Previous Conferences & Workshops
Tudor Dimofte
I'll give an introduction to some of the new relations between
geometry and physics that have arisen in recent years by
considering compactifications of "The 6-dimensional (2,0) theory"
-- with ties to (and among) instanton counting, Hitchin
moduli...
Univalent Foundations: New Foundations of Mathematics
In Voevodsky’s experience, the work of a mathematician is 5%
creative insight and 95% self-verification. Moreover, the more
original the insight, the more one has to pay for it later in
self-verification work. The Univalent Foundationsa project...
Anomalous shock fluctuations in TASEP and last passage percolation models
Patrik Ferrari
We consider the totally asymmetric simple exclusion process with
initial conditions and/or jump rates such that shocks are
generated. If the initial condition is deterministic, then the
shock at time t will have a width of order \(t^{1/3}\). We...
Some results on history dependent stochastic processes
Edge reinforced random walk (ERRW) and vertex reinforced jump
processes are history dependent stochastic process, where the
particle tends to come back more often on sites it has already
visited in the past. For a particular scheme of
reinforcement...
Tudor Dimofte and Christopher Brav
The Goncharov reading group is an informal seminar which will
read the paper "Volumes of hyperbolic manifolds and mixed Tate
motives" and related materials. We will meet on Wednesdays at 10 am
in Simonyi 114.
From classical to quantum integrability, and back
Hirota relations in their various incarnations play an important
role in both classical and quantum integrable systems, from matrix
integrals and PDE's to one-dimensional quantum spin chains and two
dimensional quantum field theories (QFT). The...
Eisenstein series of weight 1
3:30pm|Fine 1201, Princeton University
Let \(N \geq 3\). In this talk, I will sketch a proof that the
ring generated by Eisenstein series of weight \(1\) on the
principal congruence subgroup \(\Gamma(N)\) contains all modular
forms in weights \(2\) and above. This means that the only...
Circular Encryption in Formal and Computational Cryptography
The goal of computationally sound symbolic security is to create
formal systems of cryptography which have a sound interpretation
with respect to complexity-based notions of security. While there
has been much progress in the development of such...
Gambling, Computational Information, and Encryption Security
We revisit the question, originally posed by Yao (1982), of
whether encryption security may be characterized using
computational information. Yao provided an affirmative answer,
using a compression-based notion of computational information to
give a...
BCFG Drinfeld-Sokolov hierarchies and ADE LG-model with symmetry
Yongbin Ruan
1:30pm|Fine 224, Princeton University
More than twenty years ago, Witten proposed a remarkable
conjecture connecting the geometry of moduli space of curve or
Gromov-Witten theory of point to KdV integrable hierarchies (solved
by Kontsevich). Since then, Witten's conjecture opened up a...