首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
In this paper we obtain an effective Nullstellensatz using quantitative considerations of the classical duality theory in complete intersections. Letk be an infinite perfect field and let f1,...,f n–rk[X1,...,Xn] be a regular sequence with d:=maxj deg fj. Denote byA the polynomial ringk [X1,..., Xr] and byB the factor ring k[X1,...,Xn]/(f1,...,fn r); assume that the canonical morphism AB is injective and integral and that the Jacobian determinant with respect to the variables Xr+1,...,Xn is not a zero divisor inB. Let finally B*:=HomA(B, A) be the generator of B* associated to the regular sequence.We show that for each polynomialf the inequality deg (¯f) dn r(+1) holds (¯fdenotes the class off inB and is an upper bound for (n–r)d and degf). For the usual trace associated to the (free) extensionA B we obtain a somewhat more precise bound: deg Tr(¯f) dn r degf. From these bounds and Bertini's theorem we deduce an elementary proof of the following effective Nullstellensatz: let f1,..., fs be polynomials in k[X1,...,Xn] with degrees bounded by a constant d2; then 1 (f1,..., fs) if and only if there exist polynomials p1,..., psk[X1,..., Xn] with degrees bounded by 4n(d+ 1)n such that 1=ipifi. in the particular cases when the characteristic of the base fieldk is zero ord=2 the sharper bound 4ndn is obtained.Partially supported by UBACYT and CONICET (Argentina)  相似文献   

2.
 A notion of resultant in determinantal form of two ordinary algebraic differential equations is introduced and some properties are shown. This notion extends the analogous one given in the linear homogeneous case by Berkovich and Tsirulik in 1986 and it can be used for the elimination of variables and their derivatives. Received: September 29, 1995; revised version: August 2, 1996/January 4, 1997  相似文献   

3.
 The weight hierarchy of a linear [n, k; q] code C over GF(q) is the sequence (d 1, d 2, . . . , d k ) where d r is the smallest support of an r-dimensional subcode of C. An [n, k; q] code is external non-chain if for any r and s, where 1≦r<sk, there are no subspaces D and E, such that DE, dim D=r, dim E=s, w S (D)=d r , and w S (E)=d s . Bounds on the weight hierarchies of such codes of dimension 4 are studied. Received: September 27, 1996  相似文献   

4.
 A relation between the Hamming weight enumerator of a linear code and the Tutte polynomial of the corresponding matroid has been known since long ago. It provides a simple proof of the MacWilliams equation (see D. Welsh, Matroid Theory (1976)). In this paper we prove analogous results for the support weight distributions of a code. Received March 5, 1996; revised version October 28, 1996  相似文献   

5.
 We study S. D. Cohen’s method of estimating the covering radius of long primitive non-binary BCH codes with prime field alphabet. As an application we show that the covering radius is at most 7 for long 5-ary BCH codes with minimum distance seven. Received: November 13, 1996; revised version: March 11, 1997  相似文献   

6.
 We show that, under some natural conditions,the pairs (r,s) produced by the ElGamal signature scheme are uniformly distributed. In particular this implies that values of r and s are not correlated. The result is based on some new estimates of exponential sums. Received: May 17, 2000; revised version: August 23, 2001  相似文献   

7.
 This note presents a lower and an upper bound for the cardinality of the set of special permutation-invariant orbits and a formula for the number of special terms. Received: August 24, 1994; revised version: October 17, 1996/March 21, 1997  相似文献   

8.
 We present a new construction of binary nonlinear perfect codes with minimum distance 3 and lowerbound the number of nonequivalent such codes. Received: November 26, 1996; revised version: March 14, 1997  相似文献   

9.
 Let RM(m, r) be the shortened Reed-Muller code of order r and of length 2 m −1. A simple proof to the Kasami’s weight distribution formula (see [2] and [3, p. 441]) of the cosets of RM(m, 1) in RM(m, 2) is given. The derivation of this distribution formula (21) is based only on elementary properties of the trace map and the Dickson theory of quadratic forms (see [1, pp. 197–199] and [3, pp. 434–442]) is no longer needed. Received: September 25, 1996; revised version: March 11, 1997  相似文献   

10.
 An F-partition is a partition of an abelian group with the property that the linear space generated by the indicator functions of the subsets in the partition is invariant under Fourier transformation. In the present paper we study the special case of F-partitions over cyclic groups. We introduce the concept of multiplicative partitions and we show that for cyclic groups of prime orders any F-partition is necessarily multiplicative. Received: October, 1996; revised version: March 17, 1997  相似文献   

11.
 We derive a new upper bound on the covering radius of a code as a function of its dual distance. This bound improves on the Honkala-Litsyn-Tiet?v?inen bound and in a certain interval it is also better than Tiet?v?inen’s bound. Upper bounds on even-weight codes are considered as well. Received: November 4, 1996; revised version: February 1, 1997  相似文献   

12.
On Generalized Fibonacci Cubes and Unitary Transforms   总被引:1,自引:0,他引:1  
 We present a new interconnection topology called generalized Fibonacci topology, which unifies a wide range of connection topologies such as the Boolean cube (or hypercube), classical Fibonacci cube, etc. Some basic topological properties of generalized Fibonacci cubes are established. Finally, we developed new classes of the discrete orthogonal transforms, based on the generalized Fibonacci recursions. They can be implemented efficiently by butterfly-type networks (like the Fourier, or the Haar transforms). A generalized Fibonacci cube based processor architecture (generalizing the known SIMD architecture — hypercube processor) can be efficiently used for hardware implementation of the proposed discrete orthogonal transforms. Received: October 31, 1996  相似文献   

13.
 This paper continues our study of applications of factorized Gr?bner basis computations in [8] and [9]. We describe a way to interweave factorized Gr?bner bases and the ideas in [5] that leads to a significant speed up in the computation of isolated primes for well splitting examples. Based on that observation we generalize the algorithm presented in [22] to the computation of primary decompositions for modules. It rests on an ideal separation argument. We also discuss the practically important question how to extract a minimal primary decomposition, neither addressed in [5] nor in [17]. For that purpose we outline a method to detect necessary embedded primes in the output collection of our algorithm, similar to [22, cor. 2.22]. The algorithms are partly implemented in version 2.2.1 of our REDUCE package CALI [7]. Received: September 29, 1995; revised version: May 23, 1996  相似文献   

14.
 There are known constraints on the number of doubly-even and singly-even vectors in a linear even binary code C. These constraints give information about CC . We find new constraints on weights in a binary linear code C which also contains odd weight vectors. This leads to information about the dimension and weights of CC . Received: September 20, 1996  相似文献   

15.
 We prove a theorem of H. A. Barker on the Fourier coefficients of the sequence obtained by applying a complex-valued function to a recurrent sequence over a finite field. It is shown to follow from a result on the modulus of certain character sums which are evaluated in terms of Gauss sums. Received: April 1, 1997; revised version: August 29, 1997  相似文献   

16.
 We present an upper bound for the product of the k largest roots of a monic polynomial of degree n with complex coefficients. For that, we use the theory of compound matrices and the localization of the eigenvalues of matrices. Received: February 26, 1996; revised version: March 20, 1997  相似文献   

17.
In the design of waiting facilities for the units in a retrial queue, it is of interest to know probability distributions of extreme values of the orbit length. The purpose of this paper is to investigate the asymptotic behavior of the maximum orbit length in the queue with constant retrial rate, as the time interval increases. From the classical extreme value theory, we observe that, under standard linear normalizations, the maximum orbit length up to the nth time the positive recurrent queue becomes empty does not have a limit distribution. However, by allowing the parameters to vary with n, we prove the convergence of maximum orbit lengths to three possible limit distributions when the traffic intensity approaches 1 from below and n approaches infinity.

Received: October 7, 1999 / Accepted: November 21, 2000  相似文献   

18.
 We recall the construction of the hermitian-forms codes and some results about hermitians forms and exponential sums. With the help of these results, we give the weight distribution of the hermitian-forms codes and give some examples for which experimental computations have been made. Received: September 8, 1993; revised version: October 4, 1995  相似文献   

19.
 Considerations from category theory described in [1] have permitted to add new rewriting rules for optimal reductions of the λ-calculus [19, 14]. These rules produce an impressive improvement in the performance of the reduction system, and provide a first step towards the solution of the well known and crucial problem of accumulation of control operators. In this paper, after an introduction to optimal reductions, we exhibit the aforementioned problem and prove the correctness of the new rules. Received August 28, 1995; revised version August 1, 1996  相似文献   

20.
 In some applications of RSA, it is desirable to have a short secret exponent d. Wiener [6], describes a technique to use continued fractions (CF) in a cryptanalytic attack on an RSA cryptosystem having a ‘short’ secret exponent. Let n=p ⋅ q be the modulus of the system. In the typical case that G=gcd(p−1, q−1) is small. Wiener’s method will give the secret exponent d when d does not exceed (approximately) n 1/4. Here, we describe a general method to compute the CF-convergents of the continued fraction expansion of the same number as in Wiener (which has denominator d ⋅ G) up to the point where the denominator of the CF-convergent exceeds approximately n 1/4. When d<n 1/4 this technique determines d, p, and q as does Wiener’s method. For larger values of d there is still information available on the secret key. An estimate is made of the remaining workload to determine d, p and q. Roughly speaking this workload corresponds to an exhaustive search for about 2r+8 bit, where r=ln2d/n 1/4. Received: September 30, 1996; revised version: March 7, 1997  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号