388 research outputs found

    Revisit Sparse Polynomial Interpolation based on Randomized Kronecker Substitution

    Full text link
    In this paper, a new reduction based interpolation algorithm for black-box multivariate polynomials over finite fields is given. The method is based on two main ingredients. A new Monte Carlo method is given to reduce black-box multivariate polynomial interpolation to black-box univariate polynomial interpolation over any ring. The reduction algorithm leads to multivariate interpolation algorithms with better or the same complexities most cases when combining with various univariate interpolation algorithms. We also propose a modified univariate Ben-or and Tiwarri algorithm over the finite field, which has better total complexity than the Lagrange interpolation algorithm. Combining our reduction method and the modified univariate Ben-or and Tiwarri algorithm, we give a Monte Carlo multivariate interpolation algorithm, which has better total complexity in most cases for sparse interpolation of black-box polynomial over finite fields

    FORM version 4.0

    Full text link
    We present version 4.0 of the symbolic manipulation system FORM. The most important new features are manipulation of rational polynomials and the factorization of expressions. Many other new functions and commands are also added; some of them are very general, while others are designed for building specific high level packages, such as one for Groebner bases. New is also the checkpoint facility, that allows for periodic backups during long calculations. Lastly, FORM 4.0 has become available as open source under the GNU General Public License version 3.Comment: 26 pages. Uses axodra

    The importance of being zero

    Get PDF
    2018 International Symposium on Symbolic and Algebraic Computation (ISSAC), July 2018, New York, NY, United StatesWe present a deterministic algorithm for deciding if a polynomial ideal, with coefficients in an algebraically closed field K of characteristic zero, of which we know just some very limited data, namely:the number n of variables, and some upper bound for the geometric degree of its zero set in Kn, is or not the zero ideal. The algorithm performs just a finite number of decisions to check whether a point is or not in the zero set of the ideal. Moreover, we extend this technique to test, in the same fashion, if the elimination of some variables in the given ideal yields or not the zero ideal. Finally, the role of this technique in the context of automated theorem proving of elementary geometry statements, is presented, with references to recent documents describing the excellent performance of the already existing prototype version, implemented in GeoGebra.Ministerio de Economía y CompetitividadEuropean Regional Development Fun

    Spotting Trees with Few Leaves

    Full text link
    We show two results related to the Hamiltonicity and kk-Path algorithms in undirected graphs by Bj\"orklund [FOCS'10], and Bj\"orklund et al., [arXiv'10]. First, we demonstrate that the technique used can be generalized to finding some kk-vertex tree with ll leaves in an nn-vertex undirected graph in O(1.657k2l/2)O^*(1.657^k2^{l/2}) time. It can be applied as a subroutine to solve the kk-Internal Spanning Tree (kk-IST) problem in O(min(3.455k,1.946n))O^*(\min(3.455^k, 1.946^n)) time using polynomial space, improving upon previous algorithms for this problem. In particular, for the first time we break the natural barrier of O(2n)O^*(2^n). Second, we show that the iterated random bipartition employed by the algorithm can be improved whenever the host graph admits a vertex coloring with few colors; it can be an ordinary proper vertex coloring, a fractional vertex coloring, or a vector coloring. In effect, we show improved bounds for kk-Path and Hamiltonicity in any graph of maximum degree Δ=4,,12\Delta=4,\ldots,12 or with vector chromatic number at most 8

    The inverse moment problem for convex polytopes

    Full text link
    The goal of this paper is to present a general and novel approach for the reconstruction of any convex d-dimensional polytope P, from knowledge of its moments. In particular, we show that the vertices of an N-vertex polytope in R^d can be reconstructed from the knowledge of O(DN) axial moments (w.r.t. to an unknown polynomial measure od degree D) in d+1 distinct generic directions. Our approach is based on the collection of moment formulas due to Brion, Lawrence, Khovanskii-Pukhikov, and Barvinok that arise in the discrete geometry of polytopes, and what variously known as Prony's method, or Vandermonde factorization of finite rank Hankel matrices.Comment: LaTeX2e, 24 pages including 1 appendi

    Effect of acute copper sulfate exposure on olfactory responses to amino acids and pheromones in goldfish (Carassius auratus)

    Get PDF
    Exposure of olfactory epithelium to environmentally relevant concentrations of copper disrupts olfaction in fish. To examine the dynamics of recovery at both functional and morphological levels after acute copper exposure, unilateral exposure of goldfish olfactory epithelia to 100 μM CuSO4 (10 min) was followed by electro-olfactogram (EOG) recording and scanning electron microscopy. Sensitivity to amino acids (L-arginine and L-serine), generally considered food-related odorants, recovered most rapidly (three days), followed by that to catecholamines(3-O-methoxytyramine),bileacids(taurolithocholic acid) and the steroid pheromone, 17,20 -dihydroxy-4-pregnen- 3-one 20-sulfate, which took 28 days to reach full recovery. Sensitivity to the postovulatory pheromone prostaglandin F2R had not fully recovered even at 28 days. These changes in sensitivity were correlated with changes in the recovery of ciliated and microvillous receptor cell types. Microvillous cells appeared largely unaffected by CuSO4 treatment. Cilia in ciliated receptor neurones, however, appeared damaged one day post-treatment and were virtually absent after three days but had begun to recover after 14 days. Together, these results support the hypothesis that microvillous receptor neurones detect amino acids whereas ciliated receptor neurones were not functional and are responsible for detection of social stimuli (bile acidsandpheromones).Furthermore, differences in sensitivity to copper may be due to different transduction pathways in the different cell types

    End-to-end verifiable elections in the standard model

    Get PDF
    We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-to-end verifiable in the standard model, i.e., without any additional “setup” assumption or access to a random oracle (RO). Previously known end-to-end verifiable e-voting systems required such additional assumptions (specifically, either the existence of a “randomness beacon” or were only shown secure in the RO model). In order to analyze our scheme, we also provide a modeling of end-to-end verifiability as well as privacy and receipt-freeness that encompasses previous definitions in the form of two concise attack games. Our scheme satisfies end-to-end verifiability information theoretically in the standard model and privacy/receipt-freeness under a computational assumption (subexponential Decisional Diffie Helman). In our construction, we utilize a number of techniques used for the first time in the context of e-voting schemes that include utilizing randomness from bit-fixing sources, zero-knowledge proofs with imperfect verifier randomness and complexity leveraging
    corecore