University of Washington
Math Logo

Left Navigation Bar

Abstracts of 2011-2012 UW-PIMS Mathematics Colloquia
 
May 18, 2012 at 2:30pm
Mechanical Engineering Building, Room 238
Bruce Reznick
University of Illinois at Urbana-Champaign
The Secret Lives of Polynomial Identities

Polynomial identities can reflect deeper mathematical phenomena. In this talk, I will discuss some of the stories behind four identities (and their relatives). The stories involve algebra, analysis, number theory, combinatorics, geometry and numerical analysis. The identities, which don't fit well in plain text, involve polynomials in two, three and four variables being taken to powers ranging from the third to the fourteenth. The earliest is due to Viéte, and dates to the 1590s. Felix Klein makes a special guest appearance.

View slides from this lecture.
View video of this lecture.
 

April 6, 2012 at 2:30pm
Chemistry Library Building, Room 015
Christopher Hacon
University of Utah
Geometry of Varieties of General Type

In this talk we will discuss issues related to the existence of a moduli space for varieties of general type. Recall that varieties of general type are the higher dimensional analog of Riemann surfaces of genus at least 2. We will explain recent results on the boundedness of these varieties (once we fix certain invariants, these varieties are expected to be parametrized by finitely many finite dimensional parameter spaces) and on the geometry of their possible degenerations.

View video of this lecture.
 

March 9, 2012 at 2:30pm
Denny Hall, Room 216
Jonathan Brundan
University of Oregon
Representations of General Linear Lie Superalgebras

The general linear Lie algebra \(gl_n\)(C) -- endomorphisms of an \(n\)-dimensional complex vector space \(V\) with operation \([x,y]\) being the commutator \(xy-yx\) -- is the most basic example of a Lie algebra. If we assume instead that the vector space \(V\) is equipped with a \(Z/2\)-grading, i.e. \(V = V_0 \oplus V_1\) is the direct sum of an \(m\)-dimensional "even" and an \(n\)-dimensional "odd" subspace, and replace commutator with the "supercommutator" (which takes account of parity in the most natural way), we get the general linear Lie superalgebra \(gl_{m|n}\)(C).

The representation theory of the general linear Lie algebra is unbelievably rich and has a long history going back to Schur and Weyl, who computed the characters of the finite dimensional irreducible representations via the theory of symmetric functions. There is also an important family of (mostly infinite dimensional) irreducible highest weight representations for which an explicit character formula was conjectured by Kazhdan and Lusztig in 1979, and dramatically proved by Beilinson-Bernstein and Brylinski-Kashiwara in 1980, thereby giving birth to a subject known as "geometric representation theory."

So what happens for the general linear Lie superalgebra? Even the finite dimensional representations are quite difficult to understand, but now we have a pretty good picture. There is also a version of the Kazhdan-Lusztig conjecture which has just been proved (by Cheng, Lam and Wang). In the talk I'll try to give you the flavor of these results, starting with the base cases \(gl_2\)(C) and \(gl_{1|1}\)(C), which illustrate the general picture perfectly despite being trivial from a combinatorial perspective.

View video of this lecture.
 

February 17, 2012 at 2:30pm
Smith Hall, Room 205
Edward Witten
Institute for Advanced Study
Gauge Theory and Khovanov Homology
After reviewing ordinary finite-dimensional Morse theory, I will explain how Morse generalized Morse theory to loop spaces, and how Floer generalized it to gauge theory on a three-manifold. Then I will describe an analog of Floer cohomology with the gauge group taken to be a complex Lie group (rather than a compact group as assumed by Floer), and how this is expected to be related to the Jones polynomial of knots and Khovanov homology.

View video of this lecture.
 

January 13, 2012 at 2:30pm
Denny Hall, Room 216
Kristin Lauter
Microsoft Research and UW
Elliptic Curve Cryptography and Applications

In the last 25 years, Elliptic Curve Cryptography has become a mainstream primitive for cryptographic protocols and applications. This talk will give a survey of elliptic curve cryptography and its applications, including applications of pairing-based cryptography which are built with elliptic curves. No prior knowledge about elliptic curves is required for this talk. One of the information-theoretic applications I will cover is a solution to prevent pollution attacks in content distribution networks which use network coding to achieve optimal throughput. One solution is based on a pairing-based signature scheme using elliptic curves. I will also discuss some applications to privacy of electronic medical records, and implications for secure and private cloud storage and cloud computing.

View video of this lecture.
 

November 8, 2011 at 2:30pm
Mechanical Engineering Building, Room 238
Greg Galloway
University of Miami
On the Topology of Black Holes
There is a widely held belief in physics that a true astrophysical black hole, formed from the gravitational collapse of some stellar object, can be described by a certain exact solution to the Einstein equations discovered by Kerr in the 60s. This belief is based largely on a powerful theorem which shows that the Kerr solution is the unique solution to the vacuum (source-free) Einstein equations with certain prescribed properties.  A basic step in the proof is Hawking's theorem on the topology of black holes which asserts that, under physically natural conditions, the surface of a black hole (i.e., cross section of the event horizon) must be topologically a 2-sphere.

Developments in string theory over the past ten years have generated considerable interest in gravitation and black holes in higher dimensions. The remarkable discovery of Emparan and Reall of a 4+1 dimensional vacuum black hole solution to the Einstein equations with nonspherical horizon topology raised the question as to what horizon topologies are allowable in higher dimensions. In this talk we review Hawking's  theorem on the topology of black holes in 3+1 dimensions and discuss a generalization of it to higher dimensions obtained in joint work with Rick Schoen. As we shall discuss, this latter result, together with a more recent refinement of it, puts restrictions on the topology of black holes in higher dimensions.

View video of this lecture.
 

October 14, 2011 at 2:30pm
Mechanical Engineering Building, Room 238
Joel Spencer
New York University
Two Needles in Exponential Haystacks
Erdős Magic, aka The Probabilistic Method, is a powerful tool for proving the existence of a combinatorial object, such as a coloring. A probability space is created for which the probability of success is positive. Hence the desired object must exist. But where is it? Here we examine instances in which the probability is exponentially small so that a randomized algorithm would not be in \(P\). Nonetheless, we give two recent startling successes.

Bansal: A quarter century ago this speaker showed that given \(n\) sets on \(n\) vertices there is a two-coloring so that all discrepancies are \(O(\sqrt{n})\). He long conjectured that no polynomial time algorithm could find the coloring. Wrong! Nikhil Bansal, making ingenious use of semidefinite programming, finds the coloring and much more.

Moser: Even longer ago, László Lovász, with the Lovász Local Lemma, showed (roughly!) that when bad events are mostly independent there is a positive probability that the random object has no bad events. Robin Moser gives a simple "fix-it" randomized algorithm to find the object. The proof that the algorithm works, however, is most original. It gives a new and seemingly quite different proof of the Local Lemma itself.

When the probabilistic method sieves an event with exponentially small probability the usual randomized algorithms will not find an actualization. We discuss two recent startling successes: Moser et.al. on the Lovász Local Lemma and Bansal on the speaker's "Six Standard Deviations Suffice."

View video of this lecture.
 


The University of Washington is committed to providing access, equal opportunity and reasonable accommodation in its services, programs, activities, education and employment for individuals with disabilities. To request disability accommodation, contact the Disability Services Office at least ten days in advance at: 206-543-6450/V, 206-543-6452/TTY, 206-685-3885/FAX, or dso@u.washington.edu.
 

HOME   |   DEPARTMENT NEWS   |   PEOPLE   |   EVENTS AND TALKS   |   UNDERGRADUATE PROGRAM   |   GRADUATE PROGRAM
RESEARCH   |   VIGRE   |   K-12   |   GENERAL INFORMATION   |   UNIVERSITY LINKS   |   SEARCH
U of W Website Terms of Conditions and Use   |   U of W Online Privacy Statement
PRINTER FRIENDLY FORMAT
Please send comments, corrections, and suggestions to: webmaster[at]math.washington.edu