On the Parallel Computation of Boolean Gr¨obner Bases Shutaro Inoue & Yosuke Sato A commutative ring with an identity such that every element of which is idempotent is called a boolean ring. For a boolean ring B, a quotient ring B[X1 , . . . , Xn ]/〈X12 − X1 , . . . , Xn2 − Xn 〉 also becomes a boolean ring. It is called a boolean polynomial ring. A Gr¨ obner basis in a boolean polynomial ring (called a boolean Gr¨ obner basis) is first introduced in [2] and further properties are studied in [3] and [5]. A naive approach for the parallel computation of boolean Gr¨obner bases is also discussed in [4]. In the talk, we introduce a more sophisticated parallel algorithm for the computation of boolean Gr¨ obner bases, which is based on the results of [5]. We show our algorithm is satisfactorily efficient using benchmark data of our computation experiments obtained by our parallel implementation of the algorithm on the computer algebra system Risa/Asir([1]) with the parallel computation environment OpenXM([6]).

References [1] Noro, M. and Takeshima, T. Risa/Asir - Computer Algebra System. International Symposium on Symbolic and Algebraic Computation(ISSAC 92),Proceedings, 387396, ACM Press, 1992. [2] Sakai, K. and Sato, Y. Boolean Gr¨obner bases.ICOT Technical Memorandum 488. http://www.icot.or.jp/ARCHIVE/Museum/TRTM/tm-list-E.html [3] Sato, Y. A new type of canonical Gr¨obner Bases in polynomial rings over Von Neumann regular rings, International Symposium on Symbolic and Algebraic Computation(ISSAC 98),Proceedings, pp 317-321, ACM Press, 1998. [4] Sato, Y. and Suzuki, A. Parallel computation of Boolean Gr¨obner Bases. Proceedings of the Fourth Asian Technology Conference in Mathematics(ATCM 1999), pp 265274, 1999. [5] Sato, Y. Nagai, A and Inoue, S. On the Computation of Elimination Ideals of Boolean Polynomial Rings. The Asian Symposium on Computer Mathematics(ASCM 2007). To appear in LNCS Vol.5081. [6] Takayama, N. etc. Open message eXchage protocol for Mathematics,        http://www.math.kobe-u.ac.jp/OpenXM/

1

On the Parallel Computation of Boolean Gröbner Bases

obtained by our parallel implementation of the algorithm on the computer algebra system. Risa/Asir([1]) with the parallel computation environment OpenXM([6]).

28KB Sizes 2 Downloads 35 Views

Recommend Documents

Efficient Computation of Regularized Boolean ...
enabled the development of simple and robust algorithms for performing the most usual and ... Some practical applications of the nD-EVM are also commented. .... Definition 2.3: We will call Extreme Vertices of an nD-OPP p to the ending ...

Responsive Parallel Computation: Bridging Competitive ... - Umut Acar
one of the most widely applicable abstractions in computer science. Over many years of research ... result in complex, low-level, and error-prone code. There ..... conditions: for the bound, we assume an online scheduling algorithm that has no ...

Responsive Parallel Computation: Bridging Competitive ... - Umut Acar
allelism, and its use goes back to early parallel programming languages ... ability of multicore computers. Parallel .... Vertices with in-degree two “join” two parallel computations; ..... conditions: for the bound, we assume an online schedulin

Parallel Computing System for e cient computation of ...
Host Code: C++. The string comparison process is made in parallel. Device Code: CUDA for C. Raul Torres. Parallel Computing System for e cient computation ...

Parallel Computing System for efficient computation of ...
Parallel programming considerations. • The general process is executed over the CPU. – Host Code: C++. • The string comparison process is made in parallel.

on the minimal fourier degree of symmetric boolean ...
2. AMIR SHPILKA, AVISHAY TAL of course other areas of math and physics), a partial list includes learning theory, hardness of approximation, pseudo-randomness, social choice theory, coding theory, cryptography, additive combinatorics and more. A typi

Developmental influences on the neural bases of ...
Oct 12, 2010 - of opportunity for learning new skills and forging an adult identity. However, it is also a time of vulnerability, as adolescents begin to face.

Developmental influences on the neural bases of ...
internet connection with two other players, whereas the actions of these players are actually pre-programmed to include or exclude the. NeuroImage xxx (2010) ..... T1-weighted structural images, and multislice T2*-weighted echo planar volumes with BO

ON THE COMPUTATION OF RATIONAL POINTS OF A ...
d. ∑ i=0. |Bi|. We also set D−1 := 0. Observe that the sequence (Di)i≥−1 is strictly increasing. Therefore, there exists a unique κs ∈ N such that. Dκs−1 < s ≤ Dκs . By definition it follows that κs ≤ d. The matrix MΦ ∈ Fs(d+1)

On the Computation of Maximal-Correlated Cuboids Cells
since the introduction of data warehousing, OLAP, and the data cube ... In this paper, we propose a new iceberg cube mining method for reducing cuboids.

On the Power of Correlated Randomness in Secure Computation ...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7785). Cite this paper as: Ishai Y., Kushilevitz E., Meldgaard S., Orlandi C., ...

On the Power of Correlated Randomness in Secure Computation
later consumed by an “online protocol” which is executed once the inputs become available. .... The communication and storage complexity of our perfectly secure protocols ..... of space. 3 Optimal Communication for General Functionalities.

On the Computation of Maximal-Correlated Cuboids Cells
j2. (a1,b1,c1,d1). (*,b1,*,d1). 2/3 j0. 2 j3. (*,b2,c2,*). (*,b2,c2,*). 1 j0. 2. 4 Evaluation Study. In this section, we report our experimental results on the shrinking and ...

Scalable Node Level Computation Kernels for Parallel ...
node level primitives, computation kernels and the exact inference algorithm using the ... Y. Xia is with the Computer Science Department, University of Southern.

On Counterfactual Computation
cast the definition of counterfactual protocol in the quantum program- ... fact that the quantum computer implementing that computation might have run.

GraphSC: Parallel Secure Computation Made ... - Research at Google
statistics, ad campaigns, road traffic and disease monitoring, etc). Secure ... GraphLab) is to compute influence in a social graph through, .... To the best of our ..... networks through back propagation [62] or parallel empirical ..... Page 10 ...

Numeric Literals Strings Boolean constants Boolean ... - GitHub
iRODS Rule Language Cheat Sheet. iRODS Version 4.0.3. Author: Samuel Lampa, BILS. Numeric Literals. 1 # integer. 1.0 # double. Strings. Concatenation:.

The Genetic Code Boolean Lattice ABSTRACT
Knight et al (1999). Our partial order, obtained in the codon set as a consequence of a Boolean lattice and defined in the standard genetic code, reflects the relationship between the codon assignment and the .... base is U coding to hydrophobic amin

Self-organized Boolean game on networks - Semantic Scholar
Tao Zhou,1,2 Bing-Hong Wang,1,* Pei-Ling Zhou,2 Chun-Xia Yang,2 and Jun Liu2. 1Department of Modern Physics, University of Science and Technology of China, ... years. It is not unexpected that the systems with globally shared information can be ... d

On computation and characterization of robust Nash ...
provide some answers to these problems and have recently gained a lot of interest. In game theory, we can distinguish at least two sources of uncertainties. They can emerge from the fact that a player has only partial or raw information about his act

Computation of Posterior Marginals on Aggregated ... - IEEE Xplore
Abstract—Optimum soft decoding of sources compressed with variable length codes and quasi-arithmetic codes, transmitted over noisy channels, can be ...

Distributed PageRank Computation Based on Iterative ... - CiteSeerX
Oct 31, 2005 - Department of Computer. Science. University of California, Davis. CA 95616, USA .... sults show that the DPC algorithm achieves better approx-.