This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Lattice-Valued Bottleneck Duality

Robert Ghrist Julian Gould  and  Miguel Lopez Department of Mathematics, Department of Electrical & Systems Engineering, and Program in Applied Mathematics & Computational Science, University of Pennsylvania
Abstract.

This note reformulates certain classical combinatorial duality theorems in the context of order lattices. For source-target networks, we generalize bottleneck path-cut and flow-cut duality results to edges with capacities in a distributive lattice. For posets, we generalize a bottleneck version of Dilworth’s theorem, again weighted in a distributive lattice. These results are applicable to a wide array of non-numerical network flow problems, as shown. All results, proofs, and applications were created in collaboration with AI language models. An appendix documents their role and impact.

Key words and phrases:
flow-cut duality, network flows, bottleneck duality, distributive lattices, combinatorial optimization, Dilworth’s theorem
2020 Mathematics Subject Classification:
06D05, 90C35, 06A07

1. Introduction

The Max-Flow Min-Cut (MFMC) theorem is a cornerstone of network flow theory and establishes a duality between the maximum flow value that can be pushed through a network and the minimum capacity of a cut separating source from target. It is a simple consequence of LP-duality and, as with linear programming, is of profound importance. Bottleneck duality, though more restrictive and less prominent, is nevertheless an important example of duality — path-cut instead of flow-cut.

The modest goal of this paper is to extend bottleneck duality to systems valued in an order lattice. The perspectives and language of lattice theory will be used throughout: see [4, 14] for relevant background.

1.1. Classical flow-cut duality theorems

Theorem 1 (MFMC).

Let G=(V,E)G=(V,E) be a finite, connected directed graph without self-loops or parallel edges. Let s,tVs,t\in V be distinct source and sink vertices, respectively, and let c:E+c:E\to\mathbb{R}^{+} a capacity function on edges. Then:

maxϕΦval(ϕ)=minC𝒞cap(C)\max_{\phi\in\Phi}\textsc{val}(\phi)=\min_{C\in\mathcal{C}}\textsc{cap}(C)

where:

  • Φ\Phi is the (non-empty) set of feasible flows from ss to tt,

  • 𝒞\mathcal{C} is the (non-empty) set of all cuts separating ss from tt,

  • val(ϕ)=v:(s,v)Eϕ(s,v)\textsc{val}(\phi)=\sum_{v:(s,v)\in E}\phi(s,v) denotes the value of a flow ϕ\phi,

  • cap(C)=eCc(e)\textsc{cap}(C)=\sum_{e\in C}c(e) denotes the capacity of an ss-tt cut CC.

Here, a feasible flow ϕ:E+\phi:E\to\mathbb{R}^{+} satisfies:

  1. (1)

    Capacity constraints: eE, 0ϕ(e)c(e)\forall e\in E,\;0\leq\phi(e)\leq c(e)

  2. (2)

    Flow conservation: vV{s,t},u:(u,v)Eϕ(u,v)=w:(v,w)Eϕ(v,w)\forall v\in V\setminus\{s,t\},\;\sum_{u:(u,v)\in E}\phi(u,v)=\sum_{w:(v,w)\in E}\phi(v,w)

Shifting focus from the total flow through the network to the throughput of individual paths converts flow values to path bottlenecks — the edge along a path with minimum capacity. The corresponding result is:

Theorem 2 (Bottleneck Duality).

Let G=(V,E)G=(V,E) be a finite, connected directed graph without self-loops or parallel edges. Let s,tVs,t\in V be distinct source and sink vertices, respectively, and let c:E+c:E\to\mathbb{R}^{+} be a capacity function on edges. Then:

maxP𝒫minePc(e)=minC𝒞maxeCc(e)\max_{P\in\mathcal{P}}\min_{e\in P}c(e)=\min_{C\in\mathcal{C}}\max_{e\in C}c(e)

where 𝒫\mathcal{P} is the (non-empty) set of all paths from ss to tt, and 𝒞\mathcal{C} is the (non-empty) set of all ss-tt cuts.

We will generalize this result to capacities taking values in distributive lattices.

The classic MFMC theorem dates back to the seminal work in the late 1950s [11, 10, 3]. The origins of the bottleneck flow problem can be traced back to the early 1960s [22, 15].

Manifestations of duality in combinatorial optimization appear beyond the classical and bottleneck max-flow min-cut theorems. In graph theory, Menger’s Theorem [20] establishes a duality between the maximum number of vertex-disjoint paths and the minimum vertex cut in a graph, presaging the more general flow-cut duality concepts. König’s Theorem [16] reveals a duality between maximum matching and minimum vertex cover in bipartite graphs, which can be viewed as a specialized instance of flow-cut duality. Dilworth’s Theorem [7] extends these ideas to partially ordered sets, establishing a duality between the maximum size of an antichain and the minimum number of chains needed to cover the set.

The Multicommodity Flow-Cut Theorem of Leighton-Rao [18] generalizes max-flow min-cut to scenarios involving multiple commodities, linking the maximum concurrent flow to the sparsest cut in the network. The Matroid Intersection Theorem [8] further abstracts these concepts, establishing a duality between the maximum size of an intersection and a certain type of partition in the context of matroids. In the domain of combinatorial game theory, the Gale-Berlekamp Switching Game [1] presents a surprising connection to flow-cut duality. The Lovász-Plummer Matching Forest Theorem [19] and Nash-Williams Arborescence Theorem [21] extend flow-cut duality to more complex graph structures, dealing with matching forests and edge-disjoint spanning trees respectively.

1.2. Background

A lattice is a partially ordered set (L,)(L,\leq) in which every pair of elements a,bLa,b\in L has a unique supremum (least upper bound) called the join, denoted aba\vee b, and a unique infimum (greatest lower bound) called the meet, denoted aba\wedge b. The operations \vee and \wedge are required to satisfy:

  1. (1)

    Commutativity: ab=baa\vee b=b\vee a and ab=baa\wedge b=b\wedge a;

  2. (2)

    Associativity: a(bc)=(ab)ca\vee(b\vee c)=(a\vee b)\vee c and a(bc)=(ab)ca\wedge(b\wedge c)=(a\wedge b)\wedge c;

  3. (3)

    Absorption: a(ab)=aa\vee(a\wedge b)=a and a(ab)=aa\wedge(a\vee b)=a;

  4. (4)

    Idempotence: aa=aa\vee a=a and aa=aa\wedge a=a.

The ordered reals are a lattice with max and min as join and meet. Other common examples of lattices include: the power set of a set ordered by inclusion, with union as join and intersection as meet; Boolean algebras ordered by implication, with disjunction as join and conjunction as meet; and the set of partitions of a set ordered by refinement, with the coarsest common refinement as join and the finest common coarsening as meet. A wealth of useful lattices can be found in the literature on Formal Concept Analysis [13, 24].

A lattice is complete if every subset (including the empty set and the entire lattice) has both a join and a meet. A modular lattice satisfies the modular law: for all a,b,cLa,b,c\in L, if aca\leq c, then a(bc)=(ab)ca\vee(b\wedge c)=(a\vee b)\wedge c. A lattice is distributive if binary joins distribute over binary meets and vice versa:

(1) a(bc)=(ab)(ac)anda(bc)=(ab)(ac).a\vee(b\wedge c)=(a\vee b)\wedge(a\vee c)\quad\text{and}\quad a\wedge(b\vee c)=(a\wedge b)\vee(a\wedge c).

All distributive lattices are modular.

We will work with the following class of networks which have a specified source and target.

Definition 1 (Flow Network).

A flow network is a tuple (G,s,t)(G,s,t) where:

  1. (1)

    G=(V,E)G=(V,E) is a finite, directed graph without self-loops or directed cycles;

  2. (2)

    s,tVs,t\in V are distinct vertices called the source and sink, respectively;

  3. (3)

    All edges incident to ss are outgoing, and all edges incident to tt are incoming.

  4. (4)

    For all vV{s,t}v\in V\setminus\{s,t\}, there exist directed paths svs\rightsquigarrow v and vtv\rightsquigarrow t in GG.

Some of our results extend to more general networks, such as those with dead-ends: see Remarks 1 and 2.

A cut C=(S,T)C=(S,T) is a partition of VV such that sSs\in S and tTt\in T. By way of abuse of terminology, one says that eCe\in C, for an edge e=(u,v)e=(u,v) if uSu\in S and vTv\in T. A cut CC is minimal if there are no cuts CC^{\prime} such that {eE:eC}{eE:eC}\{e\in E\>:\>e\in C^{\prime}\}\subsetneq\{e\in E\>:\>e\in C\}.

2. Bottleneck duality

All results in this note stem from bottleneck duality.

2.1. Result

The following is a lattice-valued generalization of Theorem 2.

Theorem 3 (Lattice Bottleneck Duality).

For GG a flow network with c:ELc:E\to L a capacity function taking values in a distributive lattice LL:

(2) P𝒫ePc(e)=C𝒞eCc(e),\bigvee_{P\in\mathcal{P}}\bigwedge_{e\in P}c(e)=\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e),

where 𝒫\mathcal{P} is the set of all paths from ss to tt, and 𝒞\mathcal{C} is the set of all cuts separating ss from tt.

Proof: Let α=P𝒫ePc(e)\alpha=\bigvee_{P\in\mathcal{P}}\bigwedge_{e\in P}c(e) and β=C𝒞eCc(e)\beta=\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e).

We begin with weak duality: αβ\alpha\leq\beta. Consider any path P𝒫P\in\mathcal{P} and any cut C𝒞C\in\mathcal{C}. Since PP goes from ss to tt and CC separates ss from tt, there must be at least one edge ePCe^{\prime}\in P\cap C. For this edge, we have:

ePc(e)c(e)eCc(e).\bigwedge_{e\in P}c(e)\leq c(e^{\prime})\leq\bigvee_{e\in C}c(e).

The first inequality holds because ePe^{\prime}\in P, and the meet of a set is less than or equal to any element of the set. The second inequality holds because eCe^{\prime}\in C, and any element of a set is less than or equal to the join of the set.

Since this holds for any P𝒫P\in\mathcal{P} and any C𝒞C\in\mathcal{C}, we can take the join over all PP on the left side and the meet over all CC on the right side:

α=P𝒫ePc(e)C𝒞eCc(e)=β.\alpha=\bigvee_{P\in\mathcal{P}}\bigwedge_{e\in P}c(e)\leq\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e)=\beta.

Strong duality, βα\beta\leq\alpha, is more delicate. In a distributive lattice, finite meets distribute over finite joins and vice versa. For any array of elements {ai,j}L\{a_{i,j}\}\subset L over finite index sets II and JJ,

(3) iIjJai,j=jJiIai,j.\bigwedge_{i\in I}\bigvee_{j\in J}a_{i,j}=\bigvee_{j\in J}\bigwedge_{i\in I}a_{i,j}.

We will apply this to our context with paths and cuts as (finite) index sets. Define aC,Pa_{C,P} for C𝒞C\in\mathcal{C} and P𝒫P\in\mathcal{P} as:

aC,P=eCPc(e).a_{C,P}=\bigvee_{e\in C\cap P}c(e).

Note that aC,Pa_{C,P} is well-defined because GG is finite, thus CPC\cap P is finite, and the join is over a finite (and non-empty) set.

(4) β=C𝒞eCc(e)C𝒞P𝒫aC,P=P𝒫C𝒞aC,PP𝒫ePc(e)=α\beta=\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e)\leq\bigwedge_{C\in\mathcal{C}}\bigvee_{P\in\mathcal{P}}a_{C,P}=\bigvee_{P\in\mathcal{P}}\bigwedge_{C\in\mathcal{C}}a_{C,P}\leq\bigvee_{P\in\mathcal{P}}\bigwedge_{e\in P}c(e)=\alpha

The first equality is the definition of β\beta. The second inequality holds because every edge in a cut is on some path via property (4) in Definition 1. The third equality is justified by finite meets distributing over finite joins in a distributive lattice. The fourth inequality holds because for every P𝒫P\in\mathcal{P} and ePe\in P, there is a cut C𝒞C\in\mathcal{C} such that PC={e}P\cap C=\{e\}. Hence C𝒞aC,PePc(e)\bigwedge_{C\in\mathcal{C}}a_{C,P}\leq\bigwedge_{e\in P}c(e) and so the fourth inequality follows. The final equality is the definition of α\alpha.

This proves strong duality. Combining weak and strong duality demonstrates that α=β\alpha=\beta. ∎

Remark 1.

If the network has dead ends, Theorem 3 still holds assuming the lattice LL has a minimal element zero. Some care must be taken in the proof to restrict to minimal cuts when proving the second inequality in Equation (4). Finally, in the case there are no paths from ss to tt, the conclusion of Bottleneck Duality is merely that 0=00=0.

2.2. Examples

The classical +\mathbb{R}^{+}-valued bottleneck duality follows from using the lattice L=(+,)L=(\mathbb{R}^{+},\leq) with \wedge as min and \vee as max. Other examples demonstrate the limits of our results.

Example 1.

Let LL be the pentagon lattice with elements {0,a,b,c,1}\{0,a,b,c,1\}, where 0<c<b<10<c<b<1, 0<a<10<a<1, and aa is incomparable to both bb and cc: see Figure 1 [left]. The simple flow network there illustrated has two paths from ss to tt with throughputs ab=0a\wedge b=0, and cb=cc\wedge b=c. There are six cuts separating ss from tt with capacities ac=1a\vee c=1, and bb. Bottleneck duality would assert that 0c=1b0\vee c=1\wedge b: false. The lattice LL is not distributive and bottleneck duality fails.

Refer to caption
Figure 1. Bottleneck duality fails for [left] the pentagon lattice on a simple flow network with five edges, and [right] the diamond lattice on a simple flow network with three edges.
Example 2.

One could hope that modularity would suffice, but this is not the case. Figure 1[right] illustrates the diamond lattice with elements {0,a,b,c,1}\{0,a,b,c,1\}, with a,b,ca,b,c incomparable. A simple flow network with capacities as labeled has two paths (throughputs aa and bc=0b\wedge c=0) and two cuts (each with capacity 11). Bottleneck duality clearly fails here as well.

Corollary 4.

Equation (2) holds for all flow networks with capacities valued in a lattice LL if and only if LL is distributive.

Proof: Theorem 3 is one direction; Examples 1 and 2 show the reverse direction, since a lattice is distributive if and only if it does not have a sublattice isomorphic to the pentagon or diamond lattices [2]. ∎

Refer to caption
Figure 2. A lattice with four elements L={0,a,b,1}L=\{0,a,b,1\}, isomorphic to a powerset lattice on {a,b}\{a,b\}, is distributive [left]. A flow network may have optimal paths but no optimal cut [center] and/or optimal cuts but no optimal paths [right].
Example 3.

Theorem 3 is a statement on the duality of values, not a statement about existence. Optimal paths and optimal cuts may or may not exist. Figure 2 illustrates two examples of capacities on a flow network taking values in a simple distributive lattice [left], showing that optimal paths and cuts have independent existence and non-existence. In the first flow network [center], all paths have (optimal) throughput 0, but all cuts have value strictly greater than 0, though their meet is 0. In the second example [right], the two paths have throughputs aa and bb, whose join is 11; yet all cuts have (optimal) cut value 11. The case of a flow network with neither optimal path nor optimal cut is left to the reader.

2.3. Applications

Our goal is to show that the use of lattice coefficients greatly expands the applicability of bottleneck duality to use-cases beyond scalar values.

2.3.1. Supply Chain Resource Allocation

We begin with a simple use of a powerset lattice in the domain of supply chain management, particularly in resource allocation. By modeling a supply chain as a flow network G=(V,E)G=(V,E), we can represent various entities such as suppliers, distributors, and retailers as vertices, with the edges denoting the pathways through which resources flow.

A typical system might have multiple sources (representing different material source supply) and multiple targets (each of whom might receive a certain subset of resources). It is natural to add an artificial “master” source node ss and target node tt to set up a flow network.

Let RR be the finite set of all distinct resources. The lattice L=2RL=2^{R} then represents all possible combinations of these resources. This lattice structure (L,,,)(L,\subseteq,\vee,\wedge) is naturally ordered by the subset relation, with union and intersection serving as the join and meet operations, respectively.

We assign a capacity function c:ELc:E\to L to each edge in the network, where c(e)c(e) specifies the subset of resources available for allocation along that edge. This formulation allows us to model the flow of multiple resources simultaneously through the supply chain.

In this context, paths from source to sink represent specific routes through which resources flow, while cuts partition the network into two disjoint subsets, separating the source from the target. The bottleneck value of a path PP is given by c(P)=ePc(e)=ePc(e)c(P)=\bigwedge_{e\in P}c(e)=\bigcap_{e\in P}c(e), representing the common resources available across all edges in the path. Conversely, the capacity of a cut CC is defined as c(C)=eCc(e)=eCc(e)c(C)=\bigvee_{e\in C}c(e)=\bigcup_{e\in C}c(e), indicating the aggregate resources available across all edges crossing the cut.

Applying the Lattice Bottleneck Duality theorem to this supply chain model yields:

P𝒫(ePc(e))=C𝒞(eCc(e))\bigcup_{P\in\mathcal{P}}\left(\bigcap_{e\in P}c(e)\right)=\bigcap_{C\in\mathcal{C}}\left(\bigcup_{e\in C}c(e)\right)

This duality has the following straightforward interpretation:

The most comprehensive set of resources consistently available along at least one complete supply path is identical to the minimal set of resources that must be present across every possible critical partition of the supply chain.

The left-hand side of the equation represents the aggregate of limiting resource sets across all possible supply paths, identifying the broadest possible set of resources that can be guaranteed to flow through the system via at least one path. The right side represents the intersection of the aggregate resource sets across all possible critical partitions of the supply chain. This identifies the core set of resources that must be available at every potential bottleneck in the system.

2.3.2. Packaging and Safety

One can capture more supply chain complexities using the following theorem of Birkhoff.

Theorem 5 (Birkhoff [2] Ch. 9 Thm. 6).

A lattice LL is distributive if and only if it is isomorphic to a ring of sets, i.e. a family of sets closed under finite unions and intersections, partially ordered by containment.

Suppose certain resources can only be transported safely with the correct packaging materials. For example, food resources resources might need to be packaged with refrigeration devices, and hazardous materials might need certain insulators. Let RR and MM denote our sets of resources and packaging materials respectively. To each rRr\in R, let MrMM_{r}\subseteq M denote the packaging materials required to transport rr. Taking the closure of {{r}Mr:rR}\big{\{}\{r\}\cup M_{r}\>:\>r\in R\big{\}} in 2RM2^{R\sqcup M} with respect to finite unions and intersections produces a ring of sets, and hence a distributive lattice LL via Theorem 5.

With such, the capacity c(P)c(P) of a path PP from ss to tt captures precisely which resources can be transported safely with proper packaging materials. Bottlenecks respect the packaging requirements; hence, restricting to this sublattice extends the scope of the model.

2.3.3. Regulatory compliance

The following uses a lattice of “fuzzy” intervals, as per the fuzzy MFMC theorem in [6]. Consider a corporation navigating a complex regulatory landscape to launch a new product. The regulatory process can be modeled as a flow network where edges represent different aspects of compliance, each with a range of achievable compliance levels (topologized as a scalar for simplicity).

Let G=(V,E)G=(V,E) be a flow network representing potential regulatory compliance processes, with source ss representing the initial product concept and sink tt representing full regulatory approval. Multiple varied interconnected intermediate steps lie between source and target. Define a capacity function c:ELc:E\to L, where LL is the lattice of closed intervals [a,b][0,1][a,b]\subset[0,1] with aba\leq b, ordered as follows:

For A=[a1,a2]A=[a_{1},a_{2}] and B=[b1,b2]B=[b_{1},b_{2}],

ABa1b1 and a2b2A\leq B\iff a_{1}\leq b_{1}\text{ and }a_{2}\leq b_{2}

The lattice operations are defined as:

AB\displaystyle A\wedge B =[min{a1,b1},min{a2,b2}]\displaystyle=[\min\{a_{1},b_{1}\},\min\{a_{2},b_{2}\}]
AB\displaystyle A\vee B =[max{a1,b1},max{a2,b2}]\displaystyle=[\max\{a_{1},b_{1}\},\max\{a_{2},b_{2}\}]

With these operations, (L,,,)(L,\leq,\vee,\wedge) forms a distributive lattice. For each edge eEe\in E, c(e)=[le,ue]c(e)=[l_{e},u_{e}] represents the range of compliance levels the company can achieve for that step. The lower bound lel_{e} represents the minimum level of compliance the company is certain it can achieve, while the upper bound ueu_{e} represents the maximum level it might achieve with additional effort or resources.

Applying Theorem 3 to this regulatory compliance model yields:

P𝒫(ePc(e))=C𝒞(eCc(e))\bigvee_{P\in\mathcal{P}}\left(\bigwedge_{e\in P}c(e)\right)=\bigwedge_{C\in\mathcal{C}}\left(\bigvee_{e\in C}c(e)\right)

where 𝒫\mathcal{P} is the set of all compliance paths from initial concept to full approval, and 𝒞\mathcal{C} is the set of all cuts separating these states.

Path interpretations: For a compliance path PP, ePc(e)\bigwedge_{e\in P}c(e) represents the weakest compliance interval in that compliance strategy. The left-hand side of the equation thus represents the strongest among these weakest links across all compliance strategies.

Cut interpretations: A cut CC is a regulatory obstruction which must be crossed. The cut value, eCc(e)\bigvee_{e\in C}c(e), represents the best possible compliance interval achievable through any route crossing that regulatory boundary. The right-hand side of the equation represents the weakest among these best possible levels across all regulatory boundaries.

Theorem 3 thus implies:

The strongest among the weakest regulatory intervals across all compliance strategies is identical to the weakest among the best possible compliance intervals across all regulatory boundaries.

3. Bottleneck max-flow-min-cut

While we do not convert the classical max-flow-min-cut theorem to a lattice-valued versions, we can adapt lattice-valued bottleneck duality from path-cut to flow-cut duality by redefining flow conservation using the join operator.

3.1. Result

Let GG be a flow network equipped with a capacity function c:ELc:E\rightarrow L. Let us define an LL-valued flow to be a function ϕ:EL\phi:E\to L such that for each eEe\in E, ϕ(e)c(e)\phi(e)\leq c(e), and for each vertex vV{s,t}v\in V\setminus\{s,t\},

(u,v)Eϕ(u,v)=(v,w)Eϕ(v,w).\bigvee_{(u,v)\in E}\phi(u,v)=\bigvee_{(v,w)\in E}\phi(v,w).

The value of a flow, ϕ\phi, and the capacity of a cut, CC, are defined as

val(ϕ)=(s,v)Eϕ(s,v):cap(C)=eCc(e).\textsc{val}(\phi)=\bigvee_{(s,v)\in E}\phi(s,v)\quad:\quad\textsc{cap}(C)=\bigvee_{e\in C}c(e).

Our use of \vee in the conservation and flow value equations permits translation of bottleneck duality to flow-cut duality.

Theorem 6 (Lattice-Valued Bottleneck Max-Flow Min-Cut).

Let GG be a flow network with capacity c:ELc:E\to L from edges to a distributive lattice LL. Then the maximal flow value from ss to tt equals the minimal cut value:

(5) ϕΦval(ϕ)=C𝒞cap(C),\bigvee_{\phi\in\Phi}\textsc{val}(\phi)=\bigwedge_{C\in\mathcal{C}}\textsc{cap}(C),

where Φ\Phi is the set of all LL-valued flows on GG, 𝒞\mathcal{C} is the set of all cuts separating ss from tt.

Proof: For any path P𝒫P\in\mathcal{P}, define c(P)=ePc(e)c(P)=\bigwedge_{e\in P}c(e). We will show that

ϕΦval(ϕ)=P𝒫c(P)=C𝒞eCc(e)=C𝒞cap(C).\bigvee_{\phi\in\Phi}\textsc{val}(\phi)=\bigvee_{P\in\mathcal{P}}c(P)=\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e)=\bigwedge_{C\in\mathcal{C}}\textsc{cap}(C).

For each path P𝒫P\in\mathcal{P}, define the flow ϕP:EL\phi_{P}:E\to L as:

ϕP(e)={c(P)if eP¯otherwise,\phi_{P}(e)=\begin{cases}c(P)&\text{if }e\in P\\ \underline{\ell}&\text{otherwise},\end{cases}

where ¯=eEc(e)\underline{\ell}=\bigwedge_{e\in E}c(e) is the minimal element generated by cc in LL. We now verify that ϕP\phi_{P} is indeed a flow:

(1) Capacity constraints: For all eEe\in E, ϕP(e)c(e)\phi_{P}(e)\leq c(e). If ePe\in P, then ϕP(e)=c(P)=ePc(e)c(e)\phi_{P}(e)=c(P)=\bigwedge_{e^{\prime}\in P}c(e^{\prime})\leq c(e). If ePe\notin P, then ϕP(e)=¯c(e)\phi_{P}(e)=\underline{\ell}\leq c(e). In both cases, the capacity constraint is satisfied.

(2) Flow conservation: For any vV{s,t}v\in V\setminus\{s,t\}, ein(v)ϕP(e)=eout(v)ϕP(e)\bigvee_{e\in\text{in}(v)}\phi_{P}(e)=\bigvee_{e\in\text{out}(v)}\phi_{P}(e). This holds because for vPv\in P, both sides equal c(P)c(P), and for vPv\notin P, both sides equal ¯\underline{\ell}. This confirms flow conservation, and that ϕP\phi_{P} is a valid flow.

The value of this flow is val(ϕP)=eout(s)ϕP(e)=c(P)\textsc{val}(\phi_{P})=\bigvee_{e\in\text{out}(s)}\phi_{P}(e)=c(P). From this construction, we conclude ϕΦval(ϕ)=P𝒫c(P)\bigvee_{\phi\in\Phi}\textsc{val}(\phi)=\bigvee_{P\in\mathcal{P}}c(P), which equals C𝒞eCc(e)\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c(e) via bottleneck duality. ∎

Remark 2.

If the network has dead-ends, Theorem 6 still holds assuming the lattice LL has a minimal element 0, which can be used in place of ¯\underline{\ell} in the definition of ϕP\phi_{P}. Conservation still holds at dead ends since the bottom element 0 is the empty join.

3.2. Applications

Though flow-cut and path-cut bottleneck dualities are basically the same phenomenon, there are a few instances where it is perhaps more natural to work in the context of lattice-valued flows.

3.2.1. Secure Information Flows

Consider an intelligence network where information security encompasses multiple dimensions, such as confidentiality and reliability. We model these security requirements using a lattice L=IC×IRL=I_{C}\times I_{R}, where ICI_{C} and IRI_{R} are totally ordered intervals representing confidentiality and reliability levels, respectively. These intervals can be either discrete (e.g., typical clearance levels) or continuous (e.g., quantitative measures of information sensitivity or source reliability). Similar lattice models of secure information passage were considered in [5] without any assumptions of distributivity.

Let G=(V,E)G=(V,E) be a flow network representing the intelligence network, with source ss and target tt. Define a capacity function c:ELc:E\to L where c(e)=(cC(e),cR(e))c(e)=(c_{C}(e),c_{R}(e)) denotes the maximum confidentiality and reliability levels that can be securely transmitted through edge ee. The partial order \leq is the product of total orders on ICI_{C} and IRI_{R}, and the lattice operations are component-wise min (\wedge) and max (\vee).

An LL-flow ϕ:EL\phi:E\to L assigns to each transmission edge ee a security level ϕ(e)=(ϕC(e),ϕR(e))\phi(e)=(\phi_{C}(e),\phi_{R}(e)) such that ϕ(e)c(e)\phi(e)\leq c(e) for all eEe\in E. Flow conservation ensures:

(u,v)Eϕ(u,v)=(v,w)Eϕ(v,w)vV{s,t}.\bigvee_{(u,v)\in E}\phi(u,v)=\bigvee_{(v,w)\in E}\phi(v,w)\quad\forall v\in V\setminus\{s,t\}.

Flow interpretations: The flow structure is particularly appropriate for such an intelligence network, as each vertex represents a “router” that must be capable of both receiving and transmitting information at the same maximal security levels. This flow condition, as opposed to a path condition, ensures that each node in the network can handle the incoming information and redistribute it without compromising security levels.

The flow value represents the minimal levels at which intelligence can be routed through the entire system without violating any security constraints. It captures the highest combination of confidentiality and reliability that can be consistently maintained across the network.

Cut intepretations: In this context, cuts represent partitions of the intelligence network that block information from reaching the target. The capacity of a cut indicates the maximum security levels that can be transmitted across the partition, highlighting potential bottlenecks or vulnerabilities in the network’s structure.

Theorem 6 quantifies the maximum achievable secure information flow through the network, considering both confidentiality and reliability constraints simultaneously by accounting for the most restrictive network partitions that limit the overall secure flow capability.

3.2.2. Related Information Flows

The previous example can be adapted to a variety of other domains by redefining the underlying lattice and contextualizing the flow and cut interpretations. For instance, in network reliability and redundancy management, the lattice can represent different levels of system reliability, enabling the identification of critical redundancies. In access control and authorization systems, the lattice can model varying authorization levels to optimize secure permission distributions. Similarly, in data flow optimization within distributed computing systems, the lattice can capture data priority levels to enhance transmission efficiency. Each of these applications leverages the duality between flow and cut capacities to quantify and optimize system capabilities within their respective contexts.

4. Lattice-Weighted bottleneck Dilworth’s Theorem

Dilworth’s theorem is a fundamental result in the theory of partially ordered sets that establishes a duality between two important structural features of a poset: chains and antichains. Specifically, for a finite poset, the theorem states that the minimum number of chains needed to cover the entire poset is equal to the size of the largest antichain in the poset.

While not widely discussed in the literature, a bottleneck version of Dilworth’s theorem can be formulated by considering weighted elements rather than mere cardinalities. This version shifts focus to the extremal weights of chains and antichains. Specifically, it asserts an equality between two quantities: (1) the maximum, over all chains, of the minimum weight within each chain, and (2) the minimum, over all maximal antichains, of the maximum weight within each antichain. We present here a precise formulation of this duality using lattice-valued weights.

4.1. Result

Let XX be a finite partially ordered set. We say a subset AXA\subseteq X is a maximal antichain if no two elements of AA are comparable and there exists no element xXx\in X for which A{x}A\cup\{x\} is an antichain. Similarly, a maximal chain in XX is a linearly ordered subset κ\kappa for which there exists no element xXx\in X such that κ{x}\kappa\cup\{x\} is linearly ordered.

Theorem 7 (Lattice-Weighted Dilworth’s Theorem).

Let (X,X)(X,\leq_{X}) be a finite partially ordered set with c:XLc:X\to L a weight function assigning to each element of XX a value in a distributive lattice LL. Then:

(6) κ𝒳xκc(x)=A𝒜xAc(x),\bigvee_{\kappa\in\mathcal{X}}\bigwedge_{x\in\kappa}c(x)=\bigwedge_{A\in\mathcal{A}}\bigvee_{x\in A}c(x),

where 𝒳\mathcal{X} is the set of all maximal chains in XX and 𝒜\mathcal{A} the set of maximal antichains in XX.

Proof: We construct an auxiliary flow network and apply Theorem 3. Let G=(V,E)G=(V,E) be the directed graph defined as follows:

  • V:={s,t}XV:=\{s,t\}\cup X, where ss is a new source vertex and tt is a new sink vertex.

  • E:=EsEMEtE:=E_{s}\cup E_{M}\cup E_{t}, where:

    • Es={(s,x)x is minimal in X}E_{s}=\{(s,x)\mid x\text{ is minimal in }X\};

    • EM={(x,y)x<Xy and there is no z with x<Xz<Xy}E_{M}=\{(x,y)\mid x<_{X}y\text{ and there is no }z\text{ with }x<_{X}z<_{X}y\};

    • Et={(x,t)x is maximal in X}E_{t}=\{(x,t)\mid x\text{ is maximal in }X\}.

Denote EX:=EMEtE_{X}:=E_{M}\cup E_{t}. Define a capacity function c:ELc^{\prime}:E\to L by:

c(e)={¯if eEs,c(x)if e=(x,y)EX,c^{\prime}(e)=\begin{cases}\overline{\ell}&\text{if }e\in E_{s},\\ c(x)&\text{if }e=(x,y)\in E_{X},\end{cases}

where ¯=xXc(x)\overline{\ell}=\bigvee_{x\in X}c(x) is the maximal element in LL induced by the weight function cc, well-defined as XX is finite.

We now establish a pair of bijective correspondences:

  1. (1)

    There is a bijective correspondence between maximal chains and paths from ss to tt. Each maximal chain κ=(x1,x2,,xn)\kappa=(x_{1},x_{2},\ldots,x_{n}) in XX corresponds uniquely to the path Pκ=(s,x1,x2,,xn,t)P_{\kappa}=(s,x_{1},x_{2},\ldots,x_{n},t) in GG. Conversely, observe that every ss-tt path P=(s,x1,,xn,t)P=(s,x_{1},\ldots,x_{n},t) in GG must follow the order of XX, thus forming a chain κP=(x1,,xn)\kappa_{P}=(x_{1},\ldots,x_{n}). This chain must be maximal by the construction of the auxiliary flow network. The functions PκPP\mapsto\kappa_{P} and κPκ\kappa\mapsto P_{\kappa} are easily seen to be inverses.

  2. (2)

    There is a bijective correspondence between maximal antichains and minimal cuts CC with {e:eC}EX\{e\>:\>e\in C\}\subseteq E_{X}. For notational ease, for each cut CC, let EC:={e:eC}E_{C}:=\{e\>:\>e\in C\}. For any maximal antichain AXA\subseteq X, the corresponding minimal cut CA=(SA,TA)C_{A}=(S_{A},T_{A}) is:

    SA\displaystyle S_{A} :={s}{xX:aA such that xa},\displaystyle:=\{s\}\cup\{x\in X\>:\>\exists a\in A\text{ such that }x\leq a\},
    TA\displaystyle T_{A} :=VSA.\displaystyle:=V\setminus S_{A}.

    Note that ECAEXE_{C_{A}}\subseteq E_{X} and this cut is minimal. To see this, suppose that that KECAK\subsetneq E_{C_{A}}. Pick an edge eECAKe\in E_{C_{A}}\setminus K. There is a path PP from ss to tt going through the edge ee (lest AA was not an antichain). It follows that KK cannot be the set of edges ECE_{C^{\prime}} for any cut CC^{\prime}. Hence ECAE_{C_{A}} is a minimal cut.

    Now suppose that CC is a minimal cut of GG with ECEXE_{C}\subseteq E_{X}. Consider the set:

    AC:={uV:|:vV such that (u,v)EC}A_{C}:=\{u\in V\>:|:\exists v\in V\text{ such that }(u,v)\in E_{C}\}

    Since CC is a minimal cut, it follows that ACA_{C} is a maximal antichain. If there are comparable elements a,aACa,a^{\prime}\in A_{C}, then we could construct a smaller that removes one of these elements. If ACA_{C} is not maximal, again there would be a path witnessing that CC was not a cut. It is easily seen that CACC\mapsto A_{C} and ACAA\mapsto C_{A} are inverse functions.

We can now establish a chain of equalities:

(7) κ𝒳xκc(x)=P𝒫ePc(e)=C𝒞eCc(e)=CeCc(e)=A𝒜xAc(x),\bigvee_{\kappa\in\mathcal{X}}\bigwedge_{x\in\kappa}c(x)=\bigvee_{P\in\mathcal{P}}\bigwedge_{e\in P}c^{\prime}(e)=\bigwedge_{C\in\mathcal{C}}\bigvee_{e\in C}c^{\prime}(e)=\bigwedge_{C\in\mathcal{M}}\bigvee_{e\in C}c^{\prime}(e)=\bigwedge_{A\in\mathcal{A}}\bigvee_{x\in A}c(x),

where \mathcal{M} is the set of minimal cuts CC with ECEXE_{C}\subseteq E_{X}.

The first equality: For each maximal chain κ\kappa with corresponding path PκP_{\kappa}:

ePκc(e)=¯xκc(x)=xκc(x).\bigwedge_{e\in P_{\kappa}}c^{\prime}(e)=\overline{\ell}\wedge\bigwedge_{x\in\kappa}c(x)=\bigwedge_{x\in\kappa}c(x).

The equality follows from our first bijective correspondence.

The second equality: This is Theorem 3, bottleneck duality.

The third equality: For every cut CC, there is a minimal cut CC^{\prime} such that cap(C)cap(C)\text{cap}(C^{\prime})\leq\text{cap}(C) hence cap(C)𝒞cap(C)\bigwedge_{\mathcal{M}}\text{cap}(C)\leq\bigwedge_{\mathcal{C}}\text{cap}(C). Cuts containing an edge from EsE_{s} can be ignored since ¯c(x)\overline{\ell}\geq c(x) for all xXx\in X. The reverse inequality is clear since every minimal cut is a cut.

The fourth equality: For each minimal cut CC with ECEXE_{C}\subseteq E_{X} and its corresponding maximal antichain ACA_{C}:

eCc(e)=xACc(x).\bigvee_{e\in C}c^{\prime}(e)=\bigvee_{x\in A_{C}}c(x).

The equality follows from our second bijective correspondence. ∎

4.2. Applications

Menger’s Theorem is a special case of Dilworth’s theorem on vertex-disjoint paths and vertex cuts. The interested reader can formulate and prove a lattice-weighted bottleneck version of Menger using the above more general result. More specific applications that highlight the need for weights on a poset (as opposed to edge-based capacities) appear below.

4.2.1. Weakest-Link Reliability Analysis

Consider a product that can be assembled with various combinations of resources in NN stages. At stage nn of the process, a resource from the set SnS_{n} of stage-nn options must be selected. However, we allow our available choices at stage n+1n+1 to depend on our choice at stage nn. For resource options xSnx\in S_{n} and ySn+1y\in S_{n+1}, write xyx\preceq y if yy is an available stage-(n+1n+1) choice after xx. We may organize this information as a poset X=n=1NSnX=\bigsqcup_{n=1}^{N}S_{n} with partial order X\leq_{X} defined by the transitive closure of \preceq.

We wish to analyze how the assembly choices impact the reliability of the final product. In particular, we suppose each component xXx\in X has some probability of failure over time. To capture uncertainty in the lifetime of a component, we use a lattice LL of survival functions. Explicitly, LL is the set of functions f:+[0,1]f:\mathbb{R^{+}}\to[0,1] such that:

  1. (1)

    ff is weakly monotone decreasing;

  2. (2)

    ff is left continuous;

  3. (3)

    f(0)=1f(0)=1;

  4. (4)

    limtf(t)=0\lim_{t\to\infty}f(t)=0.

Or equivalently, f=1Ff=1-F where FF is a cumulative distribution function (CDF). We take a lattice weighting c:XLc:X\rightarrow L where the value c(x)(t)c(x)(t) represents the probability of component xXx\in X surviving until time tt.

We define a partial order \leq on LL based on pointwise comparison: For f,gLf,g\in L,

fgt+:f(t)g(t)f\leq g\iff\forall t\in\mathbb{R}^{+}:f(t)\leq g(t)

That is, fgf\leq g (read: “ff is less reliable than gg”) if and only if ff is no more likely to survive until time tt than gg for all tt. The join (\vee) and meet (\wedge) operations on LL are defined by pointwise max and min, respectively. With these operations, (L,,,)(L,\leq,\vee,\wedge) forms a distributive lattice.

Chain interpretations: A maximal chain κ\kappa represents a choice at every stage in the assembly of the product. We call such a collection an assembly. For such an assembly, Fκ:=xκc(x)F_{\kappa}:=\bigwedge_{x\in\kappa}c(x) is the survival function such that Fκ(t)=minxκc(x)(t)F_{\kappa}(t)=\min_{x\in\kappa}c(x)(t). Note that this is not the probability that every component survives until time tt; rather, FκF_{\kappa} represents a generalization of the “weakest-link” failure profile where we allow which component is weakest in the assembly to vary at different times. It is a non-probabilistic measure of the reliability of a certain assembly. The left hand side of Equation (6) gives the least upper bound on the “weakest-link” failure profile over possible assemblies.

Antichain interpretations: A maximal antichain AA represents a minimal choice of components such that every possible assembly requires a resource from AA. We call such a collection a necessary set of components. For such a necessary set, FA:=xAc(x)F_{A}:=\bigvee_{x\in A}c(x) is the survival function such that FA(t)=maxxAc(x)(t)F_{A}(t)=\max_{x\in A}c(x)(t). Again, this quantity cannot be directly interpreted as a survival probability for the system. Instead, FAF_{A} is a “strongest-link” survival profile across the components of AA. The right hand side of Equation (6) gives the greatest lower bound on the “strongest-link” survival profile over all necessary sets of resources.

Theorem 7 then implies the sensible yet nontrivial statement:

The best “weakest-link” reliability of an assembly is equal to the worst “greatest-link” reliability of a necessary set of components.

It is important to note that these best and worst reliability measures may not be achieved by any particular chain or anti-chain. Instead, this common value incorporates reliability information about all possible assemblies and necessary sets of components. In the case that the common value is realized by a necessary set of components, the realizing antichain shows which components must have their reliabilities improved in order to increase this measure.

4.2.2. Organizational structure and competency management

Let XX be the set of job roles in an organization, partially ordered by the reports to relationship \leq. Let YY be a finite set of all possible responsibilities or competencies in the organization. We can then define a competency function c:X2Yc:X\to 2^{Y} where c(x)c(x) is the set of competencies required by role xx. The Boolean lattice, L=2YL=2^{Y} under union and intersection, serves as our lattice of weights.

Applying Theorem 7 to this system yields:

κ𝒳xκc(x)=A𝒜xAc(x),\bigvee_{\kappa\in\mathcal{X}}\bigwedge_{x\in\kappa}c(x)=\bigwedge_{A\in\mathcal{A}}\bigvee_{x\in A}c(x),

where 𝒳\mathcal{X} is the set of all maximal chains in XX and 𝒜\mathcal{A} the set of maximal antichains in XX.

Chain interpretations: A maximal chain represents a complete hierarchical pathway within the organization. For such a chain, xκc(x)\bigwedge_{x\in\kappa}c(x) represents the intersection of competency sets across the entire hierarchical pathway. It captures the core competencies that are consistently required from the lowest to the highest role in the chain. The left hand side of the equation thus represents the union of all such core competency sets across every possible hierarchical pathway in the organization.

Antichain interpretations: An antichain represents a cross-functional team where each member operates independently of the others in terms of hierarchy. For such an antichain, xAc(x)\bigvee_{x\in A}c(x) represents the union of competency sets of a cross-functional team, capturing the collective strengths and diverse skill sets that each independent role brings to the team. The right hand side of the equation represents the intersection of all such combined competency sets across every possible cross-functional team configuration. It identifies the core competencies that are universally required across all antichains, ensuring that every cross-functional team inherently possesses these essential skills.

Theorem 7 thus implies:

Any competencies which persist across a full bottom-to-top hierarchical chain must be present in any maximal independent cross-functional team.

This equivalence reveals that the organization’s maximum potential for balanced hierarchical depth and cross-functional breadth is inherently determined by its bottleneck competencies. It demonstrates that the core competencies required consistently in hierarchical structures are precisely those that are universally necessary for effective cross-functional collaboration.

Example 4 (Organizational Competencies).

To illustrate with an unrealistically simple example, consider a software development company with roles of CEO, CTO, COO, project manager (PM), senior developer (SD), junior developer (JD), human resources (HR), quality assurance (QA), and marketing/sales (MS). These roles report according to the following complex structure in the form of a poset XX:

CEOCTOCOOPMSDHRQAMSJD

The competency relation for this organization can be represented as:

Role SP TL PP AC BC T EM M FM
CEO ×\times ×\times ×\times ×\times ×\times
CTO ×\times ×\times ×\times
COO ×\times ×\times ×\times ×\times ×\times
PM ×\times ×\times ×\times
SD ×\times ×\times ×\times ×\times
JD ×\times
QA ×\times ×\times
HR ×\times
MS ×\times

The competency set YY consists of: strategic planning (SP), technical leadership (TL), project planning (PP), advanced coding (AC), basic coding (BC), testing (T), employee management (EM), marketing (M), and financial management (FM). From this context, we construct a Boolean lattice L=2YL=2^{Y} and a competency weight function c:XLc:X\to L.

One can see from the diagram that there are five maximal chains in this poset with values computed as:

  1. (1)

    κ1={JD,SD,CTO,CEO}\kappa_{1}=\{\text{JD},\text{SD},\text{CTO},\text{CEO}\} : c(κ1)=c(\kappa_{1})=\emptyset

  2. (2)

    κ2={JD,SD,PM,CEO}\kappa_{2}=\{\text{JD},\text{SD},\text{PM},\text{CEO}\} : c(κ2)=c(\kappa_{2})=\emptyset

  3. (3)

    κ3={QA,PM,CEO}\kappa_{3}=\{\text{QA},\text{PM},\text{CEO}\} : c(κ3)=c(\kappa_{3})=\emptyset

  4. (4)

    κ4={HR,COO,CEO}\kappa_{4}=\{\text{HR},\text{COO},\text{CEO}\} : c(κ4)={EM}c(\kappa_{4})=\{\text{EM}\}

  5. (5)

    κ5={MS,PM,CEO}\kappa_{5}=\{\text{MS},\text{PM},\text{CEO}\} : c(κ5)=c(\kappa_{5})=\emptyset

Theorem 7 implies:

κ𝒳xκc(x)={EM}=A𝒜xAc(x).\bigvee_{\kappa\in\mathcal{X}}\bigwedge_{x\in\kappa}c(x)=\{\text{EM}\}=\bigwedge_{A\in\mathcal{A}}\bigvee_{x\in A}c(x).

This equality leads to the following insights:

Universal Competency:

EM (employee management) is the only competency that appears in every maximal antichain. This underscores its universal importance across all cross-functional team configurations within the organization.

Specialized Competencies:

Competencies like SP, TL, BC, FM, etc., are not universally required across all maximal antichains. Their presence is dependent on specific team configurations, indicating areas where targeted development or strategic emphasis might be beneficial.

Organizational Balance:

The prominence of EM suggests a strong emphasis on employee management, while the variability of other competencies highlights opportunities to balance strategic, technical, and operational skills more uniformly across teams.

Strategic Implications:

The absence of competencies such as PP in the universal set suggests that while important for specific roles, project planning skills are not deemed essential across all team configurations. This could indicate a potential area for organizational improvement to ensure broader competency coverage.

5. Towards lattice-valued duality

We close with a few comments.

  1. (1)

    The duality considered in this paper is not the classical max-flow-min-cut duality, and none of the theorems proved here imply classical MFMC: it is bottleneck duality that is generalized. For generalizations of the classical MFMC duality to capacities in other algebraic structures, see [12] for ordered d-monoids and [17] for certain semimodules (that have an inf-semilattice structure).

  2. (2)

    Algorithmic issues are — though important — not addressed in this work. The lack of universal existence of maximal flows and/or minimal cuts is likely to make effective computation difficult.

  3. (3)

    There do not appear to be bottleneck versions of the other major combinatorial duality theorems, such as König’s Theorem on bipartite graphs or the Matroid Intersection Theorem. It remains to be determined if there are lattice-weighted versions of these or related results.

  4. (4)

    Since most (if not all) combinatorial duality results derive from LP duality, the possibility of reformulating primal-dual LP problems and LP duality in the context of (certain classes of) lattices seems exciting.

6. Acknowledgments

This work was inspired by and generated with the assistance of AI language models: see the Appendix. The authors acknowledge support by the Air Force Office of Scientific Research (FA9550-21-1-0334) and the Office of the Undersecretary of Defense (Research & Engineering) Basic Research Office (HQ00342110001).

References

  • [1] Elwyn R Berlekamp. On the design of binary signaling alphabets. IEEE Transactions on Information Theory, 11(4):502–508, 1965.
  • [2] Garrett Birkhoff. Lattice Theory, volume 25 of Colloquium Publications. American Mathematical Society, Providence, RI, 3rd edition, 1967.
  • [3] George B Dantzig and Delbert R Fulkerson. On the max flow min cut theorem of networks. Linear inequalities and related systems, 38:225–231, 1956.
  • [4] Brian A Davey and Hilary A Priestley. Introduction to lattices and order. Cambridge University Press, 2002.
  • [5] Dorothy E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236–243, May 1976.
  • [6] Phil Diamond. A fuzzy max-flow min-cut theorem. Fuzzy Sets and Systems, 119(1):139–148, 2001.
  • [7] Robert P Dilworth. A decomposition theorem for partially ordered sets. Annals of Mathematics, pages 161–166, 1950.
  • [8] Jack Edmonds. Submodular functions, matroids, and certain polyhedra. Combinatorial structures and their applications, pages 69–87, 1970.
  • [9] Larry Eisenberg and Thomas H Noe. Systemic risk in financial systems. Management Science, 47(2):236–249, 2001.
  • [10] Peter Elias, Amiel Feinstein, and Claude E Shannon. A note on the maximum flow through a network. IRE Transactions on Information Theory, 2(4):117–119, 1956.
  • [11] Lester R Ford and Delbert R Fulkerson. Maximal flow through a network. Canadian Journal of Mathematics, 8:399–404, 1956.
  • [12] A. M. Frieze. Algebraic flows. Annals of Discrete Mathematics, 19:135–146, 1984.
  • [13] Bernhard Ganter and Rudolf Wille. Formal concept analysis: mathematical foundations. Springer Science & Business Media, 1999.
  • [14] George Grätzer. Lattice theory: Foundation. Springer Science & Business Media, 2011.
  • [15] Te C. Hu. The maximum capacity route problem. Operations Research, 9(6):898–900, 1961.
  • [16] Dénes König. Über graphen und ihre anwendung auf determinantentheorie und mengenlehre. Mathematische Annalen, 77:453–465, 1931.
  • [17] Sanjeevi Krishnan. Flow-cut dualities for sheaves on graphs, 2014.
  • [18] Tom Leighton and Satish Rao. Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. Journal of the ACM (JACM), 46(6):787–832, 1999.
  • [19] László Lovász and Michael D Plummer. Matching theory. American Mathematical Soc., 2009.
  • [20] Karl Menger. Über allgemeine kurventheorien. Fundamenta Mathematicae, 10(1):96–115, 1927.
  • [21] Crispin St John Alvah Nash-Williams. Edge-disjoint spanning trees of finite graphs. Journal of the London Mathematical Society, 1(1):445–450, 1961.
  • [22] Maurice Pollack. The maximum capacity through a network. Operations Research, 8(5):733–736, 1960.
  • [23] Alfred Tarski. A lattice-theoretical fixpoint theorem and its applications. Pacific Journal of Mathematics, 5:285–309, 1955.
  • [24] Rudolf Wille. Restructuring lattice theory: an approach based on hierarchies of concepts. Ordered sets, pages 445–470, 1982.

Appendix A AI Assistance

AI language models were useful in all aspects of the work, including formulation, proof, and application of all theorems. This appendix documents that usage.

A.1. Attribution

The following models were used substantially for conjecture formulation, proof-creation, and generation of application ideas:

  1. (1)

    Anthropic’s Claude-3.5-sonnet

  2. (2)

    Google’s Gemini-1.5-Pro-experimental-0827

  3. (3)

    OpenAI’s GPT-4o

  4. (4)

    OpenAI’s GPT-o1-mini

Other models (Claude-3-opus, Grok 2, Llama-3.1) were used less formally as part of initial conversations or experimentation with proof-writing later and did not contribute materially to the content of this paper.

Each theorem statement, proof, and application in this paper was jointly developed between authors and AI assistants.

  1. (1)

    Theorem 6 was first conjectured (for complete finite lattices) in conversations with GPT-4o and Claude-3.5-sonnet, the latter being where the result was first proposed.

  2. (2)

    The main theorem in this paper is Theorem 3, from which all others are derived. This had two human-generated proofs: one, based on the Birkhoff representation theorem, reasoned based on set intersection and union. The second was a combinatorial proof that was more self-contained and subtle. The multiple proofs generated by Claude-3.5-sonnet, GPT-4o, and Gemini-1.5-pro were all incorrect (though some very convincing at first). The proof that appears here was generated by GPT-o1-mini. It is similar in spirit to the second human-generated proof, but is clearer and more elegant in its use of indexing. Some small corrections needed to be made to the proof to make it fully rigorous, but the key idea was from GPT-o1-mini. In particular, none of the human-generated proofs were fed into GPT-o1-mini: a faulty proof (created via a combination of Gemini-1.5-Pro and Claude-3.5-sonnet) was fed into GPT-o1-mini, and it noted the errors and attempted an entirely novel proof strategy.

  3. (3)

    Theorem 6 was the initial focus of the paper. The many independent proofs generated by all models used were all incorrect. After sufficiently many tries, the common failure modes became recognizable, as if a subspace of latent proof-space was being explored. After the proof of Theorem 3 was established, the goal switched to proving Theorem 6 as a corollary. The proof appearing in this paper is the human-generated proof: the AI-generated proofs were all either incorrect or less elegant. Using GPT-o1-mini ex post facto with a clean chat leads swifty to a proof that is in essence the same as the human-generated proof presented here (66fa9b76-3c80-800d-8f63-6a7ba4e697e1).

  4. (4)

    Theorem 7 was initially generalized by Claude-3.5-sonnet, but without the maximality condition on the chains and antichains. All proofs generated were invalid, and AI models found counterexamples to the claimed result. When humans suggested adding the maximality conditions, proofs by both humans and AIs were viable. The proof appearing here is a mixture of human and AI-generated content.

  5. (5)

    The various applications were all suggested by Claude-3.5-sonnet, GPT-4o, or GPT-o1-mini, with varying degrees of viability. Applications 2.3.2 and 4.2.1 were more human-generated than AI-generated. Applications 2.3.3, 4.2.2 and Example 4 were primarily AI-generated, but multiple small errors required human editing.

A.2. Timeline

The following timeline has been reconstructed from chat histories as accurately as possible, given the limitations of search and indexing in existing platforms. Dates and chat identifiers are included for reference purposes. All specific chat references are from interactions between the first author and AI platforms, although all authors used GPT and Claude frequently in the writing and editing of this paper. There are several typos in the user inputs due to frequent use of phone interface.

14 Apr 2024:

A chat with Claude-3-opus explores potential applications of the sheaf Laplacian (d10da4f1-3712-46f5-a060-0d020e8d8f20). Claude suggests investigating the classical Eisenberg-Noe model in financial networks [9]. This sparked several subsequent conversations among the authors and the AIs about the use of lattice theory and the Tarski fixed point theorem [23] in the original work.

10 Aug 2024:

An initial conversation with GPT-4o attempts to extend the classical Eisenberg-Noe system from scalar values to more general complete lattices (b792ee6a-5603-4a9f-b837-f6949a86a867). A subsequent conversation with Claude-3.5-sonnet leads to a discussion of the use of lattices and the Tarski fixed point theorem in other classical results in applied mathematics, including various duality theorems.

10 Aug 2024:

Follow-up conversation with Claude-3.5-sonnet in a new chat begins with the prompt “I’m thinking about trying to react [sic] the max flow min cut theorem in terms of lattice theory. Has anyone done that before?” (1ac66a65-4fc3-489a-baa9-bb72389c21a7). After some clarification, Claude responds “I see what you’re aiming for now. You’re looking to reformulate the Max Flow Min Cut (MFMC) theorem using an approach similar to Eisenberg and Noe’s work on financial networks, specifically by recasting it as an iterated lattice map with fixed points.” After generating what it claims is a proof, Claude suggests several possible extensions. The prompt “We’ll [sic], what I really want to see is an extension on MFMC that uses more general lattices that those based on the total ordering of capacities.” After a long conversation about the use of lattices, the prompt “okay, let’s delve into lattice-valued capacities and see if anything can be proved in that case with tarski, comparing the result to the existing literature” Claude suggests a formulation of cut-values and flow-values as in Section 3.1 and a conjecture of Theorem 6 in the setting of a finite complete lattice. The user found this conjecture to be a surprising and elegant idea.

10 Aug 2024:

Claude’s generated proof of what would become Theorem 6 (a flawed rewrite of the classical Ford-Fulkerson proof but with lattice operations) is fed into GPT-4o (e922ed51-2c7e-40dd-9e54-8143db9d2e00) which declares “Your proof is largely correct, but careful attention should be given to the uniqueness of the maximal flow and the behavior of lattice operations in the residual network.” When asked to improve the proof, GPT-4o makes minor changes. It then suggests, “It might be worth preparing your proof for submission to a mathematical journal, given its originality and the lack of existing results in this exact domain.”

11 Aug 2024:

Subsequent chats with Claude-3.5-sonnet and GPT-4o led to a number of generalizations of duality in Mathematics to lattice-valued systems, including linear programming, Farkas’ Lemma, and the Adjoint Functor Theorem, sparking a long detour to different conjectures (604701b4-6b5a-4222-bd6e-e88d742cde91 and g-l1QiiFpYW-lattice-research/c/cf24ca41-5daa-4b8e-aa8d-4925762d9046). The lattice-valued MFMC work is dropped for about two weeks.

Late Aug 2024:

Both GPT-4o and Gemini-1.5-Pro suggest a version of Theorem 6 when asked for potential generalizations of MFMC to lattice-valued systems. Gemini (1S9G7VDZybV2zSomUmghTqBeSc8LXjaQL) proposes a version of Theorem 6 with a complete lattice, suggesting the same definitions for flow conservation, flow values, and cut values, with an incorrect Ford-Fulkerson-style proof. First attempts as proofs using GPT-4o (g-l1QiiFpYW-lattice-research/c/6f5f40be-bd9e-4c25-9726-cb2dc1e4e11f) are likewise faulty. GPT-4o later suggests that modularity or distributivity might be essential for the proof (g-l1QiiFpYW-lattice-research/c/5dbbee7b-8a21-41fc-8189-0bb6d715c851). Multiple wrong proofs are generated by Claude-3.5-sonnet and GPT-4o.

1 Sept 2024:

Claude-3.5-sonnet initially claims that Theorem 6 implies the classical MFMC (Theorem 1) by choosing L=(+,,min,+)L=(\mathbb{R}^{+},\leq,\min,+) (32c0d16d-803c-46f8-8448-29cee82792bc). However, this is not a lattice, as subsequent reflection reveals (32c0d16d-803c-46f8-8448-29cee82792bc). Focus switches from Theorem 6 to Theorem 3 as being more fundamental.

4 Sept 2024:

In looking for possible counterexamples to Theorem 3, GPT-4o finds a counterexample, but it is incorrect; then it generates a new counterexample that seems correct. Claude-3.5-sonnet confirms and generates what becomes Example 1 (fd68a342-5fc8-44c9-ad01-5a6aa1414357). Focus is now placed on distributivity as a requirement.

5 Sept 2024:

Claude-3.5-sonnet is tasked to write a proof that explicitly uses distributivity. It cycles through previously-documented failure modes in proofs. When these are pointed out, after several additional wrong attempts, Claude gives up, saying (d95ba926-c0c3-4dd8-948b-33c95139efe2): “Given the complexity of this problem and the subtlety of the error we’ve uncovered, I would recommend consulting more specialized literature on lattice-valued network flows or seeking input from experts in this field.”.

5 Sept 2024:

Gemini-Pro-1.5-experimental-0827 was tasked with generating a proof of Theorem 3 that uses distributivity in an essential manner, as this must be an assumption. The proof is convoluted and incorrect, but contains an interesting combinatorial approach (1L0dplwIZLjttzlXr6SqaZ-wShRTPGrhF).

8 Sept 2024:

Claude-3.5-sonnet is given the “proof” of Theorem 3 as suggested by Gemini on 5 Sept, making several improvements. The resulting proof is still not correct, but it takes more work than before to find the errors, since this appears to use distributivity in an essential manner (adcde57b-1f3a-47ec-be99-8c9748aa503e).

13 Sept 2024:

GPT-o1-preview and GPT-o1-mini are released to OpenAI-Plus subscribers. GPT-o1-preview is tasked with proving Theorem 3 being sure to use distributivity (66e35176-b414-800d-9c12-d712eed0cdc9). It makes several obvious errors.

13 Sept 2024:

A new proof of Theorem 3 is generated by GPT-o1-mini (66e41dbc-6434-800d-9ffa-6ce3adc01f45). The conversation began with uploading a faulty proof of the result from Claude-3.5-sonnet (adcde57b-1f3a-47ec-be99-8c9748aa503e) and asking for an analysis. GPT-o1-mini detected errors, then generated a “corrected” proof that had an obvious inequality backwards. When this was pointed out, the model confirmed the mistake and said “To address this, let’s revisit and refine the proof…”. An entirely new proof followed that is largely what appears in this paper. This critical portion of the conversation is recorded as taking 43 seconds of “thought”.

13-14 Sept 2024:

Uploaded the new proof of Theorem 3 and asked GPT-o1-mini to use this to provide a proof of Theorem 6. GPT-o1-mini made the classic mistake of trying to construct a maximal flow (66e4303b-a80c-800d-b88f-4ee03bb58208) and generally failed to prove the theorem. Human-generated proof used in paper.

16 Sept 2024:

First author announced the main results of this paper and their genesis at a talk at the Centre de Recerca Mathemàtica in Barcelona entitled Flows: Topology, Geometry, Algebra, and AI.

30 Sept 2024:

Write-up of paper completed and submitted to ArXiV.

A.3. Commentary

Based on the experience of writing this paper, the authors have a healthy mixture of optimism and realism about the prospects of AI-assisted theorem-generation and theorem-proving. It surely would have been simpler to work alone without having AI assistance, since the vast majority of proofs suggested by AI tools had errors of varying degrees of subtlety. Perhaps the most interesting aspect of this process was finding a boundary where existing language models could conjecture and almost (but not quite) prove a result that we knew to be true. Seeing an improved model (GPT-o1-mini) transcend that boundary and improve upon our proof without knowing of it was an exciting experience.

Without AI assistance, the results proved here would not have been known to us.