Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Algorithms in algebraic geometry (IMA Volumes in Mathematics and its Applications)
Dickenstein A., Schreyer F., Sommese A., Springer, 2007. Type: Book
Date Reviewed: Jul 30 2008

This thin but dense volume emerged from a 2006 workshop of the same title, a workshop that drew 110 participants. The reader who has never heard of fewnomials, cohomology rings, the Zariski topology, or a Schubert variety will have difficulty penetrating the papers. Here, I will attempt to give a sense of two of the eight papers in the book.

“Efficient Inversion of Rational Maps Over Finite Fields” addresses a technical question inspired by cryptography. Some public-key encryption schemes effectively map an n-dimensional point in a finite field via a rational map, relying on the fact that solving equations over a finite field is nondeterministic polynomial time (NP) complete. However, several of the proposed schemes have proven to be insecure, suggesting that perhaps the maps used in encryption are special. This paper shows that inverting such a map, which is what it takes to crack the encoding, can be accomplished in exponential time in various geometric parameters of the map. There is evidence that this exponential dependence is necessary, and the result suggests that these schemes are likely secure.

“Semidefinite Representation of the k-Ellipse” proves several theorems about the k-ellipse, the plane curve that is the locus of all points whose sum of distances from k given foci is some prescribed number d. They compute and study the irreducible polynomial p(x,y) that vanishes on the k-ellipse, and prove that it has degree at most 2k if k is odd, and somewhat less if k is even. The k-ellipse itself is a convex curve (classically known as an Eikurven--an egg curve), but the Zariski closure p(x,y)=0 has many more branches. They show an example of this closure for a 5-ellipse, a beautifully intricate algebraic curve of degree 25=32. The point that realizes the smallest d is known as the Fermat-Weber point of the k foci and is of considerable interest for facility location.

The other six papers similarly have some connection to a motivating application, but the focus of all papers in this volume is on the deep technical algebraic geometry behind the algorithms.

Reviewer:  Joseph O’Rourke Review #: CR135889 (0906-0529)
Bookmark and Share
  Featured Reviewer  
 
Discrete Mathematics (G.2 )
 
 
Algebraic Algorithms (I.1.2 ... )
 
 
Geometrical Problems And Computations (F.2.2 ... )
 
 
Computational Geometry And Object Modeling (I.3.5 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Discrete Mathematics": Date
 Discrete mathematics and its applications
Rosen K., McGraw-Hill Higher Education, Columbus, OH, 2002.  928, Type: Book (9780072424348)
May 7 2003
Derandomization of auctions
Aggarwal G., Fiat A., Goldberg A., Hartline J., Immorlica N., Sudan M.  Theory of computing (Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, Baltimore, MD, May 22-24, 2005)619-625, 2005. Type: Proceedings
Jul 31 2006
Algorithms on strings
Crochemore M., Hancart C., Lecroq T., Cambridge University Press, New York, NY, 2007.  392, Type: Book (9780521848992)
Apr 8 2008
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy