Seminars and Colloquia by Series

Detection of torus knots

Series
Geometry Topology Seminar
Time
Monday, April 7, 2014 - 14:05 for 1 hour (actually 50 minutes)
Location
Skiles 006
Speaker
Xingru ZhangSUNY Buffalo
We show that each (p,q)-torus knot in the 3-sphere is determined by its A-polynomial and its knot Floer homology. This is joint work with Yi Ni.

Nonnegative Preserving Data Interpolation/Fitting based on Bivariate Splines

Series
Applied and Computational Mathematics Seminar
Time
Monday, April 7, 2014 - 14:00 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Ming-Jun LaiUniversity of Georgia
I mainly discuss the following problem: given a set of scattered locations and nonnegative values, how can one construct a smooth interpolatory or fitting surface of the given data? This problem arises from the visualization of scattered data and the design of surfaces with shape control. I shall start explaining scattered data interpolation/fitting based on bivariate spline functions over triangulation without nonnegativity constraint. Then I will explain the difficulty of the problem of finding nonnegativity perserving interpolation and fitting surfaces and recast the problem into a minimization problem with the constraint. I shall use the Uzawa algorithm to solve the constrained minimization problem. The convergence of the algorithm in the bivariate spline setting will be shown. Several numerical examples will be demonstrated and finally a real life example for fitting oxygen anomalies over the Gulf of Mexico will be explained.

CANCELLED: Greedy-like algorithms and a myopic model for the non-monotone submodular maximization problem

Series
ACO Seminar
Time
Monday, April 7, 2014 - 13:00 for 1 hour (actually 50 minutes)
Location
Klaus 1116
Speaker
Allan BorodinUniversity of Toronto
We are generally interested in the following ill-defined problem: What is a conceptually simple algorithm and what is the power and limitations of such algorithms? In particular, what is a greedy algorithm or more generally a myopic algorithm for a combinatorial optimization problem? And to be even more specific, motivated by the Buchbinder et al ``online double sided greedy algorithm'' for the unconstrained non-monotone submodular maximization problem, what are (if any) the limitations of algorithms "of this genre" for the general unconstrained problem and for specific instances of the problem, such as Max-Di-Cut?Joint work with Norman Huang.

The Green-Tao theorem and a relative Szemerédi theorem

Series
Combinatorics Seminar
Time
Friday, April 4, 2014 - 15:05 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Yufei ZhaoMIT
The celebrated Green-Tao theorem states that there are arbitrarily long arithmetic progressions in the primes. In this talk, I will explain the ideas of the proof and discuss our recent simplifications. One of the main ingredients in the proof is a relative Szemerédi theorem, which says that every relatively dense subset of a pseudorandom set of integers contains long arithmetic progressions. Our main advance is both a simplification and a strengthening of the relative Szemerédi theorem, showing that a much weaker pseudorandomness condition suffices. I will explain the transference principle strategy used in the proof. Also see our recent exposition of the Green-Tao theorem: http://arxiv.org/abs/1403.2957 Based on joint work with David Conlon and Jacob Fox.

Topics in Ergodic Theory V: Oseledets Theorem.

Series
Dynamical Systems Working Seminar
Time
Friday, April 4, 2014 - 13:05 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Mikel J. de VianaGeorgia Tech
We begin the proof of Oseledets Theorem. This is part of a reading seminar geared towards understanding of Smooth Ergodic Theory. (The study of dynamical systems using at the same time tools from measure theory and from differential geometry)It should be accesible to graduate students and the presentation is informal. The first goal will be a proof of the Oseledets multiplicative ergodic theorem for random matrices. Then, we will try to cover the Pesin entropy formula, invariant manifolds, etc.

A Cubic Algorithm for Computing Gaussian Volume

Series
ACO Student Seminar
Time
Friday, April 4, 2014 - 12:05 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Ben CousinsGeorgia Tech
We present randomized algorithms for sampling the standard Gaussian distribution restricted to a convex set and for estimating the Gaussian measure of a convex set, in the general membership oracle model. The complexity of the integration algorithm is O*(n^3) while the complexity of the sampling algorithm is O*(n^3) for the first sample and O*(n^2) for every subsequent sample. These bounds improve on the corresponding state-of-the-art by a factor of n. Our improvement comes from several aspects: better isoperimetry, smoother annealing, avoiding transformation to isotropic position and the use of the ``speedy walk" in the analysis.

John-Nirenberg Theorem

Series
Analysis Working Seminar
Time
Friday, April 4, 2014 - 10:00 for 1 hour (actually 50 minutes)
Location
Skiles 006
Speaker
Sergio MayorgaSchool of Mathematics
Sergio will be leading discussion and presenting 6.2: The John-Nirenberg Theorem. Stop by, we will be havIng a good Time.

Concentration Inequalities with Bounded Couplings

Series
Stochastics Seminar
Time
Thursday, April 3, 2014 - 15:05 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Umit IslakUniversity of Southern California
Let $Y$ be a nonnegative random variable with mean $\mu$, and let $Y^s$, defined on the same space as $Y$, have the $Y$ size biased distribution, that is, the distribution characterized by $\mathbb{E}[Yf(Y)]=\mu \mathbb{E}[f(Y^s)]$ for all functions $f$ for which these expectations exist. Under bounded coupling conditions, such as $Y^s-Y \leq C$ for some $C>0$, we show that $Y$ satisfies certain concentration inequalities around $\mu$. Examples will focus on occupancy models with log-concave marginal distributions.

Feedbackless Information Gathering on Trees

Series
Graph Theory Seminar
Time
Thursday, April 3, 2014 - 12:05 for 1 hour (actually 50 minutes)
Location
Skiles 005
Speaker
Kevin CostelloUniversity of California, Riverside, CA
Suppose that each node of a rooted tree has a message that it wants to pass up the tree to the root. How can we design a protocol that guarantees all messages (eventually) reach there without being interfered with by other messages, if the nodes themselves do not know the underlying structure of the tree, or even whether their previous messages were successfully transmitted or not? I will describe (near optimal) answers to several variations of this problem, based on joint work with Marek Chrobak (UCR), Laszek Gasieniec (Liverpool) and Dariusz Kowalski (Liverpool).

Pages