Expander graphs in pure and applied mathematics
A Lubotzky - Bulletin of the American Mathematical Society, 2012 - ams.org
Expander graphs are highly connected sparse finite graphs. They play an important role in
computer science as basic building blocks for network constructions, error correcting codes …
computer science as basic building blocks for network constructions, error correcting codes …
An inverse theorem for the Gowers norm
AN INVERSE THEOREM FOR THE GOWERS $U^3(G)$ NORM Page 1 Proceedings of the
Edinburgh Mathematical Society (2008) 51, 73–153 c DOI:10.1017/S0013091505000325 …
Edinburgh Mathematical Society (2008) 51, 73–153 c DOI:10.1017/S0013091505000325 …
[BOOK][B] Nilpotent structures in ergodic theory
B Host, B Kra - 2018 - books.google.com
Nilsystems play a key role in the structure theory of measure preserving systems, arising as
the natural objects that describe the behavior of multiple ergodic averages. This book is a …
the natural objects that describe the behavior of multiple ergodic averages. This book is a …
[BOOK][B] Structure and randomness: pages from year one of a mathematical blog
T Tao - 2008 - books.google.com
" There are many bits and pieces of folklore in mathematics that are passed down from
advisor to student, or from collaborator to collaborator, but which are too fuzzy and non …
advisor to student, or from collaborator to collaborator, but which are too fuzzy and non …
The logarithmically averaged Chowla and Elliott conjectures for two-point correlations
T Tao - Forum of Mathematics, Pi, 2016 - cambridge.org
THE LOGARITHMICALLY AVERAGED CHOWLA AND ELLIOTT CONJECTURES FOR TWO-POINT
CORRELATIONS Page 1 Forum of Mathematics, Pi (2016), Vol. 4, e8, 36 pages doi:10.1017/fmp.2016.6 …
CORRELATIONS Page 1 Forum of Mathematics, Pi (2016), Vol. 4, e8, 36 pages doi:10.1017/fmp.2016.6 …
An averaged form of Chowla's conjecture
= o (HX) provided that H→∞ arbitrarily slowly with X→∞(and H≤ X). Note that the k= 2 case
of Chowla's conjecture is equivalent to the above asymptotic holding in the case that H is …
of Chowla's conjecture is equivalent to the above asymptotic holding in the case that H is …
[BOOK][B] Higher order Fourier analysis
T Tao - 2012 - books.google.com
Higher order Fourier analysis is a subject that has become very active only recently. This
book serves as an introduction to the field, giving the beginning graduate student in the …
book serves as an introduction to the field, giving the beginning graduate student in the …
Affine linear sieve, expanders, and sum-product
J Bourgain, A Gamburd, P Sarnak - Inventiones mathematicae, 2010 - Springer
Let O be an orbit in ℤ n of a finitely generated subgroup Λ of GL n (ℤ) whose Zariski closure
Zcl (Λ) is suitably large (eg isomorphic to SL 2). We develop a Brun combinatorial sieve for …
Zcl (Λ) is suitably large (eg isomorphic to SL 2). We develop a Brun combinatorial sieve for …
Long gaps between primes
Let $ p_n $ denote the $ n $ th prime. We prove that\[\max _ {p_ {n}\leqslant X}(p_ {n+ 1}-
p_n)\gg\frac {\log X\log\log X\log\log\log\log X}{\log\log\log X}\] for sufficiently large $ X …
p_n)\gg\frac {\log X\log\log X\log\log\log\log X}{\log\log\log X}\] for sufficiently large $ X …
On the local leakage resilience of linear secret sharing schemes
We consider the following basic question: to what extent are standard secret sharing
schemes and protocols for secure multiparty computation that build on them resilient to …
schemes and protocols for secure multiparty computation that build on them resilient to …