Hamilton Institute offentlig
[search 0]
Flere
Download appen!
show episodes
 
The Hamilton Institute is a multi-disciplinary research centre established at the National University of Ireland, Maynooth in November 2001. The Institute seeks to provide a bridge between mathematics and its applications in ICT and biology. In this podcast feed, we make accessible some of the best seminars held by members of the Hamilton Institute, visitors or guest speakers. Futhermore, it will also contain the lectures give as part of the 'Network Mathematics Graduate Programme'.
  continue reading
 
The Hamilton Institute is a multi-disciplinary research centre established at the National University of Ireland, Maynooth in November 2001. The Institute seeks to provide a bridge between mathematics and its applications in ICT and biology. In this podcast feed, we make accessible some of the best seminars held by members of the Hamilton Institute, visitors or guest speakers. Futhermore, it will also contain the lectures give as part of the 'Network Mathematics Graduate Programme'. The vide ...
  continue reading
 
Loading …
show series
 
Speaker:Prof. L. RizzoAbstract:In this talk I will give a survey of solutions and tools that we have developed in recent years to achieve extremely high packet processing rates in commodity operating systems, running on bare metal and on virtual machines. Our NETMAP framework supports processing of minimum size frames from user space at 10 Gbits pe…
  continue reading
 
Speaker:Prof. L. RizzoAbstract:In this talk I will give a survey of solutions and tools that we have developed in recent years to achieve extremely high packet processing rates in commodity operating systems, running on bare metal and on virtual machines. Our NETMAP framework supports processing of minimum size frames from user space at 10 Gbits pe…
  continue reading
 
Speaker:C. LanciaAbstract:Consider the arrival process defined by t_i=i + \xi_i, where \xi_i are i.i.d random variables. First introduced in the 50's, this arrival process is of remarkable importance in Air Traffic Flow Management and other transportation systems, where scheduled arrivals are intrinsically subject to random variations; other framew…
  continue reading
 
Speaker:C. LanciaAbstract:Consider the arrival process defined by t_i=i + \xi_i, where \xi_i are i.i.d random variables. First introduced in the 50's, this arrival process is of remarkable importance in Air Traffic Flow Management and other transportation systems, where scheduled arrivals are intrinsically subject to random variations; other framew…
  continue reading
 
Speaker:Dr. M. DohlerAbstract:The unprecedented communication paradigm of machine-to-machine (M2M), facilitating 24/7 ultra-reliable connectivity between a prior unseen number of automated devices, is currently gripping both industrial as well as academic communities. Whilst applications are diverse, the in-home market is of particular interest sin…
  continue reading
 
Speaker:Dr. M. DohlerAbstract:The unprecedented communication paradigm of machine-to-machine (M2M), facilitating 24/7 ultra-reliable connectivity between a prior unseen number of automated devices, is currently gripping both industrial as well as academic communities. Whilst applications are diverse, the in-home market is of particular interest sin…
  continue reading
 
Speaker:Prof. R. VinterAbstract:Estimates on the distance of a nominal state trajectory from the set of state trajectories that are confined to a closed set have an important unifying role in optimal control theory. They can be used to establish non-degeneracy of optimality conditions such as the Pontryagin Maximum Principle, to show that the value…
  continue reading
 
Speaker:Prof. R. VinterAbstract:Estimates on the distance of a nominal state trajectory from the set of state trajectories that are confined to a closed set have an important unifying role in optimal control theory. They can be used to establish non-degeneracy of optimality conditions such as the Pontryagin Maximum Principle, to show that the value…
  continue reading
 
Speaker:Prof. L. TassiulasAbstract:Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In a…
  continue reading
 
Speaker:Prof. L. TassiulasAbstract:Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In a…
  continue reading
 
Speaker:Prof. P. van den DriesscheAbstract:The World Health Organization estimates that there are 3 to 5 million cholera cases per year with 100 thousand deaths spread over 40 to 50 countries. For example, there has been a recent cholera outbreak in Haiti. Cholera is a bacterial disease caused by the bacterium Vibrio cholerae, which can be transmit…
  continue reading
 
Speaker:Prof. P. van den DriesscheAbstract:The World Health Organization estimates that there are 3 to 5 million cholera cases per year with 100 thousand deaths spread over 40 to 50 countries. For example, there has been a recent cholera outbreak in Haiti. Cholera is a bacterial disease caused by the bacterium Vibrio cholerae, which can be transmit…
  continue reading
 
Speaker:Prof. A. BanchsAbstract:Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in c…
  continue reading
 
Speaker:Prof. A. BanchsAbstract:Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in c…
  continue reading
 
Speaker:Dr. M. FioreAbstract:Vehicular networks are large scale communication systems that exploit wireless technologies to interconnect moving cars. Vehicular networks are envisioned to provide drivers with real time information on potential dangers, on road traffic conditions, and on travel times, thus improving road safety and traffic efficiency…
  continue reading
 
Speaker:Dr. M. FioreAbstract:Vehicular networks are large scale communication systems that exploit wireless technologies to interconnect moving cars. Vehicular networks are envisioned to provide drivers with real time information on potential dangers, on road traffic conditions, and on travel times, thus improving road safety and traffic efficiency…
  continue reading
 
Speaker:Dr. T. WeberAbstract:Inter-cellular variability in the duration of the cell cycle is a well documented phenomena which has been integrated into mathematical models of cell proliferation since the 70’s. Here I present a minimalist stochastic cell cycle model that allows for inter-cellular variability at the level of each single phase, i.e. G…
  continue reading
 
Speaker:Dr. T. WeberAbstract:Inter-cellular variability in the duration of the cell cycle is a well documented phenomena which has been integrated into mathematical models of cell proliferation since the 70’s. Here I present a minimalist stochastic cell cycle model that allows for inter-cellular variability at the level of each single phase, i.e. G…
  continue reading
 
Speaker:Prof. B. HanzonAbstract:Exponential Polynomial Trigonometric (EPT) functions are being considered as probability density functions. A specific matrix-vector representation is proposed for doing calculations with these functions. We investigate when these functions are non-negative and under which conditions the density functions are infinit…
  continue reading
 
Speaker:Prof. B. HanzonAbstract:Exponential Polynomial Trigonometric (EPT) functions are being considered as probability density functions. A specific matrix-vector representation is proposed for doing calculations with these functions. We investigate when these functions are non-negative and under which conditions the density functions are infinit…
  continue reading
 
Speaker:Dr. F. GringoliAbstract:Experimenting in the field is a key activity for the evolution of the modern Internet: this is especially true for radio access protocols like IEEE 802.11 that are usually affected by unpredictable issues due to noise, competing stations and interference. Here we introduce OpenFWWF, an opensource firmware that implem…
  continue reading
 
Speaker:Dr. F. GringoliAbstract:Experimenting in the field is a key activity for the evolution of the modern Internet: this is especially true for radio access protocols like IEEE 802.11 that are usually affected by unpredictable issues due to noise, competing stations and interference. Here we introduce OpenFWWF, an opensource firmware that implem…
  continue reading
 
Speaker:Dr. M. A. ChaudryAbstract:Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networ…
  continue reading
 
Speaker:Dr. M. A. ChaudryAbstract:Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networ…
  continue reading
 
Speaker:Dr. B. Radunovi?Abstract:Consider a distributed system that consists of a coordinator node connected to multiple sites. Items from a data stream arrive to the system one by one, and are arbitrarily distributed to different sites. The goal of the system is to continuously track a function of the items received so far within a prescribed rela…
  continue reading
 
Speaker:Dr. B. Radunovi?Abstract:Consider a distributed system that consists of a coordinator node connected to multiple sites. Items from a data stream arrive to the system one by one, and are arbitrarily distributed to different sites. The goal of the system is to continuously track a function of the items received so far within a prescribed rela…
  continue reading
 
Speaker:Dr. C. CanoAbstract:Wireless Sensor Networks (WSNs) are networks formed by highly constrained devices that communicate measured environmental data using low-power wireless transmissions. The increase of spectrum utilization in non-licensed bands along with the reduced power used by these nodes is expected to cause high interference problems…
  continue reading
 
Speaker:Dr. C. CanoAbstract:Wireless Sensor Networks (WSNs) are networks formed by highly constrained devices that communicate measured environmental data using low-power wireless transmissions. The increase of spectrum utilization in non-licensed bands along with the reduced power used by these nodes is expected to cause high interference problems…
  continue reading
 
Speaker:S. HanAbstract:A cyber-physical system (CPS) is a system featuring a tight combination of, and coordination between, the system's computational and physical elements. A large-scale CPS usually consists of several subsystems which are formed by networked sensors and actuators, and deployed in different locations. These subsystems interact wi…
  continue reading
 
Speaker:S. HanAbstract:A cyber-physical system (CPS) is a system featuring a tight combination of, and coordination between, the system's computational and physical elements. A large-scale CPS usually consists of several subsystems which are formed by networked sensors and actuators, and deployed in different locations. These subsystems interact wi…
  continue reading
 
Speaker:C. LanciaAbstract:The cutoff phenomenon is the abrupt convergence to stationarity of a Markov chain. It is characterized by a narrow window centered around a cutoff-time in which the distance from stationarity suddenly drops from 1 to 0. All the examples in which cutoff was detected clearly indicate that a drift towards the opportune quanti…
  continue reading
 
Speaker:C. LanciaAbstract:The cutoff phenomenon is the abrupt convergence to stationarity of a Markov chain. It is characterized by a narrow window centered around a cutoff-time in which the distance from stationarity suddenly drops from 1 to 0. All the examples in which cutoff was detected clearly indicate that a drift towards the opportune quanti…
  continue reading
 
Speaker:Prof. P. ThiranAbstract:An increasingly larger number of applications require networks to perform decentralized computations over distributed data. A representative problem of these “in-network processing” tasks is the distributed computation of the average of values present at nodes of a network, known as gossip algorithms. They have recei…
  continue reading
 
Speaker:Prof. P. ThiranAbstract:An increasingly larger number of applications require networks to perform decentralized computations over distributed data. A representative problem of these “in-network processing” tasks is the distributed computation of the average of values present at nodes of a network, known as gossip algorithms. They have recei…
  continue reading
 
Speaker:Prof. J. J. HunterAbstract:In a finite m-state irreducible Markov chain with stationary probabilities {\pi_i} and mean first passage times m_{ij} (mean recurrence time when i=j) it was first shown, by Kemeny and Snell, that \sum_{j=1}^{m}\pi_jm_{ij} is a constant, K, not depending on i. This constant has since become known as Kemeny’s const…
  continue reading
 
Speaker:Prof. J. J. HunterAbstract:In a finite m-state irreducible Markov chain with stationary probabilities {\pi_i} and mean first passage times m_{ij} (mean recurrence time when i=j) it was first shown, by Kemeny and Snell, that \sum_{j=1}^{m}\pi_jm_{ij} is a constant, K, not depending on i. This constant has since become known as Kemeny’s const…
  continue reading
 
Speaker:Prof. S. O'BrienAbstract:In the context of the Macsi industrial mathematics group, we look at the types of problems which have arisen from industrial collaboration and examine a couple of these in detail. In particular, we look at a mathematical model for etching glass with acids which arose from a study group with industry problem presente…
  continue reading
 
Speaker:Prof. S. O'BrienAbstract:In the context of the Macsi industrial mathematics group, we look at the types of problems which have arisen from industrial collaboration and examine a couple of these in detail. In particular, we look at a mathematical model for etching glass with acids which arose from a study group with industry problem presente…
  continue reading
 
Speaker:Martin CharltonAbstract:Geographically Weighted Regression is a technique for exploratory spatial data analysis. In "normal" regression with data for spatial objects we assume that the relationship we are modelling is uniform across the study area - that is, the estimated regression parameters are "whole-map" statistics. In many situations …
  continue reading
 
Speaker:Martin CharltonAbstract:Geographically Weighted Regression is a technique for exploratory spatial data analysis. In "normal" regression with data for spatial objects we assume that the relationship we are modelling is uniform across the study area - that is, the estimated regression parameters are "whole-map" statistics. In many situations …
  continue reading
 
Speaker:Dr. A. HackettAbstract:A cascade or avalanche is observed when interactions between the components of a system allow an initially localized effect to propagate globally. For example, the malfunction of technological systems like email networks or electrical power grids is often attributable to a cascade of failures triggered by some isolate…
  continue reading
 
Speaker:Dr. A. HackettAbstract:A cascade or avalanche is observed when interactions between the components of a system allow an initially localized effect to propagate globally. For example, the malfunction of technological systems like email networks or electrical power grids is often attributable to a cascade of failures triggered by some isolate…
  continue reading
 
Speaker:Dr. X. LiAbstract:Node mobility is often a hindering factor of the networking process in wireless ad hoc networks. In this talk, we will introduce our two recent works that address this problem through a prediction approach. The first work proposes an AutoRegressive Hello protocol (ARH) for mobile ad hoc networks. A hello protocol is a basi…
  continue reading
 
Speaker:Dr. X. LiAbstract:Node mobility is often a hindering factor of the networking process in wireless ad hoc networks. In this talk, we will introduce our two recent works that address this problem through a prediction approach. The first work proposes an AutoRegressive Hello protocol (ARH) for mobile ad hoc networks. A hello protocol is a basi…
  continue reading
 
Speaker:Prof. L. Leskela?Abstract:Juggler's exclusion process describes a system of particles on the positive integers where particles drift down to zero at unit speed. After a particle hits zero, it jumps into a randomly chosen unoccupied site. I will model the system as a set-valued Markov process and show that the process is ergodic if the famil…
  continue reading
 
Speaker:Prof. L. Leskela?Abstract:Juggler's exclusion process describes a system of particles on the positive integers where particles drift down to zero at unit speed. After a particle hits zero, it jumps into a randomly chosen unoccupied site. I will model the system as a set-valued Markov process and show that the process is ergodic if the famil…
  continue reading
 
Speaker:Dr. A. PozdnoukhovAbstract:Communication technologies with their very high penetration into society can serve as particularly rich source of information to explore and model evolution of complex social systems. This talk presents a framework of methods useful for exploratory analysis, modelling and visualization of data streams available fr…
  continue reading
 
Speaker:Dr. A. PozdnoukhovAbstract:Communication technologies with their very high penetration into society can serve as particularly rich source of information to explore and model evolution of complex social systems. This talk presents a framework of methods useful for exploratory analysis, modelling and visualization of data streams available fr…
  continue reading
 
Loading …

Hurtig referencevejledning