119 research outputs found
Series of rational moduli components of stable rank 2 vector bundles on
We study the problem of rationality of an infinite series of components, the so-called Ein components, of the Gieseker-Maruyama moduli space of rank 2 stable vector bundles with the first Chern class or -1 and all possible values of the second Chern class on the projective 3-space. The generalized null correlation bundles constituting open dense subsets of these components are defined as cohomology bundles of monads whose members are direct sums of line bundles of degrees depending on nonnegative integers , where and . We show that, in the wide range when c>2a+b-e,\b>a,\ (e,a)\ne(0,0), the Ein components are rational, and in the remaining cases they are at least stably rational. As a consequence, the union of the spaces over all contains an infinite series of rational components for both and . Explicit constructions of rationality of Ein components under the above conditions on and, respectively, of their stable rationality in the remaining cases, are given. In the case of rationality, we construct universal families of generalized null correlation bundles over certain open subsets of Ein components showing that these subsets are fine moduli spaces. As a by-product of our construction, for and even, they provide, perhaps the first known, examples of fine moduli spaces not satisfying the condition " is odd", which is a usual sufficient condition for fineness
ΠΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½Π½ΠΎΡΡΠΈ ΡΡΠ±ΡΠ΅ΠΊΡΠΎΠ² Π² ΡΠΈΡΡΠ΅ΠΌΠ°Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ
The problem of the functional structures research is considered in this example of information systems.
A feature of such research is that it is not always possible to ensure that the research results will match
reality. This is a topic of current interest in the field of design and analysis of information security
systems and software analysis for undeclared capabilities of systems in general. By undeclared capabilities,
we refer to a functionality available in software that is invisible to users and can be used / exploited by
an intruder. This paper presents a model of a researcher and of a functional object investigated by him.
Based on this model, informational limitations of the researcher are shown. The mathematical model of
the subjective structure of an investigated system is constructed. It is shown in which cases this structure
is stable. This article answers the question of if the researcher can claim that his subjective functional
structure corresponds to the actual structure of the investigated system. We provide examples of such
approach on certain mathematical models of information securityΠ ΡΡΠ°ΡΡΠ΅ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Π° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ° ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π»ΡΠ½ΡΡ
ΡΡΡΡΠΊΡΡΡ Π½Π° ΠΏΡΠΈΠΌΠ΅ΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°-
ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ. ΠΡΠΎΠ±Π΅Π½Π½ΠΎΡΡΡ ΡΠ°ΠΊΠΎΠ³ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ Π·Π°ΠΊΠ»ΡΡΠ°Π΅ΡΡΡ Π² ΡΠΎΠΌ, ΡΡΠΎ Π½Π΅ Π²ΡΠ΅Π³Π΄Π° Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ
Π΄ΠΎΠ±ΠΈΡΡΡΡ ΡΠΎΠ³ΠΎ, ΡΡΠΎ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ Π±ΡΠ΄Π΅Ρ ΡΠΎΠΎΡΠ²Π΅ΡΡΡΠ²ΠΎΠ²Π°ΡΡ ΡΠ΅Π°Π»ΡΠ½ΠΎΡΡΠΈ. ΠΡΠΎ ΠΊΡΠ°ΠΉΠ½Π΅
Π°ΠΊΡΡΠ°Π»ΡΠ½Π°Ρ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ° Π² ΠΎΠ±Π»Π°ΡΡΠΈ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° ΡΠΈΡΡΠ΅ΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈ
Π°Π½Π°Π»ΠΈΠ·Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ½ΠΎΠ³ΠΎ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ Π½Π° ΠΏΡΠ΅Π΄ΠΌΠ΅Ρ Π½Π΅Π΄Π΅ΠΊΠ»Π°ΡΠΈΡΡΠ΅ΠΌΡΡ
Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ. Π ΡΡΠ°ΡΡΠ΅ Π΄Π°Π½Π°
ΠΌΠΎΠ΄Π΅Π»Ρ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΈ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΠΌΠΎΠ³ΠΎ ΠΈΠΌ ΡΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΎΠ±ΡΠ΅ΠΊΡΠ°. ΠΠ° ΠΎΡΠ½ΠΎΠ²Π°Π½ΠΈΠΈ Π΄Π°Π½Π½ΠΎΠΉ ΠΌΠΎΠ΄Π΅Π»ΠΈ
ΠΏΠΎΠΊΠ°Π·Π°Π½Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΡ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»Ρ. ΠΠΎΡΡΡΠΎΠ΅Π½Π° ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ ΠΌΠΎΠ΄Π΅Π»Ρ ΡΡΠ±Ρ-
Π΅ΠΊΡΠΈΠ²Π½ΠΎΠΉ ΡΡΡΡΠΊΡΡΡΡ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΠΌΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ, ΠΈ ΠΏΠΎΠΊΠ°Π·Π°Π½ΠΎ, Π² ΠΊΠ°ΠΊΠΈΡ
ΡΠ»ΡΡΠ°ΡΡ
ΠΎΠ½Π° ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΡΡΠΎΠΉΡΠΈ-
Π²ΠΎΠΉ. ΠΠ°Π½ ΡΠ°ΠΊΠΆΠ΅ ΠΎΡΠ²Π΅Ρ Π½Π° Π²ΠΎΠΏΡΠΎΡ, Π² ΠΊΠ°ΠΊΠΎΠΌ ΡΠ»ΡΡΠ°Π΅ ΡΡΠ±ΡΠ΅ΠΊΡ ΠΌΠΎΠΆΠ΅Ρ ΡΡΠ²Π΅ΡΠΆΠ΄Π°ΡΡ, ΡΡΠΎ Π΅Π³ΠΎ ΡΡΠ±Ρ-
Π΅ΠΊΡΠΈΠ²Π½Π°Ρ ΡΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π»ΡΠ½Π°Ρ ΡΡΡΡΠΊΡΡΡΠ° ΠΎΠ±ΡΠ΅ΠΊΡΠ° ΡΠΎΠΎΡΠ²Π΅ΡΡΡΠ²ΡΠ΅Ρ Π΄Π΅ΠΉΡΡΠ²ΠΈΡΠ΅Π»ΡΠ½ΠΎΠΉ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΏΡΠΈ-
ΠΌΠ΅ΡΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ Π΄Π°Π½Π½ΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π° Π½Π° ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΌΠΎΠ΄Π΅Π»ΡΡ
ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ
Enveloppe d'holomorphie locale des vari\'et\'es CR et \'elimination des singularit\'es pour les fonctions CR int\'egrables
Soient une vari\'et\'e CR localement plongeable et un
ferm\'e. On donne des conditions suffisantes pour que les fonctions
qui sont CR sur le soient aussi sur tout entier.Comment: 6 pages, LaTeX. To appear in C. R. Acad. Sci. Paris, 199
- β¦