トップ   新規 一覧 検索 最終更新   ヘルプ   最終更新のRSS

Hakata Workshop;Winter Meeting 2018 の履歴(No.1)


Hakata Workshop; Winter Meeting 2017

~Discrete Mathematics and its Applications~

 

Our purpose of this meeting is giving an opportunity to make a speech and to communicate with researchers who study various fields not only Combinatorics.

Further information is available from the organizers below.

Organizers

  • Yoshihiro Mizoguchi (Kyushu University),
  • Tetsuji Taniguchi (Hiroshima Institute of Technology),
  • Makoto Tagami (Kyushu Institute of Technology),
  • Hirotake Kurihara (Kitakyushu National College of Technology),
  • Shuya Chiba (Kumamoto University),
  • Tsuyoshi Miezaki (University of the Ryukyus).

Supported by

Date

February 22 and 23, 2018

Location

  • Friday,February 23 Seminar Room Y-2 (2F) in Reference Eki Higashi Building. 1-16-14 Hakata-Eki-Higashi, Hakata-Ku, Fukuoka City, 812-0013 (see http://www.re-rental.com/ , Google maps )

Program

Abstract

Takeshi Hatanaka

  • Title: Passivity-Based Control and Optimization: From Networked Robotics to Multi-agent Optimization
  • Abstract: This talk is intended to review a series of our works related to a notion called passivity. In the former half, we address distributed robot motion coordination.This part start with general results on passivity-based output synchronization.The foundations therein are then shown to play a key role in achieving the objective. The presented control architecture is then extended to a scenario of interactions between the robotic swarm and a human. The subject treated in the latter half is multi-agent optimization, wherein we present a perspective that solution processes for the intended problems are regarded as interconnections of passive systems. We finally exemplify benefits of the present perspective by scenarios of 3D human localization for camera networks and co-optimization of multiple connected buildings.

Akihiro Higashitani

  • Title:Characterization problem on Ehrhart polynomials of lattice polytopes
  • Abstract: One of the most important invariants of a lattice polytope is the Ehrhart polynomial encoding the number of lattice points contained in its integral dilation. In this talk, after surveying the Ehrhart polynomials of lattice polytopes and their fundamental properties, we will focus on the characterization problem on the Ehrhart polynomials and give some recent results.

Hiroshi Tamaru

  • Title:Flat quandles and finite subsets in symmetric spaces
  • Abstract: In this talk, we overview our recent studies on some interplays between quandles and symmetric spaces. By applying an idea of symmetric spaces, we have defined the notion of flat quandles. Furthermore, some finite subsets (subquandles) in symmetric spaces provide interesting examples of flat quandles. These examples enable us to introduce the notion of s-commutative subsets in symmetric spaces, which is a generalization of antipodal sets.

Nishijima

  • Title: TBA
  • Abstract: TBA

Shohei Satake

  • Title:Constructions of -e.c. graphs and tournaments
  • Abstract: The -e.c. property is a typical property of Erd\H{o}s-R\'{e}nyi random graphs (or tournaments). The -e.c. property leads us to a generalization of the Sh\"{u}tte-Erd\H{o}s problem which asks the existence of tournaments such that there is a dominating vertex for all vertices. This property also gives a solution to the problem of full graphs, that is, graphs which contain all ``small’’ graphs. In this talk, we give some constructions of -e.c. graphs and tournaments. Moreover, we also explain applications to other problems.

Takanori Yasuda

  • Title:Cryptography Having a Resistance Against Quantum Computer
  • Abstract: It has been already shown that the current public key system is broken by using property of a quantum computer. A quantum computer having the expected property does not exist yet now, but, it is urgently necessary to develop cryptography having a resistance against quantum computer, post-quantum cryptography. Multivariate public key cryptosystem is one of candidates of post-quantum cryptography. I will explain the principle and applications of this system.