-
Summer Graduate School Algorithmic Algebra and Geometry
Show Schedules
- Algorithms in Algebra and Geometry, part 3
- Algorithms in Algebra and Geometry, part 4
- Algorithms in Algebra and Geometry, part 5
- Algorithms in Algebra and Geometry, part 6
- Algorithms in Algebra and Geometry, part 7
- Algorithms in Algebra and Geometry, part 8
- Algorithms in Algebra and Geometry, part 9
- Algorithms in Algebra and Geometry, part 10
- Algorithms in Algebra and Geometry, part 11
- Algorithms in Algebra and Geometry, part 12
- Algorithms in Algebra and Geometry, part 13
- Algorithms in Algebra and Geometry, part 14
- Algorithms in Algebra and Geometry, part 15
- Algorithms in Algebra and Geometry, part 16
- Algorithms in Algebra and Geometry, part 17
- Algorithms in Algebra and Geometry, part 18
- Combinatorics and Homology of Graph Properties
- Cutting Corners
- Algorithms in Algebra and Geometry, part 1
- Algorithms in Algebra and Geometry, part 2
-
Workshop Conference in Low-Dimensional Topology - The KirbyFest
Show Schedules
- Contractible open n-manifolds (n>4) are determined by their Z-boundaries
- Vassiliev invariants of knots and links: a survey
- Setting the Stage: Surgery in the Sixties
- The Orbifold Theorem
- Symplectic and Lagrangian surfaces in 4-space
- That marvelous torus
- Some Ideas of Kirby's: in, around, and outside of mathematics
- The stable cohomology of the mapping class group with arbitrary coefficients
- Emerging mathematical ideas in neurosurgery
- Applications of Kirby Calculus
- The knot complement theorem
- Foliated surfaces and algorithms for unknots
- Noncommutative Geometry
- Foliated Teichmuller theory
- Holomorphic bundles over elliptic curves and families of del Pezzo surfaces
- Non-isotopic Heegaard Splittings of nonmimimal genus
- Problem Session
- The Compression Theorem
- Diffeomorphisms of 4-manifolds
- Kirby and the promised land of topological manifolds: memories and memorable arguments
- Some curious symplectic and non-symplectic 4-manifolds
- Combinatorial topology and the continuum model of geometry
- The Geometry of the Seiberg-Witten Invariants
- Remarks on an old friend of Rob's: R4's from then 'til now
- Filtering the knot concordance group by Whitney Towers
- Complexifying Diffeomorpism Groups of a Surface
- Are 3-manifolds transparent? Diamonds, glass and surgery
-
Workshop Model Theory, Algebra and Arithmetic
Show Schedules
- Logarithmic-exponential series: model theoretic aspects
- Expansions of algebraically closed field in o-minimal structures
- Points of small height on curves of genus g>1
- Elementary equivalence and Isomorphism
- Effective bounds and the isotrivial case of Mordell-Lang
- Elimination of imaginaries in algebraically closed valued fields
- On the rationality of zeta functions
- Bounds in Cohomology
- Complexity of Computations with Pfaffian and Noetherian Functions
- Recent developments in the relation between diophantine problems and Nevanlinna theory
- An Arithmetic Analogue of Differential Algebraic Geometry
- Diophantine Consequences of Dichotomy Theorems in Differential and Difference Fields
- Elementary theory of free groups I
- Elementary theory of free groups II
- The pfaffian closure of an o-minimal structure
- Fields with pseudo-exponentiation
- Groups in Simple Theories
- Primes and their residue fields in weak systems of arithmetic
- On the integrally closed subrings of the field of algebraic numbers
- Around the first order theory of Frobenius
-
Workshop Understanding the Genome: Technological and Mathematical Challenges
Show Schedules
- Of Genes and Genomes
- Comparative Genomics: What, Why, Problems and Challenges
- Genome Sequence Assembly
- Using Hidden Markov Models for Biosequence Analysis: Recent Tests and New Methods
- Future Mathematical Challenges Posed by the Systems Analysis of Genomes and Proteomes
- Genes, Chips, and Genomes
- Gene Hunting Without Genomic Sequencing: the Twenty Questions Game with Genes
- Statistical aspects of gene mapping
- Mining Gene Expression Data
- Uncovering Regulatory Networks Using Pattern Recognition Algorithms
- Statistical and Computational Contributions to Gene Mapping: History and Current Developments
-
Workshop Workshop on Homotopy theory for algebraic varieties with applications to K-theory and quadratic forms
Show Schedules
- Algebraic and topological K-theory
- The Steenrod Algebra
- Basic facts and problems in the homotopy theory of algebraic varieties
- Grothendieck-Witt rings of quadratic forms in the homotopy theory of algebraic varieties
- On multiplicative functions and characteristic numbers
- Bloch-Lichtenbaum spectral sequence
- Introduction to homotopy theory I
- Introduction to homotopy theory II
- Degree formula
-
Workshop Symposium in Geometry: a conference in honor of S. S. Chern
Show Schedules
- Configuration space invariants of knots and 3-manifolds
- Finsler manifolds of constant flag curvature
- Extremal metrics in Riemann Surfaces and the Uniformization Theorem
- Projective Geometry
- Neo-modern Hodge theory
- Why do I like Chern classes?
- Algebraic cycles and the classical groups
- Mirror Principle
- Duistermaat-Heckman formulas for group valued moment maps and moduli spaces of flat connections
- Introductory remarks
- Backlund transformations and loop ground actions
- From Riemann geometry to Poisson geometry and back again
-
Workshop Introductory Workshop on Model Theory of Fields
Show Schedules
- Geometry, part 1
- Geometry, part 2
- Model Theory of Fields
- Dimension Theory, part 1.
- Dimension Theory, part 2
- Dimension Theory, part 3
- Recent Developments, part 1
- Recent Developments, part 2
- Recent Developments, part 3
- Basic Model Theory, part 1
- Basic Model Theory, part 2
- Basic Model Theory, part 3
- Model Theory of Differential Fields
- Model Theory of Fields, part 1
- Model Theory of Fields, part 2
- Model Theory of Fields, part 3
-
Workshop Cryptography and Mathematics
Show Schedules
- A problem in computational group theory and its application to structured hashing
- Overview of elliptic curve cryptography
- Cryptographic policy
- A whirlwind tour of cryptography
- Using formal languages to analyse exponentiation algorithms
- Commercial applications of cryptography
- Cryptanalysis and design of message authentication codes
- On the derivability of collision-intractable hash functions