Network Theory

Working Group Network Theory

Presentation

Topic: Theory that can be used to study networks.

Audience: The reading group Network Theory is intended for researchers in mathematics and computer science interested in networks, but anyone can attend online.

Practical details: The sessions are held every third Wednesday from 10:30 am to 11:30 pm (Central European Summer Time), in the premises of the LINCS and online. To receive the invitations, register to the mailing list. Videos, slides and notebooks of previous sessions are on the website.

Coordinator: François Durand (fradurand@gmail.com).

Description

In the reading group Network Theory, members present works from the scientific or technical literature to the other members. Our field of interest covers all theoretical aspects that can be used by researchers dealing with networks (graphs, telecommunication networks, social networks, power grids, etc). This includes general theoretical tools that are not specific to networks.

Past sessions

Contributing

As a speaker:

  • You may present a paper, a set of papers, a book chapter, or prepare a short introduction course to a given topic.
  • You do not need to be a specialist of what you present.
  • Please do not present your own work.

Sessions

14 Feb

A new perspective of entropy

14/02/2024    
10:30 am-11:30 am
Guodong Sun
Have you ever wondered how mathematicians "understand"? In a 1932 lecture, Hermann Weyl identified two key modes of mathematical reasoning: topology and abstract algebra. These, [...]
24 Jan

Understanding quantum computing using Quirk, a drag-and-drop quantum circuit simulator - Quantum

24/01/2024    
10:30 am-11:30 am
Ludovic Noirie
Quirk (https://algassert.com/quirk) is a drag-and-drop quantum circuit simulator that is easy to use and very interesting to understand how quantum computers works. In this session, [...]
20 Dec

Proving and analysing security protocols with Tamarin Prover

20/12/2023    
10:30 am-11:30 am
Guillaume Nibert
Tamarin Prover is an open source model checker for proving and verifying security protocols in the Dolev-Yao symbolic model, initially developed at the Information Security [...]
29 Nov

Coverage and Capacity of Joint Communication and Sensing in Wireless Networks

29/11/2023    
10:30 am-11:30 am
Romain Cervera
Joint Communication and Sensing (JCAS) is a technology aiming at integrating both communication and sensing in one single system. It requires the  reevaluation of network [...]
08 Nov

The Projection Method: A Unified Framework for Community Detection

08/11/2023    
10:30 am-11:30 am
Martijn Gösgens
We present the class of projection methods for community detection that generalizes many popular community detection methods. In this framework, we represent each clustering (partition) [...]
11 Oct

Quantum Networks for 5-Year-Old Network Researchers

11/10/2023    
10:30 am-11:30 am
Rémi Varloot
The aim of this talk is to present a quick overview of quantum networks. It will focus on their uses, how they operate, and most [...]
17 May

Sorting under Partial Information

17/05/2023    
10:30 am-11:30 am
Emma Caizergues
We present the following article: Cardinal, Fiorini, Joret, Jungers, and Munro. Sorting under partial information (without the ellipsoid algorithm). Proceedings of the forty-second ACM symposium [...]
05 Apr

Gaussian limit laws and generating series

05/04/2023    
10:30 am-11:30 am
Elie De Panafieu
The Central Limit Theorem states that some sums of random variables, once renormalized, converge to the Gaussian distribution. Some parameters of large combinatorial objects have [...]
15 Mar

An introduction to the numerical solver for multiple integrals

15/03/2023    
10:30 am-11:30 am
Guodong Sun
Evaluating multiple integrals is challenging when there exists no simple closed form representations. However, they are frequently encountered in network analysis, such as in queueing [...]
22 Feb

Introduction to Differential Privacy

22/02/2023    
10:30 am-11:30 am
Ilia Shilov
Consider an individual who is deciding whether to allow their data to be included in a database. For example, it may be a patient deciding [...]
1 2 3 4 5 6 7 8 9 10 11