Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Sep
29
2008

Computer Science/Discrete Mathematics Seminar I

Composition of Rational Functions
Michael Zieve
11:15am|S-101

I will discuss this problem: given rational functions f and g over a field K , determine whether there are nonconstant rational functions u and v over K such that u(f(x)) = v(g(x)) . An equivalent problem is to compute the intersection of two fields...

Oct
06
2008

Computer Science/Discrete Mathematics Seminar I

List-Decoding Reed-Muller Codes Over Small Fields
11:15am|S-101

We present the first local list-decoding algorithm for the r-th order Reed-Muller code RM(r,m) over F_2 for r>1 . Given an oracle for a received word R: F_2^m to F_2 , our randomized local list-decoding algorithm produces a list containing all...

Oct
13
2008

Computer Science/Discrete Mathematics Seminar I

Average Case to Worst Case Reductions for Polynomials
11:15am|S-101

We study the model of approximation and calculation of constant degree multivariate polynomials over finite fields. We prove that if a constant degree polynomial can be approximated by a function of a constant number of lower degree polynomials, it...

Oct
20
2008

Computer Science/Discrete Mathematics Seminar I

Affine Dispersers from Subspace Polynomials
11:15am|S-101

This talk describes new explicit constructions of dispersers for affine sources of dimension below the notorious n/2 threshold. The main novelty in our construction lies in the method of proof which relies (solely) on elementary properties of...

Nov
03
2008

Computer Science/Discrete Mathematics Seminar I

Rounded Parallel Repetitions of Unique Games
11:15am|S-101

We show a connection between the semidefinite relaxation of unique games and their behavior under parallel repetition. Denoting by val(G) the value of a two-prover unique game G, and by sdp(G) the value of a natural semidefinite program to...

Nov
10
2008

Computer Science/Discrete Mathematics Seminar I

Almost-Natural Proofs
Timothy Chow
11:15am|S-101

Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is widely regarded as a serious barrier to proving strong lower bounds...

Nov
17
2008

Computer Science/Discrete Mathematics Seminar I

Scalably Scheduling Processes with Arbitrary Speedup Curves
Jeff Edmonds
11:15am|S-101

We give a (1+eps)-speed Theta(1/eps^2)-competitive nonclairvoyant algorithm for scheduling jobs with sublinear nondecreasing speed-up curves on multiple processors with the objective of total response time.

Nov
24
2008

Computer Science/Discrete Mathematics Seminar I

Large Induced Trees in $K_r$-Free Graphs
Jacob Fox
11:15am|S-101

For a graph G , let t(G) denote the maximum number of vertices in an induced subgraph of G that is a tree. We study the problem of bounding t(G) for graphs which do not contain a complete graph K_r on r vertices. This problem was posed twenty years...

Dec
01
2008

Computer Science/Discrete Mathematics Seminar I

Derandomizing Algorithms on Product Distributions
Avinatan Hassidim
11:15am|S-101

Getting the deterministic complexity closer to the best known randomized complexity is an important goal in algorithms and communication protocols. In this work, we investigate the case where instead of one input, the algorithm/protocol is given...

Dec
08
2008

Computer Science/Discrete Mathematics Seminar I

Convergent Sequences of Sparse Graphs
Bela Bollobas
11:15am|S-101

Recently, Borgs, Chayes, Lovasz, Sos, Szegedy and Vesztergombi introduced a natural metric on the space of dense graphs, and identified the completion of the metric space that arises. Independently and simultaneously, Janson, Riordan and I defined a...

Dec
15
2008

Computer Science/Discrete Mathematics Seminar I

Direct-Product Testing, and a New 2-Query PCPs
11:15am|S-101

The ``direct product code'' of a function $f$ gives its values on all $k$-tuples $(f(x_1),\dots,f(x_k))$. This basic construct underlies “hardness amplification” in cryptography, circuit complexity and PCPs. A recent breakthrough by Dinur and...

Jan
19
2009

Computer Science/Discrete Mathematics Seminar I

Noise-Resilient Group Testing: Limitations and Constructions
Mahdi Cheraghchi
11:15am|S-101

We study combinatorial group testing schemes for learning d-sparse boolean vectors using highly unreliable disjunctive measurements. We consider an adversarial noise model that only limits the number of false observations, and show that any noise...

Jan
26
2009

Computer Science/Discrete Mathematics Seminar I

The Limits of Advice
11:15am|S-101

Since the work of Karp and Lipton in the 1980s, complexity theorists know and love the /poly operator, which adds a polynomial-sized advice string to any complexity class. But it's interesting to consider much more general kinds of "advice objects"...

Feb
09
2009

Computer Science/Discrete Mathematics Seminar I

On P vs NP, Geometric Complexity Theory, and the Riemann Hypothesis
Ketan Mulmuley
11:15am|S-101

This series of three talks will give a nontechnical, high level overview of geometric complexity theory (GCT), which is an approach to the P vs. NP problem via algebraic geometry, representation theory, and the theory of a new class of quantum...

Feb
16
2009

Computer Science/Discrete Mathematics Seminar I

Approximating Submodular Functions Everywhere
Nick Harvey
11:15am|S-101

Submodular functions are a key concept in combinatorial optimization. Algorithms that involve submodular functions usually assume that they are given by a (value) oracle. Many interesting problems involving submodular functions can be solved using...

Feb
23
2009

Computer Science/Discrete Mathematics Seminar I

The Convergence of Bird Flocking
11:15am|West Bldg. Lecture Hall

We bound the time it takes for a group of birds to reach steady state in a standard flocking model. We prove that (i) within single exponential time fragmentation ceases and each bird settles on a fixed flying direction; (ii) the flocking network...

Mar
02
2009

Computer Science/Discrete Mathematics Seminar I

Finding Sparse Cuts Locally Using Evolving Sets
Yuval Peres
11:15am|S-101

A local graph partitioning algorithm finds a set of vertices with small conductance (i.e. a sparse cut) by adaptively exploring part of a large graph $G$, starting from a specified vertex. For the algorithm to be local, its complexity must be...

Mar
09
2009

Computer Science/Discrete Mathematics Seminar I

NP and MA Do Not Contain coNP in Multiparty Communication Complexity
Dmitry Gavinsky
11:15am|S-101

We prove that NP is different from coNP and coNP is not a subset of MA in the number-on-forehead model of multiparty communication complexity for up to k=(1 - e)log(n) players, where e>0 is any constant. Prior to our work, the problem was open even...

Mar
16
2009

Computer Science/Discrete Mathematics Seminar I

Simple Algorithms for Sequential k-Independent Graphs
11:15am|S-101

The local ratio framework introduced by Bar Yehuda and Evan in 1981 provides a unified framework for many approximation algorithms. Recently, the local ratio technique has been used to provide efficient approximation algorithms for a number of...

Mar
23
2009

Computer Science/Discrete Mathematics Seminar I

Symmetry and Approximability of Submodular Maximization Problems
11:15am|S-101

A number of recent results on optimization problems involving submodular functions have made use of the "multilinear relaxation" of the problem. I will show a general approach to deriving inapproximability results in the value oracle model, based on...

Apr
06
2009

Computer Science/Discrete Mathematics Seminar I

Public Key Cryptography from Different Assumptions
Benny Applebaum
11:15am|S-101

This work attempts to broaden the foundations of public-key cryptography. We construct a new public key encryption based on two “hardness on average” assumptions: (1) it is hard to “learn parity with noise” for random sparse equations; and (2) it is...

Apr
13
2009

Computer Science/Discrete Mathematics Seminar I

Bounded Independence Fools Halfspaces
11:15am|S-101

A halfspace (a.k.a. threshold) is a boolean function h : {-1,1}^n --> {-1,1} of the form h(x) = sign(w_0 + w_1 x_1 + ... + w_n x_n), where the weights w_i are arbitrary real numbers. Halfspaces are studied extensively in the theories of complexity...

Apr
20
2009

Computer Science/Discrete Mathematics Seminar I

The Constant-Depth Complexity of k-Clique
Ben Rossman
11:15am|S-101

I will discuss a lower bound of $\omega(n^(k/4))$ on the size of constant-depth $(AC_0)$ circuits solving the k-clique problem on n-vertex graphs. This bound follows from a stronger result that $AC_0$ circuits of size $O(n^(k/4))$ almost surely fail...

Apr
27
2009

Computer Science/Discrete Mathematics Seminar I

Values and Patterns
Alon Orlitsky
11:15am|S-101

Via four applications: distribution modeling, probability estimation, data compression, and classification, we argue that when learning from data, discrete values should be ignored except for just their appearance-order pattern. Along the way, we...

May
04
2009

Computer Science/Discrete Mathematics Seminar I

Lower Bounds for Randomized Communication Complexity
Mike Saks
11:15am|S-101

We prove lower bounds on the randomized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula F is a propositional formula in which each variable appears exactly once. Such a formula...

May
11
2009

Computer Science/Discrete Mathematics Seminar I

SDP Integrality Gaps with Local L1-Embeddability
11:15am|S-101

I will present a construction of an n-point negative type metric such that every t-point sub-metric is isometrically L1-embeddable, but embedding the whole metric into L1 incurs distortion at least k, where both t and k are (\log\log\log n)^{\Omega...

May
18
2009

Computer Science/Discrete Mathematics Seminar I

The Density Hales-Jewett Theorem and Open-Source Mathematics
11:15am|S-101

On Feb. 1, in his blog, Tim Gowers proposed an open collaboration on a math problem. Specifically, he suggested working on a combinatorial proof of the Density Hales-Jewett Theorem. This theorem states that for every delta > 0, if n is sufficiently...

May
26
2009

Computer Science/Discrete Mathematics Seminar I

On the Complexity of Boolean Functions in Different Characteristics
Amir Shpilka
2:00pm|S-101

Every Boolean function on n variables can be expressed as a unique multivariate polynomial modulo p for every prime p. In this work, we study how the degree of a function in one characteristic affects its complexity in other characteristics. We...

Jun
08
2009

Computer Science/Discrete Mathematics Seminar I

Quasi-One-Way Functions
11:15am|S-101

Ideally, one would want to base the security of standard cryptographic primitives (such as pseudorandom generators) on widely believed worst-case complexity assumptions like P does not equal NP. However, it is currently not known if this is possible...

Sep
14
2009

Computer Science/Discrete Mathematics Seminar I

Blackbox Polynomial Identity Testing for Depth 3 Circuits
11:15am|S-101

I will talk about a recent work describing a deterministic polynomial time algorithm for blackbox identity testing for depth three circuits with bounded top fanin over the field of rational numbers. This resolves a question posed by Klivans and...

Oct
05
2009

Computer Science/Discrete Mathematics Seminar I

The Detectability Lemma and Quantum Gap Amplification
Itai Arad
11:15am|S-101

Constraint Satisfaction Problems appear everywhere. The study of their quantum analogues (in which the constraints no longer commute), has become a lively area of study, and various recent results provide interesting insights into quantum physics...

Oct
19
2009

Computer Science/Discrete Mathematics Seminar I

PCPs of Sub-Constant Error Via Derandomized Direct Product
11:15am|S-101

A PCP is a proof system in which the proofs that can be verified by a verifier that reads only a very small part of the proof. One line of research concerning PCPs is trying to reduce their soundness error (i.e., the probability of accepting false...

Nov
02
2009

Computer Science/Discrete Mathematics Seminar I

Grothendieck Inequalities, XOR Games, and Communication Complexity
Troy Lee
11:15am|S-101

An XOR game is a very simple model of evaluating a distributed function f(x,y) . With probability p(x,y) a Verifier sends questions x, y to Alice and Bob, respectively. Without communicating, Alice and Bob then output a, b in {-1,+1} in the hope...

Nov
09
2009

Computer Science/Discrete Mathematics Seminar I

Why Sex?
Adi Livnat
11:15am|S-101

Sex has been called "the queen of problems in evolutionary biology" since it is pervasive in nature yet its functional significance has not been known. It has often been assumed that the shuffling of genes due to sex is an adaptation that...

Nov
23
2009

Computer Science/Discrete Mathematics Seminar I

Privacy of Dynamic Data: Continual Observation and Pan Privacy
Moni Naor
11:15am|S-101

Research in the area of privacy of data analysis has been flourishing recently, with a rigorous notion such as differential privacy regarding the desired level of privacy and sanitizing algorithms matching the definition for many problems. Most of...

Dec
07
2009

Computer Science/Discrete Mathematics Seminar I

The NOF Communication Complexity of Multiparty Pointer Jumping
Joshua Brody
11:15am|S-101

We give new results on the number-on-the-forhead (NOF) communication complexity of the multiparty pointer jumping problem. The origional motivation for this problem comes from circuit complexity. Specifically, there is no explicit function known to...

Dec
14
2009

Computer Science/Discrete Mathematics Seminar I

A Parallel Repetition Theorem for Any Interactive Argument
Iftach Ilan Haitner
11:15am|S-101

The question whether or not parallel repetition reduces the soundness error is a fundamental question in the theory of protocols. While parallel repetition reduces (at an exponential rate) the error in interactive proofs and (at a weak exponential...