Seminars

Oct
13
2015

Computer Science/Discrete Mathematics Seminar II

Non-constructive combinatorics
10:30am|S-101

I will describe several old and new applications of topological and algebraic methods in the derivation of combinatorial results. In all of them the proofs provide no efficient solutions for the corresponding algorithmic problems. Finding such...

Oct
12
2015

Computer Science/Discrete Mathematics Seminar I

Factors of polynomials of low individual degree
Rafael Oliveira
11:15am|S-101

In [kal89], Kaltofen proved the remarkable fact that multivariate polynomial factorization can be done efficiently, in randomized polynomial time. Still, more than twenty years after Kaltofen's work, many questions remain unanswered regarding the...

Oct
06
2015

Computer Science/Discrete Mathematics Seminar II

Invariants of random knots
Chaim Even Zohar
10:30am|West Bldg. Lect. Hall

A knot is a closed curve embedded in the three-dimensional space, like a rope whose two ends are joined together. As usual in Topology, two knots are equivalent if one can be deformed into the other by continuous moves, where stretching and...

Oct
05
2015

Computer Science/Discrete Mathematics Seminar I

Is optimization computationally equivalent to online learning?
Elad Hazan
11:15am|West Bldg. Lect. Hall

Vapnik's fundamental theorem of statistical learning establishes a computational equivalence between optimization (empirical risk minimization) and learning in the statistical setting. Is the same true for learning in games? We give a precise answer...

Sep
28
2015

Computer Science/Discrete Mathematics Seminar I

Ramsey numbers of degenerate graphs
Choongbum Lee
11:15am|S-101

The Ramsey number of a graph $G$ is the minimum integer $n$ for which every edge-coloring of the complete graph on $n$ vertices with two colors contains a monochromatic copy of $G$. A graph is $d$-degenerate if all its subgraphs have a vertex of...

Sep
22
2015

Computer Science/Discrete Mathematics Seminar II

Explicit two-source extractors and resilient functions II
10:30am|S-101

We explicitly construct an extractor for two independent sources on $n$ bits, each with min-entropy at least $\log^C n$ for a large enough constant $C$. Our extractor outputs one bit and has error $n^{-\Omega(1)}$. The best previous extractor, by...

Sep
21
2015

Computer Science/Discrete Mathematics Seminar I

Explicit two-source extractors and resilient functions I
11:15am|S-101

We explicitly construct an extractor for two independent sources on $n$ bits, each with min-entropy at least $\log^C n$ for a large enough constant $C$. Our extractor outputs one bit and has error $n^{-\Omega(1)}$. The best previous extractor, by...