共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
3.
4.
Conditionally on the ABC conjecture, we apply work of Granville to show that a hyperelliptic curve of genus at least three has infinitely many quadratic twists that violate the Hasse Principle iff it has no -rational hyperelliptic branch points. 相似文献
5.
6.
7.
Let be a smooth irreducible algebraic curve of genus . The projective normality of a complete embedding of is determined by only its quadratic normality in case the embedding is of degree at least . This means that the complete embedding fails to be projectively normal if and only if it admits an effective divisor which fails to impose independent conditions on quadrics in the embedded projective space. Thus if admits a net, then it is interesting to compare the conditions for the projective normality of an embedding of with properties of conic sections of the plane curve given by the net. For such a curve with a net, we show that the projectively normal embeddings are closely related to properties of conic sections. 相似文献
8.
9.
10.
It is well known that the number of unramified normal coverings of an irreducible complex algebraic curve C with a group of covering transformations isomorphic to Z2⊕Z2 is (24g−3⋅22g+2)/6. Assume that C is hyperelliptic, say . Horiouchi has given the explicit algebraic equations of the subset of those covers which turn out to be hyperelliptic themselves. There are of this particular type. In this article, we provide algebraic equations for the remaining ones. 相似文献
11.
We obtain a uniform bound for the effective Bogomolov conjecture, which depends only on the genus g of the curve. The bound grows as as g tends to infinity. 相似文献
12.
13.
François Brunault 《Comptes Rendus Mathematique》2006,343(8):505-510
We state an explicit version of Beilinson's theorem for the modular curve . We deduce from it, for any elliptic curve E of prime conductor N, a formula giving in terms of the twisted values , where χ is a character modulo N. We illustrate this result and its consequences in the case of the elliptic curve . To cite this article: F. Brunault, C. R. Acad. Sci. Paris, Ser. I 343 (2006). 相似文献
14.
In this paper, a class of -ary linear codes with two weights is constructed by using the properties of cyclotomic classes of . The complete weight enumerators of these linear codes are also determined. In some cases, they are optimal and can be employed to obtain secret sharing schemes with interesting access structures and asymptotically optimal systematic authentication codes. 相似文献
15.
16.
17.
18.
19.