首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We obtain the lower bounds for the tensor rank for the class of nilpotent and solvable Lie algebras (in terms of dimensions of certain quotient algebras). These estimates, in turn, give lower bounds for the complexity of algebraic algorithms for this class of algebras. We adduce examples of attainable estimates for nilpotent Lie algebras of various dimensions.  相似文献   

2.
3.
4.
5.
Abstract

We classify all complex 6-dimensional nilpotent Tortkara algebras.

Communicated by Alberto Facchini  相似文献   

6.
A topological method is given for obtaining lower bounds for the height of algebraic decision trees. The method is applied to the knapsack problem where an Ω(n2) bound is obtained for trees with bounded-degree polynomial tests, thus extending the Dobkin-Lipton result for linear trees. Applications to the convex hull problem and the distinct element problem are also indicated. Some open problems are discussed.  相似文献   

7.
We introduce and discuss a new computational model for the Hermite-Lagrange interpolation with nonlinear classes of polynomial interpolants. We distinguish between an interpolation problem and an algorithm that solves it. Our model includes also coalescence phenomena and captures a large variety of known Hermite-Lagrange interpolation problems and algorithms. Like in traditional Hermite-Lagrange interpolation, our model is based on the execution of arithmetic operations (including divisions) in the field where the data (nodes and values) are interpreted and arithmetic operations are counted at unit cost. This leads us to a new view of rational functions and maps defined on arbitrary constructible subsets of complex affine spaces. For this purpose we have to develop new tools in algebraic geometry which themselves are mainly based on Zariski’s Main Theorem and the theory of places (or equivalently: valuations). We finish this paper by exhibiting two examples of Lagrange interpolation problems with nonlinear classes of interpolants, which do not admit efficient interpolation algorithms (one of these interpolation problems requires even an exponential quantity of arithmetic operations in terms of the number of the given nodes in order to represent some of the interpolants).In other words, classic Lagrange interpolation algorithms are asymptotically optimal for the solution of these selected interpolation problems and nothing is gained by allowing interpolation algorithms and classes of interpolants to be nonlinear. We show also that classic Lagrange interpolation algorithms are almost optimal for generic nodes and values. This generic data cannot be substantially compressed by using nonlinear techniques.We finish this paper highlighting the close connection of our complexity results in Hermite-Lagrange interpolation with a modern trend in software engineering: architecture tradeoff analysis methods (ATAM).  相似文献   

8.
Let S*Q be the spherization of a closed connected manifold of dimension at least two. Consider a contactomorphism φ that can be reached by a contact isotopy that is everywhere positively transverse to the contact structure. In other words, φ is the time-1-map of a time-dependent Reeb flow. We show that the volume growth of φ is bounded from below by the topological complexity of the loop space of Q. Denote by ΩQ0(q) the component of the based loop space that contains the constant loop.  相似文献   

9.
One says a commutative radical Banach algebra A has a lower bound if there is a lower growth condition on ∥xn1n for all nonzero elements x in A. If A is a separable algebra we give necessary and sufficient conditions for A to possess a lower bound.  相似文献   

10.
We give algebraic and geometric classifications of 4-dimensional complex nilpotent terminal algebras. Specifically, we find that, up to isomorphism, there are 41 one-parameter families of 4-dimensional nilpotent terminal (non-Leibniz) algebras, 18 two-parameter families of 4-dimensional nilpotent terminal (non-Leibniz) algebras, 2 three-parameter families of 4-dimensional nilpotent terminal (non-Leibniz) algebras, complemented by 21 additional isomorphism classes (see Theorem 13). The corresponding geometric variety has dimension 17 and decomposes into 3 irreducible components determined by the Zariski closures of a one-parameter family of algebras, a two-parameter family of algebras and a three-parameter family of algebras (see Theorem 15). In particular, there are no rigid 4-dimensional complex nilpotent terminal algebras.  相似文献   

11.
12.
J.A. Loustau 《代数通讯》2013,41(11):1045-1070
An algebraic, linear Jordan algebra without nonzero nil-potent elements is proved to be a subdirect sum of prime Jordan algebras each of which has finite capacity or contains simple subalgebras of arbitrary capacity. If in addition the base field has nonzero character-istic or the algebra satisfies a polynomial identity, then each of the summands is determined to be simple of finite capacity. Further, it is proved that algebraic, PI Jordan algebras without nonzero nilpotent elements are locally finite in the sense that any finitely generated subalgebra has finite capacity.  相似文献   

13.
Let I be a nilpotent ideal of an associative algebra A over a field F and let D be a derivation of A. We prove that the ideal I + D(I) is nilpotent if char F = 0 or the nilpotency index I is less than char F = p in the case of the positive characteristic of the field F. In particular, the sum N(A) of all nilpotent ideals of the algebra A is a characteristic ideal if char F = 0 or N(A) is a nilpotent ideal of index < p = char F.  相似文献   

14.
We denote by C k * the formula. In this paper for all k there is constructed a derivation of C k * with cut, the number of sequents in which depends linearly on k. On the other hand, it is impossible to give an upper bound which is a Kalmar elementary function of k for the number of sequents in any derivation of the formula C k * without cuts, or for the number of disjunctions in a refutation by the method of resolutions of systems of disjunctions corresponding to the negation of the formula C k * . In particular, one can construct a derivation with cut of the formula C 6 * , in which there is contained no more than 253 sequents, but in seeking a derivation of C 6 * by the method of resolutions it is necessary to construct more than 1019200 disjunctions. With the help of Skolemization and taking out of quantifiers with respect to the formula C k * there is constructed a formula v0B k + (v0), which satisfies the following conditions: 1) one can construct a derivation with cuts of the formula v0B k + (v0) in the constructive predicate calculus, the number of sequents in which depends linearly on k; 2) it is impossible to give an upper bound which is a Kalmar elementary function of k of the length of a term t such that the formula B k + (t) is derivable.Translated from Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta im. V. A. Steklova AN SSSR, Vol. 88, pp. 137–161, 1979.  相似文献   

15.
The scheme Alg5 of associative, unitary algebra structures on k5, k an algebraically closed field with char (k)2 is investigated. We establish the list of GL5-orbits on Alg5 under the action of structural transport. The numberalg5 of irreducible components of Alg5 is 10; a list of generic structures is included. We exhibit upper and lower bounds for the asymptotic behaviour of the numberalgn.  相似文献   

16.
17.
Lightweight cipher designs try to minimize the implementation complexity of the cipher while maintaining some specified security level. Using only a small number of AND gates lowers the implementation costs, and enables easier protections against side-channel attacks. In our paper we study the connection between the number of AND gates (multiplicative complexity) and the complexity of algebraic attacks. We model the encryption with multiple right-hand sides (MRHS) equations. The resulting equation system is transformed into a syndrome decoding problem. The complexity of the decoding problem depends on the number of AND gates, and on the relative number of known output bits with respect to the number of unknown key bits. This allows us to apply results from coding theory, and to explicitly connect the complexity of the algebraic cryptanalysis to the multiplicative complexity of the cipher. This means that we can provide asymptotic upper bounds on the complexity of algebraic attacks on selected families of ciphers based on the hardness of the decoding problem.  相似文献   

18.
We define the concept of fuzzy nilpotent algebra, prove that the homomorphic inverse image of a fuzzy nilpotent algebra is also nilpotent and study the intersection and union of fuzzy nilpotent algebras.  相似文献   

19.
We show that the Mal'cev semigroup identity xn = yn holds in the circle semigroup of an associative algebra over an infinite field precisely when the algebra is Lie nilpotent of class at most n. The Mal'cev semigroup law xn = yn holds in a group if and only if the group is nilpotent of class at most n.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号