Functions of perturbed pairs of noncommuting contractions
نویسندگان
چکیده
منابع مشابه
Functions of Perturbed Noncommuting Self-adjoint Operators
Abstract. We consider functions f(A,B) of noncommuting self-adjoint operators A and B that can be defined in terms of double operator integrals. We prove that if f belongs to the Besov class B ∞,1 (R), then we have the following Lipschitz type estimate in the trace norm: ‖f(A1, B1)− f(A2, B2)‖S1 ≤ const(‖A1 −A2‖S1 + ‖B1 −B2‖S1). However, the condition f ∈ B ∞,1 (R) does not imply the Lipschitz ...
متن کاملFunctions of Several Noncommuting Variables
The notions of nonsingularity, resolvent set, and spectrum, and the corresponding analytic functional calculus for n-tuples of elements of a commutative Banach algebra provide some of the deepest and most potent tools of modern analysis. A point of view one can adopt regarding this theory is as follows: The class of algebras (9(U)9 for U a domain in C9 provides a relatively small, well-understo...
متن کاملSymmetric Functions in Noncommuting Variables
Consider the algebra Q〈〈x1, x2, . . .〉〉 of formal power series in countably many noncommuting variables over the rationals. The subalgebra Π(x1, x2, . . .) of symmetric functions in noncommuting variables consists of all elements invariant under permutation of the variables and of bounded degree. We develop a theory of such functions analogous to the ordinary theory of symmetric functions. In p...
متن کاملa contrastive study of rhetorical functions of citation in iranian and international elt scopus journals
writing an academic article requires the researchers to provide support for their works by learning how to cite the works of others. various studies regarding the analysis of citation in m.a theses have been done, while little work has been done on comparison of citations among elt scopus journal articles, and so the dearth of research in this area demands for further investigation into citatio...
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Izvestiya: Mathematics
سال: 2020
ISSN: 1064-5632,1468-4810
DOI: 10.1070/im8876