Jet Spaces of Varieties over Diierential and Diierence Elds

نویسندگان

  • Anand Pillay
  • Martin Ziegler
چکیده

We give elementary proofs, using suitable jet spaces, of some old and new structural results concerning nite-dimensional diierential algebraic varieties (characteristic zero). We prove analogous results for diierence algebraic varieties in characteristic zero. We also mention partial results and problems in the positive characteristic case.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NORM AND INNER PRODUCT ON FUZZY LINEAR SPACES OVER FUZZY FIELDS

In this paper, we introduce the concepts of norm and inner prod- uct on fuzzy linear spaces over fuzzy elds and discuss some fundamental properties.

متن کامل

Jet spaces of varieties over differential and difference fields

We give elementary proofs, using suitable jet spaces, of some old and new structural results concerning finite-dimensional differential algebraic varieties (characteristic zero). We prove analogous results for difference algebraic varieties in characteristic zero. We also mention partial results and problems in the positive characteristic case.

متن کامل

Exponential Stability in Mean Square of Neutral Stochastic Differential Difference Equations

In this paper we shall discuss the exponential stability in mean square for a neutral stochastic diierential diierence equation of the form dx(t) ? G(x(t ?))] = f(t; x(t); x(t ?))dt + (t; x(t); x(t ?))dw(t). In the case when (t; x; y) 0 this neutral stochastic diierential diierence equations becomes a deterministic neutral diierential diierence equations d dt x(t)?G(x(t?))] = f(t; x(t); x(t?))....

متن کامل

Flaws in Diierential Cryptanalysis of Skipjack

This paper is motivated by some results presented by Knud-sen, Robshaw and Wagner at Crypto'99 3], that described many attacks of reduced versions of Skipjack, some of them being erroneous. Diierential cryptanalysis is based on distinguishers, any attack should prove that the events that triggers the analysis has not the same probability for the cipher than for a random function. In particular,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001