トップ   編集 差分 バックアップ 添付 複製 名前変更 リロード   新規 一覧 単語検索 最終更新   ヘルプ   最終更新のRSS

Hakata Workshop;Summer Meeting 2018 の変更点

Top / Hakata Workshop;Summer Meeting 2018

* Hakata Workshop; Summer Meeting 2018 [#s7c20db8]
''~Discrete Mathematics and its Applications~''

#br
Our purpose of this meeting is giving an opportunity to make a speech and to communicate with researchers who study various fields not only Combinatorics.

Further information is available from the organizers below.

**Organizers [#ud21e362]

-[[Yoshihiro Mizoguchi:http://imi.kyushu-u.ac.jp/~ym/]] (Kyushu University),~
-[[Tetsuji Taniguchi:http://researchmap.jp/tetsuzit-14/]] (Hiroshima Institute of Technology),~
-[[Osamu Shimabukuro:http://research.jimu.nagasaki-u.ac.jp/IST?ISTActId=FINDJPDetail&ISTKidoKbn=&ISTErrorChkKbn=&ISTFormSetKbn=&ISTTokenChkKbn=&userId=100000912]] (Nagasaki University),~
-[[Makoto Tagami:https://sites.google.com/site/tagami77/]] (Kyushu Institute of Technology),
-[[Hirotake Kurihara:https://www.kct.ac.jp/seeds/ippann_rikei/kurihara.html]] (Kitakyushu National College of Technology),~
-[[Shuya Chiba:http://www.srik.kumamoto-u.ac.jp/chiba/chiba00.html]] (Kumamoto University),~
-[[Tsuyoshi Miezaki:https://sites.google.com/site/tmiezakij/]] (University of the Ryukyus),~
-[[Daniel GAINA:http://imi.kyushu-u.ac.jp/~daniel/]] (Kyushu University).

**Supported by [#i9925d50]
-[[Graduate School of Mathematics, Kyushu University:http://www.math.kyushu-u.ac.jp/eng/]]
-JSPS KAKENHI(Grant-in-Aid for Scientific Research (C)) Grant Number 25400217.
-JSPS KAKENHI(Grant-in-Aid for Scientific Research (C)) Grant Number 17K05346

**Date [#h1da2d06]
June 16, 2018

**Location [#g8525f22]
Seminar Room P (4F) in Reference Eki Higashi Building.
1-16-14 Hakata-Eki-Higashi, Hakata-Ku, Fukuoka City, 812-0013
(see http://www.re-rental.com/ , [[Google maps:http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=%E7%A6%8F%E5%B2%A1%E5%B8%82%E5%8D%9A%E5%A4%9A%E5%8C%BA%E5%8D%9A%E5%A4%9A%E9%A7%85%E6%9D%B11%E4%B8%81%E7%9B%AE16-14&aq=&sll=33.590188,130.425417&sspn=0.012888,0.021157&ie=UTF8&hq=&hnear=%E6%97%A5%E6%9C%AC,+%E7%A6%8F%E5%B2%A1%E7%9C%8C%E7%A6%8F%E5%B2%A1%E5%B8%82%E5%8D%9A%E5%A4%9A%E5%8C%BA%E5%8D%9A%E5%A4%9A%E9%A7%85%E6%9D%B1%EF%BC%91%E4%B8%81%E7%9B%AE%EF%BC%91%EF%BC%96%E2%88%92%EF%BC%91%EF%BC%94&ll=33.591064,130.424795&spn=0.012887,0.021157&z=16]] )

**Program [#c1588fb3]
||~Speaker|~Title|
|13:27--13:30|>|Opening (Tetsuji Taniguchi)|
|13:30-14:10| Yota Otachi (TKumamoto University)|[[ Space-efficient algorithms for longest increasing subsequence>#xixkjs6w]]|
|13:30-14:10| Yota Otachi (Kumamoto University)|[[ Space-efficient algorithms for longest increasing subsequence>#xixkjs6w]]|
|14:20-15:00| Yuta Watanabe (National Institute of Technology, Ube college)|[[ Association schemes on the Schubert cells of a Grassmannian>#x9mm8bhp]]|
|15:10-15:50| Hajime Tanaka(Tohoku University)|[[The Terwilliger algebra with respect to an edge of a bipartite 2-homogeneous distance-regular graph >#g4zzad7i]]|
|16:00-16:40| Akihiro Munemasa (Tohoku University)|[[ A graph with smallest eigenvalue -3 related to the shorter Leech lattice >#bipnnfrm]]|
|16:50-17:30| Kenichi Arai(Nagasaki University)|[[ Computer-based Evaluation of Cryptographic Protocol Security>#rh97xtyp]]|
|17:30--17:35|>|Closing(Yoshihiro Mizoguchi)|

**Abstract [#oc1154db]
*** Yota Otachi [#xixkjs6w]
-Title: Space-efficient algorithms for longest increasing subsequence
-Abstract:
Given a sequence of integers, we want to find a longest increasing subsequence of the sequence.
It is known that this problem can be solved in O(n log n) time and space. Our goal in this paper is to reduce the space consumption while keeping the time complexity small. For sqrt(n) <= s <= n, we present algorithms that use O(s log n) bits and O(1/s n^2 log n) time for computing the length of a longest increasing subsequence, and O(1/s n^2 log^2 n) time for finding an actual subsequence.
We also show that the time complexity of our algorithms is optimal up to polylogarithmic factors in the framework of sequential access algorithms with the prescribed amount of space.

*** Yuta Watanabe [#x9mm8bhp]
-Title: Association schemes on the Schubert cells of a Grassmannian
-Abstract:
Let $\mathbb{F}$ be any field.
The Grassmannian $\mathrm{Gr}(m,n)$ is the set of $m$-dimensional
subspaces in $\mathbb{F}^n$, and the general linear group
$\mathrm{GL}_n(\mathbb{F})$ acts transitively on it.
The Schubert cells of $\mathrm{Gr}(m,n)$ are the orbits of the Borel
subgroup $B \subset \mathrm{GL}_n(\mathbb{F})$ on $\mathrm{Gr}(m,n)$.
We consider the association scheme on each Schubert cell defined by the
$B$-action
and show it is symmetric and it is the generalized wreath product of
one-class association schemes, which was introduced by R.~A.~Bailey in
European Journal of Combinatorics 27 (2006) 428--435.

*** Hajime Tanaka [#g4zzad7i]
-Title: The Terwilliger algebra with respect to an edge of a bipartite 2-homogeneous distance-regular graph
-Abstract:
For a bipartite Q-polynomial distance-regular graph, it follows that
the Terwilliger algebra with respect to an edge behaves in a way very
similar to the ordinary Terwilliger algebra with respect to a vertex.
In particular, we show that the structure of the Terwilliger algebra
with respect to an edge of a bipartite 2-homogeneous distance-regular
graph is completely determined from the intersection array.

*** Akihiro Munemasa[#bipnnfrm]
-Title: A graph with smallest eigenvalue -3 related to the shorter Leech lattice
-Abstract:
We demonstrate that there exists a graph with 23 vertices having smallest
eigenvalue greater than -3, such that, when represented by norm 3 vectors
in a 23-dimensional Euclidean space, it generates an integral lattice L
whose dual has minimum norm 3. The lattice L turns out to be a sublattice
of index 2 in the shorter Leech lattice. This phenomenon can be considered
as a norm 3 analogue of the fact that the Dynkin diagram of E_8 
generates a unimodular lattice of minimum norm 2.

*** Kenichi Arai [#rh97xtyp]
-Title: Computer-based Evaluation of Cryptographic Protocol Security
-Abstract:
The complexity of cryptographic protocols has increased in recent years in response to various requirements. This increase in complexity makes the evaluation of cryptographic protocol security difficult and increases the likelihood of human error. For this reason, the problem has arisen that many studies contain evaluation errors. This study focuses on the effectiveness of computer-based evaluation of cryptographic protocol security and aims to realize a method for rigorously conducting such evaluations. In this talk, we will introduce our recent study results.