Seminars archive
Upcoming Seminars   Seminar: Algebra Title to be announced Brandon William, UC Berkeley   Seminar: Algebra Title to be announced Frank Thorne, University of South Carolina   Colloquium: Computational Mathematics Optimization Methods for Training Neural Networks Jorge Nocedal, Northwestern University  Past Seminars   Defense Application of the DIKW Model in Malaria Systems Biology: From NGS Data to Disease Progression Insight JungTing Chien, Emory University   Seminar: Computer Science Perfect Secrecy vs. Computational Security in Private Key Encryption Schemes Steven La Fleur, Emory University Venue: Mathematics and Science Center, Room W301 Show abstract As evidenced by recent events, privacy and security of data is increasingly important. There is a lot of interest in the ability to securely encrypt and send messages between two parties in such a way that any potential eavesdropper will be unable to read the message. But what does "security" of an encryption scheme mean, and how do we measure how secure a given scheme is?\\
\\In this talk we will investigate formal definitions for security of an encryption schemes, and what it means to prove that an encryption scheme is secure using these definitions. We will consider the practical drawbacks of "perfect secrecy" and how the definitions and assumptions made for computational security fix these drawback while still maintaining secrecy from attackers of different strengths.\\
\\The talk is intended for undergraduate students who have taken a course in discrete mathematics for computer science and have a basic understanding of probability, theory of computation and rigorous proof.   Defense: Dissertation Efficient and Adaptive Skyline Computation Jinfei Liu, Emory University   Seminar: Numerical Analysis and Scientific Computing Nonbacktracking walk centrality for directed networks Francesca Arrigo, University of Strathclyde   Seminar: Algebra The excedance algebra and box polynomials Cyrus Hettle, Univeristy of Kentucky   Seminar Reconstructing the Tree of Life Shel Swenson, Emory University Venue: Mathematics and Science Center, Room W301   Seminar: Combinatorics On a problem in Euclidean Ramsey Theory Adril Arman, The University of Manitoba   Seminar Embedded Systems: Arduino Programming for Autonomous Racing Cars Lanny Sitanayah, Clemson University   Seminar: Algebra AthensAtlanta Joint Number Theory Seminar Gopal Prasad and Rachel Pries, University of Michigan and Colorado State University   Seminar Point Processes and Asynchronous Event Sequence Analysis Hongteng Xu, Georgia Institute of Technology Venue: White Hall 112 Show abstract Realworld interactions among multiple entities, such as user behaviors in social networks, job hunting and hopping, and diseases and their complications, often exhibit selftriggering and mutuallytriggering patterns. For example, a tweet of a twitter user may trigger further responses from her friends. A disease of a patient may trigger other complications. Temporal point processes, especially Hawkes processes and correcting processes, have a capability to capture the triggering patterns quantitatively. This talk aims to introducing basic concepts of point processes and proposing a series of cuttingedge techniques for practical applications. In particular, the Granger causality analysis of Hawkes processes, the clustering problem of event sequences, the combination of deep learning and point processes, and some interesting applications will be discussed.\\
\\
Bio: Hongteng Xu is a Ph.D. candidate in the School of Electrical and Computer Engineering, Georgia Tech, jointly supervised by Prof. Hongyuan Zha (CSE) and Prof. Mark A. Davenport (ECE). At the same time, he is a research assistant in the College of Computing at Georgia Tech. He received his Bachelor Degree in Electronic and Information Engineering from Tianjin University in 2010 and his dual Master Degree in ECE from Shanghai Jiao Tong University and Georgia Tech in 2013. His research interests include machine learning and its applications, e.g., computer vision and data mining. Currently, he has published over 20 papers on top conferences and journals. 
