Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3208976.3208979acmotherconferencesArticle/Chapter ViewAbstractPublication PagesissacConference Proceedingsconference-collections
research-article

Extending the GVW Algorithm to Local Ring

Published: 11 July 2018 Publication History

Abstract

A new algorithm, which combines the GVW algorithm with the Mora normal form algorithm, is presented to compute the standard bases of ideals in a local ring. Since term orders in local ring are not well-orderings, there may not be a minimal signature in an infinite set, and we can not extend the GVW algorithm from a polynomial ring to a local ring directly. Nevertheless, when given an anti-graded order in R and a term-over-position order in Rm that are compatible, we can construct a special set such that it has a minimal signature, where R, Rm are a local ring and a R -module, respectively. That is, for any given polynomial v0 ın R, the set consisting of signatures of pairs (u,v)ın Rm x R has a minimal element, where the leading power products of v and v0 are equal. In this case, we prove a cover theorem in R, and use three criteria (syzygy criterion, signature criterion and rewrite criterion) to discard useless J-pairs without any reductions. Mora normal form algorithm is also extended to do regular top-reductions in Rm x R, and the correctness and termination of the algorithm are proved. The proposed algorithm has been implemented in the computer algebra system Maple, and experiment results show that most of J-pairs can be discarded by three criteria in the examples.

References

[1]
A. Arri and J. Perry. 2011. The F5 criterion revised. Journal of Symbolic Computation Vol. 46, 9 (2011), 1017--1029.
[2]
G. Ars and A. Hashemi. 2010. Extended F5 criteria. Journal of Symbolic Computation Vol. 45 (2010), 1330--1340.
[3]
B. Buchberger. 1965. Ein Algorithmus zum Auffinden der Basiselemente des Restklassenrings nach einem nulldimensionalen Polynomideal. Ph.D. Dissertation.
[4]
B. Buchberger. 1979. A criterion for detecting unnecessary reductions in the construction of Gröbner-bases. Symbolic and Algebraic Computation. Springer, 3--21.
[5]
B. Buchberger. 1985. Grobner bases: an algorithmic method in polynomial ideal theory. Multidimensional systems theory (1985), 184--232.
[6]
D. Cox, J. Little, and D. O'shea. 2005. Using Algebraic Geometry. Springer.
[7]
D. Cox, J. Little, and D. O'shea. 2007. Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra. Springer.
[8]
C. Eder and J.-C. Faugère. 2017. A survey on signature-based Gröbner basis computations. Journal of Symbolic Computation Vol. 80 (2017), 719--784.
[9]
C. Eder and J. Perry. 2010. F5C: a variant of Faugère's F5 algorithm with reduced Gröbner bases. Journal of Symbolic Computation Vol. 45, 12 (2010), 1442--1458.
[10]
C. Eder and J. Perry. 2011. Signature-based algorithms to compute Gröbner bases Proceedings of the 2011 international symposium on Symbolic and algebraic computation. ACM, 99--106.
[11]
C. Eder, G. Pfister, and A. Popescu. 2017. On Signature-based Gröbner bases over Euclidean Rings Proceedings of the 2017 International Symposium on Symbolic and Algebraic Computation. ACM, 141--148.
[12]
J.-C. Faugère. 1999. A new efficient algorithm for computing Gröbner bases (F4). Journal of pure and applied algebra Vol. 139, 1 (1999), 61--88.
[13]
J.-C. Faugère. 2002. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) Proceedings of the 2002 international symposium on Symbolic and algebraic computation. ACM, 75--83.
[14]
S.H. Gao, Y. Guan, and F. Volny IV. 2010. A new incremental algorithm for computing Gröbner bases Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation. ACM, 13--19.
[15]
S.H. Gao, F. Volny IV, and M.S. Wang. 2016. A new framework for computing Gröbner bases. Math. Comp. Vol. 85, 297 (2016), 449--465.
[16]
R. Gebauer and H.M. Möller. 1986. Buchberger's algorithm and staggered linear bases Proceedings of the 5th ACM symposium on Symbolic and algebraic computation. ACM, 218--221.
[17]
V.-P. Gerdt, A. Hashemi, and B. M.-Alizadeh. 2013. Involutive Bases Algorithm Incorporating F5 Criterion. Journal of Symbolic Computation Vol. 59 (2013), 1--20.
[18]
A. Giovini, T. Mora, G. Niesi, L. Robbiano, and C. Traverso. 1991. "One sugar cube, please" or selection strategies in the Buchberger algorithm Proceedings of the 1991 international symposium on Symbolic and algebraic computation. ACM, 49--54.
[19]
G.M. Greuel and G. Pfister. 2002. A Singular Introduction to Commutative Algebra. Springer-Verlag Berlin Heidelberg.
[20]
D. Lazard. 1983. Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations. Computer algebra. Springer, 146--156.
[21]
H.M. Möller, T. Mora, and C. Traverso. 1992. Gröbner bases computation using syzygies. In Proceedings of the 1992 international symposium on Symbolic and algebraic computation. ACM, 320--328.
[22]
T. Mora, G. Pfister, and C. Traverso. 1992. An introduction to the tangent cone algorithm. Issues in non-linear geometry and robotics, CM Hoffman ed (1992).
[23]
Y. Sun and D.K. Wang. 2011. The F5 algorithm in Buchberger's style. Journal of Systems Science and Complexity Vol. 24, 6 (2011), 1218--1231.
[24]
Y. Sun and D.K. Wang. 2011. A generalized criterion for signature related Gröbner basis algorithms Proceedings of the 2011 international symposium on Symbolic and algebraic computation. ACM, 337--344.

Cited By

View all
  • (2024)Signature-based standard basis algorithm under the framework of GVW algorithmJournal of Symbolic Computation10.1016/j.jsc.2024.102370(102370)Online publication date: Jul-2024
  • (2023)Axioms for a theory of signature basesJournal of Symbolic Computation10.1016/j.jsc.2023.102275(102275)Online publication date: Dec-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISSAC '18: Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation
July 2018
418 pages
ISBN:9781450355506
DOI:10.1145/3208976
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 July 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GVW algorithm
  2. local ring
  3. signature
  4. standard bases

Qualifiers

  • Research-article

Funding Sources

Conference

ISSAC '18

Acceptance Rates

Overall Acceptance Rate 395 of 838 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Signature-based standard basis algorithm under the framework of GVW algorithmJournal of Symbolic Computation10.1016/j.jsc.2024.102370(102370)Online publication date: Jul-2024
  • (2023)Axioms for a theory of signature basesJournal of Symbolic Computation10.1016/j.jsc.2023.102275(102275)Online publication date: Dec-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media