Differential KO-theory: Constructions, computations, and applications

نویسندگان

چکیده

We provide several constructions in differential KO-theory. First, we construct a refinement of the Aˆ-genus and pushforward leading to Riemann-Roch theorem. set up Atiyah-Hirzebruch spectral sequence (AHSS) for KO-theory explicitly identify differentials, including ones which mix geometric topological data. highlight power these explicit identifications by providing characterization forms image Pontrjagin character. Along way, fill gaps literature where K-theory is usually worked out leaving essentially untouched. also illustrate with examples applications, higher tangential structures, Adams operations, Wu formula.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selecting Computations: Theory and Applications

Sequential decision problems are often approximately solvable by simulating possible future action sequences. Metalevel decision procedures have been developed for selecting which action sequences to simulate, based on estimating the expected improvement in decision quality that would result from any particular simulation; an example is the recent work on using bandit algorithms to control Mont...

متن کامل

Tense Markers and -ko Constructions in Korean

There have been heated debates on whether tense markers in Korean are inflectional affixes or syntactic words. One of the strongest pieces of evidence for the latter position comes from tense-related phenomena in -ko constructions. These constructions are usually assumed to consist of two coordinate clauses. In this paper, we will see that the tense phenomena can be accounted for naturally by c...

متن کامل

Localization in Matrix Computations: Theory and Applications

Many important problems in mathematics and physics lead to (nonsparse) functions, vectors, or matrices in which the fraction of nonnegligible entries is vanishingly small compared the total number of entries as the size of the system tends to infinity. In other words, the nonnegligible entries tend to be localized, or concentrated, around a small region within the computational domain, with rap...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

Numerical computations with infinite and infinitesimal numbers: Theory and applications

A new computational methodology for executing calculations with infinite and infinitesimal quantities is described in this chapter. It is based on the principle ‘The part is less than the whole’ introduced by Ancient Greeks and applied to all numbers (finite, infinite, and infinitesimal) and to all sets and processes (finite and infinite). It is shown that it becomes possible to write down fini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics

سال: 2021

ISSN: ['1857-8365', '1857-8438']

DOI: https://doi.org/10.1016/j.aim.2021.107671