PajooheshAGT.dvi @ Applied General Topology c© Universidad Politécnica de Valencia Volume 9, No. 1, 2008 pp. 1-14 Topological and categorical properties of binary trees H. Pajoohesh To my friend, Tehmineh Fadaei for her 40’th birthday Abstract. Binary trees are very useful tools in computer science for estimating the running time of so-called comparison based algorithms, algorithms in which every action is ultimately based on a prior compar- ison between two elements. For two given algorithms A and B where the decision tree of A is more balanced than that of B, it is known that the average and worst case times of A will be better than those of B, i.e., T A(n) ≤ T B(n) and T W A (n) ≤ T W B (n). Thus the most balanced and the most imbalanced binary trees play a main role. Here we con- sider them as semilattices and characterize the most balanced and the most imbalanced binary trees by topological and categorical properties. Also we define the composition of binary trees as a commutative binary operation, *, such that for binary trees A and B, A ∗ B is the binary tree obtained by attaching a copy of B to any leaf of A. We show that (T, ∗) is a commutative po-monoid and investigate its properties. 2000 AMS Classification: 06A12, 06F05, 16B50. Keywords: Algorithm, decision tree, lower topology, semilattice. 1. Introduction Here we bring some definitions and statements from [11]: Definition 1.1. Binary trees are reversed trees with a root node, in which every internal node has exactly two children. The order of the leaves is insignificant, so a tree is determined (up to permutation on the leaves) by the lengths of the paths from the root node to each leaf ( the distance of the leaf from the root). Thus we can represent equivalence classes of the rooted binary trees with n leaves by sequences of n non-negative integers, which give the path-length of each leaf. 2 H. Pajoohesh For example, the path-length sequence < 1 3 3 4 4 4 4 > represents a binary tree with n = 7 leaves, of which one has path-length 1, two have path-length 3, and four have path-length 4. This is shown in the following: Remark 1.2. Notice that both of the following binary trees are the same for us. We bring the following Theorem from [6]: Theorem 1.3. If we denote the set of binary trees with n leaves by Tn, < x1 ... xn >∈ Tn if and only if ∑n i=1 1/2 xi = 1. Our interest in decision trees stems from the fact that in order to carry out the running time analysis of so-called “comparison-based algorithms”, i.e. algorithms in which every action is ultimately based on a prior comparison between two elements, the notion of a decision tree is a fundamental tool [2]. Most sorting and searching algorithms are comparison-based. Decision trees are binary trees representing the comparisons carried out during the computation of a comparison-based algorithm. The path-length from the root (“input”) to a leaf (“output”) gives the comparison time for the algorithm (i.e. the total number of comparisons) to compute the output corresponding to the given input. The concept of the path-length of a tree is of great importance in the analysis of algorithms, since this quantity is often directly related to the execution time [6]. If we consider decision trees, then the path-length represents the number of comparisons made while producing the result for a given input list. Therefore, the sum of the path-length sequence represents the total number of comparisons made by the sorting algorithm over all possible permutations of the input list. Topological and categorical properties of binary trees 3 For example, if we consider some sorting algorithm A which sorts a list of size 3 then this will produce a decision tree with six leafs, each of which corresponds to the computation involved in producing the sorted list for one of the six possible input lists which can exist. Assume that the path-length sequence for the decision tree of A is < 2 3 3 2 3 3 >,(See the following diagram). As mentioned previously, the path-length sequences form an equivalence class so we can represent this tree with the sequence < 2 2 3 3 3 3 >. From this sequence we can see that two of the input lists took two comparisons to be sorted and the other four input lists took three comparisons each. cb abcacb cab ca cb cba bca bac c>acb a,b,c Definition 1.4. Consider x = < a1 ... aj p aj+2 ... q + 1 q + 1 ... an >, y = < a1 ... aj p + 1 p + 1aj+3 ... q ... an >∈ Tn. Then we say y can be ob- tained from x via a ternary exchange. If q = p + 1 then we call this ternary exchange, a minimal ternary exchange. For every x =< x1 ... xn >∈ Tn, the level of x is defined by L(x) = (n − 1)(n + 2)/2 − ∑n i=1 xi. This type of balancing exchange has the effect of moving a subtree consisting of two leaves at level q in the tree to a leaf (which then becomes an internal node) at level p in the tree. An example of this is shown in the following: <1 3 3 3 3> <2 2 2 3 3> 4 H. Pajoohesh It is obvious that these minimal balancing exchanges have the effect of in- creasing the level of balance of a tree by a value of one. Consequently, they also have the effect of decreasing the sum of the path-lengths of a sequence by a value of one. Therefore, every time we increase the level of balance of a tree’s path-length sequence (through minimal balancing exchanges), we simul- taneously decrease the sum of its path-lengths. Definition 1.5. If x, y ∈ Tn then we define x ≤ y if there are l1, ..., lm ∈ Tn such that y = l1, x = lm and for each i, 1 ≤ i < m, li+1 is obtained from li via a ternary exchange. So if x ≤ y then we say that x is more balanced than y. Example 1.6. In the following diagram, x =< 1 2 3 3 > and y =< 2 2 2 2 >, p = 1 and q + 1 = 3. So y is obtained from x via a ternary exchange which is actually a minimal ternary exchange because q = p + 1. Thus y is more balanced than x, what is seen in the diagrams as well. x y The path-length from the root (“input”) to a leaf (“output”) gives the com- parison time for the algorithm (i.e. the total number of comparisons) to com- pute the output corresponding to the given input. So the total time is the summation of all path-lengths from the root to the leaves. For instance in Example 1.6 we can see that for x, the total summation of path-lengths is 1 + 2 + 3 + 3 = 9 while for y, 2 + 2 + 2 + 2 = 8. So it is seen in this example that when y is more balanced than x then the summation of the path length sequence for y is less than the summation of the path length sequence for x. It is true in general that if the binary tree corresponding to the c.b. algorithm (comparison based algorithm)A is less than or equal to the binary tree corre- sponding to the c.b. algorithm B then the running(total) time of A (which is actually the sum of path length sequence of the binary tree corresponding to it) is less than the running time of B. In other words A is faster than B. In other words when x =< x1 ... xn > is more balanced than y =< y1 ... yn > then∑n i=1 xi ≤ ∑n i=1 yi The average time analysis and the worst and the best case analysis time for a c.b. algorithm A which is defined as the usual, is denoted respectively by T (A),T W (A) and T B(A). It was shown in [9, 10] that given two algorithms A and B where the decision tree of A is more balanced than that of B, we have that the average and worst case times of A will be better than those of B, i.e., T A(n) ≤ T B(n) and T W A (n) ≤ T W B (n). Topological and categorical properties of binary trees 5 Proposition 1.7 ([11]). Tn with the above order is a lattice. Definition 1.8. The smallest element of Tn is called the most balanced binary tree and the biggest one is called the most imbalanced binary tree. The notion of balance is very important in the context of running times of algorithms. A binary tree is the most balanced if the height of the left subtree of every node never differs by more than ±1 from the height of its right subtree [7]. If a decision tree is balanced then its sum of path-lengths will be minimised [6]. This in turn means that the computation time for the algorithm which produced this decision tree will be minimised. 2. Topologies on ordered trees In this section we look at binary trees as a semi-lattice. They are DCPOs with the induced order. We study the Scott and lower topology on them and will show that every join preserving map from a binary tree to another is Scott continuous. Then we characterize the most imbalanced binary trees by using the lower topology. Definition 2.1. Consider the poset X and x, y ∈ X such that x < y. We say x is a lower cover of y and will denote x ≺ y if there is no element between them. In other words x ≺ y if and only if {t|x < t < y} = ∅. Definition 2.2. An ordered tree is a conditionally complete ∨-semilattice T so that for every x ∈ T , i) |{y ∈ T |y ≺ x}| = 2 or 0 ii) |{y ∈ T |x ≺ y}| = 1 or 0 By a conditionally complete join semilattice we mean a ∨-semilattice such that every non-empty subset has a join. Definition 2.3. For every ordered tree, T by ∨ T we mean the biggest element of T and by m(T ) we mean the set of minimal elements of T . Every partial order on a DCPO (A poset such that every directed set has a join) induces two topologies on this set, Scott topology and lower topology and their join which is called Lawson topology. We recall that if (X, ≤) is a DCPO, then A ⊆ X is called Scott open if it is an upperset- which means that if a ∈ A and a ≤ b then b ∈ A- and whenever for directed set D ⊆ X, ∨ D ∈ A then D ∩ A 6= ∅. The collection of the Scott open sets is a topology and is called Scott topology. The topology generated by X− ↑ x, x ∈ X where ↑ x = {y ∈ X|y ≥ x} is called lower topology and is denoted by α. We study these topologies in this section. Theorem 2.4. Let T1, T2 be ordered trees. Then every join preserving map f from T1 to T2 preserves arbitrary join and hence is Scott continuous. 6 H. Pajoohesh Proof. Consider {xi|i ∈ I} ⊆ T1. We show that f ( ∨ i∈I xi) = ∨ i∈I f (xi). Since f is join preserving and hence order preserving which gives ∨ i∈I f (xi) ≤ f ( ∨ i∈I xi). (*) Now if m, n ≺ ∨ xi, m 6= n, then it is obvious that there are xl, xh, where h, l ∈ I, xl 6= xh, such that xl ≤ m and xh ≤ n. Thus xl ∨ xh = ∨ xi, so f (xl) ∨ f (xh) = f ( ∨ xi). This shows f ( ∨ xi) ≤ ∨ f (xi). (**) From (*) and (**) we get f ( ∨ xi) = ∨ f (xi) and the proof is complete. � Definition 2.5. Let T be an ordered tree, then for every x ∈ T , we define the length of x be the distance of x to ∨ T and we denote it by l(x). More precisely for x let x = x0 ≺ x1 ≺ ... ≺ ∨ T = xm then l(x) = m. Also we define the length of T , l(T ) = max{l(x)|x ∈ m(T )}. Remark 2.6. By the construction of ordered trees for every element of an ordered tree T , there is a unique path which connects it to ∨ T . Definition 2.7. For every ordered tree, we define, S(T ), to be the increasing sequence corresponding to the distance of the minimal elements to ∨ T . Definition 2.8. In the lower topology, α, A ∈ α is called principal if there exists x ∈ A such that A =↓ x. Obviously every minimal element is an open set. We call them trivial open sets. Definition 2.9. The principal α-open set V is called atomic if c(V ) = {W ∈ α|W ( V , W is nontrivial and principal } with inclusion is a chain. It is called strongly atomic if c(V ) has more than one element. Theorem 2.10. Let T be an ordered tree with n minimal elements. Then (1) Every principal open set in the lower topology is atomic if and only if for some n ∈ {2, 3, ...}, S(T ) = (1, ..., n − 2, n − 1, n − 1). (2) Every strongly atomic open set consists at least 3 minimal elements with 3 different lengths. Proof. (1) Since every principal open set is atomic, T itself is atomic. Let x1, y1 ≺∨ T . We show that one of x1 and y1 is a minimal element. Equivalently we show that ↓ x1 ∩ T = {x} or ↓ y1 ∩ T = {y}. First of all since T is a lower set ↓ x1 =↓ x1 ∩ T and ↓ y1 =↓ y1 ∩ T . Clearly these two sets are non-empty. Now if ↓ x1 ∩ T and ↓ y1 ∩ T both have more than one element, then both ↓ x1 =↓ x1 ∩ T and ↓ y1 =↓ y1 ∩ T are nontrivial principal open sets which are contained in T and neither of them contains the other one which contradicts the atomic property of T . Thus either x1 or y1 is a minimal element. Let x1 be minimal element. Notice that if both are minimal elements then S(T ) = (1, 1). Now by assumption ↓ y1 is atomic. Now if x2, y2 ≺ y1 then again with the same reason x2 is a minimal element or y2 is a minimal element. Topological and categorical properties of binary trees 7 Let x2 be a minimal element. Then again if we consider y2 and assume that x3, y3 ≺ y2 then we get another minimal element, x3 and so on. Thus we get a sequence of minimal elements x1, x2, ..., xn−2 where by their structure l(xi) = i for i = 1, 2, ..., n − 2. Now when we consider yn−2 since T has n minimal elements this time xn−1 and yn−1 both are minimal elements and their lengths are both n − 1. Thus S(T ) = (1, ..., n − 2, n − 1, n − 1). Now assume that S(T ) = (1, ..., n − 2, n − 1, n − 1). We have to show that every principal open set is atomic. Let K be principal and∨ K = e. If l(e) = s and m, n ≺ e we show that m is a minimal element or n is a minimal element. If neither of them is a minimal element then T (m) = {x ∈ T |x ≤ m} is an ordered tree so there are at least two minimal elements with the same length. We have the same result for n, too. Thus again T (n) = {x ∈ T |x ≤ m} has two minimal elements with the same length. Thus in the ordered tree there are 4 minimal elements with at most 2 distinct lengths where the construction of S(T ) doesn’t allow this. Thus either m or n is a minimal element. If both are minimal elements then c(K) = ∅ and hence K is atomic. Now if m is a minimal element but n is not, then ↓ n ∈ c(K) and is the maximum element of c(K). Inductively we can get a finite sequence which shows that c(K) is a chain. (2) Let M be a strongly atomic open set and l( ∨ M ) = s. Then by what we have proved already if x, y ≺ ∨ M , one of them is a minimal element. Let x be a minimal element then l(x) = s + 1. Now if z, t ≺ y and both are minimal elements then c(M ) = {{y, z, t}}, has one element which contradicts M being strongly atomic. Thus one of z and t is a minimal element and the other is not, which means that we will have another two lengths aside from the length of x and the proof is complete. � Remark 2.11. We can improve the above theorem to an infinite ordered tree and notice that in this case we will have: (1) Every principal open set in the lower topology is atomic if and only if S(T ) = (1, 2, 3, ...). (2) Every strongly atomic open set consists at least 3 minimal elements with 3 different lengths. 3. Category of ordered trees In this section we introduce the category of binary trees whose objects are binary trees and morphisms are strictly length preserving maps. Then we characterize the most balanced binary trees with 2k leaves, k ∈ {0, 1, 2, ...} as weak initial objects of this category. 8 H. Pajoohesh Definition 3.1. Let T1, T2 be ordered trees. A map f : m(T1) → m(T2) is length preserving if for minimal elements m, n ∈ T1, l(m) ≤ l(n) implies l(f (m)) ≤ l(f (n)). It is obvious that l(x) = l(y) implies l(f (x)) = l(f (y)). Theorem 3.2. Let T1, T2 be ordered trees. Then every length preserving map f : T1 → T2 can be extended to an order preserving map, g : T1 → T2. Proof. Define g : T1 → T2 such that for a ∈ m(T1), g(a) = f (a) and for the other points g(a) = ∨ T2. Then clearly g is order preserving. � Theorem 3.3. The class of (finite) ordered trees with length preserving maps is a category. We denote it by (FLT ) LT . Proof. This is because the composition of two length preserving maps is a length preserving map. � Theorem 3.4. T1, T2 ∈ FLT are isomorphic if and only if S(T1) = S(T2). Proof. First assume that T1 is isomorphic to T2. Thus there are length preserv- ing maps, f : m(T1) → m(T2) and g : m(T2) → m(T1) such that f ◦g = idm(T2) and g ◦ f = idm(T1). This implies |m(T1)| = |m(T2)|. Also notice that l(x) < l(y), x, y ∈ T1, implies l(f (x)) < l(f (y)), because if l(f (x)) = l(f (y)) then l(x) = l(g(f (x)) = l(g(f (y)) = l(y). Also if l(x) = l(y) then l(f (x)) = l(f (y)), because if for example l(f (x)) < l(f (y)), then by the same proof l(x) = l(g(f (x))) < l(g(f (y))) = l(y). Thus we can say l(x) = l(y) if and only if l(f (x)) = l(f (y)). So the proof will be complete if we show that l(x) = l(f (x)). But |{l(x) : x ∈ T1}| = |{l(x) : x ∈ T2}|, also for every a ∈ T1, |{x ∈ T1 : l(x) = l(a)}| = |{x ∈ T2 : l(x) = l(f (a))}|. Now the only thing that has remained is, {l(x)|x ∈ T1} = {l(x)|x ∈ T2}. We prove this by induction on the cardinality of |{l(x)|x ∈ T1}|. If |{l(x)|x ∈ T1}| = 1, then {l(x)|x ∈ Ti} = {ki}, for i = 1, 2. Then Ti has 2 ki , where i = 1, 2, minimal elements and since m(T1) = m(T2) , 2 k1 = 2k2 and hence k1 = k2. Now assume that |{l(x)|x ∈ T1}| = |{l(x)|x ∈ T2}| = p and let l(Ti) = mi, for i = 1, 2. We show that m1 = m2. For this we derive isomorphic ordered trees T ′i from Ti for i = 1, 2 such that l(T ′ i ) = l(Ti) − 1. For this take T ′ i = Ti − {x ∈ m(Ti)|l(x) = mi}, for i = 1, 2. Now m(T ′ i ) = Ai∪̇Bi, for i = 1, 2 where Ai = m(Ti) ∩ m(T ′ i ) and Bi = m(T ′ i ) − Ai. Notice that f (A1) = A2 and g(A2) = A1. By the definition of ordered trees, 2|B1| = |{x ∈ m(T1) : l(x) = m1}| = |{x ∈ m(T2) : l(x) = m2}| = 2|B2|. Since |B1| = |B2|, there is a one one and onto function, h : B1 → B2. Now define f ′ : m(T ′1) → m(T ′ 2) such that f ′(x) = f (x), if x ∈ A1 and f ′(x) = h(x) if x ∈ B1 and define g′ : m(T ′2) → m(T ′ 1) such that g ′(x) = g(x), if x ∈ A2 and g ′(x) = h−1(x) if x ∈ B2. Then f ′ and g′ are length preserving maps such that g′ ◦ f ′ = idm(T ′ 1) and f ′ ◦ g′ = idm(T ′ 2). Thus T ′ 1 and T ′ 2 are isomorphic. Topological and categorical properties of binary trees 9 Now if n1 = max{l(x)|x ∈ T1, l(x) < m1} and n2 = max{l(x)|x ∈ T2, l(x) < m2}. Then m1 − n1 = m2 − n2. Assume the contrary for example m1 − n1 < m2 − n2 then if we reduce the length of T1 and T2 like above m1 − n1 times then the new ordered trees obtained from T1 and T2 are isomorphic, because in every stage of reducing the length we get isomorphic ordered trees. But the new ordered tree obtained from T1 has p − 1 different lengths and the new ordered tree obtained by T2 has again p different lengths. But it is impossible to have two isomorphic ordered trees with different number of different lengths. So m1 −n1 = m2 −n2. Now we reduce the length m1 −n1 times in both ordered trees, then we will have two isomorphic ordered trees with p−1 different lengths and by using induction and by the proof, ∀x ∈ T1, l(x) < m1, l(x) = l(f (x)). Thus in particular n1 = n2 and since m1 −n1 = m2 −n2 we get m1 = m2. This proves that if for x ∈ T1, l(x) = m1 then l(x) = l(f (x)) and also we showed that ∀x ∈ T1, l(x) < m1, l(x) = l(f (x)). Thus for every x ∈ T1, l(x) = l(f (x)) and the proof of this part is complete. The converse of the theorem is trivial because of the definition of length, length preserving maps and S(T ). � Now we introduce a useful subcategory of LT (FLT ) whose objects are the object of LT (FLT ) but whose morphisms are strictly length preserving maps-that is if T1, T2 are trees and f : m(T1) → m(T2), whenever l(x) < l(y) for x, y ∈ T1, then l(f (x)) < l(f (y)). We denote this subcategory by SLT (FSLT ). Lemma 3.5. If f ∈ M or(LT ) is a morphism of SLT then l(f (x)) = l(f (y)) if and only if l(x) = l(y). Proof. We know from length preserving maps, l(x) = l(y) implies l(f (x)) = l(f (y)). Also if l(f (x)) = l(f (y)) then l(x) = l(y) because if for example l(x) < l(y) then l(f (x)) < l(f (y)) which contradicts l(f (x)) = l(f (y)). � Theorem 3.6. T1, T2 ∈ FSLT are isomorphic if and only if S(T1) = S(T2). Remark 3.7. Theorems 3.4 and 3.6 are not true for infinite ordered trees. For example consider T1 and T2 such that S(T1) = (1, 2, 3, ...) and S(T2) = (2, 3, 4, ...). Define f : m(T1) → m(T2) such that l(f (x)) = l(x) + 1 and g : m(T2) → m(T1) such that l(g(x)) = l(x) − 1. Then g ◦ f = idm(T1) and f ◦ g = idm(T2). So T1 is isomorphic to T2 but S(T1) 6= S(T2). Now we recall from (cf [1]) that the skeleton subcategory of a category is a full subcategory such that for any object in the original category, there exists a unique isomorphic object in the skeleton subcategory Theorem 3.8. The skeletons of FSLT and FLT are the same. Proof. It is true because we can characterize the skeletons of both SLT and LT by the path-length sequences which is exactly the characterization of binary trees. � 10 H. Pajoohesh Corollary 3.9. Consider the binary tree T : (1) T is the most imbalanced iff when we consider it as a semilattice every open set in T is atomic (2) If T is the most balanced then it has no atomic open set and so has no strongly atomic open set. Proof. By the above theorem and Theorem 2.10. � Now why have we introduced this special subcategory of LT ? Because by this subcategory we can state some of the important issues in computer science which are useful in practice as categorical properties. One of the most important types of binary trees in computer science are the most balanced binary trees. In the following theorem we characterize these binary trees by categorical structures. First we recall the following definition. Definition 3.10. An object, W in the category C is called weak initial if for every object of C there is at least one morphism from W to it. Theorem 3.11. Every object of LT (FLT ) is weak initial. Proof. Consider A an object of LT . Now for every object C of LT , if z ∈ m(C), then define f : m(A) → m(C), such that for every x ∈ m(A), f (x) = z. � Theorem 3.12. T ∈ obj(SLT ) is weak initial if and only if it is the most balanced binary tree with 2k leaves, k ∈ {0, 1, 2, ...}. Proof. Let T be the most balanced binary tree with 2k leaves, k ∈ {0, 1, 2, ...}. Then for every binary tree W , define a constant map from m(T ) to m(W ) which maps every leaf of T to a fixed leaf of W . Then this map is strictly length preserving. Conversely let T be a binary tree such that for every binary tree W there is a strictly length preserving map from m(T ) to m(W ). If T is not the most balanced binary tree with 2k leaves, k ∈ {0, 1, 2, ...} then T has at least two leaves with different lengths. But in this case there is not any strictly length preserving map from T to the binary tree with 2 leaves. � 4. Composition of comparison based algorithms Sometimes a c.b. algorithm (comparison based algorithm) B acts on some outputs of the c.b. algorithm A. Here we study this situation, and give a formula for it. We try to show it as an algebraic operation. Let the binary tree corresponding to A be < a1 ... am > and the binary tree corresponding to B be < b1 ... bn >. Let C be the algorithm obtained when B acts on the output of A at the leaf xk of A. We can obtain the binary tree corresponding to C by attaching a copy of B to the leaf xk. So C = [< c1 ... ck−1 ck,1 ... ck,n ck+1 ... cm >] such that ci = ai for i = 1, ..., k − 1, k + 1, ..., m and ck,i = ak + bi, for i = 1, ..., n and has (m − 1) + n leaves. By [< c1 ... ck−1 ck,1 ... ck,n ck+1 ... cm >] we mean the increasing sequence obtaining from the sequence < c1 ... ck−1 ck,1 ... ck,n ck+1 ... cm >. If B acts on more than one output of the algorithm A the final binary tree is obtained similarly. Topological and categorical properties of binary trees 11 Now consider c.b. algorithm C obtained when B acts on all outputs of the c.b. algorithm A. So if we consider their correspondence binary trees, a copy of the binary tree corresponding to A is attached to every leaf of the binary tree corresponding to A. Thus in this case the decision binary tree corresponding to C will be [< cij >] such that cij = ai + bj, where i = 1, ..., m and j = 1, ..., n. We denote C by A ∗ B. Now we try to formalize this definition. We bring the following from [3]. Definition 4.1. A po-groupoid (or m-poset), (M, ., ≤) is a poset M with a binary multiplication, ., which satisfies the isotonicity condition a ≤ b implies x.a ≤ x.b and a.x ≤ b.x (*) for all a, b, x ∈ M . When multiplication is (commutative) associative, M is called a (commutative) po-semigroup. A po-semigroup with identity 1, such that x.1 = 1.x = x for all x ∈ M is called a partly ordered monoid, or po- monoid. A po-group is (G, +, ≤) such that (G, +) is a group which satisfies (∗). An l-group is a po-group such that (G, ≤) is a lattice. If Tn is the set of binary trees with n leaves, n ∈ N, then as was mentioned when A ∈ Tn and B ∈ Tm then A ∗ B ∈ Tmn. Take T = ⋃ n∈N Tn. Then ∗ : T × T → T defined by ∗(A, B) = A ∗ B is a binary operation on T . We call ∗ product. Now we define ≤T on T as follows: A ≤T B if and only if there is n ∈ N such that A, B ∈ Tn and A ≤ B. Now we have the following theorem: Theorem 4.2. (T, ∗, ≤T ) is a commutative po-monoid. Proof. One can easily see that if A ∈ Tn and B ∈ Tm then A ∗ B = B ∗ A. Also the binary tree with one leaf (< 0 >), is the identity because for every A ∈ Tn where n ∈ N, A∗ < 0 >=< 0 > ∗A = A. Also notice that if A ≤T B then for every C ∈ T , A ∗ C ≤T B ∗ C. Because if for example the binary tree A is obtained from the binary tree B via a ternary exchange then A ∗ C is obtained from B ∗ C via m ternary exchanges, where C ∈ Tm. � Remark 4.3. Notice that (T, ∗, ≤T ) is not group-because, for example there is no binary tree L such that L∗ < 11 >=< 11 > ∗L =< 0 >. Corollary 4.4. If the c.b. algorithm A is faster than the c.b. algorithm B, then for every c.b. algorithm C, A ∗ C is faster than B ∗ C. Corollary 4.5. If the algorithm C is the product of the c.b. algorithm B with A and the algorithm D is the product of A with B. Then C and D are the same. For proving the next theorem we need the definition of a multi-set. Definition 4.6. A multi-set is a finite set-like object in which order is ignored but multiplicity is explicity significant. Thus contrary to sets, multi-sets allow for the repetition of elements. Therefore multi-sets {1, 2, 3} and {3, 2, 1} are considered to be equivalent, but {1, 2, 2, 3} and {1, 2, 3} differ. Also for the 12 H. Pajoohesh multi-sets A and B by A − B we mean the set A with the elements in com- mon with the set B removed according to their multiplicity. For example if {1, 2, 2, 2, 3} and {1, 2, 2, 3, 4} then A − B = {2}. Theorem 4.7. Consider A, B and C in T then: (1) Am = Bm, where m ∈ N implies A = B. (2) A ∗ C = B ∗ C implies A = B Proof. (1) It is enough to show that A2 = B2 implies A = B. Since A2 = B2, there exists some n ∈ N such that A ∈ Tn and B ∈ Tn. Let A =< a1 ... an−1 an−1 > and B =< b1 ... bn−1 bn−1 >. Assume that A 6= B and let i be the first position that ai and bi differ. Assume ai < bi. Since aj = bj, for j = 1, 2, ..., i − 1, the multi-sets {aj + ak|j, k = 1, ..., i−1} and {bj +bk|j, k = 1, ..., i−1} are equal. Thus the multi-sets A2 −{aj + ak|j, k = 1, ..., i − 1} and B 2 −{bj + bk|j, k = 1, ..., i − 1} are equal. Notice that since these sequences are increasing and A2 = B2, the smallest number that appears in A2 is 2a1 and in B 2 is 2b1, so a1 = b1. Thus i > 1. Now the smallest element that appears in A2 −{aj + ak|j, k = 1, ..., i − 1} is a1 + ai and the smallest element that appears in B2 − {bj + bk|j, k = 1, ..., i − 1} is b1 + bi = a1 + bi > a1 + ai which contradicts A2 −{aj + ak|j, k = 1, ..., i−1} = B 2 −{bj + bk|j, k = 1, ..., i − 1}. Thus A2 = B2. Similar method yields that Am = Bm implies A = B. (2) By the same technique we get A = B. � Theorem 4.8. For the c.b. algorithms A1, A2, where A1 ∈ Tn and A2 ∈ Tm: (1) T A1∗A2 (nm) = T A1 (n) + T A2 (m). (2) T WA1∗A2 (nm) = T W A1 (n) + T WA2 (m). (3) T BA1∗A2 (nm) = T B A1 (n) + T BA2 (m). Proof. (1) Let A1 =< x1 ... xn > and A2 =< y1 ... ym > then A1 ∗ A2 = [< zij >], zij = xi + yj, where i = 1, ..., n and j = 1, ..., m. Thus nmT A1∗A2 (nm) = ∑ i,j zij = ∑ i,j (xi + yj) = ∑ i ( ∑ j (xi + yj )) = ∑ i (mxi + ∑ j yj ) = m ∑ i xi + n ∑ j yj = mnT A1 (n) + nmT A2 (m). So T A1∗A2 (nm) = T A1 (n) + T A2 (m) (2) A1 ∗ A2 is obtained when we attach a copy of A2 to every leaf of A1. So the longest path-length in A1 ∗ A2 is the leaf which is the result of the longest length in A2 attaching to the longest length in A1. So the longest length in A1 ∗ A2 is the summation of longest lengths in A1 and A2. So T W A1∗A2 (nm) = T WA1 (n) + T W A2 (m) (3) It is proved similar to the previous part. � Topological and categorical properties of binary trees 13 Definition 4.9. A nontrivial Binary tree is called prime if it can not been written as the product of two nontrivial binary trees (binary trees with at least two leaves) otherwise it is decomposable. Remark 4.10. Notice that the binary tree with one leaf is not neither prime nor decomposable, we denote it by 1. Theorem 4.11. If the binary tree T is decomposable, then it is not atomic. Proof. Let T be the product of 2 nontrivial binary trees A and B. Then the length of every leaf of T is at least 2. Now consider ∨ T , then there are x, y such that x, y ≺ ∨ T . Since T doesn’t have any leaf with length less than 2, x, y are not leaves. Now {t|t ≤ x} and {t|t ≤ y} neither A and B contains the other one. So c(T ) is not a chain and so T is not atomic. � Theorem 4.12. Every element of Tn, when n is prime natural number is a prime binary tree. Proof. If C ∈ Tn is the product of A and B, where A ∈ Tj and B ∈ Tk, j, k ∈ {2, 3, ...} then A ∗ B ∈ Tjk. Thus n = jk for j, k ∈ {2, 3, ...}, which is a contradiction. � Remark 4.13. The converse of the previous theorem is not true. For example < 1 2 3 3 >∈ T4 is prime while 4 is not a prime number. I tried to prove a theorem like the fundamental theorem of arithmetic for binary trees in the sense that ”Every binary tree is 1 or prime or can be decomposed uniquely apart from rearrangement to the prime binary trees.” I worked on it for a while and I could not prove it. Then I decided to leave it in the article as a Conjecture. But while Mr Diarmuid Early was helping me with the English he found the following counter example. Example 4.14. Consider A =< 1 2 2 >, B =< 1 3 3 3 5 5 5 5 >, C =< 1 2 3 3 > and D =< 1 2 4 4 4 4 >. Four of these binary trees are prime and A ∗ B = C ∗ D =< 2 3 3 4 4 4 5 5 5 5 5 5 6 6 6 6 7 7 7 7 7 7 7 7 >. So it is seen that you can write a binary tree as the product of prime binary trees in several ways. Acknowledgements. I would like to thank Dr Michel Schellekens and Mr Diarmuid Early for their useful comments. 14 H. Pajoohesh References [1] J. Adamek, H. Herrlich and G. Strecker, Abstract and Concrete Categories, John Wiley and Sons, Inc., 1990. [2] A. Aho, J. Hopcroft and J. Ullman, Data Structures and Algorithms, Addison-Wesley Series in Computer Science and Information Processing, Addison-Wesley, 1983. [3] G. Birkhoff. Lattice Theory, American Mathematical Society Colloquium Publications, Volume XXV, 1967. [4] B. C. Pierce, Basic category theory for computer scientists, Foundations of computing series 1991. [5] G. K. Gierz, K. H. Hofmann, K. Keimel, J. D. Lawson, M. W. Mislove and D. S. Scott, A Compendium of Continuous Lattices, Springer-Verlag, Berlin, 1980. [6] D. Knuth, The Art of Computer Programming vol. 1, Addison-Wesley, 1973. [7] D. Knuth, The Art of Computer Programming vol. 3, Addison-Wesley, 1973. [8] R. Kopperman and R.Wilson, On the role of finite, hereditarily normal spaces and maps in the genesis of compact Hausdorff spaces, Topology Appl. 135 (2004), 265– 275. [9] M. O’Keeffe, H. Pajoohesh and M. Schellekens, On the relation between balance and speed of algorithms, Hadronic Journal, to appear. [10] M. O’Keeffe, H. Pajoohesh and M. Schellekens, Decision trees of algorithms and a semivaluation to measure their distance, Electron. Notes Theor. Comput. Sci. (Pro- ceeding of MFCSIT 2004), to appear. [11] D. Stott Parker and P. Ram, The construction of Huffman codes is a submodular (”convex”) optimization problem over a lattice of binary trees, Sociely for industrial and Applied Mathematics 28, no. 5, 1875–1905. Received June 2005 Accepted November 2005 H. Pajoohesh (hpajoohesh@mec.cuny.edu) Medgar Evers College, Department of Mathematics, 1150 Carroll Street, Brook- lyn, NY 11225-2298, USA.