COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY

Size: px
Start display at page:

Download "COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY"

Transcription

1 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as a map from F p m to F p m, an examine the image of this map, also known as the value set. In this paper, we present the first non-trivial algorithm an the first complexity result on explicitly computing the carinality of this value set. We show an elementary connection between this carinality an the number of points on a family of varieties in affine space. We then apply Lauer an Wan s p-aic point-counting algorithm to count these points, resulting in a non-trivial algorithm for calculating the carinality of the value set. The running time of our algorithm is pm) O). In particular, this is a polynomial-time algorithm for fixe if p is reasonably small. We also show that the problem is #P-har when the polynomial is given in a sparse representation, p = 2, an m is allowe to vary, or when the polynomial is given as a straight-line program, m = 1 an p is allowe to vary. Aitionally, we prove that it is NP-har to ecie whether a polynomial represente by a straight-line program has a root in a prime-orer finite fiel, thus resolving an open problem propose by Kaltofen an Koiran in [5, 6]. 1. Introuction In a finite fiel with q = p m p prime) elements, F q, take a polynomial, f F q [x] with egree > 0. Denote the image set of this polynomial as V f = {f α) α F q } an enote the carinality of this set as # V f ). There are a few trivial bouns that can be immeiately establishe. There are only q elements in the fiel, so # V f ) q. Aitionally, any polynomial of egree can have at most roots, thus for all a V f, fx) = a is satisfie at most times. This is true for every element in V f, so # V f ) q, whence q # V f ) q where is the ceiling function). Both of these bouns can be achieve: if # V f ) = q, then f is calle a permutation polynomial an if # V f ) = q, then f is sai to have a minimal value set. The problem of establishing # V f ) has been stuie in various forms for at least the last 115 years, but exact formulations for # V f ) are known only for polynomials in very specific forms. Results that apply to general polynomials are asymptotic in nature, or provie estimates whose errors have reasonable bouns only on average [11]. All three authors are partially supporte by the NSF. 1

2 2 QI CHENG, JOSHUA E. HILL, AND DAQING WAN The funamental problem of counting the value set carinality # V f ) can be thought of as a much more general version of the problem of etermining if a particular polynomial is a permutation polynomial. Shparlinski [14] provie a baby-step giant-step type test that etermines if a given polynomial is a permutation polynomial by extening [17] to an algorithm that runs in Õq)6/7 ). This is still fully exponential in log q. Ma an von zur Gathen [10] provie a ZPP zero-error probabilistic polynomial-time) algorithm for testing if a given polynomial is a permutation polynomial. Accoring to [7], the first eterministic polynomial-time algorithm for testing permutation polynomials is obtaine by Lenstra using the classification of exceptional polynomials which in turn epens on the classification of finite simple groups. Subsequently, an elementary approach base on the Gao-Kaltofen-Lauer factorization algorithm is given by Kayal [7]. For the more general problem of exactly computing # V f ), essentially nothing is known about this problem s complexity an no non-trivial algorithms are known. For instance, no baby-step giant-step type algorithm is known in computing # V f ). No probabilistic polynomial-time algorithm is known. Fining a non-trivial algorithm an proving a non-trivial complexity result for the value counting were raise as open problems in [10], where a probabilistic approximation algorithm is given. In this paper, we provie the first non-trivial algorithm an the first non-trivial complexity result for the exact counting of the value set problem Our results. Perhaps the most obvious metho to calculate # V f ) is to evaluate the polynomial at each point in F q an count how many istinct images result. This algorithm has a time an space complexity q) O1). One can also approach this problem by operating on points in the co-omain. One has fx) = a for some x F q if an only if f a X) = fx) a has a zero in F q ; this algorithm again has a time complexity q) O1), but the space complexity is improve consierably to log q) O1). In this paper we present several results on etermining the carinality of value sets. On the algorithmic sie, we show an elementary connection between this carinality an the number of points on a family of varieties in affine space. We then apply Lauer an Wan s p-aic point-counting algorithm [9], resulting in a non-trivial algorithm for calculating the image set carinality in the case that p is sufficiently small i.e., p = O log q) C ) for some positive constant C). Precisely, we have Theorem 6. There exists an explicit eterministic algorithm an an explicit polynomial R such that for any f F q [x] of egree, where q = p m p prime), the algorithm computes the carinality of the image set, # V f ), in a number of bit operations boune by R m p ). The running time of this algorithm is polynomial in both p an m, but is exponential in. In particular, this is a polynomial-time algorithm for fixe if the characteristic p is small q = p m can be large, but p = O log q) C ). On the complexity sie, we have several harness results on the value set problem. We frame these results using some stanar classes in complexity theory, which we outline here. NP is the complexity class of ecision problem whose positive solutions can be verifie in polynomial time. NP-har is the computational class of ecision problems that all NP problems can be reuce to using a polynomial time reuction. NP-complete is the complexity class of all NP-har problem whose

3 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY 3 solution can be verifie in polynomial time that is, NP-complete is the intersection of NP-har an NP). Co-NP-complete is the complexity class of problems where answering the logical complement of the ecision problem is NP-complete. The corresponing counting complexity theory classes that we use are as follows. #P rea sharp-p ) is the set of counting problems whose corresponing ecision problem is in NP. #P-har is the computational class of counting problems that all #P problems can be reuce to using a polynomial time counting reuction. #P-complete is the intersection of #P-har an #P. With a fiel of characteristic p = 2, we have Theorem 3. The problem of counting the value set of a sparse polynomial over a finite fiel of characteristic p = 2 is #P-har. The central approach in our proof of this theorem is to reuce the problem of counting satisfying assignments for a 3SAT formula to the problem of value set counting. Over a prime-orer finite fiel, we have Theorem 5. Over a prime-orer finite fiel F p, the problem of counting the value set is #P-har uner RP-reuction ranomize polynomial time reuction) if the polynomial is given as a straight-line program. Aitionally, we prove that it is NP-har to ecie whether a polynomial in Z[x] represente by a straight-line program has a root in a prime-orer finite fiel, thus resolving an open problem propose in [5, 6]. We accomplish the complexity results over prime-orer finite fiels by reucing the prime-orer finite fiel subset sum problem PFFSSP) to these problems. In the PFFSSP, given a prime p, an integer b an a set of integers S = {a 1, a 2,, a t }, we want to ecie the solvability of the equation a 1 x 1 + a 2 x a t x t b mo p) with x i {0, 1} for 1 i t. The main iea comes from the observation that if t < log p/3, there is a sparse polynomial αx) F p [x] such that as x runs over F p, the vector αx), αx + 1),, αx + t 1)) runs over all the elements in {0, 1} t. In fact, a lightly moifie version of the quaratic character αx) = x p 1)/2 + x p 1 )/2 suffices. So the PFFSSP can be reuce to eciing whether the sparse shift polynomial t 1 i=0 a i+1αx + i) b = 0 has a solution in F p. 2. Backgroun 2.1. The subset sum problem. To prove the complexity results, we use the subset sum problem SSP) extensively. The SSP is a well-known problem in computer science. In one instance of the SSP, given an integer b an a set of positive integers S = {a 1, a 2,, a t }, 1) Decision version) the goal is to ecie whether there exists a subset T S such that the sum of all the integers in T equals b, 2) Search version) the goal is to fin a subset T S such that the sum of all the integers in T equals b,

4 4 QI CHENG, JOSHUA E. HILL, AND DAQING WAN 3) Counting version) the goal is to count the number of subsets T S such that the sum of all the integers in T equals b. The ecision version of the SSP is a classical NP-complete problem. The counting version of the SSP is #P-complete, which can be easily erive from proofs of the NP-completeness of the ecision version, e.g. [3, Theorem 34.15]. One can view the SSP as a problem of solving the linear equation a 1 x 1 + a 2 x a t x t = b with x i {0, 1} for 1 i t. The prime-orer finite fiel subset sum problem is a similar problem where in aition to b an S, one is given a prime p, an the goal is to ecie the solvability of the equation with x i {0, 1} for 1 i t. a 1 x 1 + a 2 x a t x t b mo p) Proposition 1. The prime-orer finite fiel subset sum problem is NP-har uner RP-reuction. Proof. To reuce the subset sum problem to the prime-orer finite fiel subset sum problem, one fins a prime p > t i=1 a i, which can be one in ranomize polynomial time. Remark 1. To make the reuction eterministic, one nees to e-ranomize the problem of fining a large prime, which appears to be ifficult [15] Polynomial representations. There are ifferent ways to represent a polynomial over a fiel F. The ense representation lists all the coefficients of a polynomial, incluing the zero coefficients. The sparse representation lists only the nonzero coefficients, along with the egrees of the corresponing terms. If most of the coefficients of a polynomial are zero, then the sparse representation is much shorter than the ense representation. A sparse shift representation of a polynomial in F[x] is a list of n triples a i, b i, e i ) F F Z 0 which represents the polynomial a i x + b i ) e i. 1 i n More generally, a straight-line program for a univariate polynomial in Z[x] or F p [x] is a sequence of assignments, starting from x 1 = 1 an x 2 = x. After that, the i-th assignment has the form x i = x j x k where 0 j, k < i an is one of the three operations +,,. We first let α be an element in F p m such that F p m = F p [α]. A straight-line program for a univariate polynomial in F p m[x] can be efine similarly, except that the sequence starts from x 1 = α an x 2 = x. One can verify that a straight-line program computes a univariate polynomial, an that sparse polynomials an sparse shift polynomials have short straight-line programs. A polynomial prouce by a short straight-line program may have very high egree, an most of its coefficients may be nonzero, so it may be costly to write it in either a ense form or a sparse form.

5 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY 5 3. Harness of solving straight-line polynomials It is known that eciing whether there is a root in a finite fiel for a sparse polynomial is NP-har [8]. In a relate work, it was shown that eciing whether there is a p-aic rational root for a sparse polynomial is NP-har [1]. However, the complexity of eciing the solvability of a straight-line polynomial in Z[x] within a prime-orer finite fiel was not known. This open problem was propose in [5] an [6]. We resolve this problem within this section, an this same iea will be use later on to prove the harness result of the value set counting problem. Let p be an o prime. Let χ be the quaratic character moulo p, namely χx) equals 1, 1, or 0, epening on whether x is a quaratic resiue, a quaratic non-resiue, or is congruent to 0 moulo p. For x F p, χx) = x p 1)/2. Consier the list 1) χ1), χ2),, χp 1). It is a sequence in {1, 1} p 1. The following boun is a stanar consequence of the celebrate Weil boun for character sums, see [13] for a etaile proof. Proposition 2. Let b 1, b 2,, b t ) be a sequence in {1, 1} t. Then the number of x F p such that χx) = b 1, χx + 1) = b 2,, χx + t 1) = b t is in the range p/2 t t3 + p), p/2 t + t3 + p)). The proposition implies that if t < log p/3, then every possible sequence in { 1, 1} t occurs as a consecutive sub-sequence in expression 1). In many situations it is more convenient to use binary 0/1 sequences, which suggests instea using the polynomial x p 1)/2 + 1)/2, but this results in a small problem at x = 0. We instea use the sparse polynomial 2) αx) = x p 1)/2 + x p 1 )/2. αx) takes value in {0, 1} if x F p an αx) = 1 iff χx) = 1. Corollary 1. If t < log p/3, then for any binary sequence b 1, b 2,, b t ) {0, 1} t, there exists a x F p such that αx) = b 1, αx + 1) = b 2,, αx + t 1) = b t. In other wors, if t < log p/3, the map x αx), αx + 1),, αx + t 1)) is an onto map from F p to {0, 1} t ; this map thus sens an algebraic object to a combinatorial object. Given a straight-line polynomial fx) Z[x] an a prime p, how har is it to ecie whether the polynomial has a solution in F p? We now prove that this problem is NP-har. Theorem 1. Given a sparse shift polynomial fx) Z[x], an a large prime p, it is NP-har to ecie whether fx) has a root in F p uner RP-reuction. Proof. We reuce the ecision version of the) subset sum problem to this problem. Given b Z 0 an S = {a 1, a 2,, a t } Z 0, one can then fin a prime, p, such

6 6 QI CHENG, JOSHUA E. HILL, AND DAQING WAN that p > max2 3t, t i=1 a i) an construct a sparse shift polynomial t 1 3) βx) = a i αx + i) b. i=0 If the polynomial has a solution moulo p, then the answer to the subset sum problem is yes, since for any x F p, αx + i) {0, 1}. In the other irection, if the answer to the subset sum problem is yes, then accoring to Corollary 1, the polynomial has a solution in F p. Note that the reuction can be compute in ranomize polynomial time. 4. Complexity of the value set counting problem In this section, we prove several results about the complexity of the value set counting problem Finite fiels of characteristic 2. We will use a problem about NC 0 5 circuits to prove that counting the value set of a sparse polynomial in a fiel of characteristic 2 is #P-har. A Boolean circuit is in NC 0 5 if every output bit of the circuit epens only on at most 5 input bits. We can view a circuit with n input bits an m output bits as a map from {0, 1} n to {0, 1} m an call the image of the map the value set of the circuit. The following proposition is implie in [4]; we provie a sketch of the proof. Proposition 3. Given a 3SAT formula with n variables an m clauses, one can construct in polynomial time an NC 0 5 circuit with n+m input bits an n+m outputs bits, such that if there are M satisfying assignments for the 3SAT formula, then the carinality of the value set of the NC 0 5 circuit is 2 n+m 2 m 1 M. In particular, if the 3SAT formula can not be satisfie, then the circuit computes a permutation from {0, 1} n+m to {0, 1} n+m. Proof. Denote the variables of the 3SAT formula by x 1, x 2,, x n, an the clauses of the 3SAT formula by C 1, C 2,, C m. Buil a circuit with n + m input bits an n + m output bits as follows. The input bits will be enote by x 1, x 2,, x n an y 1, y 2,, y m, an output bits will be enote by z 1, z 2,, z n, w 1, w 2,, w m. Set z i = x i for 1 i n. An set w i = C i y i y i+1 mo m)) )) C i y i ) for 1 i m. In other wors, if C i is evaluate to be TRUE, then output y i y i+1 mo m)) as w i, an otherwise output y i as w i. Note that C i epens only on 3 variables from {x 1, x 2,, x n }, thus we obtain an NC 0 5 circuit. After fixing an assignment to x i s, z i s are also fixe, an the transformation from y 1, y 2,, y m ) to w 1, w 2,, w m ) is linear over F 2. One can verify that the linear transformation has rank m 1 if the assignment satisfies all the clauses, an it has rank m namely it has full rank) if some of the clauses are not satisfie. So the carinality of the value set of the circuit is M2 m n M)2 m = 2 n+m 2 m 1 M. If we replace the Boolean gates in the NC 0 5 circuit by algebraic gates over F 2, we obtain an algebraic circuit that computes a polynomial map from F n+m 2 to itself, where each polynomial epens only on 5 variables an has egree equal to or

7 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY 7 less than 5. There is an F 2 -basis for F 2 n+m, say ω 1, ω 2,, ω n+m which inuces a bijection from F n+m 2 to F 2 n+m given by x 1, x 2,, x n+m ) x = n+m which has an inverse that can be represente by sparse polynomials in F 2 n+m[x]. Using this fact, we can replace the input bits of the algebraic circuit by sparse polynomials, an collect the output bits together using the base to form a single element in F 2 n+m. We thus obtain a sparse univariate polynomial in F 2 n+m[x] from the NC 0 5 circuit such that their value sets have the same carinality. We thus have the following theorem: Theorem 2. Given a 3SAT formula with n variables an m clauses, one can construct in polynomial time a sparse polynomial γx) over F 2 n+m such that the value set of γx) has carinality 2 n+m 2 m 1 M, where M is the number of satisfying assignments of the 3SAT formula. Since counting the number of satisfying assignments for a 3SAT formula is known to be #P-complete, we have our main theorem: Theorem 3. The problem of counting the value set of a sparse polynomial over a finite fiel of characteristic p = 2 is #P-har. Corollary 2. The set of sparse permutation polynomials over finite fiels of characteristic p = 2 is co-np-complete Prime-orer finite fiels. The construction in Theorem 2 relies on builing extensions over F 2. The technique cannot be aopte easily to the prime-orer finite fiel case. We will prove that counting the value set of a straight-line polynomial over prime-orer finite fiel is #P-har. We reuce the counting version of the subset sum problem to the value set counting problem. Theorem 4. Given access to an oracle that solves the value set counting problem for straight-line polynomials over prime-orer finite fiels, there is a ranomize polynomial-time algorithm solving the counting version of the SSP. Proof. Given an instance of the counting subset sum problem, say b with the set S = {a 1, a 2,, a n }, if b > n i=1 a i, we answer 0; if b = 0, then we answer 1. Otherwise we fin a prime p > max2 3t, 2 n i=1 a i) an ask the oracle to count the value set of the sparse shift polynomial i=0 i=1 x i ω i t 1 fx) := 1 βx) p 1 ) αx + i)2 i ) over the prime-orer fiel F p, where αx) an βx) are as efine in equations 2) an 3), respectively. We output the answer # V f ) 1, which is easily seen to be exactly the number of subsets of {a 1,, a n } which sum to b. Since the counting version of the SSP is #P-complete, this theorem yiels Theorem 5. Over a prime-orer finite fiel F p, the problem of counting the value set is #P-har uner RP-reuction, if the polynomial is given as a straight-line program.

8 8 QI CHENG, JOSHUA E. HILL, AND DAQING WAN 5. The Image Set an Point Counting Proposition 4. If f F q [x] is a polynomial of egree > 0, then the carinality of its image set is 4) # V f ) = 1) i 1 N i σ i 1, 1 2,..., 1 ) i=1 where N k = # { x 1,..., x k ) F k q fx 1 ) = = fx k ) }) an σ i enotes the ith elementary symmetric function on elements. Proof. For any y V f, efine Ñ k,y = { x 1,..., x k ) F k q fx 1 ) = = fx k ) = y } an enote the corresponing carinality of these sets as N k,y = # an finally, note that 5) N k = Ñk,y ) y V f N k,y. Let us refer to the right han sie of 4) as η; plugging 5) into this expression an rearranging, we get η = 1) i 1 N i,y σ i 1, 1 2,..., 1 ). y V f i=1 Let us call the inner sum ω y, that is: ω y = 1) i 1 N i,y σ i 1, 1 2,..., 1 ). i=1 If we can show that for all y V f we have ω y = 1, then we clearly have η = # V f ). Let y V f be fixe. Let k = # f 1 y) ). It is clear that 1 k an N i,y = k i for 0 i. Substituting this in, our expression mercifully becomes somewhat nicer: 6) 7) ω y = 1 = 1 = 1 1) i k i σ i 1, 1 2,..., 1 ) 1) i σ i k1, k 1 2,..., k 1 ) i=0 i=0 [ 1 k1) 1 k 1 ) 1 k 1 )] 2 = 1. From step 6) to step 7), we are using the ientity n n λ X j ) = 1) j λ n j σ j X 1,..., X n ). j=1 j=0

9 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY 9 Note that the brackete term of 7) is 0, as k must be an integer such that 1 k, so one term in the prouct will be 0. Thus, we have η = # V f ), as esire. Proposition 4 gives us a way to express # V f ) in terms of the numbers of rational points on a sequence of curves over F q. If we ha a way of getting N k for 1 k, then it woul be easy to calculate # V f ). We procee by examining a family of relate spaces, Ñ k = { x 1,..., x k ) F k q fx 1 ) = = fx k ) }. ) We immeiately note that N k = # Ñk. Spaces similar to our Ñk have been use several times[16, 2] to establish various asymptotic results for # V f ). The spaces use in these works require that x i x j for i j. We will see that our work woul have been ramatically harer if we ha impose these aitional restrictions. The spaces Ñk aren t of any nice form in particular, we cannot assume they are non-singular projective, abelian varieties, etc.), so we procee by using the p- aic point counting metho escribe in [9], which runs in polynomial time for any variety over a fiel of small characteristic i.e., p = O log q) C ) for some positive constant C). Theorem 6. There exists an explicit eterministic algorithm an an explicit polynomial R such that for any f F q [x] of egree, where q = p m p prime), the algorithm computes the carinality of the image set, # V f ), in a number of bit operations boune by R m p ). Proof. We first note that: Ñ k = { x 1,..., x k ) F k q fx 1 ) = = fx k ) } fx 1 ) fx 2 ) = 0 = x 1,..., x k ) F k fx 1 ) fx 3 ) = 0 q.. fx 1 ) fx k ) = 0 For reasons soon to become clear, we nee to represent this as the solution set of a single polynomial. Let us introuce aitional variables z 1 to z k 1, an enote x = x 1,..., x k ) an z = z 1,..., z k 1 ). Now examine the auxiliary function 8) F k x, z) = z 1 fx 1 ) fx 2 )) + + z k 1 fx 1 ) fx k )). Clearly, if γ Ñk, then F k γ, z) is the zero function. If γ F k q \ Ñk, then the solutions of F k γ, z) = 0 specify a k 2)-imensional F q -linear subspace of F k 1 q. Thus, if we enote the carinality of the solution set to F k x, z) = 0 as # F k ), then we see that # F k ) = q k 1 N k + q k 2 q k ) N k Solving for N k, we fin that = N k q k 2 q 1) + q 2k 2. 9) N k = # F k) q 2k 2 q k 2. q 1)

10 10 QI CHENG, JOSHUA E. HILL, AND DAQING WAN Thus we have an easy way to etermine what N k is epening on the number of points on this hypersurface efine by the single polynomial equation F k = 0. The main theorem in [9] yiels an algorithm for toric point counting in F q l that is polynomial time when the characteristic is small i.e., p = O log q) C ) for some positive constant C) that works for general varieties. In [9, 6.4], this theorem is aapte to be a generic point counting algorithm. Aapting this result to our problem, we see that F k has a total egree of + 1, is in 2k 1 variables, an that we only care about the case where l = 1. Thus, the runtime for this algorithm is Õ28k+1 m 6k+4 k 6k+2 6k 3 p 4k+2 ) bit operations. In orer to calculate # V f ) using equation 4), we calculate N k for 1 k, scale by an elementary symmetric polynomial. All of the necessary elementary symmetric polynomials can be evaluate using Newton s ientity see [12]) in less than O 2 log ) multiplications. As such, the entire calculation has a runtime of Õ2 8+1 m p 4+2 ) bit operations. For consistency with [9], we can then note that as > 1, we can write = log 2)8+1). Thus, there is a polynomial, R, in one variable such that the runtime of this algorithm is boune by Rm p ) bit operations. In the ense polynomial moel, the polynomial f has input size O log q), so this algorithm oes not have polynomial runtime with respect to the input length. This algorithm has runtime that is exponential in the egree of the polynomial,, an polynomial in m an p. As a note, ha we aopte the spaces constructe in prior works[16, 2], we woul have then require x i x j for i j. The stanar approach to representing such inequalities is the Rabinovich trick. To use this trick, we woul have introuce an aitional variable, say y, an the aitional equation y i<jx j x i ) = 1. This is a egree k 2) + 1 polynomial, which woul have le to an equation corresponing to 8) of at least egree k 2) + 2 with 2k + 1 variables, which woul have increase the work factor of the algorithm significantly. 6. Open Problems The algorithm presente relies on Lauer-Wan, which is intene to calculate the number of F q -rational points associate with general varieties. We use this on a polynomial of a very special form. As such, it may be possible to get a consierably more efficient algorithm by exploiting symmetry in the resulting Newton polytope. Though value sets of polynomials appear to be closely relate to zero sets, they are not as well stuie. There are many interesting open problems about value sets. The most important one is to fin a counting algorithm with running time log q) O1), that is, a eterministic polynomial-time algorithm in the ense moel. It is not clear if this is always possible. Our result affirmatively solves this problem for fixe if characteristic p is reasonably small. We conjecture that the same result is true for fixe an all characteristic p. For the complexity sie, can one prove that the counting problem for sparse polynomials in prime-orer finite fiels is har? Can one prove that the counting problem for ense input moel is har for general egree? Acknowlegment: We thank Dr. Tsuyoshi Ito for pointing out reference [4] to us.

11 COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY 11 References [1] Martin Avenano, Ashraf Ibrahim, J. Maurice Rojas, an Korben Rusek. Ranomize npcompleteness for p-aic rational roots of sparse polynomials in one variable. In ISSAC, pages , [2] B. J. Birch an H. P. F. Swinnerton-Dyer. Note on a problem of Chowla. Polska Akaemia Nauk. Instytut Matematyczny. Acta Arithmetica, 5: , [3] T. H. Cormen, C. E. Leiserson, R. L. Rivest, an C. Stein. Introuction to algorithms. MIT electrical engineering an computer science series. MIT Press, [4] B. Duran. Inversion of 2 cellular automata: some complexity results. Theoretical Computer Science, 1342): , [5] Erich Kaltofen. Polynomial factorization: a success story. In The 2003 international symposium on Symbolic an algebraic computation presentation), ISSAC 03, http: //www4.ncsu.eu/ kaltofen/bibliography/lectures/lectures.html#issacphilaelphia. [6] Erich Kaltofen an Pascal Koiran. On the complexity of factoring bivariate supersparse lacunary) polynomials. In Proceeings of the 2005 international symposium on Symbolic an algebraic computation, ISSAC 05, pages , New York, NY, USA, ACM. [7] Neeraj Kayal. Solvability of a system of bivariate polynomial equations over a finite fiel extene abstract). In Automata, languages an programming, volume 3580 of Lecture Notes in Comput. Sci., pages Springer, Berlin, [8] Avia Kipnis an Ai Shamir. Cryptanalysis of the hfe public key cryptosystem by relinearization. In Proceeings of the 19th Annual International Cryptology Conference on Avances in Cryptology, CRYPTO 99, pages 19 30, Lonon, UK, Springer-Verlag. [9] Alan G. B. Lauer an Daqing Wan. Counting points on varieties over finite fiels of small characteristic. In J.P. Buhler an P. Stevenhagen, eitors, Algorithmic Number Theory, pages Cambrige University Press, [10] Keju Ma an Joachim von zur Gathen. The computational complexity of recognizing permutation functions. Computational Complexity, 51):76 97, [11] Keju Ma an Joachim von zur Gathen. Tests for permutation functions. Finite Fiels an their Applications, 11):31 56, [12] D. G. Mea. Newton s ientities. The American Mathematical Monthly, 998):pp , [13] René Peralta. On the istribution of quaratic resiues an nonresiues moulo a prime number. Mathematics of Computation, 58197): , [14] I. E. Shparlinski. A eterministic test for permutation polynomials. Computational Complexity, 22): , [15] Terence Tao, Ernie Croot III, an Haral Helfgott. Deterministic methos to fin primes. Mathematics of Computation, To appear. [16] Saburô Uchiyama. Note on the mean value of V f). Proceeings of the Japan Acaemy, 31: , [17] Joachim von zur Gathen. Tests for permutation polynomials. SIAM Journal on Computing, 203): , Qi Cheng) School of Computer Science, The University of Oklahoma, Norman, OK 73019, USA aress: qcheng@cs.ou.eu Joshua E. Hill) Department of Mathematics, University of California, Irvine, CA 92697, USA aress: hillje@math.uci.eu Daqing Wan) Department of Mathematics, University of California, Irvine, CA 92697, USA aress: wan@math.uci.eu

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS

A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS TODD COCHRANE, JEREMY COFFELT, AND CHRISTOPHER PINNER 1. Introuction For a prime p, integer Laurent polynomial (1.1) f(x) = a 1 x k 1 + + a r

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

GCD of Random Linear Combinations

GCD of Random Linear Combinations JOACHIM VON ZUR GATHEN & IGOR E. SHPARLINSKI (2006). GCD of Ranom Linear Combinations. Algorithmica 46(1), 137 148. ISSN 0178-4617 (Print), 1432-0541 (Online). URL https://x.oi.org/10.1007/s00453-006-0072-1.

More information

Stable Polynomials over Finite Fields

Stable Polynomials over Finite Fields Rev. Mat. Iberoam., 1 14 c European Mathematical Society Stable Polynomials over Finite Fiels Domingo Gómez-Pérez, Alejanro P. Nicolás, Alina Ostafe an Daniel Saornil Abstract. We use the theory of resultants

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator Avances in Applie Mathematics, 9 47 999 Article ID aama.998.067, available online at http: www.iealibrary.com on Similar Operators an a Functional Calculus for the First-Orer Linear Differential Operator

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

International Journal of Pure and Applied Mathematics Volume 35 No , ON PYTHAGOREAN QUADRUPLES Edray Goins 1, Alain Togbé 2

International Journal of Pure and Applied Mathematics Volume 35 No , ON PYTHAGOREAN QUADRUPLES Edray Goins 1, Alain Togbé 2 International Journal of Pure an Applie Mathematics Volume 35 No. 3 007, 365-374 ON PYTHAGOREAN QUADRUPLES Eray Goins 1, Alain Togbé 1 Department of Mathematics Purue University 150 North University Street,

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

Periods of quadratic twists of elliptic curves

Periods of quadratic twists of elliptic curves Perios of quaratic twists of elliptic curves Vivek Pal with an appenix by Amo Agashe Abstract In this paper we prove a relation between the perio of an elliptic curve an the perio of its real an imaginary

More information

Multiplicative properties of sets of residues

Multiplicative properties of sets of residues Multiplicative properties of sets of resiues C. Pomerance Hanover an A. Schinzel Warszawa Abstract: Given a natural number n, we ask whether every set of resiues mo n of carinality at least n/2 contains

More information

Zachary Scherr Math 503 HW 5 Due Friday, Feb 26

Zachary Scherr Math 503 HW 5 Due Friday, Feb 26 Zachary Scherr Math 503 HW 5 Due Friay, Feb 26 1 Reaing 1. Rea Chapter 9 of Dummit an Foote 2 Problems 1. 9.1.13 Solution: We alreay know that if R is any commutative ring, then R[x]/(x r = R for any r

More information

Multiplicative properties of sets of residues

Multiplicative properties of sets of residues Multiplicative properties of sets of resiues C. Pomerance Hanover an A. Schinzel Warszawa Abstract: We conjecture that for each natural number n, every set of resiues mo n of carinality at least n/2 contains

More information

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas Resistant Polynomials an Stronger Lower Bouns for Depth-Three Arithmetical Formulas Maurice J. Jansen University at Buffalo Kenneth W.Regan University at Buffalo Abstract We erive quaratic lower bouns

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

FIRST YEAR PHD REPORT

FIRST YEAR PHD REPORT FIRST YEAR PHD REPORT VANDITA PATEL Abstract. We look at some potential links between totally real number fiels an some theta expansions (these being moular forms). The literature relate to moular forms

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

On the number of isolated eigenvalues of a pair of particles in a quantum wire

On the number of isolated eigenvalues of a pair of particles in a quantum wire On the number of isolate eigenvalues of a pair of particles in a quantum wire arxiv:1812.11804v1 [math-ph] 31 Dec 2018 Joachim Kerner 1 Department of Mathematics an Computer Science FernUniversität in

More information

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS Ann. Sci. Math. Québec 33 (2009), no 2, 115 123 LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS TAKASHI AGOH Deicate to Paulo Ribenboim on the occasion of his 80th birthay. RÉSUMÉ.

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas Resistant Polynomials an Stronger Lower Bouns for Depth-Three Arithmetical Formulas Maurice J. Jansen an Kenneth W.Regan University at Buffalo (SUNY) Abstract. We erive quaratic lower bouns on the -complexity

More information

Multiplicative properties of sets of residues

Multiplicative properties of sets of residues Multiplicative properties of sets of resiues C. Pomerance Hanover an A. Schinzel Warszawa Abstract: We conjecture that for each natural number n, every set of resiues mo n of carinality at least n/2 contains

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Modular composition modulo triangular sets and applications

Modular composition modulo triangular sets and applications Moular composition moulo triangular sets an applications Arien Poteaux Éric Schost arien.poteaux@lip6.fr eschost@uwo.ca : Computer Science Department, The University of Western Ontario, Lonon, ON, Canaa

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

CMSC 313 Preview Slides

CMSC 313 Preview Slides CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

Pseudo-Free Families of Finite Computational Elementary Abelian p-groups

Pseudo-Free Families of Finite Computational Elementary Abelian p-groups Pseuo-Free Families of Finite Computational Elementary Abelian p-groups Mikhail Anokhin Information Security Institute, Lomonosov University, Moscow, Russia anokhin@mccme.ru Abstract We initiate the stuy

More information

Moments Tensors, Hilbert s Identity, and k-wise Uncorrelated Random Variables

Moments Tensors, Hilbert s Identity, and k-wise Uncorrelated Random Variables Moments Tensors, Hilbert s Ientity, an k-wise Uncorrelate Ranom Variables Bo JIANG Simai HE Zhening LI Shuzhong ZHANG First version January 011; final version September 013 Abstract In this paper we introuce

More information

arxiv: v1 [math.co] 31 Mar 2008

arxiv: v1 [math.co] 31 Mar 2008 On the maximum size of a (k,l)-sum-free subset of an abelian group arxiv:080386v1 [mathco] 31 Mar 2008 Béla Bajnok Department of Mathematics, Gettysburg College Gettysburg, PA 17325-186 USA E-mail: bbajnok@gettysburgeu

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

A New Vulnerable Class of Exponents in RSA

A New Vulnerable Class of Exponents in RSA A ew Vulnerable Class of Exponents in RSA Aberrahmane itaj Laboratoire e Mathématiues icolas Oresme Campus II, Boulevar u Maréchal Juin BP 586, 4032 Caen Ceex, France. nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

GLOBAL SOLUTIONS FOR 2D COUPLED BURGERS-COMPLEX-GINZBURG-LANDAU EQUATIONS

GLOBAL SOLUTIONS FOR 2D COUPLED BURGERS-COMPLEX-GINZBURG-LANDAU EQUATIONS Electronic Journal of Differential Equations, Vol. 015 015), No. 99, pp. 1 14. ISSN: 107-6691. URL: http://eje.math.txstate.eu or http://eje.math.unt.eu ftp eje.math.txstate.eu GLOBAL SOLUTIONS FOR D COUPLED

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p. Contents. 1. Introduction Preliminaries 3. References

NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p. Contents. 1. Introduction Preliminaries 3. References NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p ANNA MEDVEDOVSKY Abstract. We prove that the killing rate of certain egree-lowering recursion operators on a polynomial algebra over a

More information

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields 1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

ON THE MAXIMUM NUMBER OF CONSECUTIVE INTEGERS ON WHICH A CHARACTER IS CONSTANT

ON THE MAXIMUM NUMBER OF CONSECUTIVE INTEGERS ON WHICH A CHARACTER IS CONSTANT ON THE MAXIMUM NUMBER OF CONSECUTIVE INTEGERS ON WHICH A CHARACTER IS CONSTANT ENRIQUE TREVIÑO Abstract Let χ be a non-principal Dirichlet character to the prime moulus p In 1963, Burgess showe that the

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Generalized Tractability for Multivariate Problems

Generalized Tractability for Multivariate Problems Generalize Tractability for Multivariate Problems Part II: Linear Tensor Prouct Problems, Linear Information, an Unrestricte Tractability Michael Gnewuch Department of Computer Science, University of Kiel,

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Physics 5153 Classical Mechanics. The Virial Theorem and The Poisson Bracket-1

Physics 5153 Classical Mechanics. The Virial Theorem and The Poisson Bracket-1 Physics 5153 Classical Mechanics The Virial Theorem an The Poisson Bracket 1 Introuction In this lecture we will consier two applications of the Hamiltonian. The first, the Virial Theorem, applies to systems

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

A Look at the ABC Conjecture via Elliptic Curves

A Look at the ABC Conjecture via Elliptic Curves A Look at the ABC Conjecture via Elliptic Curves Nicole Cleary Brittany DiPietro Alexaner Hill Gerar D.Koffi Beihua Yan Abstract We stuy the connection between elliptic curves an ABC triples. Two important

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP ALESSANDRA PANTANO, ANNEGRET PAUL, AND SUSANA A. SALAMANCA-RIBA Abstract. We classify all genuine unitary representations of the metaplectic

More information

Convergence rates of moment-sum-of-squares hierarchies for optimal control problems

Convergence rates of moment-sum-of-squares hierarchies for optimal control problems Convergence rates of moment-sum-of-squares hierarchies for optimal control problems Milan Kora 1, Diier Henrion 2,3,4, Colin N. Jones 1 Draft of September 8, 2016 Abstract We stuy the convergence rate

More information

ANALYSIS OF A GENERAL FAMILY OF REGULARIZED NAVIER-STOKES AND MHD MODELS

ANALYSIS OF A GENERAL FAMILY OF REGULARIZED NAVIER-STOKES AND MHD MODELS ANALYSIS OF A GENERAL FAMILY OF REGULARIZED NAVIER-STOKES AND MHD MODELS MICHAEL HOLST, EVELYN LUNASIN, AND GANTUMUR TSOGTGEREL ABSTRACT. We consier a general family of regularize Navier-Stokes an Magnetohyroynamics

More information

arxiv: v1 [math.co] 15 Sep 2015

arxiv: v1 [math.co] 15 Sep 2015 Circular coloring of signe graphs Yingli Kang, Eckhar Steffen arxiv:1509.04488v1 [math.co] 15 Sep 015 Abstract Let k, ( k) be two positive integers. We generalize the well stuie notions of (k, )-colorings

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the

More information

The chromatic number of graph powers

The chromatic number of graph powers Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

7. Localization. (d 1, m 1 ) (d 2, m 2 ) d 3 D : d 3 d 1 m 2 = d 3 d 2 m 1. (ii) If (d 1, m 1 ) (d 1, m 1 ) and (d 2, m 2 ) (d 2, m 2 ) then

7. Localization. (d 1, m 1 ) (d 2, m 2 ) d 3 D : d 3 d 1 m 2 = d 3 d 2 m 1. (ii) If (d 1, m 1 ) (d 1, m 1 ) and (d 2, m 2 ) (d 2, m 2 ) then 7. Localization To prove Theorem 6.1 it becomes necessary to be able to a enominators to rings (an to moules), even when the rings have zero-ivisors. It is a tool use all the time in commutative algebra,

More information

arxiv: v1 [math-ph] 5 May 2014

arxiv: v1 [math-ph] 5 May 2014 DIFFERENTIAL-ALGEBRAIC SOLUTIONS OF THE HEAT EQUATION VICTOR M. BUCHSTABER, ELENA YU. NETAY arxiv:1405.0926v1 [math-ph] 5 May 2014 Abstract. In this work we introuce the notion of ifferential-algebraic

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 5. Levi-Civita connection From now on we are intereste in connections on the tangent bunle T X of a Riemanninam manifol (X, g). Out main result will be a construction

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

The Press-Schechter mass function

The Press-Schechter mass function The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for

More information

Arithmetic progressions on Pell equations

Arithmetic progressions on Pell equations Journal of Number Theory 18 (008) 1389 1409 www.elsevier.com/locate/jnt Arithmetic progressions on Pell equations A. Pethő a,1,v.ziegler b,, a Department of Computer Science, Number Theory Research Group,

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients ACTA ARITHMETICA 2.2 (200 Mo 3 analogues of theorems of Gauss an Jacobi on binomial coefficients by John B. Cosgrave (Dublin an Karl Dilcher (Halifax. Introuction. One of the most remarkable congruences

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

SINGULAR PERTURBATION AND STATIONARY SOLUTIONS OF PARABOLIC EQUATIONS IN GAUSS-SOBOLEV SPACES

SINGULAR PERTURBATION AND STATIONARY SOLUTIONS OF PARABOLIC EQUATIONS IN GAUSS-SOBOLEV SPACES Communications on Stochastic Analysis Vol. 2, No. 2 (28) 289-36 Serials Publications www.serialspublications.com SINGULAR PERTURBATION AND STATIONARY SOLUTIONS OF PARABOLIC EQUATIONS IN GAUSS-SOBOLEV SPACES

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials Upper an Lower Bouns on ε-approximate Degree of AND n an OR n Using Chebyshev Polynomials Mrinalkanti Ghosh, Rachit Nimavat December 11, 016 1 Introuction The notion of approximate egree was first introuce

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Some properties of random staircase tableaux

Some properties of random staircase tableaux Some properties of ranom staircase tableaux Sanrine Dasse Hartaut Pawe l Hitczenko Downloae /4/7 to 744940 Reistribution subject to SIAM license or copyright; see http://wwwsiamorg/journals/ojsaphp Abstract

More information

Linear Algebra- Review And Beyond. Lecture 3

Linear Algebra- Review And Beyond. Lecture 3 Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the

More information

Quantum Mechanics in Three Dimensions

Quantum Mechanics in Three Dimensions Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.

More information