Hermitian, Symmetric and Symplectic Random Ensembles

Total Page:16

File Type:pdf, Size:1020Kb

Hermitian, Symmetric and Symplectic Random Ensembles Annals of Mathematics, 153 (2001), 149–189 Hermitian, symmetric and symplectic random ensembles: PDEs for the distribution of the spectrum By M. Adler and P. van Moerbeke* Abstract Given the Hermitian, symmetric and symplectic ensembles, it is shown that the probability that the spectrum belongs to one or several intervals sat- isfies a nonlinear PDE. This is done for the three classical ensembles: Gaussian, Laguerre and Jacobi. For the Hermitian ensemble, the PDE (in the boundary points of the intervals) is related to the Toda lattice and the KP equation, whereas for the symmetric and symplectic ensembles the PDE is an inductive equation, related to the so-called Pfaff-KP equation and the Pfaff lattice. The method consists of inserting time-variables in the integral and showing that this integral satisfies integrable lattice equations and Virasoro constraints. Contents 0. Introduction 0.1. Hermitian, symmetric and symplectic Gaussian ensembles 0.2. Hermitian, symmetric and symplectic Laguerre ensembles 0.3. Hermitian, symmetric and symplectic Jacobi ensembles 0.4. ODEs, when E has one boundary point 1. Beta-integrals 1.1. Virasoro constraints for β-integrals 1.2. Proof: β-integrals as fixed points of vertex operators 1.3. Examples arXiv:math-ph/0009001v2 14 Aug 2001 2. Matrix integrals and associated integrable systems 2.1. Hermitian matrix integrals and the Toda lattice 2.2. Symmetric/symplectic matrix integrals and the Pfaff lattice 3. Expressing t-partials in terms of boundary-partials 3.1. Gaussian and Laguerre ensembles 3.2. Jacobi ensemble 3.3. Evaluating the matrix integrals on the full range ∗The support of a National Science Foundation grant #DMS-98-4-50790 is gratefully acknowl- edged. The support of a National Science Foundation grant #DMS-98-4-50790, a Nato, a FNRS and a Francqui Foundation grant is gratefully acknowledged. 150 M. ADLER AND P. VAN MOERBEKE 4. Proof of Theorems 0.1, 0.2, 0.3 4.1. β = 2, 1 4.2. β = 4, using duality 4.3. Reduction to Chazy and Painlev´eequations (β = 2) 5. Appendix. Self-similarity proof of the Virasoro constraints (Theorem 1.1) 0. Introduction V (z) Consider weights of the form ρ(z)dz := e− dz on an interval F = [A, B] R, with rational logarithmic derivative and subjected to the following ⊆ boundary conditions: i ρ′ g 0∞ biz k (0.0.1) = V ′ = = i , lim f(z)ρ(z)z = 0 for all k 0, − ρ f ∞ a z z A,B ≥ P0 i → together with a disjoint unionP of intervals, r (0.0.2) E = [c2i 1, c2i] F R. − ⊆ ⊆ [1 The data (0.0.1) and (0.0.2) define an algebra of differential operators 2r k+1 ∂ (0.0.3) k = ci f(ci) . B ∂ci X1 Let n, n and n denote the Hermitian (M = M¯ ⊤), symmetric (M = M ⊤) H S T 1 and “symplectic” ensembles (M = M¯ ⊤, M = JMJ¯ − ), respectively. Tra- ditionally, the latter is called the “symplectic ensemble,” although the ma- trices involved are not symplectic! These conditions guarantee the reality of the spectrum of M. Then, (E), (E) and (E) denote the subsets of Hn Sn Tn , and with spectrum in the subset E F R. The aim of this paper Hn Sn Tn ⊆ ⊆ is to find PDEs for the probabilities (0.0.4) P (E): = P ( all spectral points of M E) n n ∈ e tr V (M)dM n(E), n(E) or n(E) − = H S T e tr V (M)dM R n(F ), n(F ) or n(F ) − H S T R β n V (zk) En ∆n(z) k=1 e− dzk = | |β n V (z ) , β = 2, 1, 4 respectively, n ∆ (z) e k dz RF | n | Qk=1 − k for the Gaussian,R Laguerre andQ Jacobi weights. The probabilities involve pa- rameters β, a, b (see (0.1.1), (0.2.1) and (0.3.2)) and 1/2 1/2 2 β β − 0 for β = 2 δβ := 2 = 1,4 2 2 1 for β = 1, 4. − ! ( RANDOM ENSEMBLES 151 The method used to obtain these PDEs involves inserting time-parameters into the integrals, appearing in (0.0.4) and to notice that the integrals obtained satisfy Virasoro constraints: linear PDEs in t and the boundary points of E, and • integrable hierarchies: • ensemble β lattice Hermitian β = 2 Toda symmetric β = 1 Pfaff symplectic β = 4 Pfaff . As a consequence of a duality (explained in Theorem 1.1) between β-Virasoro generators under the map β 4/β, the PDEs obtained have a remarkable 7→ property: the coefficients Q and Qi in the PDEs are functions of the variables n, β, a, b, and have the invariance property under the map a b n 2n, a , b ; →− →−2 →−2 to be precise, a b (0.0.5) Qi( 2n,β, , ) = Qi(n, β, a, b) β=4 . − −2 −2 β=1 | Important remark. For β = 2, the probabilities satisfy PDEs in the bound- ary points of E, whereas in the case β = 1, 4, the equations are inductive. Namely, for β = 1 (resp. β = 4), the probabilities Pn+2 (resp. Pn+1) are given in terms of Pn 2 (resp. Pn 1) and a differential operator acting on Pn. − − 0.1. Hermitian, symmetric and symplectic Gaussian ensembles. Given the 2 disjoint union E R and the weight e bz , the differential operators take ⊂ − Bk on the form 2r k+1 ∂ k = ci . B ∂ci X1 Also, define the invariant polynomials (in the sense of (0.0.5)) 2 2 Q = 12b2n n + 1 , Q = 4(1 + δβ )b 2n + δβ (1 ) β 2 1,4 1,4 β − − and b2 Q = 2 δβ . 1 − 1,4 β Theorem 0.1. The following probabilities for (β = 2, 1, 4) 2 β n bzk En ∆n(z) k=1 e− dzk (0.1.1) Pn(E)= | | , β n bz2 RRn ∆n(z) e− k dzk | | Qk=1 R Q 152 M. ADLER AND P. VAN MOERBEKE satisfy the PDE’s (F := Fn = log Pn): (0.1.2) Pn 2 Pn+ 2 2 when n is even and β = 1 β − 1 1 with index δ1,4Q 2 1 Pn − ! ( 1 when n is arbitrary and β = 4 4 2 2 2 = 1 + (Q2 + 6 1F ) 1 + 4Q1(3 0 4 1 1 + 6 0) F. B− B− B− B − B− B B 0.2. Hermitian, symmetric and symplectic Laguerre ensembles. Given the disjoint union E R+ and the weight zae bz, the take on the form ⊂ − Bk 2r k+2 ∂ k = ci . B ∂ci X1 Also define the polynomials, again respecting the duality (0.0.5), 3 n(n 1)(n + 2a)(n + 2a + 1), for β = 1 4 − Q = , 3 n(2n + 1)(2n + a)(2n + a 1), for β = 4 2 − 2 2 a β β 2 β Q2 = 3βn + 6an + 4(1 )a + 3 δ1,4 + (1 a )(1 δ1,4), − β − 2 ! − − β a Q = βn2 + 2an + (1 )a , Q = b(2 δβ )(n + ), 1 2 0 1,4 β − − 2 b β Q 1 = 2 δ1,4 . − β − Theorem 0.2. The following probabilities β n a bzk En ∆n(z) k=1 zk e− dzk (0.2.1) Pn(E)= | | β n a bzk Rn ∆n(z) k=1 zk e− dzk R + | | Q 1 R Q satisfy the PDE : (F := Fn = log Pn) (0.2.2) Pn 2 Pn+ 2 β − 1 1 δ1,4Q 2 1 Pn − ! 4 β 3 = 1 2(δ1,4 + 1) 1 B− − B− 2 β 2 β + (Q2 + 6 1F 4(δ1,4 + 1) 1F ) 1 3δ1,4(Q1 1F ) 1 B− − B− B− − −B− B− 2 + Q 1(3 0 4 1 1 2 1)+ Q0(2 0 1 0) F. − B − B B− − B B B− −B 1with the same convention on the indices n 2 and n 1, as in (0.1.2) ± ± RANDOM ENSEMBLES 153 0.3. Hermitian, symmetric and symplectic Jacobi ensembles. In terms of E [ 1, 1] and the Jacobi weight (1 z)a(1 + z)b, the differential operators ⊂ − − k take on the form B 2r k+1 2 ∂ k = ci (1 ci ) . B − ∂ci X1 Setting b = a b, b = a+b, we introduce the new variables, which themselves 0 − 1 have the invariance property (0.0.5): 4 4 r = (b2 + (b + 2 β)2) s = b (b + 2 β) β 0 1 − β 0 1 − 4 q = (βn + b + 2 β)(βn + b ), n β 1 − 1 and the following polynomials in q = qn,r,s, thus invariant under the map (0.0.5): 3 (0.3.1) Q = (s2 qr + q2)2 4(rs2 4qs2 4s2 + q2r) , 16 − − − − Q = 3s2 3qr 6r + 2q2 + 23q + 24, 1 − − Q = 3qs2 + 9s2 4q2 r + 2qr + 4q3 + 10q2, 2 − Q = 3qs2 + 6s2 3q2r + q3 + 4q2, 3 − Q = 9s2 3qr 6 r + q2 + 22q +24 = Q + (6s2 q2 q). 4 − − 1 − − Theorem 0.3. The following probabilities β n a b En ∆n(z) k=1(1 zk) (1 + zk) dzk (0.3.2) Pn(E)= | | β n − a b [R 1,1]n ∆n(z) Q k=1(1 zk) (1 + zk) dzk − | | − R Q satisfy the PDE (F = Fn = log Pn): for β = 2: (0.3.3) 4 2 2 2 2 1 + (q r + 4) 1 (4 1F s) 1 + 3q 0 2q 0 + 8 0 1 B− − B− − B− − B− B − B B B− 4(q 1) 1 1 + (4 1F s) 1 + 2(4 1F s) 0 1 + 2q 2 F − − B B− B− − B B− − B B− B 2 2 +4 1F 2 0F + 3 1F = 0 B− B B− 154 M.
Recommended publications
  • Paper We Shall Assume That All Logs Are Base 2
    Maximally Recoverable Codes: the Bounded Case Venkata Gandikota ∗ Elena Grigorescu y Clayton Thomas z Minshen Zhu x Abstract Modern distributed storage systems employ Maximally Recoverable codes that aim to bal- ance failure recovery capabilities with encoding/decoding efficiency tradeoffs. Recent works of Gopalan et al [SODA 2017] and Kane et al [FOCS 2017] show that the alphabet size of grid-like topologies of practical interest must be large, a feature that hampers decoding efficiency. To bypass such shortcomings, in this work we initiate the study of a weaker version of recoverability, where instead of being able to correct all correctable erasure patterns (as is the case for maximal recoverability), we only require to correct all erasure patterns of bounded size. The study of this notion reduces to a variant of a combinatorial problem studied in the literature, which is interesting in its own right. We study the alphabet size of codes withstanding all erasure patterns of small (constant) size. We believe the questions we propose are relevant to both real storage systems and combinatorial analysis, and merit further study. 1 Introduction Modern distributed storage systems need to address the challenge of storing large amounts of data, with small overhead, while providing reliable recovery in the face of failures. Unlike in com- munication settings, if a failure occurs in a storage system, it is typically easy to detect where it occurs (e.g., rack or data center failure are obvious to the system). Hence, recent trends in practical systems adopt erasure coding schemes with fast encoding and decoding capabilities [BHH13, HSX+12, SLR+14].
    [Show full text]
  • On Decoding Additive Generalized Twisted Gabidulin Codes
    Cryptography and Communications (2020) 12:987–1009 https://doi.org/10.1007/s12095-020-00449-9 On decoding additive generalized twisted Gabidulin codes Wrya K. Kadir1 · Chunlei Li1 Received: 20 September 2019 / Accepted: 30 June 2020 /Published online: 23 July 2020 © The Author(s) 2020 Abstract In this paper, we consider an interpolation-based decoding algorithm for a large family of maximum rank distance codes, known as the additive generalized twisted Gabidulin codes, over the finite field Fqn for any prime power q. This paper extends the work of the con- ference paper Li and Kadir (2019) presented at the International Workshop on Coding and Cryptography 2019, which decoded these codes over finite fields in characteristic two. Keywords Rank metric · Maximum rank distance codes · Gabidulin codes · Twisted Gabidulin codes · Generalized twisted Gabidulin codes Mathematics Subject Classification (2010) 94B35 · 68P30 · 11T71 · 11T06 1 Introduction Error correction codes with the rank metric have found applications in space-time coding [27], random network coding [44] and cryptography [12]. Many important properties of rank metric codes including the Singleton like bound were independently studied by Del- sarte [9] , Gabidulin [13] and Roth [38]. Codes that achieve this bound were called maximum rank distance (MRD) codes. The most famous sub-family of MRD codes are Gabidulin codes which is the rank metric analog of Reed-Solomon codes. They have been extensively studied in the literature [9, 12, 13, 25, 36, 38]. Finding new families of MRD codes has been an interesting research topic since the invention of Gabidulin codes. In [20, 39], the Frobenious automorphism in the Gabidulin codes were generalized to arbitrary automorphism and generalized Gabidulin (GG) codes Chunlei Li [email protected] Wrya K.
    [Show full text]
  • The Geometry of Rank Decompositions of Matrix Multiplication Ii: 3 3 Matrices
    THE GEOMETRY OF RANK DECOMPOSITIONS OF MATRIX MULTIPLICATION II: 3 3 MATRICES × GREY BALLARD, CHRISTIAN IKENMEYER, J.M. LANDSBERG, AND NICK RYDER Abstract. This is the second in a series of papers on rank decompositions of the matrix multiplication tensor. We present new rank 23 decompositions for the 3×3 matrix multiplication tensor M⟨3⟩. All our decompositions have symmetry groups that include the standard cyclic permutation of factors but otherwise exhibit a range of behavior. One of them has 11 cubes as summands and admits an unexpected symmetry group of order 12. We establish basic information regarding symmetry groups of decompositions and outline two approaches for finding new rank decompositions of M⟨n⟩ for larger n. 1. Introduction This is the second in a planned series of papers on the geometry of rank decompositions n2 n2 n2 of the matrix multiplication tensor M n C C C . Our goal is to obtain new rank m m m decompositions of M n by exploiting symmetry. For a tensor T C C C , the rank of r ⟨ ⟩ m T is the smallest r such that T j 1 aj ∈bj cj⊗, with⊗ aj; bj; cj C . The rank of M n is a standard complexity measure⟨ ⟩ of matrix multiplication, in particular,∈ it governs⊗ ⊗ the total number of arithmetic operations needed to= multiply∑ = ⊗ two⊗ matrices. ∈ ⟨ ⟩ In this paper we present rank 23 decompositions of M 3 that have large symmetry groups, in particular all admit the standard cyclic Z3-symmetry of permuting the three tensor factors. ⟨ ⟩ Although many rank 23 decompositions of M 3 are known [15, 13], none of them was known to admit the standard cyclic Z3-symmetry.
    [Show full text]
  • Conformal Field Theory Techniques in Random Matrix Models
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server . SPHT/t98/112 Conformal Field Theory Techniques in Random Matrix models Ivan K. Kostov ∗† C.E.A. - Saclay, Service de Physique Th´eorique F-91191 Gif-sur-Yvette, France In these notes we explain how the CFT description of random matrix models can be used to perform actual calculations. Our basic example is the hermitian matrix model, reformulated as a conformal invariant theory of free fermions. We give an explicit operator construction of the corre- sponding collective field theory in terms of a bosonic field on a hyperel- liptic Riemann surface, with special operators associated with the branch points. The quasiclassical expressions for the spectral kernel and the joint eigenvalue probabilities are then easily obtained as correlation functions of current, fermionic and twist operators. The result for the spectral kernel is valid both in macroscopic and microscopic scales. At the end we briefly consider generalizations in different directions. Based on the talk of the author at the Third Claude Itzykson- Meet- ing, ”Integrable Models and Applications to Statistical Mechanics ”, Paris, July 27-29, 1998, and at the workshop “Random matrices and integrable systems”, Univ. of Warwick, November 2-4 1998. July 1999 ∗ Member of CNRS † [email protected] 1. Introduction The random matrix models have various applications in rather different domains, and sometimes language barriers prevents the flow of ideas and knowledge from one field to another. For example, such powerful techniques as the conformal field theory (CFT) description of the random matrix models and their relation with the integrable hierarchies, which were developped extensively by the string theorists in the early 90’s, are practically unknown to the mesoscopic physicists.
    [Show full text]
  • Generalized Skew Reed-Solomon Codes and Other Applications of Skew Polynomial Evaluation
    Generalized Skew Reed-Solomon Codes and Other Applications of Skew Polynomial Evaluation by Siyu Liu A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto © Copyright 2016 by Siyu Liu Abstract Generalized Skew Reed-Solomon Codes and Other Applications of Skew Polynomial Evaluation Siyu Liu Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto 2016 This thesis studies the theory of error-correcting codes based on evaluation of skew poly- nomials. Skew polynomials are a noncommutative generalization of ordinary polynomials that, in recent years, have found applications in coding theory and cryptography. The evaluation of skew polynomials is significantly different from that of ordinary polyno- mials. Using skew polynomial evaluation, we define a class of codes called Generalized Skew-Evaluation codes. This class contains a special subclass that we call Generalized Skew Reed-Solomon codes. Generalized Skew Reed-Solomon codes are intimately con- nected to both regular Reed-Solomon codes and Gabidulin codes. These connections allow us to design interesting codes for both the Hamming metric and the rank met- ric. In addition, we prove a duality theory that exists within a subclass of Generalized Skew Reed-Solomon codes. This duality theory can be viewed as an extension to the well-known duality theory of Generalized Reed-Solomon codes. The decoding of Gener- alized Skew Reed-Solomon codes can be done using a Berlekamp-Welch style decoder. We design such a decoder by studying the general polynomial interpolation problem for skew polynomials.
    [Show full text]
  • On the Q-Analogue of Cauchy Matrices Alessandro Neri
    I am a friend of Finite Geometry! On the q-Analogue of Cauchy Matrices Alessandro Neri 17-21 June 2019 - VUB Alessandro Neri 19 June 2019 1 / 19 On the q-Analogue of Cauchy Matrices Alessandro Neri I am a friend of Finite Geometry! 17-21 June 2019 - VUB Alessandro Neri 19 June 2019 1 / 19 q-Analogues Model Finite set Finite dim vector space over Fq Element 1-dim subspace ; f0g Cardinality Dimension Intersection Intersection Union Sum Alessandro Neri 19 June 2019 1 / 19 Examples 1. Binomials and q-binomials: k−1 k−1 n Y n − i n Y 1 − qn−i = ; = : k k − i k 1 − qk−i i=0 q i=0 2. (Chu)-Vandermonde and q-Vandermonde identity: k k m + n X m n m + n X m n = ; = qj(m−k+j): k j k − j k k − j j j=0 q j=0 q q 3. Polynomials and q-polynomials: k q qk a0 + a1x + ::: + ak x ; a0x + a1x + ::: + ak x : 4. Gamma and q-Gamma functions: 1 − qx Γ(z + 1) = zΓ(z); Γ (x + 1) = Γ (x): q 1 − q q Alessandro Neri 19 June 2019 2 / 19 For n = k, det(V ) 6= 0 if and only if the αi 's are all distinct. jfα1; : : : ; αngj = n: In particular, all the k × k minors of V are non-zero. Vandermonde Matrix Let k ≤ n. 0 1 1 ::: 1 1 B α1 α2 : : : αn C B C B α2 α2 : : : α2 C V = B 1 2 n C B .
    [Show full text]
  • Two Modifications for Loidreau's Code-Based Cryptosystem
    Noname manuscript No. (will be inserted by the editor) Two modifications for Loidreau’s code-based cryptosystem Wenshuo Guo · Fang-Wei Fu Received: date / Accepted: date Abstract This paper presents two modifications for Loidreau’s code-based cryp- tosystem. Loidreau’s cryptosystem is a rank metric code-based cryptosystem con- structed by using Gabidulin codes in the McEliece setting. Recently a polynomial- time key recovery attack was proposed to break Loidreau’s cryptosystem in some cases. To prevent this attack, we propose the use of subcodes to disguise the secret codes in Modification I. In Modification II, we choose a random matrix of low col- umn rank over Fq to mix with the secret matrix. According to our analysis, these two modifications can both resist the existing structural attacks. Additionally, we adopt the systematic generator matrix of the public code to make a reduction in the public-key size. In additon to stronger resistance against structural attacks and more compact representation of public keys, our modifications also have larger information transmission rates. Keywords Code-based cryptography · Rank metric codes · Gabidulin codes · Loidreau’s cryptosystem Mathematics Subject Classification (2010) 94B05 · 81Q99 1 Introduction In 1978, McEliece proposed the first code-based public-key cryptosystem, namely the well-known McEliece cryptosystem based on Goppa codes [1]. Since then cryp- tologists have made extensive study on its security [2–5]. Apart from some weak keys [6], the McEliece cryptosystem still remains secure in general cases. The main drawback of this cryptosystem lies in its large public-key size, which makes it un- practical in many situations.
    [Show full text]
  • Semiclassical Asymptotics of Orthogonal Polynomials, Riemann-Hilbert Problem, and Universality in the Matrix Model
    Annals of Mathematics, 150 (1999), 185–266 Semiclassical asymptotics of orthogonal polynomials, Riemann-Hilbert problem, and universality in the matrix model By Pavel Bleher and Alexander Its Abstract We derive semiclassical asymptotics for the orthogonal polynomials Pn(z) on the line with respect to the exponential weight exp(NV(z)), where V (z) is a double-well quartic polynomial, in the limit when n, N →∞. We assume that ε (n/N) cr ε for some ε>0, where cr is the critical value which separates orthogonal polynomials with two cuts from the ones with one cut. Simultaneously we derive semiclassical asymptotics for the recursive coecients of the orthogonal polynomials, and we show that these coecients form a cycle of period two which drifts slowly with the change of the ratio n/N. The proof of the semiclassical asymptotics is based on the methods of the theory of integrable systems and on the analysis of the appropriate matrix Riemann- Hilbert problem. As an application of the semiclassical asymptotics of the orthogonal polynomials, we prove the universality of the local distribution of eigenvalues in the matrix model with the double-well quartic interaction in the presence of two cuts. Contents 1. Introduction and formulation of the main theorem 2. Universality of the local distribution of eigenvalues in the matrix model 3. The Lax pair for the Freud equation 4. The Stokes phenomenon 5. The Riemann-Hilbert problem 6. Formal asymptotic expansion for Rn 7. Proof of the main theorem: Approximate solution to the Riemann-Hilbert problem Appendix A. Proof of formula (7.8) Appendix B.
    [Show full text]
  • Bihamiltonian Structures of Pdes and Frobenius Manifolds
    SMR1665/11 Summer School and Conference on Poisson Geometry (4 -22 July 2005) Bihamiltonian structures of PDEs and Frobenius manifolds Boris Dubrovin SISSA Trieste, Italia Bihamiltonian structures of PDEs and Frobenius manifolds Lectures at the ICTP Summer School “Poisson Geometry”, Trieste, July 11-15, 2005 Boris Dubrovin SISSA, Trieste July 12, 2005 Abstract These complementary lecture notes are based on the papers [50], [52], [53]. 1 Contents 1 Lecture 1 3 1.1 Brief summary of finite-dimensional Poisson geometry . 3 1.1.1 Poisson brackets . 3 1.1.2 Dirac bracket . 4 1.1.3 Hamiltonian vector fields, first integrals . 5 1.1.4 Poisson cohomology . 5 1.1.5 Formalism of supermanifolds . 8 1.2 Bihamiltonian structures . 9 1.2.1 Magri chains . 9 1.2.2 Symplectic bihamiltonian structures. Recursion operator . 10 1.2.3 Poisson pencils of constant rank. Construction of hierarchies . 11 1.2.4 Remark about the “method of argument translation” . 13 1.2.5 From Poisson pencils of constant rank to commuting hierarchies 14 2 Lecture 2. 14 2.1 Formal loop spaces . 14 2.2 Local multivectors and local Poisson brackets . 24 3 Lecture 3. Problem of classification of local Poisson brackets 31 3.1 Extended formal loop space . 31 3.2 Miura group . 35 3.3 (p, q)-brackets on the extended formal loop space . 37 3.3.1 Classification of (n, 0)-brackets . 41 3.3.2 Classification of (0, n)-brackets . 44 2 1 Lecture 1 1.1 Brief summary of finite-dimensional Poisson geometry 1.1.1 Poisson brackets Let P be a N-dimensional smooth manifold.
    [Show full text]
  • The Legendre Determinant Form for Drinfeld Modules in Arbitrary Rank Rudolph Perkins
    The Legendre determinant form for Drinfeld modules in arbitrary rank Rudolph Perkins To cite this version: Rudolph Perkins. The Legendre determinant form for Drinfeld modules in arbitrary rank. 2014. hal-01067333 HAL Id: hal-01067333 https://hal.archives-ouvertes.fr/hal-01067333 Preprint submitted on 23 Sep 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THE LEGENDRE DETERMINANT FORM FOR DRINFELD MODULES IN ARBITRARY RANK R. B. PERKINS Abstract. For each positive integer r, we construct a nowhere-vanishing, single-cuspidal Drinfeld modular form for GLr(Fq[θ]), necessarily of least pos- sible weight, via determinants using rigid analytic trivializations of the univer- sal Drinfeld module of rank r and deformations of vectorial Eisenstein series. Along the way, we deduce that the cycle class map from de Rham cohomology to Betti cohomology is an isomorphism for Drinfeld modules of all ranks over Fq[θ]. 1. Introduction Let Fq be the finite field with q elements, and θ an indeterminate over this field. −1 Let A,K,K∞, and A+ be Fq[θ], Fq(θ), Fq((θ )), and the set of monic polynomials in A, respectively.
    [Show full text]
  • Wronskians, Dualities and FZZT-Cardy Branes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Available online at www.sciencedirect.com ScienceDirect Nuclear Physics B 910 (2016) 55–177 www.elsevier.com/locate/nuclphysb Wronskians, dualities and FZZT-Cardy branes ∗ Chuan-Tsung Chan a, , Hirotaka Irie a,b, Benjamin Niedner c, Chi-Hsien Yeh d,e a Department of Applied Physics, Tunghai University, Taichung 40704, Taiwan b Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto 606-8502, Japan c Rudolf Peierls Centre for Theoretical Physics, University of Oxford, Oxford OX1 3NP, UK d National Center for Theoretical Sciences, National Tsing-Hua University, Hsinchu 30013, Taiwan e Department of Physics and Center for Advanced Study in Theoretical Sciences, National Taiwan University, Taipei 10617, Taiwan, ROC Received 20 January 2016; accepted 9 June 2016 Available online 29 July 2016 Editor: Leonardo Rastelli Abstract The resolvent operator plays a central role in matrix models. For instance, with utilizing the loop equation, all of the perturbative amplitudes including correlators, the free-energy and those of instanton corrections can be obtained from the spectral curve of the resolvent operator. However, at the level of non-perturbative completion, the resolvent operator is generally not sufficient to recover all the information from the loop equations. Therefore it is necessary to find a sufficient set of operators which provide the missing non- perturbative information. In this paper, we study generalized Wronskians of the Baker–Akhiezer systems as a manifestation of these new degrees of freedom. In particular, we derive their isomonodromy systems and then extend several spectral dualities to these systems.
    [Show full text]
  • Arxiv:1805.06706V2 [Cs.IT]
    SYSTEMATIC ENCODERS FOR GENERALIZED GABIDULIN CODES AND THE q-ANALOGUE OF CAUCHY MATRICES ALESSANDRO NERI∗ Technical University of Munich, Germany Abstract. We characterize the generator matrix in standard form of generalized Gabidulin codes. The parametrization we get for the non-systematic part of this matrix coincides with the q-analogue of generalized Cauchy matrices, leading to the definition of q-Cauchy matrices. These matrices can be represented very conveniently and their representation allows to define new interesting subfamilies of generalized Gabidulin codes whose generator matrix is a structured matrix. In particular, as an application, we construct Gabidulin codes whose generator matrix is the concatenation of an identity block and a Toeplitz/Hankel matrix. In addition, our results allow to give a new efficient criterion to verify whether a rank metric code of dimension k and length n is a generalized Gabidulin code. This criterion is only based on the computation of the rank of one matrix and on the verification of the linear independence of two sets of elements and it requires O(m · F (k, n)) field operations, where F (k, n) is the cost of computing the reduced row echelon form of a k × n matrix. Moreover, we also provide a characterization of the generator matrix in standard form of general MRD codes. 1. Introduction Codes in the rank metric were introduced, independently, by Delsarte [13], Gabidulin [15] and Roth [37], although a similar notion can be traced back to Bergman [7]. However, only in the last ten years have they significantly gained interest, due to their application in network coding [45, 18].
    [Show full text]