∩ I2 and E4 = Z(I4 ). Then I4 is a closed ideal and E4 = Z(I1 ) ∪ Z(I2 ). Since I4 ⊂ Ii , we have ord(Ii , x) ord(I4 , x) for x ∈ E4 , i = 1, 2. Hence max ord(I1 , x), ord(I2 , x) ord(I4 , x),
x ∈ E4 .
Proposition 6.3. If nE4 is a numbering function such that max ord(I1 , x), ord(I2 , x) nE4 (x) ord(I4 , x),
x ∈ E4
and nE4 = nE4 on E4 , then nE4 (x) = ord(I4 , x) for every x ∈ E4 . Proof. By Theorem 6.1, there is a closed ideal I in A such that Z(I ) = E4 and ord(I, x) = nE4 (x) for x ∈ E4 . Since nE4 (x) ord(I4 , x) for x ∈ E4 , by Theorem 3.9 we have I4 ⊂ I . Since ord(Ii , x) nE4 (x), we have also I ⊂ I1 ∩ I2 = I4 . Thus we get I = I4 , so nE4 (x) = ord(I4 , x) for x ∈ E4 . 2 It is not difficult to give an example of I1 and I2 such that max ord(I1 , x), ord(I2 , x) = ord(I4 , x),
x ∈ E4 .
7. Tensor products of closed ideals Let I1 , I2 be closed ideals in A satisfying Z(Ii ) ⊂ X for i = 1, 2. Let I1 ⊗ I2 =
n 2
fi,j : fi,j ∈ Ii , i = 1, 2, n 1 .
j =1 i=1
Then I1 ⊗ I2 is an ideal in A (may not be closed) and is called the tensor product of I1 and I2 . We denote by I1 ⊗ I2 the closure of I1 ⊗ I2 in A. Then I1 ⊗ I2 is a closed ideal. We call I1 ⊗ I2 the closed tensor product. It is not difficult to see that Z(I1 ⊗ I2 ) = Z(I1 ⊗ I2 ) = Z(I1 ) ∪ Z(I2 )
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2119
and ord(I1 ⊗ I2 , x) = ord(I1 ⊗ I2 , x) = ord(I1 , x) + ord(I2 , x) for every x ∈ Z(I1 ) ∪ Z(I2 ). The purpose of this section is to prove that I1 ⊗ I2 is a closed ideal in A. Let Ei = Z(Ii ),
i = 1, 2 and E = E1 ∪ E2 .
Then Z(I1 ⊗ I2 ) = E ⊂ X. We say that I1 ⊗ I2 has the factorization property if for every inner function ϕ in I1 ⊗ I2 , there are inner functions ϕ1 , ϕ2 such that ϕi ∈ Ii for i = 1, 2 and ϕ1 ϕ2 ≺ ϕ. For each x ∈ E, we may consider localizations of I1 ⊗ I2 . Since E is totally disconnected, there are many open and closed neighborhoods Ex of x in E. Let Ii,Ex = f ∈ A: ord(f, y) ord(Ii , y), y ∈ Ex ,
i = 1, 2.
Then Ii,Ex is a closed ideal, Ii ⊂ Ii,Ex , Z(Ii,Ex ) = Z(Ii ) ∩ Ex and ord(Ii,Ex , y) = ord(Ii , y),
y ∈ Z(Ii ) ∩ Ex .
When Z(Ii ) ∩ Ex = ∅, we note that Ii,Ex = A. Let IEx = I1,Ex ⊗ I2,Ex . We call IEx a localization of the closed tensor product I1 ⊗ I2 at x ∈ E. We have ord(IEx , y) = ord(I1 ⊗ I2 , y),
y ∈ Ex .
If IEx = I1,Ex ⊗ I2,Ex has the factorization property for some Ex , we say that I1 ⊗ I2 has the local factorization property at x ∈ E. Lemma 7.1. If I1 ⊗ I2 has the local factorization property at every point in E = Z(I1 ) ∪ Z(I2 ), then I1 ⊗ I2 has the factorization property. Proof. Let ϕ ∈ I1 ⊗ I2 be an inner function. By the assumption, there are points x1 , x2 , . . . , xn in E and their open and closed neighborhoods Ex1 , Ex2 , . . . , Exn of E such that E = nj=1 Exj and IExj = I1,Exj ⊗ I2,Exj has the factorization property for every 1 j n. Since ϕ ∈ IExj , there are inner functions ψ1,j , ψ2,j such that ψi,j ∈ Ii,Exj for i = 1, 2 and ψ1,j ψ2,j ≺ ϕ. Let j −1 n. Then {Vj : 1 j n} is a set of mutually V1 = Ex1 and Vj = Exj \ =1 Ex for 2 j disjoint open and closed subsets of E and E = nj=1 Vj . Take open subsets Uj of X, 1 j n, such that Vj ⊂ Uj , Uj ∩ U = ∅ for j = and Z(ψi,j ) ∩ Uj is open and closed in Z(ψi,j ) for i = 1, 2. For each i = 1, 2 and 1 j n, let ϕi,j be the subfactor of ψi,j with zeros Z(ψi,j )∩Uj . Then ord(ϕi,j , y) = ord(ψi,j , y) for y ∈ Z(ψ i,j ) ∩ Uj . We have ϕ1,j ϕ2,j ≺ ψ1,j ψ2,j ≺ ϕ for 1 j n. Since Z(ϕ1,j ϕ2,j ) ⊂ Uj , we have nj=1 ϕ1,j ϕ2,j ≺ ϕ. Let ϕi = nj=1 ϕi,j for i = 1, 2. Then ϕ1 ϕ2 = nj=1 ϕ1,j ϕ2,j ≺ ϕ. Since ψi,j ∈ Ii,Exj , for every y ∈ Vj we have
2120
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
ord(Ii , y) = ord(Ii,Exj , y) ord(ψi,j , y) = ord(ϕi,j , y) = ord(ϕi , y). Then ord(Ii , y) ord(ϕi , y) for every y ∈ E. By Theorem 3.9, we have ϕi ∈ Ii for i = 1, 2. Thus we get the assertion. 2 Let J be a closed ideal in A satisfying Z(J ) ⊂ X. Recall that mJ = max ord(J, x) x∈Z(J )
and MJ =
max
ξ ∈π(Z(J ))
Ordξ (J ),
where Ordξ (J ) =
ord(J, x): x ∈ Z(J ) ∩ π −1 (ξ ) .
If ϕ is an inner function in J , then we have MJ
max
ξ ∈π(Z(J ))
Ordξ (ϕ).
Lemma 7.2. Let J be a closed ideal in A satisfying Z(J ) ⊂ X and B be an inner function in J . Then there is an inner function ϕ of order mJ in J such that ϕ ≺ B and maxξ ∈π(Z(ϕ)) Ordξ (ϕ) = MJ . Proof. As in the proof of Corollary 3.14, for each ξ ∈ π(Z(J )) there is an inner function ψ(ξ ) of order mJ in J satisfying ψ(ξ ) ≺ B and is an open and closed neighborhood Wξ of ξ in βN such that Ordλ (J ) Ordλ (ψ(ξ ) ) = Ordξ (ψ(ξ ) ) = Ordξ (J ),
λ ∈ Wξ .
By the compactness, there are ξ1 , ξ1 , . . . , ξk in π(Z(J )) such that π(Z(J )) ⊂ ki=1 Wξi . Let i−1 V1 = Wξ1 and Vi = Wξi \ j =1 Wξj for 2 i k. Then {Vi : 1 i k} is a set of mutually disjoint open and closed subsets of βN and π(Z(J )) ⊂ ki=1 Wξi = ki=1 Vi . Let ϕi be the subfactor of ψ(ξi ) with zeros Z(ψ(ξi ) ) ∩ π −1 (Vi ). Then ϕi ≺ ψ(ξi ) ≺ B, order(ϕi ) mJ and Ordλ (ϕi ) = Ordλ (ψ(ξi ) ) = Ordξi (J ),
λ ∈ Vi .
Let ϕ = ki=1 ϕi . Since Vi ∩ Vj = ∅ for i = j , we have ϕ ≺ B and order(ϕ) mJ . For each λ ∈ π(Z(ϕ)), there is a unique 1 k such that λ ∈ V . Then Ordλ (ϕ) = Ordλ (ϕ ) = Ordξ (J ). Hence maxλ∈π(Z(ϕ)) Ordλ (ϕ) MJ . For x ∈ Z(J ), similarly we have x ∈ π −1 (V ) for some 1 k and ord(ϕ, x) = ord(ϕ , x) = ord(ψ(ξ ) , x) ord(J, x). By Theorem 3.9, we have maxλ∈π(Z(ϕ)) Ordλ (ϕ) = MJ . 2
ϕ ∈ J.
Therefore
we
get
order(ϕ) = mJ
and
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2121
Lemma 7.3. Let ϕ, ψ be inner functions satisfying ψ ≺ ϕ. Let t be a positive integer. If max
ξ ∈π(Z(ψ))
Ordξ (ψ) t
min
ξ ∈π(Z(ϕ))
Ordξ (ϕ),
then there is an inner function q such that ψ ≺ q ≺ ϕ and Ordλ ( q ) = t for every λ ∈ π(Z(ϕ)). Proof. For each n ∈ π(Z(ϕ)) ∩ N, by the assumption we have ψn ≺ ϕn and Ordn (ψ) t Ordn (ϕ). Let bn (z) be a Blaschke subproduct of ϕn such that
ord(bn , w): w ∈ Z(bn ) = t
and ψn (z) ≺ bn (z). Let q(n, z) be the function on N × D defined by q(n, z) =
bn (z), 1,
n ∈ π(Z(ϕ)) ∩ N, n ∈ N \ π(Z(ϕ)).
By Theorem 2.8, there is an inner function q in A such that q |N×D = q. It is not difficult to see that q satisfies the desired conditions. 2 Lemma 7.4. Let I1 , I2 be closed ideals in A satisfying Z(Ii ) ⊂ X for i = 1, 2. Let 1 , 2 be positive integers satisfying MIi i for i = 1, 2. Suppose that I1 ⊗I2 has the factorization property. Let ϕ be an inner function in I1 ⊗ I2 such that 1 + 2 Ordξ (ϕ) for every ξ ∈ π(Z(ϕ)). Then there are inner functions ϕ1 , ϕ2 such that ϕi ∈ Ii for i = 1, 2, ϕ1 ϕ2 ≺ ϕ and Ordξ (ϕi ) = i for every ξ ∈ π(Z(ϕ)) and i = 1, 2. Proof. By the assumption, there are inner functions ψ1 , ψ2 such that ψi ∈ Ii for i = 1, 2 and ψ1 ψ2 ≺ ϕ. By Lemma 7.2, we may assume that max
ξ ∈π(Z(ψi ))
Ordξ (ψi ) = MIi ,
i = 1, 2.
For ξ ∈ π(Z(ϕ)), we have Ordξ
ϕ ψ2
= Ordξ (ϕ) − Ordξ (ψ2 ) 1 + 2 − MI2 1
and ψ1 ≺ ϕ/ψ2 . We have also that max
ξ ∈π(Z(ψ1 ))
Ordξ (ψ1 ) = MI1 1 .
By Lemma 7.3, there is an inner function ϕ1 such that ψ1 ≺ ϕ1 ≺ ϕ/ψ2 and Ordξ (ϕ1 ) = 1 for every ξ ∈ π(Z(ϕ/ψ2 )) = π(Z(ϕ)). Since ψ1 ∈ I1 , we have ord(I1 , x) ord(ψ1 , x) ord(ϕ1 , x), By Theorem 3.9, we have ϕ1 ∈ I1 .
x ∈ Z(I1 ).
2122
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
For ξ ∈ π(Z(ϕ)), we have Ordξ
ϕ ϕ1
= Ordξ (ϕ) − Ordξ (ϕ1 ) (1 + 2 ) − 1 = 2
and ψ2 ≺ ϕ/ϕ1 . By Lemma 7.3 again, there is an inner function ϕ2 such that ψ2 ≺ ϕ2 ≺ ϕ/ϕ1 and Ordξ (ϕ2 ) = 2 for every ξ ∈ π(Z(ϕ/ϕ1 )) = π(Z(ϕ)). Since ψ2 ∈ I2 , we have also ϕ2 ∈ I2 . 2 For each positive integer m, let Γm be the family of closed tensor products I1 ⊗ I2 of closed ideals I1 and I2 in A such that Z(Ii ) ⊂ X for i = 1, 2 and max
x∈Z(I1 ⊗I2 )
ord(I1 ⊗ I2 , x) m.
Theorem 7.5. Let I1 , I2 be closed ideals in A satisfying Z(Ii ) ⊂ X for i = 1, 2. Then I1 ⊗ I2 has the factorization property. Proof. We divide the proof into four steps. Step 1. We write Ei = Z(Ii ) for i = 1, 2 and E = E1 ∪E2 . We prove the assertion by induction on m in Γm . First, we consider the case m = 1. Take I1 ⊗I2 ∈ Γ1 arbitrary. Then ord(I1 , x)+ord(I2 , x) = 1 for every x ∈ E. So we have E1 ∩ E2 = ∅ and ord(Ii , x) = 1 for x ∈ Ei and i = 1, 2. By Theorem 3.3, E1 , E2 and E are all interpolation sets. Hence I1 ⊗ I2 = I (E). Let ϕ be an inner function in I1 ⊗ I2 . Then ϕ ∈ I (E), and by Lemma 2.17 it is not difficult to see the existence of IBPs ϕ1 , ϕ2 such that ϕi ∈ Ii and ϕ1 ϕ2 ≺ ϕ. Hence I1 ⊗ I2 has the factorization property. Step 2. Let m be a positive integer with m 2. Suppose that J1 ⊗ J2 has the factorization property for every J1 ⊗ J2 ∈ Γm−1 . Let I1 ⊗ I2 ∈ Γm . Applying Lemma 7.1, we shall show that I1 ⊗ I2 has the factorization property. Let x1 ∈ E. We shall prove that I1 ⊗ I2 has the local factorization property at x1 ∈ E. Since ord(I1 ⊗ I2 , y) is upper semicontinuous in y ∈ E, there is an open and closed neighborhood Ex1 of x1 in E such that ord(I1 ⊗ I2 , y) ord(I1 ⊗ I2 , x1 ) for every y ∈ Ex1 . Let IEx1 = I1,Ex1 ⊗ I2,Ex1 be a localization of the tensor product I1 ⊗ I2 at x1 ∈ E. Since ord(IEx1 , y) ord(I1 ⊗ I2 , x1 ) = ord(IEx1 , x1 ),
y ∈ Ex1 ,
if ord(I1 ⊗ I2 , x1 ) m − 1 we have IEx1 ∈ Γm−1 . By the assumption of induction, I1 ⊗ I2 has the local factorization property at x1 ∈ E. So we may assume that ord(I1 ⊗ I2 , x1 ) = m. We write x1 = (ξ1 , z1 ). Since #(E ∩ π −1 (ξ1 )) < ∞, we may take r > 0 as
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2123
E ∩ {ξ1 } × D r (z1 ) = (ξ1 , z1 ) = {x1 }. Then there exists an open and closed neighborhood Wξ1 of ξ1 in βN such that E ∩ (Wξ1 × Dr (z1 )) is open and closed in E. Taking smaller r and Wξ1 , we may assume that
Ex1 = E ∩ Wξ1 × Dr (z1 ) . We have ord(IEx1 , y) =
2
ord(Ii,Ex1 , y) = ord(I1 ⊗ I2 , y) m,
y ∈ Ex1 ,
i=1
Ordξ1 (IEx1 ) = ord(IEx1 , x1 ) = ord(I1 ⊗ I2 , x1 ) = m and IEx1 ∈ Γm . By Corollary 3.14, Ordλ (IEx1 ) is upper semicontinuous in λ ∈ βN, so retaking smaller Wξ1 we may assume that Ordλ (IEx1 ) Ordξ1 (IEx1 ) = m,
λ ∈ π(Ex1 ).
Moreover we may assume that Ordλ (Ii,Ex1 ) ord(Ii,Ex1 , x1 ),
λ ∈ π(Ex1 ), i = 1, 2.
We shall prove that IEx1 has the factorization property. Step 3. To simplify the notations, we put Ji = Ii,Ex1 . If Ji = A, then there is nothing to prove, so we may assume that x1 ∈ Z(Ji ) for i = 1, 2. Let J = J1 ⊗ J 2 . Then we have x1 = (ξ1 , z1 ) ∈ Z(J ) = Z(J1 ) ∪ Z(J2 ). We have also J ∈ Γm , m = max ord(J, y) = ord(J, x1 ) = ord(J1 , x1 ) + ord(J2 , x1 )
(7.1)
Ordλ (Ji ) Ordξ1 (Ji ) = ord(Ji , x1 ) = 0
(7.2)
y∈Z(J )
and
for every i = 1, 2 and λ ∈ π(Z(J )). We shall prove that J has the factorization property.
2124
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Let ϕ be an inner function in J . By (7.1) and (7.2), mJ = MJ = m. By Lemma 7.2, there is an inner function ψ of order m in J such that ψ ≺ ϕ and max
λ∈π(Z(ψ))
Ordλ (ψ) = Ordξ1 (ψ) = ord(ψ, x1 ) = m.
By Corollary 2.6,
V1 = λ ∈ π Z(ψ) : Ordλ (ψ) = m
and V2 = π Z(ψ) \ V1
are open and closed in βN. We have x1 ∈ Z(Ji ) ∩ π −1 (V1 ). Let ψ1 be the subfactor of ψ with zeros Z(ψ) ∩ π −1 (V1 ) and ψ2 = ψ/ψ1 . Then max
λ∈π(Z(ψ2 ))
Ordλ (ψ2 ) m − 1.
Let J2,i = f ∈ A: ord(f, x) ord(Ji , x), x ∈ Z(Ji ) ∩ π −1 (V2 ) for i = 1, 2. Then J2,i is a closed ideal such that Ji ⊂ J2,i , Z(J2,i ) = Z(Ji ) ∩ π −1 (V2 ) and ord(J2,i , y) = ord(Ji , y) for y ∈ Z(J2,i ). Since ψ ∈ J , we have ψ2 ∈ J2,1 ⊗ J2,2 . Hence J2,1 ⊗ J2,2 ∈ Γm−1 . By the assumption of induction, there are inner functions ψ2,1 , ψ2,2 such that ψ2,i ∈ J2,i for i = 1, 2 and ψ2,1 ψ2,2 ≺ ψ2 . Next, we study on π −1 (V1 ). Let J1,i = f ∈ A: ord(f, x) ord(Ji , x), x ∈ Z(Ji ) ∩ π −1 (V1 ) for i = 1, 2. Then J1,i is a closed ideal such that Ji ⊂ J1,i , Z(J1,i ) = Z(Ji ) ∩ π −1 (V1 ) and ord(J1,i , y) = ord(Ji , y) for y ∈ Z(J1,i ). We have ψ1 ∈ J1,1 ⊗ J1,2 and Ordλ (ψ1 ) = m for every λ ∈ V1 . In Step 4, we shall show the existence of inner functions ψ1,1 , ψ1,2 such that ψ1,i ∈ J1,i for i = 1, 2 and ψ1,1 ψ1,2 ≺ ψ1 . Let ϕi = ψ1,i ψ2,i for i = 1, 2. Since V1 ∩ V2 = ∅, we have ϕ1 ϕ2 = (ψ1,1 ψ1,2 )(ψ2,1 ψ2,2 ) ≺ ψ1 ψ2 = ψ ≺ ϕ. Let x ∈ Z(Ji ). Then either x ∈ π −1 (V1 ) or x ∈ π −1 (V2 ). If x ∈ π −1 (V1 ), then ord(ϕi , x) = ord(ψ1,i , x) ord(Ji , x). If x ∈ π −1 (V2 ), then similarly ord(ϕi , x) ord(Ji , x). By Theorem 3.9, we have ϕi ∈ Ji for i = 1, 2. Thus we get the assertion. Step 4. To simplify the notations again, we put Li = J1,i for i = 1, 2 and q = ψ1 . Let L = L1 ⊗ L 2 . Then q ∈ L and Ordλ (q) = m,
λ ∈ π Z(q) .
(7.3)
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2125
We have L ∈ Γm , x1 ∈ Z(L) and ord(q, x1 ) = m. By Corollary 2.6, π(Z(q)) is an open and closed subset of βN. We have also
i = 1, 2, λ ∈ π Z(L)
Ordλ (Li ) Ordξ1 (Li ) = ord(Li , x1 ),
(7.4)
and ord(L1 , x1 ) + ord(L2 , x1 ) = m.
(7.5)
A1 = x ∈ Z(L): ord(L, x) = m .
(7.6)
Let
Then x1 ∈ A1 . To complete the proof, we need to show the existence of inner functions q1 , q2 such that qi ∈ Li for i = 1, 2 and q1 q2 = q. By (7.3) and Theorem 2.8(ii), there are simple IBPs b1 , b2 , . . . , bm such that q=
m
bj
and π Z(q) = π Z(bj ) ,
1 j m.
(7.7)
j =1
Let m bj (x),
x ∈ X.
(7.8)
A2 = x ∈ Z(q): F (x) = 0 .
(7.9)
F (x) =
j =1
Then F (x) is a continuous function on X. Let
Since q ∈ L, by (7.6) and (7.7) we have A1 ⊂ A2 . Since A2 is a closed Gδ -set, so is π(A2 ). Hence there is a sequence of mutually disjoint open and closed subsets {W } of βN such that ∞
W . π Z(q) \ π(A2 ) = =1
We have
Z(q) = A2 ∪ Z(q) ∩ π
−1
∞
W
(7.10)
=1
and A2 ∩ π
−1
∞ =1
W = ∅.
(7.11)
2126
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Since bj is a simple IBP, by (7.7) we have
# Z(q) ∩ π −1 (ξ ) = 1,
∞
ξ ∈ π Z(q) W .
(7.12)
=1
Let fix a positive integer for a while. For each i = 1, 2, let Li, = f ∈ A: ord(f, x) ord(Li , x), x ∈ Z(Li ) ∩ π −1 (W ) . Then Li, is a closed ideal, Li ⊂ Li, , Z(Li, ) = Z(Li ) ∩ π −1 (W )
(7.13)
and ord(Li, , x) = ord(Li , x),
x ∈ Z(Li, ).
(7.14)
We put K = L1, ⊗ L2, . Let y ∈ Z(K ). Then y ∈ Z(L1, ) ∪ Z(L2, ). By (7.13), we have y ∈ π −1 (W ). By (7.11), A2 ∩ / A1 . So we have π −1 (W ) = ∅. Since A1 ⊂ A2 , y ∈ m > ord(L, y)
by (7.6)
= ord(L1 , y) + ord(L2 , y) = ord(L1, , y) + ord(L2, , y)
by (7.14)
= ord(K , y). Hence K ∈ Γm−1 . By the assumption of induction, K has the factorization property. Let B be the subfactor of q with zeros Z(q) ∩ π −1 (W ). Then Z(B ) ⊂ π −1 (W ), π(Z(B )) = W and B = 1 on π −1 (βN \ W ). Since q ∈ L and y ∈ π −1 (W ), we have ord(B , y) = ord(q, y) ord(L, y) =
2
ord(Li, , y) = ord(K , y).
i=1
By Theorem 3.9, we have B ∈ K . By (7.3), Ordξ (B ) = m for every ξ ∈ W . We have also MLi, MLi . By (7.4) and (7.5), ML1 + ML2 = ord(L1 , x1 ) + ord(L2 , x1 ) = m. Hence by Lemma 7.4, there are inner functions q1, , q2, such that qi, ∈ Li, ,
i = 1, 2,
q1, q2, = B
(7.15)
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2127
and Ordλ (qi, ) = ord(Li , x1 ),
λ ∈ W , i = 1, 2.
(7.16)
Since B = 1 on π −1 (βN \ W ), moreover we may assume that qi, = 1 on π −1 (βN \ W ) for i = 1, 2. Next, we fix i = 1, 2 and move . As mentioned in Section 6, we may define the inner functions ∞
∞
i = 1, 2 and
qi, ,
=1
B .
=1
We have B ≺ q and Z(B ) ⊂ π −1 (W ). Since W ∩ Wj = ∅ for = j , by Corollary 2.9 and (7.15) we have 2 ∞
qi, =
i=1 =1
∞
∞
q1, q2, =
=1
B ≺ q.
(7.17)
=1
Let ∞
W0 =
W .
=1
Then W0 is an open and closed subset of βN and π Z
2 ∞
qi,
= W0 .
i=1 =1
By (7.16), we have Ordλ
∞
λ ∈ W0 , i = 1, 2
qi, = ord(Li , x1 ),
(7.18)
=1
and by (7.5) Ordλ
2 ∞
qi, =
i=1 =1
2
ord(Li , x1 ) = m,
i=1
Hence by (7.10),
Z(q)
π
−1
∞ =1
By (7.12) and (7.18), we have
W = A2 .
λ ∈ W0 .
(7.19)
2128
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
ord
∞
qi, , x = ord(Li , x1 ),
x ∈ Z(Li ) ∩ π
−1
W0
∞
=1
W .
(7.20)
=1
Let q ∞
q0 = 2
(7.21)
.
=1 qi,
i=1
By (7.17), q0 is an inner function. Hence by (7.3) and (7.19), Ordλ (q0 ) =
0, m,
λ ∈ W0 , λ ∈ π(Z(q)) \ W0 .
(7.22)
By (7.7), (7.8) and (7.9), we have ord(q, x) = m for every x ∈ A2 . We have Z(q0 ) ⊂ A2 , and by (7.3) and (7.12) ord(q0 , x) = m for every x ∈ Z(q0 ). Since A2 is a simple interpolation set, by (7.5) there are inner functions p1 , p2 such that ord(pi , x) = ord(Li , x1 ),
x ∈ Z(q0 ), i = 1, 2
(7.23)
and q 0 = p1 p2 .
(7.24)
Let q i = pi
∞
i = 1, 2.
qi, ,
(7.25)
=1
Then qi is an inner function. By (7.21) and (7.24), we have q = q1 q2 . We shall show that qi ∈ Li for i = 1, 2. Let x ∈ Z(Li ). Since q ∈ L, x ∈ Z(Li ) ⊂ Z(L) ⊂ Z(q). We have ∞ ∞
W ∪ W . π Z(q) = π Z(q) \ W0 ∪ W0 =1
=1
Then either
π(x) ∈ π Z(q) \ W0
(7.26)
or π(x) ∈ W0
∞ =1
W
(7.27)
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2129
or π(x) ∈
∞
(7.28)
W .
=1
Suppose that (7.26) holds. By (7.22), x ∈ Z(q0 ). By (7.4), (7.23) and (7.25), we have ord(qi , x) = ord(pi , x) = ord(Li , x1 ) ord(Li , x). Suppose that (7.27) holds. By (7.4), (7.20) and (7.25), ord(qi , x) = ord
∞
qi, , x = ord(Li , x1 ) ord(Li , x).
=1
Suppose that (7.28) holds. Then there is a unique 1 satisfying π(x) ∈ W1 . Since x ∈ Z(Li ) ∩ π −1 (W1 ), by (7.13) we have x ∈ Z(Li,1 ), so ord(qi , x) = ord(qi,1 , x)
by (7.25)
ord(Li,1 , x)
by (7.15)
= ord(Li , x)
by (7.14).
Hence by Theorem 3.9, we have qi ∈ Li for i = 1, 2. Thus we get the assertion.
2
The following corollary answers the A-version of Question 3. Corollary 7.6. Let I1 , I2 be closed ideals in A satisfying Z(Ii ) ⊂ X for i = 1, 2. Then I1 ⊗ I2 is a closed ideal in A. Proof. We have I1 ⊗ I2 ⊂ I1 ⊗ I2 and Z(I1 ⊗ I2 ) = Z(I1 ) ∪ Z(I2 ) ⊂ X. Let ϕ be an inner function in I1 ⊗ I2 . By Theorem 7.5, there are inner functions ϕ1 , ϕ2 such that ϕ1 ∈ I1 , ϕ2 ∈ I2 and ϕ1 ϕ2 ≺ ϕ. We have ϕ1 ϕ2 ∈ I1 ⊗ I2 , so ϕ ∈ I1 ⊗ I2 . By Corollary 3.4, we have I1 ⊗ I2 ⊂ I1 ⊗ I2 . Thus we get I1 ⊗ I2 = I1 ⊗ I2 . 2 Let I1 , I2 , . . . , Ik be closed ideals in A satisfying Z(Ii ) ⊂ X for 1 i k. We may define the !k k !k i=1 Ii . We have Z( i=1 Ii ) = i=1 Z(Ii ) ⊂ X.
tensor product
Corollary 7.7. Let I1 , I2 , . . . , Ik be closed ideals in A satisfying Z(Ii ) ⊂ X for 1 i k. Then ! k i=1 Ii is a closed ideal in A. Let I be a closed ideal in A satisfying Z(I ) ⊂ X. Let E1 = Z(I ). By Lemma 5.2, Z(I (E1 )) = E1 so I ⊂ I (E1 ). Let NE1 ,∞ be the associated numbering function of E1 . By Theorem 5.4, NE1 ,∞ (x) = ord(I (E1 ), x) for x ∈ E1 . Hence NE1 ,∞ (x) ord(I, x) for every x ∈ E1 . If I = I (E1 ), there is nothing to say more, so we stop the argument. Suppose that I = I (E1 ).
2130
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Let E2 = x ∈ E1 : NE1 ,∞ (x) = ord(I, x) . Then E2 = ∅. If E2 is not closed, then there are no closed ideals J satisfying I = I (E1 ) ⊗ J , and we stop the argument. Suppose that E2 is closed. As in Section 4, let NE2 ,1 (x) = 1 for x ∈ E2 . Then we have NE1 ,∞ (x) + NE2 ,1 (x) ord(I, x) for every x ∈ E1 . By Theorem 4.2 and the definition of a tilde function, we have NE1 ,∞ (x) + NE2 ,∞ (x) ord(I, x) for every x ∈ E1 . Hence by Theorem 3.9 and Corollary 7.6, we have I ⊂ I (E1 ) ⊗ I (E2 ). If I = I (E1 ) ⊗ I (E2 ), we stop the argument. Suppose that I = I (E1 ) ⊗ I (E2 ). Let E3 = x ∈ E2 : NE1 ,∞ (x) + NE2 ,∞ (x) = ord(I, x) . Then E3 = ∅. If E3 is not closed, then there are no closed ideals J satisfying I = I (E1 ) ⊗ I (E2 ) ⊗ J , and we stop the argument. If E3 is closed, then we have I ⊂ I (E1 ) ⊗ I (E2 ) ⊗ I (E3 ). We may repeat the same argument. Suppose that all E1 , E2 , . . . , Ek are closed and stop here. This means that I=
k "
I (Ei ),
E1 ⊃ E2 ⊃ · · · ⊃ Ek = ∅.
i=1
It is not difficult to give an example of I which does not have the above form. 8. Local ideal theory in H ∞ We shall study closed ideals I in H ∞ satisfying Z(I ) ⊂ G. Let E be a nonvoid compact and totally disconnected subset of G. Let nE : E → {1, 2, . . .} be a bounded numbering function on E. For each x ∈ E, let {Uα (x)}α be a net of fundamental open neighborhoods of x in G. We define the order α β by Uβ (x) ⊂ Uα (x). For each 0 < r < 1, the value of sup
ξ ∈Uα (x)
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E
decreases as α → ∞, where Lξ is the Hoffman map at ξ ∈ G. Then the value of sup
ξ ∈Uα (x)
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E
is eventually constant for sufficiently large α. Hence we may define lim
sup
α→∞ ξ ∈U (x) α
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E ∈ {1, 2, . . . , ∞}.
Also the value of lim
sup
α→∞ ξ ∈U (x) α
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2131
decreases as r decreases to 0. Hence the value of nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E sup lim α→∞ ξ ∈U (x) α
is eventually constant for sufficiently small r > 0. Thus we may define nE (x) = lim
lim
sup
r→0 α→∞ ξ ∈Uα (x)
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E .
(8.1)
nE (x) for every x ∈ E. Moreover there exist α0 and r0 > 0 such that We have nE (x) nE (x) = sup
ξ ∈Uα (x)
nE (ζ ): ζ ∈ Lξ (Dr ) ∩ E
(8.2)
nE is upper semifor every α α0 and 0 < r r0 . It is not diffcult to show that the function continuous on E. Let E1 be an open and closed subset of E. We define nE1 = nE |E1 . By the n E1 = nE |E1 on E1 . This fact is called the locally stable property definition of nE (x), we have of a tilde function. Hoffman’s work in [14] gives us many informations on the local theory in H ∞ . Let δ, η and ε be numbers such that 0 < δ < 1,
0<η<
δ−η , 1 − δη
0 < ε < δη2 .
(8.3)
Let b fix an interpolating Blaschke product in the rest of this section. Let {zn }n be the zero sequence of b in D. By [2],
δ(b) := inf 1 − |zn |2 b (zn ) > 0. n
Taking a smaller δ in (8.3), we may assume that 0 < δ < δ(b). By [14, pp. 104–106], we have |b| < ε ⊂ Lξ (Dη ) ⊂ G ξ ∈Z(b)
and Lξ1 (Dη ) ∩ Lξ2 (Dη ) = ∅ for ξ1 , ξ2 ∈ Z(b) with ξ1 = ξ2 . Also we have
Rξ , |b| < ε =
Rξ := y ∈ Lξ (Dη ): b(y) < ε ,
ξ ∈Z(b)
and b/ε maps each domain Rξ biholomorphically onto D. We may define the map γ : Z(b) × D → |b| < ε by γ (ξ, z) ∈ Lξ (Dη ) satisfying (b/ε)(γ (ξ, z)) = z. Then γ is a biholomorphically homeomorphic and onto map, and γ can be extended γ : Z(b) × D (ξ, z) → γ (ξ, z) ∈ |b| ε
2132
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
ˇ homeomorphically. It is known that Z(b) is homeomorphic to the Stone–Cech compactification βN of the set of natural numbers N (see [13]). So using the same notation, we have a homeomorphic map γ : βN × D → |b| ε . We note that γ (N × {0}) = {zn }n , and we may assume that γ (n, 0) = zn ,
n ∈ N.
For each ξ ∈ βN, γ maps {ξ } × D biholomorphically onto Rλ for some λ ∈ Z(b). Hence we have H ∞ ◦ γ ⊂ A, where A is the big disk algebra studied in Sections 2–7. We assume that E is a nonvoid compact and totally disconnected subset of G satisfying E ⊂ {|b| < ε}, and max #(E ∩ Rξ ) < ∞.
ξ ∈Z(b)
(8.4)
If I is a closed ideal in H ∞ satisfying E := Z(I ) ⊂ {|b| < ε}, then by [9] there is a CN Blaschke product ϕ in I satisfying E ⊂ Z(ϕ) ⊂ {|b| < ε}, so E satisfies (8.4). For each x ∈ E, we may take {Uα (x)}α satisfying Uα (x) ⊂ {|b| < ε}. Let nE be a bounded numbering function on E. By the definition of nE and (8.4), nE is also bounded on E. For each x ∈ E, there is (ξ, z) ∈ βN × D such that γ (ξ, z) = x. Let {Wβ (ξ )}β be a net of fundamental open and closed neighborhoods of ξ in βN. For each Uα (x), there are Wβ (ξ ) and Dr (z) ⊂ D, 0 < r < 1 − |z|, such that x ∈ γ (Wβ (ξ ) × Dr (z)) ⊂ Uα (x). Hence we may rewrite (8.1) and (8.2) as nE (x) = lim
lim
sup
r→0 β→∞ λ∈Wβ (ξ )
nE (ζ ): ζ ∈ E ∩ γ {λ} × Dr (z)
and there exist β0 and r0 > 0 such that nE (x) = sup
nE (ζ ): ζ ∈ E ∩ γ {λ} × Dr (z)
λ∈Wβ (ξ )
for every β β0 and 0 < r r0 . We define the numbering function nγ −1 (E) on γ −1 (E) by
nγ −1 (E) (y) = nE γ (y) ,
y ∈ γ −1 (E).
Condition (8.4) is converted into condition (4.1) for the set γ −1 (E). By the works in Section 4, we have
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
nE (x) = sup λ∈Wβ (ξ )
= sup λ∈Wβ (ξ )
nE (ζ ): ζ ∈ E ∩ γ {λ} × Dr (z)
nγ −1 (E) (y): y ∈ γ −1 (E) ∩ {λ} × Dr (z)
2133
= nγ −1 (E) (ξ, z). Hence we have the following. nE (x) for every x ∈ E. Lemma 8.1. nγ −1 (E) (γ −1 (x)) = nE,1 . Since nE,1 is also Let nE,1 be a bounded numbering function on E. We put nE,2 = bounded on E, for every positive integer j with j 2, we may define inductively nE,j = nE,j −1 on E. Since nE,j −1 nE,j , we may define nE,∞ (x) = lim nE,j (x), j →∞
x ∈ E.
As the special case, let NE,1 (x) = 1 for every x ∈ E. We may also define NE,j (x) = E,j −1 (x) on E for j 2. Since NE,j −1 (x) NE,j (x), we may define N NE,∞ (x) = lim NE,j (x), j →∞
x ∈ E.
We call NE,∞ : E → {1, 2, . . . , ∞} the associated numbering function of E. It is considered that NE,∞ represents a geometrically quantity of E, i.e. NE,∞ represents a generalized crossing number of lines in E at x ∈ E. We have the following. Lemma 8.2. Nγ −1 (E),∞ (γ −1 (x)) = NE,∞ (x) and nγ −1 (E),∞ (γ −1 (x)) = nE,∞ (x) for every x ∈ E. Corollary 8.3. Let nE,1 be a bounded numbering function on E. Then NE,∞ is bounded on E if E,∞ = NE,∞ and and only if nE,∞ is bounded on E. In this case, we have N nE,∞ = nE,∞ on E. Proof. Combining Lemmas 8.1 and 8.2 with Corollary 4.4 and Lemma 4.5, we get the assertion. 2 Let f ∈ H ∞ and x ∈ Z(f ) ∩ {|b| < ε}. Then we have ord(f, x) = ord(f ◦ γ , γ −1 (x)). Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ {|b| < ε}. Let x ∈ Z(I ). Then
ord(I, x) = min ord(f, x) = min ord g, γ −1 (x) . f ∈I
g∈I ◦γ
Generally, I ◦ γ is not a closed ideal in A, so let J be a closed ideal in A generated by I ◦ γ . Then we have the following.
2134
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Lemma 8.4. (i) Z(J ) = γ −1 (Z(I )). (ii) ord(J, γ −1 (x)) = ord(I, x) for every x ∈ Z(I ). Let ψ be a simple IBP in A and N = N ∩ Z(ψ). We have #(Z(ψ) ∩ π −1 (n)) = 1 for every n ∈ N . Let {an } = Z(ψ) ∩ π −1 (n) for n ∈ N . Then {an : n ∈ N }X = Z(ψ). Let cn = γ (an ) for n ∈ N . Since γ (n, 0) = zn , we have cn ∈ Rn = z ∈ D: ρ(z, zn ) < η, b(z) < ε ,
n ∈ N.
It is known that {cn : n ∈ N} is an interpolating sequence in D (see [7, p. 405]). We denote by Ψ (ψ) the interpolating Blaschke product on D with zeros {cn : n ∈ N }. Then we have γ (Z(ψ)) = Z(Ψ (ψ)). Let ψ be an inner function in A. By Theorem 2.8(ii), m there are simple IBPs ψ1 , ψ2 , . . . , ψm in A such that ψ = m ψ . We define Ψ (ψ) = i=1 i i=1 Ψ (ψi ). We easily get the following lemma. Lemma 8.5. For an inner function ψ in A, Ψ (ψ) is a CN Blaschke product such that γ (Z(ψ)) = Z(Ψ (ψ)) ⊂ {|b| < ε} and ord(ψ, y) = ord(Ψ (ψ), γ (y)) for y ∈ Z(ψ). Conversely, let ϕ be a CN Blaschke product satisfying Z(ϕ) ⊂ {|b| < ε}. Then ϕ ◦ γ ∈ A and |ϕ ◦ γ | > 0 on ∂X. By Corollary 2.11, there are an inner function Φ(ϕ) in A and an invertible function h in A such that ϕ ◦ γ = Φ(ϕ)h. For the sake of simplicity, we ignore unimodular inner factors in A and unimodular constants in CN Blaschke products. We easily check the following. Lemma 8.6. (i) For every inner function ψ in A, we have (Φ ◦ Ψ )(ψ) = ψ. (ii) For every CN Blaschke product ϕ satisfying Z(ϕ) ⊂ {|b| < ε}, we have (Ψ ◦ Φ)(ϕ) = ϕ, Z(Φ(ϕ)) = γ −1 (Z(ϕ)) and ord(Φ(ϕ), γ −1 (x)) = ord(ϕ, x) for x ∈ Z(ϕ). By Lemmas 8.5 and 8.6, we have the following. Lemma 8.7. (i) Let ϕ1 , ϕ2 be CN Blaschke products satisfying Z(ϕi ) ⊂ {|b| < ε} for i = 1, 2. Then ϕ1 ≺ ϕ2 if and only if Φ(ϕ1 ) ≺ Φ(ϕ2 ). (ii) Let ψ1 , ψ2 be inner functions in A. Then ψ1 ≺ ψ2 if and only if Ψ (ψ1 ) ≺ Ψ (ψ2 ). Lemma 8.8. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ {|b| < ε} and J be the closed ideal in A generated by I ◦ γ . Then we have the following. (i) If ϕ ∈ I is a CN Blaschke product satisfying Z(ϕ) ⊂ {|b| < ε}, then Φ(ϕ) ∈ J . (ii) If ψ ∈ J is an inner function, then Ψ (ψ) ∈ I .
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2135
Proof. (i) Let ϕ ∈ I be a CN Blaschke product. Then ord(ϕ, x) ord(I, x) for every x ∈ Z(I ). By Lemma 8.4(i), we have Z(J ) = γ −1 (Z(I )). For y ∈ Z(J ), we have
ord Φ(ϕ), y = ord ϕ, γ (y) by Lemma 8.6(ii)
ord I, γ (y) = ord(J, y)
by Lemma 8.4(ii).
By Theorem 3.9, we have Φ(ϕ) ∈ J . (ii) Let ψ ∈ J be an inner function in A. Then ord(ψ, y) ord(J, y) for y ∈ Z(J ). We have Z(I ) = γ (Z(J )), and for x ∈ Z(I )
ord Ψ (ψ), x = ord ψ, γ −1 (x)
ord J, γ −1 (x) = ord(I, x) By Theorem A, we get Ψ (ψ) ∈ I .
by Lemma 8.5
by Lemma 8.4(ii).
2
Proposition 8.9. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ {|b| < ε}, x ∈ Z(I ) and U be an open subset satisfying Z(I ) ⊂ U ⊂ {|b| < ε}. If B is a CN Blaschke product in I , then there is a CN Blaschke product ϕ of order mI in I such that Z(ϕ) ⊂ U , ϕ ≺ B and ord(ϕ, x) = ord(I, x). Proof. Let J be a closed ideal in A generated by I ◦γ . By Lemma 8.4(i), Z(J ) = γ −1 (Z(I )). By Lemma 8.8(i), we have Φ(B) ∈ J . Since γ : X → {|b| ε} is a homeomorphic map, γ −1 (U ) is an open subset of X such that Z(J ) ⊂ γ −1 (U ) ⊂ X. By Theorem 3.11, there is an inner function ψ of order mJ in J such that Z(ψ) ⊂ γ −1 (U ), ψ ≺ Φ(B) and ord(ψ, γ −1 (x)) = ord(J, γ −1 (x)). By Lemmas 8.4–8.7, we have Z(Ψ (ψ)) ⊂ U , Ψ (ψ) ≺ B and ord(Ψ (ψ), x) = ord(ψ, γ −1 (x)) = ord(I, x). Let ϕ = Ψ (ψ). Then Z(ϕ) ⊂ U and ord(ϕ, x) = ord(I, x). By Lemma 8.8(ii), we have ϕ ∈ I . 2 Corollary 8.10. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ {|b| < ε} and B ∈ I be a CN Blaschke product. Then I is generated by CN Blaschke products ϕ in I such that ϕ ≺ B as a closed ideal. Proof. Let B be a CN Blaschke product in I . Let I1 be a closed ideal in H ∞ generated by CN Blaschke products ϕ in I satisfying ϕ ≺ B. Then I1 ⊂ I . Let {Uα }α be a set of open subsets of G such that Z(I ) = α Uα and Uα ⊂ {|b| < ε} for every α. For each x ∈ Z(I ) and α, by Proposition 8.9 there is a CN Blaschke product ϕx,α ∈ I such that Z(ϕx,α ) ⊂ Uα , ϕx,α ≺ B and ord(ϕx,α , x) = ord(I, x). Then Z(I1 ) = Z(I ) and ord(I1 , x) = ord(I, x) for every x ∈ Z(I ). By Theorem A, we get I1 = I . 2 Proposition 8.11. Let I be a closed ideal in H ∞ satisfying E := Z(I ) ⊂ {|b| < ε}. Let nE (x) = ord(I, x) for x ∈ E. Then nE is a bounded numbering function satisfying nE = nE on E.
2136
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Proof. Let J be the closed ideal in A generated by I ◦ γ . By Lemma 8.4, we have Z(J ) = γ −1 (E). Let nγ −1 (E) (y) = nE (γ (y)) for y ∈ Z(J ). By Lemma 8.1, nγ −1 (E) (y) = nE (γ (y)) for every y ∈ Z(J ). By Lemma 8.4, we have
ord(J, y) = ord I, γ (y) = nE γ (y) = nγ −1 (E) (y),
y ∈ Z(J ).
Then by Theorem 4.2, nγ −1 (E) (y) is a bounded numbering function and nγ −1 (E) (y) = nγ −1 (E) (y) for every y ∈ Z(J ). Thus we get nE = nE on E. 2 Proposition 8.12. Let E be a nonvoid compact and totally disconnected subset of {|b| < ε}, and maxξ ∈Z(b) #(E ∩ Rξ ) < ∞. Then the following conditions are equivalent. (i) Z(I (E)) = E. (ii) NE,∞ is bounded. (iii) ord(I (E), x) is bounded in x ∈ E. In this case, we have that ord(I (E), x) = NE,∞ (x) for every x ∈ E. Proof. The condition maxξ ∈Z(b) #(E ∩ Rξ ) < ∞ is equivalent to max
ξ ∈π(γ −1 (E))
# γ −1 (E) ∩ π −1 (ξ ) < ∞.
Let J be the closed ideal in A generated by I (E) ◦ γ . Then J ⊂ I (γ −1 (E)) and Z(J ) = Z(I (γ −1 (E))) = γ −1 (E). Let ψ be an inner function in I (γ −1 (E)). By Lemma 8.5, we have Ψ (ψ) ∈ I (E) and Z(Ψ (ψ)) ⊂ {|b| < ε}. By Lemma 8.6(i), Φ(Ψ (ψ)) = ψ, and by Lemma 8.8(i) we have ψ ∈ J . By Corollary 3.4, we get J = I (γ −1 (E)). By Lemma 8.4(i), Z(I (E)) = E if and only if Z(J ) = γ −1 (E). Since J = I (γ −1 (E)), Z(I (E)) = E if and only if Z(I (γ −1 (E))) = γ −1 (E). By Lemma 8.2, NE,∞ (x) = Nγ −1 (E),∞ (γ −1 (x)), and by Lemma 8.4(ii) and J = I (γ −1 (E)), we have ord(I (E), x) = ord(I (γ −1 (E)), γ −1 (x)) for every x ∈ E. Therefore by Theorem 5.4, we get the assertion. 2 Proposition 8.13. Let E be a nonvoid compact and totally disconnected subset of {|b| < ε}, and nE = nE on E. maxξ ∈Z(b) #(E ∩ Rξ ) < ∞. Let nE be a bounded numbering function satisfying Then there is a closed ideal I in H ∞ such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Proof. Let nγ −1 (E) (y) = nE (γ (y)) for y ∈ γ −1 (E). By Lemma 8.1, we have
nE γ (y) = nE γ (y) = nγ −1 (E) (y), nγ −1 (E) (y) =
y ∈ γ −1 (E).
By Theorem 6.1, there is a closed ideal J in A such that Z(J ) = γ −1 (E) and ord(J, y) = nγ −1 (E) (y) for every y ∈ γ −1 (E). Let I be a closed ideal in H ∞ generated by Ψ (ψa ) for all inner functions ψa (α ∈ Λ) in J . We have γ −1 (E) =
a∈Λ
Z(ψa )
by Corollary 3.4
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
= γ −1
Z Ψ (ψa )
2137
by Lemma 8.5
a∈Λ
= γ −1 Z(I ) . Hence Z(I ) = E. For each x ∈ E, there exists α0 ∈ Λ such that
ord ψa0 , γ −1 (x) = ord J, γ −1 (x) = nγ −1 (E) γ −1 (x) = nE (x). Hence by Lemma 8.5, we get
ord Ψ (ψa0 ), x = ord ψa0 , γ −1 (x) = nE (x). Thus we get ord(I, x) nE (x). For each α ∈ Λ, we have
nE (x) = nγ −1 (E) γ −1 (x) = ord J, γ −1 (x)
ord ψα , γ −1 (x)
= ord Ψ (ψα ), x by Lemma 8.5. Hence we get nE (x) ord(I, x). Thus we get ord(I, x) = nE (x) for every x ∈ E.
2
Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2. Similarly as in Section 7, we may define the tensor product I1 ⊗ I2 and the closed tensor product I1 ⊗ I2 . We have Z(I1 ⊗ I2 ) = Z(I1 ⊗ I2 ) = Z(I1 ) ∪ Z(I2 ) and ord(I1 ⊗ I2 , x) = ord(I1 ⊗ I2 , x) = ord(I1 , x) + ord(I2 , x) for every x ∈ Z(I1 ⊗ I2 ). We say that I1 ⊗ I2 has the factorization property if for every CN Blaschke product ϕ in I1 ⊗ I2 , there are CN Blaschke products ϕ1 , ϕ2 such that ϕi ∈ Ii for i = 1, 2 and ϕ1 ϕ2 ≺ ϕ. Proposition 8.14. Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ {|b| < ε} for i = 1, 2. Then I1 ⊗ I2 has the factorization property. Proof. Let ϕ ∈ I1 ⊗I2 be a CN Blaschke product. Considering a subproduct, we may assume that Z(ϕ) ⊂ {|b| < ε}. For i = 1, 2, let Ji be the closed ideal in A generated by Ii ◦ γ . By Lemma 8.4, Z(Ji ) = γ −1 (Z(Ii )) and ord(Ji , γ −1 (x)) = ord(Ii , x) for every x ∈ Z(Ii ). Let J be the closed ideal in A generated by (I1 ⊗ I2 ) ◦ γ . Then by Lemma 8.4 again, Z(J ) = γ −1 (Z(I1 ⊗ I2 )), and for y ∈ Z(J ) we have
2138
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147 2
ord(J, y) = ord I1 ⊗ I2 , γ (y) = ord Ii , γ (y) i=1
=
2
ord(Ji , y) = (J1 ⊗ J2 , y).
i=1
By Theorem 3.9 and Lemma 8.8(i), we have Φ(ϕ) ∈ J = J1 ⊗ J2 . By Theorem 7.5, there are inner functions ψ1 , ψ2 in A such that ψi ∈ Ji for i = 1, 2 and ψ1 ψ2 ≺ Φ(ϕ). By Lemmas 8.6(ii) and 8.7(ii), Ψ (ψ1 )Ψ (ψ2 ) ≺ ϕ. By Lemma 8.8(ii), Ψ (ψi ) ∈ Ii for i = 1, 2. Hence I1 ⊗ I2 has the factorization property. 2 By the results in this section, A is a nice space to study the local ideal theory of H ∞ in G. But the local version of Theorem A may not be proved using Theorem 3.9. So Theorem A is a crucial theorem in ideal theory of H ∞ . 9. Ideal theory in H ∞ In this section, we shall answer Questions 1–4 given in the introduction. Let E be a compact and totally disconnected subset of G. For each x ∈ E, by Hoffman’s work there is an interpolating Blaschke product bx such that bx (x) = 0. Take δx , ηx , εx satisfying (8.3) and 0 < δx < δ(bx ). ∩ Ux is open and Let Ux be an open subset of M(H ∞ ) such that x ∈ Ux ⊂ {|bx | < εx } and E closed in E. By the compactness, there are x1 , x2 , . . . , xk ∈ E such that E = ki=1 E ∩ Uxi . Let j −1 E1 = E ∩ Ux1 and Ej = (E ∩ Uxj ) \ i=1 E ∩ Uxi for 2 i k. Then {Ej : 1 j k} is a set of mutually disjoint open and closed subsets of E. We have Ej ⊂ {|bxj | < εxj } for 1 j k. As a summary, we have the following. Lemma 9.1. Let E be a nonvoid compact and totally disconnected subset of G. Then there are interpolating Blaschke products b1 , b2 , . . . , b k and {Ei : 1 i k} a set of mutually disjoint open and closed subsets of E such that E = ki=1 Ei and Ei ⊂ {|bi | < εi }, where δi , ηi and εi satisfy (8.3) and 0 < δi < δ(bi ) for 1 i k. For E, we take the same notations given in Lemma 9.1. We are interested in the case that there is a closed ideal I in H ∞ satisfying Z(I ) = E and Z(I ) ⊂ G. Since I contains a CN Blaschke product, we have that maxx∈Z(bi ) #(Ei ∩ P (x) ∩ {|bi | < εi }) < ∞ for 1 i k. Therefore we assume that
max # Ei ∩ P (x) ∩ |bi | < εi < ∞,
x∈Z(bi )
1 i k.
(9.1)
If (9.1) holds for a partition E = ki=1 Ei given in Lemma 9.1, we say that E satisfies (9.1). Condition (9.1) corresponds to (8.4) for Ei and bi , 1 i k. nEi is a bounded For a bounded numbering function nE on E, let nEi = nE |Ei . By Section 8, n Ei = numbering function on Ei . By the locally stable property of a tilde function, we have nE is a bounded numbering function and nE nE on E. nE |Ei . Hence Let nE,1 be a bounded numbering function on E. For each positive integer j , we may define nE,j . Then nE,j nE,j +1 and we may define nE,∞ as before. We set also inductively nE,j +1 = NE,1 (x) = 1 for x ∈ E, and define NE,∞ as in Section 8.
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2139
Theorem 9.2. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1). Let nE,1 be a bounded numbering function on E. Then NE,∞ is bounded on E if and only if E,∞ = NE,∞ and nE,∞ = nE,∞ on E. nE,∞ is bounded on E. In this case, we have N Corollary 9.3. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1). If there is a bounded numbering function nE satisfying nE = nE on E, then NE,∞ is bounded on E. Proof. Let E = ki=1 Ei be a partition of E given in Lemma 9.1. For each 1 i k, put nEi ,1 = nE,1 |Ei . By Corollary 8.3, NEi ,∞ is bounded on Ei if and only if nEi ,∞ is bounded on Ei . Ei ,∞ = NEi ,∞ and nEi ,∞ = nEi ,∞ on Ei . Since NEi ,∞ = NE,∞ and In this case, we have N nEi ,∞ = nE,∞ on Ei , we get the assertion. 2 Lemma 9.4. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1). Then we have the following. (i) Z(I (E)) = E if and only if Z(I (Ei )) = Ei for every 1 i k. (ii) NE,∞ is bounded on E if and only if NEi ,∞ is bounded on Ei for every 1 i k. (iii) ord(I (E), x) is bounded on E if and only if ord(I (Ei ), x) is bounded on Ei for every 1 i k. (iv) ord(I (E), x) = NE,∞ (x) for every x ∈ E if and only if ord(I (Ei ), x) = NEi ,∞ (x) for every x ∈ Ei , 1 i k. Proof. Suppose that Z(I (E)) = E. For 1 i k, let Ui be an open subset such that Ei ⊂ Ui ⊂ U i ⊂ {|bi | < εi } and Ui ∩ Uj = ∅ for i = j . By [9], there is a CN Blaschke product ϕ in I (E). Let ϕi be a subproduct of ϕ with zeros Z(ϕ) ∩ Ui ∩ D counting multiplicities. Then ϕi ∈ I (Ei ) and Ei ⊂ Z(I (Ei )) ⊂ Z(ϕi ) ⊂ U i . Hence Z(I (Ei )) = Ei for 1 i k. ϕi ∈ I (Ei ). Suppose that Z(I (Ei )) = Ei for 1 i k. Then there is a CN Blaschke product Let U be an open subset of G such that E ⊂ U . Let ϕ be a subproduct of ki=1 ϕi with zeros Z( ki=1 ϕi ) ∩ U ∩ D counting multiplicities. Then ϕ ∈ I (E) and Z(ϕ) ⊂ U . This shows that Z(I (E)) = E. Thus we get (i). By the locally stable properties of NE,∞ and ord(I (E), x), NE,∞ = NEi ,∞ and ord(I (E), x) = ord(I (Ei ), x) on Ei for every 1 i k. By these facts, we get (ii), (iii) and (iv). 2 The following theorem answers Question 1. Theorem 9.5. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1). Then the following conditions are equivalent. (i) Z(I (E)) = E. (ii) NE,∞ is bounded on E. (iii) ord(I (E), x) is bounded in x ∈ E. In this case, we have that ord(I (E), x) = NE,∞ (x) for every x ∈ E.
2140
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Proof. Let E = ki=1 Ei be a partition of E given in Lemma 9.1. By Proposition 8.12 and Lemma 9.4, we get the assertion. 2 Since NE,∞ represents a geometrical quantity of E, Theorem 9.5(ii) gives a geometrical characterization of E in G satisfying Z(I (E)) = E. Corollary 9.6. Let I be a closed ideal in H ∞ satisfying E := Z(I ) ⊂ G. Then NE,∞ is bounded on E. Proof. We have I ⊂ I (E), so E ⊂ Z(I (E)) ⊂ Z(I ) = E. By Theorem 9.5, we get the assertion. 2 ∞ Let I be a closed k ideal in H satisfying E := Z(I ) ⊂ G. It is known that E is totally disconnected. Let E = i=1 Ei be a partition of E given in Lemma 9.1. For each 1 i k, let
Ii = f ∈ H ∞ : ord(f, x) ord(I, x), x ∈ Ei . Then Ii is a closed ideal in H ∞ , I ⊂ Ii and Z(Ii ) = Ei . ! For closed ideals I1 , I2 , . . . , Ik in H ∞ , we may define the tensor product ki=1 Ii and the !k closed tensor product i=1 Ii . Lemma 9.7. (i) ord(Ii , x) = ord(I, x) for x ∈ Ei , 1 i k. !k (ii) i=1 Ii = I . Proof. (i) We have ord(Ii , x) ord(I, x) for every x ∈ Ei . Since I ⊂ Ii , we have ord(Ii , x) ord(I, x) for x ∈ Ei . Thus we get (i). (ii) Let x ∈ E. Then there is a unique 1 i k satisfying x ∈ Ei . By (i), we have ord
k
"
Ii , x = ord(Ii , x) = ord(I, x).
i=1
Since x ∈ E is arbitrary, by Theorem A we get (ii).
2
Theorem 9.8. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ G and B ∈ I be a CN Blaschke product. Then I is generated by CN Blaschke products ϕ in I such that ϕ ≺ B as a closed ideal. Proof. Let E = Z(I ). Let {Ei : 1 i k}, {bi : 1 i k} and {εi : 1 i k} be given in Lemma 9.1. Take open subsets {Vi : 1 i k} of G such that Ei ⊂ Vi ⊂ {|bi | < εi } for 1 i k and Vi ∩ Vj = ∅ for i = j . For each 1 i k, let ϕi be the subproduct of B with zeros Z(B) ∩ Vi ∩ D counting multiplicities. Then ϕi ≺ B, Z(ϕi ) ⊂ V i and ord(B, x) = ord(ϕi , x) for x ∈ Ei . Hence by Lemma 9.7(i), we have ord(ϕi , x) = ord(B, x) ord(I, x) = ord(Ii , x),
x ∈ Ei .
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2141
By Theorem A, ϕi ∈ Ii . We note that ki=1 ϕi ≺ B. Since Z(Ii ) = Ei ⊂ {|bi | < εi }, by Corollary 8.10, Ii is generated by CN Blaschke products ψi ∈ Ii such that ψi ≺ ϕi as a closed ideal. By Lemma 9.7(ii), we get the assertion. 2 Theorem 9.9. Let I be a closed ideal in H ∞ satisfying E := Z(I ) ⊂ G. Let nE (x) = ord(I, x) nE = nE on E. for x ∈ E. Then nE is a bounded numbering function satisfying Proof. Since I contains a CN Blaschke product, nE is bounded on E. Let E = partition of E given in Lemma 9.1 and Ii = f ∈ H ∞ : ord(f, x) ord(I, x), x ∈ Ei ,
k
i=1 Ei
be a
1 i k.
Let nEi (x) = ord(Ii , x) for x ∈ Ei . By Lemma 9.7(i), we have nEi = nE on Ei . By Proposition 8.11, nEi = nEi on Ei . Since nE1 = nE |E1 , by the locally stable property, we have nE = nE on Ei for 1 i k. Thus we get the assertion. 2 nE1 = nE |E1 . Hence Theorem 9.10. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1) nE = nE on E. Then there is a closed ideal I and nE be a bounded numbering function satisfying in H ∞ such that Z(I ) = E and ord(I, x) = nE (x) for every x ∈ E. Proof. Let E = ki=1 Ei be a partition of E given in Lemma 9.1. Let nEi = nE |Ei for 1 i k. By the assumption and the locally stable property, we have nEi = nEi . By Proposition 8.13, there is closed ideal Ii in H ∞ such that Z(Ii ) = Ei and ord(Ii , x) = nEi (x) for every x ∈ Ei . !k Let I = i=1 Ii . Then I is a closed ideal and Z(I ) = E. For x ∈ E = Z(I ), there is a unique 1 i k satisfying x ∈ Ei and we have ord(I, x) = ord(Ii , x) = nEi (x) = nE (x). Thus we get the assertion.
2
Combining Theorem 9.10 with Theorem 9.9, we have the following corollary, which answers Question 2. Corollary 9.11. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1) and nE be a numbering function on E. Then there is a closed ideal I in H ∞ such that Z(I ) = E nE = nE on E. and ord(I, x) = nE (x) for every x ∈ E if and only if nE is bounded and Corollary 9.12. Let E be a nonvoid compact and totally disconnected subset of G satisfying (9.1). Suppose that NE,∞ is bounded on E. Let nE,1 be a bounded numbering function on E and I = f ∈ H ∞ : ord(f, x) nE,1 (x), x ∈ E . Then I is a closed ideal satisfying Z(I ) = E and ord(I, x) = nE,∞ . Proof. By the definition, I is a closed ideal in H ∞ . Since NE,∞ is bounded on E, by TheonE,∞ = nE,∞ on E. By Theorem 9.10, there is a closed ideal I1 rem 9.2 nE,∞ is bounded and in H ∞ such that Z(I1 ) = E and ord(I1 , x) = nE,∞ (x) for every x ∈ E. Since nE,1 nE,∞ , we
2142
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
have I1 ⊂ I . Hence E ⊂ Z(I ) ⊂ Z(I1 ) = E, so Z(I ) = E. Since nE,1 (x) ord(I, x) for x ∈ E, by Theorem 9.9 we have nE,∞ (x) ord(I, x) for x ∈ E, so nE,∞ (x) ord(I, x) ord(I1 , x) = nE,∞ (x),
x ∈ E.
Therefore ord(I, x) = ord(I1 , x) = nE,∞ (x) for every x ∈ E. By Theorem A, we get I = I1 .
2
Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2. We say that I1 ⊗ I2 has the factorization property if for every CN Blaschke product ϕ in I1 ⊗ I2 , there are CN Blaschke products ϕ1 , ϕ2 such that ϕi ∈ Ii for i = 1, 2 and ϕ1 ϕ2 ≺ ϕ. Theorem 9.13. Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2. Then I1 ⊗ I2 has the factorization property. Proof. We have Z(I1 ⊗ I2 )= Z(I1 ) ∪ Z(I2 ) ⊂ G. Let E =Z(I1 ) ∪ Z(I2 ). By Lemma 9.1, we have partitions Z(Ii ) = kj =1 Ei,j for i = 1, 2 such that { 2i=1 Ei,j : 1 j k} is a set of mutually disjoint open and closed subsets of E and E1,j ∪ E2,j ⊂ {|bj | < εj }. Let Ii,j = f ∈ H ∞ : ord(f, x) ord(Ii , x), x ∈ Ei,j for 1 j k and i = 1, 2. By Lemma 9.7(ii), Ii =
!k
j =1 Ii,j
for i = 1, 2. We have
k
I1 ⊗ I 2 =
" (I1,j ⊗ I2,j ),
Z(I1,j ⊗ I2,j ) = E1,j ∪ E2,j
j =1
and Z(I1,j ⊗ I2,j ) ∩ Z(I1, ⊗ I2, ) = ∅ for j = . Let ϕ ∈ I1 ⊗ I2 be a CN Blaschke product. Take {Uj : 1 j k} a set of open subsets of G such that E1,j ∪ E2,j ⊂ Uj for 1 j k and Uj ∩ U = ∅ for j = . Let ϕj be the subproduct of ϕ with zeros Z(ϕ) ∩ Uj ∩ D counting multiplicities. We have ord(ϕj , x) ord(I1 ⊗ I2 , x) = ord(I1,j ⊗ I2,j , x),
x ∈ E1,j ∪ E2,j
and kj =1 ϕj ≺ ϕ. By Theorem A, ϕj ∈ I1,j ⊗ I2,j . By Proposition 8.14, there are CN Blaschke products ψi,j ∈ Ii,j such that ψ1,j ψ2,j ≺ ϕj . We have qi :=
k j =1
k
ψi,j ∈
"
Ii,j = Ii ,
i = 1, 2
j =1
and q1 q2 ≺ ϕ. Hence I1 ⊗ I2 has the factorization property.
2
The following corollary answers Question 3. Corollary 9.14. Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2. Then I1 ⊗ I2 is a closed ideal in H ∞ , so I1 ⊗ I2 = I1 ⊗ I2 .
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2143
Proof. Trivially we have I1 ⊗ I2 ⊂ I1 ⊗ I2 . Let ϕ ∈ I1 ⊗ I2 be a CN Blaschke product. By Theorem 9.13, there are CN Blaschke products ϕ1 ∈ I1 and ϕ2 ∈ I2 such that ϕ1 ϕ2 = ϕ. Then ϕ ∈ I1 ⊗ I2 . By Theorem B, we get I1 ⊗ I2 ⊂ I1 ⊗ I2 , so we have the assertion. 2 Corollary 9.15. Let Ii , 1 i n be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for 1 i n. ! !n Then ni=1 Ii = i=1 Ii . A compact subset E of G is called ρ-separated if there exists a positive number δ satisfying ρ(x, y) δ for every x, y ∈ E with x = y. In [20], the authors showed that if I is countably generated closed ideal in H ∞ satisfying Z(I !) ⊂ G, then there are closed Gδ and ρ-separated subsets E1 , E2 , . . . , Ek of G such that I = ni=1 I (Ei ). So by Corollary 9.15, I coincides with the tensor product of the associated primary ideals I (Ei ), 1 i n. Let I1 , I2 , . . . , In , be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for 1 i n. Let n i=1
Ii =
n
fi : fi ∈ Ii , 1 i n .
i=1
!n !n We have ni=1 Ii ⊂ i=1 Ii . In the last part of this paper, we shall prove that ni=1 Ii = i=1 Ii . The following is proved in Theorem 3.6 in [19]. Lemma 9.16. Let E be a nonvoid compact and ρ-separated subset of G. Let A ⊂ D satisfy E ⊂ A and A ∩ D = A. Then there is an interpolating Blaschke product b such that E ⊂ Z(b) and Z(b) ∩ D ⊂ A. For f ∈ H ∞ , we put
Z∞ (f ) = x ∈ M H ∞ : ord(f, x) = ∞ . Lemma 9.17. Let I be a closed ideal in H ∞ satisfying Z(I ) ⊂ G and f ∈ I with f = 0. Then there is a CN Blaschke product ϕ such that f/ϕ ∈ H ∞ and ord(ϕ, x) ord(I, x) for every x ∈ Z(I ) \ Z∞ (f ). x). By Theorem B, there are interpolating Blaschke products Proof. Let mI = maxx∈Z(I ) ord(I, I b1 , b2 , . . . , bmI such that m b ∈ I . Let f = Bh, where B is a Blaschke product and h ∈ H ∞ i i=1 satisfies |h| > 0 on D. Since Z(I ) ⊂ Z(f ), we have Z(I ) \ Z∞ (f ) ⊂ Z(B) ∩ D.
(9.2)
Since Z(bi ) is ρ-separated, by Lemma 9.16 there is an interpolating Blaschke product ϕ1 such that Z(I ) ∩ Z(B) ∩ D ∩ Z(b1 ) ⊂ Z(ϕ1 )
and ϕ1 ≺ B.
(9.3)
If Z(I ) ∩ Z(B) ∩ D ∩ Z(b1 ) = ∅, then we put ϕ1 = 1. Also there is an interpolating Blaschke product ϕ2 such that
2144
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
Z(I ) ∩ Z(B/ϕ1 ) ∩ D ∩ Z(b2 ) ⊂ Z(ϕ2 )
and ϕ2 ≺ B/ϕ1 .
If Z(I ) ∩ Z(B/ϕ1 ) ∩ D ∩ Z(b2 ) = ∅, then we put ϕ2 = 1. Repeating the same argument, there are interpolating Blaschke products ϕ3 , ϕ4 , . . . , ϕmI such that for each 3 j mI we have
B
Z(I ) ∩ Z j −1 i=1
ϕi
∩ D ∩ Z(bj ) ⊂ Z(ϕj )
(9.4)
and B ϕj ≺ j −1 i=1
. ϕi
I We note that ϕi = 1 for some 1 i mI . Let ϕ = m i=1 ϕi . Then ϕ is a CN Blaschke product and f/ϕ ∈ H ∞ . I Let x ∈ Z(I ) \ Z∞ (f ). Since f and m i=1 bi are contained in I , we have ord(I, x) ord(f, x)
ord(I, x) ord
and
m I
(9.5)
bi , x .
i=1
By (9.2), we have x ∈ Z(I ) ∩ Z(B) ∩ D, so by (9.3) we have ord(b1 , x) ord(ϕ1 , x).
(9.6)
Since ord(f, x) < ∞, we have 0 ord(f/ϕ, x) < ∞. If ord(f/ϕ, x) = 0, then ord(f, x) = ord(ϕ, x). Hence by (9.5), we have ord(I, x) ord(ϕ, x). Suppose that 1 ord(f/ϕ, x) < ∞. Then 1 ord(B/ϕ, x) < ∞, so we have B x ∈ Z j −1 i=1
∩ D,
ϕi
2 j mI .
Hence by (9.4), ord(bj , x) ord(ϕj , x) for 2 j mI . Therefore by (9.5) and (9.6), we have ord(I, x)
mI j =1
ord(bj , x)
mI
ord(ϕj , x) = ord(ϕ, x).
2
j =1
The following theorem answers Question 4. Theorem 9.18. Let I1 , I2 be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for i = 1, 2. Then I1 I2 = I1 ⊗ I2 , so I1 I2 is a closed ideal. Proof. Let J = I1 ⊗I2 . Since Z(J ) = Z(I1 )∪Z(I2 ) ⊂ G, Z(J ) is totally disconnected. Trivially we have I1 I2 ⊂ J . To show the reverse inclusion, let f ∈ J with f = 0. Let f = Bh, where B is a Blaschke product and h ∈ H ∞ satisfies |h| > 0 on D. Then Z(h) is a closed Gδ -set. By
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2145
Corollary 3.1 in [16], Z∞ (B) is also a closed Gδ -set. Then Z∞ (f ) = Z∞ (B) ∪ Z(h) is a closed Gδ -set. There is a sequence of open subsets {Un }n of G such that Z(J ) \ Z∞ (f ) ⊂
∞
(9.7)
Un ,
n=1
Un ∩ U = ∅,
n = ,
(9.8)
Z(J ) ∩ Un is open and closed in Z(J )
(9.9)
and Z∞ (f ) ∩ Un = ∅
for n 1.
(9.10)
By Lemma 9.17, there is a CN Blaschke product ϕ such that f/ϕ ∈ H ∞ and ord(ϕ, x) ord(J, x),
x ∈ Z(J ) \ Z∞ (f ).
(9.11)
Then we have ϕ ≺ B and Z∞ (B) = Z∞ (B/ϕ), so f = (B/ϕ)hϕ
and Z∞ (f ) = Z∞ (B/ϕ) ∪ Z(h).
By Theorem 3.1 in [16], there are Blaschke products B1 , B2 such that B/ϕ = B1 B2 and Z∞ (B/ϕ) = Z∞ (B1 ) = Z∞ (B2 ). Since |h| > 0 on D, there is h1/2 ∈ H ∞ such that h = (h1/2 )2 . Hence we have
f = B1 h1/2 B2 h1/2 ϕ
(9.12)
Z∞ (f ) = Z∞ B1 h1/2 = Z∞ B2 h1/2 .
(9.13)
and
By (9.11), we have Z(J ) \ Z∞ (f ) ⊂ Z(ϕ). By (9.10), Z(J ) ∩ Un ⊂ Z(ϕ) for every n 1. Let ϕn be the subproduct of ϕ with zeros Z(ϕ) ∩ Un ∩ D counting multiplicities. By (9.8), we have ∞
ϕn ≺ ϕ
(9.14)
n=1
and by (9.11) we have ord(J, x) ord(ϕ, x) = ord(ϕn , x),
x ∈ Z(J ) ∩ Un .
(9.15)
Since J = I1 ⊗ I2 and Z(J ) = Z(I1 ) ∪ Z(I2 ), by (9.9) for each n 1 Z(Ii ) ∩ Un is open and closed in Z(Ii ) for i = 1, 2. Let Ii,n = f ∈ H ∞ : ord(f, x) ord(Ii , x), x ∈ Z(Ii ) ∩ Un ,
i = 1, 2
2146
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
and Jn = f ∈ H ∞ : ord(f, x) ord(J, x), x ∈ Z(J ) ∩ Un . Then Z(Ii,n ) = Z(Ii ) ∩ Un , ord(Ii,n , x) = ord(Ii , x) for x ∈ Z(Ii ) ∩ Un , Z(Jn ) = Z(J ) ∩ Un and ord(Jn , x) = ord(J, x) for x ∈ Z(J ) ∩ Un . We have also
Z(Jn ) = Z(I1 ) ∩ Un ∪ Z(I2 ) ∩ Un = Z(I1,n ) ∪ Z(I2,n ), and for x ∈ Z(Jn ) ord(Jn , x) = ord(J, x) = ord(I1 , x) + ord(I2 , x) = ord(I1,n , x) + ord(I2,n , x) = ord(I1,n ⊗ I2,n , x). Therefore by Theorem A, we have Jn = I1,n ⊗ I2,n . By (9.15), ord(Jn , x) ord(ϕn , x) for x ∈ Z(Jn ), so by Theorem A again ϕn ∈ Jn = I1,n ⊗ I2,n . By Theorem 9.13, there are Blaschke products ϕ1,n ∈ I1,n such that ϕn = ϕ1,n ϕ2,n . Let ψi =
∞
n=1 ϕi,n
ψ1 ψ2 =
∞
and ϕ2,n ∈ I2,n
(9.16)
for i = 1, 2. By (9.14),
ϕ1,n ϕ2,n =
n=1
∞
ϕn ≺ ϕ.
n=1
Let b1 = ψ1 and b2 = ψ2 (ϕ/(ψ1 ψ2 )). Then ϕ = b1 b2 . Let x ∈ Z(Ii ) \ Z∞ (f ) for i = 1, 2. Then x ∈ Z(J ) \ Z∞ (f ). By (9.7) and (9.8), there is a unique n such that x ∈ Z(Ii ) ∩ Un . Hence ord(bi , x) ord(ψi , x) = ord(ϕi,n , x) ord(Ii,n , x)
by (9.16)
= ord(Ii , x). Hence ord(bi , x) ord(Ii , x),
x ∈ Z(Ii ) \ Z∞ (f ), i = 1, 2.
(9.17)
Let f1 = b1 B1 h1/2 and f2 = b2 B2 h1/2 . By (9.12), we have f = f1 f2 . To show fi ∈ Ii , let x ∈ Z(Ii ). If x ∈ Z(Ii ) \ Z∞ (f ), then by (9.17) we have ord(fi , x) ord(Ii , x). If x ∈ Z∞ (f ), by (9.13) we have ord(fi , x) = ∞ > ord(Ii , x). By Theorem A, we get fi ∈ Ii for i = 1, 2. Hence f = f1 f2 ∈ I1 I2 . Thus I1 ⊗ I2 ⊂ I1 I2 , so we get I1 ⊗ I2 = I1 I2 . 2
K.J. Izuchi, Y. Izuchi / Journal of Functional Analysis 260 (2011) 2086–2147
2147
Corollary 9.19. Let I1 , I2 , . . . , Ik be closed ideals in H ∞ satisfying Z(Ii ) ⊂ G for 1 i k. !k Then ki=1 Ii = i=1 Ii and ki=1 Ii is a closed ideal in H ∞ . References [1] J. Bourgain, On finitely generated closed ideals in H ∞ (D), Ann. Inst. Fourier (Grenoble) 35 (1985) 163–174. [2] L. Carleson, An interpolation problem for bounded analytic functions, Amer. J. Math. 80 (1958) 921–930. [3] L. Carleson, Interpolations by bounded analytic functions and the corona problem, Ann. of Math. 76 (1962) 547– 559. [4] S. Chang, A characterization of Douglas subalgebras, Acta Math. 137 (1976) 81–89. [5] R. Engelking, General Topology, Heldermann Verlag, Berlin, 1989. [6] T. Gamelin, Uniform Algebras, Prentice Hall, New Jersey, 1969. [7] J. Garnett, Bounded Analytic Functions, Academic Press, New York, 1981. [8] P. Gorkin, Functions not vanishing on trivial Gleason parts of Douglas algebras, Proc. Amer. Math. Soc. 104 (1988) 1086–1090. [9] P. Gorkin, R. Mortini, Interpolating Blaschke products and factorization in Douglas algebras, Michigan Math. J. 38 (1991) 147–160. [10] P. Gorkin, R. Mortini, A. Nicolau, The generalized corona theorem, Math. Ann. 301 (1995) 135–154. [11] P. Gorkin, K. Izuchi, R. Mortini, Higher order hulls in H ∞ II, J. Funct. Anal. 177 (2000) 107–129. [12] C. Guillory, K. Izuchi, D. Sarason, Interpolating Blaschke products and division in Douglas algebras, Proc. Roy. Irish Acad. Sect. A 84 (1984) 1–7. [13] K. Hoffman, Banach Spaces of Analytic Functions, Prentice Hall, New Jersey, 1962. [14] K. Hoffman, Bounded analytic functions and Gleason parts, Ann. of Math. 86 (1967) 74–111. [15] K.J. Izuchi, Countably generated Douglas algebras, Trans. Amer. Math. Soc. 299 (1987) 171–192. [16] K. Izuchi, Factorization of Blaschke products, Michigan Math. J. 40 (1993) 53–75. [17] K.J. Izuchi, Interpolating Blaschke products and factorization theorems, J. Lond. Math. Soc. (2) 50 (1994) 547–567. [18] K.J. Izuchi, The structure of the maximal ideal space of H ∞ , Sugaku Expositions 17 (2004) 171–184. [19] K.J. Izuchi, Y. Izuchi, Factorization of Blaschke products and primary ideals in H ∞ , J. Funct. Anal. 259 (2010) 975–1013. [20] K.J. Izuchi, Y. Izuchi, Gleason parts and countably generated closed ideals in H ∞ , preprint. [21] H.-M. Lingenberg, Interpolation sets in the maximal ideal space of H ∞ , Michigan Math. J. 39 (1992) 53–63. [22] D. Marshall, Subalgebras of L∞ containing H ∞ , Acta Math. 137 (1976) 91–98. [23] D. Sarason, Function Theory on the Unit Circle, Lectures Notes, Virginia Polytech. Inst. and State Univ., Blacksburg, VA, 1978. [24] V. Tolokonnikov, Blaschke products with the Carleson–Newman condition, and ideals of the algebra H ∞ , J. Soviet Math. 42 (1988) 1603–1610. ˇ [25] R.C. Walker, The Stone–Cech Compactification, Springer-Verlag, Berlin, 1974.
Journal of Functional Analysis 260 (2011) 2148–2162 www.elsevier.com/locate/jfa
On the analyticity and the almost periodicity of the solution to the Euler equations with non-decaying initial velocity Okihiro Sawada a , Ryo Takada b,∗ a Department of Mathematics, Darmstadt University of Technology, Schlossgartenstrasse 7,
D-64289 Darmstadt, Germany b Mathematical Institute, Tohoku University, 6-3 Aoba, Sendai 980-8578, Japan
Received 30 July 2010; accepted 11 December 2010 Available online 24 December 2010 Communicated by J. Coron
Abstract The Cauchy problem of the Euler equations in the whole space is considered with non-decaying initial 1 . It is proved that if the initial velocity is real analytic then the solution is velocity in the frame work of B∞,1 also real analytic in spatial variables. Furthermore, a new estimate for the size of the radius of convergence of Taylor’s expansion is established. The key of the proof is to derive the suitable estimates for the higher order derivatives of the bilinear terms. It is also shown the propagation of the almost periodicity in spatial variables. © 2010 Elsevier Inc. All rights reserved. Keywords: The Euler equations; Analyticity; Almost periodicity; Non-decaying initial velocity
* Corresponding author.
E-mail addresses: [email protected] (O. Sawada), [email protected] (R. Takada). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.011
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
2149
1. Introduction and main results Let us consider the Euler equations in Rn with n 2, describing the motion of perfect incompressible fluids, ⎧ ∂u ⎪ ⎪ + (u · ∇)u + ∇p = 0 in Rn × (0, T ), ⎨ ∂t (E) div u = 0 in Rn × (0, T ), ⎪ ⎪ ⎩ u(x, 0) = u0 (x) in Rn , where the unknown functions u = u(x, t) = (u1 (x, t), . . . , un (x, t)) and p = p(x, t) denote the velocity field and the pressure of the fluid, respectively, while u0 = u0 (x) = (u10 (x), . . . , un0 (x)) denotes the given initial velocity field. The purpose of this paper is to show the propagation properties of the analyticity and the almost periodicity in spatial variables for the solution of (E) with non-decaying initial velocity. For the local-in-time existence and uniqueness of solutions for (E), Kato [5] proved that for the given initial velocity field u0 ∈ H m (Rn )n with m > n/2 + 1, there exist T = T (u0 H m ) and a unique solution u of (E) in the class C([0, T ]; H m (Rn )n ). Kato and Ponce [6] extended this result to the fractional-ordered Sobolev spaces W s,p (Rn )n = (1 − )−s/2 Lp (Rn )n for s > n/p + 1, 1 < p < ∞. In order to treat the initial velocity with the minimal regularity, Pak and Park [8] 1 (Rn ) and obtained the following result. studied in the framework of B∞,1 1 (Rn )n with div u = 0, there exists Theorem 1.1. (See Pak and Park [8].) For every u0 ∈ B∞,1 0 1 n n a T > 0 such that (E) possesses a unique solution u ∈ C([0, T ]; B∞,1 (R ) ) with the pressure ∇p = ni,j =1 ∇(−)−1 ∂xi uj ∂xj ui . 1 (Rn ) and its properties will be explained in Section 2. The definition of the Besov space B∞,1 The reader can find the other results concerning the local-in-time existence and uniqueness of solutions to (E) in the reference of [8]. It has already been known that Kato’s solution is real analytic in spatial variables if u0 ∈ C ω (Rn )n ; see Alinhac and Métivier [2], Kukavica and Vicol [7] and the references therein. In this paper, we prove the propagation of analyticity of Pak–Park’s solutions. In particular, we give an improvement for the estimate for the size of the radius of convergence of Taylor’s expansion. Before stating our result about the analyticity, we set some notation. Let N0 := N ∪ {0}, where N is the set of all positive integers. For k ∈ N0 , put
mk := c
k! , (k + 1)2
where c is a positive constant such that one has α m|β| m|α−β| m|α| , α ∈ Nn0 , β 0βα α m|β|−1 m|α−β|+1 |α|m|α| , α ∈ Nn0 \ {0}n . β
0<βα
2150
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
For example, it suffices to take c 1/16. For the detail, see Kahane [4] and Alinhac and Métivier [1]. Our result on the propagation of the analyticity now reads: 1 (Rn )n with div u = 0, and let u ∈ C([0, T ]; B 1 (Rn )n ) be the Theorem 1.2. Let u0 ∈ B∞,1 0 ∞,1 solution of (E). Suppose that u0 ∈ C ω (Rn )n in the following sense: there exist positive constants K0 and ρ0 such that
α
∂ u0
x
1 B∞,1
−|α|
K0 ρ0
m|α|
for all α ∈ Nn0 . Then, u(·, t) ∈ C ω (Rn )n for all t ∈ [0, T ] and satisfies the following estimate: there exist positive constants K := K(n, K0 ), L := L(n, K0 ) and λ := λ(n) such that
α
∂ u(·, t)
x
1 B∞,1
ρ0 K L
−|α|
m|α| (1 + t)
max{|α|−1,0}
t
exp λ|α|
u(·, τ )
1 B∞,1
dτ
(1.1)
0
for all α ∈ Nn0 and t ∈ [0, T ]. Remark 1.3. (i) Since K, L and λ do not depend on t T , (1.1) gives a grow-rate estimate for large time behavior of Pak–Park’s solutions provided 0 u(τ )B 1 dτ is uniformly bounded in ∞,1 0 1 )(Rn )n , we may obtain the similar estimates of (1.1) replaced time. When u0 ∈ (B˙ ∞,1 ∩ B˙ ∞,1 t t t dτ by 0 ∇u(τ )L∞ dτ or 0 rot u(τ )B˙ 0 dτ . 1 0 u(τ )B∞,1 ∞,1 (ii) From (1.1), one can derive the estimate for the size of the uniform analyticity radius of the solutions as follows: t
α 1
∂x u(t)L∞ − |α| ρ0 −1
lim inf u(τ ) B 1 dτ . (1 + t) exp −λ ∞,1 |α|→∞ α! L 0
Recently, Kukavica and Vicol [7] considered the vorticity equations of (E) in H s (T3 )3 with s > 7/2, and obtained the following estimate for uniform analyticity radius: t
α 1
∂x rot u(t)L∞ − |α| 2 −1 ρ 1+t exp −λ ∇u(τ ) L∞ dτ lim inf |α|→∞ α! 0
with some ρ := ρ(s, rot u0 ) and λ = λ(s). Hence our result is an improvement of the previous analyticity-rate in the sense that (1 + t 2 )−1 is replaced by (1 + t)−1 , and clarifies that ρ = ρ0 /L. The proof of Theorem 1.2 is based on the inductive argument with respect to |α|. The key of the proof is to derive the suitable estimates for the higher order derivatives of the nonlinear term of (E). To this end, we appeal to the technique due to [4], and use the commutator type estimates, the bilinear estimates (see Lemma 2.2 and Lemma 2.3 below) and the trajectory flow argument. We next consider the almost periodicity in spatial variables. We recall the definition of the almost periodicity in the sense of Bohr.
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
2151
Definition 1.4. Let f be a bounded continuous function on Rn . Put Σf := τξ f ξ ∈ Rn ⊂ L∞ Rn ,
τξ f := f (· + ξ ).
Then, f is called almost periodic in Rn if Σf is relatively compact in L∞ (Rn ). We now state the second result of this paper. 1 (Rn )n with div u = 0 and let u ∈ C([0, T ]; B 1 (Rn )n ) be the Theorem 1.5. Let u0 ∈ B∞,1 0 ∞,1 solution of (E). Suppose that u0 is almost-periodic in Rn , then the solution u(·, t) of (E) is almost-periodic in Rn for all t ∈ [0, T ].
The same assertion is known for the solutions to the Navier–Stokes equations by Giga, Mahalov and Nicolaenko [3]. Recently, Taniuchi, Tashiro and Yoneda [9] proved the almost periodicity of weak solutions to (E) in the whole plane R2 when u0 ∈ L∞ (R2 )2 . On the other hand, in the Theorem 1.5, we treat the classical solutions and all space-dimensions n 2. The proof of Theorem 1.5 is based on the argument given by [3]. The key of the proof is to use the estimate concerning the continuity with respect to the initial velocities, see Lemma 4.1 below. This paper is organized as follows. In Section 2, we introduce the notation that will be used throughout the paper, and recall the key lemmas which play important roles in our proof. In Sections 3 and 4, we present the proof of Theorems 1.2 and 1.5, respectively. 2. Preliminaries In this section, we introduce some notation and the function spaces. Let S (Rn ) be the Schwartz class of all rapidly decreasing functions, and let S (Rn ) be the space of all tempered distributions. We first recall the definition of the Littlewood–Paley operators. Let Φ and ϕ be the functions in S (Rn ) satisfying the following properties: ⊂ ξ ∈ Rn |ξ | 5/6 , supp Φ )+ Φ(ξ
∞
supp ϕ ⊂ ξ ∈ Rn 3/5 |ξ | 5/3 , ϕj (ξ ) = 1,
ξ ∈ Rn ,
j =0
where ϕj (x) = 2j n ϕ(2j x) and f denotes the Fourier transform of f ∈ S (Rn ) on Rn . Given f ∈ S (Rn ), we denote ⎧ ⎨ Φ ∗ f, j = −1, j f := ϕj ∗ f, j 0, ⎩ 0, j −2,
Sk f :=
j f,
k ∈ Z,
j k
s (Rn ) by the where ∗ denotes the convolution operator. Then, we define the Besov spaces Bp,q following definition. s (Rn ) is defined to be the set Definition 2.1. For s ∈ R and 1 p, q ∞, the Besov space Bp,q n of all tempered distributions f ∈ S (R ) such that the norm
2152
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
s f Bp,q = 2sj j f Lp j ∈Z q is finite. s (Rn ) is a Banach space with its norm · s . It is easy to see that Note that Bp,q Bp,q
f f L∞ =
j
j ∈Z
L∞
j f L∞ = f B 0 . ∞,1
j ∈Z
0 (Rn ) ⊂ L∞ (Rn ), and this embedding is continuous. It is also easily obtained Therefore B∞,1 0 that B∞,1 (Rn ) ⊂ BU C(Rn ), where BU C(Rn ) is the space of all bounded uniformly continu1 (Rn ) ⊂ W 1,∞ (Rn ), which is conous functions on Rn . Analogously, we can prove that B∞,1 1 tinuous embedding. Moreover, B∞,1 (R) contains some non-decaying functions, for example, −x
]. For more details, see Triebel [10]. [x → sin x], [x → cos x] and [x → tanh x = eex −e +e−x We now prepare the commutator type estimates and the bilinear estimates for nonlinear terms of (E). x
Lemma 2.2. (See Pak and Park [8].) There exists a positive constant C = C(n) such that j ∈Z
2j (Sj −2 u · ∇)j f − j (u · ∇)f L∞ CuB 1 f B 1 ∞,1
∞,1
1 (Rn )n+1 with div u = 0. holds for all (u, f ) ∈ B∞,1
Lemma 2.3. There exists a positive constant C = C(n) such that f gB 1
∞,1
C f L∞ gB 1
∞,1
+ gL∞ f B 1
∞,1
1 (Rn ). holds for all f, g ∈ B∞,1
The proof of Lemma 2.3 follows from the characterization by differences of Besov norm, easily; see [10]. Hence we skip the detail of the proof. Next, we give the estimate for the gradient of pressure π = ∇p. Lemma 2.4. (See Pak and Park [8].) There exists a positive constant C = C(n) such that
π(u, v)
1 B∞,1
CuB 1 vB 1 ∞,1
∞,1
1 (Rn )n with div u = div v = 0, where holds for all u, v ∈ B∞,1
π(u, v) =
n j,k=1
∇(−)−1 ∂xj uk ∂xk v j = ∇(−)−1 div (u · ∇)v .
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
2153
Finally, we recall the Gronwall inequality. Lemma 2.5 (The Gronwall inequality). Let A 0, and let f, g and h be non-negative, continuous functions on [0, T ] satisfying t
t g(s) ds +
f (t) A +
h(s)f (s) ds
0
0
for all t ∈ [0, T ]. Then it holds that f (t) Ae
t
t
0 h(τ ) dτ
+
e
t s
h(τ ) dτ
g(s) ds
0
for all t ∈ [0, T ]. 3. Proof of Theorem 1.2 s (Rn )n ) for all s 1, if u ∈ Proof of Theorem 1.2. We first notice that u ∈ C([0, T ]; B∞,1 0 s n n ∞ n n B∞,1 (R ) for all s 1. Hence u(·, t) ∈ C (R ) for all t ∈ [0, T ] and then u ∈ C ∞ (Rn × [0, T ])n , if u0 ∈ C ∞ (Rn )n . Moreover, the time-interval in which the solution exists does not depend on s. Indeed, T C/u0 B 1 with some constant C depending only on n, and the ∞,1 solution u satisfies
sup u(t) B 1
∞,1
t∈[0,T ]
C0 u0 B 1
(3.1)
∞,1
with some positive constant C0 depending only on n. Now let u0 satisfy the assumption of Theorem 1.2. We discuss with the induction argument. In the case α = 0, (1.1) follows from (3.1) with K = C0 K0 . Next, we consider the case |α| 1. We first introduce some notation. For l ∈ N and λ, L > 0, we put
Xl (t) := max ∂xα u(t) B 1 , |α|=l
Yl = Ylλ,L
∞,1
:= max sup
1kl t∈[0,T ]
t ∈ [0, T ],
Mk (t) Xk (t) , mk
where −λk Mk (t) = Mkλ,L (t) := ρ0k L−(k−1) (1 + t)−(k−1) e
t 0
u(τ )B 1
∞,1
dτ
.
The similar notation were used in [1] and [2]. In what follows, we shall show that Y|α| 2K0 for all α ∈ Nn0 with |α| 1 when λ and L are sufficiently large. We now consider the case |α| = 1. Let k be an integer with 1 k n. Taking the differential operation ∂xk to the first equation of (E), we have
2154
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
∂t (∂xk u) + (∂xk u · ∇)u + (u · ∇)∂xk u + ∂xk π(u, u) = 0,
(3.2)
where ∇p = π(u, u) =
n
∇(−)−1 ∂xj uk ∂xk uj = ∇(−)−1 div (u · ∇)u .
j,k=1
Applying the Littlewood–Paley operator j and adding the term (Sj −2 u · ∇)j (∂xk u) to the both sides of (3.2), we have ∂t j (∂xk u) + (Sj −2 u · ∇)j (∂xk u) = (Sj −2 u · ∇)j (∂xk u) − j (u · ∇)∂xk u − j (∂xk u · ∇)u − j ∂xk π(u, u) .
(3.3)
Here we consider the family of trajectory flows {Zj (y, t)} defined by the solution of the ordinary differential equations ⎧ ⎨ ∂ Zj (y, t) = Sj −2 u Zj (y, t), t , ∂t ⎩ Z (y, 0) = y. j
(3.4)
Note that Zj ∈ C 1 (Rn × [0, T ])n , and div Sj −2 u = 0 implies that each y → Zj (y, t) is a volume preserving mapping from Rn onto itself. From (3.3) and (3.4), we see that ∂t j (∂xk u) + (Sj −2 u · ∇)j (∂xk u)|(x,t)=(Zj (y,t),t) =
∂ j (∂xk u) Zj (y, t), t , ∂t
which yields that j (∂xk u) Zj (y, t), t = j (∂xk u0 )(y) −
t
j (∂xk u · ∇)u Zj (y, s), s ds
0
t +
(Sj −2 u · ∇)j (∂xk u) − j (u · ∇)∂xk u Zj (y, s), s ds
0
t −
j ∂xk π(u, u) Zj (y, s), s ds.
(3.5)
0
Since the map y → Zj (y, t) is bijective and volume-preserving for all t ∈ [0, T ], by taking the L∞ -norm with respect to y to both sides of (3.5), we have
j (∂x u)(t) ∞ j (∂x u0 ) ∞ + k k L L
t 0
j (∂x u · ∇)u (s) ∞ ds k L
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
t +
2155
(Sj −2 u · ∇)j (∂x u) − j (u · ∇)∂x u (s) ∞ ds k k L
0
t +
j ∂x π(u, u) (s) ∞ ds. k L
(3.6)
0
Multiplying both sides of (3.6) by 2j and then taking the 1 -norm in j , we obtain that
∂x u(t) 1 k B
t
∞,1
∂xk u0 B 1
+
∞,1
(∂x u · ∇)u(s) 1 ds + k B ∞,1
0
+
t 0 j ∈Z
t
∂x π(u, u)(s) 1 ds k B ∞,1
0
2j (Sj −2 u · ∇)j (∂xk u) − j (u · ∇)∂xk u (s) L∞ ds
=: I1 + I2 + I3 + I4 .
(3.7)
It follows from the assumption on u0 that I1 K0 ρ0−1 m1 .
(3.8)
From Lemma 2.3, we see that t I2 C
∇u(s)
∞ ∇u(s)
L
t 1 B∞,1
ds C
0
u(s)
1 B∞,1
X1 (s) ds,
(3.9)
0
where we used the continuous embedding ∇f L∞ Cf B 1 . For the pressure term I3 , it ∞,1 follow from Lemma 2.4 that t I3 2
π(∂x u, u)(s) 1 ds C k B
t
∞,1
0
u(s)
1 B∞,1
X1 (s) ds.
(3.10)
0
For the estimate of I4 , we have from Lemma 2.2 that t I4 C
u(s)
1 B∞,1
∂x u(s) 1 ds C k B
t
∞,1
0
u(s)
1 B∞,1
X1 (s) ds.
(3.11)
0
Substituting (3.8), (3.9), (3.10) and (3.11) into (3.7), we have
∂x u(t) 1 k B
∞,1
K0 ρ0−1 m1
t + C1 0
u(s)
1 B∞,1
X1 (s) ds
(3.12)
2156
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
with some positive constant C1 depending only on n. Since k ∈ {1, . . . , n} is arbitrary, it follows from (3.12) that
X1 (t) K0 ρ0−1 m1
t + C1
u(s)
1 B∞,1
X1 (s) ds,
0
which implies by Lemma 2.5 that X1 (t) K0 ρ0−1 m1 e
C1
t 0
u(τ )B 1
∞,1
dτ
.
(3.13)
By choosing λ C1 , we obtain from (3.13) that (C1 −λ) M1 (t) X1 (t) K0 e m1
t 0
u(τ )B 1
∞,1
dτ
K0 ,
which yields that Y1 K0 .
(3.14)
Next, we consider the case |α| 2. Let α be a multi-index with |α| 2. Taking the differential operation ∂xα to the first equation of (E), we have α α ∂xβ u · ∇ ∂xα−β u + ∂xα π(u, u) = 0. ∂t ∂x u + β
(3.15)
0βα
Applying the Littlewood–Paley operator j and adding the term (Sj −2 u · ∇)j (∂xα u) to the both sides of (3.15), we have ∂t j ∂xα u + (Sj −2 u · ∇)j ∂xα u = (Sj −2 u · ∇)j ∂xα u − j (u · ∇)∂xα u α j ∂xβ u · ∇ ∂xα−β u − j ∂xα π(u, u) . − β
(3.16)
0<βα
Similarly to the case of |α| = 1, we have from (3.16) that t α
α
α
j ∂ u (t) ∞ j ∂ u0 ∞ +
j ∂ β u · ∇ ∂ α−β u (s) ∞ ds x x x x L L L β 0<βα
0
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
t +
α
j ∂ π(u, u) (s)
x
L∞
2157
ds
0
t +
(Sj −2 u · ∇)j ∂ α u − j (u · ∇)∂ α u (s)
x
x
L∞
ds.
(3.17)
0
Multiplying both sides of (3.17) by 2j and then taking the 1 -norm in j , we obtain that
α
∂ u(t)
x
1 B∞,1
t α
∂ β u · ∇ ∂ α−β u(s) 1 ds + x x B∞,1 ∞,1 β
∂xα u0 B 1 t +
0<βα
0
α
∂ π(u, u)(s)
ds
x
1 B∞,1
0
+
t 0 j ∈Z
2j (Sj −2 u · ∇)j ∂xα u − j (u · ∇)∂xα u (s) L∞ ds
=: J1 + J2 + J3 + J4 .
(3.18)
It follows from the assumption on u0 that −|α|
J1 K0 ρ0
m|α| .
(3.19)
For the estimate of J2 , we have from Lemma 2.3 and the continuous embedding that t α
∂ β u(s) ∞ ∇∂ α−β u(s) 1 + ∇∂ α−β u(s) ∞ ∂ β u(s) 1 ds J2 C x x x x L B L B ∞,1 ∞,1 β 0<βα
0
n t
α
∂x u(s) ∞ ∇∂xα−ej u(s) 1 ds =C j L B∞,1 ej j =1
0
t α
∂ β u(s) ∞ ∇∂ α−β u(s) 1 ds +C x x L B∞,1 β 0<βα |β|2
t +C
∇u(s)
0
L∞
α
∂ u(s)
x
1 B∞,1
ds
0 t α
∇∂ α−β u(s) ∞ ∂ β u(s) 1 ds +C x x L B∞,1 β 0<β<α
0
2158
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
t C|α|
u(s)
t α X|β|−1 (s)X|α−β|+1 (s) ds 1 X|α| (s) ds + C B∞,1 β 0<βα |β|2
0
0
t α +C X|β| (s)X|α−β| (s) ds. β 0<β<α
(3.20)
0
For the pressure term J3 , from Lemma 2.4, we have t α
π ∂ β u, ∂ α−β u (s) 1 ds J3 x x B∞,1 β 0βα
0
t α
∂ β u(s) 1 ∂ α−β u(s) 1 ds x x B B∞,1 ∞,1 β
C
0βα
t C
0
u(s)
t α X|β| (s)X|α−β| (s) ds. 1 X|α| (s) ds + C B∞,1 β 0<β<α
0
(3.21)
0
For the estimate of J4 , it follows from Lemma 2.2 that t J4 C
u(s)
1 B∞,1
α
∂ u(s)
x
1 B∞,1
ds
0
t C
u(s)
1 B∞,1
(3.22)
X|α| (s) ds.
0
Substituting (3.19), (3.20), (3.21) and (3.22) to (3.18), we have
α
∂ u(t) 1 x B
∞,1
−|α| K0 ρ0 m|α|
t + C|α|
u(s)
1 B∞,1
X|α| (s) ds
0
+C
α β
0<βα |β|2
t X|β|−1 (s)X|α−β|+1 (s) ds 0
t α +C X|β| (s)X|α−β| (s) ds. β 0<β<α
0
(3.23)
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
2159
Furthermore, for the third term of the right-hand side of (3.23), we see that t α X|β|−1 (s)X|α−β|+1 (s) ds β
0<βα |β|2
0
t α M|β|−1 (s) M|α−β|+1 (s) m|β|−1 m|α−β|+1 ds = X|β|−1 (s) X|α−β|+1 (s) β m|β|−1 m|α−β|+1 M|β|−1 (s) M|α−β|+1 (s) 0<βα |β|2
0
t α λ|α| 0s u(τ )B 1 dτ −|α| |α|−2 2 |α|−2 ∞,1 m|β|−1 m|α−β|+1 ρ0 L (Y|α|−1 ) (1 + s) e ds β 0<βα |β|2
0
−|α| |α|m|α| ρ0 L|α|−2 (Y|α|−1 )2
t
(1 + s)|α|−2 e
λ|α|
s 0
u(τ )B 1
∞,1
dτ
(3.24)
ds.
0
Similarly, for the fourth term of the right-hand side of (3.23), we have t α X|β| (s)X|α−β| (s) ds β
0<β<α
0
−|α| m|α| ρ0 L|α|−2 (Y|α|−1 )2
t
|α|−2
(1 + s)
e
λ|α|
s 0
u(τ )B 1
∞,1
dτ
(3.25)
ds.
0
Substituting (3.24) and (3.25) to (3.23), we have
α
∂ u(t)
x
1 B∞,1
−|α| K0 ρ0 m|α|
t + C|α|
u(s)
1 B∞,1
X|α| (s) ds
0 −|α| + C|α|m|α| ρ0 L|α|−2 (Y|α|−1 )2
t
|α|−2
(1 + s)
e
λ|α|
s 0
u(τ )B 1
∞,1
dτ
ds,
0
which implies that −|α| X|α| (t) K0 ρ0 m|α|
t + C|α|
u(s)
1 B∞,1
X|α| (s) ds
0 −|α| + C|α|m|α| ρ0 L|α|−2 (Y|α|−1 )2
t 0
(1 + s)|α|−2 e
λ|α|
s 0
u(τ )B 1
∞,1
dτ
ds.
(3.26)
2160
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
By Lemma 2.5, we obtain from (3.26) that t
C2 |α| −|α| X|α| (t) K0 ρ0 m|α| e
t ×
|α|−2
(1 + s)
0
e
u(τ )B 1
∞,1
C2 |α|
t s
dτ
−|α| |α|−2
+ C2 |α|m|α| ρ0
u(τ )B 1
∞,1
dτ +λ|α|
s 0
L
u(τ )B 1
∞,1
dτ
(Y|α|−1 )2
ds
0
with some positive constant C2 depending only on n. By choosing λ C2 and L 1, we thus have (C2 −λ)|α| M|α| (t) X|α| (t) K0 L−(|α|−1) (1 + t)−(|α|−1) e m|α|
+ C2 |α|L
−1
−(|α|−1)
(1 + t)
t
u(τ )B 1
0
∞,1
t
|α|−2
(1 + s)
2
(Y|α|−1 )
dτ
e
(C2 −λ)|α|
t s
u(τ )B 1
∞,1
dτ
ds
0
K0 + C2 |α|L
−1
−(|α|−1)
(1 + t)
t 2
(Y|α|−1 )
(1 + s)|α|−2 ds
0
K0 +
2C2 (Y|α|−1 )2 . L
The above estimate with (3.14) implies that Y|α| K0 +
2C2 (Y|α|−1 )2 L
(3.27)
for all α ∈ Nn0 with |α| 2. From (3.14) and (3.27), we obtain by the standard inductive argument that Y|α| 2K0
(3.28)
for all α ∈ Nn0 with |α| 1, provided λ max{C1 , C2 } and L max{1, 8C2 K0 }. Therefore, it follows from (3.28) that
α
∂ u(t) 1 x B
∞,1
λ|α| 0t u(τ )B 1 dτ 2K0 ρ0 −|α| ∞,1 m|α| (1 + t)|α|−1 e L L
(3.29)
for all t ∈ [0, T ] and α ∈ Nn0 with |α| 1. From (3.1) and (3.29) with K = K0 max{C0 , L2 }, we complete the proof of Theorem 1.2. 2
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
2161
4. Proof of Theorem 1.5 In this section, we present the proof of Theorem 1.5. To this end, we will use the following lemmas. 1 (Rn )n with div u = div v = 0, and let Lemma 4.1. (See Pak and Park [8].) Let u0 , v0 ∈ B∞,1 0 0 1 n n u, v ∈ C([0, T ]; B∞,1 (R ) ) be the solutions of (E) with u(x, 0) = u0 (x) and v(x, 0) = v0 (x). Then, there exists a positive constant C = C(n) such that
u(t) − v(t)
0 B∞,1
u0 − v0 B 0
∞,1
t
u(s) 1 exp C B
∞,1
+ v(s)
1 B∞,1
ds
0
holds for all t ∈ [0, T ]. 0 (Rn ). Then, f is almost periodic in Rn if and only if Σ is relatively Lemma 4.2. Let f ∈ B∞,1 f 0 (Rn ). compact in B∞,1 0 (Rn ) if f ∈ B 0 (Rn ). We can prove Lemma 4.2 by the similar arguNote that Σf ⊂ B∞,1 ∞,1 0 (Rn ). Hence we ment in Giga, Mahalov and Nicolaenko [3], where they proved the case of B˙ ∞,1 omit the proof. 1 (Rn ) → Proof of Theorem 1.5. Let {S(t)}0tT be the solution maps, that is, S(t) : B∞,1 1 (Rn ) is defined by S(t)u = u(·, t). Since (E) is translation invariant with respect to the B∞,1 0 space variables, it follows from the uniqueness that S(t)τη u0 = τη u(·, t). Hence the map S(t) is surjective from Σu0 onto Σu(·,t) . Let {uj (·, t)}∞ j =1 be an arbitrary sequence in Σu(·,t) . Note that uj can be written as uj (·, t) = τηj u(·, t) with some ηj ∈ Rn . Moreover, it holds that uj (·, t) = S(t)τηj u0 by the surjectivity 1 (Rn ) is almost periodic, by Lemma 4.2, there exists a subsequence of of S(t). Since u0 ∈ B∞,1 ∞ {τηj u0 }j =1 , again denoted by {τηj u0 }∞ j =1 , such that
τηj u0 − τηk u0 B 0
∞,1
→0
(4.1)
1 (Rn ) is invariant under the translation. Hence as j, k → ∞. We remark that the norm of B∞,1 from Lemma 4.1 and (4.1), we obtain that
uj (t) − uk (t)
0 B∞,1
τηj u0 − τηk u0 B 0
∞,1
T
uj (s) 1 exp C B
∞,1
+ uk (s)
1 B∞,1
0
T
= τηj u0 − τηk u0 B 0 exp 2C ∞,1
u(s)
1 B∞,1
ds → 0
0
as j, k → ∞, which implies that u(·, t) is almost periodic in Rn for all t ∈ [0, T ].
2
ds
2162
O. Sawada, R. Takada / Journal of Functional Analysis 260 (2011) 2148–2162
Acknowledgments The authors would like to express their sincere gratitude to Professor Hideo Kozono for his valuable suggestions and continuous encouragement. They are also grateful to Professor Matthias Hieber and Professor Reinhard Farwig for their various supports. The first author is partly supported by Alexander von Humboldt Fellowship for his stay at Technische Universität Darmstadt. The second author acknowledges the support by International Research Training Group 1529 during his stay at Technische Universität Darmstadt. He is also partly supported by Research Fellow of the Japan society for Promotion of Science for Young Scientists. References [1] S. Alinhac, G. Métivier, Propagation de l’analyticité des solutions de systèmes hyperboliques non-linéaires, Invent. Math. 75 (1984) 189–204. [2] S. Alinhac, G. Métivier, Propagation de l’analyticité locale pour les solutions de l’équation d’Euler, Arch. Ration. Mech. Anal. 92 (1986) 287–296. [3] Y. Giga, A. Mahalov, B. Nicolaenko, The Cauchy problem for the Navier–Stokes equations with spatially almost periodic initial data, in: Mathematical Aspects of Nonlinear Dispersive Equations, in: Ann. of Math. Stud., vol. 163, Princeton Univ. Press, Princeton, 2007, pp. 213–222. [4] C. Kahane, On the spatial analyticity of solutions of the Navier–Stokes equations, Arch. Ration. Mech. Anal. 33 (1969) 386–405. [5] T. Kato, Nonstationary flows of viscous and ideal fluids in R3 , J. Funct. Anal. 9 (1972) 296–305. [6] T. Kato, G. Ponce, Commutator estimates and the Euler and Navier–Stokes equations, Comm. Pure Appl. Math. 41 (1988) 891–907. [7] I. Kukavica, V. Vicol, On the radius of analyticity of solutions to the three-dimensional Euler equations, Proc. Amer. Math. Soc. 137 (2009) 669–677. [8] H.C. Pak, Y.J. Park, Existence of solution for the Euler equations in a critical Besov space B1∞,1 (Rn ), Comm. Partial Differential Equations 29 (2004) 1149–1166. [9] Y. Taniuchi, T. Tashiro, T. Yoneda, On the two-dimensional Euler equations with spatially almost periodic initial data, J. Math. Fluid Mech. 12 (2010) 594–612. [10] H. Triebel, Theory of Function Spaces, Monogr. Math., vol. 78, Birkhäuser Verlag, Basel, 1983.
Journal of Functional Analysis 260 (2011) 2163–2190 www.elsevier.com/locate/jfa
Operator splitting for non-autonomous evolution equations András Bátkai a,∗,1 , Petra Csomós b , Bálint Farkas b , Gregor Nickel c a ELTE TTK, Institute of Mathematics, 1117 Budapest, Pázmány P. sétány 1/C, Hungary b Technische Universität Darmstadt, Fachbereich Mathematik, Schloßgartenstr. 7, 64289 Darmstadt, Germany c Universität Siegen, FB 6 Mathematik, Walter-Flex-Str. 3, 57068 Siegen, Germany
Received 2 August 2010; accepted 12 October 2010
Communicated by L. Gross To Ulf Schlotterbeck, our inspirator, on his 70th birthday
Abstract We establish general product formulas for the solutions of non-autonomous abstract Cauchy problems. The main technical tools are evolution semigroups allowing the direct application of existing results on autonomous problems. The results obtained are illustrated by the example of an autonomous diffusion equation perturbed with time dependent potential. We also prove convergence rates for the sequential splitting applied to this problem. © 2010 Elsevier Inc. All rights reserved. Keywords: Non-autonomous evolution equations; Operator splitting; Evolution families; Lie–Trotter product formula; Spatial approximation
1. Introduction Operator splitting procedures are used to solve ordinary and partial differential equations numerically. They can be considered as certain finite difference methods which simplify or even make the numerical treatment of differential equations possible. The idea behind these proce* Corresponding author.
E-mail addresses: [email protected] (A. Bátkai), [email protected] (P. Csomós), [email protected] (B. Farkas), [email protected] (G. Nickel). 1 Research partially supported by the Alexander von Humboldt-Stiftung. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.008
2164
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
dures is the following. In many situations, a certain physical phenomenon can be considered as the combined effect of several processes. Hence the behavior of a physical quantity is described by a partial differential equation in which the time derivative depends on the sum of operators corresponding to the different processes. These operators usually are of different nature and for each sub-problem corresponding to each operator there might be an effective numerical method providing fast and accurate solutions. For the sum of these operators, however, it is not always possible to find an adequate and effective method. Hence, the idea of operator splitting procedures means that instead of the sum we treat the operators separately and the solution of the original problem is then to be recovered from the numerical solutions of these sub-problems. We refer to the recent monographs by Faragó and Havasi [10] or Holden et al. [14] for a detailed introduction to the theory and applications of operator splitting methods. There was enormous progress in recent years in the theoretical investigation of operator splitting procedures. Especially, ordinary differential equations and autonomous linear evolution equations have been treated thoroughly, see also Bátkai, Csomós, and Nickel [2] and the subsection below for a (certainly not complete) list of references. The aim of the present paper is to investigate the above described splitting method for nonautonomous evolution equations of the form ⎧ ⎨ d u(t) = A(t) + B(t) u(t), dt ⎩ u(s) = x ∈ X,
t s ∈ R,
(NCP)
on some Banach space X. Our particular goal is to emphasize that non-autonomous evolution equations can often be rewritten as an autonomous abstract Cauchy problem by means of an appropriate choice for the state-space. Thus, by making use of so-called evolution semigroups, it is possible to apply existing results for autonomous problems. First we summarize the necessary background on operator splitting for abstract Cauchy problems, i.e., operator splitting in the framework of strongly continuous operator semigroups. The key ingredient here is Chernoff’s Theorem 1.1. Then non-autonomous evolution equations and evolution semigroups are surveyed, providing the main technical tools for the succeeding sections. A product representation is presented in Section 2, while operator splitting—strictly in the sense above—is considered in Section 3. To keep our presentation short, we mainly restrict ourselves to the case of the so-called sequential splitting, but in Section 4 we show how higher order splitting methods can be treated with essentially no difference. In that section, we also prove the convergence of the splitting methods when combined with spatial “discretization,” and make a quick outlook on the positivity of evolution families. Finally, as an illustration of the developed tools, we apply them to a diffusion equation with time dependent potential. Moreover, by semigroup methods, using results of Jahnke and Lubich [17], Hansen and Ostermann [12,13], we obtain estimates on the order of the convergence. A word on notation: For a family of operators U0 , U1 , . . . , Un−1 ∈ L (X), we denote the (“time-ordered”) product of these operators by n−1 p=0
Up := Un−1 Un−2 · · · U1 U0
and
0 p=n−1
Up := U0 U1 · · · Un−2 Un−1 .
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2165
1.1. Operator splitting for autonomous problems In this section, we recollect the main notions and results of operator splitting for autonomous equations. Consider the following abstract Cauchy problem on a given Banach space X: ⎧ ⎨ d u(t) = (A + B)u(t), t 0, (ACP) dt ⎩ u(0) = x ∈ X, where the operators A, B, and the closure C := A + B are supposed to be generators of strongly continuous semigroups T , S, and U , respectively. Our general reference on strongly continuous operator semigroups is the monograph Engel and Nagel [7]. As mentioned in the introduction, operator splitting means that we try to recover the solution semigroup U using the semigroups T and S. As for splitting procedures we mention the most frequently used ones (for more details, see Bátkai, Csomós, and Nickel [2, Section 2.2]): • The sequential splitting, classically the Lie–Trotter product formula, is given by n sq un (t) := S(t/n)T (t/n) x, • the Strang splitting is given by n uSt n (t) := T (t/2n)S(t/n)T (t/2n) x, • and—for a fixed parameter Θ ∈ (0, 1)—the weighted splitting is n uw n (t) := ΘS(t/n)T (t/n) + (1 − Θ)T (t/n)S(t/n) x with n ∈ N. In case Θ = 12 , it is also called symmetrically weighted splitting. The convergence of these procedures is usually ensured by the following classical result. Theorem 1.1. (See Chernoff [5], or Engel and Nagel [7, Section III].) Let C be a linear operator in the Banach space X and assume that F : R+ → L (X) is a (strongly) continuous function with F (0) = I and
F (t) k Mekωt
for all t 0 and k ∈ N (stability).
Suppose that there is a dense subspace D, with (λ − C)D being also dense for some (large) λ > 0. If for every x ∈ D the limit F (h)x − x = Cx h→0 h lim
(consistency)
exists, then C is the generator of a C0 -semigroup U , the set D is a core for the generator C, and we have n t lim F x = U (t)x (convergence). n→∞ n
2166
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Note that if the closure of C is already known to be a generator, as it is the case in problems motivated by numerical analysis, then the range condition is automatically satisfied. The operator family F is sometimes called a finite difference method. Clearly, the above mentioned splitting procedures have this form. For example, for the sequential splitting we take F sq (h) = S(h)T (h). It is important to note that Chernoff’s Theorem does not yield anything a priori about the rate of convergence. The finite difference method F is said to be of order p > 0, if for x from a suitably large subset of X there is C > 0 such that for all t ∈ [0, t0 ] we have
n
F t x − U (t)x C ,
np
n or, as in many special cases, equivalently,
F (h)x − U (h)x C hp+1 . The equivalence holds in special cases where it is possible to ensure the invariance of the above mentioned large subset D of X (for more details we refer to the Lax equivalence theorem which states that the above two definitions are equivalent for a finite different method if and only if the method is stable). Different splitting procedures were introduced to increase the order of convergence. In the finite dimensional setting, it is well known that the sequential splitting is of first order, the Strang and the weighted splitting with Θ = 12 are of second order. Moreover, the weighted splitting allows also the use of parallel computing. In the infinite dimensional case, however, no similar general statement can be made without additional assumptions. There has been intense research in this direction, and we mention the works by Bjørhus [3], Cachia and Zagrebnov [4], Faragó and Havasi [9], Hansen and Ostermann [12], Ichinose et al. [16], Jahnke and Lubich [17] or Neidhardt and Zagrebnov [26]. To obtain error estimates later for diffusion problems, we apply a result by Jahnke–Lubich, Hansen–Ostermann, which relies on commutator bounds. For simplicity, we mention here only the special case used later. Theorem 1.2. (See Jahnke and Lubich [17, Theorem 2.1], Hansen and Ostermann [12, Theorem 2.3].) Suppose that A generates a strongly continuous contraction semigroup etA in the Banach space X and that B ∈ L (X) such that there exists an α > 0 such that
[A, B]v = (AB − BA)v c (−A)α v
(1)
for all v ∈ D ⊆ D((−A)α ) (where D is some dense subspace of D((−A)α ) invariant under et (A+B) ). Then one has first order convergence for the sequential and Strang splittings, i.e.,
t B t A n
Ct 2
en en
(−A)α v , v − et (A+B) v n 2
t A t B t A n
Ct
e 2n e n e 2n
(−A)α v . v − et (A+B) v n
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2167
1.2. Non-autonomous evolution equations and evolution semigroups In this section we summarize the main results and definitions on non-autonomous evolution equations and evolution semigroups needed for our later exposition. For a detailed account and bibliographic references see, e.g., the survey by Schnaubelt in [7, Section VI.9.]. Consider now the non-autonomous evolution equation ⎧ ⎨ d u(t) = A(t)u(t), dt ⎩ u(s) = x ∈ X,
t s ∈ R,
where X is a Banach space, (A(t), D(A(t))) is a family of (usually unbounded) linear operators on X. Definition 1.3. A continuous function u : [s, ∞) → X is called a (classical) solution of (NCPs,x ) if u ∈ C1 ([s, ∞); X), u(t) ∈ D(A(t)) for all t s, u(s) = x, and dtd u(t) = A(t)u(t) for t s. We use the following slight modification of Kellermann’s definition [19, Definition 1.1] for the well-posedness of the non-autonomous Cauchy problem (NCP). Definition 1.4 (Well-posedness). For a family (A(t), D(A(t)))t∈R of linear operators on the Banach space X the non-autonomous Cauchy problem (NCP) is called well-posed (with regularity subspaces (Ys )s∈R and exponentially bounded solutions) if the following are true. (i) (Existence) For all s ∈ R the subspace
Ys := y ∈ X: there exists a classical solution for (NCP)s,y ⊂ D A(s) is dense in X. (ii) (Uniqueness) For every y ∈ Ys the solution us (·, y) is unique. (iii) (Continuous dependence) The solution depends continuously on s and y, i.e., if sn → s ∈ R, yn → y ∈ Ys with yn ∈ Ysn , then we have
uˆ s (t, yn ) − uˆ s (t, y) → 0 n uniformly for t in compact subsets of R, where uˆ r (t, y) :=
ur (t, y) y
if r t, if r > t.
(iv) (Exponential boundedness) There exist constants M 1 and ω ∈ R such that
us (t, y) Meω(t−s) y for all y ∈ Ys and t s.
2168
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
As in the autonomous case, the operator family solving a non-autonomous Cauchy problem enjoys certain algebraic properties. Definition 1.5 (Evolution family). A family U = (U (t, s))ts of linear, bounded operators on a Banach space X is called an (exponentially bounded) evolution family if (i) U (t, r)U (r, s) = U (t, s), U (t, t) = I holds for all t r s ∈ R, (ii) the mapping (t, s) → U (t, s) is strongly continuous, (iii) U (t, s) Meω(t−s) for some M 1, ω ∈ R and all t s ∈ R. In general, however, and in contrast to the behavior of C0 -semigroups (i.e., the autonomous case), the algebraic properties of an evolution family do not imply any differentiability on a dense subspace. So we have to add some differentiability assumptions in order to solve a nonautonomous Cauchy problem by an evolution family. Definition 1.6. An evolution family U = (U (t, s))ts is called evolution family solving (NCP) if for every s ∈ R the regularity subspace
Ys := y ∈ X : [s, ∞) t → U (t, s)y solves (NCP)s,y is dense in X. The well-posedness of (NCP) can now be characterized by the existence of a solving evolution family. Proposition 1.7. (See Nickel [28, Proposition 2.5].) Let X be a Banach space, and assume that (A(t), D(A(t)))t∈R is a family of linear operators on X and consider the non-autonomous Cauchy problem (NCP). The following assertions are equivalent. (i) The non-autonomous Cauchy problem (NCP) is well-posed. (ii) There exists a unique evolution family (U (t, s))ts solving (NCP). To every evolution family we can associate C0 -semigroups on X-valued function spaces. These semigroups, which determine the behavior of the evolution family completely, are called evolution semigroups. Consider the Banach space BUC(R; X) = {f : R → X: f is bounded and uniformly continuous}, normed by
f := sup f (t) ,
f ∈ BUC(R; X);
t∈R
or any closed subspace of it that is invariant under the right translation semigroup R defined by R(t)f (s) := f (s − t)
for f ∈ BUC(R; X) and s ∈ R, t 0.
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2169
In the following X will denote such a closed subspace; we shall typically take X = C0 (R; X), the space of continuous functions vanishing at infinity. It is easy to check that the following definition yields a strongly continuous semigroup. Definition 1.8. For an evolution family U = (U (t, s))ts we define the corresponding evolution semigroup T on the space X by T (t)f (s) := U (s, s − t)f (s − t) for f ∈ X , s ∈ R and t 0. We denote its infinitesimal generator by (G, D(G)). With the above notation, the evolution semigroup operators can be written as T (t)f = U (· , · −t)R(t)f. We can recover the evolution family from the evolution semigroup by choosing a function f ∈ X with f (s) = x. Then we obtain U (t, s)x = R(s − t)T (t − s)f (s)
(2)
for every s ∈ R and t s. d The generator of the right translation semigroup is essentially the differentiation − ds with domain
d := X1 := f ∈ C1 (R; X): f, f ∈ X . D − ds For a family (A(t), D(A(t)))t∈R of unbounded operators on X we consider the corresponding multiplication operator (A(·), D(A(·))) on the space X with domain D A(·) := f ∈ X : f (s) ∈ D A(s) ∀s ∈ R and s → A(s)f (s) ∈ X , and defined by A(·)f (s) := A(s)f (s)
for all s ∈ R.
Now we characterize well-posedness for non-autonomous Cauchy problems. Theorem 1.9. (See Nickel [28, Theorem 2.9].) Given a Banach space X, and a family of linear operators (A(t), D(A(t)))t∈R on X. The following assertions are equivalent. (i) The non-autonomous Cauchy problem (NCP) for the family (A(t))t∈R is well-posed (with exponentially bounded solutions). (ii) There exists a unique evolution semigroup T with generator (G, D(G)) and an invariant core D ⊆ X1 ∩ D(G) such that Gf + f = A(·)f for all f ∈ D.
2170
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Conditions implying well-posedness are generally divided into assumptions of “parabolic” and of “hyperbolic” type. Roughly speaking, the main difference between these two types is that in the parabolic case we assume all A(t) being generators of analytic semigroups, while in the hyperbolic case we assume the stability for certain products instead. In both cases one has to add some continuity assumption on the mapping t → A(t). We mention only a typical and quite simple version for each type. Assumption 1.10 (Parabolic case). (P1) The domain D := D(A(t)) is dense in X and is independent of t ∈ R. (P2) For each t ∈ R the operator A(t) is the generator of an analytic semigroup e·A(t) . For all t ∈ R, the resolvent R(λ, A(t)) exists for all λ ∈ C with λ 0 and there is a constant M 1 such that
R λ, A(t)
M |λ| + 1
for λ 0, t ∈ R. The semigroups e·A(t) satisfy esA(t) Meωs for absolute constants ω < 0 and M 1. (P3) There exist constants L 0 and 0 < α 1 such that
A(t) − A(s) A(0)−1 L|t − s|α
for all t, s ∈ R.
Assumption 1.11 (Hyperbolic case). (H1) The family (A(t))t∈R is stable, i.e., all operators A(t) are generators of C0 -semigroups and there exist constants M 1 and ω ∈ R such that (ω, ∞) ⊂ ρ A(t)
for all t ∈ R
and
k
R λ, A(tj ) M(λ − ω)−k
for all λ > ω
j =1
and every finite sequence −∞ < t1 t2 · · · tk < ∞, k ∈ N. (H2) There exists a densely embedded subspace Y → X, which is a core for every A(t) such that the family of the parts (A|Y (t))t∈R in Y is a stable family on the space Y . (H3) The mapping R t → A(t) ∈ L(Y, X) is uniformly continuous. Remark 1.12. Since the classical papers of Evans [8], Howland [15], and Neidhardt [23–25], evolution semigroups have been intensively used to study non-autonomous evolution equations. Here, various results on well-posedness as well as qualitative behavior of these equations were obtained. For a quite comprehensive overview and a long list of different variants we refer, e.g., to Nagel and Nickel [21], Neidhardt and Zagrebnov [27], Nickel [28,29], Nickel and Schnaubelt [30], and Schnaubelt [32]. The recent article Neidhardt and Zagrebnov [27] focuses
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2171
on (quite general) assumptions of the “hyperbolic” type and obtains well-posedness results—in a general sense—for non-autonomous evolution equations by properly defining and analyzing d + A(·) yielding the generator of the associated evolution semigroup. In contrast the “sum” − ds to that approach, in our paper we simply assume well-posedness of our evolution equation under any appropriate (parabolic or hyperbolic) condition. Therefore, the solving evolution family, the corresponding evolution semigroup, and its generator are well defined by assumption. Our main interest is then, how these solutions can be approximated (numerically) by splitting procedures. 2. A product formula In this section we present a product formula for the solutions of the non-autonomous Cauchy problem (NCP). In the case B(t) ≡ 0, this formula essentially goes back to Kato [18]. This splitting-type formula is especially useful if for every time r ∈ R we are able to solve effectively the autonomous Cauchy problems d u(t) = A(r)u(t), dt
(Eq. 1)
d v(t) = B(r)v(t) dt
(Eq. 2)
with appropriate initial conditions. This is usually the case if the operators A(·) and B(·) are partial differential operators with time dependent coefficients or time dependent multiplication operators. Formally, this means that we assume that the operators A(r) and B(r) generate strongly continuous operator semigroups, which we denote by using the exponential notation as e·A(r) and e·B(r) , respectively. We devote this section to the simplest product formula arising from the sequential splitting. Suppose we want to determine the solution of (NCP) at time t + s > 0 and hence take the time-step τ = t/n. We start with the known initial value usq (s) = x, then solve the first (Eq. 1) equation on the time interval [s, s + τ ] taking r = s. Then we take the result u(1) 1 (s + τ ) as the initial value for the second equation (Eq. 2) which we solve again on [s, s + τ ]. With this new result usq (s + τ ) := u(1) 2 (s + τ ) as initial value for (Eq. 1) we restart the procedure and iterate it n times. Formally: ⎧ d ⎨ u(k) (t) = A s + (k − 1)τ u(k) (t), t ∈ s + (k − 1)τ, s + kτ , 1 1 dt ⎩ (k) u1 s + (k − 1)τ = usq s + (k − 1)τ , ⎧ d ⎨ u(k) = B s + (k − 1)τ u(k) (t), t ∈ s + (k − 1)τ, s + kτ , 2 dt 2 ⎩ (k) (k) u2 s + (k − 1)τ = u1 (s + kτ ), (k)
usq (s + kτ ) := u2 (s + kτ ), with k = 1, 2, . . . , n. Using that for r ∈ [0, τ ], (k)
u1
s + (k − 1)τ + r = erA(s+(k−1)τ ) usq s + (k − 1)τ ,
2172
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
and that (k)
u2
(k) s + (k − 1)τ + r = erB(s+(k−1)τ ) u1 (s + kτ )
= erB(s+(k−1)τ ) eτ A(s+(k−1)τ ) usq s + (k − 1)τ ,
we see by a simple induction argument that the split solution usq (s + kτ ), obtained by applying the sequential splitting procedure, can be written as usq (s + kτ ) =
k−1
eτ B(s+pτ ) eτ A(s+pτ ) x
for k ∈ N, kτ t, and x ∈ X.
(3)
p=0
In what follows, we study the convergence of this expression. Assumption 2.1. Suppose that (a) the non-autonomous Cauchy problem corresponding to the operators (A(·) + B(·)) is wellposed, (b) (Stability) the operators A(r) and B(r) are generators of C0 -semigroups e·A(r) , e·B(r) of type (M, ω) (M 1 and ω ∈ R) on the Banach space X and, therefore, (ω, ∞) ⊂ ρ A(r) ∩ ρ B(r)
for all r ∈ R.
Moreover, let
1
t
pt pt
t
B(s− ) A(s− ) n en n en sup
Meωt ,
s∈R p=n
and
(c) (Continuity) the maps t → R λ, A(t) x,
t → R λ, B(t) x
are continuous for all λ > ω and x ∈ X. We denote the evolution family solving (NCP) by W and the corresponding evolution semid + A(·) + B(·), by W. group, generated by the closure C of C := − ds As we shall see in a moment, Assumption 2.1 yields that the multiplication operators A(·), B(·) with appropriate domain generate strongly continuous multiplication semigroups on C0 (R; X) (for more on this matter we refer to Engel and Nagel [7, Section III.4.13] and Graser [11]). Theorem 2.2. Under Assumption 2.1 one has the convergence W (t, s)x = lim
n→∞
n−1
t−s B(s+ p(t−s) ) t−s A(s+ p(t−s) ) n n e n x e n
p=0
for all x ∈ X, locally uniformly in s, t with s t.
(4)
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2173
Proof. The main idea of the proof is analogous to the one in Nickel [29, Proposition 3.2]. Consider the semigroups e·A(r) and e·B(r) for given r ∈ R. By the uniform growth assumption in 2.1(b) on the semigroups, for fixed t 0 the function r → etA(r) f (r) vanishes at infinity whenever f has this property. We also have that the function r → etA(r) is strongly continuous. Indeed, by the Trotter–Kato Theorem (see Engel and Nagel [7, Theorem III.4.8]) we even obtain that R+ × R (t, r) → etA(r) is strongly continuous. All these reasonings are, of course, true if A(r) is replaced by B(r). Let now f ∈ BUC(R; X). Then r → etA(r) f (r) is continuous, too. We have therefore shown that the multiplication semigroups etA(·) and etB(·) , generated by the multiplication operators A(·) and B(·), both act on the space X = C0 (R; X), see also Graser [11]. It can be seen by induction that n 1 t B(·− pt ) t A(·− pt ) t t B(·) nt A(·) n n en n R e en R(t)f (·). e f (·) = n p=n The stability assumption 2.1(b) immediately implies the stability for the finite difference method F (h) := R(h)ehB(·) ehA(·) . Consistency is standard to check: take f ∈ X1 ∩ D(A(·)) ∩ D(B(·)). Then we can write F (h)f − f ehA(·) f − f ehB(·) f − f R(h)f − f = lim R(h)ehB(·) + R(h) + h↓0 h↓0 h h h h
lim
= A(·)f + B(·)f − f . d + B(·) + A(·) genBy our well-posedness assumptions, the closure of the operator C = − ds erates a strongly continuous semigroup on X , hence the set (λ − C)D(C) is dense in X . By the d , A(·), stability assumption we can apply Chernoff’s Theorem 1.1 with the three operators − ds B(·), and obtain that the evolution semigroup generated by C is given by 1 t B(·− pt ) t A(·− pt ) n en n W(t)f = lim en f (· − t). n→∞
p=n
The above limit is to be understood in the topology of X , that is, in the uniform topology. By using this, and by applying the formula (2) from the previous section, we can recover the evolution family from the evolution semigroup and arrive at the formula 1 t−s B(t− p(t−s) ) t−s A(t− p(t−s) ) n n e n x, e n
W (t, s)x = lim
n→∞
from which the assertion follows.
p=n
2
Remark 2.3. In the proof of Theorem 2.2 we have used that the semigroups e·A(r) and e·B(r) map C0 (R; X) into itself. If e·A(r) and e·B(r) are uniformly strongly continuous in r ∈ R, then one could also work on the space X = BUC(R; X). Remark 2.4. The stability condition (b) is automatically satisfied, if A(t) and B(t) are generators of quasi-contractive semigroups with uniform exponential bound ω for all t.
2174
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Remark 2.5. In Vuillermot et al. [34,35], the authors prove the representation formula (4) where A(t) and B(t) are generators of contraction semigroups, the family A(·) satisfies a version of the so-called parabolic condition and the family B(·) is a small perturbation. Theorem 2.2 can be seen as a generalization of this result and can be applied not only in a larger class of parabolic problems but also in the hyperbolic case. In [33] Vuillermot proves a Chernoff-type approximation theorem for time-dependent operator families. Under appropriate consistency and stability assumptions it is possible to derive formula (4) from this result (as done in [33]) instead of proving it by the application of the classical Chernoff’s Theorem to evolution semigroups. It is however amongst our aims to emphasize that semigroup techniques may be used to prove approximation results also for non-autonomous problems. Remark 2.6. In case B(t) ≡ 0, we recover the well-known representation formula U (t, s)x = lim
n→∞
n−1
e
p(t−s) t−s n A(s+ n )
x,
p=0
see Nickel [29, Proposition 3.2] and Schnaubelt [31, Theorem 2.1]. Again, the stability condition reduces essentially to the classical stability condition of Kato [18]. Remark 2.7. It is straightforward to check that if one of the equations is autonomous, e.g., A(t) ≡ A, then we arrive at the same product formula but we can split the original operator C d + A and B(·). into two (and not three) operators, namely into − ds 3. Operator splitting In this section we assume that we can solve the non-autonomous equations d u(t) = A(t)u(t), dt
(Eq. A)
d v(t) = B(t)v(t) dt
(Eq. B)
and want to construct the solution of (NCP) applying an operator splitting procedure. For the sake of simplicity we only present the case of sequential splitting: We start with the initial value (1) usq (s) = x, then solve the first equation on the time interval [s, s + τ ]. Then we take this u1 (s + τ ) as the initial value for the second equation which we solve on [s, s + τ ]. With this result (1) usq (s + τ ) := u2 (s + τ ) as initial value for (Eq. A) we restart the procedure and iterate it n times. Formally: ⎧ d ⎨ u(k) (t) = A(t)u(k) (t), t ∈ s + (k − 1)τ, s + kτ , 1 dt 1 ⎩ (k) u1 s + (k − 1)τ = usq s + (k − 1)τ , ⎧ d ⎨ u(k) (t) = B(t)u(k) (t), t ∈ s + (k − 1)τ, s + kτ , 2 2 dt ⎩ (k) u2 s + (k − 1)τ = u(k) 1 (s + kτ ),
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2175
(k)
usq (s + kτ ) := u2 (s + kτ ), for k = 1, 2, . . . , n. If U and V denote the evolution families solving the above equations (Eq. A)– (Eq. B), then we have (k) u1 (r) = U r, s + (k − 1)τ usq s + (k − 1)τ , and (k) u(k) 2 (r) = V r, s + (k − 1)τ u1 (s + kτ ) = V r, s + (k − 1)τ U s + kτ, s + (k − 1)τ usq s + (k − 1)τ . By this the splitting solution usq can be written as
usq (s + kτ ) =
k−1
V s + (p + 1)τ, s + pτ U s + (p + 1)τ, s + pτ x.
p=0
In the following we analyze the convergence of this procedure. Assumption 3.1. Suppose that (a) the non-autonomous Cauchy problems corresponding to the operators A(·) + B(·), A(·), and B(·) are well-posed, and that (b) (Stability) there exist M 1 and ω ∈ R such that
0
(p + 1)t pt (p + 1)t
pt
sup
U s − ,s − V s − ,s −
Meωt .
n n n n s∈R
p=n−1
Here, again, the evolution family solving the Cauchy problem corresponding to A(·) and B(·), will be denoted by U and V , respectively. Further, we denote the evolution family solving d (NCP) by W and the corresponding evolution semigroup, generated by the closure of C = − ds + A(·) + B(·), by W. Theorem 3.2. Under Assumptions 3.1 one has the convergence W (t, s)x = lim
n→∞
n−1 p=0
for all x ∈ X.
(p + 1)(t − s) p(t − s) (p + 1)(t − s) p(t − s) V s+ ,s + U s+ ,s + x n n n n
2176
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Proof. In the space X , we define F (t) := V (·, · − t) and G(t) := U (·, · − t)R(t). Inductively, one can see that n n t t t t t G U ·, · − R F f = V ·, · − f n n n n n 0 (p + 1)t pt (p + 1)t pt U · − ,· − f (· − t). V · − ,· − = n n n n p=n−1
d By our assumptions, the closure C of the operator C = − ds + A(·) + B(·) generates a strongly continuous semigroup on X , and hence the set (λ − C)D(C) is dense. Straightforward calculation analogous to the one in the proof of Theorem 2.2 yields that (F (·)G(·)) (0)f = Cf for f ∈ D(C). Hence, by the stability assumption, we can apply Chernoff’s Theorem to this function and obtain that the evolution semigroup generated by C is given by
W(t)f = lim
n→∞
0 p=n−1
(p + 1)t pt (p + 1)t pt U · − ,· − f (· − t). V · − ,· − n n n n
From this, by picking some f ∈ X with f (s) = x, we obtain for the evolution family W (t, s)x = lim
n→∞
= lim
n→∞
0 p=n−1 n−1 p=0
(p + 1)(t − s) p(t − s) (p + 1)(t − s) p(t − s) ,t − U t− ,t − x V t− n n n n
p(t − s) (p + 1)(t − s) p(t − s) (p + 1)(t − s) ,s + U s+ ,s + x, V s+ n n n n
which was to be proved.
2
Remark 3.3. Note that the stability condition is trivially satisfied if the evolution families U and V are quasi-contractive, i.e., if M 1 can be taken in Definition 1.5(iii). In general, as usual with stability assumptions, it is rather hard to verify. Using similar arguments but a different decomposition, we arrive at a different splitting formula using evolution families corresponding to different (time-rescaled) evolution equations.
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2177
Proposition 3.4. Suppose that the operator families A(·/2), B(·/2) and A(·) + B(·) generate the , V and W , respectively. Assume furthermore that there is M 1 and ω ∈ R evolution families U such that
0
(2p + 1)t (2p + 2)t 2pt (2p + 1)t
2s − 2s − , 2s − , 2s − sup
V U
Meωt .
n n n n s∈R
p=n−1
Then we have W (t, s)x 2s + 2(p + 1)(t − s) , 2s + (2p + 1)(t − s) V n→∞ n n p=0 2s + (2p + 1)(t − s) , 2s + 2p(t − s) x. ×U n n
= lim
n−1
Proof. In the space X , we write formally −
d d d + A(·) + B(·) = − + A(·) + − + B(·) = A1 + B1 . ds 2ds 2ds
Since the division by 2 in the formula means a rescaling of the corresponding evolution semigroups S and T , we obtain the representation formulas (2·, 2 · −t)R(t/2), S(t) = V (2·, 2 · −t)R(t/2). T (t) = U By induction one can see that n t t T S f n n n 2·, 2 · − t R(t/2n) f 2·, 2 · − t R(t/2n)U = V n n 0 2 · − 2pt , 2 · − (2p + 1)t U 2 · − (2p + 1)t , 2 · − (2p + 2)t f (· − t). = V n n n n p=n−1
d Again, the closure C of the operator C = − ds + A(·) + B(·) generates a strongly continuous semigroup on X , hence (λ − C)D(C) is dense. By this and by the stability assumption Chernoff’s Theorem is applicable. We obtain that the evolution semigroup generated by C is given by
W(t)f = lim
n→∞
0 p=n−1
(2p + 1)t (2p + 2)t 2pt (2p + 1)t ,2 · − ,2 · − f (· − t). V 2·− U 2·− n n n n
2178
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
By passing to the evolution family we get the assertion: W (t, s)x (2p + 1)(t − s) 2p(t − s) = lim , 2t − V 2t − n→∞ n n p=n−1 (2p + 2)(t − s) (2p + 1)(t − s) , 2t − x × U 2t − n n n−1 2s + 2(p + 1)(t − s) , 2s + (2p + 1)(t − s) = lim V n→∞ n n p=0 2s + (2p + 1)(t − s) , 2s + 2p(t − s) x. ×U 2 n n 0
Remark 3.5. Note that, in contrast to the autonomous case, there is no general connection be, see Nickel [28]. tween the evolution families U and U 4. Generalizations and remarks 4.1. Higher order splitting methods We now show how the previous results generalize to higher order splitting methods. The results are, using the stage set up previously, direct applications of the corresponding autonomous results applied to the evolution semigroups. We restrict ourselves to the Strang and symmetrically weighted splitting, but other splitting methods can be handled analogously. In any case only the stability condition has to be adapted. This, however, is always satisfied (and typically verifiable) if the operators involved are contractions. Theorem 4.1. Suppose that Assumptions 2.1(a) and (c) are satisfied, and that the stability condition holds in the following form: (b )
0
pt pt pt
t t t
A(s− ) B(s− ) A(s− ) n en n e 2n n Meωt sup
e 2n
s∈R
p=n−1
in the case of the Strang splitting, or: (b )
0
pt pt
t t 1
nt A(s− ptn ) nt B(s− ptn ) B(s− ) A(s− ) n en n e sup n
e + en
Meωt
2 s∈R p=n−1
in the case of the symmetrically weighted splitting. Then we have W (t, s)x = lim
n→∞
n−1 p=0
t−s
e 2n A(s+
p(t−s) n )
e
p(t−s) t−s n B(s+ n )
t−s
e 2n A(s+
p(t−s) n )
x
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2179
for all x ∈ X in case of the Strang splitting; and we have W (t, s)x n−1 p(t−s) p(t−s) t−s t−s 1 t−s A(s+ p(t−s) ) t−s B(s+ p(t−s) ) n n e n e n + e n B(s+ n ) e n A(s+ n ) x n n→∞ 2
= lim
p=0
for all x ∈ X in case of the symmetrically weighted splitting. Proof. The statements follow immediately by the same reasonings as in the proof of Theorem 2.2, but now considering the expressions n t t t t R e 2n A(·) e n B(·) e 2n A(·) n for the Strang-splitting, and n t t 1 t t A(·) t B(·) B(·) A(·) R en en + en en , 2n n for the weighted splitting, respectively.
2
Remark 4.2. It can be shown by exactly the same arguments as in Csomós and Nickel [6, Lemma 2.3] that the stability condition (b ) is equivalent to the stability condition in Assumption 2.1(b) for the sequential splitting. 4.2. Spatial approximations Continuing earlier investigations started in Bátkai, Csomós, and Nickel [2], we show that operator splitting combined with spatial approximations is also convergent. We only concentrate on the formula (4) for the sequential splitting. Other methods can be considered analogously. Assumption 4.3. Let Xm , m ∈ N be Banach spaces and take operators Pm : X → Xm
and Jm : Xm → X
fulfilling the following properties: (i) Pm Jm = Im for all m ∈ N, where Im is the identity operator in Xm , (ii) limm→∞ Jm Pm x = x for all x ∈ X, (iii) Jm K and Pm K for all m ∈ N and a suitable absolute constant K 1. The operators Pm together with the spaces Xm usually refer to a kind of spatial discretization method (triangulation, Galerkin approximation, Fourier coefficients, etc.), the spaces Xm are in most applications finite dimensional spaces, and the operators Jm refer to the interpolation method describing how we associate specific elements of the function space to the elements of the approximating spaces (linear/polynomial/spline interpolation, etc.).
2180
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Assumption 4.4. For each m ∈ N and r ∈ R let the operators Am (r) and Bm (r) be generators of strongly continuous semigroups etAm (r) and etBm (r) , respectively. Assume furthermore that (a) (Stability) there exist constants M 1 and ω ∈ R such that
hA(r) hA (r)
e
, e m , ehB(r) , ehBm (r) Meωh ,
for all h > 0 and r ∈ R,
that
0
t
pt pt
t
B (s− ) A (s− ) m m n en n sup
en
Meωt ,
s∈R
and that
p=n−1
(b) (Consistency) the identities limm→∞ Jm Am (·)Pm f = A(·)f for all f ∈ D(A(·)), and limm→∞ Jm Bm (·)Pm f = B(·)f for all f ∈ D(B(·)) hold. As in Bátkai, Csomós, and Nickel [2], stability and consistency implies convergence. Theorem 4.5. Suppose that Assumption 4.4 is satisfied. Then one has the convergence W (t, s)x = lim lim Jm m→∞ n→∞
n−1
t−s B (s+ p(t−s) ) t−s A (s+ s+p(t−s) ) n n e n m Pm x e n m
p=0
for all x ∈ X. Proof. We will apply Bátkai, Csomós, and Nickel [2, Theorem 3.6], the modified Chernoff’s Theorem directly. To this end, define the spaces Xm = C0 (R; Xm ),
X := C0 (R; X)
and the projection operators Pm = I ⊗ Pm : X → Xm ,
(Pm f )(t) := Pm f (t),
and interpolation operators Jm = I ⊗ Jm : X m → X ,
(Jm fm )(t) := Jm fm (t).
We have to check that these operators satisfy the conditions in Assumption 4.3. Conditions (i) and (iii) are immediate from the definitions. The (Jm Pm f )(s) → f (s) is true pointwise. We have to show that the convergence holds in fact uniformly in s ∈ R. Take ε > 0. Let f ∈ X and [a, b] ⊂ R such that f (s) 2Kε 2 for all s ∈ R \ [a, b]. Then
Jm Pm f (s) − f (s) ε
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2181
for s ∈ R \ [a, b]. Since f is uniformly continuous, there is δ > 0 such that for all s, t ∈ [a, b], |s − t| < δ, we have f (s) − f (t) K 2ε+2 . Take a partition a = s0 < s1 < · · · < sn = b such that |si+1 − si | < δ. Then by definition, there is M > 0 such that for all m M
Jm Pm f (si ) − f (si )
ε . K2 + 2
Since for s ∈ [a, b] there is j such that s ∈ [sj , sj +1 ], we get for m M,
Jm Pm f (s) − f (s)
Jm Pm f (s) − f (sj ) + Jm Pm f (sj ) − f (sj ) + f (sj ) − f (s) ε. Hence, Jm Pm f − f ∞ ε holds for all m M. The validity of Assumption 4.4 implies that the corresponding multiplication semigroups satisfy the necessary stability and consistency conditions. 2 4.3. Positivity preservation As it was pointed out by W. Arendt (Ulm), the product and splitting formulas can be used to show positivity properties of evolution families. On the terminology and properties of positive operator semigroups see Arendt et al. [1] or Engel and Nagel [7, Section VI.1]. Theorem 4.6. Assume that X is a Banach lattice. (1) Let the conditions of Assumptions 2.1 are satisfied and that all the operators A(r) and B(r) generate positive semigroups. Then the evolution family W given by (4) in Theorem 2.2 is positive. (2) Let the conditions of Assumptions 3.1 are satisfied and that all the evolution families U and V are positive. Then the evolution family W given by Theorem 3.2 is positive. The proof is an immediate consequence of the fact that the corresponding multiplication, shift, and evolution semigroups are positive. It would be an important and interesting question whether similar results hold for shape preserving semigroups in the sense of Kovács [20, Definition 20]. 5. A non-autonomous parabolic equation In order to demonstrate the range of our results, we will consider an important and much studied parabolic equation ∂t u(x, t) = u(x, t) + V (x, t)u(x, t)
(5)
in Rd with appropriate initial conditions, where V is a smooth and bounded function. Rewritten abstractly this takes the form d u(t) = u(t) + V (t)u(t) dt
(6)
2182
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
with u : R+ → L2 (Rd ) =: X a vector valued function. Hence a straightforward choice for the splitting for the evolution semigroups is A := −
d + , ds
B := the pointwise multiplication by V (t).
These operators (with appropriate domain) generate the following semigroups on the Banach space X := BUC(R; L2 (Rd )), T (t)f (s) := et f (s − t)
and
S(t)f (s) := etV (s) f (s).
We shall assume that V ∈ BUC(R; L∞ (Rd )), so B is bounded. The domain of the generator of S can be given explicitly, see Nagel, Nickel, and Romanelli [22, Proposition 4.3]:
D(A) = f ∈ BUC(R; X) ∩ BUC1 (R; X−1 ) : −f + −1 f ∈ BUC(R; X) , here −1 with domain L2 (Rd ) is the generator of the extrapolated semigroup, see Engel and Nagel [7, Section II.5.a] for the corresponding definitions. As a corollary of Theorem 2.2 we obtain the convergence of the sequential (and also the Strang) splitting procedures. Proposition 5.1. Suppose that the potential V ∈ BUC(R; L∞ (Rd )). Let W denote the semigroup generated by A + B on BUC(R; L2 (Rd )). For every function f ∈ BUC(R; L2 (Rd )) we have the product formula n t t T lim S f = W(t)f, n→∞ n n where the convergence is uniform on compact time-intervals. Let (W (t, s))ts denote the evolution system solving (6) on L2 (Rd ). Then for every u0 ∈ L2 (Rd ) we have
n−1
t−s pt t−s
V (s+ ) n e n e n u0 = 0, lim W (t, s)u0 − n→∞
locally uniformly for s t.
p=0
Proof. For the first assertion we only have to verify the stability Assumption 2.1(b), and then the assertion follows directly from Chernoff’s Theorem 1.1. Stability follows, because the semigroup et is contractive and V (s) is uniformly bounded. The second assertion is a direct consequence of Theorem 2.2. 2 Next we study convergence rates for the sequential splitting procedure applied to the above Eq. (5). To this end we apply Theorem 1.2 to the corresponding evolution semigroups. Theorem 5.2. Suppose that V ∈ BUC(R; W 2,∞ (Rd )) ∩ BUC1 (R; L∞ (Rd )). If f ∈ BUC1 (R; H2 (Rd )), we obtain
n
Ct 2
S t T t − W(t)f
n f BUC1 (R;H2 (Rd )) .
n n
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2183
Before we prove the theorem, let us first reformulate this product formula for the solutions of the non-autonomous problem. Corollary 5.3. Consider the non-autonomous parabolic equation
∂t u(x, t) = u(x, t) + V (x, t)u(x, t), u(x, s) = u0 (x),
t s, x ∈ Rd , x ∈ Rd .
Suppose that V ∈ BUC(R; W 2,∞ (Rd )) ∩ BUC1 (R; L∞ (Rd )). If u0 ∈ H2 (Rd ) then for the evolution family (W (t, s))ts solving the above problem we have
n−1
C(t − s)2 t−s pt t−s
V (s+ ) n e n u0 H 2 . e n u0
W (t, s)u0 −
n p=0
Proof. The assertion follows from Theorem 5.2, from the calculations in the proof of Theorem 5.1 and from the fact that the constant function f (s) := u0 ∈ H2 (Rd ) is in the domain of A. 2 In order to prove Theorem 5.2 we have to verify the commutator condition in Theorem 1.2 for the generators of the evolution semigroups. To do this, we need the following abstract identification of the domains of fractional powers of evolution semigroup generators. In what follows, let B(R; Y ), BUCα (R; Y ) etc. denote the space of bounded Y -valued functions, the space of α-Hölder continuous Y -valued functions etc., where Y is some Banach space. Let X be a fixed Banach space, and let etA be a (contractive) analytic semigroup with generator (A, D(A)) thereon. The fractional powers of −A are denoted by ((−A)α , D((−A)α )). Denote by Fα the abstract Favard spaces for X and (etA )t0 , i.e.,
tA
e x − x
Fα := x ∈ X: x α := x + sup
< +∞ , tα t>0 which becomes a Banach space if endowed with the norm · α . For every α, β ∈ (0, 1) with α > β we have continuous embeddings (see Engel and Nagel [7, Section II.5.]): Fα → D (−A)β → Fβ . Consider now the Banach space X := BUC(R; X) and the semigroup T (t)f (s) := etA f (s − t) thereon. We are interested in the Favard spaces Xα of this semigroup. Proposition 5.4. In the above setting we have the following continuous inclusions: BUC R; D (−A)α ∩ Xα → BUC R; D (−A)β ∩ BUCβ (R; X), for all 0 < β α < 1, and
2184
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
BUCα (R; X) ∩ BUC R; D (−A)α → BUC R; D (−A)β ∩ Xβ , for all 0 < β α < 1. Proof. We show the statement for β = α, the rest then immediately follows. We start with the second inclusion. For f ∈ BUC(R; X) we can write
tA
T (t)f − f
= sup sup e f (s − t) − f (s) sup
tα tα t>0 t>0 s∈R etA f (s) − f (s) + etA (f (s − t) − f (s)) tα t>0 s∈R
sup f (s) F + f BUCα . = sup sup
α
s∈R
This shows that if f ∈ B(R; Fα ) ∩ BUCα (R; X), then f ∈ Xα , and the inclusion is continuous, i.e. f Xα c f B(R;Fα ) + f BUCα (R;X) . To see the first inclusion we use now that A generates an analytic semigroup. If f ∈ BUC(R; D((−A)α )), then
sup t>0
etA f (s − t) − f (s − t) (etA − I )(−A)−α (−A)α f (s − t) = sup tα tα t>0
C sup (−A)α f (s − t)
t∈R
C f BUC(R;D((−A)α )) . This implies then
T (t)f − f
f (s − t) − f (s)
+ C f BUC(R;D((−A)α )) . sup sup sup
tα tα t>0 s∈R t>0 The proof is complete.
2
Now we are in the position to check the required commutator condition and thus to prove Theorem 5.2. Proof of Theorem 5.2. Consider now the evolution semigroup corresponding to the nonautonomous equation (5). The corresponding generator is given formally as −
d + + V (t). ds
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2185
Take now f ∈ BUC1 (R; H2 (Rd )), and notice that then f belongs to the domain D(A). We calculate the commutator of A and B. We have [A, B]f = −V (t)f (t) + V (t) f + 2∇V (t) · ∇f (t). Now, if we assume that V ∈ BUC1 (R; L∞ (Rd )) and V ∈ BUC(R; W 2,∞ (Rd )), then the first two terms can be estimated by c f , so we have only to deal with the term 2∇V · ∇f , for which it suffices to estimate ∂i f (t) for i = 1, . . . , d. We have
∂i f (t) c 1/2 f (t)
2 2
∂i is 1/2 -bounded on L2 .
By Proposition 5.4 this completes the proof of the commutator condition (1) in the form
[A, B]f (−A)α f for all f ∈ D(A) with some given α 1/2. Hence Theorem 1.2 yields the assertion.
2
6. Numerical examples illustrating the convergence In Section 5 we already introduced the non-autonomous parabolic equation (sometimes also called imaginary time Schrödinger equation) ∂t u(x, t) = u(x, t) + V (x, t)u(x, t) in Rd with appropriate initial conditions with V being a smooth and bounded function. In the following we will apply the sequential splitting introduced in Section 3 to the sub-operators A(t) := and B(t) := multiplication by V (x, t). In Theorem 2.2 we showed that the product formula describing the sequential splitting is convergent also in the case if we are able to solve the corresponding autonomous Cauchy problems (Eq. 1)–(Eq. 2) with operators A(r) and B(r) for every time level r ∈ R. We will use this result when constructing our numerical scheme. In order to illustrate numerically the convergence of the sequential splitting and give an estimate on its order, let us consider the following non-autonomous equation with boundary and initial conditions: ⎧ 2 ⎪ ⎨ ∂t u(x, t) = ∂x u(x, t) + V (x, t)u(x, t), u(0, t) = u(1, t) = 0, ⎪ ⎩ u(x, 0) = u0 (x),
t 0, x ∈ [0, 1], t 0, x ∈ [0, 1]
with functions V (x, t) and u0 (x) given later on in the example.
(7)
2186
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
6.1. Error analysis Let (uspl )ni denote the approximation of the exact solution u(iδ, nτ ) of problem (7) at time nτ and at the grid point iδ (with n = 0, . . . , N − 1 and i = 0, . . . , I − 1) using sequential splitting. 1 At this point the time-step τ = N 1−1 and the grid size δ = I −1 have certain given values. We call n n n n (uspl ) = ((uspl )0 , (uspl )1 , . . . , (uspl )I −1 ), n = 0, 1, . . . , N − 1, the split solution of problem (7). As already seen, the order of the splitting procedure can be estimated with the help of the splitting error defined by
n Espl := un − unspl
where un = (un0 , un1 , . . . , unI−1 ) with uni = u(iδ, nτ ), i = 0, 1, . . . , I − 1. With this notation the splitting procedure (or an arbitrary finite difference method) is of order p > 0 if for sufficiently smooth initial values there is a constant C > 0 such that for all t ∈ [0, t0 ] we have n Espl
C , np
or, if the method is stable, equivalently, 1 C τ p+1 . Espl 1 is In general, the exact solution of problem (7) is unknown, therefore, the local splitting error Espl n to be estimated as well. To this end we compute a so-called reference solution uref on a finer space grid using no splitting procedure. Then the order p of the splitting procedure can be determined 1 Cτ p+1 . Approximating un with un , we as follows. From the definition of p we have Espl ref 1 ≈E 1 := u1 − u1 Cτ p+1 . Thus, obtain Espl spl ref spl 1 log Espl (p + 1) log τ + log C. 1 for many different Then we can estimate p by computing the approximate local splitting error Espl values of the time-step τ , plotting the logarithm of the results, and fitting a line of form y(w) = aw + b to them. Hence, a ≈ p + 1 and b ≈ log C. Note, however, that the split solution contains not only the splitting error but also a certain amount of error originating from the spatial and temporal discretization. In what follows we show how to determine the numerical solutions u1ref and u1spl . We also note that it is reasonable to compute a relative local error defined as
Eloc =
1 Espl
u1ref
because this yields the ratio how the split solution differs from the reference solution.
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2187
6.2. Numerical scheme In order to solve numerically the problem (7) we should discretize it in both space and time. For the temporal discretization we used the Crank–Nicholson method, and we chose the finite difference method for the spatial discretization. 6.2.1. Reference solution As mentioned above, we need a reference solution unref computed without using splitting procedures. After discretizing the equation, we obtain the following numerical scheme for determining (un+1 ref )i : −1 n+1 1 + (Href )ni unref i uref i = 1 − (Href )n+1 i
(8)
with (Href )ni
n+1 n+1 n+1 τ ui+1 − 2ui + ui−1 n = + Vi , 2 δ2
where Vin := V (iδ, nτ ). 6.2.2. Split solution Application of sequential splitting means that instead of the whole problem (7) two subproblems are solved. In our examples the first sub-problem corresponds to the diffusion equation ∂t uA (x, t) = ∂x2 uA (x, t). Its numerical solution unA can also be computed using Crank–Nicholson temporal and finite difference spatial discretization methods. Then we obtain the following numerical scheme similar to (8): n+1 −1 uA i = 1 − (HA )n+1 1 + (HA )ni unA i i
(9)
with (HA )ni =
n+1 n+1 n+1 τ ui+1 − 2ui + ui−1 . 2 δ2
The second sub-problem has the multiplication operator by V (x, t) on its right-hand side, i.e. ∂t uB (x, t) = V (x, t)uB (x, t). We refer again to Theorem 2.2 and take the function V only at time levels t = nτ , n = 0, 1, . . . , N − 1. In this (autonomous) case the exact solution uB (x, t) = etV (x,nτ ) u0 (x) is known. At the nth time level and on the space grid it has the form n uB i = uB (iδ, nτ ) = eτ V (iδ,nτ ) u0 (iδ). Due to the product formula (3), the split solution unspl is given by the following algorithm: for i = 0, . . . , I − 1 initial function: (u0A )i := u0 (iδ) end
(10)
2188
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
Fig. 1. Numerical solution of Eq. (7) at time levels t = 0, t = 10−3 , t = 5 · 10−3 , and t = 10−2 , respectively.
for n = 0, 1, . . . , N − 1 for i = 0, 1, . . . , I − 1 solve the first sub-problem using (9) ⇒ (unA )i end for i = 0, 1, . . . , I − 1 solve the second sub-problem using (10) ⇒ (unB )i end end −1 N −1 split solution: uN spl := uB
6.3. Numerical results Now we present some numerical results on the following example. Choose V (x, t) = t − 500x 2
and u0 (x) = e−50(x−0.4) . 2
Since the exact solution is unknown in this case, we should estimate the local splitting error using the reference solution instead of the exact one. Then the relative local splitting error Eloc and its order p can be measured. In Fig. 1 the time-behavior of the reference solution can be seen at the four time levels t = 0, t = 10−3 , t = 5 · 10−3 , and t = 10−2 , respectively. The effect of the diffusion can be clearly observed. Fig. 2 shows the result of the fitting. The dots correspond to log(Eloc ) for the various step sizes. The line fitted to these points has the form y(log(τ )) = a log(τ ) + b with a = 1.9470 and b = 3.25925. As mentioned above, the order of the splitting procedure p can be estimated by a − 1 ≈ 1, that is, the sequential splitting is of first order.
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
2189
Fig. 2. Results obtained by applying the sequential splitting with various time steps (dots), and the line y(w) = aw + b fitted to them with parameters a = 1.9470 ≈ p + 1 and b = 3.25925.
Acknowledgments A. Bátkai was supported by the Alexander von Humboldt-Stiftung. We thank Wolfgang Arendt (Ulm), Roland Schnaubelt (Karlsruhe) and Alexander Ostermann (Innsbruck) for interesting and useful discussions. The European Union and the European Social Fund have provided financial support to the project under the grant agreement no. TÁMOP-4.2.1/B-09/1/KMR. References [1] W. Arendt, A. Grabosch, G. Greiner, U. Groh, H.P. Lotz, U. Moustakas, R. Nagel, F. Neubrander, U. Schlotterbeck, One-Parameter Semigroups of Positive Operators, Lecture Notes in Math., vol. 1184, Springer-Verlag, Berlin, 1986. [2] A. Bátkai, P. Csomós, G. Nickel, Operators and spatial approximations for evolution equations, J. Evol. Equ. 9 (2009) 613–636. [3] M. Bjørhus, Operator splitting for abstract Cauchy problems, IMA J. Numer. Anal. 18 (1998) 419–443. [4] V. Cachia, V.A. Zagrebnov, Operator-norm approximation of semigroups by quasi-sectorial contractions, J. Funct. Anal. 180 (2001) 176–194. [5] P.R. Chernoff, Product Formulas, Nonlinear Semigroups, and Addition of Unbounded Operators, Mem. Amer. Math. Soc., vol. 140, American Mathematical Society, Providence, RI, 1974. [6] P. Csomós, G. Nickel, Operator splitting for delay equations, Comput. Math. Appl. 55 (2008) 2234–2246. [7] K.-J. Engel, R. Nagel, One-Parameter Semigroups for Linear Evolution Equations, Grad. Texts in Math., vol. 194, Springer-Verlag, New York, 2000, with contributions by S. Brendle, M. Campiti, T. Hahn, G. Metafune, G. Nickel, D. Pallara, C. Perazzoli, A. Rhandi, S. Romanelli, R. Schnaubelt. [8] D.E. Evans, Time dependent perturbations and scattering of strongly continuous groups on Banach space, Math. Ann. 221 (1976) 275–290. [9] I. Faragó, Á. Havasi, Consistency analysis of operator splitting methods for C0 -semigroups, Semigroup Forum 74 (2007) 125–139. [10] I. Faragó, Á. Havasi, Operator Splittings and Their Applications, Math. Res. Dev., Nova Science Publishers, New York, 2009. [11] T. Graser, Operator multipliers generating strongly continuous semigroups, Semigroup Forum 55 (1997) 68–79. [12] E. Hansen, A. Ostermann, Exponential splitting for unbounded operators, Math. Comp. 78 (2009) 1485–1496. [13] E. Hansen, A. Ostermann, Dimension splitting for time dependent operators, in: X. Hou, et al. (Eds.), Dynamical Systems and Differential Equations, Proceedings of the 7th AIMS International Conference, Arlington, Texas, USA, DCDS Supplement 2009, American Institute of Mathematical Sciences, Springfield MO, 2009, pp. 322–332.
2190
A. Bátkai et al. / Journal of Functional Analysis 260 (2011) 2163–2190
[14] H. Holden, K.H. Karlsen, K.-A. Lie, N.H. Risebro, Splitting Methods for Partial Differential Equations with Rough Solutions, European Mathematical Society, 2010. [15] J.S. Howland, Stationary scattering theory for time-dependent Hamiltonians, Math. Ann. 207 (1974) 315–335. [16] T. Ichinose, H. Neidhardt, V.A. Zagrebnov, Trotter–Kato product formula and fractional powers of self-adjoint generators, J. Funct. Anal. 207 (2004) 33–57. [17] T. Jahnke, C. Lubich, Error bounds for exponential operator splittings, BIT 40 (4) (2000) 735–744. [18] T. Kato, Linear evolution equations of “hyperbolic” type, J. Fac. Sci. Univ. Tokyo Sect. I 17 (1970) 241–258. [19] H. Kellermann, Linear evolution equations with time-dependent domain, Semesterberichte Funktionalanalysis, Tübingen, WS, 1985. [20] M. Kovács, On positivity, shape, and norm-bound preservation of time-stepping methods for semigroups, J. Math. Anal. Appl. 304 (2005) 115–136. [21] R. Nagel, G. Nickel, Well-posedness for nonautonomous abstract Cauchy problems, in: Evolution equations, semigroups and functional analysis, Milano, 2000, in: Progr. Nonlinear Differential Equations Appl., vol. 50, Birkhäuser, Basel, 2002, pp. 279–293. [22] R. Nagel, G. Nickel, S. Romanelli, Identification of extrapolation spaces for unbounded operators, Quaest. Math. 19 (1996) 83–100. [23] H. Neidhardt, On abstract linear evolution equations, I, Math. Nachr. 103 (1981) 283–298. [24] H. Neidhardt, On abstract linear evolution equations, II, Prepr., Akad. Wiss. DDR, Inst. Math. P-MATH-07/81, Berlin, 1981. [25] H. Neidhardt, On abstract linear evolution equations, III, Prepr., Akad. Wiss. DDR, Inst. Math. P-MATH-05/82, Berlin, 1982. [26] H. Neidhardt, V.A. Zagrebnov, Trotter–Kato product formula and symmetrically normed ideals, J. Funct. Anal. 167 (1999) 113–147. [27] H. Neidhardt, V.A. Zagrebnov, Linear non-autonomous Cauchy problems and evolution semigroups, Adv. Differential Equations 14 (2009) 289–340. [28] G. Nickel, Evolution semigroups for nonautonomous Cauchy problems, Abstr. Appl. Anal. 2 (1997) 73–95. [29] G. Nickel, Evolution semigroups and product formulas for nonautonomous Cauchy problems, Math. Nachr. 212 (2000) 101–116. [30] G. Nickel, R. Schnaubelt, An extension of Kato’s stability condition for nonautonomous Cauchy problems, Taiwanese J. Math. 2 (1998) 483–496. [31] R. Schnaubelt, Sufficient conditions for exponential stability and dichotomy of evolution equations, Forum Math. 11 (1999) 543–566. [32] R. Schnaubelt, Well-posedness and asymptotic behaviour of non-autonomous linear evolution equations, in: Evolution Equations, Semigroups and Functional Analysis, Milano, 2000, in: Progr. Nonlinear Differential Equations Appl., vol. 50, Birkhäuser, Basel, 2002, pp. 311–338. [33] P.-A. Vuillermot, A generalization of Chernoff’s product formula for time-dependent operators, J. Funct. Anal. 259 (2010) 2923–2938. [34] P.-A. Vuillermot, W.F. Wreszinski, V.A. Zagrebnov, A Trotter–Kato product formula for a class of non-autonomous evolution equations, Nonlinear Anal. 69 (2008) 1067–1072. [35] P.-A. Vuillermot, W.F. Wreszinski, V.A. Zagrebnov, A general Trotter–Kato formula for a class of evolution operators, J. Funct. Anal. 257 (2009) 2246–2290.
Journal of Functional Analysis 260 (2011) 2191–2221 www.elsevier.com/locate/jfa
Loops in SU(2) and factorization Doug Pickrell Mathematics Department, University of Arizona, 617 N. Santa Rita, Tucson, AZ, United States Received 18 May 2009; accepted 3 January 2011 Available online 13 January 2011 Communicated by L. Gross
Abstract We discuss analytic issues associated with a refinement of triangular factorization for the loop group of SU(2). This factorization is of interest because (1) Toeplitz determinants factor in the associated coordi2 nates, and (2) the factorization is intimately related to the critical degree of smoothness for loops, W 1/2,L . © 2011 Elsevier Inc. All rights reserved. Keywords: Loop group; Factorization; Toeplitz operator; Determinant
0. Introduction The main purpose of this paper is to prove functional analytic generalizations of Theorems 0.1 and 0.2 below (which are basically algebraic). Let Lfin SU(2) (Lfin SL(2, C)) denote the group consisting of functions S 1 → SU(2) (SL(2, C), respectively) having finite Fourier series, with pointwise multiplication. For example, for ζ ∈ C and n ∈ Z, the function 1 ζ z−n , S 1 → SU(2) : z → a(ζ ) −ζ¯ zn 1 where a(ζ ) = (1 + |ζ |2 )−1/2 , is in Lfin SU(2). It is known is dense in that Lfin SU(2) C ∞ (S 1 , SU(2)) (Proposition 3.5.3 of [8]). Also, if f (z) = fn zn , let f ∗ (z) = f¯n z−n . If f ∈ H 0 (), then f ∗ ∈ H 0 (∗ ), where is the open unit disk, ∗ is the open unit disk at ∞, and H 0 (U ) denotes the space of holomorphic functions for a domain U . E-mail address: [email protected]. 0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2011.01.001
2192
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Theorem 0.1. Suppose that k1 ∈ Lfin SU(2). The following are equivalent: (I.1) k1 is of the form k1 (z) =
b(z) , a ∗ (z)
a(z) −b∗ (z)
z ∈ S1,
where a and b are polynomials in z, and a(0) > 0. (I.2) k1 has a factorization of the form k1 (z) = a(ηn )
−η¯ n zn 1
1 ηn z−n
. . . a(η0 )
1 η0
−η¯ 0 1
,
for some finite subset {η0 , . . . , ηn } ⊂ C. (I.3) k1 has triangular factorization of the form
n 1 −j j =0 y¯j z
0 1
0
a1 0
a1−1
α1 (z) γ1 (z)
β1 (z) , δ1 (z)
where a1 > 0, the third factor is a polynomial in z which is unipotent upper triangular at z = 0. Similarly, for k2 ∈ Lfin SU(2), the following are equivalent: (II.1) k2 is of the form k2 (z) =
−c∗ (z) , d(z)
d ∗ (z) c(z)
z ∈ S1,
where c and d are polynomials in z, c(0) = 0, and d(0) > 0. (II.2) k2 has a factorization of the form
1 k2 (z) = a(ζn ) ¯ − ζn z n
ζn z−n 1
for some finite subset {ζ1 , . . . , ζn } ⊂ C. (II.3) k2 has triangular factorization of the form n −j a 1 2 j =1 x¯ j z 0 0 1
1 . . . a(ζ1 ) −ζ¯1 z
0 a2−1
α2 (z) γ2 (z)
ζ1 z−1 1
,
β2 (z) , δ2 (z)
where a2 > 0 and the third factor is a polynomial in z which is unipotent upper triangular at z = 0. Remark. The two sets of conditions are equivalent; they are intertwined by the outer involution σ of LSL(2, C) given by σ
a c
b d
=
d bz
cz−1 a
.
(0.1)
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2193
This theorem basically follows from results in [6], but it is possible to give a direct argument (not involving Lie theory). We will present this, and functional analytic generalizations, in Section 2. The terminology regarding triangular factorization and Toeplitz operators in the following theorem is reviewed in Section 1. Theorem 0.2. (a) If {ηi } and {ζj } are rapidly decreasing sequences of complex numbers, then the limits k1 (z) = lim a(ηn ) n→∞
1
−η¯ n zn
ηn z−n
1
. . . a(η0 )
1
−η¯ 0
η0
1
and k2 (z) = lim a(ζn ) n→∞
1 −ζ¯n zn
ζn z−n 1
. . . a(ζ1 )
1 −ζ¯1 z
ζ1 z−1 1
,
exist in C ∞ (S 1 , SU(2)). (b) Suppose g ∈ C ∞ (S 1 , SU(2)). The following are equivalent: (i) g has a triangular factorization g = lmau (see (1.1)), where l and u have C ∞ boundary values. (ii) g has a factorization of the form g(z) = k1∗ (z)
eχ(z) 0
0 e−χ(z)
k2 (z),
where χ ∈ C ∞ (S 1 , iR), and k1 and k2 are as in (a). (iii) The Toeplitz operator A(g) (see (1.3)) and the shifted Toeplitz operator A1 (g) (see the paragraph following (1.5)) are invertible. Remarks. (a) Suppose that g ∈ Lfin SU(2). The l and u factors in (i) are also in Lfin SL(2, C), but they are essentially never unitary on S 1 . On the other hand the factors kj in (ii) are unitary, but in general they are not in Lfin SU(2). [If k1 , k2 ∈ Lfin SU(2), then χ must be constant. Since Lfin SU(2) is dense in C ∞ (S 1 , SU(2)), the parameterization in (ii) implies that generically g will correspond to nonconstant χ .] (b) There is a generalization of this theorem with U (2) in place of SU(2), where one restricts to loops in the identity component. We will restrict our attention to SU(2), to simplify the exposition. (c) This factorization is of great interest because in particular (1) the Toeplitz determinant det(A(g)∗ A(g)) factors in the associated coordinates (see Theorem 2.2 below), (2) the invariant measures discussed in Part III of [5] factor in these coordinates, and conjecturally (3) the Evens–Lu homogeneous Poisson structure discussed in [6] factors in these coordinates.
2194
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
The outline of the paper is the following. Section 1 is a review of standard facts about triangular factorization. In Sections 2 and 3, we prove Theorems 0.1 and 0.2, respectively. In these two sections, the main point is to extend the equivalences above to other function spaces, especially the critical 2 Sobolev space W 1/2,L ; see Theorems 2.3 and 3.2. It seems possible that there are L2 generalizations of these theorems. This is briefly discussed in Section 4. In Appendix A we discuss the combinatorial relation between x ∗ and ζ in Theorem 0.1. This relation is central to the L2 question, and applications. Unfortunately this relation remains mysterious to me. The generalization of the algebraic aspects of this paper from SU(2) to general simply connected compact groups is known [6,7], but considerably more complicated. For SU(2) it suffices to consider one representation, the defining representation, which greatly simplifies everything. Notation. Sobolev spaces will be denoted W s , and will always be understood in the L2 by ∞ sense. The space of sequences satisfying n=1 n|ζn |2 < ∞ will be denoted by w 1/2 . We will write Meas(S 1 , SU(2)) for the group of (equivalence classes of) measurable maps. This group is usually equipped with the topology of convergence in measure, but this will not play a role in this paper. We will use [4] as a general reference for Hankel and Toeplitz operators. C) 1. Triangular factorization for LSL(2,C Suppose that g ∈ L1 (S 1 , SL(2, C)). A triangular factorization of g is a factorization of the form g = l(g)m(g)a(g)u(g),
(1.1)
where l=
l11 l21
l12 l22
l has a L2 radial limit, m = u=
u11 u21
∈ H ∗ , SL(2, C) , 0
0 , 0 m−1 0
m0
u12 u22
m0 ∈ S 1 , a(g) =
∈ H , SL(2, C) , 0
l(∞) = 0 , 0 a0−1
a0
1 l21 (∞)
0 1
,
a0 > 0,
u(0) =
1 u12 (0) 0 1
,
and u has a L2 radial limit. Note that (1.1) is an equality of measurable functions on S 1 . A Birkhoff (or Wiener–Hopf, or Riemann–Hilbert) factorization is a factorization of the form g = g− g0 g+ , where g− ∈ H 0 (∗ , ∞; SL(2, C), 1), g0 ∈ SL(2, C), g+ ∈ H 0 (, 0; SL(2, C), 1), and g± have L2 radial limits on S 1 . Clearly g has a triangular factorization if and only if g has a Birkhoff factorization and g0 has a triangular factorization, in the usual sense of matrices. Proposition 1. Birkhoff and triangular factorizations are unique.
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2195
Proof. If g− g0 g+ = h− h0 h+ are two Birkhoff factorizations, then the function F equal to −1 1 1 h−1 − g− for |z| 1 and (h0 h+ ) g0 g+ for |z| 1 is holomorphic on C \ S and integrable on S . Integrability implies that the singularities along S 1 are removable. Therefore F is constant, and the normalization conditions force F = 1. This implies uniqueness. 2 Remark. In the definition of Birkhoff factorization, if the L2 condition is replaced by the weaker condition that g± have pointwise radial limits a.e. on S 1 , then factorization is not unique. For example
1 0 0 1
z+1 =
z−1
0
0
z−1 z+1
−1 0 0 −1
− z−1 z+1
0
0
− z+1 z−1
is a factorization in this weaker sense. At least for the purposes of this paper, L2 appears to be the natural regularity condition in the definitions of factorization. As in [8], consider the polarized Hilbert space H := L2 S 1 , C 2 = H+ ⊕ H− ,
(1.2)
where H+ = P+ H consists of L2 -boundary values of functions holomorphic in . If g ∈ L∞ (S 1 , SL(2, C)), we write the bounded multiplication operator defined by g on H as Mg =
A(g) C(g)
B(g) D(g)
(1.3)
where A(g) = P+ Mg P+ is the (block) Toeplitz operator associated to g and so on. If g has the an bn , then relative to the basis for H: Fourier expansion g = gn zn , gn = cn dn
. . . 1 z, 2 z, 1 , 2 , 1 z−1 , 2 z−1 , . . .
(1.4)
where {1 , 2 } is the standard basis for C2 , the matrix of Mg is block periodic of the form . .. a0 .. c0 .. a−1 .. c−1 − − .. a−2 .. c−2 .
. b0 d0 b−1 d−1 − b−2 d−2 .
. a1 c1 a0 c0 − a−1 c−1 .
. b1 d1 b0 d0 − b−1 d−1 .
. . | a2 | c2 | a1 | c1 − − | a0 | c0 . .
. b2 d2 b1 d1 − b0 d0 .
.. .. .. .. − .. ..
(1.5)
From this matrix form, it is clear that, up to equivalence, Mg has just two types of “principal minors”, the matrix representing A(g), and the matrix representing the shifted Toeplitz operator A1 (g), the compression of Mg to the subspace spanned by {i zj : i = 1, 2, j > 0} ∪ {1 }. Relative to the basis (1.4), the involution σ defined by (0.1) is equivalent to conjugation by the shift
2196
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
operator, i.e. the matrix of Mσ (g) is obtained from the matrix for Mg by shifting one unit along the diagonal (in either direction: the result is the same, because Mg commutes with Mz , the square of the shift operator). Consequently the shifted Toeplitz operator is equivalent to the operator A(σ (g)). Theorem 1.1. Suppose that g ∈ L∞ (S 1 , SL(2, C)). (a) If A(g) is invertible, then g has a Birkhoff factorization, where −1
(g0 g+ )
−1 1 −1 0 , A(g) . = A(g) 0 1
(1.6)
(b) If A(g) and A1 (g) are invertible, then g has a triangular factorization. Proof. For part (a), let M denote the 2 × 2 matrix valued loop on the right hand side of (1.6). The columns of this matrix are in H+ . We must check that det(M) = 1 on . Because the entries of M are in L2 (S 1 ), det(M) ∈ L1 (S 1 ). Because det(g) = 1 on S 1 , and gM = 1 + h, where the columns of h are in H− , det(M) is holomorphic on , and on S 1 equals a function which is holomorphic in ∗ and equal to 1 at ∞. Consequently det(M) has a holomorphic extension to ˆ and hence must be identically 1. We can now take g0 g+ = M −1 . This will have L2 all of C, entries, because M is unimodular. α β For part (b), suppose that g has Birkhoff factorization g = g− g0 g+ , and let g0 = γ δ . The matrix representing Mg0 g+ has the form
.. .. .. .. − .. ..
. α γ 0 0 − 0 0 .
. β δ 0 0 − 0 0 .
. ∗ ∗ α γ − 0 0 .
. ∗ ∗ β δ − 0 0 .
. | | | | − | | .
. ∗ ∗ ∗ ∗ − α γ .
. ∗ ∗ ∗ ∗ − β δ .
.. .. .. .. − .. ..
The matrix representing Mg− is unipotent and lower triangular. Consequently A1 (g) = A1 (g− )A1 (g0 g+ ), A1 (g− ) is unipotent lower triangular, and A1 (g) is invertible iff A1 (g0 g+ ) is invertible iff α = (g0 )11 = 0. This implies part (b). 2 In Theorem 1.1 we are assuming that g is bounded. It is not generally true that the factors g± are bounded. Recall (see [2]) that a Banach ∗-algebra A ⊂ L∞ (S 1 ) is said to be decomposing if A = A+ ⊕ A− , i.e. P+ : A → A+ is continuous. For example C s (S 1 ) is decomposing, provided s > 0 and nonintegral (see p. 60 of [2]), and W s is a decomposing algebra, provided s > 1/2. (Note: W 1/2 is not an algebra.)
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2197
Corollary 1. Suppose that g ∈ L∞ (S 1 , SL(2, C)) belongs to a decomposing algebra A and has a Birkhoff factorization. Then the factors g± belong to A. This follows from the continuity of P+ on A and the formula in (a) of Theorem 1.1. Theorem 1.2. If g ∈ L∞ (S 1 , SL(2, C)), then B(g) and C(g) are compact operators if and only if g ∈ VMO, the space of functions with vanishing mean oscillation. If g ∈ QC := L∞ ∩ VMO, then A(g) and D(g) are Fredholm of index 0. The first statement is due to Hartmann, and the second to Douglas (see pp. 27 and 108 of [4], respectively). Remarks. (a) In the context of Theorem 1.1, if g has a Birkhoff factorization, then A(g) is 1–1: for if h ∈ H+ , then there is a Hardy decomposition of (not necessarily L2 ) C2 valued functions −1 −1 g− (Mg h)+ = g0 g+ h − g− (Mg h)− ;
thus if A(g)h = 0, then h = 0. A Birkhoff factorization for bounded g does not imply A(g) is invertible (see Theorem 5.1, p. 109 of [4]). (b) For g ∈ QC(S 1 , SL(2, C)), the converse in (a) (and also (b)) of Theorem 1.1 holds, because the Fredholm index of A(g) vanishes. Moreover there is a notion of generalized triangular factorization for all g (see [2] and Chapter 8 of [8]). (c) Theorem 1.2 implies that the Toeplitz operator defines a holomorphic map QC S 1 , SL(2, C) → Fred(H+ ) : g → A(g). There is a determinant line bundle Det → Fred(H+ ) with canonical section, A → det(A), which is nonvanishing precisely when A is invertible. In the notation of [6], σ0 = det(A(g)) ˜ is the pullback of the canonical section, and σ1 = det(A(σ (g))), ˜ viewed as holomorphic functions of g˜ in the universal C∗ extension of QC(S 1 , SL(2, C)). If g has a triangular factorization, then m(g)a(g) =
σ1 /σ0 0
0 σ0 /σ1
,
(1.7)
as the matrix manipulations above suggest (see (1.5)–(1.6) of [6]). 2. Proof of Theorem 0.1, and generalizations to other function spaces In the course of proving Theorem 0.1, we will also prove the following Theorem 2.1. Suppose that k1 ∈ C s (S 1 , SU(2)), where s > 0 and nonintegral. The following are equivalent:
2198
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
(I.1) k1 is of the form k1 (z) =
a(z)
b(z)
−b∗ (z)
a ∗ (z)
z ∈ S1,
,
where a, b ∈ H 0 () have C s boundary values, a(0) > 0, and a and b do not simultaneously vanish at a point in . (I.3) k1 has triangular factorization of the form
1 ∞ ∗ −j j =0 yj z
0 1
0
a1 0
a1−1
α1 (z) γ1 (z)
β1 (z) , δ1 (z)
where the factors have C s boundary values. Similarly, the following are equivalent: (II.1) k2 is of the form k2 (z) =
−c∗ (z) , d(z)
d ∗ (z) c(z)
z ∈ S1,
where c, d ∈ H 0 () have C s boundary values, c(0) = 0, d(0) > 0, and c and d do not simultaneously vanish at a point in . (II.3) k2 has triangular factorization of the form
1 0
∞
∗ −j j =1 xj z
1
a2 0
0
a2−1
α2 (z) γ2 (z)
β2 (z) , δ2 (z)
where the factors have C s boundary values. Remarks. (a) When k2 ∈ Lfin SU(2), the determinant condition c∗ c + dd ∗ = 1 can be interpreted as an equality of finite Laurent expansions in C∗ . Together with d(0) > 0, this implies that c and d do not simultaneously vanish. Thus the added hypotheses in (I.1) and (II.1) of Theorem 2.1 are superfluous in the finite case. (b) The kind of example we have to avoid in the C ∞ case is k2 =
d∗ 0
0 , d
d=
z−r rz − 1
where 0 < r < 1. (c) The factorizations in (I.2) and (II.2) of Theorem 0.1 are akin to nonabelian Fourier expansions. Consequently it is highly unlikely that one can characterize the coefficients for C s loops. For this purpose we consider a Sobolev completion at the end of this section.
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2199
Proof. As we remarked in the Introduction, the two sets of conditions are intertwined by the outer involution σ . Also it is evident that (II.3) ⇒ (II.1): by multiplying the matrices in (II.3), we see that c = a2−1 γ2 and d = a2−1 δ2 , and these cannot simultaneously vanish at a point in . We will now prove, in reference to Theorem 0.1, that (II.2) ⇒ (II.1) ⇒ (II.3) ⇒ (II.2). The second step will also complete the proof of Theorem 2.1. It is straightforward to calculate that a loop as in (II.2) has the matrix form in (II.1): Proposition 2. The product in (II.2) equals
δ∗ 2 a(ζi ) γ2
−γ2∗ δ2
,
where γ2 (z) =
∞
γ2,n zn ,
n=1
(−ζ¯i1 )ζj1 . . . (−ζ¯ir )ζjr (−ζ¯ir+1 ), γ2,n = the sum over multiindices satisfying
0 < i1 < j1 < · · · < jr < ir+1 ,
i∗ −
j∗ = n,
and δ2 (z) = 1 + δ2,n =
∞
δ2,n zn ,
n=1
ζi1 (−ζ¯j1 ) . . . ζir (−ζ¯jr ),
the sum over multiindices satisfying 0 < i1 < j1 < · · · < jr ,
(j∗ − i∗ ) = n.
This is a straightforward induction, which we omit. Now suppose that we are given a loop k2 satisfying the conditions in (II.1), with one exception: for later convenience, we initially assume that k2 is merely measurable. Suppose that A(k2 )f = P+
d∗ c
−c∗ d
f1 f2
0 = . 0
Then cf1 + df2 = 0 ∈ H 0 (), and hence by the independence of c and d around S 1 , (f1 , f2 ) = λ(d, −c). Because c and d do not simultaneously vanish, this implies that λ is holomorphic in . We also have (d ∗ λd − c∗ λ(−c))+ = λ+ = 0. Thus λ = 0. Thus the Toeplitz operator is invertible. [Note: conversely, if c and d have a common zero z0 ∈ , then the Toeplitz operator is not invertible: take λ = 1/(z − z0 ).] The same argument shows that A1 (k2 ), and also D(k2 ), are invertible.
2200
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
We must now show that this loop has a triangular factorization as in (II.3), i.e. we must solve for a2 , x ∗ , and so on, in n ∗ −j a 1 0 α2 (z) β2 (z) d (z) −c∗ (z) 2 j =1 x¯ j z = . (2.1) k2 (z) = c(z) d(z) 0 a2−1 γ2 (z) δ2 (z) 0 1 The form of the second row implies that we must have a2 = d(0)−1 , and γ2 = a2 c,
and δ2 = a2 d,
(2.2)
because δ2 (0) = 1. This does define a2 > 0, γ2 and δ2 in a way which is consistent with (II.3), because c(0) = 0 and d(0) > 0. Using (2.2), the first row in (2.1) is equivalent to d ∗ = α2 + x ∗ c,
and −c∗ = β2 + x ∗ d.
(2.3)
In the finite case, by considering the second equation as an equality in C∗ , we can immediately obtain that x ∗ = −(c∗ /d)− . The C s case is more involved. Consider the Hardy space polarization H := L2 S 1 , dθ = H + ⊕ H − , and the operator T : H − → H − ⊕ H − : x∗ →
∗ ∗ cx − , dx − .
The operator T is the restriction of D(k2 )∗ = D(k2∗ ) to the subspace {(x ∗ , 0) ∈ H− }, consequently it is injective with closed image. The adjoint of T is given by T ∗ : H − ⊕ H − → H − : f ∗ , g ∗ → c∗ f ∗ + d ∗ g ∗ . If (f ∗ , g ∗ ) ∈ ker(T ∗ ), then c∗ f ∗ + d ∗ g ∗ vanishes in the closure of ∗ , and because |c|2 + |d|2 = 1 around S 1 , (f ∗ , g ∗ ) = λ∗ (d ∗ , −c∗ ), where λ∗ is holomorphic in ∗ and vanishes at ∞ ∗ , −c∗ ) ∈ ker(T ∗ )⊥ : because d ∗ (∞) = d(0) > 0. We now claim that (d−
∗ d− f + −c∗ g dθ =
λ d ∗ d + c∗ c dθ =
λ dθ = 0,
because λ(0) = 0. Because T has closed image, there exists x ∗ ∈ H − such that ∗ d− = x∗c −,
and −c∗ = x ∗ d − .
(2.4)
We can now solve for α2 and β2 in (2.3). This shows that k2 in (II.1) has a triangular factorization as in (II.3). When k2 ∈ C s , by Corollary 1, the factors are C s . This completes the proof of Theorem 2.1.
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2201
We have now shown that (II.2) ⇒ (II.1) ⇒ (II.3). To prove that (II.3) implies (II.2), one method is to explicitly solve for x ∗ in terms of the ζ variables, then show that this relation can be inverted. The formula for x in terms of ζ is discussed in Appendix A. For our present purposes we only need to know that x∗ =
∞
x1∗ (ζj , . . .)z−j ,
j =1
where x1∗ (ζ1 , . . .) = ζ1
∞ ∞
1 + |ζk |2 + ζ2 1 + |ζk |2 s2 (ζ2 , ζ3 , . . .) k=2
+ ζ3
∞
k=3
1 + |ζk |2 s3 (ζ3 , ζ4 , . . .) + · · ·
k=4
(in the current context, these are finite sums). This structure implies that we can solve for the ζj in terms of the xi , and in fact ζn (x1 , x2 , . . .) = ζ1 (xn , xn+1 , . . .). (Note: the equivalence of (II.2) and (II.3) is implied by Theorem 5 of [6], which uses Lie theory; here we are emphasizing the elementary nature of the correspondence.) This completes the proof of Theorem 0.1. 2 It is obvious that for k2 in Theorem 0.1, there is a factorization a2 = a(ζj )−1 . By considering the Kac–Moody central extension of LSU(2), one can obtain a refinement of this factorization (recall (1.7), which suggests the existence of this refinement). Theorem 2.2. For ki as in Theorem 0.1, det(A∗ A(k1 )) equals −n −1 ˙ 1 + |ηn |2 = lim det AN (k1 ) = det 1 − C ∗ C(k1 ) = det 1 + B˙ ∗ B(y)
N →∞
n1
and det(A∗ A(k2 )) equals −n −1 ˙ 1 + |ζn |2 = , lim det AN (k2 ) = det 1 − C ∗ C(k2 ) = det 1 + B˙ ∗ B(x)
N →∞
n1
where AN denotes the finite dimensional compression of A to the span of {i zk : 0 k N }, and in the third expressions, x and y are viewed as multiplication operators on H = L2 (S 1 ), with Hardy space polarization. The first equalities are special cases of Theorem 6.1 of [9]; these are included for perspective: they demonstrate that finite dimensional approximations detect the magnitude of det A, not its
2202
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
phase. The second equalities follow from the unitarity of the Mki ; they explain why the determinants are well-defined, since C(ki ) is Hilbert–Schmidt if and only if ki ∈ W 1/2 (this follows immediately from the matrix expression for Mki in Section 1). The last two equalities follow from Theorem 5 of [6]. Lemma 1. Suppose that ζ = (ζn ) ∈ l 2 . As in Theorem 0.1, let (N ) k2
=
d (N )∗ c(N )
−c(N )∗ d (N )
:=
N
a(ζn )
ζN z−N 1
1 −ζ¯N zN
n=1
1 ... −ζ¯1 z
ζ1 z−1 1
.
Then c(N ) and d (N ) converge uniformly on compact subsets of to holomorphic functions c = c(ζ ) and d = d(ζ ), respectively, as N → ∞. The functions c and d have radial limits at a.e. point of S 1 , c and d are uniquely determined by these radial limits, k2 (z) = k2 (ζ )(z) :=
d(ζ )∗ (z) c(ζ )(z)
−c(ζ )∗ (z) d(ζ )(z)
∈ Meas S 1 , GL(2, C) ,
and det(k2 ) 1 on S 1 . A crucial lingering issue is the unitarity of k2 . In the course of proving Theorem 2.3, we will prove that k2 is unitary on S 1 when ζ ∈ w 1/2 . It is unclear whether this is true more generally for ζ ∈ l 2 (see Section 4). Proof. Because d (N ) d (N )∗ + c(N ) c(N )∗ = 1, both (c(N ) ) and (d (N ) ) are sequences of holomorphic functions on which are bounded by 1. By the Arzela–Ascoli Theorem, there exist subsequences which converge uniformly to holomorphic functions on , which will also be bounded by 1. We claim these limits are unique. As in Proposition 2, write k (N ) as
N
a(ζn )
(N )∗
(N )∗
−γ2
(N )
δ2
δ2
(N )
γ2
n=1
.
2 The ∞ n=1 a(ζn ) converges, because ζ ∈ l . Proposition 2 gives explicit expressions for the co(N ) (N ) efficients of γ2 and δ2 . Very crude estimates show that these expressions have well-defined limits as N → ∞. To see this, consider the formula for the nth coefficient of δ2 , and let P(n) denote the set of partitions of n (i.e. decreasing sequences n1 n2 · · · nl > 0, where nj = n is the magnitude and l = l(nj ) is the length of the partition). Then |δ2,n |
|ζi1 ||ζ¯j1 | · · · |ζir ||ζ¯jr |,
where the sum is over multiindices satisfying 0 < i1 < j1 < · · · < jr ,
(j∗ − i∗ ) = n.
(2.5)
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2203
If nk = jk − ik , then nk = n, but this sequence is not necessarily decreasing. However if we eliminate the constraints i1 < · · · < ir , then we can permute the indices (1 k r) for the ik and nk . We can crudely estimate that (2.5) is
|ζi1 ||ζi1 +n1 | · · · |ζil ||ζil +nl | =
(ni )∈P (n) i1 ,...,il >0 2l((n )) |ζ |l 2 i . P (n)
l
|ζis ||ζis +ns |
(ni )∈P (n) s=1 is >0
This shows that the Taylor coefficients of any limiting function for the δ (N ) will be given by the formulas in Proposition 2. The same considerations apply to the γ (N ) . Thus the sequences (γ (N ) ) and (δ (N ) ) converge uniformly on compact sets of to unique limiting functions. This proves our claim about uniqueness of the limits c and d. Because c and d are bounded by 1 on , c and d have radial limits at a.e. point of S 1 , and these boundary values uniquely determine c and d. 1 2 ) on S . Since c and d are holomorphic in , and d(0) = Finally we consider det(k 2 2 a(ζj ) = 0, det(k2 ) = |d| + |c| is nonzero a.e. on S 1 . Thus k2 is invertible a.e. on S 1 . Clearly |d|2 + |c|2 2 on the closure of , since |d| and |c| are bounded by 1. This also holds for d (N ) and c(N ) . If ρ ∈ L1 (S 1 , dθ ) is positive, then
2 2 |d| + |c|2 ρ dθ = lim |d| + |c|2 reiθ ρ eiθ dθ, r↑1
S1
S1
(by dominated convergence)
= lim lim
r↑1 N →∞
(N ) 2 (N ) 2 iθ iθ d + c re ρ e dθ
S1
lim lim sup N →∞
r↑1
= lim
N →∞
(N ) 2 (N ) 2 iθ iθ d + c re ρ e dθ
S1
(N ) 2 (N ) 2 iθ iθ d + c e ρ e dθ =
S1
ρ eiθ dθ.
S1
Since ρ is a general positive integrable function, this implies that |d|2 + |c|2 1 on S 1 . This completes the proof. 2 Remark. To show that k2 has values in SU(2), it would suffice to show
2 1 |d| + |c|2 dθ = 1. 2π
(2.6)
S1
This would follow immediately (by dominated convergence) if we knew thatc(N ) (d (N ) ) converged to c (d, respectively) on S 1 . But we have not shown this. Since d(0) = a(ζj ), it is clear that (2.6) is bounded below by a(ζj )2 .
2204
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Theorem 2.3. Suppose that k1 ∈ Meas(S 1 , SU(2)). The following are equivalent: (I.1) k1 is of the form k1 (z) =
a(z)
b(z)
−b∗ (z)
a ∗ (z)
z ∈ S1,
,
where a, b ∈ H 0 () have W 1/2 boundary values, a(0) > 0, and a and b do not simultaneously vanish at a point in . (I.2) k1 has a factorization of the form k1 (z) = lim a(ηn ) n→∞
−η¯ n zn 1
1 ηn z−n
. . . a(η0 )
1 η0
−η¯ 0 1
,
where η ∈ w 1/2 , and the limit is understood as in Lemma 1. (I.3) k1 has triangular factorization of the form
1 ∗ −j j =0 yj z
0 1
∞ where y =
∞
j =0 yj z
a1 0
0
a1−1
α1 (z) γ1 (z)
β1 (z) , δ1 (z)
has W 1/2 boundary values.
j
Moreover this defines a bijective correspondence between η ∈ w 1/2 and (yn ) ∈ w 1/2 . Similarly, the following are equivalent: (II.1) k2 is of the form k2 (z) =
−c∗ (z) , d(z)
d ∗ (z) c(z)
z ∈ S1,
where c, d ∈ H 0 () have W 1/2 boundary values, c(0) = 0, d(0) > 0, and c and d do not simultaneously vanish at a point in . (II.2) k2 has a factorization of the form k2 (z) = lim a(ζn ) n→∞
1 ¯ − ζn z n
ζn z−n 1
. . . a(ζ1 )
1 −ζ¯1 z
ζ1 z−1 1
,
where ζ ∈ w 1/2 , and the limit is understood as in Lemma 1. (II.3) k2 has triangular factorization of the form
where x =
∞
∞
∗ −j j =1 xj z
1 0
j =1 xj z
1 j
a2 0
0
a2−1
α2 (z) γ2 (z)
β2 (z) , δ2 (z)
has W 1/2 boundary values.
Moreover this defines a bijective correspondence between ζ ∈ w 1/2 and (xn ) ∈ w 1/2 .
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2205
Remarks. (a) If |ζn | < ∞, then the products in (I.2) and (II.2) converge absolutely and uniformly in z ∈ S 1 , and the limits are C 0 . However n|ζn |2 < ∞ does not imply absolute convergence of the sum of the {ζn } and vice versa; similarly C 0 does not imply W 1/2 and vice versa. It is for this reason that the weak notion of convergence in Lemma 1 is used in (I.2) and (II.2). (b) In connection with (I.2) and (II.2), note that zn converges to zero uniformly on compact subsets of , but |zn | = 1, for all n, on S 1 . Thus it is not evident in (I.2) and (II.2) that k2 is unitary; this is the problem which we could not resolve in Lemma 1. Proof. The two sets of conditions are intertwined by σ . We will first show (II.1) is equivalent to (II.3); we will then show these conditions are equivalent to (II.2). Suppose that k2 satisfies the conditions in (II.1), except that at the outset we only assume k2 is measurable. In the course of proving Theorem 2.1, we showed that k2 has a triangular factorization as in (II.3), where
x∗ 0
−1 = D k2∗
(d ∗ )− −c∗
(2.7)
(and the other factors are given explicitly by (a) of Theorem 1.1). In particular x ∗ ∈ L2 . For the Birkhoff factorization of k2 , (k2 )− =
1 x∗ 0 1
.
Because Mk2 is unitary, −1 A(k2 )A(k2 )∗ = 1 + Z(k2 )∗ Z(k2 ) ,
(2.8)
where Z(k2 ) := C(k2 )A(k2 )−1 . A matrix calculation (see (5.13) and (5.14) of [6], and note that in [6], g = k2 , and x is written in place of x ∗ ) shows that Z(k2 ) = Z (k2 )− = C (k2 )− ,
(2.9)
and relative to the basis (1.4), C((k2 )− ) is represented by the matrix ⎛
.
0 xn
⎜. 0 ⎜ ⎜ ⎜. . ⎜ ⎜ ⎜ ⎜ ⎜. ⎜ ⎜. ⎜ ⎜ ⎝. 0 0
0 .
. .
0 0
. 0
x3 0 x4 0 . .
0 ..
0 x2 0 0 0 x3 0 0
0 0 0 0 0
. 0
0 0
⎞ x1 0⎟ ⎟ ⎟ x2 ⎟ ⎟ 0⎟ ⎟ ⎟. x3 ⎟ ⎟ ⎟ ⎟ ⎟ xn ⎠ 0
(2.10)
2206
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Now suppose that k2 ∈ W 1/2 . In this case A(k2 )A(k2 )∗ is the identity plus trace class. By (2.8) and (2.9), C((k2 )− ) is Hilbert–Schmidt. By (2.10), x ∗ ∈ W 1/2 . Conversely, given x ∗ ∈ W 1/2 , by Lemma 4 of [6], we can explicitly compute k2 and the corresponding triangular factorization: ∗ −1 ∗ ∗ x , δ2∗ = 1 + C˙ x ∗ γ2 , γ2 = − 1 + C˙ zx ∗ C˙ zx ∗ β = −a2−2 A˙ x ∗ (δ2 ) α2 = a2−2 1 − A˙ x ∗ (γ2 ) ,
(2.11) (2.12)
and a22 =
˙ ∗ )) ˙ ∗ )∗ C(x det(1 + C(x . ∗ ∗ ∗ )) ˙ ˙ det(1 + C(zx ) C(zx
(2.13)
In the derivation of Eqs. (2.11) and (2.12) in Lemma 4 of [6], the fact that k2 is unimodular is not used explicitly; the derivation only uses (k2 )(1,1) = (k2 )∗(2,2) and (k2 )(1,2) = −(k2 )∗(2,1) . However, because α2 δ2 − β2 γ2 ∈ H 0 (), and has real values |c|2 + |d|2 on S 1 , α2 δ2 − β2 γ2 ˆ Since it equals 1 at z = 0, it is identically 1. This shows that extends holomorphically to C. unimodularity follows automatically. This determines a unitary k2 with measurable coefficients. The calculations (2.8), (2.9), and (2.10) imply that k2 ∈ W 1/2 . Thus (II.1) is equivalent to (II.3). Lemma 1 implies that if (ζn ) ∈ l 2 , then k2 defined as in (II.2) is in Meas(S 1 , GL(2, C)). Now suppose that ζ ∈ w 1/2 . By Theorem 2.2 N (N ) 2 ∗ −1
−n 1 + |ζn |2 = , detA k2 = det 1 + B˙ x (N ) B˙ x (N )
(2.14)
n=1
and this converges to a positive number as N → ∞. First suppose that ζn 0 for all n. Proposition 4 of Appendix A implies that the coefficients of x(ζ )(N ) are nonnegative and converge up to the coefficients of x(ζ ). This implies that the ma˙ (N ) )∗ will be nonnegative and converge in a monotone way to those ˙ (N ) )B(x trix entries of B(x ∗ ˙ (N ) )B(x ˙ (N ) )∗ ), which is bounded because (2.14) con˙ B(x) ˙ . Thus the sequence tr(B(x for B(x) ∗ ˙ B(x) ˙ ). This implies that (xn ) ∈ w 1/2 . For a general ζ ∈ w 1/2 , verges, will converge to tr(B(x) since the coefficients for x(|ζ |) dominate those for x(ζ ) we can conclude in the same way that (xn ) ∈ w 1/2 . We can now obtain a triangular factorization for k2 using (2.11)–(2.13). As we argued in the paragraph following (2.13), this automatically implies that k2 is unitary. The calculations (2.8), (2.9), and (2.10) imply that k2 ∈ W 1/2 and A(k2 ) is invertible. Since A(k2 ) is 1–1, this implies that c and d do not simultaneously vanish in (see the note in the second paragraph following Proposition 2). Thus (II.2) implies (II.1). n (N ) Suppose that we are given k2 and x as in (II.1) and (II.3). Let x (N ) = N n=1 xn z , and let ζ (N ) and k2 denote the corresponding objects. Theorem 2.2 implies that N 2 n ∗
det 1 + B˙ x (N ) B˙ x (N ) = 1 + ζn(N ) .
(2.15)
n=1
Because x ∈ W 1/2 , the sequence of numbers (2.15) has a limit. Therefore the sequence {ζ (N ) } is bounded in w 1/2 . Because the inclusion w 1/2 → l 2 is a compact operator, there are subsequences
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2207
which converge in l 2 . By Lemma 1 these limiting sequences correspond to k2 . Thus there is a unique limiting sequence, {ζn } ∈ l 2 . Since (2.15) has a limit, ζ ∈ w 1/2 . Thus (II.1) and (II.3) imply (II.2). This completes the proof. 2 3. Proof of Theorem 0.2, and generalizations Part (a) of Theorem 0.2 is obvious. We will deduce the remaining parts of Theorem 0.2 from the following Theorem 3.1. Assume s > 0 and nonintegral, or s = ∞. For g ∈ C s (S 1 , SU(2)), the following are equivalent: (i) g has a triangular factorization g = lmau, where l and u have C s boundary values. (ii) g has a factorization g = k1∗ λk2 , where k1 , k2 ∈ C s (S 1 , SU(2)) satisfy the equivalent conditions (I.1) and (I.3) ((II.1) and (II.3), respectively) of Theorem 2.1, and λ ∈ C s (S 1 , T )0 . Proof. We will use the notation in (1.1) for g, and the notation in Theorem 2.1 for the entries of the ki and their triangular factorizations. Without much comment, we will use the fact that C s is a decomposing algebra, so that factors in various decompositions will remain in C s . We proved that (ii) implies (i) in [6] (see the proof of Theorem 7); we briefly recall the calλ 0 k2 , as in (ii). We can culation. Suppose that g ∈ C s (S 1 , SU(2)) can be factored as g = k1∗ −1 0λ
write λ = exp(−χ ∗ + χ0 + χ), where χ0 ∈ iR and χ ∈ H 0 (), χ(0) = 0, with C s boundary values. Then g has triangular factorization of the form g = l(g)
eχ0 a1 a2
0
0
(eχ0 a1 a2 )−1
(3.1)
u(g),
where m0 = eχ0 ∈ S 1 , a0 = a1 a2 > 0, l(g) :=
l11 l21
l12 l22
=
α1∗ β1∗
γ1∗ δ1∗
e−χ 0
∗
0 eχ
∗
∗
1 a12 e2χ0 P− (ye2χ + x ∗ e2χ ) 0 1
(3.2)
and u(g) :=
u11 u21
u12 u22
=
1 0
∗
a2−2 e−2χ0 P+ (ye2χ + x ∗ e2χ ) 1
eχ 0
0 e−χ
α2 γ2
β2 δ2
. (3.3)
Thus (i) is implied by (ii). Now suppose that g has triangular factorization g = lmau as in (i). We must solve for k1 , χ , and k2 . An elegant way to do this (discovered after this paper was completed) is presented in the proof of Theorem 4.1 of [7]. Here we will present a somewhat more explicit (if clumsy) calculation. Eq. (3.2) implies l11 = α1∗ exp −χ ∗ ,
l21 = β1∗ exp −χ ∗
(3.4)
2208
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
and (3.3) implies u21 = γ2 exp(−χ),
u22 = δ2 exp(−χ).
(3.5)
The special forms of k1 and k2 imply that on S 1 , |α1 |2 + |β1 |2 = a1−2 , |δ2 | + |γ2 | 2
2
= a22 .
(3.6) (3.7)
Therefore on S 1 |l11 |2 + |l21 |2 = a1−2 exp −2 Re(χ) , |u21 |2 + |u22 |2 = a22 exp −2 Re(χ) .
(3.8) (3.9)
This implies that on S 1 we must have −1/2 −1/2 Re(χ) = log a1−1 + log |l11 |2 + |l21 |2 = log(a2 ) + log |u21 |2 + |u22 |2 . (3.10) Assuming that the obvious consistency condition is satisfied, this pair of equations determines χ and the ai : because χ must be holomorphic in the disk and vanish at z = 0, the average of Re(χ) around S 1 must vanish, hence
1 log |l11 |2 + |l21 |2 dθ , a1 = exp − 4π
(3.11)
S1
1 2 2 a2 = exp log |u21 | + |u22 | dθ , 4π
(3.12)
S1
and Im(χ) = i Re(χ)− − i Re(χ)+ .
(3.13)
To see that χ and the ai are well-defined, we must check that |l11 |2 + |l21 |2 = (a1 a2 )−2 |u21 |2 + |u22 |2 ,
(3.14)
as functions on S 1 . Because g ∗ g = 1, l ∗ l = (a(g)u)−∗ (a(g)u)−1 , on S 1 . This implies three independent equations |l11 |2 + |l21 |2 = a0−2 |u22 |2 + |u21 |2 , ∗ ∗ l12 + l21 l22 = −m20 u∗22 u12 + u∗21 u11 , l11 |l12 |2 + |l22 |2 = a02 |u12 |2 + |u11 |2
(3.15) (3.16) (3.17)
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2209
for the (1, 1), (1, 2) (or (2, 1)), and (2, 2) entries, respectively. The (1, 1) entry implies the consistency condition (3.14). Together with (3.4) and (3.5), this completely determines the ki : ∗ a(z) = a1 exp(χ)l11 ,
c(z) = a2−1 exp(χ)u21 ,
∗ b(z) = a1 exp(χ)l21 ,
(3.18)
d(z) = a2−1 exp(χ)u22 .
(3.19)
Because l ∗ is invertible at all points of , the entries a and b of k1 do not simultaneously vanish. Similarly, because u is invertible, the entries c and d do not simultaneously vanish. The fact that these are C s in the appropriate sense follows from the continuity of the projections P± on C s . Thus by Theorem 2.1 (and the ensuing Remark (b)) the ki have appropriate triangular factorizations. We have now solved for ki and χ . We have also observed that the diagonal term of g determines exp(χ0 ), so λ is determined as well. We now must show that g = k1−1 λk2 . From the definitions of ki and λ, both sides of this equation have the same m, a, l11 , l21 , u21 , and u22 coordinates. The proof is completed by the following explicit calculations, which I will need in a sequel to this paper. 2 Proposition 3. Suppose that g has a triangular factorization as in (1.1) and has values in SU(2). If l11 and u22 are nonvanishing, then
∗ / l ) + m2 (u∗ /u ) (l21 11 0 21 22 , l12 = −l11 P− 2 |l11 | + |l21 |2 ∗ (l21 / l11 ) + m20 (u∗21 /u22 ) 1 l22 = , − l21 P− l11 |l11 |2 + |l21 |2 ∗ (l21 / l11 ) + m20 (u∗21 /u22 ) −2 , u12 = −(m0 a0 ) u22 P+ |l11 |2 + |l21 |2 ∗ (l / l11 ) + m20 (u∗21 /u22 ) 1 . u11 = − (m0 a0 )−2 u21 P+ 21 u22 |l11 |2 + |l21 |2
In particular g is determined by m, a, l11 , l21 , u21 , and u22 . Proof. Because l11 and u22 are nonvanishing, we can use the unimodularity of l and u to solve for l22 and u11 in terms of l12 and u12 . Eq. (3.16) can be rewritten as ∗ ∗ l12 + l21 l22 + m20 u∗22 u12 + u∗21 u11 l11 1 + l12 l21 1 + u12 u21 ∗ ∗ 2 ∗ ∗ + m0 u22 u12 + u21 = 0. = l11 l12 + l21 l11 u22 Using (3.15) this can be rewritten as (l ∗ / l11 ) + m20 (u∗21 /u22 ) l12 u12 + m20 a02 = − 21 l11 u22 |l11 |2 + |l21 |2 by applying P± to this equation, and solving, we obtain the equations in the proposition.
2
2210
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Suppose that g ∈ C s (S 1 , SU(2)), s > 1/2, and g has a triangular factorization. By Theorem 7 of [6], det A∗ A(g) = det A∗ A k1−1 det A∗ A(λ) det A∗ A(k2 ) ∞ ∞ ∞
−k 2 −i 2 = 1 + |ηi | 1 + |ζk |2 . exp −2 j |χj | j =1
i=1
(3.20)
k=1
These expressions make sense because C s ⊂ W 1/2 for s > 1/2. In the remainder of this section, our goal is to use these equalities to obtain a W 1/2 analogue of Theorem 3.1, which also incorporates the condition (bi ). This involves some subtleties, because W 1/2 functions are not necessarily continuous. Because SU(2) is compact, W 1/2 (S 1 , SU(2)) is a separable topological group. In contrast to the function spaces C s , s > 0, W s , s > 1/2, and L∞ ∩ W 1/2 , for the function space W 1/2 , the loop group W 1/2 (S 1 , SU(2)) is not a Lie group, because W 1/2 (S 1 , su(2)) is not a Lie algebra (whereas, e.g. L∞ ∩ W 1/2 (S 1 , su(2)) has a Lie algebra structure). Moreover the inclusion C ∞ (S 1 , SU(2)) ⊂ W 1/2 (S 1 , SU(2)) is dense and presumably a homotopy equivalence (whereas this is false for the L∞ ∩ W 1/2 topology). With respect to the W 1/2 topology, the operator-valued function g→
A(g) C(g)
B(g) D(g)
is continuous, provided the diagonal is equipped with the strong operator topology, and the offdiagonal with the Hilbert–Schmidt topology. In reference to the following lemma, we recall that the notion of degree (or winding number) can be extended from C 0 to VMO(S 1 , S 1 ), hence degree is well-defined for W 1/2 (S 1 , S 1 ) (see Section 3 of [1] for an amazing variety of formulas, and further references, or pp. 98–100 of [4]). Also given λ ∈ W 1/2 (S 1 , S 1 ), we view λ as a multiplication operator on H = L2 (S 1 ), with the ˙ Hardy polarization. We write A(λ) for the Toeplitz operator, and so on (with the dot), to avoid confusion with the matrix case. Lemma 2. There is an exact sequence of topological groups degree exp 0 → 2πiZ → W 1/2 S 1 , iR −−→ W 1/2 S 1 , S 1 −−−→ Z → 0. ˙ Moreover degree(λ) = −index(A(λ)). There is a more general version of this involving VMO, which is implicit on pp. 100–101 of [4]. Proof. Suppose that f ∈ W 1/2 (S 1 , iR). It is convenient to use the equivalent Besov form of the W 1/2 norm,
|f |2W 1/2 =
|f (θ1 ) − f (θ2 )|2 dθ1 dθ2 . |eiθ1 − eiθ2 |2
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2211
Because |eiθ − 1| |θ |,
|ef (θ1 ) − ef (θ2 ) |2 dθ1 dθ2 |f |2W 1/2 . |eiθ1 − eiθ2 |2
Thus exp(f ) is also W 1/2 . This inequality also shows that exp is continuous at 0. Since exp is a homomorphism, this implies exp is globally continuous. Continuity implies that the image of exp is contained in the identity component. Conversely ˙ suppose that λ ∈ W 1/2 (S 1 , S 1 )0 . Then A(λ) is invertible. This implies the existence of a Birkhoff factorization λ = λ− λ0 λ+ , where for example λ+ ∈ H 0 (, 0; C∗ , 1) and has L2 boundary values. By taking logarithms on the disks, we can write λ = exp(−χ ∗ + χ0 + χ). By a formula of Szego and Widom (Theorem 7.1 of [9]), ∞ ∗ ∗ ˙ 2 ˙ ˙ ˙ j |χj | . det A A(λ) = det 1 − C C(λ) = exp −2
(3.21)
j =1
The determinant depends continuously on λ in the W 1/2 topology. Therefore χ ∈ W 1/2 . This shows the sequence is exact at W 1/2 (S 1 , S 1 ). A W 1/2 function cannot have jump discontinuities. This implies that the kernel of exp is 2πiZ. Thus the sequence in the statement of the lemma is continuous and exact. 2 Theorem 3.2. For g ∈ W 1/2 (S 1 , SU(2)), the following are equivalent: (i) g has a triangular factorization g = lmau. (ii) g has a factorization g = k1∗ λk2 , where the ki ∈ W 1/2 (S 1 , SU(2)) satisfy the equivalent conditions of Theorem 2.3, and λ ∈ W 1/2 (S 1 , T )0 . In both cases the factorization is unique. Proof. Assume (ii). Given Lemma 2, we can write λ = exp(χ). Since W 1/2 (S 1 , SU(2)) is a group, g will be in W 1/2 , and det(A(g)A(g)∗ ) will depend continuously on k1 , χ and k2 . The formula (3.20) now implies that A(g) is invertible, and hence g has a Birkhoff factorization. The triangular factorization is calculated exactly as in the proof of Theorem 3.1; see (3.2) and (3.3). (Note: we invoked (3.20), because it is not a priori clear that (3.2) and (3.3) are L2 .) Now assume (i). We can again solve for ki and χ , as in the proof of Theorem 3.1. The determi(N ) (N ) nant formulas (3.20) can be applied to g (N ) = k1 exp(χ (N ) )k2 , where the subscript indicates that ζn , χn , ηn are set equal to 0, for n > N . In (3.20), applied to g (N ) , all of the individual factors in (3.20) are bounded above by 1, and are tending monotonically down. Since g ∈ W 1/2 , det(A(g)A(g)∗ ) is positive, and det(A(g (N ) )A(g(N ))∗ will remain bounded away from zero. This implies that all of the factors in (3.20), applied to g(N ), will be bounded away from 0. Thus ζ , χ and η are in w 1/2 . By Theorem 2.3, ki ∈ W 1/2 . This implies (ii). 2 Corollary 2. The dense open set of g ∈ W 1/2 (S 1 , SU(2)) having triangular factorization is parameterized by y, χ0 ∈ iR mod 2πiZ, χ , and x, where y, χ and x are holomorphic functions in with W 1/2 boundary values, and x(0) = χ(0) = 0.
2212
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Remark. This implies that an open neighborhood of 1 ∈ W 1/2 (S 1 , SU(2)) is parameterized by a Hilbert space, even though this group is not a Lie group and there does not exist an exponential map. In this respect this group is similar to the group of W s homeomorphisms of a compact d-manifold, where s > d2 + 1, although in this case right multiplication is smooth and there does exist an exponential map (see [3]). This contrasts with the finite dimensional situation, where a topological group locally homeomorphic to Rn is automatically a C ω Lie group. 4. A conjectural L2 generalization Suppose that ζ ∈ l 2 . By Lemma 1 there is a unique limit k2 ∈ Meas(S 1 , GL(2, C)) for the product in (4.1) below. When A(k2 ) is invertible, e.g. if ζ ∈ w 1/2 (by Theorem 2.3), there are three different expressions for k2 , 1 ζn z−n 1 ζ1 z−1 . . . a(ζ ) 1 n→∞ −ζ¯n zn 1 −ζ¯1 z 1
δ ∗ (z) −γ ∗ (z) 1 x ∗ (z) a 0 α2 (z) 2 2 2 = a(ζn ) = −1 γ2 (z) 0 1 0 a2 γ2 (z) δ2 (z)
k2 (z) = lim a(ζn )
β2 (z) , (4.1) δ2 (z)
where a2 = a(ζj )−1 , and γ2 and δ2 are determined by the formulas in Proposition 2. The existence of the triangular factorization implies that k2 has values in SU(2) on S 1 . Since the expression for a2 is convergent for all ζ ∈ l 2 , it is plausible that the triangular factorization in (4.1) is valid for all ζ ∈ l 2 . A further leap of faith suggests the following Conjecture. Suppose that k2 ∈ Meas(S 1 , SU(2)). The following are equivalent: (II.1) k2 is of the form k2 (z) =
−c∗ (z) , d(z)
d ∗ (z) c(z)
z ∈ S1,
where c, d ∈ H 0 (), c(0) = 0, d(0) > 0, and c and d do not simultaneously vanish at a point in . (II.2) k2 has a factorization of the form
1 k2 (z) = lim a(ζn ) n→∞ −ζ¯n zn
ζn z−n 1
1 . . . a(ζ1 ) −ζ¯1 z
ζ1 z−1 1
where ζ ∈ l 2 , and the limit is understood as in Lemma 1. (II.3) k2 has triangular factorization of the form
1 0
∞
∗ −j j =1 xj z
1
a2 0
0 a2−1
α2 (z) γ2 (z)
β2 (z) . δ2 (z)
Moreover this defines a bijective correspondence between ζ ∈ l 2 and (xn ) ∈ l 2 .
,
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2213
In reference to this conjecture, recall that the condition (II.1) implies that A(k2 ) is 1–1. This entails invertibility when k2 ∈ QC (see Theorem 1.2), but not in general. When k2 is expressed as in (II.3), the third paragraph of the proof of Theorem 2.3, together with results of Nehari and Fefferman (pp. 3–5 of [4]), implies that A(k2 ) is invertible precisely when x has BMO boundary values. Thus the implications (II.2) ⇒ (II.1) ⇒ (II.3) hinge on the question of whether ζ ∈ l 2 ⇒ (xn ) ∈ l 2 , and this is different from the question of when A(k2 ) is invertible. The implication (II.3) ⇒ (II.1) hinges on the formulas (2.11)–(2.13) for k2 in terms of x. The first two formulas make sense for x ∈ BMO, as in the preceding paragraph, but it is not clear that this is the natural domain for x. Regarding the formula for a2 , which a priori depends on (xn ) ∈ w 1/2 , the second order term in the expansion at x = 0 is ∗ ∗ tr C x ∗ C x ∗ − tr C zx ∗ C zx ∗ = |xn |2 , the l 2 norm. This is at least consistent with the conjecture. Appendix A. The relation between x ∗ and ζ In this appendix, we consider the relation between x ∗ and (ζj ), in Theorem 0.1, at the level of combinatorial formulas. A.1. x ∗ as a function of ζ Proposition 4. x ∗ has the form ∗
x =
∞
x1∗ (ζj , . . .)z−j ,
j =1
where x1∗ (ζ1 , . . .) =
∞
ζn
n=1
∞
2 1 + |ζk | sn (ζn , ζn+1 , ζ¯n+1 , . . .), k=n+1
s1 = 1 and for n > 1, sn =
n−1
sn,r ,
sn,r =
ci,j ζi1 ζ¯j1 ζi2 ζ¯j2 . . . ζir ζ¯jr
r=1
where the sum is over multiindices satisfying the constraints
n and ci,j is a positive integer.
j1 ∨
···
i1
···
jr ∨,
r (jl − il ) = n − 1,
ir
l=1
(A.1)
2214
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Remark. The main features of the formula for x1∗ are (i) the appearance of the infinite products, which isolates the part of the expression which has to be “renormalized” in probabilistic applications, and (ii) the positivity of the coefficients. For example (ii) implies that if ζ 0, then x(ζ1 , . . . , ζN , 0, . . .) converges monotonically up to x(ζ ) as N → ∞. Proof. The fact that x ∗ is completely determined by its residue x1∗ is (b) of Theorem 5 of [6]. We will show that x1∗ has the form claimed in the lemma (I stated this without proof in [6]). Clearly x1∗ (ζ1 ) = ζ1 . The proof hinges on the following recursion (see Lemma 2 and (5.12) of [6]) x1∗ (ζ1 , . . . , ζN +1 )
= 1 + |ζN +1 |2 x1 (ζ1 , . . . , ζN ) + +
x1 (ζi , . . . , ζN )x1 (ζj , . . . , ζN )ζ¯N +1
i+j =N +2
i+j +k=2N +3
+
x1 (ζi , . . . , ζN )x1 (ζj , . . . , ζN )x1 (ζk , . . . , ζN )ζ¯N2 +1
i+j +k+l=3N +4
x1 (ζi , . . . , ζN )x1 (ζj , . . . , ζN )x1 (ζk , . . . , ζN )x1 (ζl , . . . , ζN )ζ¯N3 +1 + · · · .
From this recursion one can immediately see that coefficients will be nonnegative. We assume that x1∗ (ζ1 , . . . , ζN ) =
N
N
1 + |ζk |2 sn (ζn , . . . , ζN ),
ζn
n=1
k=n+1
where s1 = 1 and for n > 1 sn (ζn , . . . , ζN ) =
ci,j ζi1 ζ¯j1 ζi2 ζ¯j2 . . . ζir ζ¯jr ,
the sum is over multiindices as in (A.1), with jr N , and ci,j is a positive integer (for N > 1, sN (ζN ) = 0). This implies x1∗ (ζI , . . . , ζN ) =
N −(I −1)
ζn+(I −1)
n=1
=
N m=I
ζm
N −(I
−1)
1 + |ζk+(I −1) |2 sn (ζn+(I −1) , . . .)
k=n+1 N
1 + |ζk |2 sm−(I −1) (ζm , . . . , ζN )
k=m+1
where sm−(I −1) (ζm , . . . , ζN ) = the sum is over multiindices satisfying
¯ ¯ ci−(I −1)1,j −(I −1)1 ζi1 ζj1 . . . ζiL ζjL ,
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
m
j1 ∨ i1
···
jL ∨ iL
···
N
L
,
2215
(jl − il ) = m − I,
l=1
and in the notation for the coefficient, i − (I − 1)1 means that we subtract I − 1 from each of the components of i. We now plug this into the recursion relation, and rewrite the expression so that it has the same form as the sum involving N variables: x1 (ζ1 , . . . , ζN +1 ) = 1 + |ζN +1 |2 s0
= 1 + |ζN +1 |2 s0
s+1
l=1 Il =s(N +1)+1
x1 (ζIl , . . . , ζN ) ζ¯Ns +1
Il
N
Il =s(N +1)+1 Il
ζm l
ml =Il
N
2 1 + |ζk | sml −(Il −1) (ζml , . . . , ζN ) ζ¯Ns +1 × k=ml +1
= 1 + |ζN +1 |2 s0
N
...
Il =s(N +1)+1 m1 =I1
N
ζm l
ms+1 =Is+1 Il
N
2 ¯s ¯ ¯ 1 + |ζk | c il −(Il −1)1, × jl −(Il −1)1 ζil,1 ζjl,1 . . . ζil,Ll ζjl,Ll ζN +1 k=ml +1
= 1 + |ζN +1 |2 s0
N
...
Il =s(N +1)+1 m1 =I1
N
ms+1 =Is+1
1
...
ζm l
s+1 Il
N
2 ¯s ¯ ¯ 1 + |ζk | c il −(Il −1)1, × jl −(Il −1)1 ζil,1 ζjl,1 . . . ζil,Ll ζjl,Ll ζN +1 ,
(A.2)
k=ml +1
where for each 1 l s + 1, the sum
ml
jl,1 ∨ il,1
··· ···
l
is over multiindices satisfying
jl,Ll ∨ il,Ll
N ,
Ll (jl,τ − il,τ ) = ml − Il . τ =1
Consider a term in this sum of the form N
1 + |ζk |2 ζil,1 ζ¯jl,1 . . . ζil,Ll ζ¯jl,Ll ζ¯Ns +1 , ζm l Il
k=ml +1
where ml il,1 for each l. Let n = min{ml : 1 l s + 1}, and factor out
(A.3)
2216
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221 N
1 + |ζk |2
ζn
k=n+1
in (A.3). What remains can be expressed as a positive integral combination of monomials ζi1 ζ¯j1 ζi2 ζ¯j2 . . . ζir ζ¯jL , where
n
j1 ∨ i1
···
jL ∨ iL
···
N +1 ,
L (jl − il ) = n − 1. l=1
Multiplicities arise when the factors with ml = m, N
1 + |ζk |2 k=ml +1
are expanded. Thus the entire sum can be written as N n=1
N +1
ζn
1 + |ζk |2 sn (ζn , . . . , ζN +1 )
k=n+1
with sn (ζn , . . . , ζN +1 ) =
(N +1) ζi1 ζ¯j1 ζi2 ζ¯j2 i,j
c
. . . ζir ζ¯jL ,
the sum is over multiindices satisfying
n
j1 ∨ i1
···
···
jL ∨ iL
N +1 ,
L
(jl − il ) = n − 1,
l=1
(N +1)
(N +1)
and c can be computed, in principle, recursively. If jL N , then ci,j i,j the index (i, j ) has the form
i0
j1 ∨ i1
· · · jr ∨ · · · ir
< N + 1 ··· . ∨ ir+1 · · ·
(N )
= ci,j . Otherwise
N +1 ∨ iL
where r + s = L. The corresponding terms will all originate from the term involving the index s in the last expression for (A.2). There are many ways that terms could arise, and at best we obtain a formula for c(N +1) in terms of coefficients c(N ) . So at this point we can only see that these coefficients are positive. 2
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2217
Our aim now is to consider another approach which yields a closed formula for “generic” ci,j . This formula a priori involves signs, and we will make use of Proposition 4 to identify cancellations. The matrix n ∗ −j a 1 0 α(z) β(z) 2 j =1 xj z 0 a2−1 0 1 γ (z) δ(z) −1 a2 α + x ∗ a2 γ a2 β + x ∗ a2−1 δ = a2−1 δ a2−1 γ is special unitary, for all z ∈ S 1 . Therefore −γ ∗ = a22 β + x ∗ δ, and initially assuming δ is nonvanishing, this implies x ∗ = P− (−γ ∗ δ −1 ). In particular x1∗ = Residue −γ ∗ δ −1 = −γ1∗ + γ2∗ δ1 + γ3∗ δ2 + · · · − γ3∗ δ 2 2 + · · · =− γm∗ (−1)s δn1 . . . δns m1
where the second sum is over tuples n1 , . . . , ns 1 satisfying for γ ∗ and δ in Proposition 2, x1∗ =
nl = m − 1. Using the formulas
(−1)s+1 (−1)rm +1 ζim,1 ζ¯jm,1 . . . ζim,rm ζ¯jm,rm ζim,rm +1 × (−1)rn1 ζin1 ,1 ζ¯jn1 ,1 . . . ζin1 ,rn ζ¯jn1 ,rn . . . (−1)rns ζins ,1 ζ¯jns ,1 . . . ζins ,rns ζ¯jns ,rns 1
1
where the indexing can be described in the following way: the first sum is over m, n1 , . . . , ns 1 satisfying l nl = m − 1, the first internal sum, or cluster indexed by m, is over indices satisfying r m +1
0 < im,1 < jm,1 < · · · < jm,r < im,rm +1 ,
k=1
im,k −
rm
jm,k = m
k=1
and the cluster indexed by nl is over indices satisfying r
0 < inl ,1 < jnl ,1 < · · · < jnl ,rnl ,
nl (jnl ,k − inl ,k ) = nl .
k=1
We now write this as a single sum and consider one of the terms. We can put the i-indices (which are organized in clusters) im,1 , . . . , im,rm +1 ; in1 ,1 , . . . , in1 ,rn1 ; . . . ; ins ,1 , . . . , ins ,rns and the j -indices
2218
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
jm,1 , . . . , jm,rm ; jn1 ,1 , . . . , jn1 ,rn1 ; . . . ; jns ,1 , . . . , jns ,rns in nondecreasing order, which we write as i 0 i1 · · · iL
and j1 · · · jL ,
respectively. Lemma 3. In addition to being nondecreasing, the indices il , jl satisfy il−1 < jl , for l = 1, . . . , L. Proof. With the possible exception of im,r+1 , for any given i-index, it is possible to find a j-index with greater value, so that the map from these i-indices to j-indices is 1–1 (simply map in,l to jn,l ). One of iL−1 or iL must be strictly less than jL , hence iL−1 must be strictly less than jL . Similarly one of iL−2 or iL−1 or iL must be strictly less than jL−1 , hence iL−2 must be strictly less than jL−1 . Continuing in this way, this implies the strict inequalities in the lemma. 2 We claim that we can additionally assume that il jl ,
l = 1, . . . , L.
(A.4)
This is not implied by cluster decomposition considerations. For example the index set
1
2 2 1 3
violates (A.4), yet there are two cluster decompositions: 1 < 2 < 3; 1 < 2 (with (−1)s+L = (−1)1+2 = −1) and 3; 1 < 2; 1 < 2 (with (−1)s+L = (−1)2+2 = 1). This claim is justified by Proposition 4, which implies that terms corresponding to indices not satisfying (A.4) will cancel out. (It would clearly be desirable to see this cancellation directly, but I do not know how to do this.) This implies the following formula. Lemma 4. x1∗ =
ci,j ζi0 ζi1 ζ¯j1 . . . ζiL ζ¯jL , where the indices satisfy the constraints
0 < i0 i 1 · · · i L ,
j1 · · · jL , i1 j1 , . . . , iL jL , i0 < j1 , . . . , iL−1 < jL , i− j = 1,
(A.5)
and ci,j =
(−1)s+L ,
where the sum is over all possible ways in which the indices can be partitioned as im,1 , . . . , im,rm+1 ; in1 ,1 , . . . , in1 ,rn1 ; . . . ; ins ,1 , . . . , ins ,rns , jm,1 , . . . , jm,rm ; jn1 ,1 , . . . , jn1 ,rn1 ; . . . ; jns ,1 , . . . , jns ,rns so that the strict interlacing inequalities
(A.6)
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
0 < im,1 < jm,1 < · · · < jm,r < im,r+1 ,
im,k −
k
2219
jm,k = m
k
and 0 < inl ,1 < jnl ,1 < · · · < jnl ,r ,
(jnl ,k − inl ,k ) = nl k
hold for l = 1, . . . , s. To compare with the formula in Proposition 4, we first sum over n = i0 , and write x1∗ =
∞
ζn
c(n,i),j ζi1 ζ¯j1 . . . ζiL ζ¯jL
(A.7)
n=1
where (n, i) now stands for n i1 · · · iL . This implies
∞
ci,j ζi1 ζ¯j1 ζi2 ζ¯j2 . . . ζir ζ¯jr 1 + |ζk |2
c(n,i),j ζi1 ζ¯j1 . . . ζiL ζ¯jL =
(A.8)
k=n+1
where the indexing set for the latter sum satisfies the constraints in Proposition 4. To directly compare the coefficients we expand the product of factors (1 + |ζj |2 ) and distribute the pairs ζj and ζ¯j . This implies the following Lemma 5. Consider an index as in (A.5), with n = i0 . (a) If {il } ∩ {jl } is null, then c(n,i),j = ci,j . (b) In general c(n,i),j =
ci,j ,
where the sum is over all subindexing sets of (n, i, j), resulting from cancellation of pairs il = jl , which satisfy the constraints in Proposition 4. (c) In particular for any indexing set (i, j ) as in Proposition 4, ci,j c(n,i),j . Example. To clarify (b), given an indexing set such as 5 6 3 4 5
7 6
5 4
7 5
there are three proper subindexing sets,
3
6 4
7 6
3
7 3 4
2220
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
Part (a) of Lemma 5, and Lemma 4, yield an expression for a generic ci,j , where generic is defined by the null intersection condition in (a). Using this formula it is possible to write “most” of the terms in sn,r in Proposition 4 in terms of products of the Hermitian expressions bn (m) = ζn ζ¯n+m + ζn+1 ζ¯n+1+m + · · · . These expressions can be estimated using Cauchy–Schwarz, and they are also easy to understand in probabilistic contexts. Unfortunately I do not know how to systematically estimate nongeneric terms. Example. s2 = s2,1 = b2 (1) + b3 (1) and in general sn,1 = bn (n − 1) + bn+1 (n − 1). s3,2 is a quadratic expression in terms of the variables ζ3 ζ¯4 , ζ4 ζ¯5 , . . . . The matrix is 1
3 2 2 2 3 6 4 4 3 6 4 3 6
... 4 ... 4 4 4
4
... 4
...
Therefore s3,2 = b3 (1)2 + b4 (1)2 +
ζi ζ¯i+1 ζi ζ¯i+1 + ζ3 ζ¯4 ζ4 ζ¯5 + 2
i4
ζi ζ¯i+1 ζi+1 ζ¯i+2 .
i4
Thus “most” of s3,2 can be written in terms of powers of Hermitian expressions, and two “diagonal” sums near the boundary of the cone that we are adding over. A.2. ζ in terms of x We have ζn = ζ1 (xn , xn+1 , . . .), and for a finite number of variables, one can generate formulas for ζ1 . For example, if pn = j >n (1 + |ζj |2 ), then ζ1 (x1 , x2 , x3 , x4 ) =
1 1 1 1 x1 − x 2 x¯3 + 2 x2 x32 x¯3 x¯4 − 2 x2 x3 x¯4 p1 p1 p2 p3 2 p1 p3 p4 p1 p2 p32 p4 −
1
x34 x¯3 x¯42 p1 p2 p33 p42
+
1 x 3 x¯42 , p1 p32 p42 3
where the pi can be expressed in terms of x using the displayed line following (6.10) in [6]. But I have not made any progress toward finding a general formula.
D. Pickrell / Journal of Functional Analysis 260 (2011) 2191–2221
2221
References [1] H. Brezis, New questions related to the topological degree, in: The Unity of Mathematics, in Honor of the Ninetieth Birthday of I.M. Gelfand, Birkhäuser, 2006, pp. 137–154. [2] K. Clancey, I. Gohberg, Factorization of Matrix Functions and Singular Integral Operators, Birkhäuser, 1981. [3] D.G. Ebin, J. Marsden, Groups of diffeomorphisms and the motion of an incompressible fluid, Ann. Math. 92 (1) (1970) 102–163. [4] V. Peller, Hankel Operators and Their Applications, Springer, 2003. [5] D. Pickrell, Invariant measures for unitary forms of Kac–Moody groups, Mem. Amer. Math. Soc. 693 (2000) 1–144. [6] D. Pickrell, Homogeneous Poisson structures on loop spaces of symmetric spaces, Symmetry Integrability Geom. Methods Appl. 4 (2008), Paper 069. [7] D. Pickrell, B. Pittmann-Polletta, Unitary loop groups and factorization, J. Lie Theory 20 (1) (2010) 93–112. [8] A. Pressley, G. Segal, Loop Groups, Oxford Math. Monogr., Oxford Science Publications, Oxford University Press, New York, 1986. [9] H. Widom, Asymptotic behavior of block Toeplitz matrices and determinants. II, Adv. Math. 21 (1976) 1–29.
Journal of Functional Analysis 260 (2011) 2222–2246 www.elsevier.com/locate/jfa
Direct sums and the Szlenk index ✩ Philip A.H. Brooker 1 Mathematical Sciences Institute, Australian National University, Canberra ACT 0200, Australia Received 1 April 2010; accepted 16 December 2010 Available online 20 January 2011 Communicated by Gilles Godefroy
Abstract For α an ordinal and 1 < p < ∞, we determine a necessary and sufficient condition for an p -direct sum of operators to have Szlenk index not exceeding ωα . It follows from our results that the Szlenk index of an p -direct sum of operators is determined in a natural way by the behaviour of the ε-Szlenk indices of its summands. Our methods give similar results for c0 -direct sums. © 2010 Elsevier Inc. All rights reserved. Keywords: Szlenk index; Asplund operators; Direct sums; Banach spaces
0. Introduction The Szlenk index was introduced by W. Szlenk in his influential paper [22], where an ordinal index was used to show that the class of all separable, reflexive Banach spaces contains no universal element. Since then, the Szlenk index and its variants have taken on an increasingly important role in the study of Banach spaces and their operators. We refer the reader to the surveys [14] and [19] for details on some of the main applications of the Szlenk index. A class of closed operator ideals naturally related to the Szlenk index has been introduced and systematically studied by the present author in [2]. These operator ideals are denoted SZ α , where α is an ordinal, and elements of SZ α are known as α-Szlenk operators. The operator ✩
Research supported by an ANU PhD Scholarship. E-mail address: [email protected]. 1 This work forms part of the author’s doctoral dissertation, written at the Australian National University under the supervision of Dr. Richard J. Loy. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.016
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2223
ideals SZ α are studied in [2] with regard to their operator ideal properties and their relationship to other closed operator ideals, in particular the class of Asplund operators. The purpose of the present paper is to present a detailed analysis of the behaviour of the Szlenk index under the process of taking c0 and p -direct sums of operators. In particular, we give a precise formulation of the Szlenk index of a direct sum of operators in terms of the behaviour of the ε-Szlenk indices of the summands. Our motivation for this is as follows. Firstly, forming direct sums is a fundamental construction in Banach space theory, often being used to construct examples with a particular property, and so we feel it essential to understand precisely how the Szlenk index behaves under this procedure. Secondly, we are motivated by the following basic question of operator ideal theory: Question 0.1. Let I be a given operator ideal. Does I have the factorisation property? That is, does every element of I factor continuously and linearly through a Banach space whose identity operator belongs to I ? In [2], results and techniques developed in the current paper are applied to obtain both positive and negative answers to Question 0.1 for the case I = SZ α , with the answer depending upon ordinal properties of α. We now outline the structure of the current paper. In Section 1 we detail necessary notation and background results regarding the Szlenk index, including several relevant results from [2]. Our main results are presented in Section 2. Firstly, we consider the Szlenk index of 1 and ∞ -direct sums; this case is rather straightforward, but worth noting explicitly for the sake of completeness. We then move on to our main concern, providing a formulation of the Szlenk index of c0 and p -direct sums of operators, where 1 < p < ∞ (see, in particular, Theorem 2.10). This case is far more subtle than the case of 1 and ∞ -direct sums and, as such, requires substantially more effort to accomplish the desired formulation of the Szlenk index of the direct sum. Section 2 concludes with some applications of the earlier operator theoretic results to the Szlenk index of Banach spaces. The final section, Section 3, constitutes almost half of the paper and is devoted to proving the main technical lemma used in Section 2, namely Lemma 2.5. 1. Preliminaries Banach spaces are typically denoted by the letters E and F . For a Banach space E and nonempty bounded S ⊆ E, we define |S| := sup{x | x ∈ S}. By BE we denote the closed unit ball of E, and by IE the identity operator of E. The class of all bounded linear operators between arbitrary Banach spaces is denoted by B, and the class of all compact operators by K . We write O RD for the class of all ordinals, whose elements are typically denoted by the lower-case Greek letters α, β and γ . For Λ a set, Λ<∞ denotes the set of all nonempty finite subsets of Λ. When Λ denotes the index set over which we take a direct sum or direct product, it is always assumed that Λ is nonempty. Let p ∈ {0} ∪ (1, ∞) and q ∈ [1, ∞). We say that q is dual to p, or equivalently, p is predual to q, if (p, q) ∈ {(0, 1)} ∪ {(r, r(r − 1)−1 ) | r ∈ (1, ∞)}. sum of {Eλ | λ ∈ Λ} is For 1 p ∞, a set Λ and Banach spaces Eλ , λ ∈ Λ, the p -direct denoted ( λ∈Λ Eλ )p , and the c0 -direct sum of {Eλ | λ ∈ Λ} is denoted ( λ∈Λ Eλ )0 . If there is a Banach space E such that Eλ = E for all λ ∈ Λ, then we may also write the p -direct sum and for 1 < p, q < ∞ satisthe c0 -direct sum as p (Λ, E) and c0 (Λ, E), respectively. Throughout, fying p + q = pq, we implicitly identify ( λ∈Λ Eλ )∗p with ( λ∈Λ Eλ∗ )q , so that the dual of a
2224
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
direct sum is the dual direct sum of the duals of the spaces Eλ . Making∗ this identification allows us to consider direct products of the form λ∈Λ Kλ , where Kλ ⊆ Eλ and (|Kλ |)λ∈Λ ∈ q (Λ), as subsets of ( λ∈Λ Eλ )∗p . Similarly, ( λ∈Λ Eλ )∗0 is naturally identified with ( λ∈Λ Eλ∗ )1 throughout. by Λ and p = 0 or 1 < p < ∞. Let Λ be a set, {Eλ | λ ∈ Λ} a family of Banach spaces indexed canonical injection of ( E ) into ( For R ⊆ Λ, we denote by UR the λ∈R λ p λ∈Λ Eλ )p , and by PR the canonical surjection of ( λ∈Λ Eλ )p onto ( λ∈R Eλ )p . For a set Λ, a family of Banach spaces {Eλ | λ ∈ Λ} and nonempty, bounded subsets Sλ ⊆ Eλ , λ ∈ Λ, we say that {Sλ ⊆ Eλ | λ ∈ Λ} is uniformly bounded if sup{|Sλ | | λ ∈ Λ} < ∞. If {Fλ | λ ∈ Λ} is also a family of Banach spaces indexed by Λ, a set of operators {Tλ ∈ B(Eλ , Fλ ) | λ ∈ Λ} is said to be uniformly bounded if sup{Tλ | λ ∈ Λ} < ∞. Given 1 p ∞ and a uniformly bounded family of operators {Tλ ∈ B(Eλ , Fλ ) | λ ∈ Λ}, the p -direct B(E , F ) | λ ∈ Λ}, denoted ( sum of {Tλ ∈ λ λ λ∈Λ Tλ )p , is the continuous linear map that sends (T x ) ∈ ( (xλ )λ∈Λ ∈ ( λ∈Λ Eλ )p to λ λ λ∈Λ λ∈Λ Fλ )p . Each of the operators Tλ , λ ∈ Λ, is a sum mand of the direct sum ( λ∈Λ Tλ )p . A Banach space E over the field R of real scalars is said to be Asplund if every real-valued convex continuous function defined on a convex open subset U of E is Fréchet differentiable on a dense Gδ subset of U . Our arguments hold for Banach spaces over the field K = R or C; note that the notion of Asplund space may be extended (somewhat artificially) to complex Banach spaces by declaring a complex Banach space to be Asplund precisely when its underlying real Banach space structure is an Asplund space in the real scalar sense. By extending the notion of Asplund space to complex Banach spaces in this way, many of the well-known characterisations of Asplund spaces – for instance, a Banach space is Asplund if and only if each of its separable subspaces has separable dual [3, Theorem 5.7] – then hold also for complex Asplund spaces. For Banach spaces E and F , an operator T : E −→ F is Asplund if for any finite positive measure space (Ω, Σ, μ), any S ∈ B(F, L∞ (Ω, Σ, μ)) and any ε > 0, there exists B ∈ Σ such that μ(B) > μ(Ω) − ε and {f χB | f ∈ ST (BE )} is relatively compact in L∞ (Ω, Σ, μ) (here χB denotes the characteristic function of B on Ω). We note that some authors, for example in [17] and [10], refer to Asplund operators as decomposing operators. Standard references for Asplund operators are [17] and [21], where it is shown that the Asplund operators form a closed operator ideal and that a Banach space is an Asplund space if and only if its identity operator is an Asplund operator. A further impressive result is that every Asplund operator factors through an Asplund space; this is due independently to O. Re˘ınov [18], S. Heinrich [10] and C. Stegall [21]. We now define the Szlenk index, noting that our definition varies from that given by W. Szlenk in [22]. However, the two definitions give the same index for operators acting on separable Banach spaces containing no isomorphic copy of 1 (see the proof of [12, Proposition 3.3] for details). Let E be a Banach space, K ⊆ E ∗ a w ∗ -compact set and ε > 0. Define sε (K) := x ∈ K diam(K ∩ V ) > ε for every w ∗ -open V x . We iterate sε transfinitely as follows: let sε0 (K) = K, sεα+1 (K) = sε (sεα (K)) for each ordinal α β and, if α is a limit ordinal, sεα (K) = β<α sε (K). The ε-Szlenk index of K, denotedSzε (K), is the class of all ordinals α such that sεα (K) = ∅. The Szlenk index of K is the class ε>0 Szε (K). Note that Szε (K) (resp., Sz(K)) is either an ordinal or the class O RD of all ordinals. If Szε (K) (resp., Sz(K)) is an ordinal, then we write Szε (K) < ∞ (resp., Sz(K) < ∞), and otherwise we write Szε (K) = ∞ (resp., Sz(K) = ∞).
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2225
For a Banach space E, the ε-Szlenk index of E is Szε (E) = Szε (BE ∗ ), and the Szlenk index of E is Sz(E) = Sz(BE ∗ ). If T : E −→ F is an operator, the ε-Szlenk index of T is Szε (T ) = Szε (T ∗ BF ∗ ), whilst the Szlenk index of T is Sz(T ) = Sz(T ∗ BF ∗ ). It is clear that the Szlenk index of a nonempty w ∗ -compact set cannot be 0. We note also that, by w ∗ -compactness, the ε-Szlenk index of a nonempty w ∗ -compact set K is never a limit ordinal. The following proposition states some known facts about the Szlenk index. Proposition 1.1. Let E and F be Banach spaces, T : E −→ F an operator and K ⊆ E ∗ a nonempty w ∗ -compact set. (i) If E is isomorphic to a quotient or subspace of F , then Sz(E) Sz(F ). In particular, the Szlenk index is an isomorphic invariant of a Banach space. (ii) Sz(E) < ∞ if and only if E is an Asplund space. Similarly, Sz(T ) < ∞ if and only if T is an Asplund operator. (iii) If K is absolutely convex and Sz(K) < ∞, then there exists an ordinal α such that Sz(K) = ωα . In particular, the Szlenk index of an Asplund space or Asplund operator is of the form ωα for some (unique) ordinal α. (iv) Sz(K) = 1 if and only if K is norm-compact. In particular, Sz(E) = 1 if and only if dim(E) < ∞, and Sz(T ) = 1 if and only if T is compact. (v) Sz(E ⊕ F ) = max{Sz(E), Sz(F )}. Part (i) of Proposition 1.1 is discussed in [8]. Part (ii) is discussed in [8] in the case of spaces, and the more general case of operators is established in [2, Proposition 2.10]. Part (iii) was proved for K = BE ∗ in [13]; see also p. 64 of [9]. As the proof of the case K = BE ∗ relies only upon the fact that BE ∗ is convex and symmetric (that is, absolutely convex), the proof applies also to arbitrary absolutely convex K. Part (iv) is a consequence of the fact that a w ∗ -compact set is norm-compact if and only if its relative w ∗ and norm topologies coincide (see, e.g., [4, Corollary 3.1.14]), with the final assertion regarding operators requiring the use of Schauder’s theorem. Part (v) is essentially Proposition 2.4 of [7] (see also [15, Proposition 14] for the separable case), and will be improved upon in Theorem 2.11 below. Definition 1.2. For each ordinal α, define SZ α := {T ∈ B | Sz(T ) ωα }. As noted in the introduction, elements of SZ α are known as α-Szlenk operators. We have the following: Theorem 1.3. (See [2, Theorem 2.2].) Let α be an ordinal. Then SZ α is a closed operator ideal. 2. Main results It is obvious that a direct sum of operators factors any of its summands. Thus, since {T ∈ B | Sz(T ) < ∞} is the operator ideal of Asplund operators (see Proposition 1.1(ii)), it is only interesting to consider the Szlenk index of a direct sum of operators in the case that all of the summands are Asplund. With this in mind, we henceforth consider direct sums of Asplund operators only.
2226
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2.1. 1 -Direct sums and ∞ -direct sums The task of determining the Szlenk index of 1 -direct sums and ∞ -direct sums of operators is made considerably easier by the fact that the Banach spaces 1 and ∞ fail to be Asplund, for this ensures that the norms of the summand operators must exhibit c0 -like behaviour in order for the direct sum operator to be Asplund. More precisely, we have the following result. Proposition 2.1. Let Λ be a set, {Eλ | λ ∈ Λ} and {Fλ | λ ∈ Λ} families of Banach spaces, {Tλ ∈ B(Eλ , Fλ ) | λ ∈ Λ} a uniformly bounded family of Asplund operators and p = 1 or p = ∞. The following are equivalent: (i) Sz((λ∈Λ Tλ )p ) < ∞ (that is, ( λ∈Λ Tλ )p is Asplund). (ii) Sz(( λ∈Λ Tλ )p ) = sup{Sz(Tλ ) | λ ∈ Λ}. (iii) (Tλ )λ∈Λ ∈ c0 (Λ). Proof. We prove (iii) ⇒ (ii) ⇒ (i) ⇒ (iii). Suppose (iii) holds; we will show Sz(( λ∈Λ Tλ )p ) = sup{Sz(Tλ ) | λ ∈ Λ}. By Proposition 1.1(iii) there exist ordinals αλ , λ ∈ Λ, with Sz(Tλ ) =ωαλ for each λ. Let αΛ = sup{αλ | λ ∈ Λ}, so that sup{Sz(Tλ ) | λ ∈ Λ} = ωαΛ . To see that ( λ∈Λ Tλ )p ∈ SZ αΛ , for n ∈ N and λ ∈ Λ let Tλ if Tλ > 1/n, Tλ,n = 0 otherwise and Vn = ( λ∈Λ Tλ,n )p . Note that {Tλ,n | λ ∈ Λ, n ∈ N} ⊆ SZ αΛ , hence Vn ∈ SZ αΛ also that factor some element of {Tλ,n | since each Vn can be written as a (finite) sum of operators λ ∈ Λ, n ∈ N}. It follows from the definitions that Vn − ( λ∈Λ Tλ )p 1/n for each n ∈ N, hence Vn −→ ( λ∈Λ all n and SZ ααΛ is closed (TheoTλ )p as n −→ ∞. Since Vn ∈ SZ αΛ for Λ rem 1.3), we have ( λ∈Λ Tλ )p ∈ SZ αΛ . In particular, Sz(( λ∈Λ Tλ )p ) ω = sup{Sz(Tλ ) | λ ∈ Λ}. The reverse inequality follows by Theorem 1.3 and the fact that ( λ∈Λ Tλ )p factors each of the operators Tλ , λ ∈ Λ. We have now shown (iii) ⇒ (ii). It is trivial that (ii) ⇒ (i), so remains only to show that (i) ⇒ (iii). To this end, suppose that (iii) does not hold. Then there exists δ > 0 and an infinite set Λ ⊆ Λ such that Tλ > δ for all λ ∈ Λ , and so ( λ∈Λ T λ )p factors an isomorphic embedding of the non-Asplund space p . By Proposition 1.1(ii), Sz(( λ∈Λ Tλ )p ) = ∞. 2 2.2. c0 -Direct sums and p -direct sums (1 < p < ∞) In this section we consider the Szlenk index of a direct sum operator ( λ∈Λ Tλ )p , where p = 0 or 1 < p < ∞. As in the cases p = 1 and p = ∞, if (Tλ )λ∈Λ ∈ c0 (Λ) then / Sz(( λ∈Λ Tλ )p ) = sup{Sz(Tλ ) | λ ∈ Λ}. However, the situation is not so clear if (Tλ )λ∈Λ ∈ c0 (Λ), and we demonstrate this by way of an example. For an ordinal γ , we may equip the ordinal γ + 1 with its order topology, thereby making it a compact Hausdorff space. C. Samuel α has shown that for each α < ω1 , Sz(C(ωω + 1)) = ωα+1 (Samuel’s calculation is found in [20], however a more direct approach has been discovered by P. Hájek and G. Lancien [7]). By the Bessaga–Pełczy´nski linear isomorphic classification of C(K) spaces with K countable [1, Theorem 1], C(ωn + 1) is linearly isomorphic to C(ω + 1) for all 0 < n < ω. Thus, in particular,
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2227
Sz(C(ωn + 1)) = Sz(C(ω + 1)) = ωfor all 0 < n < ω. For each 0 < n < ω, let Tn denote the identity operator on C(ωn + 1). As ( 0
0
Tn
= Sz C ωω + 1 = ω2 > ω = sup Sz(Tn ) 0 < n < ω .
0
Thus the situation under consideration in this section is more subtle than the cases of 1 -direct sums and ∞ -direct sums. Our goal is to determine precisely the Szlenk index of a c0 -direct sum or p -direct sum (1 < p < ∞) of operators in terms of the overall behaviour of the ε-Szlenk indices of the summand operators. To this end, we now introduce some notation. Given a set Λ, a family of Banach spaces {Eλ | λ ∈ Λ}, a corresponding uniformly bounded family {Kλ ⊆ Eλ∗ | λ ∈ Λ} of absolutely convex, w ∗ -compact sets and 1 q < ∞, we define Bq (Kλ | λ ∈ Λ) :=
aλ Kλ ,
(aλ )λ∈Λ ∈Bq (Λ) λ∈Λ
∗ , where p is predual to q (recall and always consider B q (Kλ | λ ∈ Λ) as a subset of ( λ∈Λ Eλ ) p ∗ from Section 1 that ( λ∈Λ Eλ )p is naturally identified with ( λ∈Λ Eλ∗ )q ). Such a set Bq (Kλ | λ ∈ Λ) so defined is clearly bounded, and it is not difficult to see that it is also w ∗ -compact. Indeed, for each λ ∈ Λ define Tλ : Eλ −→ C(Kλ ) to be the map that sends x ∈ Eλ to the continuous function k → k, x (k ∈ Kλ ). Then the Kre˘ın–Mil’man theorem, along with other classical results regarding extreme points (see, for example, [5, Lemma 3.42] and[6, Exercise 2.4]), implies that Tλ∗ BC(Kλ )∗ = Kλ for each λ ∈ Λ. Hence Bq (Kλ | λ ∈ Λ) = ( λ∈Λ Tλ )∗p B(λ∈Λ C(Kλ ))∗p , ensuring the w ∗ -compactness of Bq (Kλ | λ ∈ Λ). We first deal explicitly with the case where the Szlenk index of a direct sum of operators has Szlenk index ω0 = 1. The following result describes the situation for this case. Proposition 2.2. Let Λ be a set, {Eλ | λ ∈ Λ} and {Fλ | λ ∈ Λ} families of Banach spaces, {Tλ ∈ B(Eλ , Fλ ) | λ ∈ Λ} a uniformly bounded family of operators and p ∈ {0} ∪ [1, ∞]. The following are equivalent: (i) Sz(( λ∈Λ Tλ )p ) = 1. (ii) Sz(Tλ ) = 1 for every λ ∈ Λ and (Tλ )λ∈Λ ∈ c0 (Λ). Proposition 2.2 follows immediately from Proposition 1.1(iv) and the following proposition. Proposition 2.3. Let Λ be a set, {Eλ | λ ∈ Λ} and {Fλ | λ ∈ Λ} families of Banach spaces, {Tλ ∈ B(Eλ , Fλ ) | λ ∈ Λ} a uniformly bounded family of operators and p ∈ {0} ∪ [1, ∞]. The following are equivalent: (i) ( λ∈Λ Tλ )p is compact. (ii) Tλ is compact for every λ ∈ Λ and (Tλ )λ∈Λ ∈ c0 (Λ). We omit the straightforward proof of Proposition 2.3, but note that it is similar to the proof of Proposition 2.1 presented earlier.
2228
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
The general case for c0 -direct sums and p -direct sums of operators, where 1 < p < ∞, will be deduced from the following key result. Proposition 2.4. Let Λ be a set, {Eλ | λ ∈ Λ} a family of Banach spaces, {Kλ ⊆ Eλ∗ | λ ∈ Λ, Kλ = ∅} a uniformly bounded family of nonempty absolutely convex w ∗ -compact sets, α > 0 an ordinal and 1 q < ∞. The following are equivalent: (i) Sz(Bq (Kλ | λ ∈ Λ)) ωα . (ii) sup{Szε (Kλ ) | λ ∈ Λ} < ωα for every ε > 0. (iii) sup{Szε (Bq (Kλ | λ ∈ F )) | F ∈ Λ<∞ } < ωα for every ε > 0. To establish Proposition 2.4, we prove (i) ⇒ (ii) ⇒ (iii) ⇒ (i). In proving the implication (ii) ⇒ (iii), we shall call upon the following technical result: Lemma 2.5. Let E1 , . . . , En be Banach spaces, K1 ⊆ E1∗ , . . . , Kn ⊆ En∗ nonempty, absolutely convex, w ∗ -compact sets, 1 q < ∞ and ε > 0. Let d = max{diam(Ki ) | 1 i n} and let m and M be natural numbers such that M m 2 and (2q − 1)ε q M 8q d q (m − 1). Suppose α α is an ordinal such that sεω ·M (Bq (Ki | 1 i n)) = ∅. Then for every δ ∈ (0, ε/16) there is α i n such that sδω ·m (Ki ) = ∅. The proof of Lemma 2.5 is delayed until Section 3. To show (iii) ⇒ (i) we require the following discrete variant of [7, Lemma 3.3]: Lemma 2.6. Let Λ be a set, (Eλ )λ∈Λ a family of Banach spaces, 1 q < ∞, p predual to q and K ⊆ ( λ∈Λ Eλ )∗p nonempty and w ∗ -compact. Let α be an ordinal, R ⊆ Λ and ε > δ > 0. ∗ xq > |K|q − ( ε−δ )q , then U ∗ x ∈ s α (U ∗ K). If x ∈ sεα (K) and UR δ 2 R R Proof. We fix ε, δ and R and proceed by induction on α. The conclusion of the lemma is trivially true for α = 0. So suppose that β is an ordinal such that the conclusion of the lemma holds with α = β; we show that it holds then also for α = β + 1. To this end, let x ∈ K be such that β+1 β+1 ∗ xq > |K|q − ( ε−δ )q and U ∗ x ∈ ∗ K). Our goal is to show that x ∈ (UR / sε (K), so UR 2 R / sδ β ∗ x ∈ s β (U ∗ K) by the inductive hypothesis. It follows we may assume that x ∈ sε (K), hence UR δ R ∗ x ∈ V and d := diam(V ∩ s β (U ∗ K)) δ. that there is w ∗ -open V ⊆ ( λ∈R Eλ )∗p such that UR δ R ∗ x does not belong to the w ∗ -closed set (|K|q − ( ε−δ )q )1/q B ∗ As UR , we may assume ( λ∈R Eλ )p 2
ε−δ V ∩ |K| − 2 q
q 1/q
B(λ∈R Eλ )∗p = ∅.
∗ )−1 (V ) and let u ∈ W ∩ s (K). Then U ∗ uq > |K|q − ( ε−δ )q and u ∈ s (K), Let W = (UR ε ε 2 R ∗ u ∈ V ∩ s β (U ∗ K). So for u , u ∈ W ∩ s β (K) we have hence by the induction hypothesis UR 1 2 ε δ R ∗ u − U ∗ u q d q δ q . Moreover, since U ∗ u q > |K|q − ( ε−δ )q it follows that UR 1 2 R 2 R 1 β
u1 − P ∗ U ∗ u1 |K|q − P ∗ U ∗ u1 q 1/q = |K|q − U ∗ u1 q 1/q < ε − δ . R R R R R 2
β
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246 ∗ U∗ u < Similarly, u2 − PR R 2
ε−δ 2 .
2229
We now deduce that
∗ ∗ q q ∗ ∗ ∗ ∗ ∗ ∗ u1 − u2 q = PR UR u1 − PR UR u2 + u1 − PR UR u1 − u2 − PR UR u2
∗ q ε−δ q ∗ UR u1 − UR u2 + 2 · 2 δ q + (ε − δ)q εq . β
β+1
In particular, diam(W ∩ sε (K)) ε. It follows that x ∈ / sε (K), as desired. The lemma passes easily to limit ordinals, so we are done. 2 In order to state the third (and final) lemma required in the proof of Proposition 2.4, we give the following definition. Definition 2.7. For real numbers a 0, b > c > 0 and 1 d < ∞, define
d
2a d b σ (a, b, c, d) := inf n ∈ N n − +1 . b−c b−c With regards to Definition 2.7, note that σ (a, b, c, d) = 1 whenever 2a b. Lemma 2.8. Let Λ be a set, {Eλ | λ ∈ Λ} a family of Banach spaces, 1 q < ∞, p predual to q, K ⊆ ( λ∈Λ Eλ )∗p a nonempty, w ∗ -compact set and ε > δ > 0. Suppose ηδ is a nonzero ordinal η ·σ (|K|,ε,δ,q)
such that sδ δ (UF∗ K) = ∅ for every F ∈ Λ<∞ . Then sε δ η
(K) = ∅.
η ·n
Proof. We claim that for each n < ω, either sε δ (K) is empty or q
η ·n s δ (K)q |K|q − n ε − δ . ε 2
(2.1)
To prove the claim, we proceed by induction on n. (2.1) holds trivially for n = 0. Suppose the claim holds for n = m; we will show that it holds for n = m + 1. For every F ∈ Λ<∞ we have η η sδ δ UF∗ sεηδ ·(m+1) (K) ⊆ sδ δ (UF∗ K) = ∅.
(2.2)
η ·m
If sε δ (K) = ∅, we are done. Otherwise, by the induction hypothesis,
q q η ·(m+1) |K|q − m ε − δ . s δ (K) ε 2 η ·(m+1)
(2.3)
If sε δ (K) = ∅, then applying (2.2), (2.3) and Lemma 2.6 implies that for every x ∈ ηδ ·(m+1) (K) and F ∈ Λ<∞ , we have sε
q
∗ q ε−δ q ε−δ q q U x |K|q − m ε − δ − = |K| − (m + 1) . F 2 2 2
2230
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246 η ·(m+1)
Thus x ∈ sε δ
(K) implies
q ε−δ q , xq = sup UF∗ x F ∈ Λ<∞ |K|q − (m + 1) 2 and so (2.1) holds for n = m + 1. The inductive proof of the claim is complete. By definition (precisely, Definition 2.7), we have
q
ε−δ q ε . |K|q − σ |K|, ε, δ, q − 1 2 2
(2.4)
Thus, by (2.4) and the claim proved above we have
ε diam sεηδ ·(σ (|K|,ε,δ,q)−1) (K) 2 · = ε, 2 and we thus deduce that
sεηδ ·σ (|K|,ε,δ,q) (K) ⊆ sεηδ ·(σ (|K|,ε,δ,q)−1)+1 (K) = sε sεηδ ·(σ (|K|,ε,δ,q)−1) (K) = ∅.
2
We now give the proof of Proposition 2.4, assuming Lemma 2.5. Proof of Proposition 2.4. We prove (i) ⇒ (ii) ⇒ (iii) ⇒ (i). Throughout, p shall denote the real number predual to q. To show (i) ⇒ (ii), suppose by way of a contraposition that there is ε > 0 such that ∗ | ∗ sup{Szε (Kλ ) | λ ∈ Λ} ωα . For each λ ∈ Λ, the restriction P{λ } Kλ is a norm-isometric, w homeomorphic embedding of Kλ into Bq (Kλ | λ ∈ Λ), hence Szδ (Bq (Kλ | λ ∈ Λ)) Szδ (Kλ ) for all δ > 0 and λ ∈ Λ. Thus
Szε Bq (Kλ | λ ∈ Λ) sup Szε (Kλ ) λ ∈ Λ ωα .
(2.5)
As Szε (Bq (Kλ | λ ∈ Λ)) cannot be a limit ordinal, we deduce from (2.5) that
Sz Bq (Kλ | λ ∈ Λ) Szε Bq (Kλ | λ ∈ Λ) > ωα . This proves (i) ⇒ (ii). Suppose (ii) holds. For each ε > 0 let 1 < mε < ω and βε < α be such that sup{Szε/32 (Kλ ) | λ ∈ Λ} < ωβε ·mε . Set d = sup{diam(Kλ ) | λ ∈ Λ} and for each ε ∈ (0, 1) let Mε ∈ N be such that (2q − 1)ε q Mε 8q d q (mε − 1). By Lemma 2.5, for F ∈ Λ<∞ we have Szε (Bq (Kλ | λ ∈ F )) < ωβε · Mε , hence sup Szε Bq (Kλ | λ ∈ Λ) F ∈ Λ<∞ ωβε · Mε < ωα . Thus, (ii) ⇒ (iii). Suppose that (iii) holds. As UF∗ Bq (Kλ | λ ∈ Λ) = Bq (Kλ | λ ∈ F ) for each F ∈ Λ<∞ , applying Lemma 2.8 with K = Bq (Kλ | λ ∈ Λ), δ = δ(ε) = ε/2 and ηδ(ε) = sup{Szε/2 (UF∗ Bq (Kλ | λ ∈ Λ)) | F ∈ Λ<∞ } (< ωα ) yields
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2231
Sz Bq (Kλ | λ ∈ Λ) = sup Szε Bq (Kλ | λ ∈ Λ) ε > 0
sup ηδ(ε) · σ sup |Kλ | λ ∈ Λ , ε, ε/2, q ε > 0 ωα , hence (iii) ⇒ (i).
2
Remark 2.9. The idea that an iterated implementation of Lemma 2.6 (c.f. Lemma 2.8 and its proof) might be used to prove the implication (iii) ⇒ (i) in the proof of Proposition 2.4 was essentially suggested to the author by Gilles Lancien; previous versions of the main results of this chapter used a slightly different argument (also using Lemma 2.6, but just a single direct application) and required the additional hypothesis that Kλ = BEλ∗ for all λ (see Theorem 2.11). The following result, along with Proposition 2.2, determines precisely the Szlenk index of a c0 -direct sum or p -direct sum of operators (1 < p < ∞) in terms of properties of the ε-Szlenk indices of the summands. Theorem 2.10. Let Λ be a set, {Eλ | λ ∈ Λ} and {Fλ | λ ∈ Λ} families of Banach spaces, {Tλ : Eλ −→ Fλ | λ ∈ Λ} a uniformly bounded family of Asplund operators, α > 0 an ordinal and p = 0 or 1 < p < ∞. The following are equivalent: (i) Sz(( λ∈Λ Tλ )p ) ωα . (ii) sup{Szε (Tλ ) | λ ∈ Λ} < ωα for all ε > 0. It follows that if ( λ∈Λ Tλ )p is noncompact, then Sz
λ∈Λ
Tλ
= inf ωα sup Szε (Tλ ) λ ∈ Λ < ωα for all ε > 0 .
p
Proof. For convenience we set T = ( λ∈Λ Tλ )p . The equivalence of (i) and (ii) is achieved by applying Proposition 2.4 with Kλ = Tλ∗ BFλ∗ for all λ ∈ Λ, for in this case T ∗ B(λ∈Λ Eλ )∗p = Bq (Tλ∗ BFλ∗ | λ ∈ Λ), where q ∈ [1, ∞) is dual to p. For each λ ∈ Λ let αλ denote the unique ordinal satisfying Sz(Tλ ) = ωαλ . Let αΛ = sup{αλ | λ ∈ Λ}. The set α ω sup Szε (Tλ ) λ ∈ Λ < ωα for all ε > 0 ωαΛ +1 is nonempty, hence Sz(T ) inf ωα sup Szε (Tλ ) λ ∈ Λ < ωα for all ε > 0 by the implication (ii) ⇒ (i) above. To complete the proof, we now suppose that T is noncompact. As Sz(T ) is a power of ω, it is enough to show that Sz(T ) > ωβ holds for β satisfying ωβ < inf{ωα | sup{Szε (Tλ ) | λ ∈ Λ} < ωα for all ε > 0}. Take such β. If β = 0, then Sz(T ) > ωβ by noncompactness of T . On the other hand, if β > 0 then there is ε > 0 so small that Szε (T ) sup{Szε (Tλ ) | λ ∈ Λ} ωβ . As Szε (T ) cannot be a limit ordinal, we conclude that Sz(T ) Szε (T ) > ωβ . 2
2232
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2.3. Applications Our first result here is the following Banach space analogue of Theorem 2.10 which determines precisely the Szlenk index of a c0 -direct sum or p -direct sum of Banach spaces in terms of the behaviour of the ε-Szlenk indices of the summand spaces. Theorem 2.11. Let Λ be a set, {Eλ | λ ∈ Λ} a family of Asplund spaces, α > 0 an ordinal and p = 0 or 1 < p < ∞. The following are equivalent: (i) Sz(( λ∈Λ Eλ )p ) ωα . (ii) sup{Szε (Eλ ) | λ ∈ Λ} < ωα for all ε > 0. It follows that if ( λ∈Λ Eλ )p is infinite dimensional, then Sz
λ∈Λ
Eλ
= inf ωα sup Szε (Eλ ) λ ∈ Λ < ωα for all ε > 0 .
p
Proof. The conclusions of the theorem follow by taking Tλ to be the identity operator of Eλ for each λ ∈ Λ in the statement of Theorem 2.10. 2 Theorem 2.12. Let Λ be a set, E an infinite dimensional Banach space and 1 < p < ∞. Then
Sz(E) = Sz c0 (Λ, E) = Sz p (Λ, E) . Proof. Apply Theorem 2.11 with Eλ = E for all λ ∈ Λ.
2
The previous theorem, Theorem 2.12, allows us to add to the class of ordinals γ for which the Szlenk index of C(γ + 1) is known (here, γ + 1 is equipped with its order topology). The computation of the Szlenk index of C(ω1 + 1), in particular Sz(C(ω1 + 1)) = ω1 · ω, is due to Hájek and Lancien [7]. Essentially using the fact that Sz(C(ξ + 1)) = Sz(C(ζ + 1)) for ordinals ξ and ζ satisfying ξ ζ < ξ · ω (an easy consequence of Proposition 1.1(v)), Hájek and Lancien deduce that Sz(C(γ + 1)) = ω1 · ω whenever ω1 γ < ω1 · ω. We claim that Sz(C(γ + 1)) = ω1 · ω whenever ω1 γ < ω1 · ωω , a fact that will follow once we have shown that Sz(C(ξ + 1)) = Sz(C(ζ + 1)) whenever ξ and ζ are ordinals satisfying ω ξ ζ < ξ · ωω . If ξ and ζ are ordinals satisfying ω ξ ζ < ξ · ωω , then there exists n < ω such that C(ζ + 1) is isomorphic to a subspace of C(ξ · ωn + 1). Thus, by Proposition 1.1(i), it suffices to show that Sz(C(ξ + 1)) = Sz(C(ξ · ωn + 1)) for all n < ω. This is obviously true for n = 0, and if true for some n then, since C(ξ · ωn+1 + 1) is isomorphic to c0 (ω, C(ξ · ωn + 1)), Theorem 2.12 yields
Sz C ξ · ωn+1 + 1 = Sz c0 ω, C ξ · ωn + 1
= Sz C ξ · ωn + 1
= Sz C(ξ + 1) , which completes the proof.
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2233
The following proposition asserts that the set of all countable values of the Szlenk index of Banach spaces is attained by the class of Banach spaces with a shrinking basis. A further consequence of this result is that if for α < ω1 there exists a Banach space of Szlenk index ωα , then Pełczy´nski’s complementably universal basis space (see [16]) has a complemented subspace of Szlenk index ωα . Proposition 2.13. Let 0 < α < ω1 . The following are equivalent: (i) There exists a Banach space E with Sz(E) = ωα . (ii) There exists a Banach space E with a shrinking basis and Sz(E) = ωα . To prove Proposition 2.13, we shall call on the following result regarding subspaces and quotients, due to G. Lancien [13] and [11, Theorem III.1]: Proposition 2.14. Let β < ω1 and let E be a Banach space such that Sz(E) > β. (i) There is a separable closed subspace F of E such that Sz(F ) > β. (ii) If E ∗ is norm separable, then for every δ > 0 there is a closed subspace F of E such that Sz(E/F ) > β and E/F has a shrinking basis with basis constant not exceeding 1 + δ. With the exception of the basis constant assertion of part (ii), Proposition 2.14 is proved in [13]. Lancien’s proof follows closely the proof of [11, Theorem III.1], and the extra assertion above regarding the basis constant is easily added to Lancien’s result using the observations regarding basis constants in the proof of [11, Theorem III.1]. Proposition 2.13 is an immediate consequence of the following: Proposition 2.15. Let α > 0 be a countable ordinal and E a Banach space with Sz(E) = ωα . Then there exist closed subspaces F ⊆ E and G ⊆ 2 (F ) such that 2 (F )/G has a shrinking basis and Sz(2 (F )/G) = ωα . Proof. For each n ∈ N, Proposition 2.14(i) yields a separable closed subspace Dn of E such that Sz(Dn ) > Sz1/n (E). Let F = span( n∈N Dn ). Then ωα = Sz(E) = sup Sz1/n (E) sup Sz(Dn ) Sz(F ) Sz(E) = ωα , n
n
hence equality holds throughout. In particular, Sz(F ) = ωα and, as F is a separable Asplund space (indeed, Sz(F ) < ∞), F ∗ is norm separable. For each n ∈ N let Fn = F . Then, by Proposition 2.14(ii), for each n ∈ N there is a closed subspace Gn of Fn such that Sz(Fn /Gn ) > Fn /Gn has a shrinking basis with basis constant 2. Let G denote Sz1/n (E) and not exceeding embedding into ( F ) . Then ( the image of ( n∈N Gn )2 under its natural n 2 n∈N n∈N Fn )2 /G is naturally isometrically isomorphic to ( n∈N Fn /Gn )2 . Note that ( n∈N Fn /Gn )2 has a shrinking basis since it is the 2 -direct sum of a countable family of Banach spaces with shrinking bases that have uniformly bounded basis constants. On the one hand, by Theorem 2.12 we have
= Sz(F ) = ωα . Fn /G Sz Fn Sz n∈N
2
n∈N
2
2234
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
On the other hand,
sup Sz1/n (En ) = Sz(E) = ωα . Sz Fn /G = Sz Fn /Gn n∈N
2
n∈N
n
2
Thus ( n∈N Fn )2 /G has a shrinking basis and Szlenk index ωα .
2
Proposition 2.16. Let α be an ordinal. Then there exists a Banach space of Szlenk index ωα+1 . Proof. Our proof is based on the construction of Szlenk in [22], by which we construct Banach spaces Eβ indexed by the class of ordinals β. Let E0 = {0}, Eβ+1 = Eβ ⊕1 2 and, if β is a limit ordinal, Eβ = ( γ <β Eγ )2 . It is shown in [14, Theorem 4] that for this construction we have Sz1 (Eβ ) > β for all ordinals β. As the assertion of the proposition is known to be true for α = 0 (for example, Sz(2 ) = ω), we assume that α > 0 and let β denote the least ordinal such that Sz(Eβ ) > ωα . Then, by Proposition 1.1(iii), Sz(Eβ ) ωα+1 . By Proposition 1.1(v) and the definition of β , it must be that β is a limit ordinal, hence Eβ = ( β <β Eβ )2 . It fol lows that Sz(Eβ ) = Sz(( β <β Eβ )2 ) ωα+1 , where the final inequality here follows from Theorem 2.11 and the fact that, for all ε > 0, sup Szε (Eβ ) β < β sup Sz(Eβ ) β < β ωα < ωα+1 . It is now clear that Sz(Eβ ) = ωα+1 , so we are done.
2
Implicit in the proof of Proposition 2.16 is the following fact: for a set Λ, Banach spaces Λ}, p = 0 or 1 < p < ∞ and α an ordinal satisfying sup{Sz(Eλ ) | λ ∈ Λ} ωα , we {Eλ | λ ∈ have Sz(( λ∈Λ Eλ )p ) ωα+1 . This follows easily from Theorem 2.11, but seems to have been known for some time. For example, the separable case was established in [15, Proposition 15], and the result is also implicit in the proof of [14, Proposition 5]. Propositions 2.16 and 2.13 concern themselves with the existence of Banach spaces having a particular Szlenk index. The author is not aware of a complete classification of the possible values of the Szlenk index of a Banach space. Proposition 1.1(iii) asserts that the Szlenk index of a Banach space is a power of ω. On the other hand, as the Szlenk index of a Banach space E is the supremum of the countable set {Sz1/n (E) | n ∈ N}, it follows that the Szlenk index of a Banach space is of countable cofinality. In particular, if α is an ordinal of uncountable cofinality, then α is a limit ordinal and ωα cannot be the Szlenk index a Banach space since cf (ωα ) = cf (α) ω1 . In view of this fact and Proposition 2.16, a complete classification of values of the Szlenk index of Banach spaces will be achieved if one establishes an affirmative answer to the following question, which we believe to be open: Question 2.17. Let α be an ordinal with cf (α) = ω. Does there exist a Banach space with Szlenk index equal to ωα ? A partial answer to Question 2.17 is found in [15] where it is shown that if Tωα denotes the α+1 Tsirel’son space, where α < ω1 , then Sz(Tωα ) = ωω . The values taken by the Szlenk index on the class of all operators between Banach spaces will be determined in Proposition 2.18 below.
ωα th
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2235
To conclude the current section, we now apply Proposition 2.16 to obtain, amongst other things, a characterisation of those limit ordinals α for which the operator ideal β<α SZ α is closed. Proposition 2.18. Let α > 0 be an ordinal. The following are equivalent: (i) (ii) (iii) (iv)
cf (α) ω1 . the Szlenk index of any operator between Banach spaces. ωα is not SZ α = β<α SZ β . α is a limit ordinal and β<α SZ β is closed.
Proof. We will show that (i) ⇒ (ii)⇒(iii) ⇒ (iv) ⇒ (i). To see that (i) ⇒ (ii), suppose that there exists an operator T such that ωα = Sz(T ) = sup{Sz1/n (T ) | n ∈ N}. Then cf (α) cf (ωα ) = ω < ω1 . The implication (ii) ⇒ (iii) is immediate from Proposition 1.1(iii). Now suppose that (iii) holds. Then β<α SZ β is closed by Theorem 1.3. Moreover, α is a limit ordinal. Indeed, otherwise we may write α = ζ + 1, where ζ is an ordinal, and by Proposition 2.16 there exists a Banach space E such that IE ∈ SZ ζ +1 \ SZ ζ = SZ α \ SZ β = ∅, which is absurd. β<α Finally, we show that (iv) ⇒ (i). Suppose by way of a contraposition that cf (α) = ω and ⊆ α be cofinal in α. Then {αn + 1 | n < ω} is also cofinal in α, and let {αn | n < ω} SZ = αn +1 n<ω β<α SZ β . So to complete the proof, it suffices to construct an operator T ∈ n<ω SZ αn +1 \ n<ω SZ αn +1 . To this end, for each n < ω let En be a Banach space whose Szlenk index is ωαn +1 (cf. Proposition 2.16), and set E = ( n<ω En )2 . Define T ∈ B(E) by setting T (xn )n<ω = ((n + 1)−1 xn )n<ω for each (xn )n<ω ∈ E. Since T factors IEn for each n < ω, we have Sz(T ) sup Sz(En ) n < ω = sup ωαn +1 n < ω = ωα , hence T ∈ / n<ω SZ αn +1 . On the other hand, with Am (m < ω) denoting the operator on E that sends (xn )n<ω ∈ E to the element (yn )n<ω of E that satisfies yn = xn if n m, and yn = 0 otherwise, we have that IE1 ⊕···⊕Em factors Am T for all m < ω, hence Sz(Am T ) Sz(E1 ⊕ · · · ⊕ Em ) = max ωαi +1 1 i m . In particular, Am T ∈ n<ω SZ αn +1 for m < ω. As limm→ω Am T − T = 0, it follows that T ∈ n<ω SZ αn +1 (E). 2 Remark 2.19. The existence of an operator of Szlenk index ωα whenever cf (α) ω (Proposition 2.18(ii) ⇒ (i)) is used in the proof of [2, Theorem 5.1], where it is shown that if β is an ordinal with cf (β) ω, then SZ ωβ does not have the factorisation property. 3. Proof of Lemma 2.5 Our goal in this section is to prove Lemma 2.5. We proceed via a sequence of lemmas, whose general theme is to establish upper bounds (in terms of set containment) on various derived
2236
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
sets sεα (K), where K is w ∗ -compact, α is an ordinal and ε > 0. The sets K that we shall consider are typically direct products, for it will be seen later that the set Bq (Ki | 1 i n) in the statement of Lemma 2.5 can be ‘approximated’ from above (with respect to set containment) in a convenient way by a finite union of direct products of w ∗ -compact sets. Indeed, this so-called approximation of Bq (Ki | 1 i n) plays a key role in our proof. We mention another important aspect of our results in this section. As noted earlier, Lemma 2.5 is used to establish the implication (ii) ⇒ (iii) of Proposition 2.4. Note that in the statement of Proposition 2.4(iii), there is no (finite) upper bound on the cardinality of the finite sets F ∈ Λ<∞ . It is thus important for us in this section, when aiming for estimates of ε-Szlenk indices of direct products, to obtain estimates that are independent of the (finite) number of factors in a given direct product. Our efforts in this regard are reflected in the fact that the numbers M and n in the statement of Lemma 2.5 are independent of one another. We first establish the following general result regarding the behaviour of sεα derivatives of finite unions of w ∗ -compact sets. Lemma 3.1. Let E be a Banach space, K1 , . . . , Kn ⊆ E ∗ w ∗ -compact sets and ε > 0. Let α be an ordinal and m < ω. Then: α (K ). (i) sεα ( ni=1 Ki ) ⊆ ni=1 sε/2 n m i n mn (ii) sε ( i=1 Ki ) ⊆ i=1 sε (Ki ). (iii) If α is a limit ordinal, then sεα ( ni=1 Ki ) ⊆ ni=1 sεα (Ki ). Proof. (i) holds trivially for α = 0. Suppose that β is an ordinal such that (i) holds for all α β β+1 and let x ∈ E ∗ \ ni=1 sε/2 (Ki ). Then for 1 i n there is w ∗ -open Ui x such that diam(Ui ∩ β β sε/2 (Ki )) ε/2. It follows that for x1 , x2 ∈ ( ni=1 Ui ) ∩ (sε ( ni=1 Ki )) we have x1 − x2 x1 − x + x − x2
ε ε + = ε, 2 2
β β+1 hence diam(( ni=1 Ui )∩(sε ( ni=1 Ki ))) ε. In particular, x ∈ / sε ( ni=1 Ki ), and so (i) passes to successor ordinals. Suppose that β is a limit ordinal such that (i) holds for all α < β. Then sεβ
n i=1
Ki =
sεα
α<β
n
Ki ⊆
n
α sε/2 (Ki ).
(3.1)
α<β i=1
i=1
β Let x ∈ sε ( ni=1 Ki ). Then for each α < β we may choose iα ∈ {1, . . . , n} such that x ∈ α (K ), and for some i ∈ {1, . . . , n} the set {α < β | i = i } is cofinal in β. Hence sε/2 iα α
x∈
iα =i
α sε/2 (Ki ) =
α<β
β
α sε/2 (Ki ) = sε/2 (Ki ) ⊆
n
β
sε/2 (Ki ).
(3.2)
i=1
β Since x ∈ sε ( ni=1 Ki ) was arbitrary, (i) passes to limit ordinals, and thus holds for all ordinals α.
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2237
Statement (ii) is trivial for m = 0. To see that it is true for m = 1, we first let Pk = {F ⊆ {1, . . . , n} | |F | = k}, k ∈ N. It suffices to show that for all l < ω,
n n l (3.3) sε Ki ⊆ sε (Ki ) ∪ Ki . i=1
F ∈Pl+1 i∈F
i=1
Indeed, taking l = n in (3.3) gives (ii) with m = 1 (since F ∈Pl+1 i∈F Ki = ∅ when l = n). It is clear that (3.3) holds for l = 0. Suppose now l < ω is such that (3.3) holds for l = l ; we show that it holds also for l = l + 1. Let n
∗ x∈E \ sε (Ki ) ∪ Kj . G ∈Pl +2 j ∈G
i=1
We want to show that x ∈ / sεl +1 ( ni=1 Ki ), so by the induction hypothesis it suffices to assume that
n n l Ki ⊆ sε (Ki ) ∪ Ki , x ∈ sε i=1
F ∈Pl +1 i∈F
i=1
hence x∈
n Ki \ sε (Ki ) ∪
F ∈Pl +1 i∈F
Kj
.
(3.4)
G ∈Pl +2 j ∈G
i=1
By (3.4) there is (a unique) Fx ∈ Pl +1 such that x ∈ ( i∈Fx Ki ) \ ( i ∈/ Fx Ki ). For each i ∈ Fx ∗ let Ui x be w ∗-open and such that diam(Ui ∩ Ki ) ε and Ui ∩ i ∈/ Fx Ki = ∅. Then U = i∈Fx Ui is a w -neighbourhood of x and U∩
n
sε (Ki ) ∪
Ki
F ∈Pl +1 i∈F
i=1
=U ∩
i∈Fx
Ki =
Ui ∩ Ki
i∈Fx
has norm diameter not exceeding ε (because diam(Ui ∩ Ki ) ε for i ∈ Fx ). It follows then by (3.3) and the induction hypothesis on l = l that
n n l +1 x∈ / sε sε (Ki ) ∪ Ki Ki , ⊇ sε F ∈Pl +1 i∈F
i=1
i=1
as required. In particular, (3.3) holds for all l < ω and (ii) holds for m = 1. Suppose h < ω is such that (ii) holds for all m h. Then n n n (h+1)n n h sε Ki ⊆ sε sε (Ki ) ⊆ sεh+1 (Ki ), i=1
i=1
i=1
so that (ii) holds for m = h + 1, and thus for all m by induction.
2238
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
For (iii), we prove the case n = 2, with the general case then following from this case and a straightforward induction on n. So we want to show that if α is a nonzero limit ordinal, then sεα (K1 ∪ K2 ) ⊆ sεα (K1 ) ∪ sεα (K2 ).
(3.5)
To this end, it suffices to consider the case α = ωβ , β > 0, since the general case follows from finitely many iterations of this case. Indeed, every limit ordinal α is the sum of finitely many ordinals of the form ωβ , β > 0. We proceed by induction on β. For β = 1 we note that, by (ii),
sεω (K1 ∪ K2 ) =
sε2m (K1 ∪ K2 ) ⊆
m<ω
sεm (K1 ) ∪ sεm (K2 ) ,
(3.6)
m<ω
and then a similar argument to that used to obtain (3.2) from (3.1) yields (iii) for α = ω. Suppose now that (3.5) holds for α = ωβ , some β > 0. Then a straightforward induction on l < ω shows that for all such l we have sεω ·l (K1 ∪ K2 ) ⊆ sεω ·l (K1 ) ∪ sεω ·l (K2 ). β
β
β
(3.7)
(3.7) and an argument similar to that used to obtain (3.2) from (3.1) yields sεω
β+1
(K1 ∪ K2 ) ⊆ sεω
β+1
(K1 ) ∪ sεω
β+1
(K2 );
in particular, (iii) passes to successor ordinals. The straightforward proof that (iii) passes to limit ordinals uses, once again, a similar cofinality argument to that used to obtain (3.2) from (3.1) above. 2 The next three lemmas are specifically concerned with sεα derivatives of direct products of sets, considered as w ∗ -compact subsets of dual spaces of direct sums of Banach spaces. sets We require more notation. Given Banach spaces E1 , . . . , En , nonempty w ∗ -compact q ∗ K1 ⊆ E1∗ , . . . , Kn∗ ⊆ En∗ , 1 q < ∞ and a1 , . . . , an 0 real numbers such that ni=1 ai 1, for each ε > 0 we define n q q n n q ai εi ε and 0 εi diam(Ki ), 1 i n . Aε := (εi )i=1 ∈ R w ∗ -compact
i=1
In all places where we use the notation Aε , the w ∗ -compact sets K1 , . . . , Kn , real numbers should arise from this notation. It is a1 , . . . , an and 1 q < ∞ will be fixed, so no ambiguity elementary to see that Aε = ∅ if and only if ε q > ni=1 [ai · diam(Ki )]q . We adopt the notational convention that s0α (K) = K for every ordinal α and w ∗ -compact K. Lemma 3.2. Let E1 , . . . , En be Banach spaces and K1 ⊆ E1∗ , . . . , Kn ⊆En∗ w ∗ -compact sets. q numbers such that ni=1 ai 1. Let p be Let 1 q < ∞, ε > 0 and let a1 , . . . , an 0 be real n n ∗ predual to q and consider i=1 ai Ki as a subset of ( i=1 Ei )p . Then, for every δ ∈ (0, ε), sε
n i=1
ai Ki ⊆
n (εi )∈Aδ i=1
ai sεi (Ki ).
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2239
Proof.We first suppose that ε q > ni=1 [ai · diam(Ki )]q . Then sε ( ni=1 ai Ki ) is empty since n assertion of the lemma follows. diam( i=1 ai Ki ) < ε. The n q q Suppose now that ε i=1 [ai · diam(Ki )] , so that Aε = ∅ for 0 < ε ε. Let δ ∈ (0, ε), n n (ai xi )i=1 ∈ sε ( i=1 ai Ki ) and, for 1 i n, define δi := inf diam(Ki ∩ Ui ) Ui a w ∗ -neighbourhood of xi . q q q Then ni=1 ai δi ε q > δ q . Let f : {1, . . . , n} −→ R be a map such that ni=1 ai f (i)q δ q and f (i) ∈ {0} ∪ (0, δi ) for all i (note that [0, δi ) is empty whenever δi = 0). We claim that with f so defined, xi ∈ sf (i) (Ki ) for 1 i n. Indeed, if δi = 0 then f (i) = 0, hence xi ∈ Ki = sf (i) (Ki ) by convention. On the other hand, if δi > 0, then for all w ∗ -open Ui xi we have diam(Ki ∩ Ui ) δi > f (i), hence xi ∈ sf (i) (Ki ) in this case too. Note that (f (i))ni=1 ∈ Aδ since q f (i) δi diam(Ki ) for all i and ni=1 ai f (i)q δ q , hence (ai xi )ni=1
∈
n
ai sf (i) (Ki ) ⊆
i=1
n
ai sεi (Ki ).
2
(εi )∈Aδ i=1
∗ ∗ Lemma 3.3. Let E1 , . . . , En be Banach spaces and K1 ⊆ E1∗ , . . . , Kn ⊆ E n w -compact sets. q n such that i=1 ai 1. Let p Let 1 q < ∞, ε > 0 and leta1 , . . . , an 0 be real numbers n n ∗ be predual to q and consider i=1 ai Ki as a subset of ( i=1 Ei )p . Then, for every δ ∈ (0, ε), 0 < m < ω and ordinal α,
α sεω ·m
n
i=1
n
ai Ki ⊆
α α α ai sεωi,m sεωi,m−1 . . . sεωi,1 (Ki ) . . . .
(3.8)
(εi,1 ),...,(εi,m )∈Aδ/2 i=1
α Proof. If ε q > ni=1 [ai ·diam(Ki )]q , then sεω ·m ( ni=1 ai Ki ) is empty since diam( ni=1 ai Ki ) < ε and ωα · m 1. The assertion of the lemma follows. Suppose now that ε q ni=1 [ai · diam(Ki )]q , so that Aε = ∅ whenever 0 < ε ε. For α = 0 and m = 1, (3.8) is a consequence of Lemma 3.2. Suppose that α is an ordinal such that (3.8) holds for m = 1, 2, . . . , k, for some 0 < k < ω. We will show that (3.8) holds for α and m = k + 1. Fix δ ∈ (0, ε) and note that A(ε+δ)/4 ⊆ Aδ/2 since δ/2 < (ε + δ)/4. We now detail a method that assigns to each (εi )ni=1 ∈ A(ε+δ)/4 an element (ε i )ni=1 of a certain finite subset of Aδ/2 . For (εi )ni=1 ∈ A(ε+δ)/4 and 1 i n, define ji := max j ∈ N ∪ {0} j (ε − δ) 4εi and set ε i = ji (ε − δ)/4. Note that ε i εi diam(Ki ) and
n i=1
1/q q q ai ε i
n
1/q q q ai εi
i=1
ε+δ ε−δ − 4 4 δ = , 2
−
n i=1
1/q q ai (εi
− ε i )q
2240
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
hence (ε i )ni=1 ∈ Aδ/2 . Moreover, for (εi,1 )ni=1 , . . . , (εi,m )ni=1 ∈ A(ε+δ)/4 we have
α α α α α α sεωi,m sεωi,m−1 . . . sεωi,1 (Ki ) . . . ⊆ sεωi,m sεωi,m−1 . . . sεωi,1 (Ki ) . . .
(3.9)
for all 1 i n. Let A = {(ε i )ni=1 | (εi )ni=1 ∈ A(ε+δ)/4 } ⊆ Aδ/2 . Then A is finite, with |A|
4 · max1in diam(Ki ) +1 ε−δ
n .
The finiteness of A will allow us to invoke Lemma 3.1 in the next step of our proof. To complete our demonstration that (3.8) holds for m = k + 1, we henceforth treat the cases α = 0 and α > 0 separately. If α = 0, then for δ ∈ (0, ε) we have, by the induction hypothesis, (3.9), Lemma 3.1(i) and Lemma 3.2, sεk+1
n
ai Ki ⊆ sε
i=1
n
(εi,1 ),...,(εi,k )∈A(ε+δ)/4 i=1
⊆ sε
n
w∗
ai sεi,k sεi,k−1 . . . sεi,1 (Ki ) . . .
ai sεi,k sεi,k−1 . . . sεi,1 (Ki ) . . .
(εi,1 ),...,(εi,k )∈A(ε+δ)/4 i=1
⊆
sε/2
n
ai sεi,k sεi,k−1 . . . sεi,1 (Ki ) . . .
i=1
(εi,1 ),...,(εi,k )∈A(ε+δ)/4
⊆
n
ai sεi,k+1 sεi,k . . . sεi,1 (Ki ) . . . ,
(εi,1 ),...,(εi,k ),(εi,k+1 )∈Aδ/2 i=1
as required. On the other hand, if α > 0 then it follows from the induction hypothesis, (3.9) and Lemma 3.1(iii) that ωα ·(k+1)
sε
n
ωα
ai Ki ⊆ sε
i=1
n
w∗
ai s
α α sεωi,k−1 . . . sεωi,1 (Ki ) . . .
α ai sεωi,k
ωα ωα sεi,k−1 . . . sεi,1 (Ki ) . . .
ωα εi,k
(εi,1 ),...,(εi,k )∈A(ε+δ)/4 i=1
α ⊆ sεω
n
(εi,1 ),...,(εi,k )∈A(ε+δ)/4 i=1
⊆
(εi,1 ),...,(εi,k )∈A(ε+δ)/4
⊆
α sεω
n
ωα ωα sεi,k−1 . . . sεi,1 (Ki ) . . .
i=1 n
(εi,1 ),...,(εi,k ),(εi,k+1 )∈Aδ/2 i=1
as we would like.
α ai sεωi,k
α α α ai sεωi,k+1 sεωi,k . . . sεωi,1 (Ki ) . . . ,
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2241
Finally, suppose that β is a nonzero ordinal (either limit or successor) such that (3.8) holds for all m < ω and α < β; we show that (3.8) then holds for m = 1 and α = β. Fix δ ∈ (0, ε) and let A be defined as above. Then, since A ⊆ Aδ/2 , to complete the induction it suffices to show that β sεω
n
n
ai Ki ⊆
i=1
β
ai sεωi (Ki ).
(3.10)
(ε i )∈A i=1
To prove (3.10), we shall establish the following two inclusions: ωβ
sε
n
ai Ki ⊆
i=1
n
ai sεωi ·l (Ki ) α
(3.11)
(l,α)∈(0,ω)×β (ε i )∈A i=1
and n
n
ai sεωi ·l (Ki ) ⊆ α
(l,α)∈(0,ω)×β (ε i )∈A i=1
β
ai sεωi (Ki ).
(3.12)
(ε i )∈A i=1
We first deal with (3.11). To this end, let x
β ∈ sεω
n
ai Ki =
i=1
Then, since
ε+δ 2
x∈
α sεω ·m
(m,α)∈(0,ω)×β
n
ai Ki .
i=1
< ε, it follows from the induction hypothesis and (3.9) that
n
α α α ai sεωi,m sεωi,m−1 . . . sεωi,1 (Ki ) . . .
(m,α)∈(0,ω)×β (εi,1 ),...,(εi,m )∈A(ε+δ)/4 i=1
⊆
n
α α α ai sεωi,m sεωi,m−1 . . . sεωi,1 (Ki ) . . . .
(m,α)∈(0,ω)×β (ε i,1 ),...,(εi,m )∈A i=1
So for each (m, α) ∈ (0, ω) × β there are (ε i,1,m,α )ni=1 , . . . , (ε i,m,m,α )ni=1 ∈ A such that x∈
n
α
α α ai sεωi,m,m,α sεωi,m−1,m,α . . . sεωi,1,m,α (Ki ) . . . .
(3.13)
i=1
Suppose l ∈ (0, ω) and α < β and set ml = |A| · l. Then there is a subset Jl,α ⊆ {1, 2, . . . , ml } with |Jl,α | = l and |{(ε i,j,ml ,α )ni=1 | j ∈ Jl,α }| = 1. Let (ε i,l,α )ni=1 denote the unique element of {(ε i,j,ml ,α )ni=1 | j ∈ Jl,α }(⊆ A). We may write Jl,α = {j1 < j2 < · · · < jl }, and then by (3.13) we have, in particular,
2242
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246 n
x∈
α
α α ai sεωi,m ,m ,α sεωi,m −1,m ,α . . . sεωi,1,m ,α (Ki ) . . . l
i=1
⊆
n
n
l
α α ai sεωi,j ,m ,α sεωi,j l
i=1
=
l
l
l
l
l−1 ,ml ,α
α . . . sεωi,j
1 ,ml ,α
(Ki ) . . .
·l ai sεωi,l,α (Ki ) α
i=1
⊆
n
ai sεωi ·l (Ki ). α
(ε i )∈A i=1
As l ∈ (0, ω) and α < β were arbitrary, (3.11) follows. We now prove (3.12). Let
y∈
n
ai sεωi ·l (Ki ), α
(l,α)∈(0,ω)×β (εi )∈A i=1
and for each l ∈ (0, ω) and α < β let (ε i,(l,α) )ni=1 ∈ A be such that y∈
n
·l ai sεωi,(l,α) (Ki ). α
i=1
For each (ε i )ni=1 ∈ A, let A (ε i )ni=1 = ωα · l 0 < l < ω, α < β, (ε i,(l,α) )ni=1 = (ε i )ni=1 . Since {ωα · l | 0 < l < ω, α < β} is cofinal in ωβ and {A[(ε i )ni=1 ] | (ε i )ni=1 ∈ A} is a finite partition of {ωα · l | 0 < l < ω, α < β}, there exists (ρ i )ni=1 ∈ A such that A[(ρ i )ni=1 ] is cofinal in ωβ . It follows that y∈
n
ξ ∈A[(ρ i )ni=1 ] i=1
ξ
ai sρ i (Ki ) ⊆
n ai i=1
=
ξ ∈A[(ρ i )ni=1 ]
ξ sρ i (Ki )
n ξ ai sρ i (Ki ) i=1
=
n
ξ <ωβ β
ai sρωi (Ki )
i=1
⊆
n (ε i )∈A i=1
At last, the proof of Lemma 3.3 is complete.
2
β
ai sεωi (Ki ).
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2243
Lemma 3.4. Let E1 , . . . , En be Banach spaces and K1 ⊆ E1∗ , . . . , Kn ⊆ En∗ nonempty w ∗ compact sets. Let 1 q < ∞, ε > 0 and let a1 , . . . , an 0 be real numbers such that q n that M m 2 i=1 ai 1. Let d = max{diam(Ki ) | 1 i n} and let m, M ∈ N be such and (2q − 1)ε q M 8q d q (m − 1). Let p be predual to q and consider ni=1 ai Ki as a ωα ·m (K ) = ∅ for all 1 i n, then subset of ( ni=1 Ei )∗p . If α is an ordinal such that sε/8 i α sεω ·M ( ni=1 ai Ki ) = ∅. α Proof. If ε q > ni=1 [ai ·diam(Ki )]q , then sεω ·M ( ni=1 ai Ki ) is empty since diam( ni=1 ai Ki ) < ε and ωα · M 1. The assertion of the lemma follows. So suppose now that ε q ni=1 [ai · diam(Ki )]q . Then Aε = ∅ whenever 0 < ε ε. Apply α ing Lemma 3.3 with δ = ε/2, we see that sεω ·M ( ni=1 ai Ki ) is contained in a union of sets of the form n
α α α ai sεωi,M sεωi,M−1 . . . sεωi,1 (Ki ) . . . ,
(3.14)
i=1
where (εi,1 )ni=1 , (εi,2 )ni=1 , . . . , (εi,M )ni=1 ∈ Aε/4 . For each such product (3.14), q a1
M
q ε1,j
q + a2
j =1
M
q ε2,j
j =1
q + · · · + an
M
q εn,j
j =1
Mε q . 4q
q q q q Since ni=1 ai 1, there is h ∈ {1, . . . , n} such that M j =1 εh,j Mε /4 . We claim that at least one of the following two conditions holds for such h: (a) There exists a subset {j1 < j2 < · · · < jm } ⊆ {1, 2, . . . , M} such that min{εh,j1 , . . . , εh,jm } ε/8. (b) There exists j M such that εh,j > d. Indeed, suppose that (a) does not hold. Then there are distinct j1 , . . . , jm−1 in {1, . . . , M} such that εh,j < ε/8 whenever j ∈ {1, . . . , M} \ {j1 , . . . , jm−1 }. It follows then that m−1 k=1
q εh,jk
q Mε q ε > q − (M − m + 1) 4 8
q
q q ε ε ε + (m − 1) =M − 4 8 8
q q ε ε >M − 4 8 d q (m − 1).
q
Thus εh,jk > d q for some k m − 1, hence εh,jk > d for some k m − 1. In particular, (b) holds whenever (a) does not.
2244
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246 α
α
α
If (b) holds, then the factor ah sεωh,M (sεωh,M−1 (. . . sεωh,1 (Kh ) . . .)) is empty since diam(Kh ) d < α α α εh,j for j satisfying (b). It follows then that the product ni=1 ai sεωi,M (sεωi,M−1 (. . . sεωi,1 (Ki ) . . .)) is empty also, giving the desired result. On the other hand, if (a) holds then
α α α α α sεωh,M sεωh,M−1 . . . sεωh,1 (Kh ) . . . ⊆ sεωh,jm sεωh,j
m−1
α . . . sεωh,j (Kh ) . . . 1
ωα ·m (Kh ). ⊆ sε/8
α We conclude that sεω ·M ( ni=1 ai Ki ) is contained in a union of direct products of the form (3.14), with each such direct product having a factor contained in a scalar multiple of one of ωα ·m (K ), 1 i n. From this it is clear that if s ωα ·m (K ) = ∅ for all 1 i n, then the sets sε/8 i i ε/8 α sεω ·M ( ni=1 ai Ki ) ⊆ ∅. 2 The next and final lemma required for our proof of Lemma 2.5 shows how we can put a set Bq (Ki | 1 i n) inside a finite union of direct products of w ∗ -compact sets in a way that will be useful for us. Lemma 3.5. Let E1 , . . . , En be Banach spaces, K1 ⊆ E1∗ , . . . , Kn ⊆ En∗ nonempty, absolutely convex, w ∗ -compact sets, 1 q < ∞ and l ∈ N. Let L = Nn ∩ (l + n1/q )Bnq . Then
Bq (Ki | 1 i n) ⊆
n ki
(ki )ni=1 ∈L i=1
l
Ki .
Proof. Let (ai )ni=1 ∈ Bnq and set ji = inf{j ∈ N | l|ai | < j }, 1 i n. Then ji − 1 l|ai | for all i, hence (ji )ni=1 nq (lai )ni=1 nq + n1/q l + n1/q . In particular, (ji )ni=1 ∈ L. As the sets Ki , 1 i n, are absolutely convex, we have ai Ki ⊆ jli Ki for all i, hence ni=1 ai Ki ⊆ n ji i=1 l Ki . It follows that Bq (Ki | 1 i n) =
n
ai Ki
(ai )∈Bn i=1 q
⊆
(ki )ni=1 ∈L
n ki i=1
l
Ki .
2
We note a few points of interest regarding the sets (ki )∈L ni=1 kli Ki from Lemma 3.5. For each l ∈ N, let Ll = Nn ∩ (l + n1/q )Bnq . Then the intersection of the collection { (ki )∈Ll ni=1 kli Ki }l∈N is precisely Bq (Ki | 1 i n); this follows from the observation that for l ∈ N, each point of (ki )∈Ll ni=1 kli Ki is no greater than n1/q · l −1 · max{diam(Ki ) | 1 i n} in norm distance from Bq (Ki | 1 i n). We may thus think of { (ki )∈Ll ni=1 kli Ki }l∈N as a sequence of increasingly closer approximations to the set Bq (Ki | 1 i n), and our need to closely approximate Bq (Ki | 1 i n) is reflected by our choice of l in the following proof of Lemma 2.5.
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
2245
Proof of Lemma 2.5. Fix δ ∈ (0, ε/16). Let l 16δn1/q (ε − 16δ)−1 be an integer and let L = Nn ∩ (l + n1/q )Bnq . By Lemma 3.5 and the hypothesis of Lemma 2.5, α sεω ·M
n ki (ki )∈L i=1
l
Ki ⊇ sεω
α ·M
Bq (Ki | 1 i n) ∅.
Thus, since L is finite, by Lemma 3.1(i) there exists (hi )ni=1 ∈ L such that ωα ·M sε/2
n hi i=1
l
Ki = ∅.
(3.15)
1/q
Let ρ = (1 + n l )−1 . By (3.15) and the homogeneity of the derivations sε (where γ is an ordinal and ε > 0), we have γ
ωα ·M sρε/2
n ρhi i=1
l
Ki
ωα ·M = ρsε/2
n hi i=1
l
Ki = ∅.
(3.16)
Thus, since ( ρhl i )ni=1 nq 1, it follows from (3.16) and Lemma 3.4 that there is i n such that ωα ·m (K ) = ∅. As ρε/16 δ, we conclude that s ωα ·m (K ) ⊇ s ωα ·m (K ) ∅. This completes sρε/16 i i i δ ρε/16 the proof. 2 Remark 3.6. Lemma 2.5 is similar to [2, Lemma 5.9]. Though many of the arguments and preliminary results used here in the proof of Lemma 2.5 have been employed similarly in the proof of [2, Lemma 5.9], neither of these technical lemmas are strong enough to be used in place of the other in the proofs of the respective theorems for which they have been developed. Acknowledgments The author thanks Dr. Rick Loy for his invaluable support and the anonymous referee for many helpful suggestions that have improved the presentation of the results. Part of the research presented here was completed during a visit of the author to the Département de Mathématiques at the Université de Franche-Comté, and the author thanks the department for their kind hospitality. The author is especially grateful to Prof. Gilles Lancien for many stimulating discussions during his stay. References [1] C. Bessaga, A. Pełczy´nski, Spaces of continuous functions, IV. On isomorphical classification of spaces of continuous functions, Studia Math. 19 (1960) 53–62. [2] P.A.H. Brooker, Asplund operators and the Szlenk index, J. Operator Theory, in press, a preprint is online at arXiv: 1003.5710v3 [math.FA]. [3] R. Deville, G. Godefroy, V. Zizler, Smoothness and Renormings in Banach Spaces, Pitman Monogr. Surv. Pure Appl. Math., vol. 64, Longman Scientific & Technical, Harlow, 1993. [4] R. Engelking, General Topology, second edition, Sigma Ser. Pure Math., vol. 6, Heldermann-Verlag, Berlin, 1989. [5] M. Fabian, P. Habala, P. Hájek, V. Montesinos Santalucía, J. Pelant, V. Zizler, Functional Analysis and InfiniteDimensional Geometry, CMS Books Math./Ouvrages Math. SMC, vol. 8, Springer-Verlag, New York, 2001.
2246
P.A.H. Brooker / Journal of Functional Analysis 260 (2011) 2222–2246
[6] J. Giles, Convex Analysis with Application in the Differentiation of Convex Functions, Res. Notes Math., vol. 58, Pitman (Advanced Publishing Program), Boston, MA, 1982. [7] P. Hájek, G. Lancien, Various slicing indices on Banach spaces, Mediterr. J. Math. 4 (2) (2007) 179–190. [8] P. Hájek, G. Lancien, V. Montesinos, Universality of Asplund spaces, Proc. Amer. Math. Soc. 135 (7) (2007) 2031– 2035 (electronic). [9] P. Hájek, V. Montesinos Santalucía, J. Vanderwerff, V. Zizler, Biorthogonal Systems in Banach Spaces, CMS Books Math./Ouvrages Math. SMC, vol. 26, Springer-Verlag, New York, 2008. [10] S. Heinrich, Closed operator ideals and interpolation, J. Funct. Anal. 35 (3) (1980) 397–411. [11] W.B. Johnson, H.P. Rosenthal, On ω∗ -basic sequences and their applications to the study of Banach spaces, Studia Math. 43 (1972) 77–92. [12] G. Lancien, Dentability indices and locally uniformly convex renormings, Rocky Mountain J. Math. 23 (2) (1993) 635–647. [13] G. Lancien, On the Szlenk index and the weak∗ -dentability index, Quart. J. Math. Oxford Ser. (2) 47 (185) (1996) 59–71. [14] G. Lancien, A survey on the Szlenk index and some of its applications, RACSAM Rev. R. Acad. Cienc. Exactas Fís. Nat. Ser. A Mat. 100 (1–2) (2006) 209–235. [15] E. Odell, Th. Schlumprecht, A. Zsák, Banach spaces of bounded Szlenk index, Studia Math. 183 (1) (2007) 63–97. [16] A. Pełczy´nski, Universal bases, Studia Math. 32 (1969) 247–268. [17] A. Pietsch, Operator Ideals, North-Holland Math. Library, vol. 20, North-Holland, Amsterdam, 1980. [18] O. Re˘ınov, RN-sets in Banach spaces, Funktsional. Anal. i Prilozhen. 12 (1) (1978) 80–81, 96. [19] H. Rosenthal, The Banach spaces C(K), in: Handbook of the Geometry of Banach Spaces, vol. 2, North-Holland, Amsterdam, 2003, pp. 1547–1602. [20] C. Samuel, Indice de Szlenk des C(K) (K espace topologique compact dénombrable), in: Seminar on the Geometry of Banach Spaces, vols. I, II, Paris, 1983, in: Publ. Math. Univ. Paris VII, vol. 18, Univ. Paris VII, Paris, 1984, pp. 81–91. [21] C. Stegall, The Radon–Nikodým property in conjugate Banach spaces, II, Trans. Amer. Math. Soc. 264 (2) (1981) 507–519. [22] W. Szlenk, The non-existence of a separable reflexive Banach space universal for all separable reflexive Banach spaces, Studia Math. 30 (1968) 53–61.
Journal of Functional Analysis 260 (2011) 2247–2282 www.elsevier.com/locate/jfa
A critical elliptic problem for polyharmonic operators ✩ Yuxin Ge a , Juncheng Wei b , Feng Zhou c,∗ a Département de Mathématiques, Université Paris Est Créteil Val de Marne, 61 avenue du Général de Gaulle,
94010 Créteil Cedex, France b Department of Mathematics, Chinese University of Hong Kong, Shatin, Hong Kong c Department of Mathematics, East China Normal University, Shanghai 200241, PR China
Received 13 April 2010; accepted 5 January 2011 Available online 22 January 2011 Communicated by H. Brezis
Abstract In this paper, we study the existence of solutions for a critical elliptic problem for polyharmonic operators. We prove the existence result in some general domain by minimizing on some infinite-dimensional Finsler manifold for some suitable perturbation of the critical nonlinearity when the dimension of domain is larger than critical one. For the critical dimensions, we prove also the existence of solutions in domains perforated with the small holes. Some unstable solutions are obtained at higher level sets by Coron’s topological method, provided that the minimizing solution does not exist. © 2011 Elsevier Inc. All rights reserved. Keywords: Polyharmonic operators; Critical and non-critical dimensions; Ground state solutions; Topological methods
1. Introduction Let K ∈ N and Ω ⊂ RN (N 2K + 1) be a smooth bounded domain in RN . We consider the semilinear polyharmonic problem with homogeneous Dirichlet boundary condition ✩ The first author is supported by ANR project ANR-08-BLAN-0335-01. The second author is partially supported by a research Grant from GRF of Hong Kong and a Focused Research Scheme of CUHK. The third author is supported in part by NSFC No. 10971067, the “basic research project of China”, No. 2006CB805902 and Shanghai project 09XD1401600. * Corresponding author. E-mail addresses: [email protected] (Y. Ge), [email protected] (J. Wei), [email protected] (F. Zhou).
0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2011.01.005
2248
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
(−)K u = |u|s−2 u + f (x, u) u = Du = · · · = D K−1 u = 0
in Ω, on ∂Ω
(1)
K where s := N 2N −2K denotes the critical Sobolev exponent for (−) and f (x, u) is a lower-order s−2 perturbation of |u| u (see the assumption (H2) below). Eq. (1) is of variational type: Solutions of (1) correspond to critical points of the energy functional 1 1 |u|s − F (x, u), (2) E(u) = u2K,2,Ω − 2 s Ω
Ω
defined on the Hilbert space H0K (Ω) = v ∈ H K (Ω) D i v = 0 on ∂Ω, ∀0 i < K which is endowed with the scalar product ⎧ ⎪ (−)M u (−)M v if K = 2M is even, ⎪ ⎪ ⎪ ⎨ Ω (u, v)Ω = ⎪ ⎪ ⎪ ∇(−)M u ∇(−)M v if K = 2M + 1 is odd ⎪ ⎩
(3)
Ω
and · K,2,Ω is the corresponding norm, F (x, u) := We assume that
u 0
f (x, t) dt is the primitive of f .
(H1) f (x, u) : Ω × R → R is continuous and supx∈Ω, |u|M |f (x, u)| < ∞ for every M > 0; (H2) f (x, u) = a(x)u + g(x, u) with a(x) ∈ L∞ (Ω) ∩ C ∞ (Ω), g(x, u) = o(u) as u → 0 uniformly in x and g(x, u) = o(|u|s−1 ) as u → ∞ uniformly in x. From (H1) to (H2), it follows f (x, 0) = 0 and that f is a lower-order perturbation of |u|s−2 u at infinite in the sense that limu→∞ f|u|(x,u) s−1 = 0 uniformly in x ∈ Ω. Moreover, we assume that f (x, u) satisfies: (H3) (H4) (H5)
∂f ∂u (x, u) is continuous on Ω × R; s−2 ), ∀u ∈ R uniformly in x ∈ Ω; | ∂f ∂u (x, u)| C(1 + |u| f (x,u) f1 (x, u) := u is non-decreasing in u > 0 and non-increasing
in u < 0 for a.e. x ∈ Ω.
For K = 1, f (x, u) = λu and λ ∈ (0, λ1 ) where λ1 is the first eigenvalue of − for Dirichlet boundary condition, the problem has a strong background from some variational problems in geometry and physics, such as the Yamabe’s problem with lack of compactness. This was considered by Brezis and Nirenberg for positive solutions in their pioneer work in [3]. Then it has been studied extensively in the last three decades. We recall briefly some results about the existence and multiplicity of sign-changing solutions to the problem (1) for K = 1 and f (x, u) = λu. For any fixed λ > 0, the first multiplicity result was due to Cerami, Fortunato and Struwe [5]. They obtained the number of the solutions of (1) is bounded below by the number of the eigenvalues of − lying in the open interval (λ, λ + S|Ω|−2/N ), where S is the best constant for
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2249
∗
the Sobolev embedding D 1,2 (RN ) → L2 (RN ) (see the definition below) and |Ω| denotes the Lebesgue measure of Ω. Capozzi, Fortunato and Palmieri in [4] established the existence of a nontrivial solution for λ > 0 which is not an eigenvalue of − when N 4 and for any λ > 0 when N 5 (see also [43]). In [8], Devillanova and Solimini proved that, if N 7, then (1) has infinitely many solutions for every λ > 0. They proved also in [9] that, if N 4 and λ ∈ (0, λ1 ), then there exist at least N2 + 1 pairs of nontrivial solutions. Clapp and Weth [6] have extended this last result to all λ > 0 with N 4. In the same paper they also obtained some extensions to critical biharmonic problems for N 8. When the domain Ω is a ball and N 4, Fortunato and Jannelli [12] proved there are infinitely many sign-changing solutions which are built using the symmetry of the domain Ω. Schechter and Zou in [35] showed the same result for any domain Ω when N 7. In particular, if λ λ1 , it has and only has infinitely many sign-changing solutions except zero. Their work is based on the estimates of Morse indices of nodal solutions. Concerning the polyharmonic case, Pucci and Serrin in [32] have studied the problem (1) for K = 2 and λ > 0 when Ω is a ball. They proved that it admits nontrivial radial symmetric solutions for all λ ∈ (0, λ1 ) if and only if N 8. If N = 5, 6, 7, then there exists λ∗ ∈ (0, λ1 ) such that the problem admits no nontrivial radial symmetric solutions whenever λ ∈ (0, λ∗ ]. Here λ1 is understood as the first eigenvalue of 2 for Dirichlet boundary conditions. This is the counterpart of the well-known result of [3] on the nonexistence for radial symmetric solutions for small λ in dimension N = 3 and K = 1 (where λ∗ = λ1 /4). They called these dimensions as critical dimensions. They conjectured that for general K 1, the critical dimensions are 2K + 1, . . . , 4K − 1. The conjecture is not completely solved for all K 1. Grunau [22] defined later the notion of weakly critical dimensions as the space dimensions for which a necessary condition for the existence of a positive radial solution of (1) in B1 is λ ∈ (λ∗ , λ1 ) for some λ∗ > 0. He proved that the conjecture is true in the weak sense. Gazzola, Grunau and Squassina [16] proved nonexistence of positive radial symmetric solutions for Navier boundary condition for small λ > 0. They established also some existence results for λ = 0. Their result strongly depends on the geometry of domains. For biharmonic operators, Bartsch, Weth and Willem in [1] and Ebobisse and Ahmedou in [10] have studied the problem (1) on domains with nontrivial topology under Dirichlet boundary condition and Navier boundary condition respectively. For related problems, we infer to [2,11,13,15,20,21,29] and the references therein. For general case K 1, Ge has studied in [19] the same type of Eq. (1) for Navier boundary condition when f (x, u) = λu with 0 λ < λ1 and λ1 the first eigenvalues of (−)K . He established the existence of positive solutions in some general domain under the suitable assumptions. In particular unstable solutions in higher level set are obtained by Coron’s topological method in domains perforated with the small holes. The purpose of this paper is to continue the study of the semilinear polyharmonic problem (1) to general K 1 with Dirichlet boundary condition for general domains. Let us denote the polyharmonic operator L := (−)K − a(x) and λ1 (Ω) λ2 (Ω) · · · λn (Ω) · · · the eigenvalues of L under the homogeneous Dirichlet boundary condition. It is well known that each eigenvalue λk (Ω), k 1, can be described as the minimax value
vLv λk (Ω) = min max Ω 2 . V ⊂H0K (Ω), dim V =k v∈V Ωv
2250
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
It follows that λk (Ω) is a non-increasing functional on the domains, that is, if Ω2 ⊂ Ω1 , then λk (Ω2 ) λk (Ω1 ). Moreover, from the unique continuation principle, we have λk (Ω2 ) > λk (Ω1 ) for any k 1, provided Ω1 is connected (see [24,31]). For the perforated domain Ω := Ω1 \ Ω2 with the smooth bounded domains Ω2 ⊂ Ω1 , with the help of the above description, we have lim λk (Ω1 \ Ω2 ) = λk (Ω1 ), where the limit is taken as the diameter of Ω2 goes to 0. To this aim, it suffices to consider Ω2 = B(x, ) balls with small radius > 0 in the sequel. Assume now λn (Ω) 0 and λn+1 (Ω) > 0 for some n 1. Under our assumptions, the energy functional E is not bounded from below. Thus, we could not use directly the minimization procedure. We split the tangent bundle into two parts: at any tangent space, Tu H0K = T1 ⊕ T2 , where T1 is a finite vector space and T2 is infinite one. The second differential d 2 E is non-positive on T1 and is definite positive on T2 . First, we solve the equation dE(u)|T1 = 0, which leads to consider an infinite-dimensional Finsler manifold. Then, we study the energy functional E on such manifold in order to solve dE(u)|T2 = 0. In such way, we get a solution of the initial problem. Compared to the classic Lyapunov reduction method, we follow the similar strategy, but inverse the procedure. More precisely, let ei (x) be an eigenfunction associated to λk (Ω) with ei K,2,Ω = 1 for any 1 i n. Define M := v ∈ H0K (Ω) \ {0} dE(v)(w) = 0, ∀w ∈ Span(v, e1 , . . . , en ) . We prove in Section 2 that under the hypothesis (H1) to (H5), M is then a complete C 1 Finsler manifold and it will be a C 1,1 Finsler manifold with additional assumptions (H6) to (H7) (see Section 2). This permits to consider the following minimization problem κ := inf E(v). v∈M
We prove then κ
N K 2K N (SK (Ω))
for any f satisfying (H1) to (H5), where we denote
SK (Ω) :=
inf
v∈H0K (Ω)\{0}
v2K,2,Ω v2Ls (Ω)
the best constant for the embedding H0K (Ω) → Ls (Ω). Here, as for K = 1, it is well known that SK (Ω) is independent of Ω and SK (Ω) = SK (RN ) := infv∈H K (RN )\{0}
v2
K,2,RN
v2 s
(see also [15,
L (RN )
18,37,40,41]). Therefore we denote it by SK in the sequel. Our first result concerns the nonN 2K critical dimension case, i.e., we prove that if we have the strict inequality κ < K N (SK (Ω)) , then the infimum for κ is achieved by some u ∈ M which is a solution of (1). Such √ situation is realized for example by either N 4K and λn (Ω) < 0, λn+1 (Ω) > 0 or N > 2( 2 + 1)K and λn (Ω) 0, λn+1 (Ω) > 0, see Proposition 2 below. Notice that this existence result in Proposition 2 is similar to the main result of [13] of Gazzola (see also [14]). The method we used is a reduction type method which is different from the method used by Gazzola. This reduction method can be seen as an alternative approach to the linking method (see [36]). The manifold M
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2251
we defined here is a generalization of the Nehari manifold [28], which is equivalent to the manifold defined in [30,33,38,39]. They employed a similar variational approach-reduction method, for existence of solutions to the stationary Schödinger equation and some semilinear elliptic equations. We have even an improvement √ under some suitable conditions on the eigenfunctions when the dimension is less than 2( 2 + 1)K. This is stated in Proposition 3 and in Corollary 1. In particular, when K = 1 and N = 4, if λ > λ1 , with λ1 is a simple eigenvalue, there are ground state solutions for (1). The existence result in such cases is not new and is proved by Clapp and Weth in [6] even under some weaker assumptions on the eigenvalues. However, the new part is that the solutions we obtained here are ground state solutions. For the critical dimension 2K < N < 4K, the existence of solutions to (1) is a delicate issue. To our knowledge, there are few results on it, even for the case K = 1. The reason is that the minimizing method fails, for example, for K = 1, when Ω ⊂ R3 is a ball and when f (x, u) = λu with 0 < λ < λ41 . It is well known that there are no positive solutions. In Section 3, we study the existence of solutions for some perforated domains in such critical dimensions. We analyze the concentration phenomenon when the minimizing solutions do not exist. Then following Coron’s strategy of topological argument [7], we obtain the existence of unstable critical points in higher level sets for domains perforated with small holes. The approach of combining the variational method and Coron’s topological strategy is new for the existence of nontrivial solutions in the indefinite case. In all this paper, C, C and c denote generic positive constants independent of u, even their value could be changed from one line to another one. We give also some notations here. The N ∞ ∞ N space DK,2 (RN ) (resp. DK,2 (RN + )) is the completion of C0 (R ) (resp. C0 (R+ )) for the norm · K,2,RN (resp. · K,2,RN ). +
2. Study of the energy functional E on M We begin this section by studying some properties of the set M. Observe that v ∈ M is equivalent to say v = 0 and satisfying l0 (v) := v2K,2,Ω − vsLs (Ω) − f (x, v)v = 0, Ω
li (v) := (v, ei )Ω −
|v|s−2 vei − Ω
f (x, v)ei = 0,
∀1 i n.
(4)
Ω
Let us denote V0 := Span(e1 , . . . , en ) the n-dimensional vector space spanned by e1 , . . . , en . We prove now the following proposition. Proposition 1. Suppose (H1) to (H5) are satisfied. Then M is a complete C 1 Finsler manifold. Furthermore, suppose that (H6) (H7)
∂2f (x, u) is continuous on Ω × R and u → |u|s−2 u is C 2 on ∂u2 ∂2 s−3 , ∀u ∈ R uniformly in x ∈ Ω. | ∂u 2 f (x, u)| C(|u| + 1)
Then M is a complete C 1,1 Finsler manifold.
R;
2252
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
Proof. The proof is divided into several steps. Step 1. M is not empty. / V0 and By the assumptions (H1)–(H2), E is a continuous functional on H0K (Ω). Fixing v ∈ let V := Span(v, e1 , . . . , en ). Clearly, for all w ∈ V , we have 1 1 1 2 2 a(x)w − |w|s , (5) E(w) wK,2,Ω − 2 2 s Ω
Ω
0 and F (x, u) 12 a(x)u2 for all u ∈ R \ {0} since it follows from (H2) and (H5) that g(x,u) u and for a.e. x ∈ Ω. As V is a finite-dimensional vector space, all the norms on it are equivalent. In particular, the norms · K,2,Ω and · Ls (Ω) are equivalent on V . This implies lim
w∈V , w→∞
E(w) = −∞.
(6)
On the other hand, again from (H2), we infer for any given ε > 0, there exists C > 0 such that for all u ∈ R and for a.e. x ∈ Ω g(x, u) ε|u| + C|u|s−1 ,
F (x, u)
so that for all w ∈ V 1 1 E(w) w2K,2,Ω − 2 2
1 C a(x) + ε u2 + |u|s , 2 s
1+C a(x) + ε w 2 − s
Ω
(7)
|w|s . Ω
Since v ∈ / V0 , we can choose v ∈ V ∩ (V0 )⊥ such that 12 v 2K,2,Ω − 12 taking a sufficiently small ε > 0, we have 2 2 1 1 v 2 a(x) + ε v ε v K,2,Ω . − K,2,Ω 2 2
Ω
a(x)(v )2 > 0. By
(8)
Ω
As a consequence, we obtain sup E(w) > 0.
(9)
w∈V
Together with (6), there exists v˜ ∈ V such that E(v) ˜ = maxw∈V E(w) since V is a finitedimensional vector space. Clearly, v˜ ∈ M. Step 2. M is closed. We define the map L : H0K (Ω) → Rn+1 , v → l0 (v), . . . , ln (v) .
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2253
In view of the assumptions (H1)–(H2), L is continuous on H0K (Ω). Let (vk ) ⊂ M be a sequence in M such that vk → v in H0K (Ω). Then we get L(v) = 0. Now it suffices to show v = 0. First, we note vk ∈ / V0 for all k ∈ N. Indeed, we have vk 2K,2,Ω
−
a(x)vk2
= vk sLs (Ω)
Ω
+
g(x, vk )vk .
(10)
Ω
If we have vk ∈ V0 for some k 1, the term on the left-hand is non-positive. But that one on the right-hand is non-negative. Thus, vk sLs (Ω) = 0 and the desired contradiction vk = 0 gives the result. Now, we claim there exists some positive number c > 0 such that vk K,2,Ω > c. We denote the orthogonal projection of vk on V0 by
vk :=
n (vk , ei )Ω ei i=1
and vk⊥ its orthogonal complementary
vk⊥ := vk − vk . As vk ∈ M, we obtain vk , vk Ω −
a(x)vk vk
Ω
g(x, vk ) s−2 |vk | vk vk . = + vk Ω
Together with (10), we have
⊥ 2 v k
K,2,Ω
−
2 ⊥ 2 2 a(x) vk − vk − a(x) vk
Ω
|vk |s−2 +
= Ω
Ω
g(x, vk ) ⊥ 2 2 vk − vk vk
which implies ⊥ 2 v k K,2,Ω −
2 a(x) vk⊥
Ω
g(x, vk ) ⊥ 2 s−2 |vk | vk , + vk
Ω
since 2 v
k K,2,Ω
− Ω
Gathering (5), (8) and (11), we get
2 a(x) vk 0.
(11)
2254
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2 2ε v ⊥ k
K,2,Ω
2 v ⊥ −
2 a(x) + ε vk⊥ (1 + C)
k
Ω
⊥ 2 (1 + C)vk s−2 Ls (Ω) vk Ls (Ω)
2 |vk |s−2 vk⊥
Ω
⊥ 2 C (1 + C)vk s−2 Ls (Ω) vk K,2,Ω .
Finally, vk Ls (Ω) c > 0 and the desired claim follows. Step 3. dL(v) is surjective and its kernel splits for all v ∈ M. By (H3) and (H4), f (x, u)u and f (x, u) are C 1 on Ω × R and ∂(f (x, u)u) C 1 + |u|s−1 , (x, u) ∂u
uniformly in x ∈ Ω and ∀u ∈ R.
(12)
Therefore, L is C 1 on H0K (Ω) provided the assumptions (H1)–(H4) hold. A direct calculation leads to
dl0 (v)(w) = 2(v, w)Ω − s
f (x, v) + v
|v|s−2 vw − Ω
Ω
dli (v)(w) = (w, ei )Ω − (s − 1)
|v|s−2 wei − Ω
∂f (x, v) w, ∂v
∂f (x, v) wei , ∂v
∀1 i n.
(13)
Ω
We claim dL(v)|V , the restriction on V of dL(v), is a bijective endomorphism from V on Rn+1 . As V and Rn+1 have the same dimension, it suffices to prove Ker(dL(v)|V ) = {0}. Let w ∈ Ker(dL(v)|V ) and write w = μv + ni=1 μi ei where μ, μi ∈ R for each i. Combining (4) and (13), we get
dl0 (v)(w) = −(s − 2) Ω
dli (v)(w) = −
−f (x, v) + v
|v|s−2 vw −
∂f (x, v) w = 0, ∂v
Ω
n f (x, v) ∂f (x, v) − + μvei − (s − 2) |v|s−2 μvei + μ j ej , ei v ∂v
Ω
j =1
Ω
− (s − 1)
|v|s−2 ei Ω
n
μj ej −
j =1
Ω
∂f (x, v) ei μj ej = 0, ∂v n
j =1
for all 1 i n. On the other hand, we have μdl0 (v)(w) +
n i=1
Together with (14), we infer
Ω
μi dli (v)(w) = 0.
(14)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
(s − 2)
|v| Ω
+
s−2
w +
|v|
2
s−2
n g(x, v) μj ej v
Ω
2
2 −
j =1
Ω
n
μj ej ,
j =1
n
μj ej ,
j =1
n
n
∂f (x,v) ∂v
− Ω
+ Ω
0,
a(x)
μi ei
μi ei
i=1
i=1
+ We know from (H2) and (H5) that − f (x,v) v
f (x, v) ∂f (x, v) − + w2 v ∂v
+
μj ej
j =1
Ω
n
2255
2 μj ej
= 0.
j =1
Ω
g(x,v) v n
a(x)
n
0 and 2 0.
μj ej
j =1
Ω
Finally, we deduce vw(x) = 0,
v
n
μj ej (x) = 0 for a.e. x ∈ Ω
(15)
j =1
and
n
μj ej ,
j =1
n
−
μi ei
i=1
Ω
a(x)
n
2 μj ej
= 0.
(16)
j =1
Ω
Thus we have μv 2 = vw − v
n
μj ej = 0
j =1
which yields μ = 0. Moreover, it follows from (16) that Lw = 0. By the unique continuation principle, we have either w ≡ 0 or w(x) = 0 for a.e. x ∈ Ω. Indeed, we state first w is regular. All the derivatives of w vanish a.e. on the set {x ∈ Ω; w(x) = 0} provided this set is not a negligible measurable set. Thus, w vanishes of infinite order at such points. By the strong unique continuation principle [24], w vanishes. Going back to (15), we have w ≡ 0 and the desired claim follows. As a consequence, for all v ∈ M, dL(v) is surjective and H0K (Ω) = ker(dL(v)) ⊕ V . M is thus a complete C 1 Finsler manifold (see [23]). Furthermore, M is a complete C 1,1 Finsler manifold provided (H6) and (H7) are satisfied. 2 For any v ∈ H0K (Ω) \ V0 , we denote by V
+
:= tv +
n
μi ei for all t > 0, μi ∈ R ,
i=1
the (n + 1)-dimensional half space spanned by v and {ei } for all 1 i n. We have the following
2256
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
Lemma 1. Under the assumptions (H1) to (H5), then there exists a unique v0 ∈ M such that M ∩ V + = {v0 }.
(17)
E(v0 ) = max E(w).
(18)
Moreover we have w∈V +
Proof. Given v ∈ H0K (Ω) \ V0 , we define for any t > 0 the n-dimensional affine vector space Vt := tv + V0 . We divide the proof into several steps. Step 1. For any t > 0 there exists a unique v(t) ∈ Vt such that E(v(t)) = maxVt E. Moreover, {v(t), t > 0} is a C 1 curve in V + . From (H1) to (H4), it is known that E is C 2 on V + . Thanks to (6), we have lim
w∈Vt , w→∞
E(w) = −∞.
Thus there exists some v(t) ∈ Vt such that E(v(t)) = maxw∈Vt E(w). A direct calculation leads to ∂g(x, v) 2 2 2 s−2 (s − 1)|v| w2 . + d E(v)(w, w) = wK,2,Ω − a(x)w − ∂v Ω
Ω
By (H5), we infer g(x, v) 0 v
and
∂g(x, v) g(x, v) 0. ∂v v
Hence, d 2 E(v) < 0 on Vt , that is, the functional E is strictly concave on Vt . This yields the uniqueness. We note {v(t), t > 0} = {w ∈ V + | dE(w)|V0 = 0}. As the second variation d 2 E of E is negative define on V0 , it follows from the Implicit Function Theorem that {v(t), t > 0} is a C 1 curve in V + which finishes the proof of Step 1. Step 2. For all w ∈ M ∩ V + , the restriction of E on V + has a strictly local maximum at w. nRecall V := Span(v, e1 , . . . , en ). Let v = 0 satisfying dE(v)|V = 0 and w = μv + i=1 μi ei ∈ V . As in the proof of Proposition 1, we have by (H2), d E(v)(w, w) = −(s − 2)
s−2
Ω
|v|
2
w −
|v|
2
s−2
Ω
n j =1
2 μj ej
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2257
2 n f (x, v) ∂f (x, v) g(x, v) 2 − + w − − μj ej v ∂v v Ω
+
n
μj ej ,
j =1
n
Ω
−
μi ei
i=1
j =1
Ω
a(x) Ω
n
2 μj ej
j =1
which implies from (H1) to (H5) d 2 E(v)(w, w) < 0 provided w = 0. Therefore, the desired claim follows. Step 3. There exists a unique t0 > 0 such that v(t0 ) ∈ M. Moreover, dE(v(t))(v(t)) > 0 for any 0 < t < t0 and dE(v(t))(v(t)) < 0 for any t > t0 . With the same arguments as in the proof of Proposition 1, we have sup E(w) > 0.
(19)
w∈V +
On the other hand, it follows from (5) that ∀w ∈ V0 E(w) 0.
(20)
In particular, we obtain sup E(w) = sup E(w) = sup E v(t) ,
w∈V +
w∈V +
t>0
where V + is the closure of V + . Combining (6), (19) and (20) and using the continuity of E on V + , there exists some v0 ∈ M ∩ V + such that E(v0 ) = sup E(w). w∈V +
We know M ∩ V + ⊂ w ∈ V + dE(w)|V0 = 0 = v(t) t > 0
(21)
so that there exists t0 > 0 such that v(t0 ) = v0 . Set α(t) := E(v(t)) then α (t) = dE(v(t))(v (t)) = l0 (v(t)) since v (t) − v ∈ V0 and dE(v(t))|V0 = 0. We claim M ∩ V + = {v(t) | α (t) = 0}. t Obviously, M ∩ V + ⊂ {v(t) | α (t) = 0}. Conversely, for any v(t) with α (t) = 0, by the method of Lagrange multipliers, there exist μ1 , . . . , μn ∈ R such that dE(v(t))|V + n i=1 μi dli (v(t))|V = 0. Hence, we have on V0 , n i=1
μi d 2 E v(t) (·, ei ) = 0.
2258
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
By virtue of the fact d 2 E(v)|V0 < 0 for all v ∈ Vt , we infer μ1 = · · · = μn = 0 which proves the claim. Applying (6), we infer lim α(t) = −∞,
t→+∞
since inf wK,2,Ω = +∞.
lim
t→+∞ w∈Vt
It follows from Step 2 that there exists only strictly local maximum points for α(t). Hence, t0 is the only critical point of α(t). Moreover, α (t) > 0 for any 0 < t < t0 and α (t) < 0 for any t > t0 . The lemma is proved. 2 Now let us consider the minimization problem κ := inf E(v).
(22)
v∈M
We have then Lemma 2. Under assumptions (H1) to (H5), there holds κ
N K (SK ) 2K . N
(23)
Proof. Let B(x0 , R) ⊂ Ω for some x0 ∈ Ω and R > 0. We consider for some small number ν > 0 and for all ∈ (0, ν), the function u (x) := CN,K
( 2
(N −2K)/2 , + |x − x0 |2 )(N −2K)/2
where the constant CN,K independent of is chosen such that u sLs (RN ) = u 2K,2,RN = N
(SK ) 2K . Let ξ ∈ C0∞ (B(x0 , R)) be a fixed cut-off function satisfying 0 ξ 1 and ξ ≡ 1 on B(x0 , R/2). Putting w := ξ u ∈ C0∞ (Ω) as in [3] and [21], we obtain as → 0 N N and w 2K,2,Ω = (SK ) 2K + O N −2K . w sLs = (SK ) 2K + O N
(24)
It is clear that as → 0, we have w 0
weakly in H0K (Ω),
w 0 weakly in Ls (Ω), strongly in Lq (Ω) (∀q < s) and a.e. in Ω. Therefore, there holds f (x, w ) → 0
s
strongly in L s−1 (Ω).
(25)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2259
Indeed, for any M > 0, let fM (x, u) :=
if |u| M, if |u| > M.
f (x, u), 0,
From (H1) to (H2), it follows that ∀δ > 0, there exists M > 0 such that fM (x, u) − f (x, u) δ|u|s−1
for a.e. x ∈ Ω and ∀u ∈ R.
Therefore, we have f (x, w )
s
L s−1
s + fM (x, w ) s f (x, w ) − fM (x, w ) s−1 L L s−1 s . δw s−1 Ls + fM (x, w ) s−1
(26)
L
Using Lesbegue’s theorem, we infer that ∀β > 0 fM (x, w )
Lβ
→ 0.
Letting → 0 in (26), we obtain lim supf (x, w )
s
L s−1
→0
2δC.
Thus (25) is proved. Similarly, we have F (x, w ) = 0.
lim
→0 Ω
Set e0 = w . Clearly, e0 , e1 , . . . , en are linearly independent. Denote V the (n + 1)-dimensional vector space spanned by e0 , . . . , en and let w˜ ∈ V ∩ M. We claim lim w − w˜ K,2,Ω = 0.
→0
For this purpose, fix some small number r > 0. For all (γ¯0 , . . . , γ¯n ) ∈ Rn+1 with with the same arguments as above, we have the following expansions:
F x, w +
Ω
n i=0
γ¯i ei =
F x,
Ω
n
n
2 i=0 γ¯i
γ¯i ei + o(1),
i=1
2 2 n n γ¯i ei = (1 + γ¯0 )2 w 2K,2,Ω + γ¯i ei + o(1), w + i=0 i=1 K,2,Ω K,2,Ω s s n n s s γ¯i ei = |1 + γ¯0 | |w | + γ¯i ei + o(1) w + Ω
i=0
Ω
Ω
i=1
= r2,
2260
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
where o(1) tends to 0 uniformly with respect to (γ¯0 , . . . , γ¯n ). As a consequence, we infer E w +
n
1 1 γ¯i ei (1 + γ¯0 )2 w 2K,2,Ω − |1 + γ¯0 |s w sLs (Ω) 2 s i=0 n s n 1 2 1 + γ¯i λi (Ω) − γ¯i ei + o(1), s 2 s i=1
i=1
(27)
L (Ω)
since F (x, u) 12 a(x)u2 for a.e. x ∈ Ω. Gathering (24) and (27), we deduce E w +
n
γ¯i ei < E(w )
(28)
i=0
provided is sufficiently small. On the other hand, E(w˜ ) = supv∈V E(v). Hence, we have w˜ − w = ni=0 γi ei with Γ = (γ0 , . . . , γn ) ∈ Rn+1 satisfying |Γ |2 = ni=0 γi2 < r 2 , that is, the claim is proved. Now, applying (24) and (27), we infer lim E(w˜ ) = lim E(w ) =
→0
This yields the desired result.
→0
N K (SK ) 2K . N
2
Now we state our main result of this section. Theorem 1. Suppose (H1) to (H5) and κ<
N K (SK ) 2K N
(29)
are satisfied. Then there exists u ∈ M such that E(u) = κ and u is a solution to (1). Proof. The strategy of the proof is standard. Let (uk ) ⊂ M be a minimizing sequence for E. We prove first that (uk ) is bounded and then we can extract a subsequence, if necessary, which converges to some limit u. We prove then u = 0, u ∈ M and u is a minimizer for κ. Step 1. (uk ) is a bounded sequence in H0K (Ω). Recall that (uk ) satisfies (4) and 1 1 uk 2K,2,Ω − uk sLs (Ω) − 2 s
F (x, uk ) = κ + o(1)
(30)
Ω
so that K uk sLs (Ω) + N
Ω
f (x, uk )uk − F (x, uk ) = κ + o(1). 2
(31)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2261
From (H5), for a.e. x ∈ Ω and ∀u ∈ R, we have 1 F (x, u) f (x, u)u, 2 which in turn (31) implies uk sLs (Ω)
N κ + o(1). K
(32)
We infer from (H2) that for a.e. x ∈ Ω and ∀u ∈ R, we have also 1 2|u|s F (x, u) a(x)u2 + + C, 2 s
(33)
thus
2 1 F (x, uk ) uk sLs (Ω) + s 2
Ω
a(x)u2k + C. Ω
Together with (30) and (32), uk 2K,2,Ω
2 = uk sLs (Ω) + 2 s C
F (x, uk ) + 2κ + o(1) Ω
uk sLs (Ω)
+ uk 2Ls (Ω) + C + 2κ + o(1) C.
Hence Step 1 is proved. Extracting a subsequence, there exists some u ∈ H0K (Ω) such that uk u weakly in H0K (Ω), uk u
weakly in Ls (Ω), strongly in Lq (Ω) (∀q < s) and a.e. on Ω,
so that li (u) = 0,
∀1 i n.
(34)
Setting vk = uk − u, we have uk 2K,2,Ω = vk 2K,2,Ω + u2K,2,Ω + o(1), uk sLs (Ω) = usLs (Ω) + vk sLs (Ω) + o(1).
(35)
Step 2. We have u = 0. Suppose by contradiction that u = 0. As in the proof of Lemma 2, we have s
f (x, uk ) → 0 in L s−1 (Ω)
and F (x, uk ) → 0 in L1 (Ω).
(36)
2262
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
Combining (4), (30) and (36), we deduce uk sLs (Ω) =
N κ + o(1), K
uk 2K,2,Ω =
N κ + o(1) K
which yields uk 2K,2,Ω uk 2Ls (Ω)
=
N κ K
s−2 s
+ o(1) < SK
for sufficiently large k.
This contradiction gives u = 0. Consequently, we have u ∈ / V0 because of (34). Step 3. We have u ∈ M and E(u) = κ. We need to prove l0 (u) = 0 to conclude that u ∈ M and E(u) = κ. So we should exclude two cases: (i) l0 (u) < 0 and (ii) l0 (u) > 0. First we suppose that the case (i) occurs. In this case there exists t ∈ (0, 1) such that u(t) ∈ M because of Step 3 of Lemma 1. Set vk := uk − u as before and u˜ k := tuk + u(t) − tu = tvk + u(t). We define for all w ∈ H0K (Ω), 1 1 E∞ (w) := w2K,2,Ω − 2 s
|w|s . Ω
As vk 0 weakly in H0K (Ω), we obtain E(u˜ k ) = E∞ (tvk ) + E u(t) + o(1). Suppose E(u(t)) > κ, otherwise E(u(t)) = κ and then we finish the proof. By Lemma 1 and the fact u˜ k − tuk ∈ V0 , we have E(u˜ k ) E(uk ) = κ + o(1) which implies E∞ (tvk ) < 0 for sufficiently large k. In particular, vk = 0. Consequently, for sufficiently large k, s s tvk sLs (Ω) > tvk 2K,2,Ω SK tvk 2Ls (Ω) > SK tvk 2Ls (Ω) 2 2
(37)
so that N
vk sLs (Ω) > (SK ) 2K .
(38)
On the other hand, we have vk sLs (Ω) = uk sLs (Ω) − usLs (Ω) + o(1)
N κ − usLs (Ω) + o(1), K
which contradicts (38) by using Lemma 2. Thus case (i) is impossible.
(39)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
Now we treat the case (ii). By the same arguments in Step 2, we have f (x, uk )uk = f (x, u)u + o(1) and F (x, uk ) = F (x, u) + o(1). Ω
Ω
Ω
2263
(40)
Ω
Thus, according to (31) and (40), we have 1 N N s vk Ls (Ω) = κ + F (x, u) − f (x, u)u − usLs (Ω) + o(1). K K 2
(41)
Ω
Similarly, we have vk 2K,2,Ω
N N = κ+ K K
N F (x, u) + 1 − f (x, u)u − u2K,2,Ω + o(1). 2K
Ω
(42)
Ω
Combining (40) and (42), we see that l0 (u) > 0 implies for sufficiently large k vk sLs (Ω) > vk 2K,2,Ω . N
Consequently, by the definition of SK , we obtain vk sLs (Ω) > (SK ) 2K for sufficiently large k. This is (38) and as before, we conclude that (ii) does not occur and thus u ∈ M. Moreover E(uk ) = E(u) + E∞ (vk ) + o(1) and vk sLs (Ω) = vk 2K,2,Ω + o(1). Thus E(u) = E(uk ) −
K vk 2K,2,Ω + o(1). N
Finally, we deduce vk 2K,2,Ω = o(1) and therefore E(u) = κ. Step 4. u is a solution to (1). In fact u is a critical point of E on M. By the method of Lagrange multipliers, there exists μ, μ1 , . . . , μn ∈ R such that dE(u) + μdl0 (u) +
n
μi dli (u) = 0.
i=1
We consider its restriction on V , this means μdl0 (u) +
n i=1
μi dli (u) = 0 V
since dE(u)|V = 0. On the other hand, we have seen from Proposition 1 that dL(u)|V is an isomorphism from V on Rn+1 . Consequently, μ = μ1 = · · · = μn = 0, that is, dE(u) = 0. Finally, u solves the problem (1) which finishes the proof. 2
2264
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
The following propositions concern the linear perturbation problem for the non-critical dimensions case where the assumption (29) is justified. Some similar existence results under various assumptions have been obtained by other approaches for example for the polyharmonic operators in [13] and for harmonic and biharmonic operators in [6]. Proposition 2. We suppose f (x, u) = μu for some √ μ > 0. Then (29) holds provided either N 4K and λn (Ω) < 0, λn+1 (Ω) > 0; or N > 2( 2 + 1)K and λn (Ω) 0, λn+1 (Ω) > 0. Proof. We keep the same notations as in the proof of Lemma 2. Direct calculations lead to w s−1 w L1 = O (N −2K)/2 and w 2L2 c1 2K = O (N −2K)/2 , (43) Ls−1 for some positive constant c1 > 0. Notice that when N = 4K, we have more precise estimate w 2L2 c1 2K |log |. On the other hand, we have for any i = 1, . . . , n (w , ei )Ω = w (−)K ei = O (N −2K)/2 . Ω
We prove the lemma in two cases. Case 1. N 4K and λn (Ω) < 0, λn+1 (Ω) > 0. Set K¯ = min{2K, (N − 2K)/2}. As in Lemma 2, we write w˜ − w = ni=0 γi ei with Γ = ¯ (γ0 , . . . , γn ) ∈ Rn+1 . We claim that |Γ |2 = ni=0 γi2 < 2K |log |, provided is sufficiently small. We want to prove for all sufficiently small and for all Γ¯ = (γ¯0 , . . . , γ¯n ) ∈ Rn+1 satisfying ¯ |Γ¯ |2 = ni=0 γ¯i2 = 2K |log |, (28) holds. As before, we have 2 n γ¯i ei w + i=0
= (1 + γ¯0 )2 w 2K,2,Ω
2 n + γ¯i ei
¯ + O 2K |log |1/2 ,
(44)
2 n + γ¯i ei 2
¯ + O 2K |log |1/2 .
(45)
i=1
K,2,Ω
K,2,Ω
and 2 n γ¯i ei w + 2 i=0
= (1 + γ¯0 )
2
w 2L2 (Ω)
i=1
L (Ω)
L (Ω)
From the fact that function · → | · |s is convex on R, we have s n γ¯i ei w + s i=0
L (Ω)
(1 + γ¯0 )s |e0 |s +
Ω
Ω
s(1 + γ¯0 )s−1 |e0 |s−2 e0 Ω
¯ (1 + γ¯0 )s |e0 |s + O 2K |log |1/2 .
n
γ¯i ei
i=1
(46)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2265
Gathering (44) to (46) and using (24), there holds E w +
n i=0
1 1 γ¯i ei (1 + γ¯0 )2 w 2K,2,Ω − |1 + γ¯0 |s w sLs (Ω) 2 s ¯ μ 1 2 (1 + γ¯0 )2 w 2L2 (Ω) + γ¯i λi (Ω) + O 2K |log |1/2 2 2 n
−
i=1
N 1 1 s−2 2 γ¯ (SK ) 2K w 2K,2,Ω − w sLs (Ω) − 2 s 4 0 n ¯ μ 1 2 − w 2L2 (Ω) + γ¯i λi (Ω) + O 2K |log |1/2 . 2 2
(47)
i=1
Here we use the facts 12 (1 + t)2 − 1s (1 + t)s ¯
K N
−
s−2 2 4 t
provided t small and w 2L2 (Ω) =
O( K ). Therefore we obtain (28) and the desired claim follows. By (24) and (47), there exists some positive constant c > 0 such that E(w˜ )
K ¯ N N K ¯ (SK ) 2K − c 2K |log | + O 2K |log |1/2 < (SK ) 2K , N N ¯
provided is sufficiently small since we have 2K 2K |log | for small when N > 4K and ¯ w 2L2 c1 2K |log | when N = 4K. This implies (29). √ Case 2. N > 2( 2 + 1)K and λn (Ω) = 0, λn+1 (Ω) > 0. Assume λn−l (Ω) = · · · = λn (Ω) = 0 and λn−l−1 (Ω) < 0. Set B = B1 × B2 where B1 := (γ¯0 , . . . , γ¯n−l−1 ) ∈ R
n−l
n−l−1 2 2K¯ γ¯i < |log | i=0
and B2 := (γ¯n−l , . . . , γ¯n ) ∈ R
l+1
n 2(N−2K)K¯ 1 2 γ¯i < N+2K |log | s . i=n−l
We claim for all sufficiently small there holds sup E w + ∂B
We write w +
n
i=0 γ¯i ei
n
γ¯i ei < sup E w +
i=0
= (w +
n−l−1 i=0
B
n
γ¯i ei .
i=0
γ¯i ei ) + ( ni=n−l γ¯i ei ) := w1 + w2 . We have
Lw2 = (−)K w2 − μw2 = 0,
(48)
2266
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
so that (w2 , w1 )Ω − μ
w2 w1 = (w2 , w2 )Ω − μ
w22
= (e0 , w2 )Ω − μ
e0 w2 = 0.
(49)
As a consequence, we deduce 1 μ 1 E(w1 + w2 ) = w1 2K,2,Ω − w1 2L2 (Ω) − 2 2 s
|w1 + w2 |s .
(50)
We want to prove the claim by two steps. Step 1. There exists some 0 > 0 independent of (γ¯n−l , . . . , γ¯n ) such that for all ∈ (0, 0 ) and for all (γ¯n−l , . . . , γ¯n ) ∈ B2 there holds n n sup E w + γ¯i ei < E w + γ¯i ei . (51) (γ¯0 ,...,γ¯n−l−1 )∈∂B1
i=n−l
i=0
With the same arguments as in Case 1 and by (49), we have for all (γ¯0 , . . . , γ¯n−l−1 ) ∈ ∂B1 1 μ 1 μ w1 2K,2,Ω − w1 2L2 (Ω) = (1 + γ¯0 )2 e0 + w2 2K,2,Ω − (1 + γ¯0 )2 e0 + w2 2L2 (Ω) 2 2 2 2 n−l−1 ¯ 1 2 γ¯i λi (Ω) + O 2K |log |1/2 2
+
(52)
i=1
and 1 s
1 |w1 + w2 | = s 1 s s
w1 + (1 + γ¯0 )w2 − γ¯0 w2 s (1 + γ¯0 )s |e0 + w2 |s
+ (1 + γ¯0 )
|e0 + w2 |
s−1
s−2
n−l−1 (e0 + w2 ) γ¯i ei − γ¯0 w2 i=1
¯ 1 s2 2 1 + s γ¯0 + γ¯0 |e0 + w2 |s + O 2K |log |1−1/2s . s 4
(53)
Here we use the facts |a + b|s−1 2s−1 (|a|s−1 + |b|s−1 ) for all a, b ∈ R and (1 + γ¯0 )s 1 + 2 s γ¯0 + s4 γ¯02 for small γ¯0 . Gathering (52) and (53), we obtain E w +
n
γ¯i ei
i=0
E w +
n i=n−l
γ¯i ei +
n−l−1 ¯ 1 2 γ¯i λi (Ω) + O 2K |log |1−1/2s 2 i=1
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2267
+ γ¯0 e0 + w2 2K,2,Ω − μe0 + w2 2L2 (Ω) − |e0 + w2 |s s 1 2 2 2 s + γ¯0 e0 + w2 K,2,Ω − μe0 + w2 L2 (Ω) − |e0 + w2 | . 2 2 From the inequality |a + b|s − |a|s − |b|s C |a||b|s−1 + |b||a|s−1 ,
(54)
∀a, b ∈ R
and for some constant C > 0, we infer from (43) (N−2K)K¯ |e0 + w2 |s − |e0 |s − |w2 |s O N−2K 2 + N+2K |log |1/2s ,
(55)
which implies by (24),
¯ N |e0 + w2 |s = (SK ) 2K + o K .
(56)
On the other hand, again by (24), we have ¯ N e0 + w2 2K,2,Ω − μe0 + w2 2L2 (Ω) = e0 2K,2,Ω − μe0 2L2 (Ω) = (SK ) 2K + O K ,
(57)
¯
since e0 2L2 (Ω) = O( K ). Combining (54) to (57), we get finally E w +
n
γ¯i ei E w +
n
γ¯i ei +
i=n−l
i=0
−
n−l−1 1 2 γ¯i λi (Ω) 2 i=1
N s −2 2 ¯ γ¯0 (SK ) 2K + O 2K |log |1−1/2s . 4
(58)
This gives the desired result (51). Step 2. There exists some 1 > 0 independent of (γ¯0 , . . . , γ¯n−l−1 ) such that for all ∈ (0, 1 ) and for all (γ¯0 , . . . , γ¯n−l−1 ) ∈ B1 , there holds n sup E w + γ¯i ei < E(w ). (59) (γ¯n−l ,...,γ¯n )∈∂B2
i=0
Using (49), (55) and (58), we estimate E w +
n i=0
γ¯i ei E(w ) −
1 s
1 E(w ) − s
¯ |e0 + w2 |s − |e0 |s + O 2K |log |1−1/2s N−2K (N−2K)K¯ ¯ |w2 |s + O 2 + N+2K |log |1/2s + 2K |log |1−1/2s . (60)
2268
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
As all the norms on the finite dimension vector space are equivalent, we have
n
|w2 |s c
s/2 γ¯i2
(61)
i=n−l
which implies for all (γ¯n−l , . . . , γ¯n ) ∈ ∂B2 , E w +
n
2N K¯
γ¯i ei E(w ) − c N+2K |log |1/2
i=0
N−2K (N−2K)K¯ ¯ + O 2 + N+2K |log |1/2s + 2K |log |1−1/2s . K¯ K¯ K¯ N −2K Hence, we prove the desired result in Step 2 since N2N K¯ and N2N + (NN−2K) +2K < 2 +2K 2 +2K . Therefore, claim (48) follows. Now we write w˜ = w + ni=0 γi ei with Γ = (γ0 , . . . , γn ) ∈ B1 × B2 . Using (60), we have
N−2K (N−2K)K¯ ¯ E(w˜ ) E(w ) + O 2 + N+2K |log |1/2s + 2K |log |1−1/2s N−2K (N−2K)K¯ N K ¯ (SK ) 2K − c 2K + O 2 + N+2K |log |1/2s + 2K |log |1−1/2s N N K < (SK ) 2K N
√ provided sufficiently small since N > 2( 2 + 1)K implies 2K < the proof. 2
N −2K 2
(N −2K) + 2(N +2K) . We finish 2
Under more assumptions on the eigenfunctions, we have the following improved result. Proposition 3. Under the same assumptions as in Proposition 2, we suppose λn−l (Ω) = · · · = λn (Ω) = 0, λn+1 (Ω) > 0 and λn−l−1 (Ω) < 0. Moreover, we assume Σ0 := x ∈ Ω; en−l (x) = · · · = en (x) = 0 = ∅. Then (29) holds provided either N 4K and K 4; or N > 2(K − 1 + K 5.
(62) √ 2K 2 − 2K + 1 ) and
Proof. We √ keep the same notations as in Proposition 2. We need only to consider the case 4K ¯ (K¯ + 2)/(s − 1)}. N 2(1 + 2 )K so that K¯ = (N − 2K)/2. Let x0 ∈ Σ0 and α := min{2K/s,
Set B = B1 × B2 where B1 is defined as in the proof of Proposition 2 and B2
:= (γ¯n−l , . . . , γ¯n ) ∈ R
l+1
n 2 2 2α γ¯i < |log | s . i=n−l
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2269
Similar to (48), we claim for all sufficiently small there holds sup E w + ∂B
We write again w + before.
n
γ¯i ei < sup E w + B
i=0
n
i=0 γ¯i ei
n
γ¯i ei .
(63)
i=0
= w1 + w2 . To prove (63), we divide the proof in two steps as
Step 1. With the same arguments as in Step 1 of the proof of Proposition 2, there exists some 2 > 0 independent of (γ¯n−l , . . . , γ¯n ) such that for all ∈ (0, 2 ) and for all (γ¯n−l , . . . , γ¯n ) ∈ B2 , (51) holds. In fact, we observe (s − 1)α > K¯ and we infer thus E w +
n
γ¯i ei E w +
n
γ¯i ei +
i=n−l
i=0
n−l−1 1 2 γ¯i λi (Ω) 2 i=1
¯ N s−2 2 − γ¯0 (SK ) 2K + O 2K |log |1/2 , 4
(64)
which proves the desired claim in Step 1. Step 2. There exists some 3 > 0 independent of (γ¯0 , . . . , γ¯n−l−1 ) such that for all ∈ (0, 3 ) and for all (γ¯0 , . . . , γ¯n−l−1 ) ∈ B1 , there holds sup
(γ¯n−l ,...,γ¯n )∈∂B2
E w +
n
γ¯i ei < E(w ).
(65)
i=0
First we have similarly, E w +
n
γ¯i ei
i=0
1 E(w ) − s
|e0 + w2 | − |e0 | s
s
¯ + O 2K |log |1/2 .
(66)
We will estimate carefully the second term on the right side. Observe the basic inequality |a + b|s − |a|s − |b|s − s|a|s−2 ab C |a||b|s−1 + |b|2 |a|s−2 ,
∀a, b ∈ R.
Using the facts
|w |s−2 =
O( 2K ) O( 2K |log |)
when N > 4K, when N = 4K
¯ we obtain from (43) and min{(s − 1)α, K + α} > K, |e0 + w2 |s − |e0 |s − |w2 |s − s|e0 |s−2 e0 w2 = O 2K¯ .
(67)
2270
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
To handle
|e0 |s−2 e0 w2 , we write w2 (x) = ∇w2 (x0 ), x − x0 + O α |log |1/s |x − x0 |2
since w2 (x0 ) = 0. Thus, we imply
|e0 |s−2 e0 w2 = O (N +2K)/2 + (N −2K+4)/2 α |log |1/s
when K > 1
(68)
|e0 |s−2 e0 w2 = O (N +2)/2 + (N +2)/2 |log | α |log |1/s
when K = 1,
(69)
and
by remarking ∇w2 (x0 ), x − x0 is an odd function with respect to x − x0 so that
|e0 |s−2 e0 ∇w2 (x0 ), x − x0 = 0.
B(x0 ,R/2)
Recalling (61) and gathering (66) to (69), we have for all (γ¯n−l , . . . , γ¯n ) ∈ ∂B2 , E w +
n
γ¯i ei
i=0 ¯
¯
E(w ) − c sα |log | + O( K+2+α |log |1/s + 2K |log |1/2 )
if K > 1,
E(w
if K = 1.
¯ ) − c sα |log | + O( K+2+α |log |(s+1)/s
¯ + 2K |log |1/2 )
¯ for all K and Hence, we prove the desired result in Step 2 since sα min{K¯ + 2 + α, 2K} ¯ ¯ sα = 2K < K + 2 + α for K = 1. Therefore, the claim follows. Now we write w˜ = w + ni=0 γi ei with Γ = (γ0 , . . . , γn ) ∈ B1 × B2 . Using (64), (67) to (69), we have ⎧ N ¯ ¯ ⎨ K (SK ) 2K − μ2 w 2L2 + O( K+2+α |log |1/s + 2K |log |1/2 ) if K > 1, N E(w˜ ) N ¯ ¯ μ 2 K+2+α (s+1)/s 2 K 1/2 ⎩ K (SK ) 2K − w + O( |log | + |log | ) if K = 1. N
2
L2
√ ¯ and 2K < min{K¯ + 2 + α, 2K}. ¯ When K 3 and 4K < N 2(1 + 2 )K, we have α = 2K/s ¯ = K , K = K¯ and 2K K¯ + 2 + α. When K 4 When K 4 and N = 4K, we have α = 2K/s 2 √ and N > 2(K − 1 + 2K 2 − 2K + 1 ), we have α = (K¯ + 2)/(s − 1) and 2K < min{K¯ + ¯ Recall w 2 2 c1 2K when N > 4K and w 2 2 c1 2K |log | when N = 4K. 2 + α, 2K}. L L In all above cases, there holds E(w˜ ) <
N K (SK ) 2K N
provided sufficiently small. We finish the proof.
2
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2271
Corollary 1. Under the same assumptions as in Proposition 2, suppose K = 1, N 4 and λn (Ω) = 0 is a simple eigenvalue for some n 2. Then, there exists some u ∈ M a solution N to (1) satisfying E(u) < N1 (S1 ) 2 . Proof. Clearly, for all n 2, the eigenfunctions en change the sign. The desired result follows directly from Proposition 3 and Theorem 1. 2 Here we give the further heuristic discussions. We suppose the same assumptions as in Proposition 2. When K = 1 and N 4, assume λn−1 (Ω) = λn (Ω) = 0 a double eigenvalue and 0 is a regular value for en−1 and en . Let Ω1 be a connected component of the set {x ∈ Ω; en−1 (x) > 0}. From the Green’s formula, we have ∂en−1 ∂en−1 ∂en en = en − en−1 = en−1 en − en en−1 = 0. ∂ν ∂ν ∂ν ∂Ω1
Ω1
∂Ω1
n−1 > 0 a.e. on the boundary ∂Ω1 . Thus, there exists It follows from Maximum’s principle that ∂e∂ν some point x ∈ ∂Ω1 \ ∂Ω such that en (x) = 0 since ∂Ω1 \ ∂Ω is not empty. Therefore, the condition (62) is satisfied. For the general K, from the orthogonality condition Ω ei ej = 0 for i = j , there exists at most one eigenfunction which keeps√the sign. As a consequence, we have some ground state solutions for the dimension less than 2( 2 + 1)K provided 0 is a simple eigenvalue. In [6], by some different approach, the authors proved the existence of a solution under somewhat weaker assumptions. More precisely, when K = 1 and N 4 or K = 2 and N 8, if λ is an eigenvalue of multiplicity m < N + 2, then it has at least N +1−m pairs of nontrivial solutions. 2 However, we do not know whether these solutions are ground state ones or not. Comparing to their result, Corollary 1 gives some more information about some found solutions, that is, there are ground state solutions under appropriate assumptions on the eigenvalues.
3. Existence of solutions for some perforated domains In this section, we analyze first the concentration phenomenon for the problem (1). For this purpose, set FK (v) :=
((−)M v)2 |∇(−)M v|2
if K = 2M, if K = 2M + 1.
Similarly to Theorem 6 of [19], we have the following theorem and here we just give a sketch of the proof. Theorem 2. Suppose the assumptions (H1) to (H5) are satisfied. Moreover, suppose that κ=
N K (SK ) 2K N
(70)
and E(v) > κ,
∀v ∈ M.
(71)
2272
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
Let (uk ) ⊂ M be a minimizing sequence for κ, that is, limn→∞ E(uk ) = κ. Then there exists x0 ∈ Ω¯ such that μk := ζΩ FK (uk ) dx SK δx0
weakly in R RN
and νk := ζΩ |uk |s dx SK δx0
weakly in R RN ,
where R(RN ) denotes the space of non-negative Radon measures on RN with finite mass, δx0 denotes the Dirac measure concentrated at x0 with mass equal to 1 and ζΩ designates the characteristic function of Ω. Proof. As in the proof of Theorem 1, we see that (uk ) is bounded in H0K (Ω). Extracting a subsequence, there exists some u ∈ H0K (Ω) such that uk u weakly in H0K (Ω), uk u
weakly in Ls (Ω) and a.e. on Ω.
Moreover, for all 1 j n, we have lj (u) = 0. Furthermore, we have u = 0. Otherwise, with the same arguments as in Theorem 1, we infer u ∈ M and E(u) = κ which contradicts (71). Now the rest of proof is just a consequence of concentration compactness principle (for details cf. [25,17,19]). 2 In the following, we give some classification result. First we recall a basic fact for nonexistence result on the half space RN + . It can be stated as follows: Lemma 3. Let u ∈ DK,2 (RN + ) be a weak positive solution of the problem
(−)K u = |u|s−2 u
in RN +,
u = Du = · · · = D K−1 u = 0 on ∂RN +.
(72)
Then u ≡ 0. A stronger result have been obtained by Reichel and Weth in [34] very recently. Here we give a proof based on the Pohozaev formula (see [26]). Proof. It follows from the Pohozaev formula D K u = 0 on ∂RN + (see the details cf. [19] for the Navier boundary conditions). Now, (−)K−1 ((−)u) = us > 0 in RN + verifying Dirichlet . Thanks to the Boggio’s result, boundary condition (−)u = · · · = D K−2 (−)u = 0 on ∂RN + we know the Green function for the operator (−)K−1 on the half space with Dirichlet bound∂u ary condition is positive. Thus, (−)u > 0 in RN + . From Hopf’s Maximum principle, ∂n > 0 on ∂RN + . This contradiction finishes the proof of lemma. 2
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2273
A similar problem in the whole space can be stated as follows: Lemma 4. Let u ∈ DK,2 (RN ) be a weak positive solution of the problem (−)K u = |u|s−2 u
in RN .
(73)
Then there exist a constant λ 0 and a point x0 ∈ RN such that u(x) =
2λ 2 1 + λ |x − x0 |2
N−2K 2
.
(74)
This result has been proved by Wei and Xu (Theorem 1.3 in [42]). K,2 (RN )) be a weak sign-changing solution of the Lemma 5. Let u ∈ DK,2 (RN + ) (resp. u ∈ D problem (72) (resp. (73)). Then
E∞ (u)
N 2K (SK ) 2K . N
(75)
Proof. Our proof is an adaptation of Gazzola–Grunau–Squassina’s approach [16]. We consider the closed convex cone v 0 a.e. in RN C1 = v ∈ DK,2 RN + + and its dual cone (w, v) N 0, ∀v ∈ C1 . C2 = w ∈ DK,2 RN + R +
We claim that C2 ⊂ −C1 . Given h ∈ C0∞ (RN + ) ∩ C1 , let v be the solution to the problem (−)K v = h
in RN +.
Again from the Boggio’s result, we have v 0 since the Green function for the operator (−)K on the half space with Dirichlet boundary condition is positive. Consequently, for all w ∈ C2 , we have hw = (−)K vw = (v, w)RN 0. +
RN +
RN +
This implies w 0 a.e. in RN + . Hence the claim is proved. Using a result of Moreau [27], for any ), there exists a unique pair (u1 , u2 ) ∈ C1 × C2 such that u ∈ DK,2 (RN + u = u1 + u2
with (u1 , u2 )RN = 0. +
Now let u be a sign-changing solution of the problem (72). Then ui = 0 for all i = 1, 2. From the above claim, we see u1 0 and u2 0 so that |u(x)|s−2 u(x)ui (x) |ui (x)|s for i = 1, 2. Applying the Sobolev inequality for ui (i = 1, 2), we obtain
2274
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
SK ui 2Ls
ui 2K,2,RN +
= (u, ui )RN = +
(−) uui K
RN +
ui (x)s = ui s s L
RN +
so that N
ui sLs (Ω) (SK ) 2K . Consequently, using the fact u2
K,2,RN +
= usLs , we infer
K K u2K,2,RN = u1 2K,2,RN + u2 2K,2,RN + + + N N N K 2K SK u1 2Ls + u2 2Ls (SK ) 2K . N N
E∞ (u) =
Similarly, we have the same result for u ∈ DK,2 (RN ).
2
Theorem 3. Assume (H1), (H2), (H5), (70) and (71) are satisfied. Let (uk ) ⊂ H0K (Ω) be a (P.S.)β sequence such that
N N K 2K (SK ) 2K , (SK ) 2K , N N K ∗ dE(uk ) → 0 in H0 (Ω) .
E(uk ) → β ∈
(76) (77)
Then (uk ) is precompact in H0K (Ω). Proof. The blow up analysis for (P.S.)β sequences is more or less standard. Its proof follows from the P. Lions’ concentration compactness principle and it is close to one in [19]. The only difference is that we need Lemma 6 to rule out sign-changing bubbles. We leave this part to interested readers. 2 As a consequence, we have Corollary 2. Under the assumptions (H1) to (H5), (70) and (71), assume moreover (H8) en (Ω) < 0. Let (uk ) ⊂ M be a (P.S.)β sequence for E on M such that N N K 2K E(uk ) → β ∈ (SK ) 2K , (SK ) 2K , N N dE(uk ) → 0. (T M)∗
uk
Then (uk ) is precompact in M.
(78) (79)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2275
Proof. As in the proof of Theorem 1, (uk ) is a bounded sequence in H0K (Ω). On the other hand, using (30), (31) and (H2), we infer that (uk ) is bounded from below by some positive constant in H0K (Ω) and also in Ls (Ω). Set V k the (n + 1)-dimensional vector space spanned by uk , e1 , . . . , en . If there is no confusion, we drop the index k. We claim there exists some positive constant c > 0 independent of k such that ∀k ∈ N, ∀w ∈ H0K (Ω), we can decompose w = w1 + w2
(80)
where w1 ∈ V k and w2 ∈ Tuk M satisfying w1 K,2,Ω cwK,2,Ω ,
w2 K,2,Ω cwK,2,Ω .
Set e0 = uk and θi = dli (uk )(w) ∈ R for all i = 0, . . . , n. Using (13) and the fact that (uk ) is a bounded sequence in H0K (Ω), the vector Θ = (θ0 , . . . , θn )T is bounded in Rn+1 with respect to k. Moreover, we can estimate |Θ| cwK,2,Ω . Define (n + 1) × (n + 1) symmetric matrix M(k) = (mij )0i,j n by mij = d 2 E(uk )(ei , ej ). We write w1 =
n
ψ i ei
i=0
where ψi ∈ R. Denote the vector Ψ = (ψ0 , . . . , ψn )T ∈ Rn+1 . Again from (13), the decomposition (80) is equivalent to solve d 2 E(uk )(w1 , ei ) = dli (uk )(w),
∀0 i n,
that is, M(k)Ψ = Θ. As in the proof of Lemma 1, the matrix is negative definite. Clearly, the matrix M(k) is uniformly bounded. We show there exists c > 0 independent of k such that M(k) −cI T n+1 where In is the identity matrix. For this purpose, for any vector Γ = (γ0 , . . . , γn ) ∈ R , denote ξ = i=0 γi ei we have
Γ T M(k)Γ = d 2 E(uk )(ξ, ξ ) n 2 s−2 2 s−2 −(s − 2) |uk | ξ − |uk | γj e j Ω
Ω
j =1
2276
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
+
n
γj e j ,
j =1
−
s −2 s −1
n
−
γi e i
i=1
Ω
|uk |s γ02 +
n
a(x) Ω
n
2 γj e j
j =1
γj2 λj (Ω).
j =1
Ω
Thus, the desired result follows. As a consequence, (Ψ = (M(k))−1 Θ)k is a bounded sequence. More precisely, we infer w1 K,2,Ω cwK,2,Ω . Therefore, w2 K,2,Ω wK,2,Ω + w1 K,2,Ω cwK,2,Ω , that is, the claim is proved. Hence, dE(uk )(w) = dE(uk )(w2 ) cdE(uk ) wK,2,Ω . (Tuk M)∗ Thus, there holds dE(uk )
(H0K (Ω))∗
cdE(uk )(T M)∗ uk
so that lim dE(uk )(H K (Ω))∗ = 0.
n→∞
0
Finally, applying Theorem 3, we finish the proof.
2
Now, we can prove the main result for domains with the small holes. Recall that Ω = Ω1 \ Ω2 is a bounded domain satisfying Ω2 ⊂ B(0, ) and Ω1 is fixed. To search solutions of (1) in such Ω, we minimize the energy functional E on the Finsler manifold M. We see that the concentration phenomenon occurs if E cannot reach the minimum. In this case, we will employ Coron’s strategy to search unstable critical points in higher level sets. Theorem 4. Let Ω be a bounded domain satisfying the above assumption. Assume (H1) to (H7) hold. Then there exists η > 0 such that for all < η, the problem (1) admits a nontrivial solution in Ω. Proof. Thanks to Lemma 2, we have κ
N K 2K N (SK )
. In the case κ < N K 2K N (SK )
N K 2K N (SK )
, the desired re-
sult follows from Theorem 1. So we suppose κ = . If there exists u ∈ M such that E(u) = κ, we finish the proof by Step 4 in the proof of Theorem 1. Hence, we assume ∀v ∈ M there holds E(v) > κ. From the properties of eigenvalues λi (Ω) described in the previous sections, (H8) is always satisfied for the perforated domain Ω, provided is sufficiently small. In fact, in case λi (Ω1 ) = 0 for all i ∈ N, it follows from the continuity of λi (Ω). In the case λn (Ω1 ) = · · · = λn+k (Ω1 ) = 0, we have λn (Ω) > 0.
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2277
We divide the proof into several steps. Step 1. We choose a radially symmetric function ϕ ∈ C0∞ (RN ) such that 0 ϕ 1, ϕ ≡ 1 on the annulus {x ∈ RN | 1/2 < |x| < 1} and ϕ ≡ 0 outside the annulus {x ∈ RN | 1/4 < |x| < 2}. For any R 1, define ⎧ ⎨ ϕ(Rx) ϕR (x) = 1 ⎩ ϕ(x/R)
if 0 |x| < 1/R, if 1/R |x| < R, if |x| R.
Denote the unit sphere S N −1 = {x ∈ RN | |x| = 1}. For σ ∈ S N −1 , 0 t < 1, we set uσt (x) = CN,K
1−t (1 − t)2 + |x − tσ |2
N−2K 2
∈ H K RN , N
σ (x) = where the choice of CN,K is such that uσt 2K,2,RN = uσt sLs (RN ) = (SK ) 2K . Let w˜ t,R N−2K
σ (x) = (4R) 2 w σ (4Rx). Hence w σ ∈ H K (B(0, 1/2)\B(0, 1/16R 2 )), uσt (x)ϕR (x) and wt,R ˜ t,R t,R 0 ∀σ ∈ S N −1 and ∀t ∈ [0, 1). Clearly,
σ w˜ s N = w σ s N , t,R L (R ) t,R L (R ) σ σ w˜ t,R K,2,RN = wt,R K,2,RN .
(81) (82)
A direct computation leads to ∀R > 1 σ N −2K 2K−N w˜ − uσ 2 R t K,2,RN C(1 − t) t,R
(83)
σ w˜ − uσ s s N CR −N (1 − t)N . t L (R ) t,R
(84)
and
Consequently σ 2 σ s N s N = (SK ) 2K = lim w˜ t,R lim w˜ t,R K,2,RN L (R )
R→∞
R→∞
σ ∈ M ∩ Vect{e (Ω), . . . , e (Ω), w σ } where uniformly for t ∈ [0, 1) and σ ∈ S N −1 . Set w¯ t,R 1 n t,R Ω = Ω1 \ Ω2 , B(0, 1/2) ⊂ Ω1 and Ω2 ⊂ B(0, 1/16R 2 ). Thanks to the Implicit Function Theorem, the continuous map
wR : S N −1 × [0, 1) → H0K (Ω), σ (σ, t) → wt,R
yields a continuous map
2278
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
w¯ R : S N −1 × [0, 1) → M, σ (σ, t) → w¯ t,R .
Recall Ω1 is fixed. Without loss of generality, we assume en (Ω) < 0 and en+1 (Ω) > 0. A ba∞ (Ω \ {0}) away from 0 sic observation is that ei (Ω) → ei (Ω1 ) for all i = 1, . . . , n in Cloc 1 and strongly in H0K (Ω1 ) as R → +∞. For this purpose, we prolong ei (Ω) by setting 0 in Ω1 \ Ω and denote it by e¯i (Ω). We remark first from regularity theory of elliptic equation ∞ (Ω \ {0}) and is also bounded family in H K (Ω ). that {e¯i (Ω)} is bounded family in Cloc 1 1 0 Thus, the weak limit function v of e¯i (Ω) in H0K (Ω1 ) solves some linear elliptic equation of eigenvalue type in Ω1 \ {0}. As v ∈ H0K (Ω1 ), {0} is a removable singularity point. Thus, v is an eigenfunction in Ω1 . On the other hand, it follows from the fact λi (Ω) → λi (Ω1 ) that ei (Ω)K,2,Ω = e¯i (Ω)K,2,Ω1 → vK,2,Ω1 so that we have the strong convergence in ∞ (Ω \ {0}) comes from the compactness of this H0K (Ω1 ). Moreover, the convergence in Cloc 1 family in such space. Furthermore, the orthogonality of {ei (Ω)} with respect to i gives the orthogonality of the limit eigenfunctions and the desired claim follows. We remark that
1 1 1 E(u) u2K,2,Ω − usLs (Ω) − 2 s 2
a(x)u2 . Ω
In the following, we consider the simple case F (x, u) = 12 a(x)u2 (we can treat the general case with the same arguments). Fix some small number r > 0. As in the proof of Lemma 2, for all Γ = (γ0 , . . . , γn ) ∈ Rn+1 with ni=0 γi2 r 2 , we infer σ sup E wt,R +
t,σ,Ω2
n
N N 1 1 γi ei (1 + γ0 )2 (SK ) 2K − |1 + γ0 |s (SK ) 2K 2 s i=0 n s n 1 2 1 + γi λi (Ω1 ) − γi ei (Ω1 ) s 2 s
i=1
i=1
+ o(1),
L (Ω1 )
where o(1) is uniformly with respect to Γ as R → ∞. Consequently, we deduce sup E t,σ,Ω2
σ wt,R
+
n
σ γi ei < E wt,R
i=0
for
n
γi2 = r 2
i=0
provided R is sufficiently large. This implies σ σ w¯ t,R − wt,R =
n
γi ei (Ω)
for some |Γ | < r,
i=0
so that σ K N lim sup E w¯ t,R = (SK ) 2K . N
R→∞ t,σ,Ω2
(85)
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2279
Hence, we can choose R0 > 0 such that for any R R0 σ 2K N (SK ) 2K . < E w¯ t,R N t∈[0,1), σ ∈S N−1 , Ω2 ⊂B(0,1/16R 2 ) sup
(86)
Thus we can define a map α : B(0, 1) → M, σ . (t, σ ) → w¯ t,R 0
Step 2. Set η := 1/16R02 and fix Ω2 ⊂ B(0, η). From (81) to (84), we infer that σ 2 σ s N lim w¯ t,R = lim w¯ t,R = (SK ) 2K 0 K,2,Ω 0 Ls (Ω)
t→1
t→1
uniformly for σ ∈ S N −1
which implies for any σ ∈ S N −1 K N lim E α(t, σ ) = (SK ) 2K . N
t→1
Step 3. For any v ∈ M, let γ (v) =
s x v(x) dx ∈ RN
Ω
denote its center mass. We claim there exists δ˜ > 0 such that for any v ∈ M satisfying E(v) N K ˜ we have 2K + δ, N (SK ) N γ (v) ∈ RN \ B 0, 2 (SK ) 2K /2
(87)
where B(0, 2 ) ⊂ Ω2 . Otherwise, we can find a sequence (vn ) ⊂ M satisfying N K (SK ) 2K , N N γ (vn ) ∈ B 0, 2 (SK ) 2K /2 .
lim E(vn ) =
n→∞
Applying Theorem 2, there exists x0 ∈ Ω¯ such that s N ζΩ vn (x) dx (SK ) 2K δx0 . Consequently, N N γ (vn ) → (SK ) 2K x0 ∈ / B 0, 2 (SK ) 2K
(88) (89)
2280
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
which contradicts (89). Thus, the desired claim yields. Choosing t0 ∈ [0, 1) such that ∀σ ∈ S N −1 N ˜ we set 2K + δ, and ∀t ∈ [t0 , 1), we have E(α(t, σ )) < K N (SK ) β := min
max
f ∈H (t,σ )∈(0,t0 ]×S N−1
E f (t, σ ) ,
where H is the set of any function homotopic to α on B(0, t0 ) with the fixed boundary data, that is, H = f f : B(0, t0 ) → M is continuous, f |∂B(0,t0 ) = α|∂B(0,t0 ) and f is homotopic to α . We see that ∀f ∈ H , γ ◦ f : B(0, t0 ) → RN is a contraction of the loop γ ◦ α|∂B(0,t0 ) ⊂ RN \ N B(0, 2 (SK ) 2K /2). On the other hand, it follows from Steps 1 and 2 N
lim γ ◦ α(t, σ ) = (SK ) 2K
t→1
σ 4R0
uniformly in σ ∈ S N −1 . N
Thus, γ ◦ α|∂B(0,t0 ) is a nontrivial loop in RN \ B(0, 2 (SK ) 2K /2). Using (89), we obtain sup (t,σ )∈B(0,t0
K N ˜ E f (t, σ ) (SK ) 2K + δ, N )
which implies β
N N K K (SK ) 2K + δ˜ > (SK ) 2K . N N
On the other hand, it follows from Step 1 β
sup (t,σ )∈B(0,t0
2K N (SK ) 2K . E α(t, σ ) < N )
Recalling Theorem 1 and Corollary 2 and using the deformation lemma, we infer β is a critical value. Finally, the problem (1) admits a nontrivial critical point u such that E(u) = β. 2 Remark 1. The condition a ∈ L∞ (Ω) ∩ C ∞ (Ω) could be weakened. Remark 2. We can use the above strategy to treat also the problem with Navier boundary conditions. Acknowledgment The authors would like to thank the referee for pointing out the references [30,33,38] that the equivalent Nehari type manifolds are defined therein and valuable comments on Propositions 2 and 3.
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
2281
References [1] T. Bartsch, T. Weth, M. Willem, A Sobolev inequality with remainder term and critical equations on domains with topology for the polyharmonic operator, Calc. Var. Partial Differential Equations 18 (2003) 253–268. [2] F. Bernis, J. Garcia-Azorero, I. Peral, Existence and multiplicity of nontrivial solutions in semilinear critical problems of fourth order, Adv. Differential Equations 1 (1996) 219–240. [3] H. Brezis, L. Nirenberg, Positive solutions of nonlinear elliptic equations involving critical Sobolev exponents, Comm. Pure Appl. Math. 36 (1983) 437–477. [4] A. Capozzi, D. Fortunato, G. Palmieri, An existence results for nonlinear elliptic problems involving critical Sobolev exponents, Ann. Inst. H. Poincaré Anal. Non Linéaire 2 (6) (1985) 463–470. [5] G. Cerami, D. Fortunato, M. Struwe, Bifurcation and multiplicity results for nonlinear elliptic problems involving critical Sobolev exponents, Ann. Inst. H. Poincaré Anal. Non Linéaire 1 (5) (1984) 341–350. [6] M. Clapp, T. Weth, Multiple solutions for the Brezis–Nirenberg problem, Adv. Differential Equations 10 (2005) 463–480. [7] J.M. Coron, Topologie et cas limite des injections de Sobolev, C. R. Acad. Sci. Paris Sér. I 299 (1984) 209–212. [8] G. Devillanova, S. Solimini, Concentration estimates and multiple solutions to elliptic problem at critical growth, Adv. Differential Equations 7 (2002) 1257–1280. [9] G. Devillanova, S. Solimini, A multiplicity result for elliptic equations at critical growth in low dimension, Commun. Contemp. Math. 5 (2003) 171–177. [10] F. Ebobisse, M. Ould Ahmedou, On a nonlinear fourth order elliptic equation involving the critical Sobolev exponent, Nonlinear Anal. 52 (5) (2003) 1535–1552. [11] D.E. Edmunds, D. Fortunato, E. Jannelli, Critical exponents, critical dimensions and the biharmonic operator, Arch. Ration. Mech. Anal. 112 (3) (1990) 269–289. [12] D. Fortunato, E. Jannelli, Infinitely many solutions for some nonlinear elliptic problems in symmetrical domains, Proc. Roy. Soc. Edinburgh Sect. A 105 (1987) 205–213. [13] F. Gazzola, Critical growth problems for polyharmonic operators, Proc. Roy. Soc. Edinburgh Sect. A 128 (1998) 251–263. √ [14] F. Gazzola, H.C. Grunau, On the role of space dimension n = 2 + 2 2 in the semilinear Brezis–Nirenberg eigenvalue problem, Analysis 20 (2000) 395–399. [15] F. Gazzola, H.C. Grunau, Critical dimensions and higher order Sobolev inequalities with remainder terms, NoDEA Nonlinear Differential Equations Appl. 8 (2001) 35–44. [16] F. Gazzola, H.C. Grunau, M. Squassina, Existence and nonexistence results for critical growth biharmonic elliptic equations, Calc. Var. Partial Differential Equations 18 (2003) 117–143. [17] Y. Ge, Estimations of the best constant involving the L2 norm in Wente’s inequality and compact H -surfaces in Euclidean space, ESAIM Control Optim. Calc. Var. 3 (1998) 263–300. [18] Y. Ge, Sharp Sobolev inequalities in critical dimensions, Michigan Math. J. 51 (2003) 27–45. [19] Y. Ge, Positive solutions in semilinear critical problems for polyharmonic operators, J. Math. Pures Appl. 84 (2005) 199–245. [20] H.C. Grunau, Critical exponents and multiple critical dimensions for polyharmonic operators. II, Boll. Unione Mat. Ital. (7) 9-B (1995) 815–847. [21] H.C. Grunau, Positive solutions to semilinear polyharmonic Dirichlet problems involving critical Sobolev exponents, Calc. Var. Partial Differential Equations 3 (1995) 243–252. [22] H.C. Grunau, On a conjecture of P. Pucci–J. Serrin, Analysis 16 (1996) 399–403. [23] S. Lang, Introduction to Differentiable Manifolds, Interscience, New York, 1962. [24] C. Lin, Strong unique continuation for m-th powers of a Laplacian operator with singular coefficients, Proc. Amer. Math. Soc. 135 (2007) 569–578. [25] P.L. Lions, The concentration-compactness principle in the calculus of variations: The limit case. Part I and Part II, Rev. Mat. Iberoam. 1 (1) (1985) 145–201, Rev. Mat. Iberoam. 1 (2) (1985) 45–121. [26] E. Mitidieri, A Rellich type identity and applications, Comm. Partial Differential Equations 18 (1993) 125–151. [27] J.J. Moreau, Décomposition orthogonale d’un espace hilbertien selon deux cônes mutuellement polaires, C. R. Acad. Sci. Paris Sér. I 255 (1962) 238–240. [28] Z. Nehari, On a class of nonlinear second-order differential equations, Trans. Amer. Math. Soc. 95 (1960) 101–123. [29] E.S. Noussair, C.A. Swanson, J. Yang, Critical semilinear biharmonic equations in R N , Proc. Roy. Soc. Edinburgh Sect. A 121 (1992) 139–148. [30] A. Pankov, Periodic nonlinear Schrödinger equation with application to Photonic crystals, Milan J. Math. 73 (2005) 259–287.
2282
Y. Ge et al. / Journal of Functional Analysis 260 (2011) 2247–2282
[31] M.H. Protter, Unique continuation for elliptic equation, Trans. Amer. Math. Soc. 95 (1960) 81–91. [32] P. Pucci, J. Serrin, Critical exponents and critical dimensions for polyharmonic operators, J. Math. Pures Appl. 69 (1990) 55–83. [33] M. Ramos, H. Tavares, Solutions with multiple spike patterns for an elliptic system, Calc. Var. Partial Differential Equations 31 (2008) 1–25. [34] W. Reichel, T. Weth, A priori bounds and a Liouville theorem on a half-space for higher-order elliptic Dirichlet problems, Math. Z. 261 (2009) 805–827. [35] M. Schechter, W.M. Zou, On the Brezis–Nirenberg problem, Arch. Ration. Mech. Anal. 197 (1) (2010) 337–356. [36] M. Struwe, Variational Methods, Springer, Berlin, Heidelberg, New York, Tokyo, 1990. [37] C.A. Swanson, The best Sobolev constant, Appl. Anal. 47 (4) (1992) 227–239. [38] A. Szulkin, T. Weth, Ground state solutions for some indefinite variational problems, J. Funct. Anal. 257 (2009) 3802–3822. [39] A. Szulkin, T. Weth, M. Willem, Ground state solutions for a semilinear problem with critical exponent, Differential Integral Equations 22 (2009) 913–926. [40] G. Talenti, Best constant in Sobolev inequality, Ann. Mat. Pura Appl. 110 (1976) 353–372. [41] R.C.A.M. Van der Vorst, Best constant for the embedding of the space H 2 ∩ H01 (Ω) into L2N/(N −4) Ω, Differential Integral Equations 6 (2) (1993) 259–276. [42] J. Wei, X. Xu, Classification of solutions of higher order conformally invariant equations, Math. Ann. 313 (2) (1999) 207–228. 4
[43] D. Zhang, On multiple solutions of u + λu + |u| N−2 u = 0, Nonlinear Anal. 13 (1989) 353–372.
Journal of Functional Analysis 260 (2011) 2283–2299 www.elsevier.com/locate/jfa
Bounded mean oscillation and bandlimited interpolation in the presence of noise Gaurav Thakur Program in Applied and Computational Mathematics, Princeton University, Princeton, NJ 08544, USA Received 4 August 2010; accepted 19 October 2010 Available online 28 October 2010 Communicated by Alain Connes
Abstract We study some problems related to the effect of bounded, additive sample noise in the bandlimited interpolation given by the Whittaker–Shannon–Kotelnikov (WSK) sampling formula. We establish a generalized form of the WSK series that allows us to consider the bandlimited interpolation of any bounded sequence at the zeros of a sine-type function. The main result of the paper is that if the samples in this series consist of independent, uniformly distributed random variables, then the resulting bandlimited interpolation almost surely has a bounded global average. In this context, we also explore the related notion of a bandlimited function with bounded mean oscillation. We prove some properties of such functions, and in particular, we show that they are either bounded or have unbounded samples at any positive sampling rate. We also discuss a few concrete examples of functions that demonstrate these properties. © 2010 Elsevier Inc. All rights reserved. Keywords: Sampling theorem; Nonuniform sampling; Paley–Wiener spaces; Entire functions of exponential type; BMO; Sine-type functions
1. Introduction The classical Whittaker–Shannon–Kotelnikov (WSK) sampling theorem is a central result in signal processing and forms the basis of analog-to-digital and digital-to-analog conversion in a variety of contexts involving signal encoding, transmission and detection. If we normalize
E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.015
2284
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
∞ the Fourier transform as fˆ (ω) = −∞ f (t)e−2πiωt dt, then the sampling theorem states that a function f ∈ L2 (R) with supp(fˆ ) ⊂ [− b2 , b2 ] can be expressed as a series of the form f (t) =
∞ k=−∞
ak
sin(π(bt − k)) , π(bt − k)
(1)
where ak = f (k) are its samples. Conversely, for a given collection of data {ak } ∈ l 2 , the series (1) defines a function in L2 (R) with supp(fˆ ) ⊂ [− b2 , b2 ] called the bandlimited interpolation of {ak }. The calculation or approximation of this series is a standard procedure in many applications. For example, in audio processing it is used for resampling signals at a higher rate, typically by applying a lowpass filter to the piecewise-constant zero order hold function of the samples [6]. In this paper, we consider the situation of bounded noise in the samples ak . Building on recent work by Boche and Mönich on related problems [3–5], we study some properties of the effect of the noise on the bandlimited interpolation f . Before we discuss our problems, it will be convenient to define the Paley–Wiener spaces for 1 p ∞ by b b p PW b = f ∈ Lp : supp(fˆ ) ⊂ − , , 2 2 where fˆ is interpreted in the sense of tempered distributions. Our notation PW b essentially follows Seip [12], and is slightly different from the one used by Boche and Mönich. Without loss of generality, we will set b = 1 in what follows. Returning to the series (1), we consider corrupted samples of the form ak = Tk + Nk , where Tk are the true samples and Nk is some form of noise, and we correspondingly write f (t) = T (t) + N(t). One obstacle we face is that the noise {Nk } may not naturally decay in time alongside the signal, and even if {Tk } ∈ l 2 , it is often more physically meaningful to consider {Nk } ∈ l ∞ . The WSK sampling theorem shows that for any collection of samples {ak } ∈ l 2 , there exists a unique function f ∈ PW 21 with f (k) = ak . However, for bounded samples {ak } ∈ l ∞ , the series (1) does not necessarily converge. In fact, a given {ak } ∈ l ∞ may correspond to multiple functions f ∈ PW ∞ 1 , or to no such function [3]. A simple example of the former possibility (non-uniqueness) is given by ak ≡ 0, which corresponds to the functions f (t) ≡ 0 and f (t) = sin(πt). It turns out that adding one extra sample to the collection {ak } resolves this ambiguity, and allows us to consider the unique bandlimited interpolation of any bounded data {ak } ∈ l ∞ . We discuss the details of this procedure in Section 3. The latter possibility (non-existence) is less obvious, but in [3], Boche and Mönich presented an explicit example of this phenomenon. They showed that for the samples given by ak = 0, k < 1, and ak = (−1)k / log(k + 1), k 1, there is no f ∈ PW ∞ 1 with f (k) = ak . It is also possible to construct other, similar examples using standard special functions, and we describe one such sequence of {ak } in Section 3 and discuss its properties. The main observation of this paper is that such examples of {ak } are in a sense “highly oscillating.” By assuming that the noise Nk is statistically incoherent and defining N (t) carefully, we can rule out these examples and obtain sharper statements on the behavior of N (t). More precisely, we show in Section 4 that if Nk is a uniformly distributed, independent white noise r process, then supr>0 2r1 −r |N (t)| dt < ∞ almost surely. In other words, the average of |N (t)| is p
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2285
globally bounded. We find that this result does not generally hold for {Nk } ∈ l ∞ that lack such a statistical condition, and we discuss examples that illustrate the differences. We also study a second topic motivated by further understanding N (t). As discussed in [7], the WSK series (1) can be interpreted as a discrete Hilbert transform operator H , mapping a space of samples into a space of bandlimited functions (see also [1] and [11]). The Plancherel p formula shows that H maps l 2 into PW 21 . In fact, H also maps l p into PW 1 for any 1 < p < ∞, and the series (1) converges for any {ak } ∈ l p [10]. This can be compared with the continuous Hilbert transform, and more generally any Calderon–Zygmund singular integral operator, which maps Lp into itself for any 1 < p < ∞. Such operators behave differently for p = ∞, mapping L∞ into the space BMO of functions with bounded mean oscillation [13]. It is thus reasonable to expect that if we consider samples {ak } ∈ l ∞ , the “right” target space for H may be one of bandlimited functions lying in the space BMO. However, this heuristic reasoning turns out to be incorrect. We consider bandlimited BMO functions in Section 5 and establish some of their properties. In particular, we find that such a function f is either in L∞ or that its samples {f ( ks )} are unbounded for any sampling rate s > 0. We exhibit a concrete example of such a function, and study it in the context of our other results. We review some existing theory on bandlimited functions and the space BMO in Section 2, and discuss some preliminary results in Section 3. The main results of the paper are presented in Sections 4 and 5. We also develop our results for a class of general, nonuniformly spaced interpolation points, given by zeros of sine-type functions. The above discussion for uniformly spaced points is a special case. 2. Background material We will write f1 f2 if the inequality f1 Cf2 holds for a constant C independent of f1 and f2 . We define f1 f2 similarly, and write f1 f2 if both f1 f2 and f1 f2 . For a set of points Y = {yk } and an extra element y, ˜ we denote the collection {yk } ∪ {y} ˜ by Y˜ , with Y˜ l p := (Y l p + |y| ˜ p )1/p and Y˜ l ∞ := max(Y l ∞ , |y|). ˜ These conventions will be used throughout the paper. p We first review a basic, alternative formulation of PW b , 1 p ∞. An entire function f is said to be of exponential type b if
b = inf β: f (z) eβ|z| , z ∈ C . We denote this by writing type(f ) = b, and by type(f ) = ∞ if b = ∞ or f is not entire. By p the Paley–Wiener–Schwartz theorem [9], PW b can be equivalently described as the space of all entire functions with type(f ) πb whose restrictions to R are in Lp . It also follows that p q p PW b ⊂ PW b for p < q. Functions f ∈ PW b satisfy the classical estimates f Lp πbf Lp and f (· + ic)Lp eπb|c| f Lp , respectively known as the Bernstein and Plancherel–Polya inequalities [10,12]. p There is a rich and well-developed theory of nonuniform sampling for functions in PW b . We only cover a few aspects of it that we will need in this paper, and refer to [12] and [15] for more details. We consider a sequence of points X = {xk } ⊂ R, indexed so that xk < xk+1 . The
2286
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
separation constant of X is defined by λ(X) = infk |xk+1 − xk |, and X is said to be separated if λ(X) > 0. The generating function of X is given by the product S(z) = z
δX
lim
r→∞
0<|xk |
z 1− , xk
(2)
where δX = 1 if 0 ∈ X and δX = 0 otherwise. For real and separated X, such a function S is said to be sine-type if the following conditions hold: (I) The product (2) converges and type(S) = πb < ∞. (II) For any ε > 0, there are positive constants C1 (ε) and C2 (ε) such that whenever dist(z, X) > ε, C1 (ε) e−πb| Im(z)| S(z) C2 (ε).
(3)
It can be shown that condition (II) is equivalent to requiring that the bounds (3) only hold in some half-plane {z: | Im(z)| c}, c > 0. Furthermore, a sine-type function S also satisfies the bounds |S (xk )| 1 and forces X to satisfy supk |xk+1 − xk | < ∞ [10]. Now suppose the sequence X = {xk } has a sine-type generating function S with type(S) = πb. p Let 1 < p < ∞. Then any f ∈ PW b can be expressed in terms of its samples ak = f (xk ), f (z) =
∞
ak
k=−∞
S (x
S(z) , k )(z − xk )
(4)
with uniform convergence on compact subsets of C. Conversely, for any {ak } ∈ l p , the series p (4) converges uniformly on compact subsets of C and defines a function f ∈ PW b with ak = f (xk ) [10]. The simplest example of a sequence X with a sine-type generating function is the uniform sequence xk = bk , for which S(z) = sin(πbz) and the expansion (4) reduces to the WSK samπb pling theorem. More generally, any finite union of uniform sequences has a sine-type generating function. As a more interesting example, the Bessel function J0 has real, separated zeros, sat-
2 isfies J0 (z) = J0 (−z), and has the asymptotic formula J0 (z) = πz cos(z − π4 )(1 + O( 1z )) as |z| → ∞ and | arg z| < π (see [14]). This implies that for sufficiently small ε > 0, S(z) = π(z+ε) zJ0 ( πz 2 )J0 ( 2 ) is a sine-type function with type(S) = π . Sequences X with sine-type generating functions are not the most general class for which f has an expansion of the form (4), but they have several convenient properties and cover some important cases encountered in applications, such as that of periodic interpolation points. Such sequences X and various properties of the series (4) have recently been studied in [4] in a computational context. The above results do not directly carry over to bounded functions f ∈ PW ∞ b , but in this case we still have the following theorem [2].
Theorem (Beurling). For a sequence X = {xk }, let N (X, I ) be the number of xk in an interval I . Then f L∞ f (X)l ∞ for all f ∈ PW ∞ b if and only if D − (X) := lim sup inf r→∞
a
N (X, [a, a + r)) > b. r
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2287
D − (X) is called the lower uniform density of X. For a uniform sequence xk = ks , D − (X) = s, and Beurling’s theorem implies that f ∈ PW ∞ b is uniquely determined by its samples if we oversample it beyond its Nyquist rate. We finally review a few properties of the Banach space BMO of functions with bounded mean oscillation, which has been studied extensively in connection with singular integral operators. It is defined by 1 f : f BMO = sup I |I | I
f (t) − 1 dt < ∞ , f (s) ds |I | I
where the supremum runs over all real intervals I . The quantity f BMO is technically a seminorm, since f BMO = f +cBMO for any constant c. Now for any g ∈ L1 , we denote its Hilbert ∞ g(t) transform by H g(z) := −∞ π(t−z) dt and its Riesz projections by P ± g := (g ± iH g)/2. We can then consider the “real” Hardy space H 1 (R), given by f : f H 1 (R) = f L1 + H f L1 < ∞ . Finally, it will also be useful to define the subspaces U1 = f ∈ C0∞ :
∞
f (t) dt = 0 , −∞
U2 = f ∈ H 1 (R): 1 + t 2 P + f (t) ∈ L∞ which are both norm dense in H 1 (R) [8,13]. These spaces are all closely related, as the following theorem shows. Theorem (Fefferman). BMO is the dual space of H 1 (R). More specifically, we have the inequality ∞ f (t)g(t) dt , f BMO sup g 1 g∈U H (R) 1
−∞
where U can be taken as U1 or U2 . Conversely, for any bounded linear functional L on H 1 (R), there is an f ∈ BMO with L f BMO . We write w = u + iv for the complex variable w in what follows. Let C± = {w: ±v > 0} be the upper and lower half-planes, and let P (w, t) = π1 (u−t)v2 +v 2 be the Poisson kernel on C+ . Now define the square Qa,r = {w: a < u < a + r, 0 < v < r}. A measure μ on C+ is said to μ(Q ) be a Carleson measure if we have N (μ) := sup( r a,r , a ∈ R, r > 0) < ∞. In other words, the measure μ of any square protruding from the real axis must be comparable to the length of its edge. The following theorem characterizes BMO in terms of such measures.
2288
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
∞ (t)| Theorem (Fefferman–Stein). Suppose −∞ |f dt < ∞, so that P (w, ·) f is well defined. t 2 +1 Then
2
1/2 f BMO N v ∇u,v P (w, ·) f du dv . (5) A detailed discussion of BMO and the significance of these theorems can be found in [8] or [13]. 3. Bandlimited interpolation of bounded data In this section, we establish a preliminary result showing how adding an extra sample allows us to treat the bandlimited interpolation of bounded data, such as the noise model discussed in Section 1. We define −2 −πb| Im(z)| |dz| < ∞ . z e (6) PW + = f entire: lim sup f (z) b r→∞
|z|=r
+ + The Plancherel–Polya inequality shows that PW ∞ b ⊂ PW b . Functions in PW b can be expanded in the following way.
Theorem 1. Suppose X = {xk } ⊂ R is separated and has a sine-type generating function S with ˜ ˜ type(S) = πb, and let x˜ ∈ / X. If f ∈ PW + b and A = f (X), then f (z) = a˜
∞ S(z) 1 S(z0 ) 1 + ak lim − , z0 →z S (xk ) z0 − xk S(x) ˜ x˜ − xk
(7)
k=−∞
with uniform convergence of compact subsets of C. Conversely, for any A˜ ∈ l ∞ , the series (7) converges uniformly on compact subsets of C and f ∈ PW + b. Proof. We use a standard complex variable argument. Assume z is in a closed ball B with z ∈ / X, and choose a real sequence {rn } with rn → ∞ and dist({rn }, X) > 0. We can then consider the integral
1 1 f (w)S(z) 1 − |dw|. J (rn ) := 2πi S(w) z − w x˜ − w |w|=rn
For sufficiently large n, it can be seen by calculating residues that
1 S(z) S(z) 1 . + J (rn ) = −f (z) + a˜ ak − S(x) ˜ S (xk ) z − xk x˜ − xk |xk |
The inequalities (3) and (6) imply that as rn → ∞, J (rn ) max S(z)(z − x) ˜ z∈B
|w|=rn
|f (w)|e−πb| Im(w)| |dw| → 0. |w|2
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2289
By letting z → xk for each xk ∈ B, we obtain the formula (7) for all z ∈ B. For the other direction of Theorem 1, we note that S has simple zeros at exactly X, so for z ∈ R, |S(z)| 2S L∞ dist(z, X). The Bernstein and Plancherel–Polya inequalities then show that for z ∈ C and d = supk |xk+1 − xk | < ∞,
S(z) SL∞ min dist(z, X), d eπb| Im(z)| . Now define the sets:
Re(w) − min 1/2, λ(X) , Re(w) + min 1/2, λ(X) ,
z I2 = −∞, Re(z) + x˜ /2 I1 ∪ I1x˜ ,
I3 = Re(z) + x˜ /2 + 1, ∞ I1z ∪ I1x˜ .
I1w =
Using the separation of X along with basic properties of lower Riemann sums, we have ∞ min(dist(z, X), d)|z − x| ˜ + eπb| Im(z)| Al ∞ f (z) aS(z) ˜ |z − xk ||x˜ − xk | k=−∞
|xk+1 − xk ||z − x| |xk − xk−1 ||z − x| ˜ ˜ πb| Im(z)| ˜ ∞ 1+ + Al e λ(X)|z − xk ||x˜ − xk | λ(X)|z − xk ||x˜ − xk | k∈Z∩I2 k∈Z∩I3
|z − x| ˜ ˜ l ∞ eπb| Im(z)| 1 + A dt |z − t||x˜ − t| R\(I1z ∪I1x˜ )
˜ l ∞ eπb| Im(z)| 1 + max log |z|, 0 , A which implies that f ∈ PW + b.
(8)
2
This expansion can be compared with the series (4). It is essentially a nonuniform version of the classical Valiron interpolation formula considered in [3], in which the derivative of f at a point is used instead of the extra sample a, ˜ but the form considered here will be more convenient ˜ for our purposes. We also mention that the extra point x˜ plays no special role in the collection X, and we isolate it mainly for notational convenience. If we pick any point xj ∈ X and let yk = xk for k = j , yj = x˜ and y˜ = xj , then Y˜ = {yk } ∪ y˜ satisfies the conditions of Theorem 1 too. ˜ For any A˜ ∈ l ∞ , we call the function f given by (7) the bandlimited interpolation of A˜ at X. / X, if g is the bandlimited interpolation of A∪{a˜ 2 } at X ∪{x˜2 }, Note that for any given a˜ 2 and x˜2 ∈ / X we then g(z) = f (z) + cS(z) for some constant c. Moreover, if A ∈ l 2 , then for any given x˜ ∈ can always choose a˜ so that f coincides with the series (4), or in the special case of uniformly spaced points X = { bk }, the usual bandlimited interpolation given by the WSK series (1). We discuss an example of a PW + 1 function that illustrates many of the typical properties of the (z) series (7). We use the uniform samples X = {k} and denote ψ(z) =
(z) , where is the usual gamma function. The properties of ψ are discussed in depth in [14]. ∞ Example. The function G1 (z) = sin(πz)ψ(−z) is in PW + 1 \PW 1 and satisfies ak = 0 for k < 0 k and ak = (−1) π for k 0.
2290
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
Fig. 1. Left: The function G1 (z). Right: The bandlimited interpolation of Boche and Mönich’s sequence.
The function ψ satisfies the estimate lim
|z|→∞, | arg z|<π
ψ(z) = 1, log z
(9)
˜ the so G1 is not bounded. With A = {ak } given as above, Theorem 1 shows that for any x˜ and a, (unique) bandlimited interpolation of A˜ at X˜ is of the form G1 (z) + c sin(πz). It follows that the samples A have no bandlimited interpolation in PW ∞ 1 . It will be instructive to isolate one property of G1 here. A classical formula of Gauss [14, p. 240] shows that for integer k > 0, k−1
1 2k−1 2 1 1 k = G1 −k − = (−1) + +C , G1 k − 2 2 m m m=1
(10)
m=k
so as z → ∞, |G1 (z)| grows logarithmically in between the integer samples. The same applies as z → −∞, even though the samples at k < 0 are all zero. This can be interpreted as a nonlocal effect, where the sustained growth of |G1 | on the positive real axis, caused by the “bad behavior” of the samples at k > 0, induces growth on the negative real axis too. This property can be seen in the graph of G1 in Fig. 1. It is also present in the bandlimited interpolation of Boche and Mönich’s example ak = 0, k < 1, and ak = (−1)k / log(k + 1), k 1, where we take x˜ = 12 and a˜ = 0. 4. Bandlimited interpolation of random data We can now state the main result of this paper. Theorem 2. Suppose X ⊂ R is separated and has a sine-type generating function S with type(S) πb, and let x˜ ∈ / X. Suppose also that A˜ = {ak } ∪ a˜ is a collection of i.i.d. random ˜ variables uniformly distributed in [−α, α]. Let f be the bandlimited interpolation of A˜ at X. Then almost surely, 1 sup r>0 2r
r −r
f (t) dt < ∞.
(11)
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2291
We make a few comments before proving Theorem 2. This result deals with the same situation discussed in Section 1, even though it has been formulated slightly differently. In the notation of Section 1, we can take Tk to be zero by linearity and only consider the noise Nk . As we saw in Section 3, the extra sample a˜ can be taken as deterministic and changed arbitrarily without affecting the result of Theorem 2. The exact probability distribution of A˜ is also of little significance here, and the result holds more generally for any symmetric, finitely supported distribution. We split the proof of Theorem 2 into three lemmas for clarity. Our approach is to write the function f as the sum of two parts, each with only zero samples in one direction along the real axis, and show that each one is almost surely bounded on that side. This shows directly that the nonlocal effect discussed in Section 3 does not occur. We then move to the deterministic setting and show that this one-sided boundedness forces a certain regularity upon the other side, resulting in the function having a bounded global average. For the rest of this section, we assume that X˜ and S are as given in Theorem 2, without repeating the conditions on them every time. Lemma 3. For k such that xk > 0, let {ak } be a collection of i.i.d. random variables uniformly distributed in [−α, α], let ak = 0 for all other k and let a˜ = 0. Suppose f is the bandlimited ˜ Then supt<0 |f (t)| < ∞ almost surely. interpolation of A˜ at X. Proof. We can assume that x0 = min(xk : xk > 0) and x˜ > 0, as the general case follows from the remarks after Theorem 1. Let bk = S (xk )(akx−x ˜ k ) . Then we have ∞
E(bk ) = 0
k=0
and the separation property shows that for some constant d, ∞
var(bk ) =
k=0
∞ 1 α2 2 3 S (xk ) (x˜ − xk )2 k=0
∞ 1 α2 3 (dist(x, ˜ X) + λ(X)|k − d|)2 k=0
< ∞. By Kolmogorov’s three-series theorem,
∞
k=0 bk
converges almost surely. Now let
∞ 1 f (t) ak 1 . = g(t) = − S(t) S (xk ) t − xk x˜ − xk k=0
∞ It is easy to check that if ∞ k=0 bk converges, then limt→−∞ g(t) = k=0 bk . Since |g(0)| < ∞, it follows by continuity that supt<0 |g(t)| < ∞ almost surely. We also have supt<0 |f (t)| supt<0 |g(t)|, which proves the lemma. 2
2292
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
˜ Then for each Lemma 4. For any A˜ ∈ l ∞ , let f be the bandlimited interpolation of A˜ at X. c > 0, f (· + ic) Al ∞ . S(· + ic) BMO Proof. Applying Fefferman’s duality theorem to the series (7) gives ∞ ∞
ak h(z) f (· + ic) 1 1 1 dz . sup − S(· + ic) (x ) z + ic − x h S x ˜ − x 1 k k k h∈U1 H (R) BMO −∞ k=−∞
Since h is finitely supported and the series (7) converges uniformly on compact sets, we can interchange the order of summation and integration. P + h and P − h are in L1 , so by analyticity we have f (· + ic) S(· + ic)
∞
∞ + P h(z) + P − h(z) ak h(z) dz sup − h S (x ) z + ic − x x ˜ − x k k k h∈U1 H 1 (R) BMO 1
k=−∞
−∞
∞ 2πi ak P − h(xk − ic) = sup S (xk ) h∈U1 hH 1 (R) k=−∞
Al ∞ sup h∈U1
1 hH 1 (R)
∞ − P h(xk − ic) . k=−∞
Since X is separated, an elementary property of Hardy spaces [10, p. 138] is that ∞ − P h(xk − ic) P − h
L1
hH 1 (R) ,
k=−∞
which completes the proof.
2
˜ Suppose that Lemma 5. For any A˜ ∈ l ∞ , let f be the bandlimited interpolation of A˜ at X. f (·+ic) 1 r supt<0 |f (t)| < ∞ and for some c > 0, S(·+ic) ∈ BMO. Then supr>0 2r −r |f (t)| dt < ∞. (z+i) Proof. We assume c = 1 without loss of generality. Let f ± (z) = f (z)e±πbiz , g(z) = fS(z+i) , ∞ |f (t)| M1 = supt<0 |f (t)| and M2 = supt<0 |g(t)|. The estimate (8) implies that −∞ t 2 +1 < ∞, so |f + | has a harmonic majorant on the upper half-plane (see [8]) and the reproducing formula f + (z) = P (z, ·) f + holds for Im(z) > 0. We can then estimate
0 ∞ + P (t + i, s) ds + f (s) P (t + i, s) ds sup f (t + i) sup M1 t<0
t<0
−∞
0
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
M1 1 + 2 π
∞ 0
2293
|f (s)| ds . s2 + 1
This shows that M2 < ∞. Now for any fixed r > 0, 1 2r
r −r
f (t + i) dt 1 2r 1 2r
r
g(t) dt
−r
r
g(t) dt −
0
g(t) dt + M2
−r
0
0 r r r 1 g(s) ds + g(t) dt − g(s) ds + M2 g(t) dt − 2r −r
0
−r
−r
r r 1 1 g(s) ds dt + M2 g(t) − r 2r −r
−r
2gBMO + M2 . We finally use a Poisson integral again to move back to the real line. For Im(z) < 1, we have f − (z) = P (z − i, ·) f − (· + i). This gives 1 2r
r −r
f (t) dt eπb 1 2r =e
πb
e
−r −∞
1 2πr
πb
r ∞
1 2r
∞
|f (s + i)| ds dt (t − s)2 + 1
f (s + i) arctan(r + s) + arctan(r − s) ds
−∞
2r
f (s + i) ds + 2
−2r
R\[−2r,2r]
|f (s + i)| ds . s2 + 1
Taking the estimate (8) into account again, we conclude that 1 sup 2r r>0
r
f (t) dt < ∞.
2
−r
We can now combine these lemmas to complete the proof. Proof of Theorem 2. For any A˜ ∈ l ∞ , we can write the bandlimited interpolation f of A˜ at X˜ as ˜ f (z) = f1 (z) + f2 (z) + aS(z) S(x) ˜ , where f1 (xk ) = 0 for xk < 0 and f2 (xk ) = 0 for xk 0. Applying Lemmas 3–5 on f1 (z) and f2 (−z) and noting that S ∈ L∞ finishes the proof. 2
2294
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
Fig. 2. Left: The function G2 (z) on [−100, 100]. Right: G2 (z) on [−5000, 5000].
The statistical incoherence in the samples A˜ in Theorem 2 is the reason we have the bounded ˜ As an illustration average property (11), and it does not generally hold for bounded samples A. of this, we return to the example function G1 from Section 3 and show that the average of |G1 (t)| is unbounded. It suffices to consider t < 0. Let T be the tent function ⎧ 0 < t 12 , ⎨ 2t T (t) = 2 − 2t 1 < t 1, (12) ⎩ 2 0 otherwise. 1 It is clear that | sin(πt)| ∞ n=−∞ T (t + n), and the formula (9) implies that |ψ(t)| 2 log |t| for sufficiently large t. This shows that ∞ 1 G1 (t) log(n)T (t + n). 2 n=2
0 It follows that as r → ∞, 1r −r |G1 (t)| dt log r → ∞. Fig. 2 shows an example of the bandlimited interpolation of random data. In the notation of Theorem 2, we use a realization of A˜ with α = 12 , and take xk = k and x˜ = 12 . We denote the resulting function by G2 . The graphs in Fig. 2 can be compared with the functions shown in Fig. 1 in Section 3. Unlike those functions, it can be seen that G2 does not steadily grow over long time intervals. Intuitively, this shows how the effect of noisy samples on the bandlimited interpolation is in a sense well controlled. 5. Bandlimited BMO functions In this section, we study some properties of bandlimited functions in the space BMO. Such functions have a somewhat different character than the examples we have seen so far. We fix a point c and define the space PW b to be the following PW b = f : type(f ) πb, f BMO,c := f (c) + f BMO < ∞ . The term |f (c)| resolves the ambiguity in the BMO seminorm for constant functions, and f BMO,c is a (full) norm. It will be shown below that the precise value of c is unimportant and ∞ (t)| dt < ∞ [8], that changing it gives an equivalent norm. Since f ∈ BMO always satisfies −∞ |f t 2 +1
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2295
the Paley–Wiener–Schwartz theorem implies that PW b ⊂ PW + b . We first give a version of the Plancherel–Polya inequality for PW b . Lemma 6. If f ∈ PW b , then f (· + ic)BMO f BMO eπb|c| . p
Proof. The proof is similar to the PW b case described in [12]. Define Rε± (z) = e∓(πb+ε) Im(z)
1 2r
r r 1 f (z + s) ds dt, f (z + t) − 2r
−r
−r
for complex z and real r. For each ε > 0, Rε+ is a subharmonic function satisfying |Rε+ (z)| f BMO for z ∈ R and max(log |Rε+ (z)|, 0) → 0 as z → i∞. Applying the Phragmen–Lindelöf principle over C+ gives |Rε+ (z + ic)| f BMO e(πb+ε)|c| for c 0, and we can repeat the argument with Rε− and C− for c < 0. Taking the supremum over real z and r and letting ε → 0 gives the inequality. 2 We will now establish several basic properties of PW b . Theorem 7. Let f ∈ PW b . Then the following statements hold. I: II: III: IV:
For each c ∈ R, f (· + ic) is uniformly Lipschitz continuous on R. For any fixed numbers c and c , f BMO,c f BMO,c . For any given z ∈ C, the point evaluation functional z → f (z) is bounded on PW b . f L∞ f BMO .
Proof. We set b = 1 without loss of generality. We can prove all of the above statements by using the reproducing kernel-like function K(c, t) =
2πN |c| sin t , πt (t − c) c
where c ∈ R\{0} and N is any integer greater than |c|. As a function of t, K(c, t) is entire and satisfies 2π type(K) < ∞. For any f ∈ PW + 1, ∞ f (t)K(c, t) dt = f (c) − f (0). −∞ c exp(2πiηN z/c)f (z) has poles This can be seen by observing that for η = ±1, the function z(z−c) at c and 0 with respective residues ηf (c) and −ηf (0). The estimation argument is very similar to the proof of Theorem 1, and we omit the details. We now suppose that f ∈ PW 1 . We want to approximate the H 1 (R) norm of K(c, t) − c 1 K(c , t), where c 1 and c 1. We first integrate the function π(z−s) z(z−c) exp(2πiηN z/c), where s ∈ R\{0, c}, and perform the same kind of calculation as before to find that
2296
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
1 c exp(2πiNs/c) c exp(−2πiNs/c) 1 − + + πs π(c − s) 2πs(c − s) 2πs(c − s) c(cos(2πNs/c) − 1) = . πs(c − s)
H K(c, s) = −
Let N = max(c, c ) and define the interval I w := [w − 12 , w + 12 ]. We first consider the case where 1 c 32 and |c − c | > 12 . Recalling that T is the tent function (12), we have K(c, ·) − K c , · 1 L
∞ ∞ 2cT (2N t/c + n) 2c T (2N t/c + n) + dt π|t (t − c)| π|t (t − c )| n=−∞
−∞
16N + π
R\(I 0 ∪I c )
2c dt + π|t (t − c)|
3 2
R\(I 0 ∪I c )
c − c . Now suppose that 1 c that
2c dt π|t (t − c )|
and |c − c | 12 , so that N = 2. Some elementary estimates show
K(c, ·) − K c , · 1 L 1/2 5/2 4 4 − dt + max 4 − sin(4πc/c ) , 4 − sin(4πc /c) dt c c c π(c − c ) c π(c − c) −1/2
+
1/2
c − c |t|−3/2 dt
R\(−1/2,5/2)
c − c .
Following the same arguments, we can also obtain the bound H K(c, ·) − H K(c , ·)L1 |c − c | for the above choices of c and c . By Fefferman’s duality theorem and the fact that K(c, ·) − K(c , ·) ∈ U2 , we have ∞
1 f (t) K(c, t) − K c , t dt f BMO K(c, ·) − K(c , ·)H 1 (R) f (c) − f (c ) , c − c
−∞
(13)
where the constant in the inequality is independent of c and c . Since the BMO seminorm is translation-invariant, the inequality (13) actually holds for all c, c ∈ R. Combining this with Lemma 6 proves (I) and letting c → c gives (IV). If we fix R = |c − c | > 0, this also shows that f BMO + |f (c)| |f (c )|, where the implied constant depends on R, and we can interchange c and c to get (II). Finally, the statement (III) is just (II) phrased in a different way. 2
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2297
Remark. The closure of the set of uniformly continuous BMO functions under the BMO seminorm is called VMO, for vanishing mean oscillation. Theorem 7(I) shows that PW b ⊂ VMO. Note that there are two non-equivalent definitions of VMO in the literature, and we use the one given in [8]. Remark. Theorem 7(IV) is a sharper form of the p = ∞ case of Bernstein’s inequality. We mention that the opposite inequality does not generally hold (even if f BMO is replaced by / PW b . f BMO,c ), and there are functions f such that f ∈ PW ∞ b but f ∈ Corollary 8. Let f ∈ PW b . Then either f ∈ PW ∞ b or there is no separated sequence X with D − (X) > 0 such that f (X) ∈ l ∞ . Proof. Suppose we have a separated X = {xk } with D − (X) > 0 and f (X) ∈ l ∞ . This means that for some large fixed r, every real interval I of length r contains a point xn ∈ X. Theorem 7(IV) then shows that for any t ∈ I , t f (t) = f (xn ) + f (u) du f (xn ) + rf BMO .
2
xn
Intuitively, Corollary 8 says that an unbounded PW b function is large in most places on the real line. It also shows that the bandlimited interpolation of bounded data A˜ ∈ l ∞ can never be in PW b unless it is actually in PW ∞ b . This occurs in spite of Lemma 4 and highlights a p basic difference between PW b and PW b , 1 < p < ∞. In Lemma 4, we generally cannot remove 1 from the inequality and conclude that f ∈ BMO. In contrast, for A ∈ l p , the the factor S(·+ic) (·+ic) series (4) can be used to find that fS(·+ic) ∈ Lp (see [10]), which clearly implies f (· + ic) ∈ Lp p and thus f ∈ L . We finally study an example of an unbounded PW b function that illustrates the “largeness” property described above.
Example. The function G3 (z) =
∞
πz k k=0 (−1) sin( 3·2k )
is in PW 1/3 \PW ∞ 1/3 .
To see this, we use the identity sin z = 2i1 (eiz − e−iz ) to write G3 = G3+ + G3− , where P (w, ·) G3± = G3± (w) for w ∈ C± , and then apply the Fefferman–Stein theorem (5) to each part. Let w = u + iv. We first note that by analyticity,
∇ P (w, ·) G3+ 2 = ∇G3+ (u + iv) 2 = 2 G (w) 2 . 3+ πz πz Since | sin 3·2 k | | 3·2k | for large k, the series defining G3 converges uniformly on compact sets, so we have 2 ∞ d 1 2
πi −k 2 w e3 N 2v G3+ (w) du dv = N 2v du dv dw 2i
N
2ve
− 2π 3 v
k=0
∞ π 3 · 2k k=0
2
du dv 2.
2298
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
Fig. 3. Left: The function G3 (z) on [−100, 100]. Right: The absolute value of G3 (z) on [0, 5000]. The peaks at powers of 2 are clearly visible, as well as a self-similarity effect at different scales.
Doing the same calculation with G3− , we find that G3 ∈ PW 1/3 . On the other hand, G3 satisfies the identity G3 (2z) = sin( 2πz 3 ) − G3 (z). This implies that for integer n 2, k n−1 n
π2 n n−k (−1) sin G3 2 = (−1) g3 (1) + 3 k=0 √
3 = (−1)n g3 (1) − (n − 2) , 2 / PW ∞ so G3 ∈ 1/3 . By Corollary 8, the samples G3 (X) are unbounded for any separated sequence X − with D (X) > 0. It is interesting to note that such a function can still be bounded on a sequence X that is “very sparse” in the sense that D − (X) = 0. It is easy to check that G3 (3 · 2n ) = (−1)n G3 (3) and G3 (−z) = −G3 (z), so G3 (X) ∈ l ∞ for the sequence xn = 3 · 2n sign(n). Some graphs of G3 are shown in Fig. 3. Acknowledgment The author would like to thank Professor Ingrid Daubechies for many valuable discussions in the course of this work. References [1] Y. Belov, T.Y. Mengestie, K. Seip, Unitary discrete Hilbert transforms, J. Anal. Math. (2009). [2] A. Beurling, Collected works of Arne Beurling, in: L. Carleson, P. Malliavin, J. Neuberger, J. Wermer (Eds.), Harmonic Analysis, in: Contemp. Math., vol. 2, Birkhäuser Boston, Boston, MA, 1989. [3] H. Boche, U.J. Mönich, On the behavior of Shannon’s sampling series for bounded signals with applications, Signal Process. 88 (2007) 492–501. [4] H. Boche, U.J. Mönich, Convergence behavior of non-equidistant sampling series, Signal Process. 90 (2009) 145– 156. [5] H. Boche, U.J. Mönich, Global and local approximation behavior of reconstruction processes for Paley–Wiener functions, Sampl. Theory Signal Image Process. 8 (1) (2009) 23–51. [6] R. Crochiere, L.R. Rabiner, Multirate Digital Signal Processing, Prentice–Hall, Englewood Cliffs, NJ, 1983. [7] C. Eoff, The discrete nature of the Paley–Wiener spaces, Proc. Amer. Math. Soc. 123 (2) (1995) 505–512. [8] J.B. Garnett, Bounded Analytic Functions, revised first ed., Grad. Texts in Math., Springer, New York, NY, 2007.
G. Thakur / Journal of Functional Analysis 260 (2011) 2283–2299
2299
[9] L. Hörmander, The Analysis of Linear Partial Differential Operators, Classics Math., vol. I, Springer, Berlin, Heidelberg, Germany, 2003. [10] B.Ya. Levin, Lectures on Entire Functions, Transl. Math. Monogr., vol. 150, Amer. Math. Soc., Providence, RI, 1996. [11] Y. Lyubarskii, K. Seip, Complete interpolating sequences and Muckenhoupt’s (Ap) condition, Rev. Mat. Iberoamericana 13 (2) (1997) 361–376. [12] K. Seip, Interpolation and Sampling in Spaces of Analytic Functions, Univ. Lecture Ser., vol. 33, Amer. Math. Soc., Providence, RI, 2004. [13] E.M. Stein, Harmonic Analysis: Real-variable Methods, Orthogonality and Oscillatory Integrals, Princeton Math. Ser., vol. 43, Princeton Univ. Press, Princeton, NJ, 1993. [14] E.T. Whittaker, G.M. Watson, A Course of Modern Analysis, Cambridge Math. Lib., fourth ed., Cambridge Univ. Press, Cambridge, UK, 1927. [15] R.M. Young, An Introduction to Nonharmonic Fourier Series, vol. 93, revised first ed., Academic Press, San Diego, CA, 2001.
Journal of Functional Analysis 260 (2011) 2300–2365 www.elsevier.com/locate/jfa
Global well-posedness of the Maxwell–Dirac system in two space dimensions Piero D’Ancona a , Sigmund Selberg b,∗ a Department of Mathematics, University of Rome “La Sapienza”, Piazzale Aldo Moro 2, I-00185 Rome, Italy b Department of Mathematical Sciences, Norwegian University of Science and Technology, Alfred Getz’ vei 1,
N-7491 Trondheim, Norway Received 13 August 2010; accepted 12 December 2010 Available online 30 December 2010 Communicated by I. Rodnianski
Abstract In recent work, Grünrock and Pecher proved that the Dirac–Klein–Gordon system in 2d is globally wellposed in the charge class (data in L2 for the spinor and in a suitable Sobolev space for the scalar field). Here we obtain the analogous result for the full Maxwell–Dirac system in 2d. Making use of the null structure of the system, found in earlier joint work with Damiano Foschi, we first prove local well-posedness in the charge class. To extend the solutions globally we build on an idea due to Colliander, Holmer and Tzirakis. For this we rely on the fact that MD is charge subcritical in two space dimensions, and make use of the null structure of the Maxwell part. © 2010 Elsevier Inc. All rights reserved. Keywords: Maxwell–Dirac equations; Well-posedness
Contents 1. 2. 3. 4. 5.
Introduction . . . . . . . . . . . . Main results . . . . . . . . . . . . From local to global solutions Preliminaries . . . . . . . . . . . . Local well-posedness . . . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
* Corresponding author.
E-mail addresses: [email protected] (P. D’Ancona), [email protected] (S. Selberg). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.010
. . . . .
. . . . .
2301 2305 2309 2312 2318
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
6. The quadrilinear estimate . . . . . . . . . . . . . . . . 7. Bilinear and null form estimates . . . . . . . . . . . . 8. Proof of the dyadic quadrilinear estimate, Part I . 9. Proof of the dyadic quadrilinear estimate, Part II . 10. Proof of the trilinear estimate . . . . . . . . . . . . . . 11. Estimates for the electromagnetic field . . . . . . . 12. Proof of Lemma 11.2 . . . . . . . . . . . . . . . . . . . s,b;p 13. Proof of the linear estimates in Xφ(ξ ) . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
2301
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
2320 2325 2328 2334 2342 2349 2360 2361 2364
1. Introduction The Maxwell–Dirac system (MD) describes the motion of an electron interacting with an electromagnetic field. Here we study the 2d (two space dimensions) case, where the electron is restricted to move in the (x 1 , x 2 )-plane. Then the electric field E is constrained to the same plane, the magnetic field B is perpendicular to it, and all fields depend only on (t, x 1 , x 2 ) (not on x 3 ), so we write x = (x 1 , x 2 ), and occasionally t = x 0 . The partial derivative with respect to x μ is denoted ∂μ for μ = 0, 1, 2; we write ∂t = ∂0 , and ∇ denotes the spatial gradient. The summation convention is in effect: Roman indices j, k, . . . run over {1, 2}, Greek indices μ, ν, . . . over {0, 1, 2}, and repeated upper/lower indices are implicitly summed over these ranges. Indices are raised and lowered using the metric diag(−1, 1, 1) on R1+2 . In terms of a potential A = {Aμ }μ=0,1,2 with Aμ : R1+2 → R, B = ∇ × A = (0, 0, ∂1 A2 − ∂2 A1 ),
E = ∇A0 − ∂t A,
where A = (A1 , A2 , 0) denotes the spatial part of A. Expressing Maxwell’s equations in terms of A, and imposing the Lorenz gauge condition ∂ μ Aμ = 0 ( ⇐⇒ ∂t A0 = ∇ · A), the MD system reads (see e.g. [12]) −iα μ ∂μ + Mβ ψ = Aμ α μ ψ, Aμ = −α μ ψ, ψ,
(1.1)
where ψ : R1+2 → CN is the Dirac spinor, M ∈ R is a constant and = ∂μ ∂ μ = −∂t2 + x is the D’Alembertian on R1+2 . Since we work in 2d, the smallest possible dimension of the spinor space is N = 2, and then for the 2 × 2 Dirac matrices we can take the representation α 0 = I2×2 , α 1 = σ 1 , α 2 = σ 2 , β = σ 3 , where the σ j are the Pauli matrices. Finally, ·,· is the standard C2 inner product. Recently there has been significant progress in the regularity theory for MD and the simpler Dirac–Klein–Gordon system (DKG), −iα μ ∂μ + Mβ ψ = φβψ, (1.2) − + m2 φ = βψ, ψ, where φ is real-valued and m ∈ R is a constant.
2302
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
A key question for both systems is whether global regularity holds, i.e. starting from smooth initial data, does the solution exist for all time and stay smooth? For small data this has been answered affirmatively by Georgiev [16] in 3d, but for large data there was until quite recently only the 1d result of Chadam [7]. To make progress on the large data question in 2d and 3d, a natural strategy is to study local (in time) well-posedness for rough data and exploit conservation laws to extend the solutions globally. But for both DKG and MD, the energy lacks a definite sign (see [17]), so the only conserved quantity that appears to be immediately useful is the charge: ψ(t)2 2 = const. L This constant will be called the charge constant in what follows. The charge conservation was of course a key ingredient in Chadam’s global result for 1d MD [7], later improved for the 1d DKG case by Bournaveas [5], in the sense that the regularity requirements were lowered to the charge class (data in L2 for the spinor and in some Sobolev space for the scalar field). Since then a number of papers improving the local and global theory for 1d DKG have appeared, see [13,1,22,26–28,31,32,23]. As the space dimension increases, however, it becomes much more difficult to prove local existence in the charge class, and therefore correspondingly difficult to exploit the charge conservation. Indeed, it was to take more than thirty years from the 1d result of Chadam until the next major breakthrough in the global theory was achieved quite recently by Grünrock and Pecher [19], who proved global well-posedness for 2d DKG. At the same time, but independently, Ovcharov [25] proved a corresponding result under a spherical symmetry assumption. Decisive improvements in the local theory have been made possible through the discovery, by the authors in joint work with Damiano Foschi, of the complete null structure of first DKG, in [11], and then MD, in [12], permitting significant progress compared to earlier local results such as [18,4,6,24,14,2], where at most partial null structure was used. In [19], Grünrock and Pecher use the DKG null structure combined with bilinear estimates similar to those used in [10], where in particular it was shown that 2d DKG is locally well-posed for data ψ(0) ∈ L2 R2 ,
φ(0) ∈ H 1/2 R2 ,
∂t φ(0) ∈ H −1/2 R2 ,
(1.3)
with a time of existence depending only on the size of the data norm. Thus, to get a global result it suffices—in view of the conservation of charge—to show that φ(t)
H 1/2 (R2 )
+ ∂t φ(t)H −1/2 (R2 )
cannot blow up in finite time. In fact, Grünrock and Pecher prove this for an equivalent norm which we shall denote D(t). In our reformulation, they prove: Theorem 1.1. (See [19].) The local solution of 2d DKG exists up to a time T > 0 determined by T 1/2 1 + D(0) = ε,
(1.4)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2303
where ε > 0 depends on the charge constant. Moreover, if D(0) 1 then sup D(t) D(0) + CT 1/2 ,
(1.5)
0tT
where C depends on the charge constant. Both DKG and MD are charge subcritical in 2d (whereas the 3d problems are charge critical). To be precise, the critical regularity determined by scaling is half a derivative below the regularity of the charge class data (1.3), hence the half power of T in (1.4) is optimal, and in fact so is the half power in (1.5). The fact that the two exponents add up to 1 enabled Grünrock and Pecher to apply a scheme devised by Colliander, Holmer and Tzirakis [8] to extend solutions globally. We recall the argument here since a modified version of it will be used for MD. Since the only possible impediment to global existence is D(t) becoming large, one may assume D(t) 1 for all t 0 for which the solution exists. Now as long as D(t) 2D(0), Theorem 1.1 can be applied repeatedly with a uniform time increment T given by T 1/2 [1 + 2D(0)] = ε. In view of (1.5) the theorem can be applied n times, where n is the smallest integer such that nCT 1/2 > D(0). In this way one covers a total time interval of length nT = nCT 1/2
1 1/2 ε ε ε > D(0) T D(0) = > 0, C C[1 + 2D(0)] C[3D(0)] 3C
the crucial point being that ε/3C is independent of D(0). Repeating the whole argument one can therefore cover a time interval of arbitrary length. The purpose of the present paper is to extend the result of Grünrock and Pecher to the full MD system. This adds significant difficulties since MD has a far more complicated null structure than DKG, and since instead of a single scalar field φ we have to deal with the electromagnetic field (E, B). Because of these additional difficulties, we have to face the following two issues, affecting the above global existence argument: (i) For MD we are only able to prove the analog of (1.5) up to a logarithmic loss in the factor T 1/2 , i.e. the term CT 1/2 on the right-hand side is replaced by CT 1/2 log(1/T ), where D(t) is now a certain norm of (E, B)(t) such that local existence holds up to a time 0 < T 1 determined by (1.4). (ii) The norm D(t) actually depends implicitly on T . Because of these issues, we are not able to apply the scheme of Colliander, Holmer and Tzirakis in its original form, but with some extra work—exploiting in particular a crucial monotonicity property of our data norm with respect to T —we are nevertheless able to obtain a global existence result. The detailed argument is given in Section 3, but as a warm-up we sketch here the argument in the much simpler situation where we ignore the implicit dependence of D(t) on T . The local result can then be iterated until nCT 1/2 log(1/T ) > D(0), giving a total time ≡ nT >
D(0) ε 1 1 ∼ ∼ , log(1/T ) C[1 + 2D(0)] log(1/T ) log D(0)
2304
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
where (1.4) was used. Moreover, one can easily show D() 3D(0), so by a further iteration one covers successive time intervals of length 1 , 2 , . . . such that j +1
1 log(3j D(0))
∼
1 j +1
for j 0, hence ∞ j =1 j = ∞. Some notation: The Fourier transforms on R2 and R1+2 are defined by f (ξ ) =
e−ix·ξ f (x) dx,
e−i(tτ +x·ξ ) u(t, x) dt dx,
u(X) =
R2
R1+2
u. where ξ ∈ R2 , τ ∈ R and X = (τ, ξ ). We also write F u = If A is a subset of R1+2 , or a condition describing such a set, the multiplier PA is defined by P u(X), A u(X) = χA (X) where χA is the characteristic function of A, and similarly if A ⊂ R2 . We write D = −i∇, and given h : R2 → C we denote by h(D) the multiplier defined by (ξ ) = h(ξ )f (ξ ). h(D)f The notation · is reserved for the L2 -norms on both R2 and R1+2 (which one it is will be clear from the context): f =
f (x)2 dx
1/2
u =
,
R2
u(t, x)2 dt dx
1/2 ,
R1+2
and similarly in Fourier space. For s ∈ R, the Sobolev space H s = H s (R2 ) is defined as the completion of the Schwartz space S(R2 ) with respect to the norm f H s = Ds f , s =B ˙ s (R2 ) is the completion of S(R2 ) with where ξ = (1 + |ξ |2 )1/2 . The Besov space B˙ 2,1 2,1 respect to the norm
f B˙ s =
2,1
N s P|ξ |∼N f ,
N >0
where N is understood to be dyadic, i.e. of the form 2j with j ∈ Z. In estimates we use the shorthand X Y for X CY , where C 1 is either an absolute constant or depends only on quantities that are considered fixed; X = O(R) is short for |X| R; X ∼ Y means X Y X; X Y stands for X C −1 Y , with C as above. We write for equality up to multiplication by an absolute constant (typically factors involving 2π ).
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2305
2. Main results 2.1. Local well-posedness We consider the initial value problem for 2d MD starting from data ψ(0, x) = ψ0 (x),
E(0, x) = E0 (x),
B(0, x) = B0 (x) = 0, 0, B03 ,
which by Maxwell’s equations [see (2.6) below] must satisfy ∇ · E0 = |ψ0 |2 and ∇ · B0 = 0. But the latter automatically holds in 2d, since B = (0, 0, B 3 ) does not depend on x 3 , whereas the constraint ∇ · E0 = |ψ0 |2 determines the curl-free part1 of E0 , so we only specify data Edf 0 for the divergence-free part Edf . Thus, −1 2 E0 = Edf 0 + ∇ |ψ0 | . The data for the potential A, Aμ (0, x) = aμ (x),
∂t Aμ (0, x) = a˙ μ (x)
(μ = 0, 1, 2),
are fixed by choosing a0 = a˙ 0 = 0. Then the spatial parts a = (a1 , a2 , 0) and a˙ = (a˙ 1 , a˙ 2 , 0) are given by, since ∇ · a = 0 by the Lorenz condition, a = −−1 ∂2 B03 , −∂1 B03 , 0 ,
a˙ = −E0 .
Solving the second equation in (1.1) and splitting Aμ into its homogeneous and inhomogeneous parts, we reduce MD to a nonlinear Dirac equation μ −iα μ ∂μ + Mβ ψ = Ahom. μ α ψ − N (ψ, ψ, ψ),
(2.1)
where = 0, Ahom. μ
Ahom. μ (0, x) = aμ (x),
∂t Ahom. ˙ μ (x), μ (0, x) = a
and N (ψ1 , ψ2 , ψ3 ) = −1 α μ ψ1 , ψ2 α μ ψ3 . Here −1 F denotes the solution of u = F on R1+2 with vanishing data at t = 0. 1 Recall the splitting of E (or indeed any vector field) into divergence-free and curl-free parts: E = −−1 ∇ × (∇ × E) + −1 ∇(∇ · E) ≡ Edf + Ecf .
2306
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Assuming the following data regularity: 2 2 ⎧ 2 ⎪ ⎨ ψ0 ∈ L R , C , −1/2 R2 , R2 , P|ξ |1 Edf 0 ∈H ⎪ ⎩ P|ξ |1 B03 ∈ H −1/2 R2 , R ,
2 2 ˙0 P|ξ |<1 Edf 0 ∈ B2,1 R , R , P|ξ |<1 B 3 ∈ B˙ 0 R2 , R , 0
(2.2)
2,1
we can prove existence up to a time T > 0 determined by a condition like (1.4) in Theorem 1.1, but with a norm depending implicitly on T , namely DT (t) = Edf (t)(T ) + B 3 (t)(T ) ,
(2.3)
where we use the norm · (T ) defined by f (T ) = P|ξ |1/T f H −1/2 + T 1/2
P|ξ |∼N f ,
(2.4)
0
the sum being over dyadic N ’s. Recall that · denotes the L2 -norm. Theorem 2.1. Given initial data as in (2.2), construct data for A by choosing a0 = a˙ 0 = 0 and setting a = −−1 (∂2 B03 , −∂1 B03 , 0) and a˙ = −E0 , and consider the 2d MD equation (2.1). There exists a constant ε > 0, depending only on |M| and the charge constant ψ0 2L2 , such that if T > 0 is so small that T 1/2 1 + DT (0) ε,
(2.5)
then (2.1) has a solution ψ ∈ C [−T , T ]; L2 R2 , C2 satisfying ψ(0) = ψ0 . Moreover, the solution is unique in a certain subspace of C([−T , T ]; L2 ), and depends continuously on the data. Persistence of higher regularity holds, and in particular, if the data ψ0 , 3 Edf 0 and B0 are smooth, then so is ψ . Here we mean solution in the sense of distributions on (−T , T ) × R2 . The fact that the righthand side of (2.1) makes sense as a distribution is far from obvious, but follows from the very estimates that will be used to close the iteration argument used to prove existence. As we show later (see Lemma 3.1), DT (0) CD1 (0) for 0 < T 1, hence (2.5) is indeed satisfied for T > 0 sufficiently small. 2.2. Growth estimate for the electromagnetic field Having obtained ψ , we reconstruct the full potential − −1 α μ ψ, ψ, Aμ = Ahom. μ
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2307
which by the definition of the data (aμ , a˙ μ ) satisfies the Lorenz gauge condition ∂ μ Aμ = 0 (see [12]). Now define B = ∇ × A = (0, 0, ∂1 A2 − ∂2 A1 ),
E = ∇A0 − ∂t A.
Since Aμ = −α μ ψ, ψ, it follows that Maxwell’s equations hold: ∇ · E = ρ,
∇ × E + ∂t B = 0,
∇ · B = 0,
∇ × B − ∂t E = J,
(2.6)
where ρ = J 0 = |ψ|2 ,
J = J 1, J 2, 0 ,
J μ = α μ ψ, ψ .
The first equation in (2.6) determines the curl-free part of E and implies E = Edf + −1 ∇ |ψ|2 , where Edf = Pdf E is the divergence-free part of E. Here Pdf = −−1 ∇×∇× is the projection onto divergence-free fields. From Maxwell’s equations we know that E = ∇ρ + ∂t J and B = −∇ × J, hence
Edf = Pdf (−∇J0 + ∂t J), Edf (0) = Edf ∂t Edf (0) = ∇ × 0, 0, B03 − Pdf J(0), 0,
(2.7)
and
B 3 = ∂1 J2 − ∂2 J1 , B 3 (0) = B03 ,
3 ∂t B 3 (0) = − ∇ × Edf 0 .
(2.8)
We want to use these wave equations to prove an estimate analogous to (1.5) in Theorem 1.1 for our norm DT (t). To be precise, we aim to prove sup DT (t) DT (0) + CT 1/2 log(1/T ), 0tT
but in order to avoid a constant factor C > 1 in front of the first term on the right-hand side, we first split the wave equations into first order equations and modify DT (t) accordingly. Recall that the splitting u = u+ + u− given by u± =
1 u ± i|D|−1 ∂t u 2
transforms u = F into −1 −i∂t ± |D| u± = − ±2|D| F.
(2.9)
2308
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
The term |D|−1 ∂t u in (2.9) causes problems at low frequency if u = Edf , however. To avoid this we use a general trick going back at least as far as [27], and used also in [19]: Adding −Edf to both sides of (2.7) gives the Klein–Gordon equation
( − 1)Edf = Pdf (−∇J0 + ∂t J) − Edf , Edf (0) = Edf ∂t Edf (0) = ∇ × 0, 0, B03 − Pdf J(0). 0,
(2.10)
The extra term −Edf on the right-hand side is relatively easy to handle due to the gain in regularity, and the key advantage is that we can now use the analog of (2.9) for the Klein–Gordon equation: The splitting v = v+ + v− given by v± =
1 v ± iD−1 ∂t v 2
(2.11)
transforms ( − 1)v = G into −1 −i∂t ± D v± = − ±2D G. df 3 3 3 Applying (2.11) to Edf and (2.9) to B 3 , we now write Edf = Edf + + E− and B = B+ + B− , where
df −1 df df −1 2Edf ∇ × 0, 0, B 3 − Pdf J , ± = E ± iD ∂t E = E ± iD 3 3 2B± = B 3 ± i|D|−1 ∂t B 3 = B 3 ± i|D|−1 − ∇ × Edf
(2.12) (2.13)
satisfy −1 −i∂t ± D Edf Pdf (−∇J0 + ∂t J) − Edf , ± = − ±2D 3 −1 −i∂t ± |D| B± = − ±2|D| (∂1 J2 − ∂2 J1 ).
(2.14) (2.15)
Define the corresponding norm df 3 3 D˜ T (t) = Edf + (t) (T ) + E− (t) (T ) + B+ (t) (T ) + B− (t) (T ) ,
(2.16)
and note that D˜ T (0) < ∞. Indeed, D˜ T (0) C D˜ 1 (0) by Lemma 3.1 below, and D˜ 1 (0) < ∞ in view of the assumption (2.2) and some straightforward Sobolev estimates for J [see (4.14) and (4.15) below]. Since DT (t) D˜ T (t) by the triangle inequality, the iteration argument used to prove Theorem 2.1 will also immediately give us: Theorem 2.2. Theorem 2.1 still holds with DT (0) replaced by D˜ T (0) in (2.5): T 1/2 1 + D˜ T (0) ε, where ε > 0 depends only on the charge constant and |M|.
(2.17)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2309
We shall prove the following growth estimate for D˜ T (t). Theorem 2.3. Let ψ be the solution of 2d MD obtained in Theorem 2.2, with existence time T 3 satisfying (2.17), and reconstruct the electromagnetic field as above. Then Edf ± and B± , as functions of t ∈ [−T , T ], describe continuous curves in the data space (2.2), hence the same is true df 3 3 3 for Edf = Edf + + E− and B = B+ + B− . Moreover, we have sup D˜ T (t) D˜ T (0) + CT 1/2 log(1/T ),
(2.18)
0tT
where C depends only on the charge constant and |M|. Combining Theorems 2.2 and 2.3, we shall obtain the global well-posedness: Theorem 2.4. The solution of 2d MD obtained in Theorem 2.2 extends globally in time. In particular, for smooth data the solution is smooth on R1+2 , so global regularity holds for 2d MD. The rest of this paper is organized as follows: In the next section we prove Theorem 2.4, in Section 4 we introduce various notation and function spaces needed for the proof of Theorems 2.1 and 2.2, given in Sections 5–10. Finally, in Section 11 we prove Theorem 2.3. 3. From local to global solutions Here we prove that if the conclusions of Theorems 2.2 and 2.3 hold, then the solutions extend globally in time, hence we obtain Theorem 2.4. We follow as closely as possible the argument outlined at the end of Section 1, but the fact that our norm depends implicitly on T creates some difficulties. To resolve these we rely crucially on the following monotonicity property of the norm (2.4): Lemma 3.1. There exists C > 1 such that for all 0 < S < T 1 and f ∈ S(R2 ), f (S) Cf (T ) . Proof. By definition, f (S) = P|ξ |1/S f H −1/2 + S 1/2
P|ξ |∼N f ,
0
but the second term is clearly bounded by
T 1/2
0
P|ξ |∼N f + S 1/2
P|ξ |∼N f ,
1/T N <1/S
where in turn the second term is bounded by an absolute constant times S 1/2
N <1/S
N 1/2 P1/T |ξ |<1/S f H −1/2 P1/T |ξ |<1/S f H −1/2 ,
2310
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
hence f (S) P|ξ |1/S f H −1/2 + P1/T |ξ |<1/S f H −1/2 + T 1/2
P|ξ |1/T f H −1/2 + T 1/2
P|ξ |∼N f
0
P|ξ |∼N f = f (T ) ,
0
where the implicit constants are absolute.
2
We now proceed in two steps, first iterating the local existence result with a fixed time increment. Then in the second step we iterate the entire first step. 3.1. First iteration Since D˜ T (0) C D˜ 1 (0), there clearly exists 0 < T 1 such that ε T 1/2 1 + D˜ T (0) = , 2
(3.1)
with ε as in (2.17). Then as long as D˜ T (t) 2D˜ T (0) we will have T 1/2 1 + D˜ T (t) ε, so that the solution can be continued on [t, t + T ], by Theorem 2.2. Thus we obtain existence on successive time intervals [0, T ], [2T , 3T ], . . . , [(n − 1)T , nT ], and in view of the estimate (2.18) from Theorem 2.3, we must stop at the first n for which nCT 1/2 log(1/T ) > D˜ T (0),
(3.2)
at which point we have covered a total time interval of length ≡ nT >
ε 1 1 D˜ T (0) ∼ ∼ , C log(1/T ) 2[1 + D˜ T (0)] log(1/T ) log D˜ T (0)
(3.3)
where we used the fact, justified below, that D˜ T (0) can be assumed as large as we like: D˜ T (0) 1,
(3.4)
log(1/T ) ∼ log D˜ T (0),
(3.5)
so in particular
in view of (3.1).
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2311
Moreover, we claim that D˜ T () 3D˜ T (0).
(3.6)
To see this, first note that by (3.2), and using (3.1), (3.4) and (3.5), n
D˜ T (0)2 , log D(0)
so by (3.4) we may assume n 1, and using the definition of n we then get n D˜ T (0) (n − 1)CT 1/2 log(1/T ) CT 1/2 log(1/T ), 2 which together with (2.18) proves (3.6). Finally, to justify (3.4), consider the maximal interval of existence [0, T ∗ ). We assume ∗ T < ∞, as otherwise we already have global existence and there is nothing to prove. But then by translating the time origin sufficiently close to T ∗ we may in fact assume T ∗ as small as we like, and we observe that (3.1) implies −1/2 D˜ T (0) ∼ T −1/2 > T ∗ for small T ∗ > 0. This proves (3.4). 3.2. Second iteration Now we iterate the first iteration, introducing a subscript j = 1, 2, . . . on T , n and belonging to the j -th iteration step. Define S0 = 0 and Sj = Sj −1 + j for j 1. The initial data at the j -th step are then taken at time t = Sj −1 , the time increment Tj is determined by the condition 1/2
Tj
ε 1 + D˜ Tj (Sj −1 ) = , 2
(3.7)
and the first iteration allows us to move forward by a time step j = n j T j ∼
1 , ˜ log DTj (Sj −1 )
(3.8)
so we reach the time Sj = Sj −1 + j , at which the data norm can at most have tripled in size: D˜ Tj (Sj ) 3D˜ Tj (Sj −1 ).
(3.9)
But in order to relate j +1 to j , we need to compare D˜ Tj +1 (Sj ) and D˜ Tj (Sj −1 ), whereas (3.9) only provides a comparison of D˜ Tj (Sj ) and D˜ Tj (Sj −1 ). We bridge this gap by the following argument:
2312
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
• If Tj +1 Tj , then Lemma 3.1 gives D˜ Tj +1 (Sj ) C D˜ Tj (Sj ) 3C D˜ Tj (Sj −1 ), where we used (3.9) at the end. • If Tj +1 > Tj , comparison of (3.7) for j and j + 1 gives D˜ Tj +1 (Sj ) < D˜ Tj (Sj −1 ). Thus, in both cases, D˜ Tj +1 (Sj ) 3C D˜ Tj (Sj −1 ) for j 1, and induction gives D˜ Tj +1 (Sj ) (3C)j D˜ T1 (0) for j 0, so by (3.8), j +1
1 log((3C)j D˜ T1 (0))
∼
1 j +1
for j 0, hence ∞
j +1 = ∞,
j =0
proving global existence. 4. Preliminaries In this section we prepare the ground for the proof of Theorem 2.2. 4.1. Function spaces As is usual, we split ψ = ψ+ + ψ− ,
ψ± ≡ Π ± ψ,
using the Dirac projections Π ± = Π(±D), defined in terms of the symbol 1 ξj Π(ξ ) = I2×2 + αj . 2 |ξ | The projections are self-adjoint and orthogonal, i.e. Π + Π − = Π − Π + = 0, so in particular ψ(t)2 = ψ+ (t)2 + ψ− (t)2 .
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2313
Now (2.1) splits into two equations: μ −i∂t ± |D| ψ± = −Π ± (Mβψ) + Π ± Ahom. μ α ψ − Π ± N (ψ, ψ, ψ),
(4.1)
and we introduce X s,b spaces corresponding to (−i∂t ± |D|). More generally, consider an equation of the form −i∂t + φ(D) u = F, s,b 1+2 ) where φ : R2 → R is a given function. Define Xφ(ξ ) (for s, b ∈ R) as the completion of S(R with respect to the norm
b u(τ, ξ )L2 , uXs,b = ξ s τ + φ(ξ ) τ,ξ
φ(ξ )
where 1/2 ξ = 1 + |ξ |2 . In fact, we use either φ(ξ ) = ±|ξ | or φ(ξ ) = ±ξ , but since τ ± |ξ | ∼ τ ± ξ , the corres,b s,b sponding norms are equivalent, hence the spaces X±|ξ | and X±ξ are identical, and we denote s,b them simply by X± . s,b , however, one can only get the estimates in Theorems 2.1 and 2.3 Estimating ψ± in X± 1/2 replaced by T 1/2−δ for arbitrarily small δ > 0. To avoid this loss, we use instead some with T s,b , as was done in [19]. Similar spaces have been used in [3] and [9]. Besov versions of X± s,b;1 s,b;∞ 1+2 ) with Specifically, we shall use Xφ(ξ ) and Xφ(ξ ) , defined as the completions of S(R respect to the norms
uXs,b;1 = φ(ξ )
Lb Ds Pτ +φ(ξ )∼L u,
L1
uXs,b;∞ = sup Lb Ds Pτ +φ(ξ )∼L u, φ(ξ )
L1
where L 1 is restricted to the dyadic numbers. The spaces corresponding to φ(ξ ) = ±|ξ | or φ(ξ ) = ±ξ coincide, and we simply write s,b;p
s,b;p
s,b;p
= X±|ξ | = X±ξ .
X± Restriction to the time-slab
ST = (−T , T ) × R2 is handled in the usual way. Define uXs,b;p (S φ(ξ )
T)
=
inf
v=u on ST
vXs,b;p . φ(ξ )
2314
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365 s,b;p
This is a seminorm on Xφ(ξ ) , but becomes a norm if we identify elements which agree on ST , and s,b;p
s,b;p
s,b;p
the resulting space is denoted Xφ(ξ ) (ST ). In other words, Xφ(ξ ) (ST ) is the quotient Xφ(ξ ) /M, s,b;p
s,b;p
where M = {v ∈ Xφ(ξ ) : v = 0 on ST }. Since M is a closed subspace of Xφ(ξ ) , we conclude s,b;p
from general facts about quotient spaces (see e.g. [15, Section 5.1]) that Xφ(ξ ) (ST ) is a Banach space. s,b;p
4.2. Basic properties of Xφ(ξ ) First observe that
for b < b ,
(4.2)
uv dt dx ,
(4.3)
uXs,b;1 Cb,b uXs,b ;∞ φ(ξ )
φ(ξ )
since L1 Lb−b < ∞ for dyadic L’s. Second, by standard methods one finds that uXs,b;1 = φ(ξ )
uXs,b;∞ = φ(ξ )
sup
v s.t. v
−s,−b;∞ =1 X φ(ξ )
uv dt dx ,
sup
v s.t. v
−s,−b;1 =1 X φ(ξ )
(4.4)
and similarly for spinor-valued u and v, replacing uv by u, v. Next, observing that by the Hausdorff–Young inequality followed by Hölder’s inequality one has Ds Pτ +φ(ξ )∼L u p 2 L1/2−1/p Ds Pτ +φ(ξ )∼L u (2 p ∞), L L t
x
it follows that uLp H s t
Ds Pτ +φ(ξ )∼L u
p
Lt L2x
L
uXs,1/2−1/p;1 ,
(4.5)
φ(ξ )
implying the embedding s,1/2;1
Xφ(ξ )
→ Ct H s
and also, writing ρT (t) = ρ(t/T ), where ρ is a smooth cutoff function satisfying ρ(t) = 1 for |t| 1 and ρ(t) = 0 for |t| 2, ρT u ρT Lp uL2p/(p−2) L2 T 1/p uX0,1/p;1 t
t
x
φ(ξ )
(2 p ∞).
(4.6)
Moreover, one has (see [19, Proposition 2.1(iii)]) ρT uXs,b;1 T 1/2−b uXs,1/2;1 φ(ξ )
φ(ξ )
for 0 < b 1/2.
(4.7)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2315
Finally, consider the solution of the initial value problem −i∂t + φ(D) u = F
u(0) = f,
on ST ,
(4.8)
given (for sufficiently regular f and F ) by the Duhamel formula u(t) = e−itφ(D) f +
t
e−i(t−t )φ(D) F t dt .
(4.9)
0
Then for any s ∈ R and 0 < T 1, the following estimates hold: uXs,1/2;1 (S
f H s + F Xs,−1/2;1 (S ) ,
uXs,1/2;1 (S
f H s + T 1/2+b F Xs,b;∞ (S
T)
φ(ξ )
T)
φ(ξ )
φ(ξ )
(4.10)
T
φ(ξ )
for − 1/2 < b < 1/2.
T)
(4.11)
See Section 13 for the proof, by standard methods. We remark that (4.11) is included in [19, Proposition 2.1], but only for −1/2 < b < 0. Moreover, we will need t sup e−i(t−t )φ(D) F t dt t∈R
Hs
0
(τ, ξ )| s |F dτ , ξ τ + φ(ξ ) L2
(4.12)
ξ
which is also proved in Section 13. 4.3. A Sobolev product estimate We will need the following elementary fact: Lemma 4.1. If a, b ∈ R satisfy a < 1 and a + b > 1, then for all f, g ∈ L2 (R2 ), −a |D| D−b (f g) Ca,b f g. Proof. Note that P|ξ
0 |N0
(f g) N0 f g
(4.13)
by Plancherel and Cauchy–Schwarz: (f g) χ|ξ0 |N0 f (ξ1 )
g (ξ0 − ξ1 ) dξ1 0 |N0
P|ξ
L2ξ
0
Thus
χ|ξ0 |N0 L2 f
g . ξ0
2316
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
−a−b −a |D| D−b (f g) P|ξ |∼N (f g) N0−a P|ξ0 |∼N0 (f g) + N0 0 0 N0 1
0
N01−a +
N01−a−b f g,
N0 1
0
and the last two sums are finite if and only if a < 1 and a + b > 1.
2
In particular, we then obtain the following estimates for the current, already used in Section 2 to see that the data for Edf ± are in the correct space. First, P|ξ
0 |∼N0
2 2 J(t) N0 ψ(t) ∼ ψ(t) ,
0
(4.14)
0
where (4.13) was used. Second, J(t)
H −3/2
2 ψ(t) ,
(4.15)
by Lemma 4.1. 4.4. Some special sets For N, L 1, r, γ > 0 and ω ∈ S1 , where S1 ⊂ R2 is the unit circle, define Γγ (ω) = ξ ∈ R2 : θ (ξ, ω) γ , Tr (ω) = ξ ∈ R2 : |Pω⊥ ξ | r , KL± = (τ, ξ ) ∈ R1+2 : τ ± |ξ | ∼ L , ± KN,L = (τ, ξ ) ∈ R1+2 : ξ ∼ N, τ ± |ξ | ∼ L , ± KN,L,γ (ω) = (τ, ξ ) ∈ R1+2 : ξ ∼ N, ±ξ ∈ Γγ (ω), τ ± |ξ | ∼ L , Hd (ω) = (τ, ξ ) ∈ R1+2 : |τ + ξ · ω| d , where θ (a, b) denotes the angle between nonzero vectors a, b ∈ R2 and Pω⊥ is the projection onto the orthogonal complement ω⊥ of ω in R2 . For later use we note the elementary fact (see [12]) that ± (ω) ⊂ Hmax(L,N γ 2 ) (ω). KN,L,γ
We shall also need the following: Lemma 4.2. Suppose N, d, γ > 0. The estimate
χHd (ω) (τ, ξ ) 1 +
ω∈Ω(γ )
holds for all (τ, ξ ) ∈ R1+2 with |ξ | ∼ N .
d Nγ 2
1/2
(4.16)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2317
Proof. The left side equals #{ω ∈ Ω(γ ): ω ∈ A} where A is the set of ω ∈ S1 such that |τ + ξ · ω| d. Without loss of generality assume ξ = (|ξ |, 0). Then 1 2 d τ 1 1 +O . A ⊂ A ≡ ω = ω ,ω ∈ S : ω = − |ξ | N Thus, A is the intersection of S1 and a strip of thickness comparable to d/N , so length(A ) . # ω ∈ Ω(γ ): ω ∈ A 1 + γ But length(A ) (d/N)1/2 , and the proof is complete.
2
4.5. Angular decompositions For γ ∈ (0, π], let Ω(γ ) denote a maximal γ -separated subset of the unit circle. We recall the following angular Whitney decomposition: Lemma 4.3. We have 1∼
χΓγ (ω1 ) (ξ1 )χΓγ (ω2 ) (ξ2 ),
0<γ <1 ω1 ,ω2 ∈Ω(γ ) γ dyadic 3γ θ(ω1 ,ω2 )12γ
for all ξ1 , ξ2 ∈ R2 \ {0} with θ (ξ1 , ξ2 ) > 0. The straightforward proof is omitted. The condition θ (ω1 , ω2 ) 3γ ensures that the sectors Γγ (ω1 ) and Γγ (ω2 ) are well separated. If separation is not needed, it is better to use the following variation (again, we skip the easy proof): Lemma 4.4. For any 0 < γ < 1 and k ∈ N,
χθ(ξ1 ,ξ2 )kγ
χΓγ (ω1 ) (ξ1 )χΓγ (ω2 ) (ξ2 ),
ω1 ,ω2 ∈Ω(γ ) θ(ω1 ,ω2 )(k+2)γ
for all ξ1 , ξ2 ∈ R2 \ {0}. Writing uγ ,ω = P±ξ ∈Γγ (ω) u for a given sign, we note that u2 ∼
uγ ,ω 2
(4.17)
ω∈Ω(γ )
and (given signs ±1 and ±2 )
γ ,ω1 γ ,ω2 u u u1 u2 , 1
ω1 ,ω2 ∈Ω(γ ) θ(ω1 ,ω2 )γ
2
(4.18)
2318
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
where we used the Cauchy–Schwarz inequality, (4.17) and the fact that, given ω2 , the set of ω1 ∈ Ω(γ ) satisfying θ (ω1 , ω2 ) kγ has cardinality at most 2k + 1. 5. Local well-posedness The iterates {ψ± }∞ n=−1 for (4.1) are defined in the standard way, i.e. ψ± (n)
(−1)
is taken to be
(n) is obtained by solving (4.1) on ST with identically zero, and in the general inductive step, ψ± (n−1) the previous iterate ψ± inserted on the right-hand side, and with initial data Π ± ψ0 . Note that (n) (n) Π ± ψ± = ψ± on ST . We shall estimate the iterates in the norm (n) (n) pn (T ) = ψ+ X0,1/2;1 (S ) + ψ− X0,1/2;1 (S ) , +
−
T
T
where T > 0 remains to be fixed. We also need estimates for the difference of two successive iterates, (n) ψ − ψ (n−1) 0,1/2;1 qn (T ) = . ± ± X (S ) ±
±
T
We claim that to prove Theorem 2.1, it suffices to show, for 0 < T 1, pn+1 (T ) C1 + C2 T 1/2 1 + DT (0) pn (T ) + C3 T δ pn (T )3 , qn+1 (T ) C2 T 1/2 1 + DT (0) qn (T ) + C3 T δ pn (T )2 qn (T ),
(5.1) (5.2)
where C1 and C2 depend on the charge constant, C2 depends in addition on |M|, C3 is an absolute constant, and δ > 0 is some small number. In fact, the verification of the above claim consists of a completely standard argument, which we only sketch here. First one uses (5.1) to verify that pn (T ) 2C1
(5.3)
for all n if T > 0 is small enough. Indeed, this clearly holds for n = −1 and all 0 < T 1, and then it follows for all n 0 by induction, provided that 2C2 T 1/2 [1 + DT (0)] 1/2 and 8C12 C3 T δ 1/2. The latter condition simply says that T ε for some ε > 0 depending only on the charge constant, whereas the former (and stronger) condition says that T 1/2 1 + DT (0) ε for some ε > 0 depending only on the charge constant and M, so this is exactly condition (2.5) in Theorem 2.1. Second one uses (5.2) to verify that, with the same condition on T , the sequence of iter0,1/2;1 (n) ates ψ± is Cauchy in X± (ST ), hence converges in that space to a solution of 2d MD on ST = (−T , T ) × R2 . Indeed, (5.2) implies qn+1 (T ) 12 qn+1 (T ). This proves the local existence part of Theorem 2.1. Uniqueness in the iteration space follows by (5.2) (or rather its analog for the difference of any two solutions instead of two iterates).
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2319
Finally, continuous dependence on the data and persistence of higher regularity follow from standard arguments which we do not repeat here. Note that the same argument immediately gives Theorem 2.2, since we can apply the estimate DT (0) D˜ T (0) in the right-hand sides of (5.1) and (5.2). So we need to prove (5.1) and (5.2). The first term on the right-hand side of (5.1) comes from applying (4.10) to the homogeneous (0) (n+1) part ψ± of ψ± , while the remaining terms come from the inhomogeneous part, which we split into three parts corresponding to the three terms on the right-hand side of (4.1). Applying (4.11) with b = 0 and b = −1/4, respectively, to the first two terms, and (4.10) to third, we reduce (5.1) [and in fact also (5.2), since all the terms in (4.1) are either linear or trilinear in ψ] to the following three estimates, where ±1 , . . . , ±4 denote independent signs and the implicit constants are absolute. First, we need MΠ ±2 βψX0,0;∞ (S
T)
±2
|M|ψX0,1/2;1 (S ) , ±1
T
0,0;∞ 0,0;∞ but this is trivial since X± = X± . Second, we need 2 1
Π ± Ahom. α μ Π ± ψ1 0,−1/4;∞ μ 2 1 X (S
T)
±2
T 1/4 ψ0 2 + DT (0) ψ1 X0,1/2;1 (S ) , ±1
T
and third, Π ± N (Π ± ψ1 , Π ± ψ2 , Π ± ψ3 ) 0,−1/2;1 4 1 2 3 X (S ±4
T
Tδ )
3 j =1
ψj X0,1/2;1 (S ) . ±j
T
It suffices to prove these without the restriction to ST = (−T , T ) × R2 , but of course we can then insert a smooth time cutoff ρT (t) = ρ(t/T ), where ρ(t) = 1 for |t| 1 and ρ(t) = 0 for |t| 2. By (4.3) and (4.4) we therefore reduce to proving ± ,± I 1 2 T 1/4 ψ0 2 + DT (0) ψ1
0,1/2;1 1
X±
ψ2 X0,1/4;1 ±2
(5.4)
and ± ,...,± 4 T δ ψ J 1 1 X 0,1/2;1 ψ2 X 0,1/2;1 ψ3 X 0,1/2;1 ψ4 X 0,1/2;∞ , ±1
±2
±3
±4
(5.5)
where I ±1 ,±2 = J ±1 ,...,±4 =
μ ρAhom. α Π ±1 ψ1 , Π ±2 ψ2 dt dx, μ ρ−1 α μ Π ±1 ψ1 , Π ±2 ψ2 · α μ Π ±3 ψ3 , Π ±4 ψ4 dt dx,
and the ψj ∈ S(R1+2 ) are C2 -valued. Moreover, we can freely replace ψj by ρT ψj in the above integrals whenever it may be needed.
2320
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
We concentrate first on the quadrilinear estimate (5.5), proved in the next four sections by adapting the proof of the analogous estimate in 3d from [12]. We make a dyadic decomposition, use the null structure of the quadrilinear form in the integral, reduce to various L2 bilinear estimates, and finally sum the dyadic pieces to obtain (5.5). The main difference from the 3d case is that the L2 bilinear estimates are different in 2d; the estimates we need have been proved by the second author in [30]. The trilinear estimate (5.4) is proved in Section 10. 6. The quadrilinear estimate Here we begin the proof of (5.5). First we switch to Fourier variables in J ±1 ,...,±4 by Plancherel’s theorem. To this end we recall the following representation of −1 , derived from Duhamel’s formula (see [21, Lemma 4.4]). Lemma 6.1. Given G ∈ S(R1+2 ), set u = −1 G and consider the splitting u = u+ + u− defined by (2.9). Then e∓it|ξ | u ± (t, ξ ) = ± 4π|ξ |
∞ −∞
eit (τ ±|ξ |) − 1 G τ , ξ dτ . τ ± |ξ |
Moreover, multiplying by the cutoff ρ(t) and taking Fourier transform also in time, ∞ ρu
± (τ, ξ ) = −∞
κ± (τ, τ ; ξ ) G τ , ξ dτ , 4π|ξ |
where
(τ ± |ξ |) ρ
(τ − τ ) − ρ κ± τ, τ ; ξ = ± τ ± |ξ | and ρ
(τ ) denotes the Fourier transform of ρ(t). j |, where zj : R1+2 → C2 with |zj | = 1, and applying the convolution j = zj |ψ Thus, writing ψ formula 12 u u (X ) u 1 (X1 )u 2 (X2 ) dμ12 (6.1) 1 2 0 X0 , dμX0 ≡ δ(X0 − X1 + X2 ) dX1 dX2 , twice, we see that it suffices to prove (5.5) for J ±0 ,±1 ,...,±4 =
κ±0 (τ0 , τ0 ; ξ0 ) j (Xj ) dμ12 dμ43 q1234 ψ X0 dτ0 dτ0 dξ0 , X0 |ξ0 |
where X0 = (τ0 , ξ0 ), X0 = (τ0 , ξ0 ), Xj = (τj , ξj ) for j = 1, . . . , 4, q1234 = α μ Π(e1 )z1 (X1 ), Π(e2 )z2 (X2 ) α μ Π(e3 )z3 (X3 ), Π(e4 )z4 (X4 )
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2321
and ej = ±j ξj /|ξj |. We may restrict the integration to ξj = 0 for j = 0, . . . , 4, hence the unit vectors ej are well defined, as are the angles θj k = θ (ej , ek ) = θ (±j ξj , ±k ξk ), in terms of which the null structure of q1234 will be expressed. Note that X0 = X1 − X2 , τ0
= τ1 − τ2 ,
X0 = X4 − X3 ,
τ0 = τ4 − τ3 ,
ξ0 = ξ1 − ξ2 = ξ4 − ξ3 ,
in the above integral. For simplicity we will just write J instead of J ±0 ,±1 ,...,±4 from now on. Split J = J|ξ0 |<1 + J|ξ0 |1 by restricting the integration to |ξ0 | < 1 and |ξ0 | 1, respectively. We first dispose of the easy low frequency part. 6.1. Estimate for J|ξ0 |<1 From Plancherel’s theorem one infers 1/2 P|ξ |<1 f B(0, 1) f L1 , where B(0, 1) = {ξ ∈ R2 : |ξ | < 1}. Applying also ρ−1 F F , which follows from [21, Lemma 4.3], we estimate J|ξ0 |<1 ρ−1 P|ξ |<1 α μ Π ±1 ψ1 , Π ±2 ψ2 P|ξ |<1 α μ Π ±3 ψ3 , Π ±4 ψ4 P|ξ |<1 α μ Π ±1 ψ1 , Π ±2 ψ2 P|ξ |<1 α μ Π ±3 ψ3 , Π ±4 ψ4 α μ Π ±1 ψ1 , Π ±2 ψ2 L2 L1 α μ Π ±3 ψ3 , Π ±4 ψ4 L2 L1 t
t
x
x
ψ1 L4 L2 ψ2 L4 L2 ψ3 L4 L2 ψ4 L4 L2 . t
x
t
x
t
x
t
x
Recalling that we can replace ψj by ρT ψj , we then get the desired estimate (5.5) for the low frequency part by applying (4.5) and (4.7) to the norms of ψ1 , ψ2 and ψ3 , whereas for ψ4 we use (4.5) followed by (4.2). 6.2. Dyadic decomposition of J|ξ0 |1 Letting N ’s and L’s denote dyadic numbers greater than or equal to one, we assign dyadic sizes to the weights, writing τ0 ±0 |ξ0 | ∼ L0 , τj ±j |ξj | ∼ Lj and ξj ∼ Nj for j = 0, . . . , 4, 012 and we set N = (N0 , . . . , N4 ) and L = (L0 , L0 , L1 , . . . , L4 ). We shall use the shorthand Nmin for the minimum of N0 , N1 and N2 , and similarly for other index sets than 012, for the L’s, and for maxima. Since ξ0 = ξ1 − ξ2 in J , one of the following must hold:
2322
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
“low output” , 12 12 N0 ∼ Nmax “high output” , Nmin
N0 N1 ∼ N2
and similarly for the index 034. In particular, the two largest of N0 , N1 and N2 must be compa012 N 012 ∼ N N 12 . rable, and Nmin 0 min max As shown in [12], κ± (τ0 , τ0 ; ξ0 ) (L0 L0 )−1/2 σL0 ,L (τ0 − τ0 ), where 0
σL0 ,L0 (r) =
r−2 (L0 L0 )−1/2
if L0 ∼ L0 , otherwise,
hence |J|ξ0 |1 |
JN,L , N0 (L0 L0 )1/2
N ,L
where JN,L =
|q1234 |σL0 ,L0 τ0 − τ0 χK ±0
N0 ,L0
×
4
χ
j =1
±j j ,Lj
KN
(X0 )χK ±0
N0 ,L0
X0
j (Xj ) dμ12 dμ43 (Xj )ψ X0 dτ0 dτ0 dξ0 . X 0
To ease the notation we define uj (implicitly depending on Nj , Lj and ±j ) by u j = χ
±j j ,Lj
KN
j |. |ψ
± Recall that KN,L = {(τ, ξ ) ∈ R1+2 : ξ ∼ N, τ ± |ξ | ∼ L}. We claim that it suffices to prove, for some ε > 0,
1/2−ε JN ,L N01−ε L0 L0 L1 L2 L3 L4 u1 u2 u3 u4 .
(6.2)
Indeed, this gives |J|ξ0 |1 |
(L1/2−ε u1 )(L1/2−ε u2 )(L1/2−ε u3 )(L1/2 u4 ) 1
2
N ,L
3
4
N0ε (L0 L0 L4 )ε
,
and we sum the N ’s using the general estimate N0 ,N1 ,N2
−ε/2
N0
a N1 b N2 Cε
N1
2 aN 1
1/2
1/2 2 bN 2
,
(6.3)
N2
valid for nonnegative sequences aN1 , bN2 and dyadic N0 , N1 , N2 1, the largest two of which are assumed comparable. By symmetry it suffices to consider N0 N1 ∼ N2 and N1 N0 ∼ N2 .
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2323 −ε/2
First, if N0 N1 ∼ N2 , then we sum N1 ∼ N2 by Cauchy–Schwarz, and N0 using N0 . Sec−ε/2 −ε/4 −ε/2 ond, if N1 N0 ∼ N2 , then we estimate N0 N0 N1 , so we can sum both N1 and N0 ∼ N2 without problems. Applying (6.3) to the estimate for |J|ξ0 |1 | above, we get
|J|ξ0 |1 |
−ε L0 L0 L4
3 j =1
L
1/2−ε Lj P ±j ψj K Lj
1/2
L4 PK ±4 ψ4 L4
ψ1 X0,1/2−ε;1 ψ2 X0,1/2−ε;1 ψ3 X0,1/2−ε;1 ψ4 X0,1/2;∞ . ±1
±2
±3
±4
Since we may replace ψj by ρT ψj , we now get (5.5) for J|ξ0 |1 by applying (4.7) to the norms of ψ1 , ψ2 and ψ3 . So we have reduced (5.5) to proving the dyadic estimate (6.2). For this, we need to use the null structure of the quadrilinear form, obtained in [12]: Lemma 6.2. (See [12].) Consider the symbol appearing in J , q1234 = α μ Π(e1 )z1 , Π(e2 )z2 α μ Π(e3 )z3 , Π(e4 )z4 , where the ej ∈ R2 and zj ∈ C2 are unit vectors. Defining the angles θj k = θ (ej , ek ),
φ = min{θ13 , θ14 , θ23 , θ24 },
we have |q1234 | θ12 θ34 + φ max(θ12 , θ34 ) + φ 2 . When applying this, it is natural to distinguish the cases φ min(θ12 , θ34 ),
(6.4)
min(θ12 , θ34 ) φ max(θ12 , θ34 ),
(6.5)
max(θ12 , θ34 ) φ.
(6.6)
In certain situations, the last two cases can be treated simultaneously, by virtue of the following simplified estimate: Lemma 6.3. (See [12].) In cases (6.5) and (6.6), |q1234 | θ13 θ24 . To end this section we prove the dyadic estimate (6.2) in the case (6.4). This particularly simple case essentially corresponds, as discussed in [12], to solving the Dirac–Klein–Gordon system instead of Maxwell–Dirac. The cases (6.5) and (6.6) are far more difficult and will be handled in the next few sections.
2324
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
6.3. The case φ min(θ12 , θ34 ) Then |q1234 | θ12 θ34 , hence
±
JN,L
TL 0,L F PK ±0 0
N0 ,L0
0
Bθ12 (u1 , u2 )(X0 ) · F PK ±0
N0 ,L0
Bθ34 (u3 , u4 )(−X0 ) dX0 ,
where the null form Bθ12 (u1 , u2 ) is defined on the Fourier transform side by inserting the angle θ12 = θ (±1 ξ1 , ±2 ξ2 ) in the right-hand side of the convolution formula (6.1), and the operator ± TL 0,L is defined by 0
0
±
TL 0,L F (τ0 , ξ0 ) = 0
0
± aL 0,L τ0 , τ0 , ξ0 F τ0 , ξ0 dτ0 , 0
0
where ± aL 0,L τ0 , τ0 , ξ0 = 0 0
τ0 − τ0 −2
(L0 L0 )−1/2 χτ0 ±0 |ξ0 |=O(L0 ) χτ0 ±0 |ξ0 |=O(L0 )
if L0 ∼ L0 , otherwise.
This family of operators is uniformly bounded on L2 (see [12, Lemma 3.3]): ±
Lemma 6.4. TL 0,L F F for F ∈ L2 (R1+2 ). 0
0
Applying this, we get JN ,L PK ±0
N0 ,L0
Bθ12 (u1 , u2 )PK ±0
N0 ,L0
Bθ34 (u3 , u4 ),
and to finish we use the following null form estimate (proved in the next section): ±
Lemma 6.5. For all u1 , u2 ∈ L2 (R1+2 ) such that u j is supported in KNjj,Lj , P
±
KN 0,L 0
Bθ12 (u1 , u2 ) (N0 L0 L1 L2 )3/8 u1 u2 .
0
Thus, 3/8 JN ,L N0 L0 L1 L2 (N0 L0 L1 L2 )3/8 u1 u2 u3 u4 , proving (6.2) in the case φ min(θ12 , θ34 ). In the next section we prepare the ground for the proof of the other cases, by recalling various bilinear and null form estimates proved in [30]. In particular, we prove Lemma 6.5.
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2325
For later use we record here the following variation on Lemma 6.4: Lemma 6.6. (See [12].) Assume that L0 L0 or L0 L0 . Let ω, ω ∈ S1 , c, c ∈ R and d, d > 0. For F, G ∈ L2 (R1+2 ) satisfying τ 0 , ξ0 : τ 0 + ξ0 · ω = c + O d , supp G ⊂ (τ0 , ξ0 ): τ0 + ξ0 · ω = c + O(d) , supp F ⊂
we have, for any 0 p 1/2, ±0 T F L ,L 0
0
d L0
p F ,
and p T ±0 F (τ0 , ξ0 ) · G(τ0 , ξ0 ) dτ0 dξ0 dd F G. L0 ,L0 L L 0 0
7. Bilinear and null form estimates A key ingredient needed for the proof of Lemma 6.5 is: ±
Theorem 7.1. (See [30].) For all u1 , u2 ∈ L2 (R1+2 ) such that u j is supported in KNjj,Lj , the estimate P ±0 (u1 u2 ) Cu1 u2 K N0 ,L0
holds with 012 12 1/2 12 12 1/4 C ∼ Nmin Nmin Lmax Lmin , 012 0j 1/2 0j 0j 1/4 Nmin Lmax (j = 1, 2), C ∼ Nmin Lmin 012 12 1/4 1/2 L012 , C ∼ Nmin Nmin N0 L012 med min 012 2 012 1/2 , C ∼ Nmin Lmin
(7.1) (7.2) (7.3) (7.4)
regardless of the choice of signs ±j . The estimate (7.3) is not included in [30], but follows from either (7.1) or (7.2) and the fact 012 N 012 ∼ N N 12 . that Nmin 0 min max Motivated by the convolution formula (6.1), a triple (X0 , X1 , X2 ) of vectors Xj = (τj , ξj ) ∈ R1+2 is said to be a bilinear interaction if X0 = X1 − X2 . Given signs (±0 , ±1 , ±2 ) we also define the hyperbolic weights hj = τj ±j |ξj |. If all three hyperbolic weights vanish, we say that the interaction is null. If this happens, the vectors Xj all lie on the null cone, and moreover it is clear geometrically that the angle θ12 = θ (±1 ξ1 , ±2 ξ2 ) must vanish. The following more or less standard lemma generalizes this statement. For a proof, see e.g. [29].
2326
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Lemma 7.1. Given a bilinear interaction (X0 , X1 , X2 ) with ξj = 0, and signs (±0 , ±1 , ±2 ), define hj = τj ±j |ξj | and θ12 = θ (±1 ξ1 , ±2 ξ2 ). Then 2 max |h0 |, |h1 |, |h2 | min |ξ1 |, |ξ2 | θ12 . Moreover, we either have |ξ0 | |ξ1 | ∼ |ξ2 |
and ±1 = ±2 ,
in which case θ12 ∼ 1 and
max |h0 |, |h1 |, |h2 | min |ξ1 |, |ξ2 | ,
or else we have 2 |ξ1 ||ξ2 |θ12 . max |h0 |, |h1 |, |h2 | |ξ0 |
With this information in hand, we can prove Lemma 6.5. By Lemma 7.1 we have θ12 12 p (L012 max /Nmin ) for 0 p 1/2. Taking p = 3/8 and using (7.3), P
±
KN 0,L 0
Bθ12 (u1 , u2 )
0
L012 max 12 Nmin
3/8
12 012 012 3/8 N0 Nmin Lmin Lmed u1 u2 ,
proving Lemma 6.5. The following improves the estimate (7.1) in certain situations. Theorem 7.2. (See [30].) Let ω ∈ S1 , 0 < α 1 and I ⊂ R a compact interval. Then for all ± u1 , u2 ∈ L2 (R1+2 ) such that u j is supported in KNjj,Lj , and assuming in addition that supp u 1 ⊂ (τ, ξ ): θ ξ, ω⊥ α , we have Pξ ·ω∈I (u1 u2 ) 0
12 )1/2 (L L )3/4 |I |(Nmin 1 2 α
1/2 u1 u2 .
The same estimate holds for Pξ1 ·ω∈I u1 · u2 and u1 · Pξ2 ·ω∈I u2 . Here ω⊥ ⊂ R2 is the orthogonal complement of ω, and |I | is the length of I . The next result is a null form estimate. Recall that Tr (ω) ⊂ R2 , for r > 0 and ω ∈ S1 , denotes a tube (actually a strip, since we are in the plane) of radius comparable to r around Rω. Theorem 7.3. (See [30].) Let r > 0 and ω ∈ S1 . Then for all u1 , u2 ∈ L2 (R1+2 ) such that u j is ± supported in KNjj,Lj , Bθ (PR×T (ω) u1 , u2 ) (rL1 L2 )1/2 u1 u2 . r 12
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2327
The key point here is that we are able to exploit concentration of the Fourier supports near a null ray, which is not possible for the standard product u1 u2 . We remark that in [30], the theorem is proved for |ξj | ∼ Nj on the support of u j instead of ξj ∼ Nj as we have here. 12 ∼ 1, but then the trivial estimate P This only makes a difference if Nmin R×Tr (ω) u1 · u2 12 12 1/2 (rNmin Lmin ) u1 u2 is stronger. In the following refinement of Theorem 7.3 we limit attention to interactions which are nearly null, by restricting the angle to θ12 1; the correspondingly modified null form is denoted Bθ12 1 . Theorem 7.4. (See [30].) Let r > 0, ω ∈ S1 and I ⊂ R a compact interval. Assume that ± 12 . Then for all u , u ∈ L2 (R1+2 ) such that u j is supported in KNjj,Lj , N1 , N2 1 and r Nmin 1 2 Pξ
0 ·ω∈I
! Bθ12 1 (PR×Tr (ω) u1 , u2 ) (rL1 L2 )1/2 supPξ1 ·ω∈I1 u1 u2 , I1
where the supremum is over all translates I1 of I . We end this section by recalling some facts, proved in [12], about the bilinear interaction X0 = X1 − X2 , where we assume ξj = 0. Given signs (±0 , ±1 , ±2 ), we define as before the hyperbolic weights hj = τj ±j |ξj | and the angles θj k = θ (±j ξj , ±k ξk ) for j, k = 0, 1, 2. In Lemma 7.1 we related θ12 to the size of the weights hj and |ξj |. The sign ±0 was arbitrary, but by keeping track of the sign we can get more. In fact, since τ0 = τ1 − τ2 , we have h0 − h1 + h2 = ±0 |ξ0 | − ±1 |ξ1 | ±2 |ξ2 |, so defining ±12 ≡
+ if (±1 , ±2 ) = (+, +) and |ξ1 | > |ξ2 |, − if (±1 , ±2 ) = (+, +) and |ξ1 | |ξ2 |, + if (±1 , ±2 ) = (+, −),
(7.5)
and correspondingly in the remaining cases (±1 , ±2 ) = (−, −), (−, +) by reversing all three signs (±12 , ±1 , ±2 ) above, it is clear that the following holds: Lemma 7.2. If ±0 = ±12 , then max(|h0 |, |h1 |, |h2 |) |ξ0 |. In the remaining case ±0 = ±12 we have the following estimates. Lemma 7.3. (See [12].) If ±0 = ±12 , then min(θ01 , θ02 ) ∼
min(|ξ1 |, |ξ2 |) sin θ12 . |ξ0 |
Moreover, if ±0 = ±12 and ±1 = ±2 , then max(θ01 , θ02 ) ∼ θ12 . Lemma 7.4. (See [12].) For all signs, max |h0 |, |h1 |, |h2 | |ξ0 | min(θ01 , θ02 )2 .
2328
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Lemma 7.5. (See [12].) If ±0 = ±12 and ±1 = ±2 , then 2 |ξ1 ||ξ2 |θ12 ∼ min |ξ0 |, |ξ1 |, |ξ2 | max(θ01 , θ02 )2 max |h0 |, |h1 |, |h2 | , |ξ0 |
whereas if ±0 = ±12 and ±1 = ±2 , then max(θ01 , θ02 ) ∼ θ12 . We now have at our disposal all the tools required to finish the proof of the main dyadic estimate (6.2). Recall that the DKG case (6.4) has been completely dealt with, so the remaining null regimes are (6.5) and (6.6). 8. Proof of the dyadic quadrilinear estimate, Part I By symmetry, we may assume L1 L2 ,
L3 L4 .
We distinguish the cases (i) L2 L0 , (ii) L4 L0 and (iii) L2 > L0 , L4 > L0 , but in this section we further restrict (i) and (ii) to L0 ∼ L0 , leaving the remaining cases for the next section. By symmetry it suffices to consider ⇒ |q1234 | φθ34 , θ12 , θ34 φ ⇒ |q1234 | φ 2 ,
θ12 φ θ34
(8.1a) (8.1b)
where the estimates on the right hold by Lemma 6.2. By Lemma 7.1, 0 12 1/2 N0 Lmax , θ12 γ ≡ min γ ∗ , N1 N2
for some 0 < γ ∗ 1.
(8.2)
In fact, here we can choose any 0 < γ ∗ 1 that we want, by adjusting the implicit constant in (8.1a). By Lemma 7.1 we also have 1/2 L034 max θ34 γ ≡ min 1, 34 . Nmin
(8.3)
φ min(θ01 , θ02 ) + min(θ03 , θ04 ),
(8.4)
Observe that
since θj k θ0j + θ0k . By Lemma 7.4, min(θ01 , θ02 )
0 12 Lmax N0
1/2 ,
min(θ03 , θ04 )
L034 max N0
1/2 .
(8.5)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2329
We assume that uj ∈ L2 (R1+2 ) for j = 1, 2, 3, 4 has nonnegative Fourier transform u j supported ± in KNjj,Lj . To simplify, we introduce the shorthand u0 12 = PK ±0
N0 ,L0
(u1 u2 ),
u043 = PK ±0
N0 ,L0
(u4 u3 ).
(8.6)
We define ±12 and ±43 as in (7.5), recalling that ξ0 = ξ1 − ξ2 = ξ4 − ξ3 . Note the following important relations: ±0 = ±12 ,
θ12 1,
N0 N1 ∼ N2
⇒
±0 = ±12 ,
θ12 1,
N1 N0 ∼ N2
⇒
N1 θ12 , N0 N0 θ12 ∼ θ01 ∼ θ02 . N1 θ01 ∼ θ02 ∼
(8.7) (8.8)
This follows from Lemmas 7.3 and 7.5, and the fact, from the proof of Lemma 7.3 in [12], that θ02 θ01 if |ξ1 | |ξ2 |. Note also that (8.7) can only happen if ±1 = ±2 , by Lemma 7.1. Of course, (8.8) applies symmetrically if N2 N0 ∼ N1 . Analogous estimates apply to the index 043. 8.1. The case L2 L0 ∼ L0 Then we treat the cases (8.1a) and (8.1b) simultaneously by using Lemma 6.3 to estimate |q1234 | θ13 θ24 , and pairing up u1 with u3 , and u2 with u4 , by changing variables from (τ0 , τ0 , ξ0 ) to τ˜0 = τ1 + τ3 ,
τ˜0 = τ2 + τ4 ,
ξ˜0 = ξ1 + ξ3 = ξ2 + ξ4 .
Then τ˜0 − τ˜0 = τ0 − τ0 , so the symbol of TL0 ,L0 is invariant under the change of variables: ± ± aL 0,L (τ0 , τ0 , ξ0 ) = aL 0,L (τ˜0 , τ˜0 , ξ˜0 ). This is where we use the assumption L0 ∼ L0 . Using 0 0 0 0 Lemma 6.4 we conclude that JN ,L TL0 ,L0 F Bθ13 (u1 , u3 )(X˜ 0 ) · F Bθ24 (u2 , u4 )(X˜ 0 ) d X˜ 0 Bθ13 (u1 , u3 )Bθ24 (u2 , u4 ), where the null form Bθ13 (u1 , u3 ) is defined by inserting θ13 in the convolution formula " 1 (X1 )u 3 (X3 )δ(X0 − X1 − X3 ) dX1 dX3 . The estimates for Bθ12 in the previu 1 u3 (X0 ) u ous section hold also for this null form. Recalling (8.2) and applying Lemma 4.4 to the pair (±1 ξ1 , ±2 ξ2 ) before making the above change of variables, we obtain similarly B uγ ,ω1 , u3 B uγ ,ω2 , u4 , JN ,L θ13 1 θ24 2 ω1 ,ω2
where the sum is over ω1 , ω2 ∈ Ω(γ ) satisfying θ (ω1 , ω2 ) γ and we write γ ,ωj
uj
= P±j ξj ∈Γγ (ωj ) u.
2330
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365 γ ,ω
Since the spatial frequency ξj of uj j is restricted to a tube of radius comparable to Nj γ about Rωj , we can apply Theorem 7.3, obtaining 1/2 γ ,ω1 γ ,ω2 u u u3 u4 JNΣ,L N1 N2 γ 2 L1 L2 L3 L4 1 2 ω1 ,ω2
1/2 N0 L0 L1 L2 L3 L4 u1 u2 u3 u4 , where we summed ω1 , ω2 as in (4.18), and used the definition (8.2) of γ , taking into account the assumption L2 L0 . Interpolating with the crude estimate 2 034 1/2 0 12 1/2 JN,L u0 12 u043 N02 Lmin N0 Lmin u1 u2 u3 u4 ,
(8.9)
which follows from (7.4), we get the desired estimate (6.2), recalling that L0 ∼ L0 . 8.2. The case L4 L0 ∼ L0 If θ34 1, then we have the analog of (8.2), so by symmetry the argument in the previous subsection applies, with the roles of the indices 12 and 34 reversed. We therefore assume θ34 ∼ 1. 34 L , by Lemma 7.1. Moreover, we may assume L > L , since the case L L is Then Nmin 0 2 2 0 0 done. Now trivially estimate |q1234 | 1. Then with notation as in (8.6), 3/8 34 3/4 3/4 L0 L1 Nmin (L3 L4 )3/8 u1 u2 u3 u4
JN,L N0
3/4
N0
L0 L0 L1 L2 L3 L4
3/8
u1 u2 u3 u4 ,
34 where we used Lemma 6.4, Theorem 7.1, the assumption L2 > L0 and the fact that Nmin L0 ∼ L 0 .
8.3. The case L2 > L0 and L4 > L0 So far we could treat (8.1a) and (8.1b) simultaneously, but from now on we need to separate the two, and we divide into subcases depending on which term dominates in the right-hand side of (8.4): θ12 φ θ34 ,
min(θ01 , θ02 ) min(θ03 , θ04 ),
(8.10a)
θ12 φ θ34 ,
min(θ01 , θ02 ) < min(θ03 , θ04 ),
(8.10b)
θ12 , θ34 φ,
min(θ01 , θ02 ) < min(θ03 , θ04 ),
(8.10c)
θ12 , θ34 φ,
min(θ01 , θ02 ) min(θ03 , θ04 ).
(8.10d)
Note that the last two are symmetric, so we only consider the first three. Subcase (8.10b) is by far the most difficult, and will be split further into subcases.
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2331
8.4. Subcase θ12 φ θ34 , min(θ01 , θ02 ) min(θ03 , θ04 ) By (8.3)–(8.5), |q1234 | φθ34 (φθ34 )3/4
L2 N0
3/8
L4
3/8 ,
34 Nmin
hence JN ,L
L2 L4 34 N0 Nmin
3/8
4 2 3/8 3/8 034 N 0 L0 L1 N0 Nmin L0 L3 uj
3/8 3/4 = N0 L0 L0 L1 L2 L3 L4 u1 u2 u3 u4 ,
j =1
where we used Lemma 6.4 and Theorem 7.1. 8.5. Subcase θ12 φ θ34 , min(θ01 , θ02 ) < min(θ03 , θ04 ) Then L4 p |q1234 | φθ34 min(θ03 , θ04 ) 34 Nmin
(8.11)
for 0 p 1/2. By (8.2) and Lemma 4.4 applied to (±1 ξ1 , ±2 ξ2 ), JN,L
L4 1/4 ω1 ,ω2
Bθ03 PK ±0
34 Nmin
N0 ,L0
±
F −1 TL 0,L F u0 121 0
γ ,ω ,ω2
0
, u3 u4 ,
(8.12)
where γ ,ω ,ω2
u0 121
= PK ±0
N0 ,L0
γ ,ω1 γ ,ω2 u1 u2
(8.13) γ ,ω ,ω
and the sum is over ω1 , ω2 ∈ Ω(γ ) with θ (ω1 , ω2 ) γ . The spatial Fourier support of u0 121 2 12 γ around Rω . Therefore, by Theorem 7.3, is contained in a tube of radius comparable to Nmax 1 Lemma 6.4 and Theorem 7.1, L4 1/4 1/2 γ ,ω1 ,ω2 12 u u3 u4 Nmax γ L0 L3 JN,L 0 12 34 N min ω1 ,ω2
N 12 34 )1/2 max (Nmin
1/2
L4
N0 34 Nmin
1/4
N 0 L2 N1 N2
1/2
012 1/2 3/4 L0 L1 L0 L3 N0 Nmin
3/4 1/2 3/8 L0 (L1 L2 )5/16 (L3 L4 )3/8
N 0 L0
1/2 4
uj
j =1 4 j =1
uj .
(8.14)
2332
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Here we summed ω1 , ω2 as in (4.18) and used (8.2) (recalling L0 < L2 ), the fact that 012 N 012 ∼ N N 12 , and the assumptions L L , L L . Nmin 0 min 1 2 3 4 max 34 , but also whenInterpolating with the trivial estimate (8.9) we then obtain (6.2) if N0 Nmin 34 1/4 ever we are able to gain an extra factor (Nmin /N0 ) . In particular, this happens if ±0 = ±43 , since then N0 L4 by Lemma 7.2, so instead of (8.3) we can use θ34 1 (L4 /N0 )1/4 in (8.11), thereby gaining the desired factor. Thus, we may assume ±0 = ±43 , and the same argument shows that we may assume θ34 1. Moreover, we can assume ±0 = ±12 , since otherwise Lemma 7.2 implies N0 L2 , hence the argument in Section 8.4 applies. Next observe that by (8.8) and (8.11), since ±0 = ±43 and θ34 1, N3 N0 ∼ N4
⇒
θ04
N3 θ34 , N0
θ03 ∼ θ34 ,
|q1234 |
N3 θ03 θ34 , N0
(8.15)
so we gain a factor N3 /N0 in (8.14), which is more than enough. We are therefore left with N4 N0 ∼ N3 , which is hard; we split further into N0 N2 and N2 N0 , treated in the next two subsections. Here one should keep in mind that ±0 = ±12 = ±43 , L1 L2 , L3 L4 , L2 > L0 and L4 > L0 . 8.5.1. Subcase N0 N2 Inserting P|ξ4 |N4 in front of Bθ03 in (8.14), then instead of Theorem 7.3 we apply Theorem 7.4, the hypotheses of which are satisfied: First, since N4 N0 ∼ N3 , we have N0 , N3 1 12 in the theorem now and θ03 1 [by the analog of (8.15)]. Second, the hypothesis r Nmin becomes 12 γ N0 , Nmax
(8.16)
with γ as in (8.2). But if (8.16) fails, then N0 N1 ∼ N2 , and N0 L2 in view of the definition (8.2) of γ , so the argument in Section 8.4 applies. Thus, we can assume that (8.16) holds, γ ,ω ,ω hence Theorem 7.4 applies, so in (8.14) we can replace u0 121 2 by γ ,ω ,ω supPξ0 ·ω1 ∈I u0 121 2 , I
where the supremum is over all intervals I ⊂ R with |I | = N4 . But since γ 1, Theorem 7.2 implies, via duality, 01 1/2 3/4 1/2 γ ,ω1 γ ,ω2 γ ,ω ,ω u u , L0 L1 supPξ0 ·ω1 ∈I u0 121 2 N4 Nmin 1 2
(8.17)
I
012 )1/2 (L L )3/4 inside the square root is replaced by so in the second line of (8.14), N0 (Nmin 0 1 01 1/2 3/4 N4 (Nmin ) (L0 L1 ) , so in effect we gain a factor (N4 /N0 )1/2 , recalling that N0 N2 .
8.5.2. Subcase N0 N2 If N2 ∼ 1, we simply estimate 4 1/2 3/2 3/2 JN ,L u0 12 u043 N2 (L1 L2 )3/4 · N0 (L0 L3 )3/4 uj , j =1
(8.18)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2333
by Lemma 6.4 and Theorem 7.1. We therefore assume 1 N2 N0 ∼ N1 . This ensures that ξ2 ∼ N2 can be replaced by |ξ2 | ∼ N2 . By (8.8) and (8.2), θ12 ∼ θ02 ∼
N0 θ01 , N2
hence θ01 α ≡
N2 γ. N0
(8.19)
Now modify (8.12) by applying Lemma 4.4 again, this time to (±0 ξ0 , ±1 ξ1 ): JN ,L
L4 1/2 ω1 ,ω2 ω ,ω 0
N4
1
× P|ξ4 |N4 Bθ03 1 PK ±0
γ ,ω1 ,ω2 ;α,ω0 ,ω1
±
N0 ,L0
F −1 TL 0,L F u0 12 0
0
, u3 u4 ,
(8.20)
where the second sum is over ω0 , ω1 ∈ Ω(α) satisfying θ (ω0 , ω1 ) α, and γ ,ω1 ,ω2 ;α,ω0 ,ω1
u0 12
= P±0 ξ0 ∈Γα (ω0 ) PK ±0
N0 ,L0
γ ,ω1 ;α,ω1
u1
γ ,ω1
= P±1 ξ1 ∈Γα (ω1 ) u1
γ ,ω1 ;α,ω1 γ ,ω2 u1 , u2
.
(8.21) (8.22)
The spatial Fourier support of (8.21) is contained in a tube of radius comparable to N0 α ∼ N2 γ around Rω0 , whereas the one for (8.13) is of radius comparable to N1 γ , so we gain a factor (N2 /N0 )1/2 when applying Theorem 7.4, compared to our estimates in the previous subsection. On the other hand, we now have the additional sum over ω0 , ω1 . To come out on top, we have to make sure that this sum does not cost us more than a factor (N0 /N2 )1/4 . For the bilinear interaction X0 = X1 − X2 in (8.21) we have, by (4.16), recalling also θ (ω0 , ω1 ) α and N1 ∼ N0 , X1 ∈ Hmax(L1 ,N0 α 2 ) ω1 . X0 ∈ Hmax(L ,N0 α 2 ) ω1 , 0
Therefore, X2 = X1 − X0 ∈ Hd ω1 , γ ,ω2
so we can insert PHd (ω ) in front of u2 1 subsection we then get
0 1 where d = max Lmax , N0 α 2 ,
(8.23)
in (8.21). Adapting the argument from the previous
3/4 1/2 L4 1/4 1/2 JN,L N2 γ L0 L3 N4 N0 L0 L1 N4 γ ,ω1 ;α,ω γ ,ω 1 u PHd (ω1 ) u2 2 u3 u4 × 1
ω1 ,ω2 ω ,ω 0
1
3/4 1/2 L2 1/2 1/2 N L0 L3 N 4 N 0 L0 L1 1/2 2 N 2 N4 γ ,ω γ ,ω u 1 u 2 u3 u4 , × B 1/2 1 2
1/2
L4
ω1 ,ω2
(8.24)
2334
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
where B=
sup
(τ,ξ ), |ξ |∼N2
ω1 ∈Ω(α)
χHd (ω1 ) (τ, ξ ).
(8.25)
If we can prove that B
N0 N2
1/2 (8.26)
,
then summing ω1 , ω2 as in (4.18) we get the desired estimate. 0 1 , N α 2 ), so if d = N α 2 , we By Lemma 4.2, B 1 + (d/N2 α 2 )1/2 , where d = max(Lmax 0 0 0 1 , which happens when N α 2 L0 1 . Then instead get (8.26). The other possibility is d = Lmax 0 max of (8.26) we only get B
01 Lmax N2 α 2
1/2 (8.27)
,
but to compensate we can use the following replacement for (8.17): Pξ
0 ·ω1 ∈I
γ ,ω ,ω2
u0 121
0 1 1/2 γ ,ω1 γ ,ω2 N4 (N2 γ )Lmin u1 u2 ,
(8.28)
which by [30, Lemma 1.2] reduces to the trivial fact that the intersection of the strips {ξ0 : ξ0 · ω1 ∈ I } and Tr (ω2 ) has area O(r|I |), where in the present case r ∼ N2 γ and |I | = N4 . Modifying (8.24) accordingly, we again get the desired estimate. 8.6. Subcase θ12 , θ34 φ, min(θ01 , θ02 ) < min(θ03 , θ04 ) Then p L4 |q1234 | φ min(θ03 , θ04 ) N0 2
(0 p 1/2).
(8.29)
34 /N )1/4 , implying the Comparing with (8.11), we then we get (8.14) with an extra factor (Nmin 0 desired estimate.
9. Proof of the dyadic quadrilinear estimate, Part II It remains to consider the cases where L0 L0
or L0 L0
and either L2 L0 or L4 L0 (as before we assume L1 L2 and L3 L4 by symmetry). It suffices to consider the cases (8.10a)–(8.10c), the last two of which we split further into
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2335
L2 L0 ,
L4 > L0 ,
(9.1a)
L2 L0 ,
L4 L0 ,
(9.1b)
L2 > L0 ,
L4 L0 .
(9.1c)
12 , N 34 1, as otherwise trivial estimates analogous to (8.18) apply. We may assume Nmin min
9.1. Subcase θ12 φ θ34 , min(θ01 , θ02 ) min(θ03 , θ04 ) By (8.3)–(8.5), |q1234 | φθ34 (φθ34 )
3/4
0 12 Lmax N0
3/8
L034 max
3/8
34 Nmin
(9.2)
,
so with notation as in (8.6), JN,L
0 12 Lmax N0
3/8
L034 max 34 Nmin
3/8
±0 T F u0 12 u043 . L ,L 0
0
If we apply Lemma 6.4 and (7.3), we get the desired estimate except in the case N0 N1 ∼ N2 , but then we can apply the following: Lemma 9.1. If L0 L0 or L0 L0 , ±0 1/2 012 0 12 0 12 1/2 1/2 T 12 N F u u1 u2 . 0 0 Nmin Lmin Lmed L ,L 0
0
0 12 = L12 , this holds by Lemma 6.4 and (7.2), so we assume L0 12 = L . Proof. If Lmax max max 0 Since θ12 1, we have θ12 γ with γ as in (8.2), and we reduce to estimating S = γ ,ω1 ,ω2 ±0 , where ω1 , ω2 ∈ Ω(γ ) with θ (ω1 , ω2 ) γ . By (4.16), ω1 ,ω2 TL ,L F u0 12 0
0
γ ,ω ,ω2
supp F u0 121
⊂ Hd (ω1 ),
12 2 where d = max L12 max , Nmax γ ,
(9.3)
so by Lemma 6.6, d p γ ,ω ,ω u 1 2 (0 p 1/2). S 0 12 L 0 ω ,ω 1
2
Taking p = 1/4, we note that if d = L12 max , we get the desired estimate by using (7.2) and sum12 γ 2 ∼ N L /N 12 , on the other hand, then (7.1) implies ming ω1 , ω2 as in (4.18). If d = Nmax 0 0 min the estimate we need. 2
2336
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
9.2. Subcase θ12 φ θ34 , min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 L0 , L4 > L0 Observe that (8.11) holds. Now repeat the argument leading to (8.14), but use Lemma 9.1 instead of Lemma 6.4 and Theorem 7.1, hence L4 1/4 1/2 ±0 γ ,ω ,ω 12 T JN,L Nmax γ L0 L3 F u0 121 2 u3 u4 L0 ,L0 34 ω1 ,ω2 Nmin
N 12 34 )1/2 max (Nmin
1/2
L4
N0 34 Nmin
1/4
N0 L0 N1 N2
1/2
012 1/2 L0 L3 N0 Nmin (L1 L2 )3/4
1/2 4
uj
j =1
3/4 1/2 1/4 L0 (L1 L2 L3 L4 )3/8
N 0 L0
4
uj ,
(9.4)
j =1
34 , but also whenever we so interpolating with the trivial estimate (8.9) we obtain (6.2) if N0 Nmin 34 are able to gain an extra factor (Nmin /N0 )1/4 . Now we continue as in Section 8.5, reducing finally to the difficult case N4 N0 ∼ N3 . Then we proceed as in Section 8.5.1. We may assume (8.16) [otherwise N0 L0 , and then (9.2) holds], hence Theorem 7.4 applies, so in (9.4) we can replace γ ,ω ,ω ± TL 0,L F u0 121 2 by 0
0
± γ ,ω ,ω supTL 0,L F Pξ0 ·ω1 ∈I u0 121 2 , I
0
(9.5)
0
where the supremum is over I ⊂ R with |I | = N4 . By Theorem 7.2, 12 1/2 1/2 γ ,ω1 γ ,ω2 γ ,ω ,ω u u . (L1 L2 )3/4 supPξ0 ·ω1 ∈I u0 121 2 N4 Nmin 1 2
(9.6)
I
If we combine this with Lemma 6.4, we get 12 1/2 1/2 γ ,ω1 γ ,ω2 u u , l.h.s.(9.5) N4 Nmin (L1 L2 )3/4 1 2
(9.7)
012 1/2 1/2 γ ,ω1 γ ,ω2 u u . l.h.s.(9.5) N4 Nmin (L1 L2 )3/4 1 2
(9.8)
but we need
If this holds, then we gain the necessary factor (N4 /N0 )1/4 in (9.4). We prove (9.8) for N0 N1 ∼ N2 , as otherwise it reduces to (9.7). Recalling (9.3) from the proof of Lemma 9.1, we use Lemma 6.6 followed by either (9.6) or 01 1/2 3/4 1/2 γ ,ω1 γ ,ω2 γ ,ω ,ω u u , L0 L1 supPξ0 ·ω1 ∈I u0 121 2 N4 Nmin 1 2
(9.9)
I
which follows from Theorem 7.2 via duality, recalling γ 1. Specifically, if d = L12 max , we 12 γ 2 . Then (9.8) follows. use (9.9), whereas (9.6) is used if d = Nmax
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2337
9.3. Subcase θ12 φ θ34 , min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 L0 , L4 L0 For the remainder of Section 9, we change the notation from (8.2), writing now θ12 γ ≡
0 12 N0 Lmax N1 N2
1/2 (9.10)
.
By (8.4) and (8.5), φ min(θ03 , θ04 )
L0 N0
p (0 p 1/2),
(9.11)
hence |q1234 | φθ34 (L0 /N0 )p θ34 , so applying Lemma 4.4 to (±1 ξ1 , ±2 ξ2 ) and Lemma 4.3 to (±3 ξ3 , ±4 ξ4 ), and recalling (8.3), JN ,L
L0 p
ω1 ,ω2 0<γ34 γ ω3 ,ω4
×
±
γ ,ω ,ω2
TL 0,L F u0 121 0
N0
0
γ34 γ ,ω4 ,ω3
34 (X0 ) · F u043
(X0 ) dX0 ,
(9.12)
34 4 3 where γ is defined as in (8.3), u0 121 2 is defined as in (8.13), u043 is similarly defined, and the sum is over ω1 , ω2 ∈ Ω(γ ) with θ (ω1 , ω2 ) γ , dyadic γ34 and ω3 , ω4 ∈ Ω(γ34 ) satisfying γ34 ,ω4 ,ω3 . 3γ34 θ (ω3 , ω4 ) 12γ34 , hence θ34 ∼ γ34 in u043 γ ,ω1 ,ω2 12 γ Recall that the spatial Fourier support of u0 12 is contained in a tube of radius r ∼ Nmax around Rω1 . Covering R by almost disjoint intervals I of length r,
γ ,ω ,ω
γ ,ω ,ω2
u0 121
γ ,ω ,ω
=
γ ,ω ,ω2
Pξ0 ·ω1 ∈I u0 121
,
I
where the sum has cardinality O(N0 /r). Fix I . Then ξ0 is restricted to a cube of sidelength r, and tiling by translates of this cube we may assume without loss of generality that the ξj are restricted to such cubes Qj , for j = 1, 2, 3, 4. By (9.3), τ0 + ξ0 · ω1 = O d ,
12 where d = max L2 , Nmax γ2 .
(9.13)
r2 where d = max L4 , 34 , rγ34 , Nmin
(9.14)
Moreover, as proved in [12, Section 9.4], τ0 + ξ0 · ω3 = c + O(d),
and c ∈ R depends on (Q3 , Q4 ) and (ω3 , ω4 ). So by Lemmas 6.4 and 6.6, we can dominate the integral in (9.12) by the product of
3/8 γ ,ω1 ,ω2 d u min 1, 0 12 L0
(9.15)
2338
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
and
d L0
1/4
γ34 ,ω4 ,ω3 u .
(9.16)
043
By Theorem 7.2, γ ,ω1 ,ω2 u C uγ ,ω1 uγ ,ω2 1
0 12
(9.17)
2
holds with 01 1/2 3/4 C 2 ∼ r Nmin L0 L1 , 1/2 12 C 2 ∼ r Nmin (L1 L2 )3/4 .
(9.18) (9.19)
Noting that d L2 N 0 ∼ max , 12 , L0 L0 Nmin
(9.20)
12 , and otherwise the minimum of (9.18) and (9.19), hence we use (9.19) if N0 ∼ Nmax
1/2 γ ,ω1 γ ,ω2 012 1/2 u u . (L1 L2 )3/4 (9.15) r Nmin 1 2
(9.21)
γ34 ,ω4 ,ω3 u C uγ34 ,ω3 uγ34 ,ω4
(9.22)
Next we claim that 043
3
4
holds with C 2 ∼ r 2 L3 , 34 1/2 C 2 ∼ r Nmin (L3 L4 )3/4 , C2 ∼
(9.23) (9.24)
rL3 L4 . γ34
(9.25)
In fact, (9.25) holds due to the assumption θ (ω3 , ω4 ) 3γ34 , by the argument in [30, Section 3.3]; (9.24) holds by Theorem 7.2, and (9.23) reduces to a trivial volume estimate (see [30, Lemma 1.1]). Interpolating (9.23) and (9.25) we also get 1/2
C2 ∼
r 2 L3 L4 r 2 (L3 L4 )3/4 , (rγ34 )1/2 (rγ34 )1/2
(9.26)
and since d 1/2 times the minimum of (9.23), (9.24) and (9.26) is r 2 (L3 L4 )3/4 , (9.16)
r 2 (L3 L4 )3/4 1/2 L0
1/2
γ34 ,ω3 γ34 ,ω4 u u . 3
4
(9.27)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2339
Estimating the integral in (9.12) by the product of (9.21) and (9.27), summing the ω’s as in (4.18), 1/2 1/2 estimating γ34 γ34 and using γ34 ∼ (γ )1/2 , where the sum is over dyadic 0 < γ34 γ , we conclude, taking p = 3/8, 012 1/4 4 r 1/2 Nmin 5/8 rγ N0 (L0 L1 L2 L3 L4 )3/8 uj JN ,L N0 L0 j =1
I
4 12 γ γ )1/2 N 012 1/4 3/8 (Nmax 7/8 min L N L L L L L uj , 0 1 2 3 4 0 0 N0 (L0 L0 )1/4
(9.28)
j =1
where we summed I using the fact that the index set has cardinality O(N0 /r), and used the 12 γ . Thus, if the expression definition r ∼ Nmax A=
12 γ γ )2 N 012 (Nmax min N0 L0 L0
(9.29)
is O(1), we get the desired estimate. In view of (9.10), (8.3) and the assumptions L2 L0 and L4 L 0 , A
12 )2 N 012 N L (Nmax L0 min 0 0 . min 1, 34 N0 L0 L0 N1 N2 Nmin
(9.30)
In particular, A
12 N 012 Nmax min 12 N 34 Nmin min
N0 34 Nmin
,
(9.31)
012 N 012 ∼ N N 12 . The only remaining case is then N 34 N . where we used the fact that Nmin 0 min 0 max min If ±0 = ±43 , then N0 L0 by Lemma 7.2, so we can estimate the minimum in (9.30) by 1 34 /N compared to (9.31). If, on the other hand, ± = ± , then by L0 /N0 , gaining a factor Nmin 0 0 43 Lemma 7.3 and (8.3),
min(θ03 , θ04 )
34 1/2 1/2 34 Nmin N 34 Nmin L0 1/2 L0 θ34 min = , 34 N0 N0 Nmin N0 N0
34 /N )3/8 (since we took p = 3/8 which means that compared to (9.11) we gain a factor (Nmin 0 above), which then appears to the fourth power in A, so we have more than enough improvement.
9.4. Subcase θ12 φ θ34 , min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 > L0 , L4 L0 The only difference from the previous case is that now L2 > L0 , instead of L2 L0 . This difference only shows up in the expression (9.10) for γ , however, and this expression is not used explicitly until the estimate (9.20). But in the present case, d /L0 > 1, so the minimum in (9.15) is equal to one, and instead of (9.21) we use (9.17) with C as in (9.18). The argument then goes
2340
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
through without problems except when N2 N0 ∼ N1 . To be precise, instead of (9.29) we will now have A=
12 γ γ )2 N 01 (Nmax min , N 0 L0 L2
(9.32)
leading to 12 )2 N 01 (Nmax N 01 L0 min N0 L2 A · · min 1, 34 = min × r.h.s.(9.30), 012 N 0 L0 L2 N1 N2 Nmin Nmin
(9.33)
so we are done except for N2 N0 ∼ N1 . Then we must gain a factor N2 /N0 in (9.32). We assume N2 1, since otherwise (8.18) applies, and we assume ±0 = ±12 , as otherwise (9.2) applies. Thus (8.19) holds, and we use this to make an extra angular decomposition for γ ,ω
γ ,ω
γ ,ω1 ;α,ω
γ ,ω
1 (±0 ξ0 , ±1 ξ1 ). In view of (8.23), we then replace u1 1 and u2 2 by u1 and PHd (ω1 ) u2 2 , with d as in (8.23) and ω1 ∈ Ω(α). The spatial output ξ0 is restricted to a tube of radius r ∼ N0 α ∼ N2 γ around Rω1 , replacing r ∼ N0 γ used in the previous section. Decomposing into cubes as in the previous section, applying (9.17), (9.18) and (9.27), with r replaced by r , we get
3/8 1/2 (r γ )1/2 7/8 L N L L L L L B uj , 0 1 2 3 4 0 (L0 L2 )1/4 0 4
JN ,L
j =1
where B is given by (8.25). So now instead of (9.29) we have A=
(r γ )2 2 B , L0 L2
and (9.30) is replaced by A
N22 N0 L2 L0 N2 L0 · min 1, 34 B 2 min 1, 34 B 2 . L0 L2 N 1 N 2 L0 Nmin Nmin
When (8.26) holds we are done, since then we get N0 L0 A min 1, 34 L0 Nmin
(9.34)
and by the same argument as at the end of the previous subsection we also know how to deal with 34 N . If (8.26) fails, we only have (8.27). But to compensate we can use the fact the case Nmin 0 0 1 , as follows from (8.28). In effect we then get (9.34). that (9.17) holds with C 2 ∼ r (N2 γ )Lmin
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2341
9.5. Subcase θ12 , θ34 φ, min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 L0 , L4 > L0 Then 1/2 L4 , |q1234 | φ min(θ03 , θ04 ) min(θ03 , θ04 ) N0 2
2
and we proceed as in Section 8.5, but recalling also that we have Lemma 9.1 at our disposal. The 34 )1/4 , result is that we can dominate JN ,L by the last line of (8.14), but without the factor (N0 /Nmin so interpolating with the trivial estimate (8.9) we obtain (6.2). 9.6. Subcase θ12 , θ34 φ, min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 L0 , L4 L0 We modify the argument from Section 9.3. Since θ12 , θ34 1, (9.10) holds, and θ34 γ ≡
N 0 L0 N3 N4
1/2 .
(9.35)
Now |q1234 | φ 2 , and (9.11) holds, hence the factor γ34 in (9.12) must be replaced by (L0 /N0 )q for some 0 q 1/2. Taking q = 0 or q = 1/4 we get (9.28), but with the factor 1/2 L0 1/4 γ ∼ min 1, 34 Nmin replaced by L0 1/4 min 1, N0
1,
0<γ34 γ
bur of course the sum diverges. To fix the problem, observe that the separation assumption θ (ω3 , ω4 ) 3γ34 is only needed when we apply the null form estimate (9.25), i.e. when rγ34 dominates in the definition of d in (9.14), but then γ34
r 34 Nmin
12 N L 1/2 Nmax 0 0 ∼ 34 γ = 34 . N Nmin Nmin 1 N2 12 Nmax
On the other hand, we also have the upper bound (9.35) for γ34 . The cardinality of the this set of dyadic numbers γ34 is O(logL0 ). Recall that we used symmetry to assume that the second term in (8.4) dominates, hence we will also pick up the symmetric factor O(logL0 ) in the final 34 , then effectively the factor (γ )1/2 in the last line estimate. So to summarize, if θ34 r/Nmin 34 /N in of (9.28) is replaced by min(1, L0 /N0 )1/4 logL0 logL0 , hence we gain a factor Nmin 0 the right-hand side of (9.31), so we get the desired estimate (6.2). 34 , but then we do not need the separation, so here we can It remains to consider θ34 r/Nmin avoid summation over γ34 altogether by using Lemma 4.4 instead of Lemma 4.3, hence we do not pick up any logarithmic factors.
2342
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
9.7. Subcase θ12 , θ34 φ, min(θ01 , θ02 ) < min(θ03 , θ04 ), L2 > L0 , L4 L0 This follows by the argument from Section 9.4 with the same modifications as in the previous subsection. 10. Proof of the trilinear estimate Here we prove (5.4) for given signs ±1 , ±2 : |I | T 1/4 ψ0 2 + DT (0) ψ1 X0,1/2;1 ψ2 X0,1/4;1 , ±1
(10.1)
±2
where DT (0) = T 1/2
P|ξ
0 |∼N0
df 3 3 E0 , B0 + P|ξ |1/T Edf 0 , B0 H −1/2
0
and I=
μ α Π ±1 ψ1 , Π ±2 ψ2 dt dx ρAhom. μ hom. (X )σ j (X , X )ψ 2 (X2 ) dμ12 dX0 ρA 0 1 2 1 (X1 ) ψ −X0 j
with σ j (X1 , X2 ) = α j Π(±1 ξ1 )z1 (X1 ), Π(±2 ξ2 )z2 (X2 ) . j = zj |ψ j | with |zj | = 1. The convolution measure dμ12 is Here Xj = (τj , ξj ) and we write ψ −X0 given by the rule in (6.1), hence X0 = X2 − X1 . Recall also that we can insert the time cutoff ρT in front of the ψj in I whenever needed. Corresponding to the regions |ξ0 | < 1/T and |ξ0 | 1/T we split I = I|ξ0 |<1/T + I|ξ0 |1/T and claim that I|ξ0 |<1/T
df 3 −1/2 2 +T ψ0 ψ1 ψ2 0 |∼N0 E0 , B0
P|ξ
(10.2)
0
and 3 2 I|ξ0 |1/T P|ξ |1/T Edf 0 , B0 H −1/2 + ψ0 ψ1 X 0,1/4;1 ψ2 X 0,1/4;1 . ±1
±2
(10.3)
But we are allowed to insert ρT in front of the ψ’s, and in (10.2) we use (4.6) to get ρT ψ1 ρT ψ2 T 1/2 ψ1 X0,1/2;1 T 1/4 ψ2 X0,1/4;1 , ±1
±2
(10.4)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2343
whereas in (10.3) we get from (4.7), ρT ψ1 X0,1/4;1 T 1/4 ψ1 X0,1/2;1 . ±1
(10.5)
±1
Combining (10.2)–(10.5) we obtain (10.1), hence it suffices to prove the claimed estimates (10.2) and (10.3). For convenience we shall denote by c = 1/T 1 the cutoff point between low and high frequencies. hom. By our choice of data, Ahom. = 0. Using (2.9) we split Ahom. = Ahom. j j,+ + Aj,− for j = 1, 2, 0 and we split I accordingly. Note that ± a j (ξ0 ) gj 0 (ξ0 ) i a
˙ j (ξ0 ) hom. (X ) = δ τ ± |ξ | A ± = δ τ ± |ξ | , 0 0 0 0 0 0 0 0 j,±0 2 2|ξ0 | |ξ0 |1/2 where
±
gj 0 (ξ0 ) = |ξ0 |1/2
i a
˙ j (ξ0 ) a j (ξ0 ) ±0 . 2 2|ξ0 |
−1 2 Since a = −−1 (∂2 B03 , −∂1 B03 , 0) and a˙ = −E0 = −Edf 0 − ∇(|ψ0 | ),
χ|ξ
0 |c
3 2 g ±0 P|ξ |c Edf 0 , B0 H −1/2 + |ψ0 | H −3/2 3 2 P|ξ |c Edf 0 , B0 H −1/2 + ψ0 ,
(10.6)
where |ψ0 |2 H −3/2 ψ0 2 by Lemma 4.1. 10.1. Estimate for I = I|ξ0 |c We want (10.3), but in view of (10.6) it suffices to prove I χ|ξ0 |c g ±0 + ψ0 2 ψ1 X0,1/4;1 ψ2 X0,1/4;1 ±1
±2
(10.7)
for I=
±
gj 0 (ξ0 ) j 1 (X1 )ψ 2 (X2 ) dμ12
τ0 ±0 |ξ0 | σ (X1 , X2 )ψ χ|ξ0 |c ρ −X0 dX0 1/2 |ξ0 |
with any combination of signs ±0 , ±1 , ±2 . Taking the absolute value and using dyadic decomposition we get, since ρ
is rapidly decreasing, |I |
IN,L 1/2
N ,L
N 0 L0
,
(10.8)
2344
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
where N = (N0 , N1 , N2 ) with Nk ∼ ξj , L = (L0 , L1 , L2 ) with Lk = τk ±k |ξk | and IN,L = with u k = χK ±k
χK ±0
(X0 ) σ j (X1 , X2 )g ±0 (ξ0 )u 1 (X1 )u 2 (X2 ) dμ12 dX0 −X0 j τ0 ±0 |ξ0 | N0 ,L0
χ|ξ0 |c
Nk ,Lk
k |. Note the implicit summation over j = 1, 2. |ψ
Since ∇ · a = 0 and ∇ · a˙ = −|ψ0 |2 , we observe that 2 ξ0 gj 0 (ξ0 ) |ξ0 |−1/2 |ψ 0 | (ξ0 ). j ±
(10.9)
Using this property, it was proved in [12] that σ j = σ j (X1 , X2 ) satisfies j ±0 2 σ g (ξ0 ) θ12 g ±0 (ξ0 ) + min(θ01 , θ02 )g ±0 (ξ0 ) + |ξ0 |−3/2 |ψ 0 | (ξ0 ) j
(10.10)
where θkl = θ (±k ξk , ±l ξl ). Correspondingly we split 2 IN,L IN1 ,L + IN,L + IN3 ,L .
10.2. Estimate for IN1 ,L Defining u 0 (X0 ) = χK ±0
N0 ,L0
(X0 )
χ|ξ0 |c |g ±0 (ξ0 )| τ0 ±0 |ξ0 |
and using (7.3) and Lemma 7.1 we get, for 0 p 1/2, IN1 ,L
=
θ12 u 0 (X0 )u 1 (X1 )u 2 (X2 ) dμ12 −X0 dX0
L012 max 12 Nmin
p
012 12 1/4 1/2 Nmin Nmin N0 L012 L0 u0 u1 u2 , med
012 and estimating L012 med Lmax L0 L1 L2 , 1 IN,L 1/2 N ,L N0 L0
L012 p−1/4 N 012 1/4 (L1 L2 )1/4 max
N,L
12 Nmin
min
N0
1/4
L0
u0 u1 u2 .
(10.11)
If we exclude for the moment the case N0 N1 ∼ N2 , and take p = 1/4, (10.11) gives the 012 /N )1/4 for the smallest N and desired estimate: We first sum the N ’s using the factor (Nmin 0 Cauchy–Schwarz for the two largest N ’s. Then we sum L0 , and finally we sum L1 and L2 using 0,1/4;1 the definition of the norm on X± , obtaining
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2345
χ|ξ0 |c g ±0 (ξ0 ) ψ1 0,1/4;1 ψ2 0,1/4;1 1/2 X± X± τ0 ±0 |ξ0 | 1 2 N L 0 N,L 0 χ|ξ0 |c g ±0 ψ1 X0,1/4;1 ψ2 X0,1/4;1 1 IN,L
±1
±2
as required for (10.7). There remains the interaction N0 N1 ∼ N2 . Then we need to find a way to sum N0 . If N0 L012 max , there is no problem, since we can take p = 1/2 instead of p = 1/4 in (10.11), thereby gaining an extra factor
L012 max 12 Nmin
1/4
L012 max N0
1/4
012 which can be used to sum N0 if N0 L012 max . But what if N0 < Lmax ? Then instead of (7.3) we use (7.2), obtaining (estimating trivially θ12 1),
1/2 1/2 3/2 u0 u1 u2 , IN1 ,L N0 L0 L12 min hence 1/4
IN1 ,L 1/2
N 0 L0
1/4 N0 (L12 min ) 1/2
L0
u0 u1 u2 .
(10.12)
First sum N1 ∼ N2 using Cauchy–Schwarz, then sum N0 using
1/4
N0
1/4 1/4 ∼ L012 L0 L12 , max max
(10.13)
N0
then sum L0 using the remaining factor L0
, and finally sum L1 and L2 as above.
10.3. Estimate for IN2 ,L The difference from the previous subsection is that θ12 is replaced by min(θ01 , θ02 )
L012 max N0
p (0 p 1/2),
and this is better than the estimate we used for θ12 except if N0 N1 ∼ N2 . But in that case, by (7.2), IN2 ,L 1/2 N 0 L0
1 1/2 N 0 L0
L012 max N0
p
3/2 12 1/2 1/2 N0 L0 Lmin u0 u1 u2 .
2346
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
12 012 If N0 L012 max , we take p = 1/2, obtaining (since Lmin Lmax L0 L1 L2 )
2 IN,L 1/2
N 0 L0
L012 max N0
1/4
1/4 1/4
L1 L2 1/4
L0
u0 u1 u2 ,
2 so summing is no problem. If N0 < L012 max , then with p = 0 we get (10.12) for IN,L , and using (10.13) we can again sum.
10.4. Estimate for IN3 ,L We may assume θ12 1, since otherwise the estimate for IN1 ,L applies to IN,L as a whole by simply estimating |σ j (X1 , X2 )| 1. Then by Lemma 7.1, θ12 γ ≡
N0 L012 max N1 N2
1/2 ,
hence IN3 ,L
−3/2 N0
χθ12 γ u 0 (X0 )u 1 (X1 )u 2 (X2 ) dμ12 −X0 dX0
with u 0 (X0 ) = χK ±0
N0 ,L0
(X0 )
2 ||ψ 0 | (ξ0 )| . τ0 ±0 |ξ0 |
By Lemma 4.4 applied to the pair (±1 ξ1 , ±2 ξ2 ), 3 IN,L
−3/2 N0
γ ,ω1 γ ,ω2 (X1 )u (X2 ) dμ12 u 0 (X0 )u −X0 dX0 , 1 2
(10.14)
ω1 ,ω2 γ ,ωj
where the sum is over ω1 , ω2 ∈ Ω(γ ) with θ (ω1 , ω2 ) γ and uj last integral, ξ1 , ξ2 are both restricted to a tube of radius 12 γ∼ r ∼ Nmax
12 N L012 Nmax 0 max 12 Nmin
= P±j ξj ∈Γγ (ωj ) u. So in the
1/2
around Rω1 , hence the same is true for ξ0 = ξ2 − ξ1 , so we get −3/2
IN3 ,L N0
PR×Tr (ω1 ) u0 PK ±0
N0 ,L0
ω1 ,ω2 −3/2
N0
PT
r (ω1 )
ω1 ,ω2
γ ,ω1 γ ,ω2 u1 u2
1/2 012 12 1/2 1/2 γ ,ω1 γ ,ω2 u u , Pξ0 ∼N0 |ψ0 |2 × N0 Nmin L0 Lmin 1 2
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2347
where we used (7.2). Applying the estimate (by Plancherel and Cauchy–Schwarz this reduces to the obvious fact that the area of intersection of a strip of width r and a disk of radius N0 is comparable to rN0 ) (10.15) sup PTr (ω) Pξ0 ∼N0 |ψ0 |2 (rN0 )1/2 ψ0 2 , ω∈S1
and summing ω1 , ω2 as in (4.18), we then obtain 1/2 012 12 1/2 1/2 −3/2 3 N0 (rN0 )1/2 ψ0 2 N0 Nmin L0 Lmin u1 u2 IN,L 12 012 1/4 Nmax Nmin 1/2 012 1/4 L0 L12 ψ0 2 u1 u2 min Lmax 12 N0 Nmin 1/2 012 1/4 ψ0 2 u1 u2 L0 L12 min Lmax 3/4
L0 (L1 L2 )1/4 ψ0 2 u1 u2 , 012 N 012 ∼ N N 12 and L12 L012 L L L . Thus, where we used Nmin 0 min 0 1 2 max min max 3 IN,L 1/2 N ,L N0 L0
ψ0 2
(L1/4 u1 )(L1/4 u2 ) 1
2 1/2 1/4 N 0 L0
N ,L
, −1/2
12 , all the N ’s can be summed using the factor N ; so summing the N ’s is easy (if N0 ∼ Nmax 0 −1/2 if N0 N1 ∼ N2 , we sum N1 ∼ N2 using Cauchy–Schwarz and N0 using the factor N0 ), we −1/4 can sum L0 using the factor L0 , and finally we sum L1 and L2 using the definition of the 0,1/4;1 , obtaining norm on X±
IN3 ,L 1/2
N ,L N0 L0
ψ0 2 ψ1 X0,1/4;1 ψ2 X0,1/4;1 ±1
±2
as needed for (10.7). 10.5. Estimate for I = I|ξ0 |
ρ 1 (X1 )ψ 2 (X2 ) dμ12 a(ξ0 )ψ
τ0 ±0 |ξ0 |
−X0 dX0 ,
|ξ0 |
I2 = 1|ξ0 |
I3 = |ξ0 |<1
|
a˙ (ξ0 )| ρ 2 (X2 ) dμ12 1 (X1 )ψ
τ0 ±0 |ξ0 | ψ −X0 dX0 , |ξ0 |
ρ
(τ0 − |ξ0 |) (τ0 + |ξ0 |) − ρ 1 (X1 )ψ 2 (X2 ) dμ12 a˙ (ξ0 ) ψ −X0 dX0 . |ξ | 0
2348
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Since ρ
is rapidly decreasing and a = −−1 (∂2 B03 , −∂1 B03 , 0),
a(ξ0 )| χ|ξ0 |
2 (X0 + X1 ) dX1 dX0 1 (X1 )ψ ψ τ0 ±0 |ξ0 |2
I1
χ|ξ0 |
a(ξ0 )| dX0 ψ1 ψ2 τ0 ±0 |ξ0 |2 a(ξ0 ) dξ0 ψ1 ψ2 χ|ξ0 |
3 (ξ )| χ|ξ0 |
0
P|ξ
0 |∼N0
B03 ψ1 ψ2 .
0
P|ξ I2
df + 0 |∼N0 E0
1N0
|ξ0 |
P|ξ
df + 0 |∼N0 E0
1 2 |ψ0 | (ξ0 ) dξ0 ψ1 ψ2 ξ0 2
1N0
|ξ0 |
dξ0 ξ0
1/2
|ψ0 |2
H −3/2
ψ1 ψ2
df 1/2 2 + c ψ1 ψ2 , E ψ 0 0 |∼N0 0
P|ξ 1N0
where |ψ0 |2 H −3/2 ψ0 2 by Lemma 4.1. "1
(τ0 − |ξ0 |) = 2|ξ0 | 0 ρ
(τ0 − |ξ0 | + 2s|ξ0 |) ds, Finally, since ρ
(τ0 + |ξ0 |) − ρ 1 I3
ρ a˙ (ξ0 ) dX0 ds ψ1 ψ2
τ0 − |ξ0 | + 2s|ξ0 |
0 |ξ0 |<1
a˙ (ξ0 ) dξ0 ψ1 ψ2
|ξ0 |<1
Edf (ξ0 ) dξ0 +
0
|ξ0 |<1
|ξ0 |<1
1 2 |ψ0 | (ξ0 ) dξ0 ψ1 ψ2 |ξ0 |
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
P|ξ0 |<1 Edf 0 +
|ξ0 |<1
P|ξ
dξ0 |ξ0 |
1/2
df + ψ0 2 0 |∼N0 E0
2349
2 ψ1 ψ2 0 |<1 |ψ0 |
−1/2 |D| P|ξ
ψ1 ψ2 ,
0
where we estimated −1/2 |D| P|ξ
0 |<1
|ψ0 |2 |D|−1/2 D−1 |ψ0 |2 ψ0 2
by Lemma 4.1. This completes the proof of the trilinear estimate. 11. Estimates for the electromagnetic field Here we prove Theorem 2.3. W (t) = e−it (±|D|) and S KG (t) = e−it (±D) the propagators of the evolution opDenote by S± ± erators −i∂t ± |D| and −i∂t ± D respectively. Then by Duhamel’s principle applied to (2.14) and (2.15), KG df Edf ± (t) = S± (t)E± (0)
t −
−1 KG Pdf (−∇J0 + ∂t J) − ρT Edf (s) ds, S± (t − s) ±2D
(11.1)
0
t 3 W 3 B± (t) = S± (t)B± (0) −
−1 W S± (t − s) ±2|D| (∂1 J2 − ∂2 J1 )(s) ds,
(11.2)
0
for |t| T . W (t) and S KG (t) are unitary, Since S± ± KG S (t)Edf (0)
= Edf ± (0) (T ) , W S (t)B 3 (0) = B 3 (0) , ± ± ± (T ) (T ) ±
±
(T )
for all t, and this takes care of the first term on the right-hand side of (2.18), hence it remains to prove that, for some C depending only on the charge norm and |M|, sup Ij (t)(T ) CT 1/2 log(1/T )
|t|T
for the inhomogeneous terms
(11.3)
2350
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
t I1 (t) =
W S± (t − s)|D|−1 (∂1 J2 − ∂2 J1 )(s) ds,
0
t I2 (t) =
KG S± (t − s)D−1 Pdf (−∇J0 + ∂t J)(s) ds,
0
t I3 (t) =
KG S± (t − s)D−1 ρT Edf (s) ds.
0
These are defined for |t| T , but after choosing an extension of ψ we can consider all t ∈ R and insert the cutoff ρT (t) = ρ(t/T ) in front of ψ , so that J μ = α μ ρT ψ, ρT ψ .
(11.4) 0,1/2;1
The extensions (or representatives, to be precise) of ψ± ∈ X± note ψ± for convenience, can of course be chosen so that
(ST ), which we still de-
ψ± X0,1/2;1 2ψ± X0,1/2;1 (S ) , ±
±
T
and in view of (5.3) we then have ψ± X0,1/2;1 C1 , ±
(11.5)
where C1 only depends on the charge constant. We may further assume Π ± ψ± = ψ± , since this already holds on ST , and replacing ψ± by Π ± ψ± it will hold globally; moreover, applying Π ± does not increase the norm. Having thus chosen the extensions ψ± , we define the extension of ψ itself by ψ = ψ+ + ψ− , and note that Π ± ψ = ψ± by orthogonality of the projections. Writing ψj = ρT ψ±j for given signs ±j , and applying (6.1) to (11.4), we now note that J κ (X0 )
±1 ,±2
1 (X1 )ψ 2 (X2 ) dμ12 α κ Π(±1 ξ1 )z1 (X1 ), Π(±2 ξ2 )z2 (X2 ) ψ X0 ,
j = zj |ψ j | with |zj | = 1. where Xj = (τj , ξj ) and ψ Observe that the symbol of (1/i)∂κ is X0κ = τ0 for κ = 0, and X0κ = ξ0κ for κ = 1, 2, where we write ξ0 = (ξ01 , ξ02 ). Thus,
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
F (∂1 J2 − ∂2 J1 )(X0 )
±1 ,±2 k,l=1,2; k=l
Fkl±1 ,±2 (X0 ),
± ,± F Pdf (−∇J0 + ∂t J) (X0 ) Fk01 2 (X0 ),
2351
(11.6) (11.7)
±1 ,±2 k=1,2
where ±1 ,±2 Fκλ (X0 ) =
σκλ (X1 , X2 )ψ 1 (X1 )ψ 2 (X2 ) dμ12
X0
and the symbol σκλ (X1 , X2 ) = X0κ α λ Π(±1 ξ1 )z1 (X1 ), Π(±2 ξ2 )z2 (X2 ) − X0λ α κ Π(±1 ξ1 )z1 (X1 ), Π(±2 ξ2 )z2 (X2 ) has the following null structure: Lemma 11.1. (See [12].) For any choice of signs ±0 , ±1 , ±2 , and writing θκλ = θ (±κ ξκ , ±λ ξλ ) for κ, λ = 0, 1, 2, we have σkl (X1 , X2 ) |ξ0 |θ12 + |ξ0 | min(θ01 , θ02 ), σk0 (X1 , X2 ) |ξ0 |θ12 + |ξ0 | min(θ01 , θ02 ) + τ0 ±0 |ξ0 |,
(11.8) (11.9)
for k, l = 1, 2. To simplify the notation, summations over ±1 , ±2 [such as in (11.7) and (11.6)] will be tacitly assumed from now on. Moreover, the sign ± appearing in the definitions of the Ij will be denoted ±0 . Corresponding to (11.8) and (11.9), respectively, we now split I1 = I1,1 + I1,2 , I2 = I2,1 + I2,2 + I2,3 , by restricting in Fourier space. In fact, for all these terms except I2,3 we shall prove something stronger than (11.3), namely Ij,k (t)(1) CT 1/2 . In other words, we will show that sup P|ξ0 |1 Ij,k (t)H −1/2 CT 1/2 ,
|t|T
sup
P|ξ
|t|T 0
0 |∼N0
Ij,k (t) CT 1/2 ,
for j, k = 1, 2. This is stronger than (11.3) since by Lemma 3.1, f (T ) f (1) .
(11.10) (11.11)
2352
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
11.1. Estimate for I1,1 with |ξ0 | 1 Now |σkl | |ξ0 |θ12 , so recalling (11.6) and applying (4.12) with φ(ξ ) = ±|ξ | we get P|ξ
0 |1
I1,1 (t)H −1/2
12 1 θ12 ψ1 (X1 ) ψ2 (X2 ) dμX0 dτ0 2 ξ0 1/2 τ0 ±0 |ξ0 | Lξ 0 12 f (ξ0 ) θ ψ (X1 ) ψ2 (X2 ) dμX0 dτ0 dξ0 = sup 1/2 τ ± |ξ | 12 1 ξ 0 0 0 0 f =1 012 p Lmax 1 1/2 sup L0 χξ0 ∼N0 f PK ±0 (u1 u2 ) 1/2 12 N0 ,L0 f =1 N ,L N0 L0 Nmin
(11.12)
for 0 p 1/2, where we used Lemma 7.1 to estimate θ12 and we write u j = χ
±j j ,Lj
KN
L012 max 12 Nmin
p (11.13)
j |. |ψ
Assuming L1 L2 by symmetry, we split into the three cases L1 L0 L2 , L1 L2 L0 and L0 L1 L2 . 11.1.1. The case L1 L0 L2 Then we take p = 1/4 and use (7.2), so we estimate the above sum by
χL1 L0
N ,L
=
L2 12 Nmin
∼
1/2 1/2
012 N 1/2 (Nmin 0 L0 L1 ) 1/2 1/2
N 0 L0
χξ0 ∼N0 f u1 u2
1/2 1/4
χL1 L0
N ,L
1/4
012 )1/2 L (Nmin 1 L2
1/4
12 )1/4 L (N0 Nmin 0
χL1 L0
N ,L
012 Nmin 012 Nmax
1/4
χξ0 ∼N0 f u1 u2
1/2 1/4
L1 L2 1/4
L0
χξ0 ∼N0 f u1 u2
12 ∼ N 012 N 012 . Now we sum the N ’s. Recalling that the two largest N ’s where we used N0 Nmin max min 012 /N 012 )1/4 to sum the smallest N , and the two largest N ’s are are comparable, we use (Nmin max summed using Cauchy–Schwarz. Thus we are left with
L
1/2 1/4
χL1 L0
L1 L2 1/4
L0
f PK ±1 ψ1 PK ±2 ψ2 . L1
L2
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2353
Next we sum L0 using
1/2
L1
1/4
1/4 L0 : L0 L1 L0
∼ L1 ,
and finally, the summations of L1 and L2 give the X 0,1/4;1 -norms of ψ1 and ψ2 . So we have shown that the part of the last line of (11.12) corresponding to L1 L0 L2 is bounded by an absolute constant times ψ1 X0,1/4;1 ψ2 X0,1/4;1 = ρT ψ±1 X0,1/4;1 ρT ψ±2 X0,1/4;1 CT 1/2 , ±1
±2
±1
±2
(11.14)
where we used (4.7) and (11.5), hence C only depends on the charge constant. 11.1.2. The case L1 L2 L0 Taking p = 1/4 and using (7.1) gives
χL1 L0
N ,L
=
L0 12 Nmin
χL1 L0
N ,L
1/4
1/2
012 (N 12 )1/2 L L 1/2 (Nmin 1 2 ) min 1/2 1/2
N 0 L0 012 Nmin N0
1/2
χξ0 ∼N0 f u1 u2
1/2 1/4
L1 L2
χξ0 ∼N0 f u1 u2 ,
1/4
L0
so the argument in the previous subsection works except when N0 N1 ∼ N2 , which we now assume. The problem is then that we have no way of summing N0 . To resolve this, divide into N0 < L0 and N0 L0 . In the latter case we can pick up an extra factor (L0 /N1 )1/4 (L0 /N0 )1/4 by choosing p = 1/2 instead of p = 1/4, allowing us to sum N0 . That leaves N0 < L0 . Then we use P
±
KN 0,L 0
1/4 (u1 u2 ) (N0 L1 )1/4 (N1 L2 )1/8 N02 L1 u1 u2
0
obtained by interpolation between (7.1) and (7.4). Taking p = 1/8, we thus get
χL1 L2 L0 χN0
N ,L
=
L0 N1
1/8
3/2
1/4
1/4
(N0 N1 L1 L2 )1/2 1/2 1/2
N 0 L0
χξ0 ∼N0 f u1 u2
1/4 1/2 1/8
χL1 L2 L0 χN0
N 0 L1 L2 3/8
L0
N ,L 1/4
1/4
χξ0 ∼N0 f u1 u2 ,
1/8
and summing N0 < L0 we replace N0 by L0 ; then we are still left with L0 in the denomi1/2 1/4 1/4 nator, and summing L0 L2 we end up with just L1 L1 L2 , which is what we want.
2354
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
11.1.3. The case L0 L1 L2 Then we do not use (11.12) at all, but apply instead (4.5) with p = ∞ followed by (4.11) with b = 0 to obtain sup P|ξ0 |1 I1,1 (t)H −1/2
|t|T
P|ξ0 |1 I1,1 X−1/2,1/2;1 (S
T)
±0
T
1/2
χ ±0 (X0 ) KL 12 0 sup θ12 ψ1 (X1 ) ψ2 (X2 ) dμX0 2 . ξ0 1/2 L0 1 L
(11.15)
X0
Of course, we only do this for the part of I1,1 corresponding to the restriction L0 L1 L2 , which is tacitly assumed. Now it suffices to show that χ ±0 (X0 ) KL 12 0 θ12 ψ (X1 ) ψ (X2 ) dμX0 ψ2 X0,1/2;1 2 ψ1 X±0,1/2;1 ±2 ξ0 1/2 1 L X0
uniformly in L0 , since the right-hand side equals ρT ψ±1 X0,1/2;1 ρT ψ±2 X0,1/2;1 ψ±1 X0,1/2;1 ψ±2 X0,1/2;1 C, ±1
±2
±1
±2
where we use (4.7) and (11.5), so C only depends on the charge constant. To prove the desired estimate, observe that χ ±0 (X0 ) KL 12 0 θ12 ψ1 (X1 ) ψ2 (X2 ) dμX0 2 ξ0 1/2 L
X0
G(X0 )χ ±0 (X0 ) KL 12 0 = sup θ12 ψ1 (X1 ) ψ2 (X2 ) dμX0 dτ0 dξ0 1/2 ξ0 G=1 L2 p 1 sup χξ0 ∼N0 GPK ±0 (u1 u2 ) 1/2 N 12 N0 ,L0 G=1 N ,L ,L N0 min 1
(11.16)
2
for 0 p 1/2, recalling that L0 L2 = L12 max . Take p = 1/4 and use (7.2) to estimate the summand by
L2 12 Nmin
1/4
1/2
1/2
012 N 1/2 (Nmin 0 L1 L0 ) 1/2
N0
χξ0 ∼N0 Gu1 u2
1/2 1/4 1/4
012 )1/2 L (Nmin 1 L0 L2
χξ0 ∼N0 Gu1 u2 12 )1/4 (N0 Nmin 012 1/4 Nmin 1/2 1/2 L1 L2 χξ0 ∼N0 Gu1 u2 012 Nmax =
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2355
12 ∼ N 012 N 012 . This gives the desired bound. For later use we note that the where we used N0 Nmin max min above argument actually works for L0 L2 (we do not need to assume L0 L1 ).
11.2. Estimate for I1,2 with |ξ0 | 1 The only difference from the previous subsection is that θ12 is replaced by min(θ01 , θ02 ), so (11.13) is replaced by min(θ01 , θ02 )
L012 max N0
p (0 p 1/2),
by Lemma 7.4. Therefore, it suffices to look at the case N0 N1 ∼ N2 . By symmetry we assume L1 L 2 . 11.2.1. The case L0 L2 Then we modify (11.15) and (11.16) in the obvious way, and use (7.2) to estimate the summand in the last line of (11.16) by
L2 N0
p
3/2
1/2
(N0 L1 L0 )1/2 1/2
N0
Gu1 u2
L2 N0
p−1/4
1/2 1/2
L1 L2 Gu1 u2 .
If N0 < L2 we take p = 0, otherwise p = 1/2. In either case we can then sum N0 without problems, and we get the desired estimate. 11.2.2. The case L1 L2 L0 Here we use the obvious analog of (11.12). We may assume θ12 1 [otherwise we trivially reduce to (11.12)], so by Lemma 7.1, θ12 γ ≡
N 0 L0 N1 N2
1/2 (11.17)
.
Applying Lemma 4.4, then instead of the summand in the last line of (11.12) we now have
1
1/2 ω1 ,ω2 N0 L0
L0 N0
p
χH
d (ω1 )
(X0 )χξ0 ∼N0 f (ξ0 )L2 PK ±0 X0
N0 ,L0
γ ,ω1 γ ,ω2 , u1 u2
where the sum is over ω1 , ω2 ∈ Ω(γ ) with θ (ω1 , ω2 ) γ , and the restriction of X0 to the thickened null hyperplane Hd (ω1 ) = {X0 : τ0 + ξ0 · ω1 = O(d)} with N 0 L0 2 d = max L2 , N1 γ ∼ max L2 , N1 γ ,ω1 γ ,ω2 u2 )(X0 ).
comes from applying (4.16) to F (u1
Now estimate
2356
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
1
1/2 ω1 ,ω2 N0 L0
1 1/2
L0 N0 L0 N0
p
d 1/2 χξ0 ∼N0 f (ξ0 )L2 PK ±0 ξ0
p #
N0 ,L0
γ ,ω1 γ ,ω2 u1 u2
$ N0 L0 1/2 max L2 , N1
N 0 L0 3/2 1/2 1/2 1/2 1/2 χξ ∼N f (ξ0 ) 2 u1 u2 × min N0 L0 L1 , N0 N1 L1 L2 0 0 L ξ0
L0 N0
p−1/4
1/2 1/4 L1 L2 χξ ∼N f (ξ0 ) 2 u1 u2 , 0 0 Lξ 1/4 0 L0
where we used Theorem 7.1 and summed ω1 , ω2 as in (4.18). If N0 < L0 we take p = 0, otherwise p = 1/2, and this allows us to sum N0 , leaving us with the sum
1/2 1/4
L1 L2 1/4 L0
L0 : L0 L2
1/2
1/4 1/4
∼ L1 L1 L2 ,
as desired. 11.3. Estimates for I2,1 and I2,2 with |ξ0 | 1 These follow from the arguments used for I1,1 and I1,2 in the two previous subsections. Indeed, the only difference is that we apply (4.11) and (4.12) with φ(ξ ) = ±ξ instead of φ(ξ ) = ±|ξ |, but the same estimates apply, since τ ± |ξ | ∼ τ ± ξ . Thus the proof of (11.10) is complete. 11.4. Estimates for Ij,k , j, k = 1, 2, with |ξ0 | < 1 Since we only consider j, k = 1, 2, we have |σκλ (X1 , X2 )| |ξ0 |, hence (4.12) gives χ|ξ |∼N 12 0 0 0 |∼N0 Ij,k (t) τ ± |ξ | ψ1 (X1 ) ψ2 (X2 ) dμX0 dτ0 2 0 0 0 L
P|ξ 0
0
ξ0
1 1/2 12 χ|ξ |∼N ψ1 (X1 ) ψ2 (X2 ) dμX0 L 2 L0 0 0 0 L 0
1 1/2 0
X0
1/2 N0 L012 PK ±1 ψ1 PK ±2 ψ2 min L1
L2
ψ1 X0,1/4;1 ψ2 X0,1/4;1 , ±1
±2
1/4 1/4
1/2 L where we used (7.4) and estimated (L012 1 L2 . Recalling (11.14) we then get (11.11), min ) as desired.
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2357
11.5. Estimate for I2,3 Note that I2,3 (t) (T )
−1/2 T 1/2 P|ξ0 |∼N0 I2,3 (t) + N0 P|ξ0 |∼N0 I2,3 (t).
0
N0 1/T
But now |σk0 (X1 , X2 )| |τ0 ±0 |ξ0 ||, so (4.12) gives 12 P|ξ |∼N I2,3 (t) 1 χ|ξ |∼N ψ ψ dμ (X ) (X ) dτ 1 1 2 2 0 0 0 0 0 X0 N0 L2ξ 0 1 χ|ξ |∼N = f1 (ξ1 )f2 (ξ1 − ξ0 ) dξ1 2 N0 0 0 L ξ0
1 N0 χ|ξ0 |∼N0 L2 f1 f2 ∼ f1 f2 , ξ0 N0 N0
where
fj (ξj ) =
ψ j (τj , ξj ) dτj
hence fj ψj X0,1/2;1 = ρT ψ±j X0,1/2;1 C ±j
±j
with C depending only on the charge constant, by (4.7) and (11.5). Thus −1/2 1/2 I2,3 (t) C T 1/2 N0 + T 1+ N0 (T ) 0
N0 1/T
1N0 <1/T
∼ C T 1/2 + T 1/2 log(1/T ) + T 1/2
with C depending only on the charge constant, proving (11.3) for I2,3 . This concludes the proof of (11.3) for I1 and I2 , and only I3 remains. 11.6. Estimate for I3 By (4.5) with p = ∞ and (4.11) with b = 0, sup P|ξ0 |∼N0 I3 (t) P|ξ0 |∼N0 I3 (t)X0,1/2;1 (S
|t|T
±0
T)
T 1/2 ρT P|ξ0 |∼N0 D−1 Edf X0,0;∞ ±0 1/2 −1 df ρT P|ξ0 |∼N0 D E T 1/2 T ρT sup P|ξ0 |∼N0 D−1 Edf (t). |t|1
(11.18)
2358
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Thus sup P|ξ0 |∼N0 I3 (t) T sup P|ξ0 |∼N0 Edf (t)H −1
|t|T
|t|1
and similarly sup P|ξ0 |1/T I3 (t)H −1/2 T sup P|ξ0 |1/T Edf (t)H −3/2
|t|T
|t|1
hence sup I3 (t)(T ) T T 1/2
|t|T
sup P|ξ0 |∼N0 Edf (t)H −1 + T sup P|ξ0 |1/T Edf (t)H −3/2 ,
0
|t|1
and to estimate the right-hand side we now apply the following lemma, proved in the next section. Lemma 11.2. Let s ∈ R. The solution of u = F with initial data u(0) = f , ∂t u(0) = g satisfies s−1 |F (τ, ξ )| , ξ sup u(t)H s f H s + gH s−1 + dτ |τ | − |ξ | L2 |t|1 ξ
where the implicit constant is absolute. Applying this to (2.7), where J μ is now defined for all t by (11.4), we find 3 sup P|ξ0 |∼N0 Edf (t)H −1 P|ξ0 |∼N0 Edf 0 H −1 + P|ξ0 |∼N0 ∇ × 0, 0, B0 − Pdf J(0) H −2
|t|1
χ|ξ0 |∼N0 F Pdf (−∇J0 + ∂t J) (X0 ) dτ0 + 2 ξ0 2 |τ0 | − |ξ0 | L
ξ0
P|ξ
Edf + P|ξ
N0 3 ψ0 2 0 |∼N0 0 0 |∼N0 B0 + N0 2 χ|ξ0 |∼N0 F Pdf (−∇J0 + ∂t J) (X0 ) dτ0 + 2 , 2 ξ0 |τ0 | − |ξ0 | L ξ0
where we applied (4.13) to get P|ξ0 |∼N0 Pdf J(0)H −2 N0 N0 −2 ψ0 2 . Similarly sup P|ξ0 |1/T Edf (t)H −3/2
|t|1
3 P|ξ0 |1/T Edf 0 H −3/2 + P|ξ0 |1/T ∇ × 0, 0, B0 − Pdf J(0) H −5/2 χ|ξ0 |1/T + ξ 5/2 |τ | − |ξ | F Pdf (−∇J0 + ∂t J) (X0 ) dτ0 2 0 0 0 L ξ0
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2359
3 2 P|ξ0 |1/T Edf 0 H −1/2 + P|ξ0 |1/T B0 H −1/2 + ψ0 χ|ξ0 |1/T , dτ F P + (−∇J + ∂ J) (X ) df 0 t 0 0 2 ξ0 5/2 |τ0 | − |ξ0 | L ξ0
where we used (4.15). Thus 2 T DT (0) + ψ0 + T T 1/2 (T )
sup I3 (t)
|t|T
a N0 + b ,
(11.19)
0
where χ|ξ0 |∼N0 F Pdf (−∇J0 + ∂t J) (X0 ) dτ0 , a N0 = 2 ξ 2 |τ | − |ξ | 0 0 0 Lξ 0 χ |ξ0 |1/T b= ξ 5/2 |τ | − |ξ | F Pdf (−∇J0 + ∂t J) (X0 ) dτ0 2 . 0 0 0 L ξ0
But by (11.7) and (11.9), F Pdf (−∇J0 + ∂t J) (X0 )
(X1 )ψ (X2 ) dμ12 |ξ0 | + |τ0 | − |ξ0 | ψ X0 ,
hence a N0
χ|ξ0 |∼N0 12 ψ (X1 ) ψ (X2 ) dμX0 dτ0 2 ξ0 Lξ 0 χ|ξ0 |∼N0 = f1 (ξ1 )f2 (ξ1 − ξ0 ) dξ1 2 ξ 0 Lξ 0 χ|ξ0 |∼N0 N0 ξ 2 f1 f2 ∼ N f1 f2 , 0 0 L ξ0
where fj (ξj ) = Similarly,
"
j (τj , ξj )| dτj satisfies (11.18) with C depending only the charge constant. |ψ χ|ξ0 |1/T b ξ 3/2 0
L2ξ 0
f1 f2 ∼ T 1/2 f1 f2 ,
hence T 1/2
0
aN0 + b T 1/2
0
N0 + T 1/2
1N0 <1/T
T 1/2 + T 1/2 log(1/T ) + T 1/2 ,
1 + T 1/2
2360
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
with implicit constants depending only on the charge constant, so we finally conclude that sup I3 (t)(T ) 1 + ψ0 2 T 1 + DT (0) + CT 3/2 log(1/T )
|t|T
1 + ψ0 2 T 1/2 ε + CT 3/2 log(1/T ),
where C depends only on the charge constant and we used (2.17) in the last step, recalling that DT (0) D˜ T (0). Thus ε depends only on the charge constant and |M|, so we have proved (11.3) for I3 . 3 Finally, we remark that the estimates proved in this section also give that Edf ± and B± describe continuous curves in the data space (2.2) for |t| T . 12. Proof of Lemma 11.2 For the homogeneous part of u this follows from the standard energy inequality, so we assume f = g = 0, i.e. u = −1 F . Now split F = F1 + F2 + F3 corresponding to the following three regions in Fourier space: (i) |ξ | 1, (ii) |ξ | < 1 and |τ | 2, and (iii) |ξ | < 1 and |τ | < 2. Set uj = −1 Fj for j = 1, 2, 3. From Lemma 6.1 we get u1 (t)
Hs
s−1 ξ s |F (τ, ξ )| |F (τ, ξ )| dτ ξ dτ χ|ξ |1 |ξ | |τ | − |ξ | |τ | − |ξ | L2 L2 ξ
ξ
for all t ∈ R. Lemma 6.1 also gives
u(t, ξ ) = u + (t, ξ ) + u − (t, ξ ) 1 |ξ | 1 |ξ |
∞ # −∞
∞ −∞
$ eitτ − e−it|ξ | eitτ − eit|ξ | − F (τ, ξ ) dτ τ + |ξ | τ − |ξ |
−2|ξ |eitτ + 2|ξ | cos(t|ξ |) + 2iτ sin(t|ξ |) F (τ, ξ ) dτ, τ 2 − |ξ |2
is supported in |τ | |ξ | we get so if F
u(t, ξ )
1 min(|t|, |ξ |−1 ) dτ, + F (τ, ξ ) |τ | |τ |2
and applying this to u2 yields sup u2 (t)
|t|1
Hs
χ |ξ |<1 |τ |2
(τ, ξ )| s−1 |F |F (τ, ξ )| . dτ ξ dτ |τ | |τ | − |ξ | L2 L2 ξ
ξ
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2361
Finally, by the standard energy inequality we have sup u3 (t)
Hs
|t|1
1
F3 (t)
dt sup F3 (t)H s−1
H s−1
|t|1
0
s−1 ξ F3 (τ, ξ ) dτ
L2ξ
s−1 |F (τ, ξ )| ξ , dτ |τ | − |ξ | L2 ξ
completing the proof of the lemma. s,b;p
13. Proof of the linear estimates in Xφ(ξ )
Here we prove (4.10) and (4.11) by an argument similar to the one used in [20] for the standard X s,b spaces. Moreover, we prove (4.12). 13.1. Proof of (4.10) s,−1/2;1
Letting G ∈ Xφ(ξ ) proving
s,−1/2;1
denote an arbitrary representative of F ∈ Xφ(ξ ) uXs,1/2;1 (S φ(ξ )
T)
(ST ), we reduce to
f H s + GXs,−1/2;1 . φ(ξ )
By density we may assume G ∈ S(R1+2 ). Denote by S(t) = e−itφ(D) the free propagator of −i∂t + φ(D). Split the solution of [−i∂t + φ(D)]u = G, u(0) "= f into homogeneous and inhot mogeneous parts, u = v + w, where v(t) = S(t)f and w(t) = 0 S(t − t )G(t ) dt . Since v (τ, ξ ) = δ(τ + φ(ξ ))f (ξ ), vXs,1/2;1 (S
T)
φ(ξ )
ρvXs,1/2;1 =
φ(ξ )
L
ξ s χτ +φ(ξ )∼L ρ
τ + φ(ξ ) f (ξ )L2
1/2
τ,ξ
L
=
L1/2 Pτ ∼L ρL2 f H s = ρB 1/2 f H s . t
2,1
L
Next, taking Fourier transform in space, t w
(t, ξ ) = 0
t , ξ dt e−i(t−t )φ(ξ ) G
eitλ − e−itφ(ξ ) G(λ, ξ ) dλ i(λ + φ(ξ ))
(13.1)
and then also in time, w (τ, ξ ) =
ξ) δ(τ − λ) − δ(τ + φ(ξ )) G(τ, − δ τ + φ(ξ )
g (ξ ), G(λ, ξ ) dλ = i(λ + φ(ξ )) i(τ + φ(ξ ))
2362
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
where
g (ξ ) =
ξ) G(λ, dλ. i(λ + φ(ξ ))
Now split G = G1 + G2 corresponding to the Fourier domains |τ + φ(ξ )| 1 and |τ + φ(ξ )| 1 respectively. Write w = w1 + w2 accordingly. Expand w 1 (t, ξ ) = e−itφ(ξ )
∞ [it (λ + φ(ξ ))]n ξ ) dλ χ G(λ, n!i(λ + φ(ξ )) |λ+φ(ξ )|1 n=1
hence w1 (t) =
∞ n t n=1
n!
(13.2)
S(t)fn
where f n (ξ ) =
n−1 ξ ) dλ i λ + φ(ξ ) χ|λ+φ(ξ )|1 G(λ,
(13.3)
and clearly fn H s GXs,−1/2;1 . φ(ξ )
Thus w1 Xs,1/2;1 (S φ(ξ )
T
∞ 1 t n ρ(t)S(t)fn s,1/2;1 Xφ(ξ ) n! φ(ξ ) n=1 ∞ ∞ n2n−1 1 n t ρ(t) 1/2 fn H s GXs,−1/2;1 B2,1 n! n! φ(ξ )
ρw1 Xs,1/2;1 )
n=1
n=1
since t n ρ(t)B 1/2 t n ρ(t)H 1 2n + n2n−1 . Finally, split w2 = a − b where 2,1
ξ) χ|τ +φ(ξ )| 1 G(τ, , i(τ + φ(ξ )) ξ) χ|λ+φ(ξ )| 1 G(λ,
b(τ, ξ ) = δ τ + φ(ξ ) h(ξ ), h(ξ ) = dλ. i(λ + φ(ξ )) a (τ, ξ ) =
Thus aXs,1/2;1 ∼ φ(ξ )
L 1
1 L1/2 Ds Pτ +φ(ξ )∼L G GXs,−1/2;1 . L φ(ξ )
(13.4) (13.5)
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
Moreover, hH s
L 1 L
−1 L1/2 Ds P τ +φ(ξ )∼L G
bXs,1/2;1 (S
T)
φ(ξ )
2363
by Cauchy–Schwarz, so
ρbXs,1/2;1 hH s GXs,−1/2;1 , φ(ξ )
φ(ξ )
and this completes the proof of (4.10). 13.2. Proof of (4.11) The argument here is similar, but we modify the splitting G = G1 + G2 , letting it corresponding to |τ + φ(ξ )| 1/T and |τ + φ(ξ )| 1/T respectively. Then (13.2) holds with fn given by the obvious modification of (13.3), hence fn H s
Ln−1 L1/2 Ds Pτ +φ(ξ )∼L G T −n+1/2+b GXs,b;∞ , φ(ξ )
L1/T
where we estimated
Ln−1/2−b ∼ T −n+1/2+b
L1/T
for b < 1/2, recalling that n 1, hence n − 1/2 − b > 0. Thus w1 Xs,1/2;1 (S φ(ξ )
T)
ρT w1 Xs,1/2;1 φ(ξ )
∞ 1 n T (t/T )n ρ(t/T )S(t)fn Xs,1/2;1 n! φ(ξ ) n=1
∞ 1 n T t n ρ(t)B 1/2 T −n+1/2+b GXs,b;∞ φ(ξ ) 2,1 n! n=1 ∞ n2n−1 T 1/2+b GXs,b;∞ , φ(ξ ) n!
n=1
where we used the elementary estimate 1/2−s s T s ρT B2,1 ρB2,1
(0 < s 1/2)
with s = 1/2 and ρ(t) replaced by t n ρ(t). The splitting w2 = a − b is defined as in (13.4) and (13.5) but with the obvious modifications, and we have aXs,1/2;1 ∼ φ(ξ )
L 1/T
L 1/T
1 L1/2 Ds Pτ +φ(ξ )∼L G L L−1/2−b GXs,b;∞ ∼ T 1/2+b GXs,b;∞ , φ(ξ )
φ(ξ )
2364
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
provided that −1/2 − b < 0, i.e. b > −1/2. Since, by Cauchy–Schwarz, hH s
1 L1/2 Ds Pτ +φ(ξ )∼L G, L
L 1/T
we also have bXs,1/2;1 (S φ(ξ )
T)
ρbXs,1/2;1 hH s T 1/2+b GXs,b;∞ , φ(ξ )
φ(ξ )
completing the proof of (4.11). 13.3. Proof of (4.12) With w(t) =
"t 0
S(t − t )G(t ) dt , (13.1) gives w
(t, ξ ) e−itφ(ξ )
eit (λ+φ(ξ )) − 1 G(λ, ξ ) dλ, i(λ + φ(ξ ))
implying (4.12). References [1] Nikolaos Bournaveas, Dominic Gibbeson, Low regularity global solutions of the Dirac–Klein–Gordon equations in one space dimension, Differential Integral Equations 19 (2) (2006) 211–222. [2] Philippe Bechouche, Norbert J. Mauser, Sigmund Selberg, On the asymptotic analysis of the Dirac–Maxwell system in the nonrelativistic limit, J. Hyperbolic Differ. Equ. 2 (1) (2005) 129–182. [3] I. Bejenaru, S. Herr, J. Holmer, D. Tataru, On the 2D Zakharov system with L2 -Schrödinger data, Nonlinearity 22 (5) (2009) 1063–1089. [4] Nikolaos Bournaveas, Local existence for the Maxwell–Dirac equations in three space dimensions, Comm. Partial Differential Equations 21 (5–6) (1996) 693–720. [5] Nikolaos Bournaveas, A new proof of global existence for the Dirac–Klein–Gordon equations in one space dimension, J. Funct. Anal. 173 (1) (2000) 203–213. [6] Nikolaos Bournaveas, Low regularity solutions of the Dirac–Klein–Gordon equations in two space dimensions, Comm. Partial Differential Equations 26 (7–8) (2001) 1345–1366. [7] John Chadam, Global solutions of the Cauchy problem for the (classical) coupled Maxwell–Dirac equations in one space dimension, J. Funct. Anal. 13 (1973) 173–184. [8] James Colliander, Justin Holmer, Nikolaos Tzirakis, Low regularity global well-posedness for the Zakharov and Klein–Gordon–Schrödinger systems, Trans. Amer. Math. Soc. 360 (9) (2008) 4619–4638. [9] J. Colliander, C. Kenig, G. Staffilani, Local well-posedness for dispersion-generalized Benjamin–Ono equations, Differential Integral Equations 16 (12) (2003) 1441–1472. [10] Piero D’Ancona, Damiano Foschi, Sigmund Selberg, Local well-posedness below the charge norm for the Dirac– Klein–Gordon system in two space dimensions, J. Hyperbolic Differ. Equ. 4 (2) (2007) 295–330. [11] Piero D’Ancona, Damiano Foschi, Sigmund Selberg, Null structure and almost optimal local regularity of the Dirac– Klein–Gordon system, J. Eur. Math. Soc. (JEMS) 4 (2007) 877–898. [12] Piero D’Ancona, Damiano Foschi, Sigmund Selberg, Null structure and almost optimal local well-posedness of the Maxwell–Dirac system, Amer. J. Math. 132 (3) (2010) 771–839. [13] Y.F. Fang, On the Dirac–Klein–Gordon equations in one space dimension, Differential Integral Equations 17 (11– 12) (2004) 1321–1346. [14] Y.F. Fang, M. Grillakis, On the Dirac–Klein–Gordon equations in three space dimensions, Comm. Partial Differential Equations 30 (4–6) (2005) 783–812. [15] G.B. Folland, Real Analysis: Modern Techniques and Their Applications, second ed., John Wiley, New York, 1999.
P. D’Ancona, S. Selberg / Journal of Functional Analysis 260 (2011) 2300–2365
2365
[16] Vladimir Georgiev, Small amplitude solutions of the Maxwell–Dirac equations, Indiana Univ. Math. J. 40 (3) (1991) 845–883. [17] Robert Glassey, Walter Strauss, Conservation laws for the classical Maxwell–Dirac and Klein–Gordon–Dirac equations, J. Math. Phys. 20 (3) (1979) 454–458. [18] Leonard Gross, The Cauchy problem for the coupled Maxwell and Dirac equations, Comm. Pure Appl. Math. 19 (1966) 1–15. [19] Axel Grünrock, Hartmut Pecher, Global solutions for the Dirac–Klein–Gordon system in two space dimensions, Comm. Partial Differential Equations 1 (2010) 89–112. [20] Carlo Kenig, Gustavo Ponce, Luis Vega, The Cauchy problem for the KdV equation in Sobolev spaces of negative indices, Duke Math. J. 71 (1) (1994) 1–21. [21] Sergiu Klainerman, Matei Machedon, Smoothing estimates for null forms and applications, Duke Math. J. 81 (1) (1995) 99–133. [22] Shuji Machihara, The Cauchy problem for the 1-D Dirac–Klein–Gordon equation, NoDEA Nonlinear Differential Equations Appl. 14 (5–6) (2007) 625–641. [23] Shuji Machihara, Kenji Nakanishi, Kotaro Tsugawa, Well-posedness for nonlinear Dirac equations in one dimension, Kyoto J. Math. 50 (2) (2010) 403–451. [24] Nader Masmoudi, Kenji Nakanishi, From Maxwell–Klein–Gordon and Maxwell–Dirac to Poisson–Schrödinger, Int. Math. Res. Not. IMRN 13 (2003) 697–734. [25] Evgeni Ovcharov, Inhomogeneous Strichartz estimates with spherical symmetry and applications to the Dirac– Klein–Gordon system in two space dimensions, arXiv:0903.5339. [26] Hartmut Pecher, Low regularity well-posedness for the one-dimensional Dirac–Klein–Gordon system, Electron. J. Differential Equations 150 (2006), 13 pp. (electronic). [27] Hartmut Pecher, Modified low regularity well-posedness for the one-dimensional Dirac–Klein–Gordon system, NoDEA Nonlinear Differential Equations Appl. 15 (3) (2008) 279–294. [28] Sigmund Selberg, Global well-posedness below the charge norm for the Dirac–Klein–Gordon system in one space dimension, Int. Math. Res. Not. IMRN 17 (2007), Art. ID rnm058, 25 pp. [29] Sigmund Selberg, Anisotropic bilinear L2 estimates related to the 3D wave equation, Int. Math. Res. Not. IMRN (2008), Art. ID rnn107, 63 pp. [30] Sigmund Selberg, Bilinear Fourier restriction estimates related to the 2d wave equation, preprint, 2010, available on http://arxiv.org/abs/1003.5978, Adv. Differential Equations, in press. [31] Sigmund Selberg, Achenef Tesfahun, Low regularity well-posedness of the Dirac–Klein–Gordon equations in one space dimension, Commun. Contemp. Math. 10 (2) (2008) 181–194. [32] Achenef Tesfahun, Global well-posedness of the 1D Dirac–Klein–Gordon system in Sobolev spaces of negative index, J. Hyperbolic Differ. Equ. 6 (3) (2009) 631–661.
Journal of Functional Analysis 260 (2011) 2366–2386 www.elsevier.com/locate/jfa
Power boundedness in Fourier and Fourier–Stieltjes algebras and other commutative Banach algebras E. Kaniuth a,∗,1 , A.T. Lau b,2 , A. Ülger c,3 a Institut für Mathematik, Universität Paderborn, D-33095 Paderborn, Germany b Department of Mathematical and Statistical Sciences, University of Alberta, Edmonton, Canada T6G 2G1 c Department of Mathematics, Koc University, 34450 Sariyer, Istanbul, Turkey
Received 30 August 2010; accepted 19 November 2010 Available online 26 November 2010 Communicated by K. Ball
Abstract We study power boundedness in the Fourier and Fourier–Stieltjes algebras, A(G) and B(G), of a locally compact group G as well as in some other commutative Banach algebras. The main results concern the question of when all elements with spectral radius at most one in any of these algebras are power bounded, the characterization of power bounded elements in A(G) and B(G) and also the structure of the Gelfand transform of a single power bounded element. © 2010 Elsevier Inc. All rights reserved. Keywords: Commutative Banach algebra; Structure space; Power bounded element; Locally compact group; Fourier algebra; Figà–Talamanca–Herz algebra; Fourier–Stieltjes algebra; Segal algebra; Dual algebra; Coset ring
0. Introduction This research is motivated by the work of Schreiber [30] on power bounded elements in the measure algebra M(G) of a locally compact abelian group G and is to some extent a continuation * Corresponding author.
E-mail addresses: [email protected] (E. Kaniuth), [email protected] (A.T. Lau), [email protected] (A. Ülger). 1 Supported by the German Research Foundation. 2 Supported by NSERC grant MS 100. 3 Supported by the TUBA and Tubitak Isbap project No. 107T896. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.11.012
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2367
of our recent article [23]. Recall that an element a of an arbitrary Banach algebra A is called power bounded if supn∈N a n < ∞ and that the spectral radius r(a) of any power bounded element a is 1. The Banach algebra A is said to have the power boundedness property (pbproperty) if every a ∈ A with r(a) 1 is power bounded. Let G be a locally compact group and let A(G) and B(G) be the Fourier and the Fourier– Stieltjes algebra of G, as introduced by Eymard [7]. These algebras are natural generalizations of the measure algebras and the L1 -algebras of locally compact abelian groups and have since been a major object of investigation in abstract harmonic analysis. The purpose of this paper is twofold. On the one hand, our aim is to find criteria, in terms of the group structure, for algebras such as A(G) and B(G) to have the power boundedness property. On the other hand, we want to characterize the power bounded elements of these algebras. Even though many of our results concern Fourier and Fourier–Stieltjes algebras, some are of considerably more general nature. The contents can be briefly described as follows. In Section 2 we prove that an abstract Segal algebra in A(G) (hence A(G) itself, in particular) has the power boundedness property if and only if G is discrete. As a consequence we obtain that B(G) has the power boundedness property precisely when G is finite. We also discuss the so-called Figà–Talamanca–Herz algebras, the Lp -analogues of A(G). However, for them we are only able to show that power boundedness forces G to be discrete under the additional hypothesis that G is amenable. Section 3 is devoted to extend major results of [30, Section 6] to general locally compact groups. Theorem 3.2 gives a necessary condition, in terms of the closed coset ring and characters of subgroups of G, for a closed subset E of G to be of the form Eu = {x ∈ G: |u(x)| = 1} for some power bounded element of B(G) and for a continuous function on E to be the restriction of some power bounded element of B(G). This generalizes the corresponding result of [30]. Necessary and sufficient conditions are given when E is both open and closed. When G is connected and amenable, a somewhat deeper characterization of power bounded elements in B(G) can be obtained. They turn out to be precisely those functions in B(G) which are either constant of modulus one or for which the sequence of powers is w ∗ -convergent to zero (Theorem 4.6). The statement of Theorem 4.6 is even new for connected abelian groups, and this also applies to several other of our results. In the more general setting of a commutative dual Banach algebra A, connectedness of (A) turns out to be equivalent to certain w ∗ -convergence conditions placed on the power bounded elements of A (Theorem 4.2). In Section 5 we give a criterion for discreteness of a locally compact group in terms of convergence of Ishikawa sequences associated with power bounded elements in B(G), and in the final section we determine explicitly the power bounded elements of two function algebras. Power bounded elements in the Fourier–Stieltjes algebra of a locally compact abelian group were first studied by Beurling and Helson [2], and later by Andersson [1] and other authors. There is an extensive literature on power bounded operators in Banach spaces. As a sample we mention [24], one of the main results of which we shall use. 1. Preliminaries Let A be a Banach algebra. An element a of A is said to be power bounded if supn∈N a n < ∞. The set of all power bounded elements of A will be denoted by PB(A). By Theorem 1.2 of [30], PB(A) has the following properties: (1) Every element a of PB(A) has spectral radius r(a) at most one.
2368
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
(2) If r(a) < 1, then a ∈ PB(A). (3) If A is commutative, then PB(A) is convex. We say that A has the power boundedness property (pb-property) if every a ∈ A with r(a) 1 is power bounded. Note that every uniform algebra has the pb-property. For a commutative Banach algebra A, we shall always denote by (A) the Gelfand spectrum of A, equipped with the w ∗ -topology, and by a → a, ˆ where a(γ ˆ ) = γ (a) for γ ∈ (A), the Gelfand homomorphism. For a ∈ A, let ˆ ) = 1 and Fa = γ ∈ (A): a(γ Ea = γ ∈ (A): a(γ ˆ )=1 . Recall that A is said to be regular if given a closed subset F of (A) and γ ∈ (A) \ F , there exists a ∈ A such that a(γ ˆ ) = 0 and a| ˆ F = 0. Given a closed subset F of (A), there are two distinguished ideals of A with hull equal to F , namely j (F ) = {a ∈ A: aˆ has compact support disjoint from F } and k(F ) = a ∈ A: a(γ ˆ ) = 0 for all γ ∈ F . The set F is called a set of synthesis or spectral set if k(F ) is the only closed ideal with hull equal to F , and F is a Ditkin set if a ∈ aj (F ) for every a ∈ k(F ). If A is regular and I is any ideal with h(I ) = F , then j (F ) ⊆ I ⊆ k(F ), and hence in this case F is a set of synthesis if and only if j (F ) = k(F ). As general references to spectral synthesis, we mention [21] and [28]. For any group H , the coset ring R(H ) is the Boolean ring generated by all cosets of subgroups of H . If H is a topological group, then the closed coset ring Rc (H ) is defined to be Rc (H ) = E ∈ R(H ): E is closed in H . For a locally compact abelian group G, the elements of Rc (G) have been completely described by Gilbert [14] and Schreiber [31]. Forrest [9] verified that the analogous description is valid for arbitrary locally compact groups G. A subset E of G belongs to Rc (G) if and only if E is of the form E=
n i=1
xi Hi \
ni
yij Kij ,
j =1
where xi , yij ∈ G, Hi is a closed subgroup of G and Kij is an open subgroup of Hi , n, ni ∈ N0 , 1 i n, 1 j ni . In particular, we shall use the fact that if E ∈ R(G), then the closure E of E belongs to Rc (G), which in [14] is the key step to the structure theorem of elements in Rc (G). Moreover, every compact set in R(G) is a finite union of cosets. For examples, see [29]. Let G be a locally compact group. The Fourier–Stieltjes algebra and the Fourier algebra, B(G) and A(G), have been introduced and studied extensively by Eymard in his seminal article [7].
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2369
The space B(G) is the linear span of the set P (G) of all continuous positive definite functions on G and can be identified with the dual space of the group C ∗ -algebra C ∗ (G). With pointwise multiplication and the dual norm, B(G) is a semisimple commutative Banach algebra. The Fourier algebra A(G) is the closed ideal of B(G) generated by all compactly supported functions in B(G). The spectrum of A(G) can be canonically identified with G. More precisely, the map x → ϕx , where ϕx (u) = u(x) for u ∈ A(G), is a homeomorphism from G onto (A(G)). The algebra A(G) is regular and, as shown in [25], admits a bounded approximate identity if and denotes the dual group of G, then only if G is amenable. Note that when G is abelian and G the Fourier–Stieltjes transform furnishes isometric isomorphisms between the measure algebra and the group algebra L1 (G) and A(G), respectively. For all this, compare [7]. M(G) and B(G) 2. Power bounded elements in Fourier algebras and Segal algebras on locally compact groups We start by recalling the definition of a Segal algebra from [4]. Let (B, · B ) be any Banach algebra. A Banach algebra (A, · A ) is called a Segal algebra in (B, · B ) if (1) A is a dense ideal in B; (2) there exists a constant α > 0 such that aB αaA for all a ∈ A; (3) there exists a constant β > 0 such that a1 a2 A βa1 B a2 A for all a1 , a2 ∈ A. Suppose that B is commutative. Then, by [4, Theorem 2.1], the map ϕ → ϕ|A is a homeomorphism from (B) onto (A). Moreover, A is semisimple if B is semisimple. For Segal algebras on locally compact abelian groups compare [27] and [28]. In the sequel we study the power boundedness property for Segal algebras in the Fourier algebra of a locally compact group. There are plenty of such Segal algebras. For instance, for any 1 p < ∞, we can take A(G) ∩ Lp (G), equipped with the norm f = f A(G) + f p ,
f ∈ A(G) ∩ Lp (G).
Segal algebras in Fourier algebras were recently studied in [12] under operator space aspects. We start with three lemmas, which are used to prove Theorem 2.4 below, but appear to be of independent interest. Lemma 2.1. Let G be a locally compact group with the property that each compact subset of G belongs to the coset ring Rc (G). Then G is discrete. Proof. For the sake of brevity we say that a locally compact group H has property (∗) if every compact subset of H lies in Rc (H ). We first show that if H is any σ -compact amenable locally compact group satisfying (∗), then H must be discrete. For that, by [22, Proposition 2.1] it suffices to show that spectral synthesis holds for A(H ). Thus let E be any closed subset of H . Since H is σ -compact, E = ∞ i=1 Ei where each Ei is compact. By hypothesis, Ei ∈ Rc (H ). Since H is amenable, Ei is a spectral set and the ideal k(Ei ) has a bounded approximate identity [11, Lemma 2.2]. In particular, each Ei is a Ditkin set. Since a closed countable union of Ditkin sets is again a Ditkin set (see [21, Theorem 5.2.2]), we conclude that E is a spectral set for A(H ), as was to be shown.
2370
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
Notice next that if H is a closed subgroup of a locally compact group G and G has property (∗), then so does H . Indeed, if K is any compact subset of H , then K ∈ Rc (G) and, using the structure of sets in Rc (G) and elementary group theory, it is easily verified that E ∩ H ∈ Rc (H ) for every E ∈ Rc (G). Now let G be the given group and let G0 denote the connected component of the identity of G. Since G/G0 is totally disconnected, we can choose an open subgroup H of G such that H /G0 is compact. We have to show that H is discrete. Every such group H is a projective limit of Lie groups. So there exists a compact normal subgroup C of H such that H /C is a Lie group. Since C has property (∗) and is compact, it must be finite, and hence H is a Lie group. Let R denote the radical of the connected Lie group H0 . We now further exploit the fact that if L is an amenable σ -compact group having property (∗), then L is discrete. Since R is solvable and connected, it follows that R is trivial. So H0 is a connected semisimple Lie group. If H0 is compact, it must be trivial. If H0 is noncompact then the Iwasawa decomposition shows that H0 contains a closed subgroup which is isomorphic to R and has property (∗). This is impossible and therefore H0 is trivial and hence H is discrete since H0 is open in H . This completes the proof. 2 Recall that for any locally compact group G and u ∈ B(G), Eu = x ∈ G: u(x) = 1 and Fu = x ∈ G: u(x) = 1 . Lemma 2.2. Let H be a totally disconnected compact group. If A(H ) has the power boundedness property, then H must be finite. Proof. Since H is totally disconnected it is a projective limit of finite groups. Suppose that H is infinite. Then we can find of closed normal subgroups Hn of H
a strictly decreasing ∞ sequence −n 1 1 of finite index. Let K = ∞ H and u = 2 Hn ∈ P (H ). Then K has infinite index n=1 n n=1 in H and Fu = K. By a well-known result due to Kakutani and Kodaira [20] there exists a closed normal subgroup N of H such that H /N is second countable and u is constant on cosets of N . Since Fu = K, N is contained in K. So N/K is second countable and therefore every closed subset of H /K equals Ev for some v ∈ A(H /K). Since A(H /K) has the pb-property, by Theorem 4.1 of [23] every closed subset of H /K is contained in Rc (H /K). Lemma 2.1 now implies that H /K is discrete and hence finite. This contradiction completes the proof. 2 Lemma 2.3. Let G be a locally compact group, H an open subgroup of G and K a compact normal subgroup of H such that H /K is second countable. Let A be a Segal algebra in A(G) and suppose that A has the power boundedness property. Then, for any compact subset C of H which is a union of K-cosets, we have C ∈ Rc (G). Proof. Since H /K is second countable, by [23, Lemma 4.3] there exists w ∈ B(H /K) such that w∞ = 1 and Fw = C/K. Let q denote the quotient homomorphism and let v denote the trivial extension of w ◦ q to all of G. Then v∞ = 1 and Fu = C. As C is compact, there exists u ∈ j (∅) such that 0 u 1 and u = 1 on C. Then uv ∈ j (∅) ⊆ A and it satisfies uv∞ = 1 and Fuv = C. Since A has the pb-property, there exists a constant C > 0 such that (uv)n C for all n ∈ N. Now · A(G) α · A for some constant α. It follows that uv is a power bounded element of A(G) and hence C = Fuv ∈ Rc (G) by [23, Theorem 4.1]. 2
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2371
The following theorem is the first main result of this section. Theorem 2.4. Let G be a locally compact group and let A be a Segal algebra in A(G). Then A has the power boundedness property if and only if G is discrete. In particular, A(G) has the power boundedness property if and only if G is discrete. Proof. Since A is semisimple, A has the pb-property if G is discrete [30, Corollary 2.3]. Conversely, suppose that A has the pb-property. Since G/G0 is totally disconnected, we can choose an open subgroup H of G such that H /G0 is compact. It suffices to show that H is finite. Now H is a projective limit of Lie groups. Fix a compact normal subgroup K of H such that H /K is a Lie group, so second countable. Then, by Lemma 2.3 every compact subset C of H , which is a union of K-cosets, belongs to Rc (G). Thus every compact subset of H /K belongs to Rc (G/K) and hence to Rc (H /K). Lemma 2.1 now implies that H /K is discrete. Thus G0 ⊆ K, and since both H /G0 and K are compact, it follows that H is compact. We show next that A(H ) has the pb-property. Since H is open and compact, A(H ) embeds isometrically into Ac (G) = A(G) ∩ Cc (G) via the mapping i : u → i(u), where i(u) is the trivial extension of u to G. Let u ∈ A(H ) be such that u∞ = 1. Since (A) = G (point evaluations) and i(u) vanishes outside of H , rA (u) = u∞ = 1. Therefore, since A has the pb-property, i(u)n A C for some constant C and all n ∈ N. On the other hand, · A(G) α · A for some constant α. It follows that n u
A(H )
= i(u)n A(G) α i(u)n A αC
for all n ∈ N. This shows that A(H ) has the pb-property. Since H is a totally disconnected compact group, Lemma 2.2 implies that H is finite. 2 Next we consider the power boundedness property for certain ideals of A(G). Proposition 2.5. Let G be a locally compact group and E a closed subset of G. If the ideal k(E) has the power boundedness property, then every compact subset of G \ E belongs to the coset ring R(G). Proof. Let K be any compact subset of G \ E and choose a compactly generated open subgroup H of G containing K. Then H \ K is σ -compact and hence there exists v ∈ A(H ) with v∞ 1 and Fv = K and v = 0 on H ∩E (compare the proof of Theorem 2.4). Now let u denote the trivial extension of v to all of G. Then u ∈ k(E), u∞ 1 and Fu = K. By hypothesis, u is power bounded and hence Fu ∈ Rc (G). 2 Corollary 2.6. Let G be an amenable locally compact group and suppose that E is a countable subset of G and G \ E is σ -compact. If the ideal k(E) has the power boundedness property, then G is discrete. Proof. The statement follows once we have seen that every closed subset F of G is a set of synthesis for A(G). As G \ E is σ -compact, F = ∞ j =1 Fn ∪ F0 , where F0 is a closed subset of E and each Fn , n ∈ N, is a compact subset of G \ E. By Proposition 2.5, Fn ∈ Rc (G), n ∈ N, and hence Fn is a Ditkin set for A(G). On the other hand, F0 is a countable union of singletons and hence also is a Ditkin set. Being a countable union of Ditkin sets, E is a Ditkin set. 2
2372
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
Since k(∅) = A(G), the preceding corollary extends Theorem 2.4 when G is an amenable second countable group. In Corollary 6.5 of [30] it was shown that if G is a connected locally compact abelian group fˆ(γ ) = 1} is finite. Since conand f is a power bounded element of L1 (G), then the set {γ ∈ G: is compact-free (see [16, Theorem 24.17]), the following nectedness of G is equivalent to that G generalizes [30, Corollary 6.5]. Corollary 2.7. Let G be a locally compact group such that G contains no nontrivial compact subgroup. Let u be a power bounded element of B0 (G) = u ∈ B(G): u ∈ C0 (G) . Then Eu is finite. Proof. Since u vanishes at infinity, the set Eu , which belongs to Rc (G), must be compact. Therefore Eu is a finite union of cosets of compact subgroups of G. By the hypothesis on G, this means that Eu is finite. 2 We now turn to the problem of when the Fourier–Stieltjes algebra B(G) has the power boundedness property. The result will be an easy consequence of Theorem 2.4 and the following lemma. Lemma 2.8. Let G be a discrete group. If every subset of G is contained in R(G), then G is finite. Proof. Let WAP(G) denote the space of weakly almost periodic functions on G. The hypothesis implies that 1E ∈ B(G) ⊆ WAP(G) for every subset E of G. This in turn implies that ∞ (G) ⊆ WAP(G) and hence these two spaces are equal. Since WAP(G) has a unique invariant mean [3], so does ∞ (G). However, this forces G to be finite (see [26, Chapter VI]). 2 Corollary 2.9. Let G be any locally compact group. Then B(G) has the power boundedness property if and only if G is finite. Proof. We only have to show that if B(G) has the pb-property, then G is finite. If B(G) has the pb-property, so does A(G) and hence G is discrete by Theorem 2.4. By the standard argument, we can assume that G is countable. Then, given any subset E of G, by [23, Lemma 4.3], there exists u ∈ B(G) with u∞ = 1 and Fu = E. Since u is power bounded, Fu ∈ R(G) by [23, Theorem 4.1]. Lemma 2.8 now shows that G is finite. 2 For a locally compact group G, Herz has introduced Lp -versions, Ap (G), of the Fourier algebra for all 1 < p < ∞. These algebras are nowadays usually referred to as the Figà– Talamanca–Herz algebras. We refer to [15] and [8] for the definition and basic properties of Ap (G). In particular, Ap (G) is a semisimple regular commutative Banach algebra with spectrum G. It is expected that in the following theorem, which is the second main result of this section, the hypothesis of amenability can be dropped. However, we have been unable to show this. Theorem 2.10. Let G be a first countable amenable locally compact group and 1 < p < ∞. Then Ap (G) has the power boundedness property if and only if G is discrete.
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2373
Proof. We only have to show the necessity of the condition and for that we can assume that G is second countable. Indeed, if H is a compactly generated open subgroup of G, then H is second countable and Ap (H ) can be considered as a closed subalgebra of Ap (G) and hence has the power boundedness property. Let E be any compact subset of G. Let Bp (G) denote the algebra of all bounded continuous functions v on G which are multipliers of Ap (G), that is, vAp (G) ⊆ Ap (G). Then, as in the proof of [23, Lemma 4.3], we find v ∈ Bp (G) such that Fv = E and v∞ = 1. Since Ap (G) is regular, there exists w ∈ Ap (G) such that w = 1 on E and w∞ = 1. Now the element u = vw of Ap (G) satisfies Fu = E and u∞ = 1. Because G is amenable, the algebra Ap (G) has a bounded approximate identity [15] and therefore the closed ideal I = (1G − u)Ap (G) of Ap (G) has a bounded approximate identity by [23, Theorem 1.7]. Since h(I ) = E, [10, Proposition 3.13] implies that E ◦ , the interior of E, is closed in G. It is now easy to see that if E ◦ is closed in G for every compact subset E of G, then G must be discrete. In fact, if G0 , the connected component of the identity, is nontrivial, then take E = U , where U is any nonempty, relatively compact subset of G0 , whereas, if G is totally disconnected and H is any infinite compact open subgroup of G, one can take for E the intersection of a strictly decreasing sequence of subgroups of finite index in H (see the proof of Lemma 2.2). 2 With somewhat more effort, similar arguments as those in the proof of Theorem 2.4 can be used to show that in Theorem 2.10 the hypothesis that G be first countable can be dropped. 3. On power bounded elements in Fourier–Stieltjes algebras The main purpose of this section is to describe, for power bounded elements u of the Fourier– Stieltjes algebra B(G), the restriction of u to Eu , u|Eu , in terms of the coset ring of G and affine maps. The main result, Theorem 3.2 below, gives a necessary condition for a subset E of G to be of the form Eu for some u ∈ PB(B(G)) and for a continuous function on E to be the restriction of some u ∈ PB(G). We start by recalling the notions of affine and piecewise affine maps. Let G and H be groups. A map α : C ⊆ G → H is called affine if C is a coset and for any r, s, t ∈ C,
α rs −1 t = α(r)α(s)−1 α(t). A map α : Y ⊆ G → H is called piecewise affine if (i) there exist pairwise disjoint sets Yi ∈ R(G), i = 1, . . . , n, such that Y = ni=1 Yi , (ii) each Yi is contained in a coset Ci on which there is an affine map αi : Ci → H such that αi |Yi = α|Yi . The proof of the following lemma is patterned after that of [30, Lemma 6.1]. Lemma 3.1. Let G be a locally compact group and u a power bounded element of B(G) such that Eu is open in G. Then u|Eu is a piecewise affine map from Eu into T. Proof. For f ∈ B(T), define a function φ(f ) on G by φ(f )(x) = f (u(x)) for x ∈ Eu and φ(f )(x) = 0 otherwise. Then φ(f ) is continuous since Eu is open and closed in G. Because 1 (Z), we have B(T) =
2374
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
fˇ(n)u n ∈ B(G),
n∈Z
where fˇ denotes the inverse Fourier transform of f , and φ(f )(x) =
fˇ(n)u(x) n
n∈Z
for all x ∈ Eu . Since Eu ∈ Rc (G), 1Eu ∈ B(G), and therefore φ(f ) = 1Eu ·
fˇ(n)u n ∈ B(G).
n∈Z
Since f g is the inverse Fourier transform of fˇ ∗ g, ˇ it is straightforward to check that φ is a homomorphism from B(T) into B(G). Since φ is bounded and B(T) = 1 (Z) carries the MAX operator space structure [6, p. 316], φ is actually completely bounded [6, p. 49]. It now follows from [18, Theorem 3.7] that there exists an affine map α : Y ⊆ G → T such that, for each f ∈ B(T) and x ∈ G, φ(f )(x) = f (α(x)) whenever x ∈ Y and φ(f )(x) = 0 otherwise. Here Y = x ∈ G: φ(f )(x) = 0 for some f ∈ B(T) . It is then obvious that Y = Eu and α = u|Eu . So u|Eu is piecewise affine.
2
Theorem 3.2. Let G be a locally compact group and let u be a power bounded element of B(G). Then there exist closed subsets F1 , . . . , Fn of G with the following properties: (1) Fj ∈ Rc (G), 1 j n, and Eu = nj=1 Fj . (2) For each j = 1, . . . , n, there exist a closed subgroup Hj of G, aj ∈ G, αj ∈ T and a continuous character γj of Hj such that Fj ⊆ aj Hj and
u(x) = αj γj aj−1 x for all x ∈ Fj . Proof. We apply Lemma 3.1 to Gd , the group G equipped with the discrete topology. Let i : Gd → G denote the identity map. Then u ◦ i ∈ B(Gd ) and u ◦ iB(Gd ) = uB(G) [7, Théorème 2.20], and hence u ◦ i is power bounded. Therefore, by Lemma 3.1 there exist subsets Si of G, subgroups Li of G, ci ∈ G and affine maps βi : ci Li → T, i = 1, . . . , n, with the following properties: (1) Si ∈ R(Gd ) and Eu = ni=1 Si . (2) For each i = 1, . . . , n, Si ⊆ ci Li and βi |Si = u|Si . Now each Si is of the form q l=1
d l Ml \
ql k=1
elk Nlk ,
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2375
where dl , elk ∈ G, the Ml are subgroups of G and the Nlk are subgroups of Ml , 1 l q, 1 k ql . Thus, by a further reduction step, we can assume that we only have to consider a set S of the form m S=a H \ bj Kj ⊆ bT , j =1
where bj ∈ H and the Kj are subgroups of H , and that there exists an affine map β : bT → T such that β|S = u|S . Furthermore, we can assume that each Kj has infinite index in H because otherwise, for some j , H is a finite union of Kj -cosets and therefore can be assumed to be simply a coset. Now m
bj Kj H = H ∩ a −1 bT ∪
and H ∩ a −1 bT = ∅,
j =1
because otherwise at least one of the Kj has finite index in H . It follows that H ∩ a −1 bT = h(H ∩ T ) for some h ∈ H and H ∩ T has finite index in H . So S is contained in a finite union of cosets of T ∩ H and consequently we can assume that S ⊆ c(T ∩ H ) for some c ∈ G. Since also S ⊆ bT , we have bT = cT . Hence δ = β|c(T ∩H ) is an affine map satisfying δ|S = u|S . Now S ⊆ c(T ∩ H ) implies that a = ch for some h ∈ H and therefore S=c H \
m
= c (T ∩ H ) \
hbj Kj
j =1
m
hbj Kj .
j =1
If hbj Kj ∩ (T ∩ H ) = ∅, then hbj = tk for some t ∈ (T ∩ H ) and k ∈ Kj and hence hbj Kj ∩ (T ∩ H ) = tKj ∩ (T ∩ H ) = t (Kj ∩ T ∩ H ). Thus, setting A = T ∩ H and Bj = hbj Kj ∩ (T ∩ H ), we have S =c A\
m
Bj ,
j =1
where Bj is either empty or a coset in A. In addition, since Kj has infinite index in H and A has finite index in H , the subgroup corresponding to Bj has infinite index in A. When G is abelian, in precisely the above setting it was shown by Cohen [5] that, since u ∈ B(G) is uniformly continuous, the affine map δ : cA → T is uniformly continuous as well and hence extends to a continuous affine map δ : cA → T. We briefly indicate the proof in the current nonabelian situation. The first observation is that there are elements a1 , . . . , am+1 of S / Kj whenever k = l, 1 k, l m + 1. To see this, let Bj such that, for all j = 1, . . . , n, ak−1 al ∈ be a coset of the subgroup Hj of H , pick an element a1 of S, and define inductively the sequence of ak s by choosing ak+1 ∈ S \
k i=1
ai (H1 ∪ · · · ∪ Hn )
2376
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
arbitrarily. This is possible because H cannot be covered by finitely many cosets of subgroups of infinite index in H [18, Proposition 2.2]. Next observe that if x, y ∈ cH , then xy −1 ak ∈ S for some 1 k m + 1. Indeed, otherwise there exist k, l ∈ {1, . . . , m + 1}, k = l, such that −1 −1
ak−1 al = xy −1 ak xy al ∈ Kj for some j , contradicting the choice of the ak . The remainder of the proof is now entirely analogous to the one on page 223 of [5], using the uniform continuity of the function u ∈ B(G). Then δ agrees with u on S since u is continuous. Let γ denote the continuous character of A associated with δ. Then u(x) = αγ (c−1 x) for all x ∈ S. Finally, since Eu is closed in G, Eu is a finite union of such sets S and on each such set S, u is of the form stated in (2). This completes the proof of the theorem. 2 Corollary 3.3. Let u be a power bounded element of A(G). Then in the description of Eu and u|Eu in Theorem 3.2 each Fj can be chosen to be a compact coset in G. Proof. We only have to note that Eu is compact and that every compact set in R(G) is a finite union of cosets of compact subgroups of G. 2 When G is abelian, every character of a closed subgroup H of G extends to a character of G. The preceding theorem therefore generalizes Theorem 6.2 of [30]. Even for abelian G and u ∈ B(G), there seems to be no necessary and sufficient criterion in terms of Eu , the closed coset ring and piecewise affine maps for u to be power bounded. However, if Eu is open in G, we have the following result, which generalizes [30, Theorem 6.7]. Theorem 3.4. Let G be an arbitrary locally compact group and let u ∈ B(G) be such that Eu is open in G. Then u is power bounded if and only if there exist (i) pairwise disjoint open sets F1 , . . . , Fn in R(G) such that Eu = nj=1 Fj and open subgroups Hj of G and aj ∈ G such that Fj ⊆ aj Hj , j = 1, . . . , n, and (ii) characters γj of Hj and αj ∈ T, j = 1, . . . , n, such that
u(x) = αj γj aj−1 x for all x ∈ Fj . Proof. Suppose first that u is power bounded. By Lemma 3.1, u|Eu is a piecewise affine map from Eu into T. Let R0 (G) denote the open coset ring of G, the smallest ring of subsets of G containing all open cosets. Using [18, Lemma 1.3(ii)] and its proof, we can write Eu as a disjoint union Eu = nj=1 Fj of open sets in R0 (G) such that for each j , there are an open subgroup Hj , an element aj of G and a continuous affine map βj : aj Hj → T such that βj |Fj = u|Fj . Now define γj : Hj → T by γj (h) = βj (aj )−1 βj (aj h),
h ∈ H.
Then it is known and easily verified that γj is a continuous character of Hj , and of course γj satisfies u(x) = γj (aj−1 x) for all x ∈ Fj .
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2377
Conversely, let (i) and (ii) be satisfied and let γ˜j denote the trivial extension of γj to all of G. Since Fj is an open and closed set in R(G), 1Fj is an idempotent in B(G). Now u can be written as u=
n
αj 1Fj · Laj γ˜j .
j =1
Since the sets Fj are pairwise disjoint, it follows that, for all q ∈ N, uq =
n
q q αj 1Fj Laj γ˜j ,
j =1
and therefore, since |αj | = 1 = 1Fj B(G) , q u
B(G) =
n q La γ˜ j j B(G) j =1
n q γ˜
n q γ
j =1
j =1
j
n j =1
whence u is power bounded.
= B(G)
j
B(G)
q
γj B(Hj ) = n,
2
Corollary 3.5. Let u ∈ A(G) be such that u∞ 1 and Eu is open in G. Then u is power bounded if and only if there exist a compact open subgroup K of G, characters χ1 , . . . , χn of K, elements a1 , . . . , an of G and α1 , . . . , αn ∈ T such that (i) Eu = nj=1 aj K; (ii) u(x) = αj χj (aj−1 x) for x ∈ aj K, 1 j n. Proof. By Theorem 3.4 we only have to show that if u is power bounded, then the sets Fj in (i) of that theorem can be chosen to be cosets of a single compact open subgroup of G. Fix j and p note that, since Eu is compact, F = Fj can be written as a finite union F = i=1 ci Ci , were all Ci are compact subgroups. Since F is open in G, some of the Ci , say precisely C1 , . . . , Cq , q q p, are open in G. Then the open subset F \ i=1 ci Ci has to be empty. It follows that F is a
q finite union of cosets of the compact open subgroup i=1 Ci of G. Thus each Fj is a finite union of cosets
of some compact open subgroup Kj and hence also of the compact open subgroup K = nj=1 Kj . 2 The following corollary, which will be used in Section 4, characterizes the power bounded elements u of B(G) satisfying Eu = G.
2378
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
Corollary 3.6. Let G be a connected locally compact group and let u ∈ B(G) such that |u(x)| = 1 for all x ∈ G. Then u is power bounded if and only if there exist α ∈ T and a character γ of G such that u(x) = αγ (x) for all x ∈ G. In particular, such a u is constant on cosets of the commutator subgroup of G. Finally, we determine the extreme points of the convex set PB(A) for certain subalgebras A of B(G). Proposition 3.7. Let A be any closed subalgebra of B(G) containing A(G). Then u ∈ A is an extreme point of PB(A) if and only if |u(x)| = 1 for all x ∈ G. In particular, if G is noncompact and A ⊆ C0 (G), then PB(A) has no extreme points. Proof. If Eu = G, then u is an extreme point of the unit ball of C b (G). If u fails to be an extreme point of PB(A), then there exists v ∈ A, v = 0, such that the elements 12 (u + v) and 12 (u − v) are power bounded. Thus 12 (u + v)∞ 1 and 12 (u − v)∞ 1. This contradicts the fact that u is an extreme point of the unit ball of C b (G). Conversely, let u be an extreme point of PB(A) and, towards a contradiction, assume that |u(x0 )| < 1 for some x0 ∈ G. Choose an open, relatively compact neighbourhood V of x0 such that V ∩ Eu = ∅. Then u|V ∞ < 1. Since A(G) ⊆ A and A(G) is regular, there exists v ∈ A such that v = 0 on G \ V , v(x0 ) = 0 and v∞ < 1 − u|V ∞ . Then, by construction of v, u = u ± v = 1, u = u ± v on a neighbourhood of Eu and Eu±v = Eu . This implies that u ± v ∈ A is power bounded [30, Corollary 3.4], contradicting the fact that u is an extreme point of PB(A). 2 Corollary 3.8. Let G be a connected group. Then the extreme points of PB(B(G)) are precisely the functions u of the form u(x) = αγ (x), x ∈ G, where α ∈ T and γ is a continuous character of G. 4. Connected Gelfand spectrum and power bounded elements Recall that a semisimple commutative Banach algebra A is said to be a dual Banach algebra if there exists a Banach space X such that A = X ∗ and the multiplication in A is separately w ∗ continuous. Connectedness of the spectrum of a dual Banach algebra A turns out to be closely related to convergence of sequences (a n )n∈N for power bounded elements a ∈ A. To accomplish the corresponding results, we are going to employ, apart from harmonic analysis tools, various other resources, such as the Ishikawa iteration process [19] (as in [23, Corollary 1.3]), a theorem of Katznelson and Tzafriri [24] concerning the perispheral spectrum of power bounded operators on a Banach space and a Toeplitz summation theorem (see [32]). Suppose that A is unital with identity e and let a ∈ A. In the sequel, the Ishikawa sequence associated to a is always understood n to be sequence of elements ( e+a 2 ) , n ∈ N. Proposition 4.1. Let A = X ∗ be a dual semisimple commutative Banach algebra with identity e, and let a ∈ A be power bounded. n (i) If u ∈ A is a w ∗ -cluster point of the sequence ( e+a 2 ) , n ∈ N, then u is an idempotent and satisfies au = u. n (ii) If w ∗ -limn→∞ a n = 0, then w ∗ -limn→∞ ( e+a 2 ) = 0.
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2379
Proof. (i) The mapping La : A → A, b → ab is power bounded since La = a and Lna = La n . Therefore, by [23, Corollary 1.3], e + a n+1 e+a n b − b →0 2 2 for every b ∈ A. In particular, taking b = e, e + a n+1 e + a n → 0. − 2 2 n Now, let u ∈ A be a w ∗ -cluster point of the sequence ( e+a 2 ) , n ∈ N. Then 2 u = u and also au = u.
(ii) For n, k ∈ N0 , let ck (n) = 2−n nk . Then
e+a 2 u = u. This implies
∞ n (1) k=0 ck (n) = k=0 ck (n) = 1 for all n ∈ N0 ; (2) limn→∞ ck (n) = 0 for each k ∈ N0 . Since the sequence (a n )n∈N is w ∗ -convergent and
e+a 2
n
n ∞ 1 n k a = = n ck (n)a k , k 2 k=0
k=0
it follows that, for all x ∈ X, n (3) limn→∞ ( e+a 2 ) , x = limn→∞
∞
k=0 ck (n)a
k , x.
Now (1) and (2) show that the summation method defined by the doubly infinite matrix with entries ck (n) is ‘regular’ in the sense of summation theory. It then follows from (3), w ∗ limn→∞ a n = 0 and the Toeplitz summation theorem (see [32]) that lim
n→∞
for each x ∈ X, as was to be shown.
e+a 2
n
,x = 0
2
The main results of this section are the following theorem and Theorem 4.6 below. Theorem 4.2. Let A = X ∗ be a semisimple commutative dual Banach algebra with identity e. Then the following are equivalent. (i) (A) is connected. (ii) For each power bounded element a of A, a = e, with Ea = Fa , we have w ∗ -limn→∞ a n = 0. n (iii) For each power bounded element a of A, a = e, w ∗ -limn→∞ ( e+a 2 ) = 0.
2380
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
Proof. (i) ⇒ (ii) Let a ∈ PB(A) be such that a = e and Ea = Fa . As in the proof of Proposition 4.1(i), consider the power bounded linear operator La : b → ab of A. Then
σ (La ) = aˆ (A)
and aˆ (A) ∩ T = Ea = Fa .
Thus σ (La ) ∩ T ⊆ {1}, and it follows from [24, Theorem 1 and the Remark on page 317] that lim a n+1 − a n = lim Ln+1 − Lna = 0. a
n→∞
n→∞
Let u be a w ∗ -cluster point of the sequence (a n )n∈N . Then au = u and this in turn implies that u2 = u. Hence, since (A) is connected, either u = 0 or u = e. In the latter case it follows that a = e. This contradiction shows that 0 is the only w ∗ -cluster point of the sequence (a n )n∈N . Consequently, w ∗ -limn→∞ a n = 0. (ii) ⇒ (iii) is immediate from Proposition 4.1(ii). (iii) ⇒ (i) Towards a contradiction, assume that (A) is not connected. Then, by Shilov’s idempotent theorem, there exists an idempotent a in A with 0 = a = e. Clearly, a is power e+a n bounded and ( e+a 2 ) = 2 = 0 for all n ∈ N, contradicting (iii). 2 We now present the Hardy algebra as an example to which the preceding theorem applies. The result can also easily be deduced from the fact that w ∗ -convergence in H ∞ (D) is equivalent to pointwise convergence plus uniform boundedness (see Theorem 5.3 and its proof of Garnett’s book [13]). Example 4.3. Let H ∞ (D) be the algebra of all bounded analytic functions on the open unit disk D = {z ∈ C: |z| < 1}, equipped with the uniform norm. By Carleson’s Corona Theorem, the spectrum of H ∞ (D) is connected (see [13, Chapter VIII] or [17, Chapter 10]). Moreover, H ∞ (D) is a dual Banach algebra. In fact, its unique predual is X = L1 (T)/H0 (T), where H0 (T) is the closure in L1 (T) of the set of all complex polynomials without constant term [13, Chapter V, Section 5]. n Let f ∈ H ∞ (D) with f = 1 and f ∞ 1. Then, by Theorem 4.2, w ∗ -limn→∞ ( 1+f 2 ) =0 ∗ n and, if in addition Ef = Ff , then w -limn→∞ f = 0. Turning to locally compact groups and A = B(G), note that if u ∈ B(G) = C ∗ (G)∗ has the property that w ∗ -limn→∞ un = 0, then u is power bounded. In fact, this follows readily from the uniform boundedness principle. We now attack the problem of whether conversely power boundedness of u entails w ∗ -limn→∞ un = 0. The first partial answer is a consequence of Theorem 4.2. Corollary 4.4. Let G be a connected locally compact group and let u ∈ B(G) be such that u = 1G and Eu = Fu . Then u is power bounded if and only if w ∗ -limn→∞ un = 0. In particular, if u ∈ B(G), then |u| is power bounded if and only if w ∗ -limn→∞ |u|n = 0. Proof. If G is connected, so is (B(G)). Indeed, otherwise there exists an idempotent v ∈ B(G) such that 0 = v = 1G , and since G is determining for B(G), we conclude that {x ∈ G: u(x) = 1} is a proper nonempty open and closed subset of G. Thus, if u is power bounded, the implication (i) ⇒ (ii) of Theorem 4.2 shows that w ∗ -limn→∞ un = 0. 2 The next proposition, which will be used in Theorem 4.6 below, shows that if Eu = G, then in Corollary 4.4 we can drop the absolute value.
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2381
Proposition 4.5. Let G be a connected locally compact group and let u ∈ B(G) be such that |u(x)| = 1 for all x ∈ G and u is nonconstant. Then u is power bounded if and only if w ∗ limn→∞ un = 0. Proof. We only have to show that the limit condition is necessary. By Lemma 3.6 there exist α ∈ T and a character γ of G such that u(x) = αγ (x) for all x ∈ G. Of course we can assume that α = 1. Let N = {x ∈ G: γ (x) = 1} and define β on G/N by β(xN ) = γ (x). Then β is a faithful character of G/N . Since G/N is connected, β(G/N ) = T and β is a topological isomorphism between G/N and T. Thus we can identify G/N with T, and then β is of the form β(z) = zm for all z ∈ T and some m ∈ Z, m = 0. Let φ : L1 (G) → L1 (G/N ) = L1 (T) be the surjective homomorphism defined by φ(f )(xN ) = N f (xt) dt, x ∈ G. Then φ extends uniquely to a continuous homomorphism from C ∗ (G) onto C ∗ (G/N ). It suffices to verify that γ n , f → 0 for all f in some subalgebra A of L1 (G) which is dense in C ∗ (G). Choose A to consist of all f ∈ L1 (G) such that φ(f ) is a trigonometric polynomial on G/N = T. Then A is dense in L1 (G) since the trigonometric polynomials are dense in L1 (T). Fix f ∈ A and let φ(f )(z) =
r
cj znj ,
z ∈ T,
j =1
where c1 , . . . , cr ∈ C and n1 , . . . , nr ∈ Z. Then, normalizing Haar measures on G, N and T appropriately and using Weil’s formula, γ n, f =
γ (xt)n f (xt) dt d(xN )
G/N N
=
β(z)n φ(f )(z) dz T
=
r j =1
Since
Tz
q
znm+nj dz.
cj T
dz = 0 whenever q = −1, we get that γ n , f = 0 for sufficiently large n ∈ N.
2
Of course, it is desirable to drop the hypothesis that Eu = Fu . As we are now going to show, using entirely different tools, this can be done under the assumption that G is amenable. Theorem 4.6. Let G be an amenable and connected locally compact group and let u be a nonconstant function in B(G). Then u is power bounded if and only if w ∗ -limn→∞ un = 0. Proof. By the remark preceding Corollary 4.4, we have to show that if u ∈ B(G) is power bounded, then w ∗ -limn→∞ un = 0. By Proposition 4.5 we can assume that Eu = G. Consider the closed ideal
2382
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
A0 (u) = v ∈ A(G): lim un v A(G) = 0 n→∞
of A(G). Then, as proved in [23, Theorem 2.6], j (Eu ) ⊆ A0 (u) ⊆ k(Eu ). Moreover, by [23, Theorem 4.1], Eu ∈ Rc (G). Since G is amenable, it follows that Eu is a set of synthesis and k(Eu ) has a bounded approximate identity [11, Lemma 2.2]. Therefore A0 (u) = k(Eu ) and the ideal A0 (u) has a bounded approximate identity, (uα )α say. Now, because Eu = G and hence A0 (u) = {0}, any w ∗ -cluster point of (uα )α in B(G) is a nonzero idempotent. Since G is connected, we conclude that 1G is the only such w ∗ -cluster point. Hence uα → 1G in the w ∗ -topology of B(G). Now let v ∈ B(G) be a w ∗ -cluster point of the bounded sequence (un )n∈N . Then v = w ∗ limι unι for some subnet (unι )ι∈I of (un )n∈N . Since the multiplication in B(G) is separately w ∗ -continuous, for any f ∈ C ∗ (G), v, uα · f = uα v, f → v, f . Since (uα )α ⊆ A0 (u), it follows that v, f = limv, uα · f = lim lim unι , uα · f α α ι = lim lim unι uα , f = 0. α
ι
Hence v = 0, and this shows that 0 is the only w ∗ -cluster point of the sequence (un )n∈N . Consequently, w ∗ -limn→∞ un = 0. 2 yields Theorem 4.6, applied to an abelian locally compact group G and μ ∈ M(G) = B(G), the following corollary. and let Corollary 4.7. Let G be a locally compact abelian group with connected dual group G μ ∈ M(G) = C0 (G)∗ be such that μ is not a multiple of the Dirac measure δe . Then μ is power bounded if and only if w ∗ -limn→∞ μn = 0. 5. A criterion for discreteness in terms of Ishikawa sequences In this section we first give a criterion for a locally compact group G to be discrete in terms of norm convergence of the Ishikawa sequences associated to power bounded elements of B(G). Lemma 5.1. Let G be a locally compact group. If Fu is open in G for every u ∈ P 1 (G) = {v ∈ P (G): v(e) = 1}, then G is discrete. Proof. Suppose first that G is first countable and let (Vn )n∈N be a neighbourhood basis of the identity e. For each n ∈ N, we can choose vn ∈ P 1 (G) such that vn = 0 on G \ Vn . Then v = ∞ −n 1 n=1 2 vn ∈ P (G) and Fv = {e}. So G is discrete.
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2383
Notice next that the condition presumed in the lemma passes to open subgroups and to quotient groups. Let G0 be the connected component of the identity, and choose an open subgroup H of G such that H /G0 is compact. Then H is a projective limit of first countable groups (actually, Lie groups) H /Kα . By the first paragraph and the preceding remark, it follows that each H /Kα is discrete and hence finite since it is almost connected. Thus H is a compact totally disconnected group. We have to show that H is finite. Assuming that H is infinite, we find a strictly decreasing ∞ −n 1 sequence (Hn )n of open subgroups of H . Let u = n=1 2 1Hn ; then u ∈ P (H ) and therefore
∞ Fu is open in H . But Fu = n=1 Hn , which is of infinite index in H and hence not open in H . This contradiction finishes the proof. 2 Theorem 5.2. Let G be a locally compact group. Then G is discrete if and only if for every power n bounded element u ∈ A(G), the sequence ( 1+u 2 ) , n ∈ N, converges in norm in B(G). Proof. Suppose first that G is discrete and let u be a power bounded element of A(G). By n ∗ Proposition 4.1, the sequence ( 1+u 2 ) , n ∈ N, has a subsequence which converges in the w ∗ topology to some idempotent v in B(G). Since G is discrete, w -convergence implies pointwise convergence. Hence v(x) = 1 if u(x) = 1 and v(x) = 0 otherwise. n Now let w ∈ B(G) be another w ∗ -cluster point of the sequence ( 1+u 2 ) , n ∈ N. Then also w(x) = 1 if u(x) = 1 and w(x) = 0 otherwise, and hence w = v. Thus the whole sequence n ∗ ( 1+u 2 ) , n ∈ N, converges to v in the w -topology. Since G is discrete, the mapping A(G) → A(G), v → uv, is a compact operator. As the 1 n sequence vn = ( 1+u 2 ) − 2n , n ∈ N, is in A(G) and bounded, (uvn )n converges in norm. Since n 2−n → 0, it follows that u( 1+u 2 ) converges in norm to uv = v. Since
1+u 2
n+1
−
1+u 2
n =
u 1+u n 1 1+u n − , 2 2 2 2
n u( 1+u 2 ) → v in norm and
1 + u n+1 1 + u n → 0, − 2 2 n it follows that ( 1+u 2 ) → v in norm. n Conversely, suppose that whenever u ∈ A(G) is power bounded, the sequence ( 1+u 2 ) , n ∈ N, converges in norm to some element of B(G), say v. By Proposition 4.1, v is an idempotent and vu = u. Moreover, since the convergence is in norm, for x ∈ G, considered as a linear functional of B(G), we get that v(x) = 1 if u(x) = 1 and v(x) = 0 otherwise. This implies that for any such u the set Fu is open in G. In particular, Fu is open in G for every u ∈ P 1 (G). Now, Lemma 5.1 implies that G is discrete. 2
Suppose that G is discrete and u is a power bounded element of A(G). Then, by the preceding n theorem, the sequence ( 1+u 2 ) , n ∈ N, converges in norm in B(G). One might wonder whether 1+u n n limn→∞ ( 2 ) = 0. Note that, by [23, Corollary 2.8], limn→∞ ( 1+u 2 ) = 0 if and only if 1 − u is invertible in B(G).
2384
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
As an interesting consequence of Theorem 5.2 we obtain the following corollary. Corollary 5.3. Let G be a locally compact abelian group. Then G is compact if and only if for n every power bounded element f of L1 (G), the sequence ( δe +f 2 ) , n ∈ N, converges in M(G). In concluding this section, we present an application of power boundedness to the existence of a weakly compact homomorphism between two commutative Banach algebras. The reader will observe that we do not assume the algebra A to have a bounded approximate identity. Theorem 5.4. Let A and B be semisimple commutative Banach algebras and let φ : A → B be a weakly compact homomorphism with dense range. Suppose that given any ϕ ∈ (A), there exists a power bounded element u of A such that Eu = {ϕ}. Then (B) is discrete, and hence B has the power boundedness property. Proof. Let γ ∈ (B) be arbitrary and let ϕ = φ ∗ (γ ). By hypothesis, there exists u ∈ PB(A) such that Eu = {ϕ}. Let m be a w ∗ -cluster point of the sequence (un )n in A∗∗ . Then m, ϕ = 1 and m, δ = 0,
δ ∈ (A), δ = ϕ.
Let b = φ ∗∗ (m). Then b ∈ B since φ is weakly compact. As φ ∗ is one-to-one, φ ∗ (ρ) = ϕ for ρ ∈ (B), ρ = γ . It follows that b, ϕ = φ ∗∗ (m), ρ = m, φ ∗ (ρ) = 0 for ρ ∈ (B) \ {γ } and |b, γ | = 1. Since b ∈ B, this shows that the singleton {ψ} is open in (B). Finally, since B is semisimple and (B) is discrete, B has the pb-property. 2 Let G be a first countable locally compact group. Then, given any x ∈ G, there exists u ∈ A(G), actually a translate of a positive definite function, such that Eu = {x} and uA(G) = 1. Therefore the following corollary is an immediate consequence of the preceding theorem. Corollary 5.5. Let G be a first countable locally compact group and B a semisimple commutative Banach algebra whose spectrum is not discrete. Then there does not exist a weakly compact homomorphism from A(G) into B with dense range. 6. Power bounded elements of two function algebras We finish the paper by determining explicitly the power bounded elements of two commutative Banach algebras which are neither uniform algebras nor algebras associated with locally compact groups. Example 6.1. Let X be a compact metric space with metric d and let Lip(X) denote the space of all Lipschitz functions of order one on X, that is, all continuous complex-valued functions f on X for which |f (x) − f (y)| : x, y ∈ X, x = y p(f ) = sup d(x, y)
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
2385
is finite. With pointwise multiplication and the norm f = f ∞ + p(f ), the set Lip(X) is a commutative Banach algebra, and the map x → ϕx , where ϕx (f ) = f (x) for f ∈ Lip(X), is a homeomorphism from X onto (Lip(X)). In particular, σLip(X) (f ) = f (X) and hence rLip(X) (f ) = f ∞ for each f ∈ Lip(X). We claim that f ∈ Lip(X) is power bounded if and only if X is the disjoint union of open sets U and V such that f |U ∞ < 1 and V = {x ∈ X: |f (x)| = 1} and f is locally constant on V . In particular, if X is connected then f ∈ Lip(X) is power bounded if and only if either f ∞ < 1 or f (X) = {z} for some z ∈ T. Suppose first that f is power bounded and let U = {x ∈ X: |f (x)| < 1}. Towards a contradiction, assume that there exists x ∈ U such that |f (x)| = 1. Of course, we can assume that f (x) = 1. Since f is power bounded, there exists C > 0 such that |f (y)n − 1| C d(y, x) for all y ∈ X and n ∈ N. As x ∈ U , there exists y ∈ U with d(y, x) < 1/2C and hence |f (y)n −1| < 1/2 for all n ∈ N, which is impossible since f (y)n → 0. This contradiction shows that U is closed in X and V = {x ∈ X: |f (x)| = 1} is open. √ To show that f is locally constant on V , fix x ∈ V and put W = {y ∈ V √ : d(y, x) < 1/ 3}. Again we can assume that f (x) = 1. Then, for y ∈ W , |f (y)n − 1| < 1/ 3 for all n ∈ N and hence for all n ∈ Z since |f (y)| √ = 1. So the set {f (y)n : n ∈ Z} is a subgroup of T, which is contained in {z ∈ T: |z − 1| < 1/ 3}. However, every such subgroup must be trivial. This shows that f (y) = 1 for all y ∈ W . Conversely, suppose that f satisfies the above conditions on U and V . Since V is compact, V is a disjoint union of open sets V1 , . . . , Vm such that f is constant on each Vj . Let δ = min d(Vj , Vk ): 1 j, k m, j = k . Then δ > 0 and for x ∈ Vj and y ∈ Vk , j = k, we have δ d(x, y) d(Vj , Vk ) δ f (x)n − f (y)n 2 for all n ∈ N. Since f is constant on each Vj , we conclude that f |V ∈ Lip(V ) is power bounded. Moreover, since f |U ∞ < 1, f |U ∈ Lip(U ) is power bounded. Using these facts and d(U, V ) > 0, it follows that f is power bounded. Example 6.2. Let C 1 [a, b] be the algebra of all continuously differentiable, complex-valued functions on the interval [a, b]. Equipped with the norm f = f ∞ + f ∞ , C 1 [a, b] is a semisimple commutative Banach algebra, the spectrum of which can be canonically identified with [a, b] in the sense that the map t → ϕt , where ϕt (f ) = f (t) for f ∈ C 1 [a, b] and t ∈ [a, b], is a homeomorphism between [a, b] and (C 1 [a, b]). We claim that apart from functions f ∈ C 1 [a, b] with rC 1 [a,b] (f ) = f ∞ < 1, the constant functions of absolute value one are the only power bounded elements of C 1 [a, b]. Of course, this is reminiscent of the description of the power bounded elements of Lip(X) in Example 6.1, and the following arguments are indeed similar. Let f ∈ C 1 [a, b] be power bounded with f ∞ = 1. If t0 ∈ [a, b] is such that |f (t0 )| = 1 then |f (t)| = 1 in a neighbourhood of t0 . To verify this, we can assume that f (t0 ) = 1. By hypothesis, (f n ) ∞ C < ∞ for all n ∈ N and hence, by the mean value theorem, f (t)n − 1 = f n (t) − f n (t0 ) C|t − t0 |
2386
E. Kaniuth et al. / Journal of Functional Analysis 260 (2011) 2366–2386
for all t ∈ [a, b] and all n ∈ N. It follows that for t ∈ [a, b] with |t − t0 | < 1/C, we cannot have |f (t)| < 1. This shows that the set {t ∈ [a, b]: |f (t)| = 1} is open (and closed) in [a, b] and hence equal to [a, b]. Using this, it is now seen as in Example 6.1 that f is locally constant, and hence constant, on the interval [a, b]. Acknowledgments The authors are grateful to the reviewer for carefully checking the manuscript and for drawing their attention to Garnett’s book [13] in connection with Example 4.3. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32]
R. Andersson, Power bounded restrictions of Fourier–Stieltjes transforms, Math. Scand. 46 (1980) 129–153. A. Beurling, H. Helson, Fourier–Stieltjes transforms with bounded powers, Math. Scand. 1 (1953) 120–126. R.B. Burckel, Weakly Almost Periodic Functions on Semigroups, Gordon and Breach, New York, 1970. J.T. Burnham, Closed ideals in subalgebras of Banach algebras. I, Proc. Amer. Math. Soc. 32 (1972) 551–555. P.J. Cohen, On homomorphisms of group algebras, Amer. J. Math. 82 (1960) 213–226. E.G. Effros, Z.-J. Ruan, Operator Spaces, London Math. Soc. Monogr. Ser., vol. 23, Clarendon Press, Oxford, 2000. P. Eymard, L’algèbre de Fourier d’un groupe localement compact, Bull. Soc. Math. France 92 (1964) 181–236. P. Eymard, Algèbre Ap et convoluteurs de Lp , in: Sèminaire Bourbaki No. 367, 1969/70, pp. 55–72. B.E. Forrest, Amenability and ideals in A(G), Austral. J. Math. Ser. A. 53 (1992) 143–155. B.E. Forrest, Amenability and the structure of Ap (G), Trans. Amer. Math. Soc. 343 (1994) 233–243. B.E. Forrest, E. Kaniuth, A.T. Lau, N. Spronk, Ideals with bounded approximate identities in Fourier algebras, J. Funct. Anal. 203 (2003) 286–304. B.E. Forrest, N. Spronk, P. Wood, Operator Segal algebras in Fourier algebras, Studia Math. 179 (2007) 277–295. J.B. Garnett, Bounded Analytic Functions, Academic Press, New York, 1981. J.E. Gilbert, On projections of L∞ (G) and translation invariant subspaces, Proc. Lond. Math. Soc. 19 (1969) 69–88. C. Herz, Harmonic synthesis for subgroups, Ann. Inst. Fourier (Grenoble) 23 (1973) 91–123. E. Hewitt, K.A. Ross, Abstract Harmonic Analysis. I, Springer, New York, 1963. K. Hoffman, Banach Spaces of Analytic Functions, Prentice Hall, Englewood Cliffs, NJ, 1962. M. Ilie, N. Spronk, Completely bounded homomorphisms of the Fourier algebras, J. Funct. Anal. 225 (2005) 480– 499. S. Ishikawa, Fixed points and iteration of a nonexpansive mapping in a Banach space, Proc. Amer. Math. Soc. 59 (1976) 65–71. S. Kakutani, K. Kodaira, Über das Haarsche Maß in der lokal bikompakten Gruppe, Proc. Imp. Acad. Tokyo 20 (1944) 444–450. E. Kaniuth, A Course in Commutative Banach Algebras, Grad. Texts in Math., vol. 246, Springer, New York, 2009. E. Kaniuth, A.T. Lau, Spectral synthesis for A(G) and subspaces of VN(G), Proc. Amer. Math. Soc. 129 (2001) 3253–3263. E. Kaniuth, A.T. Lau, A. Ülger, Multipliers of commutative Banach algebras, power boundedness and Fourier– Stieltjes algebras, J. Lond. Math. Soc. (2) 81 (2010) 255–275. Y. Katznelson, L. Tzafriri, On power bounded operators, J. Funct. Anal. 68 (1986) 313–328. H. Leptin, Sur l’algèbre de Fourier d’un groupe localement compact, C. R. Math. Acad. Sci. Paris Ser. A 266 (1968) 1180–1182. A.L.T. Paterson, Amenability, Math. Surveys Monogr., vol. 29, American Mathematical Society, Providence, RI, 1988. H. Reiter, L1 -Algebras and Segal Algebras, Lecture Notes in Math., vol. 231, Springer, New York, 1971. H. Reiter, J.D. Stegeman, Classical Harmonic Analysis and Locally Compact Groups, Oxford University Press, Oxford, 2000. W. Rudin, Fourier Analysis on Groups, Interscience, New York, 1960. B. Schreiber, Measures with bounded convolution powers, Trans. Amer. Math. Soc. 151 (1970) 405–431. B. Schreiber, On the coset ring and strong Ditkin sets, Pacific J. Math. 33 (1970) 805–812. A. Wilansky, Summability through Functional Analysis, Math. Stud., vol. 85, North-Holland, Amsterdam, 1984.
Journal of Functional Analysis 260 (2011) 2387–2406 www.elsevier.com/locate/jfa
Non-existence of vortices in the small density region of a condensate ✩ Amandine Aftalion a,∗ , Robert L. Jerrard b , Jimena Royo-Letelier c,d a CNRS et Université Versailles-Saint-Quentin-en-Yvelines, Laboratoire de Mathématiques de Versailles,
CNRS UMR 8100, 45 avenue des États-Unis, 78035 Versailles Cédex, France b Dept. of Mathematics University of Toronto, Toronto, Canada M5S2E4 c CMAP, Ecole Polytechnique, 91128 Palaiseau Cédex, France d Université Versailles-Saint-Quentin-en-Yvelines, Laboratoire de Mathématiques de Versailles, CNRS UMR 8100, 45 avenue des États-Unis, 78035 Versailles Cédex, France Received 31 August 2010; accepted 5 December 2010 Available online 30 December 2010 Communicated by H. Brezis
Abstract In this paper, we answer a question raised by Lev Pitaevskii and prove that the ground state of the Gross– Pitaevskii energy describing a Bose–Einstein condensate in a rotationally symmetric trap at low rotation does not have vortices in the low density region. Therefore, the first ground state with vortices has its vortices in the bulk. In fact we prove something stronger, which is that the ground state for the model at low and moderate rotations is equal to the ground state in a condensate with no rotation. This is obtained by proving that for small rotational velocities, the ground state is multiple of the ground state with zero rotation. We rely on sharp bounds of the decay of the wave function combined with weighted Jacobian estimates. © 2010 Elsevier Inc. All rights reserved. Keywords: Bose–Einstein condensates; Jacobian estimates; Ground state; Radial symmetry
✩
This work was partially supported by French ministry grant ANR-0238 VoLQuan and by the National Science and Engineering Research Council of Canada, under operating Grant 261955. * Corresponding author. E-mail address: [email protected] (A. Aftalion). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.003
2388
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
1. Introduction Among the many experiments on Bose–Einstein condensates, one consists in rotating the trap holding the atoms in order to observe a superfluid behavior: the appearance of quantized vortices [1,23,18–20,2]. This takes place for sufficiently large rotational velocities. On the contrary, at low rotation, no vortex is detected in the bulk of the condensate. The system can be described by a complex valued wave function minimizing a Gross–Pitaevskii type energy. A vortex corresponds to zeroes of the wave function with phase around it. The density of the condensate is significant in a region which is either a disk or an annulus, and gets exponentially small outside this domain. Vortices are experimentally visible in the bulk of the condensate. A question raised by Lev Pitaevskii is whether for small rotational velocity, when there are no vortices in the bulk, vortices could exist in the low density region. For very large rotational velocities, when bulk vortices are arranged on a triangular lattice, it has been shown [5] that in a simplified model, obtained by formally projecting the Gross–Pitaevskii energy onto the lower Landau level, the vortex distribution extends to infinity. This suggests that in this case, there are many vortices in the low density region. It is then very natural to wonder whether vortices first appear in the bulk or at infinity. It is experimentally and numerically difficult to observe a vortex, which is a zero, in a low density region. Mathematically this could not be achieved through energy estimates or expansion since the contribution of a vortex in a low density region is very small. In this paper, we introduce new ideas to answer Pitaevskii’s question and prove that at low velocity, there are indeed no vortices in the condensate, even in the low density region. Therefore, the first ground state with vortices has its vortices in the bulk. Since a condensate is a trapped object, the geometry of the trap plays a role. An important special case is a radial harmonic trapping potential V (r) = r 2 . The space can then be split into two regions, a region of the form D = {λ0 > V (r)} (for a suitable constant λ0 ), where the wave function is significant and the condensate is mainly located, and a region R2 \ D where the modulus of the wave function is exponentially small [2]. In this latter region, it is very difficult to determine mathematically the contribution of a vortex to the energy. Ignat and Millot [11,12] following ideas from [7], have determined the critical rotational velocity Ωc for the nucleation of the first vortex inside D. This theorem does not describe the behavior in R2 \ D. A natural question is whether for Ω < Ωc , the minimizer of the energy has zeroes in this region, whether there is a smaller critical velocity than Ωc where the minimizer is unique and vortex free. At very high velocity, it has been proved in [5] that vortices exist up to infinity in a reduced model so it seems reasonable that at smaller velocity, vortices may exist in the exponentially small region, far away from the bulk and could arrange themselves on disks or arrays close to infinity. In fact, we prove that this is not the case before Ωc , namely that the minimizer is unique and does not vanish. It means that for a large range of rotational velocities Ω, the minimizer exactly equals the ground state of a condensate at rest. We consider here a two-dimensional setting and define the energy for the complex-valued wave function u, such that R2 |u|2 = 1, as Eε (u) =
1 1 1 |∇u|2 + 2 |u|4 + 2 V (x)|u|2 − Ωx ⊥ · (iu, ∇u) dx, 2 4ε 2ε
(1.1)
R2
where Ω is the angular velocity, x = (x1 , x2 ), x ⊥ = (−x2 , x1 ), ε > 0 is a small parameter, V (x) is the trapping potential and (iu, ∇u) = iu∇u∗ − iu∗ ∇u. The class of potentials includes
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2389
the model case V = x12 + x22 . Then, the critical angular velocity for nucleation of vortices is of order | log ε| (see [11]). An upper bound on the rotational velocity is given by Ω < 1/ε when the confinement breaks down. The condensate is mostly concentrated in the region D := x ∈ R2 : V < λ0
(1.2)
where λ0 is chosen so that
+ λ0 − V (x) dx = 1.
(1.3)
R2
We refer to [2] for more details on how this is derived from the physical experiments. In recent experiments in which a laser beam is superimposed upon the magnetic trap holding the atoms, the trapping potential V (x) is of a different type [21,23,24,3]: V (r) = r 2 + V0 e−r
2 /w 0
(1.4)
.
When the gaussian is expanded around the origin, this leads to a harmonic plus quartic potential [16,23] k V (r) = (1 − b)r 2 + r 4 . 4
(1.5)
If b is small (b < 1 + (3k 2 /4)1/3 ), the domain D given by (1.2) is a disc, while if b > 1 + (3k 2 /4)1/3 , it is an annulus. According to the values of V0 and w0 in the case of (1.4), the domain D can also be a disk or an annulus. In this paper, we consider potentials V including r 2 and of the type (1.4) or (1.5) when the bulk D is a disk. In the case where D is a disk, the potential V is not necessarily required to be increasing. 1.1. Assumptions Throughout this paper, we make the following assumptions about the potential V . First, V is nonnegative and radial,
V ∈ C1,
(1.6)
and there exist c0 > 0, p 2 such that
1 p r V (r) c0 r p c0
if r c0 .
(1.7)
This assumption is easily seen to imply that Eε is bounded below for |Ω| 1ε and that the angular momentum term x ⊥ · (iu, ∇u) is integrable as long as u has finite energy. We will also use (1.7) to obtain decay estimates that justify for example the integration by parts leading to a decoupling of the energy. We fix λ0 ∈ R such that (1.2)–(1.3) hold. Such a λ0 exists due to the growth of V . We further assume that the bulk D is a disk and not an annulus, that is V is such that
2390
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
D = BR (0)
for some R > 0
(1.8)
and that there exist δ0 > 0 and a C 1 function R : (−2δ0 , 2δ0 ) → R also denoted Rδ = R(δ), such that R0 = R, 0<
x: V (x) < λ0 + δ = BRδ (0)
1 dR/dλ C C
and
for some constant C
(1.9)
where Br (y) denotes the open ball of radius r about y. This implies that λ0 − V is bounded away from 0 in the interior of D; in physical terms, this assumption rules out the case of annular bulks and “giant vortices” at low angular velocities. We remark that the assumption above implies that if |x| ∈ (R−δ , Rδ ) and 0 δ δ0 then dist(x, ∂D) = O(δ). We point out that assumptions (1.7) and (1.9) imply that there exists c1 > 0 such that V (r) − λ0 c1 r 2 − R 2 for all r R.
(1.10)
Our assumptions include indeed potentials like r 2 or (1.5) for a disk case, and do not require V to be increasing. 1.2. Main result Our main result is Theorem 1.1. Assume that uε minimizes Eε (·) with rotation Ω, and let ηε denote the minimizer of Eε (·) for Ω = 0. There exists ε0 , ω0 , ω1 > 0 such that if 0 < ε < ε0 and Ω ω0 | log ε| − ω1 log | log ε| then uε = eiα ηε in R2 for some constant α. In the pure quadratic case V = r 2 , Ignat and Millot [11,12] have shown that the bulk of the condensate (that is any domain contained in D) is vortex-free for |Ω| ω0 | log ε|−ω1 log | log ε|, for some ω1 > 0 and the same constant ω0 that we find in Theorem 1.1. They have no information on what happens in R2 \ D. Our theorem proves that vortices do not lie in R2 \ D. They have also shown that there exists δ > 0 such that the ground state has at least one vortex in the bulk if Ω ω0 | log ε| + δ log | log ε|. In this sense, our estimate |Ω| ω0 | log ε| − ω1 log | log ε| captures the sharp leading-order term, and the correct scaling of the next-order term, of the critical velocity for vortex formation. We point out that our arguments also deal with more general potentials. The arguments used in [11] to prove the existence of interior vortices for rotations greater than ω0 | log ε|+δ log | log ε| should extend with few changes to the more general potentials considered here, using results about auxiliary functions that we establish in Section 3 in place of parallel results from [11]. Thus the constant ω0 should also be sharp for these more general potentials. We split the proof into two independent results. The first main result of this paper asserts roughly speaking that symmetry breaking occurs first in the interior of D: if Ω is small enough that there are no vortices in D, then there are no vortices anywhere, and in fact the rotation has absolutely no effect on the ground state. Theorem 1.2. Assume that uε minimizes Eε (·) with rotation Ω, and let ηε denote the minimizer of Eε (·) for Ω = 0. Assume also that Ω C| log ε| for some C.
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2391
There exists ε0 > 0 such that if 0 < ε < ε0 and Ω is subcritical in the sense that 1 |uε | ηε in D1 := x ∈ D: dist(x, ∂D) | log ε|−3/2 2
(1.11)
then uε = eiα ηε in R2 for some constant α. Our second main theorem gives an estimate for the critical value of Ω. The statement of the theorem refers to an auxiliary function f0 : let a(x) = λ0 − V (x), η0 :=
√
a+,
∞ ξ0 (r) =
sη02 (s) ds, r
f0 (r) =
0
if r R,
ξ0 (r)/η02 (r)
if r R.
(1.12)
Theorem 1.3. Let ω0 = 2 f10 ∞ . There exist ω1 > 0 and ε1 > 0 such that if |Ω| ω0 | log ε| − ω1 log | log ε| and 0 < ε < ε1 , then Ω is subcritical in the sense of (1.11), and the conclusion of Theorem 1.2 thus holds. In our proof of Theorem 1.3, as in estimates of the critical rotation in works such as [11] and [4], a main point is to obtain sharp energy lower bounds. In all earlier works that we know of, this is done using the vortex ball construction originally introduced by [13] and [22]. In our proof of Theorem 1.3, we avoid any explicit1 mention of vortex balls by instead appealing to a result from [14], stated here as Lemma 4.1. This makes our argument considerably shorter than those in [4,11] and other references. We point out that the results of [11,12] do not directly imply that Theorem 1.3 holds in the case V = r 2 , although it is possible that this conclusion can be extracted with relatively little effort from arguments in these references. 1.3. Main ideas of the proof The energy minimizers with Ω = 0 provide real solutions to the Euler–Lagrange equations when Ω = 0, Eε (η) = Gε (η), where Gε (η) =
1 1 1 |∇η|2 + 2 |η|4 + 2 V (x)|η|2 dx. 2 4ε 2ε
(1.13)
R2
Our main goal consists in proving that up to the critical velocity of nucleation of bulk vortices, the minimizer of Eε with velocity Ω is in fact equal to ηε . The minimizer ηε of Gε under the L2 constraint of norm 1, is (up to a complex multiplier of modulus one) the unique positive solution of 1 However, the proof of Lemma 4.1, see Lemma 8 in [14], ultimately relies on a vortex ball construction appearing in [15].
2392
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
−ηε +
1 1 ηε V (x) + ηε2 = 2 λε ηε 2 ε ε
(1.14)
where ε12 λε is the Lagrange multiplier, which is also necessarily unique. Moreover, λε → λ0 , and ηε2 converges to a + in L2 (D) and uniformly on any compact set of D. We will need some estimates on the decay of ηε at infinity that we prove in Section 2. By a remarkable identity (see Lassoued and Mironescu [17]), for any u, the energy Eε for any Ω splits into two parts, the energy Gε (ηε ) of the density profile and a reduced energy of the complex phase v = u/ηε : Eε (u) = Gε (ηε ) + Fε (v),
(1.15)
where Fε (v) =
2 ηε2 ηε4 2 2 2 ⊥ |∇v| + 2 |v| − 1 − ηε Ωx · (iv, ∇v) dx. 2 4ε
(1.16)
R2
In particular the potential V (x) only appears in Gε . We will recall the proof of (1.15), as well as that of (1.18) below, in Section 3. This kind of splitting of the energy is by now standard in the rigorous analyzes of functionals such as Eε . Next, define ∞ ξε (r) =
sηε2 (s) ds,
(1.17)
r
so that ∇ ⊥ ξε = x ⊥ ηε2 . An integration by parts yields Fε (v) = R2
2 ηε2 4Ωξε ηε4 2 2 dx |∇v| − 2 J v + 2 |v| − 1 2 ηε 4ε
(1.18)
where J v = 12 ∇ × (iv, ∇v) = (ivx1 , vx2 ) is the Jacobian. We recall that the function fε := ξε /ηε2 appearing in Fε is important since it is well known that vortices in the interior of D first appear near where this function attains a local maximum [2,4,11,12]; its importance is also clear from (1.18), since it controls the relative strength of the positive and negative contributions to Fε . The proofs of Theorems 1.2 and 1.3 rest on new bounds for fε in R2 \ D and near ∂D, which in turn rely on decay estimates for ηε . In particular, we show in Lemma 2.4 that fε Cε 2/3 in R2 \ D. The other part of the proof consists essentially of bounds of 2Ω ηε2 fε J v by the positive terms in Fε . Away from the bulk, we use our estimates of fε to find that 2Ωfε J v is bounded pointwise by 12 |∇v|2 . In the bulk, where ηε2 is not too small, we have
2 2 1 1 2 η4 1 ηε |∇v|2 + ε2 |v|2 − 1 ηε2 |∇v|2 + 2 |v|2 − 1 2 2 4ε 4˜ε
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2393
for some ε˜ such that | log ε˜ | = | log ε|(1 + o(1)). We obtain the desired bounds by combining this with a weighted Jacobian estimate mentioned above, Lemma 4.1, which directly implies that
2Ω
χηε2 fε J v Ω
2 fε ∞ | log ε˜ |
χηε2
2 1 1 + small error terms |∇v|2 + 2 |v|2 − 1 2 4˜ε
where χ is a cutoff function supported in the bulk. Note that the leading-order critical rotation ω0 ε ∞ is such that Ω( 2 f log ε˜ | ) ≈ Ω/ω0 | log ε|. The proof of Theorem 1.3 is completed by assembling these ingredients and controlling error terms. The proof of Theorem 1.2 relies on an additional inv gredient, which is that if |v| 12 in an open set U , then J v is extremely close in U to J ( |v| ) = 0. Theorem 1.1 follows immediately from combining Theorems 1.2 and 1.3. An interesting open problem is to see to what extent this analysis continues to hold if the assumption of radial symmetry is dropped. In our arguments, this symmetry is used heavily in our analysis of the behavior of fε away from the bulk, and near the boundary of the bulk. We briefly remark on the assumption (1.7) of quadratic growth. Our proofs show that the absence of vortices in the low density region is a consequence of the fact that the auxiliary function fε = ξε /ηε2 is very small in R2 \ D. The proof of this fact (see Lemma 2.4) can be modified to show that if for example (1.7) holds with p < 2, then fε (r) Cεr 1−p/2 → ∞ as r → ∞. However, in this situation Eε is unbounded below for any Ω = 0. This reflects the fact that a subquadratic trapping potential is not strong enough to contain a rotated condensate. 2. Properties of auxiliary functions In this section we study the real-valued minimizer ηε and the auxiliary functions ξε and fε = ξε /ηε2 defined as ∞ ξε (r) =
sηε2 (s) ds,
fε (r) = ξε (r)/ηε2 (r).
(2.19)
r
Theorem 2.1. Assume that V satisfies (1.6), (1.9). Then for every ε > 0, there exists a unique positive minimizer ηε of Gε in H := u ∈ H 1 R2 : |u|2 V (x) < ∞, |u|2 = 1 . R2
R2
Every minimizer of Gε in H has the form eiα ηε , for α constant. Moreover, ηε is a radial smooth positive function and satisfies (1.14) with |λε − λ0 | Cε| log ε|1/2
(2.20)
where λ0 is defined by (1.3). Finally, recall the notations Rδ from (1.9) and a = λ0 − V , the following estimates are satisfied:
2394
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406 −1/3 (R−r)
ηε (r) Cε 1/6 ecε √ √ ηε − a + Cε 1/3 a +
in R2 \ D,
in BR−ε1/3 ,
(2.21) (2.22)
∇ηε L∞ (R2 ) Cε −1 ,
(2.23)
ηε (r) 0 for all r ∈ (R−δ0 , Rδ0 ), C η (r) ηε (r) V (r) for all sufficiently large r ε ε
(2.24) (2.25)
if ε < ε0 . Certain parts of the proof follow quite closely arguments given in [4] and in the pure quadratic case in [11]. Note that some arguments in [11] rely strongly on the special shape of the potential and cannot be generalized to other functions. Since V is not necessarily increasing, we have property (2.24) only in the neighborhood of ∂D. Proof. Step 1: existence of minimizers. This follows from standard arguments once we notice that R2 |un |2 V dx is uniformly bounded for any sequence (un ) minimizing Gε , and the set of functions in H satisfying such a uniform bound is precompact with respect to weak convergence in H 1 (R2 ). This last fact is proved by straightforward and well-known arguments, such as are explained in the proof in [11], Lemma 2.1, for V quadratic, the point being that the bound on |u|2 V prevents mass escaping to ∞. Standard theory then implies that any minimizer is smooth. If η is any minimizer, then |η| is as well, since G(|ζ |) G(ζ ) for all ζ . The strong maximum principle then implies that |η| (and hence η) never vanishes, and since G(η) G(|η|), it is easy to see that η/|η| = eiα for some constant α. We henceforth let ηε denote a fixed positive minimizer. Step 2: uniqueness of ηε . This follows from ideas in [9]. Multiplying (1.14) by ηε and integrating by parts we find that με is positive. Suppose that there are two couples (η0 , μ0 ) and (η1 , μ1 ) satisfying (1.14) such that η0 L2 = 1 = η1 L2 and μ0 > μ1 , and define w = ηη10 . This function verify
η02 (w − 1)2 dx = 2 R2
R2
2 η1 − η0 η1 dx = 2
η02 w(w − 1) dx
R2
and 1 −∇ · η02 ∇w + 2 η04 w w 2 − 1 = (μ1 − μ0 )η02 w. ε Multiplying the second equality by (w − 1), integrating by parts and then using the first equality we find 2 1 4 1 2 2 2 2 η0 ∇(w − 1) + 2 η0 w(w − 1) (w + 1) + (μ0 − μ1 )η0 (w − 1) dx = 0. 2 ε R2
The integration by parts is justified in view of (2.21), (2.25), which apply to both η0 and η1 , and the proofs of which do not rely on the uniqueness of the minimizer. Hence w ≡ 1 and μ0 = μ1 .
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2395
From (1.6) is easy to see that the compose of ηε with any rotation has the same energy, so it is also a minimizer of Gε . The unicity implies then that ηε is a radial function. Step 3: estimate of λε − λ0 . We next note, following standard arguments, that Gε can be rewritten 2 1 1 1 1 + 2 1 |∇η|2 + 2 η2 − a + + 2 a − η2 dx + 2 λ0 − Gε (η) = a 2 2 4ε 2ε 2ε R2
if η 2 = 1. Let G1ε (η) denote the first integral above. We claim that G1ε (ηε ) C| log ε|. Since ηε is a minimizer, to prove this it suffices to construct a competitor for which G1ε is suitably small. To do this, define
gε (s) :=
s ε √ s
if s ε 2 , if s
and η˜ ε :=
ε2 ,
gε (a + ) .
gε (a + ) L2
Note that 1=
a+
gε2 a + =
a+ −
a + ε 2
a+ a + 1 − 2 1 − Cε 2 . ε
Using this and explicit calculations such as those in [14], Lemma 12, the claim is easily verified. We now multiply (1.14) by ηε , integrate by parts and rewrite, recalling the L2 constraint, to find that 1 1 (λε − λ0 ) = |∇ηε |2 + 2 ηε2 + (V − λ0 ) ηε2 dx (2.26) ε2 ε 1 = |∇ηε |2 + 2 ηε2 − a + + a − ηε2 dx ε 2 1 = |∇ηε |2 + 2 a − ηε2 + ηε2 − a + + ηε2 − a + a + dx (2.27) ε
1 1 4G1ε (ηε ) + 2 ηε2 − a + L2 a + L2 C G1ε (ηε ) + G1ε (ηε ) . ε ε Thus we have proved (2.20). Step 4: estimates of ηε . We claim that ηε2 max(λε − V ) =: A. D
(2.28)
√ To see this define w = 1ε (ηε − A). We have that ηε ∈ L3loc , so after (1.14) w, w ∈ L1loc . Kato’s inequality gives w + sgn+ (w)w. Using (1.14) again we find
2396
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
sgn+ (w) 2 ηε ηε − A 3 ε √ 2 2 √ + 3 sgn+ (w) = (εw + A ) ε w + 2εw A w ε3
w +
in D .
Hence we have −w + + (w + )3 0 in D (R2 ) and w ∈ L3loc , so using Lemma 2 in [8], ≡ 0. We remark that the properties of the potential V at the boundary (1.9) implies that the maximum of λε − V is attained at an interior point x0 of D such that dist(x0 , ∂D) > cδ0 . The minimizer being a solution of (1.14) in L∞ , by elliptic regularity we derive that it is a smooth function. w+
Proof of (2.21). We construct a supersolution of (1.14) of the form ⎧√ λ0 − V (x) + 8δ ⎪ ⎪ ⎨ λ −δ−V (x) √ 0 √ +3 δ η(x) ¯ := 6 δ ⎪ ⎪ ⎩ − |x| γe σ
if |x| R−δ , if R−δ |x| Rδ , if Rδ |x|,
where 0 < δ < δ0 is small parameter that will be determined later and γ , σ are chosen such that η¯ ∈ C 1 (R2 ), i.e., √ 8 δ Rδ /σ e γ= 3
and σ =
16δ . |∇V (Rδ )|
A straightforward computation shows that for δ = Cε 1/3 , η¯ is a supersolution of (1.14) and we also have σ = O ε 1/3
−1/3 and γ = O ε 1/6 eε R .
Moreover, with this choice of δ, η¯ 2 > λε − V for every |x| R−δ , so using (2.28) ηε2 (x0 ) A = λε − V (x0 ) < η(x ¯ 0 ). Because ηε and η¯ are going to zero at infinity, if the function ηε − η¯ is positive somewhere in (r0 , ∞), for r0 := |x0 |, then it attains a positive maximum at r˜ ∈ (r0 , ∞), i.e. ηε (˜r ) = η¯ (˜r ) and ηε
(˜r ) < η¯
(˜r ). Given the structure of (1.14) and because η¯ is a supersolution and ηε a solution, if V (˜r ) − λε 0 we ¯ r ). In another hand, if V (˜r ) − λε < 0 then we would have that ηε (˜r ) η(˜ would have η(˜ ¯ r ) < λε − V (˜r ), which for ε small enough, contradicts the definition of η. ¯ Hence ηε (r) η(r) ¯
in (r0 , ∞).
2
Proof of (2.22). Using assumption (1.9), by exactly following [4], one finds that |ηε − Cε 1/3 aε+ , for aε := λε − V = a + λε − λ0 . In view of (2.20), this implies (2.22). 2
aε+ |
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2397
Proof of (2.23). For x ∈ R2 define η(y) ˜ = ηε (ε(y − x)) in B2L (x). This function satisfies η˜ = η˜ V ε(y − x) + η˜ 2 − λε =: hε . After estimates (2.21) and (2.22) |hε | C, so using a Hölder estimate for the first derivative of η˜ (see Theorem 8.32 in [10]) we have that ∇ η
˜ L∞ (BL (x)) C for a constant C independent of x and hence the result. 2 Step 5: proof of (2.24). We denote L the elliptic operator obtained by linearizing equation (1.14) L := − +
1 V (x) + 3ηε2 − λε , ε2
and λj , j = 1, 2, . . . , its eigenvalues in R2 . Let μ be the first Dirichlet eigenvalue of L in the half space Ω = {x1 > 0} and ψ the corresponding eigenfunction (which exists because of the compact embedding of H in L2 ). Since V and ηε are radial, is clear that the odd extension of ψ to R2 is an eigenfunction for L in R2 with corresponding eigenvalue μ = λj . Note that j 2 because the odd extension change sign in R2 . We have that Lηε = 2ηε4 > 0 and ηε > 0. Using the maximum principle due to Berestycki, Nirenberg and Varadhan [6], this implies that the first eigenvalue of L is positive. We will prove that if (2.24) does not hold, then μ < 0, which contradicts the fact that λ1 > 0. Assume that ηε (r) > 0 at some r ∈ (R−δ0 , Rδ0 ). Then there exists α < r < β such that
ηε (α) = ηε (β) = 0 and ηε > 0 in (α, β). If α R−2δ0 , then ηε is increasing on (R−2δ0 , R√ −δ0 ), so that ηε (R−2δ0 ) ηε (R−δ0 ). This is impossible for all sufficiently small ε, since ηε → a + uniformly for r < R−ε1/3 , by (2.22), and a + (R−2δ0 ) > a + (R−δ0 ). Thus α R−2δ0 . The same argument, but using (2.21) instead of (2.22), shows that β R2δ0 . Now let D := {x ∈ R2 : x1 > 0, α < |x| < β}. Then ∂ηε > 0 in D, ∂x1
∂ηε = 0 in ∂D ∂x1
∂ηε and L ∂x1
=−
∂V ηε 0 in D. ∂x1
The last inequality come from the differentiation of (1.14) and hypothesis (1.9), which implies that ∂V /∂R > 0 for r ∈ (R−2δ0 , R2δ0 ). Using the monotonicity of Dirichlet eigenvalues with respect to the domain, this implies that μ < 0. Step 6: proof of (2.25). For any r R, define a function η˜ : (r, ∞) → R by p+2 2α p+2 s 2 −r 2 η(s) ˜ := ηε (r) exp − p+2
where c0 and p are the constants in (1.7). It follows from (2.20) and (1.7) that if s r and r is sufficiently large, then V (s) − λε + η˜ 2 (s) V (s) c0 s p , so that if r is sufficiently large, then −η˜ +
1 c0 V − λε + η˜ 2 η˜ −η(s) ˜ + 2 s p η˜ = 2 ε ε
−α 2 +
p p c0 p 2 −1 η. + 1 s + α s ˜ 2 ε2
2398
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406 1/2
Choosing α = (2c0ε) , it follows that η˜ is a subsolution of (1.14) in (r, ∞) if r is sufficiently large. For such r, noting that η(r) ˜ = ηε (r), we can argue as in the proof of (2.21) to deduce that ηε − η˜ is nonnegative in (r, ∞). ˜ ηε (s) for s r, we again use (1.7) to conclude that Then since η(r) ˜ = ηε (r) and η(s) ηε (r) η˜ (r) = −
√ c0 (2c0 )1/2 p r 2 ηε (r) − 2 V (r)ηε (r) ε ε √
c
˜ we obtain for sufficiently large r. On the other hand, by choosing α = 2ε0 in the definition of η, a decreasing supersolution (still denoted η) ˜ such that η(r) ˜ = ηε (r). A similar application of the maximum principle shows that ηε is bounded above by (the new) η˜ on (r, ∞), and in particular this implies that ηε (r) 0. These facts combine to establish (2.25). 2 We next prove: Lemma 2.2. Assume that V satisfies (1.6) and (1.9) and the quadratic growth condition (1.10). Let ηε be the positive minimizer found in Theorem 2.1. Let fε (r) := ξε (r)/ηε2 (r), where ξε was defined in (1.17). Then there exists a constant C independent of ε ∈ (0, ε1 ] such that fε |x|
C dist(x, ∂D) + Cε 2/3
if x ∈ D,
Cε 2/3
if not.
(2.29)
In addition, for all sufficiently small ε,
∇ξε ∞ C
(2.30)
fε − f0 ∞ Cε 1/3 .
(2.31)
and
Proof. For every s r Rδ (where 0 < δ δ0 will be chosen later), we define η(s) ˜ = ηε (r)e−μδ (s
2 −r 2 )/2
and
μ2δ =
c1 (Rδ2 − R 2 ) + (λε − λ0 ) Rδ2 ε 2
.
(2.32)
Using (1.10), where the constant c1 is defined, and arguing as in the proof of (2.25), we find that η˜ − ηε is nonnegative in (r, ∞). We use the previous estimate and the definition of ξε to compute 1 fε (r) = 2 ηε (r)
∞
∞ sηε2 (s) ds
r
e−μδ (s
2 −r 2 )
s ds =
r η (r)
1 2μδ
for r Rδ .
The definition of fε implies that fε (r) = −r − 2fε (r) ηεε (r) , and from the monotonicity (2.24) of ηε , we infer that fε (r) −r in (R−δ0 , Rδ0 ). Thus for any R−δ0 r Rδ ,
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
fε (r)
2399
Rδ2 − r 2 1 + . 2 2μδ
We now fix δ = ε 2/3 , and we conclude from (1.9) and (2.20) that (2.29) holds as long as r R−δ0 . For 0 r R−δ0 , we write 1 fε (r) = ηε (r)2
R−δ0
sηε2 (s) ds + r
ηε2 (R−δ0 ) f (R−δ0 ). ηε2 (r)
From (2.22) and (1.9), we see that if 0 r s R−ε1/3 , then ηε2 (s) (1 + Cε 1/3 )2 a + (s) C ηε2 (r) (1 − Cε 1/3 )2 a + (r)
for sufficiently small ε,
(2.33)
and by using the and the fact that fε (R−δ0 ) Cε 2/3 + Cδ0 , one easily deduces that (2.29) holds for r ∈ [0, R−δ0 ). Next, the definition of ξε implies that |∇ξε (x)| = |x|ηε2 (x), so that (2.30) follows from (2.28) and (2.21). For r R−ε1/3 , we see from (2.29) that |fε (r) − f0 (r)| Cε 1/3 + |f0 (r)|. This is trivially bounded by Cε 1/3 if r R. If R−ε−1/3 r R then (1.9) implies that c(R − r) a(r) C(R − r), and thus f0 (r) = f0 (r)
C r −R
R s(R − s) ds C(R − r) Cε 1/3 . r
For 0 r R−ε1/3 we write
fε (r) − f0 (r) =
1 ηε2 (r)
+
R−ε1/3
sηε2 (s) ds
1 − a(r)
r
R−ε1/3
sa(s) ds r
ηε2 (R−ε1/3 ) fε (R−ε1/3 ) − ηε2 (r)
a(R−ε1/3 ) f0 (R−ε1/3 ) a(r)
= I + II − III. Using (2.33) and our earlier estimates of fε , f0 for r R−ε1/3 , we see that |II| Cfε (R−ε1/3 ) Cε 1/3
and |III| Cf0 (R−ε1/3 ) Cε 1/3 .
We further decompose the remaining term as I=
1 1 − ηε2 (r) a(r)
R−ε1/3 sηε2 (s) ds r
1 + a(r)
R−ε1/3
r
s ηε2 (s) − a(s) ds.
2400
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
Using (2.22), it follows that R−ε1/3
|I | Cε
1/3 r
Due to (2.24), ηε2 (s) ηε2 (r)
ηε2 (s) ηε2 (r)
η2 (s) ds + Cε 1/3 s ε2 ηε (r)
R−ε1/3
s
a(s) ds. a(r)
r
1 if R−δ0 r s R−ε1/3 . And if 0 r R−δ0 then ηε2 (r) C −1 and so
C. Thus the first integral is bounded by Cε 1/3 . The second integral is similarly estimated, using (1.9) in place of (2.24). 2 Remark 2.3. In the case of a potential V for which (1.8) fails, so that for example D has the form BR \ BR , one expects that instead of being small, fε is large, namely, fε cec/ε in the interior of BR . This is related to the formation at very low rotations of a giant vortex in the interior of BR . The arguments used to prove Lemma 2.4 show in this situation that if V grows quadratically in the complement of BR , as in (1.10), then fε is very small in R2 \ BR . This suggests that at low rotations there should be no vortices in R2 \ BR , but this cannot be deduced from the arguments we use to prove Theorems 1.2 and 1.3. The last lemma in this section examines the case when V has subquadratic growth and fε is also large so that in principle vortices could exist in the low density region. Lemma 2.4. Assume that V satisfies (1.6), (1.9) and there exist c2 > 0 and p < 2 such that V (r) c2 r p + 1 for all r R.
(2.34)
Then fε (x) → +∞ as |x| → ∞. Note that with these assumptions on V , there is a sequence of functions ζα in H such that infα Gε (ζα ) = −∞. Physically this happens because the centrifugal force due to rotation is bigger than the subquadratic trapping potential. This indicates that, although one can prove that in this situation, fε → ∞ as r → ∞ (compare Lemma 2.4), this is not expected to give any information about the physical behavior of condensates. Proof. Let q > 2. For every r max{1, R}, we claim that ηε (s) ηε (r)e−νε,r (s
q −r q )/q
for all s r. Where νε,r is the positive root of the polynomial ν 2 − small satisfy
(2.35) q rq ν
−
c , ε 2 r 2q−2−p
which for ε
νε,r < C ε −1 r −β with β = q − 1 − p/2. Indeed, the right-hand side of (2.35) is a subsolution in (r, ∞) of (1.14) while ηε is a solution. Boths functions are going to zero at infinity and they are equal at s = r, so the result come arguing as in the proof of (2.21).
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2401
We use the previous estimates and the definition of ξε to compute
fε (r) =
1 ξε (r) = ηε2 (r) ηε2 (r)
and hence the result.
∞
∞ sηε2 (s) ds
r
e−νr (s
q −r q )
r
s ds
r 2−q > Cεr 1−p/2 νr
2
3. Splitting the energy In this section we recall the proofs of (1.15) and (1.18). For U ⊂ R2 , we will write Eε (w; U ) etc to denote the integrals over U of the energy density appearing in the definition of Eε (u) = Eε (u; R2 ), and similarly Gε (·, U ), Fε (·, U ). Note that v = u/ηε is well defined since ηε > 0. Since ηε satisfies (1.14), we multiply it by ηε (1 − |v|2 ) and integrate over a ball Br to find that
2 1 λε 2 1 1 |v| − 1 − ηε2 + 2 ηε2 V (x) + ηε2 + |∇ηε |2 = 2 |u| − ηε2 . 4 2 2ε ε
Br
Br
Note that the Lagrange multiplier term tends to 0 as r → ∞, since both the L2 norms of u and ηε are 1. Moreover, Eε (vηε ; Br ) = Gε (ηε ; Br ) + Fε (v; Br ) +
1 1 |∇ηε |2 |v|2 − 1 + ηε ∇ηε · ∇|v|2 2 2
Br
2 1 1 1 1 1 − 2 ηε4 1 − |v|2 + 2 η4 |v|4 + 2 V (x)η2 |v|2 − 2 η4 − 2 V (x)η2 . 4ε 4ε 2ε 4ε 2ε We integrate by parts to obtain
1 ηε ∇ηε · ∇|v|2 = − 2
Br
Br
1 2 |v| ηε2 + 4
1 2 |v| ηε ν · ∇η. 2
∂Br
We use (2.25) to estimate C 1 2 1 2 2√ C −1/2 |v| η V (r) η ν · ∇η |v| V = V |u|2 . ε ε 2 2 ε ∂Br
∂Br
∂Br
Since R2 V |u|2 < ∞, we can easily find a sequence rk → ∞ such that the above integral tends to 0. Combining the above and letting rk → ∞ along this sequence, we obtain (1.15). The only property of V that the above argument used (implicitly) was (1.7), which will be used in the proof of (2.25).
2402
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
The integration by parts that leads to (1.18) is justified in a similar fashion. One must estimate boundary terms of the form ∂Br ξ ν · (iv, ∇v). To do this we note that ξ ν · (iv, ∇v) = fε (r)ηε2 (iv, ∇v) = fε (r)(iu, ∇u) fε ∞ |u|2 + |∇u|2 . We prove in (2.29) that fε is bounded as long as V satisfies (1.10) (in fact we show that fε Cε 2/3 for large r) and since u ∈ H 1 (R2 ), we can again find a sequence rk → ∞ such that the boundary terms vanish. Note also that the fact that fε ∈ L∞ , or equivalently that |ξε | Cηε2 , implies that the term ξε J v appearing in (1.18) is integrable on R2 for v = u/ηε , whenever u has finite energy. 4. Proofs of Theorems 1.2 and 1.3 In this section we use the estimates we have already established to complete the proofs of our main theorems. Proof of Theorem 1.2. We assume that uε minimizes Eε and that Ω C| log ε| is such that (1.11) holds. Let χ be a smooth function such that χ ≡ 1 in {x ∈ D: dist(x, ∂D) 2| log ε|−3/2 }, and with support in D1 . We also assume that ∇χ ∞ 2| log ε|3/2 . Let v = uε /ηε , so that Eε (u) = Gε (ηε ) + Fε (v) = Eε (ηε ) + Fε (v). Thus Fε (v) 0. We write Fε (v) = A1 − A2 + B where A1 =
2 ηε2 ηε4 2 2 dx, |∇v| + 2 |v| − 1 χ 2 4ε
A2 = 2Ω
R2
χξε J v dx R2
and B=
2 2 η4 η dx. (1 − χ) ε |∇v|2 − 4Ωfε J v + ε2 |v|2 − 1 2 4ε
R2
It follows directly from our estimates on fε that 0 < fε C(ε 2/3 + | log ε|−3/2 ) in the support of 1 − χ , for small enough ε. Since Ω C| log ε|, it follows that Ωfε 14 for all sufficiently small ε and (recalling that |J v| 12 |∇v|2 ) we deduce that 1 |∇v|2 − 4Ωfε J v |∇v|2 2 in the support of 1 − χ . It follows immediately that
2 2 η η4 dx 0 B (1 − χ) ε |∇v|2 + ε2 |v|2 − 1 4 4ε R2
and hence that B = 0 if and only if v is a constant of modulus 1 in the support of 1 − χ .
(4.36)
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2403
Since Fε (v) 0, it is clear that A1 + B A2 . Next, define ε˜ = ε/(infD1 ηε ), so that (in view of (2.22) and the definition of D1 ) 1 ηε2 ε˜ 2 ε2
ε˜ Cε| log ε|3/4 ,
in D1 .
Then (4.36) and (2.22) imply that, D1
−2 2 1 1 |∇v|2 + 2 |v|2 − 1 inf ηε (A1 + 2B) C| log ε|3/2 A2 . 2 4˜ε D1
(4.37)
v = w 1 + iw 2 . From (1.11) we see that |v| 12 in D1 , and hence it is To continue, let w = |v| clear that w ∈ H 1 (D1 ), and |w|2 ≡ 1. It follows that J w = 0; we will recall a standard proof of this fact in a moment. Thus A2 = 2Ω χξε (J v − J w) dx = 2Ω ∇ ⊥ (χξε ) · (iv, ∇v) − (iw, ∇w) dx.
D1
D1
If we write v = ρeiφ in D1 , then a calculation shows that (iv, ∇v) = ρ 2 ∇φ,
(iw, ∇w) = ∇φ.
From the latter fact we see that J w = 12 ∇ × (iw, ∇w) = 0, as we asserted above. Also, from this and the fact that ρ 12 in D1 we estimate 2 (iv, ∇v) − (iw, ∇w) = |ρ − 1| |ρ∇φ| 2|v|2 − 1|∇v|. ρ
Using (4.37), we deduce that A2 2Ω ∇(χξε )∞
D1
2 ε˜ 1 2 dx |∇v|2 + |v| − 1 2 2˜ε
CΩ ∇(χξε )∞ ε| log ε|9/4 A2 . One checks easily from the definitions and from (2.30) that ∇(χξε )
∞
∇χ ∞ ξε ∞ + ∇ξε ∞ C| log ε|3/2
(4.38)
so we conclude that A2 Cε| log ε|15/4 A2 12 A2 for all sufficiently small ε. We know from (4.37) that A2 0, and it follows that A2 = 0, and hence (again appealing to (4.37)) that A1 = B = 0. Thus ∇v L2 = 1 − |v|2 L2 = 0, and so v is a constant of modulus 1 as required. 2 The proof of Theorem 1.3 will use the following result, which is Lemma 8 in [14].
2404
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
Lemma 4.1. There exists a universal constant C > 0 such that for any κ ∈ (1, 2), open set U ⊂ R2 and u ∈ H 1 (U ; R2 ), and ε ∈ (0, 1), φJ u κ |φ| eε (u) | log ε| U
|φ| + 1 eε (u) dx + Cε (κ−1)/50 1 + φ W 1,∞ φ ∞ + 1 +
(4.39)
supp φ
for all φ ∈ Cc0,1 (U ). Here eε (u) = 12 |∇u|2 +
1 (|u|2 4ε 2
− 1)2 .
The lemma as stated in [14] does not explicitly specify the exponent (κ − 1)/50 appearing on the right-hand side of (4.39). By inspection of the proof, however, one sees that this exponent can be taken to have the form 12 α, where α = (κ − 1)/12κ as in Theorem 2.1 of [15]. Proof of Theorem 1.3. We continue to use notation from the proof of Theorem 1.2, such as A1 , A2 , B, ε˜ , and so on. We first invoke the lemma, with ε˜ in place of ε and χξε in place of φ, and with κ > 1 to be chosen. This yields |A2 | 2Ωκ
χξε R2
eε˜ (v) dx + E, | log ε˜ |
where E denotes the error terms in (4.39). We note that for all sufficiently small ε > 0, the error term satisfies the bound E Cε β (1 + |A2 |), for β = (κ − 1)/100, for all sufficiently small ε. This is a consequence of (4.37) and the estimates
χξε W 1,∞ C| log ε|3/2 ,
χξε L∞ C.
These in turn follow from (4.38) together with (2.30). Now the choice of ε˜ implies that eε˜ (v) 12 |∇v|2 + ξε = fε ηε2 , we obtain
fε ∞ 1 − Cε β |A2 | 2Ωκ | log ε˜ | = 2Ωκ
χ
ηε2 (|v|2 4ε 2
− 1)2 in D1 , and recalling that
2 η4 ηε2 + Cε β |∇v|2 + ε2 |v|2 − 1 2 4ε
fε ∞ A1 + Cε β . | log ε˜ |
We know from (2.31) that fε ∞ (1 + Cε 1/3 ) f0 ∞ (1 + Cε β ) f0 ∞ , and from the choice of ε˜ , for any K > 0 there exists ε0 > 0 such that | log ε˜ | (| log ε| − log | log ε|)(1 + Kε β ) if 0 < ε < ε0 . Thus |A2 | Ω
2 f ∞ κA1 + Cε β | log ε| − log | log ε|
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
2405
for all sufficiently small ε. Assume that Ω 2 f1 ∞ (| log ε| − (c1 + 1) log | log ε|), for c1 to be chosen below. Then log | log ε| log | log ε| |A2 | 1 − c1 κA1 + Cε β 1 − c1 κA1 + Cε β . (4.40) | log ε| − log | log ε| | log ε| | log ε| We now take κ := 1 + c1 log| log ε| , so that β = (κ − 1)/100 = B A2 and that B 0, clearly A1 A2 , so we deduce that
c12
log | log ε| | log ε|
2
c1 log | log ε| 100 | log ε| .
Recalling that A1 +
A1 Cε β = C| log ε|−c1 /100 .
If c1 = 400 then we conclude that A1 C| log ε|−2 . Then (4.40) implies that A2 C| log ε|−2 , and it follows that B C| log ε|−2 . In view of (4.37), this implies that |∇v|2 + D1
The estimate ∇v ∞
C ε
2 1 2 |v| − 1 C| log ε|−2 . 2 4ε
(4.41)
(see (2.23)) and (4.41) are easily seen to imply that |v| 1 − C| log ε|−1
in D1
for all sufficiently small ε. Thus Ω is subcritical for small enough ε.
(4.42) 2
References [1] J.R. Abo-Shaeer, C. Raman, J.M. Vogels, W. Ketterle, Observation of vortex lattices in Bose–Einstein condensates, Science 292 (2001) 476. [2] A. Aftalion, Vortices in Bose Einstein Condensates, Progr. Nonlinear Differential Equations Appl., vol. 67, Birkhäuser Boston, Inc., Boston, MA, 2006. [3] A. Aftalion, P. Mason, Rotation of a Bose Einstein condensate held under a toroidal trap, Phys. Rev. A 81 (2010) 023607. [4] A. Aftalion, S. Alama, Lia Bronsard, Giant vortex and the breakdown of strong pinning in a rotating Bose–Einstein condensate, Arch. Ration. Mech. Anal. 178 (2005) 247–286. [5] A. Aftalion, X. Blanc, F. Nier, Lowest Landau level for Bose Einstein condensates and Bargmann transform, J. Funct. Anal. 241 (2006) 661–702. [6] H. Berestycki, L. Nirenberg, S.R.S. Varadhan, The principal eigenvalue and maximum principle for second-order elliptic operators in general domains, Comm. Pure Appl. Math. 47 (1994) 47–92. [7] F. Bethuel, H. Brezis, F. Hélein, Ginzburg–Landau Vortices, Progr. Nonlinear Differential Equations Appl., vol. 13, Birkhäuser Boston, Inc., Boston, MA, 1994. [8] H. Brezis, Semilinear equations in RN without conditions at infinity, Appl. Math. Optim. 12 (1984) 271–282. [9] H. Brezis, L. Oswald, Remarks on sublinear elliptic equations, Nonlinear Anal. 10 (1986) 55–64. [10] D. Gilbarg, N.S. Trudinger, Elliptic Partial Differential Equations of Second Order, Springer-Verlag, ISBN 978-3540-41160-4, 1998. [11] R. Ignat, V. Millot, The critical velocity for vortex existence in a two-dimensional rotating Bose–Einstein condensate, J. Funct. Anal. 233 (2006) 260–306. [12] R. Ignat, V. Millot, Energy expansion and vortex location for a two-dimensional rotating Bose–Einstein condensate, Rev. Math. Phys. 18 (2006) 119–162. [13] R.L. Jerrard, Lower bounds for generalized Ginzburg–Landau functionals, SIAM J. Math. Anal. 30 (1999) 721–746.
2406
A. Aftalion et al. / Journal of Functional Analysis 260 (2011) 2387–2406
[14] R.L. Jerrard, Local minimizers with vortex filaments for a Gross–Pitaevsky functional, ESAIM Control Optim. Calc. Var. 13 (2007) 35–71. [15] R. Jerrard, H.M. Soner, The Jacobian and the Ginzburg–Landau energy, Calc. Var. Partial Differential Equations 14 (2002) 151–191. [16] K. Kasamatsu, M. Tsubota, M. Ueda, Giant hole and circular superflow in a fast rotating Bose–Einstein condensate, Phys. Rev. B 66 (2002) 053606. [17] L. Lassoued, P. Mironescu, Ginzburg–Landau type energy with discontinuous constraint, J. Anal. Math. 77 (1999) 1–26. [18] K.W. Madison, F. Chevy, V. Bretin, J. Dalibard, Stationary states of a rotating Bose–Einstein condensate: Routes to vortex nucleation, Phys. Rev. Lett. 86 (2001) 4443–4446. [19] C.J. Pethick, H. Smith, Bose Einstein Condensation in Dilute Gases, Cambridge University Press, 2002. [20] L. Pitaevskii, S. Stringari, Bose Einstein Condensation, Internat. Ser. Monogr. Phys., vol. 116, Oxford Science Publications, 2003. [21] C. Ryu, et al., Observation of persistent flow of a Bose Einstein condensate in a toroidal trap, Phys. Rev. Lett. 99 (2007) 260401. [22] E. Sandier, Lower bounds for the energy of unit vector fields and applications, J. Funct. Anal. 152 (1998) 379–403; J. Funct. Anal. 171 (2000) 233 (erratum). [23] S. Stock, V. Bretin, F. Chevy, J. Dalibard, Shape oscillation of a rotating Bose–Einstein condensate, Europhys. Lett. 65 (2004) 594. [24] C.N. Weiler, et al., Spontaneous vortices in the formation of Bose Einstein condensates, Nature 455 (2008) 948.
Journal of Functional Analysis 260 (2011) 2407–2423 www.elsevier.com/locate/jfa
Minimal and maximal operator spaces and operator systems in entanglement theory Nathaniel Johnston a,∗ , David W. Kribs a,b , Vern I. Paulsen c , Rajesh Pereira a a Department of Mathematics and Statistics, University of Guelph, Guelph, Ontario N1G 2W1, Canada b Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada c Department of Mathematics, University of Houston, Houston, TX 77204-3476, USA
Received 2 September 2010; accepted 6 October 2010 Available online 15 October 2010 Communicated by D. Voiculescu
Abstract We examine k-minimal and k-maximal operator spaces and operator systems, and investigate their relationships with the separability problem in quantum information theory. We show that the matrix norms that define the k-minimal operator spaces are equal to a family of norms that have been studied independently as a tool for detecting k-positive linear maps and bound entanglement. Similarly, we investigate the k-super minimal and k-super maximal operator systems that were recently introduced and show that their cones of positive elements are exactly the cones of k-block positive operators and (unnormalized) states with Schmidt number no greater than k, respectively. We characterize a class of norms on the k-super minimal operator systems and show that the completely bounded versions of these norms provide a criterion for testing the Schmidt number of a quantum state that generalizes the recently-developed separability criterion based on trace-contractive maps. © 2010 Elsevier Inc. All rights reserved. Keywords: Operator space; Operator system; Quantum information theory; Entanglement
* Corresponding author.
E-mail addresses: [email protected] (N. Johnston), [email protected] (D.W. Kribs), [email protected] (V.I. Paulsen), [email protected] (R. Pereira). 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.003
2408
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
1. Introduction A primary goal of this paper is to formally link central areas of study in operator theory and quantum information theory. More specifically, we connect recent investigations in operator space and operator system theory [18,21] on the one hand and the theory of entanglement [9,1] on the other. As benefits of this combined perspective, we obtain new results and new elementary proofs in both areas. We give further details below before proceeding. Given a (classical description of a) quantum state ρ, one of the most basic open questions in quantum information theory asks for an operational criterion for determining whether ρ is separable or entangled. Much progress has been made on this front over the past two decades. For instance, a revealing connection between the separability problem and operator theory was established in [7], where it was shown that ρ is separable if and only if it remains positive under the application of any positive map to one half of the state. Another more recent approach characterizes separability via maps that are contractive in the trace norm on Hermitian operators [8]. In this work we show that these two approaches to the separability problem can be seen as arising from the theory of minimal and maximal operator systems and operator spaces, respectively. Additionally, this work can be seen as demonstrating how to rephrase certain positivity questions that are relevant in quantum information theory in terms of norms that are relevant in operator theory instead. For example, instead of using positive maps to detect separability of quantum states, we can construct a natural operator system into which positive maps are completely positive. Then the completely bounded norm on that operator system serves as a tool for detecting separability of quantum states as well. A natural generalization of the characterization of separable states in terms of positive linear maps was implicit in [25] and proved in [22] – a state has Schmidt number no greater than k if and only if it remains positive under the application of any k-positive map to one half of the state. Recently, a further connection was made between operator theory and quantum information: a map is completely positive on what is known as the maximal (resp. minimal) operator system on Mn , the space of n × n complex matrices, if and only if it is a positive (resp. entanglementbreaking [10]) map [19]. Thus, the maps that serve to detect quantum entanglement are the completely positive maps on the maximal operator system on Mn . Similarly, completely positive maps on “k-super maximal” and “k-super minimal” operator systems on Mn [26] have been studied and shown to be the same as k-positive and k-partially entanglement breaking maps [2], respectively. We will reprove these statements via an elementary proof that shows that the cones of positive elements that define the k-super maximal (resp. k-super minimal) operator systems are exactly the cones of (unnormalized) states with Schmidt number at most k (resp. k-block positive operators). Analogous to the minimal and maximal operator systems, there are minimal and maximal operator spaces (and appropriate k-minimal and k-maximal generalizations). We will show the norms that define the k-minimal operator spaces on Mn coincide with a family of norms that have recently been studied in quantum information theory [13,12,11,17,3–5] for their applications to the problems of detecting k-positive linear maps and NPPT bound entangled states. Furthermore, we will connect the dual of a version of the completely bounded minimal operator space norm to the separability problem and extend recent results about how trace-contractive maps can be used to detect entanglement. We will see that the maps that serve to detect quantum entanglement via norms are roughly the completely contractive maps on the minimal operator space on Mn . The natural generalization to norms that detect states with Schmidt number k is proved via a
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2409
stabilization result for the completely bounded norm from Mr to the k-minimal operator space (or system) of Mn . In Section 2 we introduce the reader to the various relevant notions from quantum information theory such as separability and Schmidt rank. In Section 3 we introduce (abstract) operator spaces and the k-minimal and k-maximal operator space structures, and investigate their relationship with norms that have been used in quantum information theory. In Section 4 we give a similar treatment to abstract operator systems and the k-super minimal and k-super maximal operator system structures. We then investigate some norms on the k-super minimal operator system structures in Section 5. We close in Section 6 by considering the completely bounded version of some of the norms that have been presented and establish a relationship with the Schmidt number of quantum states. 2. Quantum information theory preliminaries Given a vector space V , we will use Mm,p (V ) to denote the space of m × p matrices with elements from V . For brevity we will write Mm (V ) := Mm,m (V ) and Mm := Mm (C). It will occasionally be convenient to use tensor product notation and identify Mm ⊗ V ∼ = Mm (V ) in the standard way, especially when V = Mn . We will make use of bra-ket notation from quantum mechanics as follows: we will use “kets” |v ∈ Cn to represent unit (column) vectors and “bras” v| := |v∗ to represent the dual (row) vectors, where (·)∗ represents the conjugate transpose. Unit vectors represent pure quantum states (or more specifically, the projection |vv| onto the vector |v represents a pure quantum state) and thus we will sometimes refer to unit vectors as states. Mixed quantum states are represented by density operators ρ ∈ Mm ⊗ Mn that are positive semidefinite with Tr(ρ) = 1. A state |v ∈ Cm ⊗ Cn is called separable if there exist |v1 ∈ Cm , |v2 ∈ Cn such that |v = |v1 ⊗ |v2 ; otherwise it is said to be entangled. The Schmidt rank of a state |v, denoted SR(|v), is the least number separable states |vi needed to write |v = i αi |vi , where αi are some (real) coefficients. The analogue of Schmidt rank for a bipartite mixed state ρ ∈ Mm ⊗ Mn is Schmidt number [25], denoted SN(ρ), which is defined to be the least integer k such that ρ can be written in the form ρ = i pi |vi vi | with {pi } forming a probability distribution and SR(|vi ) k for all i. An operator X = X ∗ ∈ Mm ⊗ Mn is said to be k-block positive (or a k-entanglement witness) if v|X|v 0 for all vectors |v with SR(|v) k. In the extreme case when k = min{m, n}, we see that the k-block positive operators are exactly the positive semidefinite operators (since SR(|v) min{m, n} for all vectors |v), and for smaller k the set of k-block positive operators is strictly larger. In [13,12], a family of operator norms that have several connections in quantum information theory was investigated. Arising from the Schmidt rank of bipartite pure states, they are defined for operators X ∈ Mm ⊗ Mn as follows XS(k) = sup v|X|w: SR |v , SR |w k . |v,|w
(1)
These norms were shown to be useful for determining whether or not an operator is k-block positive, and also have applications to the problem of determining whether or not there exist bound entangled non-positive partial transpose states [13,17]. The problem of computing these norms was investigated in [12].
2410
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
The completely bounded norm of a linear map Φ : Mr → Mn is defined to be Φcb := sup (idm ⊗ Φ)(X): X ∈ Mm (Mr ) with X 1 . m1
It was shown by Smith [24] (and independently later by Kitaev [15] from the dual perspective) that it suffices to fix m = n so that Φcb = idn ⊗ Φ. We will see in Section 6 a connection between the norms idk ⊗ Φ for 1 k n and the norms (1). 3. k-Minimal and k-maximal operator spaces We will now present (abstract) operator spaces and the k-minimal and k-maximal operator space structures. An operator space is a vector space V together with a family of L∞ matrix norms · Mm (V ) on Mm (V ) that make V into a matrix normed space. That is, we require that if A = (aij ), B = (bij ) ∈ Mp,m and X = (xij ) ∈ Mm (V ) then A · X · B ∗ Mp (V ) AXMm (V ) B, where ∗
A · X · B :=
m
aik xk bj ∈ Mp (V )
k,=1
and A, B represent the operator norm on Mp,m . The L∞ requirement is that X ⊕ Y Mm+p (V ) = max{XMm (V ) , Y Mp (V ) } for all X ∈ Mm (V ), Y ∈ Mp (V ). When the particular operator space structure (i.e., the family of L∞ matrix norms) on V is not important, we will denote the operator space simply by V . We will use Mn itself to denote the “standard” operator space structure on Mn that is obtained by associating Mm (Mn ) with Mmn in the natural way and using the operator norm. For a more detailed introduction to abstract operator spaces, the interested reader is directed to [18, Chapter 13]. Given an operator space V and a natural number k, one can define a new family of norms on Mm (V ) that coincide with the matrix norms on Mm (V ) for 1 m k and are minimal (or maximal) for m > k. We will use MIN k (V ) and MAX k (V ) to denote what are called the k-minimal operator space of V and the k-maximal operator space of V , respectively. For X ∈ Mm (V ) we will use XMm (MIN k (V )) and XMm (MAX k (V )) to denote the norms that define the k-minimal and k-maximal operator spaces of V , respectively. For X ∈ Mm (V ) one can define the k-minimal and k-maximal operator space norms via XMm (MIN k (V )) := sup Φ(Xij ) : Φ : V → Mk with Φcb 1
(2)
XMm (MAX k (V )) := sup Φ(Xij ) : Φ : V → B(H) with idk ⊗ Φ 1 .
(3)
and
Indeed, the names of these operator space structures come from the facts that if O(V ) is any operator space structure on V such that · Mm (V ) = · Mm (O(V )) for 1 m k then · Mm (MIN k (V )) | · |Mm (O(V )) · Mm (MAX k (V )) for all m > k. In the k = 1 case, these operator spaces are exactly the minimal and maximal operator space structures that are fundamental in operator space theory [18, Chapter 14]. The interested reader is directed to [16] and the references therein for further properties of MIN k (V ) and MAX k (V ) when k 2.
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2411
One of the primary reasons for our interest in the k-minimal operator spaces is the following result, which says that the k-minimal norm on Mm (Mn ) is exactly equal to the S(k)-norm (1) from quantum information theory. Theorem 1. Let X ∈ Mm (Mn ). Then XMm (MIN k (Mn )) = XS(k) . Proof. A fundamental result about completely bounded maps says (see [14, Theorem 19], for example) that any completely bounded map Φ : Mn → Mk has a representation of the form Φ(Y ) =
nk
Ai Y Bi∗
with Ai , Bi ∈ Mk,n
i=1
nk nk
∗ ∗ and Ai Ai Bi Bi = Φ2cb . i=1
(4)
i=1
By using the fact that Φ is completely contractive (so Φcb = 1) and a rescaling of the operators {Ai } and {Bi } we have nk
∗ XMm (MIN k (Mn )) = sup (Im ⊗ Ai )X Im ⊗ Bi : i=1
nk nk
∗ ∗ Ai Ai = Bi Bi = 1 , i=1
i=1
where the supremum is taken over all families of operators {Ai }, {Bi } ⊂ Mk,n satisfying the normalization condition. Now define αij |aij := A∗i |j and βij |bij := Bi∗ |j , and let |v = k k m k j =1 γj |cj ⊗ |j , |w = j =1 δj |dj ⊗ |j ∈ C ⊗ C be arbitrary unit vectors. Then simple algebra reveals k
∗ νi |vi := Im ⊗ Ai |v = αij γj |cj ⊗ |aij j =1
and k
μi |wi := Im ⊗ Bi∗ |w = βij δj |dj ⊗ |bij . j =1
In particular, SR(|vi ), SR(|wi ) k for all i. Furthermore, by the normalization condition on {Ai } and {Bi } we have that v| Im ⊗
nk
Ai A∗i
i=1
|v =
nk
νi2
1 and w| Im ⊗
i=1
nk
Bi Bi∗
|w =
i=1
nk
μ2i 1.
(5)
i=1
Thus we can write nk nk nk
∗ νi μi vi |X|wi νi μi vi |X|wi . v|(Im ⊗ Ai )(X) Im ⊗ Bi |w = i=1
i=1
i=1
(6)
2412
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
The normalization condition (5) and the Cauchy–Schwarz inequality tell us that there is a particular i such that the sum (6) |vi |X|wi |. Taking the supremum over all vectors |v and |w gives the “” inequality. The “” inequality can be seen by noting that if we have two vectors in their Schmidt decom positions |v = ki=1 αi |ci ⊗ |ai and |w = ki=1 βi |di ⊗ |bi , then we can define operators A, B ∈ Mk,n by setting their ith row in the standard basis to be ai | and bi |, respectively. Because the orthonormal sets, A = B = 1. Additionally, if we define rows of A and B form k−1
= α |c ⊗ |i and |w β |d |v = k−1 i=0 i i i=0 i i ⊗ |i, then (Im ⊗ A)(X) Im ⊗ B ∗ v (Im ⊗ A)(X) Im ⊗ B ∗ w = v|X|w. Taking the supremum over all vectors |v, |w with SR(|v), SR(|w) k gives the result.
2
Remark 2. When working with an operator system (instead of an operator space) V , it is more natural to define the norm (2) by taking the supremum over all completely positive unital maps Φ : V → Mk rather than all complete contractions (similarly, to define the norm (3) one would take the supremum over all k-positive unital maps rather than k-contractive maps). In this case, the k-minimal norm no longer coincides with the S(k)-norm on Mm (Mn ) but rather has the following slightly different form: XMm (OMIN k (Mn )) = sup v|X|w: SR |v , SR |w k and |v,|w
∃P ∈ Mm s.t. (P ⊗ In )|v = |w ,
(7)
where the notation OMIN k (Mn ) refers to a new operator system structure that is being assigned to Mn , which we discuss in detail in the next section. Intuitively, this norm has the same interpretation as the norm (1) except with the added restriction that the vectors |v and |w look the same on the second subsystems. We will examine this norm in more detail in Section 5. In particular, we will see in Theorem 8 that the norm (7) is a natural norm on the k-super minimal operator system structure (to be defined in Section 4), which plays an analogous role to the k-minimal operator space structure. Now that we have characterized the k-minimal norm in a fairly concrete way, we turn our attention to the k-maximal norm. The following result is a direct generalization of a corresponding known characterization of the MAX(V ) norm [18, Theorem 14.2]. Theorem 3. Let V be an operator space and let X ∈ Mm (V ). Then XMm (MAX k (V )) = inf AB: A, B ∈ Mm,rk , xi ∈ Mk (V ), xi Mk (V ) 1 with X = A · diag(x1 , . . . , xr ) · B ∗ , where diag(x1 , . . . , xr ) ∈ Mrk (V ) is the r × r block diagonal matrix with entries x1 , . . . , xr down its diagonal, and the infimum is taken over all such decompositions of X. Proof. The “” inequality follows simply from the axioms of an operator space: if X = (Xij ) = A · diag(x1 , . . . , xr ) · B ∗ ∈ Mm (V ) then
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2413
Φ(Xij ) = A · diag (idk ⊗ Φ)(x1 ), . . . , (idk ⊗ Φ)(xr ) · B ∗ . Thus Φ(Xij ) AB max (idk ⊗ Φ)(x1 ), . . . , (idk ⊗ Φ)(xr ) . By taking the supremum over maps Φ with idk ⊗ Φ 1, the “” inequality follows. We will now show that the infimum on the right is an L∞ matrix norm that coincides with · Mm (V ) for 1 m k. The “” inequality will then follow from the fact that · Mm (MAX k (V )) is the maximal such norm. First, denote the infimum on the right by Xm,inf and fix some 1 m k. Then the inequality XMm (V ) Xm,inf follows immediately by picking any particular decomposition X = A · diag(x1 , . . . , xr ) · B ∗ and using the axioms of an operator space to see that A · diag(x1 , . . . , xr ) · B ∗ M
m (V )
AB max x1 , . . . , xr AB Xm,inf .
The fact that equality is attained by some decomposition of X comes simply from writing X = (XMm (V ) I ) · (X ⊕ 0k−m ) · I . It follows that · Mm (V ) = · m,inf for 1 m k. All that remains to be proved is that · m,inf is an L∞ matrix norm, which we omit as it is directly analogous to the proof of [18, Theorem 14.2]. 2 As one final note, observe that we can obtain lower bounds of the k-minimal and k-maximal operator space norms simply by choosing particular maps Φ that satisfy the normalization condition of their definition. Upper bounds of the k-maximal norms can be obtained from Theorem 3. The problem of computing upper bounds for the k-minimal norms was investigated in [12]. 4. k-Super minimal and k-super maximal operator systems We will now introduce (abstract) operator systems, and in particular the minimal and maximal operator systems that were explored in [19] and the k-super minimal and k-super maximal operator systems that were explored in [26]. Our introduction to general operator systems will be brief, and the interested reader is directed to [18, Chapter 13] for a more thorough treatment. Let V be a complex (not necessarily normed) vector space as before, with a conjugate linear involution that will be denoted by ∗ (such a space is called a ∗-vector space). Define Vh := {v ∈ V : v = v ∗ } to be the set of Hermitian elements of V . We will say that (V , V + ) is an ordered ∗-vector space if V + ⊆ Vh is a convex cone satisfying V + ∩ −V + = {0}. Here V + plays the role of the “positive” elements of V – in the most familiar ordering on square matrices, V + is the set of positive semidefinite matrices. Much as was the case with operator spaces, an operator system is constructed by considering the spaces Mm (V ), but instead of considering various norms on these spaces that behave well with the norm on V , we will consider various cones of positive elements on Mm (V ) that behave well with the cone of positive elements V+ . To this end, given a ∗-vector space V we let Mm (V )h
2414
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
denote the set of Hermitian elements in Mm (V ). It is said that a family of cones Cm ⊆ Mm (V )h (m 1) is a matrix ordering on V if C1 = V + and they satisfy the following three properties: • each Cm is a cone in Mm (V )h ; • Cm ∩ −Cm = {0} for each m; and • for each n, m ∈ N and X ∈ Mm,n we have X ∗ Cm X ⊆ Cn . A final technical restriction on V is that we will require an element e ∈ Vh such that, for any v ∈ V , there exists r > 0 such that re − v ∈ V + (such an element e is called an order unit). It is said that e is an Archimedean order unit if re + v ∈ V + for all r > 0 implies that v ∈ V + . A triple (V , C1 , e), where (V , C1 ) is an ordered ∗-vector space and e is an Archimedean order unit, will be referred to as an Archimedean ordered ∗-vector space or an AOU space for short. Furthermore, if e ∈ Vh is an Archimedean order unit then we say that it is an Archimedean matrix order unit if the operator em := Im ⊗ e ∈ Mm (V ) is an Archimedean order unit in Cm for all m 1. We are now able to define abstract operator systems: Definition 4. An (abstract) operator system is a triple (V , {Cm }∞ m=1 , e), where V is a ∗-vector is a matrix ordering on V , and e ∈ V is an Archimedean matrix order unit. space, {Cm }∞ h m=1 For brevity, we may simply say that V is an operator system, with the understanding that there is an associated matrix ordering {Cm }∞ m=1 and Archimedean matrix order unit e. Recall from [19] that for any AOU space (V , V + , e) there exists minimal and maximal operator system min }∞ structure OMIN(V ) and OMAX(V ) – that is, there exist particular families of cones {Cm m=1 ∞ max }∞ + , e) then C max ⊆ and {Cm such that if {D } is any other matrix ordering on (V , V m m=1 m m=1 min for all m 1. In [26] a generalization of these operator system structures, analogous D m ⊆ Cm to the k-minimal and k-maximal operator spaces presented in Section 3, was introduced. Given an operator system V , the k-super minimal operator system of V and the k-super maximal operator system of V , denoted OMIN k (V ) and OMAX k (V ) respectively, are defined via the following families of cones: min,k + Cm := (Xij ) ∈ Mm (V ): Φ(Xij ) ∈ Mm ∀ unital CP maps Φ : V → Mk , max,k Cm := A · D · A∗ ∈ Mm (V ): A ∈ Mm,rk , D = diag(D1 , . . . , Dr ), D ∈ Mk (V )+ ∀, r ∈ N . max,k need not define an operator system due to If V is infinite-dimensional then the cones Cm Im ⊗ e perhaps not always being an Archimedean order unit, though it was shown in [26] how to Archimedeanize the space to correct this problem. We will avoid this technicality by working explicitly in the V = Mn case from now on. Observe that the interpretation of the k-super minimal and k-super maximal operator systems is completely analogous to the interpretation of k-minimal and k-maximal operator spaces. min,k max,k and Cm coincide with the families of positive cones of The families of positive cones Cm V for 1 m k, and out of all operator system structures on V with this property they are the largest (smallest, respectively) for m > k. min,k ⊆ Mm ⊗ Mn are exactly the cones In terms of quantum information theory, the cones Cm max,k ⊆ Mm ⊗ Mn are exactly the cones of (unnorof k-block positive operators, and the cones Cm
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2415
malized) density operators ρ with SN(ρ) k. These facts have appeared implicitly in the past, but their importance merits making the details explicit: Theorem 5. Let X, ρ ∈ Mm ⊗ Mn . Then min,k if and only if X is k-block positive; and (a) X ∈ Cm max,k (b) ρ ∈ Cm if and only if SN(ρ) k.
Proof. To see (a), we will use techniques similar to those used in the proof of Theorem 1. Use min,k if and only if the Choi–Kraus representation of completely positive maps so that X ∈ Cm nk
(Im ⊗ Ai )X Im ⊗ A∗i ∈ (Mm ⊗ Mk )+
for all {Ai } ⊂ Mk,n with
i=1
nk
Ai A∗i = Ik .
i=1
Now define αij |aij := A∗i |j and let |v = vector. Then some algebra reveals
k−1
j =0 γj |cj ⊗ |j ∈ C
m ⊗ Ck
be an arbitrary unit
k−1
νi |vi := Im ⊗ A∗i |v = αij γj |cj ⊗ |aij . j =0
In particular, SR(|vi ) k for all i. Thus we can write nk nk
v|(Im ⊗ Ai )(X) Im ⊗ A∗i |v = νi2 vi |X|vi 0. i=1
(8)
i=1
Part (a) follows by noting that we can choose |v and a CP map with one Kraus operator A1 so that (Im ⊗ A∗1 )|v is any particular vector of our choosing with Schmidt rank no larger than k. To see the “only if” implication of (b), we could invoke various known duality results from operator theory and quantum information theory so that the result would follow from (a), but for completeness we will instead prove it using elementary means. To this end, suppose max,k . Thus we can write ρ = A · D · A∗ for some A ∈ Mm,rk and D = diag(D ρ ∈ Cm 1 , . . . , Dr ) = r + with D ∈ Mk (Mn ) for all . Furthermore, write D = =1 || ⊗ D h d,h |v,h v,h | where |v,h = ki=1 |i ⊗ |d,h,i . Then if we define α,i |a , i := A(| ⊗ |i), we have A · D · A∗ =
kn
r
d,h
ij =1
h=1 =1
=
kn
r
h=1 =1
=
kn
r
h=1 =1
k
A || ⊗ |ij | A∗ ⊗ |d,h,i d,h,j |
d,h
k
α,i α,j |a,i a,j | ⊗ |d,h,i d,h,j |
ij =1
d,h |w,h w,h |,
2416
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
where |w,h :=
k
α,i |a,i ⊗ |d,h,i .
i=1
Since SR(|w,h ) k for all , h, it follows that SN(ρ) k as well. For the “if” implication, we note that the above argument can easily be reversed.
2
One of the useful consequences of Theorem 5 is that we can now easily characterize completely positive maps between these various operator system structures. Recall that a map Φ ∞ between operator systems (V , {Cm }∞ m=1 , e) and (V , {Dm }m=1 , e) is said to be completely positive if (Φ(Xij )) ∈ Dm whenever (Xij ) ∈ Cm . We then have the following result that characterizes k-positive maps, entanglement-breaking maps, and k-partially entanglement breaking maps as completely positive maps between these k-super minimal and k-super maximal operator systems. Corollary 6. Let Φ : Mn → Mn and let k n. Then (a) Φ : OMIN k (Mn ) → Mn is completely positive if and only if Φ is k-partially entanglement breaking; (b) Φ : Mn → OMAX k (Mn ) is completely positive if and only if Φ is k-partially entanglement breaking; (c) Φ : OMAX k (Mn ) → Mn is completely positive if and only if Φ is k-positive; (d) Φ : Mn → OMIN k (Mn ) is completely positive if and only if Φ is k-positive. Proof. Fact (a) follows from [2, Theorem 2] and fact (b) follows from the fact that Φ is kpartially entanglement breaking (by definition) if and only if SN((idm ⊗Φ)(ρ)) k for all m 1. Fact (c) follows from [25, Theorem 1] and (d) follows from (c) and the fact that the cone of unnormalized states with Schmidt number at most k and the cone of k-block positive operators are dual to each other [23]. 2 Remark 7. Corollary 6 was originally proved in the k = 1 case in [19] and for arbitrary k in [26]. min,k max,k and Cm Both of those proofs prove the result directly, without characterizing the cones Cm as in Theorem 5. 5. Norms on operator systems Given an operator system V , the matrix norm induced by the matrix order {Cm }∞ m=1 is defined for X ∈ Mm (V ) to be rem X ∈ C2m . (9) XMm (V ) := inf r: X ∗ rem In the particular case of X ∈ Mm (OMIN k (V )) or X ∈ Mm (OMAX k (V )), we will denote the norm (9) by XMm (OMIN k (V )) and XMm (OMAX k (V )) , respectively. Our first result characterizes XMm (OMIN k (Mn )) in terms of the Schmidt rank of pure states, much like Theorem 1 characterized XMm (MIN k (Mn )) .
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2417
Theorem 8. Let X ∈ Mm (OMIN k (Mn )). Then XMm (OMIN k (Mn )) = sup v|X|w: SR |v , SR |w k and |v,|w
∃P ∈ Mm s.t. (P ⊗ In )|v = |w .
Proof. Given X ∈ Mm (OMIN k (Mn )), consider the operator X˜ :=
rIn X∗
X rIn
∈ (M2 ⊗ Mm ) ⊗ Mn ∼ = M2m ⊗ Mn .
min,k ˜ (Mn ) if and only if v|X|v 0 for all |v ∈ C2m ⊗ Cn with SR(|v) k. If we Then X˜ ∈ C2m multiply on the left and the right by a Schmidt-rank k vector |v := ki=1 βi |ai ⊗ |bi , where |ai = αi1 |1 ⊗ |ai1 + αi2 |2 ⊗ |ai2 ∈ C2 ⊗ Cm and |bi ∈ Cn , we get
˜ v|X|v =
k k
2 2 + r βi2 αi1 + βi2 αi2 2αi1 αj 2 βi βj Re ai1 | ⊗ bi | X |aj 2 ⊗ |bj ij =1
i=1
=r +
k
2αi1 αj 2 βi βj Re ai1 | ⊗ bi | X |aj 2 ⊗ |bj
ij =1
= r + 2c1 c2 Re v1 |X|v2 , where c1 |v1 := ki=1 αi1 βi |ai1 ⊗ |bi , c2 |v2 := ki=1 αi2 βi |ai2 ⊗ |bi ∈ Cm ⊗ Cn . Notice that the normalization of the Schmidt coefficients tells us that c12 + c22 = 1. Also notice that |v1 and |v2 can be written in this way using the same vectors |bi on the second subsystem if and only if there exists P ∈ Mm such that (P ⊗ In )|v1 = |v2 . Now taking the infimum over r and requiring that the result be non-negative tells us that the quantity we are interested in is XMm (OMIN k (Mn )) = sup 2c1 c2 Re v1 |X|v2 : SR |v1 , SR |v2 k, c12 + c22 = 1, ∃P ∈ Mm s.t. (P ⊗ In )|v1 = |v2 = sup v1 |X|v2 : SR |v1 , SR |v2 k and ∃P ∈ Mm s.t. (P ⊗ In )|v1 = |v2 , where the final equality comes applying a complex phase to |v1 so that Re(v1 |X|v2 ) = |v1 |X|v√2 |, and from Hölder’s inequality telling us that the supremum is attained when c1 = c2 = 1/ 2. 2 Of course, the matrix norm induced by the matrix order is not the only way to define a norm on the various levels of the operator system V . What is referred to as the order norm of v ∈ Vh [20] is defined via vor := inf{t ∈ R: −te v te}.
(10)
2418
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
It is not difficult to see that for a Hermitian element X = X ∗ ∈ Mm (V ), the matrix norm induced by the matrix order (9) coincides with the order norm (10). It was shown in [20] how the order norm on Mm (V )h can be extended (non-uniquely) to a norm on all of Mm (V ). Furthermore, there exists a minimal order norm · m and a maximal order norm · M satisfying · m · M 2 · m . We will now examine properties of these two norms as well as some other norms (all of which coincide with the order norm on Hermitian elements) on the k-super minimal operator system structures. We will consider an operator X ∈ Mm (OMIN k (Mn )), where recall by this we mean X ∈ Mm (Mn ), where the operator system structure on the space is OMIN k (Mn ). Then we recall the minimal order norm, decomposition norm · dec , and maximal order norm from [20]: Xm := sup f (X): f : Mm OMIN k (Mn ) → C a pos. linear functional s.t. f (I ) = 1 , r
r
min,k |λi |Pi : X = λi Pi with Pi ∈ Cm (Mn ) and λi ∈ C , Xdec := inf i=1 i=1 or r
r
∗ |λi |Hi or : X = λi Hi with Hi = Hi and λi ∈ C . XM := inf i=1
i=1
Our next result shows that the minimal order norm can be thought of in terms of vectors with Schmidt rank no greater than k, much like the norms · S(k) and · Mm (OMIN k (Mn )) introduced earlier. Theorem 9. Let X ∈ Mm (OMIN k (Mn )). Then Xm = sup v|X|v: SR |v k . |v
Proof. Note that if we define a linear functional f : Mm (OMIN k (Mn )) → C by f (X) = v|X|v min,k (Mn ) (by for some fixed |v with SR(|v) k then it is clear that f (X) 0 whenever X ∈ Cm definition of k-block positivity) and f (I ) = 1. The “” inequality follows immediately. To see the other inequality, note that if X = X ∗ = (Xij ) and |v, |w can be written |v = k k r=1 αr |ar ⊗ |br and |w = r=1 γr |cr ⊗ |br , then v|X|w =
k
αr γs ar | br |Xij |bs ij |cs
rs=1
⎛ (b |X |b ) 1 ij 1 ij .. = α1 a1 |, . . . , αk ak | ⎝ . (bk |Xij |b1 )ij
··· .. . ···
(b1 |Xij |bk )ij ⎞ ⎛ γ1 |c1 ⎞ .. ⎠ ⎝ .. ⎠ . . . γk |ck (bk |Xij |bk )ij
Because X is Hermitian, so is the operator in the last line above, so if we take the supremum over all |v, |w of this form, we may choose αi |ai = γi |ci for all i. It follows that sup v|X|v: SR |v k = sup v|X|w: SR |v , SR |w k and ∃P ∈ Mm s.t. (P ⊗ In )|v = |w .
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2419
The “” inequality follows from Theorem 8, the fact that · Mm (OMIN k (Mn )) is an order norm, and the minimality of · m among order norms. 2 The characterization of · m given by Theorem 9 can be thought of as in the same vein as [20, Proposition 5.8], where it was shown that for a unital C∗ -algebra, · m coincides with the numerical radius. In our setting, · m can be thought of as a bipartite analogue of the numerical radius, which has been studied in quantum information theory in the k = 1 case [6]. In the case where X is not Hermitian, equality need not hold between any of the order norms that have been introduced. We now briefly investigate how they compare to each other in general. Proposition 10. Let X ∈ Mm (OMIN k (Mn )). Then Xm XMm (OMIN k (Mn )) Xdec XM . Proof. The first and last inequalities follow from the fact that · m and · M are the minimal and maximal order norms, respectively. Thus, all that needs to be shown is that XMm (OMIN k (Mn )) Xdec . To this end, let |v, |w ∈ Cm ⊗ Cn with SR(|v), SR(|w) k be such that there exists some P ∈ Mm such that (P ⊗ In )|v = |w. Then for any decomposition min,k (Mn ) and λi ∈ C we can use a similar argument to that used in X = ri=1 λi Pi with Pi ∈ Cm the proof of Theorem 9 to see that v|Pi |v |v|Pi |w| 0 because each Pi is k-block positive (by Theorem 5). Thus r r r r
v|X|w = λi v|Pi |w |λi |v|Pi |w |λi |v|Pi |v |λi |Pi . i=1
i=1
i=1
i=1
or
Taking the supremum over all such vectors |v and |w and the infimum over all such decompositions of X gives the result. 2 We know in general that · m and · M can differ by at most a factor of two. We now present an example some of these norms and to demonstrate that in fact even · m and · Mm (OMIN k (Mn )) can differ by a factor of two. Example 11. Consider the rank-1 operator X := |φψ| ∈ OMIN kn (Mn ), where 1
|i ⊗ |i, |φ := √ n n−1 i=0
It is easily verified that if |v =
n−1 1
|ψ := √ |i ⊗ i + 1 (mod n) . n i=0
k
i=1 αi |ai ⊗ |bi
then
k n−1
1
v|X|v = αr αs ar |ibr |ij |as j + 1 (mod n)bs n rs=1 ij =0
k n−1 k
1 = Tr αr |ar br | · j | αr |ar br | j + 1 (mod n) . n r=1
j =0
r=1
2420
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
In the final line above we have the trace of an operator with rank at most k, multiplied by the sum of the elements on the superdiagonal of the same operator, subject to the constraint that the k k and so Xm = 2n Frobenius norm of that operator is equal to 1. It follows that |v|X|v| 2n k−1 1 (equality can be seen by taking |v = i=0 √ |i ⊗ (|i + |i + 1 (mod n))). 2k k−1 k−1 √1 To see that Xop is twice as large, consider |v = √1 i=0 |i⊗|i and |w = i=0 |i⊗ k
k
|i + 1 (mod n). Then it is easily verified that v|X|w = nk . Moreover, if P ∈ Mm is the cyclic permutation matrix such that P |i = |i − 1 (mod n) for all i then (P ⊗ In )|v = |w, showing that Xop nk . 6. Contractive maps as separability criteria We now investigate the completely bounded version of the k-minimal operator space norms and k-super minimal operator system norms that have been introduced. We will see that these completely bounded norms can be used to provide a characterization of Schmidt number analogous to its characterization in terms of k-positive maps. Given operator spaces V and W , the completely bounded (CB) norm from V to W is defined by ΦCB(V ,W ) := sup (idm ⊗ Φ)(X)M m1
m (W )
: X ∈ Mm (V ) with XMm (V ) 1 .
Clearly this reduces to the standard completely bounded norm of Φ in the case when V = Mr and W = Mn . We will now characterize this norm in the case when V = Mr and W = MIN k (Mn ). In particular, we will see that the k-minimal completely bounded norm of Φ is equal to the perhaps more familiar operator norm idk ⊗ Φ – that is, the CB norm in this case stabilizes in much the same way that the standard CB norm stabilizes (indeed, in the k = n case we get exactly the standard CB norm). This result was originally proved in [16], but we prove it here using elementary means for completeness and clarity, and also because we will subsequently need the operator system version of the result, which can be proved in the same way. Theorem 12. Let Φ : Mr → Mn be a linear map and let 1 k n. Then idk ⊗ Φ = ΦCB(Mr ,MIN k (Mn )) . Proof. To see the “” inequality, simply notice that Y Mk (MIN k (Mn )) = Y Mk (Mn ) for all Y ∈ Mk (Mn ). We thus just need to show the “” inequality, which we do in much the same manner as Smith’s original proof that the standard CB norm stabilizes. First, use Theorem 1 to write ΦCB(Mr ,MIN k (Mn )) = sup (idm ⊗ Φ)(X)S(k) : X 1 .
(11)
m1
Now fix m k and a pure state |v ∈ Cm ⊗ Cn with SR(|v) k. We begin by showing that ˜ ∈ Ck ⊗ Cn such that (V ⊗ In )|v ˜ = |v. there exists an isometry V : Ck → Cm and a state |v To this end, write |v in its Schmidt Decomposition |v = ki=1 αi |ai ⊗ |bi . Because k m, k m ˜ := we k may define an isometry V : C → C by V |i = |ai for 1 i k. If we define |v α |i ⊗ |b then (V ⊗ I )| v ˜ = |v, as desired. i i n i=1
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2421
˜ 1 and the supremum (11) (holding m fixed) is Now choose X˜ ∈ Mm (Mr ) such that X ˜ Then choose vectors |v, |w ∈ Cm ⊗ Cn with SR(|v), SR(|w) k such that attained by X. (idm ⊗ Φ)(X) ˜
v|(idm ⊗ Φ)(X)|w . ˜ = S(k)
As we saw earlier, there exist isometries V , W : Ck → Cm and unit vectors |v, ˜ |w ˜ ∈ Ck ⊗ C n such that (V ⊗ In )|v ˜ = |v and (W ⊗ In )|w ˜ = |w. Thus (idm ⊗ Φ)(X) ˜
S(k)
∗ ˜ ˜ V ⊗ In (idm ⊗ Φ)(X)(W = v| ⊗ In )|w ˜ ∗ ˜ ˜ = v|(id ⊗ Ir ) |w ˜ k ⊗ Φ) V ⊗ Ir X(W ∗ ˜ (idk ⊗ Φ) V ⊗ Ir X(W ⊗ Ir ) sup (idk ⊗ Φ)(X): X ∈ Mk (Mr ) with X 1 ,
˜ ⊗ Ir ) 1. The desired where the final inequality comes from the fact that (V ∗ ⊗ Ir )X(W inequality follows, completing the proof. 2 We will now show that the operator system versions of these norms have applications to testing separability of quantum states. To this end, notice that if we instead consider the completely bounded norm from Mr to the k-super minimal operator systems on Mn , then a statement that is analogous to Theorem 12 holds. Its proof can be trivially modified to show that if Φ : Mr → Mn and 1 k n then sup v|(idk ⊗ Φ)(X)|v: X 1, X = X ∗ = sup v|(idm ⊗ Φ)(X)|v: X 1, X = X ∗ , SR |v k .
(12)
m1
Eq. (12) can be thought of as a stabilization result for the completely bounded version of the norm described by Theorem 9. We could also have picked one of the other order norms on the k-super minimal operator systems to work with, but from now on we will be working exclusively with Hermiticity-preserving maps Φ. So by the fact that all of the operator system order norms are equal on Hermitian operators, it follows that these versions of their completely bounded norms are all equal as well. Before proceeding, we will need to define some more notation. If Φ : Mn → Mr is a linear map, then we define a Hermitian version of the induced trace norm of Φ: ∗ ΦH tr := sup Φ(X) tr : Xtr 1, X = X . Because of convexity of the trace norm, it is clear that the above norm is unchanged if instead of being restricted to Hermitian operators, the supremum is restricted to positive operators or even just projections. Now by taking the dual of the left and right norms described by Eq. (12), and using the fact that the operator norm is dual to the trace norm, we arrive at the following corollary:
2422
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
Corollary 13. Let Φ : Mn → Mr be a Hermiticity-preserving linear map and let 1 k n. Then idk ⊗ ΦH tr = sup (id m ⊗ Φ)(ρ) tr : ρ ∈ Mm ⊗ Mn with SN(ρ) k . m1
We will now characterize the Schmidt number of a state ρ in terms of maps that are contractive in the norm described by Corollary 13. Our result generalizes the separability test of [8]. We begin with a simple lemma that will get us most of the way to the linear contraction characterization of Schmidt number. The k = 1 version of this lemma appeared as [8, Lemma 1], though our proof is more straightforward. Lemma 14. Let ρ ∈ Mm ⊗ Mn be a density operator. Then SN(ρ) k if and only if (idm ⊗ Φ)(ρ) 0 for all trace-preserving k-positive maps Φ : Mn → M2n . Proof. The “only if” implication of the proof is clear, so we only need to establish that if SN(ρ) > k then there is a trace-preserving k-positive map Φ : Mn → M2n such that (idm ⊗ Φ)(ρ) 0. To this end, let Ψ : Mn → Mn be a k-positive map such that (idm ⊗ Ψ )(ρ) 0 (which we know exists by [25,22]). Without loss of generality, Ψ can be scaled so that Ψ tr n1 . Then if Ω : Mn → Mn is the completely depolarizing channel defined by Ω(ρ) = n1 In for all ρ ∈ Mn , it follows that (Ω − Ψ )(ρ) 0 for all ρ 0 and so the map Φ := Ψ ⊕ (Ω − Ψ ) : Mn → M2n is k-positive (and easily seen to be trace-preserving). Because (idm ⊗ Ψ )(ρ) 0, we have (idm ⊗ Φ)(ρ) 0 as well, completing the proof. 2 We are now in a position to prove the main result of this section. Note that in the k = 1 case of the following theorem it is not necessary to restrict attention to Hermiticity-preserving linear maps Φ (and indeed this restriction was not made in [8]), but our proof for arbitrary k does make use of Hermiticity-preservation. Theorem 15. Let ρ ∈ Mm ⊗ Mn be a density operator. Then SN(ρ) k if and only if (idm ⊗ Φ)(ρ)tr 1 for all Hermiticity-preserving linear maps Φ : Mn → M2n with idk ⊗ ΦH tr 1. Proof. To see the “only if” implication, simply use Corollary 13 with r = 2n. For the “if” implication, observe that any positive trace-preserving map Ψ is necessarily Hermiticity-preserving and has Ψ H tr 1. Letting Ψ = id k ⊗ Φ then shows that any k-positive trace-preserving map Φ has idk ⊗ ΦH tr 1. Thus the set of Hermiticity-preserving linear maps Φ with idk ⊗ ΦH 1 contains the set of k-positive trace-preserving maps, so the “if” implitr cation follows from Lemma 14. 2 Acknowledgments Thanks are extended to Marius Junge for drawing our attention to the k-minimal and kmaximal operator space structures. N.J. was supported by an NSERC Canada Graduate Scholarship and the University of Guelph Brock Scholarship. D.W.K. was supported by Ontario Early Researcher Award 048142, NSERC Discovery Grant 400160 and NSERC Discovery Accelerator Supplement 400233. R.P. was supported by NSERC Discovery Grant 400096.
N. Johnston et al. / Journal of Functional Analysis 260 (2011) 2407–2423
2423
References ˙ [1] I. Bengtsson, K. Zyczkowski, Geometry of Quantum States: An Introduction to Quantum Entanglement, Cambridge University Press, Cambridge, 2006. [2] D. Chruscinski, A. Kossakowski, On partially entanglement breaking channels, Open Syst. Inf. Dyn. 13 (2006) 17–26. [3] D. Chru´sci´nski, A. Kossakowski, Spectral conditions for positive maps, Comm. Math. Phys. 290 (2009) 1051–1064. [4] D. Chru´sci´nski, A. Kossakowski, G. Sarbicki, Spectral conditions for entanglement witnesses vs. bound entanglement, preprint, 2009, arXiv:0908.1846v1 [quant-ph]. [5] D.P. DiVincenzo, P.W. Shor, J.A. Smolin, B.M. Terhal, A.V. Thapliyal, Evidence for bound entangled states with negative partial transpose, Phys. Rev. A 61 (2000) 062312, arXiv:quant-ph/9910026v3. ˙ [6] P. Gawron, Z. Puchala, J.A. Miszczak, L. Skowronek, M.-D. Choi, K. Zyczkowski, Local numerical range: a versatile tool in the theory of quantum information, E-print: arXiv:0905.3646v1 [quant-ph]. [7] M. Horodecki, P. Horodecki, R. Horodecki, Separability of mixed states: necessary and sufficient conditions, Phys. Lett. A 223 (1996) 1–8. [8] M. Horodecki, P. Horodecki, R. Horodecki, Separability of mixed quantum states: linear contractions approach, Open Syst. Inf. Dyn. 13 (2006) 103. [9] R. Horodecki, P. Horodecki, M. Horodecki, K. Horodecki, Quantum entanglement, Rev. Modern Phys. 81 (2009) 865–942. [10] M. Horodecki, P.W. Shor, M.B. Ruskai, General entanglement breaking channels, Rev. Math. Phys. 15 (2003) 629– 641. [11] N. Johnston, Characterizing operations preserving separability measures via linear preserver problems, preprint, 2010, arXiv:1008.3633v1 [quant-ph]. [12] N. Johnston, D.W. Kribs, A family of norms with applications in quantum information theory II, preprint, 2010, arXiv:1006.0898v1 [quant-ph]. [13] N. Johnston, D.W. Kribs, A family of norms with applications in quantum information theory, J. Math. Phys. 51 (2010) 082202. [14] N. Johnston, D.W. Kribs, V. Paulsen, Computing stabilized norms for quantum operations, Quantum Inf. Comput. 9 (1–2) (2009) 16–35. [15] A.Yu. Kitaev, Quantum computations: algorithms and error correction, Russian Math. Surveys 52 (1997) 1191– 1249. [16] T. Oikhburg, E. Ricard, Operator spaces with few completely bounded maps, Math. Ann. 328 (2004) 229–259. [17] L. Pankowski, M. Piani, M. Horodecki, P. Horodecki, A few steps more towards NPT bound entanglement, IEEE Trans. Inform. Theory 56 (2010) 4085–4100. [18] V.I. Paulsen, Completely Bounded Maps and Operator Algebras, Cambridge University Press, Cambridge, 2003. [19] V. Paulsen, I. Todorov, M. Tomforde, Operator system structures on ordered spaces, Proc. Lond. Math. Soc. (2010), doi:10.1112/plms/pdq011. [20] V. Paulsen, M. Tomforde, Vector spaces with an order unit , Indiana Univ. Math. J. 58 (3) (2009) 1319–1359. [21] G. Pisier, Introduction to Operator Space Theory, Cambridge University Press, Cambridge, 2003. [22] K.S. Ranade, M. Ali, The Jamiołkowski isomorphism and a simplified proof for the correspondence between vectors having Schmidt number k and k-positive maps, Open Syst. Inf. Dyn. 14 (2007) 371–378. ˙ [23] Ł. Skowronek, E. Størmer, K. Zyczkowski, Cones of positive maps and their duality relations, J. Math. Phys. 50 (2009) 062106. [24] R.R. Smith, Completely bounded maps between C∗ -algebras, J. London Math. Soc. 27 (1983) 157–166. [25] B.M. Terhal, P. Horodecki, Schmidt number for density matrices, Phys. Rev. A 61 (2000) 040301R. [26] B. Xhabli, Universal operator system structures on ordered spaces and their applications, PhD thesis, 2009.
Journal of Functional Analysis 260 (2011) 2424–2450 www.elsevier.com/locate/jfa
Sharp energy estimates for nonlinearly locally damped PDEs via observability for the associated undamped system Fatiha Alabau-Boussouira a,∗,1 , Kaïs Ammari b a Université Paul Verlaine-Metz Metz. LMAM UMR 7122, 57045 Metz Cedex 1, France b Département de Mathématiques, Faculté des Sciences de Monastir, 5019 Monastir, Tunisia
Received 5 September 2010; accepted 4 January 2011 Available online 15 January 2011 Communicated by J. Coron
Abstract We consider the problem of sharp energy decay rates for nonlinearly damped abstract infinitedimensional systems. Direct methods for nonlinear stabilization generally rely on multiplier techniques, and thus are valid under restrictive geometric conditions compared to the optimal geometric optics condition of Bardos et al. (1992) [10]. We prove sharp, simple and quasi-optimal energy decay rates through an indirect method, namely an observability estimate for the corresponding undamped system. One of the main advantage of these results is that they allow to combine optimal geometric conditions, as for instance that of Bardos et al. (1992) [10] and the optimal-weight convexity method of the first author (AlabauBoussouira, 2010 [6], Alabau-Boussouira, 2005 [2]) to deduce very simple and quasi-optimal energy decay rates for nonlinearly locally damped systems. We also show that using arguments based on Russell’s principle (Russell, 1978 [24]), one can deduce sharp energy decay rates from the exponential stabilization of the linearly damped system. Our results extend to nonlinearly damped systems, those of Haraux (1989) [14] and Ammari and Tucsnak (2001) [9] which concern linearly damped systems. © 2011 Elsevier Inc. All rights reserved. Keywords: Nonlinear stabilization; Dissipative systems; Observability; Energy decay rates; Wave equation; Hyperbolic equation
* Corresponding author.
E-mail addresses: [email protected] (F. Alabau-Boussouira), [email protected] (K. Ammari). 1 Present position Délégation CNRS at MAPMO, UMR 6628.
0022-1236/$ – see front matter © 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2011.01.003
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2425
1. Introduction and main results In this paper we characterize the stabilization for some nonlinear infinite-dimensional systems. These results have been partially announced in [7]. We show that if the linear system is observable through a locally distributed observation, then any dissipative nonlinear feedback locally distributed stabilize the system and we give a general easily computable energy decay formula. We show by this way that for the locally distributed case, one can combine the optimal geometric optics conditions of Bardos, Lebeau and Rauch [10] (see also [11,12]) and the optimalweight convexity method by the first author [1,2,6] (see also [3,4]) based on nonlinear Gronwall inequalities with optimal weight to deduce sharp easily computable energy decay rates for nonlinear damped systems. Using recent results of the first author [6], a very simple, upper estimate is given for feedbacks with general growth close to the origin (not close to a linear behavior) and linear at infinity. Optimality of these estimates has been proved in the finite-dimensional case in [6] and in certain infinite-dimensional situations [2] using optimality results by Vancostenoble and Martinez [26] (see also [25]). Our results extend to nonlinear feedbacks, previous results by Haraux [14] and Ammari and Tucsnak [9,8] valid for linear feedbacks. A result using this indirect approach has been obtained for boundary and localized dampings for wave-type equations by Daoulatli, Lasiecka and Toundykov in [13], using the ODE approach of [16] for nonlinear boundary and localized stabilization. Theorem 2.2 of [13] can be compared to our main result Theorem 1.1. Let us denote by w the solution of the nonlinearly damped system, by z the solution of the linearly damped system and by φ the solution of the conservative system. The proof of Theorem 2.2 [13] relies on an observability estimate for the corresponding linearly damped system solved by z, estimates of the mixed products of the form a(x)zt wt , a(x)zt ρ(., wt ) Ω
Ω
and the ODE-convexity approach of [16] (see also [20,28]) which consists in estimating the energy decay rate of the nonlinear stabilization system by the solution S of a nonlinear separable ODE of the form S (t) + q S(t) = 0, S(0) = Ew (0) where q = I − (I + h−1 ◦ (K.I ))−1 . Here I stands for the identity map on R, K depends on the minimal time T (above which the observability inequality holds), on the observability constant and on the damping region. Moreover h is a strictly increasing concave function on [0, ∞), such that h(0) = 0 and related to the damping ρ (assumed to depend only on the second variable) as follows h ρ(s)s s 2 + ρ 2 (s), ∀|s| 1. The above nonlinear ODE can be replaced by a simplified one under further hypotheses. Our approach here relies rather on an observability inequality for the conservative system, on two comparison properties – namely a comparison property (see later in Lemma 2.3) between the localized observation for the conservative system and the time integral of the localized kinetic energy of the solution of the linearly damped system, and a comparison property (see
2426
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
later in Lemma 2.2) between this last quantity and the time integral of the localized linear and nonlinear kinetic energies of the nonlinearly damped system – and on the optimal-weight convexity method [2,6] we above mentioned. It consists in determining an optimal-weight thanks to convexity properties of the function H introduced later in (1.9) and to prove a nonlinear Gronwall type inequality relative to this weight. The optimal-weight convexity method generalizes the power-like integral method (see [15] and references therein). Optimality of the sharp upper estimate given in Theorem 1.1 is proved in [6] in the finite-dimensional case for dampings which are not close to a linear behavior close to the origin (see later in Theorem 1.1 the condition lim supx→0+ ΛH (x) < 1). Moreover, we show in [6] that the upper estimate given in Theorem 1.1, can be estimated from above by the energy of an associated ODE of first order which involves only the function g of Assumption (A1), this holding in the finite as well as in the infinite-dimensional case. It should be noted that the dampings considered in [13] have more general growth behaviors at infinity (they can be sublinear or superlinear at infinity) than in the present paper. Both the ODE-convexity method [16] and the optimal-weight convexity method [2,6] provide sharp energy decay rates, but use somehow different ways to measure the decay of the energy of solutions. Our purpose here is indeed to provide a self-contained, easy and explicit approach based on a general methodology initiated in [2,6], pursued through lower energy estimates and further comparison properties in [5] and to combine it with and stress the importance of quasi-optimal geometric conditions on the observation region derived thanks to micro-local analysis [10]. Our study in [2,6] is valid only under the less general multiplier geometric conditions. On the other hand, the upper estimates derived thanks to this approach are obtained through a very simple formula in the case of dampings which are not close to a linear behavior at the origin. Therefore, it is important to show that it is possible to combine this approach for capturing optimal and quasi-optimal energy decay rates and the geometric optics approach of [10] which allows optimal and quasi-optimal geometric conditions on the support of the damping region. In this, we extend the results of [14,9] and give a different but related method compared to [13] and a different expression for sharp upper energy decay rates of the solutions of nonlinearly locally damped PDEs. We also give an explicit dependence of the parameters which are involved in our estimate with respect to the observability constant, the initial energy and the minimal time for observability. This is also important for numerical purposes. We present now the general set-up for our results. We consider the following second order differential equation w(t) ¨ + Aw(t) + a(.)ρ(., w) ˙ = 0, t ∈ (0, ∞), x ∈ Ω, (1.1) 0 w(0) ˙ = w1 , w(0) = w , where Ω is a bounded open set in RN , with a boundary Γ . We assume that Ω is either convex or of class C 1,1 . We set H = L2 (Ω), with its usual scalar product denoted by ·,· H and the associated norm · H and where A : D(A) ⊂ H → H is a densely defined self-adjoint linear operator satisfying Au, u H Cu2H ,
∀u ∈ D(A)
(1.2)
for some C > 0. We also introduce the scale of Hilbert spaces Hα , as follows: for every α 0, Hα = D(Aα ), with the norm zα = Aα zH . The space H−α , is defined by duality with respect to the pivot space H as follows: H−α = Hα∗ , for α > 0. The operator A can be extended (or
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2427
restricted) to each Hα , such that it becomes a bounded operator A : Hα → Hα−1 ,
∀α ∈ R.
(1.3)
Eq. (1.1) is understood as an equation in H−1/2 , i.e., all the terms are in H−1/2 . The energy of a solution is defined by Ew (t) =
2 1 w(t), w(t) ˙ . H ×H 1/2 2
(1.4)
Most of the coupled linear equations modelling the damped vibrations of elastic structures can be written in the form (1.1), where w stands for the displacement field and the term B w(t) ˙ = a(.)ρ(., w), ˙ represents a viscous feedback damping. The system (1.1) is well-posed. More precisely, the following holds: Suppose that (w 0 , w 1 ) ∈ H1/2 × H . Then the problem (1.1) admits a unique solution w ∈ C [0, ∞); H1/2 ∩ C 1 [0, ∞); H . Moreover w satisfies, for all t 0, the energy identity 0 1 2 w ,w H
1/2 ×H
2 ˙ − w(t), w(t)
H1/2 ×H
t =2
a(.)ρ ., w(s) ˙ w(s) ˙ dx ds.
(1.5)
0 Ω
The aim of this paper is to deduce sharp simple computable energy decay rates for the damped system (1.1) from observability estimates for the associated undamped system, that is
¨ + Aφ(t) = 0, φ(t) ˙ φ(0) = φ 0 , φ(0) = φ1.
(1.6)
Before stating our main results, let us specify some hypotheses on the feedback and give some preliminary definitions. We make the following assumptions on the feedback ρ and on a: Assumption (A1). ρ ∈ C(Ω × R; R) is a continuous monotone nondecreasing function with respect to the second variable on Ω such that ρ(., 0) = 0 on Ω and there exists a continuous strictly increasing odd function g ∈ C([−1, 1]; R), continuously differentiable in a neighbourhood of 0 and satisfying g(0) = g (0) = 0, with
c1 g |v| ρ(., v) c2 g −1 |v| , c1 |v| ρ(., v) c2 |v|,
|v| 1, a.e. on Ω, |v| 1, a.e. on Ω,
(1.7)
where ci > 0 for i = 1, 2. Moreover a ∈ C(Ω), with a 0 on Ω and ∃a− > 0 such that a a− on ω.
(1.8)
2428
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Here ω stands for the subregion of Ω on which the feedback ρ is active and U = L2 (ω). We define a function H (see [2]) by H (x) =
√ √ xg( x ),
x ∈ 0, r02 .
(1.9)
Thanks to Assumption (A1), H is of class C 1 and is strictly convex on [0, r02 ], where r0 > 0 is the extension of H to R where H (x) = +∞ for a sufficiently small number. We denote by H x ∈ R\[0, r02 ]. We also define a function L by L(y) =
(y) H y ,
if y ∈ (0, +∞), if y = 0,
0,
(1.10)
stands for the convex conjugate function of H , i.e.: H (y) = supx∈R {xy − H (x)}. where H We prove in [2] that L is strictly increasing continuous and onto from [0, +∞) on [0, r02 ). We define a function ΛH on (0, r02 ] by H (x) . xH (x)
ΛH (x) =
(1.11)
We also define 1 + ψr (x) = H (r02 )
H (r02 )
1/x
v 2 (1 − Λ
1 dv, −1 H ((H ) (v)))
x
1 H (r02 )
.
(1.12)
Let us state our main results: Theorem 1.1. Assume that ρ and a satisfy Assumption (A1) and that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Assume that lim
x→0+
H (x) =0 ΛH (x)
(1.13)
where ΛH is defined by (1.11). Moreover assume that there exists T > 0 such that the following observability inequality is satisfied for the linear conservative system (1.6) T cT Eφ (0)
√ 2 ˙ H dt, | a φ|
∀(φ0 , φ1 ) ∈ H1/2 × H
(1.14)
0
with a certain cT > 0. Then, the energy of the solution of (1.1) satisfies Ew (t) βT L
1 ψr−1 ( t−T T0 )
,
for t sufficiently large.
(1.15)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2429
If further, lim supx→0+ ΛH (x) < 1 then we have the simplified decay rate −1 Ew (t) βT H
DT0 , t −T
(1.16)
for t sufficiently large. Here D is a positive constant which is independent of Ew (0) and T , whereas T0 depends on T and is defined by (3.10), β is a positive constant chosen so that
Ew (0) 2αT Ew (0) , , β > max , CT L(H (r02 )) δ
(1.17)
where the constants CT > 0, α and δ > 0 are respectively defined by (2.25), (2.26) and (2.34). Remark 1.2. If 0 < lim inf ΛH (x) x→0+
(1.18)
holds, then since limx→0+ H (x) = 0, (1.13) holds. Moreover, under the above hypotheses, we have L
1
ψr−1 ( t−T T0 )
→ 0 as t → ∞.
We refer to [6,5] for lower energy estimates for the nonlinearly damped wave equation with locally distributed or boundary dampings. For several examples of PDEs, exponential decay for the linear damped case, has been proved under geometric conditions. We now give an important result showing that sharp energy decay rates for the case of arbitrary nonlinear damping is a consequence of exponential stabilization for the case of linear damping. This corollary is deduced from Theorem 1.1 and from Russell’s principle [24] as generalized by K. Liu [18]. Let us formulate this result. For this, we consider the case of the linearly damped system:
z¨ (t) + Az(t) + a(.)˙z = 0, z(0) = z , 0
t ∈ (0, ∞), x ∈ Ω,
z˙ (0) = w . 1
(1.19)
We define the energy of a solution z of (1.19) by Ez as in (1.4) replacing w by z and for initial date (z0 , z1 ) ∈ H1/2 × H . Corollary 1.3. Assume that ρ and a satisfy Assumption (A1) and that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Assume also that (1.13) holds. We moreover assume that the system (1.19) is exponentially stable, that is there exist μ > 0 and C > 0 such that Ez (t) CEz (0)e−μt ,
∀(z0 , z1 ) ∈ H1/2 × H.
(1.20)
2430
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Then there exists T > 0 such that the energy of the solution of (1.1) satisfies (1.15). If further lim supx→0+ ΛH (x) < 1, then Ew satisfies the simplified decay rate (1.16). The proof of Theorem 1.1 relies on the next theorem. This second result is interesting in itself since it allows to compare in full generality, discrete energy inequalities (valid for sequences of time converging to infinity) to continuous ones. For this, we consider the following assumption. Assumption (A2). H is a continuously differentiable strictly convex function on [0, r02 ] with H (0) = H (0) = 0. The function M defined by M(x) = xL−1 (x),
x ∈ 0, r02
(1.21)
is such that limx→0+ M (x) = 0, where L is defined by (1.10). Remark 1.4. Thanks to Assumption (A2), for all positive constant κ, there exists δ ∈ (0, r02 ] such that the function x → x − κM(x) is strictly increasing on [0, δ]. Theorem 1.5. Assume that Assumption (A2) holds and let T > 0 and ρT > 0 be given. Let δ > 0 be such that the function defined by x → x − ρT M(x) is strictly increasing on [0, δ]. Assume is a nonnegative, nonincreasing function defined on [0, ∞) with E(0) < δ and satisfying that E (k + 1)T E(kT E ) 1 − ρT L−1 E(kT ) ,
∀k ∈ N.
(1.22)
for t sufficiently large.
(1.23)
satisfies the upper estimate Then E TL E(t)
1 ψr−1 ( (t−TT )ρT )
,
If moreover lim supx→0+ ΛH (x) < 1, then we have the simplified decay rate T H −1 E(t)
DT , ρT (t − T )
(1.24)
and of T . for t sufficiently large and where D is a positive constant independent of E(0) The paper is organized as follows. In the second section, we establish preliminary technical results. In Section 3, we give the proof of our three main results, that is Theorem 1.1, Corollary 1.3 and Theorem 1.5. We give examples of applications of our results to various examples of feedbacks growth and to examples of PDEs, namely the wave and Bernoulli–Euler plate equations.
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2431
2. Preliminary intermediate results In all this section the initial data (w(0), w(0)) ˙ will be kept fixed. We extend H by +∞ on R\[0, r02 ] and still denote this extension by H . We define the convex conjugate of H and denote it by H . Moreover we define a weight function f such that sf (s) , H f (s) = β where β > max( αT CT ,
Ew (0) , Ewδ(0) ) L(H (r02 ))
s ∈ 0, βr02 ,
(2.1)
where the constants CT > 0, α and δ > 0 are respectively
defined by (2.25), (2.26) and (2.34). We recall that f is defined by f (s) = L
−1
s , β
∀s ∈ 0, βr02 ,
where L is the continuous strictly increasing function defined from [0, +∞) onto [0, r02 ) by (1.10). One can show [2] that f is a strictly increasing function from [0, βr02 ) onto [0, ∞). We start by a key lemma which relies on the optimal-weight convexity method of [2]. Lemma 2.1. Assume that ρ and a satisfy Assumption (A1) and that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Let (w 0 , w 1 ) ∈ H1/2 ×H be given and (φ 0 , φ 1 ) = (w 0 , w 1 ) and w and φ be the respective solutions of (1.1) and of (1.6). Then the following inequality holds T
f Eφ (0)
2 ˙ dx dt a(x)|w| ˙ 2 + a(x)ρ(x, w)
Ω
0
c5 T H f Eφ (0) + c6 f Eφ (0) + 1
T a(x)ρ(x, w) ˙ w˙ dx dt,
(2.2)
0 Ω
where c5 = |Ω| 1 + c22 , and |Ω| =
Ω
c6 =
1 + c2 , c1
dσ , with dσ = a(.) dx.
Proof. Define ε0 = g(r0 ) < 1. We can easily check that there exist c1 > 0 and c2 > 0 such that c1 g |v| ρ(x, v) c2 g −1 |v| ,
x ∈ Ω, |v| ε0 ,
(2.3)
and c1 |v| ρ(x, v) c2 |v|,
x ∈ Ω, |v| ε0 .
(2.4)
2432
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Define now r12 = H −1 ( cc12 H (r02 )) and ε1 = min(r0 , g(r1 )). We can assume, without loss of generality that c1 < c2 , so that ε1 ε0 holds. Moreover, one can easily prove that there exist constants, that we still denote by c1 > 0 and c2 > 0 such that c1 |v| ρ(x, v) c2 |v|,
x ∈ Ω, |v| ε1
(2.5)
and c1 g |v| ρ(x, v) c2 g −1 |v| ,
x ∈ Ω, |v| ε1 .
(2.6)
T Step 1. Estimate of 0 f (Eφ (0)) Ω a(x)|ρ(x, w)| ˙ 2 dx dt. t ˙ x)| ε0 }. We also set We set for all fixed t 0, Ω1 = {x ∈ Ω, |w(t, cg =
1 . c2
(2.7)
Thus, by definition of cg and thanks to (2.3), we have 2 ˙ x) r02 , cg2 ρ x, w(t, We set dσ = a(x) dx and |Ω1t | = σ (Ω1t ) = 1 |Ω1t |
Ω1t
∀x ∈ Ω1t .
dσ . Since
2
˙ x) dσ ∈ 0, r02 , cg2 ρ x, w(t,
Ω1t
which is the domain of convexity of H , and thanks to Jensen’s inequality, we have H
1 |Ω1t |
2 ˙ x) dσ cg2 ρ x, w(t,
Ω1t
1 |Ω1t | 1 |Ω1t |
2 ˙ x) dσ H cg2 ρ x, w(t,
Ω1t
˙ x) g cg ρ x, w(t, ˙ x) a(x) dx. cg ρ x, w(t,
(2.8)
Ω1t
But thanks to (2.3), and since g is increasing, we have on Ω1t : w(t) ˙ ˙ g cg ρ x, w(t)
on Ω1t .
Using this last inequality in (2.8), we deduce that H
1 |Ω1t |
Ω1t
2 1 ˙ x) a(x) dx cg2 ρ x, w(t, cg w(t)(x)ρ ˙ x, w(t, ˙ x) a(x) dx. t |Ω1 | Ω1t
(2.9)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2433
On the other hand, thanks to (2.3), we obtain 1 |Ω1t |
Ω1t
1 cg w(t, ˙ x)ρ x, w(t, ˙ x) dσ |Ω1t |
ε0 g −1 (ε0 )a(x) dx = H r02 .
(2.10)
Ω1t
Hence, we have H −1
1 |Ω1t |
cg w(t, ˙ x)ρ x, w(t, ˙ x) a(x) dx ∈ 0, r02 .
Ω1t
Thanks (2.8) and to Young’s inequality, we have T
f Eφ (t)
2 ˙ x) dx dt a(x)ρ x, w(t,
Ω1t
0
T 0
T 0
−1 cg |Ω1t | f Eφ (t) H a(x)w(t, ˙ x)ρ x, w(t, ˙ x) a(x) dx dt |Ω1t | cg2 Ω1t
1 |Ω1t | H f Eφ (t) + 2 cg cg
T
w(t, ˙ x)ρ x, w(t, ˙ x) a(x) dx dt.
0 Ω1t
On the complementary set of Ω1t in Ω, since ρ has a linear growth, and since ˙ 2 2Eφ (t) = (φ(t), φ(t) H
1/2 ×H
= 2Eφ (0),
∀t 0,
we have T 0
f Eφ (t)
2 ˙ x) dx dt a(x)ρ x, w(t,
Ω\Ω1t
f (Eφ (0)) cg
T
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx dt.
0 Ω\Ω1t
Hence, thanks to the above two inequalities, we have
(2.11)
2434
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
T
f Eφ (t)
2 ˙ x) dx dt a(x)ρ x, w(t,
Ω
0
f (Eφ (0)) + 1 |Ω| 2 T H f Eφ (0) + cg cg
T
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx dt.
(2.12)
0 Ω
T ˙ 2 dx dt. Step 2. Estimate of 0 f (Eφ (0)) Ω a(x)|w| t ˙ x)| ε1 } Thus, we have We set Ω2 = {x ∈ Ω, |w(t, 1 w(t, ˙ x)g w(t, ˙ x) w(t, ˙ x)ρ x, w(t, ˙ x) , c1
∀x ∈ Ω2t ,
and 1 |Ω2t |
2
w(t, ˙ x)) dσ ∈ 0, r02 ,
Ω2t
which is the domain of convexity of H . Therefore thanks to Jensen’s inequality and since H is nondecreasing, we have
2 w(t, ˙ x) dσ Ω2t H −1
Ω2t
Ω2t H −1
1 |Ω2t |
2 ˙ x) dσ H w(t,
Ω2t
1 |Ω2t |c1
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx .
Ω2t
Thanks (2.13) and to Young’s inequality, we have T
f Eφ (t)
2 ˙ x) dx dt a(x)w(t,
Ω2t
0
T
t Ω f Eφ (t) H −1 2
0
T 0
1 |Ω2t |c1
t Ω H f Eφ (t) + 1 2 c1
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx dt
Ω2t
T
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx dt.
0 Ω2t
On the complementary set of Ω2t in Ω, since ρ has a linear growth, and since 2 ˙ 2Eφ (t) = φ(t), φ(t) H
1/2 ×H
= 2Eφ (0),
∀t 0,
(2.13)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2435
we have T
f Eφ (t)
2 ˙ x) dx dt a(x)w(t,
Ω\Ω2t
0
f (Eφ (0)) c1
T
a(x)w(t, ˙ x)ρ x, w(t, ˙ x) dx dt.
0 Ω\Ω2t
Hence, thanks to the above two inequalities, we have f Eφ (0)
T a(x)|w| ˙ 2 dx dt 0 Ω
f (Eφ (0)) + 1 |Ω|T H f Eφ (0) + c1
T
a(x)wρ ˙ x, w(t, ˙ x) dx dt.
(2.14)
0 Ω
Now thanks to the definition of the weight function f in (2.1), we have f Eφ (0)
T |w| ˙ 2 dx dt
(2.15)
0 ω
|ω|αT Eφ (0)f Eφ (0) f (Eφ (0)) + 1 + c1 a−
T
w(t, ˙ x)ρ x, w(t, ˙ x) dx dt.
(2.16)
0 Ω
Inequalities (2.12) and (2.14) lead to the desired result.
2
The next lemma compares the localized kinetic damping of the linearly damped equation with the localized linear and nonlinear kinetic energies of the nonlinearly damped equation. Lemma 2.2. Assume that ρ ∈ C(Ω × R; R) is a continuous monotone nondecreasing function with respect to the second variable on Ω such that ρ(., 0) = 0 on Ω. Let w be the solution of (1.1) with initial data (w 0 , w 1 ) ∈ H1/2 × H . Let us introduce z solution of the linear locally damped problem
z¨ + Az + a(x)˙z = 0, z(0) = w 0 , z˙ (0) = w 1 .
2436
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Then the following inequality holds T
T a(x)|˙z| dx dt 2 2
0 Ω
2 a(x)|w| ˙ 2 + a(x)ρ x, w˙ dx dt.
(2.17)
0 Ω
Proof. Set ψ = w − z. Then ψ is solution of ψ¨ + Aψ + a(x)ρ(., w) ˙ − a(x)˙z = 0, ψ(0) = 0,
˙ ψ(0) = 0.
(2.18)
Therefore, we have T
(ψ¨ + Aψ)ψ˙ +
0 Ω
T
a(x)ρ(., w) ˙ − a(x)˙z ψ˙ dx dt = 0.
0 Ω
Thus, we have T Eψ (T ) +
T a|˙z| dx dt = 2
0 Ω
−a(x)ρ(., w) ˙ w˙ + a z˙ w˙ + a(x)˙z ρ(., w) ˙ dx dt.
0 Ω
Since ρ(., v) is monotone increasing with respect to v and vanishes at v = 0, we deduce from the above equality that T
T a|˙z| dx dt 2
0 Ω
a z˙ w˙ + a(x)˙zρ(., w) ˙ dx dt
0 Ω
T η
a|˙z|2 dx dt +
2 1 ˙ dx dt, a|w| ˙ 2 + a(x)ρ(., w) 2η
∀δ > 0.
0 Ω
We choose η = 12 . Thus T
T a|˙z| dx dt 2 2
0 Ω
2 ˙ dx dt. a|w| ˙ 2 + a(x)ρ(., w)
2
0 Ω
The next lemma compares the localized observation for the conservative undamped equation with the localized damping of the linearly damped equation. Lemma 2.3. Assume that a ∈ C(Ω), with a 0 on Ω. Let T > 0 be given, then there exists kT > 0 such that for all (w 0 , w 1 ) ∈ H1/2 × H
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
T
˙ 2 dx dt kT a|φ|
0 Ω
2437
T a|˙z|2 dx dt
(2.19)
0 Ω
where φ is the solution of the conservative equation (1.6) with (φ 0 , φ 1 ) = (w 0 , w 1 ) and z is the solution of (2.17). Proof. We set θ = φ − z. Then θ satisfies
θ¨ + Aθ = a(x)˙z, θ (0) = 0, θ˙ (0) = 0.
Let t 0 be given. Then we have t Eθ (t) =
a z˙ θ˙ dx ds.
0 Ω
We integrate both sides with respect to t on [0, T ]. This gives T
T Eθ (t) dt =
(T − t)a z˙ θ˙ dx dt.
0 Ω
0
Thus, bounding appropriately the right-hand side of the above relation we obtain T
|θ˙ | dx dt 4T aL∞ (Ω) 2
T a|˙z|2 dx dt.
2
0 Ω
(2.20)
0 Ω
Since φ = θ + z and thanks to (2.20), we obtain (2.19) with kT = 8T 2 a2L∞ (Ω) + 2.
2
Theorem 2.4. We assume the hypotheses of Lemma 2.1 and denote by w and φ the respective w = Ew . Then, the solutions of (1.1) and (1.6) where (w 0 , w 1 ) = (φ 0 , φ 1 ) ∈ H1/2 × H . We set E β following inequality holds w (T ) E w (0) w (0) 1 − ρT L−1 E E
(2.21)
where ρT =
cT . 4kT (c6 H (r02 ) + 1)
(2.22)
2438
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Proof. Thanks to our assumptions and to (2.19), we know that there exist cT > 0 and kT > 0 such that T cT Eφ (0)
˙ dx dt kT a|φ|
T a|˙z|2 dx dt.
2
0 Ω
(2.23)
0 Ω
Thanks to the choice of β, we have f Eφ (0) H r02 . This together with (2.17), (2.2) and the definition of the weight function f lead to αT CT Eφ (0)f Eφ (0) Eφ (0)f Eφ (0) + β
T a(x)ρ(x, w) ˙ w˙ dx dt,
(2.24)
0 Ω
where CT =
cT , 2kT (c6 H (r02 ) + 1)
(2.25)
and α=
c5 . (c6 H (r02 ) + 1)
(2.26)
Now the dissipation relation for w gives T a(x)ρ(x, w) ˙ w˙ dx dt = Ew (0) − Ew (T ). 0 Ω
Since Eφ (0) = Ew (0), we obtain
αT f Ew (0) . Ew (T ) Ew (0) 1 − CT − β Thanks to our choice of β in (1.17), we have CT − αT β >
CT 2
(2.27)
= ρT > 0. Thus, we have (2.21).
2
Corollary 2.5. Assume the hypotheses of Lemma 2.1. We set w (kT ), Ek = E
∀k ∈ N.
(2.28)
We define M as in (1.21). Then the following inequalities hold Ek+1 − Ek + ρT M(Ek ) 0,
∀k ∈ N,
(2.29)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2439
with w (0). E0 = E
(2.30)
Proof. Due to the invariance by translation of (1.1) and (1.6), so that working on the interval [kT , (k + 1)T ] and making the time translation t − kT , we deduce that w (k + 1)T E w (kT ) 1 − CT L−1 E w (kT ) , E
∀k ∈ N.
(2.31)
2
We then easily deduce (2.29).
Proposition 2.6. Assume the hypotheses of Theorem 1.1 and define ψ by ψ(x) = x − ρT M(x),
x ∈ 0, r02
(2.32)
where ρT is defined by (2.22). Then, there exists δ > 0 such that ψ is strictly increasing on [0, δ]. Proof. Thanks to the definition of L and M, we have x(H )2 (x) H (x) = , M L ◦ H (x) = H (x) ΛH (x)
x ∈ 0, r02 .
Since L and H are vanishing at 0 and are invertible in a neighbourhood of 0 and thanks to (1.13), we deduce that lim M (y) = 0.
y→0+
(2.33)
Hence, there exists δ > 0 such that M (y) < Thus ψ is strictly increasing on [0, δ].
1 , ρT
∀y ∈ [0, δ].
(2.34)
2
Proposition 2.7. We assume that (A1) holds. Then lim inf x→0+
H (x) =0 ΛH (x)
(2.35)
where ΛH is defined by (1.11). Proof. We remark that (A1) implies that H (0) = 0. Moreover H and ΛH are nonnegative in a right neighbourhood of 0, so that lim infx→0+ ΛHH(x) (x) = γ exists and is nonnegative. Assume to the contrary that γ > 0. Then, there exist η0 > 0 and δ1 > 0 such that η0
H (x) , ΛH (x)
∀x ∈ (0, δ1 ).
2440
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Hence, we have √ η0 H (s) , √ √ 2 s 2 H (s)
∀s ∈ (0, δ1 ).
Since H (0) = 0, this implies that H (0) > 0 which contradicts Assumption (A1). Hence (2.35) holds. 2 Remark 2.8. Hence the only situation where (1.13) can be violated occurs if lim inf ΛH (x) = 0 x→0+
and limx→0+
H (x) ΛH (x)
does not exist.
3. Comparison with an Euler scheme and proof of Theorem 1.1, Corollary 1.3 and Theorem 1.5 We start by a first comparison result between the energy evaluated at time kT and a sequence yk which is a numerical approximation obtained by a standard Euler scheme applied to an appropriate ordinary differential equation as will be seen later on. Lemma 3.1. Assume the hypotheses of Theorem 1.5. We set ), Ek = E(kT
∀k ∈ N.
(3.1)
We consider the sequence ( yk )k defined by induction as follows
y k + ρT M( yk ) = 0, k+1 − y y0 = E0 .
k ∈ N,
(3.2)
Then the following inequality holds Ek yk ,
(3.3)
for all k ∈ N. Proof. Thanks to the hypotheses of Theorem 1.5, we know that (2.29) holds. On the other hand, the sequence ( yk )k satisfies (3.2). Hence, we have yk ), Ek+1 − y k+1 ψ(Ek ) − ψ(
∀k ∈ N
(3.4)
where ψ is defined by (2.32). We prove (3.3) par induction on k. Since E0 y0 , (3.3) holds for is nonincreasing and k = 0. Assume that (3.3) holds at the order k. First, we remark that since E thanks to our assumption E0 < δ, we have Ek < δ,
∀k ∈ N.
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2441
Moreover, it is easy to check that the sequence ( yk )k is nonincreasing, so that yk y0 = E0 < δ,
∀k ∈ N.
Thanks to our choice of δ, and since we make the assumption that Ek yk , we deduce from Proposition 2.6 that ψ(Ek ) − ψ( yk ) 0. Using this last estimate in (3.4), we deduce that (3.3) holds at the order k + 1.
2
We now compare the sequence ( yk ) obtained using an Euler scheme to the solution of the associated ordinary differential equation at time kT . Lemma 3.2. Assume the hypotheses of Theorem 1.5. We define Ek as in (3.1). We consider the ordinary differential equation
ρT M y(s) = 0, T y(0) = E0 y (s) +
s 0,
(3.5)
and set sk = kT ,
yk = y(sk ),
∀k ∈ N.
(3.6)
Then we have for all k in N yk yk ,
(3.7)
where ( yk )k is defined by (3.2). Remark 3.3. As mentioned before, the sequence ( yk )k is a numerical approximation of the sequence (y(sk ))k thanks to the Euler scheme applied to (3.5). Proof of Lemma 3.2. We integrate (3.5) between sk and sk+1 and compare with the equation satisfied by yk . Thus we have ρT yk+1 − y k ) + k+1 − (yk − y T
sk+1 M y(s) − M( yk ) ds = 0,
∀k ∈ N.
(3.8)
sk
We prove (3.7) by induction on k. The property clearly holds for k = 0. Assume that it holds at the order k. Since y is nonincreasing, we deduce that yk = y(sk ) y0 = E0 < δ. Thus y(s) yk < δ,
∀s ∈ [sk , sk+1 ].
2442
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Since M is nondecreasing, we deduce from (3.8) that yk ) yk+1 − y ψ(yk ) − ψ( k+1 . Since we assume that (3.7) holds at the order k and since ψ is nondecreasing on [0, δ], we deduce yk ) . 0 ψ(yk ) − ψ( Using this last inequality in the above one, we prove (3.7) at the order k + 1.
2
We deduce from Lemma 3.1 and Lemma 3.2 the following result. Corollary 3.4. Assume the hypotheses of Theorem 1.5. Then we have Ek y(sk ),
∀k ∈ N.
(3.9)
We can now give the proof of Theorem 1.5 and Theorem 1.1. Proof of Theorem 1.5. We set T0 =
T , ρT
r = E(0).
(3.10)
We also define r Kr (τ ) =
1 dv. M(v)
(3.11)
τ
Thus the solution y of (3.5) is characterized as y(t) = Kr−1
t , T0
t 0.
(3.12)
On the other hand, we define Ek by (3.1). Then, thanks to (1.22), Ek satisfies (2.29) for all k ∈ N. Let l ∈ N be an arbitrary fixed integer. We have in particular Ek+1+i − Ek+i + ρT M(Ek+i ) 0,
for i = 0, . . . , i = l.
Summing these inequalities from i = 0 to i = l, and using the fact that (Ek )k is a nonincreasing sequence whereas M is a nondecreasing function, we obtain Ek+l+1 − Ek +
1 (l + 1)T M(Ek+l ) 0 T0
so that (l + 1)T M(Ek+l ) T0 Ek ,
∀k, l ∈ N.
(3.13)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2443
In particular, we have for any arbitrary p ∈ N M(Ep )
T0 T
Ep−l . l+1
inf
l∈{0,...,p}
(3.14)
Now thanks to Corollary 3.4 and to (3.12), we have Ei yi = Kr−1
iT , T0
∀i ∈ N.
Using this last relation in (3.14), we deduce that M(Ep )
T0 T
inf
Kr−1 ( (p−l)T T0 )
l+1
l∈{0,...,p}
(3.15)
.
Let now t T be given and p ∈ N be the unique integer so that t ∈ [pT , (p + 1)T ). Let θ ∈ (0, t − T ] be arbitrary and l ∈ N be the unique integer so that θ ∈ [lT , (l + 1)T ). Then, thanks to (3.15) and by construction, we have
T0 M E(t) M(Ep ) T
inf
Kr−1 ( (p−l)T T0 ) l+1
l∈{0,...,p}
,
and Kr−1
(p − l)T T0
Kr−1
t −θ −T . T0
We deduce that
T −1 t − T − θ M E(t) Kr , θ T0
∀θ ∈ (0, t − T ].
Since M is strictly increasing, we deduce that T M −1 E(t)
inf
θ∈(0,(t−T )]
1 −1 (t − T − θ ) . K θ r T0
Using now the proof of Theorem 2.1 of [2], we deduce that TL E(t)
1 ψr−1 ( t−T T0 )
,
∀t T .
So that (1.23) is proved. If we further assume that lim supx→0+ ΛH (x) < 1, then using Theorem 2.3 of [6] we obtain (1.24). 2 We can now give the proof of our two main results. We start by
2444
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Proof of Theorem 1.1. Since (1.13) holds, we have that limx→0+ M (x) = 0. This, together with = Ew /β. Then the assumptions of Theorem 1.1 imply that Assumption (A2) holds. We set E 0 = Ew (0)/β < δ. Thus, thanks to our assumptions thanks to our choice of β in (1.17) we have E we can apply Corollary 2.5, so that the sequence (Ek )k defined by (2.28) satisfies (2.29). This im satisfies (1.22). We can therefore apply Theorem 1.5 to E, so that E satisfies (1.23). plies that E If additionally lim supx→0+ ΛH (x) < 1 we obtain (1.24). Going back to the definition of E we conclude. 2 Proof of Corollary 1.3. Thanks to Theorem 3.2 in [18], exponential stabilization for system (1.19) implies that there exist T > 0 and cT > 0 such that (1.14) holds for (1.6). We can thus apply Theorem 1.1 to conclude. 2 Remark 3.5. The fact that exponential stabilization implies controllability in Theorem 3.2 in [18] is the generalization of Russell’s principle. 4. Applications to examples of PDEs and dampings Now, we give applications of Theorem 1.1 and Corollary 1.3. In the next result, we denote by CT (E(0)) a positive (explicit) constant depending on E(0) and T whereas KT is a positive constant depending on T . We also only give the expression of g in a right neighbourhood of 0, since as long as g has a linear growth at infinity, the asymptotic behavior of the energy depends only on the behavior of g close to 0. 4.1. Examples of dampings Theorem 4.1. We assume that ρ ∈ C(Ω × R; R) is a continuous monotone nondecreasing function with respect to the second variable on Ω such that ρ(., 0) = 0 on Ω and satisfying (1.7). We assume that a ∈ C(Ω) satisfies (1.8) with a 0 on Ω. We assume that there exists T > 0 such that the solution of (1.6) satisfies the observability inequality (1.14). Then, we have the following results: Example 1. Let g be given by g(x) = x p where p > 1 on (0, r0 ]. Then the energy of solution of (1.1) satisfies the estimate −2 E(t) CT E(0) t p−1 , for t sufficiently large and for all (u0 , u1 ) ∈ H1/2 × L2 (Ω). Example 2. Let g be given by g(x) = x p (ln( x1 ))q where p > 2 and q > 1 on (0, r0 ]. Then the energy of solution of (1.1) satisfies the estimate −2q/(p−1) E(t) CT E(0) t −2/(p−1) ln(t) , for t sufficiently large and for all (u0 , u1 ) ∈ H1/2 × L2 (Ω). Example 3. Let g be given by g(x) = e
−
1 x2
on (0, r0 ].
(4.1)
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2445
Then the energy of solution of (1.1) satisfies the estimate −1 E(t) CT E(0) ln(t) ,
(4.2)
for t sufficiently large and for all (u0 , u1 ) ∈ H1/2 × L2 (Ω). 1
Example 4. Let g be given by g(x) = e−(ln( x )) where 1 < p < 2 on (0, r0 ]. Then the energy of solution of (1.1) satisfies the estimate p
1/p E(t) CT E(0) e−2(ln(KT t)) , for t sufficiently large and for all (u0 , u1 ) ∈ H1/2 × L2 (Ω). Example 5. Let g be given by g(x) = x(ln( x1 ))−p where p > 0. Then the energy of solution of (1.1) satisfies the estimate 1/(p+1) 1/(p+1) 1 E(t) CT E(0) e−KT t , t
(4.3)
for t sufficiently large and for all (u0 , u1 ) ∈ H1/2 × L2 (Ω). Proof. For all examples, g satisfies the assumptions in (A1) and H satisfies the assumption of Theorem 1.1. For Examples 1 and 2, limx→0+ ΛH (x) exists and is in (0, 1). Hence (1.13) holds so that the energy satisfies the simplified upper estimate (1.16). Using [2,5], we deduce the desired upper estimates for both examples. For Examples 3 and 4, limx→0+ ΛH (x) = 0. For Example 3, we have e−1/x H (x) = √ , ΛH (x) x thus (1.13) holds. For Example 4, we find that e H (x) = ΛH (x)
−(ln( √1x ))p
√ x
,
thus (1.13) holds. Therefore, the assumptions of Theorem 1.1 are satisfied. Moreover, since limx→0+ ΛH (x) = 0, the energy satisfies the simplified upper estimate (1.16). Using [2,5], we deduce the desired upper estimates for both examples. For Example 5, limx→0+ ΛH (x) = 1, hence (1.13) holds and the energy satisfies the general upper estimate (1.15). We refer to [2,6] for the computation of the desired estimate. 2
2446
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
4.2. First example: stabilization of the nonlinear damped wave equation We consider the following initial and boundary problem: ⎧ ⎨ utt − u + a(x)ρ(x, ut ) = 0, (x, t) ∈ Ω × (0, +∞), u = 0, on ∂Ω × (0, +∞), ⎩ u(x, 0) = u0 (x), ut (x, 0) = u1 (x), on Ω,
(4.4)
where ρ and a satisfy (A1). Hence u satisfies an equation of the form (1.1) with: A = − : D(A) ⊂ H = L2 (Ω) → L2 (Ω), D(A) = u ∈ L2 (Ω), u ∈ L2 (Ω), u|∂Ω = 0 , H1/2 = H01 (Ω). It is well known that A is a self-adjoint operator satisfying (1.2). The conservative equation (1.6) becomes in this case: ⎧ ⎨ φtt − φ = 0, Ω × (0, +∞), φ = 0, ∂Ω × (0, +∞), ⎩ φ(x, 0) = u0 (x), φt (x, 0) = u1 (x),
(4.5) Ω.
We consider the control geometric condition, also called the condition of geometric optics of Bardos, Lebeau and Rauch [10,17] (see also [11,12]): (G.C.C.) The generalized ray of Ω has a finite order contact with the boundary ∂Ω and there exists T0 > 0 such that every generalized ray of Ω with length greater than T0 hits the open set ω. The stability result can now be stated as follows. Theorem 4.2. We assume that Ω is a C ∞ bounded open set with a boundary of class C ∞ . We assume that ρ and a satisfy Assumption (A1) with a ∈ C ∞ (Ω; [0, ∞)). Assume that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ] and that (1.13) is satisfied. Moreover assume that the geometric condition (G.C.C.) is valid. Then, there exists T > 0 such that the energy of the solution of (4.4) satisfies Eu (t) βT L
1 ψr−1 ( t−T T0 )
,
for t sufficiently large.
(4.6)
If further lim supx→0+ ΛH (x) < 1, then we have the simplified decay rate −1 Eu (t) βT H
DT0 , t −T
(4.7)
for t sufficiently large. Here D is a positive constant which is independent of Eu (0) and T , whereas T0 depends on T and is defined by (3.10), β is a positive constant chosen such as
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
Eu (0) 2αT Eu (0) , , β > max , CT L(H (r02 )) δ
2447
(4.8)
where the constants CT > 0, α and δ > 0 are respectively defined by (2.25), (2.26) and (2.34). Proof. Thanks to Theorem 0 in Lebeau [17], exponential stabilization holds for the associated linear damped system (1.19). Hence applying Corollary 1.3, we conclude. 2 For the sake of completeness, let us now describe another geometric condition, namely the piecewise multiplier geometric condition (HG) given below (see K. Liu [18]). It is less general than the condition (G.C.C.) but requires light smoothness assumptions on Ω and a (the smoothness assumptions required in [10] have been strongly weakened in [11,12]). To state this condition, we need some notation. If Ωj ⊂ Ω is a Lipschitz domain, we denote by Γj its boundary and by νj the outward unit normal to Γj . Moreover, if U is a subset of RN and x ∈ R N , we set d(x, U ) = infy∈U |x − y|, and Nε (U ) = {x ∈ RN , d(x, U ) ε}. We make the following geometric assumptions on Ω and ω as in [18] and [21] (for use of the piecewise multiplier method, see [22] for the bondary damped case): ⎧ ⎪ ⎨ ∃ε > 0, domains Ωj ⊂ Ω with Lipschitz boundary Γj for 1 j J, and points xj in RN such that Ωi ∩ Ωj = ∅ if i = j, (HG) ⎪ ⎩ Ω ∩ N [ γ (x ) ∪ (Ω\ Ω )] ⊂ ω, ε j j j j j where γj (xj ) = {x ∈ Γj , (x − xj ) · νj (x) > 0}. These assumptions generalize Zuazua’s assumptions [27] (see also [29]), valid to a single domain Ω1 = Ω and to a single observation point. It allows to treat situations for which for instance Ω is a ball and the damping coefficient a vanishes at the two poles of this ball, so that two observation points at least are requested. Theorem 4.3. We assume that ρ and a satisfy Assumption (A1) where Ω is a bounded open set which is either convex or of class C 1,1 . We also assume that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Assume also that (1.13) holds. Then, under the geometric condition (HG), the energy of the solution of the nonlinearly damped equation (4.4) satisfies the estimates given in Theorem 4.2. Our result is also valid for the more general PDE considered by Lebeau [17,10]. Thanks to Theorem 0 in [17] and to [10], and applying Corollary 1.3, we deduce that Theorem 4.4. We assume that (Ω, g) is a C ∞ Riemannian compact and connex manifold, with a boundary of class ∞, whereas −A is the Laplacian on Ω for the metrics g. We assume that ρ and a satisfy Assumption (A1) with a ∈ C ∞ (Ω; [0, ∞)). We assume that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Assume also either that (1.18) or (1.13) holds. Then, under the geometric condition (G.C.C.), the energy of the solution of the nonlinearly damped equation (1.1) satisfies the estimates given in Theorem 4.2. We now consider a third example studied in [23] ⎧ ⎨ utt − u + aqu + a(x)ρ(x, ut ) = 0, (x, t) ∈ Ω × (0, +∞), ∂ u = 0, on ∂Ω × (0, +∞), ⎩ ν u(x, 0) = u0 (x), ut (x, 0) = u1 (x), on Ω,
(4.9)
2448
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
where q ∈ C(Ω) is a nonnegative and nonzero function and ν represents the outward unit normal vector to the boundary ∂Ω. We define the energy of a solution u by 1 Eu (t) = 2
2 2 2 ut + |∇u| + aqu .
Ω
Theorem 4.5. We assume that Ω is a bounded open set which is either convex or of class C 1,1 , and that ρ and a satisfy Assumption (A1). We further assume that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ]. Assume also that (1.13) holds. Then, under the geometric hypothesis (HG), the energy Eu of the solution of (4.9) satisfies the estimates given in Theorem 4.2. Proof. Thanks to Martinez’s result [23], exponential stabilization holds for Eq. (4.9) in case of a linear damping. Applying our Corollary 1.3, we conclude. 2 Remark 4.6. A similar result can be deduced under the geometric condition (G.C.C.) for smoother domains Ω and coefficients a and q. 4.3. Second example: stabilization of a nonlinear Bernoulli–Euler plate equation We consider the following initial and boundary value problem: ⎧ 2 ⎪ ⎨ utt + u + a(x)ρ(x, ut ) = 0, Ω × (0, +∞), u = 0, u = 0, ∂Ω × (0, +∞), ⎪ ⎩ u(x, 0) = u0 (x), ut (x, 0) = u1 (x), Ω,
(4.10)
where ρ and a satisfy (A1) and Ω is a bounded open set which is either convex or of class C 1,1 of RN . In this case: A = 2 ,
D(A) = {u ∈ L2 (Ω), 2 u ∈ L2 (Ω), u|∂Ω = 0, u|∂Ω = 0}.
(4.11)
Moreover the conservative equation (1.6) becomes in this case ⎧ 2 ⎪ ⎨ φtt + φ = 0, Ω × (0, +∞), φ = 0, φ = 0, ∂Ω × (0, +∞), ⎪ ⎩ 0 φ(x, 0) = u (x), φt (x, 0) = u1 (x),
(4.12) Ω.
The stability result can now be stated as follows. Theorem 4.7. Assume that there exists r0 > 0 sufficiently small so that the function H defined by (1.9) is strictly convex on [0, r02 ] and that (1.13) is satisfied. Moreover assume that the geometric
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
2449
condition (HG) is valid. Then, the energy of the solution of (4.10) satisfies Eu (t) βT L
1 ψr−1 ( t−T T0 )
,
for t sufficiently large.
(4.13)
If further lim supx→0+ ΛH (x) < 1, then we have the simplified decay rate −1 Eu (t) βT H
DT0 , t −T
(4.14)
for t sufficiently large. Here D is a positive constant which is independent of Eu (0) and T , whereas T0 depends on T and is defined by (3.10), β is a positive constant chosen such as
2αT Eu (0) Eu (0) β > max , , , CT L(H (r02 )) δ
(4.15)
where the constants CT > 0, α and δ > 0 are respectively defined by (2.25), (2.26) and (2.34). Remark 4.8. 1. In the case where a ∈ C ∞ (Ω) and under a geometric condition like (G.C.C.) we obtain the same stability result (like Theorem 4.7) (by decomposing the plate-like operator in two Schrödinger-like operators ∂t2 + 2 = (i∂t + )(−i∂t + )). 2. By using the equivalence between exact internal controllability of the Kirchhoff plate-like equation (4.16) and the wave equation (see [19] for more details), we obtain a stability result as Theorem 4.7 for the following system, under the same geometric condition (G.C.C.) in the case where a ∈ C ∞ (Ω) and under condition (HG) in the case where a ∈ C(Ω). ⎧ 2 ⎪ ⎨ utt − γ utt + u + a(x)ρ(x, ut ) = 0, (x, t) ∈ Ω × (0, +∞), (4.16) u = 0, u = 0, on ∂Ω × (0, +∞), ⎪ ⎩ 0 1 u(x, 0) = u (x), ut (x, 0) = u (x), on Ω, where ρ and a satisfy (A1), γ > 0 is a constant and Ω is a bounded smooth domain of RN , N 2 (the smoothness assumptions on Ω being adapted if one considers (G.C.C.) or (HG)). Acknowledgments We are grateful to the referees for their valuable comments and suggestions. References [1] F. Alabau-Boussouira, Une formule générale pour le taux de décroissance des systèmes dissipatifs non linéaires, C. R. Acad. Sci. Paris Sér. I Math. 338 (2004) 35–40. [2] F. Alabau-Boussouira, Convexity and weighted integral inequalities for energy decay rates of nonlinear dissipative hyperbolic systems, Appl. Math. Optim. 51 (2005) 61–105. [3] F. Alabau-Boussouira, Piecewise multiplier method and nonlinear integral inequalities for Petrowsky equations with nonlinear dissipation, J. Evol. Equ. 6 (2006) 95–112.
2450
F. Alabau-Boussouira, K. Ammari / Journal of Functional Analysis 260 (2011) 2424–2450
[4] F. Alabau-Boussouira, Asymptotic behavior for Timoshenko beams subject to a single nonlinear feedback control, NoDEA 14 (2007) 643–669. [5] F. Alabau-Boussouira, New trends towards lower energy estimates and optimality for nonlinearly damped vibrating systems, J. Differential Equations 249 (2010) 1145–1178. [6] F. Alabau-Boussouira, A unified approach via convexity for optimal energy decay rates of finite and infinite dimensional vibrating damped systems with applications to semi-discretized vibrating damped systems, J. Differential Equations 248 (2010) 1473–1517. [7] F. Alabau-Boussouira, K. Ammari, Nonlinear stabilization of abstract systems via a linear observability inequality and application to vibrating PDE’s, C. R. Acad. Sci. Paris Sér. I Math. 348 (2010) 165–170. [8] K. Ammari, M. Tucsnak, Stabilization of Bernoulli–Euler beams by means of a pointwise feedback force, SIAM J. Control Optim. 39 (2000) 1160–1181. [9] K. Ammari, M. Tucsnak, Stabilization of second order evolution equations by a class of unbounded feedbacks, ESAIM Control Optim. Calc. Var. 6 (2001) 361–386. [10] C. Bardos, G. Lebeau, J. Rauch, Sharp sufficient conditions for the observation, control and stabilization of waves from the boundary, SIAM J. Control Optim. 30 (1992) 1024–1065. [11] N. Burq, Contrôlabilité exacte des ondes dans des ouverts peu réguliers, Asymptot. Anal. 14 (1997) 157–191. [12] N. Burq, P. Gérard, Condition nécessaire et suffisante pour la contrôlabilité exacte des ondes, C. R. Acad. Sci. Paris Sér. I Math. 325 (1997) 749–752. [13] M. Daoulatli, I. Lasiecka, D. Toundykov, Uniform energy decay for a wave equation with partially supported nonlinear boundary dissipation without growth conditions, Discrete Contin. Dyn. Syst. Ser. S 2 (2009) 67–94. [14] A. Haraux, Une remarque sur la stabilisation de certains systèmes du deuxième ordre en temps, Port. Math. 46 (1989) 245–258. [15] V. Komornik, Exact Controllability and Stabilization. The Multiplier Method, Collection RMA, vol. 36, Masson/John Wiley, Paris/Chicester, 1994. [16] I. Lasiecka, D. Tataru, Uniform boundary stabilization of semilinear wave equation with nonlinear boundary damping, Differential Integral Equations 8 (1993) 507–533. [17] G. Lebeau, Equation des ondes amorties, in: Algebraic and Geometric Methods in Mathematical Physics, Kaciveli, 1993, in: Math. Phys. Stud., vol. 19, Kluwer Acad. Publ., Dordrecht, 1996, pp. 73–109. [18] K. Liu, Locally distributed control and damping for the conservative systems, SIAM J. Control Optim. 35 (1997) 1574–1590. [19] K. Liu, X. Yu, Equivalence between exact internal controllability of the Kirchhoff plate-like equation and the wave equation, Chin. Math. Ann. 218 (2000) 71–76. [20] W.-J. Liu, E. Zuazua, Decay rates for dissipative wave equations, Ric. Mat. 48 (1999) 61–75. [21] P. Martinez, A new method to obtain decay rate estimates for dissipative systems with localized damping, Rev. Mat. Complut. 12 (1999) 251–283. [22] P. Martinez, A new method to obtain decay rate estimates for dissipative systems, ESAIM Control Optim. Calc. Var. 4 (1999) 419–444. [23] P. Martinez, Stabilization for the wave equation with Neumann boundary condition by a locally distributed damping, ESAIM Proc. 8 (2000) 119–136. [24] D.L. Russell, Controllability and stabilizability theory for linear partial differential equations: recent progress and open questions, SIAM Rev. 20 (1978) 639–739. [25] J. Vancostenoble, Optimalité d’estimation d’énergie pour une équation des ondes amortie, C. R. Acad. Sci. Paris Sér. I 328 (1999) 777–782. [26] J. Vancostenoble, P. Martinez, Optimality of energy estimates for the wave equation with nonlinear boundary velocity feedbacks, SIAM J. Control Optim. 39 (2000) 776–797. [27] E. Zuazua, Exponential decay for the semilinear wave equation with locally distributed damping, Comm. Partial Differential Equations 15 (1990) 205–235. [28] E. Zuazua, Uniform stabilization of the wave equation by nonlinear feedbacks, SIAM J. Control Optim. 28 (1990) 466–477. [29] E. Zuazua, Propagation, observation and control of wave approximation by finite difference methods, SIAM Rev. 47 (2005) 197–243.
Journal of Functional Analysis 260 (2011) 2451–2482 www.elsevier.com/locate/jfa
ζ -function and heat kernel formulae Fedor Sukochev a,∗ , Dmitriy Zanin b,1 a School of Mathematics and Statistics, University of New South Wales, Sydney, 2052, Australia b School of Computer Science, Engineering and Mathematics, Flinders University, Bedford Park, 5042, Australia
Received 14 September 2010; accepted 11 October 2010 Available online 9 November 2010 Communicated by Alain Connes
Abstract We present a systematic study of asymptotic behaviour of (generalised) ζ -functions and heat kernels used in noncommutative geometry and clarify their connections with Dixmier traces. We strengthen and complete a number of results from the recent literature and answer (in the affirmative) the question raised by M. Benameur and T. Fack (2006) [1]. © 2010 Elsevier Inc. All rights reserved. Keywords: Zeta function; Heat kernel formulae; Dixmier trace; Noncommutative geometry
1. Introduction The interplay between Dixmier traces, ζ -functions and heat kernel formulae is a cornerstone of noncommutative geometry [8]. These formulae are widely used in physical applications. To define these objects, let us fix a Hilbert space H and let B(H ) be the algebra of all bounded operators on H with its standard trace Tr. Let A and B be positive operators from B(H ). Consider the following [0, ∞]-valued functions t→
1 1+1/t Tr A , t
t→
1 1+1/t Tr A B t
* Corresponding author.
E-mail addresses: [email protected] (F. Sukochev), [email protected] (D. Zanin). 1 Research supported by the Australian Research Council.
0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.10.007
(1)
2452
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
and, for fixed 0 < q < ∞, t→
1 Tr exp −(tA)−q , t
t→
1 Tr exp −(tA)−q B . t
(2)
When these functions are finitely-valued, they are frequently referred to as ζ -functions and heat kernel functions associated with the operators A and B. When these functions are bounded, a particular interest is attached to their asymptotic behaviour when t → ∞, which is usually measured with the help of some generalised limit γ : L∞ (0, ∞) → R yielding the following functionals 1 1+1/t 1 1+1/t Tr A Tr A ζγ (A) := γ , ζγ ,B (A) := γ B (3) t t and ϕγ (A) := γ
1 Tr exp −(tA)−q , t
ϕγ ,B (A) := γ
1 Tr exp −(tA)−q B . t
(4)
A natural class of operators for which the formulae (1) and (3) are well defined (respectively, (2) and (4)) is given by the set M1,∞ (respectively, L1,∞ ) of compact operators from B(H ). More precisely, denote by μn (T ), n ∈ N, the singular values of a compact operator T (the singular values are the eigenvalues of the operator |T | = (T ∗ T )1/2 arranged with multiplicity in decreasing order [24, §1]). Then
n 1 M1,∞ := M1,∞ (H ) = T : sup μk (T ) < ∞ n∈N log(n + 1)
(5)
k=1
defines a Banach ideal of compact operators. We set
L1,∞ := T ∈ M1,∞ : ∃C > 0 such that μn (A) C/n, n 1 . It is important to observe that the subset L1,∞ is not dense in M1,∞ (see e.g. [17]). It should also be pointed out that our notation here differs from that used in [8]. It follows from [6, Theorem 4.5] that the functions defined in (1) are bounded if and only if A ∈ M1,∞ . It also follows from [6] and [4] that the functions defined in (2) are bounded if and only if A ∈ L1,∞ . In fact the last result is a strong motivation to consider the following modification of formulae (2). Let us consider a Cesaro operator on L∞ (0, ∞) given by 1 (Mx)(t) = log(t)
t x(s)
ds , s
t ∈ (0, ∞).
1
It follows from [6] and [4] that the functions 1 M t → Tr exp −(tA)−q , t
1 M t → Tr exp −(tA)−q B t
(6)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2453
are bounded if and only if A ∈ M1,∞ . Therefore, for a given generalised limit ω, let us set ω := ω ◦ M
(7)
and instead of the functions given in (4) consider the functions ξω (A) := ω
1 −q Tr exp −(tA) , t
ξω,B (A) := ω
1 −q Tr exp −(tA) B . t
(8)
The class of dilation invariant states ω as above was introduced by A. Connes (see [8]) and it is natural to refer to this class as “Connes states”. We prove in Section 5 that if ω in (7) is dilation invariant, then ξω is a linear functional on M1,∞ . In fact, we also show in Proposition 18 that if ω in (7) is such that ξω is linear on M1,∞ , then necessarily there exists a dilation invariant generalised limit ω0 such that ξω = ξω0 . There is a deep reason to require that the functionals ξω and ζγ be defined on M1,∞ and be linear (and thus, by implication, to consider Connes states). Important formulae in noncommutative geometry [8] and its semi-finite counterpart [5,7,1,6,4] then connect these functionals with Dixmier traces on M1,∞ . Recall that in [9], J. Dixmier constructed a non-normal semi-finite trace (a Dixmier trace) on B(H ) using the weight Trω (T ) := ω
∞ n 1 μk (T ) , log(1 + n) k=1
T > 0,
(9)
n=1
where ω is a dilation invariant state on L∞ (0, ∞). The interplay between positive functionals Trω , ζγ and ξω on M1,∞ makes an important chapter in noncommutative geometry and has been treated (among many other papers) in [8,5, 7,1,6,22,4,23]. We now list a few most important known results concerning this interplay and explain our contribution to this topic. In [5], the equality 1 1+1/t B = ζω◦log,B (A), Trω (AB) = (ω ◦ log) τ A t
0 A ∈ M1,∞ ,
(10)
was established for every B ∈ B(H ) under very restrictive conditions on ω. These conditions are dilation invariance for both ω and ω ◦ log and M-invariance of ω. In [6], for the special case B = 1, the assumption that ω is M-invariant has been removed. However, the case of an arbitrary B appears to be inaccessible by the methods in that article. In Section 4, we prove the general result which implies, in particular, that the equality (10) holds without requiring M-invariance of ω. In [5], the equality 1 1 −q τω (AB) ω τ exp −(tA) B = Γ 1 + t q
(11)
was established under the same conditions on ω and ω ◦ log as above. In [23], in the special case B = 1 the equality (11) was established under the assumption that ω is M-invariant. However,
2454
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
again the case of an arbitrary B appears to be inaccessible by the methods in that article. Here, we are able to treat the case of a general operator B. In [1] a more general approach to the heat kernel formulae is suggested. It consists of replacing the function t → exp(t −q ) with an arbitrary function f from the Schwartz class. The following equality was proved in [1] ∞ 1 1 ds · τω (AB) ω τ f (tA)B = f t s
(12)
0
for A ∈ L1,∞ and M-invariant ω. In [1, p. 51], M. Benameur and T. Fack have asked whether the result above continues to stand without the M-invariance assumption on ω. In Theorem 49 below, we answer this question affirmatively for a much larger class of functions than the Schwartz class and for any A ∈ M1,∞ . Finally, it is important to emphasise the connection between our results with the theory of fully symmetric functionals. Recall that a linear positive functional ϕ : M1,∞ → C is called fully symmetric if ϕ(B) ϕ(A) for every positive A, B ∈ M1,∞ such that B ≺≺ A. The latter symbol means that n k=1
μk (B)
n
μk (A),
∀n ∈ N.
k=1
It is obvious that every Dixmier trace Trω is a fully symmetric functional. However, the fact that every fully symmetric functional coincides with a Dixmier trace is far from being trivial (see [16] and Theorem 1 below). It is therefore quite natural to ask whether a similar result holds for the sets of all linear positive functionals on M1,∞ formed by the ξω and ζγ respectively. To this end, we establish results somewhat similar to those of [16]. Firstly, in Theorem 22 we prove that if ω in (7) is dilation invariant, then the functional ξω extends to a fully symmetric functional on M1,∞ . Secondly, in Theorem 31 we show that in fact every normalised fully symmetric functional on M1,∞ coincides with some ξω , where ω is dilation invariant. Thus, in view of [16], we can conclude that the set {Trω : ω is a dilation invariant generalised limit} coincides with the set {ξω : ω is a dilation invariant generalised limit} (up to a norming constant). At the same time, a natural question, namely, whether the equality 1 Trω ξω = Γ 1 + q holds for every dilation invariant generalised limit ω is answered in the negative in Theorem 37. Finally, we note that the question on the relationship between the sets {Trω : ω is a dilation invariant generalised limit}, {ζγ : γ is a generalised limit} and {ζω : ω is a dilation invariant generalised limit} remains open. 2. Definitions and notations The theory of singular traces on operator ideals rests on some classical analysis which we now review for completeness.
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2455
As usual, L∞ (0, ∞) is the set of all bounded Lebesgue measurable functions on the semi-axis equipped with the uniform norm · . Given a function x ∈ L∞ (0, ∞), one defines its decreasing rearrangement μ(x) = μ(·, x) by the formula (see e.g. [19])
μ(t, x) = inf s 0: m |x| > s t . Let H be a Hilbert space and let B(H ) be the algebra of all bounded operators on H equipped with the uniform norm · . Let N ⊂ B(H ) be a semi-finite von Neumann algebra with a fixed faithful and normal semi-finite trace τ . For every A ∈ N , the generalised singular value function μ(A) = μ(·, A) is defined by the formula (see e.g. [14])
μ(t, A) := inf Ap: τ (1 − p) t . If, in particular, N = B(H ), then μ(A) is a step function and, therefore, can be identified with the sequence {μ(n, A)}n0 of singular numbers of the operators A (the singular values are the eigenvalues of the operator |A| = (A∗ A)1/2 arranged with multiplicity in decreasing order). Equivalently, μ(A) can be defined in terms of the distribution function dA of A. That is, setting dA (s) := τ E|A| (s, ∞) ,
s 0,
we obtain
μ(t, A) = inf s: dA (s) t ,
t > 0.
Here, E|A| denotes the spectral measure of the operator |A|. The following formula follows directly from the von Neumann definition of trace (see the definition at [20, Definition 15.1.1]) τ f (A) = −
∞ f (λ) ddA (λ).
(13)
0
Using the Jordan decomposition, every operator A ∈ B(H ) can be uniquely written as A = (A)+ − (A)− + i (A)+ − (A)− . Here, (A) := 12 (A + A∗ ) (respectively, (A) := 2i1 (A − A∗ )) for any operator A ∈ B(H ) and B+ = BEB (0, ∞) (respectively, B− = BEB (−∞, 0)) for any self-adjoint operator B ∈ B(H ). Recall that A, A ∈ N for every A ∈ N and B+ , B− ∈ N for every self-adjoint B ∈ N . Let ψ : R+ → R+ be an increasing concave function such that ψ(t) = O(t) as t → 0. The Marcinkiewicz function space Mψ (see e.g. [19]) consists of all x ∈ L∞ (0, ∞) satisfying
xMψ
1 := sup t>0 ψ(t)
t μ(s, x) ds < ∞. 0
2456
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
The Marcinkiewicz operator space Mψ := Mψ (N , τ ) (see e.g. [7,6]) consists of all A ∈ N satisfying 1 AMψ := sup t>0 ψ(t)
t μ(s, A) ds < ∞. 0
We are especially interested in Marcinkiewicz spaces M1,∞ and M1,∞ that arise when ψ(t) = log(1 + t), t 0. In the literature, the ideal M1,∞ is sometimes referred to as the Dixmier ideal. We recommend the recent paper of A. Pietsch, [21], discussing the origin of M1,∞ in mathematics. For s > 0, dilation operators σs : L∞ → L∞ are defined by the formula (σs x)(t) = x(t/s). Clearly, σs : M1,∞ → M1,∞ (see also [19, Theorem II.4.4]). Further, we need to recall the important notion of Hardy–Littlewood majorization. Let A, B ∈ N . B is said to be majorized by A and written B ≺≺ A if and only if t
t μ(s, B) ds
0
μ(s, A) ds,
t 0.
(14)
0
We have (see [14]) A + B ≺≺ μ(A) + μ(B) ≺≺ 2σ1/2 μ(A + B).
(15)
One of the most widely used ideals in von Neumann algebras is 1/p
Lp := Lp (N , τ ) = A ∈ N : Ap := τ |A|p <∞ ,
p 1,
usually called the Schatten–von Neumann ideal of p-summable operators. Using Hardy– Littlewood majorization, it is very easy to see (e.g. [5, Lemma 2.1]) that M1,∞ ⊂ Lp for all p > 1. A linear functional ϕ : M1,∞ → C is said to be symmetric if ϕ(B) = ϕ(A) for every positive A, B ∈ M1,∞ such that μ(B) = μ(A). A linear functional ϕ : M1,∞ → C is said to be fully symmetric if ϕ(B) ϕ(A) for all A, B ∈ M+ 1,∞ such that B ≺≺ A [10–12]. Every fully symmetric functional is symmetric and bounded. The converse fails [17]. A positive normalised linear functional γ : L∞ (0, ∞) → R is called a generalised limit if γ (z) = 0 for every z ∈ L∞ (0, ∞) such that limt→∞ z(t) = 0. A linear functional γ : L∞ (0, ∞) → R is called dilation invariant if γ (σs z) = γ (z) for every z ∈ L∞ (0, ∞) and every s > 0. Let S ⊆ B(H ). We denote by S + the set of all positive operators from S. Let ω : L∞ (0, ∞) → R be a dilation invariant generalised limit. Define a functional τω on M+ 1,∞ by the formula
1 τω (A) = ω log(1 + t)
t
μ(s, A) ds .
0
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2457
The functional τω is additive and unitarily invariant on M+ 1,∞ . Thus, τω extends to a fully symmetric functional on M1,∞ . One usually refers to it as to a Dixmier trace. We refer the reader to [9,8,5,7,6,16] for details. Further, we use the following properties of Dixmier traces. Let A ∈ M1,∞ and let B ∈ N . We have (see [8,5]) τω (AB) = τω (BA).
(16)
Suppose that B > 0. It follows from (16) that τω (AB) = τω B 1/2 AB 1/2 .
(17)
Suppose that the trace τ on the von Neumann algebra N is infinite and the algebra N is either diffuse (that is with no minimal projections) or else is B(H ). Given any finite sequence {An } of operators, we can construct a sequence of operators {Bn } such that μ(An ) = μ(Bn ) for all n’s and Bn Bm = 0 for all n = m. Further, we refer to any such sequence {Bn } as a “sequence of disjoint copies of {An }”. Cesaro operator M is defined on L∞ (0, ∞) by the formula 1 (Mx)(t) = log(t)
t x(s)
ds , s
t ∈ (0, ∞).
1
3. Preliminary important results In this section, for the reader’s convenience, we collect a number of key known results, which will be used throughout this paper. The following important theorem is proved in [16, Theorem 11] for general Marcinkiewicz spaces. Theorem 1. Every fully symmetric functional on M1,∞ is a Dixmier trace. The following theorem is an analog of Lidskii formula (see [24]) for Dixmier traces. It is proved in [23, Theorem 33] for a large subclass of Marcinkiewicz spaces which contains M1,∞ . Theorem 2. Let A ∈ M1,∞ and let τω be an arbitrary Dixmier trace on M1,∞ . We have
1 τω (A) = ω log(t)
λ .
|λ|>log(t)/t, λ∈σ (A)
The following ω-variant of the classical Karamata theorem is established in [5]. Theorem 3. Let β be a continuous increasing function. Set ∞ h(t) = 0
e−(u/t) dβ(u). q
2458
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
We have
h(t) ω t
1 β(t) =Γ 1+ ω q t
for any dilation invariant generalised limit ω. Consider the ideal KN of τ -compact operators in N (that is the norm closed ideal generated by the projections E ∈ N with τ (E) < ∞). The following result is not new (see [15, Chapter II, Lemma 3.4]). We present a short proof for convenience of the reader. Theorem 4. Let A, B ∈ N be positive τ -compact operators. We have B ≺≺ A if and only if τ (B − t)EB (t, ∞) τ (A − t)EA (t, ∞) ,
∀t > 0.
(18)
Proof. Fix t > 0. It follows from the definition of generalised singular value function that μ(AEA (t, ∞)) = μ(A)χ[0,dA (t)] . Applying [14, Proposition 2.7] to the operator AEA (t, ∞), we have τ AEA (t, ∞) =
dA (t)
μ(s, A) ds, 0
and hence τ (A − t)EA (t, ∞) =
dA (t)
μ(s, A) − t ds.
0
The function u u→
μ(s, A) − t ds
0
attains its maximum at u = dA (t). If B ≺≺ A, then dB (t)
dB (t)
dA (t)
0
0
0
μ(s, B) − t ds
μ(s, A) − t ds
Inequality (18) follows now from (19).
μ(s, A) − t ds.
(19)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2459
Suppose now that (18) holds. Fix u > 0 and set t = μ(u, A). It follows that u
dB (t)
μ(s, B) − t ds = τ (B − t)EB (t, ∞)
μ(s, B) − t ds
0
0
τ (A − t)EA (t, ∞) =
u
μ(s, A) − t ds.
0
Hence, u
u μ(s, B) ds
0
Since u is arbitrary, we have B ≺≺ A.
μ(s, A) ds. 0
2
4. ζ -function formulae We begin by showing that the functionals given in (3) are well defined on M+ 1,∞ . Lemma 5. If γ : L∞ (0, ∞) → R is a generalised limit, then ζγ (A) < ∞ and ζγ ,B (A) < ∞ for any A ∈ M+ 1,∞ . Proof. It is clear that μ(s, A) ≺≺ (1 + s)−1 A1,∞ . Therefore, 1+1/t τ A1+1/t A1,∞
∞ 0
dt 1+1/t = tA1,∞ . (1 + s)1+1/t
Hence, ζγ (A) A1,∞ . It follows from τ A1+1/t B Bτ A1+1/t that ζγ ,B (A) Bζγ (A).
2
Remark 6. Let x, y ∈ L∞ (0, ∞). For any generalised limit γ such that γ (|x − 1|) = 0, we have γ (xy) = γ (y). Indeed, |γ (xy − y)| γ (|x − 1|)y = 0. Lemma 7. For any A, C ∈ M+ 1,∞ we have τ A1+s + C 1+s τ (A + C)1+s 2s τ A1+s + C 1+s ,
s > 0.
2460
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Proof. In the special case when N = B(H ), the first inequality can be found in [18, (2.9)]. In the general case, it follows directly from Proposition 4.6(ii) of [14] when f (u) = u1+s , u > 0. The second inequality follows from the same proposition by setting there a = a ∗ = b = b∗ = 2−1/2 . 2 Let A ∈ M1,∞ . For a functional ζγ defined on M+ 1,∞ by (3) (see Lemma 5), we set ζγ (A) := ζγ (A)+ − ζγ (A)− + i ζγ (A)+ − ζγ (A)− .
(20)
The following theorem shows that functionals ζγ defined by (20) are fully symmetric on M1,∞ . Theorem 8. If γ : L∞ (0, ∞) → R is a generalised limit, then ζγ is a fully symmetric linear functional on M1,∞ . Proof. To verify that ζγ is linear, it is sufficient to check that ζγ (A + C) = ζγ (A) + ζγ (C) for any A, C ∈ M+ 1,∞ . It follows from the left-hand side inequality of Lemma 7 that ζγ (A + C) ζγ (A) + ζγ (C). Noting that γ (|21/t − 1|) = 0, it follows from the right-hand side inequality of Lemma 7 and Remark 6 that ζγ (A + C) ζγ (A) + ζγ (C). Therefore, we have ζγ (A + C) = ζγ (A) + ζγ (C). The homogeneity of ζγ follows from Remark 6. Finally, if 0 C ≺≺ A ∈ M+ 1,∞ , then C, A ∈ 1 1 1+s 1+s 1+1/t 1+1/t ) t τ (A ) and so ζγ (C) ζγ (A). 2 L1+s and τ (C ) τ (A ). Hence, t τ (C Let B ∈ N . We extend the functional ζγ ,B on M1,∞ , similarly to (20). Observe that ζγ ,B1 +B2 (A) = ζγ ,B1 (A) + ζγ ,B2 (A),
B1 , B2 ∈ N , A ∈ M1,∞ .
Lemma 9. If A ∈ M1,∞ and Bn → B in N , then ζγ ,Bn (A) → ζγ ,B (A). Proof. It is sufficient to prove the assertion for A ∈ M+ 1,∞ . Since 1+s τ A B − τ A1+s Bn τ A1+s B − Bn , we obtain ζγ ,B (A) − ζγ ,B (A) ζγ (A)B − Bn . n
2
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2461
The following lemma follows immediately from [5, Lemma 3.3]. Lemma 10. Let A, B ∈ B + (H ) and let s > 0. We have (i) (B 1/2 AB 1/2 )1+s B 1/2 A1+s B 1/2 if 0 B 1. (ii) (B 1/2 AB 1/2 )1+s B 1/2 A1+s B 1/2 if B 1. The result below significantly strengthens [5, Proposition 3.6] by removing all extra assumptions on the generalised limit γ . Proposition 11. If γ : L∞ (0, ∞) → R is a generalised limit, then ζγ ,B (A) = ζγ B 1/2 AB 1/2 ,
∀A ∈ M1,∞ , B ∈ N + .
Proof. It is sufficient to prove the assertion for A ∈ M+ 1,∞ . Suppose first that there are constants 0 < m M < ∞ such that m B M. Applying Lemma 10 to the operators A and M −1 B (respectively, m−1 B), we have 1+s M s B 1/2 A1+s B 1/2 . ms B 1/2 A1+s B 1/2 B 1/2 AB 1/2 Therefore, 1+1/t 1 1/t 1+1/t 1 1/t 1+1/t 1 1/2 m τ A M τ A B τ B AB 1/2 B . t t t Since γ (|m1/t − 1|) = 0 and γ (|M 1/t − 1|) = 0, it follows from Remark 6 that ζγ ,B (A) = ζγ (B 1/2 AB 1/2 ). For an arbitrary B ∈ N + , we set Bn := BEB (1/n, ∞) + 1/nEB [0, 1/n], n 1. From the first part of the proof, we have 1/2 1/2 ζγ ,Bn (A) = ζγ Bn ABn . 1/2
1/2
Since Bn ABn
→ B 1/2 AB 1/2 in M1,∞ , we have by Theorem 8 1/2 1/2 ζγ Bn ABn → ζγ B 1/2 AB 1/2 .
On the other hand, by Lemma 9 we have ζγ ,Bn (A) → ζγ ,B (A).
2
The following is our main result on the ζ -function. Theorem 12. If γ : L∞ (0, ∞) → R is a generalised limit, then ζγ ,B (A) = ζγ (AB),
∀A ∈ M1,∞ , B ∈ N .
2462
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Proof. It is sufficient to prove the assertion for B ∈ N + . By Theorems 8 and 1, we know that ζγ is a Dixmier trace on M1,∞ . Hence, by (17), we have ζγ (B 1/2 AB 1/2 ) = ζγ (AB). The assertion follows now from Proposition 11. 2 Our remaining objective in this section is to provide strengthening of several formulae linking Dixmier traces and ζ -functions from [5,6]. −1 Lemma 13. Let A ∈ M+ 1,∞ . The mapping s → s ζγ ◦σs (A) is convex and, therefore, continuous.
Proof. For all t, s > 0, we have s
−1
σs
1 1+1/t 1 τ A = τ A1+s/t . t t
Therefore, for every s > 0 s −1 ζγ ◦σs = γ
1 1+s/t . τ A t
Let λi > 0 and let λ1 + λ2 = 1. Since the mapping t → a 1+t is convex for every a > 0, it follows from the spectral theorem that the map s → As is also convex. Therefore, for all positive real numbers s1 , s2 and t, we have A1+(λ1 s1 +λ2 s2 )/t λ1 A1+s1 /t + λ2 A1+s2 /t . The assertion follows immediately.
2
Let γ be a generalised limit on L∞ (0, ∞). Below, we will formally apply the notation ζγ ,B (A) introduced in (3) to some unbounded positive operators B on H . Lemma 14. Let A ∈ N be a positive τ -compact operator and let B 1 be an unbounded operator commuting with A. If (the closure of ) the product AB ∈ M1,∞ and AB n ∈ N for every n ∈ N, then ζγ (AB) = ζγ ,B (A). Proof. It follows from AB = BA and B 1 that A1+s B (AB)1+s . The inequality ζγ ,B (A) ζγ (AB) follows immediately. 1/2n Set cn := AB 2n , n 1 and observe that BA1/2n cn . Setting Bn = BEA [0, cn−1 ], we obtain Bn A1/n = BA1/2n · A1/2n EA 0, cn−1 (cn A)1/2n EA 0, cn−1 1. It follows from (21) that A1+1/t Bn (ABn )1+n/t (n−1) . Thus, γ
1 1+1/t 1 n−1 τ A τ (ABn )1+n/t (n−1) = ζγ ◦σn/(n−1) (ABn ). Bn γ t t n
(21)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2463
Since A is τ -compact, then B −Bn is bounded operator with finite support. Due to the linearity with respect to B, we have ζγ ,B (A) = ζγ ,Bn (A)
n−1 n−1 ζγ ◦σn/(n−1) (ABn ) = ζγ ◦σn/(n−1) (AB). n n 2
The assertion follows now from Lemma 13.
The following result is mainly known (see [5,6]). Our proof is however much simpler than the arguments used there. Theorem 15. If ω is a dilation invariant generalised limit such that the generalised limit ω ◦ log is still dilation invariant, then τω = ζω◦log . Proof. It is sufficient to verify the equality τω = ζω◦log on positive operators A ∈ M+ 1,∞ such that A e−1 . Define a continuously increasing function β : (0, ∞) → (0, ∞) by ∞ β(u) := −
λ ddA (λ).
ue−u
Let h be as in Theorem 3 as applied to the above β. Define an operator B 1 by the formula A = Be−B and set C = e−B . We have ∞ h(t) =
e
−u/t
∞ dβ(u) = −
0
(13) e−u(1+1/t) u ddA ue−u = τ C 1+1/t B .
(22)
0
The conditions of Lemma 14 are valid for B and C. Indeed, B commutes with C, BC = A ∈ M1,∞ and B n e−B ∈ N for every n ∈ N. By Lemma 14, we have h(t) . ζω◦log (A) = ζω◦log,B (C) = (ω ◦ log) t By Theorem 2, we have
−1 τω (A) = ω log(t)
∞
β(t) . λ ddA (λ) = (ω ◦ log) t
(23)
log(t)/t
We can now conclude h(t) (Thm. 3) β(t) (23) ζω◦log (A) = (ω ◦ log) = (ω ◦ log) = τω (A). t t (22)
2
The following corollary strengthens and extends the results of [6, Theorem 4.11] and [5, Theorem 3.8]. It follows immediately from Theorems 15 and 12.
2464
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Corollary 16. If ω is a dilation invariant generalised limit such that the generalised limit ω ◦ log is still dilation invariant, then 1 1+1/t B , ∀A ∈ M+ τω (AB) = (ω ◦ log) τ A 1,∞ , B ∈ N . t 5. The linearity criterion for functionals ξγ In this section we focus on functionals ξγ (·) defined in (8). It follows from the proof of [6, Theorem 5.2] that 1 M t → τ exp −(tA)−q ∈ L∞ (0, ∞), ∀A ∈ M+ 1,∞ , t and therefore, 1 ξγ (A) := (γ ◦ M) t → τ exp −(tA)−q t
(24)
is finite for every A ∈ M+ 1,∞ and every generalised limit γ on L∞ (0, ∞). We note, in passing that a stronger result than [6, Theorem 5.2] is established in Theorem 40 below. Let A ∈ M1,∞ . For a functional ξγ , we set ξγ (A) := ξγ (A)+ − ξγ (A)− + i ξγ (A)+ − ξγ (A)− .
(25)
It is an open question how to describe the set of all generalised limits γ for which (25) yields a linear functional ξγ . However, the class of linear functionals ξγ is an easier object. Below in Proposition 18, we show that the sets of linear functionals {ξγ : γ is a generalised limit} and linear functionals {ξω : ω is a dilation invariant generalised limit} coincide. Lemma 17. For every locally integrable z with Mz ∈ L∞ (0, ∞), we have (M ◦ σs −1 − σs −1 ◦ M)(z) ∈ C0b (0, ∞),
∀s > 0.
Here, C0b (0, ∞) is the space of all bounded continuous functions tending to 0 at ∞. Proof. Fix s > 0. The assertion follows by writing 1 (M ◦ σs −1 − σs −1 ◦ M)(z) = log(t)
st
1 du − z(u) u log(st)
s
st z(u) 1
and noting that the assumption Mz ∈ L∞ (0, ∞) easily implies that 1 log(st)
st 1
1 du − z(u) u log(t)
st z(u) 1
du ∈ Cb0 (0, ∞). u
2
du u
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2465
Proposition 18. Suppose that a generalised limit γ on L∞ (0, ∞) is such that ξγ is a linear functional on M1,∞ . Then, there exists a dilation invariant generalised limit ω on L∞ (0, ∞) such that ξγ = ξω . Proof. Fix s > 0 and observe that
−q 1 1 −q t → τ exp −(tsA) = sσs −1 t → τ exp −(tA) . t t
(26)
Therefore, 1 −q ξγ (sA) = s(γ ◦ M ◦ σs −1 ) τ exp −(tA) . t By the assumption, we have ξγ (sA) = sξγ (A) and appealing to Lemma 17, we obtain 1 ξγ (A) = (γ ◦ σs −1 ◦ M) τ exp −(tA)−q , t
∀s > 0.
(27)
Let E be the linear span of the functions t →M
1 τ exp −(tA)−q , t
A ∈ M+ 1,∞ ,
and let F := E + C0b (0, ∞). We claim that the space F is dilation invariant. Indeed, it follows from Lemma 17 and (26) that every function −q 1 σs −1 t → M τ exp −(tA) t belongs to the set 1 + C0b (0, ∞). s −1 t → M τ exp −(tsA)−q t It follows from (27) that γ ◦ σs −1 = γ on F . By the invariant form of the Hahn–Banach theorem (see [13, p. 157]) applied to the group of dilations {σs }s>0 , we see that γ |F can be extended to a dilation invariant generalised limit ω on L∞ (0, ∞). 2 The following lemma can be found in [23]. We present a shorter proof for convenience of the reader. Lemma 19. If ω is a dilation invariant generalised limit on L∞ (0, ∞), then 1 1 1 ξω (A) = Γ 1 + (ω ◦ M) dA , q t t
∀A ∈ M+ 1,∞ .
(28)
2466
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Proof. It follows from (13) that τ exp −(tA)−q =
∞
e−(u/t) ddA q
1 . u
(29)
0
Setting β(u) = dA (1/u), multiplying both sides of (29) by 1/t and applying Theorem 3 to ω ◦ M (which is dilation invariant, see [8]), we obtain (28). 2 Lemma 20. Let A ∈ M+ 1,∞ and let ω be a dilation invariant generalised limit on L∞ (0, ∞). We have 1 1 1 1 ξω (A) = Γ 1 + ω τ A− EA , ∞ . (30) q log(1 + t) t t Proof. In view of Lemma 19, it is sufficient to show that right-hand sides of (28) and (30) coincide. This easily follows from the following computation, where we use integration by parts t 1 1 1 ds 1 1 1 = M dA dA = dA (u) du t t log(t) s s2 log(t)
1
1/t
1 1 udA (u)|11/t − = log(t) log(t)
1 u ddA (u) 1/t
1 1 1 τ A− EA , ∞ + o(1). = log(t) t t
2
Lemma 21. Let ω be a dilation invariant generalised limit on L∞ (0, ∞) and let A, B ∈ M+ 1,∞ be such that B ≺≺ A. We have ξω (B) ξω (A). Proof. The assertion follows from Lemma 20 and Theorem 4.
2
The following is the main result of this section. Theorem 22. For any dilation invariant generalised limit ω on L∞ (0, ∞), the functional ξω given by (25) is linear and fully symmetric on M1,∞ . Proof. The assertion follows from Lemma 21 provided we have shown that ξω (A + B) = ξω (A) + ξω (B),
∀A, B ∈ M+ 1,∞ .
(31)
To this end, we observe first that since ω and ω ◦ M are dilation invariant, it follows from Lemma 21 and (15) that ξω (A + B) = ξω μ(A) + μ(B) ,
∀A, B ∈ M+ 1,∞ .
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2467
Now, let C and D be disjoint copies of A and B (see Section 2). Thus, we have ξω (C + D) = ξω μ(C) + μ(D) = ξω μ(A) + μ(B) = ξω (A + B). However, the equality ξω (C + D) = ξω (C) + ξω (D) for positive operators C and D such that CD = 0 follows immediately from the definition (24). Since the equalities ξω (A) = ξω (C), ξω (B) = ξω (D) are obvious, we arrive at (31). 2 6. Every fully symmetric functional has form ξω It follows from Theorems 22 and 1 that the functional ξω is a fully symmetric functional on M1,∞ whenever ω is a dilation invariant generalised limit ω on L∞ (0, ∞). In this section, we show the converse. Define a (non-linear) operator T : M+ 1,∞ → L∞ (0, ∞) by the formula (T A)(t) =
1 τ log(1 + t)
A−
1 1 EA , ∞ , t t
t > 0.
(32)
We need some properties of the operator T . Firstly, we show that it is additive on certain pairs of A, B ∈ M+ 1,∞ . Lemma 23. Let A, B ∈ M+ 1,∞ be such that AB = BA = 0. It follows that T (A+B) = T A+T B. Proof. It follows immediately from the assumption that 1 1 1 1 1 1 A+B − EA+B ,∞ = A − EA , ∞ + B − EB ,∞ . t t t t t t
2
Next, we explain the connection of the operator T with fully symmetric functionals on M1,∞ . Lemma 24. Let the operators A, B ∈ M+ 1,∞ be such that T B T A. For every fully symmetric functional ϕ on M1,∞ , we have ϕ(B) ϕ(A). Proof. It follows immediately from the definition (32) that τ
1 1 1 1 EB ,∞ τ A− EA , ∞ , B− t t t t
Applying Theorem 4 we obtain B ≺≺ A and so ϕ(B) ϕ(A).
∀t > 0.
2
Lemma 25. Let A, B ∈ M+ 1,∞ . For every fully symmetric functional ϕ on M1,∞ , we have ϕ(B) − ϕ(A) ϕM∗1,∞ lim sup(T B − T A)(t). t→∞
2468
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Proof. Without loss of generality, ϕM∗1,∞ = 1. Denote the right-hand side by c and suppose that c 0 (the case when c < 0 is treated similarly). Fix ε > 0. We have (T B − T A)(t) c + ε for all sufficiently large t. Let C be an operator with μ(t, C) = (c + 2ε)/(1 + t). We have T B T A + T C for all sufficiently large t. Let A1 and C1 be disjoint copies of A and C, respectively. It follows from Lemma 23 that T B(t) T (A1 + C1 )(t) for all sufficiently large t. Choose 0 < δ small enough to guarantee T B1 (t) T (A1 + C1 )(t) for all t > 0, where B1 := min{B, δ}. By Lemma 24, we have ϕ(B1 ) ϕ(A1 ) + ϕ(C1 ), or equivalently ϕ(B) ϕ(A) + c + 2ε. Since ε is arbitrarily small, we are done. 2 Lemma 26. Let A1 , . . . , An ∈ M+ 1,∞ and let λ1 , . . . , λn ∈ R for some n 1. For every fully symmetric functional ϕ on M1,∞ we have n
λk ϕ(Ak ) lim sup
n
t→∞
k=1
λk (T Ak )(t).
(33)
k=1
Proof. Both sides of the inequality (33) depend continuously on the λk ’s. Without loss of generality, we may assume that all λk ∈ Q. Multiplying both sides by the common denominator, we may assume that all λk ∈ Z. Writing
λk Ak =
|λk |
sgn(λk )Ak
k=1
we see that it is sufficient to prove (33) only for the case when λk = ±1 for every k. Let {Bk } be a disjoint copy sequence of {Ak }. Both sides of the inequality (33) do not change if we replace Ak with Bk . Without loss of generality, the operators Ak Aj = 0, k = j . By Lemma 25 we have n
λk ϕ(Ak ) = ϕ
Ak − ϕ
λk =1
k=1
Ak
λk =−1
lim sup T Ak − T Ak (t). t→∞
λk =1
λk =−1
Since Ak Aj = 0 for all k = j , we have by Lemma 23 that
T
λk =1
and the assertion follows.
n Ak − T Ak = λk T Ak λk =−1
k=1
2
b Lemma 27. Let E be the linear span of T M+ 1,∞ and C0 (0, ∞). For every s > 0 we have σs E = E.
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2469
Proof. It follows from the definition (32) that for every s > 0, we have σs T A ∈ sT s −1 A + C0b (0, ∞),
∀A ∈ M+ 1,∞ .
2
(34)
Let ϕ be a normalised fully symmetric functional on M1,∞ . We need the following linear functional on E. Definition 28. For every z ∈ E such that z∈
n
λk T Ak + C0∞ (0, ∞)
k=1
we set ρ(z) =
n
λk ϕ(Ak ).
k=1
That ρ is well defined is proved below. Lemma 29. The linear functional ρ : E → R is well defined. For every z ∈ E, we have ρ(z) lim sup z(t). t→∞
Proof. Let z ∈ E be such that z∈
n
λk T Ak + C0b (0, ∞),
z∈
k=1
m
μk T Bk + C0b (0, ∞).
k=1
We have n
λk T Ak −
k=1
m
μk T Bk ∈ C0b (0, ∞).
k=1
It follows from Lemma 26 that n k=1
λk ϕ(Ak ) =
m
μk ϕ(Bk ),
k=1
so that ρ is well defined. The second assertion directly follows from Lemma 26.
2
Lemma 30. Let ϕ be a normalised fully symmetric functional on M1,∞ . There exists a dilation invariant generalised limit ω on L∞ (0, ∞) such that ϕ(A) = ω(T A) for every A ∈ M+ 1,∞ .
2470
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Proof. For every A ∈ M+ 1,∞ , we have Def. 28 −1 (34) ρ(σs T A) = ρ sT s −1 A = sϕ s A = ρ(T A). Therefore, ρ is σs -invariant on E. It follows from Lemma 29 that ρ(z) lim sup z(t), t→∞
z ∈ E.
By the invariant form of the Hahn–Banach theorem (see [13, p. 157]) applied to the group of dilations {σs }s>0 , we can extend ρ to a dilation invariant generalised limit on L∞ (0, ∞). 2 The following assertion is the main result of this section. It permits representation of a fully symmetric functional ϕ via heat kernel formulae. Theorem 31. Let ϕ be a fully symmetric functional on M1,∞ . There exists a dilation invariant generalised limit ω on L∞ (0, ∞) such that ϕ = const · ξω . Proof. It follows from Lemma 30 that there exists a dilation invariant generalised limit ω such that 1 1 1 τ A− . ϕ(A) = ω EA , ∞ log(1 + t) t t The assertion follows now from Lemma 20.
2
7. A counterexample It is known (see [23, Theorem 33] and the more general result in Corollary 51 below) that the equality 1 ξω (A) = Γ 1 + τω (A), q
A ∈ M+ 1,∞ ,
holds for every M-invariant generalised limit ω on L∞ (0, ∞) (see also earlier results with more restrictive assumptions on ω in [5, Theorem 4.1] and [6, Theorem 5.2]). In view of Theorems 31 and 1, it is quite natural to ask whether the equality above holds for every dilation invariant generalised limit ω. In this section we prove that this is not the case. Lemma 32. Let ω be a dilation invariant generalised limit on L∞ (0, ∞). For every s > 1, we have (35) χ[eek ,seek ) = 0, ω ω
k
k
χ(ek+ek /s,ek+ek ] = 0.
(36)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2471
Proof. Denote the left-hand side of (35) by f (s). Due to the dilation invariance of ω, we have f (s) = ω
χ[teek ,steek ) = f (st) − f (t),
s, t > 1.
k
Since f is monotone and bounded, we have f = 0. Denote the left-hand side of (36) by g(s). Due to the dilation invariance of ω, we have g(s) = ω
χ(ek+ek /st,ek+ek /t] = g(st) − g(t),
s, t > 1.
k
Since g is monotone and bounded, we have g = 0.
2
Lemma 33. Let ω be a dilation invariant generalised limit on L∞ (0, ∞). We have (i) ω
k
t −ek e χ[ek−1+ek−1 ,ek+ek ] (t) = 0. log(t)
(ii) ω
k
1 k ek+e χ[eek ,eek+1 ] (t) = 0. t log(t)
Proof. We only prove the first assertion. Proof of the second one is similar. Fix s > 1. We have t 2 k k e−e + 2e−e /2 , log(t) s
k
∀t ek+e /s, ∀k 1
and, therefore, k
t 2 k e−e χ[ek−1+ek−1 ,ek+ek ] (t) + χ[ek+ek /s,ek+ek ] (t) log(t) s k k e−e /2 χ[ek−1+ek−1 ,ek+ek ] (t). +2 k
Clearly, ω
k
e−e
k /2
χ[ek−1+ek−1 ,ek+ek ] (t) = 0.
2472
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
It follows from Lemma 32 that ω
k
t 2 −ek e χ[ek−1+ek−1 ,ek+ek ] (t) . log(t) s
Since s is arbitrarily large, we have
ω
k
t k e−e χ[ek−1+ek−1 ,ek+ek ] (t) = 0. log(t)
2
Lemma 34. There exists a dilation invariant generalised limit ω on L∞ (0, ∞) such that ω
χ[eek ,ek+ek ) = 1,
ω
k
χ[ek+ek ,eek+1 ) = 0.
k
Proof. Define a positive, homogeneous functional π on L∞ (0, ∞) by the formula 1 π(x) = lim sup log log(N ) N →∞
N log(N )
x(s)
ds . s
N
It is verified in [23, Lemma 4] that every ω ∈ L∞ (0, ∞)∗ satisfying ω π is dilation invariant. Observing that
π
χ[eek ,ek+ek ) = 1,
k
let us select ω ∈ L∞ (0, ∞)∗ satisfying ω π and such that ω
χ[eek ,ek+ek ) = 1.
k
Therefore,
ω
χ[ek+ek ,eek+1 ) = 1 − ω χ[eek ,ek+ek ) = 0.
k
2
k
Define a function x by the formula x = sup e−e χ[0,ek+ek ] . k
k∈N
(37)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Fix k 1. For every t ∈ [ek−1+e 1 log(1 + t)
k−1
2473
k
, ek+e ], we have
t
ek+e
x(s) ds e
x(s) ds e
1−k
0
k
1−k
k
e−e · en+e n
n
n=1
0
e2 , e−1
which guarantees x ∈ M1,∞ . Lemma 35. Let x be as in (37) and let ω be as in Lemma 34. We have τω (x) = (e − 1)−1 . Proof. Fix t ∈ [ek−1+e
k−1
k
, ek+e ]. We have t x(u) du = 0
ek k + te−e + O(1). e−1
It follows that τω (x) = (e − 1)−1 ω +ω
k
k
t log(t)
ek χ[ek−1+ek−1 ,ek+ek ] (t) log(t) −ek e χ[ek−1+ek−1 ,ek+ek ] (t) .
By Lemma 33, the second generalised limit above vanishes. We claim that the first generalised limit above is 1. Indeed, k
ek χ[ek−1+ek−1 ,ek+ek ] (t) 1 + o(1) χ[eek ,ek+ek ] (t) log(t) k
and k
ek χ[ek−1+ek−1 ,ek+ek ] (t) χ[eek ,ek+ek ] (t) + e χ[ek−1+ek−1 ,eek ] . log(t) k
The claim follows from Lemma 34.
k
2
Lemma 36. Let x be as in (37) and let ω be as in Lemma 34. We have 1 e ξω (x) = Γ 1+ . e−1 q k
Proof. Fix t ∈ [ee , ee
k+1
). We have
x>1/t
1 1 ek+1 k − ek+e + O(1). x(u) − du = t e−1 t
2474
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
This estimate and Lemma 20 yield k 1 e e ξω (x) = ω χ[eek ,eek+1 ] (t) Γ (1 + 1/q) e−1 log(t) k 1 k+ek χ[eek ,eek+1 ] (t) . −ω e t log(t) k
It follows from Lemma 33 that the second generalised limit is 0. We claim that the first generalised limit is 1. Indeed, k
ek χ[eek ,eek+1 ] (t) 1 + o(1) χ[eek ,ek+ek ] log(t) k
and k
The claim follows from Lemma 34.
ek χ k k+1 (t) 1. log(t) [ee ,ee ] 2
The following theorem delivers the promised counterexample. Theorem 37. There exist A ∈ M1,∞ and dilation invariant generalised limit ω on L∞ (0, ∞) such that 1 τω (A) < ξω (A). Γ 1+ q Proof. For brevity, we assume that the von Neumann algebra N is of type II (the argument can be easily adjusted when N is of type I ). Let x be as in (37) and let A ∈ M+ 1,∞ be such that x = μ(A). The assertion follows from Lemmas 35 and 36. 2 8. Correctness of the definition for generalised heat kernel formulae Let ω be a dilation invariant generalised limit on L∞ (0, ∞) and let B ∈ N . Following [1], we consider the functionals on M+ 1,∞ defined by the formula 1 ξω,B,f (A) = (ω ◦ M) t → τ f (tA)B . t The main result of this section, Theorem 40, shows that the function 1 M t → τ f (tA)B t is bounded, and so the formula (38) is well defined.
(38)
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2475
2 −1 log(t)) as t → ∞. Lemma 38. Let A ∈ M+ 1,∞ . We have τ (A EA [0, 1/t]) = O(t
Proof. Let c := A1,∞ . We have μ(s, A) ≺≺ c(1 + s)−1 . Fix t > 0. Define decreasing function xt ∈ M1,∞ (0, ∞) by setting xt (s) =
log(1+ct log(t)) , t log(t) c 1+s ,
0 s ct log(t), s > ct log(t).
Define a decreasing function yt ∈ M1,∞ (0, ∞) by setting 1 yt (s) = μ(A)χ{μ(A)1/t} (s) + χ{μ(A)1/t} (s), t
s > 0.
We claim that yt ≺≺ xt . Indeed, yt (s) 1/t xt (s) for s ct log(t) and s
s yt (u) du c
0
0
du = 1+u
s xt (u) du 0
for s > ct log(t). It follows that
2
τ A EA
1 0, t
∞
∞ yt2 (s) ds
0
xt2 (s) ds. 0
We have ∞ xt2 (s) ds
c log2 (1 + ct log(t)) + = t log(t)
0
∞
ct log(t)
c2 log(t) . ds 5c t (1 + s)2
2
Lemma 39. Let f (t) = t 2 χ[0,1] (t) and let A ∈ M+ 1,∞ . We have t →M
1 τ f (tA) ∈ L∞ (0, ∞). t
Proof. For fixed t > 0, we have t t 1 1 1 1 1 2 2 M τ f (tA) = τ A EA 0, EA 0, ds = τ A ds . t log(t) s log(t) s
1
1
2476
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Integrating by parts, we obtain
t EA 1
t 1 1 1 t 1 1 t 1 −1 ds = sEA 0, − s dEA 0, = sEA 0, + u dEA , u 0, s s 1 s s 1 t 1
= O(1) + A−1 EA
1 1 , ∞ + tEA 0, . t t
1/t
Therefore,
1 1 1 1 t 1 2 M τ f (tA) = τ AEA , ∞ + τ A EA 0, +O . t log(t) t log(t) t log(t) It follows from the definitions of · 1,∞ and dA (·) that for every A ∈ M1,∞ and every t > 0, we have
1 max 1, A1,∞ log(1 + t). dA t Clearly, 1 1 1 τ AEA 0, = log(t) t log(t)
dA(1/t)
μ(s, A) ds
log(dA (1/t)) A1,∞ ∈ L∞ . log(t)
0
The assertion follows now from Lemma 38.
2
Theorem 40. Let a bounded function f ∈ C 2 [0, ∞) be such that f (0) = f (0) = 0. Let A ∈ M+ 1,∞ and let B ∈ N . We have 1 M t → τ f (tA)B ∈ L∞ (0, ∞). t Proof. Due to the well-known inequality τ (CB) τ (|C|)B, it suffices to prove the theorem only when B = 1. In this case, for the function f (t) := t 2 χ[0,1] (t), the assertion follows from Lemma 39. If f (t) := χ(1,∞) (t) then it holds trivially. Thus, it holds for the function f (t) := min{1, t 2 }. Finally, observe that the assumptions on f guarantee that there exists a constant c > 0 such that |f (t)| c min{1, t 2 }. 2 Since the function t → exp(−t −q ) satisfies the assumptions of Theorem 40 we obtain the following corollary, which was implicitly proved in [6, Theorem 5.2]. Corollary 41. For every q > 0 and every A ∈ M+ 1,∞ , we have 1 −q ∈ L∞ (0, ∞). M t → τ exp −(tA) t
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2477
9. Reduction theorem for generalised heat kernel formulae The results of this section extend and generalise those of [5, Theorem 4.1] and [6, Theorem 5.2]. We also give an answer to the question asked in [1, p. 52]. We explicitly prove that the functional ξω,B,f (extended to M1,∞ as in (25)) is linear on M1,∞ . Lemma 42. Let f ∈ C 2 [0, ∞) be such that f (0) = f (0) = 0. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞), we have ε 1 B = 0. lim (ω ◦ M) τ f tAEA 0, ε→0 t t Proof. Since |f (t)| const · t 2 for t ∈ [0, 1], it is sufficient to prove the assertion for f (t) = t 2 . As in the proof of Theorem 40, it is sufficient to assume that B = 1. By Theorem 40, for every ε > 0 we have ε 2 1 ∈ L∞ (0, ∞). M t → τ tAEA 0, t t Since ω is dilation invariant, we conclude 1 ε 2 1 1 2 (ω ◦ M) τ tAEA 0, = ε(ω ◦ M) τ tAEA 0, . t t t t The assertion follows immediately.
2
Lemma 43. Let f ∈ L∞ (0, ∞) be such that f (0) = 0. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞), we have 1 1 ,∞ B = 0. lim (ω ◦ M) τ f tAEA ε→0 t εt Proof. As before, we may assume that B = 1. It is clear that 1 1 f tAEA ,∞ f EA ,∞ . εt εt Since ω ◦ M is dilation invariant, we obtain 1 1 1 1 (ω ◦ M) τ EA ,∞ = ε(ω ◦ M) dA . t εt t t The assertion follows immediately.
2
2478
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
Lemma 44. Let f : R+ → R be monotone on [a, b] and such that f (0) = 0. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) we have
b 1 1 a b 1 ds (ω ◦ M) τ f tAEA , f (s) 2 · (ω ◦ M) τ EA , ∞ B . B = t t t t t s a
Proof. Without loss of generality, we may assume that f is increasing on [a, b] and that B 0. Let a = a0 a1 a2 · · · an = b. For every given t > 0, we have EA
a b , t t
=
n−1
EA
k=0
ak ak+1 , . t t
Since f is increasing on [a, b] and f (0) = 0, we have f (ak )EA
ak ak+1 , t t
ak ak+1 ak ak+1 f tAEA , f (ak+1 )EA , . t t t t
Therefore, n−1 1 a b ak ak+1 1 (ω ◦ M) τ f tAEA , B B f (ak+1 )(ω ◦ M) τ EA , t t t t t t k=0
and n−1 1 1 a b ak ak+1 , (ω ◦ M) τ f tAEA , f (ak )(ω ◦ M) τ EA B B . t t t t t t k=0
We have EA
ak ak+1 , t t
= EA
ak ak+1 , ∞ − EA ,∞ . t t
For all c > 0, we have 1 c 1 1 −1 (ω ◦ M) τ EA , ∞ B = c (ω ◦ M) τ EA , ∞ B . t t t t Therefore, 1 ak ak+1 1 1 1 1 (ω ◦ M) τ EA , − (ω ◦ M) τ EA , ∞ B . B = t t t ak ak+1 t t
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2479
Hence, n−1
1 1 1 1 f (ak ) − (ω ◦ M) τ EA , ∞ B ak ak+1 t t k=0 a b 1 B (ω ◦ M) τ f tAEA , t t t n−1 1 1 1 1 f (ak+1 ) − (ω ◦ M) τ EA , ∞ B . ak ak+1 t t k=0
Both coefficients in the latter formula tend to
b a
f (s)s −2 ds.
2
Lemma 45. Let a bounded function f ∈ C 2 [0, ∞) be such that f (0) = f (0) = 0. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) we have ∞ ξω,B,f (A) =
1 ds 1 f (s) 2 (ω ◦ M) τ EA , ∞ B . t t s
0
Proof. Let f satisfy the assumptions above. Observe that the assertion of Lemma 44 holds for the function f |[a,b] , where 0 < a < b < ∞. Indeed, every such function is a function of bounded variation and therefore may be written as a difference of two monotone functions. Now the assertion follows from Lemmas 42, 43, 44 by setting a := ε and b := ε −1 and letting ε → 0. 2 Corollary 46. Let a bounded function f ∈ C 2 [0, ∞) be such that f (0) = f (0) = 0. Let A ∈ + M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) we have ∞ ξω,B,f (A) = 0
1 1 ds 1 τ A− EA , ∞ B . f (s) 2 ω log(1 + t) t t s
Proof. It follows from the definition of Cesaro operator M that t 1 1 1 1 ds M t → τ EA , ∞ B = τ EA , ∞ B 2 . t t log(t) s s 1
Integrating by parts, we obtain 1 log(t)
t 1 ds τ EA , ∞ B 2 s s 1
1 = log(t)
1 1/t
τ EA (u, ∞)B du
2480
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
1
1 1 1 = · uτ EA (u, ∞)B 1/t − log(t) log(t)
udτ EA (u, ∞)B
1/t
∞
1 −1 −1 · τ EA , ∞ B + τ u dEA (u, ∞)B + o(1). = t log(t) t log(t) 1/t
Evidently, ∞ −τ
1 u dEA (u, ∞)B = τ AEA , ∞ B . t
1/t
Therefore, 1 1 1 1 1 M t → τ EA , ∞ B = τ A− EA , ∞ B + o(1). t t log(t) t t The assertion follows now from Lemma 45.
2
The first assertion in lemma below can be found in [3, Theorem 11]. For the second assertion we refer to [2, Theorem 3.5]. Lemma 47. Let A, B ∈ B + (H ) and let f be convex continuous function such that f (0) = 0. We have (i) τ (B 1/2 f (A)B 1/2 ) τ (f (B 1/2 AB 1/2 )) if B 1. (ii) τ (B 1/2 f (A)B 1/2 ) τ (f (B 1/2 AB 1/2 )) if B 1. We show in the following lemma that ξω,B,f depends continuously on B. Lemma 48. If A ∈ M+ 1,∞ and let Bn , B ∈ N , n 1, then ξω,B (A) − ξω,B (A) ξω (A) · Bn − B. n Proof. The assertion follows from the inequality τ f (tA)Bn − τ f (tA)B τ f (tA) · Bn − B.
2
The following theorem extends the results of [5,6] and gives an affirmative answer to the question stated in [1]. It also shows that the functionals ξω,B,f (·) are linear functionals on M1,∞ for a wide class of functions f .
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
2481
Theorem 49. Let a bounded function f ∈ C 2 [0, ∞) be such that f (0) = f (0) = 0. Let A ∈ M1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) we have 1 ξω,B,f (A) = Γ (1 + 1/q)
∞
ds f (s) 2 ξω (AB). s
(39)
0
Proof. It follows from Theorem 22 that ξω is linear and fully symmetric. By Theorem 1 and (17), we have ξω (B 1/2 AB 1/2 ) = ξω (AB). Recall that function u → (u − 1/t)+ is convex. It follows from Lemma 47 that (i) τ ((A − 1t )+ B) τ ((B 1/2 AB 1/2 − 1t )+ ) if B 1. (ii) τ ((A − 1t )+ B) τ ((B 1/2 AB 1/2 − 1t )+ ) if B 1. It follows from Corollary 46 that for 0 B 1 we have 1 ξω,B,f (A) Γ (1 + 1/q)
∞
ds f (s) 2 ξω B 1/2 AB 1/2 . s
(40)
0
Since both sides are homogeneous, the inequality (40) is valid for every B. It follows from 46 that for B 1 we have 1 ξω,B,f (A) Γ (1 + 1/q)
∞
ds f (s) 2 ξω B 1/2 AB 1/2 . s
(41)
0
Since both sides are homogeneous, the inequality (41) is valid if B is bounded from below by a strictly positive constant. Thus, we have the equality (39) valid for every B bounded from below by a strictly positive constant. Set Bn = BEB (1/n, ∞) + 1/nEB [0, 1/n]. It follows that equality (39) holds with B replaced with Bn throughout. By Lemma 48, we have ξω,Bn ,f (A) → ξω,B,f (A). Since ABn → AB in M1,∞ and since ξω is bounded on M1,∞ , we have ξω (ABn ) → ξω (AB). The assertion follows immediately. 2 The following corollary treats the case of classical heat kernel formulae. We use the notation 1 ξω,B (A) = (ω ◦ M) τ exp −(tA)−q B . t Corollary 50. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) we have ξω,B (A) = ξω (AB). Proof. Use f (t) = exp(−t −q ) in Theorem 49 and observe that ∞ f (s) 0
ds 1 = Γ 1 + . q s2
2
2482
F. Sukochev, D. Zanin / Journal of Functional Analysis 260 (2011) 2451–2482
The following assertion extends [23, Theorem 33]. Corollary 51. Let A ∈ M+ 1,∞ and let B ∈ N . For every dilation invariant generalised limit ω on L∞ (0, ∞) such that ω = ω ◦ M, we have 1 ξω,B (A) = Γ 1 + τω (AB). q References [1] M. Benameur, T. Fack, Type II noncommutative geometry. I. Dixmier trace in von Neumann algebras, Adv. Math. 199 (2006) 29–87. [2] J. Bourin, Convexity or concavity inequalities for Hermitian operators, Math. Inequal. Appl. 7 (4) (2004) 607–620. [3] L. Brown, H. Kosaki, Jensen’s inequality in semi-finite von Neumann algebras, J. Operator Theory 23 (1) (1990) 3–19. [4] A.L. Carey, V. Gayral, A. Rennie, F. Sukochev, Integration on locally compact noncommutative spaces, arXiv: 0912.2817v1. [5] A. Carey, J. Phillips, F. Sukochev, Spectral flow and Dixmier traces, Adv. Math. 173 (1) (2003) 68–113. [6] A. Carey, A. Rennie, A. Sedaev, F. Sukochev, The Dixmier trace and asymptotics of zeta functions, J. Funct. Anal. 249 (2) (2007) 253–283. [7] A. Carey, F. Sukochev, Dixmier traces and some applications to noncommutative geometry, Uspekhi Mat. Nauk 61 (6(372)) (2006) 45–110 (in Russian); English translation in: Russian Math. Surveys 61 (6) (2006) 1039– 1099. [8] A. Connes, Noncommutative Geometry, Academic Press, San Diego, 1994. [9] J. Dixmier, Existence de traces non normales, C. R. Acad. Sci. Paris 262 (1966) A1107–A1108. [10] P. Dodds, B. de Pagter, A. Sedaev, E. Semenov, F. Sukochev, Singular symmetric functionals, Zap. Nauchn. Sem. S.-Peterburg. Otdel. Mat. Inst. Steklov. (POMI) 290 (2002), Issled. po Linein. Oper. i Teor. Funkts. 30, 42–71 (in Russian); English translation in: J. Math. Sci. (N. Y.) 124 (2) (2004) 4867–4885. [11] P. Dodds, B. de Pagter, A. Sedaev, E. Semenov, F. Sukochev, Singular symmetric functionals with additional invariance properties, Izv. Ross. Akad. Nauk Ser. Mat. 67 (6) (2003) 111–136 (in Russian); English translation in: Izv. Math. 67 (2003) 1187–1213. [12] P. Dodds, B. de Pagter, E. Semenov, F. Sukochev, Symmetric functionals and singular traces, Positivity 2 (1) (1998) 47–75. [13] R. Edwards, Functional Analysis, Holt, Rinehart and Winston, New York, 1965. [14] T. Fack, H. Kosaki, Generalized s-numbers of τ -measurable operators, Pacific J. Math. 123 (2) (1986) 269–300. [15] I. Gohberg, M. Krein, Introduction to the Theory of Linear Nonselfadjoint Operators, Transl. Math. Monogr., vol. 18, American Mathematical Society, Providence, RI, 1969. [16] N. Kalton, A. Sedaev, F. Sukochev, Fully symmetric functionals on a Marcinkiewicz space are Dixmier traces, Adv. Math., in press. [17] N. Kalton, F. Sukochev, Rearrangement-invariant functionals with applications to traces on symmetrically normed ideals, Canad. Math. Bull. 51 (2008) 67–80. [18] L.S. Koplienko, Trace formula for nontrace-class perturbations, Sibirsk. Mat. Zh. 25 (5) (1984) 62–71 (in Russian); English translation in: Sib. Math. J. 25 (5) (1984) 735–743. [19] S. Krein, Ju. Petunin, E. Semenov, Interpolation of Linear Operators, Nauka, Moscow, 1978 (in Russian); English translation in: Transl. Math. Monogr., vol. 54, American Mathematical Society, 1982. [20] F.J. Murray, J. von Neumann, On rings of operators, Ann. Math. 37 (1) (1936) 116–229. [21] A. Pietsch, About the Banach Envelope of l1,∞ , Rev. Mat. Complut. 22 (1) (2009) 209–226. [22] A. Sedaev, Generalized limits and related asymptotic formulas, Math. Notes 86 (4) (2009) 612–627. [23] A. Sedaev, F. Sukochev, D. Zanin, Lidskii-type formulae for Dixmier traces, Integral Equations Operator Theory, doi:10.1007/s00020-010-1828-1, in press, http://arxiv.org/pdf/1003.1817. [24] B. Simon, Trace Ideals and Their Applications, American Mathematical Society, 2005.
Journal of Functional Analysis 260 (2011) 2483–2496 www.elsevier.com/locate/jfa
Note
Perturbations and operator trace functions Walter D. van Suijlekom Institute for Mathematics, Astrophysics and Particle Physics, Radboud University Nijmegen, Heyendaalseweg 135, 6525 AJ Nijmegen, The Netherlands Received 4 August 2010; accepted 13 December 2010 Available online 22 December 2010 Communicated by Alain Connes
Abstract We study the spectral functional A → Tr f (D + A) for a suitable function f , a self-adjoint operator D having compact resolvent, and a certain class of bounded self-adjoint operators A. Such functionals were introduce by Chamseddine and Connes in the context of noncommutative geometry. Motivated by the physical applications of these functionals, we derive a Taylor expansion of them in terms of Gâteaux derivatives. This involves divided differences of f evaluated on the spectrum of D, as well as the matrix coefficients of A in an eigenbasis of D. This generalizes earlier results to infinite dimensions and to any number of derivatives. © 2010 Elsevier Inc. All rights reserved. Keywords: Noncommutative geometry; Perturbation theory
1. Introduction The spectral action in noncommutative geometry [4] is given as the trace Tr f (D) of a suitable function f (D) of an unbounded self-adjoint operator D, which is assumed to have compact resolvent. One is interested in this trace function as D is perturbed to D + A where A is a certain self-adjoint bounded operator. For instance, the so-called inner fluctuations of a spectral triple are of this type; they are central in the applications of noncommutative geometry to high-energy physics [1–3] (cf. also [6]). A natural question that arises is what happens to the trace function when D is perturbed to D + A. It is the goal of this paper to address this question. E-mail address: [email protected]. 0022-1236/$ – see front matter © 2010 Elsevier Inc. All rights reserved. doi:10.1016/j.jfa.2010.12.012
2484
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
We aim for a Taylor expansion of the spectral action by Gâteaux deriving it with respect to A. As we will see, the context of finite-dimensional noncommutative manifolds (i.e. spectral triples) allows for a derivation of results previously obtained only for finite-dimensional (matrix) algebras [13]. Our main result is the expansion: SD [A] =
∞ 1 n=0
n
Ai1 i2 · · · Ain i1 f [λi1 , . . . , λin ]
i1 ,...,in
where f [λi1 , . . . , λin ] is the divided difference of order n of f (cf. Definition 14 below) evaluated on the spectrum of D, and Aij are the matrix coefficients with respect to an eigenbasis of D. This paper is organized as follows. First, we recall in Section 2 some results on perturbations of operators, in the setting of noncommutative geometry. Then, we give a precise definition of the spectral action functional in Section 3. In that section, we also recall the definition of divided differences and derive our main result on the Taylor expansion of the spectral action. We end with some conclusions and an appendix recalling a theorem by Getzler and Szenes. 2. Perturbations and spectral triples Recall that a spectral triple consists of an algebra A of bounded operators on a Hilbert space H, together with a self-adjoint operator D with compact resolvent such that the commutator [D, a] is a bounded operator for all a ∈ A. The key example is associated to a compact Riemannian spin manifold M: ∞ ∂ , C (M), L2 (M, S), / ∂ is a Dirac operator on the spinor bundle S → M. Indeed, / ∂ is an elliptic differential where / operator of degree one and smooth functions satisfy [/ ∂ , f ] = f Lip < ∞ in the Lipschitz norm of f . In general, a spectral triple (A, H, D) is said to be of finite summability if there exists an n 0 such that (1 + D 2 )−n/2 is a traceclass operator on H. Let us start with a basic and well-known result. Lemma 1. Let p be a polynomial on R. Then for any t > 0 the operator p(D)e−tD is traceclass. 2
Proof. By finite summability and Hölder’s inequality (1 + D 2 )−n/2 is traceclass for some n. Thus, −n/2 2 p(D)e−tD = ϕ(D) 1 + D 2 with ϕ defined by functional calculus for the function −n/2 −tx 2 e . ϕ(x) = p(x) 1 + x 2
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2485
For t > 0, this is a bounded function on R so that ϕ(D)(1 + D 2 )−n/2 is in the ideal L1 (H) of traceclass operators as required. 2 In particular, this applies to p(x) = 1, i.e. finite summability implies so-called θ -summability: 2 Tr e−tD < ∞ (t ∈ R+ ).
(1)
2.1. Fréchet algebra of smooth operators Given the derivation δ(·) = [|D|, ·] on B(H), there is a natural structure of a Fréchet algebra on the smooth domain of δ. Proposition 2. The following define a multiplicative family of semi-norms on B(H): n δ (T )
T ∈ B(H)
indexed by n ∈ Z0 . Proof. The derivation property of δ yields n n n n k n n−k δ (T1 T2 ) = δk (T1 )δn−k (T2 ). δ (T1 )δ (T2 ) k k k=0
2
k=0
We will denote B n (H) = T ∈ B(H): δ k (T ) < ∞ for all k n . Evidently, we have B ∞ (H) ⊂ · · · ⊂ B 2 (H) ⊂ B 1 (H) ⊂ B(H) where by definition B ∞ (H) =
n∈Z0
B n (H).
Remark 3. Recall that a spectral triple (A, H, D) is called regular if both the algebra A and [D, A] are in the smooth domain of δ. This can thus be reformulated as: the algebra generated by a and [D, b] (a, b ∈ A) is a subalgebra of B ∞ (H). In particular, the A-bimodule of Connes’ differential one-forms [4, Sect. VI.1], 1 (A) = ΩD
j
is a subspace of B ∞ (H).
aj [D, bj ]
2486
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2.2. Perturbations of heat operators In this subsection, we take a closer look at the heat operator e−tD and its perturbations. First, recall that the standard m-simplex is given by an m-tuple (t1 , . . . , tm ) satisfying 0 t1 · · · tm 1. Equivalently, it can be given by an m + 1-tuple (s0 , s1 , . . . , sm ) such that s0 + · · · + sm = 1 and 0 si 1 for any i = 0, . . . , m. Indeed, we have s0 = t1 , si = ti+1 − ti and sm = 1 − tm and, vice versa, tk = s0 + s1 + · · · + sk−1 . For later use, we prove the following bound, which already appeared in a slightly different form in [10]. 2
Proposition 4. For any m 0 and 0 k m + 1 we have the bound
d m s(s0 · · · sk−1 )−1/2
m
πk . (m − k)!
Proof. In terms of the parameters ti for the m-simplex, we have to find an upper bound for
1
tm
dt1
dtm−1 · · ·
dtm 0
t2
0
0
1 t1 (t2 − t1 ) · · · (tk − tk−1 )
,
where tm+1 ≡ 1. First, note that by a standard substitution
t2 0
1 = π. dt1 √ t1 (t2 − t1 )
For the subsequent integral over t2 :
t3 0
1 dt2 √ t3 − t2
t3 dt2 √ 0
1 =π t2 (t3 − t2 )
since t2 1. This we can repeat k times, leaving us with the integral
1
tm dtm
0
tk+1 dtm−1 · · · dtk =
0
0
1 . (m − k)!
2
Lemma 5. Let A be a bounded operator and denote DA = D + A. Then
e
−t (DA )2
=e
−tD 2
1 −t 0
with P (A) = DA + AD + A2 .
ds e−st (DA ) P (A)e−(1−s)tD 2
2
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2487
Proof. Note that e−tDA is the unique solution of the Cauchy problem 2
(dt + DA )u(t) = 0, u(0) = 1
with dt = d/dt. Using the fundamental theorem of calculus, we find that dt e
−tD 2
t −
2 −(t−t )DA
dt e
P (A)e
−t D 2
2 = −DA
e
−tD 2
t −
0
2 −(t−t )DA
dt e
P (A)e
−t D 2
0
showing that the bounded operator e−tD − Cauchy problem. 2 2
t 0
dt e−(t−t )DA P (A)e−t D also solves the above 2
2
The following estimates were proved in a slightly different form in [10]. Lemma 6. If the operators A, Ai are bounded, and αi ∈ {0, 1} are such that
i
αi = k, then
Tr A0 |DA |α0 e−s0 tDA2 A1 |D|α1 e−s1 tD 2 · · · An |D|αn e−sn tD 2 d n s n
A0 · · · An Tr e−(1−)tD (n − k)!(π −2 t)k/2
2
for any 0 < < 1. Proof. Recall Hölder’s inequality: Tr(T0 · · · Tn ) T0
s0−1
· · · Tn s −1
(2)
n
when s0 + · · · + sn = 1. Also, we estimate for some arbitrary 0 < < 1: Ai e−si tD 2
si−1
2 s 2 s Ai Tr e−tD i Ai Tr e−(1−)tD i ,
Ai |D|e−si tD 2 −1 Ai |D|e−si tD 2 Tr e−(1−)tD 2 si s i
2 s (si t)−1/2 Ai Tr e−(1−)tD i
writing e−stD = e−stD e−(1−)stD . We have used Lemma 1 and the fact that 2
2
−stD 2 e 1,
2
|D|e−stD 2 sup xe−stx 2 = (2est)−1/2 . x∈R+
Moreover, Theorem C in [10] (cf. Appendix A) gives Tr e−t (1−/2)(DA ) e(1+2/)tA Tr e−t (1−)D . 2
2
2
(∗)
2488
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
This further yields A0 |DA |e−s0 tDA2
s0−1
2 2 s A0 |DA |e−/2si tDA Tr e−(1−/2)tDA i 2 2 s (es0 t)−1/2 e(1+2/)tA A0 Tr e−(1−)tD 0 .
Combining these estimates with (2), we obtain for instance in the case that the first k αi are nonzero (i.e. α0 = · · · = αk−1 = 1): Tr A0 |DA |α0 e−s0 tDA2 A1 |D|α1 e−s1 tD 2 · · · An |D|αn e−sn tD 2
A0 · · · An 2 Tr e−(1−)tD k/2 s0 · · · sk (t)
making use of the fact that s0 + s1 + · · · + sn = 1. The bounds of Proposition 4 complete the proof. 2 Let us introduce the following convenient notation (cf. [10]). If A0 , . . . , An are operators, we define a t-dependent quantity by
A0 , . . . , An n := t Tr n
A0 e−s0 tD A1 e−s1 tD · · · An e−sn tD d n s. 2
2
2
(3)
n
Note the difference in notation with [10], for which the same symbol is used for the supertrace of the same expression, rather than the trace. Also, we are integrating over the ‘inflated’ n-simplex tn , yielding the factor t n . The forms A0 , . . . , An satisfy, mutatis mutandis, the following properties. Lemma 7. (See [10].) In each of the following cases, we assume that the operators Ai are such that each term is well defined: 1. 2. 3. 4.
Ai , . . . , An , . . . , Ai−1 n ; A0 , . . . , An n = n , . . . , A
= A 0 n n i=0 1, . . . , Ai , . . . , An , A0 , . . . , Ai−1 n ; n i=0 A0 , . . . , [D, Ai ], . . . , An n = 0; A0 , . . . , [D 2 , Ai ], . . . , An n = A0 , . . . , Ai−1 Ai , , . . . , An n−1 − A0 , . . . , Ai Ai+1 , . . . , An n−1 .
2.3. Gâteaux derivatives As a preparation for the next section, we recall the notion of Gâteaux derivatives, referring to the excellent treatment [12] for more details. Definition 8. The Gâteaux derivative at x ∈ X of a map F : X → Y between locally convex topological vector spaces is defined for h ∈ X by F (x + uh) − F (x) . u→0 u
F (x)(h) = lim
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2489
In general, the map F (x)(·) is not linear, in contrast with the Fréchet derivative. However, if X and Y are Fréchet spaces, then the Gâteaux derivatives actually defines a linear map F (x)(·) for any x ∈ X [12, Theorem 3.2.5]. In this case, higher order derivatives are denoted as F , F et cetera, or more conveniently as F (k) for the k-th order derivative. The latter will be understood as a linear bounded operator from X × · · · × X (k + 1 copies) to Y . Theorem 9 (Taylor’s formula with integral remainder). For a Gâteaux k + 1-differentiable map F : X → Y between Fréchet spaces X and Y it holds for x, a ∈ X that F (x) = F (a) + F (a)(x − a) + +
1 F (a)(x − a, x − a) + · · · 2!
1 (k) F (a)(x − a, . . . , x − a) + Rk (x) n!
with integral remainder given by 1 Rk (x) = k!
1
F (k+1) a + t (x − a) (1 − t)h, . . . , (1 − t)h, h dt.
0
3. Trace functionals In this section, we consider trace functionals of the form A → Tr f (D + A). Here D is the self-adjoint operator forming a finitely summable spectral triple (A, H, D), and A is a bounded operator. We derive a Taylor expansion of this functional in A. Our main motivation comes from the spectral action principle introduced by Chamseddine and Connes [1,2] and we define accordingly Definition 10. (See Chamseddine and Connes [2].) The spectral action functional SD [A] is defined by A ∈ B(H) .
SD [A] = Tr f (D + A)
The square brackets indicate that SD [A] is considered as a functional of A ∈ B(H). Remark 11. Actually, Chamseddine and Connes considered SD [A] for so-called gauge fields 1 (A) which associated to the spectral triple (A, H, D). These are self-adjoint elements A in ΩD 2 by Remark 3 is a subset of B (H). For the function f we assume that it is a Laplace–Stieltjes transform:
f (x) = t>0
for which we make the additional:
e−tx dμ(t) 2
2490
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
Assumption 1. For all α > 0, β > 0, γ > 0 and 0 < 1, there exist constants Cαβγ such that
Tr t α |D|β e−t (D
2 −β)
dμ(t) < Cαβγ .
t>0
In view of Theorem 9, we have the following Taylor expansion (around 0) in A ∈ B 2 (H) for the spectral action SD [A]: ∞ 1 (n) S (0)(A, . . . , A). SD [A] = n! D
(4)
n=0
Indeed, SD is Fréchet differentiable on B 2 (H) as the following Proposition establishes. (n)
Proposition 12. If n = 0, 1, . . . and A ∈ B 2 (H), then SD (0)(A, . . . , A) exists and (n) (0)(A, . . . , A) = n! SD
n
1, (1 − ε1 ){D, A} + ε1 A2 , . . . ,
(−1)k
ε1 ,...,εk
k=0
(1 − εk ){D, A} + εk A2 k dμ(t), where the sum is over multi-indices (ε1 , . . . , εk ) ∈ {0, 1}k such that
k
i=1 (1 + εi ) = n.
Proof. We will prove this by induction on n; the case n = 0 being trivial. By definition of the Gâteaux derivative and using Lemma 5, (n+1) SD (0)(A, . . . , A) = n!
n k=0 ε1 ,...,εk
k (−1)k+1 1, (1 − ε1 ){D, A} + ε1 A2 , . . . , i=1
{D, A}, . . . , (1 − εk ){D, A} + εk A2 i
+
k+1
k (−1)k 1, (1 − ε1 ){D, A} + ε1 A2 , . . . , 2(1 − εi )A2 , . . . , i=1
(1 − εk ){D, A} + εk A2 k dμ(t). The first sum corresponds to a multi-index ε = (ε1 , . . . , εi−1 , 0, εi , . . . , εk ), the second sum corresponds to ε = (ε1 , . . . , εi + 1, . . . , εk ) if εi = 0, counted with a factor of 2. In both cases, we compute that j (1 + εj ) = n + 1. In other words, the induction step from n to n + 1 corresponds to inserting in a sequence of 0’s and 1’s (of, say, length k) either a zero at any of the k + 1 places, or replace a 0 by a 1 (with the latter counted twice). In orderto arrive at the right combinatorial coefficient (n + 1)!, we have to show that any ε satisfying i (1 + εi ) = n + 1 appears in precisely n + 1 ways from ε that satisfy i (1 + εi ) = n. If ε has length k, it contains n + 1 − k
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2491
times 1 as an entry and, consequently, 2k − n − 1 a 0. This gives (with the double counting for the 1’s) for the number of possible ε: 2(n + 1 − k) + 2k − n − 1 = n + 1 2
as claimed. This completes the proof. Example 13. (1) SD (0)(A) =
(2) SD (0)(A, A) = 2
− 1, {D, A} 1 dμ(t),
− 1, A2 1 + 1, {D, A}, {D, A} 2 dμ(t),
(3)
SD (0)(A, A, A) = 3!
1, A2 , {D, A} 2 + 1, {D, A}, A2 2
− 1, {D, A}, {D, A}, {D, A} 3 dμ(t). 3.1. Divided differences Recall the definition of and some basic results on divided differences. Definition 14. Let g : R → R and x0 , x1 , . . . , xn be distinct points on R. The divided difference of order n is defined by the recursive relations g[x0 ] = g(x0 ), g[x0 , x1 , . . . , xn ] =
g[x1 , . . . , xn ] − g[x0 , x1 , . . . , xn−1 ] . xn − x0
On coinciding points we extend this definition as the usual derivative: g[x0 , . . . , x, . . . , x, . . . , xn ] := lim g[x0 , . . . , x + u, . . . , x, . . . , xn ]. u→0
Finally, as a shorthand notation, we write for an index set I = {i1 , . . . , in }: g[xI ] = g[xi1 , . . . , xin ]. Also note the following useful representation due to Hermite [14]. Proposition 15. For any x0 , . . . , xn ∈ R:
f [x0 , x1 , . . . , xn ] = n
f (n) (s0 x0 + s1 x1 + · · · + sn xn ) d n s.
2492
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
As an easy consequence, we derive n
f [x0 , . . . , xi , xi , . . . , xn ] = f [x0 , x1 , . . . , xn ].
i=0
Proposition 16. For any x1 , . . . , xn ∈ R we have for f (x) = g(x 2 ): f [x0 , . . . , xn ] =
(xi + xi+1 ) g xI2
{i−1,i}⊂I
I
where the sum is over all ordered index sets I = {0 = i0 < i1 < · · · < ik = n} such that ij − ij −1 2 for all 1 j k (i.e. there are no gaps in I of length greater than 1). Proof. This follows from the chain rule for divided difference: if f = g ◦ ϕ, then [9] f [x0 , . . . , xn ] =
n
k−1 g ϕ(xi0 ), . . . , ϕ(xik ) ϕ[xij , . . . , xij +1 ].
k=1 0=i0
j =0
For ϕ(x) = x 2 we have ϕ[x, y] = x + y, ϕ[x, y, z] = 1 and all higher divided differences are zero. Thus, if ij +1 − ij > 2 then ϕ[xij , . . . , xij +1 ] = 0. In the remaining cases one has ϕ[xij , . . . , xij +1 ] =
xij + xij +1
if ij +1 − ij = 1,
1
if ij +1 − ij = 2,
and this selects in the above summation precisely the index sets I .
2
Example 17. For the first few terms, we have f [x0 , x1 ] = (x0 + x1 )g x02 , x12 ,
f [x0 , x1 , x2 ] = (x0 + x1 )(x1 + x2 )g x02 , x12 , x22 + g x02 , x22 , f [x0 , x1 , x2 , x3 ] = (x0 + x1 )(x1 + x2 )(x2 + x3 )g x02 , x12 , x22 , x32 + (x2 + x3 )g x02 , x22 , x32 + (x0 + x1 )g x02 , x12 , x32 . 3.2. Taylor expansion of the spectral action We fix a complete set of eigenvectors {ψn }n of D with respective eigenvalue λn ∈ R, forming an orthonormal basis for H. We also denote Amn := (ψm , Aψn ) so that m,n Amn |ψm )(ψn | converges to A in the weak operator topology. Theorem 18. If f satisfies Assumption 1 and A ∈ B 2 (H), then (n)
SD (0)(A, . . . , A) = n!
i1 ,...,in
Ain i1 Ai1 i2 · · · Ain−1 in f [λip , λi1 , . . . , λin ].
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2493
A similar result was obtained in finite dimensions in [13]. (n)
Proof. Proposition 12 gives us an expression for SD in terms of the brackets · · · . We compute for these: (−1)k 1, (1 − ε1 ){D, A} + ε1 A2 , . . . , (1 − εk ){D, A} + εk A2 k dμ(t)
k k 2 = (−1) (1 − εj )(λij −1 − λij )A + εj A i i i0 =ik , i1 ,...,ik
k
×e
−(s0 tλ2i +···+sk tλ2i )
=
k
0
i0 =ik , i1 ,...,ik
j −1 j
j =1
d k s dμ(t)
k (1 − εj )(λij −1 − λij )A + εj A2 i
j =1
j −1 ij
g λ2i0 , . . . , λ2ik .
Glancing back at Proposition 16 we are finished if we establish a one-to-one relation between the order index sets I = {0 = i0 < i1 < · · · < ik = n} such that ij −1 − ij 2 for all 1 j k and the multi-indices (ε1 , . . . , εk ) ∈ {0, 1}k such that ki=1 (1 + εi ) = n. If I is such an index set, we define a multi-index: εj =
0 if {ij − 1, ij } ⊂ I, 1 otherwise.
Indeed, then ij = ij −1 + 1 + εj so that k k (1 + εi ) = i0 + (1 + εi ) = ik = n. i=1
i=1
It is now clear that, vice-versa, if ε is as above, we define I = {0 = i0 < i1 < · · · < ik = n} by ij = ij −1 + 1 + εj and starting with i0 = 0. 2 Corollary 19. If n 0 and A ∈ B 2 (A), then (n)
SD (0)(A, . . . , A) = (n − 1)!
Ai1 i2 · · · Ain i1 f [λi1 , . . . , λin ].
i1 ,...,in
Consequently, SD [A] =
∞ 1 n=0
n
Ai1 i2 · · · Ain i1 f [λi1 , . . . , λin ].
i1 ,...,in
An interesting consequence is the following, which was obtained recently at first order for bounded operators [11].
2494
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
Corollary 20. If n 0 and A ∈ B 2 (A) and if f has compact support, then (n)
SD (0)(A, . . . , A) =
(n − 1)! Tr 2πi
f (z)A(z − D)−1 · · · A(z − D)−1 .
The contour integral encloses the intersection of the spectrum of D with supp f . Proof. This follows directly from Cauchy’s formula for divided differences (cf. [8, Ch. I.1]) g[x0 , . . . , xn ] =
1 2πi
with the contour enclosing the points xi .
g(z) dz (z − x0 ) · · · (z − xn )
2
4. Outlook We have obtained a Taylor expansion for the spectral action in noncommutative geometry. As such, it is natural to consider its quadratic part as the starting point for a free quantum field theory. Expectedly, this involves the usual nuances of a gauge theory such as gauge fixing, Gribov ambiguities, et cetera. Under the assumption of vanishing tadpole (1)
SD (A) = 0
A ∈ Ω 1 (A) ,
also exploited in [5], one indeed encounters a degeneracy in the quadratic part. In fact, in this (2) case SD (A, [D, a]) = 0 for all a ∈ A. This vanishing on pure gauge fields will be considered in more detail elsewhere. Once this issue has been dealt with, the higher derivatives of the spectral action account for interactions, allowing for a development of a perturbative quantization of the spectral action. Another application of the present work is to matrix models, as our Taylor expansion is very similar to Lagrangians encountered in matrix models. In fact, if the spectral triple is (MN (C), CN , D) with D a symmetric N × N -matrix, then the spectral action is exactly the hermitian one-matrix model (cf. [7]). An honest infinite-dimensional example might be provided by the spectral triples that are involved in Moyal deformations (see [15] and references therein). It would be interesting to apply the above results and develop a quantum theory for these models. Acknowledgments The author would like to thank Alain Connes and Dirk Kreimer for stimulating discussions. The Institut de Hautes Études Scientifique in Bures-sur-Yvette is thanked for providing a great scientific atmosphere during visits in 2009 and 2010. This work is part of the NWO VENI-project 639.031.827. Appendix A. A theorem by Getzler and Szenes In [10] Getzler and Szenes proof the following theorem. For completeness, we repeat it here (specified to our finitely-summable case).
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
2495
Theorem 21 (Getzler–Szenes). Let (A, H, D) be a finitely-summable spectral triple and V a self-adjoint bounded operator on H. Then (A, H, DV ) with DV = D + V is a finitely-summable spectral triple, and Tr e−(1−/2)t (DV ) e(1+2/)tV Tr e−(1−)tD 2
2
2
for any 0 < < 1 and t > 0. Proof. This follows from the fact that for two positive self-adjoint operator A and B we have Tr e−A−B Tr e−A .
(5)
Indeed, let A = (1 − )tD 2 ,
B = tD 2 /2 + (1 − /2)t DV + V D + V 2 + (1 + 2/)tV 2 , so that A + B = (1 − /2)(D + V )2 + (1 + 2/)V 2 . Obviously, A is positive. To see that B is positive, we use the fact that 0 tD 2 /2 + 2tV 2 / + t (DV + V D), √ √ which is just positivity of ( t/2D + 2t/V )2 . Combining this with V 2 V 2 and multiplying by the positive number (1 − /2) we obtain 0 (1 − /2) tD 2 /2 + 2tV 2 / + t (DV + V D) = B − 2 /4tD 2 − (1 − /2)tV 2 , ensuring positivity of B. Eq. (5) then implies Tr e−(1−/2)t (D as desired.
2 +DV +V D+V 2 )
e−(1+2/)tV Tr e−(1−)tD 2
2
2
References [1] A.H. Chamseddine, A. Connes, Universal formula for noncommutative geometry actions: Unifications of gravity and the standard model, Phys. Rev. Lett. 77 (1996) 4868–4871. [2] A.H. Chamseddine, A. Connes, The spectral action principle, Comm. Math. Phys. 186 (1997) 731–750. [3] A.H. Chamseddine, A. Connes, M. Marcolli, Gravity and the standard model with neutrino mixing, Adv. Theor. Math. Phys. 11 (2007) 991–1089. [4] A. Connes, Noncommutative Geometry, Academic Press, San Diego, 1994. [5] A. Connes, A.H. Chamseddine, Inner fluctuations of the spectral action, J. Geom. Phys. 57 (2006) 1–21. [6] A. Connes, M. Marcolli, Noncommutative Geometry, Quantum Fields and Motives, AMS, Providence, 2008. [7] P. Di Francesco, P.H. Ginsparg, J. Zinn-Justin, 2-D gravity and random matrices, Phys. Rep. 254 (1995) 1–133. [8] W.F. Donoghue Jr., Monotone Matrix Functions and Analytic Continuation, Grundlehren Math. Wiss., vol. 207, Springer-Verlag, New York, 1974. [9] M.S. Floater, T. Lyche, Two chain rules for divided differences and Faà di Bruno’s formula, Math. Comp. 76 (2007) 867–877.
2496
W.D. van Suijlekom / Journal of Functional Analysis 260 (2011) 2483–2496
[10] E. Getzler, A. Szenes, On the Chern character of a theta-summable Fredholm module, J. Funct. Anal. 84 (1989) 343–357. [11] D.S. Gilliam, T. Hohage, X. Ji, F. Ruymgaart, The Fréchet derivative of an analytic function of a bounded operator with some applications, Int. J. Math. Math. Sci. 2009 (2009), Art. ID 239025, 17 pp. [12] R.S. Hamilton, The inverse function theorem of Nash and Moser, Bull. Amer. Math. Soc. 7 (1982) 65–222. [13] F. Hansen, Trace functions as Laplace transforms, J. Math. Phys. 47 (2006) 043504, 11. [14] C. Hermite, Sur la formule d’interpolation de lagrange, J. Reine Angew. Math. 84 (1878) 70–79. [15] R. Wulkenhaar, Field theories on deformed spaces, J. Geom. Phys. 56 (2006) 108–141.