2 The Truncated Fourier Transform and Applications The TFT permits to speed up the multiplication of univariate polynomials with a constant factor bet

Size: px
Start display at page:

Download "2 The Truncated Fourier Transform and Applications The TFT permits to speed up the multiplication of univariate polynomials with a constant factor bet"

Transcription

1 The Truncated Fourier Transform and Applications Joris van der Hoeven D pt. de Math matiques (B t. 425) Universit Paris-Sud Orsay Cedex France joris@texmacs.org January 9, 2004 In this paper, we present a truncated version of the classical Fast Fourier Transform. When applied to polynomial multiplication, this algorithm has the nice property of eliminating the jumps in the complexity at powers of two. When applied to the multiplication of multivariate polynomials or truncated multivariate power series, we gain a logarithmic factor with respect to the best previously known algorithms. Keywords: Fast Fourier Transform, jump phenomenon, truncated multiplication, FFT-multiplication, multivariate polynomials, multivariate power series. A.M.S. subject classification: 42-04, 68W25, 42B99, 30B10, 68W Introduction Let R 3 1/2 be an eective ring of constants (i.e. the usual arithmetic operations, and can be carried out by algorithm). If R has a primitive n-th root of unity with n = 2 p, then the product of two polynomials P Q 2 R[X] with deg P Q < n can be computed in time O(n log n) using the Fast Fourier Transform or FFT [CT65]. If R does not admit a primitive n-th root of unity, then one needs an additional overhead of O(log log n) in order to carry out the multiplication, by articially adding new root of unity [SS71, CK91]. Besides the fact that the asymptotic complexity of the FFT involves a large constant factor, another classical drawback is that the complexity function admits important jumps at each power of two. These jumps can be reduced by using (k 2 p )-th roots of unity for small k. They can also be smoothened by decomposing (n ) (n )-multiplications as n n-, n - and (n ) -multiplications. However, these tricks are not very elegant, cumbersome to implement, and they do not allow to completely eliminate the jump problem. In section 3, we present a new kind of Truncated Fourier Transform or TFT, which allows for the fast evaluation of a polynomial P 2 R[X] in any number n of well-chosen roots of unity. This algorithm coincides with the usual FFT if n is a power of two, but it behaves smoothly for intermediate values. In section 4, we also show that the inverse operation of interpolation can be carried out with the same complexity. 1

2 2 The Truncated Fourier Transform and Applications The TFT permits to speed up the multiplication of univariate polynomials with a constant factor between 1 and 2. In the case of multivariate polynomials, the repeated gain of such a constant factor leads to the gain of a non-trivial asymptotic factor. More precisely, assuming that R admits suciently 2 p -th roots of unity, we will show in section 5 that the product of two multivariate polynomials P Q 2 R[z 1 z d ] can be computed in time O(s log s), where s = and r = deg P Q 1. The best previously r d 1 d known algorithm [CKL89], based on sparse polynomial multiplication, has time complexity O(s log 2 s). In section 6 we nally give an algorithm for the multiplication of truncated multivariate power series. This algorithm, which has time complexity O(s log 2 s), again improves the best previously known algorithm [LS01] by a factor of O(log s). Moreover, both in the cases of multivariate polynomials and power series, we expect the corresponding constant factor to be much better. 2. The Fast Fourier Transform Let R be an eective ring of constants, n = 2 p with p 2N and! 2 R a primitive n-th root of unity (i.e.! n/2 = 1). The discrete Fast Fourier Transform (FFT) of an n-tuple (a 0 a n 1 ) 2 R n (with respect to!) is the n-tuple (a^0 a^n 1 ) = FFT! (a) 2 R n with n 1 a^i =X a j! ij : j=0 In other words, a^i = A(! i ), where A 2 R[X] denotes the polynomial A = a 0 a 1 X a n 1 X n 1. The F.F.T can be computed eciently using binary splitting: writing (a 0 a n 1 ) = (b 0 c 0 b n/2 1 c n/2 1 ) we recursively compute the Fourier transforms of (b 0 Then we have FFT! (a 0 FFT! 2(b 0 FFT! 2(c 0 b n/2 1 ) = (b^0 b^n/2 1) c n/2 1 ) = (c^0 c^n/2 1 ): b n/2 1 ) and (c 0 c n/2 1 ) a n 1 ) = (b^0 c^0 b^n/2 1 c^n/2 1! n/2 1 b^0 c^0 b^n/2 1 c^n/2 1! n/2 1 ): This algorithm requires n p = n log 2 n multiplications with powers of! and 2 n p additions (or subtractions). In practice, it is most ecient to implement an in-place variant of the above algorithm. We will denote by [i] p the bitwise mirror of i at length p (for instance, [11] 5 = 26). At step 0, we start with the vector x 0 = (x 00 x 0n 1 ) = (a 0 a n 1 ):

3 Joris van der Hoeven 3 At step s 2 f1 pg, we set x simj! = 1![i] sm x s(i1)mj 1! [i] sm! x s 1imj x s 1(i1)mj!: (1) for all i 2 f0 2 n/m 2g and j 2 f0 m 1g, where m = 2 p s. Using induction over s, it can easily be seen that for all i 2 f0 x simj = (FFT! m(a j a mj a n mj )) [i] s n/m 1g and j 2 f0 m 1g. In particular, x pi = a^[i] p a^i = x p[i] p for all i 2 f0 n 1g. This algorithm of repeated crossings is illustrated in gure 1. Figure 1. Schematic representation of a Fast Fourier Transform for n = 16. The black dots correspond to the xsi, the upper row being (x00 x015) = (a0 a15) and the lower row (x40 x415) = (a^0 a^8 a^4 a^12 a^15 ). A classical application of the FFT is the multiplication of polynomials A = a 0 a n 1 X n 1 and B = b 0 b n 1 X n 1. Assuming that deg A B < n, we rst evaluate A and B in 1!! n 1 using the FFT: (A(1) (B(1) A(! n 1 )) = FFT! (a 0 a n 1 ) B(! n 1 )) = FFT! (b 0 b n 1 ) We next compute the evaluations (A(1) B(1) A(! n 1 ) B(! n 1 ))) of A B at 1! n 1. We nally have to recover A B from these values using the inverse FFT. But the inverse FFT with respect to! is nothing else as 1/n times the direct FFT with respect to! 1. Indeed, for all (a 0 a n 1 ) 2 R n and all i 2 f0 n 1g, we have n 1 n 1 FFT! 1(FFT! (a)) i =X X a i! (i k)j = n a i (2) k=0 j =0 since n 1 X j=0! (i k)j = 0

4 4 The Truncated Fourier Transform and Applications whenever i k. This yields a multiplication algorithm of time complexity O(n log n) in R[X], when assuming that R admits enough primitive 2 p -th roots of unity. In the case that R does not, then new roots of unity can be added articially [SS71, CK91, vdh02] so as to yield an algorithm of time complexity O(n log n log log n). 3. The Truncated Fourier Transform The algorithm from the previous section has the disadvantage that n needs to be a power of two. If we want to multiply two polynomials A B 2 R[X] such that deg A B 1 = n, then we need to carry out the FFT at precision 2 n, thereby losing a factor of 2. This factor can be reduced using several tricks. For instance, one may decompose the (n ) (n )- product into an n n product, an n -product and an (n ) -product. This is ecient for small, but not very good if n/2. In the latter case, one may also use an FFT at precision 3 n/2, by using 3 3-matrices at one step of the FFT computation. However, all these tricks of the trade require a large amount of hacking and one always continues to lose a non-trivial factor between 1 and 2. The idea behind the Truncated Fourier Transform is to provide an ecient algorithm for the evaluation of polynomials in any number of distinct points. Moreover, the inverse operation of interpolation can be carried out with the same complexity. This technique will eliminate the jumps in the complexity of FFT multiplication. So let n = 2 p, l < n (usually, l>n/2) and let! be a primitive n-th root of unity. Given an l-tuple (a 0 a l 1 ), we will evaluate the corresponding polynomial A = a 0 a l 1 X l 1 in! [0]p! [1]p! [l 1] p. We call (A(! [0]p ) A(! [l 1]p )) the Truncated Fourier Transform (TFT) of (a 0 a l 1 ). Now consider the completion of the l-tuple (a 0 a l 1 ) into an n-tuple (a 0 a l 1 0 0). When using the in-place algorithm from the previous section in order to compute (A(! [0]p ) A(! [l 1]p )), we claim that many of the computations of the x si can actually be skipped (see gure 2). Indeed, at stage s, it suces to compute the vector (x s0 x sbl/mc(m1) 1 ). Besides x s0 x sl 1, we therefore compute at most m = 2 p s additional values. In total, we therefore compute at most p l 2 p 1 2 p 2 1 < p l n values x si. This proves the following result: Theorem 1. Let n = 2 p, l < n and let! 2 R be a primitive n-th root of unity in R. Then the Truncated Fourier Transform of an l-tuple (a 0 a l 1 ) w.r.t.! can be computed using at most l p n additions (or subtractions) and d(l p n)/2e multiplications with powers of!. Figure 2. Schematic representation of a TFT for n = 16 and l = 11.

5 Joris van der Hoeven 5 = ) Remark 2. Assume that R admits a privileged primitive n-th root of unity! n for every n 2 2 N 2, such that! 2n =!n for all n. Then the TFT (a^0 a^l 1 ) of an l-tuple (a 0 a l 1 ) w.r.t.! n with n > l does not depend on the choice of n. We call (a^0 a^l 1 ) the TFT of (a 0 a l 1 ) w.r.t. the privileged sequence (! 1! 2! 4 of roots of unity. Remark 3. Since the only operations we need for computing the TFT are additions, subtractions and multiplications by powers of!, the algorithm naturally combines with Sch nhage-strassen's algorithm when! is a symbolically added root of unity. Remark 4. If f 0 = f l 0 1, then the TFT of (f 0 f l 1 ) can be computed using O((l l 0 ) p 2 n) operations using a similar algorithm as above. More generally, this allows the rapid transformation of unions of segments. 4. Inverting the Truncated Fourier Transform Unfortunately, the inverse TFT cannot be computed using a similar formula as (2). Indeed, starting with the x li, we need to compute an increasing number of x si when s decreases. Therefore we will rather invert the algorithm which computes the TFT, but with this dierence that we will sometimes need x s 0 i 0 with s0 < s in order to compute x si. We will use the fact that whenever one value among x simj, x s 1imj and one value among x s(i1)mj, x s 1(i1)mj are known in the cross relation (1), then we can deduce the others from them using one multiplication by a power of! and two shifted additions or subtractions (i.e. the results may have to be divided by 2). More precisely, let us denote k s = bl/mc m and l s = k s m at each stage s. We use a recursive algorithm which takes the values x pks x pl 1 and x sl x sls on input, and which computes x sks x sl 1. If s = p, then we have nothing to do. Otherwise, we distinguish two cases: If l s = l s1, then we rst compute x sks x sks1 1 from x pks x pks1 1 using repeated crossings. We next deduce x si and x s1im/2 from x s1i and x sim/2 for all i 2 fl m/2 k s1 1g. Invoking our algorithm recursively, we now obtain x s1ks1 x s1l 1. We nally compute x si and x sim/2 from x s1i and x s1im/2 for i 2 fk s l m/2 1g. If l s > l s1, then we rst compute x s1i from x si and x sim/2 for i 2 fl l s1 1g. Invoking our algorithm recursively, we next compute x s1ks1 x s1l 1. We nally deduce x si from x s1i and x sim/2 for all i 2 fk s l 1g. The two cases are illustrated in gures 3 resp. 4. Since x 0l = = x 0n 1 = 0, the application of our algorithm for s = 0 computes the inverse TFT. We notice that the values x si with i < l are computed in decreasing order (for s) and the values x si with i > l in increasing order. In other words, the algorithm may be designed in such a way to remain in place. We have proved: Theorem 5. Let n = 2 p, l < n and let! 2 R be a primitive n-th root of unity in R. Then the l-tuple (a 0 a l 1 ) can be recovered from its Truncated Fourier Transform w.r.t.! using at most l p n shifted additions (or subtractions) and d(l p n)/2e multiplications with powers of!.

6 6 The Truncated Fourier Transform and Applications Figure 3. Schematic representation of the recursive computation of the inverse TFT for n = 16, l = 11. The dierent images show the progression of the known values xij (the black dots) during the dierent computations at stage s = 0. Since l0 = l1 = 16, we fall into the rst case of our algorithm and the recursive invocation of the algorithm is done between the third and the fourth image. Figure 4. Schematic representation of the recursive computation of the inverse TFT for n = 16, l = 11 at stage s = 1. Since l 1 = 16 and l 2 = 12, we now fall into the second case of our algorithm and the recursive invocation of the algorithm is done between the third and the fourth image. 5. Multiplying multivariate polynomials Let R be a ring with a privileged sequence (! 1! 2! 4 ) of roots of unity (see remark 2). Given a non-zero multivariate polynomial f = X f i1 i i 1 i d i d z 1 1 z in d > 1 variables, we dene the total degree of f by deg f = max fi 1 d i d 2 R[z 1 z d ] i d : f i1 i d 0g 2N We let deg 0 = 1. Now let f g 2 R[z 1 z d ] be such that deg f g < r. In this section we present an algorithm to compute f g, which has a good complexity in terms of the number s = r d 1 d

7 Joris van der Hoeven 7 TFT of expected coecients of f g. When computing f g using the classical FFT with respect to each of the variables z 1 z d, we need a time O(d (2 r) d log r)) which is much bigger than s, in general. When using multiplication of sparse polynomials [CKL89], we need a time O(s log 2 s) with a very large constant factor. Our algorithm is based on the TFT w.r.t. all variables and we will show that it has a complexity O(s log s). Given f 2 R[z 1 z d ] with deg f < r, the TFT of f with respect to one variable z v at order r is dened by [i TFT vr (f ) = f i1 i v 1 i v1 i d (z v =! v v ]n i 1 i d <r where n = 2 p > r. We recall that the result does not depend on the choice of n. The TFT with respect to all variables z 1 z d at order r is dened by [i TFT r (f ) = f (! 1 ]n [i n! d ]n n ) where n = 2 p > r (see gure 5). We have Given f g 2 C[z 1 TFT r (f ) = TFT dr ( i 1 i d <r 1r (f ) ): z d ] with deg f g < r, we will use the formula in order to compute the product f g. f g = TFT r 1 (TFTr (f ) TFT r (g)) f 05 f (1! 3 ) f 04 f 14 f (1! 5 ) f(! 4! 5 ) f 03 f 13 f 23 f (1! 6 ) f(! 4! 6 ) f(! 2! 6 ) f 02 f 12 f 22 f 32 f (1! 2 ) f(! 4! 2 ) f(! 2! 2 ) f(! 6! 2 ) f 01 f 11 f 21 f 31 f 41 f (1! 4 ) f(! 4! 4 ) f(! 2! 4 ) f(! 6! 4 ) f(! 5! 4 ) f 00 f 10 f 20 f 30 f 40 f 50 f(1 1) f(! 4 1) f (! 2 1) f (! 6 1) f (! 5 1) f(! 3 1) Figure 5. Illustration of the TFT in two variables (! =! 8 ). In order to compute TFT vr (f ), say for v = 1, we compute the TFT of (f 0i2 i d f l 1i2 i d ) with l = r i 2 i r for all i 2 i d with i 2 i n < r 1 (if i 2 i n = r 1, then the TFT of (f 0i2 i d ) is given by itself, so we have nothing to do). One such computation takes a time 6C l log l for some universal constant C, by using the TFT w.r.t.! n with minimal n = 2 p > l (so n may vary as a function of i 2 i d, but not C). The computation of TFT r (f ) therefore takes a time T dr with r T dr 6 C dx r l d 2 l log l: Dividing by s, we obtain T dr s r 6 C d 2 (d 1)X Xr 6 C d 3 l=2 l=2 l=2 d 2 (r d l 2)! (r d 1)! (r d l)! (r 1)! (r d 1)! (r l)! (r 1)! (r l)! l log l l log l (r l d) (r l d 1) (3)

8 8 The Truncated Fourier Transform and Applications TFT TFT If r 6 d, then the summand rapidly deceases when l > 2, so that T dr s = r O(d3 ) = O(r) = O(log s): (r d) 3 Consequently, T dr = O(s log s) and even T dr = O(s) for xed r. If r > d, then for d = " r and l = r, Stirling's formula yields log (r d l)! (r 1)! (r d 1)! (r l)! = " r : It follows that only the rst O(r/d) = O(1/") terms in (3) contribute to the asymptotic behaviour of T dr, so that s T dr = O(d 3 1 " log (1/") " r 2 ) = O(d log (r/d)) = O(log s): Again, we nd that T dr = O(s log s). We have proved: Theorem 6. Let R be a ring with a privileged sequence (! 1! 2! 4 Let f g 2 R[z 1 z d ] be polynomials with deg f deg g < r and let s = product f g can be computed using O(s log s) operations in R. ) of roots of unity.. Then the r d 1 r 6. Multiplying multivariate power series Since power series have innitely many terms, implementing an operation on power series really corresponds to implementing the operation for polynomial approximations at all degrees. As P usual, multiplication is a particularly important operation. Given f g 2 C[z 1 z d ] with deg f < r and deg g < r, we will show how to compute the truncated product h = i 1 i d <d (f g) i i 1 i d z 1 i 1 z d d 2 R[z 1 z d ] of f and g. The rst idea [LS01] is to use homogeneous coordinates instead of the usual ones: f ~ (z 1 z 2 g~(z 1 z 2 z d ) = f (z 1 z 1 z 2 z 1 z d ) z d ) = g(z 1 z 1 z 2 z 1 z d ): This transformation takes no time since it corresponds to some re-indexing. We next compute the TFTs f^ and g^ in z 2 z d at order r: f^ = TFT dr ( g^ = TFT dr ( 2r (f ~ ) ) 2r (g~) ): We next compute the s 0 r d 2 = d 1 truncated products h^i2 i d (z 1 ) of the obtained polynomials f^i 2 i d (z 1 ) and g^i2 i d (z 1 ). After transforming the results of these multiplication back using h ~ 1 = TFT 2r( we obtain the truncated product h of f and g by h(z 1 z 2 1 TFT dr(h^) ) z d ) = h ~ (z 1 z 2 /z 1 z d /z 1 ): The total computation time is bounded by O(r s 0 log s 0 r s 0 log r). Using the fact that r s 0 = O(s log s), we have proved the following theorem: Theorem 7. Let R be a ring with a privileged sequence (! 1! 2! 4 ) of roots of unity. Let f g 2 R[z 1 z d ] be polynomials of degrees <r and let s =. Then the truncated r d 1 r product of f and g at degree <r can be computed using O(s log 2 s) operations in R.

9 Joris van der Hoeven 9 Remark 8. In practice, if the coecients f i1 i d have dierent growths in i 1 i d, then it may be useful to consider truncations along more general degrees of the form deg f = max f 1 i 1 d i d : f i1 i d 0g: The slicing technique from section in [vdh02] may then be used in order to obtain complexity bounds of the same type. Remark 9. Using remark 4, the polynomial and truncated multiplication algorithms can be used in combination with the strategy of relaxed evaluation [vdh97, vdh02, vdh03b] for solving partial dierential equations in multivariate power series with an additional overhead of O(log r). A recent technique [vdh03a] allows to reduce this overhead even further and it would be interesting to study more precisely what happens in the multivariate case. Bibliography [CK91] D.G. Cantor and E. Kaltofen. On fast multiplication of polynomials over arbitrary algebras. Acta Informatica, 28:693701, [CKL89] J. Canny, E. Kaltofen, and Y. Lakshman. Solving systems of non-linear polynomial equations faster. In Proc. ISSAC '89, pages , Portland, Oregon, A.C.M., New York, ACM Press. [CT65] J.W. Cooley and J.W. Tukey. An algorithm for the machine calculation of complex Fourier series. Math. Computat., 19:297301, [HQZ00] Guillaume Hanrot, Michel Quercia, and Paul Zimmermann. Speeding up the division and square root of power series. Research Report 3973, INRIA, July Available from [HQZ02] Guillaume Hanrot, Michel Quercia, and Paul Zimmermann. The middle product algorithm I. speeding up the division and square root of power series. Submitted, [HZ02] Guillaume Hanrot and Paul Zimmermann. A long note on Mulders' short product. Research Report 4654, INRIA, December Available from [LS01] G. Lecerf and. Schost. Fast multivariate power series multiplication in characteristic zero. Technical Report , GAGE, cole polytechnique, Palaiseau, France, [SS71] A. Sch nhage and V. Strassen. Schnelle Multiplikation grosser Zahlen. Computing 7, 7: , [vdh97] J. van der Hoeven. Lazy multiplication of formal power series. In W. W. K chlin, editor, Proc. ISSAC '97, pages 1720, Maui, Hawaii, July [vdh02] Joris van der Hoeven. Relax, but don't be too lazy. JSC, 34:479542, [vdh03a] Joris van der Hoeven. New algorithms for relaxed multiplication. Technical Report , Univ. d'orsay, [vdh03b] Joris van der Hoeven. Relaxed multiplication using the middle product. In Manual Bronstein, editor, Proc. ISSAC '03, pages , Philadelphia, USA, August 2003.

2 Multi-point evaluation in higher dimensions tion and interpolation problems in several variables; as an application, we improve algorithms for multi

2 Multi-point evaluation in higher dimensions tion and interpolation problems in several variables; as an application, we improve algorithms for multi Multi-point evaluation in higher dimensions Joris van der Hoeven Laboratoire d'informatique UMR 7161 CNRS cole polytechnique 91128 Palaiseau Cedex France Email: vdhoeven@lix.polytechnique.fr Web: http://www.lix.polytechnique.fr/~vdhoeven

More information

2 Section 2 However, in order to apply the above idea, we will need to allow non standard intervals ('; ) in the proof. More precisely, ' and may gene

2 Section 2 However, in order to apply the above idea, we will need to allow non standard intervals ('; ) in the proof. More precisely, ' and may gene Introduction 1 A dierential intermediate value theorem by Joris van der Hoeven D pt. de Math matiques (B t. 425) Universit Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the eld of grid-based

More information

Newton s method and FFT trading

Newton s method and FFT trading Newton s method and FFT trading Joris van der Hoeven Dépt. de Mathématiques (Bât. 425) CNRS, Université Paris-Sud 91405 Orsay Cedex France Email: joris@texmacs.org December 9, 2008 Let C[[z]] be the ring

More information

Counterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co

Counterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co Counterexamples to witness conjectures Joris van der Hoeven D pt. de Math matiques (b t. 45) Universit Paris-Sud 91405 Orsay CEDEX France August 15, 003 Consider the class of exp-log constants, which is

More information

An Illustrated Introduction to the Truncated Fourier Transform

An Illustrated Introduction to the Truncated Fourier Transform An Illustrated Introduction to the Truncated Fourier Transform arxiv:1602.04562v2 [cs.sc] 17 Feb 2016 Paul Vrbik. School of Mathematical and Physical Sciences The University of Newcastle Callaghan, Australia

More information

Relaxed Multiplication Using the Middle Product

Relaxed Multiplication Using the Middle Product Relaxed Multiplication Usin the Middle Product Joris van der Hoeven Département de Mathématiques (bât. 425) Université Paris-Sud 91405 Orsay Cedex France joris@texmacs.or ABSTRACT In previous work, we

More information

Fast Multivariate Power Series Multiplication in Characteristic Zero

Fast Multivariate Power Series Multiplication in Characteristic Zero Fast Multivariate Power Series Multiplication in Characteristic Zero Grégoire Lecerf and Éric Schost Laboratoire GAGE, École polytechnique 91128 Palaiseau, France E-mail: lecerf,schost@gage.polytechnique.fr

More information

Multi-point evaluation in higher dimensions

Multi-point evaluation in higher dimensions x Multi-point evaluation in higher dimensions Joris van der Hoeven Laboratoire d informatique UMR 7161 CRS École polytechnique 91128 Palaiseau Cedex France Email: vdhoeven@lix.polytechnique.fr Web: http://www.lix.polytechnique.fr/~vdhoeven

More information

Effective analytic functions Joris van der Hoeven D pt. de Math matiques (b t. 425) Universit Paris-Sud Orsay Cedex France

Effective analytic functions Joris van der Hoeven D pt. de Math matiques (b t. 425) Universit Paris-Sud Orsay Cedex France Effective analytic functions Joris van der Hoeven D pt. de Math matiques (b t. 425) Universit Paris-Sud 945 Orsay Cedex France Email: vdhoeven@texmacs.org August, 23 One approach for computations with

More information

Multi-point evaluation in higher dimensions

Multi-point evaluation in higher dimensions x Multi-point evaluation in higher dimensions Joris van der Hoeven Laboratoire d informatique UMR 7161 CNRS École polytechnique 91128 Palaiseau Cedex France Email: vdhoeven@lix.polytechnique.fr Web: http://www.lix.polytechnique.fr/~vdhoeven

More information

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication March, 2006 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform

More information

Fast composition of numeric power series

Fast composition of numeric power series Fast composition of numeric power series Joris van der Hoeven CNRS, Département de Mathématiques Bâtiment 425 Université Paris-Sud 91405 Orsay Cedex France Email: joris@texmacs.org Web: http://www.math.u-psud.fr/~vdhoeven

More information

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform polynomial multiplication

More information

Computing with D-algebraic power series

Computing with D-algebraic power series Computing with D-algebraic power series by Joris van der Hoeven CNRS, LIX, École polytechnique 91128 Palaiseau Cedex France Email: vdhoeven@lix.polytechnique.fr April 15, 2014 Abstract In this paper, we

More information

Faster polynomial multiplication over nite elds

Faster polynomial multiplication over nite elds Faster polynomial multiplication over nite elds David Harvey School of Mathematics and Statistics University of New South Wales Sydney NSW 2052 Australia Email: d.harvey@unsw.edu.au Joris van der Hoeven

More information

1 Matrices and Systems of Linear Equations

1 Matrices and Systems of Linear Equations Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 207, v 260) Contents Matrices and Systems of Linear Equations Systems of Linear Equations Elimination, Matrix Formulation

More information

Fast algorithms for polynomials and matrices Part 2: polynomial multiplication

Fast algorithms for polynomials and matrices Part 2: polynomial multiplication Fast algorithms for polynomials and matrices Part 2: polynomial multiplication by Grégoire Lecerf Computer Science Laboratory & CNRS École polytechnique 91128 Palaiseau Cedex France 1 Notation In this

More information

Even faster integer multiplication

Even faster integer multiplication Even faster integer multiplication David Harvey School of Mathematics and Statistics University of New South Wales Sydney NSW 2052 Australia Email: d.harvey@unsw.edu.au Joris van der Hoeven a, Grégoire

More information

arxiv: v1 [cs.ds] 28 Jan 2010

arxiv: v1 [cs.ds] 28 Jan 2010 An in-place truncated Fourier transform and applications to polynomial multiplication arxiv:1001.5272v1 [cs.ds] 28 Jan 2010 ABSTRACT David Harvey Courant Institute of Mathematical Sciences New York University

More information

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02)

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02) Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 206, v 202) Contents 2 Matrices and Systems of Linear Equations 2 Systems of Linear Equations 2 Elimination, Matrix Formulation

More information

A differential intermediate value theorem

A differential intermediate value theorem A differential intermediate value theorem by Joris van der Hoeven Dépt. de Mathématiques (Bât. 425) Université Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the field of grid-based transseries

More information

Three Ways to Test Irreducibility

Three Ways to Test Irreducibility Three Ways to Test Irreducibility Richard P. Brent Australian National University joint work with Paul Zimmermann INRIA, Nancy France 12 Feb 2009 Outline Polynomials over finite fields Irreducibility criteria

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Lecture 8 - Algebraic Methods for Matching 1

Lecture 8 - Algebraic Methods for Matching 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 1, 2018 Lecture 8 - Algebraic Methods for Matching 1 In the last lecture we showed that

More information

Output-sensitive algorithms for sumset and sparse polynomial multiplication

Output-sensitive algorithms for sumset and sparse polynomial multiplication Output-sensitive algorithms for sumset and sparse polynomial multiplication Andrew Arnold Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada Daniel S. Roche Computer Science

More information

Three Ways to Test Irreducibility

Three Ways to Test Irreducibility Outline Three Ways to Test Irreducibility Richard P. Brent Australian National University joint work with Paul Zimmermann INRIA, Nancy France 8 Dec 2008 Polynomials over finite fields Irreducibility criteria

More information

Even faster integer multiplication

Even faster integer multiplication Even faster integer multiplication DAVID HARVEY School of Mathematics and Statistics University of New South Wales Sydney NSW 2052 Australia Email: d.harvey@unsw.edu.au JORIS VAN DER HOEVEN a, GRÉGOIRE

More information

Faster integer multiplication using short lattice vectors

Faster integer multiplication using short lattice vectors Faster integer multiplication using short lattice vectors David Harvey and Joris van der Hoeven ANTS XIII, University of Wisconsin, Madison, July 2018 University of New South Wales / CNRS, École Polytechnique

More information

Polynomial functions over nite commutative rings

Polynomial functions over nite commutative rings Polynomial functions over nite commutative rings Balázs Bulyovszky a, Gábor Horváth a, a Institute of Mathematics, University of Debrecen, Pf. 400, Debrecen, 4002, Hungary Abstract We prove a necessary

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

Implementing Fast Carryless Multiplication

Implementing Fast Carryless Multiplication Implementing Fast Carryless Multiplication Joris van der Hoeven, Robin Larrieu and Grégoire Lecerf CNRS & École polytechnique MACIS 2017 Nov. 15, Vienna, Austria van der Hoeven, Larrieu, Lecerf Implementing

More information

The following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of

The following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of An algorithm for computing the Weierstrass normal form Mark van Hoeij Department of mathematics University of Nijmegen 6525 ED Nijmegen The Netherlands e-mail: hoeij@sci.kun.nl April 9, 1995 Abstract This

More information

Par Joris van der Hoeven. : LIX, Ecole polytechnique, France. Web :

Par Joris van der Hoeven. : LIX, Ecole polytechnique, France. Web : On systems of multivariate power series equations Par Joris van der Hoeven Lab. : LIFL, Universite de Lille I, France : LIX, Ecole polytechnique, France Email: vdhoeven@lix.polytechnique.fr Web : http://lix.polytechnique.fr:0/vdhoeven/

More information

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The

More information

Motivation Automatic asymptotics and transseries Asymptotics of non linear phenomena. Systematic theorie. Eective theory ) emphasis on algebraic aspec

Motivation Automatic asymptotics and transseries Asymptotics of non linear phenomena. Systematic theorie. Eective theory ) emphasis on algebraic aspec Introduction to automatic asymptotics by Joris van der Hoeven CNRS Universite d'orsay, France email: vdhoeven@math.u-psud.fr web: http://ultralix.polytechnique.fr/~vdhoeven MSRI, Berkeley, 6-0-998 Motivation

More information

Even faster integer multiplication

Even faster integer multiplication Even faster integer multiplication DAVID HARVEY School of Mathematics and Statistics University of New South Wales Sydney NSW 2052 Australia Email: d.harvey@unsw.edu.au JORIS VAN DER HOEVEN a, GRÉGOIRE

More information

SCALED REMAINDER TREES

SCALED REMAINDER TREES Draft. Aimed at Math. Comp. SCALED REMAINDER TREES DANIEL J. BERNSTEIN Abstract. It is well known that one can compute U mod p 1, U mod p 2,... in time n(lg n) 2+o(1) where n is the number of bits in U,

More information

Literature Review: Adaptive Polynomial Multiplication

Literature Review: Adaptive Polynomial Multiplication Literature Review: Adaptive Polynomial Multiplication Daniel S. Roche November 27, 2007 While output-sensitive algorithms have gained a fair amount of popularity in the computer algebra community, adaptive

More information

Fast integer multiplication

Fast integer multiplication Fast integer multiplication David Harvey, Joris van der Hoeven, Grégoire Lecerf CNRS, École polytechnique Bordeaux, February 2, 2015 http://www.texmacs.org Fundamental complexities I(n): multiplication

More information

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the

More information

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016 CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have

More information

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics

More information

Fast Polynomials Multiplication Using FFT

Fast Polynomials Multiplication Using FFT Li Chen lichen.xd at gmail.com Xidian University January 17, 2014 Outline 1 Discrete Fourier Transform (DFT) 2 Discrete Convolution 3 Fast Fourier Transform (FFT) 4 umber Theoretic Transform (TT) 5 More

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

Fraction-free Row Reduction of Matrices of Skew Polynomials

Fraction-free Row Reduction of Matrices of Skew Polynomials Fraction-free Row Reduction of Matrices of Skew Polynomials Bernhard Beckermann Laboratoire d Analyse Numérique et d Optimisation Université des Sciences et Technologies de Lille France bbecker@ano.univ-lille1.fr

More information

Between Sparse and Dense Arithmetic

Between Sparse and Dense Arithmetic Between Sparse and Dense Arithmetic Daniel S. Roche Computer Science Department United States Naval Academy NARC Seminar November 28, 2012 The Problem People want to compute with really big numbers and

More information

output H = 2*H+P H=2*(H-P)

output H = 2*H+P H=2*(H-P) Ecient Algorithms for Multiplication on Elliptic Curves by Volker Muller TI-9/97 22. April 997 Institut fur theoretische Informatik Ecient Algorithms for Multiplication on Elliptic Curves Volker Muller

More information

q-alg/ Mar 96

q-alg/ Mar 96 Integrality of Two Variable Kostka Functions Friedrich Knop* Department of Mathematics, Rutgers University, New Brunswick NJ 08903, USA knop@math.rutgers.edu 1. Introduction q-alg/9603027 29 Mar 96 Macdonald

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162 COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication

More information

A new zero-test for formal power series

A new zero-test for formal power series A new zero-test for formal power series Joris van der Hoeven Département de Mathématiques (bât. 425) Université Paris-Sud 91405 Orsay Cedex France joris@texmacs.org ABSTRACT In this paper, we present a

More information

(1.) For any subset P S we denote by L(P ) the abelian group of integral relations between elements of P, i.e. L(P ) := ker Z P! span Z P S S : For ea

(1.) For any subset P S we denote by L(P ) the abelian group of integral relations between elements of P, i.e. L(P ) := ker Z P! span Z P S S : For ea Torsion of dierentials on toric varieties Klaus Altmann Institut fur reine Mathematik, Humboldt-Universitat zu Berlin Ziegelstr. 13a, D-10099 Berlin, Germany. E-mail: altmann@mathematik.hu-berlin.de Abstract

More information

Fast Polynomial Multiplication

Fast Polynomial Multiplication Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution

More information

BREAKING THE AKIYAMA-GOTO CRYPTOSYSTEM. Petar Ivanov & José Felipe Voloch

BREAKING THE AKIYAMA-GOTO CRYPTOSYSTEM. Petar Ivanov & José Felipe Voloch BREAKING THE AKIYAMA-GOTO CRYPTOSYSTEM by Petar Ivanov & José Felipe Voloch Abstract. Akiyama and Goto have proposed a cryptosystem based on rational points on curves over function elds (stated in the

More information

CS 4424 Matrix multiplication

CS 4424 Matrix multiplication CS 4424 Matrix multiplication 1 Reminder: matrix multiplication Matrix-matrix product. Starting from a 1,1 a 1,n A =.. and B = a n,1 a n,n b 1,1 b 1,n.., b n,1 b n,n we get AB by multiplying A by all columns

More information

In-place Arithmetic for Univariate Polynomials over an Algebraic Number Field

In-place Arithmetic for Univariate Polynomials over an Algebraic Number Field In-place Arithmetic for Univariate Polynomials over an Algebraic Number Field Seyed Mohammad Mahdi Javadi 1, Michael Monagan 2 1 School of Computing Science, Simon Fraser University, Burnaby, B.C., V5A

More information

Implementing fast carryless multiplication

Implementing fast carryless multiplication Implementing fast carryless multiplication Joris Van Der Hoeven, Robin Larrieu, Grégoire Lecerf To cite this version: Joris Van Der Hoeven, Robin Larrieu, Grégoire Lecerf. Implementing fast carryless multiplication.

More information

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität

More information

Computations in Modules over Commutative Domains

Computations in Modules over Commutative Domains Computations in Modules over Commutative Domains 2007, September, 15 Dodgson's Algorithm Method of Forward and Backward Direction The One-pass Method The Recursive Method àñòü I System of Linear Equations

More information

Implementation of the DKSS Algorithm for Multiplication of Large Numbers

Implementation of the DKSS Algorithm for Multiplication of Large Numbers Implementation of the DKSS Algorithm for Multiplication of Large Numbers Christoph Lüders Universität Bonn The International Symposium on Symbolic and Algebraic Computation, July 6 9, 2015, Bath, United

More information

Multiplying huge integers using Fourier transforms

Multiplying huge integers using Fourier transforms Fourier transforms October 25, 2007 820348901038490238478324 1739423249728934932894??? integers occurs in many fields of Computational Science: Cryptography Number theory... Traditional approaches to

More information

Elliptic Curves Spring 2013 Lecture #3 02/12/2013

Elliptic Curves Spring 2013 Lecture #3 02/12/2013 18.783 Elliptic Curves Spring 2013 Lecture #3 02/12/2013 3.1 Arithmetic in finite fields To make explicit computations with elliptic curves over finite fields, we need to know how to perform arithmetic

More information

Boxlets: a Fast Convolution Algorithm for. Signal Processing and Neural Networks. Patrice Y. Simard, Leon Bottou, Patrick Haner and Yann LeCun

Boxlets: a Fast Convolution Algorithm for. Signal Processing and Neural Networks. Patrice Y. Simard, Leon Bottou, Patrick Haner and Yann LeCun Boxlets: a Fast Convolution Algorithm for Signal Processing and Neural Networks Patrice Y. Simard, Leon Bottou, Patrick Haner and Yann LeCun AT&T Labs-Research 100 Schultz Drive, Red Bank, NJ 07701-7033

More information

Integer multiplication with generalized Fermat primes

Integer multiplication with generalized Fermat primes Integer multiplication with generalized Fermat primes CARAMEL Team, LORIA, University of Lorraine Supervised by: Emmanuel Thomé and Jérémie Detrey Journées nationales du Calcul Formel 2015 (Cluny) November

More information

Numerical Results on the Transcendence of Constants. David H. Bailey 275{281

Numerical Results on the Transcendence of Constants. David H. Bailey 275{281 Numerical Results on the Transcendence of Constants Involving e, and Euler's Constant David H. Bailey February 27, 1987 Ref: Mathematics of Computation, vol. 50, no. 181 (Jan. 1988), pg. 275{281 Abstract

More information

Linear Regression and Its Applications

Linear Regression and Its Applications Linear Regression and Its Applications Predrag Radivojac October 13, 2014 Given a data set D = {(x i, y i )} n the objective is to learn the relationship between features and the target. We usually start

More information

Notes on the matrix exponential

Notes on the matrix exponential Notes on the matrix exponential Erik Wahlén erik.wahlen@math.lu.se February 14, 212 1 Introduction The purpose of these notes is to describe how one can compute the matrix exponential e A when A is not

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 5 Divide and Conquer: Fast Fourier Transform Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms

More information

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f 1 Bernstein's analytic continuation of complex powers c1995, Paul Garrett, garrettmath.umn.edu version January 27, 1998 Analytic continuation of distributions Statement of the theorems on analytic continuation

More information

The WENO Method for Non-Equidistant Meshes

The WENO Method for Non-Equidistant Meshes The WENO Method for Non-Equidistant Meshes Philip Rupp September 11, 01, Berlin Contents 1 Introduction 1.1 Settings and Conditions...................... The WENO Schemes 4.1 The Interpolation Problem.....................

More information

ICML '97 and AAAI '97 Tutorials

ICML '97 and AAAI '97 Tutorials A Short Course in Computational Learning Theory: ICML '97 and AAAI '97 Tutorials Michael Kearns AT&T Laboratories Outline Sample Complexity/Learning Curves: nite classes, Occam's VC dimension Razor, Best

More information

A RELATION BETWEEN SCHUR P AND S. S. Leidwanger. Universite de Caen, CAEN. cedex FRANCE. March 24, 1997

A RELATION BETWEEN SCHUR P AND S. S. Leidwanger. Universite de Caen, CAEN. cedex FRANCE. March 24, 1997 A RELATION BETWEEN SCHUR P AND S FUNCTIONS S. Leidwanger Departement de Mathematiques, Universite de Caen, 0 CAEN cedex FRANCE March, 997 Abstract We dene a dierential operator of innite order which sends

More information

The discrete and fast Fourier transforms

The discrete and fast Fourier transforms The discrete and fast Fourier transforms Marcel Oliver Revised April 7, 1 1 Fourier series We begin by recalling the familiar definition of the Fourier series. For a periodic function u: [, π] C, we define

More information

UNIVERSITY OF CALIFORNIA Department of Electrical Engineering and Computer Sciences Computer Science Division. Prof. R. Fateman

UNIVERSITY OF CALIFORNIA Department of Electrical Engineering and Computer Sciences Computer Science Division. Prof. R. Fateman UNIVERSITY OF CALIFORNIA Department of Electrical Engineering and Computer Sciences Computer Science Division CS 282 Spring, 2000 Prof. R. Fateman The (finite field) Fast Fourier Transform 0. Introduction

More information

A Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006

A Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006 A Z q -Fan theorem Frédéric Meunier December 11, 2006 Abstract In 1952, Ky Fan proved a combinatorial theorem generalizing the Borsuk-Ulam theorem stating that there is no Z 2-equivariant map from the

More information

Distributed computation of the number. of points on an elliptic curve

Distributed computation of the number. of points on an elliptic curve Distributed computation of the number of points on an elliptic curve over a nite prime eld Johannes Buchmann, Volker Muller, Victor Shoup SFB 124{TP D5 Report 03/95 27th April 1995 Johannes Buchmann, Volker

More information

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable Deciding positivity of real polynomials Eberhard Becker, Victoria Powers, and Thorsten Wormann Abstract. We describe an algorithm for deciding whether or not a real polynomial is positive semidenite. The

More information

Divisor matrices and magic sequences

Divisor matrices and magic sequences Discrete Mathematics 250 (2002) 125 135 www.elsevier.com/locate/disc Divisor matrices and magic sequences R.H. Jeurissen Mathematical Institute, University of Nijmegen, Toernooiveld, 6525 ED Nijmegen,

More information

1. Introduction to commutative rings and fields

1. Introduction to commutative rings and fields 1. Introduction to commutative rings and fields Very informally speaking, a commutative ring is a set in which we can add, subtract and multiply elements so that the usual laws hold. A field is a commutative

More information

On the Exponent of the All Pairs Shortest Path Problem

On the Exponent of the All Pairs Shortest Path Problem On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty

More information

Computer Algebra: General Principles

Computer Algebra: General Principles Computer Algebra: General Principles For article on related subject see SYMBOL MANIPULATION. Computer algebra is a branch of scientific computation. There are several characteristic features that distinguish

More information

CS S Lecture 5 January 29, 2019

CS S Lecture 5 January 29, 2019 CS 6363.005.19S Lecture 5 January 29, 2019 Main topics are #divide-and-conquer with #fast_fourier_transforms. Prelude Homework 1 is due Tuesday, February 5th. I hope you ve at least looked at it by now!

More information

1. Introduction to commutative rings and fields

1. Introduction to commutative rings and fields 1. Introduction to commutative rings and fields Very informally speaking, a commutative ring is a set in which we can add, subtract and multiply elements so that the usual laws hold. A field is a commutative

More information

Parallel Integer Polynomial Multiplication Changbo Chen, Svyatoslav Parallel Integer Covanov, Polynomial FarnamMultiplication

Parallel Integer Polynomial Multiplication Changbo Chen, Svyatoslav Parallel Integer Covanov, Polynomial FarnamMultiplication Parallel Integer Polynomial Multiplication Parallel Integer Polynomial Multiplication Changbo Chen 1 Svyatoslav Covanov 2,3 Farnam Mansouri 2 Marc Moreno Maza 2 Ning Xie 2 Yuzhen Xie 2 1 Chinese Academy

More information

Linear Algebra, 3rd day, Wednesday 6/30/04 REU Info:

Linear Algebra, 3rd day, Wednesday 6/30/04 REU Info: Linear Algebra, 3rd day, Wednesday 6/30/04 REU 2004. Info: http://people.cs.uchicago.edu/laci/reu04. Instructor: Laszlo Babai Scribe: Richard Cudney Rank Let V be a vector space. Denition 3.. Let S V,

More information

Our goal is to solve a general constant coecient linear second order. this way but that will not always happen). Once we have y 1, it will always

Our goal is to solve a general constant coecient linear second order. this way but that will not always happen). Once we have y 1, it will always October 5 Relevant reading: Section 2.1, 2.2, 2.3 and 2.4 Our goal is to solve a general constant coecient linear second order ODE a d2 y dt + bdy + cy = g (t) 2 dt where a, b, c are constants and a 0.

More information

It is well-known (cf. [2,4,5,9]) that the generating function P w() summed over all tableaux of shape = where the parts in row i are at most a i and a

It is well-known (cf. [2,4,5,9]) that the generating function P w() summed over all tableaux of shape = where the parts in row i are at most a i and a Counting tableaux with row and column bounds C. Krattenthalery S. G. Mohantyz Abstract. It is well-known that the generating function for tableaux of a given skew shape with r rows where the parts in the

More information

Chapter 2 Notes, Linear Algebra 5e Lay

Chapter 2 Notes, Linear Algebra 5e Lay Contents.1 Operations with Matrices..................................1.1 Addition and Subtraction.............................1. Multiplication by a scalar............................ 3.1.3 Multiplication

More information

ON THE REDUCIBILITY OF EXACT COVERING SYSTEMS

ON THE REDUCIBILITY OF EXACT COVERING SYSTEMS ON THE REDUCIBILITY OF EXACT COVERING SYSTEMS OFIR SCHNABEL arxiv:1402.3957v2 [math.co] 2 Jun 2015 Abstract. There exist irreducible exact covering systems (ECS). These are ECS which are not a proper split

More information

MATH 205 HOMEWORK #3 OFFICIAL SOLUTION. Problem 1: Find all eigenvalues and eigenvectors of the following linear transformations. (a) F = R, V = R 3,

MATH 205 HOMEWORK #3 OFFICIAL SOLUTION. Problem 1: Find all eigenvalues and eigenvectors of the following linear transformations. (a) F = R, V = R 3, MATH 205 HOMEWORK #3 OFFICIAL SOLUTION Problem 1: Find all eigenvalues and eigenvectors of the following linear transformations. a F = R, V = R 3, b F = R or C, V = F 2, T = T = 9 4 4 8 3 4 16 8 7 0 1

More information

Essentials of Intermediate Algebra

Essentials of Intermediate Algebra Essentials of Intermediate Algebra BY Tom K. Kim, Ph.D. Peninsula College, WA Randy Anderson, M.S. Peninsula College, WA 9/24/2012 Contents 1 Review 1 2 Rules of Exponents 2 2.1 Multiplying Two Exponentials

More information

PUTTING FÜRER ALGORITHM INTO PRACTICE WITH THE BPAS LIBRARY. (Thesis format: Monograph) Linxiao Wang. Graduate Program in Computer Science

PUTTING FÜRER ALGORITHM INTO PRACTICE WITH THE BPAS LIBRARY. (Thesis format: Monograph) Linxiao Wang. Graduate Program in Computer Science PUTTING FÜRER ALGORITHM INTO PRACTICE WITH THE BPAS LIBRARY. (Thesis format: Monograph) by Linxiao Wang Graduate Program in Computer Science A thesis submitted in partial fulfillment of the requirements

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8 Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................

More information

Integer multiplication and the truncated product problem

Integer multiplication and the truncated product problem Integer multiplication and the truncated product problem David Harvey Arithmetic Geometry, Number Theory, and Computation MIT, August 2018 University of New South Wales Political update from Australia

More information

Solving Sparse Rational Linear Systems. Pascal Giorgi. University of Waterloo (Canada) / University of Perpignan (France) joint work with

Solving Sparse Rational Linear Systems. Pascal Giorgi. University of Waterloo (Canada) / University of Perpignan (France) joint work with Solving Sparse Rational Linear Systems Pascal Giorgi University of Waterloo (Canada) / University of Perpignan (France) joint work with A. Storjohann, M. Giesbrecht (University of Waterloo), W. Eberly

More information

Computing the Monodromy Group of a Plane Algebraic Curve Using a New Numerical-modular Newton-Puiseux Algorithm

Computing the Monodromy Group of a Plane Algebraic Curve Using a New Numerical-modular Newton-Puiseux Algorithm Computing the Monodromy Group of a Plane Algebraic Curve Using a New Numerical-modular Newton-Puiseux Algorithm Poteaux Adrien XLIM-DMI UMR CNRS 6172 Université de Limoges, France SNC'07 University of

More information

AMS 209, Fall 2015 Final Project Type A Numerical Linear Algebra: Gaussian Elimination with Pivoting for Solving Linear Systems

AMS 209, Fall 2015 Final Project Type A Numerical Linear Algebra: Gaussian Elimination with Pivoting for Solving Linear Systems AMS 209, Fall 205 Final Project Type A Numerical Linear Algebra: Gaussian Elimination with Pivoting for Solving Linear Systems. Overview We are interested in solving a well-defined linear system given

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Non-determinism, Regular Expressions CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard

More information