Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems
|
|
- Sharleen Smith
- 5 years ago
- Views:
Transcription
1 Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing , China chenqi.mou, December 12, 2013 Nanning, China
2 The problem Chemical reaction networks
3 The problem Chemical reaction networks
4 The problem Chemical reaction networks
5 The problem Chemical reaction networks
6 Reconstructing Chemical Reaction Networks Chemical reaction networks
7 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean?
8 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean? CRR (Compound-Reaction-Reconstruction) problem [Fagerberg et. al. 2013] Existence / NP-hard / SAT, SMT, ILP
9 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean? CRR (Compound-Reaction-Reconstruction) problem [Fagerberg et. al. 2013] Existence / NP-hard / SAT, SMT, ILP = CRR + problem: all the potential SR-graphs
10 Why Polynomial System Solving (PoSSo)? CRR problem Existence Hilbert s Nullstellensatz NP-hardness PoSSo is also NP-hard [Garey & Johnson 1979] SAT, SMT, ILP Polynomial system solvers
11 Why Polynomial System Solving (PoSSo)? CRR problem Existence Hilbert s Nullstellensatz NP-hardness PoSSo is also NP-hard [Garey & Johnson 1979] SAT, SMT, ILP Polynomial system solvers All the solutions feasible natural Complexity: Worst: doubly exponential (in #var) [Mayr & Meyer 1982] Dedicated complexity (structured): bidegree (1,1) [Faugère, Safey El Din, Spaenlehauer 2010]
12 Matrix representation R: a reaction = Input species: I(R); Output species: O(R); SR-graph two Boolean matrices
13 Matrix representation R: a reaction = Input species: I(R); Output species: O(R); SR-graph two Boolean matrices E m n { such that 1, Si I(R E i,k := k ) 0, Otherwise P n m { such that 1, Sj O(R P k,j := k ) 0, Otherwise On the Complexity of Reconstructing Chemical Reaction Networks 3 A R1 C R2 E B D F FIGURE 1. A directed hypergraph, consisting of two reactions {R1, R2} and six chemical species {A, B,..., F}. Hyperarc R1 has t(r1) = {A, B} and h(r1) = {C, D}, hyperarc R2 has t(r2) = {C} and h(r2) = {E, F }.
14 Matrix representation S-graphs: Boolean matrix S m m such that { 1, Rk s.t. S S i,j := i I(R k ) and S j O(R k ) 0, Otherwise R-graphs: Boolean matrix R n n such that { 1, Si s.t. S R k,l := i O(R k ) and S i I(R k ) 0, Otherwise
15 Matrix representation S-graphs: Boolean matrix S m m such that { 1, Rk s.t. S S i,j := i I(R k ) and S j O(R k ) 0, Otherwise R-graphs: Boolean matrix R n n such that { 1, Si s.t. S R k,l := i O(R k ) and S i I(R k ) 0, Otherwise Input: S, R = Output: E, P CRR: existence of E and P CRR + : all the possible E and P
16 Relationship S, R, E, and P S i,j = (E i,k P k,j ), R k,l = (P k,i E i,l ). k=1,...,n i=1,...,m Direct translation to PoSSo problem Background Boolean polynomial ring F 2 [E 1,1,..., E m,n, P 1,1,..., P n,m ] x y = x y and x y = x + y + x y Boolean polynomial system
17 Structure S i,j = k=1,...,n (E i,k P k,j ) x y = x y and x y = x + y + x y S i,j = 1 = 1 polynomial equation (degree 2n; variable 2n) = of type s (or r if R i,j = 1) S i,j = 0 = n bivariate quadratic equations = of type 0
18 Structure S i,j = k=1,...,n (E i,k P k,j ) x y = x y and x y = x + y + x y S i,j = 1 = 1 polynomial equation (degree 2n; variable 2n) = of type s (or r if R i,j = 1) S i,j = 0 = n bivariate quadratic equations = of type 0 Structure (p and q: #zeros in S and R) type 0: np + mq type s: m 2 p type r: n 2 q #Solutions #Variables = overdefined
19 PoSSo Methods Gröbner bases [Buchberger 1965, Faugère 1999, 2002] triangular sets [Wang 2001, Moreno Maza 2000, Gao & Huang 2012] XL (overdefined) e.g., [Ars et. al. 2004] Polynomial system = in a better form = solutions Complexity (Gröbner bases): Salvy 2004] O( ( n+d reg n Over F 2 : add the field equations (x 2 k + x k = 0). ) ω)[bardet, Faugère,
20 PoSSo Implementation Gröbner bases: Buchberger algorithm: almost in all Computer Algebra Systems F 4, F 5 : FGb, MAGMA... = MAGMA: optimization for over F 2 (since V2.15) Triangular sets: Epsilon, RegularChains (in Maple)...
21 Randomly generated S and R MAGMA V (F 4 implementation) = V2.20 (released yesterday, F 4 updated) m, n P Density (%) #Var #F Time #Solutions / / / > 1000 unknown / / / > 1000 unknown / / / / /
22 Remarks on the experiments General one: no optimization is made for CRR: (1) Experimentally, not comparable to SMT / SAT in efficiency (with optimization) (2) Problem generation (VS CNF generation) There exist instances with more than 1 solution (not trivial) For real-world examples (Biology): size (m, n 40), sparsity 98%
23 Future work Structure = simplify the problem / dedicated algorithm Complexity analyses: better? CRR: NP-hardness by PoSSo?
On the chordality of polynomial sets in triangular decomposition in top-down style
On the chordality of polynomial sets in triangular decomposition in top-down style Chenqi Mou joint work with Yang Bai LMIB School of Mathematics and Systems Science Beihang University, China ISSAC 2018,
More informationOn the Existence of Semi-Regular Sequences
On the Existence of Semi-Regular Sequences Sergio Molina 1 joint work with T. J. Hodges 1 J. Schlather 1 Department of Mathematics University of Cincinnati DIMACS, January 2015 Sergio Molina (UC) Semi-Regular
More informationA Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA 2 Summary
More informationEfficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Xiao-Shan Gao and Zhenyu Huang Key Laboratory of Mathematics Mechanization
More informationRésolution de systèmes polynomiaux structurés et applications en Cryptologie
Résolution de systèmes polynomiaux structurés et applications en Cryptologie Pierre-Jean Spaenlehauer University of Western Ontario Ontario Research Center for Computer Algebra Magali Bardet, Jean-Charles
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationMutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik
More informationEfficient Haplotype Inference with Boolean Satisfiability
Efficient Haplotype Inference with Boolean Satisfiability Joao Marques-Silva 1 and Ines Lynce 2 1 School of Electronics and Computer Science University of Southampton 2 INESC-ID/IST Technical University
More informationOn Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gröbner Basis Algorithms Using Linear Algebra
On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gröbner Basis Algorithms Using Linear Algebra Yao Sun a, Zhenyu Huang a, Dongdai Lin a, Dingkang Wang b a SKLOIS, Institute
More informationGröbner Bases in Public-Key Cryptography
Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis
More informationSolving Polynomial Systems over Finite Fields: Algorithms, Implementation and Applications
Solving Polynomial Systems over Finite Fields: Algorithms, Implementation and Applications Chenqi Mou To cite this version: Chenqi Mou. Solving Polynomial Systems over Finite Fields: Algorithms, Implementation
More informationChange of Ordering for Regular Chains in Positive Dimension
Change of Ordering for Regular Chains in Positive Dimension X. Dahan, X. Jin, M. Moreno Maza, É. Schost University of Western Ontario, London, Ontario, Canada. École polytechnique, 91128 Palaiseau, France.
More informationReverse engineering using computational algebra
Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2015 M. Macauley (Clemson)
More informationAlgebraic Proof Systems
Algebraic Proof Systems Pavel Pudlák Mathematical Institute, Academy of Sciences, Prague and Charles University, Prague Fall School of Logic, Prague, 2009 2 Overview 1 a survey of proof systems 2 a lower
More informationMathCheck2: Combining SAT and CAS Presentation at Applications of Computer Algebra 2016 Kassel, Germany
MathCheck2: Combining SAT and CAS Presentation at Applications of Computer Algebra 2016 Kassel, Germany Curtis Bright, Vijay Ganesh, Albert Heinle, Ilias Kotsireas, Saeed Nejati, Krzysztof Czarnecki University
More informationarxiv: v1 [cs.sc] 29 Jul 2009
An Explicit Construction of Gauss-Jordan Elimination Matrix arxiv:09075038v1 [cssc] 29 Jul 2009 Yi Li Laboratory of Computer Reasoning and Trustworthy Computing, University of Electronic Science and Technology
More informationAlgebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,
More informationMatrices: 2.1 Operations with Matrices
Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,
More informationJean-Charles Faugère
ECC 2011 The 15th workshop on Elliptic Curve Cryptography INRIA, Nancy, France Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L Huot
More informationMultivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar?
Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Christian Eder, Jean-Charles Faugère and Ludovic Perret Seminar on Fundamental Algorithms, University
More informationAlgebraic Aspects of Symmetric-key Cryptography
Algebraic Aspects of Symmetric-key Cryptography Carlos Cid (carlos.cid@rhul.ac.uk) Information Security Group Royal Holloway, University of London 04.May.2007 ECRYPT Summer School 1 Algebraic Techniques
More informationComplex Hadamard matrices and 3-class association schemes
Complex Hadamard matrices and 3-class association schemes Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University (joint work with Takuya Ikuta) June 26, 2013 The 30th Algebraic
More informationNew Directions in Multivariate Public Key Cryptography
New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in
More informationThe Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen
The Graph Isomorphism Problem and the Module Isomorphism Problem Harm Derksen Department of Mathematics Michigan Center for Integrative Research in Critical Care University of Michigan Partially supported
More informationGröbner Bases. Applications in Cryptology
Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break
More informationMA2501 Numerical Methods Spring 2015
Norwegian University of Science and Technology Department of Mathematics MA2501 Numerical Methods Spring 2015 Solutions to exercise set 3 1 Attempt to verify experimentally the calculation from class that
More informationComputational complexity and some Graph Theory
Graph Theory Lars Hellström January 22, 2014 Contents of todays lecture An important concern when choosing the algorithm to use for something (after basic requirements such as correctness and stability)
More informationA remarkable representation of the Clifford group
A remarkable representation of the Clifford group Steve Brierley University of Bristol March 2012 Work with Marcus Appleby, Ingemar Bengtsson, Markus Grassl, David Gross and Jan-Ake Larsson Outline Useful
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationSolving Multivariate Polynomial Systems
Solving Multivariate Polynomial Systems Presented by: Bo-Yin Yang work with Lab of Yang and Cheng, and Charles Bouillaguet, ENS Institute of Information Science and TWISC, Academia Sinica Taipei, Taiwan
More informationA (short) survey on signature-based Gröbner Basis Algorithms
A (short) survey on signature-based Gröbner Basis Algorithms Christian Eder, Jean-Charles Faugère, John Perry and Bjarke Hammersholt Roune ACA 2014, New York, US July 10, 2014 1 / 16 How to detect zero
More informationPhase Transition in a System of Random Sparse Boolean Equations
5.1 Phase Transition in a System of Random Sparse Boolean Equations 33 Phase Transition in a System of Random Sparse Boolean Equations Thorsten Ernst Schilling and Pavol Zajac University of Bergen, KAIVT
More informationSMT Nonlinear Real Arithmetic and Computer Algebra: a Dialog
SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialogue of the Deaf? James 1 University of Bath J.H.@bath.ac.uk 23 July 2017 1 Thanks to EU H2020-FETOPEN-2016-2017-CSA project SC 2 (712689) and
More informationACI-matrices all of whose completions have the same rank
ACI-matrices all of whose completions have the same rank Zejun Huang, Xingzhi Zhan Department of Mathematics East China Normal University Shanghai 200241, China Abstract We characterize the ACI-matrices
More informationThe F 4 Algorithm. Dylan Peifer. 9 May Cornell University
The F 4 Algorithm Dylan Peifer Cornell University 9 May 2017 Gröbner Bases History Gröbner bases were introduced in 1965 in the PhD thesis of Bruno Buchberger under Wolfgang Gröbner. Buchberger s algorithm
More informationComplexity (Pre Lecture)
Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What
More informationDiscrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness
Discrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness Marc Uetz University of Twente m.uetz@utwente.nl Lecture 9: sheet 1 / 31 Marc Uetz Discrete Optimization Outline 1 N P and co-n P 2 N P-completeness
More informationGroebner Bases in Boolean Rings. for Model Checking and. Applications in Bioinformatics
Groebner Bases in Boolean Rings for Model Checking and Applications in Bioinformatics Quoc-Nam Tran, Ph.D. Professor of Computer Science Lamar University Invited Talk at CMU on October 8, 2010 Outline
More informationCS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem
CS20a: NP completeness Cook s theorem SAT is an NP-complete problem http://www.cs.caltech.edu/courses/cs20/a/ December 2, 2002 1 NP-complete definition A problem is in NP if it can be solved by a nondeterministic
More informationComparison between XL and Gröbner Basis Algorithms
Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042
More informationComp487/587 - Boolean Formulas
Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested
More informationGraph structure in polynomial systems: chordal networks
Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology
More informationAdvanced Algebra II 1 st Semester Exam Review
dname Advanced Algebra II 1 st Semester Exam Review Chapter 1A: Number Sets & Solving Equations Name the sets of numbers to which each number belongs. 1. 34 2. 525 3. 0.875 4. Solve each equation. Check
More informationIntroduction to Solving Combinatorial Problems with SAT
Introduction to Solving Combinatorial Problems with SAT Javier Larrosa December 19, 2014 Overview of the session Review of Propositional Logic The Conjunctive Normal Form (CNF) Modeling and solving combinatorial
More informationInderjit Dhillon The University of Texas at Austin
Inderjit Dhillon The University of Texas at Austin ( Universidad Carlos III de Madrid; 15 th June, 2012) (Based on joint work with J. Brickell, S. Sra, J. Tropp) Introduction 2 / 29 Notion of distance
More informationSolving the Hamiltonian Cycle problem using symbolic determinants
Solving the Hamiltonian Cycle problem using symbolic determinants V. Ejov, J.A. Filar, S.K. Lucas & J.L. Nelson Abstract In this note we show how the Hamiltonian Cycle problem can be reduced to solving
More informationReverse engineering using computational algebra
Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Fall 2016 M. Macauley (Clemson)
More informationCS 246 Review of Linear Algebra 01/17/19
1 Linear algebra In this section we will discuss vectors and matrices. We denote the (i, j)th entry of a matrix A as A ij, and the ith entry of a vector as v i. 1.1 Vectors and vector operations A vector
More informationComplexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 4 NP-completeness Recap: relations between classes EXP PSPACE = NPSPACE conp NP conp
More informationFrom Satisfiability to Linear Algebra
From Satisfiability to Linear Algebra Fangzhen Lin Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Technical Report August 2013 1 Introduction
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017
U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 Scribed by Luowen Qian Lecture 8 In which we use spectral techniques to find certificates of unsatisfiability
More informationToday. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04].
Today Few Comments PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04]. Remarkably simple novel proof. Leads to new quantitative results too!
More informationNP-Hardness reductions
NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then
More informationA survey of algebraic attacks against stream ciphers
A survey of algebraic attacks against stream ciphers Frederik Armknecht NEC Europe Ltd. Network Laboratories frederik.armknecht@netlab.nec.de Special semester on Gröbner bases and related methods, May
More informationOn the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems
On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems Bruno.Salvy@inria.fr Algorithms Project, Inria Joint work with Magali Bardet & Jean-Charles Faugère September 21st, 2006
More informationGraph structure in polynomial systems: chordal networks
Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology
More informationAlgebraic Analysis of Bifurcation and Limit Cycles for Biological Systems
Algebraic Analysis of Bifurcation and Limit Cycles for Biological Systems Wei Niu 1 and Dongming Wang 2,1 1 Laboratoire d Informatique de Paris 6, Université Pierre et Marie Curie CNRS, 104 avenue du Président
More informationSparse Boolean equations and circuit lattices
Sparse Boolean equations and circuit lattices Igor Semaev Department of Informatics, University of Bergen, Norway igor@ii.uib.no Abstract. A system of Boolean equations is called sparse if each equation
More informationLecture 4: Products of Matrices
Lecture 4: Products of Matrices Winfried Just, Ohio University January 22 24, 2018 Matrix multiplication has a few surprises up its sleeve Let A = [a ij ] m n, B = [b ij ] m n be two matrices. The sum
More informationSOLVING VIA MODULAR METHODS
SOLVING VIA MODULAR METHODS DEEBA AFZAL, FAIRA KANWAL, GERHARD PFISTER, AND STEFAN STEIDEL Abstract. In this article we present a parallel modular algorithm to compute all solutions with multiplicities
More informationGeneralized critical values and testing sign conditions
Generalized critical values and testing sign conditions on a polynomial Mohab Safey El Din. Abstract. Let f be a polynomial in Q[X 1,..., X n] of degree D. We focus on testing the emptiness of the semi-algebraic
More informationAn Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph.
An Algorithm to Determine the Clique Number of a Split Graph O.Kettani email :o_ket1@yahoo.fr Abstract In this paper, we propose an algorithm to determine the clique number of a split graph. Introduction
More informationComplexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 6 conp Agenda conp the importance of P vs. NP vs. conp neither in P nor NP-complete:
More informationTeaching Commutative Algebra and Algebraic Geometry. Geometry using Computer Algebra Systems
Teaching Commutative Algebra and Algebraic Geometry using Computer Algebra Systems Department of Mathematics, Simon Fraser University British Columbia, CANADA Computer Algebra in Education ACA 2012, Sofia,
More informationCounting Zeros over Finite Fields with Gröbner Bases
Counting Zeros over Finite Fields with Gröbner Bases Sicun Gao May 17, 2009 Contents 1 Introduction 2 2 Finite Fields, Nullstellensatz and Gröbner Bases 5 2.1 Ideals, Varieties and Finite Fields........................
More informationICALP g Mingji Xia
: : ICALP 2010 g Institute of Software Chinese Academy of Sciences 2010.7.6 : 1 2 3 Matrix multiplication : Product of vectors and matrices. AC = e [n] a ec e A = (a e), C = (c e). ABC = e,e [n] a eb ee
More informationBOOLEAN TENSOR FACTORIZATIONS. Pauli Miettinen 14 December 2011
BOOLEAN TENSOR FACTORIZATIONS Pauli Miettinen 14 December 2011 BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS X BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS C X A B BACKGROUND: BOOLEAN MATRIX FACTORIZATIONS
More informationCHAPTER 6. Direct Methods for Solving Linear Systems
CHAPTER 6 Direct Methods for Solving Linear Systems. Introduction A direct method for approximating the solution of a system of n linear equations in n unknowns is one that gives the exact solution to
More informationan efficient procedure for the decision problem. We illustrate this phenomenon for the Satisfiability problem.
1 More on NP In this set of lecture notes, we examine the class NP in more detail. We give a characterization of NP which justifies the guess and verify paradigm, and study the complexity of solving search
More informationOriented covers of the triangular graphs
Oriented covers of the triangular graphs Akihiro Munemasa Tohoku University (joint work with Keiji Ito) March 30, 2018 Beijing Normal University A. Munemasa Triangular graphs March 30, 2018 1 / 23 Contents
More informationIncidence Structures Related to Difference Sets and Their Applications
aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž
More informationDesigning rotating schedules by using Gröbner bases
Designing rotating schedules by using Gröbner bases Raúl Falcón 1, David Canca 1, Eva Barrena 2 1 University of Seville (Spain) 2 CIRRELT and HEC Montréal (Canada) {rafalgan, dco}@us.es, eva.barrena-algara@hec.ca
More informationarxiv: v3 [cs.sc] 3 May 2013
On the Complexity of Computing Gröbner Bases for Quasi-Homogeneous Systems arxiv:1301.5612v3 [cs.sc] 3 May 2013 Jean-Charles Faugère * Jean-Charles.Faugere@inria.fr ABSTRACT Mohab Safey El Din * Mohab.Safey@lip6.fr
More informationEXPLORING THE COMPLEXITY OF THE INTEGER IMAGE PROBLEM IN THE MAX-ALGEBRA
EXPLORING THE COMPLEXITY OF THE INTEGER IMAGE PROBLEM IN THE MAX-ALGEBRA MARIE MACCAIG Abstract. We investigate the complexity of the problem of finding an integer vector in the max-algebraic column span
More informationSparse analysis Lecture II: Hardness results for sparse approximation problems
Sparse analysis Lecture II: Hardness results for sparse approximation problems Anna C. Gilbert Department of Mathematics University of Michigan Sparse Problems Exact. Given a vector x R d and a complete
More information1. Introduction Recap
1. Introduction Recap 1. Tractable and intractable problems polynomial-boundness: O(n k ) 2. NP-complete problems informal definition 3. Examples of P vs. NP difference may appear only slightly 4. Optimization
More informationGeometry of Gaussoids
Geometry of Gaussoids Bernd Sturmfels MPI Leipzig and UC Berkeley p 3 p 13 p 23 a 12 3 p 123 a 23 a 13 2 a 23 1 a 13 p 2 p 12 a 12 p p 1 Figure 1: With The vertices Tobias andboege, 2-faces ofalessio the
More informationAn application of regular chain theory to the study of limit cycles
International Journal of Bifurcation and Chaos c World Scientific Publishing Company An application of regular chain theory to the study of limit cycles Changbo Chen Department of Computer Science, University
More informationSolving Parametric Polynomial Systems by RealComprehensiveTriangularize
Solving Parametric Polynomial Systems by RealComprehensiveTriangularize Changbo Chen 1 and Marc Moreno Maza 2 1 Chongqing Key Laboratory of Automated Reasoning and Cognition, Chongqing Institute of Green
More informationAnalysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg
More informationOn the complexity of polynomial system solving
Bruno Grenet LIX École Polytechnique partly based on a joint work with Pascal Koiran & Natacha Portier XXVèmes rencontres arithmétiques de Caen Île de Tatihou, June 30. July 4., 2014 Is there a (nonzero)
More informationWORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE
WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe
More informationLinear Algebra. Matrices Operations. Consider, for example, a system of equations such as x + 2y z + 4w = 0, 3x 4y + 2z 6w = 0, x 3y 2z + w = 0.
Matrices Operations Linear Algebra Consider, for example, a system of equations such as x + 2y z + 4w = 0, 3x 4y + 2z 6w = 0, x 3y 2z + w = 0 The rectangular array 1 2 1 4 3 4 2 6 1 3 2 1 in which the
More informationIsomorphism of Polynomials : New Results
Isomorphism of Polynomials : New Results Charles Bouillaguet, Jean-Charles Faugère 2,3, Pierre-Alain Fouque and Ludovic Perret 3,2 Ecole Normale Supérieure {charles.bouillaguet, pierre-alain.fouque}@ens.fr
More informationMXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
MXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy Mohamed Saied Emam Mohamed 1, Wael Said Abd Elmageed Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB
More information1 Approximate Counting by Random Sampling
COMP8601: Advanced Topics in Theoretical Computer Science Lecture 5: More Measure Concentration: Counting DNF Satisfying Assignments, Hoeffding s Inequality Lecturer: Hubert Chan Date: 19 Sep 2013 These
More informationComputations Modulo Regular Chains
Computations Modulo Regular Chains Xin Li, Marc Moreno Maza and Wei Pan (University of Western Ontario) ISSAC 2009, Seoul July 30, 2009 Background A historical application of the resultant is to compute
More informationCounting and Gröbner Bases
J. Symbolic Computation (2001) 31, 307 313 doi:10.1006/jsco.2000.1575 Available online at http://www.idealibrary.com on Counting and Gröbner Bases K. KALORKOTI School of Computer Science, University of
More informationOn Polynomial Systems Arising from a Weil Descent
On Polynomial Systems Arising from a Weil Descent Christophe Petit and Jean-Jacques Quisquater UCL Crypto Group, Université catholique de Louvain Place du Levant 3 1348 Louvain-la-Neuve (Belgium) christophe.petit@uclouvain.be,
More informationOn Fulton s Algorithm for Computing Intersection Multiplicities
On Fulton s Algorithm for Computing Intersection Multiplicities Steffen Marcus 1 Marc Moreno Maza 2 Paul Vrbik 2 1 University of Utah 2 University of Western Ontario March 9, 2012 1/35 Overview Let f 1,...,f
More informationSolving a Binary Puzzle
Math.Comput.Sci. (2017) 11:515 526 DOI 10.1007/s11786-017-0322-4 Mathematics in Computer Science Solving a Binary Puzzle Putranto H. Utomo Rusydi H. Makarim Received: 7 December 2016 / Revised: 13 March
More informationSolving Quadratic Equations with XL on Parallel Architectures
Solving Quadratic Equations with XL on Parallel Architectures Cheng Chen-Mou 1, Chou Tung 2, Ni Ru-Ben 2, Yang Bo-Yin 2 1 National Taiwan University 2 Academia Sinica Taipei, Taiwan Leuven, Sept. 11, 2012
More informationDetermine the size of an instance of the minimum spanning tree problem.
3.1 Algorithm complexity Consider two alternative algorithms A and B for solving a given problem. Suppose A is O(n 2 ) and B is O(2 n ), where n is the size of the instance. Let n A 0 be the size of the
More informationGroebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics
Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named
More informationWeek 15-16: Combinatorial Design
Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial
More informationarxiv: v3 [cs.sc] 21 Oct 2016
On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method Zhenyu Huang, Yao Sun, Dongdai Lin SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences,
More informationLecture 24 : Even more reductions
COMPSCI 330: Design and Analysis of Algorithms December 5, 2017 Lecture 24 : Even more reductions Lecturer: Yu Cheng Scribe: Will Wang 1 Overview Last two lectures, we showed the technique of reduction
More informationDeterminants of Partition Matrices
journal of number theory 56, 283297 (1996) article no. 0018 Determinants of Partition Matrices Georg Martin Reinhart Wellesley College Communicated by A. Hildebrand Received February 14, 1994; revised
More informationA new perspective on long range SU(N) spin models
A new perspective on long range SU(N) spin models Thomas Quella University of Cologne Workshop on Lie Theory and Mathematical Physics Centre de Recherches Mathématiques (CRM), Montreal Based on work with
More information