• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19890
  • 3293
  • 3267
  • 2702
  • 1114
  • 962
  • 889
  • 889
  • 889
  • 889
  • 889
  • 885
  • 558
  • 400
  • 397
  • Tagged with
  • 43461
  • 5472
  • 4888
  • 4581
  • 4033
  • 3785
  • 3726
  • 3128
  • 2880
  • 2685
  • 2379
  • 2349
  • 2237
  • 2233
  • 2157
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
461

Super symmetric vertex algebras and supercurves

Heluani, Reimundo January 2006 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2006. / Includes bibliographical references (p. 149-151). / We define and study the structure of SUSY Lie conformal and vertex algebras. This leads to effective rules for computations with superfields. Given a strongly conformal SUSY vertex algebra V and a supercurve X, we construct a vector bundle [ ... ] on X, the fiber of which, is isomorphic to V. Moreover, the state-field correspondence of V canonically gives rise to (local) sections of these vector bundles. We also define chiral algebras on any supercurve X, and show that the vector bundle [ ... ] corresponding to a SUSY vertex algebra, carries the structure of a chiral algebra. / by Reimundo Heluani. / Ph.D.
462

Pure bending of thin shells of revolution: a nonlinear dislocation problem.

Smith, William Allan January 1966 (has links)
Massachusetts Institute of Technology. Dept. of Mathematics. Thesis. 1966. Ph.D. / Bibliography: leaves 83-85. / Ph.D.
463

Algebraic and combinatorial properties of minimal border strip tableaux

Clifford, Peter, 1975- January 2003 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2003. / Includes bibliographical references (p. 59-60). / Motivated by results and conjectures of Stanley concerning minimal border strip tableaux of partitions, we present three results. First we generalize the rank of a partition [lambda] to the rank of a shifted partition S([lambda]).We show that the number of bars required in a minimal bar tableau of S([lambda]) is max(o, e + (ℓ([lambda]) mod 2)), where o and e are the number of odd and even rows of [lambda]. As a consequence we show that the irreducible negative characters of [tilde]S[sub]n vanish on certain conjugacy classes. Another corollary is a lower bound on the degree of the terms in the expansion of Schur's Q[sub][lambda] symmetric functions in terms of the power sum symmetric functions. The second result gives a basis for the space spanned by the lowest degree terms in the expansion of the Schur symmetric functions in terms of the power sum symmetric functions. These lowest degree terms studied by Stanley correspond to minimal border strip tableaux of [lambda]. The Hilbert series of these spaces is the generating function giving the number of partitions of n into parts differing by at least 2. Applying the Rogers-Ramanujan identity, the generating function also counts the number of partitions of n into parts 5k + 1 and 5k - 1. Finally for each [lambda] we give a relation between the power sum symmetric functions and the monomial symmetric functions; the terms are indexed by the types of minimal border strip tableaux of [lambda]. / by Peter Clifford. / Ph.D.
464

A minimal reduction class for the Entscheidungsproblem

Kahr, Andrew Seth January 1962 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1962. / Vita. / Includes bibliographical references (leaf 31). / by Andrew Seth Kahr. / Ph.D.
465

On contact homology of the unit cotangent bundle of a Riemann surface with genus greater than one

Luo, Wei, 1975- January 2003 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2003. / Includes bibliographical references (p. 80). / In this thesis, I study pseudo-holomorphic curves in symplectisation of the unit cotangent bundle of a Riemann surface of genus greater than 1. The contact form and compatible almost complex structure are both constructed from a metric on the Riemann surface whose curvature is constant -1. I related the pseudo-holomorphic curve equation to harmonic map equations and a Cauchy-Riemann type equation perturbed with quadratic terms for functions on a punctured Riemann sphere. Then I prove a Theorem that gives one to one correspondence between solutions to the perturbed Cauchy-Riemann equation and finite energy pseudo-holomorphic curves. / by Wei Luo. / Ph.D.
466

Towards characterizing morphims between high dimensional hypersurfaces

Sheppard, David C. (David Christopher), 1977- January 2003 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2003. / Includes bibliographical references (p. 44). / This thesis is organized into two papers. All results are proven over an algebraically closed field of characteristic zero. Paper 1 concerns morphisms between hypersurfaces in Pn, n =/> 4. We show that if the two hypersurfaces involved in the morphism are of general type, then the morphism of hypersurfaces extends to an everywhere-defined endomorphism of Pn. A corollary is that if X [right arrow] Y is a nonconstant morphism of hypersurfaces of large dimension and large degree, then deg Y divides deg X. The main tool used to analyze morphism between hypersurfaces is an inequality of Chern classes analogous to the Hurwitz-inequality. Paper 2 is a long example. We check that every morphism from a quintic hypersurface in I4 to a nonsingular cubic hypersurface in P4 is constant. In the process, we classify morphisms froin the projective plane to nonsingular cubic threefolds. / by David C. Sheppard. / Ph.D.
467

Matrix estimation with latent permutations

Mao, Cheng, Ph. D. Massachusetts Institute of Technology January 2018 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2018. / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 151-167). / Motivated by various applications such as seriation, network alignment and ranking from pairwise comparisons, we study the problem of estimating a structured matrix with rows and columns shuffled by latent permutations, given noisy and incomplete observations of its entries. This problem is at the intersection of shape constrained estimation which has a long history in statistics, and latent permutation learning which has driven a recent surge of interest in the machine learning community. Shape constraints on matrices, such as monotonicity and smoothness, are generally more robust than parametric assumptions, and often allow for adaptive and efficient estimation in high dimensions. On the other hand, latent permutations underlie many graph matching and assignment problems that are computationally intractable in the worst-case and not yet well-understood in the average-case. Therefore, it is of significant interest to both develop statistical approaches and design efficient algorithms for problems where shape constraints meet latent permutations. In this work, we consider three specific models: the statistical seriation model, the noisy sorting model and the strong stochastic transitivity model. First, statistical seriation consists in permuting the rows of a noisy matrix in such a way that all its columns are approximately monotone, or more generally, unimodal. We study both global and adaptive rates of estimation for this model, and introduce an efficient algorithm for the monotone case. Next, we move on to ranking from pairwise comparisons, and consider the noisy sorting model. We establish the minimax rates of estimation for noisy sorting, and propose a near-linear time multistage algorithm that achieves a near-optimal rate. Finally, we study the strong stochastic transitivity model that significantly generalizes the noisy sorting model for estimation from pairwise comparisons. Our efficient algorithm achieves the rate (n- 3 /4 ), narrowing a gap between the statistically optimal rate Õ(n-1 ) and the state-of-the-art computationally efficient rate [Theta] (n- 1/ 2 ). In addition, we consider the scenario where a fixed subset of pairwise comparisons is given. A dichotomy exists between the worst-case design, where consistent estimation is often impossible, and an average-case design, where we show that the optimal rate of estimation depends on the degree sequence of the comparison topology. / by Cheng Mao. / Ph. D.
468

Weakly nonlinear surface waves in a ferrofluid

Engel, Mark, 1962- January 1991 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1991. / Includes bibliographical references (leaves 82-86). / by Mark Engel. / Ph.D.
469

Studies in program obfuscation

Varia, Mayank (Mayank Harshad) January 2010 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. / This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. / Cataloged from student submitted PDF version of thesis. / Includes bibliographical references (p. 159-164). / Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while maintaining its functionality. Commercial products exist to perform this procedure, but they do not provide a rigorous security guarantee. Over the past decade, program obfuscation has been studied by the theoretical cryptography community, where rigorous definitions of security have been proposed and obfuscators have been constructed for some families of programs. This thesis presents three contributions based on the virtual black-box security definition of Barak et al [10]. First, we show tight connections between obfuscation and symmetric-key encryption. Specifically, obfuscation can be used to construct an encryption scheme with strong leakage resilience and key-dependent message security. The converse is also true, and these connections scale with the level of security desired. As a result, the known constructions and impossibility results for each primitive carry over to the other. Second, we present two new security definitions that augment the virtual black-box property to incorporate non-malleability. The virtual black-box definition does not prevent an adversary from modifying an obfuscated program intelligently. By contrast, our new definitions provide software with the same security guarantees as tamper-proof and tamper-evident hardware, respectively. The first definition prohibits tampering, and the second definition requires that tampering is detectable after the fact. We construct non-malleable obfuscators of both favors for some program families of interest. Third, we present an obfuscator for programs that test for membership in a hyperplane. This generalizes prior works that obfuscate equality testing. We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption that holds in the generic group model. Additionally, we show a cryptographic application of the new obfuscator to leak-ageresilient one-time digital signatures. The thesis also includes a survey of the prior results in the field. / by Mayank Varia. / Ph.D.
470

The blowup formula for higher rank Donaldson invariants

Culler, Lucas Howard January 2014 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2014. / 16 / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 73-74). / In this thesis, I study the relationship between the higher rank Donaldson invariants of a smooth 4-manifold X and the invariants of its blowup X#CP2 . This relationship can be expressed in terms of a formal power series in several variables, called the blowup function. I compute the restriction of the blowup function to one of its variables, by solving a special system of ordinary differential equations. I also compute the SU(3) blowup function completely, and show that it is a theta function on a family of genus 2 hyperelliptic Jacobians. Finally, I give a formal argument to explain the appearance of Abelian varieties and theta functions in four dimensional topological field theories. / by Lucas Howard Culler. / Ph. D.

Page generated in 0.0748 seconds