## Organisers:

## Time:

## Venue:

## Webpage:

Abstract: Let A be an $n \times n$ boolean matrix, i.e., its entries come from the set $\{0,1\}$. Let $r_i$ denote the number of 1's in the row $i$.

Speaker:

Sagnik Mukhopadhyay, TIFR

Friday, 22 February 2013, 14:30 to 16:00

Abstract: Let A be an $n \times n$ boolean matrix, i.e., its entries come from the set $\{0,1\}$. Let $r_i$ denote the number of 1's in the row $i$.

Speaker:

Rakesh Venkat, TIFR

Friday, 15 February 2013, 14:30 to 16:00

How does one partition the vertex set of a graph into two parts $(S,S^C)$, so that the ratio of edges going across to the Volume (number of edges incident on vertices in S) in the vertex set is as small as possible?

S.P. Mudur

Friday, 15 February 2013, 11:30 to 12:30

Web Usage Mining is the application of data mining techniques for discovery and analysis of user access patterns from the interaction generated by the users in the form of access logs, proxy-server logs, browser logs, etc.

Speaker:

Naqueeb Ahmad Warsi, TIFR

Friday, 8 February 2013, 14:30 to 16:00

In information theory rate distortion addresses the problem of determining the minimal number of bits per symbol, as measured by the rate $R$, that should be communicated over a channel, so that the source (input signal) can be approximately recon

Chien-Chung Huang

Friday, 1 February 2013, 14:30 to 16:00

In an atomic splittable routing game, each player controls a non-negligible, splittable flow in a network. Each edge has a delay that is a function of the total flow on the edge.

Speaker:

Gugan Thoppe, TIFR

Friday, 11 January 2013, 15:00 to 16:30

The method of variation of parameters, credited to J.L. Lagrange, expresses each solution of the perturbed system of differential equations, $x' = A(t)x + f(t)$, in terms of the solution of the associated homogeneous system, $y' = A(t)y$.

Sachin Chaudhari

Friday, 11 January 2013, 11:00 to 12:00

Inefficient use of radio spectrum is becoming a serious problem as more and more wireless systems are being developed to operate in crowded spectrum bands.

Sanjit A. Seshia

Wednesday, 9 January 2013, 16:00 to 17:00

Human interaction is central to many computing systems that require a high level of assurance. We term such systems as "high-confidence interactive systems".

Venkat Ananatharam

Tuesday, 8 January 2013, 14:30 to 15:30

Networks are largely viewed as a medium for communication from transmitters to receivers. More generally a network can be used as a medium to enable coordinated action between the entities represented by its nodes.

Deepak Kapur

Tuesday, 8 January 2013, 11:00 to 12:00

Loop invariants play a central role in ensuring the reliability of software.