Basic notions of effective descriptive set theory II

Speaker: 

Geoff Galgon and Garrett Ervin

Institution: 

UCI

Time: 

Monday, October 24, 2011 - 4:00pm

Location: 

RH 440R

We will introduce the "lightface" projective hierarchy and examine it both from syntactical and semantical aspect. "Lightface" \Sigma^0_1" sets are effective versions of open sets. We also prove that lightface \Sigma^0_1 sets of reals can be represented as sets of branches of recursive trees, and lithtface \Sigma^1_1 sets can be represented as projections of recursive trees.

Definability and Infinity

Speaker: 

Monroe Eskew

Institution: 

UC Irvine

Time: 

Monday, October 24, 2011 - 5:30pm

Location: 

RH 306

What does it mean for a collection to be finite? On the one hand, we have our preschool notion that a collection is finite when can be counted with natural numbers in a way that terminates. On the other hand, there is a definition due to Dedekind that a set is finite if and only if it cannot be put in one-to-one correspondence with a proper subset. Intuitively these two notions should be equivalent, but can we prove it? I will argue that to avoid a circular argument, one direction requires more care than one would initially think. Further, the other direction is true only by virtue of the Axiom of Choice. To outline the proof of this fact, we will examine formal notions of definiabilty and the set-theoretic technique of forcing.

Vortex sheets in incompressible, ideal 2D flow

Speaker: 

Milton Lopes Filho

Institution: 

Univ. of Campinas, Brazil

Time: 

Friday, January 20, 2012 - 4:00pm

Location: 

RH 306

Vortex sheets in 2D flow are curves where a tangential discontinuity of velocity occurs. They represent an idealized description of thin regions of intense shear, which are a common feature of fluid flows occurring in practice. In this talk, we examine the different mathematical descriptions of vortex sheets, the current knowledge concerning these descriptions and some of the recent progress on the subject.

Serfati solutions to the incompressible 2D Euler equations in an exterior domain

Speaker: 

Helena Nussenzveig Lopes

Institution: 

University of Campinas, Brazil

Time: 

Thursday, January 12, 2012 - 3:00pm

Location: 

RH 306

In 1963 V. I. Yudovich proved the existence and uniqueness of weak solutions of the incompressible 2D Euler equations assuming that the vorticity, which is the curl of velocity, is bounded and integrable in the full plane. A few extensions of this result have been established, most notably by Yudovich himself and, also, by M. Vishik, always assuming some decay of vorticity at infinity. Paradoxically, if the vorticity is doubly-periodic then there is no difficulty in establishing well-posedness of weak solutions, as long as the vorticity is also bounded. In this talk I will report on work in progress aimed at extending, for 2D flows in a domain exterior to an island, well-posedness of weak solutions to include all vorticities which are bounded and are the curl of a bounded velocity field. This work is related to recent results by Taniuchi, Tashiro and Yoneda and it builds on previous, albeit incomplete, work due to Ph. Serfati, where flow in the full plane was considered.

This is joint work with J. P. Kelliher (UCR) and M. C. Lopes Filho (UNICAMP).

Complexity in coding theory

Speaker: 

Professor Daqing Wan

Institution: 

UCI

Time: 

Thursday, November 3, 2011 - 3:00pm

Location: 

RH 440R

Among the most important complexity problems in
coding theory are the maximun likelihood decoding
and the computation of the minimun distance.
In this talk, we explain a self-contained, quick and
transparent proof of the NP-hardness of these
problems based on the subset sum problem over
finite fields.

Wave Decoherence for the Random Schrdinger Equation with Long-Range Correlations.

Speaker: 

Christophe Gomez

Institution: 

Stanford Mathematics Dept.

Time: 

Monday, November 7, 2011 - 4:00pm

Location: 

RH 306

Wave propagation in random media with long-range correlations was recently stimulated by data collections showing that the medium of propagation presented some long-range correlation effects. We will analyze the random Schrdinger equation to show that a wave propagating in a random medium with slowly decaying correlations undergoes some anomalous decoherence effects.

Curvature and rational connectivity on projective manifolds

Speaker: 

Professor Bun Wong

Institution: 

UCR

Time: 

Tuesday, November 22, 2011 - 4:00pm

Location: 

RH 306

In this lecture, we will talk about a recent joint
work ofGordon Heier and myself about curvature characterizations
ofuniruledness and rational connectivity of projective manifolds. A
result on projective manifolds with zero total scalar curvature will
also be discusse.

Approximate common divisors via lattices

Speaker: 

Nadia Heninger

Institution: 

UCSD Department of Computer Science and Engineering

Time: 

Tuesday, November 15, 2011 - 3:00pm

Location: 

RH 340N

Given two integers, we can compute their greatest common divisor
efficiently using Euclid's algorithm. Howgrave-Graham formulated
an approximate version of this question, asking ``What if instead of
exact multiples of some common divisor, we only know approximations?''
This problem has many applications in cryptography, particularly
partial key recovery for RSA. In this talk, I will show how to extend
Howgrave-Graham's algorithm from two approximate multiples to many
approximate multiples. This gives a more detailed analysis of the
hardness assumption underlying the recent fully homomorphic
cryptosystem of van Dijk, Gentry, Halevi, and Vaikuntanathan. While
these results do not challenge the suggested parameters, a
$2^{n^{2/3}$ approximation algorithm for lattice basis reduction in
$n$ dimensions could be used to break these parameters.

Joint work with Henry Cohn

Toward Making Homomorphic Encryption Practical

Speaker: 

Craig Gentry

Institution: 

IBM

Time: 

Tuesday, October 25, 2011 - 3:00pm

Location: 

RH 340N

Homomorphic encryption allows you to delegate the processing of your data or your query to a "worker" (e.g., the "cloud") without sacrificing your privacy. The worker can process your private data or private query even though it is encrypted, and send back to you the (encrypted) response that you were seeking, without learning anything significant.

This talk will partly be a tutorial designed to give a taste of how homomorphic encryption schemes work, and why they have been so inefficient. Next, the talk will sketch some very recent results that dramatically improve efficiency and give us hope that homomorphic computation may one day be truly practical.

Pages

Subscribe to UCI Mathematics RSS