Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Jan
28
2008

Computer Science/Discrete Mathematics Seminar I

Hardness Amplification Proofs Require Majority
11:15am|S-101

Hardness amplification is a major line of research that mainly seeks to transform a given lower bound (e.g. a function that has correlation at most 99% with small circuits) into a strongly average-case one (i.e. a function that has negligible...

Feb
04
2008

Computer Science/Discrete Mathematics Seminar I

The Rules of the Game
11:15am|S-101

Avoider-Enforcer games are a misere version of somewhat more popular Maker-Breaker games. An Avoider-Enforcer game is played by two players, called Avoider and Enforcer, on a hypergraph H=(V,E) (typically the vertices of H are the edges of the...

Feb
11
2008

Computer Science/Discrete Mathematics Seminar I

Uniform Direct Product Theorems: Simplified, Optimized, and Derandomized
11:15am|S-101

A given function f(x) is "hard on average" with respect to an algorithm A , if A(x) disagrees with f(x) on "many" inputs x. Applications in cryptography and derandomization require functions that are "very hard on average" (essentially unpredictable...

Feb
18
2008

Computer Science/Discrete Mathematics Seminar I

Integrality Gaps for Sherali-Adams Relaxations
Yury Makarychev
11:15am|S-101

We prove strong lower bounds for Sherali-Adams relaxations of the MAX CUT, Vertex Cover and Sparsest Cut problems. Specifically, we show that the integrality gap of MAX CUT and Vertex Cover relaxations is 2-$\epsilon$ after n^delta rounds (where...

Feb
25
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...

Mar
03
2008

Computer Science/Discrete Mathematics Seminar I

Disjointness is Hard in the Multi-Party Number-On-The-Forehead Model
Troy Lee
11:15am|S-101

The disjointness function---determining if a number of sets share a common element---is a notorious example in communication complexity of a function which is hard, but it is hard to show it is hard. Determining both the randomized and quantum...

Mar
10
2008

Computer Science/Discrete Mathematics Seminar I

A Frieman Isomorphism-type Lemma for Polynomials
Philip Matchett Wood
11:15am|West Bldg. Lecture Hall

A Freiman isomorphism is a fundamental object in additive combinatorics that allows one to move an additive problem from one group to another, all while preserving the salient additive properties. In this talk, we will discuss a new mapping result...

Mar
24
2008

Computer Science/Discrete Mathematics Seminar I

Testing Symmetric Properties of Distributions
Paul Valiant and Paul Valiant
11:15am|S-101

We introduce the notion of a Canonical Tester for a class of properties on distributions, that is, a tester strong and general enough that ``a distribution property in the class is testable if and only if the Canonical Tester tests it''. We...

Mar
31
2008

Computer Science/Discrete Mathematics Seminar I

On Proving Hardness of Improper Learning from Worst-Case Assumptions
Benny Applebaum
11:15am|S-101

Learning theory, and in particular PAC learning, was introduced by Valiant in 1984 and has since become a major area of research in theoretical and applied computer science. One natural question that was posed at the very inception of the field is...

Apr
07
2008

Computer Science/Discrete Mathematics Seminar I

Merkle Puzzles are Optimal
Mohammad Mohmoody Ghidary
11:15am|S-101

We prove that every key exchange protocol in the random oracle model in which the honest users make at most $n$ queries to the oracle can be broken by an adversary making $O(n^2)$ queries to the oracle. This improves on the previous $\Tilde{O}(n^6)$...

Apr
14
2008

Computer Science/Discrete Mathematics Seminar I

Embeddings of Discrete Groups and the Speed of Random Walks
11:15am|S-101

Let G be a finitely generated group equipped with the word metric. Assume that G does not admit a bi-Lipschitz embedding into Hilbert space. How can we quantify the extent to which G is non-Hilbertian? A natural approach is to consider the Hilbert...

Apr
28
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...

May
12
2008

Computer Science/Discrete Mathematics Seminar I

Artin Map, Cyclotomic Function Fields, and Folded List-Decodable Codes
11:15am|West Bldg. Lecture Hall

Recently, algebraic codes which achieve the optimal trade-off between rate and (list) error-correction radius were constructed by a careful "folding" of the Reed-Solomon code. The "low-degree'' nature of this folding operation was crucial to the...

May
23
2008

Computer Science/Discrete Mathematics Seminar I

The finite field Kakeya conjecture.
2:00pm|S-101

A Kakeya set in F^n , where F is a finite field, is a set containing a line in every direction. The finite field Kakeya conjecture states that the size of such sets is bounded from below by C_n*|F|^n , where C_n depends only on the dimension n . I...

Sep
15
2008

Computer Science/Discrete Mathematics Seminar I

On a Conjecture of Linial and Berge
11:15am|S-101

In 1982 Linial and Berge conjectured that there is some form of duality between partitioning the vertices of a directed graph to disjoint paths and finding a big set of vertices in it with a small chromatic number. In the talk I will discuss the...

Sep
29
2008

Computer Science/Discrete Mathematics Seminar I

Composition of Rational Functions
Michael Zieve
11:15am|S-101

I will discuss this problem: given rational functions f and g over a field K , determine whether there are nonconstant rational functions u and v over K such that u(f(x)) = v(g(x)) . An equivalent problem is to compute the intersection of two fields...

Oct
06
2008

Computer Science/Discrete Mathematics Seminar I

List-Decoding Reed-Muller Codes Over Small Fields
11:15am|S-101

We present the first local list-decoding algorithm for the r-th order Reed-Muller code RM(r,m) over F_2 for r>1 . Given an oracle for a received word R: F_2^m to F_2 , our randomized local list-decoding algorithm produces a list containing all...

Oct
13
2008

Computer Science/Discrete Mathematics Seminar I

Average Case to Worst Case Reductions for Polynomials
11:15am|S-101

We study the model of approximation and calculation of constant degree multivariate polynomials over finite fields. We prove that if a constant degree polynomial can be approximated by a function of a constant number of lower degree polynomials, it...

Oct
20
2008

Computer Science/Discrete Mathematics Seminar I

Affine Dispersers from Subspace Polynomials
11:15am|S-101

This talk describes new explicit constructions of dispersers for affine sources of dimension below the notorious n/2 threshold. The main novelty in our construction lies in the method of proof which relies (solely) on elementary properties of...

Nov
03
2008

Computer Science/Discrete Mathematics Seminar I

Rounded Parallel Repetitions of Unique Games
11:15am|S-101

We show a connection between the semidefinite relaxation of unique games and their behavior under parallel repetition. Denoting by val(G) the value of a two-prover unique game G, and by sdp(G) the value of a natural semidefinite program to...

Nov
10
2008

Computer Science/Discrete Mathematics Seminar I

Almost-Natural Proofs
Timothy Chow
11:15am|S-101

Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is widely regarded as a serious barrier to proving strong lower bounds...

Nov
17
2008

Computer Science/Discrete Mathematics Seminar I

Scalably Scheduling Processes with Arbitrary Speedup Curves
Jeff Edmonds
11:15am|S-101

We give a (1+eps)-speed Theta(1/eps^2)-competitive nonclairvoyant algorithm for scheduling jobs with sublinear nondecreasing speed-up curves on multiple processors with the objective of total response time.

Nov
24
2008

Computer Science/Discrete Mathematics Seminar I

Large Induced Trees in $K_r$-Free Graphs
Jacob Fox
11:15am|S-101

For a graph G , let t(G) denote the maximum number of vertices in an induced subgraph of G that is a tree. We study the problem of bounding t(G) for graphs which do not contain a complete graph K_r on r vertices. This problem was posed twenty years...

Dec
01
2008

Computer Science/Discrete Mathematics Seminar I

Derandomizing Algorithms on Product Distributions
Avinatan Hassidim
11:15am|S-101

Getting the deterministic complexity closer to the best known randomized complexity is an important goal in algorithms and communication protocols. In this work, we investigate the case where instead of one input, the algorithm/protocol is given...

Dec
08
2008

Computer Science/Discrete Mathematics Seminar I

Convergent Sequences of Sparse Graphs
Bela Bollobas
11:15am|S-101

Recently, Borgs, Chayes, Lovasz, Sos, Szegedy and Vesztergombi introduced a natural metric on the space of dense graphs, and identified the completion of the metric space that arises. Independently and simultaneously, Janson, Riordan and I defined a...

Dec
15
2008

Computer Science/Discrete Mathematics Seminar I

Direct-Product Testing, and a New 2-Query PCPs
11:15am|S-101

The ``direct product code'' of a function $f$ gives its values on all $k$-tuples $(f(x_1),\dots,f(x_k))$. This basic construct underlies “hardness amplification” in cryptography, circuit complexity and PCPs. A recent breakthrough by Dinur and...

Jan
19
2009

Computer Science/Discrete Mathematics Seminar I

Noise-Resilient Group Testing: Limitations and Constructions
Mahdi Cheraghchi
11:15am|S-101

We study combinatorial group testing schemes for learning d-sparse boolean vectors using highly unreliable disjunctive measurements. We consider an adversarial noise model that only limits the number of false observations, and show that any noise...

Jan
26
2009

Computer Science/Discrete Mathematics Seminar I

The Limits of Advice
11:15am|S-101

Since the work of Karp and Lipton in the 1980s, complexity theorists know and love the /poly operator, which adds a polynomial-sized advice string to any complexity class. But it's interesting to consider much more general kinds of "advice objects"...

Feb
09
2009

Computer Science/Discrete Mathematics Seminar I

On P vs NP, Geometric Complexity Theory, and the Riemann Hypothesis
Ketan Mulmuley
11:15am|S-101

This series of three talks will give a nontechnical, high level overview of geometric complexity theory (GCT), which is an approach to the P vs. NP problem via algebraic geometry, representation theory, and the theory of a new class of quantum...

Feb
16
2009

Computer Science/Discrete Mathematics Seminar I

Approximating Submodular Functions Everywhere
Nick Harvey
11:15am|S-101

Submodular functions are a key concept in combinatorial optimization. Algorithms that involve submodular functions usually assume that they are given by a (value) oracle. Many interesting problems involving submodular functions can be solved using...

Feb
23
2009

Computer Science/Discrete Mathematics Seminar I

The Convergence of Bird Flocking
11:15am|West Bldg. Lecture Hall

We bound the time it takes for a group of birds to reach steady state in a standard flocking model. We prove that (i) within single exponential time fragmentation ceases and each bird settles on a fixed flying direction; (ii) the flocking network...

Mar
02
2009

Computer Science/Discrete Mathematics Seminar I

Finding Sparse Cuts Locally Using Evolving Sets
Yuval Peres
11:15am|S-101

A local graph partitioning algorithm finds a set of vertices with small conductance (i.e. a sparse cut) by adaptively exploring part of a large graph $G$, starting from a specified vertex. For the algorithm to be local, its complexity must be...

Mar
09
2009

Computer Science/Discrete Mathematics Seminar I

NP and MA Do Not Contain coNP in Multiparty Communication Complexity
Dmitry Gavinsky
11:15am|S-101

We prove that NP is different from coNP and coNP is not a subset of MA in the number-on-forehead model of multiparty communication complexity for up to k=(1 - e)log(n) players, where e>0 is any constant. Prior to our work, the problem was open even...

Mar
16
2009

Computer Science/Discrete Mathematics Seminar I

Simple Algorithms for Sequential k-Independent Graphs
11:15am|S-101

The local ratio framework introduced by Bar Yehuda and Evan in 1981 provides a unified framework for many approximation algorithms. Recently, the local ratio technique has been used to provide efficient approximation algorithms for a number of...

Mar
23
2009

Computer Science/Discrete Mathematics Seminar I

Symmetry and Approximability of Submodular Maximization Problems
11:15am|S-101

A number of recent results on optimization problems involving submodular functions have made use of the "multilinear relaxation" of the problem. I will show a general approach to deriving inapproximability results in the value oracle model, based on...

Apr
06
2009

Computer Science/Discrete Mathematics Seminar I

Public Key Cryptography from Different Assumptions
Benny Applebaum
11:15am|S-101

This work attempts to broaden the foundations of public-key cryptography. We construct a new public key encryption based on two “hardness on average” assumptions: (1) it is hard to “learn parity with noise” for random sparse equations; and (2) it is...

Apr
13
2009

Computer Science/Discrete Mathematics Seminar I

Bounded Independence Fools Halfspaces
11:15am|S-101

A halfspace (a.k.a. threshold) is a boolean function h : {-1,1}^n --> {-1,1} of the form h(x) = sign(w_0 + w_1 x_1 + ... + w_n x_n), where the weights w_i are arbitrary real numbers. Halfspaces are studied extensively in the theories of complexity...

Apr
20
2009

Computer Science/Discrete Mathematics Seminar I

The Constant-Depth Complexity of k-Clique
Ben Rossman
11:15am|S-101

I will discuss a lower bound of $\omega(n^(k/4))$ on the size of constant-depth $(AC_0)$ circuits solving the k-clique problem on n-vertex graphs. This bound follows from a stronger result that $AC_0$ circuits of size $O(n^(k/4))$ almost surely fail...

Apr
27
2009

Computer Science/Discrete Mathematics Seminar I

Values and Patterns
Alon Orlitsky
11:15am|S-101

Via four applications: distribution modeling, probability estimation, data compression, and classification, we argue that when learning from data, discrete values should be ignored except for just their appearance-order pattern. Along the way, we...

May
04
2009

Computer Science/Discrete Mathematics Seminar I

Lower Bounds for Randomized Communication Complexity
Mike Saks
11:15am|S-101

We prove lower bounds on the randomized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula F is a propositional formula in which each variable appears exactly once. Such a formula...

May
11
2009

Computer Science/Discrete Mathematics Seminar I

SDP Integrality Gaps with Local L1-Embeddability
11:15am|S-101

I will present a construction of an n-point negative type metric such that every t-point sub-metric is isometrically L1-embeddable, but embedding the whole metric into L1 incurs distortion at least k, where both t and k are (\log\log\log n)^{\Omega...