|
-
ADVANCE PROGRAM
-
- JUNE 5
-
10:00 AM - 11:00 AM Inauguration - Prof. S. S. Prabhu
11:00 AM - 11:15 AM
Tea
11:15 AM - 11:45 AM
Prof. S.D. Adhikari
"Early Ramsey-type Theorems in Combinatorial Theory"
11:45 AM - 12:15 PM
Prof. Muralidhara
"Importance and Applications of Number Theory"
12:15 PM - 12:45 PM
Prof. G. S. Raghavan
"Expanders and Ramanujan Graphs"
12:45 PM - 2:00 PM
Lunch
2:00 PM - 2:30 PM
Prof. Vijay Chandru, Strand Genomics
"Computational Biology & Vice Versa"2:30 PM - 3:15 PM
Dr. Shanmukh Yatragadda, Strand Genomics
"Algorithms in Next Generation Sequencing"
3:15 PM - 3:30 PM
Tea
3:30 PM - 4:30 PM
Dr. Vamsi Veeramachaneni, Strand Genomics
"Knowledge representation and similarity searching using ontologies"4:30 PM - 5:00 PM
Break
5:00 PM - 7:00 PM
Networking Sessions
7:00 PM - 8:00 PM
Prof. George Andrews
8:00 PM - 9:30 PM
Dinner
-
JUNE 6
10:00 AM- 11:00 AM |
Prof.
B. Ramakrishna "Convolution sums of the divisor functions and an application." Abstract: In this talk, we present our recent work (a joint work with Brundaban Sahu) on the evaluation of convolution sums of the divisor functions. As an application, we find formulas for the number of representations of an integer by certain quadratic forms. |
11:00 AM - 11:15 AM |
Tea |
11:15 AM - 12:15 PM |
Prof. S.D.
Adhikari "A problem regarding visibility of integer lattice points and related questions." |
12:15 PM - 12:45 PM |
PhD
Student: Abhilasha Aswal |
12:45 PM - 2:00 PM |
Lunch |
2:00 PM - 3:30 PM |
Prof. R. Balasubramanian |
3:30 PM - 3:45 PM |
Tea |
3:45 PM - 4:30 PM | Prof. G. N. Srinivasa Prasanna, IIITB |
5:00 PM - 6:30 PM |
Music
Programme "Carnatic Vocal recital by Ms.Amrutha Venkatesh accompanied by Sri B.K.Raghu on the Violin and Sri B.C.Manjunath on the Mrudangam." |
7:00 PM |
Banquet |
JUNE 7
10:00 AM - 11:00 AM |
Prof. Kalyan Chakraborty "Preventing unknown key-share attack using cryptographic bilinear maps." Abstract: We consider a couple of well-known two-pass protocols and show that these protocols are not unknown key-share attack resilient. Finally we describe a couple of three-pass protocols derived from the above protocols by adding an extra pass which provides additional key confirmation and prevents unknown key share attack. |
11:00 AM - 11:15 AM |
Tea |
11:15 AM - 12:15 PM |
Prof. C. S. Yogananda "Srinivasa Ramanujan and the Fermat's Last Theorem." |
12:15 PM - 12:45 PM |
PhD Students |
12:45 PM - 2:00 PM |
Lunch |