Colloquium
- Spectral Problems in Inverse Scattering for Inhomogeneous MediaThe inverse scattering problem for inhomogeneous (possibly anisotropic) media amounts to solving a nonlinear ill-posed equation, thus presenting difficulties in arriving at a solution.
- Granular flow: Particle Size Segregation and New Constitutive LawsThe segregation of particles of different sizes can be achieved by vibration or by shear flow. I describe a nonlinear conservation law that captures the main features of segregation
- Differential imaging of evolution in elastic backgrounds with unknown microstructureMajor components of nuclear power plants e.g., reactors, fuel cells and containment vessels are comprised of highly heterogeneous composites that (a) their topology
- Fairest edge usage in spanning treesThis talk will explore several interesting and interrelated optimization problems involving the spanning trees of a graph. Each problem will be connected to a single fundamental question: How should we
- On the dynamics of coupled Morris-Lecar NeuronsIn recent years, the study of computational neuronal dynamics has made remarkable progress has been made by on the nonlinear study of artificial neural networks. This approach relies on using models of
- Designing frustration and topologically constrained disorder in artificial spin iceWe are all familiar with classical states of matter as ordered or disordered; and yet some of the most relevant phenomena in nature, from the nano-machinery of life
- A Localized Reduced-Order Modeling Approach for PDEs with Bifurcating Solutions Reduced-order modeling (ROM) commonly refers to the construction, based on a few solutions (referred to as snapshots) of an expensive discretized partial differential
- Improving the accuracy of the trapezoidal ruleThe trapezoidal rule uses function values at equispaced nodes. It is very accurate for integrals over periodic intervals, but is usually quite inaccurate in non-periodic cases. Commonly used improvements
- Dan Massey, Interdisciplinary Telecom Program, University of Colorado 51´«Ã½Cybersecurity Rule 6: Use Cryptography CorrectlyThis talk explores some of the key mathematical concepts used in cybersecurity. Cryptography is one obvious example
- Peter F. Craigmile, Department of Statistics, The Ohio State UniversityEnhancing statistical inference for stochastic processes using modern statistical methods(This is joint research with Radu Herbei, Matthew Pratola, Huong Nguyen, and Grant