Differential KO-theory: Constructions, computations, and applications
نویسندگان
چکیده
We provide several constructions in differential KO-theory. First, we construct a refinement of the Aˆ-genus and pushforward leading to Riemann-Roch theorem. set up Atiyah-Hirzebruch spectral sequence (AHSS) for KO-theory explicitly identify differentials, including ones which mix geometric topological data. highlight power these explicit identifications by providing characterization forms image Pontrjagin character. Along way, fill gaps literature where K-theory is usually worked out leaving essentially untouched. also illustrate with examples applications, higher tangential structures, Adams operations, Wu formula.
منابع مشابه
Selecting Computations: Theory and Applications
Sequential decision problems are often approximately solvable by simulating possible future action sequences. Metalevel decision procedures have been developed for selecting which action sequences to simulate, based on estimating the expected improvement in decision quality that would result from any particular simulation; an example is the recent work on using bandit algorithms to control Mont...
متن کاملTense Markers and -ko Constructions in Korean
There have been heated debates on whether tense markers in Korean are inflectional affixes or syntactic words. One of the strongest pieces of evidence for the latter position comes from tense-related phenomena in -ko constructions. These constructions are usually assumed to consist of two coordinate clauses. In this paper, we will see that the tense phenomena can be accounted for naturally by c...
متن کاملLocalization in Matrix Computations: Theory and Applications
Many important problems in mathematics and physics lead to (nonsparse) functions, vectors, or matrices in which the fraction of nonnegligible entries is vanishingly small compared the total number of entries as the size of the system tends to infinity. In other words, the nonnegligible entries tend to be localized, or concentrated, around a small region within the computational domain, with rap...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملNumerical computations with infinite and infinitesimal numbers: Theory and applications
A new computational methodology for executing calculations with infinite and infinitesimal quantities is described in this chapter. It is based on the principle ‘The part is less than the whole’ introduced by Ancient Greeks and applied to all numbers (finite, infinite, and infinitesimal) and to all sets and processes (finite and infinite). It is shown that it becomes possible to write down fini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics
سال: 2021
ISSN: ['1857-8365', '1857-8438']
DOI: https://doi.org/10.1016/j.aim.2021.107671