Computing in the Monster

نویسندگان

  • Robert A. Wilson
  • Richard Parker
  • Peter Walsh
چکیده

We give a survey of computational methods and results concerning the Monster sporadic simple group. There are now three computer constructions of the Monster which are proving effective in answering real questions about this group. The first construction over the field of two elements is the fastest for calculations, and has been used to show the group is a Hurwitz group. The second construction over the field of three elements, uses an involution centralizer as the heart of the construction, and has proved to be the most useful as far as calculations with subgroups is concerned. P. E. Holmes has used this construction to find explicitly four new conjugacy classes of maximal subgroups, as well as to eliminate various other possibilities for maximal subgroups. The third construction over the field of seven elements uses the same generators as the first construction, which means that elements given as words in these generators can be investigated modulo 2 and modulo 7 simultaneously. This gives enough information in most cases to determine the conjugacy class of the element.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MONSTER: Minnesota prOteiN Sequence annotaTion servER

Summary: MONSTER is a server for predicting the local structure and function properties of protein sequences. MONSTER provides residue-wise annotation services, that include secondary structure, transmembrane-helix region, disorder region, protein-dna binding site, local structure alphabet, solvent accessibility surface area, and residue-wise contact order prediction. MONSTER uses sequence-deri...

متن کامل

Monster : A Tool for Analyzing the Interaction Between Operating Systems and Computer Architectures

To enable computer designers to better evaluate the architectural needs of operating systems, we have developed Monster , a tool which combines hardware and software monitoring techniques to unobtrusively obtain system performance data. This report is split into two major parts. In Part I, we argue the need for OS performance evaluation tools, summarize previous hardware and software based moni...

متن کامل

Foucault’s Monsters, the Abnormal Individual and the Challenge of English Law

This article considers the challenge that an English legal history of the category monster poses for Foucault’s genealogy of the abnormal individual. While the idea of the monster is not confined to law it is contended that the inauguration of the monster category into English law and its subsequent development provides a useful vantage point from which to critique Foucault’s position. While la...

متن کامل

2A-orbifold construction and the baby-monster vertex operator superalgebra

In this article we prove that the full automorphism group of the baby-monster vertex operator superalgebra constructed by Höhn is isomorphic to 2×B, where B is the baby-monster sporadic finite simple group, and determine irreducible modules for the baby-monster vertex operator algebra. Our result has many corollaries. In particular, we can prove that the Z2-orbifold construction with respect to...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002