Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

May
31
2005

Computer Science/Discrete Mathematics Seminar I

A Formal Model for Dynamic Programming
10:30am|S-101

Many algorithms can intuitively be classified into one of a few basic paradigms of algorithms, such as greedy algorithms, dynamic programming, LP rounding, local search, etc. It is natural to ask which problems can be solved using these paradigms...

Jun
13
2005

Computer Science/Discrete Mathematics Seminar I

The PCP Theorem by Gap Amplification
11:15am|S-101

Given a set of variables, and a set of local constraints over them (e.g. a 3CNF formula) define the "satisfiability-gap" of the system as the smallest fraction of unsatisfiable constraints. We will describe a new proof for the PCP theorem of [AS...

Sep
12
2005

Computer Science/Discrete Mathematics Seminar I

Locally Decodable Codes with 2 Queries and Polynomial Identity Testing for Depth 3 Circuits
11:15am|S-101

In this work we study two, seemingly unrelated, notions. Locally Decodable Codes (LDCs) are codes that allow the recovery of each message bit from a constant number of entries of the codeword. Polynomial Identity Testing (PIT) is one of the...

Sep
26
2005

Computer Science/Discrete Mathematics Seminar I

Expanders, L-functions, and the Elliptic Curve Discrete Logarithm Problem
Stephen D. Miller
11:15am|S-101

I will talk about a family of graphs which originally arose in cryptography, in studying the difficulty of the discrete logarithm problem on elliptic curves. These graphs can be shown to be expanders, assuming the generalized Riemann hypothesis (GRH...

Oct
03
2005

Computer Science/Discrete Mathematics Seminar I

Szemeredi's Regularity Lemma Revisited
Terry Tao
11:15am|S-101

Szemeredi's regularity lemma asserts, roughly speaking, that any large dense graph can be approximated to any specified accuracy by a much simpler "finite complexity" object; it has had many applications in graph theory, combinatorial number theory...

Oct
10
2005

Computer Science/Discrete Mathematics Seminar I

Randomness Extractors for a Constant Number Independent Sources of Polynomial Min-Entropy
11:15am|S-101

We construct an extractor that can extract from a constant number of independent sources of length $n$, each of which have min-entropy $n^\gamma$ for an arbitrarily small constant $\gamma > 0$. Our constructions are different from recent extractor...

Oct
17
2005

Computer Science/Discrete Mathematics Seminar I

Embeddings of Earthmover Metrics
10:30am|S-101

Earthmover metrics are popular similarity measures in computer vision, and they are also used in the design of approximation algorithms for classification problems. Motivated by the existing nearest neighbor search databases for L_1 metrics, it was...

Oct
31
2005

Computer Science/Discrete Mathematics Seminar I

Quantum Information and the PCP Theorem
11:15am|S-101

I will discuss the following two results. I will assume no prior knowledge of quantum information or the PCP theorem. 1) The membership of $x$ in $SAT$ (for $x$ of length $n$) can be proved by a logarithmic-size quantum state $\Psi$, together with a...

Nov
07
2005

Computer Science/Discrete Mathematics Seminar I

Near-Optimal Algorithms for Unique Games
Yuri Makarychev
11:15am|S-101

Unique games were introduced by Uriel Feige and Laszlo Lovasz. We are given a graph G, a set of labels [k] = {1,...,k}, and permutations pi_{uv} on the set [k] (for all edges (u,v)). Our goal is to find an assignment of labels to variables x(u) (for...

Nov
28
2005

Computer Science/Discrete Mathematics Seminar I

Almost Orthogonal Linear Codes are Locally Testable
11:15am|S-101

A code is said to be locally testable if an algorithm can distinguish between a codeword and a vector being essentially far from the code using a number of queries that is independent of the code's length. The question of characterizing codes that...

Dec
05
2005

Computer Science/Discrete Mathematics Seminar I

Rational Secure Computation and Ideal Mechanism Design
Silvio Micali
11:15am|S-101

We prove a general result bridging the fields of Secure Protocols and Game Theory. We show that ANY mediated game with incomplete information can be perfectly simulated by the players alone, essentially by means of an extensive-form game in which...

Dec
12
2005

Computer Science/Discrete Mathematics Seminar I

From Combinatorial Patterns to Strongly Correlated Networks States in Population Neural Code
Elad Schneidman
11:15am|S-101

Biological networks have so many possible states that exhaustive sampling is impossible. Successful analysis thus depends on simplifying hypotheses, but experiments on many systems hint that complicated, higher order interactions among large groups...

Dec
20
2005

Computer Science/Discrete Mathematics Seminar I

Ramanujan Complexes of any Affine Type
Donald Cartwright
10:30am|S-101

Ramanujan complexes of type ${\tilde A}_n$ have been constructed by Lubotzky, Samuels and Vishne. In this talk I would like to propose a definition of Ramanujan complexes associated with buildings of any affine type. This involves defining...

Jan
16
2006

Computer Science/Discrete Mathematics Seminar I

Internal Conflict in a Computational System
Adi Livnat
11:15am|S-101

Internal conflict is considered to be a fundamental psychological phenomenon, and many behaviors in both humans and animals have been attributed to it. However, from a biological standpoint, internal conflict is counterintuitive, in that it appears...

Jan
23
2006

Computer Science/Discrete Mathematics Seminar I

Dispersion of Mass and the Complexity of Randomized Algorithms
Santosh Vempala
11:15am|S-101

Perhaps the most appealing conjectures in asymptotic convex geometry are (i) slicing (or isotropic constant) and (ii) variance. Together, they imply that for a random point X from an isotropic convex body in \R^n, the variance of |X|^2 is O(n). We...

Jan
30
2006

Computer Science/Discrete Mathematics Seminar I

From Trees to General Graphs: Counting Independent Sets up to the Tree Threshold
11:15am|S-101

We present a novel tree representation for the hard-core lattice gas model (weighted independent sets) on a general graph. We use this representation to show that for any graph of maximum degree D, the Gibbs measure is unique (the influence of any...

Feb
13
2006

Computer Science/Discrete Mathematics Seminar I

Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
Joel Friedman
11:15am|S-101

Counting connected components and Betti numbers was a known technique in algebraic complexity theory in the late 1970's and early 1980's. Speculation arose as to whether such methods could attack lower bounds in Boolean complexity theory (e.g., P vs...

Feb
20
2006

Computer Science/Discrete Mathematics Seminar I

The Grothendieck Inequality Revisited
Ron Blei
11:15am|S-101

In this talk I will prove the following counterpoint to a result by Kashin and Szarek (cf. Theorem 1, C. R. Acad. Sci. Paris, Ser. I, 1336 (2003) 931-936)): There exists a map \phi from infinite-dimensional euclidean space into the space of...

Feb
27
2006

Computer Science/Discrete Mathematics Seminar I

Hamilton Cycles in Expanding and Highly Connected Graphs
11:15am|S-101

A Hamilton cycle in a graph G is a cycle passing through all vertices of G. Hamiltonicity is one of the most central and appealing notions in Graph Theory, with a variety of known conditions and approaches to show the existence of a Hamilton cycle...

Mar
13
2006

Computer Science/Discrete Mathematics Seminar I

On the (Im)possibility of Basing One-Way Functions on NP-Hardness
11:15am|S-101

One-way functions (i.e., polynomial-time computable functions that are hard to invert on the average case) are the cornerstone of modern cryptography. The hardness condition on the task of inverting a one-way function is an *average-case* complexity...

Mar
20
2006

Computer Science/Discrete Mathematics Seminar I

Relaxed Two-Coloring of Cubic Graphs
11:15am|S-101

A RED/BLUE coloring of a graph is called $C$-relaxed if the RED vertices form an independent set, while the BLUE vertices induce connected components of order at most $C$. We show that there exists a smallest integer $C$ such that every cubic graph...

Mar
27
2006

Computer Science/Discrete Mathematics Seminar I

The Cover Time of Random Walks on Random Graphs
Alan Frieze
11:15am|S-101

We give asymptotically precise estimates for the expected time taken for a random walk to visit all vertices of a graph, viz. the cover time. We do this for several models of random graphs viz. $G_{n,p}$ when $p$ is above the connectivity threshold...

Apr
03
2006

Computer Science/Discrete Mathematics Seminar I

The Arrangement Method for Linear Programming
Vladlen Koltun
11:15am|S-101

We propose a new approach to designing a strongly polynomial algorithm for linear programming. We show that linear programming on any polytope can be reduced to linear programming on an arrangement polytope. The graphs of arrangement polytopes have...

Apr
17
2006

Computer Science/Discrete Mathematics Seminar I

Simultaneous Optimization and Fairness
Ashish Goel
11:15am|S-101

In this talk, we will sketch the theory of simultaneous optimization for concave profit functions, and point out connections to fairness. More precisely, suppose we would like to simultaneously approximate all symmetric utility functions over a...

May
01
2006

Computer Science/Discrete Mathematics Seminar I

Many Hamiltonian Cycles
Jeff Kahn
11:15am|S-101

We'll begin with the following theorem, which proves a conjecture of S\'ark\"ozy, Selkow and Szemer\'edi, and try to use it as an excuse to talk about other things (perhaps including Br\'egman's Theorem, entropy, the ``incremental random method,"...

May
08
2006

Computer Science/Discrete Mathematics Seminar I

Universal Graphs
11:15am|S-101

Let $F$ be a family of graphs. A graph $H$ is *$F$-universal* if every $G\in F$ is isomorphic to a subgraph of $H$. Besides being of theoretical interest, universal graphs have applications in chip design and network simulation. For any two positive...

May
15
2006

Computer Science/Discrete Mathematics Seminar I

New Connections Between Derandomization, Worst-Case Complexity and Average-Case Complexity
Danny Gutfreund
11:15am|Dilworth Room

We show new connections between derandomization, worst-case hardness and average-case hardness. Specifically, we show that a mild derandomization assumption together with the worst-case hardness of NP implies the average-case hardness of a language...

Sep
25
2006

Computer Science/Discrete Mathematics Seminar I

Minimum Bounded-Degree Spanning Trees Through Matroid Intersection
Michel Goemans
11:15am|S-101

Consider the minimum cost spanning tree problem under the restriction that all degrees must be at most a given value $k$. The main result I will present is that one can efficiently find a spanning tree of maximum degree at most $k+2$ whose cost is...

Oct
09
2006

Computer Science/Discrete Mathematics Seminar I

Languages with Bounded Multiparty Communication Complexity
11:15am|West Building Lecture Theatre

We uncover the structure of those languages that have bounded (by a constant) k-party communication complexity in the input on the forehead model, no matter how we partition the input bits into k disjoint sets. This generalizes an earlier result of...

Oct
16
2006

Computer Science/Discrete Mathematics Seminar I

Randomness-Efficient Sampling Within NC^1
Alex Healy
11:15am|S-101

It is now well-known that a random walk on an expander graph is a very good "sampler", and this has been used to prove a variety of important results in complexity theory, cryptography and algorithms. On the surface, however, taking a walk on an...

Oct
30
2006

Computer Science/Discrete Mathematics Seminar I

2-Source Dispersers for n^{o(1)} Entropy, and Ramsey Graphs Beating theFrankl-Wilson Construction
11:15am|S-101

The main result of this work is an explicit disperser for two independent sources on n bits, each of entropy k=n^{o(1)}. Put differently, setting N=2^n and K=2^k, we construct explicit N by N Boolean matrices for which no K by K submatrix is...

Nov
06
2006

Computer Science/Discrete Mathematics Seminar I

Towards Harmful Low-Rate Noise Models for Quantum Computers
11:15am|S-101

We propose and discuss two conjectures on the nature of errors in highly correlated noisy physical stochastic systems. The first asserts that errors for a pair of substantially correlated elements are themselves substantially correlated. The second...

Nov
13
2006

Computer Science/Discrete Mathematics Seminar I

Coupon Go
Elwyn Berlekamp
11:15am|S-101

Decomposition and modularity are fundamental issues in many fields, including mathematics, biology, engineering, and management. How can large systems be broken into subsystems which interact enough to meet the overall system goals, but not so much...

Nov
27
2006

Computer Science/Discrete Mathematics Seminar I

New Locally Decodable Codes and Private Information Retrieval Schemes
11:15am|S-101

A q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only q bits of the codeword C(x), even after some constant fraction of...

Dec
04
2006

Computer Science/Discrete Mathematics Seminar I

Transparent Achievement of Correlated Equilibrium
Silvio Micali
11:15am|S-101

Achieving correlated equilibrium is a problem at the intersection of game theory, cryptography and efficient algorithms. Thus far, however, perfectly rational solutions have been lacking, and the problem has been formulated with somewhat limited...

Dec
11
2006

Computer Science/Discrete Mathematics Seminar I

Approximation Algorithms for Combinatorial Allocation Problems
11:15am|S-101

In combinatorial allocation, m items are to be assigned to n players so that their total utility is maximized. This problem has many variants depending on the utility functions involved and possible additional constraints. We consider two variants...

Dec
18
2006

Computer Science/Discrete Mathematics Seminar I

On the Computation and Approximation of Two-Player Nash Equilibria
11:15am|S-101

In 1950, Nash showed that every non-cooperative game has an equilibrium. Before his work, the result was known only for two-player zero-sum games. While von Neumann's minimax theorem was the mathematical foundation of the two-player zero-sum game...

Jan
15
2007

Computer Science/Discrete Mathematics Seminar I

How to Rank with Few Errors: A PTAS for Weighted Feedback Arc Set on Tournaments
Warren Schudy
11:15am|S-101

Suppose you ran a chess tournament, everybody played everybody, and you wanted to use the results to rank everybody. Unless you were really lucky, the results would not be acyclic, so you could not just sort the players by who beat whom. A natural...

Jan
22
2007

Computer Science/Discrete Mathematics Seminar I

On the Condition Number of a Randomly Perturbed Matrix
11:15am|West Building Lecture Theatre

Let $M$ be an arbitrary $n$ by $n$ matrix. We study the condition number a random perturbation $M+N_n$ of $M$, where $N_n$ is a random matrix, motivated by a problem raised by Spielman and Teng. It is shown that, under very general conditions on $M$...