Academia.eduAcademia.edu

SIAM AAG 15 and ICIAM 2015

2015

Polynomial System Solver This has mixed volume computations and sparse condition numbers. Liddell etc. are looking at "how do you know you've got all the real solutions. Note also that lots of people are looking at GPU [VY15]. Quoted [GXD + 14] as his favourite weird application. 1.7 Critical Points via Monodromy and Local Methods: Martin del Campo The critical point is where the Jacobian has full rank, and rank[∇Φ u (x) T , • • • , ]'lem. These conditions are additive so can assume X is irreducible. Note this re;ates to opening talk. The monodromy Group is the subgroup of S d generated by permutations arising from lifts of loops.

SIAM AAG 15 and ICIAM 2015 James H. Davenport 3–7 August 2015 10–14 August 2015 Contents I SIAM Applications of Algebraic Geometry 2015 (not fully spell-checked etc.) 1 3 August 2015 1.1 The Euclidean Distance of an Algebraic Variety: Ottaviani . . . 1.2 The Optimal Littlewood–Richardson Homotopy: Sottile . . . . . 1.3 Sparse Gröbner Bases: the Unmixed Case: Spaenlehauer . . . . . 1.3.1 Semigroup algebras . . . . . . . . . . . . . . . . . . . . . . 1.4 Algorithms for the Computation of Chern–Schwartz–MacPherson Classes and the Euler Characteristic: Helmer . . . . . . . . . . . 1.5 Some Current Directions in Coding Theory: Walker . . . . . . . 1.5.1 Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . 1.5.2 Goppa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5.3 New developments . . . . . . . . . . . . . . . . . . . . . . 1.6 Advances in Software in Numerical Algebraic Geometry: Brake . 1.6.1 solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Critical Points via Monodromy and Local Methods: Martin del Campo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.8 A lifted square formulation for certifiable Schubert calculus: Hein 6 7 7 8 9 9 10 10 11 11 11 12 12 12 13 2 4 August 2015 14 2.1 p-adic Integration and Number Theory: Kim . . . . . . . . . . . 14 2.2 Fast Scalar Multiplication in Pairing Groups: Ionica . . . . . . . 15 2.3 Pairings and Arithmetic: Schwabe . . . . . . . . . . . . . . . . . 16 2.4 Applications of Numerical Algebraic Geometry: Hauenstein . . . 17 2.5 Theta ranks for Matroids: Sanyal . . . . . . . . . . . . . . . . . . 18 2.6 Exact Algorithm for Polynomial Optimisation: Safey El Din . . . 18 2.7 Optimality Conditions using Newton diards and sums of squares: Sekiguchi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.8 Gap Vectors of Real projective varietes: Juhnke-Kubitzke . . . . 20 3 5 August 2015 21 3.1 Algebraic Codes and Invariance: Sudan . . . . . . . . . . . . . . 21 3.1.1 Codes and Algebraic Codes . . . . . . . . . . . . . . . . . 21 3.1.2 Combinatorics of Algebraic Codes . . . . . . . . . . . . . 21 1 3.2 3.3 3.4 3.5 3.1.3 Algorithmics of Algebraic Codes . . . . 3.1.4 Locality of (some) Algebraic Codes . . . 3.1.5 Aside: Symmetric Ingredients . . . . . . 3.1.6 Conclusions . . . . . . . . . . . . . . . . Root isolation: Yap . . . . . . . . . . . . . . . . 3.2.1 selective history . . . . . . . . . . . . . . 3.2.2 Pellet Predicates . . . . . . . . . . . . . Continuous Amortization: Intrinsic Complexity bsed ALgorithms: Burr . . . . . . . . . . . . . 3.3.1 Developments . . . . . . . . . . . . . . . Davenport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . subduvsion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6 August 2015 4.1 Algebraic Vision: Reka Thomas . . . . . . . . . . . . . . . . . . . 4.1.1 Fundamental Questions [HZ00] . . . . . . . . . . . . . . . 4.1.2 Two View Geometry . . . . . . . . . . . . . . . . . . . . . 4.2 Twisted Hessian Curves: Lange . . . . . . . . . . . . . . . . . . . 4.3 Computational algebraic number theory tackles lattice-base cryptolography: Bernstein . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Encryption based on card shuffle: Lee . . . . . . . . . . . . . . . 4.5 A class of constacyclic codes over Fpr + uFpr + vFpr + uvFpr : Bandi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6 Challenges in the Development of Open Source Computer Algebra Systems: Decker . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.1 First Challenge: Faster Algorithms . . . . . . . . . . . . . 4.6.2 Third Challenge: Making More of the Abstract Concentps Constructuve . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.3 Integration of Systems . . . . . . . . . . . . . . . . . . . . 4.7 Primary Decomposition and Parallelization: Schönemann . . . . 4.8 Criteria for Gröbner Bases: Gao . . . . . . . . . . . . . . . . . . 4.9 Modular Techniques in Computational Algebraic Geometry: . . 4.10 Computing Integral Bases of curves in small characteristic: Stillman 4.11 SIAM AG Business Meeting . . . . . . . . . . . . . . . . . . . . . 4.11.1 AG2017: Anton Leykin (Georgia Tech) . . . . . . . . . . 4.11.2 Also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.11.3 SIAM J. Applied Algebra and Geometry . . . . . . . . . . 21 22 22 22 23 23 23 24 25 25 25 26 26 26 26 28 29 29 30 31 31 32 32 33 33 34 35 36 36 37 37 5 7 August 2015 38 5.1 Progress Report on Geometric Complexity Theory: Mulmuley . . 38 5.2 Homotopy continuation versus Gröbner bases for parametric systems: Leykin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 5.2.1 Gröbner Trace . . . . . . . . . . . . . . . . . . . . . . . . 40 5.2.2 Parametric homotopy . . . . . . . . . . . . . . . . . . . . 40 5.3 Integral bases via localisationa nd Hensel Lifting: ?Lapaigne . . . 41 5.4 Gröbner Bases for Algebraic Number Fields: Decker . . . . . . . 41 2 5.5 5.6 Tropical Homotopy Continuation: Jensen . . . . . . . . . . . . . Lattices over Polynomial Rings and Applications to Function Fields: Bauch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7 On the Existence of Semi-Regular Sequences: Hodges . . . . . . 5.8 New Results in Linear Cryptanalysis of DES; Semaev . . . . . . 5.9 Enumeration and Gröbner Bases Methods on Solving Generic Multivariate Polynomial Systems: Yang . . . . . . . . . . . . . . 5.10 Hodge Theory for Combinatorial Geometries: Huh . . . . . . . . II ICIAM 2015 42 43 44 45 45 46 48 6 10 August 2015 49 6.1 Opening Ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . 49 6.2 Prize Ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 6.2.1 Buffa by Volker Mehrmann . . . . . . . . . . . . . . . . . 49 6.2.2 Majda by Felix Otto . . . . . . . . . . . . . . . . . . . . . 50 6.2.3 Coron by Alastait Pitt . . . . . . . . . . . . . . . . . . . . 50 6.2.4 Engquist by Kako . . . . . . . . . . . . . . . . . . . . . . 50 6.2.5 Li Tatsien by Yang . . . . . . . . . . . . . . . . . . . . . . 50 6.3 Revisiting Term Rewriting in Algebra: William Sit . . . . . . . . 50 6.4 New effective differential Nullstellensatz: Richard Gustavson . . 52 6.5 Solving Polynomial Systems . . . . . . . . . . . . . . . . . . . . . . 52 6.6 Computing Equilibria of semi-algebraic economies using triangular decomposition and real solution classification: Li Xiaoliang . 53 6.7 Triangular Systems over Finite Fields: Mou . . . . . . . . . . . . 54 6.8 Computing Decomposition. . . . . . . . . . . . . . . . . . . . . . . 55 6.9 Solving Parametric Polynomial Optimiation via Triangular Decompsoition: Changbo Chen . . . . . . . . . . . . . . . . . . . . . 56 6.10 Disovering Multiple Lyapunov Functions for Switched Hybrid Systems: She . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 7 11 August 2015 7.1 : Majda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.1.1 Ex 1: TBH . . . . . . . . . . . . . . . . . . . . . . . . 7.1.2 Ex 2: Lorenz 96 model . . . . . . . . . . . . . . . . . . 7.1.3 Ex 3: MMT equation . . . . . . . . . . . . . . . . . . 7.1.4 Stochastic Superparameterization . . . . . . . . . . . . 7.1.5 Extreme Events . . . . . . . . . . . . . . . . . . . . . . 7.1.6 Information Theory . . . . . . . . . . . . . . . . . . . 7.1.7 Lessons for UQ and Failure of Polynomial Chaos . . . 7.1.8 Inverse Problems and Data Assimilation . . . . . . . . 7.2 Filerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.1 Madden–Julian Oscillation (MJO) . . . . . . . . . . . 7.3 Grid and Grid Control Optimization in Europe — M2GI: Sax 7.4 Randomised ALgorithms in Linear Algebra: Kannan . . . . . 3 . . . . . . . . . . . . . . . . . . . . . . . . . . 58 58 58 59 59 59 59 59 60 60 60 60 61 62 7.4.1 Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.4.2 Matrix Sketching . . . . . . . . . . . . . . . . . . . . . . . 7.4.3 Distributed data . . . . . . . . . . . . . . . . . . . . . . . 7.5 Numerical Solving for Parametric Polynomial Systems with Constraints: Wenyuan Wu . . . . . . . . . . . . . . . . . . . . . . . . 7.5.1 Computing Real Witness Points: Wenyuan Wu . . . . . . 7.5.2 Numerical Solving Parametric Systems . . . . . . . . . . . 7.6 Algebraic attack and algebraic Immunity of Boolean Functions: Lin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.7 Davenport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.8 Extending Hybrid CSP with Porbability and Stochasticity: Shuling Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.9 An Application of QE to Automatic Parallelization of Computer Programs: Marc MM . . . . . . . . . . . . . . . . . . . . . . . . . 7.10 Modular Techniques for Efficient Computation of Ideal Operation: Yokoyama . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.11 From lexicographic Groebner bases to triangular sets: Dahan . . 7.12 Characteristic Set Methods for Solvig Boolean Equations: Gao . 7.12.1 Aside . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 64 65 65 65 66 66 67 67 68 69 70 71 72 8 12 August 2015 73 8.1 Stabilization of control systems: from water clocks to rivers; Coron 73 8.1.1 1D hyperboic PDE systems . . . . . . . . . . . . . . . . . 74 8.1.2 La Sambre . . . . . . . . . . . . . . . . . . . . . . . . . . 74 8.2 Computational Progress in Linear and Mixed Integer Programming: Bixby . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 8.2.1 Linear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 8.2.2 Mixed Integer . . . . . . . . . . . . . . . . . . . . . . . . . 75 8.3 On Convergence of the Multi-Block Alternating Direction Method of Multipliers: Yang . . . . . . . . . . . . . . . . . . . . . . . . . 78 8.4 Bounded-degree SOS Hierarchy for Polynomial Optimisation: Lasserre 79 8.5 Smaller SDP for SOS Decomposition: Bican Xia . . . . . . . . . 80 8.6 Applications of homogenisation in SDP relaxations of polynomial optimisation: problems: Feng Guo . . . . . . . . . . . . . . . . . 81 8.6.1 Minimise a rational function . . . . . . . . . . . . . . . . 81 8.6.2 Semi-Infiite Polynomial Programming . . . . . . . . . . . 81 8.6.3 Convex hulls of semialgebraic sets . . . . . . . . . . . . . 82 8.7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 8.8 Algebraic boundaries of convex sets: Sinn . . . . . . . . . . . . . 83 8.9 Symbolic-numeric Methods for Linear and Integer Programming: Steffy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 8.10 Problems on Symbolic Computation of Polynomial Equations in Wavelet ANalysis: Bin Han . . . . . . . . . . . . . . . . . . . . . 84 4 9 13 August 2015 9.1 Without Mathematics and Supercomputing, no Effective Risk Reduction of Natural Disasters: Qing-Cun Zeng . . . . . . . . . . 9.1.1 Computing Problems . . . . . . . . . . . . . . . . . . . . . 9.2 Software and applications for polynonial homotopy continuation: Leykin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.3 Bertini 2.0 and BertiniLab: Software for solving polynomial systems numerically: Bates . . . . . . . . . . . . . . . . . . . . . . . 9.4 Computing mixed volume . . . in quermassintegral time: Malajovich 9.5 Classifying Polynomial Systems Using the Canonical Form of a Graph: Yu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.6 Labahn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.7 Arnold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.8 Computing Approximate GCRDs of Differential Operators: Giesbrecht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.9 European Research Funding: ERC and Mathematics . . . . . . . 9.9.1 Bourguignon . . . . . . . . . . . . . . . . . . . . . . . . . 9.9.2 China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.9.3 Evaluation in ERC . . . . . . . . . . . . . . . . . . . . . . 9.9.4 Past Grantholders . . . . . . . . . . . . . . . . . . . . . . 85 10 14 August 2015 10.1 Applied Mathematics for Business Decision Making: the Next Frontiers: Kempf . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.2 Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.3 Towards a solution . . . . . . . . . . . . . . . . . . . . . . 10.2 Developments in Computer Algebra Research and the Next Generation: Yokoyama . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3 Lattice-based Analysis and Their Applications in Public Key Cruptanalysis; Morozov . . . . . . . . . . . . . . . . . . . . . . . 10.3.1 SarkatMaitra . . . . . . . . . . . . . . . . . . . . . . . . . 10.3.2 Pengetal . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.4 Mansfield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.5 Binomal Differnce Ideal and Toric Difference Variety: Yuan . . . 10.6 Differential Algebar and the muduli space of products of elliptic curves: Freitag . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.7 Differential Chow Varieties Exist: Wei Li . . . . . . . . . . . . . 10.7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.7.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 5 85 86 86 88 88 89 90 90 90 91 91 92 93 93 95 95 95 96 97 97 98 98 98 99 100 101 101 101 Part I SIAM Applications of Algebraic Geometry 2015 (not fully spell-checked etc.) 6 Chapter 1 3 August 2015 Opening remarks: 350 registered, biggest conference we have hosted here. 1.1 The Euclidean Distance of an Algebraic Variety: Ottaviani Theorem 1 (Spectral) Given a real n × n symmetric matrix A there exists a diagonal D and U ∈ O(nR) such that A = U −1 DU . The i-th column of U is an eigenvector with eigenvalue λi . Real matrices are a vector space with scalar product AB T . Theorem 2 (Spectral) Decomposition of operators form (for physicists). The variety of rank one matrices is the cone over the Segre variety P(Rm ) × P(Rm ). The Euclidean scalar product extends to the scalar product between rank one matrices. Then by linearity this extends to any rank. Theorem 3 Let ui be normalised eigenvectors of A. Then the critical points of the distance function from A are λi ui ⊗ ui An analogue extends to unsymmetric m × n matrices A. The critical points are singular pairs x ⊗ y of vectors of A and in particular they are al real. The number of critical points of the distance from general p ∈ iAn to X is called the Euclidean Distance Degree of X (ED(X)). The variety of rank one matrices is much better-behaved than general varieties. ED(X) = 1 ⇔ X is a linear space. Spheres have ED=2 and ED=2 implies X is a sphere (if smooth), or a few other quadric cones. Plane curves may have ED 2,3 or 4. 2 are circles or pairs of lines. See Apollonius. 7 Call the ED discriminant the locus of points u such that at least two critical points of the distance from u coincide. The ED discriminant of plane curves is a classical object, the evolute. When an ellipse degenerates to a circle, the evolute disappears to a point. Theorem 4 (Catanese-Trifogli) Let X be a variety with projective closure XsubsetPn =]An ∪ H∞ . let dim X = m. The ED degree of a general translate g · X ⊂ Pn is m X . . . Chern classes i=0 But Chern classes cannot distinguish the circle from the ellipse, so we need X to be transversal to the isotropic quadric. If the desingularization map is linear, the the Catanese-Trifogli formula can be applied with the Chern classes of the desingularization. In general we need to replace Chern classes by Mather classes (tricky, no software). Now replace the matrices with tensors. Theorem 5 The critical pints of the distance from a tensor t to X correspond to tensors (x1 ⊗ · · · xd ) such that t(x1 , . . . , x̂i , . . . , xd ) = λxi . For (2,2,2) we have 6 critical pints but for (3,3,3) we have 37, which is more than the dimension of the ambient space. Symmetric tensors are polynomials. 1.2 The Optimal Littlewood–Richardson Homotopy: Sottile This is all about Numerical Homotopy Continuation. ❼ Bézout Homotopy: optimal1 in the generic case ❼ Polyhedral homotopy. Optimal for Sparse systems with the BKK bound ❼ equation-by-equation with regeneration, as in Bertini But enumerative geometry problems aren’t usually square, and are well below BKK Bound. For me classical 19th century work by specialisation is just homotopy in reverse. Consider Schubert problems. The set of linear spaces having position α with respect to a flag of subspaces F is a Schubert variety Xα F . We are interested in counting points in Xα1 F 1 ∩ Xα2 F 2 ∩ · · · Xαn F n . 1 In the sense of never following a redundant or dead-end path. 8 Ravi Vakil’s interpretation of Littlewood–Richardson. Transforms the intersection of two Schubert varieties into a union of them. This is done via “checkerboard games” explaining how the flags interact. The aim is to end up with a diagonal checker-board, which [JHD thinks] means we can read off the solutions. He compares this with bubblesort. Simple example, then one where there are two checker-board patterns. There are three kinds of Homotopy. ❼ Geometrically constant (coordinate change) ❼ Simple Homotopy (subspace rotates with flag) ❼ Subtle Homotopy (read paper!) FS/RV/Jan Verschelde met several times over three years to write this down in terms of linear algebra. See [SVV10]. 1.3 Sparse Gröbner Bases: the Unmixed Case: Spaenlehauer ±1 See ISSAC 2014. f1 , . . . , fm ∈ K[x±1 1 , . . . , xn ]. What exact solutions in (K \ n {0}) . . By unmixed, we mean that 1 is a monomial and is a vertex of the Newton polynomial of the set of monomials. [KipnisShamir1999,Joux2013] in cryptology. Kushnirenko’s theorem states that the number of solutions is much smaller than Bézout.  ω n+d ) then FGLM O(nDEG3 ). General strategy is a grevlex basis O(m d 1.3.1 Semigroup algebras An affine semigroup S is a finitely generated additive subsemigroup of Zn containing 0 ∈ Zn and no non-zero invertible elements. Then we get semigroup algebras (toric rings) Usual concept of admissible ordering. ⟨LM(G)⟩ = LM(I) iff G is a Sparse Gröbner Basis of I. Let M be a finite “generating set” of S (not necessarily minimal). rankM (X s ) is the smallest integer k such that X s is the product of k elements of M . The rank of a polynomial is the maximal rank of its monomials. Mimic F5 by replacing “degree’ by “rank” The same theorems apply, and we can read off a sparse Gröbner basis from the row-echelon form of the Macaulay matrix of rank d. Shows huge (105 ) speedups in some examples over classical F5 , less (80) in other examples. Computing over a finite field. (n) Understand w.r.t. toric homogenisation: M (h) = {(s, 1) : s ∈ M }. If K[SM ] is Cohen–Macaulay, we have a theorem of Hochster . . . . Then the complexity of the FGLM-equivalent can have a similar bound. There is an extension of Fröberg’s conjecture in the Cohen–Macaulay case. 9 In positive dimension this is not easy, as the “lcm” of two monomials is a non-principal ideal. Might be related to [Stu95]. 1.4 Algorithms for the Computation of Chern– Schwartz–MacPherson Classes and the Euler Characteristic: Helmer Consider subschemes of certain smooth complete toric varieties XΣ . Work over k an algebraically closed field of characteristic 0. We will find χ (Euler) via cSM . This has useful functional properties. When V is a subscheme of ‘P n the class cSM (V ) can bethought of as a more refined version of the Euler characteristic since it contains the Euler characteristics of . . . . Need the Segre class. LetXΣ be an n-dimensional smooth complete toric variety defined by a fan Σ. Let R be the graded coordinate ring (Cox ring) of XΣ with irrelevant ideal B and assume that all Cartier divisors associated to generating rays are nef (needed for counting purposes). Also one technical assumption. We work in the Chow ring of XΣ . Write the Chow ring as A∗ (XΣ ) ≡ Z[x1 , . . . , vm ]/(I + J) where I is the Stabley–Reisner ideal and J is the ideal generated by all the linear relations of the rays Σ(1). Aluffi had an algorithm by blowups. Eklund/Jost/Peterson had a probabilistic algorithm by saturation. We had one by counting points. Moe/Qviller have one, with same nef-restriction. Let I be an ideal in R homogeneous with respect to the grading on R. Choose generators fi such that [V (fi )] = α ∈ A1 (XΣ ) for all i. Cut with (the right) general hyperplanes until we get something zero-dimensional. Claims stunningly better times for Segre classes (all in Macaulay 2). Can do degree 12 in P16 (over a finite field of course). His Bertini timings are much worse, probably an issue with his implementation, he said2 . How to get from Segre to CSM? There’s a formula (Aluffi) for hypersurfaces, then use inclusion/exclusion. But this needs exponentially many computations. 1.5 Some Current Directions in Coding Theory: Walker Introducer: speaker is famous for book on Algebraic Codes. Encoder is an injective map, the channel transmits a garbled version of this codeword, which the decoder has to 2 But a questioner made the same comment. 10 Theorem 6 (Shannon) Every channel has a capacity c such that for all RC and every ϵ > 0 there is a code of rate R such that the probability of error using this code is < ϵ. Hence “Shannon’s Challenge” — find this. Definition 1 A linear code of length n, dimension k and minimum distance d over F − q is a k-dimensional subspace C of Fnq such that any two distinct elements of C differ in at least d positions. d 1 k ≤1− + . n n n 1.5.1 Reed–Solomon Codes For k < n < q the Reed–Solomon Code of length n and dimension k over ‘Fq is C − {(f (a1 ), . . . , f (an )|f ∈ Lk }. 1.5.2 Goppa Suppose a curve X/Fq of genus g, P a set of points, G a divisor with supp(G) ∩ P = ∅ Then ‘f rackn‘ge1 − nd + n1 − ng . The rank distance between two codes has distance 21 of the distance between the matrices. 1.5.3 New developments ❼ Quantum codes. If C1 ⊂ C2 are linear codes of length n over F − q then there is a quantum code such as . . . ❼ Locally recoverable codes, as in node failure in a cloud. Replication is an expensive answer, so Facebook [TB14] uses Reed–Solomon (10/14 code: 10 data bits spread across 14 raw bits) with 40% overhead rather than 200% for replication. We want codes in which every symbol is a function of a small number of others.3 [There was a debate over why 200% rather than 100%: Speaker is quoting original paper. JHD subsequently: 100% would be simple replication, but that’s not ECC at all. See also https:// storagemojo.com/2013/06/21/facebooks-advanced-erasure-codes/.] ❼ MIMO interference, as in neural nets. Q Algebraic geometry codes? 3 JHD’s memory of the original talk is this. In 2015 a Facebook data centre is 40PB, made up of 1TB discs, so 40,000 of them. The Mean Time Between Failure of a disc is five year, say 2000 days. So 20 discs fail a day. each disc failure means recovering the 13 copies, so we are shipping 260TB across the backbone — as of course the replicas are in different racks. Call it 11 TB/hour, or 3GB/sec. That’s 24Gb/sec, which takes up a large chunk of 40Gb Ethernet. The speaker noted that disc sizes were growing faster than Ethernet bandwidth, so the problem was getting worse. 11 A I doubt it will be used for channel encoding. Introducer But see PQC. Q–JHD (afterwards) Aren’t locally recoverable codes really saying that the decoding matrix should be (uniformly) sparse. A Essentially, yes. That’s why LDPC (Low Density Parity Check) codes work. 1.6 Advances in Software in Numerical Algebraic Geometry: Brake Aim is to show developments since 2013. Defines this as “the use of numerical tools to study and use zero-sets of polynomials”. Want a bridge, rather than a wedge, with the symbolic tools4 . 1.6.1 solvers Bertini Interfaces with Macaulay2, Singular, MatLab. C under redevelopment into C++. Uses MPI parallelism. Does Numerical Irreducible Decomposition. Also doing bindings for Python scripts. Bertini 2 will be GPL3. Hom4PS-3 Has automatic multiple precision, MPI Parallelism GPU acceleration. Author: “Tropical geometry has inspired new . . . ”. NAG4M2 Runs inside Macaulay2. Again Numerical Irreducible Decomposition PHCPack Sage, Maple etc. Also GPU acceleration. Polynomial System Solver This has mixed volume computations and sparse condition numbers. Liddell etc. are looking at “how do you know you’ve got all the real solutions. Note also that lots of people are looking at GPU [VY15]. Quoted [GXD+ 14] as his favourite weird application. 1.7 Critical Points via Monodromy and Local Methods: Martin del Campo The critical point is where the Jacobian has full rank, and rank[∇Φu (x)T , · · · , ]‘lem. These conditions are additive so can assume X is irreducible. Note this re;ates to opening talk. The monodromy Group is the subgroup of Sd generated by permutations arising from lifts of loops. 4 JHD: see note 2. 12 1. Find one critical point: we use witness sets. 2. Find random loops 3. Trace test When should I stop? Sr−1 ‘subseteqSr ‘subseteqS: when are we at S? Theorem 7 ([Sommeseetal2003]) The trace of X with respect to ‘calLt is affine linear on t. Moreover the coordinate-wise sum of any proper subset of ‘calLt ‘cupX is not linear on t. Once we have found all the critical points over ‘C n for u we can find the critical points for u′ by parameter homotopies. 1.8 A lifted square formulation for certifiable Schubert calculus: Hein Schubert calculus is the study of linear spaces incident to fixed linear spaces. Example 1 (Four lines) Given four lines in P 3 , what are the lines that meet all. Generically, two. |w| = codimGr(a,n( Xw a Schubert problem is a list of Schubert condiPF . Then |wi | = dim(Gr(a, n)). In Plücker coordinates these are tions (wi ) such that heavily over-determined: problems for numerical methods. Our [HHS12] primal-dual formalisation is square but adds a ton of new variables. So we lift the problem from the Grassmanian to a more general flag variety. Example 2 Gr(3, 8): w = (3, 5, 8), then x must meet three conditions: dim x ∩ F3 ≥ 1, dim x ∩ F5 ≥ 2 and dim x ∩ F8 ≥ 3 (trivial). Theorem 8 (H–Sottile) This lifted formulation defines each Xw F as a complete intersection. Dimension+—Equation—=—Variables— Example 3 X(5,9,10) F ⊂ GR(3, 10). Deyerminental formulation has 45 degree 3 polynomials in 21 variables (10 linearly independent polynomials). Primal– dual uses 21 bilinear polynomials in 39 variables. Lifted uses . . . . 13 Chapter 2 4 August 2015 2.1 p-adic Integration and Number Theory: Kim Example 4 Polynomial equations in two variables. f (x, y) = 0 : f ∈ Z[x, y]. This is still an inaccessible problem. Call the solutions Xf (Q). genus 0 Can parametrise all solutions: method of sweeping lines. x2 + y 2 = 1  2 −1 2 is m m2 +1 , m2 +1 . genus 1 Birch–Swinnerton-Dyer conjectures. There is1 a finite set S of solutions such that all others can be generated from S by chord/tangent (elliptic curve arithmetic). The “algorithm” for finding S terminates if (the relevant port of ) the conjecture is true. genus≥ 2 The solutions are finite (Faltings). But there is no known algorithm for finding them. This is often known as “Effective Mordell Conjecture”. We want C(f ) such that all solutions have numerators/denominators bounded by C(f ). A precise enough version of the ABC Conjecture would yield such. • I am trying a non-Archimedean approach to this. So I want to descibe X(Q) ⊂ X(Qp ), via a non-Archimedean approach using p-adic analytic equations. Sometimes write R = Q∞ and write Qv for a general completion. P∞ Example 5 n=1 n! converges in any Zp . Open question: is it algebraic? Qp = Zp [1/p]. If p ̸ |n, then n ∈ Z× p . Zp has the topologyof a Cantor set: a fact that is probably under-utilised. X/Fp is a smooth projective variety. What is |X(Fp )|. Of course, we can use brute force here. So assume X is liftwable, ie. assume there is a 1 Mordell–Weil Theorem. 14 i smaooth projective scheme X /Zp such that X (mod p) ≡ X. Then Hcr (X) := i ∗ H (XQp , ΩXQp ) is the crysttaline cohooology. Then we have a Lefschetz trace formula: X |X(Fpn )| = (−1)i T r[ϕ . . .]n . i Profound, but very hard to use. In fact, can use any Grothendieck cohomology theory, in particular étale cohomology theory. But this is notoriously hard to compute. Kedlaya noticed that crysttaline cohomology is much easier because of the relation to differential forms. Example 6 X hyperelliptic with affine model y 2 = f (x) with f having odd 0 p degree d. Hcr (X) = Fp . The basis for the de Rham cohomology is {xk dx/y|O ≤ k ≤ d − 2}. Given any closed differential form, we can write it in terms of the 1 basis (Kedlaya has an algorithm for this). Then the action of ϕ in Hcr (X) is represented by the matrix (cij ). √ / Q. Note that −1 exists in Q5 , Q13 etc., even though ∈ Hasse–Minkowski Theorem, underpinned by Class Field Theory. There are local reciprocity maps: Recv : Q× v ↼ Gal(Qp /Qp ). Having done the preliminaries, let us look at p-adic line integrals. Z z dt/t : Q∗p → Qp . logp (x) = 1 For z ∈ 1 + pZp gives us a power series which converges. Then logp (u) = 1 p−1 Then define logp (p) = 0 and we get a group homomorphism: p−1 logp u ∗ logp : Qp → Qp . logp (z) = · · · as a consequence of local class firld theory. Consider the connection ∇ . . . . The thing that actually matters is the parallel transport operator Tbz = matrix. Sometimes known as Coleman integration. P∞ n Example 7 X = P1 \ {0, 1, ∞}. Then ℓk (z) = n=1 znl is only defined for |z|p < 1, but we can do analytic continuation. This relates to the p-adic dilogarithm via usual equations (different proofs!). There is currently a strategy in place for describing rational points X(Q) ⊂ X(Qp ). This is “Arithmetic Chern-Simons theory”. 2.2 Fast Scalar Multiplication in Pairing Groups: Ionica Let E be a pairing-freindly elliptic curve over Fq wher r||E(Fq )| and r|q k − 1, where k os the embedding degree. Then G ⊆ E(Fq ) and G2 ⊆ E(Fqk ). e : G1 × G2 → GT 15 is thefundamental operation. We need both this and multiplication in G1 G2 . We wuld like all this to be efficient! Multi-sclar multiplication: [s]P + [t]Q. Write S and t in binary with bits si tj . Precompute T = P + Q. For each bit we add one of P , Q andT . GLV: Assumethere is an efficient endomorphism ϕ : E → E : ϕ(P ) = [λϕ ]P . Then this makes multiplication faster. Example 8 Eα y 2 = x3 + αx. Assume q ≡ 1 (mod 4), let i ∈ Fq with i2 ≡ 1. ϕ : (x, y) → (x, iy) is an automorphism. Then the GLS construction (2009). There is also 4-GLV if we have two endomorphisms ϕ and ψ with different eigenvalues. Store 16 points, but sve 43 of the 17 doublins (and 32 of the additions. [LongaSica2009] require the eigenvalues to have good lattice reduction. Consider GLS curves defned over Fq2 with CM by a small D → 2 endomorphisms ψ 2 + [1] = 0, ϕ2 + [D] = 0 for points over Fq2 . Various friendly curves, e.g. KSS k = 18 uses 2-GLV in G1 and 6-GLV in G2 . No known one with 4-GLV in G1 . C1 /Fq : y 2 = x5 + ax3 + bx: Satoh curves. JC1 is the√Weil restriction of Ec /Fq2 : y 2 = x3 + 27(3c − 10)x + 108(14 − 9c) where c = a/ b. D = 2D′ Gives I2 : Fc /Fq2 → E−c /Fq2 . Vélu’s forumlae give this 2-isogeny explicitly. We also have ID′ , again with Vélu. Then ‘phi22 ± 2 = 0 and ϕ2D′ ± D′ = 0 for points defined over Fq2 . Table of Multiplication/Squaring counts showing, roughly, 20% improvement. Recipe for constructing such curves. 1. Pick discriminant 2. Search for m, n 3. take Hilbert polynomial and get roots in Fq2 4. . . . But these are not pairing-friendly. This requirement imposes additional constraints. Current work is applying these. 2.3 Pairings and Arithmetic: Schwabe [Naehrigetal2013a] and other work. However, pairing-based software doesn’t always depend on these for critical timngs. Pairing computation is often not the bottleneck (any more). There is a widely used benchmark: http://bench. cr.yp.to. Supports benchmarking of many primitives, but not pairing or other group arithmetic. Filling this gap is our aim. Need a C-API: bench does and everyone serious about performance wants this. In theory, everyone writes multiplicative, but we write additively. 16 Note that a major attack is via timing, so we are always interested in constant-time software. [Osvietalk206] stole Linux dmcrypt AES key. [BrumleyTuveri2011] took a few minutes to teal OpenSSL ECDSA key over the network. bgroup_g1e, bgroup_g2e, bgroup_g3e and bgroup_scalar. Parameters are byte arrays, but pack and unpack are explicit. Scalar and multi-sclar multiplication, but again constant time. Hashing versions into G1 and G2 . Note that the public and private versions are allowed to be different, since a datum should never be both! Also scalar arithmetic. This is not normally the bottleneck so only has constant-time versions. Also no non-constant-time version of pairings, for same reason. Reference version is 254-bit BN curve ([Aranhaetal2011]) Reference C implementation and AMD-64 version. Points are in Jacobian coordinates. Doubling is 2M+5S. This works for infinity as well. To make addition constant time, we compute P + Q and 2P , then choose which (makes it expensive2 !). Tried using [Hı10], but these actually have other special cases, so are not truly constanttime. Bos–Coster algorithm. Various figures: g1e_scalarmult: 347024 cycles. Pairing 2.6M cycles, but pairing product (n = 2) is only 3.8M, not 2 × 2.6M. Note that this shows that simple “pairing count” is naı̈ve. Examples of how to use: they all fit on one slide. http://cryptojedi.org/ papers/#panda. 2.4 Applications of Numerical Algebraic Geometry: Hauenstein One question: how do we know that we have all the solutions?. Many engineers wonder why? See [BlekhermanHauensteinOttenRanestadSturmfels2012]. We had the correct calculations for a Hilbert SoS case. This was numerical, and correct, whereas hand symbolic was wrong. [SommeseVerscheldeWampler2002]: For a union of irreducible, the centripd of interstecion points moves linearly. This is easy tosee for hypersurfaces. Showed example with 87K (but an exact number) of points, [HauensteunRodriguez] “fix” the trace test by taking linear slices in the Segre embedding, so the condition here is linear, Alt’s problem had 8652 solutions, but neded to add 23706 extra solutions to get the verified trace test: 32358. My favourite homotopy is local descent. Note that there is also modular local solutions followed by reconstruction to verify. See [Campo-Rodriguez2015a]. Example 9 σ8 (C3 ×C6 ×C6 ) [ChiantiniMellaOttaviani2014] proved at least six 2 There’s an internal-only version which only adds, for cases known to have P ̸= Q. 17 solutions. Have verified it’s actually 6, or more precisely 528·8! = 6·8!+522·8!, where the last element is terms at infinity. [. . . ]Littlewood’s problem of sevn touching cylinders. Bertini2 workshop May 23-25 at Notre Dame. Q Suppose there is no solution. A Gröbner then is often faster: run both/all and see which is first. Q How do we argue for Bertini rather than Newton? A Give examples where the convergence is so bad that a random choice will fail: easy in high dimension. [GriewankOsborne] 2.5 Theta ranks for Matroids: Sanyal [Change of title and subject given other talk.] The minimal degree necessary for hi such that any linear l(p) ≥ 0 for all p ∈ V a finite configuration. Lev(V ) depends only on facet-definiing linear functions. Lev(V ) ≤ k ⇒ T h(V ) ≤ k − 1 but the converse is not true. However, if T h(V ) = 1, Lev(V ) = 2. Matroid M = (E, B) has a finite ground set E, and B with B − 1, B2 ∈ B ∀e ∈ B2 \ B2 ∃f ∈ B2 \ B1 : (B1 \ {e}) ∪ {f } ∈ B. Theorem 9 The following three are equivalent. 1. T h(M ) = 1 2. M has no minor isomophic to four cases 3. M is constructed from uniform matroids by taking sums or 2-sums. 2.6 Exact Algorithm for Polynomial Optimisation: Safey El Din F = (f1 , . . . , fp ) ⊂ Q[x1 , . . . , xn ], variety V , , G ∈ Q[. . .]. All degrees ≤ D. G∗ = inf x∈V ∩Rn G(x) In the worst case, G∗ is an algebraic number of degree Dn . Example 10 [BaiZimmermann20112] suze optimisation of sextic polynmialsin the number field sieve. Degree 12 162 monomials. Coefficents of bit size ≈ 254. Output: 14 local minimizers very close and of large magintude, 200 digits needed to distinguish these points. 18 Quantifier elimination by CAD is doubly exponential and in practice limited to n ≈ 4 There is DO(n) [BPR06]. The key tool is polar varieties. From now on, we assume that G = x1 (this is wlog, since we just add another variable/equation). Let πi : (x1 , . .V . , vn ) → (x1 , . . . , xi ). Polar variety Wi−1 assiciation to (f1 , . . . , f )p) and πi . fi = 0∧ truncated Jacobian =0. W1 ⊂ W2 ⊂ · · · Wi with d = dim V (under regularity assumptions). W1 is the critical locus of the restriction of x → X1 (x) to V . Let Ci′ = Wi ∩ Sd V (X1 . . . , Xi−1 . Most of the time this has dimension1. The let ‘C ′ = i=2 Ci′ , and most of the time this has dimension 1. It contains W1 . Sd Let C = i=2 (Ci − W1 ). Up to a generic linear change of coordinates in X2 . . . , Xn ), C has dimension at most 1. [SafeyElDinSchost2004] has a topological invariance property. Canuse symbolic homotopy or geometric resolution. This is quadratic in intrinsic geometrical degree bounds and linear in cost of evaluation. 2.7 Optimality Conditions using Newton diards and sums of squares: Sekiguchi Theorem 10 ([Nie2013]) If a Hessian condition and some constraint P qualifications hold at each global minimiser of (POP) the f − fmin = σ0 + σi2 gi . S Let ∆(f ) = {α + Rn+ |α ∈ supp(f )}. Theorem 11 ([Vasiliev1977]) If lots of conditions, then f has an isolate zero at 0. I am interested in analogous results. R[x] 21 γ = {f : deg(f ) ≤ 12 γ}. P Theorem 12 Sufficient conditions for f ∈ R[[x]]2 are 1. Every vertex of Γ is even 2. . . . 3. . . . Theorem 13 Let f2m be the lowest homogeneous part of f . If this is a sum of P squares (bounded by m) then f is a SOS in R[[x]]2 . The problem is terms with odd degrees separately but even total degree. There seems to be a Newton polygon-based technique for massaging these terms. The key seems to be “binarily regular Newton polyhedron” conditions. Future work includes asking what sort of Newton diagrams have this condition. 19 2.8 Gap Vectors of Real projective varietes: JuhnkeKubitzke Recall “p is non-negative” “sum of squares”. How are these related. Theorem 14 (Hilbert 1888) Nonnegative p is a sum of squares if 1. p is bivariate (univariate non-homogeneous) 2. p is quadratic 3. p is of degree 4 in 3 variables In all other cases, there exist non-negative polynomails that are not sums of squares. Let X be a real projective variety, I(X) its ideal, R = R[xi ]/I(X), PX , ΣX = . . . When is P = Σ? Theorem 15 Iff X(C) is a variety of minimal degree. So we now ask when are the faces of PX and ΣX equal? For Γ ⊂ X, let P (Γ) be the set of forms of PX that vanish on Γ. Let ΣX (Γ) be the forms of ΣX that vanish on Γ. Theorem 16 Let Γ be a finite set of points. Let Y be the prohection of X away from Γ. Definition 2 Γ is independent if 1. ⟨Γ⟩ ∩ X = Γ 2. The points in Γ are projectively independent 3. ⟨Γ⟩ and X intersect transversally. Then we want to cosnider the dimensions of these P (Γ). Le gℓ (X) = dim P (Γ)− dim Σ(Γ) for 1 ≤ ell ≤??.   c+1 Suppose X has codimension c. Let ϵ(X) = − dim I(X)2 . Then 2 gc (X) = ϵ(X) and gc−1 (X) = 0 if X is a variety of minimal degree, else ϵ(X)−1. Also the gi are weakly increasing with i. Let g be the vector of gℓ . g = 0 iff X is avariety of minimal dgeree. g has only one non-zero component iff ϵ(X) = 1: then g = (0, . . . , 1). 20 Chapter 3 5 August 2015 3.1 Algebraic Codes and Invariance: Sudan This is an ex-coding theorist’s prespective. 3.1.1 Codes and Algebraic Codes n Linear codes over Fq . Encodingfunction E : FK q → Fq . The associated code C is the image of E. Reed–Solomon: regard message as a polynomial, and evaluate at n points. Reed–Muller: multivariate generalisations of Reed–Solomon. Algebraic–Geometric Codes: the domain is the set of rational points of an irreducible curve. 3.1.2 Combinatorics of Algebraic Codes Rate R(C) = k/n. Distance = δ(C) := minx̸=y d(x, y). Pigeonhole principle implies R(C) + δ(c) ≤ 1 + n1 . Note that Reed–Solomon can be made to hit this bound exactly. For Reed–Solomon and Reed–Muller, distance equates to scarcity of roots. In higher dimension there is a lot of underpinning algebar/geometry Stichtenoth etc. It is true, non-trivial, that there are infinitely many algebraic-geometric 1 . codes with R(C) + δ(C) ≥ 1 − √q−1 3.1.3 Algorithmics of Algebraic Codes Want efficient encoding: matrix-vector product, ehcih is generally efficient. Testing (“is it a code word”) is also easy. Decoding (with correction): given r ∈ Fnq find m with δ(E(m), r) minimal. This is not obviously easy. There are codes for which decoding is NP-complete. Let U ∗ v denote coordinate-wise product. For linear codes A, B ≤ Fnq , define A ∗ B = span{a ∗ b|a ∈ A, b ∈ B}. For every known algebraic code C of distance δ there is acode E of codimension 21 ′ ≈ d elta2n sich that E ∗ C is a code of distance 2δ . For Reed–Solomon this is algorithmic. Call (E, E ∗ C) an error-locating pair. Given r ∈ Fnq . 1. Find e ∈ E f ∈ E ∗ C such that e ∗ r = f 2. Find x̂ ∈ C such that e ∗ x̂ = f — againa linear system There is a solution to step 1 if dim E > |errors|. A list decoding abstraction is an increasing basis sequence, such as xi for Reed–Solomon. 3.1.4 Locality of (some) Algebraic Codes This will become more challenging. Want to perform tasks in o(n) time. Notethat we expect to corrects 2δ errors. Does correcting a linear fractio of errors require scanning the whole code? does testing? Deterministically: yes, but probabilistially, not necessarily. The codes I am talking about are less used in practice (yet) than the locallyrepairable codes of Section 1.5. Note that Reed–Solomon must require reading at least k elements. Reed–Muller is better. RM [m, r, q]]{(⟨f (α)⟩α∈Fm |f ∈ q Fq [x1 , . . . , xm ] deg(f ) ≤ r}. Restrictions of low-degree polynomials to lines n yields low-degree (univariate) polynomials. I have 1+m -locality. Locality implies small (local) cobstraints. Do these lead to local decoding: No!. Reed–Muller has a lot of transitivity so we need to consider Aut(C). If a code has l-local constraints and 2-transitivity the the code is l-locallydecodable from O( 1l )-fraction errors. Suppose my constraint is f (a) = f (b) + f (c) + f (d). To find f (x), we find a random π with π(a) = x. Then f (x) = f (π(b)) + f (π(c)) + f (π(d)). Recent progress /cpciteYekhannEfrmenko2006 3-locally decodable cods of sub-exponentail ength. Not great, but best we can do. [Koppartyetal2013] no(1) -locally decodable codes with R + δ → 1. 3.1.5 Aside: Symmetric Ingredients Message is a bivariate polynomial. Ecode f by evaluations of (f, fx , fy ) and the rate goes to 1 as we take more and more derivatives. 3.1.6 Conclusions Q Many cnstructions require large q? How about q = 2 A Restrict to the small input (as in BCH), or use concatenation of codes, i.e. code Fα 2 into Fq first. Q Finite fields only for the degree testing?? A Yes. 22 3.2 Root isolation: Yap “near optimal” is a code word in this area. Root isolation means finding ϵapproximations, i.e. an ϵ-disc containing exactly one root. Distinguish Global find all the roots Local those in a given region. 3.2.1 selective history Classical: Descartes etc.. Benchmark problem: isolate all roots of an integer polynomial F . Õ(d2 l) [Schoenhage(unpubl),Pan]. Based on circle method (global) but now have good bisection methods (local). Three bisection methods. 1. Sturm. Non-adaptive; limited to polynomials. 2. Descartes; Collins–Akritas. This is the method of choice for Computer Algebra [SM15] 3. Evaluation [BKY09, SY12] Does complex roots [SY11] Note that representing analytic funtions is a problem. Also whereas we have sqfr for polynmials we have no analogy. We need a replacement for the C1 (monotonicity) -predicate. Our tool here is Pellet’s theorem. We also need a replacment for sign evaluation. Given F : C → C, have F : C → C.. Should be conservative: F (B) ⊆ F (B), and convergent. For an analytic function, we want box functions fro all its derivatives. We will change the problem into root clustering. Descartes etc. rquire only simple zeros (in the box under consideration). To be unconditional, we allow a k-cluster to be k simple roots, a k-multiple root, or inbetween. A disc D is isolating for F if 3D \ D contains no roots. Then clusters are either disjoint or containing. n roots have at most 2n − 1 clusters. Root clustering problem: given a box B0 ⊂ C and find an ϵ-isolating system of cliusters for B0 . 3.2.2 Pellet Predicates Given k ≥ 0, reals r, K ≥ 1 Ck (m, r; K) : |Fk (m)|rK > K X ... i̸=k Lemma 1 (Pellet 1881) If Ck (m, r; k) holds then teh disc Dm (r) contains . . . Theorem 17 (Darboux) F : D0 → C be anaytic in D0 . . . . 23 Box version of Pellet. Ck (m, r; K) : . . . Define firstC(B, n) to return the smallest k ∈ 0 . . . N such that D(2k · B) is isolating. Then this gives a “split if necessary” algorithm. The problem is that uses exact evaluation: C. By “soft evaluation” we return A < B, A > B or 21 A < B < 2A. If C succeeds then C succeeds (but with different parameters) Use Abbott’s improvement of quadratic to give Newton–Bisection processes. If the multiplicity is k we use a k-step Newton. We can’t analyse the analytic algorithm in general but in the case of polynomials it is near-optimal. 3.3 Continuous Amortization: Intrinsic Complexity for subduvsion-bsed ALgorithms: Burr Prototypical: subdivision for real roots. Many multivatiate analogies. 1. How many subdivisions 2. bit complexity Challenge is that the algorithm is adaptive. The tree varies in depth and maxdepth is not the appropriate measure. Width is often used. Condition numbes are also used. Definition 3 f : R → R≥0 is alocal size bound if ∀x ∈ RF (x) ≤ min J∋x;C(J)false w(J) Doesn’t depend on onput interval. Measuses local worst-case complexity, We can count the number of sibdivisions by integating the local size function. R Theorem 18 (BurrKramerYap) B(I, f ) + 1 = 2dx F . It matches or improves all known techniques. Example 11 (Sturm) SSturm (J) = true iff J has 0 or 1 roots. So w(J) ≥ dist2I (x, R − roots(f )), distance to second-closest root. Get an expression in terms of ln(αi+1 − αi ) etc. DMM bound used for these gives equivalent of best results in literature. Let (X, µ) be a measure space. S a cllection of finite measure subsets of X. Input: I ∈ S, and a stopping criterion. Local Size bound ∀xinR : F (x) ≤ −minJ∈S;J∋x;... µ(J)   Z X g(K · . . .) g(µ(J)) ≤ max g(µ(i)), ... I J∈P Again, can match/improve literature’s bounds. 24 3.3.1 Developments Unequal-sized subdivisions. See [BC11]. Homotopy continuation subdivides the time division. From their paper we know the (lower bound on) size of interval that contains a point and he can regard this as a bound, and reconstruct their research. Continuous amortisation lead to intrinsic and geometric complexity bounds. Our complexity results are in terms of the actual geometry of the roots. [PlantingaVegter2004] subdivision-based curve approximation algorithm. 3.4 Davenport 3.5 Drew attention to Alicia Dickenstein conference August 2016. The previous talk had a lot of resultants! Introduced by Sylvester. Example 12 Square n × n system deg(fi ) = di . Consider Res1,d1 ,...,dn (1 − txi , f1 , . . . , fn ), the roots in xi . What happens in the sparse world? Consider n + 1 polynomials in n variables where Ai ⊂ Zn being the support of fi . What would we mean by sparse resultant? GKZ, Sturmfels. Given us irreducibilty, homogeneities, extremal coefficients etc. but we lose some geometric information. Self/Galligo/Sombra in AJM2014. Want Res{0a}.A1 ,...,An (t − xa , f1 . . . , fn ) for all a ∈ Zn . We define the resultant as the definitin equation of the direct image π∗ W . Example 13 A0 =1 = A2 = {(0, 0), (0, 2), (2, 0)}. Now the degree is always the mixed volume. We have a toric variety The classic resultant is connected withtheChwo form of thsi variety. We use Rémond’s resultant of cycles as a building block. LNM1752 2001. Define ResX (F0 , . . . , Fn ) such that if |X| ∩ V (F0 ) cuts properly, te ResX = ResX·Z(F0 ) The Poisson formula works always with no strange exponents. D’AndreaJeronimoSombra have generalised work of Sturmfels, which simplifies a lot. For systems with parameters, the degrees on the parameters are well-controlled. 25 Chapter 4 6 August 2015 4.1 Algebraic Vision: Reka Thomas problems in Computer Vision form the point of view of algebraic geometry or algebraic methods in optimisation. Today I will present joint work with Google. See book: Multiple View Geometry in Computer Vision. Hartley,R. & Zisserman,A., C.U.P., 2000. Definition 4 A camera is a (central projection) map from R3 to R2 . Example 14 (x, y, z) → ( fzx , fzy ). But move to P3 → P2 : have (x, y, z, 1) → (f x, f y, z). Now linear, so a camera is essentially a 3 × 4 matrix P of rank 3. The centre of the matrix is the right kernel. Write P = [A|b]. If A is non-singular we say that the camera is finite. Use ∼ to mean “equal in projection space”. So P = K[R|t] where K is upper triangular with positive diagonal. R is the rotation matrix. A camera is calibrated if we know K. 4.1.1 Fundamental Questions [HZ00] 1. Resectioning Given Xi ↔ x − i find P . 2. Triangulation Given Pi and xi find X that gets mapped to each xi (j) 3. Reconstruction xi find Pj and Xi . In practice all data are noisy, se we need MLEs. Depends on the noise model. 4.1.2 Two View Geometry Suppose x ∼ P1 X, y ∼ P2 X. There is a 3 × 3 matrix F of rank 2 such that y T F x = 0: the epipolar equation. 7 degrees of freedom. If the cameras are calirbated, ther is an essential matrix E: y T Ex = 0 where E has five degrees of freedom. 26 Theorem 19 (Projective Reconstruction) Suppose yiT F xi = 0. Then we can resocnstruct 2 cameras and the world point Xi up to a projective transformation unless the Xi lie on a livne joining the camera centres. Suppose we are given m correspondences (xi , yi ) ∈ R2 × R2 : does there exist a reconstruction. Let a be the vectorisation of the matrix A. R2 := {a ∈ P8C : rank(A) ≤ 2 : dimension7degree3. R1 := {a ∈ P8C : rank(A) ≤ 1 F = R2 \ R1 ) ∩ P8R = fundamental matrices. Let Z be the vectorisation of [xi ⊗ yi ]. Then the question sis whether kerR (Z) ∩ F ̸= ∅ rank(Z) = 9 No solution. rank(Z) = 8 Compute a = kerR (Z). ∃F ⇔ rank(A) = 2 rank(Z) ≤ 7 The intersection is non-empty but it might be entirely in R1 . rank(Z) ≤ 5 Almost always have one: details. rank(Z) = 6 Might or might not exist. rank(Z) = 7 Might or might not exist. Now what happens if we have calibrated cameras? σ1 = σ2 ; σ3 = 0. This is a variety E [Demazure1988]. This is cut out by 2EE T E − trace(EE T )E = 0, det(E) = 0. The complex E is a secant variety. Ec (Zariski closure) is irreducible: dimension 5 and degree 10. So we ask if E ∩ kerR (Z) ̸= ∅. Theorem 20 rank(Z) ≤ 4 → ∃E. For rank 8 we just compute {A} = ker and check the Demazure equations. 5,6,7 are the hard cases. X X 2 a2i,j = 4 Mi.j.k.l : M 2 × 2 minors There’s also a rotational formulation. The real question is hard: what about the complex form? Rank 5 always exists. For higher ranks we need the Chow form. Suppose V ⊂ PnC is irreduicble if dimension d. Let L ⊂ PnC be a linear space of simension n − d − 1. Usually V ∩ L = ∅. The Chow form of V , ChV (A) is a homogeneous polynomial in A of degree (d + 1)δ such that V ∩ L ̸= ∅ ⇔ L satisfies ChV (A). Shows an example in Macaulay 2: [Nister2004] KTH PhD uses ad hoc techniques on Demazure cubics. These days Gröbner trace techniques are used. Kukelova’s thesis does this in Android ’phones! [Sturmfels2014] Hurwitz form of a projective variety. V ⊂ PnC irreducible of dimension d and degree δ. Intersect with L linear of dimension d. Expect 27 δ points: when do we get fewer? This defines HV ⊂ GR(d, PnC ). This gives (Bürgisser) some useful information on the condition number of the reconstruction. Example 15 (Rome wasn’t built in a day) Project at Washington to reconstruct Rome from all its images in Flickr. First problem is doing the matching. Q Real points? A These are hard questions. Vision considers these problems solved in practice, as they are reconstructing objects that exist! 4.2 Twisted Hessian Curves: Lange Paper at http://cr.yp.to/papers.html#hessian, slides at https://www.hyperelliptic. org/tanja/vortraege/20150806-squished.pdf. Note that Google does use elliptic curve signatures. Note that we normally use large finite fields, and Weierstrass forms. Note the problem with addition if P1 = ±P2 , and special cases of infinity: special cases imply timing risks and bugs. Hence Edwards1 curves (example d = 30), where all points are equivalent.   ... x 1 y 2 + y1 x 2 , . (x1 , y1 ) = (x2 , y2 ) = 1 − 30x1 x2 y1 y2 1 − 30x1 x2 y1 y2 We say that the addition law is strongly unified, i.e. it can be used for doubling. For complete [no special caes at all] we need d to be a non-square, but this is a property of d that is relative to the field. Doesn’t worry us too much, provided we stick to the appropriate extension fields. Note [CC86]: much neglected. For some reason they missed Edwards curves. Weierstrass Edwards Jacobi Quartic Hessian Credited to Sylvester by [CC86]. [JQ01] 2(x1 , y1 z1 ) = (z1 , x1 , y1 ) + (y1 , z1 , x1 ). Claimed to be “unified”, but we still need to make sure that we do a rotation for every addition. We write H/k : ax3 + y 3 + z 3 = dxyz with a(27a − d3 ) ̸= 0. Use (0, −1, 1) as the neutral element. Addition still fails for doubling. But we have a variant: x′3 = z22 x1 z1 − y 2 x2 y 2 etc. involving a. This is a complete addition law if a is not a cube. If a is a cube, they have a strongly unified formulation. There is a very efficient tripling (no use for constant time encryption, but useful for signature verification etc.). Note that these curves have cofactor 3 in the order and this is the first time this has helped. [BL95, But note there are typos] on addition laws in standard formats. 1 Today is Harold Edwards’ 79th birthday. 28 Q Analogy for Edwards for hyperelliptic? A Not known. We have tried, but end up with genus 3. 4.3 Computational algebraic number theory tackles lattice-base cryptolography: Bernstein Note that the standard sales brochure for lattice-based is powerful. Problem 1 (Short generator) Take a degree n number field K. Given the principal ideal gØ find a short g. √ √ Examples: Q, Q[i], Q[ζn ], Q[ 2, 3]. Need Ø which might or might not be √ √ Z[θ], e.g. Q[ 5] has Z[ 1+2 5 ]. SVP is usually solved by LLL. But for large n, LLL finds short veectors, but not the shortest, and the gap grows exponentially in n. BKZ doesn’t actually solve this. [LaarhovendeWeger2015] ≈ 1.23n ([NguyenVidick2008] has ≈ 1.33n ). But we can exploit factorisation. Suppose we find α short but αØ ̸= gØ. Hence produce a lot of short αi Ø and do factor base work in the αØ/gØ. Only interested in α with smooth factorisations. Variation: just igore the gØ and factor αØ into small primes. Does every prime have generators? Also compute Ø∗ via generators. [SmartVercauteren????] “exponential time” quote. There are n ring maps ψi : K → C. Defibe Log : K ∗ → R∗ as (log |ϕi |),a nd then Log Ø∗ is a lattice of rank r1 + r2 = 1. Use CVP to find elements of Log Ø∗ close to Log gØ. Had a blog post about subfields and relevance. If we know Log normk:F g for such an F . Then this constrains Log u to a shifted sublattie of /LogØ∗ : constraints are unit rank of F . Example 16 ζ661 gives a maximal rank of 8 to be attacked. √ Example 17 Q[ 2, . . .] degree 210 , means the whole problem is trivial. Admittedly no-one’s proposed this field but all the old hardness arguments work for it! [Campbelletal2014a] shows a textbook attack on cyclotomics. The analysis is bogus, but the algorithm is very fast. Plagiarised by [Crameretal2015], which does the analysis correctly. [Song2015] produced a polynomial-time quantum algorithm. 4.4 Encryption based on card shuffle: Lee Consider block ciphers and the indistinguishability framework: adversary capable of making adaptive forward and backward queries. 29 Example 18 Credit card numbers. Need to transform to/from bit strings, but we’d rather have {0-9}16 transforms. Feistel networks are standard, but are only secure up to 2n/2 queries for a sufficient number of rounds. Credit cards are too small! Consider card shuffle: a Markov process whose mixing time is the number of rounds. We want it to be oblivious: trace one card ignoring the rest. Claims the Thorp [Crypto2009] this is secure up to 2n /n queries for O(n2 ) rounds. “swap or not” shuffle [Crypto2012] Chose a round key K ̸= 0 for {1, 1}3 . the cards at x, x ⊕ K are matched, and swapped or not as max(x, x ⊕ K). Can view this as choosing permutations. New construction “partition and mix”: For each elements, choose D − 1 distinct elements at random, and arrange elements in block. Need an “ϵ-alomst D . D-uniform” partition, and thsi reduces the number of rounds by log 1+ϵ But finding such partitions is not trivial. Definition 5 A family of permutations on N elements in perfect D-wise independent if it acts uniformly on tuples of D elements. However, there are no non-trivial subgroups of Sn for n ≥ 25 which are 4-wise independent. Alternative technique via Hamming codes. Can extend to [2s −1, 2s −s−1, 3]Hamming, which is 2D−n -almost 2s -uniform. Claims 60 rouns rather than 450 for the SN-shuffle. Conclusion: claims that this is useful for format-preserving encryption. 4.5 A class of constacyclic codes over Fpr +uFpr + vFpr + uvFpr : Bandi Classically we consider codes over finite fields. [Hammendsetal1994] initiated study over rings. Various authors have studied the title ring. Apparently several good codes have been produced over rings, better than over fields. Note that u2 − v 2 = 0 and uv = vu. Let τ : (c0 , . . . , cn−1 ) 7→ (δcn−1 , c0 , . . . , cn−2 ). Costacyclic means invariant under τ for a suitable δ. R[x] . This is a local ring (but not a chain) with maximal Let Rn = ⟨xn −(1+λu)⟩ ideal ⟨. . .. Can count all these constacyclic codes, and can produce the duals. Q Why is this ring interesting? A So far unexplored. Q What about efficient decoders? A Not solved, apparently. Q Why 1 + λu. A It’s a generic linear after scaling. 30 4.6 Challenges in the Development of Open Source Computer Algebra Systems: Decker In charge of the Singular project since 2009. I learned to use computer algebra via the original Macaulay. Numerical methods (e.g. Section 9.3) are important, but not the only answer. Report on OS software from the DfG priority project. Unlike 20 years ago, methods from cmputer algebra are now firmly established in the toolbox of the pure mathematician. A decisive feature of the current developments is that more and more abstract mathematical concepts are being made constructive. Algebraic geometry by itself is not sufficient. In this project, Malle has considerably strengthened Cohen–Lenstra, and I now call then Cohen–Lenstra–Malle. Demonstrates the Zbl citations for Singular by MSc categories. These days over half the citations are outside Algebraic Geometry/Commutative Algebra. Want to intertwine Singlaur, GAP and Polymake. I believe that Antic will become a major tool in number theory. 4.6.1 First Challenge: Faster Algorithms First need to convert curve into primary decomosition, hence factoring. Need lots of algrotiths as there is no universal one. Example 19 Phylogenetic modelling. Engelmann in Singular solved the problem: 26 CPU days and a GB with 416812 elements. Used a Hilbert-driven GB computation. Example 20 (Gröbner Bases over Number Fields) Use modular reconstruction, but choose primes such that the minimal polynomial factorises: many more smaller problems. Note this is a highly parallel problem. 1. Coarse-grained. Comparatively easy. 2. Fine-grained. This needs thread-safe, but optimal, memory management. A major project. GAP Largely done: see HPC-GAP. Developer nowmoved to Kaiserslautern. * Racing multiple algorithms. Needs Coarse-grained, and ParallelWaitFirst. There is also ParallelWaitAll. Note Villamayor’s constructive version of Hironaka. One major problem is choosing the “right” order of blowups. Example 21 (De Rham) Use the Weyl lagebra to compute the de Rham cohomology of complements of affive varieties. 31 But this needs the BGG correspondence [Bernstein–Gelfand–Gelfand]. Let V be a vector space of dimension n + 1 with dual space W . S = SymK (W and V E = V . We grade S and E by letting elements of W have degree 1 and V have degreee −1. Shows a session. Starts with GAP’s SmallGroup(1000,93). Then calls Singular from Gap, to get Tate resolutions. 4.6.2 Third Challenge: Making More of the Abstract Concentps Constructuve Aim: Fourier–Mukai transforms and their generalisations. 4.6.3 Integration of Systems One example already. Also shows interatcion with Polymake. Computes a GIT-fun from Polymake and Sigular. FLINT Important basic operations. ANTIC fast number feild arithmetic. HECKE an implementation of algebraic number theory in Julia. Also tools in tropical geometry essentially a piece-wise linear version. FAN computes tropical varieties, and trivial valuations. ATINT Tropical intersection theory. Shows an example involving Chow Rings and its TopChernClass. Q How does this relate to SAGE? A We want to conect systems together directly, rather than via the SAGE kernel. Q Representation Theory? A GAP’s Chevy system does something, but also Cohen’s Lie. Q Can you study memory-sharing as a Gröbern base problem itself. A Not yet! Q You showed many pictures: how do we produce them. A These pictures were produced via Greuel’s Imaginary: you should install these. surf.lib is the ray-tracing starting point. 32 4.7 Primary Decomposition and Parallelization: Schönemann This is a basic tool. Computers are not getting faster, just more cores. Hence a change of approach is necessary. Singular’s memory-management is very suited to GB, but is not thread-safe. Hence more common to use communication rather than memory-sharing. Classically: GB via CRT. Can use multiple threads in one processor for matrix operations (F4-style), as the sub-division is wellunderstood. MathicGB (Roune) computes GB’s via a matrix of machine integers. In general, have a multi-area scheme: some exclusive to a thread, some shared and lockable. Wu-Ritt Gianni–Trager–Zacharias Here we add a pre-rpocessing step. We need dimension hence need a GB. Actually use a factoring GB, since this will automatically contribute to the primary decomposition. In practice this gets us most of the way very often. However, this also imposes inequations. Therefore should treat lowest-degree factors first. Use work-stealing on the factors Eisenbud–Huneke–Vasconcelos Theorem 21 If I ⊆ R = K[x1 , . . . , xn ] ... We can’t yet parallelise the characteristic sets algorithm. Factorising Gröbner is implemented, but not in parallel. A good discussion on factoring, and JHD mentioned experience from [Dav87]. 4.8 Criteria for Gröbner Bases: Gao G is a Gröbner basis for I iff every polynomial h ∈ I is top-reducible by G. Not algorithmically testable, hence the S-polynomial criterion. Hence LCM criterion, [MMT92], then Faugère’s F4. [EderFaugere2014]: survey paper. X H := {(u1 , ldots, um ) ∈ Rm : ui gi = 0} is calle dthe syzygy module of {gi }. Want a term order ≺2 on Rm which is compatible with the order ≺1 on R. [Fau02] the signature of v is min{lm(u) : u.g = 0}. Reduce pairs (u, v) ∈ Rm × R by reducing the R part and tracking the changes in Rm part. We only reduce (u1 , 0) by terms of the form (u2 , 0). M := {(U, v) ∈ Rm × R : u.g = v} and have a concept of a string GB of M . Then the elements with zero R-part are a GB for the syzygy module, and the projection onto R are a GB for the original. 33 If both v1 v2 are non-zero then the J-pair consists of doing the S-polynomial computation on both components. Let T = max(t1 lm(u1 ), t2 lm(u2 )). Theorem 22 (us) The following criterai are equivalient. 1. G is a strong GB for M 2. Every J-pair of G is covered by G. [RouneStillman2012a] etc. all have rules about ”rewritable” when tlm(v2 ) ≺ lm(v1 and “added later tan” rule. The last is not mathematical. Note that we only store the signature lm(u) not the whole u. 4.9 Modular Techniques in Computational Algebraic Geometry: Rational reconsruction is an old idea. Preimage under the Farey map. This works as long as N is large enough, and none of the primes are bad. 1. Input modulo p is not valid 2. Algorithm fails (e.g. matrix not invertible) 3. Computable invariant is wrong (e.g. Hilbert polynomial). These primes are usually Zariski-closed in Spec Z. 4. Computable invariant with unknown value is wrong: only solution is majority voting. All (x, y) ∈ Λ which reconstruct correctly are in a straight line. If M (bad primes) are small enough, Gauss–Langange will find the shortest vactor, and its norm divides the bad primes (take these out). Hence this algorithm. 1. Compute Ip 2. Reduce P according to majority vote on LM (U (p)) 3. compute termwise CRT-lift 4. Lift U(N) to error-tolerant rational reconstruction 5. Test on a new random prime 6. Verify 7. If any stage fails, repeat p Example 22 I → I + Jac(I) where Normalisation: A is the integral close of A in its quotient field. 34 Example 23 Curve I = ⟨x3 + x2 − y 2 ⟩ Hence this algorithm. 1. Start from Ao = A and J Theorem 23 (GrauertTemmert) p Jac(I) = P1 ∩ · · · P + r is a primary Theorem 24 (201) Suppose J = decomposition, and A ⊂ B ⊂ A is the ring given by normalising Pi . Then i P A= Bi . Hence adjoint ideals. Q Worst error fraction? A Never occurs in practice! We actually start at laregst prime and work down. 4.10 Computing Integral Bases of curves in small characteristic: Stillman This is about embracing the bad primes. k is Fp or Fq , wth p small. f (x, y) is an equation of a plane curve (think irreducible). Monic in y of degree n. L; = k(C) = k(x)[y]/(f ). Assume separble. Let Ø ⊂ L be the integral closure of k[x] in L. Suppose P (x) ∈ k[x] is irreducible let Øp denote the integral closure of k[x](P ) in L. Ø is rank n free k[x]-module. Øp is a rank n free k[x](P ) module. If P 2 doesn’t divide the discriminant then ØP is trivial. o n (x,y) , . . . where the gi Definition 6 A partial basis of Øp is a set B = 1, g1pd 1 are monic in t of degree i, the fraction is integral over k[x], 0 ≥ d1 ≤ d2 ≤ . . .. Let L(B) be the k[x](P ) -spanPof B. B is a full basis if also L(B) − ØP . The delta invariant at P is δp = di . Example 24 F = y 9 (y − 1) + (x3 + x2 + 1)2 y + (x3 + x2 + 1)3 . 4 points in singular locus (one over the base field, Trager computed Ø via “round 2”. ALso [vH94] uses Puiseux series for large enough characteristic. [LeonardPellikaan2003]. Montes algorithm. If I can compute integral basis for Øx for f ′ ∈ k ′ [xy] with k ′ a finite extensin of k. . . . . General idea g ∈ Øx iff g p ∈ Øx since Øx = {g ∈ L|v(g) ≥ 0 for all valuations centred at x = 0}. 1. Start with a partial basis B of Øx which is Frobenius stable. 2. For the momemt, assume that k = Fp 35 3. Let M be the n × n matrix pf σ w.r.t. B. Since L(B) is Frobenius-stable, M is a matrix of polynomials 4. For c0 , . . . , cn−1 ∈ σ  c − 0b0 + · · · p  ...  5. Do this until L(B) = g ∈ x1 L(B)|g p ∈ L(B) : Frobenius-stable. * Nearly there: may need one more x. 6. Compute W1 the kernel of . . . A singular point above 0 always leads to a fraction: quite often we can compute these “for free”. f (x, y) = T S 2 + xSU + x2 V (x, y) where S, T, U ∈ k[y] and S is square-free and irreducible factor of T of multiplicity ≥ 2 does not divide U , then we have precisely the right fraction. 4.11 SIAM AG Business Meeting Jan Draisma chaired the meeting. Note that we have http://wiki’siam.org/ siag-ag/index.php/Main_Page. Note that you need to be added to the Wiki by a member. Conference numbers over the history: 307; 386; 350 (at this year). Biggest AGs are 1500, 500 is probably median. Smilar size to Discrete Math. Note SIAM fellows: 2014 Sturmfels and 2015 Charles Wampler. 4.11.1 AG2017: Anton Leykin (Georgia Tech) Beginning of August 2016. Duration 4 or 5 days — previous meetings were 3 21 days, but this is 5. We have a big airport in Atlanta. 25 minute subway to campus in 25 minutes. Many hotels in walking distance with discounted rates. Q Can we avoid competing with MAA MathFest: we have last two times. A Note that SIAM Conference is also around this time, and we can’t conflict with that. Q–Ottaviani MEGA is a conflict. A show of hands said that almost everyone present had been at a MEGA. MEGA 2017 will be in Nice in June. Alicia MEGA was even, but went to odd because of ISSAC. JHD But ISSAC is now every three years in Europe. We can live with 2017, but should think about 2019 if AG2019 should be in Europe. Note ICIAM 2019 is in Valencia. All Also overlap with CRYPTO in Santa Barbara in late August. 36 Sandra Possibly merge the two when AG is in Europe. Sturmfels/JHD Motion for the leaders of AG and MEGA to discuss. Fortunately there is intersection! Notably Jan Draisma himself. * A poll showed that about half the room would be going to ICIAM 2015. Note that we are recommending to SIAM that Georgia Tech be approved. 4.11.2 Also 2016 will be SIAM AM July 11-15 with AMS Invited Lecture by Sturmfels. SIAM also has funding for summer schools. We have 90 student members and 148 non-student. %age students is sligtly lower than SIAM average. However student members (of the AG) have been declining, attributable in part to a change in SIAM software. Academia is 84%, whereas SIAM average is 75%. 75% maths departments, 10% CS and the rest “other/none”. US is about 2/3 of the total. 4.11.3 SIAM J. Applied Algebra and Geometry Note that it is not formally an AG journal. Proposalwokred on by FS and TT. Proposal goes to SIAM Trustees this weekend.xs Q Open Access? A SIAM model (which itself is evolving). Q Can we add “Applied Topology”? A We should certainly reach out to that community. Q Editorial board, process, terms etc. A Being discussed. SIAM has guidelines. 37 Chapter 5 7 August 2015 5.1 Progress Report on Geometric Complexity Theory: Mulmuley [Ikenmeyeretal2015a] is the main reference. Problem 2 (The permanent verses determinant problem) The permanent of an n × n variable matrix X cannot be approximated infinitesimally closely by symbolic determinants of m × m matrices whose entris affice linear combinations of the entries of X if m is polynomial in n. This strengthens Valiant’s conjecture, but is reducible to looking for representation-theoretic obstructions. Let G = GLl (C) wheren l = m2 . Let λ : λ1 ≥ λ2 ≥ · · · ≥ λl ≥ 0 be a partition and let Vλ (G) denote the Weyl module (irreducible representation) of G. An obstruction (for given m and n) is a Weyl module Vλ (G) that occurs on a certain G-orbit closure associated with the (padded) permanent but not on the G-orbit closure associated with the determinant. Conjecture 1 An obstruction exists if m = poly(n). This implies the truth of the previous problem. Let H = GLm (C) × GLM (C). Let ρ denote the natural monomorphism from G to G = GL(Cm ⊗ Cm ) = GLl (C). Given partitions λµπ, the Kronecker π coefficient Kλµ is the multiplicity of the irreducible H-module Vµ (H) ⊗ Vπ (H) in he irreducible G-module Vλ (G) considered as an H-module via ρ. If λ is an obstuction for given n and m then 1. |λ| is divisible by m 2. the height (numbe rof non-zero parts) of λ is ≤ n2 λ 3. The rectangular coefficient kδ(λ),δ(λ) vanishes. 38 Note that these are necessary, not sufficient. But satisfying them is challenging enough. [Kirwan1984] the Kronecker cone for a given m is a polyhedral cone. BUt [Burgisseretal] (λ, δ(λ), δ(λ)) lies in the Kronecker cone, so can’t be proved zero this way. This shows we can’t use asymptotic techniques of algebraic geometry and representation theory on the Kronecker cone used to show the existence of vanishing rectangular Kronecker coefficients. If Vλ (G) is an obstruction for given m = na and n, then the partition trible (λ, δ(λ), δ(λ)) must be (ϵ, b)=exception in teh following sense: letting ϵ = 2/a and b large enough: wher (, µ, π) is exceptional iff λ =0 0 kµ,π 1. µ = π = δ(λ) 2. height(λ ≤ mϵ 3. etc. Hence our intermediate goal is to show that superpolynomiallly many exceptional partition triples (λ, µ, π) exist, as m → ∞, for any fixed ϵ > 0, with a large enough constant b depending on ϵ. Hard. Let’s relax condition 1 and just insist that µ = π, but not necessarily rectangular. Theorem 25 For an 0 < ϵ ≤ 1 there exists 0 < a < 1 such that, for all n, there a exist Ω(2m ) partition triples such that [various items which meet the relatxed goals above]. The proof uses the theory of NP-completeness. It explicitly constructs the obstructions. This theorem disproves the conjecture that KRONECKER is in P [unless P=NP, I suppose]. Note that deciding positivity of Littlewood–Richardson. coefficients is in strong P [Knutson;Tao]. Conjecture 2 (GCT6) There is a #P formula for the Kronecker coefficients. This is the complexity-theoretic version of the clasical problem of finding a positive rule for the Kronecker coefficients. analogous to the positive Littlewood– Richardson. rule. All positive rules known so far for restricted classes of Kronecker coefficients. (such as Littlewood–Richardson) are for subclasses of partition triplies of type P. The following result provides the first known instance of a positive rule for Kronecker coefficients. for a subclass of type NP. Theorem 26 There is a #P formula . . . 39 The next aim is to extend this explicit proof strategy to . . . , but the problem is the “GCT chasm”: the existing EXPSPACE versus P gap in the complexity of derandomizing Noether’s Normalisation Lemma for explicit varieties. Note that, in fact we only need rectangular Kronecker coefficients. Q Can you explain NNL? A Another lecture, but note that if we could solve permanent/determinant, we should close the chasm. 5.2 Homotopy continuation versus Gröbner bases for parametric systems: Leykin Given ϕ ∈ K[px]m and V ⊂]Ap = Spec(K[p]) such that, for a generic p∗ ∈ V the set of solutions ϕ−1 (p + ∗) is finite, “get” this set. 5.2.1 Gröbner Trace This of a parametric or comprehensive GB of I = ⟨]phi(p, x)⟩. There is an open Up ⊂ V and G ⊂ K[p, x] such that P (p∗ , x) ⊂ K[x] is a GB for all p∗ ∈ Up . But actually computing a comprehensive GB, so we use Gröbner trace ideas. This is a procedure which evaluates the coefficients of G(p0 , x) ⊂ K[x] for a given p ∈ V , which are rational functions in p0 . We only tae extensin when we “solve”. 5.2.2 Parametric homotopy Classically, V is the dense open subset of Ap . Generally 1. Take a generic (codim(V )-plane L ∈ Ap 2. Find a structured witness set V (ϕ) ∩ (L × Ax ) ⊂ Ap × Ax 3. Given p0 ∈ V , pick a general L0 ⊂ Ap that contains p0 4. Deform from L to L0 . Example 25 (Vision) X is projected by three calibrated cameras R1 = I, R2 , R3 ∈ SO3 , and centers C1 = 0, C2 , C3 . There is related work (Kileel) on calibrated trifocal varieties. Use the Cayley parametrisation of SO3 , and two matrices means six parameters. Write down a map Proj(K[X, C]) × SO3 × SO3 → (P2 × P2 × P2 )4 in some affine charts. dim(C) = 23, dim(V ) = 24, ∂ ′ phi is of full rank, so we have a codimension 1 variety. 40 A vision problem is minimal if a generic fiber ϕ−1 (y) is finite and the number of points and cameras is optimal. [HoltNetravali1995] for four points in 3 views, |]phi−1 (y)| = 1 for a generic view. Homotopy Take a real line L1 ∈ Ay containng y1 witha known solution and moving it to a real L2 containing y2 works often if Y1 , , y2 are “not too far apart”. Complex L1 , l2 (in fact L1 ||L2 ) work even better. If single-path tracking succeeds, homotopy takes ≈ 0.1 seconds. But using the whole witness set (4000 points) is slow, and evaluation of ϕ and its derivatives is the bottleneck: problem with Macaulay2 currently. Gröbner Computation of ⟨ψ(y0 , r) rank for exacty0 takes ≈ 1sec (unfeasible). In Macaulay2 use GroebnerBasis by Roune, with Strategy=>"F4" option, which beats Faugère’s F4. 5.3 Integral bases via localisationa nd Hensel Lifting: ?Lapaigne Let A = k[x1 , . . . , xn ]/I where I is a prime ideal. x ∈ Q(A) iff it satsifies a monic equation. A = set of integral elements in Q(A). Example 26 On y 2 − x3 , y/x is integral, but y/x2 is not — consider Puiseux series around x = 0. An integral basis is a se of k[x]-module generator sfor A. 2 Example 27 I = ⟨y 3 = x2 ⟩. IB 1, y, yx . Factorisation is ring of Puiseux series. Therefore valuations and integral exponents = minplaces γj vj (y). So we localise at the various singular points. If Pi is a singular point, let P (i) (i) A = A. APi = APi Then Note that f ∈ k[x][y] can be factored in k[[x]][y]. But need to use CRT to reconstruct the answer from the different fi . Q Are the bases triangular? A At the places Pi — yes. And at the end. 5.4 Gröbner Bases for Algebraic Number Fields: Decker JHD observes that this seems to be [BFDS15]. As I said yesterday, we are revisiting basic algorithms. Given I ⊆ K[xi ] where K = Q[α]. We think of I˜ ⊂ Q[X, t] with f added. We know about modular/CRT Grp̈bner bases. 41 However, we also choose primes such that f factorises, so we have two levels of CRT-ing. Let S = Q(α)[X] and T = Q[X, t]. Fix a global product order ≻K = (≻1 , ≻2 ). Given H = {gi (X, α)}. Theorem 27 Let G̃ be the reduced GB of I˜ wrt ≻K . Then if I˜ = ̸ 1 ... [Noro2006] observed that we get many tb X a which slow down the process. He therefore went monic in Q(t)[X]. Open question for us: what is a “good” factorisation? Definition 7 Take p dividing no (numerator or denominator) coefficient in the input f . Also [presumably f sqfr]. Then p is admissible. Let fip be the factors of f (mod p). Definition 8 We say that p is admissible of type B if the sizes of G̃i,p and G̃j,p coincide. Definition 9 Let I˜ be as above. Then p is lucky iff LM(G̃p ) = LM(G̃). This can only be etsted a posteriori. Use majority voting [IPS11] and then use CRT and rational erconstruction to produce a G̃. Randomly chooose an additional prime p and check that I˜p reduces correctly an vice versa. Theorem 28 ([Arn03, Pfi07]) If we are homogeneous, if I˜ reduces to zero w.r.t. G̃ and if G̃ is the reduced GB of ⟨G̃, then I is the GB required. Table of experimental data. Magma is mostly slow/timeout (on his examples!). New algorithm (on 32 cores) is significantly faster than the sequential nonmodular algorithm. Q-JHD How many primes? A 12 such that there are at least three factors of f modulo p, then 12 more such and so on. 5.5 Tropical Homotopy Continuation: Jensen Goal: mixed volume computation. a ⊕ b = max(a, b); a ⊙ b = a + b. Tropical polynomials are piecewise linear. For f ∈ R[x1 , . . . , xn ], the “tropical hypersurface” is defined s T (f ) := {ω ∈ Rn : maxi (ci + ⟨ai , ω⟩)} where its attained twice. P Q Volume λi Ci ) is a polynomial, an dthe coeficients of λi os the mixed volume. BKK: The number of solutions is . . . . Why is this tropical? To compute the mixed volume of Newton polytopes we find a subdivision of the Minkowski sum using a suitable lift. Description of homotopy: divergence, collison do we find isolated solution? ALl these problems arise tropically. 42 Input Polynomials Output Isolated SOlutoins Tropical variant Input Output tart with knwon volumes and their tropical hypersufrtace, how does this evolve. The regular subdivisons of conv(A1 )+conv(A2 ) correspond to Cayley configurations. Wrte u ∼ v if they induce the same regular triangulation of conv(A). Inspired by Gröbner fan ideas. Question: which inequalities guarantee the existence of a given cell. Can we treat each mixed cell separately? We track the cells as we change the coefficients. As we evolve, cells can split, and paths can collide. We use Reverse Search ideas [AvisFukuda]. Regeneration [HauensteinSommeseWampler2011]. First solve a linear system. Do this for enough linear l1 and interpolate to solve f1 = l2 = · · · = ln = 0, and continue. This is what to tropicalise. I know the mixed volume of simplices = tropical lines. Shows an evolution (note via discrete transformations) from this to desired state. Note several competing ideas, including [Mal14] — first tropical method. Shows Cyclic n. Li 2007 and Li 2011 (both use random floating-point lifts) scale by ×8–9 as n increases by 1, Malajovich by 4–5, me 5–7. My parallel (16 threads) seems to be 4–11. To JHD, Malajovich’s times looked generally the best. Q–Malajovic? There are two algorithms in my paper: one guaranteed and one random. Which one? A I’m not sure. * The times were actually from the “guaranteed” version of Malajovich. 5.6 Lattices over Polynomial Rings and Applications to Function Fields: Bauch Let C/Fq be a smooth curve determined by y n + a1 (x)y n−1 + · · · an (x) = 0. Hence Jac(C). For elliptic curves, Jac(E) ≡ E. In general, how do we do arithmetic in Jacobians? Consider F = F (c) := Fq [x, y]/(f ). f assumed irreducible and separable. P PF is the set of places of F/k. Let P0 (F ) = P(F ) \ P∞ (F ). DF = { f inite λP P : P ∈ P(F )}. Denoting classes by [D], then [D1 ] = [D2 ] is dim(L(D1 − D2 )) > 0. 43 Let Ø′′F = Cl(Fq [x], F ) the finite maximal order. Q Also ØF,∞ . Write a divisor as finite+infinite and represent a sum of two ideals Q∈PF,0 Q−aQ and infinite equivalent. Define degree of a rtonal function |a/b| = deg a − deg b. A basis is reduced if ||a1 b1 + · · · || = max |ai bi | for all ai . There is a reduction algorithm. o n v )z)+vP (D) . Define || · ||D : F → −inf ty ∪ Q by ||z||D = −/limP ∈P∞ (F ) p e(P/∞) Theorem 29 (ID , || · ||D ) is a lattice., and a reduced basis has . . . Let sm(D) := sm(D, || · ||D ). Definition 10 D1 and D2 are isomentric if same sm. Hence isomery class. If I have an A-basis B)0 and an orthonormal B∞ then . . . . If r ∈ R and D′ −D+r(x)∞ Then this corresponds to the lattice xr ID , ||·||D − r). Theorem states number of arithmetic operations: O(n5 (h(D) + n2 Cf )2 + n5+ϵ Cf2+ϵ log q. Theorem 30 Let B be a set of F having n leements. It is aFq [x−1 ](x−1 ) -integral pasis of ØF,∞ iff F s w-semi-reduced. So if we make our sums w-semi-reduced we have good arithmetic. Q Plane curves only? A So far yes. 5.7 On the Existence of Semi-Regular Sequences: Hodges These correspond to systems of equations that are the hardest to solve for GB. Experimentally, most systems are. But we cant prove anything that corresponds to this. Systems of equations over a finite fields (generally F2 ). pi (x1 , . . . , xn ) = βi . In genrla the ones in crypto are not smei-regular. See [BardetFaugèreSalvyYung]. Intutively,the polynomials are as independent as possible. Assume x2i − xi ‘f oralli. Definition 11 Let λ1 , . . . , λm ∈ B be a squence of homogeneous elements of positive degrees di and I = (λ1 , . . .). The sequence is smei-regular over F2 if ro all i = 1, 2, . . . , m   B 7→ λi : ... The truncation of a power series is immediately before the first non-positive coefficient. Theorem 31 (Bardet. . . ) The sequence is semi-regular iff the Hilbert series  n (1+z) is Q(1+zdi ) . 44 Data: 20 sets of homogenepus quadratics, for varous m, n. Most combinations had 100% semi-regular. Can’t even prove they always exist. Conjecture 3 1. For fixed m, the semi-regular tend to 0 as n → ∞ 2. As n → ∞ the proportoinof sequence so flength n that are semi-regular tends to 1. 3. As n → ∞ the proportion of all sequences in n variables that are semiregular tends to 1. Proved 1 and 3: no progress on 2. Keep m = 1 and fix degree. Varies dramatically on whether n − d is odd (often 100%) or even (sometimes 0%). If d = n, n − 1 then all elements are semiregular.  Can  prove there are no semi-regular of degree d > n/3. If n − d = 2s n and is odd, there are no semi-regular. s Conjecture 4 If n − d is odd, most sequences are semi-regular. Have a result on when elementary symmetric polynomials are semi-regular. In particular when d = 2k . . . . Problem 3 Letπ(n, d) be the proportion of sequences that are semi-regular. Show this → ∞. Also, what about Fq ? 5.8 New Results in Linear Cryptanalysis of DES; Semaev EK (Pi ) = Ci is encryption. Assume a lot of Pi , Ci pairs. QN Average number of sides in the final equation s/approx2rank(J) i (−αi ). 242 plain/cipher blocks and some approximations. Success probability seems o be 0.89. Experimental verification for 8-round DES. Note that this isn’t limited to DES. (But he doesn’t discuss how to find approximations.) 5.9 Enumeration and Gröbner Bases Methods on Solving Generic Multivariate Polynomial Systems: Yang M Q(m, n, q) problem: find a solution to a system of m quadratic equations in n variables over Fq . More precisely. For any probailistic Turing macjone A trying to solve a MQ systems with randomly-drawn coefficients where m/n = c + o(1) and sub-expoential functions η(n), the probability that A returns the correct answer in time η(n) is negligible. [Patarinetal]. 45 “If (name==Faugère) then use F5, else use F4 in Magma” (except that Jintai Ding claims MutantXL). For F2 , brute force is often the best, otherwise anymptotically XL with sparse solver is best and for large fields with c > 1 then XL with sparse solver is often best. XL was first suggested [Laz83], rediscovered by [Courtoisetal2000Eurocrypt]. Let T (D) = {} and T := |T (D) |. Multiply every equation by every monials as long as degree ≤ D. Then solve linear equations. If we expect 1 solution, we can use sparse solvers. Claims that you can throw away rows at random (to get a sparse system) without losing solutions [JHD: surely this is obvious: a row is an extra equation]. Claims that XL2 [CourtoisPatarin2002] — suppose that we only manage to eliminate the toplevel monmials then multiply prepeatedly by others.  If we assume usual regularity conditions then #monomials= [tD ] (1 − tq )n (1 − t)−(n+1) . Also #free monomials equation. Note that he is talking about generic equations, so this isn’t HFE etc. Courtois+Pieprzyk overclaimed efficiency of ZXL in2002. [Bardetetal2004] derives D = (0.0090 + o(1))n for F5. [Bettaleetal2008] suggest guessing 0.45 of the variables. [Bouillaguetetal2013] brute force attacks on F2 run very well on GPU/FPGA. Claims that you may think GB overtakes enumeration at 200, but we think the hardware effects actually moves this closer to 400. Record holder for MQ challenge III (m/n = 2, F31 ) are us, using XL with Wiedermann. 32 days on 64core AMD 6282SE (4 sockets) with 512GB RAM. Conclusion: Brute Force is probably the best way even for quadratics, an certainly for higher degrees. 5.10 Hodge Theory for Combinatorial Geometries: Huh Three fundamental ideas: 1. A matriod is apiecewise linear object — tropical linear space [Sturmfels]. 2. Hodge structure on the cohooly of projective toic varieties produces fundamental combinatorial inequalities [Stanley] 3. g-conjecture for polytopes can be proved using the “flip connectivity” of simplicial polytopes of given dimension [McMullen] So consider a graph (vertices and edges). χg (q) =#numbr of proper colourings of G with q colours. For a square we get q 4 − 4q 3 + 6q 2 − 3q. always a2i ≥ ai−1 ai+1 . (5.1) Can build up graphs, which proves polynomiality etc. However, this doesn’t explain (5.1), because this isn’t preserved under addition. Matroids id a set of sets, which are called independent. 46 1. every subset of an independent set is independent. 2. If A, B are independent, and |A| > |B| then there is an element of A which adde to B keeps it independent. n + 1 size of M the ground set r + 1 rank = Not obvious to construct. Let G be a graph, base set is edges, and a set is independent if it’s not a circuit. Of let A be a finite set fo vectors in V . Then “independent” = “linear independent”. Fano matroid is realisable iff char(k)=2 and non-Fani matriod iff ̸= 2. NonPappus matroid is not realisable over any field. So ask how many matroids are realisable over a field. Conjecture 5 0% of matroids (limit as n → ∞ are realisable. Stated as an easy exercise in an early book! When k = Q realisability is Holbert’s 10th problem. Conjecture 6 (Rota) Define χM (q) = χM \e (q)−χM/e (q) for a matroid. (5.1) still holds. Theorem 32 Any noncontant homogenepus polynomial h defeines a sequence of milnor numbers µ0 (h), . . . , µr (h) with the following properties: 1. µi (h) is the number of i-dimensional cells in a CW-model of the complement D(h) := {x ∈ Pr | . . .} 2. . . . Consider the n-dimensional permutohedron, the convex hull of an orbit of the symmetric group Sn+1 . In a recent work with . . . , we obtained inequalities that demonstrate Rota’s inequality. Let X be a smooth projective variety of dimensionr, and k ≤ r/2. Let C k (X) b ethe image of the cycle class map in H 2k (X, Q). Then Grothendieck’s conjectures say that 1. Hard Lefschetz: Any hyperplane class defines an isomorphism 2. Hodge–Riemann: any hyperplane class ℓ defines a definite form of sign (−1)k . . . P Ak (M )R × P Ak (M )R → Ar (M )R ∼ R Any structure that has these is said to be “like a smooth projective variety”. The toric variety of ∆M is in the realisable case, ‘Chow Equivalnt’ to a smaooth projective variety. Itis tempting tothink of this as a Chow homotopy (but when the base field is C, we must remember that it isn’t!). For any two matroids on [n] with the same rank, there is a diagram of “flip” from one to the other: each “flip” preserves the “Kahler package” above. Define the cohomology . . . [he said “don’t read these slides!”]. Then his Main Theorem is indeed that Hard Lefschetz: and Hodge–Riemann: are valid. So why does this imply (5.1)? 47 Part II ICIAM 2015 48 Chapter 6 10 August 2015 6.1 Opening Ceremony Attended by Vice-President of People’s Republic of China, Minister of Education, President of the Academy of Sciences and President of Council of Tsinghua University. We are united in believing that our mathematics is applicable outside the world of mathematics. Applied Mathematics might once have fitted into a single syllabus, but those days are long gone. Our member societies include Optimisation, Mathematical Biology, and Computer Science. Over 3100 delegates as of this morning. 6.2 Prize Ceremony Prizes are ✩5000, contributed by various societies, including the UK’s IMA, Collatz Annalisa Buffa Lagrange Andrew J. Majda Maxwell Jean-Michel Coron ICIAM Pioneer Björn Engquist ICIAM Su Buchin Li Tatsien 6.2.1 Buffa by Volker Mehrmann “The use of highly suphisticated mathematical techniques in computer simulations” is the citation. Since 2004 Research Director CNR (Pavia), also ERC Starting Grant. First worked one electromagnetics: both analytic (Sobolev spaces) and a general framework for coupled problems such as magneto-elesticity. 49 Then isogeometric analysis. Can we bring the methods of splines and NURBS as primitives in the discretisation of PDEs? First isogeometric GPL-licensed code. 6.2.2 Majda by Felix Otto I always went to his Courant lectures on turbulent convection. Went in three years from Assistant to Full Professor at UCLA (1976–78). “Remarks on the Breakdown of Smooth Solutions for the 3-D Euler Equations”. This paper asked the question “if something does wrong, what”? Local existence theory doesn’t answer this. They show that ∇ × u has to blow up. “Absorbing Boundary Conditions for the Numerical Simulations of waves” (with Engquist). Require the constions to be local and to lead to a well-posed systems. Need pseudo-differential calculus for the locality. This comes up with a clean communicable result: three conditions wih increasing angle of incidence. 6.2.3 Coron by Alastait Pitt Prize is for “originality in applied mathematics”. “Highly sophisticated and novel mathematical techniques.” Control Theory began with Maxwell’s own apper “On Governance” (1860). 1992: fundamental paper in control systems. In finite dimensions, most systems can be stabilised by time-varying feedback laws — “Coron’s return laws”. Proof of controllability of Euler and Navier-Stokes, despite the fact that linearised Euler is not controllable. These controllers are now being used to regulate the Meuse in Belgium. 6.2.4 Engquist by Kako Siminal qoek in numerical methods for wave propagation in unbounded regions by introducing the absorbing Boundary Condition (ABC) or Radiating Boundary Condition (RBC). The Essentially Non-Oscillatory (ENO) sheme is used in industrail problems. Also Heterogeneous Multiscale method (HMM). 6.2.5 Li Tatsien by Yang Major textbook, regarded as a model in China, and first two volumes translated into English. Directs Chinese Undergraduate Contest in Modelling, which has had a major influence on curricula 6.3 Revisiting Term Rewriting in Algebra: William Sit My co-authors ave used these ideas to characterize Rota-Baxter type poerators. 50 k is a commutative unity ring (usually, but not always, a field). An algebra is a free associative k-module. A rewritingsystem is a set v wirh a binary relation →. A rule a → b is just a pair (a, b0. Wite → ∗ for the transitive reflexive closure. Define a → ∗b1 ; a → ∗b2 as a fork, and if every fork Theorem 33 (Newman’s Lemma) A terminating RS is confluent iff it is locally confluent. The symmetric closure of → is ↔. Usual stuff on term algebras (largely skipped). Fix a k-basis W of V a free j-module. For f ∈ V the support of f is the set of w ∈ W appearng with nonzero coefficients in the basis-expression of f . We are concerned with RS w.r.t. a fixed basis W . We therefore think of →⊂ W ×V , i.e. only basis elements get reduced by rules. Let T be the set of elements of W that actually get rewritten. We extend the rewriting system from T to the whole of V as →Π . We say that the sytem is simple if t+̇v for all t →v . Example 28 W1 = {xy, x, y}, W2 = . . .. Let Π = {x → y}. Lemma 2 1. f →Π g; 2. (f − g) . . . 3. . . . Then certain inferences, bt counterexamples against all others. Theorem 34 The following are equivalent. provided →Π is simle. 1. →Π is confluent 2. ↓Π is transitive 3. JHD couldn’t get this (12 items in all) 4. There are three key arrows that require “simple”. (l) may not hold for nonsimple. But “joinable” is not actually transitive. f and g joinable to g1 x + z, g and h to g2 , and g1 and g2 aren’t joinable. But f and g are!. A local base-fork is (ct →Π cv1 ; ct →Π cv2 ). Theorem 35 If Π is lcolly base-confluent, it is base-confluent. A minimal descebdant chain is the shortest from fron f to t. “Every time one introduces a new concept of standard bases, one neds new defintiins and theorems (but generally the same proofs) — Mora”. This should simplify this problem. 51 6.4 New effective differential Nullstellensatz: Richard Gustavson Is a system of polynomial partial diffential equations consistent? Example 29 ux −vy = 0; uy −vx = 0; (uxx +uyy )2 +)vxx +vyy )2 = 1. Simply regarding this as a polynomial system is consistent, but not when we differentiate. How often? Q P Differential ring, and order(θ = ∂xiii ) is ii . Let K{yi } be the ring of differential polynomials. Concept of “differentially closed” Theorem 36 (Weak Differential Nullstellensatz) Let K be a differential field of characteristic 0. For F ⊆ K{yi }, we have 1 ∈ / [F ] iff. for all differentially closed L ⊆ K, there is (ai ) ∈ Ln such that f (a1 , . . .) = 0. Let F have derivatives of maximal order d and degree h. Let F (b) extend F by all its derivatives up to order b. So an effective Differential Nullstellensatz would be a bound b(m, n, h, d). Example 30 F = {y ′ − 1, y d } needs to differentiate d times. So b(11, 1, d) ≥ d Extensions: b(m, n, d, h) ≥ dmn h r Theorem 37 (Sadik1985) A lower bound h2 where h = r + r  r−1 h−2  + 8. First upper bound is due to [Gri89]. Triple-exponential and first-order systems only with a single derivations/ [GKOS08] Ackermann-based. [DJS15] Theorem 38 where αT =  α+T T  k ≤ (nαT −1 d)2 O(n3 α3 ) T and T is to be defined. Uses a lemma [Pierce2014]. [FS14] use this to produce a recursive construction i for T .t = t(mn(2i h)) as in Pierce. Define T = Thm,n with Thmn = 2t(m,n,(2 h)) . b(1, n, h, d) ≤ (n(h + 1)d)2 O(n3 (h+2)3 ) which is [DJS15] but allows for non- constant coefficients. Shows some enormous figures for m = 2, 3. T = 22 · · · was one example. Have some improvements on [FS14]. 6.5 2520 +520 + Solving Polynomial Systems . . . Gives an n-variable 0-dimensional system, the output should be isolating boxes, and a Tt (X) ∈ Q[x] which defines the xi -values. Example 31 In two-D . . . 52 Lots of GB and RC methods. LGP bivariate: do a shift such that t Our system LUR requires a different shift. We produce a root candidate box by interval methods. For multivariates, first reduce to 2-D by resultants, Then isolate in 2D, and produce candidate root intervals inR3 , Shift such that two projections onto R2 are disjoint. Q How do you construct a random sample with mutliple roots? A Discriminants of surfaces (?). Q-MMM How do you do n > 3? A Complex description. Q-MMM Regular Chains now has a C version. A But doesn’t that require radicals? Not necessarily. A RC is always radical, but can represent non-radical systems. 6.6 Computing Equilibria of semi-algebraic economies using triangular decomposition and real solution classification: Li Xiaoliang [Joint work with Dongming Wang] Multiple equilibria are a problem for classical theories of economics. Pi (uj , xk ) = 0; Qi (uj , xk )σ0 where σ ∈ {<, ≤, >, ≥, ̸=}. Numerical problems have drawbacsk: instability, and are infeasible for multiple equilibria. [KublerSchmedders2010] uses Shape Lemma, also papers that use numerical homotopy. “Our methods are not new: we are rewriting RUR to make it accessible to econimists. In practice redoing [KublerSchmedders2010] in regular chains rather than GB. Example 32 x3 − 20y 2 = 0; y 2 − 2x − 1 = 0; x − y ̸= 0; 2x − y ̸= 0; y > 0. 1. Let x < y. Regular Chain for equalities (easy). T . Let T ∗ = Tx=x+y then decompose and get a chain T1 and T2 where T1 is univariate in x and T2 is now linear in y. Can always get such a “quasi-linear” system. 2. Back-substituting the linear variables gives a set of constraints in x alone. 3. Use the modified Uspensky Algorithm to isolate the roots of all the inegualities. 4. Then test sanple points to know which intervals satisfy the inequalities, and then see where T1 has zeros. But what abut parameters. 53 Example 33 1. Let u < x < y. Get three regular chains now. T2 = {ux, y 2 − 1}. T1 is the “main branch”, i,e, greatest dimension. 2. Then again make a linear transformation. 3. Then need to define border polynomial which divides the patrameters space into regions. 4. Take sample points of parameters space, and test these in the full system as before. Example 34 (Exchange Economy [KublerSchmedders2010]) u11 (c) = 9c− 29 1 2 2 c u12 (c) = 4 . . . [two parameters]. The sqfr BP has degree 25 and 249 terms. There are three equilibria when R0 There is a small rgion in R2 where this happens: probably not found by chance. Example 35 (Duopoly) Customer can buy from A, B or neither. Customers have identical preferences AssumeUA > UB > U0 > 0 are the utility functions for owning A B etc. Proposition 1 There is a Cournot equilibrium with f racR1 R2 < 1 UA −UB 3 UA −U0 . Original proof was opaque. Q When did semi-algebraic equilibria occur? A Papers cited, but in practice most are, Q Have you encountered problems you can’t solve? A Lots! 6.7 Triangular Systems over Finite Fields: Mou Triangular iff mvars are distinct. Saturated ideal sat(T ) := |langleT ⟩ : ( Qr i=1 Ii ) ∞ Definition 12 A triangular set is simple iff forall i = 2 . . . , n and aassociated prime p of sati−1 (T ), the image of Ti in (K[x1 , . . . , xi−1 /p)[xi ] under the natural homomorphism is square-free. Note that (K[x1 , . . . , xi−1 / sati−1 (T ))[xi ] is not necesarily a IFD. Nowever our triangular representtation is a good representaton of algebraic extensions. So, after decomposing F into triangulars, we decompose the triangulars into simple sets. Hence by induction we want the “square-free” part of a polynomial in (Fq (x1 , . . . , xi−1 ]/ sat(Ti−1 )[xi ]. Quotes as not a UFD. Note that sqfr over finite fields is harder [GT96]. Qp 1 In the 0-dim case we have “generalised sqfr decomposition”. Q i=1 Pi where Q is a p-th power. 54 . For the positive dimensional-case we turn u into a parameter. [Kal98]. But the computation of radicals in positive dimension and positive characteristic. This is hard. Note [Sei74] and the Condition P requirement, See also [FGT02]. What is a squarefree decomosition over an unmixed product of field extensions? Iff all the images over the components are sqfr, and the components are fields. We have anew algorithm 1. square-free decomposition plus D5 2. pth power identification: multiple derivations (new) 3. pth root extractuon via linear systems and Condition P This is a new algorithms for simple decomposition. Q Complexity result? A Always hard for triangular systems. Also uses D5. MMM We should have written up our D5 results. [DMSX06]. Q A 6.8 Computing Decomposition. . . Let K be a field. K the algebraic closure. K[x]/I a finite o-dim ideal. Definition 13 Dec(I) = {σ ∈ Sn |F (tσ(1) , . . . = F } is the decomposition group. Example 36 F = (t1 + t3 )(t2 + t4 ) has decomposition group F4 1. Dec(]langleT ⟩) is up to the Galois group of F [Anaietal1996]. O(n4 ). 2. There is an O(n3 ) algorithms by increasing chains of groups 3. We give a new algorithm: no complexity. Proposition 2 Under the above conditions, dots Definition 14 ZeroK (I) = {P1 , . . . , PN } with Definition 15 Si , Sj ∈ S are I-equivalent if Si = Sj . ∼I is an equivalence relation. Lemma 3 (4.5) The map Ψ : K[x]/I → is an endomeophism. Lemma 4 Si ∼I Sj iff gi (λ) = gj (λ). 55 Theorem 39 Let QsPI = {Bk ⊂ {1 . . . , n}|k = 1, . . . , s} with Bk = {n1 , . . . , ns } Then Dec(I) = k=1 Sym(Fk ) New algorithm: 1. Compute a Gröbner basis of I 2. Compute each mxi 3. Compute the characteristic polynomial fi of each xmi 4. Construct the decomosition 5. use above theorem. Application. ZeroK (ψσ (T )) ⊆)Zero(T ). Triangular decompsition of Cyclic-5. Algorithms give 15 sets. We get a union o f three sets ψ1,4 etc. Q You use GB - any chance of using triangular sets here? A Somewhat confused 6.9 Solving Parametric Polynomial Optimiation via Triangular Decompsoition: Changbo Chen Applicaton: Ecological Driver Assistance System. The Model Predictive Control is basically solving lots of optimisation problems, but these are really one parametric problem. Minimise f subject to equations fi , inequalities gj ≤ 0. Note that it is possible for optima to be at infinity. CADs — naturally described by a tree. A strong projection algorithm (Collins, Hong) may use too many polynomials, but a ewaker one (McCallum etc.) may fail. Introduce a new variable z to denote the optimal value, Add equatoinal constraints z − f (umx) = 0 Eliminate x > z > u. Eliminate with equalities and inequalities. Output the cells with smallest z value in each u-cylinder. Note that this will tellus about caes where the minimum is not attained as well. We also have [JHD missed this] to see whather the KKT condition is valid. We need to exploit the structure of the MPC problem and the KKt condition to combine this with RC-CAD. Q–JHD Exploit structure? A A lot of the conditions are linear, so could use Fourier–Motzkin. Q–JHD But doesn’t RC-CAD do qute well in the linear case? A Yes, but still does more work than we would like. 56 6.10 Disovering Multiple Lyapunov Functions for Switched Hybrid Systems: She Two critical problems are safety verification and stability anaysis. Stability is done by constructing transitions that are suually sued for safety verification. So we will look at asymptotic stability. Definition 16 A switched hybrid system has N subsystems (modes) For each mode i there is an ODE ẋ = fi (x). The state space is X ⊂ Rn . Also there are switching functions into different modes. We want to use RRC to verify the existence of a multiple Lyapunov function. The family {Vi (x) : i ∈ M } is called a multiple Lyapunov function. (each vi (0) = 0 and . . . [Standard Lyapunov definition?]). 1. For each ode i (a) Let Xi be St i j=1 {x|Ei,j x ≥ 0} Ei,j is an n × n matrix (b) Let Vi be a quadratic form and write Vi (x= xT P x . . . 2. Piece together. So we use real root classification to under-approximate the constraints in out theorem. Formulate these under-approximations as a semi-algebraic set. The algorithm got very involved here. We have a set of semi-algebraic sets from the various conditions. There is atheorm that states that,n if one satsifies all these semi-algebraic sets, then it is a MLF. Example 37 3D Eachs subsystem is asymptotically stable. The linearisation has two eigenvalues with real part 0.. We gte anya nswer. MI can’t apply becaus eof the eigenvalues, and SOS doesn’t terminate in five hours. As well as efficiency, note that LMI and SOS use floating-point, so have inherent problems. Note that QE could be applied, but is doubly-exponential, while this method is an adaptive CAD where some variables can be eliminataed. Q In RRC do you need to make a recursive call into the variety of the border polynomial. Since the RRC output is the truth outside the border polynomial. [led to a discussion in Chinese with Changbo] A Apparently use the “finder” interface. [??] Q A 57 Chapter 7 11 August 2015 7.1 : Majda Climate Science is an extreme Complex System. Probably 10M or more unstable directions with a huge sate space. We need both statistical and applied mathematical skills together. We have to cope with model error: lack of physical understanding and inadequate resolution due to the curse of ensemble size. The computational cost of genrating even a small number of ensemble members is overwhelming. Therefore we need uncertainty quantification (UQ) bounds for 1 and 2. Therefore a new paradigm: Rigorous Math Theory Qualitative or Quantitative models ↙ ↘ 7.1.1 ↘ Crucial Improved Understanding of Complex Systems Novel Numerical Algorithm ↙ Ex 1: TBH [MajdaTomoleyevPNAS2000] on the Truncated Burgers-Hopf (TBH) equations. Consider the finitie Galerkin truncation of inviscid Burgers equation. Statisticl predictons are equipartition of energy. correlation scaling law (large scales decorrelate more slowly), no separation of sclares. R This is confirmed in sumulations R with 40 odes. The Hamiltonian is actually uL ambda3 , not the energy ( u2Λ ). We use thsi for dta assimilation as well. 58 7.1.2 Ex 2: Lorenz 96 model duj dt = (uj+1 − uj−2 )uj−1 − uj + F . epeeninDepending on the forcng value F the system will exhibit completely different dynamic features. Can be weakly chaotic, strongly chaotic or turbulent. Miros mid-latitude baroclinic waves along midlatitude circle. nbergy of weather moves eastward but individual (Rossby) waves move westward. Been used for UQ modelling. 7.1.3 Ex 3: MMT equation iut = |∂x|1/2 u + λ|u|2 u − iAu + F . Consider focusing nonlinearity λ = −1. The instability of collapsing solitons radiate energy to large scales. If you try to run with too few modes, you lose energy. But he has a trick (eddy terms) to restore this, and therefore beat the curse of ensemble size, 7.1.4 Stochastic Superparameterization 1. A general framework for stochasric subgridscale modelling with no scale separation. 2. Success in a difficult test problem. 3. . . . 7.1.5 Extreme Events [NeelinetalGRL2011] CO and CO2 distribution in the atmosphere has bit fat tails compared with Gaussian. We want exactly solvable test models which display intermittency. [MajdaGershorinPhilRS2013]. This model shows the “exreme event” behaviour and fat tails that we observe. [MajdaXinTongNonlineatirt2015] have a rigorous PDF which dislays intermittency. Thes eoccur when the random mean flow U (t) gets close to a certain resonant set. 7.1.6 Information Theory We can look at Shannon Entopy. Relative entropy quantifies the lack of information or model error in the statistics of uM relative to that of u. What we’d like to do is take the current climate and compute the response to forcing. Example of a perfect model and an imperfect one. They can predict the cimate perfectly but get the response to forcing completely wrong. Equilibrium statistical fidelity is a necessray condition. Combine the information theory with linear response theory in improving predictive fidelity. Want a linear response operator calculated through correlation functions in the unperturbed climate. 59 7.1.7 Lessons for UQ and Failure of Polynomial Chaos [MajdaBranickiDCDS2012] u̇ = (−γ+σγ ξ)u+f (t) where parametric uncertainly is σγ ξ . . . . It is easy to solve exactly. Both PC with 120 coefficients and MC with 50,000 smaples will fail to predictthe variance with any accuracy. 7.1.8 Inverse Problems and Data Assimilation Swows sample points in Atlantic. Firts rigorous math theory [NanChenMajdaNonlinearity2014JNLS2015] Inherent nonlinearity in measurement. Build exact closed analytic formulae for the optimal filter for the velocity field. Prove a man field limit at long tmes. To recover incompressible flows need an exponential increase in the number of tracers for reducting the uncertainly by a fixed amount. We have a rigorous mathematical model with comparable high skill in recovering GB modes . . . . 7.2 Filerting A two-step porcess involving statistical prediction of the state variables through a forward operator followed by . . . . Finite ensemblke Kalman filter (EnKF) often works well to estimate the mean when ensemble size is much smaller than phase space. Why? There is a surprising pathology with catastrophic filter divergence. For filtering forced disspative systems such as L96, EnKF can explode to machine infinity in finite time. [HarlimMajda2008]. Wellposedness of EnKF is an issue. We need a priori estimates for . . . . We look for energy principles inherited by the Kalman filtering scheme. We need modificatoin schemes for EnKF. 7.2.1 Madden–Julian Oscillation (MJO) Starts in the Indian Ocean. Affects El Nino Australian and Asian monsoon tropical cyclones and midlatitude predictability. Rossby wave trains from this croos middle USA. This has slow eastward propagtion at 5 m/sec. Peculiar dispersive relation dω dl ≈ 0. MJO is actually an envelope of smaller-scale convection waves. GCMs typically don’t adequately represent convectively coupled equatorial waves and the MJOs. Needs Nonlinear Laplacian Spectral Analysis. We apply this to datasets 106 in dimension. Four ideas: lagged embedding; machine learning; adaptive weights; spectral entropy criteria. Have a traiing period and predictive period for MJO1 and MJO2. hese both have exreme events and fat tails. We have observed variables and hidden variables for stochastic damping and phase. 60 We would like (and see) that our ensemble spread captures the long-range forrecast uncertainty. [MajdaStechmann2009PNAS] have a new model for the MJO, which caputes all three features: as above plus horizontal quadrupole structure. Neutrally stable interatcions between palnetary-scale lower-tropospheric moisture and . . . . Minimal nonlinear osciallator model. Linearised primitive equations: equatorial long-wave scaling and Coriolis term: equatorial β-plane approximation. Ad dymanic equation for convective activity. 2011-12 massive effort to study MJO. There fore replace the ∂t a = Γqa by a stochastic jump process. We get ntermittent egenration of MJO events plus organisation of MJO events into wave trains. We obsrve 39.7 days as average duration. and our skeleton model predicts 34.8 days. There are squall lines at 200km sclare CCW at 2000 km and MJO at 20,000 km, Why? [Majdo2007JAS]. Paper son multicloud Model Dynamics. Good models run with 160km (v. coarse) resolution. 7.3 Grid and Grid Control Optimization in Europe — M2GI: Sax Introduction: do you realise that the gas energy moves far more energy than the electricity grid. Speaker: Gas represents 25% of Europe’s energy/ 2/3 of this comes from Norway or Russia. These costs 1Meuro/km. There will be shortfalls from NL due to a recent court decision there. Shows pipeline network in Europe. Also extensions into Algeria via Sardinia. Tunisia via Sicily, Morocco via Spain etc. Also across the Black Sea from Ukraine to Turkey. Open Gas Europe . . . lots of statistics. Mentions NorthStream from Russia to Griefswald. “yestrday, al their troubles seemed so far away” — gas was vertically integrated, and mathematically the optimisation problem was soluble, Inthe 1970s we wrote programs using physics, thermodynamics etc. Mathematically, these used tools like Reynolds numbers, Darcy–Weisbach equation etc. But the EU did not like the huge profst from trading, and forced the companies to unbundle. This left “security of supply” no-one’s problem. 2009–15 have demonstrated the issues this causes (e.g. 2011 there was zero gas flow at Waidhaus. which normally provides most of the gas for Germany). There were also shortage/low temperaturs problems in February 2012. Gas storage provides no security. The gas providers use their storage to pursue profitable trading. Graph (in German) of the output of a porous reservoir storage. Above a critical withdrawal (50%), the efficiency declines seriously. Until 2014 network planning was more-or-less “y hand”. Scenarios were simulated by standard software, but this was limited. Gas notwork operators have obligations: 1. guarantee safe and reliable operation 61 2. non-discriminatory 3. transparent 4. at competitive prices 5. refusal of access requires a well-founded justification. Therefore an entry/exit model. Offered capacities. booked capacities, nominated capacities. Thetransport company has to guarantee that any combination of entry/exit points is technically feasible. Even is one assumes this is reasonable, ths is not mathematically well-defined. Therefore we have discrete decision, nonlinear equations giverning gas physics. The MATHEON project ealt with optimisation of gas transport and stable transient modelling and simulation of flow networls. We had a large research project ForNE: 10 universities and 10 employees from Germany’s operator OGE. Book “Evaluating Gas Network Capacities”. “With a little help from my friends” — our new target is a navigation system for control sstem decision in avolatile gas market gered to 24–48 hour time frame. MODAL AG was led by ZIB to offer the gas industry computing kernels and a sustained researh effort. Funded by German Ministry of Educationa nd Research but a lot of industry support. This closes the gap between research and sueful deployment. ZIB’s past track record was important here. Part of the gas in the network is used to supplythe energy for transport, and therefore this should be minimised. A 10% reduction here is equal to one nuclear power plant! Notethat a permanent risk is that a decision taken in the past will lead to a problem in the future. Such a solution [MODAL] would provide early warning of problems/ Algorithms would be able to find solutions for control problems that hmans can’t find. This should increase the capacty of the network. M2GI “More Mathematics in the Gas Industry” is the only way of maximising the provision of freely allocatable capacity, of optimising the grid and grid control to handle this . . . . 1. Research should be given the necessary time 2. Grass does not grow faster if you pull it 3. “a good start needs enthusiasm a good end discipline” 4. “Mathematics makes gas flow better” 7.4 Randomised ALgorithms in Linear Algebra: Kannan This means “an algorithm can toss coins” or “the data tosses coins”. i.e. average case analysis. The second is not our concern. We want results that work for every matrix. Examples: 62 ❼ Quick Sort 1960s ❼ Primality testing 1970s — only recently deterministic ❼ Routing 1980s: randomness to avoid congestion ❼ Convex sets and volume in the 1990s ❼ Matrix Algorithms — this talk. The simplest form is to compte witha small sample of rows/columns. Moderndata matrices can be massive. hence O(1) access to an entry cannot be assumed. We will prove error bounds on answers from a small sample. If fulldata is unavailable, only a sample may be available. Netflix has prefernces of 105 customers on 105 products. A related question is distributed data. Communication is expensive, so the processors send sketches. 7.4.1 Setting A is a large marix. How can I compute AAT . and more generally AB. Then I might want SVD, Low Rank Approximation. Matrix Sketches. ensors: approximation by sum of rank 1 tensors. ❼ No free lunch: approximate answers only. ❼ But we will prove error bounds for all input matrices. qP ||A||F = i,j Ai,j , ||A||2 = max eigenvalue norm. If the rank is j, to solve these problems with error ±ϵ||A||F , a sample of f (k/ϵ) rows/colums will suffice, provided that they are picked in i.i.d. trials, provided that the probability of picking a row/column is proprtional t its squared length. f is a small polynomial. [FiezeKannan196] did SVD and Low Rank Sampling. Many improvements. Alternative Scheme, take a sample of entries, set others to zero, and compute faster because of sparsity. Note that this doesn’t reduce matrix size. Approximate AAT in O(n2 ) time. Uniform smpling of rows is no good — what happens if all but one column of A are zeros. An unbiased estimator of AAT X = p1j (column j)(rown j). This is why we need squared length. Then ||A||2 E(||AAT − est||F ) ≤ √sF with s samples. [DrineasKannaMahoney]. Can we do better woth the spectral norm? E(||AAT − est||2 ). [Rudelson] E(||AAT − est||2 ) ≤ c||A||√Fs||A||2 . [Tropp] “User friendly tail bounds for . . . ”. Suppose P is a probability distribution on Rd . We want the variance/covarince matrix of P Mi.j = EP (xi xj ). We really want error bounds for sinite smaple size which depend on d alone. P might be log-concave like Gaussian, or uniform 63 on a convex subset. So how many samples should we take for relative error ϵ? M ≈ϵ M ′ . We want M ′ : |xT (M − M ′ )x| ≤ϵ ||x||2 ∀x. Let B be the pseudo-left inverse of A. V BA = I on the row space of A. Let pj be proportional to the squared length of columns in BA. Draw s i.i.d. sample colums of A according to pj and the W be the estimator of AAT based √ on these columns. Then whp |xT AT Ax − X T W x| ≤ c√sr xT AT AxT . We get relative error for every x provided s?c rank A. Graph has n vertices. Pick O(n log n) sample of weighted edges such that every cut has roughly(with ϵ) the same number of edges crossing it. Better is a spectral sparsifier: find a sma;; subset B of eighted colmns of A such thatAAT ≈ B T B. This is stringer than the cut sparsifier. THis can be solved by preconditioning, but that takes time. [SpielmanSr5ivatsava] says we can estimate the precoditioned probailities fast. Analogy is electriical resistance. 7.4.2 Matrix Sketching Is a sample of rows sufficient? No. Theorem 40 Let A be any m × n matrix and CE = an m√× s sample of s columns of A picked according to length squared. Ditto R but s. Then their is c||A||2 a s ×′ sqrts matrix U such that E(||A − CU R||22 ) ≤ ... F . SVD. Sample A to get m × s C. Find the top k eigenvalues of C T C. Find the top k left singular vectors U1 , . . . of C. A′ = projection of A only the span of ui . Then E(||A − A′ ||2F ) ≤ best possible rank k approximination +. . . . Data Handling – Pass Efficient Model. Sampling ALgorithms use a constant number of passes. Pass 1 computes lengthsquared probabilities, and pass 2 samples. Traditional SVD can find best approximation Ak of rank k to A. Note that if A is a patient vs gene-expression matrix you say “principla component 1 is 3(patient 1)-4(10th patient) +· · ·” — would be better if the columns of the approximating matrix were actual columns. Can get an approximationA′ to A with error < (1 + ϵ)× best possible. We want the probability of drawing an r-tuple of columsn withprobabiliyu proportional to squared volumn pf the siplex they span. Lemma 5 (Johnson–Lindestrauss) A fixed (notrandom) nit vector in Rd . √ K W a random k × d matriix. Then whp |W x| ≈ √d . The probability of failure falls expoenntially in k. So o ensure this nolds simultaneously for N vectors, need k > c log N . But ther are ony ecd bectors in Rd of that norm, so with k > cd we get whp ∀x : |W Ax|‘approx|Ax|. 64 7.4.3 Distributed data Matrix spread over many servers. Do we need to communicat ethe same random projection to all servers? So instead use pseudo-random projectsions and just distribite the seeds. These need to be k-wise independent. Suppose r servers. server t has a n × d matrix A(t) with d > n. Find a low rank approximation of A(1) + · · · with communication being a scarce nd ). We want to resourse. [emmeletal] have deterministic tight bounds. O( √ r allow randomness. We have O( rdk ϵ ). 7.5 7.5.1 Numerical Solving for Parametric Polynomial Systems with Constraints: Wenyuan Wu Computing Real Witness Points: Wenyuan Wu . Note that lots of numerical work over C, then the critical point approach started in symbolic computation [SafeyElDin]. We need a regularity assumption, that the Jacobian is of full rank. Sometimes the plane/distance approach will hit singular or ill-conditioned points. These are a compact set, so with high probability we will miss them. In dimension > 1 we also need to know the direction for path tracking. Also we need to determine the step size: need to avoid “jumping”. For a square system we need to estimatethe distance between two isolated points. Suppose max{||∇Ji,j ||2 } on unit ball is K(g). ′ Lemma 6 (Root Isolation) Let σn+1 be smallest eigenvalue . . . As far as direction determination is ocncerned, we need to incrase the smallest t √ signular value. This lads to an optimisation problem. ∆x = Hc ... solves this optimisation problem. Shows an example with ncreasding σ. P ❼ Suppose dim V] R(f ) is m = n−k > 1 Let g(x0 , . . . , xn ) = {f, ( x2i −1)/2} when K(g) = 1 (rescaling). ❼ The diretcion is HC t Left J ⊕ T . . . . ❼ ... Define an expression for step size in terms of ρ. If Newton iteration converges to z1 Then z1 is on the same component as z0 iff (?) dist(z1 , z0 ) :< ωδ. If the convergence point z2 is outside this ball, we may have had jumping. ρ ≈ 1.6 is the appropriate value. So we can ask now many prediction–corretion steps we need. Has a linear plot of this against log10 σ. 65 7.5.2 Numerical Solving Parametric Systems Many applications, but symbolic methods don’t scale well (expression swell). Numerical methods can take advantage of sparsity. The goal is to answer these question for a 0-dim parametric system 1. Count how many connected cells in parameter space, and chooce a smaple poit in each cell. 2. Membership tests for these points 3. Construct a path from a given point to a sample point. Suppose we have solved a square system off-line and have solutions Sp at p. then use real homotopy to follow a path from p to q. Consider the singular points .... Conside R[a.b.x1 . . . . .xn ]. Suppose we are only intereste din ome (physcial) region of parameter space. Assuming convergence of Newton we areguaranteed to stay on the same component, and parmetric homotopy works. 7.6 Algebraic attack and algebraic Immunity of Boolean Functions: Lin Compexity O(. . .). Assume either that f has small degree, or existsg : deg(f g) small. Definition 17 The algebraic immunity of f is ming̸=0 deg g|f g = 0or(f +1)g = 0}. We want functions with maximal AI. There were Carlet–feng constructions. Need immunity against Fast Algebraic Attacks (FAA). We can use LFSRl If f g =  h with deg(g) low use Berlekamp–Massey to n eliminate h with E ≈ equations. A lot of symmetric function with deg(g) high AI are vulnerable to FAA. Theorem 41 (Curtois2003) If e + d ≥ n then ther is a g ̸= 0 with deg(g) < e and deg(f g) < e. Want Perfect Algebraic Immune functions (PAI). M. Liu et al. produce 2k -variable Carlet–Feng functions. There are various suggestions of PAI functions on nearly such, with no proofs only computer analysis. Claims that algebraic attacks converts qualitative cryptanalysis into a quantitative approach. This is a unifirmmethod. So the problem is to construct such functions. 66 Q Any attacks based on sparsity, rather than degree? A This could be a problem: there have been cases. 7.7 Davenport See . 7.8 Extending Hybrid CSP with Porbability and Stochasticity: Shuling Wang Given by someone else. Example 38 An aircraift ❼ flight pathis a sequence of line segments ❼ ideally should follow nomial path, but may deviate due to wind etc. ❼ If deviates, should fllow a correction heading ❼ The aircraft therfore acts as a continupus pkant, wirh stochastic influence, and the flight control system acts as a discrete controller. Hence we have a hybrid stochastic system. There has been work on stochastic hybrid automata. Rachability anaysis is usually done by probabilistic model checking or simulation. This is not scalable. [Platzer] uses stochastic hybrid programs. Deductive-based verification, but concurrency and communication are not supported. Let F be a σ-algebra on Ω and P is a probability measure on (Ω, F ). Mapping X : Ω → Rn is an Rn -valued random variable if for each B ∈ B, we have X −1 (B) ∈ F . A stochastic process X is a function X : . . . . Use Hybrid CSP [HeZhou1994]. Adds timings consructs continuous evolution and interrupts. It inherits ch!e and ch?e from CSP. We have P ||Q for parallel composition. Continuous evolution ⟨F (ṡ, s) = 0&B⟩ wher F is a differntal equation s is a vector of variables and B is a Boolean expression. Timeout: langleF (ṡ, s) = 0&B⟩ ▷d Q continues for d time units, then becomes Q. P ⊔p Q is probabilistic choice: P with probability p and q with probability 1 − p. Also adds a “commnication interrupt” ▷|i∈I . The semantics of SHCSP is defined by a set of transition relations. We can prove that this is well-defined, i.e. evolution doe sbnot look nto the future and evolution is a Markov process. 67   −π/4 right 0 correct be the angle corExample 39 (Continued) Let θ(t) be  π/4 lef t rection. Use {A; E}P {R; C} where A and R are the discrete pre/post-conditions, and E and C the continuus assumptions and conclusions. Ther are many inference rules. For example ⊔p -introduction (JHD wasn’t sure of the details). The main one is stichastic continuous evolution. Example 40 (continued) We apply the SDE rule. Then we define the dangerous states. Our Booelan guard is f ≥ 0 ∧ LF ≤ 0. 7.9 An Application of QE to Automatic Parallelization of Computer Programs: Marc MM Supported by Chinese Academy of Sciences and IBM Centre for Advanced Systems: 2×CAS. Our context is GPUs. Automatic generation may seem insne, but it makes sense for many of the kernels in scientific computation. (dense linear/polynomial algebra, stencil compilations). We focus on C→CUDA. Standard techniques (polyhedron model) are inear,, but parametric ❼ Old-fashioned parallelism: loops map to loops. ❼ Polyhedron parallelism:: performa “god” change of coordinates for the loops. Dependence Analysis Transform the sequential object to a geometric object in index space. [Feautrier]. This talk responds to [GrosslingeretalJSC2006]. Parallelization Our real interest Code Generation Important Data is decomposed into segments, and the segment is given to a group of threads. So we have serial code executing on the CPU (“host”) and parallel parts (“kernels”) executing on the GPU. Note that the threads are SIMD. Typically we have many more thred blocks (logical program threads) than physical processors. A threadblock has access to per-thread shared memory, and (slower) access to the GPU main memory. Cache/main memory is a good analogy. We propose the MCM (Many Core Machine) model as an abstract machine model. [Haqueetal2015PARCO]. Let Z be the private memory size, U the data transfer time, ℓ be the number of threads per thread block etc. 68 Example 41 (DFT) Two algorithms: CooleyTukey and Stckoham. Get exprssions for the ratio CT/S of work. span and paallelism overhead, e.g. 4n(47 log2 nℓ + · · · WCT = WS 172n log2 nℓ + · · · We should generate kernel code where ℓ etc. are parameters. Example 42 (Dense Polynomial Multiplication) Change coordinates to create concurrency: p := i + j. But this is not sufficient. Work is unenvenly distributed, and too many processors are implied. Hence rouping intothred blocks. Use RegularChains:-QuantifierElimination on the system to eliminate i, j to give us a program in terms of thrad block and thread index. d Most people believe that Fourier–Motzkin is doubly exponential O(n2 ) coefficient operations, but in pratcice ideas from Linear Programming improve this. Example 43 (Simplified LU) The main loop is updating the kth column of L then the n − k columns of U . INRIA had a MetaForl to CUDA translator for non-parametric code. We have a preliminary parametric version. Various tables showing sppedups for various thread block sizes (which really matters). One problem isthat the CUDA compiler doesn’t do common subexpresion elimination, which hurts his comparisons at the moment. 7.10 Modular Techniques for Efficient Computation of Ideal Operation: Yokoyama Given by Marc MM. Full Methods for recovering the true result from its modular images are necessary e.g. wanting a GB. Partial Only do some of the computation based on modular techniques. Cyclic-* took 14 seconds on F99981793 but 883 seconds over Q. 50 primes of 27 bits are necessary for a candidiate. 1. Compute modular images 2. Glue these together 3. Verify the candidate solution. hree styles. ❼ CRA ❼ Hensel 69 ❼ hybrid, as in Gröbner trace Marc MM shows his [not Y’s] standard Euclidean/CRT approach with early discovery when degree doesn’t change. [Arn03] does the same, using h(d0 ) as the compatibility test. Then Y defines Pauer lucky and Hilbery lucky. Ned to check inclusion both ways: one is easy as it’s reduction w.r.t. Gröbner basis. Theorem 42 ([Arn03, Theorem 7.1]) If the situation is homogeneous . . . Proposes a trace-driven [Noro] for using modular information to determine useless syzygies. F4+trace 630 verification 140 Buchberger+trace 900 verification: 160 There were many more examples. 7.11 From lexicographic Groebner bases to triangular sets: Dahan See [Laz85]. Structure of a lex GB in two variables: exact division of the l.c. w.r.t. y (essentially GianniKalkbrener for two variables). This observation can in fact give us a triangular set. What happens when n > 2? [Laz92] introduces LexTriangular via D5. Moeller also had a Groebner version in 1992. Note that this in in Singular, and has the advantage that it can handle non-radical ideals. Lazard uses D5 to use “quasi-inverse” of the leading coefficients. Note that this needs g.c.d. computation. My theorem 1. ψ(gt ) ̸= 0 ⇔ ψ(lc≤k−1 (gt ) ̸= 0 2. 3. [Bec94] proved 3, but not the crucial 1. Has a division result for several variables but requires zero-dimensionality and radicality, and is not as neat. Example 44 Vanishing ideal of a set of points. x5 , y 4 , x4 y 2 z, y 3 z, x4 z 2 , x2 yz 2 . . .. P gi = α∈A Lα )x, y)f1 (x, y)f2 (x, y, z) where the L are Lagrange interpolants. Theorem 43 Let g, g ′ ∈ 1. . . . 2. If degz (g) < degz (g ′ ) then by Theorem 1, lcx (g)|lcx,y (g) and lcx (g ′ )|lcx,y (g ′ ) ... 70 By induction we can suppose that we only have two polynomials in two variables (Triangular). But we might have many in three variables. Let h := lcxg1(g) ; ... gl(2) = q ... etc. Is it possible to have more than three variables? Yes, but it’s tedious to state. 7.12 Characteristic Set Methods for Solvig Boolean Equations: Gao Deciding whether a Boolean system has a solution is NP-complete. Butit has many applications. [Shannon1946] stated that a good cryptosystem was “equivalent to colving a certain systems pf simulatneous equations in many unknonws”. Ther are logic approaches (SAT) and graph-theoretic (BDD) [Bryant1986]. Also Gröbner basis [Courtois2000]. Approximate algorithms [Has88]. e suich that Definition 18 The r-approximation algorithms optputs O e O ≤ O where O is the true optimal. 1 rO ≤ Various classes of NP-problems. Any r-approx r-approx beyond sone threshold No r-approx Most multivariate crypto systems are based on quadratic equations. [Hastad2001] shows it is NP-hard to approximate MAX-MQ in Fq for any ratio 2 q − ϵ. There is a polyomial-time algorithms with ratio q... . 2 q Random assignment is a q + qn/2 -approximation algorithm. Hence q is −q basically the threshold. Note [Wu 79] founding Mathematical Mechanisation. This has been applied for algebaric equations, differential equations (Riit, Kolchin), difference equations [Gaoetal2009JSC]. What about finite fields? Any triangular set can be made monic. Note that a chain may not have zeros in Fq : See x2 + 1 in F − 3. Definition 19 A proper triangular set has . . . P Theorem 44 |Zeroq (P )| = triangular sets Theorem 45 The bit-complexity of TDCS is O(ln ) = O(2n log l ) where l = |P|. n Compare O(P 2n for exhaustive serch, and O(d2 ) for Gröbner basis. 71 Theorem 46 Algorithm MFCS — Multiplication Free. uses MF well-ordering S principle. Output Zeroq (P ) = Zeroq (T ) ∪ i Zeroq (Pi ) where T is a [roper riangular set. Then the size of thePpolynomials is bounded by the size of the input. Bitwise complexity is O(lnd+1 P ∈P term(P ). Theorem 47 ([HSL14]) For a quadratic polynomial syste of m polynomials, the bitsize complexity of MFSC is [the same as exhaustive search]. Examples of stream ciphers shows that MFCS ourperforms TDCS (always rund out of time) or GB (always runs out of memeory). Problem 4 (COOK at SAT 2004) If AB = I as Boolean matrices does BA = I? For n = 4 we take 0.2 seconds and Magma 2363; n = 5 we took 10 and Magma overflowed. SAT took 800-2000. For n − 6 we take 166 seconds. 7.12.1 Aside Theorem 48 Let hi ∈ K{yi } there is an algorithm to comoute satuated triangular sets Aq := Ψq,1 . . . Ψq,lq such that S 1. Zero(hi ) = Zero(Ψi ) 2. Complexity is (merely) triply-exponential 72 Chapter 8 12 August 2015 8.1 Stabilization of control systems: from water clocks to rivers; Coron Water clock (clepsydra) Hole at the bottom of a tank, and the height of the water reflects time. But as the water flows, the flow rate decreases, so it’s nonlinear. Ctesibius (3rd century BC) apparently invented a regulator: none survive, but it is described in pseudo-Archimedes. Watt’s regulator 1788: se Science Museum in London. Showed Watt’s original drawing. Maxwell (1868) “on goovernance” was the first publication. Shows the cart/inverted pendulum. Definition 20 (Lyapunov) Let ye be an equilibrium Theorem 49 If X is C 1 and ye is an equilibrium point of ẏ = X(y) If the eigenvalues of X ′ (ye ) have . . . Theorem 50 (something about stability) Problem 5 Can we ensure that we have stability, or asymptotic stability? Definition 21 (controllabilty) Given states y 0 and y 1 can we move from one to the other? For non-linear systems,, we need to be more careful: “small-time local controllability” is the key idea. We know no N&S conditions for STLC. If the linearised system is controllable, then the nonlinear system is STLC by inverse mapping theorem. Let [X, Y ](y) = Y ′ (y)X(y) − X ′ (y)Y (y). The Lie algebar rabk condition at 0 is satisfied if {h(0) : h ∈ Lie{f0 , . . . , fm }} = Rn . Let PM denote the characteristic polynomial of matrix M . Example 45 (Baby stroller) ẏ1 = u1 cos y3 ; ẏ2 = u1 sin y3 .ẏ3 = · · · is controllable but does not satisfy the bracket condition. 73 Example 46 (Satellite Attitude) Need three actuators to make the linear system controllable, but with two it is STLC, Again it does not satisfy the bracket condition. Need to enlarge the system to allow feedback to depend on time. His 1992 theorem. Definition 22 The origina in locally continuously reachable in small time for the control system if for every positive T there is ϵ > 0 such that . . . Seems like a very strong property, but we know of no systems with asymptotic stability that doesn’t have this. If he is in dimension > 3 there is enough room for perturbations to avoid any crossing, so his theorem is proved: that we have asymptotic stability. 8.1.1 1D hyperboic PDE systems Various gates on the Meuse. V (t, x) is the velocity of the water at point s along the river. Conserve mass and momentum. “Théorie du mouvement non permanent des eaux . . . ” discovered when author was 74!. In genral yt + A(y)yx = · · · with boundary conditions on y. Note that there are many applications: see forthcoming book. 4n Let X be a Banach space of functions from (0, 1) to Rn . Let λ1 = 4n+1 4n which perturbs the stable case (1,2), we get instability. Hence and λ2 = 2n+1 we actually want robust exponential stable. given by a theorem of Silkowski, if ρ0 (K) < 1 then . . . . Chinese Theorem: If ρ∞ (G′ (0)) < 1 then dots. For the nonlinear case, also need || · ||2 . ρ0 ≤ ρ2 . but for n ∈ {1, 2, 3, 4, 5} we have equality (speaker; Voisin). Even for n = 2 they have eamples where ρ2 < 1 but this isn’t enough to guarantee exponential stability. 8.1.2 La Sambre One checks that for η ∈ (0, 1) there are nonlinear feedback laws such that ρ∞ (G′ (0)) < 1. Shows pictures, and states that they are currently working on La Meuse. Note that when Maxwell wrote, there were probably 75000 Watt reguators in England. There was only one pendulum regulator, but that’s what Maxwell wrote about. To get convergence, you need an integrator. This we are actually using on the rivers. Q You mention robustness. What about robustness w.r.t. the model? A Good question. Lyapunov theory doesn’t really handle this. But it can handle any specified class of perturbations. 74 8.2 Computational Progress in Linear and Mixed Integer Programming: Bixby Grötschel claims there are over 100K such programs running at any one time, affecting all aspects of our life: e.g. buying an airline ticket. Will talk mostly about the second (MIP), but this relies crucially on LP. 8.2.1 Linear 1947 Dantzig invents simplex, and talks about it. First use was 120 man-days on desktop calculators. 1951 Used on computers at NBS 1960s commercially viable at oil companies, notably BP (still major users) etc. 1970s Interest flourished, but LP was hard. 1980s Thought this was as far as we can go. Airline model with 4420 constraints and 6711 variables was insoluble. 1981 IBM PC. 1984 [Kar84a, Kar84b] interior point methods. 1990s LP really took off. Simplex kept pace with primal/dual. 95% of problems are still solved with simplex, not interior point. Popular new applications. 401640 constraints; 1584000 variables. All numbers on same Pentium 4: 2GHz. My first CPLEX (1988) 29.8 days. CPLEX 5.0 (1997) 1.5 hours. CPLEX 0.9 (2003) was 59.1 seconds. The algorithm was Dantzig’s primal simplex algorithm. Paper in Journal OR. So today LP is considered a solved problem. Large (Millions) models can be solved robustly and quickly. There has been no real research in LP algorithms since 2004. The power industry still has big problems, and some mixed IP problems finding the LP a bottleneck 8.2.2 Mixed Integer Definition 23 The same (minimise C T x subject to Ax = b and l ≤ x ≤ u) subject to constraints that some of the xj must be integer. In 2012 we [Gurobi] sold to 200+ new customers acroos a range of industries (e.g. “ATM provisioning”; “sports betting”). Basic method is branch-and-bound. Relaxing the integer constraints leads to an LP problem. Then take a variable that should be integer but isn’t, and try both ⌊x⌋ and ⌈x⌉ (and then do LP on one fewer variable!). Always keep track of upper bound (best solution we’ve found) and lower (LP solution). Difference is the “gap”. 75 The last thing I want you to do is believe that Bixby has said we can solve these problems. Example 47 (Schedule Generation Model) 157323 rows, 182812 columns, If we can solve the fleet assignment problem for a given schedule, why not optimise both? LP relaxation at root node was 18 hours. At 1710 nodes we found first feasible solution with a gap of 3.7%. Took 92 days! Example 48 (Real!) 44 constraints, 51 variables, maximisation. Immediately get a solutions at −2186. After 1.4 days, 5.5GB tree, 32M B&B nodes, made no progress. Example 49 (Toy) Maximise x + y + z subject to 2x + 2y ≤ 1; z = 0 x.y free. Removing z = 0, or Euclidean reduction, do great simplification. Turning off presolve on all current codes will run forever. Example 50 (Real supply chain) Weekly model, daily buckets. Minimise end-of-day inventory. Production (single facility), inventory, shipping (trucks) to wholesellers (so demand is known). Initial modeling phase had a production grouping requirement, and a bizarre truck requirement (union rules). Couldn’t get feasible solutions. So how did the humans do it? They fixed the producibles schedule first, and then solved in 1 hour (in 5.0; 4.0 wouldn’t). Cplex 11 (2007) with Gomory fractional cuts took 0.63 seconds. So is the original problem soluble? Yes – 100seconds, and is 20% better than the soluton found with scheduler heuristics. 1954 Dantzig/Fulkerson solves a 420-city TSP with LP and cutting planes. 1957 Gomory’s cutting plane algorithms. 1960;1965 B&B formulated. 1969 BP does first commercial MIP. 1974 IBM’s MPSX/370; and Sciconic. These were LP-based MIP. . . . Good old B&B remainded state of the art despite much theory (Padberg cutting planes, Balas disjunctive programming) 1998 Choice of branching variables (see TSP ideas: we had been very naı̈ve here); lpsolve routines; cutting planes (Gomory’s “lesser” ideas). Our test set has 1852 real-world MIPs from customers. We used pure defaults. Best version→version improvements were 2.1→3.0 (Mature Dual Simplex LP: factor of 5.5) and 6.0→6.5 (Mined the theory backlog: factor of 9.5). After this we started solving real problems with “out of the box hits”. Total improvement over 17 years 19990-2007 was 30, 000× in CPLEX. Since then in Gurobi we have seen a further 38.6×. Combining these two gives us 1.1M ×, i.e. ×1.8/year. We see real problems with 1M rows/columns. 8% of models solved with gap > 10%, 14% within < 10% and 75% optimal. Of the unsolved: 54 are blocked by LP, 16 were tunable, and 37 were “other”. 76 Figure 8.1: Bixby’s slide 37 Suppose you were given the following choices: } } Option 1: Solve a MIP with today’s solution technology on a machine from 1991 Option 2: Solve a MIP with 1991 solution technology on a machine from today Which option should you choose? } Answer: Option 1 would be faster by a factor of approximately 400. © 2015 Gurobi Optimization ⑧ 37 Would you use today’s technology on a 1991 machine or vice versa? [Most of the audience voted for modern computers and old software] Option 1 (today’s software on 1991 machines) wins by 400×. See Figure 8.1. JHD observes that 1.8× every year is 5.8× in three years, whereas the original Moore’s Law [Moo65] is ×4 in three years. Clearly a win for the software/algorithms. Q “Mixed Integer Rounding”? A A simple idea for producing cutting planes. Q What sort of time limit do people set in industry? A We always customers what their criterion is. Often “overnight is fine”. Other answers are “2 hours good; 5 minutes better”. Q How do you find the improvements? There was a slide showing version-onversion improvements. An older version of this slide was in [Bix10]. A 1998: literature. These days they come from practical problems, where we notice a feature, see if it shows up in the library, then implement it. This is a bag of tricks. Q Thank you for your business model for helping researchers. What about quadratic? A We can handle quadratic RHS. We don’t see much of a demand for this. 77 8.3 On Convergence of the Multi-Block Alternating Direction Method of Multipliers: Yang Subtitle: are there better methods for LP? Minimise C T x subject to Ax < b and x ≥ 0. This is a data-driven model, which neds to be solved fast in practice. Geometrically, the constraints are a polyhedron, and the optimal plane has tobe found. Markov decision processes provide a mathematical framework for sequential decision making where decision outcomes are partly random and partly decided by decision makers. At each time step, the process is in state i and the decision maker chooses an ation j, The process responds by moving to a state and producing a cost cj,i The probability of entering the next state in indepenednet of history. Hence we can ask for an optimal policy for teh decision maker. Howard [1960]√formulated this as “policy iteration method”. ath-findng methods are O9n n) But the im is to avoid matric inversion. Eraly work was the vonNeumann projection (see als Freund). Subgradient method [Renegar2014] transforms the problem assuming we know a feasible point with iteration complexity O(L1/2 D/2 ). Also two-block ADMM. onsider minx∈Rm f1 (x1 ) = · · · such that Ax = b We takethe augented Lagrangian function L(x1 . . . . , xp , y) Do this or eahc xi , then update y. Convergence was well-established when p = 1 or p = 2. What  about p > 2? 2014 we 1 1 1 would an example that can diverge when p = 3 A =  1 1 2 . Note that 1 2 2 ρ(A) > 1. Perhaps we only update y by some beta < 1 of the true value. For p = 1. 0 < β < 2 (Powell 1969). Is there a good problem-independent β? No! Random-Permuted ADMM. Each round, use a random permutation for the order of updates. This seems ot owrk in practice, Consider a square system of linear equations. After k rounds, we use a . . . Theorem 51 If A is invertive, the expeted iterate ϕk converges ot the solution linearly for any 1 ≤ p ≤ n. P 1 We can show that the “expected update matrix” n! σ Mσ has radius < 1. Difficulty in proof as few tools for spectral radius of nonsymmetric matrix. Showed examples of converges for large weakly Laplacian linear systems. Consider the nonseparate quadratic problem to maximinse tT Hx + cT x. Then if each block converges, the whole converges. So why multiblock? Consider the homogeneous and self-dual linear prgoramme to find x., y, s) with Ax − bτ = 0; −AT y − s + cτ = 0; bT y − cT x − κ = 0; eT x + τ + eT s + κ = 1 (x.τ, s, κ) ≥ 0. Where the three blocks (x, τ ), y, (s, κ) are alternately updated. Also, consider the logarithmic barrier function as objective. Gradually reduce µ to 0 as in interior-point methods. Note that ADMM is easily implementable on a distributed platform. MinP 1 imise cT x Rather minimise qi (xi ) independenently, then update x′0 := max( m xi , 0) 78 1. Can we characterise the convergence rate? We have proved results about expectation. 2. can RP-ADMM convergence be “with high probability”? 3. Can we extend to more general convex optmisation? 4. So are there better LP algorithms out there? 8.4 Bounded-degree SOS Hierarchy for Polynomial Optimisation: Lasserre LP- and SDP-certificates of positivity. With f ′ in′ R[x] and K := {x ∈ Rn : gi (x) ≥ 0.j = 1, . . . , m} being a compact semi-algebaric set. We are looking at the global minimisation problem. To prve this, we need to prove positivity of f ≥ f ∗ . Can this be done effectively? Real Algebraic Geometry helps. Such certificates exist, and are amenable to practical computation (note that Positivstellensätze for more general functions are not so amenable). Theorem 52 (Putinar’s Positivstellensätz) If K is compact and satisfies a technical Archimedean assumption and f > 0 on K then f (x) = σ0 (x) + m X σi (x)gj (x) (8.1) j=1 where the σi are sums of squares. Note that this theorem has no bounds on the degrees. Testing this (in bounded degree) is an SDP. We can write K as {x : gi (x) ≥ 0; (1 − gj (x)) ≥ 0} Theorem 53 (Krivine-etc.) If K is compact and in that form, then f (x) = m XY α,β j=1 gj (x)αi (1 − gj (x))βi (8.2) This is solving an LP. Many applications: generalised moment problem. This can be used to approximate set with quantifiers: {x ∈ B : f (x, y) ≤ 0∀y : (x, y) ∈ L} for example. We impose the constaint deg(σj gj ) ≤ 2d in (52) to get element d in the SDP hierarchy, or same in (8.2). This has been useful in problems of modest size, or larger if sparse. The SDP-hierarchy has been used in combinatorial complexity. Note that our statement didn’t distinguish between convex and nonconvex. and we can add Booleans by x(1 − x) = 0. However, the class of (easy) SOSconvex1 problems is recognised as convergence occurs at the first level of the 1 The Hessian factors as SOS. 79 hierarchy. For general convex problem convergence always happens. The SOShierarchy dominates other lift-and-project hierarchies (i.e. best lower bounds) for hard 0/1 combinatorial problems, Note this doesn’t occur for LP-hierarchy. Theorem 54 (MarshallNie) Let x∗ ∈ K be a global miniimiser and assume 1. The gradients ∇gi (x8 ) are linearly independent 2. struct complementarity holds 3. second-order sufficiency conditions hold at (x∗ , λ∗ ) then Therefore Putinar certificates are a generalisation. However, SDP-solvers have size constraints. Can we do better. Assume that gj ≤ 1 on K (rescaling if necessary) and that {1, gj } generates R[x]. Then remember Lagrangian relaxation. Q-EK I agree that you get a certificate with a good backward error. But is this meaningful? Only if the input problen is well-conditioned. A Agreed the the certificate is not exact. 8.5 Smaller SDP for SOS Decomposition: Bican Xia See [DX14]. It is known that SOS decomposition can be reduced to SDP, so in principle has a symbolic solution. We know that numerical SDP solvers can solve large SOS problems, and has available iplementations. Definition 24 SOSS(p,Q) means that p has support Q and is a sum of squares. This is equivalent to finding a positive semi-definite matrix M such that p(x) = QT (x)M Q(x) where Q(x) is the vector of monomials corresponding to Q. Let SOS(p.Q be any algorithms that solves this. We find two classes of polynomials wher the original SOS proble can be transformed into smaller ones, and ways of detecting nn-SOS problems. Between steps 1 and 2, we find check for evident non-SOSness, then check for a splitting. Define the Newton polytope N (p) to be the convex hull . . . . P Definition 25 For a polynomial p = ci xalphai and T ⊂ Rn denote by Proj(p.T ) the result of deleting Theorem 55 If P is OS, then Proj(pF ) is SOS for even face F of N (p). Definition 26 p is convex cover polynomial if there are some pairwise disjoint S faces Fi of N (p) such that S(p) = Fi . 80 In this case the problem decomposes. In fact every convex cover polynomial is a split polynomial. If a polynomial. is split, then the SDP-matrix can be block-diagonalised. States his Theorems 3 and 4, analogous to previous but for split polynomials. Proposition 3 Suppose Q has SOSS(p,Q) for a polynomial p. Then if p is SOS, the α ∈ Q + Q for all α ∈ S([). This gives us a quick negative check. After this check, we check for split polynomials, and solve them separately. Note that split polynomials may split further. SQR(k, n, d, t) is the sum of squares of k polynomials of n variables with t terms of degree at most d. Various timing data: the check rejects all non-SOS polynomials very quickly. Pn Q–SMW Your non-SOS polynomials are very special. g12 +g2 i=1 xi +100g32 + 100. A We need the +100 to ensure the constantterms is not zero. Q Which SDP solver? A My student implemented this. The real point is the reduction. 8.6 Applications of homogenisation in SDP relaxations of polynomial optimisation: problems: Feng Guo We want checkable conditions to veify non-negativity: NP-hard. For SDP programming the pimal problem: supW −T r(CW ) s.t. T r(AiW ) = bi and W ≥ 0. W T − W . Also dual problem. Spectrahedron {(x) ∈ Rn xT A.x ≥ 0 and projected spectrahedron. Let Σ2 be the set of sums of squares. Let Q(X) . . . . The Archimedean condition is equivalent to saying that S is compact. Shows an example of non-compact S with Putinar’s Positivstellensätz failing. So homogenise each generator to get Se> or Se≥ depending on what condition e > We say that S is closed we impose on x0 . f (x) ≥ 0 on S iff fe(e x) ≥ 0 on cl(S) e e at infinity if cl(S> ) = S> . Detecting this is an open question. 8.6.1 Minimise a rational function Mininise: r∗ + = min p(x) q(x) . This is maximise r such that p(x) − rq(x) > 0. Example 51 max x21+1 which is not achievable, but is after homogenisation 2 (i.e. at infinity). 8.6.2 Semi-Infiite Polynomial Programming minx∈X f (x) subject to G(x, u) ≥ 0∀u ∈ U . Problems when U is not compact. 81 8.6.3 Convex hulls of semialgebraic sets Projected spectrahedron. Let P be the set of support hyperplanes of S and M ]{(1.x) : x ∈ Rm }. {1} × cl(co(S)) = P ∗∩ M . Problems in the noncompact case. {x1 ≥ 0; x21 − x32 ≥ 0}. Need a modified Lasserre’s relaxation. We perspectively prject to X0 = 1. We assue S is closed at ∞ and . . . . 8.7 Two tasks: compute zeros, and check whether we have an approximate zero. Given a complex polynomial, we cantake real and imaginary parts. Example 52 f1 = x2 − 2y, f2 = y 2 − x, f3 = x2 − 2x2y − 2y. Then P0 = (00) is a zero of F1 , f2 , and we can get P1 by Newton. But when we add F3 . We are going to consruct system containing all zeros of Σ, preserving reguar P 2 a square ∂f zeros: f = fi and ∂f ∂x ∂y : solve for the derivatives and f − r in Q[x, y, r). For such a square system, we can use homotopy and a posteriori certificaton. Many deflation techniques for multiple zeros. Theorem 56 P is a simple zero of Σ iff (P, 0) is a simple zero of the square system ∆ = {D1 (f ), . . . , Dn (f ), f − r}. He gave a proof. Emphasised that, although the total degree has doubled, the computation is not much greater. Theorem 57 Given Σ ⊂ Z[X] and (P, r0 ) is a zero of ∆ within the root separation bound Showed an example with [Tsigaridasetal2010a] version of DMM bound of 10−138 while true answer is 2.5. Hence he claims that the certified simple zeros from Theorem 1 of ∆ are with high probability the zeros of Σ. Would like to look diretcly at multiple zeros in Theorem 1. Q-Mourrain You could also consider f3 − r in the extended system. A Not sure that the proof works. Q You proof considers AT A, so squares the condition number. Have you eplored this? A No. Q Why the slack variable? A So that the Jacobian isn’t zero. 82 8.8 Algebraic boundaries of convex sets: Sinn Consider a polynomial optimisation: problem: minimise ℓ over {gi (x) ≥ 0}. The optimal value function maps the coefficients of ℓ into the minimum value. By Tarski, thisis semi-algebraic. A convex set is semi-algebraic iff its dual is. The dual of C is the set of supporting hyperplanes of C. C = dual(dual(C)). The algebraic boundary ∂a S of s is the Zariski closure in ′ An of its boundary in the Euclidan topology. The optimal value function satisfies Φ(−Ψ(−alpha1 , . . . , αn ), −alpha1 , . . . , αn ) = 0. hwer Φ is the defining polynmial of the algebaric boundary of the dual convex body. Recall normal cone to x ∈ ∂C is NC (x) = {ℓ ∈ (Rn )∗ : ∀y ∈ Cℓ(y) ≥ ℓ(x)}. There’s also a dual variety: Zariski closure {[H] ∈ P(V ∗ ) : [H] is tangent to X at a regular P ∈ Xreg }. Biduality for irreducible varieties. Definition 27 An extreme point of C is a point x such that if x = with y, z ∈ C implies y = z = x. 1 2 (y + z) ∗ Theorem 58 Let Z ⊂ ∂a C 0 be an irreducible component. Then Z is an ir∗ reducible subvariety of Exa (C) the Zariski closure of the extreme points. Z ∩ ∗ Ex(C) is Zariski dense in Z . Assume Y ⊂ Exa (C) and Y ∩ Ex(C) is Zariski ∗ dense in Y . Then Y is . . . Theorem 59 Let C ⊂′ Rn be a convex compact semi-algebraic set with 0 in its interior. Suppose that every irreducible compact of ∂a C is smooth along ∂C. ∗ Let Z ⊂ Exa (C) be an irreducible subvariety such that Z is an irreducible component of ∂a C. If codim(Z) = 1 . . . Shows a semi-algebraic description of the “hard cases”. See [Sinn2015 Researchinthe Mathematical Sciences 2(2015)] 8.9 Symbolic-numeric Methods for Linear and Integer Programming: Steffy Linear Programming and MIP. 0/1 variables here. See Section 8.2. We use SCIP and SoPlex from ZIB — open souce and within an order of magnitude of commercial. Notethe problems of lfoating point, and we may only get “nearly feasible” solutions. Note that VLSI verification really cares about correctness. Ther are also poorly sclaed/conditioned problems, some biological systems. Note that the dual solution provides an optimality certificate. Simplex also allows for fast re-optimisation (needed in MIP). QSopt_ex does nuerical simplex: checked exactly, then increase precision if necessary. Well-tried examples of 83 iterative refinement for linear systems, in mixed precision. an apply these ideas, but need to do the dual problem as well. Near singularities. we keep adding nearly parallel planes. so ill conditined. Q Mixed nonlinear systems? A The solution may not be rational any more. 8.10 Problems on Symbolic Computation of Polynomial Equations in Wavelet ANalysis: Bin Han For ϕ, ψ 1 , . . . , ψ s ∈ L2 (R) define an affine system AS(ϕ, ψ 1 , . . . , ψ s ). Affine systems can have dilates and shifts. Need to construct tight framelets from Filter Bank. Haar Orthonormal wavelet ϕ = χ[0,1] and ψ = χ[0,1/2] − χ[1/2,2] . Also Shannon and Daubchies wavelets. Common characteristics are that we have linear equations from the approximations, and we also get total degree two equations. Conjecture 7 (Since 1988) Real-valued orthogonal filters a having arbitrary high linear-phase moments and smoothness sm2 (a). Current stasus lpm(a) = 5; sm(a) ≈ 2.449. Note that we would want sm(a) > 2.5 for a C 2 function ϕ. A d × d matrix M is called a dilaton matrix if it is an integer . . . . Problem 6 Construct a finitely supported 1D real-valued orthonomral M-wavelet finter a such that sm(a) is large and a is symmetric. Can prove it doesn’t exist for M = 2. For m = 3 sm(a) ≈ 2.06. For M = 4 sm(a) ≈ 2.53.   1 −1 If M = then we have a problem with 36 unknowns — unsolved. 1 1 Also a sOS problem. For a given A, find filters U1 , . . . , us such that |û1 (ξ)||2 + · · · + |ûs (ξ)||2 = v̂(ξ) where v̂ = · · ·. 84 Chapter 9 13 August 2015 9.1 Without Mathematics and Supercomputing, no Effective Risk Reduction of Natural Disasters: Qing-Cun Zeng Natural disasters cost many lives and much economic damage. 22% windstorm, flood 35% etc., 85% being meteorological in all. 53% of the deaths were caused by meteorological disasters. In China, Great King Yu (21st C BC) led his people is controlling rivers. We should emphasise that there have been great progress in the last 50 years in risk reduction of natual disasters. Typhoon/Hurricane Galveston (1900 Sept 8) kill6-8K people. 1992 Hurricane Andrew was tracjed by satellite, but Numerical Weather Preddiction could only given 24 hours warning. Sandy (2012) we had five days warning(better NWP, sending and assimilation). In China, storm Rammasun was monitored by Chinese satellite. NWP successfully prdicted the track. Landfall warning 36 hours in advance. No life was lost, but nevertheless direct econmic loss 26GYuan. NWP predicted heavy rain in Beijing oin2013, but several people wer killed. The NWP did not predict the quantity of rain (beat all records). Also the civil emergency system was not good enough. Gave a six-step action plan (including verification and lessons learned). But the first stage, prediction, is key. Remote sensing needs to be inverted to find physical quantities, e.g. water vapour desnity from radiation. Thisis a Fredholm integral equation of the first kind. E/U of the solution requires g(z ′ ), W ∗ z, z ′ ) to satisfy certain constraints. Also ill-conditioned. Weather prediction is compliicated. There is mass conservation for atmospheric water (in three phases), cloud formation and evolution (very complicated), lower boundary conditions (kinematic, geometrcal and physical), and 85 upper boundary conditions (what is the upper boundary?) All fluzes (except radiation) → 0 and z → ∞. Then their initial conditions. Wellposedness was proved by Chinese scientists for linearised equations. For the nonlinear model we do not have stability. Meteorologists call tc the “predictability” — the point after which prediction becomes impossible. 9.1.1 Computing Problems 1. Numerical Prediction. Note that von Neumann proposed numerical weather prediction, hence NWP and Computers have a common father. The two have grown up together! [Richardson: “Weather Presdiction by Numerical Processes” 1922] had a FEM formulation. This didn’t succeed, because the equations were too simplistic, and computational resources inadequate. Shows a graph of ECMWF forecasting accuracy, and notes that storm warnngs from regional centres are 3-days, which is adequate. 4D data assimilation was proposed by a French meteorologists in 1987. We can be proud of what we have done, but should do more to improve the disaster prediction. Need to iprove resolution (akss for a grod size of 500m-1000m!!), This would require morepowerful computers. We also need numerical (quantitaive) predictions of disasters, e.g. water flow. This requires a high-resolution ground model. Note that there are very irregular and complicated boundary conditions. 2. Visualisation. There is an optimisation problem: minimise (cost of actions) + (losses prevented). This requires real-time regulation, and the ability to explain to policy-makers. Q How do we cope with the chaos caused by nonlinearity? A Ensemble prediction. Q–JHD Can we really achieve this incrase in resolution globally? Should we not be looking at local resolution? A We need more powerful computers. [JHD fears he did not explain the question well enough] 9.2 Software and applications for polynonial homotopy continuation: Leykin Q What is the meaning of “algebra” in Chinese? A I have been told it means “substitution mathematics”. Q Ask your students what algebra means. A In Arabic it means “the union of broken parts”, or possibly “bone setting”. 86 Example 53 Have a target [polynomial] system F , and a simple system G with the same number of solutions, Then consider H(x, t) := (1 − t)G(x) + tF (x).  ∂H −1 ∂H Hence dx dt = ∂x ∂t . But there may be numerical issues, and problems with targeting singular solutions. There is also the issue of certification1 . Software can even describe positive dimensional solutions (numerical algebaric geometry (PHCpack, Bertini, NAG4M2) but we won’t talk much about this. Let K = C (occasionally ′ R). Solve parametric problems for generic paraneters. Given Ψ ∈ K[p.x]m and V ⊂ AP = K #p suchthat for a generic p0 ]inV . we have finitely many solutions. If you wanted to solve this non-numerically, we could look at parametric or comprehensive Gröbner bases. This very expensive. 1. Take a generic codim(V ) plane O 2. Find a structured witness set V (Ψ) ∩ (L × Ax ) ⊂ Ap × Ax . 3. Given po ∈ V pick generic L0 4. Deform L to L0 Example 54 (Computer Vision) Point X is projected on to three calibrated cameras, with local coordinate frames I, R2 , R3 . Use Cayley parametrisation of SO3 (six parameters for two SO3 instances). We have a rational map from the space of configurations (dimension 23) to V the space of views (dimension 24). n fact the pre-image has cardinality 1 [HoltNetravali1995]. Proof (uses [MorganSommese1989]): compute a Gröbner base in Macaulay (pre-M2) and prove the number of points in the fibre is constant, therefore 1. Notes that the GB solution is used in practice (Android ’phones). But takes 1second. With homotopies we have singularities, but when we are not too far from the reference solution, we are at 100ms, and could make 1ms. The bottleneck is the cmputation of Ψ and its derivatives, which is done via an SLP. Example 55 (Definite Representations) f ∈ C[x, y, z] of degree d. Determinental map Φ : M → F . [Nui1968] the set of hyperbolic polynomials is closed in F , contractible and path-connected [good news for homotopy!]. Follow Nui’s paths (avoid singularities). Q How do you choose the parameters, and can you identify the bad ones. A In practice it is hard [impossible for the vision problem] to identify the bad points, as you need to invert a rational map. Q How big a problem can you solve? A Millions of zeros if necessary. But note the vision problem, for example, only has one realistic solution. 1 Claims that there is a difference between “verification” and “certification”. 87 9.3 Bertini 2.0 and BertiniLab: Software for solving polynomial systems numerically: Bates BertiniLab is a MatLab interface! But I’m not going to talk much about this. 1. This talk is numerical, but I believe in a mixed approach for many cases. 2. There’s much other good software besides Bertini. 3. This is a software development talk, not algorithms. In BertiniLand, we go from t = 1 to t = 0 [arguments about density of floating point numbers etc. can be made, but it’s just a feature]. Bertini was written in the basement of the Students’ Union at Notre Dame. Bertini how has some AI: autochanging other tolerances as you change one. BertiniLab was written for a specific user. alphaCertified will certify (in the sense of alpha theory) solutions. Paratopy uses parameter homotopies and parallelism: using Bertini as the core engine. Does summary statistics. BertiniReal — see Schost’s ideas. Uses Morse-theoretic ideas to project critical points down, and look at the fibres over special points. It can produce MatLab .fig files and STL files [3D printers]: hence polynomial system → pretty solid. We have money from “Advanced Cyber Infrastructure” branch of NSF for Bertini 2. 1.5 people → 10! More modular, GPL licencing, regression tests etc. Q–EK LinBox took a long time to incorporate software from elsewhere: but eventually includes R+. What are your numerical analysis plans? A We use Python for Numerical LA, and BOOST. Q Also, it took us far too long to join SAGE. A That’s where I get the most flak about our licence. We’re happy to join anyone. 9.4 Computing mixed volume . . . in quermassintegral time: Malajovich See http://www.labma.ufrj.br/~gregorio/papers/beijing/pdf Mixed volume (Minkowsky). Take n convex objects in n dimensions. V (A1 , . . . , An ) = 1 ∂n ′ n! ∂ti V il(t1 A1 + cdots) 3 Similarly Steiner formula: V ol(A + ϵB 3 ) = V ol(A) + Sϵ + πKϵ +2 + 4π 3 ϵ+ . Quermassintegral: V (A, A, B 3 ) = 3S. V (A, B 3 , B 3 ) = 3πK. Theorem 60 (BKKh) he generic number of roots in (C× )n of f1 (x) = · · · = 0 is n!V (Conv(A1 ), . . . , Conv(An )). 88 To be contrasted with Bézout, which is for dense polynomials. Note that the “Bézout\BKKh” roots are in general degenerate, so bad news for homotopy. Legendre transform of a 7→ bi (a) if ξ 7→ λi (ξ) = maxa∈A aξ − bi (a). Tropical semi-ring: (R ∪ {∞}. + . max) [That’s what he wrote, but Ph said the other way round, which seems better]. Tropical limit: limr→∞ eτ ... . . .. Mixed cells are dual to the solutions ξ of the tropical polynomial system. Theorem 61 With probability 1, the algorithm2 computes the mixed volume and produces all the initial points in time bounded by O(T + T ′ ) arithmetic operations, where [he suddenly changed into a software demo!] and 1. with probability 1. vd ≤ n!V (A1 , . . . , Ad−1 , A, B n , . . . , B n ) 2. . . . Shows a graph of T against measured time, which does look linear. Note that there is non-trivial numerical analysis involved here to translate the theorem into implementation. At times I need to move to quad computation. 9.5 Classifying Polynomial Systems Using the Canonical Form of a Graph: Yu P α Polynomial α∈A cα x . Homotopy from a binomial system to this. Shows PHC Web Interface. We have 16 cores of CPU and two K20c nVidia cards. Want to store various supports A to facilitate re-using stored results. But how do we store a support in a way that allows for commutativity etc. Therefore want a unique key. Definition 28 Two polynomial systems are isomorphic if 1. they have the same dimension and number of equations 2. there is a permutation of variables and one of equations that takes one to the other. Hence think of variables as root vertices, pointing to powers, and hecne to monomials, Then can use standard graph tools. Q What’s the connection to graph isomorphism? A In general graph isomorphism is hard, but . . . . Q Look at Maple’s technology: this very rapidly finds a match. A Need one to be invariant over variable names. JHD/Dan Roche Maple’s is not invariant over variable names. Q-Dan Do you solve the user’s system or the one in the database? unclear discussion. 2 It is a randomised algorithm. 89 9.6 Labahn Our solutions are invariant under symmetry groups. Why is there a set of dundamental invariants (?for the system, or for the solutionspace). Action: G × K n → K n . See [Gat90], [FaugereSvartz2013a], [HL12]. [HubertLabahnMathComp]. Definition 29 G is diagonalisable if ∃R : R · G · R−1 is diagonal. Recall also the structure theorem for abelian groups. Also Hermite normal form for matrices. which we can make canonical. Example 56 Invariant under x1 → x2 → x3 . Write as diag(ω, ω 2 , 1). It’s harder when the system is invariant, but not the individual polynomials. We want to extend from abelian groups to soluble ones. 9.7 Arnold Compares dense and sparse representations: dense has fast arithmetic. The support of a polynomial is the set of exponents of its non-zero sums. Definition 30 The sumset A ⊕ B = {a + b : a ∈ A.b ∈ B}. Definition 31 The structural support of f · g is supp(f ) ⊕ supp(g), and the structural sparsity is | supp(f ) ⊕ supp(g)|. That is, “ignoring cancellation” Theorem 62 Ther is a randomised algorithm that, with probability > 0.99 computes h = f · g on Õ(Sn log D + T log C) whre C is a bound on the coeffcients and D > maxd degxi (f · g). Note also [ColeHanharan2002] have a Las Vegas algorithm Õ(T log C log2 D). Note that “grade school” is as ggos at it gets when there’s no collisions. But squaring is a classical case where there is collision. Also composition of sparse polynomials. Define hmod p to be h (mod xp − 1). Hence we can define “collision” of terms when we use mod p . Say p is “good” if there are no collisions, and “OK” if less than half the terms collide. If we knew the number of terms in the sumset, we could produce probability estimates. So guess the size as 2, 4, 8, . . ., pikc pG and pO K according to such estimates and [check for sanity]. See [AR15] for the details. 9.8 Computing Approximate GCRDs of Differential Operators: Giesbrecht Note that we don’t have unique factorisation. GCRD is the right question for joint solutions of differential equations. 90 Problem 7 [Approximate GCD]Find f˜ and g̃ such that deg gcd(f˜, g̃)) > 1 and ||f −f˜|| ||g−g̃| ||f || , ||g|| small. Lots of alternatives, but this is the definition we shall generalise. GCRD dates back to [Orr1933]. [li1997] hd a subresultant theory for generalised Ore polyomials. Aim was to merge these with [CGTW95]. However, it is not obvious that the question is even well-posed. Nee to define norms correctly, then can generalise Problem 7 precisely. Clear denominators and use[Kaltofenetal2006] to clear approximate contents. Think of the differential Sylvester matrix S. The degree on the exact GCRD is the nullity of this matrix. Then inflate S to Sb with numerical coefficients and do a reduced rank calculation here. We can set this up as an optimisatoin problem, and then ask whether Φ attains its minimum. We can also ask whether Newton iteration is going to converge. Use ideas from [Kaltofenetal2007Unpubl]. Theorem 63 Define the set of possible solutions: impose that lcx (lc∂ (h)) = 1. Then if the set is non-empty, the infimum of the error is attained. Also σv — the smallest singular value of the inflated Sylvester matrix — is some measure of3 the condition number. Q Does your unstructured perturbation take you to an inflated Sylvester matrix? A Not necessarily, but near enough. Then the Newton iteration should take you back. Q–EK Approximate factorisation? A Future work. 9.9 9.9.1 European Research Funding: ERC and Mathematics Bourguignon ERC is a bottom-up individual-based pan-European comptition with host institutions in EU/Associated Countries. 15% of referees are outside the EU. There is an independent Scientific Council4 with its own executive agency. Starting 2–7 years5 post PhD. Up to 1.5M+0.5(large facilities) Consolidator 7–12 years post PhD. up to 2M+0.75 3 Still needs more work. had an 5 Throughout, women can automatically cliam 18 months extra/child: men if they can prove they had leave of absence. 4 Just 91 Advanced Up to 2.5M+1 Proof of Concept Reserved for people who had already have an ERC grant. ERC gets 17% of the EU Science Budget. 1.6Geuro this year, i.e. approximately 1000 grants. 2/3 of grants go to people between 30-40. About 27% of the postdoc money used here goes to non-EU citizens. Note that these grants are portable (which ensures they are well-treated by hosts!). 8% of ERC grants go to PIs who are not European6 . Success rate this year should be about 15% (up on historical). During FP7 supported 4300 of which 237 in Mathematics. Last year 35/937 were mathematicians (decrease in proportion, which is slightly worrying). 2 Fields Medals and 3 Nobel Prizes went to ERC holders. 9.9.2 China Ma [Sugaku Tushin 12(2007) 1]. Mathematics has a special fund (Tianyuan) and staus in China. But there are many funding schemes. Shows basic funding graph 1999-2009. We are very happy with the improvements over the bast ten years. “National Centre for Mathematics and Interdisciplinary Sciences (CAS”. Launched 24 November 2010 as part of Innovation 2020 initiative. from Shandong But in China there is a problem for counting [evaluating numerically?] people, especially in universities. It tends to be numbers of papers and grant income. Chan: President HKUST We have a separate system. I was also an AD at US NSF including mathematics. NSF Funds 62% of the US mathematics basic research. Increased need to show societal relevance. Mathematicians do not participate as enthusiastically in the big inter-disciplinary programmes (Big Data etc.) as I think they should. Also there’s more private money: Simons is about 25% of the size of NSF’s DMS. Shows graph of NSF’s funcing” flat until 1984, climbing until 2002, then flat. NSF does fund Oberwolfach for American participants. HK UGC is 65%, RGC is 9%, rest private etc. Institutes Mathematics is cheap, and institutes are cheaper than observatories. Chinese NSF Shows 1986–2015 cumulative figures. Also figures for 2015. Tianyuan had 700 proposals but only 31 awards. In 1989 Tianyuan was 1M RMB/year, but now it is 25M/year. In the early days this was used 6 Must spent at least half of the year in a (given) European Laboratory. 92 partly for grants, partly for “other matters important for the development of mathematcsi”, but now all on this second task. There is an Academic Leading Group of the Tianyuan Fund. Administered by an office in CNSF. 9.9.3 Evaluation in ERC There is a five-minute video ob ERC website which she recommends everyone to see. Schemes ERC Grants: see J-PB. Implementing Agreement Chinese researchers hwo are active holders on NSFC grants can be part of ERC teams for 6-12 months: NSERC covers international travel, ERC grants cover subsistence etc. Enrique (Chair of Math Panel) Round 1 expects a 3:1 cut. Evaluates B1 and the CV. The Panel is 12–14 people. Four panelists will read your application. The key task is to envisage an ambitious major research theme, incorporating a team of several people. Diagrams about research group organisation help: you need both focus and to be understood by a large range of people. Volker Mehrmann My grant is Maths/CS/Engineering, but there is no longer an interdisciplinary panel. This means that you have to make it in your own field first (see previous). Maria Esteban: Chair Step 1 is only by panel members (but can ask other ERC panels). The second stage is external referees. At least four external reviews as well as the panelists. But the panel determines the ranking. Carillo Starting and Consolidator have an interview as well. These are obtained before the interview. A lead reviewer is nominated for each candidate. 9.9.4 Past Grantholders Annalisa Buffa I applied to the first round of ERC Starting Grants. “Innovative compatible discretizations for PDEs”. This was a new and exciting topic. This was my chance to build a team. Complicated diagram of people, grants (one researcher got an ERC consolidator grant) and destinations. Martin Hairer Consolidator Grant just before Fields Medal. So I had recently developed a theory of regularity structures to give meaning to stichastic PDEs that were previously thought to be ill-posed. Ann Math.; Invent. Math. etc. Hence the aim was to understand cross-over between regimes. Phase coexistence is one example. 93 As well as hiring a range of postdocs from different disciplines, I am organsing workshops, which is very easy at Warwick. I have been pleasantly surprised by the application process (and Warwick’s research support staff). The interview (being shuffled from waiting room to waiting room) was the strangest part of the experience. The ongoing adminstration has been easier than I had feared, in particular changing the start date. Had problems with the University of Warwick’s Housing system and the ERC’s double charging rules. Coron Spoke about nonlinear control, where the nonlinearity is important. I was at the Institut de France, with no teaching, but this was running out. How else to avoid teaching? Apply for an ERC Advanced Grant. More to the point, PhD students (2) and postdocs (which are very hard to get in France: these were my first). The administration is not very heavy. Q Is there a right of respond to referees? J-PB There is a formal “redress” process (about 2%), and we are always trying to make the reports of the panels helpful. The names of the referees are not revealed. Q Suppose you have a string track record, but with to change area. The referees might not take account of this J-PB This is something I stress in the briefing to panel members. The Panels do take risks like this. Q Can an ERC grant holder and I (non-EU) write visits to each other into our grants? A Yes. Q Interviews are known to reinforce gender bias. A We had 18% of women applying in Mathematics (which is above the EU average), but the success rate did not match this. In the past women did less well than men at stage 1, but better at stage 2. This year it was about even. 94 Chapter 10 14 August 2015 10.1 Applied Mathematics for Business Decision Making: the Next Frontiers: Kempf Speaker is Chief Mathematician at Intel. Every area has its core problems, which take years, decades, centuries to solve. Consider Weather Forecasting (Section 9.1) for example. This has interesting mathematics, and is important for humanity. 10.1.1 Background The human brain has changed little since 200,000BC. First steps were fire, domestication of plans and animals, then the industrial revolution.1 Observed that even in inflation-adjusted ✩, companies have grown bigger. 1900 Standard Oil was ✩1.4G (✩70G in 2015), 1955 GM was ✩10G (✩100G in 2015) but Sinopec is ✩500G. Note that intuition lives in the earlier parts of the brain. Good intuition comes from structure, repetition and feedback. But business decisions tend not to fall into this category. Intel has gone from 2300 transistors in 1971 to 6.5G today. Question: do computers belong on this timeline. 10.1.2 Problem When the Chief Mathematician (speaker) goes into a room full of Vice-Presidents, they don’t take his word for it: they want to apply their “business intuition”. 1713: Nicholas Bernoulli and the Saint Petersburg Problem was the start of “perfect rationality” and the Expected Utility Hypothesis. But see Herbert 1 JHD notes that writing, arithmetic etc. were omitted. 95 Simon’s research (Nobel Prize in Economics) “Models of Bounded Rationality”. Daniel Kahneman (2002 Nobel) claims that humans have biased bounded rationality. See his book “Thinking Fast and Slow”. Overconfident professionals sincerely believe they have expertise act as experts, and look like experts. “You have to struggle to remind yourself that they may be victims of an illusion” — Kahneman. But: how biased are we, and what can we do about it. 10.1.3 Towards a solution Human techniques. 1. Heuristic search with paper/pencil 2. Heuristic Search with a Spreadsheet 3. Optimisation with a strong technique (CPLEX) 4. Automation with a strong technique Solutions 1. Over-riding intuition 2. More recently, implicitly using intuition 3. Now, explicitly using intuition Example 57 (A new (Intel) factory) Building (clean rooms) costs ✩2G; equipment ✩6G2 . If I give you the flow, characteristics of the equipment, can you decide how much equipment is needed? Note that there’s re-entrant flow — machines used repeatedly in the process. Traditional methodology was divide and conquer: cost each machine type separately. Problem is that all the equipment is independent, but the flow is not. Hence we now do a discrete event simulation (warm it up for a year of simulated time, then run for two years). Typically end up with a set of equipment that costs less but actually produces more. Example 58 Lead time for equipment is growing: current 4Q-5Q. But forecasting is getting harder (1D–2Q). So what is your demand forecast? If we order equipment to hit the upper forecast, we risk using ✩300M unfulfilled, If we hit the lower forecast, we risk unfulfilling ✩3G of sales. So current strategy is to buy from the lower bound, with options (including paying for long-lead-time sub-assemblies) for more. 2 [Hsu21], admittedly six years later, claims ✩5–20G, and quotes a single extreme ultraviolet lithography (EUV) machine that costs more than ✩100 million. 96 I am confident telling any group at Intel that using our tools will halve your decision time (I normally get 5×–10×) and get a 5% better solution (I expect 10%–15%). Then we should recall “the wisdom of crowds”. Consider “Guess the weight” contests — the mean is generally closer than any individual forecast. Note that we hear 1:1 from our customers. Linear regression of forecast/actual purchase has r=0.78. There’s a “Bass Model” for technology diffusion. This reduces our average forecast error by 25%. Also set up a “prediction market” internally for our experts to buy “shares” in forecasts. 6 of 11 quarters are ±5%, 10 of 11 are ±10% — pretty good. A large range of possible projects, with inter-relationships. Key concept is the “efficient frontier of non-dominated Portfolios”. Then use “elimination by aspects”. First one is budgets — in line with plans. Then look at “products/projects in all”, in none etc. Then resources (by skill set) etc. Then market balance. Executives are irrationally overconfident in their decisions. Application of analytics to exclude or employ intuition can yield better/faster decisions. But what we are doing at Intel is only the tip of the iceberg! Call for young mathematicians to do more research here. 10.2 Developments in Computer Algebra Research and the Next Generation: Yokoyama “Heuristic Counting of Kachisa–Schaefer–Scott curves”: JSIAM Letters 6(2014) pp. 73-76. Consider elliptic curve cryptography. Note that you can draw a curve in R2 , but looked at over a finite field it’s a set of dots. Given P and Q, can we compute n such that Q = n × P . Pairing-friendly curves. Supersingular. Miyaji-Nakabayaski-Takano, BarretNaehig are the ones that interest us. Z y 1 C dx. Q(y) = + + 2 deg q deg r 2 (log c) Use Hosten-Thomas’ algorithm. Computed various examples from isl. 10.3 Lattice-based Analysis and Their Applications in Public Key Cruptanalysis; Morozov Note [Cop96] and [HerrmanMay2008] if we know some bits of p. [BloemerMay2003] if some bits of d are known. 97 Other side-channel attacks. Suppose Ni = pi qi and suppose pi share bots. Once studied by Faugère. Lemma 7 ([HG97]) If ||g(X1 x1 , lgots, Xn xn )|| > N √ ω then the root is exact. 1. Collect polynomials with root x0 modulo N m 2. Construct a lattice with coefficents gi (xX) as basis vectors. Thel LL reduce 3. If X < N 1/3 this is an exact solution. What we are doing: improve Sarkar-Maitra and revisit [Pengetal??]. 10.3.1 SarkatMaitra Suppose pi share a certain number of MSB. Then gcd(N1 , N2 +(p1 −p2 )q2 , . . .) = (0) p1 . We onbserve that ui contains a large prime q1 determines by N1 . Theorem 64 Suppose p − 1 have αn bits (qi have (1 − α)n bit) pi share γn bits. Then N1 , N2 can be factored in polynomial time if [condition on α, γ]. 10.3.2 Pengetal k α the reduced basis doesn’t actually Based on [MayRitzenhofen]. When γ < k−1 contain the required vector. They use [HerrmanMay2008] Apparently these two produce the same bounds. This works in the case of balanced moduli (α = 0.5). 512/512 bits needs 460 shared bits: lattice has dimension 105 and takes 2000 seconds. 10.4 Mansfield See also work of Hubert. She really put moving frames on a rigorous basis for symbolic computation. I need a Lie group. G × M → M is a regular free action. The elements of the group foliate the space, and there is a unique element of G that moves m to m′ . ρ : M → G by Solve ϕj (g · z) = 0 for j = 1/ldots dim G. Solve this and invoke Implicit Function Theorem. If I(zi ) are the canonical invariants for z = (z1 , ldots, zi ) and F (z1 , . . . , zn ) is an invariant, then we have a replacement rule F (z1 , . . .) = F (g · z1 , . . .) = · · · . Example 59 (difference) un+k 7→ ũn+k = λun+k + ϵ Φ : ×un = 1, ×un+1 = 0. λ = − un+11−un and µ. But I(un+k ) has a fixed base point, which is not what I want. End up with a matrix in λ, ϵ independent of n. 98 In anything, we end up with too many invariants. In the differential case, the components of the Maurer–Cartan matrices are (almost) generating. The point is to be able to solve for the invariants without solving for the frame. “multispace” is a manifold that contains the jet bundle, but also local lattice embeddings. Regard jet space as equivalent classes, and a function as equivalent to its Lagrange interpolation. Hence the points we interpolate have to be in general position. If points coalesce, we have points with multiplicity: ultimately interpolation becomes Taylor series. 10.5 Binomal Differnce Ideal and Toric Difference Variety: Yuan In the algebraic case, these are well-studied. [EisenbudSturmfels1996]. A lattice is a mobule in Z[x]n . Note not a PID so may not have HNF. (f1 , . . .) is a GB iff a generalised Hermite form. (F, σ)Pis a difference field. Assume F P algebarically closed. If p = ci xi write ap = (σ i a)ci . Ratio of σ-monomials is a Laurent σ-monomial. Hence Laurent σ-binomial:. We can define a partial character ona lattice Lp is a homomorphism onlt F ∗ . Let I(ρ) = [Yf − ρ(f )|f ∈ Lp ]. Get a difference ascending chain. Theorem 65 f is a reduced GB with [A] ̸= [1] iff A is a reguar and coherent difference ascending chain iff A is a characteristic set of [A]. An ideal is reflexive of ρx ∈ I ⇒ ρ ∈ I. Also Perfec and prime. We can define Z-saturated also x-saturated (xf ∈ L ⇒ xinL), and saturated if it is both. √ √ √ Example 60 F = Q( 3) and p = y 3 −1. {p} = [p, y x−1 −1] if σ( −3) = −3 and {p} = [p, y x−2 − 1] otherwise. Theorem 66 If I(ρ) is perfect, then Lρ is N -saturated; if Lρ is x, M -saturated then ;dots. Can characterise reflexive closure of T and perfect closure. Similar results in the non-Laurent case. Torilc σ-deals and varieties. A toric variety is a σ-variety parameterized by σ-monomials. Theorem 67 (equivalent) 1. X ≡ Spec(Q{M }) wherne M ⊂ Z[X] is . . . Theorem 68 The σ-Chow form of Xα is the σ-sparse resultant with support α. Algorithms to compute the saturations (in both directions). [Gaoetal2014aArXiV] 99 10.6 Differential Algebar and the muduli space of products of elliptic curves: Freitag This is really about conjectures coming from Diophantine Geometry. X is a family of sets (typically subvarieties of a fixed variety) and F a subset of special sets. Fa are special points. If V ∈ X contains “many” special points implies U ⊂ V is positive dimensional and special. Example 61 V = Cn ; X is { irreducible algebaric subsets of V }. F is pA where p ∈ T or(V ). . . . Also Manin–Mumford conjecture is of this form. Recall j-function. Definition 32 a function f which is anlytic on some domain is automorphic if 1. . . . Theorem 69 (Ax–Lindemann–Weierstrass) If the ai are linearly independent over C, their exponentials are algebarically independent. For “algebraically dependent” if ai = g(aj ) we will say thatj(ai ), j(aj ) are modularly dependent. Note that j satisfies a third-order differential equation. Theorem 70 (Pila) Let W ⊂ C The ai are modularly dependent iff the 3n functions are algebraiclly dependent. step 0 Let f (t)]inM er(U ) The Kolchin closure of Iso(j(f (t))) is given by {x|χ(x) = Sδ (f (t))}. Step1 By Nishioka’s theorem; j(f (t)) is generic on this set. Step 2 Shelah reflecting principle. Le A ⊂ B ⊂ M and tp(a/b) be a forking extension of tp(a/A). Thnen cb(a/B) ⊂ acl({di }i∈N ) where the di form an indiscernable sequence. Step 3 By Pila, linearly dependent → algebraically dependent. step 4 If we could assume di = j(gi t) for gi ∈ GL2 (R) we would be done. Step 5 Siedenberg. Let K = Q(u1 , . . . , un ) be a differential field generated by n elements over Q and letK1 = K(v) be a simple differentual field extensin of N . SUppose U ⊂ C is an open ball and ι : K → and . . . . Suppose Y ⊂ Xa × Xb and Y cnnot prokect ontpo both Xa and Xb . then we say Xa ⊥ Xb . 100 10.7 Differential Chow Varieties Exist: Wei Li P Algebraic Chow Variety. Let V = P si Vi be a d-cycle in Pn . The Chow form of V is a aunique P polynomialF (ui,j ) = ω cω Mω (ui,j ) such that F (ui,j ) = 0 ⇔ V bigcapdi=1 j ui,j v− = 0 ̸= 0. Example 62 A line in P3 . The Chow coordinates are then Plücker coordinates in this case. For an affine variety, the Chow variety may not be closed. Differential Chow Form[GaoLiYuan2013]. Consider a sufficiently saturated U |= DCF0 and An ≡ U n . Hence differential Cow coordinates. Proved that these differential Chow varieties exist when g = 1. We will now show that these exost for all (d, h, g, m). Use various ingrediat=ents, especially differential characteristic sets. Need a prolongation sequence τl : functors for the category of algebraic varieties in An to the category of algebraic varieties in An(l+1) . ∇l : V → τl (V ) — differential point. A component of a differential variety with maximal Kolchin polynomial is called a generic component. Need toprove results about what, relative to DCF0 , is definable in families. Butit is open whether primality of radical ideals is definable in families. We proved that C1 is a constructible set, with a 1-1 map to δ-Chown (d, h, g, m). Is there a more natural construction (this one used a lot of model theory!). Also the Ritt problem! Q Do you know any one example? A We know ones in dimension 1, not in higher dimension. Q Is there any conjecture that can imply the Ritt problem? A No! 10.7.1 10.7.2 101 Bibliography [AR15] A. Arnold and D.S Roche. Output-Sensitive Algorithms for Sumset and Sparse Polynomial Multiplication. In D. Robertz, editor, Proceedings ISSAC 2015, pages 29–36, 2015. [Arn03] E.A. Arnold. Modular algorithms for computing Gröbner bases. J. Symbolic Comp., 35:403–419, 2003. [BC11] P. Bürgisser and F. Cucker. On a problem posed by Steve Smale. Annals of Mathematics, 174:1785–1836, 2011. [Bec94] T. Becker. On Gröbner Bases under Specialization. AAECC, 5:1–8, 1994. [BFDS15] D.K. Boku, C. Fieker, W. Decker, and A. Steenpass. Gröbner Bases over Algebraic Number Fields. http://arxiv.org/abs/ 1504.04564, 2015. [Bix10] R.E. Bixby. Mixed-Integer Programming: It works better than you may think. www.ferc.gov/eventcalendar/Files/20100609110044Bixby, 2010. [BKY09] M. Burr, F. Krahmer, and C. Yap. Continuous amortization: A nonprobabilistic adaptive analysis technique. Technical Report TR09136 Electronic Colloquium on Computational Complexity, 2009. [BL95] W. Bosma and H.W. Lenstra. Complete systems of two addition laws for elliptic curves. J. Number Theory, 53:229–240, 1995. [BPR06] S. Basu, R. Pollack, and M.-F. Roy. Algorithms in Real Algebraic Geometry, 2nd ed. Springer, 2006. [CC86] D.V. Chudnovsky and G.V. Chudnovsky. Elliptic Functions and Algebraic Topology. SCRATCHPAD II Newsletter 1(1985-6) 2, pages 2–3, 1986. [CGTW95] R.M. Corless, P. Gianni, B.M. Trager, and S.M. Watt. The singular value decomposition for polynomial systems. In A.H.M. Levelt, editor, Proceedings ISSAC 1995, pages 195–207, 1995. 102 [Cop96] D. Coppersmith. Finding a small root of a bivariate integer equation; factoring with high bits known. In Proceedings EUROCRYPT ’96, pages 178–189, 1996. [Dav87] J.H. Davenport. Looking at a set of equations (Technical Report 8706, University of Bath Computer Science). http://staff.bath. ac.uk/masjhd/TR87-06.pdf, 1987. [DJS15] L. D’Alfonso, G. Jeronimo, and P. Solernó. A decision method for the integrability of differential-algebraic Pfaffian systems. http: //arxiv.org/abs/1501.04941, 2015. [DMSX06] X. Dahan, M. Moreno Maza, É. Schost, and Y. Xie. On the complexity of the D5 principle. In J.-G. Dumas, editor, Proceedings Transgressive Computing 2006, pages 149–168, 2006. [DX14] L. Dai and B. Xia. Smaller SDP for SOS Decomposition. http: //arxiv.org/abs/1407.2679, 2014. [Fau02] J.-C. Faugère. A New Efficient Algorithm for Computing Gröbner Bases Without Reduction to Zero (F5 ). In T. Mora, editor, Proceedings ISSAC 2002, pages 75–83, 2002. [FGT02] E. Fortuna, P. Gianni, and B. Trager. Derivations and Radicals of Polynomial Ideals over Fields of Arbitrary Characteristic. J. Symbolic Comp., 33:609–625, 2002. [FS14] J. Freitag and O.L. Sanchez. Effective uniform bounding in partial differential fields. http://arxiv.org/abs/1411.0029, 2014. [Gat90] K. Gatermann. Symbolic Solutions of Polynomial Equation Systems with Symmetry. In S. Watanabe and M. Nagata, editors, Proceedings ISSAC 1990, pages 112–119, 1990. [GKOS08] O. Golubitsky, M. Kondratieva, A. Ovchinnikov, and A. Szanto. A Bound for Orders in Differential Nullstellensatz. http://arxiv. org/abs/0803.0160, 2008. [Gri89] D.Yu. Grigoriev. Complexity of quantifier elimination in the theory of ordinary differential equations. In Proceedings EUROCAL 87, pages 11–25, 1989. [GT96] P. Gianni and B.M. Trager. Square–Free Algorithms in Finite Characteristic. AAECC, 7:1–14, 1996. [GXD+ 14] Z. Guo, Q. Xia, Z. Du, L. Ji, and Z. Han. Research of critical ambient temperature of cylindrical fireworks and crackers. Journal of Thermal Analysis and Calorimetry, 115:1787–1792, 2014. [Has88] B.J. Hastad. Solving Simultaneous Modular Equations of Low Degree. SIAM J. Comp., 17:336–341, 1988. 103 [HG97] N.A. Howgrave-Graham. Finding Small Roots of Univariate Modular Equations Revisited. Cryptography and Coding (Ed. M. Darnell), pages 131–142, 1997. [HHS12] J.D. Hauenstein, N. Hein, and F. Sottile. Certifiable Numerical Computations in Schubert Calculus. http://arxiv.org/abs/ 1212.3315, 2012. [Hı10] H. Hıs, ıl. Elliptic Curves, Group Law and Efficient Computation. PhD thesis, Queensland University of Technology, 2010. [HL12] E. Hubert and G. Labahn. Rational invariants of scalings from Hermite normal forms. In Proceedings ISSAC 2012, pages 219–226, 2012. [HSL14] Z. Huang, Y. Sun, and D. Lin. On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method. http: //arxiv.org/abs/1405.4596, 2014. [Hsu21] J. Hsu. The great chip crisis threatens the promise of Moore’s Law. https://www.technologyreview.com/2021/06/30/1026438/ global-microchip-shortage-problem-m1-apple-tsmc-intel/, 2021. [HZ00] R. Hartley and A. Zisserman. See book: Multiple View Geometry in Computer Vision. C.U.P., 2000. [IPS11] I. Idrees, G. Pfister, and S. Steidel. Parallelization of Modular Algorithms. J. Symbolic Comp., 46:672–684, 2011. [JQ01] M. Joye and J.-J. Quisquater. On Rabin-Type Signatures. In B. Honary, editor, Proceedings 8th. IMA Conf. Cryptography and Coding, pages 99–113, 2001. [Kal98] M. Kalkbrener. Algorithmic properties of polynomial rings. J. Symbolic Comp., 26:525–581, 1998. [Kar84a] N.K. Karmarkar. A New Polynomial-Time Algorithm for Linear Programming. Combinatorica, 4:373–395, 1984. [Kar84b] N.K. Karmarkar. A New Polynomial-Time Algorithm for Linear Programming. In Proceedings 16th STOC, pages 302–311, 1984. [Laz83] D. Lazard. Gröbner Bases, Gaussian Elimination and Resolution of Systems of Algebraic Equations. In Proceedings EUROCAL 83, pages 146–157, 1983. [Laz85] D. Lazard. Ideal Bases and Primary Decomposition: Case of Two Variables. J. Symbolic Comp., 1:261–270, 1985. 104 [Laz92] D. Lazard. Solving Zero-dimensional Algebraic Systems. J. Symbolic Comp., 13:117–131, 1992. [Mal14] G. Malajovich. Computing mixed volume and all mixed cells in quermassintegral time. http://arxiv.org/abs/1412.0480, 2014. [MMT92] H. Möller, T. Mora, and C. Traverso. Gröbner bases computation using syzygies. In Proceedings ISSAC ’92, pages 320–328, 1992. [Moo65] G.E. Moore. Cramming More Components onto Integrated Circuits. Electronics, pages 114–117, 1965. [Pfi07] G. Pfister. On Modular Computation of Standard bases. Analele Stiintifice ale Universitatii Ovidius Mathematical Series, XV:129– 137, 2007. [Sei74] A. Seidenberg. Constructions in Algebra. Trans. A.M.S., 197:273– 313, 1974. [SM15] M. Sagraloff and K. Mehlhorn. Computing real roots of real polynomials. To appear in J. Symbolic Comp, 2015. [Stu95] B. Sturmfels. Gröbner Bases and Convex Polytopes. Amer. Math. Sci., 1995. [SVV10] F. Sottile, R. Vakil, and J. Verschelde. Solving Schubert Problems with Littlewood-Richardson Homotopies. In S.M. Watt, editor, Proceedings ISSAC 2010, pages 179–186, 2010. [SY11] M. Sagraloff and C.K. Yap. A simple but exact and efficient algorithm for complex root isolation. In Proceedings ISSAC 2011, pages 353–360, 2011. [SY12] V. Sharma and C.K. Yap. Near Optimal Tree Size Bounds on a Simple Real Root Isolation Algorithm. In Proceedings ISSAC 2012, pages 319–326, 2012. [TB14] I. Tamo and A. Barg. A Family of Optimal Locally Recoverable Codes. IEEE Trans. Information Theory, 60:4661–4676, 2014. [vH94] M. van Hoeij. An algorithm for computing an integral basis in an algebraic function field. J. Symbolic Comp., 18:353–363, 1994. [VY15] J. Verschelde and X. Yu. Accelerating Polynomial Homotopy Continuation on a Graphics Processing Unit with Double Double and Quad Double Arithmetic. http://arxiv.org/abs/1501.06625, 2015. [Wu 79] Wu and Wen Tsün. On the Mechanization of Theorem Proving in Elementary Differential Geometry. Sci. Sinica 1979 (Special Issue I on Mathematics), pages 94–102, 1979. 105