DC Field | Value | Language |
---|---|---|
dc.contributor.author | Blagojević, Pavle | en |
dc.contributor.author | Lück, Wolfgang | en |
dc.contributor.author | Ziegler, Günter | en |
dc.date.accessioned | 2020-04-26T19:36:31Z | - |
dc.date.available | 2020-04-26T19:36:31Z | - |
dc.date.issued | 2016-04-01 | en |
dc.identifier.issn | 0002-9947 | en |
dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/558 | - |
dc.description.abstract | A continuous map Rd → RN is k-regular if it maps any k pairwise distinct points to k linearly independent vectors. Our main result on k-regular maps is the following lower bound for the existence of such maps between Euclidean spaces, in which α(k) denotes the number of ones in the dyadic expansion of k: For d ≥ 1 and k ≥ 1 there is no k-regular map Rd → RN for N <d(k − α(k)) + α(k). This reproduces a result of Cohen & Handel from 1978 for d = 2 and the extension by Chisholm from 1979 to the case when d is a power of 2; for the other values of d our bounds are in general better than Karasev’s (2010), who had only recently gone beyond Chisholm’s special case. In particular, our lower bound turns out to be tight for k ≤ 3. A framework of Cohen & Handel (1979) relates the existence of a k-regular map to the existence of a low-dimensional inverse of a certain vector bundle. Thus the non-existence of regular maps into RN for small N follows from the non-vanishing of specific dual Stiefel–Whitney classes. This we prove using the general Borsuk–Ulam–Bourgin–Yang theorem combined with a key observation by Hung (1990) about the cohomology algebras of configuration spaces. Our study produces similar lower bound results also for the existence of ℓ -skew embeddings Rd → RN, for which we require that the images of the tangent spaces of any ℓ distinct points are skew affine subspaces. This extends work by Ghomi & Tabachnikov (2008) for the case ℓ = 2. | en |
dc.publisher | American Mathematical Society | - |
dc.relation | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | - |
dc.relation.ispartof | Transactions of the American Mathematical Society | en |
dc.title | On highly regular embeddings | en |
dc.type | Article | en |
dc.identifier.doi | 10.1090/tran/6559 | en |
dc.identifier.scopus | 2-s2.0-84955165705 | en |
dc.relation.firstpage | 2891 | en |
dc.relation.lastpage | 2912 | en |
dc.relation.issue | 4 | en |
dc.relation.volume | 368 | en |
dc.description.rank | M21a | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.project.projectURL | http://www.mi.sanu.ac.rs/novi_sajt/research/projects/174008e.php | - |
crisitem.project.fundingProgram | Directorate for Education & Human Resources | - |
crisitem.project.openAire | info:eu-repo/grantAgreement/NSF/Directorate for Education & Human Resources/1740089 | - |
crisitem.author.orcid | 0000-0003-3649-9897 | - |
SCOPUSTM
Citations
7
checked on Nov 24, 2024
Page view(s)
24
checked on Nov 24, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.