Pseudofunctorial behavior of Cousin complexes on formal schemes

نویسندگان

  • Joseph Lipman
  • Suresh Nayak
  • Pramathanath Sastry
چکیده

On a suitable category of formal schemes equipped with codimension functions we construct a canonical pseudofunctor (−)♯ taking values in the corresponding categories of Cousin complexes. Cousin complexes on such a formal scheme X functorially represent derived-category objects F by the local cohomologies H codim(x) x F (x ∈ X) together with “residue maps” from the cohomology at x to that at each immediate specialization of x; this representation is faithful when restricted to F which are Cohen-Macaulay (CM), i.e., Hi xF = 0 whenever i 6= codim(x). Formal schemes provide a framework for treating local and global duality as aspects of a single theory. One motivation has been to gain a better understanding of the close relation between local properties of residues and global variance properties of dualizing complexes (which are CM). Our construction, depending heavily on local phenomena, is inspired by, but generalizes and makes more concrete, that of the classical pseudofunctor (−)∆ taking values in residual complexes, on which the proof of Grothendieck’s (global) Duality Theorem in Hartshorne’s “Residues and Duality” is based. Indeed, it is shown in the following paper by Sastry that (−)♯ is a good “concrete approximation” to the fundamental duality pseudofunctor (−)!. The pseudofunctor (−)♯ takes residual complexes to residual complexes, so contains a canonical representative of (−)∆; and it generalizes as well several other functorial (but not pseudofunctorial) constructions of residual complexes which appeared in the 1990s.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applications of Duality Theory to Cousin Complexes

We use the anti-equivalence between Cohen-Macaulay complexes and coherent sheaves on formal schemes to shed light on some older results and prove new results. We bring out the relations between a coherent sheaf M satisfying an S2 condition and the lowest cohomology N of its “dual” complex. We show that if a scheme has a Gorenstein complex satisfying certain coherence conditions, then in a finit...

متن کامل

Duality for Cousin Complexes

We relate the variance theory for Cousin complexes − developed by Lipman, Nayak and the author to Grothendieck duality for Cousin complexes. Specifically for a Cousin complex F on (Y, ∆)—with ∆ a codimension function on a formal scheme Y (noetherian, universally catenary)—and a pseudo-finite type map f : (X, ∆) → (Y, ∆) of such pairs of schemes with codimension functions, we show there is a der...

متن کامل

Relation between two twisted inverse image pseudofunctors in duality theory

Grothendieck duality theory assigns to essentially-finite-type maps f of noetherian schemes a pseudofunctor f× right-adjoint to Rf∗, and a pseudofunctor f ! agreeing with f× when f is proper, but equal to the usual inverse image f∗ when f is étale. We define and study a canonical map from the first pseudofunctor to the second. This map behaves well with respect to flat base change, and is taken...

متن کامل

Residues and Duality for Cousin Complexes

We construct a canonical pseudofunctor ( ) on the category of finite-type maps of (say) connected noetherian universally catenary finite-dimensional separated schemes, taking values in the category of Cousin complexes. This pseudofunctor is a concrete approximation to the restriction of the Grothendieck Duality pseudofunctor( ) to the full subcategory of the derived category having Cohen-Macaul...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003