“Papers of School of Mathematics”

 

Pages: 1 2 3 4 5 6

  1. M. Hormozi ,
Pointwise domination and weak $L^{1}$ boundedness of Littlewood-Paley operators via sparse operators,
in: Trends in Mathematics, , 2024, pp. 49-56  [abstract]

   2. M. khajeh Salehani,
Controllability on the infinite-dimensional group of orientation-preserving diffeomorphisms of the unit circle,
in: Proceedings of the 3rd conference on Dynamical Systems and Geometric Theories, , 2021, pp.   [abstract]

   3. O. Etesami (Joint with J. Gao, S. Mahloujifar, and M. Mahmoody),
Polynomial-time targeted attacks on coin-tossing for any number of corruptions,
in: The Theory of Cryptography Conference (TCC) 2021, , 2021, pp.   [abstract]

   4. E. Eftekhary (Joint with A. Alishahi),
On the construction of the sutured Floer complex,
in: Proceedings of the Gokova Geometry-topology conference 2013, , 2021, pp. 97-109  [abstract]

   5. M. Ghari (Joint with F. L. G. Faroldi, E. Lehmann, and Th. Studer),
Impossible and conflicting obligations in justification logic,
in: Deontoc Logic and Normative Systems, , 2020, pp.   [abstract]

   6. A. Nozad (Joint with C. Florentino, J. Silva, and A. Zamora),
On Hodge polynomials of singular character varieties,
in: Proceedings of the 12th ISAAC congress in its current form, , 2020, pp.   [abstract]

   7. R. Rezaeian Farashahi (Joint with M. Fadavi and S. Sabbaghian),
Injective encodings to binary ordinary elliptic curves,
in: Proceedings of SAC 2018, 1349, 2019, pp. 434-449  [abstract]

   8. S. Beigi and O. Etesami (Joint with A. Bogdanov and S. Guo),
Optimal Deterministic Extractors for Generalized Santha-Vazirani Sources,
in: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, , 2018, pp. DOI: 10.4230/LIPIcs.APPROX-RANDOM.2018.30  [abstract]

   9. S. Saeedi Madani,
Binomial edge ideals: A survey,
in: Springer Proceedings in Mathematics and Statistics, 238, 2018, pp. 83-94  [abstract]

   10. R. Rezaeian Farashahi (Joint with M. Fadavi and A. Yazdani Kashani),
Uniform encodings to elliptic curves over finite fields,
in: Proceedings of the tenth international workshop on coding and cryptography (WCC2017), , 2017, pp.   [abstract]

   back to top  

Pages: 1 2 3 4 5 6

scroll left or right