## Organisers:

## Time:

## Venue:

## Webpage:

Let us consider a natural generalization of the Partial Vertex Cover problem. Here, an instance consists of a graph $G = (V,E)$, a cost function $c : V -> Z^{+}$, a partition $P_{1}, . . .

Speaker:

Pritam Bhattacharya, TIFR

Friday, 1 March 2013, 14:30 to 16:00

Let us consider a natural generalization of the Partial Vertex Cover problem. Here, an instance consists of a graph $G = (V,E)$, a cost function $c : V -> Z^{+}$, a partition $P_{1}, . . .

Xavier Viennot

Wednesday, 27 February 2013, 16:00 to 17:00

Computer scientists defined the Strahler number of a binary tree in relation with the minimum number of registers needed for the computation of an arithmetical expression.

Xavier Viennot

Tuesday, 26 February 2013, 16:00 to 17:00

The following is reproduced from Doron Zeilberger's page:

http://www.math.rutgers.edu/~zeilberg/mamarim/mamarimhtml/bordelaise.html.

Milind Sohoni

Tuesday, 26 February 2013, 14:30 to 15:30

Markets are of course, one of the oldest mechanism of exchanging commodities and cultural artifacts. While their history is over 5000 years old, their mathematical theory is rather recent. The first such models were by Fisher and Walras.

Speaker:

Sagnik Mukhopadhyay, TIFR

Friday, 22 February 2013, 14:30 to 16:00

Abstract: Let A be an $n \times n$ boolean matrix, i.e., its entries come from the set $\{0,1\}$. Let $r_i$ denote the number of 1's in the row $i$.

Speaker:

Rakesh Venkat, TIFR

Friday, 15 February 2013, 14:30 to 16:00

How does one partition the vertex set of a graph into two parts $(S,S^C)$, so that the ratio of edges going across to the Volume (number of edges incident on vertices in S) in the vertex set is as small as possible?

S.P. Mudur

Friday, 15 February 2013, 11:30 to 12:30

Web Usage Mining is the application of data mining techniques for discovery and analysis of user access patterns from the interaction generated by the users in the form of access logs, proxy-server logs, browser logs, etc.

Speaker:

Naqueeb Ahmad Warsi, TIFR

Friday, 8 February 2013, 14:30 to 16:00

In information theory rate distortion addresses the problem of determining the minimal number of bits per symbol, as measured by the rate $R$, that should be communicated over a channel, so that the source (input signal) can be approximately recon

Chien-Chung Huang

Friday, 1 February 2013, 14:30 to 16:00

In an atomic splittable routing game, each player controls a non-negligible, splittable flow in a network. Each edge has a delay that is a function of the total flow on the edge.

Speaker:

Gugan Thoppe, TIFR

Friday, 11 January 2013, 15:00 to 16:30

The method of variation of parameters, credited to J.L. Lagrange, expresses each solution of the perturbed system of differential equations, $x' = A(t)x + f(t)$, in terms of the solution of the associated homogeneous system, $y' = A(t)y$.