Seminars and Colloquia by Series

Friday, August 14, 2009 - 15:05 , Location: Skiles 255 , Prof. Satoru Iwata , Kyoto University , Organizer: Prasad Tetali
In this lecture, I will explain connections between graph theory and submodular optimization. The topics include theorems of Nash-Williams on orientation and detachment of graphs.
Friday, August 14, 2009 - 14:00 , Location: Skiles 114 , Hao Deng , School of Mathematics, Georgia Tech , Organizer:
Monday, August 10, 2009 - 15:00 , Location: Skiles 255 , Kun Zhao , School of Mathematics, Georgia Tech , Organizer:
Thursday, July 2, 2009 - 13:30 , Location: Skiles 255 , Turkay Yolcu , School of Mathematics, Georgia Tech , Organizer:
In this thesis, we extend De Giorgi's interpolation method to a class of parabolic equations which are not gradient flows but possess an entropy functional and an underlying Lagrangian. The new fact in the study is that not only the Lagrangian may depend on spatial variables, but also it does not induce a metric. Assuming the initial condition is a density function, not necessarily smooth, but solely of bounded first moments and finite entropy, we use a variational scheme to discretize the equation in time and construct approximate solutions. Moreover, De Giorgi's interpolation method reveals to be a powerful tool for proving convergence of our algorithm. Finally, we analyze uniqueness and stability of our solution in L^1.
Wednesday, July 1, 2009 - 15:30 , Location: Skiles 255 , Alan J. Michaels , School of Electrical and Computer Engineering, Georgia Tech , Organizer:
This disseratation provides the conceptual development, modeling and simulation, physical implementation and measured hardware results for a procticable digital coherent chaotic communication system.
Series: Other Talks
Wednesday, July 1, 2009 - 12:00 , Location: Skiles 255 , Pablo Laguna , School of Physics, Georgia Tech , Organizer:
This will be an informal seminar with a discussion on some mathematical problems in relativistic astrophysics, and discuss plans for future joint seminars between the Schools of Mathematics and Physics.
Thursday, June 11, 2009 - 11:05 , Location: Skiles 255 , Daniel Kral , ITI, Charles University, Prague , Organizer: Robin Thomas

We study several parameters of cubic graphs with large girth. In particular, we prove that every n-vertex cubic graph with sufficiently large girth satisfies the following:

  • has a dominating set of size at most 0.29987n (which improves the previous bound of 0.32122n of Rautenbach and Reed)
  • has fractional chromatic number at most 2.37547 (which improves the previous bound of 2.66881 of Hatami and Zhu)
  • has independent set of size at least 0.42097n (which improves the previous bound of 0.41391n of Shearer), and
  • has fractional total chromatic number arbitrarily close to 4 (which answers in the affirmative a conjecture of Reed). More strongly, there exists g such that the fractional total chromatic number of every bridgeless graph with girth at least g is equal to 4.
The presented bounds are based on a simple probabilistic argument.

The presentation is based on results obtained jointly with Tomas Kaiser, Andrew King, Petr Skoda and Jan Volec.

Thursday, June 4, 2009 - 11:00 , Location: Skiles 255 , Zdenek Dvorak , Simon Fraser University , Organizer: Robin Thomas
Richter and Salazar conjectured that graphs that are critical for a fixed crossing number k have bounded bandwidth. A weaker well-known conjecture of Richter is that their maximum degree is bounded in terms of k. We disprove these conjectures for every k >170, by providing examples of k-crossing-critical graphs with arbitrarily large maximum degree, and explore the structure of such graphs.
Thursday, May 21, 2009 - 11:00 , Location: Skiles 255 , Joshua Cooper , Department of Mathematics, University of South Carolina , Organizer: Prasad Tetali
We consider the Ulam "liar" and "pathological liar" games, natural and well-studied variants of "20 questions" in which the adversarial respondent is permitted to lie some fraction of the time. We give an improved upper bound for the optimal strategy (aka minimum-size covering code), coming within a triply iterated log factor of the so-called "sphere covering" lower bound. The approach is twofold: (1) use a greedy-type strategy until the game is nearly over, then (2) switch to applying the "liar machine" to the remaining Berlekamp position vector. The liar machine is a deterministic (countable) automaton which we show to be very close in behavior to a simple random walk, and this resemblance translates into a nearly optimal strategy for the pathological liar game.
Monday, May 11, 2009 - 13:00 , Location: Skiles 255 , Evan Borenstein , School of Mathematics, Georgia Tech , Organizer: Ernie Croot

Pages