On solving zero-dimensional and parametric systems

Size: px
Start display at page:

Download "On solving zero-dimensional and parametric systems"

Transcription

1 On solving zero-dimensional and parametric systems Fabrice Rouillier - SALSA (INRIA) project and CALFOR (LIP6) team Paris, France

2 General Objectives E = {p 1,, p r }, F = {f 1,, f l }, with p i, f i Q[U, X] U = U 1,, U d parameters X = X d+1,, X n indeterminates C = {x C n, p 1 = 0,, p r = 0, f 1 0,, f s 0} S = {x R n, p 1 =0,, p r =0, f 1 > 0,, f s > 0} In part 1 : we suppose that d = 0 (no parameter) and that the ideal p 1,, p r is zero-dimensional (finite number of complex zeroes). In part 2 : we suppose that d 0 and that the ideal p 1,, p r U=u is zero-dimensional for almost all u C d (general results will be described but only this case will be detailed).

3 General Objectives (2) The goal is to propose mathematical objects and algorithms to SOLVE such systems. The end-user queries we are interested in are (see G.-M. Greuel s talk): Zero-dimensional systems : count the real / complex roots ; detect multiple points and compute multiplicities ; provide an acurate and certified approximation of the roots ; signs of polynomials at the real roots of a system ; Parametric systems : count the real / complex roots wrt parameter s values ; describe geometrically the solutions set ; provide formal expressions of the roots ; provide numerically stable solutions.

4 General Objectives (3) Constraints : Exact/certified results : a real root is not a complex root with a small imaginary part... A numerical approximation must be certified with respect to a precision given by the end-user, etc. Universal algorithms : being able to check the assumptions (for example zero-dimensional) and the mathematical arbitrary choices (so called generic choices). Efficiency : computation time (bit operations) but also memory consumming.

5 Part 1 : Zero-dimensional Systems

6 Univariate case We assume that we know how to solve the univariate case (at least in the real case) : Counting/isolating real roots : Descarte s based methods, Sturm sequences etc. Evaluating polynomials (or their signs) at the roots of a univariate polynomial. More details / examples will be given in workshop B2 (Feb 27 - March 3) A reference book : Algorithms in Real Algebraic Geometry - Basu Pollack and Roy (Springer)

7 Notations E = {p 1, p s } Q[X 1,, X n ], is the ideal generated by E; V (E) C n is the zero set of or equivalently the set of complex solutions of {x C n, p 1 (x) = 0,, p n (x) = 0}; x C n, x i denotes its i-th coordinate.

8 Using Gröbner bases (see C. Traverso s talk) Theorem 1. Let G = {g 1,, g l } be a Gröbner basis for any ordering < of E = {p 1,, p s } Q[X 1,, X n ] s. The following properties are equivalent: For all index i, i = 1 n, there exists a polynomial g j G and a positive integer n j such that X i n j = LM (g j, < ); The system {p 1 = 0,, p s =0} has a finite number of solutions in C n. Q[X 1,, X n ] G is a finite dimensional Q-vector space Proof. According to Theorem 3, the 2nd and 3rd items are equivalent; m First item implies that 1 i = n, m i s.t. 1,, X i i (modulo I) and thus implies 3rd item. are lineary dependent m 3rd item implies that 1 i = n, m i s.t. 1,, X i i are lineary dependent (modulo I) so that p i Q[X i ], p i G. Thus, normalform(p i, G, < 0) = 0 g i G such αm that LM(g i, < ) divides LM(p i, < )=X i i, α N. Corollary 2. B = {t = X 1 e1 X n e n, (e 1,, e n ) N n normalform(t, G, < ) = t} = {w 1,, w D } is a basis of Q[X 1,, X n ]/ as a Q-vector space;

9 Counting the solutions (C. Traverso s talk) Definition 3. The multiplicity µ(α) of α ( V () is the ) dimension of the C[X localization of 1,, X n ] C[X1,, X at α (denoted by n ] ). α Theorem 4. C[X 1, Proof., X n ] < α V () ( C[X1,, X n ] α V (), e α C[X 1,, X n ] such that α V () e α = 1, e α e α = 0 if α α, e 2 α = e α. (consequence : e α (α) = 1 and e α (β) = 0 if β α V ()) ) α. s α = β α X 1 β 1 α 1 β 1 : n α N s.t. t α = s α n α : t α (α) = 1 and t α t β = 0; t α, α V () = 1 r α, α V () r αt α = 1. Set e α = r α t α. e α ( C[X1,, X n ] ) < ( C[X1,, X n ] ) α Corollary 5. The dimension of Q[X 1,, X n ] zeroes of counted with multiplicities. equals the number of complex

10 Stickelberger s theorem (C. Traverso s talk) Definition 6. Let h C[X 1,, X n ]; m h : C[X 1,, X n ] C[X 1,, X n ] u hu Theorem 7. The eigenvalues of m h are the h(α), α V ()with multiplicity µ(α). Proof. e α (f f(α))(β)=0, β V () n α N, e α (f f(α)) n α ( ) C[X1,, X the restriction of m eα (f f(α)) to n ] is thus nilpotent so (( that 0 is its ) ) unique eigenvalue (of multiplicity µ(α) = C[X1,, X dim n ] ). α ( ) ( ) C[X1,, X conclude using Theorem 4 : e n ] C[X1,, X n ] α and < α C[X 1,, X n ] ( ) C[X1,, X n ] < α V () α. α

11 Application of Stickelberger s theorem Corollary 8. (Stickelberger) Trace(m h ) = α V () µ(α)h(α); Charpol(m h, T) = α V () (T h(α))µ(α) Det(m h ) = α V () h(α)µ(α) Examples of use : h = 1 : Trace(m 1 )=dim ( C[X1,, X n ] h = X i : Charpol(m Xi, T) = α V () (T α i) µ(α), and thus V (Charpol(m Xi, T)) = {α i, α V ()} ) C. Traverso s talk : A first objective is to COMPUTE explicitly the matrices m Xi, i = 1 n.

12 Computing in the quotient algebra (C. Traverso s talk) For computing a matrix of m Xi, we need : A (monomial) basis B = {w 1,, w D } of Q[X 1, of C[X 1,, X n ] ordering, X n ] (or equivalently ) : can be deduced from a Gröbner basis for any A way for computing the class h of h Q[X 1,, X n ] in Q[X 1,, X n ] as a vector wrt B (denoted by h B from now) : for example the normalform. G For example, the colums of the matrix of m h wrt B are the coordinates of h w i B.

13 Counting distinct roots The matrix of M Xi wrt B has X i w 1,, X i w D as columns. If E has rational coefficients, then G Q[X 1,, X n ] and M Xi has also rational entries. One can compute its characteristic polynomial and apply any univariate solver to isolate all the possible real i-th coordinates of the zeroes of. Definition 9. (Separating element) Let t Q[X 1,, X n ]. t separates V () if (α, β) V () 2, α β t(α) t(β). Lemma 10. t separates V () V (charpol(m t ))( R n )=#V ()( R n ) Lemma 11. Almost all polynomials separate V () C n. Probabilistic algorithm for computing V () or V () R n Lemma 12. charpol(m t ) squarefree t separates V (). Deterministic filter

14 A (naïve) deterministic algorithm Lemma 13. if d = V () < D, t { n i=1 that t separates V (). j i 1 X i, j = 0 n d (d 1) } such 2 Proof. Let (α, β) V (), α β. p α,β (T) = n i=1 T i 1 (α i β i ) 0. Thus V (p α,β ) < and there exists at most n integers j such that p α,β (j) = 0. d(d 1), so there 2 intergers j such that there exists (α, β) the number of distinct couples (α, β) V () 2 is d (d 1) 2 exists at most n V () 2, α β with p α,β (j) = 0 Lemma 14. t separates V () iff V (charpol(m t )) = max ( V (charpol(m n j i=1 i 1 X i )), j 0 = n d (d 1) ) 2

15 Hermite s quadratic form Double goal : count the distinct complex/real roots - decrease the number of operations for searching a separating element. Definition 15. (Hermite s quadratic form). For f Q[X 1,, X n ] : q f : Q[X 1,, X n ] Q h G Trace(m fh 2) Theorem 16. For f Q[X 1,, X n ], rank(q f )=#{x V (), f(x) 0} signature(q f )=#{x V () R n, f(x) > 0} #{x V () R n, f(x) < 0} Corollary 17. Taking f = 1 : rank(q 1 ) = #V () signature(q 1 )=#(V () R n )

16 Hermite s quadratic form Set d = #V (), t a separating element of V (). w d,, w D st {w i } D i=1 = {1, t,, t d 1, w d,, w D } is a basis of Q[X 1,, X n ] ; q f (h ) = ( µ(α)f(α) D α V () i=1 G ) 2 h i w i (α) for hg = D h i=1 i w i ; q f (h G ) =(h 1,, h D )Γ t with Γ = 1 t(α 1) µ(α 1 ) f µ(α d ) f d t(α 1 ) d 1 1 t(α d ) t(α d ) d 1 q f (h G ) = α V () µ(α)f(α)(l α(h)) 2 Γ h 1 h D w d (α 1 ) w D (α 1 ) w d (α d ) w D (α d ) if α α, µ(α)f(α)(l α (h)) 2 + µ(α)f(α)(l ᾱ (h)) 2 = l 1,α (h ) 2 l 2,α (h ) 2, l 1,α, l 2,α being linar forms with real coefficients. G G l α, l 1,α, l 2,α linearly indep h µ(α)f(α)(l(α, α V () R h)) 2 has n the same signature as q f. G

17 Variable s elimination An easy example : compute G a Gröbner basis of ; compute D = dim Q Q[X 1,, X n ] and {w 1,, w D } from G; compute 1, X 1,, X D 1 1 (normalform) and check they are lineary G independant; [ ] ] D 1 if so, solve the linear system, X 1G 1,, X 1 β = [X D 1, X 2,, X n X D 1 D 1 i=0 β 1,i+1 X i 1 = 0 X and get a system equivalent to E : 2 D 1 i=0 β 2,i+1 X i 1 = 0 X n D 1 i=0 β n,i+1 X i 1 = 0 ELSE??

18 Lexicographic Gröbner bases By change of ordering (FGLM algorithm - see C. Traverso s talk) Suppose that Q[X 1,, X n ] is computed (Gröbner basis G wrt any monomial ordering < and a monomial basis B = {w 1,, w D }). Strategy : compute the image mg B of monomials m in increasing order wrt the lexicographic ordering until getting a set D = #B Q-linearly independant vectors w 1,, w D } (w 1 = 1 and w i 1 < lex w i, 2 i = D). Solve [ w 1, w D ] β = [ ] X i w j, set g i,j = X i w j D D k=1 β i,j,k w k n,j=1 i=1 Theorem 18. G = {g i,j, i = 1 n, j = 1 D} is a Gröbner basis wrt < lex of. Proof. p, g G s.t. LM(g, < lex ) divides LM(p, < lex ) since other else p = D i=1 a i w i (and thus do not belongs to )

19 Remarks on lexicographic Gröbner bases General shape in the zero-dimensional case for < lex : f 1 (X 1 ) f 2 (X 1, X 2 ) f k3 1(X 1, X 2 ) f k3 (X 1, X 2, X 3 ) f kn (X 1,, X n ) f kn +1(X 1,, X n ) Case of ideals in Shape position ideals for < lex (degree(f 1 )=D) : f 1 (X 1 ) X 2 f 2 (X 1, X 2 ) X n f n (X 1,, X n ) This occurs for example when X 1 is separating and =. Triangular sets (lexicographic Gröbner bases in the zero-dimensional case) : f 1 (X I )=0 n X f 2 (X 1 )=0 n X n n + f n (X 1,, X n 1 )=0

20 The case of radical ideals Main remark : if t Q[X 1,, X n ] separates V () and if =, then assuming that T is a new variable, E {T t} is in shape position for < lex with T < lex X 1 < lex < lex X n. Proof : charpol(m t ) = α V () (T t(α)) = minpol(m t) is squarefree. An algorithm : compute G a Gröbner basis of for < D R L, B = {w 1,, w D } a basis of Q[X 1,, X n ] and d = #V () (Hermite s quadratic form); compute p t = minpol(m t ) for t { n i=1 j i 1 D(D 1) X i, j = n } until 0 2 degree(squarefree(p t )) = d; ] ] if degree(p t ) = D solve [1, t,, t D 1 β = [t D, X 1,, X n and return G G E = {T D 1 D 1 i=0 β 1,i+1 T i,x j D 1 i=0 β 2,i+1 T i, j 1 = n} ( x = (x0, x 1,, x n ) V ( E ) x = (x 1,, x n ) V () ) ELSE?

21 Remarks There exists algorithms to compute the radical of an ideal but they are inefficient for large problems. They require the computation of several Gröbner bases ; For some problems, one would also like to compute the multiplicities of the solutions... Note that the above algorithm may compute O(n D 2 ) minimal polynomials before concluding with a failure! At this stage : we do not know how to reduce the problem (efficiently) to an easy univariate one when the ideal is not in shape position ; Numerical instability : the polynomials in a lexicographic Gröbner basis have HUGE coefficients (excepted the first one) : this often forbids to plug numerical approximations of the roots of the first polynomial into the basis to get an accurate approximation of the coordinates for large examples.

22 The Rational Univariate Representation (RUR) Definition 19. For t Q[X 1,, X n ]: f t = D i=0 a i T D i = charpol(m t ), f t square-free part. v Q[X 1,, X n ], g t,v (T)= d 1 Trace(m i=0 vt i)h d i 1 (f t, T), where j d = degree(f t ) and Hj (f t, T) = i=0 a i T j i Theorem 20. If t separates V (), then and : V ()( R n ) V (f t )( R) α = (α 1,, α n ) t(α) R t (β)=( g t,x 1 (β) t,xn (β) g t,1 (β) g t,1 (β) β f t Q[T] and v Q[X 1,, X n ], g t,v Q[T]; µ(α)= µ(t(α)) = µ(r t (t(α)))= (f t )(t(α)) (f t ) (t(α)) This generalizes the elimination process to the case of non radical ideals

23 The RUR : Proof By construction, f t Q[T] and v Q[X 1,, X n ], g t,v Q[T]; Thus V () V (f t ) V ()( R n ) V (f t )( R n ). By Stickelberger s theorem, f t (T)= α V () (T t(α))µ(α). Thus f t (T)= (T t(α)) α V () Consider g v,t = ( ) α V () µ(α)v(α) β V ( E α (T t(β)) ),β if t separates V () ( ) g t,v (t(α))= µ(α)v(α) β V ( E α (t(α) t(β)) ),β (f t (T) ) = g v,1 (T) = ( ) α V () µ(α) β V ( E α (T t(β)) ),β (f t (T)) = ( ) α V (),β ) β V ( E α (T t(β)) so that v(α) = g t,v(t(α)) and µ(α) = (f t g t,1 (t(α)) )(t(α)) = (f t )(t(α)) g t,1 (t(α)) (f t ) (t(α))

24 The RUR : Proof To prove the theorem, we finally need to show : g v,t (T)= α V ( E ) µ(α)v(α) ( β V ( E ),β α (T t(β)) ) = d 1 trace(m i=0 vt i)h d i 1 (f t, T) with f t = i=0 D a i T D i = α V () (T t(α)) and H j (f t, T)= j i=0 a i T j i g v,t (T) = f t (T) i 0 trace(m vt i) T i+1 α V () d 1 j=0 µ(α)v(α) T t(α) = i 0 g v,t (T) = d i 1 i=0 trace(m vt i)a j T d i j 1 = d 1 trace(m vt i)h d i 1 (f t, T) i=0 α V () µ(α)v(α)t(α)i T i+1 =

25 The RUR : a naïve algorithm Algorithm : compute G a Gröbner basis of for < D R L, B = {w 1,, w D } a basis of and d = #V () (Hermite s quadratic form); Q[X 1,, X n ] compute f t = charpol(m t ) for t { n i=1 degree(f t )=d; j i 1 X i, j = 0 n compute Trace(m Xi t j ), i=1 n, j = 1 d; and deduce; return g t,v (T)= d 1 trace(m i=0 vt i)h d i 1 (f t, T) for v = 1, X1,, X n Remarks : Trace(m Xi t j) normalform(x it j w k ), i = 1 n, j = 1 D, k = 1 D O(n D 2 N), N D = cost of normalform Hermite s quadratic form Trace(w i w j ) normalform(w i w j w k ), k =1 D O(D 3 N), N D= cost of normalform charpol(m t ) O(D 4 ) (with a naïve algorithm) D(D 1) } until 2 Theoretical complexity : O(n D 6 ) arithm. operations, Practical complexity : O(D 4 + n D 3 ) arithm. operations

26 For computing RUR, we only need The RUR : remarks a monomial basis B = {w 1,, w D } of Q[X 1, 1 and i > 1, k, w i = X k w j the matrices M Xi of m Xi wrt B;, X n ] I ; Suppose that w 1 = This input can be provided by Gröbner bases but also by some new alternatives (B. Mourrain and P. Trebuchet s work). From now we suppose we only have these data as input and that the rational numbers in the M Xi are of binary size t. The goal is now to design an efficient algorithm (binary complexity) for computing the RUR.

27 Objectives RUR = separating element t AND a RUR-Candidate {f t (T), g t,1 (T), g t,x1 (T),, g t,xn (T)} : if t separates V (I), V ()( R) V (f t )( R) α = (α 1,, α n ) t(α) (X 1 (α) = g t,x 1 (t(α)) g t,1 (t(α)) n(α)= g t,xn (t(α)) g t,1 (t(α)) t(α) preserving multiplicities and real roots. Many variants for computing a RUR-Candidate - few solutions for computing a RUR. This difference is critical for decision algorithms. Can be computed as a lexicographic Gröbner basis when I is radical and X 1 separates V ()(Faugère, Yokoyama,... multi-mod. or p-adic methods). A major problem is to check that a RUR-Candidate is a RUR or equivalently that t separates V () for non radical ideals.

28 From few traces Theorem 21. Given q 1 [1] = [Trace(m w1 ),, Trace(m wd )] (first line of Hermite s quadratic form), a RUR-Candidate can be computed in O(D 3 + n D 2 ) arithmetic operations. Proof. See algorithms below

29 The first polynomial According to Stickelberger s theorem, Trace(m t i) = D i=1 α i is the i-th Newton s sum of f t = charpol(m t ) = D i=0 a i T D i. One can thus deduce the coefficients of f t from the scalars Trace(m t i), 0 { i = D by solving the triangular linear system : (D i)a i = } i 1 j=0 a i j Trace(m t j) Algorithm charpol : D i=0 Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n = [1, 0,, 0]; M yg t = D i=1 t i M Xi ; For i = 0 D do Trace(m t i) = yg q 1 [1] yg = M t yg /* at the i-th yg step = t i G Solve (D i)a i = i 1 j=0 a i j Trace(m t j) O(D 3 ) operations (note this is a general algorithm for computing the characteristic polynomial of any element in Q[X 1,, X n ]. I

30 The coordinates Algorithm coordinates : Input = data from algorithm charpol + f t j f t = i=0 a i T d i the squarefree part of f t i For d H i=0 i (f t, t) = j=0 For v {1, X 1,, X n } a j t i j? already com p uted [Trace(m vw1 ),, Trace(m vwd )] = M v q 1 [1] t For i=d 1 Trace(m vhi (t))=h i (t) [Trace(m vw1 ),, Trace(m vwd )] t g t,v (T)= d 1 Trace(m i=0 vhi (f t,t))t d i 1 = d 1 Trace(m i=0 Xj t i)h d i 1(f t, T) O(n D 2 ) arithmetic operations

31 Computing Hermite s quadratic form j=1 D D q 1 = [Trace(m wi w j )] i=1 Remark : Trace(w i w j ) = w i w j q 1 [1]; Proposition 22. Hermite s quadratic form can be computed from q 1 [1] performing O(#TD) arithmetic operations where T = {w i w j, i = 1 D, j = 1 D}.

32 Algorithm RUR-Classic : RUR from few traces Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n d = #V () (Hermite s quadratic form); O(D 3 ) compute f t = charpol(m t ) for t { n i=1 j i 1 X i, j 0 = n until degree(f t )=d; O(D 3 ) practical / O(n D 5 ) theoretical compute g t,v, v = 1, X 1,, X n O(n D 2 ) D(D 1) 2 } return f t, g t,v, v = 1, X 1,, X n The theoretical complexity is a worst case : all the possible separating elements excepted the last one are not separating. In practice, I haven t any example with more than two tries...

33 RUR from a multiplication table Definition 23. T = {w j w j, i 1 = D, j = 1D} Remark : #T < D 2 Examples : from a lexicographic G. basis in Shape position : #T = O(D 2 ) If D = δ n (Bezout), #T = O(2 n D 2 ) (ex. when #G = n) Computing T Computing w i w j : i, k, w i w j = X k w i w j w i w j = M Xk w i w j Requires O(#TD 2 ) arithmetic operations Computing q 1 from T : for i 1 = D, Trace(m wi ) = D i=1 (O(D 2 )) w i w j [j] Theorem 24. Computing a RUR from T requires O(#TD 2 + D 3 + n D 2 ) arithmetic operations.

34 Complexity : remarks Remark : up to now we have counted O(1) each arithmetical operation; This is fine for data of fixed sizes (Z/pZ, floating point numbers, etc.) but not for integers, rationals, polynomials, series, etc. For integers : The addition is linear in the size of its operands; The naïve multiplication is quadratic in the size of its operands; (fast fft-based versions are close to be linear (forget the log) for very large integers. Data are growing at each operation : a + b has size O(max (log 2 (a), log 2 (b))+1), ab has size O(log(a)+log(b)) Funny example : fast exponentiation may not be so fast... (m(a, b)= binary cost of the mult. of and integer of size a by an integer of size b) ) X 2n = x. x : arithmetic cost O(2 n 2 ) - binary cost O( n i=1 m(i, 1) X 2n = ( ) (x 2 ) 2 2 ( arithmetic cost O(n) - binary cost O n m(2 i, 2 i ) ) i=1

35 Complexity : choosing the right model We are working with rationals! The (bound on the) growth of coefficients in an addition is greater than in a multiplication! An example : [a 1,,a D ] [b 1,,b D ] a i, b i of size t with integers, result of size O(2 t + D) with rationals, result of size O(2 Dt) k iterations v = M v, v (resp. M) a vector (resp. a matrix) of dimension D with entries of size t : with integers, result with scalars of size O(k(t+D)) with rationals, result of size O(D k t) A more precise model : 1 u [a 1,, a D ] 1 v [b 1,, b D ] u, v, a i, b i of size t result of size O(2 t + D) For our problem we can assume that the scalars are integers!

36 Complexity : choosing the right model Suppose that t is the binary size of the integers in M Xi = 1 M d Xi X i The multiplication table : at most δ = max (deg(w i w j )) iterations v = M v. Growth of coefficients : t δ (t + D) Bound on the binary cost : O(#TD 2 δ(t + D)) Hermite s quadratic form : Trace(w i w j ) = w i w j q 1 [1]; size O(δ (t + D)) bin. cost : O(#T Dδ (t + D)) Reduction of Hermite s quadratic form : growth of coefficients t D t (Rouillier s fraction-free algorithm) binary cost : O(D 4 δ (t + D)) First polynomial of the RUR : it is the characteristic polynomial of M t thus its coefficients are of size O(D t) (see G. Villard s survey). The intermediate iteration : t i+1 = M t t i induces a growth t D(t + D) (thus the resolution of the triangular system do not induce any growth) The binary cost is bounded by O(D 4 (t + D)). Coordinates : no significant growth (compared with the computation of the first polynomial) O(n D 3 (t + D))

37 Complexity : First remarks The computation of the multiplication table is not so costly compared to the rest since the data are not growing too much. The reduction of Hermite s quadratic form is the main operation. Algorithm RUR-Classic: Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n d = #V () (Hermite s quadratic form); O(D 3 ) compute f t = charpol(m t ) for t { n i=1 j i 1 X i, j 0 = n until degree(f t )=d; O(D 3 ) practical /O(n D 5 ) theoretical compute g t,v, v = 1, X 1,, X n O(n D 2 ) return f t, g t,v, v = 1, X 1,, X n D(D 1) 2 } We need to change again our strategy!

38 Computing faster The strategy : compute d and t using modular arithmetic (modulo a prime number). The result will be correct excepted for a finite number of primes. check that the RUR-Candidate is a RUR after the computation to get a deterministic algorithm. Advantages : fast computations (fixed precision) for predicting t if the prime numbers are big enough : very few are bad ; take t = X i when possible (smaller results due to the sparsity of M Xi ) t may be given by the user.

39 Checking a RUR-Candidate There exists a filter : checking that f t is squarefree For the general case : Proposition 25. A RUR-Candidate R t () = {f t, g t,1, g t,x1,, g t,xn } is a RUR iff Trace(m pi w j ) = 0, i = 1 n, j = 1 D with p i = X i g t,1 (t) g t,xi (t); Proof. R t () is a RUR iff p i (α) = 0, i = 1 n, α V () since #V (f t ) V (). Hermite s quadratic form must be of rank 0: rank(q pi ) = rank( [ Trace(m pi w j w k ) ] j=1 D k=1 D ) = #{α V (), pi (α) 0} its first line is null Trace(m pi w j ) = 0, j = 1 D

40 Checking a RUR-Candidate Corollary 26. A RUR-Candidate R t () = {f t, g t,1, g t,x1,, g t,xn } is a RUR iff q 1 pg i = 0, i 1 = n, j 1 = D with p i = X i g t,1 (t) g t,xi (t); Proposition 27. One can check that a RUR-Candidate is a RUR in O(D 3 + n D 2 ) arithmetic operations (if the RUR-Candidate has been computed using RUR-Classic). Algorithm CheckRUR-Classic H 0 = a 0 [1, 0,, 0]; for i=1 D H i (t) = M t H i 1 (t) + a i H i 1 (t); if q 1 H D (t) [0,, 0] then return(false) i=1 for n g t,xi (t) = D i=1 Trace(X i t j )? alread y com puted H D i 1 (t) g t,1 (t) = D i=1 Trace(t j )H D i 1 (t) for i=1 n if q 1 ( g t,xi (t) + M Xi g t,1 (t)) [0,, 0] then return(false) return(true) O(D 3 + n D 2 ) arithmetic operations - no significant growth of coefficients (compared to the other sub-algorithms)

41 RUR vs Lexicographic Gröbner bases in the shape position case When X 1 separates V () + is radical RUR f(x 1 ) = 0 X 2 = h 2(X 1 ) f (X 1 ) Lex. G.B. f(x 1 ) = 0 X 2 = f 2 (X 1 ) X n = h n(x 1 ) f (X 1 ) X n = f n (X 1 ) (same number of arithmetic operations in the shape position case) Proposition : f (X 1 )X i h i (X 1 )=X i f i (X 1 ) mod I Equivalently : f i = f 1 (X 1 )h n (X 1 ) mod I Remarks : all the coefficients of the RUR have the same size (O(D t)) In a Lex. G. B. the coefficients of f appear to be small (O(D t)) compared to those of f i.

42 Adding inequations/inequalities E = {p 1,, p r }, F = {f 1,, f l }, with p i, f i Q[X 1,, X n ] A straightforward method : C = {x C n, p 1 = 0,, p r = 0, f 1 0,, f s 0} S = {x R n, p 1 =0,, p r =0, f 1 > 0,, f s > 0} Compute f i ( g t,x 1 g t,1,, g t,xn g t,1 ), i = 1 s and study the signs of these univariate polynomials at the roots of f t. Drawback : terrible computations (substitutions+reduction modulo f t ) A less straightforward method : E = {p 1,, p r, T 1 f 1,, T s f s } Q[X 1,, X n ] Compute the RUR of E : {f t, g t,1, g t,x1,, g t,xn, g t,t1,, g t,ts } and study the signs of g t,1, g t,t1,, g t,ts at the roots of f t (univariate problem). Drawback : can not study f i, i = 1 s without re-computing an ideal

43 ,,,,,, Adding inequations/inequalities A solution : simulating Gröbner bases Definition 28. Given two monomial orderings < U (w.r.t. the variables U 1,, U d ) and < X (w.r.t. the variables X d+1,, X n ) one can define a block ordering < U,X : m < U,X m if and only if m U1 =1, (m U1 =1, U d =1 < X m U1 =1, U d =1 = m U1 =1, U d =1 U d =1 or and m X d+1 =1, X n =1 < U m X d+1 =1, X n =1 Lemma 29. If G is a Gröbner basis of = p 1,, p r, T 1 f 1,, T s f s for < X, then G {T i normalform(f i ), i = 1 s} is a Gröbner basis of E = p 1,, p r, T 1 f 1,, T s f s for < T,X where T is any admissible monomial ordering wrt T = [T 1,, T n ]; Remark : Q[X 1,, X n ] Q[X 1,, X n, T 1,, T n ] < so that the only extraneous computations needed to extend the RUR are the construction of the M Ti and the compu- E tations of the Trace(m Ti t ). j Complexity : O(D 3 + n D 2 + s D 2 )? RU R ).

44 SALSA library containing Software FGb (F4 algorithm implemented by J.C. Faugère) - Dynamic library written in C RS (RUR + real root isolation by F. Rouillier) - Dynamic library written in C An interface with Maple Software (version >9.5)... (see next lecture). Will be linked with Maple 11 (official distribution)

45 Conclusion We have seen how to solve in a certified way any kind of zero-dimensional system : counting complex/real roots, certified isolation (by the way or interval arithmetic + symbolic resolution of univariate polynomials), computation of the multiplicities, certified evaluation of polynomials at the roots of a zero-dimensional system (easy to certify the sign for example). Recent progress have been made using baby step/giant step technics (Rouillier 2005) decreasing the number of bit operations required to compute a RUR-Candidate and using specific multiplication tables (only partially stored) decreasing the memory consummed. The RUR can be used jointly with splitting technics like triangular sets. Systems with 100/200 complex roots are easy in general (seconds) Systems with up to 1000 complex solutions are (in general) reachable by the current versions of the software (minutes/hours) Systems with >10000 solutions have been solved by the beta versions. Important remark : only few solvers are able to provide the required univariate black-boxes able to solve such large polynomials (first polynomial of a RUR)...

Rational Univariate Representation

Rational Univariate Representation Rational Univariate Representation 1 Stickelberger s Theorem a rational univariate representation (RUR) 2 The Elbow Manipulator a spatial robot arm with three links 3 Application of the Newton Identities

More information

Symbolic methods for solving algebraic systems of equations and applications for testing the structural stability

Symbolic methods for solving algebraic systems of equations and applications for testing the structural stability Symbolic methods for solving algebraic systems of equations and applications for testing the structural stability Yacine Bouzidi and Fabrice Rouillier Abstract n this work, we provide an overview of the

More information

Hybrid Approach : a Tool for Multivariate Cryptography

Hybrid Approach : a Tool for Multivariate Cryptography Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

Rational Univariate Reduction via Toric Resultants

Rational Univariate Reduction via Toric Resultants Rational Univariate Reduction via Toric Resultants Koji Ouchi 1,2 John Keyser 1 Department of Computer Science, 3112 Texas A&M University, College Station, TX 77843-3112, USA Abstract We describe algorithms

More information

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

Calcul d indice et courbes algébriques : de meilleures récoltes

Calcul d indice et courbes algébriques : de meilleures récoltes Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information

Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals. Masayuki Noro. Toru Aoyama

Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals. Masayuki Noro. Toru Aoyama Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals Toru Aoyama Kobe University Department of Mathematics Graduate school of Science Rikkyo University Department

More information

Elliptic Curve Discrete Logarithm Problem

Elliptic Curve Discrete Logarithm Problem Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October

More information

Exact algorithms for linear matrix inequalities

Exact algorithms for linear matrix inequalities 0 / 12 Exact algorithms for linear matrix inequalities Mohab Safey El Din (UPMC/CNRS/IUF/INRIA PolSys Team) Joint work with Didier Henrion, CNRS LAAS (Toulouse) Simone Naldi, Technische Universität Dortmund

More information

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic Didier Henrion Simone Naldi Mohab Safey El Din Version 1.0 of November 5, 2016 Abstract This document briefly describes

More information

Certifying solutions to overdetermined and singular polynomial systems over Q

Certifying solutions to overdetermined and singular polynomial systems over Q Certifying solutions to overdetermined and singular polynomial systems over Q Tulay Ayyildiz Akoglu a,1, Jonathan D. Hauenstein b,2, Agnes Szanto a,3 a Department of Mathematics, North Carolina State University,

More information

Computing Real Roots of Real Polynomials

Computing Real Roots of Real Polynomials Computing Real Roots of Real Polynomials and now For Real! Alexander Kobel Max-Planck-Institute for Informatics, Saarbrücken, Germany Fabrice Rouillier INRIA & Université Pierre et Marie Curie, Paris,

More information

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable Deciding positivity of real polynomials Eberhard Becker, Victoria Powers, and Thorsten Wormann Abstract. We describe an algorithm for deciding whether or not a real polynomial is positive semidenite. The

More information

Real solving polynomial equations with semidefinite programming

Real solving polynomial equations with semidefinite programming .5cm. Real solving polynomial equations with semidefinite programming Jean Bernard Lasserre - Monique Laurent - Philipp Rostalski LAAS, Toulouse - CWI, Amsterdam - ETH, Zürich LAW 2008 Real solving polynomial

More information

Real Root Isolation of Regular Chains.

Real Root Isolation of Regular Chains. Real Root Isolation of Regular Chains. François Boulier 1, Changbo Chen 2, François Lemaire 1, Marc Moreno Maza 2 1 University of Lille I (France) 2 University of London, Ontario (Canada) ASCM 2009 (Boulier,

More information

Generalized critical values and testing sign conditions

Generalized critical values and testing sign conditions Generalized critical values and testing sign conditions on a polynomial Mohab Safey El Din. Abstract. Let f be a polynomial in Q[X 1,..., X n] of degree D. We focus on testing the emptiness of the semi-algebraic

More information

Topology of implicit curves and surfaces

Topology of implicit curves and surfaces Topology of implicit curves and surfaces B. Mourrain, INRIA, BP 93, 06902 Sophia Antipolis mourrain@sophia.inria.fr 24th October 2002 The problem Given a polynomial f(x, y) (resp. f(x, y, z)), Compute

More information

Almost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17

Almost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17 Almost polynomial Complexity for Zero-dimensional Gröbner Bases Amir Hashemi co-author: Daniel Lazard INRIA SALSA-project/ LIP6 CALFOR-team http://www-calfor.lip6.fr/ hashemi/ Special semester on Gröbner

More information

Gröbner Bases. Applications in Cryptology

Gröbner Bases. Applications in Cryptology Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break

More information

Stream Ciphers: Cryptanalytic Techniques

Stream Ciphers: Cryptanalytic Techniques Stream Ciphers: Cryptanalytic Techniques Thomas Johansson Department of Electrical and Information Technology. Lund University, Sweden ECRYPT Summer school 2007 (Lund University) Stream Ciphers: Cryptanalytic

More information

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be

More information

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group.

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group. Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions

More information

Solving Polynomial Systems Symbolically and in Parallel

Solving Polynomial Systems Symbolically and in Parallel Solving Polynomial Systems Symbolically and in Parallel Marc Moreno Maza & Yuzhen Xie Ontario Research Center for Computer Algebra University of Western Ontario, London, Canada MITACS - CAIMS, June 18,

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms

More information

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases Gröbner bases In this lecture we introduce Buchberger s algorithm to compute a Gröbner basis for an ideal, following [2]. We sketch an application in filter design. Showing the termination of Buchberger

More information

Primitive sets in a lattice

Primitive sets in a lattice Primitive sets in a lattice Spyros. S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, FL 33431, U.S.A spyros@fau.unl.edu Tran van Trung Institute for Experimental

More information

Change of Ordering for Regular Chains in Positive Dimension

Change of Ordering for Regular Chains in Positive Dimension Change of Ordering for Regular Chains in Positive Dimension X. Dahan, X. Jin, M. Moreno Maza, É. Schost University of Western Ontario, London, Ontario, Canada. École polytechnique, 91128 Palaiseau, France.

More information

Interval Gröbner System and its Applications

Interval Gröbner System and its Applications Interval Gröbner System and its Applications B. M.-Alizadeh Benyamin.M.Alizadeh@gmail.com S. Rahmany S_Rahmani@du.ac.ir A. Basiri Basiri@du.ac.ir School of Mathematics and Computer Sciences, Damghan University,

More information

over a field F with char F 2: we define

over a field F with char F 2: we define Chapter 3 Involutions In this chapter, we define the standard involution (also called conjugation) on a quaternion algebra. In this way, we characterize division quaternion algebras as noncommutative division

More information

Primary Decomposition

Primary Decomposition Primary Decomposition p. Primary Decomposition Gerhard Pfister pfister@mathematik.uni-kl.de Departement of Mathematics University of Kaiserslautern Primary Decomposition p. Primary Decomposition:References

More information

CSL361 Problem set 4: Basic linear algebra

CSL361 Problem set 4: Basic linear algebra CSL361 Problem set 4: Basic linear algebra February 21, 2017 [Note:] If the numerical matrix computations turn out to be tedious, you may use the function rref in Matlab. 1 Row-reduced echelon matrices

More information

Section III.6. Factorization in Polynomial Rings

Section III.6. Factorization in Polynomial Rings III.6. Factorization in Polynomial Rings 1 Section III.6. Factorization in Polynomial Rings Note. We push several of the results in Section III.3 (such as divisibility, irreducibility, and unique factorization)

More information

Bon anniversaire Marc!

Bon anniversaire Marc! Bon anniversaire Marc! The full counting function of Gessel walks is algebraic Alin Bostan (INRIA) joint work with Manuel Kauers (INRIA/RISC) Journées GECKO/TERA 2008 Context: restricted lattice walks

More information

Gröbner Bases. eliminating the leading term Buchberger s criterion and algorithm. construct wavelet filters

Gröbner Bases. eliminating the leading term Buchberger s criterion and algorithm. construct wavelet filters Gröbner Bases 1 S-polynomials eliminating the leading term Buchberger s criterion and algorithm 2 Wavelet Design construct wavelet filters 3 Proof of the Buchberger Criterion two lemmas proof of the Buchberger

More information

compare to comparison and pointer based sorting, binary trees

compare to comparison and pointer based sorting, binary trees Admin Hashing Dictionaries Model Operations. makeset, insert, delete, find keys are integers in M = {1,..., m} (so assume machine word size, or unit time, is log m) can store in array of size M using power:

More information

QR Decomposition. When solving an overdetermined system by projection (or a least squares solution) often the following method is used:

QR Decomposition. When solving an overdetermined system by projection (or a least squares solution) often the following method is used: (In practice not Gram-Schmidt, but another process Householder Transformations are used.) QR Decomposition When solving an overdetermined system by projection (or a least squares solution) often the following

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

Problem Set 2. Assigned: Mon. November. 23, 2015

Problem Set 2. Assigned: Mon. November. 23, 2015 Pseudorandomness Prof. Salil Vadhan Problem Set 2 Assigned: Mon. November. 23, 2015 Chi-Ning Chou Index Problem Progress 1 SchwartzZippel lemma 1/1 2 Robustness of the model 1/1 3 Zero error versus 1-sided

More information

Fast Polynomial Multiplication

Fast Polynomial Multiplication Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution

More information

Real Solving on Bivariate Systems with Sturm Sequences and SLV Maple TM library

Real Solving on Bivariate Systems with Sturm Sequences and SLV Maple TM library Real Solving on Bivariate Systems with Sturm Sequences and SLV Maple TM library Dimitris Diochnos University of Illinois at Chicago Dept. of Mathematics, Statistics, and Computer Science September 27,

More information

Generalized eigenspaces

Generalized eigenspaces Generalized eigenspaces November 30, 2012 Contents 1 Introduction 1 2 Polynomials 2 3 Calculating the characteristic polynomial 5 4 Projections 7 5 Generalized eigenvalues 10 6 Eigenpolynomials 15 1 Introduction

More information

Commuting birth-and-death processes

Commuting birth-and-death processes Commuting birth-and-death processes Caroline Uhler Department of Statistics UC Berkeley (joint work with Steven N. Evans and Bernd Sturmfels) MSRI Workshop on Algebraic Statistics December 18, 2008 Birth-and-death

More information

GRÖBNER BASES AND POLYNOMIAL EQUATIONS. 1. Introduction and preliminaries on Gróbner bases

GRÖBNER BASES AND POLYNOMIAL EQUATIONS. 1. Introduction and preliminaries on Gróbner bases GRÖBNER BASES AND POLYNOMIAL EQUATIONS J. K. VERMA 1. Introduction and preliminaries on Gróbner bases Let S = k[x 1, x 2,..., x n ] denote a polynomial ring over a field k where x 1, x 2,..., x n are indeterminates.

More information

A Blackbox Polynomial System Solver on Parallel Shared Memory Computers

A Blackbox Polynomial System Solver on Parallel Shared Memory Computers A Blackbox Polynomial System Solver on Parallel Shared Memory Computers Jan Verschelde University of Illinois at Chicago Department of Mathematics, Statistics, and Computer Science The 20th Workshop on

More information

Improved algorithms for solving bivariate systems via Rational Univariate Representations

Improved algorithms for solving bivariate systems via Rational Univariate Representations Improved algorithms for solving bivariate systems via Rational Univariate Representations Yacine Bouzidi, Sylvain Lazard, Guillaume Moroz, Marc Pouget, Fabrice Rouillier, Michael Sagraloff To cite this

More information

Global optimization, polynomial optimization, polynomial system solving, real

Global optimization, polynomial optimization, polynomial system solving, real PROBABILISTIC ALGORITHM FOR POLYNOMIAL OPTIMIZATION OVER A REAL ALGEBRAIC SET AURÉLIEN GREUET AND MOHAB SAFEY EL DIN Abstract. Let f, f 1,..., f s be n-variate polynomials with rational coefficients of

More information

EIGENVALUES AND EIGENVECTORS 3

EIGENVALUES AND EIGENVECTORS 3 EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices

More information

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of

More information

CSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Spring 2014 Basic Algorithms Instructor: Daniele Micciancio UCSD CSE We have already seen an algorithm to compute the Gram-Schmidt orthogonalization of a lattice

More information

Rings. EE 387, Notes 7, Handout #10

Rings. EE 387, Notes 7, Handout #10 Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for

More information

c Igor Zelenko, Fall

c Igor Zelenko, Fall c Igor Zelenko, Fall 2017 1 18: Repeated Eigenvalues: algebraic and geometric multiplicities of eigenvalues, generalized eigenvectors, and solution for systems of differential equation with repeated eigenvalues

More information

Giac and GeoGebra: improved Gröbner basis computations

Giac and GeoGebra: improved Gröbner basis computations Giac and GeoGebra: improved Gröbner basis computations Z. Kovács, B. Parisse JKU Linz, University of Grenoble I November 25, 2013 Two parts talk 1 GeoGebra (Z. Kovács) 2 (B. Parisse) History of used CAS

More information

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington

More information

Zero Determination of Algebraic Numbers using Approximate Computation and its Application to Algorithms in Computer Algebra

Zero Determination of Algebraic Numbers using Approximate Computation and its Application to Algorithms in Computer Algebra Zero Determination of Algebraic Numbers using Approximate Computation and its Application to Algorithms in Computer Algebra Hiroshi Sekigawa NTT Communication Science Laboratories, Nippon Telegraph and

More information

Improved Polynomial Identity Testing for Read-Once Formulas

Improved Polynomial Identity Testing for Read-Once Formulas Improved Polynomial Identity Testing for Read-Once Formulas Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree)

More information

Eigenvalues and Eigenvectors

Eigenvalues and Eigenvectors /88 Chia-Ping Chen Department of Computer Science and Engineering National Sun Yat-sen University Linear Algebra Eigenvalue Problem /88 Eigenvalue Equation By definition, the eigenvalue equation for matrix

More information

Polynomial mappings into a Stiefel manifold and immersions

Polynomial mappings into a Stiefel manifold and immersions Polynomial mappings into a Stiefel manifold and immersions Iwona Krzyżanowska Zbigniew Szafraniec November 2011 Abstract For a polynomial mapping from S n k to the Stiefel manifold Ṽk(R n ), where n k

More information

Overview of Computer Algebra

Overview of Computer Algebra Overview of Computer Algebra http://cocoa.dima.unige.it/ J. Abbott Universität Kassel J. Abbott Computer Algebra Basics Manchester, July 2018 1 / 12 Intro Characteristics of Computer Algebra or Symbolic

More information

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y] Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j

More information

SOLVING VIA MODULAR METHODS

SOLVING VIA MODULAR METHODS SOLVING VIA MODULAR METHODS DEEBA AFZAL, FAIRA KANWAL, GERHARD PFISTER, AND STEFAN STEIDEL Abstract. In this article we present a parallel modular algorithm to compute all solutions with multiplicities

More information

A variant of the F4 algorithm

A variant of the F4 algorithm A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis

More information

Counting and Gröbner Bases

Counting and Gröbner Bases J. Symbolic Computation (2001) 31, 307 313 doi:10.1006/jsco.2000.1575 Available online at http://www.idealibrary.com on Counting and Gröbner Bases K. KALORKOTI School of Computer Science, University of

More information

Sparse representations from moments

Sparse representations from moments Sparse representations from moments Bernard Mourrain Inria Méditerranée, Sophia Antipolis BernardMourrain@inriafr Sparse representation of signals Given a function or signal f (t): decompose it as f (t)

More information

School of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information

School of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information MRQ 2017 School of Mathematics and Statistics MT5836 Galois Theory Handout 0: Course Information Lecturer: Martyn Quick, Room 326. Prerequisite: MT3505 (or MT4517) Rings & Fields Lectures: Tutorials: Mon

More information

Real Solving on Algebraic Systems of Small Dimension

Real Solving on Algebraic Systems of Small Dimension Real Solving on Algebraic Systems of Small Dimension Master s Thesis Presentation Dimitrios I. Diochnos University of Athens March 8, 2007 D. I. Diochnos (Univ. of Athens, µ Q λ ) Real Solving on Bivariate

More information

Computing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland

Computing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland Computing L-series of geometrically hyperelliptic curves of genus three David Harvey, Maike Massierer, Andrew V. Sutherland The zeta function Let C/Q be a smooth projective curve of genus 3 p be a prime

More information

Journal of Symbolic Computation. Thirty years of Polynomial System Solving, and now?

Journal of Symbolic Computation. Thirty years of Polynomial System Solving, and now? Journal of Symbolic Computation 44 (2009) 222 231 Contents lists available at ScienceDirect Journal of Symbolic Computation journal homepage: www.elsevier.com/locate/jsc Thirty years of Polynomial System

More information

A distinguisher for high-rate McEliece Cryptosystems

A distinguisher for high-rate McEliece Cryptosystems A distinguisher for high-rate McEliece Cryptosystems JC Faugère (INRIA, SALSA project), A Otmani (Université Caen- INRIA, SECRET project), L Perret (INRIA, SALSA project), J-P Tillich (INRIA, SECRET project)

More information

Fast Algorithms for Polynomial Solutions of Linear Differential Equations

Fast Algorithms for Polynomial Solutions of Linear Differential Equations Fast Algorithms for Polynomial Solutions of Linear Differential Equations Alin Bostan and Bruno Salvy Projet Algorithmes, Inria Rocquencourt 78153 Le Chesnay (France) {Alin.Bostan,Bruno.Salvy}@inria.fr

More information

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute

More information

Finding at Least One Point in Each Connected Component of a Real Algebraic Set Defined by a Single Equation

Finding at Least One Point in Each Connected Component of a Real Algebraic Set Defined by a Single Equation journal of complexity 16, 716750 (2000) doi:10.1006jcom.2000.0563, available online at http:www.idealibrary.com on Finding at Least One Point in Each Connected Component of a Real Algebraic Set Defined

More information

Construction of latin squares of prime order

Construction of latin squares of prime order Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo

More information

div(f ) = D and deg(d) = deg(f ) = d i deg(f i ) (compare this with the definitions for smooth curves). Let:

div(f ) = D and deg(d) = deg(f ) = d i deg(f i ) (compare this with the definitions for smooth curves). Let: Algebraic Curves/Fall 015 Aaron Bertram 4. Projective Plane Curves are hypersurfaces in the plane CP. When nonsingular, they are Riemann surfaces, but we will also consider plane curves with singularities.

More information

Chap. 3. Controlled Systems, Controllability

Chap. 3. Controlled Systems, Controllability Chap. 3. Controlled Systems, Controllability 1. Controllability of Linear Systems 1.1. Kalman s Criterion Consider the linear system ẋ = Ax + Bu where x R n : state vector and u R m : input vector. A :

More information

1 Last time: least-squares problems

1 Last time: least-squares problems MATH Linear algebra (Fall 07) Lecture Last time: least-squares problems Definition. If A is an m n matrix and b R m, then a least-squares solution to the linear system Ax = b is a vector x R n such that

More information

Characterizations of indicator functions of fractional factorial designs

Characterizations of indicator functions of fractional factorial designs Characterizations of indicator functions of fractional factorial designs arxiv:1810.08417v2 [math.st] 26 Oct 2018 Satoshi Aoki Abstract A polynomial indicator function of designs is first introduced by

More information

Twists of elliptic curves of rank at least four

Twists of elliptic curves of rank at least four 1 Twists of elliptic curves of rank at least four K. Rubin 1 Department of Mathematics, University of California at Irvine, Irvine, CA 92697, USA A. Silverberg 2 Department of Mathematics, University of

More information

A Saturation Algorithm for Homogeneous Binomial Ideals

A Saturation Algorithm for Homogeneous Binomial Ideals A Saturation Algorithm for Homogeneous Binomial Ideals Deepanjan Kesh and Shashank K Mehta Indian Institute of Technology, Kanpur - 208016, India, {deepkesh,skmehta}@cse.iitk.ac.in Abstract. Let k[x 1,...,

More information

Math 113 Homework 5. Bowei Liu, Chao Li. Fall 2013

Math 113 Homework 5. Bowei Liu, Chao Li. Fall 2013 Math 113 Homework 5 Bowei Liu, Chao Li Fall 2013 This homework is due Thursday November 7th at the start of class. Remember to write clearly, and justify your solutions. Please make sure to put your name

More information

arxiv: v1 [math.ds] 3 Mar 2016

arxiv: v1 [math.ds] 3 Mar 2016 Solving systems of polynomial inequalities with algebraic geometry methods Laura Menini, Corrado Possieri and Antonio Tornambè arxiv:163.1183v1 [math.ds] 3 Mar 16 Dipartimento di Ingegneria Civile e Ingegneria

More information

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ). CMPSCI611: Verifying Polynomial Identities Lecture 13 Here is a problem that has a polynomial-time randomized solution, but so far no poly-time deterministic solution. Let F be any field and let Q(x 1,...,

More information

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring

Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France

More information

Lecture 03: Polynomial Based Codes

Lecture 03: Polynomial Based Codes Lecture 03: Polynomial Based Codes Error-Correcting Codes (Spring 016) Rutgers University Swastik Kopparty Scribes: Ross Berkowitz & Amey Bhangale 1 Reed-Solomon Codes Reed Solomon codes are large alphabet

More information

Lecture 2: Lattices and Bases

Lecture 2: Lattices and Bases CSE 206A: Lattice Algorithms and Applications Spring 2007 Lecture 2: Lattices and Bases Lecturer: Daniele Micciancio Scribe: Daniele Micciancio Motivated by the many applications described in the first

More information

Algebraic Equations for Blocking Probabilities in Asymmetric Networks

Algebraic Equations for Blocking Probabilities in Asymmetric Networks Algebraic Equations for Blocking Probabilities in Asymmetric Networks Ian Dinwoodie, Emily Gamundi and Ed Mosteig Technical Report #2004-15 April 6, 2004 This material was based upon work supported by

More information

Ad Placement Strategies

Ad Placement Strategies Case Study 1: Estimating Click Probabilities Tackling an Unknown Number of Features with Sketching Machine Learning for Big Data CSE547/STAT548, University of Washington Emily Fox 2014 Emily Fox January

More information

Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1

Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Xiao-Shan Gao and Zhenyu Huang Key Laboratory of Mathematics Mechanization

More information

Anatomy of SINGULAR talk at p. 1

Anatomy of SINGULAR talk at p. 1 Anatomy of SINGULAR talk at MaGiX@LIX 2011- p. 1 Anatomy of SINGULAR talk at MaGiX@LIX 2011 - Hans Schönemann hannes@mathematik.uni-kl.de Department of Mathematics University of Kaiserslautern Anatomy

More information

Computer Algebra: General Principles

Computer Algebra: General Principles Computer Algebra: General Principles For article on related subject see SYMBOL MANIPULATION. Computer algebra is a branch of scientific computation. There are several characteristic features that distinguish

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

New Gröbner Bases for formal verification and cryptography

New Gröbner Bases for formal verification and cryptography New Gröbner Bases for formal verification and cryptography Gert-Martin Greuel Diamant/Eidma Symposium November 29th - November 30th November 29th, 2007 Introduction Focus of this talk New developements

More information

Course 311: Hilary Term 2006 Part IV: Introduction to Galois Theory

Course 311: Hilary Term 2006 Part IV: Introduction to Galois Theory Course 311: Hilary Term 2006 Part IV: Introduction to Galois Theory D. R. Wilkins Copyright c David R. Wilkins 1997 2006 Contents 4 Introduction to Galois Theory 2 4.1 Polynomial Rings.........................

More information

Mathematical Optimisation, Chpt 2: Linear Equations and inequalities

Mathematical Optimisation, Chpt 2: Linear Equations and inequalities Mathematical Optimisation, Chpt 2: Linear Equations and inequalities Peter J.C. Dickinson p.j.c.dickinson@utwente.nl http://dickinson.website version: 12/02/18 Monday 5th February 2018 Peter J.C. Dickinson

More information

Lattice reduction of polynomial matrices

Lattice reduction of polynomial matrices Lattice reduction of polynomial matrices Arne Storjohann David R. Cheriton School of Computer Science University of Waterloo Presented at the SIAM conference on Applied Algebraic Geometry at the Colorado

More information

Algebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.

More information

Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn

Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn Randomization Randomized Algorithm: An algorithm that uses (or can use) random coin flips in order to make decisions We will see: randomization

More information