56,930 research outputs found
Converting between quadrilateral and standard solution sets in normal surface theory
The enumeration of normal surfaces is a crucial but very slow operation in
algorithmic 3-manifold topology. At the heart of this operation is a polytope
vertex enumeration in a high-dimensional space (standard coordinates).
Tollefson's Q-theory speeds up this operation by using a much smaller space
(quadrilateral coordinates), at the cost of a reduced solution set that might
not always be sufficient for our needs. In this paper we present algorithms for
converting between solution sets in quadrilateral and standard coordinates. As
a consequence we obtain a new algorithm for enumerating all standard vertex
normal surfaces, yielding both the speed of quadrilateral coordinates and the
wider applicability of standard coordinates. Experimentation with the software
package Regina shows this new algorithm to be extremely fast in practice,
improving speed for large cases by factors from thousands up to millions.Comment: 55 pages, 10 figures; v2: minor fixes only, plus a reformat for the
journal styl
Exact Algorithms for Solving Stochastic Games
Shapley's discounted stochastic games, Everett's recursive games and
Gillette's undiscounted stochastic games are classical models of game theory
describing two-player zero-sum games of potentially infinite duration. We
describe algorithms for exactly solving these games
Isogenies of Elliptic Curves: A Computational Approach
Isogenies, the mappings of elliptic curves, have become a useful tool in
cryptology. These mathematical objects have been proposed for use in computing
pairings, constructing hash functions and random number generators, and
analyzing the reducibility of the elliptic curve discrete logarithm problem.
With such diverse uses, understanding these objects is important for anyone
interested in the field of elliptic curve cryptography. This paper, targeted at
an audience with a knowledge of the basic theory of elliptic curves, provides
an introduction to the necessary theoretical background for understanding what
isogenies are and their basic properties. This theoretical background is used
to explain some of the basic computational tasks associated with isogenies.
Herein, algorithms for computing isogenies are collected and presented with
proofs of correctness and complexity analyses. As opposed to the complex
analytic approach provided in most texts on the subject, the proofs in this
paper are primarily algebraic in nature. This provides alternate explanations
that some with a more concrete or computational bias may find more clear.Comment: Submitted as a Masters Thesis in the Mathematics department of the
University of Washingto
Complete Subdivision Algorithms, II: Isotopic Meshing of Singular Algebraic Curves
Given a real valued function f(X,Y), a box region B_0 in R^2 and a positive
epsilon, we want to compute an epsilon-isotopic polygonal approximation to the
restriction of the curve S=f^{-1}(0)={p in R^2: f(p)=0} to B_0. We focus on
subdivision algorithms because of their adaptive complexity and ease of
implementation. Plantinga and Vegter gave a numerical subdivision algorithm
that is exact when the curve S is bounded and non-singular. They used a
computational model that relied only on function evaluation and interval
arithmetic. We generalize their algorithm to any bounded (but possibly
non-simply connected) region that does not contain singularities of S. With
this generalization as a subroutine, we provide a method to detect isolated
algebraic singularities and their branching degree. This appears to be the
first complete purely numerical method to compute isotopic approximations of
algebraic curves with isolated singularities
Characterizing Triviality of the Exponent Lattice of A Polynomial through Galois and Galois-Like Groups
The problem of computing \emph{the exponent lattice} which consists of all
the multiplicative relations between the roots of a univariate polynomial has
drawn much attention in the field of computer algebra. As is known, almost all
irreducible polynomials with integer coefficients have only trivial exponent
lattices. However, the algorithms in the literature have difficulty in proving
such triviality for a generic polynomial. In this paper, the relations between
the Galois group (respectively, \emph{the Galois-like groups}) and the
triviality of the exponent lattice of a polynomial are investigated. The
\bbbq\emph{-trivial} pairs, which are at the heart of the relations between
the Galois group and the triviality of the exponent lattice of a polynomial,
are characterized. An effective algorithm is developed to recognize these
pairs. Based on this, a new algorithm is designed to prove the triviality of
the exponent lattice of a generic irreducible polynomial, which considerably
improves a state-of-the-art algorithm of the same type when the polynomial
degree becomes larger. In addition, the concept of the Galois-like groups of a
polynomial is introduced. Some properties of the Galois-like groups are proved
and, more importantly, a sufficient and necessary condition is given for a
polynomial (which is not necessarily irreducible) to have trivial exponent
lattice.Comment: 19 pages,2 figure
Generalized Interference Alignment --- Part I: Theoretical Framework
Interference alignment (IA) has attracted enormous research interest as it
achieves optimal capacity scaling with respect to signal to noise ratio on
interference networks. IA has also recently emerged as an effective tool in
engineering interference for secrecy protection on wireless wiretap networks.
However, despite the numerous works dedicated to IA, two of its fundamental
issues, i.e., feasibility conditions and transceiver design, are not completely
addressed in the literature. In this two part paper, a generalised interference
alignment (GIA) technique is proposed to enhance the IA's capability in secrecy
protection. A theoretical framework is established to analyze the two
fundamental issues of GIA in Part I and then the performance of GIA in
large-scale stochastic networks is characterized to illustrate how GIA benefits
secrecy protection in Part II. The theoretical framework for GIA adopts
methodologies from algebraic geometry, determines the necessary and sufficient
feasibility conditions of GIA, and generates a set of algorithms that can solve
the GIA problem. This framework sets up a foundation for the development and
implementation of GIA.Comment: Minor Revision at IEEE Transactions on Signal Processin
On the Skolem Problem for Continuous Linear Dynamical Systems
The Continuous Skolem Problem asks whether a real-valued function satisfying
a linear differential equation has a zero in a given interval of real numbers.
This is a fundamental reachability problem for continuous linear dynamical
systems, such as linear hybrid automata and continuous-time Markov chains.
Decidability of the problem is currently open---indeed decidability is open
even for the sub-problem in which a zero is sought in a bounded interval. In
this paper we show decidability of the bounded problem subject to Schanuel's
Conjecture, a unifying conjecture in transcendental number theory. We
furthermore analyse the unbounded problem in terms of the frequencies of the
differential equation, that is, the imaginary parts of the characteristic
roots. We show that the unbounded problem can be reduced to the bounded problem
if there is at most one rationally linearly independent frequency, or if there
are two rationally linearly independent frequencies and all characteristic
roots are simple. We complete the picture by showing that decidability of the
unbounded problem in the case of two (or more) rationally linearly independent
frequencies would entail a major new effectiveness result in Diophantine
approximation, namely computability of the Diophantine-approximation types of
all real algebraic numbers.Comment: Full version of paper at ICALP'1
- …