Toric Varieties in Hilbert Schemes
نویسنده
چکیده
Given a field K, let R be the power series ring K[[x1, . . . , xn]]. There is a natural action of Aut(R) on the Hilbert scheme Hilb(R) parameterizing ideals in R of colength d. Recall from [10] that given a smooth variety X of dimension n and a monomial ideal I ⊂ R of finite colength, the space U(I) parametrizing subschemes of X isomorphic to Spec(R/I) sits naturally inside a suitable Hilbert scheme H . In [10] a flag bundle B on the tangent bundle of X and a space Y ⊂ B × U(I) such that Y is a fiber bundle over B with respect to the first projection map and an étale covering of U(I) with respect to the second is constructed. Moreover, Y has the property that its closure in B × H is also a fiber bundle over B. Via an isomorphism φ of R and the local ring of the point of X over which the fiber lies, the fiber is isomorphic to the closure of the G-orbit of I in H where G is the subgroup of Aut(R) fixing the flag over which the fiber lies via φ. The complexity of the fiber F (I) of Y over B and its closure is partially measured by the measuring sequence of I as defined in [10]. In the first level of complexity, the G equivariance of F̄ (I) forces its normalization to be a projective space. In the second level, the normalization is forced to be a toric variety. In the third level, we lump together all of the other cases. The following three sections correspond to these three levels of difficulty, each illustrating techniques for understanding F and F̄ (I). For simplicity, we restrict ourselves to the case when n = 2, thus freeing the variable n for later use. Moreover, we will use the variables x
منابع مشابه
Toric Hilbert Schemes
We introduce and study the toric Hilbert scheme that parametrizes all ideals with the same multigraded Hilbert function as a given toric ideal.
متن کاملCombinatorics of the Toric Hilbert Scheme
The toric Hilbert scheme is a parameter space for all ideals with the same multi-graded Hilbert function as a given toric ideal. Unlike the classical Hilbert scheme, it is unknown whether toric Hilbert schemes are connected. We construct a graph on all the monomial ideals on the scheme, called the flip graph, and prove that the toric Hilbert scheme is connected if and only if the flip graph is ...
متن کاملCombinatorics of the Toric Hilbert Scheme Diane Maclagan and Rekha R. Thomas
The toric Hilbert scheme is a parameter space for all ideals with the same multi-graded Hilbert function as a given toric ideal. Unlike the classical Hilbert scheme, it is unknown whether toric Hilbert schemes are connected. We construct a graph on all the monomial ideals on the scheme, called the flip graph, and prove that the toric Hilbert scheme is connected if and only if the flip graph is ...
متن کاملGenetic-metabolic networks can be modeled as toric varieties
The mathematical modelling of genetic-metabolic networks is of outmost importance in the field of systems biology. Different formalisms and a huge variety of classical mathematical tools have been used to describe and analyse such networks. Michael A. Savageau defined a formalism to model genetic-metabolic networks called S-Systems, [16], [17], [19]. There is a limit in the number of nodes that...
متن کاملExtensions of Toric Varieties
In this paper, we introduce the notion of “extension” of a toric variety and study its fundamental properties. This gives rise to infinitely many toric varieties with a special property, such as being set theoretic complete intersection or arithmetically Cohen-Macaulay (Gorenstein) and having a Cohen-Macaulay tangent cone or a local ring with non-decreasing Hilbert function, from just one singl...
متن کاملSecret Sharing Schemes with a large number of players from Toric Varieties
A general theory for constructing linear secret sharing schemes over a finite field Fq from toric varieties is introduced. The number of players can be as large as (q − 1)r − 1 for r ≥ 1. We present general methods to obtain the reconstruction and privacy thresholds as well as conditions for multiplication on the associated secret sharing schemes. In particular we apply the method on certain to...
متن کامل