Thu, 24 Nov 2016
12:00
L5

Very weak solutions to non-Newtonian fluids

Sebastian Schwarzacher
(Charles University, Prague)
Abstract
I will present a new result which was established in collaboration with M. Bulıcek and J. Burczak. We established an existence, uniqueness and optimal regularity results for very weak solutions to certain incompressible non-Newtonian fluids. We introduce structural assumptions of Uhlenbeck type on the stress tensor. These as-sumptions are sufficient and to some extend also necessary to built a unified theory. Our approach leads qualitatively to the same so called Lp-theory as the one that is available for the linear Stokes equation.
Thu, 03 Nov 2016
12:00
L5

A new approach to study strong advection problems

Harsha Hutridurga
(Imperial College)
Abstract
In this talk, I shall be attempting to give an overview of a new weak convergence type tool developed by myself, Thomas Holding (Warwick) and Jeffrey Rauch (Michigan) to handle multiple scales in advection-diffusion type models used in the turbulent diffusion theories. Loosely speaking, our strategy is to recast the advection-diffusion equation in moving coordinates dictated by the flow associated with a mean advective field. Crucial to our analysis is the introduction of a fast time variable. We introduce a notion of "convergence along mean flows" which is a weak multiple scales type convergence -- in the spirit of two-scale convergence theory. We have used ideas from the theory of "homogenization structures" developed by G. Nguetseng. We give a sufficient structural condition on the "Jacobain matrix" associated with the flow of the mean advective field which guarantees the homogenization of the original advection-diffusion problem as the microscopic lengthscale vanishes. We also show the robustness of this structural condition by giving an example where the failure of such a structural assumption leads to a degenerate limit behaviour. More details on this new tool in homogenzation theory can be found in the following paper: T. Holding, H. Hutridurga, J. Rauch. Convergence along mean flows, in press SIAM J Math. Anal., arXiv e-print: arXiv:1603.00424, (2016). In a sequel to the above mentioned work, we are preparing a work where we address the growth in the Jacobain matrix -- termed as Lagrangian stretching in Fluid dynamics literature -- and its consequences on the vanishing microscopic lengthscale limit. To this effect, we introduce a new kind of multiple scales convergence in weighted Lebesgue spaces. This helps us recover some results in Freidlin-Wentzell theory. This talk aims to present both these aspects of our work in an unified manner.
Thu, 27 Oct 2016
12:00
L5

The inverse Calderón problem with Lipschitz conductivities

Pedro Caro
(Basque Center for Applied Mathematics)
Abstract
In this talk I will present a recent uniqueness result for an inverse boundary value problem consisting of recovering the conductivity of a medium from boundary measurements. This inverse problem was proposed by Calderón in 1980 and is the mathematical model for a medical imaging technique called Electrical Impedance Tomography which has promising applications in monitoring lung functions and as an alternative/complementary technique to mammography and Magnetic Resonance Imaging for breast cancer detection. Since in real applications, the medium to be imaged may present quite rough electrical properties, it seems of capital relevance to know what are the minimal regularity assumptions on the conductivity to ensure the unique determination of the conductivity from the boundary measurements. This question is challenging and has been brought to the attention of many analysts. The result I will present provides uniqueness for Lipschitz conductivities and was proved in collaboration with Keith Rogers.
Thu, 20 Oct 2016
12:00
L5

Long-time existence for Yang-Mills flow

Alex Waldron
(Stony Brook University)
Abstract

I'll discuss the problem of controlling energy concentration in YM flow over a four-manifold. Based on a study of the rotationally symmetric case, it was conjectured in 1997 that bubbling can only occur at infinite time. My thesis contained some strong elementary results on this problem, which I've now solved in full generality by a more involved method.

When they are not researching and teaching our faculty are busy writing. Via the panels on this page, you will find an extensive list of books written by our current and emeritus faculty.
Tue, 18 Oct 2016
17:00
C1

Operator systems and non-signalling correlations

Ivan Todorov
(Queen's University Belfast)
Abstract

The talk will be a survey of recent work on the connections between group operator systems and non-signalling correlations. I will show how tensor products in the operator system category can be interpreted as physical theories, and will exhibit a refinement of non-signalling corrections giving rise to quantum attributes of graphs, including quantum versions of the chromatic and the fractional chromatic number. Relations between the parameters will be examined and further directions will be discussed.

Wed, 02 Nov 2016
15:00
L5

Classical key exchange protocols secure against quantum adversaries

Marc Kaplan
(Telecom ParisTech)
Abstract

Not considering classified work, the first person to have asked and solved the problem of secure communication over insecure communication channels was Ralph Merkle, in a project for a Computer securitjohn y course at UC Berkeley in 1974. In this work, he gave a protocol that allow two legitimate parties to establish a secret key with an effort of the order of N, but such that an eavesdropper can not discover the secret key with non-vanishing probability if he is not willing to spend an effort of at least the order of N^2.
In this talk, we will consider key exchange protocols in the presence of a quantum eavesdropper. Unfortunately, it is easy to see that in this case, breaking Merkle’s original protocol only requires an effort of the order of N, similar to the one of the legitimate parties. We will show how to restore the security by presenting two sequences of protocols with the following properties:
- In the first sequence, the legitimate parties have access to a quantum computer, and the eavesdropper's effort is arbitrarily close to N^2.
- In the second sequence, the protocols are classical, but the eavesdropper’s effort is arbitrarily close to N^{3/2}.
We will show the key exchange protocols, the quantum attacks with the proof of their optimality. We will focus mostly on the techniques from quantum algorithms and complexity theory used to devise quantum algorithms and to prove lower bounds. The underlying tools are the quantum walk formalism, and the quantum adversary lower bound method, respectively. Finally, we will introduce a new method to prove average-case quantum query complexity lower bounds.

Tue, 15 Nov 2016

14:15 - 15:15
L4

Representations of finite groups over self-injective rings

Greg Stevenson
(Bielefeld)
Abstract

 For a group algebra over a self-injective ring
there are two stable categories: the usual one modulo projectives
and a relative one where one works modulo representations
which are free over the coefficient ring.
I'll describe the connection between these two stable categories,
which are "birational" in an appropriate sense.
I'll then make some comments on the specific case
where the coefficient ring is Z/nZ and give a more
precise description of the relative stable category.

Subscribe to