To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
We describe a mechanically verified proof of correctness of the floating point multiplication, division, and square root instructions of the AMD-K7 microprocessor. The instructions are implemented in hardware and represented here by register-transfer level specifications, the primitives of which are logical operations on bit vectors. On the other hand, the statements of correctness, derived from IEEE Standard 754, are arithmetic in nature and considerably more abstract. Therefore, we begin by developing a theory of bit vectors and their role in floating point representations and rounding. We then present the hardware model and a rigorous proof of its correctness. All of our definitions, lemmas and theorems have been formally encoded in the ACL2 logic, and every step in the proof has been mechanically checked with the ACL2 prover.
The authors of this paper study approximation methods for stochastic differential equations, and point out a simple relation between the order of convergence in the pth mean and the order of convergence in the pathwise sense: Convergence in the pth mean of order α for all p ≥ 1 implies pathwise convergence of order α – ε for arbitrary ε > 0. The authors then apply this result to several one-step and multi-step approximation schemes for stochastic differential equations and stochastic delay differential equations. In addition, they give some numerical examples.
We present a proof, which is conditional on the Birch and Swinnerton-Dyer Conjecture for a specific abelian variety, that there do not exist rational numbers x and c such that x has exact period N = 6 under the iteration x ↦ x2 + c. This extends earlier results by Morton for N = 4 and by Flynn, Poonen and Schaefer for N = 5.
A module over a finite-dimensional algebra is called a ‘diamond’ if it has a simple top and a simple socle. Using covering theory, the classification of all diamonds for algebras of finite representation type over algebraically closed fields can be reduced to representation-directed algebras. The author proves a criterion referring to the positive roots of the corresponding Tits quadratic form, which makes it easy to check whether a representation-directed algebra has a faithful diamond. Using an implementation of this criterion in the CREP program system on representation theory, he is able to classify all exceptional representation-directed algebras having a faithful diamond. He obtains a list of 157 algebras up to isomorphism and duality. The 52 maximal members of this list are presented at the end of this paper.
Modular polynomials are an important tool in many algorithms involving elliptic curves. In this article we investigate their generalization to the genus 2 case following pioneering work by Gaudry and Dupont. We prove various properties of these genus 2 modular polynomials and give an improved way to explicitly compute them.
This paper deals with the problem of finding the least length of a product of n binomials. A theorem of R. Maltby has shown that the problem is algorithmically solvable for any fixed n. Here, a different proof is presented for this result, and yields improved complexity. The author reports the results of computations of the upper bounds on the least length or Euclidean norm of a product of binomials.
Elliptic boundary value problems are well posed in suitable Sobolev spaces, if the boundary conditions satisfy the Shapiro–Lopatinskij condition. We propose here a criterion (which also covers over-determined elliptic systems) for checking this condition. We present a constructive method for computing the compatibility operator for the given boundary value problem operator, which is also necessary when checking the criterion. In the case of two independent variables we give a formulation of the criterion for the Shapiro–Lopatinskij condition which can be checked in a finite number of steps. Our approach is based on formal theory of PDEs, and we use constructive module theory and polynomial factorisation in our test. Actual computations were carried out with computer algebra systems Singular and MuPad.
The authors construct faithful permutation representations of maximal 2-local subgroups and classify the radical chains of the Janko simple group J4; hence the Alperin weight conjecture and the Dade reductive conjecture for J4 are verified.
Dyckhoff and Pinto present a weakly normalising system of reductions on derivations are characterised as the fixed points of the composition of the Prawitz translations into natural deduction and back. This paper presents a formalisation of the system, including a proof of the Weak normalisation property for the formalisation. More details can be found in earlier work by the author. The formalisation has been kept as closes as possible to the original presentation to allow an evaluation of the state of proof assistance for such methods, and to ensure similarity of methods, and not merely similarly of results. The formalisation is restricted to the implicational fragment of intuitionistic logic.
Prior to this paper, all small simple groups were known to be efficient, but the status of four of their covering groups was unknown. Nice, efficient presentations are provided in this paper for all of these groups, resolving the previously unknown cases. The authors‘presentations are better than those that were previously available, in terms of both length and computational properties. In many cases, these presentations have minimal possible length. The results presented here are based on major amounts of computation. Substantial use is made of systems for computational group theory and, in partic-ular, of computer implementations of coset enumeration. To assist in reducing the number of relators, theorems are provided to enable the amalgamation of power relations in certain presentations. The paper concludes with a selection of unsolved problems about efficient presentations for simple groups and their covers.
Let G be a subgroup of PSL(2, R) which is commensurable with PSL(2, Z). We say that G is a congruence subgroup of PSL(2, R) if G contains a principal congruence subgroup /overline Γ(N) for some N. An algorithm is given for determining whether two congruence subgroups are conjugate in PSL(2, R). This algorithm is used to determine the PSL(2, R) conjugacy classes of congruence subgroups of genus-zero and genus-one. The results are given in a table.
One way of suggesting that an NP problem may not be NP-complete is to show that it is in the promise class UP. We propose an analogous new method—weaker in strength of evidence but more broadly applicable—for suggesting that concrete NP problems are not NP-complete. In particular, we introduce the promise class EP, the subclass of NP consisting of those languages accepted by NP machines that, when they accept, always have a number of accepting paths that is a power of two. We show that FewP, bounded ambiguity polynomial time (which contains UP), is contained in EP. The class EP applies as an upper bound to some concrete problems to which previous approaches have never been successful, for example the negation equivalence problem for OBDDs (ordered binary decision diagrams).
The maximal subgroups of the finite classical groups are divided by a theorem of Aschbacher into nine classes. In this paper, the authors show how to construct those maximal subgroups of the finite classical groups of linear, symplectic or unitary type that lie in the first eight of these classes. The ninth class consists roughly of absolutely irreducible groups that are almost simple modulo scalars, other than classical groups over the same field in their natural representation. All of these constructions can be carried out in low-degree polynomial time.
This paper considers a number of related problems concerning the computation of eigenvalues and complex resonances of a general self-adjoint operator H. The feature which ties the different sections together is that one restricts oneself to spectral properties of H which can be proved by using only vectors from a pre-assigned (possibly finite-dimensional) linear subspace L.
This paper describes how to obtain bounds on the spectrum of a non-self-adjoint operator by means of what are referred to here as ‘its higher-order numerical ranges’. Proofs of some of their basic properties are given, as well as an explanation of how to compute them. Finally, they are used to obtain new spectral insights into the non-self-adjoint Anderson model in one and two space dimensions.
This article deals with a constructive aspect of Hilbert's seventeenth problem: producing a collection of real polynomials in two variables, of degree 8 in one variable, which are positive but are not sums of three squares of rational fractions.
To do this we use a reformulation of this problem in terms of hyperelliptic curves due to Huisman and Mahé and we follow a method of Cassels, Ellison and Pfister which involves the computation of a Mordell–Weil rank over ℝ(x).
In this paper, the strong mean square convergence theory is established for the numerical solutions of stochastic functional differential equations (SFDEs) under the local Lipschitz condition and the linear growth condition. These two conditions are generally imposed to guarantee the existence and uniqueness of the true solution, so the numerical results given here were obtained under quite general conditions.
The exterior square of a multiset is a natural combinatorial construction which is related to the exterior square of a vector space. We consider multisets of elements of an abelian group. Two properties are defined which a multiset may satisfy: recognisability and involution-recognisability. A polynomial-time algorithm is described which takes an input multiset and returns either (a) a multiset which is either recognisable or involution-recognisable and whose exterior square equals the input multiset, or (b) the message that no such multiset exists. The proportion of multisets which are neither recognisable nor involution-recognisable is shown to be small when the abelian group is finite but large. Some further comments are made about the motivating case of multisets of eigenvalues of matrices.
We discuss the Brauer-Manin obstruction on del Pezzo surfaces of degree 4. We outline a detailed algorithm for computing the obstruction and provide associated programs in MAGMA. This is illustrated with the computation of an example with an irreducible cubic factor in the singular locus of the defining pencil of quadrics (in contrast to previous examples, which had at worst quadratic irreducible factors). We exploit the relationship with the Tate-Shafarevich group to give new types of examples of III [2], for families of curves of genus 2 of the form y2 = f(x), where f(x) is a quintic containing an irreducible cubic factor.
We develop a formalism for studying the discrete logarithm problem for the multiplicative group and for elliptic curves over finite fields by lifting the respective group to an algebraic number field and using global duality. One of our main tools is the signature of a Dirichlet character (in the multiplicative group case) or principal homogeneous space (in the elliptic curve case), which is a measure of its ramification at certain places. We then develop signature calculus, which generalizes and refines the index calculus method. Finally, using some heuristics, we show the random polynomial time equivalence for these two cases between the problem of computing signatures and the discrete logarithm problem. This relates the discrete logarithm problem to some very well-known problems in algebraic number theory and arithmetic geometry.