Some Recent Advances on Compressed Sensing and Matrix Completion
Event Topic: Computational Mathematics & Statistics
Event Topic: Computational Mathematics & Statistics
Description Abstract In order to protect data in cloud computing environments, users must use diverse access control solutions available for each cloud service provider (CSP). Consequently, access...
SpeakerVijay G. SubramanianNorthwestern Universityhttp://users.eecs.northwestern.edu/~vjsubram/Site/Welcome.html Description Network games provide a basic framework for studying the diffusion of new...
Description Abstract Today's quality of life greatly depends on many large and complex communication networks, such as the Internet, cellular networks, and the communication infrastructure of national...
Description Attacker defender games are (two-player) games played on graphs. The player strategies are subsets of the edges or vertices of the graph (for example the defender sends message(s) through...
Event Topic: Computational Mathematics & Statistics
SpeakerIan SloanUniversity of New South Waleshttp://web.maths.unsw.edu.au/~sloan/ Description Richard Bellman coined the phrase “the curse of dimensionality” to describe the extraordinarily rapid...
Description Abstract The problem of big data has become increasingly importance in recent years. On the one hand, the big data is an asset that potentially can offer tremendous value or reward to the...
Description Abstract Cloud computing provides on demand remote storage and computation resources at a cost that depends only on the usage rate. However, the loss of the physical control over data and...
Description In Coding Theory, the maximum size of binary codes of length n with minimum distance d is a well studied problem. In this talk, we study binary codes when there is a restriction on maximum...