On solving zero-dimensional and parametric systems
|
|
- Aleesha Gibbs
- 5 years ago
- Views:
Transcription
1 On solving zero-dimensional and parametric systems Fabrice Rouillier - SALSA (INRIA) project and CALFOR (LIP6) team Paris, France
2 General Objectives E = {p 1,, p r }, F = {f 1,, f l }, with p i, f i Q[U, X] U = U 1,, U d parameters X = X d+1,, X n indeterminates C = {x C n, p 1 = 0,, p r = 0, f 1 0,, f s 0} S = {x R n, p 1 =0,, p r =0, f 1 > 0,, f s > 0} In part 1 : we suppose that d = 0 (no parameter) and that the ideal p 1,, p r is zero-dimensional (finite number of complex zeroes). In part 2 : we suppose that d 0 and that the ideal p 1,, p r U=u is zero-dimensional for almost all u C d (general results will be described but only this case will be detailed).
3 General Objectives (2) The goal is to propose mathematical objects and algorithms to SOLVE such systems. The end-user queries we are interested in are (see G.-M. Greuel s talk): Zero-dimensional systems : count the real / complex roots ; detect multiple points and compute multiplicities ; provide an acurate and certified approximation of the roots ; signs of polynomials at the real roots of a system ; Parametric systems : count the real / complex roots wrt parameter s values ; describe geometrically the solutions set ; provide formal expressions of the roots ; provide numerically stable solutions.
4 General Objectives (3) Constraints : Exact/certified results : a real root is not a complex root with a small imaginary part... A numerical approximation must be certified with respect to a precision given by the end-user, etc. Universal algorithms : being able to check the assumptions (for example zero-dimensional) and the mathematical arbitrary choices (so called generic choices). Efficiency : computation time (bit operations) but also memory consumming.
5 Part 1 : Zero-dimensional Systems
6 Univariate case We assume that we know how to solve the univariate case (at least in the real case) : Counting/isolating real roots : Descarte s based methods, Sturm sequences etc. Evaluating polynomials (or their signs) at the roots of a univariate polynomial. More details / examples will be given in workshop B2 (Feb 27 - March 3) A reference book : Algorithms in Real Algebraic Geometry - Basu Pollack and Roy (Springer)
7 Notations E = {p 1, p s } Q[X 1,, X n ], is the ideal generated by E; V (E) C n is the zero set of or equivalently the set of complex solutions of {x C n, p 1 (x) = 0,, p n (x) = 0}; x C n, x i denotes its i-th coordinate.
8 Using Gröbner bases (see C. Traverso s talk) Theorem 1. Let G = {g 1,, g l } be a Gröbner basis for any ordering < of E = {p 1,, p s } Q[X 1,, X n ] s. The following properties are equivalent: For all index i, i = 1 n, there exists a polynomial g j G and a positive integer n j such that X i n j = LM (g j, < ); The system {p 1 = 0,, p s =0} has a finite number of solutions in C n. Q[X 1,, X n ] G is a finite dimensional Q-vector space Proof. According to Theorem 3, the 2nd and 3rd items are equivalent; m First item implies that 1 i = n, m i s.t. 1,, X i i (modulo I) and thus implies 3rd item. are lineary dependent m 3rd item implies that 1 i = n, m i s.t. 1,, X i i are lineary dependent (modulo I) so that p i Q[X i ], p i G. Thus, normalform(p i, G, < 0) = 0 g i G such αm that LM(g i, < ) divides LM(p i, < )=X i i, α N. Corollary 2. B = {t = X 1 e1 X n e n, (e 1,, e n ) N n normalform(t, G, < ) = t} = {w 1,, w D } is a basis of Q[X 1,, X n ]/ as a Q-vector space;
9 Counting the solutions (C. Traverso s talk) Definition 3. The multiplicity µ(α) of α ( V () is the ) dimension of the C[X localization of 1,, X n ] C[X1,, X at α (denoted by n ] ). α Theorem 4. C[X 1, Proof., X n ] < α V () ( C[X1,, X n ] α V (), e α C[X 1,, X n ] such that α V () e α = 1, e α e α = 0 if α α, e 2 α = e α. (consequence : e α (α) = 1 and e α (β) = 0 if β α V ()) ) α. s α = β α X 1 β 1 α 1 β 1 : n α N s.t. t α = s α n α : t α (α) = 1 and t α t β = 0; t α, α V () = 1 r α, α V () r αt α = 1. Set e α = r α t α. e α ( C[X1,, X n ] ) < ( C[X1,, X n ] ) α Corollary 5. The dimension of Q[X 1,, X n ] zeroes of counted with multiplicities. equals the number of complex
10 Stickelberger s theorem (C. Traverso s talk) Definition 6. Let h C[X 1,, X n ]; m h : C[X 1,, X n ] C[X 1,, X n ] u hu Theorem 7. The eigenvalues of m h are the h(α), α V ()with multiplicity µ(α). Proof. e α (f f(α))(β)=0, β V () n α N, e α (f f(α)) n α ( ) C[X1,, X the restriction of m eα (f f(α)) to n ] is thus nilpotent so (( that 0 is its ) ) unique eigenvalue (of multiplicity µ(α) = C[X1,, X dim n ] ). α ( ) ( ) C[X1,, X conclude using Theorem 4 : e n ] C[X1,, X n ] α and < α C[X 1,, X n ] ( ) C[X1,, X n ] < α V () α. α
11 Application of Stickelberger s theorem Corollary 8. (Stickelberger) Trace(m h ) = α V () µ(α)h(α); Charpol(m h, T) = α V () (T h(α))µ(α) Det(m h ) = α V () h(α)µ(α) Examples of use : h = 1 : Trace(m 1 )=dim ( C[X1,, X n ] h = X i : Charpol(m Xi, T) = α V () (T α i) µ(α), and thus V (Charpol(m Xi, T)) = {α i, α V ()} ) C. Traverso s talk : A first objective is to COMPUTE explicitly the matrices m Xi, i = 1 n.
12 Computing in the quotient algebra (C. Traverso s talk) For computing a matrix of m Xi, we need : A (monomial) basis B = {w 1,, w D } of Q[X 1, of C[X 1,, X n ] ordering, X n ] (or equivalently ) : can be deduced from a Gröbner basis for any A way for computing the class h of h Q[X 1,, X n ] in Q[X 1,, X n ] as a vector wrt B (denoted by h B from now) : for example the normalform. G For example, the colums of the matrix of m h wrt B are the coordinates of h w i B.
13 Counting distinct roots The matrix of M Xi wrt B has X i w 1,, X i w D as columns. If E has rational coefficients, then G Q[X 1,, X n ] and M Xi has also rational entries. One can compute its characteristic polynomial and apply any univariate solver to isolate all the possible real i-th coordinates of the zeroes of. Definition 9. (Separating element) Let t Q[X 1,, X n ]. t separates V () if (α, β) V () 2, α β t(α) t(β). Lemma 10. t separates V () V (charpol(m t ))( R n )=#V ()( R n ) Lemma 11. Almost all polynomials separate V () C n. Probabilistic algorithm for computing V () or V () R n Lemma 12. charpol(m t ) squarefree t separates V (). Deterministic filter
14 A (naïve) deterministic algorithm Lemma 13. if d = V () < D, t { n i=1 that t separates V (). j i 1 X i, j = 0 n d (d 1) } such 2 Proof. Let (α, β) V (), α β. p α,β (T) = n i=1 T i 1 (α i β i ) 0. Thus V (p α,β ) < and there exists at most n integers j such that p α,β (j) = 0. d(d 1), so there 2 intergers j such that there exists (α, β) the number of distinct couples (α, β) V () 2 is d (d 1) 2 exists at most n V () 2, α β with p α,β (j) = 0 Lemma 14. t separates V () iff V (charpol(m t )) = max ( V (charpol(m n j i=1 i 1 X i )), j 0 = n d (d 1) ) 2
15 Hermite s quadratic form Double goal : count the distinct complex/real roots - decrease the number of operations for searching a separating element. Definition 15. (Hermite s quadratic form). For f Q[X 1,, X n ] : q f : Q[X 1,, X n ] Q h G Trace(m fh 2) Theorem 16. For f Q[X 1,, X n ], rank(q f )=#{x V (), f(x) 0} signature(q f )=#{x V () R n, f(x) > 0} #{x V () R n, f(x) < 0} Corollary 17. Taking f = 1 : rank(q 1 ) = #V () signature(q 1 )=#(V () R n )
16 Hermite s quadratic form Set d = #V (), t a separating element of V (). w d,, w D st {w i } D i=1 = {1, t,, t d 1, w d,, w D } is a basis of Q[X 1,, X n ] ; q f (h ) = ( µ(α)f(α) D α V () i=1 G ) 2 h i w i (α) for hg = D h i=1 i w i ; q f (h G ) =(h 1,, h D )Γ t with Γ = 1 t(α 1) µ(α 1 ) f µ(α d ) f d t(α 1 ) d 1 1 t(α d ) t(α d ) d 1 q f (h G ) = α V () µ(α)f(α)(l α(h)) 2 Γ h 1 h D w d (α 1 ) w D (α 1 ) w d (α d ) w D (α d ) if α α, µ(α)f(α)(l α (h)) 2 + µ(α)f(α)(l ᾱ (h)) 2 = l 1,α (h ) 2 l 2,α (h ) 2, l 1,α, l 2,α being linar forms with real coefficients. G G l α, l 1,α, l 2,α linearly indep h µ(α)f(α)(l(α, α V () R h)) 2 has n the same signature as q f. G
17 Variable s elimination An easy example : compute G a Gröbner basis of ; compute D = dim Q Q[X 1,, X n ] and {w 1,, w D } from G; compute 1, X 1,, X D 1 1 (normalform) and check they are lineary G independant; [ ] ] D 1 if so, solve the linear system, X 1G 1,, X 1 β = [X D 1, X 2,, X n X D 1 D 1 i=0 β 1,i+1 X i 1 = 0 X and get a system equivalent to E : 2 D 1 i=0 β 2,i+1 X i 1 = 0 X n D 1 i=0 β n,i+1 X i 1 = 0 ELSE??
18 Lexicographic Gröbner bases By change of ordering (FGLM algorithm - see C. Traverso s talk) Suppose that Q[X 1,, X n ] is computed (Gröbner basis G wrt any monomial ordering < and a monomial basis B = {w 1,, w D }). Strategy : compute the image mg B of monomials m in increasing order wrt the lexicographic ordering until getting a set D = #B Q-linearly independant vectors w 1,, w D } (w 1 = 1 and w i 1 < lex w i, 2 i = D). Solve [ w 1, w D ] β = [ ] X i w j, set g i,j = X i w j D D k=1 β i,j,k w k n,j=1 i=1 Theorem 18. G = {g i,j, i = 1 n, j = 1 D} is a Gröbner basis wrt < lex of. Proof. p, g G s.t. LM(g, < lex ) divides LM(p, < lex ) since other else p = D i=1 a i w i (and thus do not belongs to )
19 Remarks on lexicographic Gröbner bases General shape in the zero-dimensional case for < lex : f 1 (X 1 ) f 2 (X 1, X 2 ) f k3 1(X 1, X 2 ) f k3 (X 1, X 2, X 3 ) f kn (X 1,, X n ) f kn +1(X 1,, X n ) Case of ideals in Shape position ideals for < lex (degree(f 1 )=D) : f 1 (X 1 ) X 2 f 2 (X 1, X 2 ) X n f n (X 1,, X n ) This occurs for example when X 1 is separating and =. Triangular sets (lexicographic Gröbner bases in the zero-dimensional case) : f 1 (X I )=0 n X f 2 (X 1 )=0 n X n n + f n (X 1,, X n 1 )=0
20 The case of radical ideals Main remark : if t Q[X 1,, X n ] separates V () and if =, then assuming that T is a new variable, E {T t} is in shape position for < lex with T < lex X 1 < lex < lex X n. Proof : charpol(m t ) = α V () (T t(α)) = minpol(m t) is squarefree. An algorithm : compute G a Gröbner basis of for < D R L, B = {w 1,, w D } a basis of Q[X 1,, X n ] and d = #V () (Hermite s quadratic form); compute p t = minpol(m t ) for t { n i=1 j i 1 D(D 1) X i, j = n } until 0 2 degree(squarefree(p t )) = d; ] ] if degree(p t ) = D solve [1, t,, t D 1 β = [t D, X 1,, X n and return G G E = {T D 1 D 1 i=0 β 1,i+1 T i,x j D 1 i=0 β 2,i+1 T i, j 1 = n} ( x = (x0, x 1,, x n ) V ( E ) x = (x 1,, x n ) V () ) ELSE?
21 Remarks There exists algorithms to compute the radical of an ideal but they are inefficient for large problems. They require the computation of several Gröbner bases ; For some problems, one would also like to compute the multiplicities of the solutions... Note that the above algorithm may compute O(n D 2 ) minimal polynomials before concluding with a failure! At this stage : we do not know how to reduce the problem (efficiently) to an easy univariate one when the ideal is not in shape position ; Numerical instability : the polynomials in a lexicographic Gröbner basis have HUGE coefficients (excepted the first one) : this often forbids to plug numerical approximations of the roots of the first polynomial into the basis to get an accurate approximation of the coordinates for large examples.
22 The Rational Univariate Representation (RUR) Definition 19. For t Q[X 1,, X n ]: f t = D i=0 a i T D i = charpol(m t ), f t square-free part. v Q[X 1,, X n ], g t,v (T)= d 1 Trace(m i=0 vt i)h d i 1 (f t, T), where j d = degree(f t ) and Hj (f t, T) = i=0 a i T j i Theorem 20. If t separates V (), then and : V ()( R n ) V (f t )( R) α = (α 1,, α n ) t(α) R t (β)=( g t,x 1 (β) t,xn (β) g t,1 (β) g t,1 (β) β f t Q[T] and v Q[X 1,, X n ], g t,v Q[T]; µ(α)= µ(t(α)) = µ(r t (t(α)))= (f t )(t(α)) (f t ) (t(α)) This generalizes the elimination process to the case of non radical ideals
23 The RUR : Proof By construction, f t Q[T] and v Q[X 1,, X n ], g t,v Q[T]; Thus V () V (f t ) V ()( R n ) V (f t )( R n ). By Stickelberger s theorem, f t (T)= α V () (T t(α))µ(α). Thus f t (T)= (T t(α)) α V () Consider g v,t = ( ) α V () µ(α)v(α) β V ( E α (T t(β)) ),β if t separates V () ( ) g t,v (t(α))= µ(α)v(α) β V ( E α (t(α) t(β)) ),β (f t (T) ) = g v,1 (T) = ( ) α V () µ(α) β V ( E α (T t(β)) ),β (f t (T)) = ( ) α V (),β ) β V ( E α (T t(β)) so that v(α) = g t,v(t(α)) and µ(α) = (f t g t,1 (t(α)) )(t(α)) = (f t )(t(α)) g t,1 (t(α)) (f t ) (t(α))
24 The RUR : Proof To prove the theorem, we finally need to show : g v,t (T)= α V ( E ) µ(α)v(α) ( β V ( E ),β α (T t(β)) ) = d 1 trace(m i=0 vt i)h d i 1 (f t, T) with f t = i=0 D a i T D i = α V () (T t(α)) and H j (f t, T)= j i=0 a i T j i g v,t (T) = f t (T) i 0 trace(m vt i) T i+1 α V () d 1 j=0 µ(α)v(α) T t(α) = i 0 g v,t (T) = d i 1 i=0 trace(m vt i)a j T d i j 1 = d 1 trace(m vt i)h d i 1 (f t, T) i=0 α V () µ(α)v(α)t(α)i T i+1 =
25 The RUR : a naïve algorithm Algorithm : compute G a Gröbner basis of for < D R L, B = {w 1,, w D } a basis of and d = #V () (Hermite s quadratic form); Q[X 1,, X n ] compute f t = charpol(m t ) for t { n i=1 degree(f t )=d; j i 1 X i, j = 0 n compute Trace(m Xi t j ), i=1 n, j = 1 d; and deduce; return g t,v (T)= d 1 trace(m i=0 vt i)h d i 1 (f t, T) for v = 1, X1,, X n Remarks : Trace(m Xi t j) normalform(x it j w k ), i = 1 n, j = 1 D, k = 1 D O(n D 2 N), N D = cost of normalform Hermite s quadratic form Trace(w i w j ) normalform(w i w j w k ), k =1 D O(D 3 N), N D= cost of normalform charpol(m t ) O(D 4 ) (with a naïve algorithm) D(D 1) } until 2 Theoretical complexity : O(n D 6 ) arithm. operations, Practical complexity : O(D 4 + n D 3 ) arithm. operations
26 For computing RUR, we only need The RUR : remarks a monomial basis B = {w 1,, w D } of Q[X 1, 1 and i > 1, k, w i = X k w j the matrices M Xi of m Xi wrt B;, X n ] I ; Suppose that w 1 = This input can be provided by Gröbner bases but also by some new alternatives (B. Mourrain and P. Trebuchet s work). From now we suppose we only have these data as input and that the rational numbers in the M Xi are of binary size t. The goal is now to design an efficient algorithm (binary complexity) for computing the RUR.
27 Objectives RUR = separating element t AND a RUR-Candidate {f t (T), g t,1 (T), g t,x1 (T),, g t,xn (T)} : if t separates V (I), V ()( R) V (f t )( R) α = (α 1,, α n ) t(α) (X 1 (α) = g t,x 1 (t(α)) g t,1 (t(α)) n(α)= g t,xn (t(α)) g t,1 (t(α)) t(α) preserving multiplicities and real roots. Many variants for computing a RUR-Candidate - few solutions for computing a RUR. This difference is critical for decision algorithms. Can be computed as a lexicographic Gröbner basis when I is radical and X 1 separates V ()(Faugère, Yokoyama,... multi-mod. or p-adic methods). A major problem is to check that a RUR-Candidate is a RUR or equivalently that t separates V () for non radical ideals.
28 From few traces Theorem 21. Given q 1 [1] = [Trace(m w1 ),, Trace(m wd )] (first line of Hermite s quadratic form), a RUR-Candidate can be computed in O(D 3 + n D 2 ) arithmetic operations. Proof. See algorithms below
29 The first polynomial According to Stickelberger s theorem, Trace(m t i) = D i=1 α i is the i-th Newton s sum of f t = charpol(m t ) = D i=0 a i T D i. One can thus deduce the coefficients of f t from the scalars Trace(m t i), 0 { i = D by solving the triangular linear system : (D i)a i = } i 1 j=0 a i j Trace(m t j) Algorithm charpol : D i=0 Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n = [1, 0,, 0]; M yg t = D i=1 t i M Xi ; For i = 0 D do Trace(m t i) = yg q 1 [1] yg = M t yg /* at the i-th yg step = t i G Solve (D i)a i = i 1 j=0 a i j Trace(m t j) O(D 3 ) operations (note this is a general algorithm for computing the characteristic polynomial of any element in Q[X 1,, X n ]. I
30 The coordinates Algorithm coordinates : Input = data from algorithm charpol + f t j f t = i=0 a i T d i the squarefree part of f t i For d H i=0 i (f t, t) = j=0 For v {1, X 1,, X n } a j t i j? already com p uted [Trace(m vw1 ),, Trace(m vwd )] = M v q 1 [1] t For i=d 1 Trace(m vhi (t))=h i (t) [Trace(m vw1 ),, Trace(m vwd )] t g t,v (T)= d 1 Trace(m i=0 vhi (f t,t))t d i 1 = d 1 Trace(m i=0 Xj t i)h d i 1(f t, T) O(n D 2 ) arithmetic operations
31 Computing Hermite s quadratic form j=1 D D q 1 = [Trace(m wi w j )] i=1 Remark : Trace(w i w j ) = w i w j q 1 [1]; Proposition 22. Hermite s quadratic form can be computed from q 1 [1] performing O(#TD) arithmetic operations where T = {w i w j, i = 1 D, j = 1 D}.
32 Algorithm RUR-Classic : RUR from few traces Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n d = #V () (Hermite s quadratic form); O(D 3 ) compute f t = charpol(m t ) for t { n i=1 j i 1 X i, j 0 = n until degree(f t )=d; O(D 3 ) practical / O(n D 5 ) theoretical compute g t,v, v = 1, X 1,, X n O(n D 2 ) D(D 1) 2 } return f t, g t,v, v = 1, X 1,, X n The theoretical complexity is a worst case : all the possible separating elements excepted the last one are not separating. In practice, I haven t any example with more than two tries...
33 RUR from a multiplication table Definition 23. T = {w j w j, i 1 = D, j = 1D} Remark : #T < D 2 Examples : from a lexicographic G. basis in Shape position : #T = O(D 2 ) If D = δ n (Bezout), #T = O(2 n D 2 ) (ex. when #G = n) Computing T Computing w i w j : i, k, w i w j = X k w i w j w i w j = M Xk w i w j Requires O(#TD 2 ) arithmetic operations Computing q 1 from T : for i 1 = D, Trace(m wi ) = D i=1 (O(D 2 )) w i w j [j] Theorem 24. Computing a RUR from T requires O(#TD 2 + D 3 + n D 2 ) arithmetic operations.
34 Complexity : remarks Remark : up to now we have counted O(1) each arithmetical operation; This is fine for data of fixed sizes (Z/pZ, floating point numbers, etc.) but not for integers, rationals, polynomials, series, etc. For integers : The addition is linear in the size of its operands; The naïve multiplication is quadratic in the size of its operands; (fast fft-based versions are close to be linear (forget the log) for very large integers. Data are growing at each operation : a + b has size O(max (log 2 (a), log 2 (b))+1), ab has size O(log(a)+log(b)) Funny example : fast exponentiation may not be so fast... (m(a, b)= binary cost of the mult. of and integer of size a by an integer of size b) ) X 2n = x. x : arithmetic cost O(2 n 2 ) - binary cost O( n i=1 m(i, 1) X 2n = ( ) (x 2 ) 2 2 ( arithmetic cost O(n) - binary cost O n m(2 i, 2 i ) ) i=1
35 Complexity : choosing the right model We are working with rationals! The (bound on the) growth of coefficients in an addition is greater than in a multiplication! An example : [a 1,,a D ] [b 1,,b D ] a i, b i of size t with integers, result of size O(2 t + D) with rationals, result of size O(2 Dt) k iterations v = M v, v (resp. M) a vector (resp. a matrix) of dimension D with entries of size t : with integers, result with scalars of size O(k(t+D)) with rationals, result of size O(D k t) A more precise model : 1 u [a 1,, a D ] 1 v [b 1,, b D ] u, v, a i, b i of size t result of size O(2 t + D) For our problem we can assume that the scalars are integers!
36 Complexity : choosing the right model Suppose that t is the binary size of the integers in M Xi = 1 M d Xi X i The multiplication table : at most δ = max (deg(w i w j )) iterations v = M v. Growth of coefficients : t δ (t + D) Bound on the binary cost : O(#TD 2 δ(t + D)) Hermite s quadratic form : Trace(w i w j ) = w i w j q 1 [1]; size O(δ (t + D)) bin. cost : O(#T Dδ (t + D)) Reduction of Hermite s quadratic form : growth of coefficients t D t (Rouillier s fraction-free algorithm) binary cost : O(D 4 δ (t + D)) First polynomial of the RUR : it is the characteristic polynomial of M t thus its coefficients are of size O(D t) (see G. Villard s survey). The intermediate iteration : t i+1 = M t t i induces a growth t D(t + D) (thus the resolution of the triangular system do not induce any growth) The binary cost is bounded by O(D 4 (t + D)). Coordinates : no significant growth (compared with the computation of the first polynomial) O(n D 3 (t + D))
37 Complexity : First remarks The computation of the multiplication table is not so costly compared to the rest since the data are not growing too much. The reduction of Hermite s quadratic form is the main operation. Algorithm RUR-Classic: Input = q 1 [1] = [Trace(m wi )] i=1 D, + B + M Xi, i = 1n d = #V () (Hermite s quadratic form); O(D 3 ) compute f t = charpol(m t ) for t { n i=1 j i 1 X i, j 0 = n until degree(f t )=d; O(D 3 ) practical /O(n D 5 ) theoretical compute g t,v, v = 1, X 1,, X n O(n D 2 ) return f t, g t,v, v = 1, X 1,, X n D(D 1) 2 } We need to change again our strategy!
38 Computing faster The strategy : compute d and t using modular arithmetic (modulo a prime number). The result will be correct excepted for a finite number of primes. check that the RUR-Candidate is a RUR after the computation to get a deterministic algorithm. Advantages : fast computations (fixed precision) for predicting t if the prime numbers are big enough : very few are bad ; take t = X i when possible (smaller results due to the sparsity of M Xi ) t may be given by the user.
39 Checking a RUR-Candidate There exists a filter : checking that f t is squarefree For the general case : Proposition 25. A RUR-Candidate R t () = {f t, g t,1, g t,x1,, g t,xn } is a RUR iff Trace(m pi w j ) = 0, i = 1 n, j = 1 D with p i = X i g t,1 (t) g t,xi (t); Proof. R t () is a RUR iff p i (α) = 0, i = 1 n, α V () since #V (f t ) V (). Hermite s quadratic form must be of rank 0: rank(q pi ) = rank( [ Trace(m pi w j w k ) ] j=1 D k=1 D ) = #{α V (), pi (α) 0} its first line is null Trace(m pi w j ) = 0, j = 1 D
40 Checking a RUR-Candidate Corollary 26. A RUR-Candidate R t () = {f t, g t,1, g t,x1,, g t,xn } is a RUR iff q 1 pg i = 0, i 1 = n, j 1 = D with p i = X i g t,1 (t) g t,xi (t); Proposition 27. One can check that a RUR-Candidate is a RUR in O(D 3 + n D 2 ) arithmetic operations (if the RUR-Candidate has been computed using RUR-Classic). Algorithm CheckRUR-Classic H 0 = a 0 [1, 0,, 0]; for i=1 D H i (t) = M t H i 1 (t) + a i H i 1 (t); if q 1 H D (t) [0,, 0] then return(false) i=1 for n g t,xi (t) = D i=1 Trace(X i t j )? alread y com puted H D i 1 (t) g t,1 (t) = D i=1 Trace(t j )H D i 1 (t) for i=1 n if q 1 ( g t,xi (t) + M Xi g t,1 (t)) [0,, 0] then return(false) return(true) O(D 3 + n D 2 ) arithmetic operations - no significant growth of coefficients (compared to the other sub-algorithms)
41 RUR vs Lexicographic Gröbner bases in the shape position case When X 1 separates V () + is radical RUR f(x 1 ) = 0 X 2 = h 2(X 1 ) f (X 1 ) Lex. G.B. f(x 1 ) = 0 X 2 = f 2 (X 1 ) X n = h n(x 1 ) f (X 1 ) X n = f n (X 1 ) (same number of arithmetic operations in the shape position case) Proposition : f (X 1 )X i h i (X 1 )=X i f i (X 1 ) mod I Equivalently : f i = f 1 (X 1 )h n (X 1 ) mod I Remarks : all the coefficients of the RUR have the same size (O(D t)) In a Lex. G. B. the coefficients of f appear to be small (O(D t)) compared to those of f i.
42 Adding inequations/inequalities E = {p 1,, p r }, F = {f 1,, f l }, with p i, f i Q[X 1,, X n ] A straightforward method : C = {x C n, p 1 = 0,, p r = 0, f 1 0,, f s 0} S = {x R n, p 1 =0,, p r =0, f 1 > 0,, f s > 0} Compute f i ( g t,x 1 g t,1,, g t,xn g t,1 ), i = 1 s and study the signs of these univariate polynomials at the roots of f t. Drawback : terrible computations (substitutions+reduction modulo f t ) A less straightforward method : E = {p 1,, p r, T 1 f 1,, T s f s } Q[X 1,, X n ] Compute the RUR of E : {f t, g t,1, g t,x1,, g t,xn, g t,t1,, g t,ts } and study the signs of g t,1, g t,t1,, g t,ts at the roots of f t (univariate problem). Drawback : can not study f i, i = 1 s without re-computing an ideal
43 ,,,,,, Adding inequations/inequalities A solution : simulating Gröbner bases Definition 28. Given two monomial orderings < U (w.r.t. the variables U 1,, U d ) and < X (w.r.t. the variables X d+1,, X n ) one can define a block ordering < U,X : m < U,X m if and only if m U1 =1, (m U1 =1, U d =1 < X m U1 =1, U d =1 = m U1 =1, U d =1 U d =1 or and m X d+1 =1, X n =1 < U m X d+1 =1, X n =1 Lemma 29. If G is a Gröbner basis of = p 1,, p r, T 1 f 1,, T s f s for < X, then G {T i normalform(f i ), i = 1 s} is a Gröbner basis of E = p 1,, p r, T 1 f 1,, T s f s for < T,X where T is any admissible monomial ordering wrt T = [T 1,, T n ]; Remark : Q[X 1,, X n ] Q[X 1,, X n, T 1,, T n ] < so that the only extraneous computations needed to extend the RUR are the construction of the M Ti and the compu- E tations of the Trace(m Ti t ). j Complexity : O(D 3 + n D 2 + s D 2 )? RU R ).
44 SALSA library containing Software FGb (F4 algorithm implemented by J.C. Faugère) - Dynamic library written in C RS (RUR + real root isolation by F. Rouillier) - Dynamic library written in C An interface with Maple Software (version >9.5)... (see next lecture). Will be linked with Maple 11 (official distribution)
45 Conclusion We have seen how to solve in a certified way any kind of zero-dimensional system : counting complex/real roots, certified isolation (by the way or interval arithmetic + symbolic resolution of univariate polynomials), computation of the multiplicities, certified evaluation of polynomials at the roots of a zero-dimensional system (easy to certify the sign for example). Recent progress have been made using baby step/giant step technics (Rouillier 2005) decreasing the number of bit operations required to compute a RUR-Candidate and using specific multiplication tables (only partially stored) decreasing the memory consummed. The RUR can be used jointly with splitting technics like triangular sets. Systems with 100/200 complex roots are easy in general (seconds) Systems with up to 1000 complex solutions are (in general) reachable by the current versions of the software (minutes/hours) Systems with >10000 solutions have been solved by the beta versions. Important remark : only few solvers are able to provide the required univariate black-boxes able to solve such large polynomials (first polynomial of a RUR)...
Rational Univariate Representation
Rational Univariate Representation 1 Stickelberger s Theorem a rational univariate representation (RUR) 2 The Elbow Manipulator a spatial robot arm with three links 3 Application of the Newton Identities
More informationSymbolic methods for solving algebraic systems of equations and applications for testing the structural stability
Symbolic methods for solving algebraic systems of equations and applications for testing the structural stability Yacine Bouzidi and Fabrice Rouillier Abstract n this work, we provide an overview of the
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationRational Univariate Reduction via Toric Resultants
Rational Univariate Reduction via Toric Resultants Koji Ouchi 1,2 John Keyser 1 Department of Computer Science, 3112 Texas A&M University, College Station, TX 77843-3112, USA Abstract We describe algorithms
More informationWORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE
WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe
More informationComputing Minimal Polynomial of Matrices over Algebraic Extension Fields
Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this
More informationCalcul d indice et courbes algébriques : de meilleures récoltes
Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:
More informationPolynomials, Ideals, and Gröbner Bases
Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields
More informationModular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals. Masayuki Noro. Toru Aoyama
Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals Toru Aoyama Kobe University Department of Mathematics Graduate school of Science Rikkyo University Department
More informationElliptic Curve Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October
More informationExact algorithms for linear matrix inequalities
0 / 12 Exact algorithms for linear matrix inequalities Mohab Safey El Din (UPMC/CNRS/IUF/INRIA PolSys Team) Joint work with Didier Henrion, CNRS LAAS (Toulouse) Simone Naldi, Technische Universität Dortmund
More informationSPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic
SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic Didier Henrion Simone Naldi Mohab Safey El Din Version 1.0 of November 5, 2016 Abstract This document briefly describes
More informationCertifying solutions to overdetermined and singular polynomial systems over Q
Certifying solutions to overdetermined and singular polynomial systems over Q Tulay Ayyildiz Akoglu a,1, Jonathan D. Hauenstein b,2, Agnes Szanto a,3 a Department of Mathematics, North Carolina State University,
More informationComputing Real Roots of Real Polynomials
Computing Real Roots of Real Polynomials and now For Real! Alexander Kobel Max-Planck-Institute for Informatics, Saarbrücken, Germany Fabrice Rouillier INRIA & Université Pierre et Marie Curie, Paris,
More information2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable
Deciding positivity of real polynomials Eberhard Becker, Victoria Powers, and Thorsten Wormann Abstract. We describe an algorithm for deciding whether or not a real polynomial is positive semidenite. The
More informationReal solving polynomial equations with semidefinite programming
.5cm. Real solving polynomial equations with semidefinite programming Jean Bernard Lasserre - Monique Laurent - Philipp Rostalski LAAS, Toulouse - CWI, Amsterdam - ETH, Zürich LAW 2008 Real solving polynomial
More informationReal Root Isolation of Regular Chains.
Real Root Isolation of Regular Chains. François Boulier 1, Changbo Chen 2, François Lemaire 1, Marc Moreno Maza 2 1 University of Lille I (France) 2 University of London, Ontario (Canada) ASCM 2009 (Boulier,
More informationGeneralized critical values and testing sign conditions
Generalized critical values and testing sign conditions on a polynomial Mohab Safey El Din. Abstract. Let f be a polynomial in Q[X 1,..., X n] of degree D. We focus on testing the emptiness of the semi-algebraic
More informationTopology of implicit curves and surfaces
Topology of implicit curves and surfaces B. Mourrain, INRIA, BP 93, 06902 Sophia Antipolis mourrain@sophia.inria.fr 24th October 2002 The problem Given a polynomial f(x, y) (resp. f(x, y, z)), Compute
More informationAlmost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17
Almost polynomial Complexity for Zero-dimensional Gröbner Bases Amir Hashemi co-author: Daniel Lazard INRIA SALSA-project/ LIP6 CALFOR-team http://www-calfor.lip6.fr/ hashemi/ Special semester on Gröbner
More informationGröbner Bases. Applications in Cryptology
Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break
More informationStream Ciphers: Cryptanalytic Techniques
Stream Ciphers: Cryptanalytic Techniques Thomas Johansson Department of Electrical and Information Technology. Lund University, Sweden ECRYPT Summer school 2007 (Lund University) Stream Ciphers: Cryptanalytic
More informationPolynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes
Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be
More informationAlgebra Review 2. 1 Fields. A field is an extension of the concept of a group.
Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions
More informationSolving Polynomial Systems Symbolically and in Parallel
Solving Polynomial Systems Symbolically and in Parallel Marc Moreno Maza & Yuzhen Xie Ontario Research Center for Computer Algebra University of Western Ontario, London, Canada MITACS - CAIMS, June 18,
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationBasic Algorithms in Number Theory
Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms
More informationMCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases
Gröbner bases In this lecture we introduce Buchberger s algorithm to compute a Gröbner basis for an ideal, following [2]. We sketch an application in filter design. Showing the termination of Buchberger
More informationPrimitive sets in a lattice
Primitive sets in a lattice Spyros. S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, FL 33431, U.S.A spyros@fau.unl.edu Tran van Trung Institute for Experimental
More informationChange of Ordering for Regular Chains in Positive Dimension
Change of Ordering for Regular Chains in Positive Dimension X. Dahan, X. Jin, M. Moreno Maza, É. Schost University of Western Ontario, London, Ontario, Canada. École polytechnique, 91128 Palaiseau, France.
More informationInterval Gröbner System and its Applications
Interval Gröbner System and its Applications B. M.-Alizadeh Benyamin.M.Alizadeh@gmail.com S. Rahmany S_Rahmani@du.ac.ir A. Basiri Basiri@du.ac.ir School of Mathematics and Computer Sciences, Damghan University,
More informationover a field F with char F 2: we define
Chapter 3 Involutions In this chapter, we define the standard involution (also called conjugation) on a quaternion algebra. In this way, we characterize division quaternion algebras as noncommutative division
More informationPrimary Decomposition
Primary Decomposition p. Primary Decomposition Gerhard Pfister pfister@mathematik.uni-kl.de Departement of Mathematics University of Kaiserslautern Primary Decomposition p. Primary Decomposition:References
More informationCSL361 Problem set 4: Basic linear algebra
CSL361 Problem set 4: Basic linear algebra February 21, 2017 [Note:] If the numerical matrix computations turn out to be tedious, you may use the function rref in Matlab. 1 Row-reduced echelon matrices
More informationSection III.6. Factorization in Polynomial Rings
III.6. Factorization in Polynomial Rings 1 Section III.6. Factorization in Polynomial Rings Note. We push several of the results in Section III.3 (such as divisibility, irreducibility, and unique factorization)
More informationBon anniversaire Marc!
Bon anniversaire Marc! The full counting function of Gessel walks is algebraic Alin Bostan (INRIA) joint work with Manuel Kauers (INRIA/RISC) Journées GECKO/TERA 2008 Context: restricted lattice walks
More informationGröbner Bases. eliminating the leading term Buchberger s criterion and algorithm. construct wavelet filters
Gröbner Bases 1 S-polynomials eliminating the leading term Buchberger s criterion and algorithm 2 Wavelet Design construct wavelet filters 3 Proof of the Buchberger Criterion two lemmas proof of the Buchberger
More informationcompare to comparison and pointer based sorting, binary trees
Admin Hashing Dictionaries Model Operations. makeset, insert, delete, find keys are integers in M = {1,..., m} (so assume machine word size, or unit time, is log m) can store in array of size M using power:
More informationQR Decomposition. When solving an overdetermined system by projection (or a least squares solution) often the following method is used:
(In practice not Gram-Schmidt, but another process Householder Transformations are used.) QR Decomposition When solving an overdetermined system by projection (or a least squares solution) often the following
More informationNotes 10: List Decoding Reed-Solomon Codes and Concatenated codes
Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT
More informationProblem Set 2. Assigned: Mon. November. 23, 2015
Pseudorandomness Prof. Salil Vadhan Problem Set 2 Assigned: Mon. November. 23, 2015 Chi-Ning Chou Index Problem Progress 1 SchwartzZippel lemma 1/1 2 Robustness of the model 1/1 3 Zero error versus 1-sided
More informationFast Polynomial Multiplication
Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution
More informationReal Solving on Bivariate Systems with Sturm Sequences and SLV Maple TM library
Real Solving on Bivariate Systems with Sturm Sequences and SLV Maple TM library Dimitris Diochnos University of Illinois at Chicago Dept. of Mathematics, Statistics, and Computer Science September 27,
More informationGeneralized eigenspaces
Generalized eigenspaces November 30, 2012 Contents 1 Introduction 1 2 Polynomials 2 3 Calculating the characteristic polynomial 5 4 Projections 7 5 Generalized eigenvalues 10 6 Eigenpolynomials 15 1 Introduction
More informationCommuting birth-and-death processes
Commuting birth-and-death processes Caroline Uhler Department of Statistics UC Berkeley (joint work with Steven N. Evans and Bernd Sturmfels) MSRI Workshop on Algebraic Statistics December 18, 2008 Birth-and-death
More informationGRÖBNER BASES AND POLYNOMIAL EQUATIONS. 1. Introduction and preliminaries on Gróbner bases
GRÖBNER BASES AND POLYNOMIAL EQUATIONS J. K. VERMA 1. Introduction and preliminaries on Gróbner bases Let S = k[x 1, x 2,..., x n ] denote a polynomial ring over a field k where x 1, x 2,..., x n are indeterminates.
More informationA Blackbox Polynomial System Solver on Parallel Shared Memory Computers
A Blackbox Polynomial System Solver on Parallel Shared Memory Computers Jan Verschelde University of Illinois at Chicago Department of Mathematics, Statistics, and Computer Science The 20th Workshop on
More informationImproved algorithms for solving bivariate systems via Rational Univariate Representations
Improved algorithms for solving bivariate systems via Rational Univariate Representations Yacine Bouzidi, Sylvain Lazard, Guillaume Moroz, Marc Pouget, Fabrice Rouillier, Michael Sagraloff To cite this
More informationGlobal optimization, polynomial optimization, polynomial system solving, real
PROBABILISTIC ALGORITHM FOR POLYNOMIAL OPTIMIZATION OVER A REAL ALGEBRAIC SET AURÉLIEN GREUET AND MOHAB SAFEY EL DIN Abstract. Let f, f 1,..., f s be n-variate polynomials with rational coefficients of
More informationEIGENVALUES AND EIGENVECTORS 3
EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices
More informationADVANCED TOPICS IN ALGEBRAIC GEOMETRY
ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of
More informationCSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Basic Algorithms Instructor: Daniele Micciancio UCSD CSE We have already seen an algorithm to compute the Gram-Schmidt orthogonalization of a lattice
More informationRings. EE 387, Notes 7, Handout #10
Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for
More informationc Igor Zelenko, Fall
c Igor Zelenko, Fall 2017 1 18: Repeated Eigenvalues: algebraic and geometric multiplicities of eigenvalues, generalized eigenvectors, and solution for systems of differential equation with repeated eigenvalues
More informationGiac and GeoGebra: improved Gröbner basis computations
Giac and GeoGebra: improved Gröbner basis computations Z. Kovács, B. Parisse JKU Linz, University of Grenoble I November 25, 2013 Two parts talk 1 GeoGebra (Z. Kovács) 2 (B. Parisse) History of used CAS
More informationABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n
ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington
More informationZero Determination of Algebraic Numbers using Approximate Computation and its Application to Algorithms in Computer Algebra
Zero Determination of Algebraic Numbers using Approximate Computation and its Application to Algorithms in Computer Algebra Hiroshi Sekigawa NTT Communication Science Laboratories, Nippon Telegraph and
More informationImproved Polynomial Identity Testing for Read-Once Formulas
Improved Polynomial Identity Testing for Read-Once Formulas Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree)
More informationEigenvalues and Eigenvectors
/88 Chia-Ping Chen Department of Computer Science and Engineering National Sun Yat-sen University Linear Algebra Eigenvalue Problem /88 Eigenvalue Equation By definition, the eigenvalue equation for matrix
More informationPolynomial mappings into a Stiefel manifold and immersions
Polynomial mappings into a Stiefel manifold and immersions Iwona Krzyżanowska Zbigniew Szafraniec November 2011 Abstract For a polynomial mapping from S n k to the Stiefel manifold Ṽk(R n ), where n k
More informationOverview of Computer Algebra
Overview of Computer Algebra http://cocoa.dima.unige.it/ J. Abbott Universität Kassel J. Abbott Computer Algebra Basics Manchester, July 2018 1 / 12 Intro Characteristics of Computer Algebra or Symbolic
More informationLecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]
Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j
More informationSOLVING VIA MODULAR METHODS
SOLVING VIA MODULAR METHODS DEEBA AFZAL, FAIRA KANWAL, GERHARD PFISTER, AND STEFAN STEIDEL Abstract. In this article we present a parallel modular algorithm to compute all solutions with multiplicities
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis
More informationCounting and Gröbner Bases
J. Symbolic Computation (2001) 31, 307 313 doi:10.1006/jsco.2000.1575 Available online at http://www.idealibrary.com on Counting and Gröbner Bases K. KALORKOTI School of Computer Science, University of
More informationSparse representations from moments
Sparse representations from moments Bernard Mourrain Inria Méditerranée, Sophia Antipolis BernardMourrain@inriafr Sparse representation of signals Given a function or signal f (t): decompose it as f (t)
More informationSchool of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information
MRQ 2017 School of Mathematics and Statistics MT5836 Galois Theory Handout 0: Course Information Lecturer: Martyn Quick, Room 326. Prerequisite: MT3505 (or MT4517) Rings & Fields Lectures: Tutorials: Mon
More informationReal Solving on Algebraic Systems of Small Dimension
Real Solving on Algebraic Systems of Small Dimension Master s Thesis Presentation Dimitrios I. Diochnos University of Athens March 8, 2007 D. I. Diochnos (Univ. of Athens, µ Q λ ) Real Solving on Bivariate
More informationComputing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland
Computing L-series of geometrically hyperelliptic curves of genus three David Harvey, Maike Massierer, Andrew V. Sutherland The zeta function Let C/Q be a smooth projective curve of genus 3 p be a prime
More informationJournal of Symbolic Computation. Thirty years of Polynomial System Solving, and now?
Journal of Symbolic Computation 44 (2009) 222 231 Contents lists available at ScienceDirect Journal of Symbolic Computation journal homepage: www.elsevier.com/locate/jsc Thirty years of Polynomial System
More informationA distinguisher for high-rate McEliece Cryptosystems
A distinguisher for high-rate McEliece Cryptosystems JC Faugère (INRIA, SALSA project), A Otmani (Université Caen- INRIA, SECRET project), L Perret (INRIA, SALSA project), J-P Tillich (INRIA, SECRET project)
More informationFast Algorithms for Polynomial Solutions of Linear Differential Equations
Fast Algorithms for Polynomial Solutions of Linear Differential Equations Alin Bostan and Bruno Salvy Projet Algorithmes, Inria Rocquencourt 78153 Le Chesnay (France) {Alin.Bostan,Bruno.Salvy}@inria.fr
More informationFrequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography
Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute
More informationFinding at Least One Point in Each Connected Component of a Real Algebraic Set Defined by a Single Equation
journal of complexity 16, 716750 (2000) doi:10.1006jcom.2000.0563, available online at http:www.idealibrary.com on Finding at Least One Point in Each Connected Component of a Real Algebraic Set Defined
More informationConstruction of latin squares of prime order
Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo
More informationdiv(f ) = D and deg(d) = deg(f ) = d i deg(f i ) (compare this with the definitions for smooth curves). Let:
Algebraic Curves/Fall 015 Aaron Bertram 4. Projective Plane Curves are hypersurfaces in the plane CP. When nonsingular, they are Riemann surfaces, but we will also consider plane curves with singularities.
More informationChap. 3. Controlled Systems, Controllability
Chap. 3. Controlled Systems, Controllability 1. Controllability of Linear Systems 1.1. Kalman s Criterion Consider the linear system ẋ = Ax + Bu where x R n : state vector and u R m : input vector. A :
More information1 Last time: least-squares problems
MATH Linear algebra (Fall 07) Lecture Last time: least-squares problems Definition. If A is an m n matrix and b R m, then a least-squares solution to the linear system Ax = b is a vector x R n such that
More informationCharacterizations of indicator functions of fractional factorial designs
Characterizations of indicator functions of fractional factorial designs arxiv:1810.08417v2 [math.st] 26 Oct 2018 Satoshi Aoki Abstract A polynomial indicator function of designs is first introduced by
More informationTwists of elliptic curves of rank at least four
1 Twists of elliptic curves of rank at least four K. Rubin 1 Department of Mathematics, University of California at Irvine, Irvine, CA 92697, USA A. Silverberg 2 Department of Mathematics, University of
More informationA Saturation Algorithm for Homogeneous Binomial Ideals
A Saturation Algorithm for Homogeneous Binomial Ideals Deepanjan Kesh and Shashank K Mehta Indian Institute of Technology, Kanpur - 208016, India, {deepkesh,skmehta}@cse.iitk.ac.in Abstract. Let k[x 1,...,
More informationMath 113 Homework 5. Bowei Liu, Chao Li. Fall 2013
Math 113 Homework 5 Bowei Liu, Chao Li Fall 2013 This homework is due Thursday November 7th at the start of class. Remember to write clearly, and justify your solutions. Please make sure to put your name
More informationarxiv: v1 [math.ds] 3 Mar 2016
Solving systems of polynomial inequalities with algebraic geometry methods Laura Menini, Corrado Possieri and Antonio Tornambè arxiv:163.1183v1 [math.ds] 3 Mar 16 Dipartimento di Ingegneria Civile e Ingegneria
More information(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).
CMPSCI611: Verifying Polynomial Identities Lecture 13 Here is a problem that has a polynomial-time randomized solution, but so far no poly-time deterministic solution. Let F be any field and let Q(x 1,...,
More informationDeterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France
More informationLecture 03: Polynomial Based Codes
Lecture 03: Polynomial Based Codes Error-Correcting Codes (Spring 016) Rutgers University Swastik Kopparty Scribes: Ross Berkowitz & Amey Bhangale 1 Reed-Solomon Codes Reed Solomon codes are large alphabet
More informationLecture 2: Lattices and Bases
CSE 206A: Lattice Algorithms and Applications Spring 2007 Lecture 2: Lattices and Bases Lecturer: Daniele Micciancio Scribe: Daniele Micciancio Motivated by the many applications described in the first
More informationAlgebraic Equations for Blocking Probabilities in Asymmetric Networks
Algebraic Equations for Blocking Probabilities in Asymmetric Networks Ian Dinwoodie, Emily Gamundi and Ed Mosteig Technical Report #2004-15 April 6, 2004 This material was based upon work supported by
More informationAd Placement Strategies
Case Study 1: Estimating Click Probabilities Tackling an Unknown Number of Features with Sketching Machine Learning for Big Data CSE547/STAT548, University of Washington Emily Fox 2014 Emily Fox January
More informationEfficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Xiao-Shan Gao and Zhenyu Huang Key Laboratory of Mathematics Mechanization
More informationAnatomy of SINGULAR talk at p. 1
Anatomy of SINGULAR talk at MaGiX@LIX 2011- p. 1 Anatomy of SINGULAR talk at MaGiX@LIX 2011 - Hans Schönemann hannes@mathematik.uni-kl.de Department of Mathematics University of Kaiserslautern Anatomy
More informationComputer Algebra: General Principles
Computer Algebra: General Principles For article on related subject see SYMBOL MANIPULATION. Computer algebra is a branch of scientific computation. There are several characteristic features that distinguish
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationNew algebraic decoding method for the (41, 21,9) quadratic residue code
New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,
More informationNew Gröbner Bases for formal verification and cryptography
New Gröbner Bases for formal verification and cryptography Gert-Martin Greuel Diamant/Eidma Symposium November 29th - November 30th November 29th, 2007 Introduction Focus of this talk New developements
More informationCourse 311: Hilary Term 2006 Part IV: Introduction to Galois Theory
Course 311: Hilary Term 2006 Part IV: Introduction to Galois Theory D. R. Wilkins Copyright c David R. Wilkins 1997 2006 Contents 4 Introduction to Galois Theory 2 4.1 Polynomial Rings.........................
More informationMathematical Optimisation, Chpt 2: Linear Equations and inequalities
Mathematical Optimisation, Chpt 2: Linear Equations and inequalities Peter J.C. Dickinson p.j.c.dickinson@utwente.nl http://dickinson.website version: 12/02/18 Monday 5th February 2018 Peter J.C. Dickinson
More informationLattice reduction of polynomial matrices
Lattice reduction of polynomial matrices Arne Storjohann David R. Cheriton School of Computer Science University of Waterloo Presented at the SIAM conference on Applied Algebraic Geometry at the Colorado
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationChapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn
Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn Randomization Randomized Algorithm: An algorithm that uses (or can use) random coin flips in order to make decisions We will see: randomization
More information