scholarly journals An algebraic version of the multiplication property of the Fredholm index

1994 ◽  
Vol 208-209 ◽  
pp. 229-230 ◽  
Author(s):  
Don Hadwin
2009 ◽  
Vol 431 (11) ◽  
pp. 2049-2061 ◽  
Author(s):  
Dana Gheorghe ◽  
Florian-Horia Vasilescu
Keyword(s):  

2017 ◽  
Vol 19 (6) ◽  
pp. 1785-1810 ◽  
Author(s):  
Jacob Fox ◽  
János Pach ◽  
Adam Sheffer ◽  
Andrew Suk ◽  
Joshua Zahl
Keyword(s):  

2019 ◽  
Vol 18 (01) ◽  
pp. 1950003 ◽  
Author(s):  
Gregor Dolinar ◽  
Alexander Guterman ◽  
Bojan Kuzma ◽  
Olga Markova

Linear algebraic version of celebrated Double Centralizing Theorem states that the set of matrices commuting with all matrices from a centralizer of a given matrix [Formula: see text] coincides with the set of polynomials in [Formula: see text]. We examine the existence of an analogue of this classical result once commutativity is substituted by commutativity up to a factor, which is an important relation in quantum physics.


2021 ◽  
Vol 157 (3) ◽  
pp. 573-624
Author(s):  
Tatsuki Kuwagaki

We introduce irregular constructible sheaves, which are ${\mathbb {C}}$-constructible with coefficients in a finite version of the Novikov ring $\Lambda$ and special gradings. We show that the bounded derived category of cohomologically irregular constructible complexes is equivalent to the bounded derived category of holonomic ${\mathcal {D}}$-modules by a modification of D’Agnolo and Kashiwara's irregular Riemann–Hilbert correspondence. The bounded derived category of cohomologically irregular constructible complexes is equipped with the irregular perverse $t$-structure, which is a straightforward generalization of usual perverse $t$-structure, and we prove that its heart is equivalent to the abelian category of holonomic ${\mathcal {D}}$-modules. We also develop the algebraic version of the theory.


Author(s):  
Vladimir F. Molchanov ◽  
Svetlana V. Tsykina

The basic notion of the Berezin quantization on a manifold M is a correspondence which to an operator A from a class assigns the pair of functions F and F^♮ defined on M. These functions are called covariant and contravariant symbols of A. We are interested in homogeneous space M=G/H and classes of operators related to the representation theory. The most algebraic version of quantization — we call it the polynomial quantization — is obtained when operators belong to the algebra of operators corresponding in a representation T of G to elements X of the universal enveloping algebra Env g of the Lie algebra g of G. In this case symbols turn out to be polynomials on the Lie algebra g. In this paper we offer a new theme in the Berezin quantization on G/H: as an initial class of operators we take operators corresponding to elements of the group G itself in a representation T of this group. In the paper we consider two examples, here homogeneous spaces are para-Hermitian spaces of rank 1 and 2: a) G=SL(2;R), H — the subgroup of diagonal matrices, G/H — a hyperboloid of one sheet in R^3; b) G — the pseudoorthogonal group SO_0 (p; q), the subgroup H covers with finite multiplicity the group SO_0 (p-1,q -1)×SO_0 (1;1); the space G/H (a pseudo-Grassmann manifold) is an orbit in the Lie algebra g of the group G.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ying Zou ◽  
Yanting Chai ◽  
Sha Shi ◽  
Lei Wang ◽  
Yunfeng Peng ◽  
...  

Due to the transparency of the wireless channel, users in multiple-key environment are vulnerable to eavesdropping during the process of uploading personal data and re-encryption keys. Besides, there is additional burden of key management arising from multiple keys of users. In addition, profile matching using inner product between vectors cannot effectively filter out users with ulterior motives. To tackle the above challenges, we first improve a homomorphic re-encryption system (HRES) to support a single homomorphic multiplication and arbitrarily many homomorphic additions. The public key negotiated by the clouds is used to encrypt the users’ data, thereby avoiding the issues of key leakage and key management, and the privacy of users’ data is also protected. Furthermore, our scheme utilizes the homomorphic multiplication property of the improved HRES algorithm to compute the cosine result between the normalized vectors as the standard for measuring the users’ proximity. Thus, we can effectively improve the social experience of users.


Sign in / Sign up

Export Citation Format

Share Document