All Seminars
Title: Contact geometry, open books and monodromy |
---|
Colloquium: Topology |
Speaker: John Etnyre of Georgia Tech |
Contact: Aaron Abrams, abrams@mathcs.emory.edu |
Date: 2009-04-06 at 3:00PM |
Venue: W306 |
Download Flyer |
Abstract: Recall that an open book decomposition of a 3-manifold M is a link L in M whose complement fibers over the circle with fiber a Seifert surface for L. Giroux's correspondence relates open book decompositions of a manifold M to contact structures on M. This correspondence has been fundamental to our understanding of contact geometry. An intriguing question raised by this correspondence is how geometric properties of a contact structure are reflected in the monodromy map describing the open book decomposition. In this talk I will show that there are several interesting monoids in the mapping class group that are related to various properties of a contact structure (like being Stein fillable, weakly fillable, . . .). I will also show that there are open book decompositions of Stein fillable contact structures whose monodromy cannot be factored as a product of positive Dehn twists. This is joint work with Jeremy Van Horn-Morris and Ken Baker. |
Title: Density of isoperimetric spectra |
---|
Colloquium: Topology |
Speaker: Noel Brady of University of Oklahoma |
Contact: Aaron Abrams, abrams@mathcs.emory.edu |
Date: 2009-04-06 at 4:00PM |
Venue: W306 |
Download Flyer |
Abstract: |
Title: Digital Identity Management and Protection |
---|
Seminar: Computer Science |
Speaker: Elisa Bertino of CS Department, CERIAS, Purdue University |
Contact: Li Xiong, lxiong@mathcs.emory.edu |
Date: 2009-04-03 at 3:00PM |
Venue: MSC W301 |
Download Flyer |
Abstract: \small Digital identity management (DIM) has emerged as a critical foundation for supporting successful interaction in today's globally interconnected society. It is crucial not only for the conduct of business and government but also for a large and growing body of electronic or online social interactions. Digital identity management is usually coupled with the notion of federation. The goal of federations is to provide users with protected environments to federate identities by the proper management of identity attributes. Federations provide a controlled method by which federation members can provide more integrated and complete services to a qualified group of individuals within certain sets of business transactions. By controlling the scope of access to participating sites, and by enabling secure, cross-domain transmission of user's personal information, federations can make the perpetration of identity frauds more difficult, as well as reduce their frequency, and their potential impact. In this talk we will first discuss basic digital identity concepts and requirements towards DIM solutions and we will overview relevant initiatives currently undergoing in academia and industry. We will then focus on the problem of identity theft and discuss an initial solution to the problem of establishing and protecting digital identity.\\ \\* \textbf{Biography:} Elisa Bertino is professor of Computer Science at Purdue University and serves as Research Director of the Center for Education and Research in Information Assurance and Security (CERIAS). Previously she was a faculty member at Department of Computer Science and Communication of the University of Milan where she directed the DB and SEC laboratory. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Elisa Bertino is a Fellow member of IEEE and a Fellow member of ACM. She received the 2002 IEEE Computer Society Technical Achievement Award for "For outstanding contributions to database systems and database security and advanced data management systems" and the 2005 IEEE Computer Society Tsutomu Kanai Award "For pioneering and innovative research contributions to secure distributed systems". \\ |
Title: On Graphs with a Given Endomorphism Monoid |
---|
Defense: Dissertation |
Speaker: Benjamin Shemmer of Emory University |
Contact: Benji Shemmer, bshemmer@emory.edu |
Date: 2009-04-02 at 4:00PM |
Venue: MSC W201 |
Download Flyer |
Abstract: Hedlin and Pultr proved that for any monoid M there exists a graph G with endomorphism monoid isomorphic to M. We will give a construction G(M) for a graph with prescribed endomorphism monoid M. Using this construction we derive bounds on the minimum number of vertices and edges required to produce a graph with a given endomorphism monoid for various classes of finite monoids. |
Title: Patching Brauer Groups |
---|
Seminar: Algebra |
Speaker: Feng Chen of Emory University |
Contact: Feng Chen (Emory), fchen@emory.edu |
Date: 2009-03-31 at 4:00PM |
Venue: MSC W303 |
Download Flyer |
Abstract: |
Title: Bidirectional Wave Propagation in the Human Arterial Tree |
---|
Seminar: Numerical Analysis and Scientific Computing |
Speaker: Radu C. Cascaval of University of Colorado at Colorado Springs |
Contact: Alessandro Veneziani, ale@mathcs.emory.edu |
Date: 2009-03-27 at 3:00PM |
Venue: MSC W303 |
Download Flyer |
Abstract: We describe a nonlinear model for the propagation of the pressure and flow velocity waves in the peripheral circulation, which is based on a Boussinesq-type system. The key ingredient is the inclusion of dispersive effects (amplitude-dependent speeds of propagation) in addition to the nonlinear effects. We discuss the formation and propagation of the transmitted and reflected waves at bifurcations and terminal ends. The timing of the reflections as well as the different speeds of the reflected waves are particularly relevant in view of the complex geometry of the peripheral circulation. The advantage of this analysis in the time domain, compared with linear impedance models, is that it applies for non-periodic flows and also allows the direct implementation of accurate time-dependent controls, such as those exhibited in the peripheral circulation. We discuss an application of this model on the study of the latencies measured experimentally during rest and dynamical changes in the cardiovascular system. |
Title: Killing forms of Lie algebras |
---|
Dissertation defense: Algebra |
Speaker: Audrey Malagon of Emory University |
Contact: Skip Garibaldi, skip@mathcs.emory.edu |
Date: 2009-03-25 at 4:00PM |
Venue: MSC W201 |
Download Flyer |
Abstract: One approach to the problem of classifying Lie Algebras is to find invariants. One such invariant is the Killing form. In this talk I will give a formula for computing the Killing form of an isotropic Lie algebra defined over an arbitrary field of characteristic zero, based on the Killing form of a subalgebra containing its anisotropic kernel. I will then explicitly compute the Killing form for several Lie algebras of exceptional type and give a general formula for the Killing form of all inner type Lie algebras of type E6, including the anisotropic ones. |
Title: Towards Contextual Text Mining |
---|
Seminar: Computer Science |
Speaker: Qiaozhu Mei of University of Illinois at Urbana-Champaign |
Contact: Eugene Agichtein, eugene@mathcs.emory.edu |
Date: 2009-03-24 at 11:00AM |
Venue: W302 |
Download Flyer |
Abstract: Text is generally associated with all kinds of contextual information. Contextual information can be explicit, such as the time and the location where a blog article is written, and the author(s) of a biomedical publication, or implicit, such as the positive or negative sentiment that an author had when he/she wrote a product review; there may also be complex context such as the social network of the authors. Many applications require analysis of patterns of topics over different contexts. For instance, analysis of search logs in the context of users can reveal how we can improve the quality of a search engine by optimizing the search results according to particular users, while analysis of text in the context of a social network can facilitate discovery of more meaningful topical communities. Since contextual information affects significantly the choices of topics and words made by authors, in general, it is very important to incorporate it in analyzing and mining text data. In this talk, I will present a new paradigm of text mining, called contextual text mining, where context is treated as a "first-class citizen." I will introduce general ways of modeling and analyzing various kinds of context in text, including simple context, implicit context, and complex context, in the framework of probabilistic language models. I will show the effectiveness of these general contextual text mining techniques with sample applications in web search and social network analysis. Biosketch: Qiaozhu Mei is a Ph.D. candidate of Department of Computer Science at the University of Illinois at Urbana-Champaign. He has broad research interests in text information management, especially text mining and information retrieval with probabilistic models. He has published extensively in these areas, and has received the Best Student Paper Runner-Up Awards of ACM KDD 2006 and ACM KDD 2007. He is also one of the five recipients of the inaugural Yahoo! Ph.D. Student Fellowship. |
Title: Representation theory: a brief introduction from the sl(n) perspective |
---|
Seminar: Algebra |
Speaker: Julie Beier of Mercer University |
Contact: Skip Garibaldi, skip@mathcs.emory.edu |
Date: 2009-03-24 at 3:00PM |
Venue: MSC W303 |
Download Flyer |
Abstract: Representation theory can be simply defined as the study of the ways a group acts on a vector space. A large piece of this process involves understanding weight spaces, particularly irreducible highest weight spaces. We will explore weight spaces of irreducible representations by looking at $sl(n, \mathbf{C})$, $U_q(sl(n))$ and $U_q(\widehat{sl}(n))$. As the structure of the space becomes more complicated we utilize different combinatorics to understand these irreducible, highest weight spaces. |
Title: Signal Processing Approach To Obtain A Direct Multi-grid Solver |
---|
Seminar: Numerical Analysis and Scientific Computing |
Speaker: Pablo Navarrete of University of Chile, Department of Electrical Engineering |
Contact: Jim Nagy, nagy@mathcs.emory.edu |
Date: 2009-03-20 at 3:00PM |
Venue: W306 |
Download Flyer |
Abstract: Modifications of the conventional muti-grid algorithm are explored to avoid the use of smoothing iterations. In the full multi-grid algorithm, classical smoothing iterations (e.g. Gauss-Seidel) reduce high-frequency components of the error and a coarse-grid approach reduces the low-frequency components of the error. The problem here is that two methods with different structures are being combined, which introduces additional complexity in the convergence analysis of multi-grid methods. Then, the idea is to avoid the use of smoothing iterations by using different inter-grid configurations. In an analogy with perfect reconstruction filters, a configuration of inter-grid operators is found such that the approximation error is completely cancelled after one iteration of the algorithm. The main assumption for this configuration to work is a particular aliasing pattern in the eigen-vectors of the linear system. Examples and simulations are presented to evaluate the performance of the new algorithm. |