In this talk, the relationship between integrable systems and invariant curve flows is studied. It is shown that many integrable systems including the well-known integrable equations and Camassa-Holm type equations arise from the non-stretching invariant curve flows in Klein geometries. The geometrical formulations to some properties of integrable systems are also given.
The p-adic L-function attached to an elliptic curve with split, multiplicative reduction at the prime p will vanish at s=1. This is an example of what we call a "trivial zero." This talk will outline the way that Glenn Stevens and I proved a formula for the derivative at s=1 for that function.
Consider a quasi-periodic Schr\"odinger operator
$H_{\alpha,\theta}$ with analytic potential and Diophantine frequency
$\alpha$. Given any rational approximating $\alpha$, let $S_+$ and $S_-$
denote the union, respectively, the intersection of the spectra taken over
$\theta$. We show that up to sets of zero Lebesgue measure, the absolutely
continuous spectrum can be obtained asymptotically from $S_-$ of the
periodic operators associated with the continued fraction expansion of
$\alpha$. Similarly, from the asymptotics of $S_+$, one recovers the
spectrum of $H_{\alpha,\theta}$ (modulo a set of zero Lebesgue measure).
Optimal Delaunay triangulations (ODTs) are optimal meshes minimizing the inter- polation error to a convex function in Lp norm. We shall present several applications of ODT.
1. Mesh smoothing and optimization. Meshes with high quality are obtained by minimizing the interpolation error in a weighted L1 norm.
2. Anisotropic mesh adaptation. Optimal anisotropic interpolation error esti- mate is obtained by choosing anisotropic functions. The error estimate is used to produce anisotropic mesh adaptation for convection-dominated problems.
3. Sphere covering and convex polytope approximation. Asymptotic exact and sharp estimate of some constant in these two problems are obtained from ODT.
4. Quantization. Optimization algorithms based on ODT are applied to quanti- zation to speed up the processing.
Almost all forms of communication on the internet are initiated and obfuscated by a method of public key cryptography. Perhaps the most important among these are credit card transactions. This talk will discuss why public key cryptography is considered safe enough for those transactions and how quantum computers are a threat to those methods.