Shizuo Kaji and Masaki Nakagawa
نویسنده
چکیده
We determine the Chow rings of the complex algebraic groups E6 and E7, giving generators and relations in terms of Schubert classes of the corresponding flag varieties. This is a continuation of the work of R. Marlin on the computation of the Chow rings of SOn, Spinn,G2, and F4.
منابع مشابه
Equivariant Schubert Calculus of Coxeter Groups
We consider an equivariant extension for Hiller’s Schubert calculus on the coinvariant ring of a finite Coxeter group.
متن کاملMOD p DECOMPOSITIONS OF THE LOOP SPACES OF COMPACT SYMMETRIC SPACES
We give p-local homotopy decompositions of the loop spaces of compact, simplyconnected symmetric spaces for quasi-regular primes. The factors are spheres, sphere bundles over spheres, and their loop spaces. As an application, upper bounds for the homotopy exponents are determined.
متن کاملDappled tiling
We consider a certain tiling problem of a planar region in which there are no long horizontal or vertical strips consisting of copies of the same tile. Intuitively speaking, we would like to create a dappled pattern with two or more kinds of tiles. We give an efficient algorithm to solve the problem, and discuss its applications in texturing.
متن کاملHomotopy Decomposition of a Suspended Real Toric Space
We give p-local homotopy decompositions of the suspensions of real toric spaces for odd primes p. Our decomposition is compatible with the one given by Bahri, Bendersky, Cohen, and Gitler for the suspension of the corresponding real moment-angle complex, or more generally, the polyhedral product. As an application, we obtain a stable rigidity property for real toric spaces.
متن کاملMATHEMATICAL ENGINEERING TECHNICAL REPORTS A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
In this paper, we specify a class of mathematical problems, which we refer to as “Function Density Problems” (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introd...
متن کامل