https://arxiv.org/api/ZrUxX4pA9jlabNC3zXm0kwsG2Pw 2026-04-09T15:57:54Z 3074 180 15 http://arxiv.org/abs/2506.13242v6 A non-commutative algorithm for multiplying 4x4 matrices using 48 non-complex multiplications 2025-11-26T10:24:48Z The quest for non-commutative matrix multiplication algorithms in small dimensions has seen a lot of recent improvements recently. In particular, the number of scalar multiplications required to multiply two $4\times4$ matrices was first reduced in \cite{Fawzi:2022aa} from 49 (two recursion levels of Strassen's algorithm) to 47 but only in characteristic 2 or more recently to 48 in \cite{alphaevolve} but over complex numbers. We propose an algorithm in 48 multiplications with only rational coefficients, hence removing the complex number requirement. It was derived from the latter one, under the action of an isotropy which happen to project the algorithm on the field of rational numbers. We also produce a straight line program of this algorithm, reducing the leading constant in the complexity, as well as an alternative basis variant of it, leading to an algorithm running in $7 n^{2+\frac{\log_2 3}{2}} +o\left(n^{2+\frac{log_2 3}{2}}\right)$ operations over any ring containing an inverse of 2. 2025-06-16T08:42:15Z Jean-Guillaume Dumas CASC Clément Pernet CASC Alexandre Sedoglavic CRIStAL http://arxiv.org/abs/2511.18877v1 Computing basis of solutions of any Mahler equation 2025-11-24T08:31:54Z Mahler equations arise in a wide range of contexts including the study of finite automata, regular sequences, algebraic series over Fp(z), and periods of Drinfeld modules. Introduced a century ago by K. Mahler to study the transcendence of certain complex numbers, they have recently been the subject of several works establishing a deep connection between such transcendence properties and the nature of their solutions. While numerous studies have investigated these solutions, existing algorithms can only compute them in specific rings: rational functions, power series, Puiseux series, or Hahn series. This paper solves the problem by providing an algorithm that computes a complete basis of solutions for any Mahler equation, along with a decomposition of each solution over the field of Puiseux series. Along the way, we describe an algorithm that computes a fundamental matrix of solutions for any Mahler system. 2025-11-24T08:31:54Z Colin Faverjon LAMFA Marina Poulet UGA, IF http://arxiv.org/abs/2412.17099v2 Additive and Multiplicative Coinvariant Spaces of Weyl Groups in the Light of Harmonics and Graded Transfer 2025-11-19T17:46:52Z The action of a Weyl group on the associated weight lattice induces an additive action on the symmetric algebra and a multiplicative action on the group algebra of the lattice. We show that the coinvariant space of the multiplicative action affords the regular representation and is isomorphic to a space of multiplicative harmonics, which corresponds to existing results for additive coinvariants of reflection groups. We then design an algorithm to compute a multiplicative coinvariant basis from an additive one. The algorithm preserves isotypic decomposition and graded structure and enables the study of multiplicative coinvariants by integrating combinatorial knowledge from the additive setting. We investigate the Weyl groups of type A and C to find new explicit equivariant maps and combinatorial structure. 2024-12-22T17:24:44Z Sebastian Debus Tobias Metzlaff 10.1016/j.jalgebra.2025.11.008 http://arxiv.org/abs/2402.03111v2 Computing roadmaps in unbounded smooth real algebraic sets II: algorithm and complexity 2025-11-19T16:01:17Z A roadmap for an algebraic set $V$ defined by polynomials with coefficients in the field $\mathbb{Q}$ of rational numbers is an algebraic curve contained in $V$ whose intersection with all connected components of $V\cap\mathbb{R}^{n}$ is connected. These objects, introduced by Canny, can be used to answer connectivity queries over $V\cap \mathbb{R}^{n}$ provided that they are required to contain the finite set of query points $\mathcal{P}\subset V$; in this case, we say that the roadmap is associated to $(V, \mathcal{P})$. In this paper, we make effective a connectivity result we previously proved, to design a Monte Carlo algorithm which, on input (i) a finite sequence of polynomials defining $V$ (and satisfying some regularity assumptions) and (ii) an algebraic representation of finitely many query points $\mathcal{P}$ in $V$, computes a roadmap for $(V, \mathcal{P})$. This algorithm generalizes the nearly optimal one introduced by the last two authors by dropping a boundedness assumption on the real trace of $V$. The output size and running times of our algorithm are both polynomial in $(nD)^{n\log d}$, where $D$ is the maximal degree of the input equations and $d$ is the dimension of $V$. As far as we know, the best previously known algorithm dealing with such sets has an output size and running time respectively polynomial in $(n^{\log{n}}D)^{n\log n}$ and $(n^{\log{n}}D)^{n\log^2 n}$. 2024-02-05T15:44:16Z 62 pages Rémi Prébet Mohab Safey El Din Éric Schost http://arxiv.org/abs/2406.14265v3 VeriFlow: Modeling Distributions for Neural Network Verification 2025-11-19T14:47:28Z Formal verification has emerged as a promising method to ensure the safety and reliability of neural networks. However, many relevant properties, such as fairness or global robustness, pertain to the entire input space. If one applies verification techniques naively, the neural network is checked even on inputs that do not occur in the real world and have no meaning. To tackle this shortcoming, we propose the VeriFlow architecture as a flow-based density model tailored to allow any verification approach to restrict its search to some data distribution of interest. We argue that our architecture is particularly well suited for this purpose because of two major properties. First, we show that the transformation that is defined by our model is piecewise affine. Therefore, the model allows the usage of verifiers based on constraint solving with linear arithmetic. Second, upper density level sets (UDL) of the data distribution are definable via linear constraints in the latent space. As a consequence, representations of UDLs specified by a given probability are effectively computable in the latent space. This property allows for effective verification with a fine-grained, probabilistically interpretable control of how a-typical the inputs subject to verification are. 2024-06-20T12:41:39Z Faried Abu Zaid Daniel Neider Mustafa Yalçıner http://arxiv.org/abs/2511.15735v1 LinApart2: efficient parallel partial fraction decomposition algorithm for denominators with polynomials of general degree 2025-11-18T10:33:45Z We present LinApart2, a major update to the LinApart algorithm for univariate partial fraction decomposition. Unlike its predecessor, LinApart2 can handle denominators of arbitrary polynomial degree without explicit factorization, while retaining the efficiency and parallelizability of the Laurent series method. Benchmarks show substantial speedups in both runtime and memory usage compared to Mathematica's built-in routine Apart and to the Euclidean algorithm, enabling computations that were previously intractable. 2025-11-18T10:33:45Z 23 pages, 12 figures, code is available at https://github.com/fekeshazy/LinApart, the manuscript has been submitted to Computer Physics Communication Levente Fekésházy Oliver Schnetz http://arxiv.org/abs/2402.16393v4 Optimal Communication Unbalanced Private Set Union 2025-11-18T10:17:09Z We present new two-party protocols for the Unbalanced Private Set Union (UPSU) problem. Here, the Sender holds a set of data points, and the Receiver holds another (possibly much larger) set, and they would like for the Receiver to learn the union of the two sets and nothing else. Furthermore, the Sender's computational cost, along with the communication complexity, should be smaller when the Sender has a smaller set. While the UPSU problem has numerous applications and has seen considerable recent attention in the literature, our protocols are the first where the Sender's computational cost and communication volume are linear in the size of the Sender's set only, and do not depend on the size of the Receiver's set. Our constructions combine linearly homomorphic encryption (LHE) with fully homomorphic encryption (FHE). The first construction uses multi-point polynomial evaluation (MEv) on FHE, and achieves optimal linear cost for the Sender, but has higher quadratic computational cost for the Receiver. In the second construction we explore another trade-off: the Receiver computes fast polynomial Euclidean remainder in FHE while the Sender computes a fast MEv, in LHE only. This reduces the Receiver's cost to quasi-linear, with a modest increase in the computational cost for the Sender. Preliminary experimental results using HElib indicate that, for example, a Sender holding 1000 elements can complete our first protocol using less than 2s of computation time and less than 10MB of communication volume, independently of the Receiver's set size. 2024-02-26T08:36:11Z 23rd International Conference on Applied Cryptography and Network Security, Jun 2025, Munich, Germany. pp.107-135 Jean-Guillaume Dumas CASC, UGA, LJK Alexis Galan CASC, UGA Bruno Grenet CASC Aude Maignan CASC Daniel S. Roche http://arxiv.org/abs/2509.10828v2 Structuring Definitions in Mathematical Libraries 2025-11-17T23:02:01Z Codifying mathematical theories in a proof assistant or computer algebra system is a challenging task, of which the most difficult part is, counterintuitively, structuring definitions. This results in a steep learning curve for new users and slow progress in formalizing even undergraduate level mathematics. There are many considerations one has to make, such as level of generality, readability, and ease of use in the type system, and there are typically multiple equivalent or related definitions from which to choose. Often, a definition that is ultimately selected for formalization is settled on after a lengthy trial and error process. This process involves testing potential definitions for usability by formalizing standard theorems about them, and weeding out the definitions that are unwieldy. Inclusion of a formal definition in a centralized community-run mathematical library is typically an indication that the definition is "good." For this reason, in this survey, we make some observations about what makes a definition "good," and examine several case studies of the refining process for definitions that have ultimately been added to the Lean Theorem Prover community-run mathematical library, mathlib. We observe that some of the difficulties are shared with the design of libraries for computer algebra systems, and give examples of related issues in that context. 2025-09-13T14:47:24Z Alena Gusakov Peter Nelson Stephen Watt http://arxiv.org/abs/2511.12664v1 Quantum Hyperdimensional Computing: a foundational paradigm for quantum neuromorphic architectures 2025-11-16T16:01:56Z A significant challenge in quantum computing (QC) is developing learning models that truly align with quantum principles, as many current approaches are complex adaptations of classical frameworks. In this work, we introduce Quantum Hyperdimensional Computing (QHDC), a fundamentally new paradigm. We demonstrate that the core operations of its classical counterpart, Hyperdimensional Computing (HDC), a brain-inspired model, map with remarkable elegance and direct correspondence onto the native operations of a QC. This suggests HDC is exceptionally well-suited for a quantum-native implementation. We establish a direct, resource-efficient mapping: (i) hypervectors are mapped to quantum states, (ii) the bundling operation is implemented as a quantum-native averaging process using a Linear Combination of Unitaries (LCU) and Oblivious Amplitude Amplification (OAA), (iii) the binding operation is realized via quantum phase oracles, (iv) the permutation operation is implemented using the Quantum Fourier Transform (QFT), and (v) vector similarity is calculated using quantum state fidelity measurements based on the Hadamard Test. We present the first-ever implementation of this framework, validated through symbolic analogical reasoning and supervised classification tasks. The viability of QHDC is rigorously assessed via a comparative analysis of results from classical computation, ideal quantum simulation, and execution of a 156-qubit IBM Heron r3 quantum processor. Our results validate the proposed mappings and demonstrate the versatility of the framework, establishing QHDC as a physically realizable technology. This work lays the foundation for a new class of quantum neuromorphic algorithms and opens a promising avenue for tackling complex cognitive and biomedical problems intractable for classical systems. 2025-11-16T16:01:56Z 44 pages, 6 figures Fabio Cumbo Rui-Hao Li Bryan Raubenolt Jayadev Joshi Abu Kaisar Mohammad Masum Sercan Aygun Daniel Blankenberg http://arxiv.org/abs/2511.11872v1 Decomposition and Preprocessing of Ternary Constraint Networks 2025-11-14T21:02:06Z Constraint programming is a general and exact method based on constraint propagation and backtracking search. We provide a function decomposing a constraint network into a ternary constraint network (TCN) with a reduced number of operators. TCNs are not new and have been used since the inception of constraint programming, notably in constraint logic programming systems. This work aims to specify formally the decomposition function of discrete constraint network into TCN and its preprocessing. We aim to be self-contained and descriptive enough to serve as the basis of an implementation. Our primary usage of TCN is to obtain a regular data layout of constraints to efficiently execute propagators on graphics processing unit (GPU) hardware. 2025-11-14T21:02:06Z Currently serve as supplementary materials for AAAI-2026 paper "A GPU-based Constraint Programming Solver" Pierre Talbot http://arxiv.org/abs/2508.18123v2 Views: a hardware-friendly graph database model for storing semantic information 2025-11-13T20:02:56Z The graph database (GDB) is an increasingly common storage model for data involving relationships between entries. Beyond its widespread usage in database industries, the advantages of GDBs indicate a strong potential in constructing symbolic artificial intelligences (AIs) and retrieval-augmented generation (RAG), where knowledge of data inter-relationships takes a critical role in implementation. However, current GDB models are not optimised for hardware acceleration, leading to bottlenecks in storage capacity and computational efficiency. In this paper, we propose a hardware-friendly GDB model, called Views. We show its data structure and organisation tailored for efficient storage and retrieval of graph data and demonstrate its functional equivalence and storage performance advantage compared to represent traditional graph representations. We further demonstrate its symbolic processing abilities in semantic reasoning and cognitive modelling with practical examples and provide a short perspective on future developments. 2025-08-25T15:30:33Z Yanjun Yang Adrian Wheeldon Yihan Pan Themis Prodromakis Alex Serb http://arxiv.org/abs/2511.09703v1 Spectral and combinatorial methods for efficiently computing the rank of unambiguous finite automata 2025-11-12T20:00:48Z A zero-one matrix is a matrix with entries from $\{0, 1\}$. We study monoids containing only such matrices. A finite set of zero-one matrices generating such a monoid can be seen as the matrix representation of an unambiguous finite automaton, an important generalisation of deterministic finite automata which shares many of their good properties. Let $\mathcal{A}$ be a finite set of $n \times n$ zero-one matrices generating a monoid of zero-one matrices, and $m$ be the cardinality of $\mathcal{A}$. We study the computational complexity of computing the minimum rank of a matrix in the monoid generated by $\mathcal{A}$. By using linear-algebraic techniques, we show that this problem is in $\textsf{NC}$ and can be solved in $\mathcal{O}(mn^4)$ time. We also provide a combinatorial algorithm finding a matrix of minimum rank in $\mathcal{O}(n^{2 + ω} + mn^4)$ time, where $2 \le ω\le 2.4$ is the matrix multiplication exponent. As a byproduct, we show a very weak version of a generalisation of the Černý conjecture: there always exists a straight line program of size $\mathcal{O}(n^2)$ describing a product resulting in a matrix of minimum rank. For the special case corresponding to total DFAs (that is, for the case where all matrices have exactly one 1 in each row), the minimum rank is the size of the smallest image of the set of all states under the action of a word. Our combinatorial algorithm finds a matrix of minimum rank in time $\mathcal{O}(n^3 + mn^2)$ in this case. 2025-11-12T20:00:48Z Stefan Kiefer Andrew Ryzhikov http://arxiv.org/abs/2302.13600v7 Fast in-place accumulation 2025-11-06T13:28:48Z This paper deals with simultaneously fast and in-place algorithms for formulae where the result has to be linearly accumulated: some output variables are also input variables, linked by a linear dependency. Fundamental examples include the in-place accumulated multiplication of polynomials or matrices (that is with only $O(1)$ extra space). The difficulty is to combine in-place computations with fast algorithms: those usually come at the expense of (potentially large) extra temporary space. We first propose a novel automatic design of fast and in-place accumulating algorithms for any bilinear formulae (and thus for polynomial and matrix multiplication) and then extend it to any linear accumulation of a collection of functions. For this, we relax the in-place model to any algorithm allowed to modify its inputs, provided that those are restored to their initial state afterwards. This allows us to derive in-place accumulating algorithms for fast polynomial multiplications and for Strassen-like matrix multiplications. We then consider the simultaneously fast and in-place computation of the Euclidean polynomial remainder $R = A \bmod B$. If $A$ and $B$ have respective degree $m+n$ and $n$, and $M(k)$ denotes the complexity of a (not-in-place) algorithm to multiply two degree-$k$ polynomials, our algorithm uses at most $O((n/m) M(m)\log(m))$ arithmetic operations. If $M(n) = Θ(n^{1+ε})$ for some $ε>0$, then our algorithms do match the not-in-place complexity bound of $O((n/m) M(m))$. We also propose variants that compute - still in-place and with the same complexity bounds - $A = A \bmod B$, $R += A \bmod B$ and $R += AC \bmod B$, that is multiplication in a finite field extension. To achieve this, we develop techniques for Toeplitz matrix operations, for generalized convolutions, short product and power series division and remainder whose output is also part of the input. 2023-02-27T09:08:34Z Journal version. The conference version (ISSAC'24) is available as v6 of the current preprint (arxiv:2302.13600v6) Journal of Symbolic Computation 134 (2026) 102523 Jean-Guillaume Dumas CASC Bruno Grenet CASC 10.1016/j.jsc.2025.102523 http://arxiv.org/abs/2511.03389v1 Terracini matroids: algebraic matroids of secants and embedded joins 2025-11-05T11:50:03Z Applications of algebraic geometry have sparked much recent work on algebraic matroids. An algebraic matroid encodes algebraic dependencies among coordinate functions on a variety. We study the behavior of algebraic matroids under joins and secants of varieties. Motivated by Terracini's lemma, we introduce the notion of a Terracini union of matroids, which captures when the algebraic matroid of a join coincides with the matroid union of the algebraic matroids of its summands. We illustrate applications of our results with a discussion of the implications for toric surfaces and threefolds. 2025-11-05T11:50:03Z Fatemeh Mohammadi Jessica Sidman Louis Theran http://arxiv.org/abs/2511.02121v1 On the integrality of some P-recursive sequences 2025-11-03T23:22:10Z We investigate the arithmetic nature of P-recursive sequences through the lens of their D-finite generating functions. Building on classical tools from differential algebra, we revisit the integrality criterion for Motzkin-type sequences due to Klazar and Luca, and propose a unified method for analysing global boundedness and algebraicity within a broader class of holonomic sequences. The central contribution is an algorithm that determines whether all, none, or a one-dimensional family of solutions to certain second-order recurrences are globally bounded. This approach generalizes earlier ad hoc methods and applies successfully to several well-known sequences from the On-Line Encyclopedia of Integer Sequences (OEIS). 2025-11-03T23:22:10Z 30 pages, 4 figures Anastasia Matveeva