Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Nov
05
2007

Computer Science/Discrete Mathematics Seminar I

Markets and the Primal-Dual Paradigm
Vijay Vazirani
11:15am|S-101

The notion of a ``market'' has undergone a paradigm shift with the Internet -- totally new and highly successful markets have been defined and launched by companies such as Google, Yahoo!, Amazon, MSN and Ebay. These markets are computationally...

Nov
12
2007

Computer Science/Discrete Mathematics Seminar I

Developments in Holographic Algorithms
Jin-Yi Cai
11:15am|S-101

Valiant's theory of holographic algorithms is a new design method to produce polynomial time algorithms. Information is represented in a superposition of linear vectors in a holographic mix. This mixture creates the possibility for exponential sized...

Nov
19
2007

Computer Science/Discrete Mathematics Seminar I

On a Network Creation Game
Yishay Mansour
11:15am|S-101

A network creation game abstracts a network construction by selfish agent who build a network by buying links to each other. Each player pays a fixed cost per link, and suffers an additional communication cost (which is the sum of distances to the...

Nov
26
2007

Computer Science/Discrete Mathematics Seminar I

On Hardness of Learning Intersection of Two Halfspaces
11:15am|West Building Lecture Theatre

I will present a result that shows hardness of weak PAC-learning intersection of two halfspaces using a hypothesis which is an intersection of k halfspaces for any (fixed) integer k. Specifically, for every integer k and an arbitrarily small...

Dec
03
2007

Computer Science/Discrete Mathematics Seminar I

Expander Flows, Graph Spectra and Graph Separators
Umesh Vazirani
11:15am|S-101

A graph separator is a set of edges whose deletion partitions the graph into two (or more) pieces. Finding small graph separators is a fundamental combinatorial problem with numerous applications. Interest in it also derives from its theoretical...

Jan
21
2008

Computer Science/Discrete Mathematics Seminar I

Noisy Binary Search and Applications
Avinatan Hassidim
11:15am|S-101

We use a Bayesian approach to optimally solve problems in noisy binary search. We deal with two variants: 1. Each comparison can be erroneous with some probability 1 - p. 2. At each stage k comparisons can be performed in parallel and a noisy answer...

Jan
28
2008

Computer Science/Discrete Mathematics Seminar I

Hardness Amplification Proofs Require Majority
11:15am|S-101

Hardness amplification is a major line of research that mainly seeks to transform a given lower bound (e.g. a function that has correlation at most 99% with small circuits) into a strongly average-case one (i.e. a function that has negligible...

Feb
04
2008

Computer Science/Discrete Mathematics Seminar I

The Rules of the Game
11:15am|S-101

Avoider-Enforcer games are a misere version of somewhat more popular Maker-Breaker games. An Avoider-Enforcer game is played by two players, called Avoider and Enforcer, on a hypergraph H=(V,E) (typically the vertices of H are the edges of the...

Feb
11
2008

Computer Science/Discrete Mathematics Seminar I

Uniform Direct Product Theorems: Simplified, Optimized, and Derandomized
11:15am|S-101

A given function f(x) is "hard on average" with respect to an algorithm A , if A(x) disagrees with f(x) on "many" inputs x. Applications in cryptography and derandomization require functions that are "very hard on average" (essentially unpredictable...

Feb
18
2008

Computer Science/Discrete Mathematics Seminar I

Integrality Gaps for Sherali-Adams Relaxations
Yury Makarychev
11:15am|S-101

We prove strong lower bounds for Sherali-Adams relaxations of the MAX CUT, Vertex Cover and Sparsest Cut problems. Specifically, we show that the integrality gap of MAX CUT and Vertex Cover relaxations is 2-$\epsilon$ after n^delta rounds (where...

Feb
25
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...

Mar
03
2008

Computer Science/Discrete Mathematics Seminar I

Disjointness is Hard in the Multi-Party Number-On-The-Forehead Model
Troy Lee
11:15am|S-101

The disjointness function---determining if a number of sets share a common element---is a notorious example in communication complexity of a function which is hard, but it is hard to show it is hard. Determining both the randomized and quantum...

Mar
10
2008

Computer Science/Discrete Mathematics Seminar I

A Frieman Isomorphism-type Lemma for Polynomials
Philip Matchett Wood
11:15am|West Bldg. Lecture Hall

A Freiman isomorphism is a fundamental object in additive combinatorics that allows one to move an additive problem from one group to another, all while preserving the salient additive properties. In this talk, we will discuss a new mapping result...

Mar
24
2008

Computer Science/Discrete Mathematics Seminar I

Testing Symmetric Properties of Distributions
Paul Valiant and Paul Valiant
11:15am|S-101

We introduce the notion of a Canonical Tester for a class of properties on distributions, that is, a tester strong and general enough that ``a distribution property in the class is testable if and only if the Canonical Tester tests it''. We...

Mar
31
2008

Computer Science/Discrete Mathematics Seminar I

On Proving Hardness of Improper Learning from Worst-Case Assumptions
Benny Applebaum
11:15am|S-101

Learning theory, and in particular PAC learning, was introduced by Valiant in 1984 and has since become a major area of research in theoretical and applied computer science. One natural question that was posed at the very inception of the field is...

Apr
07
2008

Computer Science/Discrete Mathematics Seminar I

Merkle Puzzles are Optimal
Mohammad Mohmoody Ghidary
11:15am|S-101

We prove that every key exchange protocol in the random oracle model in which the honest users make at most $n$ queries to the oracle can be broken by an adversary making $O(n^2)$ queries to the oracle. This improves on the previous $\Tilde{O}(n^6)$...

Apr
14
2008

Computer Science/Discrete Mathematics Seminar I

Embeddings of Discrete Groups and the Speed of Random Walks
11:15am|S-101

Let G be a finitely generated group equipped with the word metric. Assume that G does not admit a bi-Lipschitz embedding into Hilbert space. How can we quantify the extent to which G is non-Hilbertian? A natural approach is to consider the Hilbert...

Apr
28
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...

May
12
2008

Computer Science/Discrete Mathematics Seminar I

Artin Map, Cyclotomic Function Fields, and Folded List-Decodable Codes
11:15am|West Bldg. Lecture Hall

Recently, algebraic codes which achieve the optimal trade-off between rate and (list) error-correction radius were constructed by a careful "folding" of the Reed-Solomon code. The "low-degree'' nature of this folding operation was crucial to the...

May
23
2008

Computer Science/Discrete Mathematics Seminar I

The finite field Kakeya conjecture.
2:00pm|S-101

A Kakeya set in F^n , where F is a finite field, is a set containing a line in every direction. The finite field Kakeya conjecture states that the size of such sets is bounded from below by C_n*|F|^n , where C_n depends only on the dimension n . I...

Sep
15
2008

Computer Science/Discrete Mathematics Seminar I

On a Conjecture of Linial and Berge
11:15am|S-101

In 1982 Linial and Berge conjectured that there is some form of duality between partitioning the vertices of a directed graph to disjoint paths and finding a big set of vertices in it with a small chromatic number. In the talk I will discuss the...

Sep
29
2008

Computer Science/Discrete Mathematics Seminar I

Composition of Rational Functions
Michael Zieve
11:15am|S-101

I will discuss this problem: given rational functions f and g over a field K , determine whether there are nonconstant rational functions u and v over K such that u(f(x)) = v(g(x)) . An equivalent problem is to compute the intersection of two fields...

Oct
06
2008

Computer Science/Discrete Mathematics Seminar I

List-Decoding Reed-Muller Codes Over Small Fields
11:15am|S-101

We present the first local list-decoding algorithm for the r-th order Reed-Muller code RM(r,m) over F_2 for r>1 . Given an oracle for a received word R: F_2^m to F_2 , our randomized local list-decoding algorithm produces a list containing all...

Oct
13
2008

Computer Science/Discrete Mathematics Seminar I

Average Case to Worst Case Reductions for Polynomials
11:15am|S-101

We study the model of approximation and calculation of constant degree multivariate polynomials over finite fields. We prove that if a constant degree polynomial can be approximated by a function of a constant number of lower degree polynomials, it...

Oct
20
2008

Computer Science/Discrete Mathematics Seminar I

Affine Dispersers from Subspace Polynomials
11:15am|S-101

This talk describes new explicit constructions of dispersers for affine sources of dimension below the notorious n/2 threshold. The main novelty in our construction lies in the method of proof which relies (solely) on elementary properties of...

Nov
03
2008

Computer Science/Discrete Mathematics Seminar I

Rounded Parallel Repetitions of Unique Games
11:15am|S-101

We show a connection between the semidefinite relaxation of unique games and their behavior under parallel repetition. Denoting by val(G) the value of a two-prover unique game G, and by sdp(G) the value of a natural semidefinite program to...

Nov
10
2008

Computer Science/Discrete Mathematics Seminar I

Almost-Natural Proofs
Timothy Chow
11:15am|S-101

Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is widely regarded as a serious barrier to proving strong lower bounds...

Nov
17
2008

Computer Science/Discrete Mathematics Seminar I

Scalably Scheduling Processes with Arbitrary Speedup Curves
Jeff Edmonds
11:15am|S-101

We give a (1+eps)-speed Theta(1/eps^2)-competitive nonclairvoyant algorithm for scheduling jobs with sublinear nondecreasing speed-up curves on multiple processors with the objective of total response time.

Nov
24
2008

Computer Science/Discrete Mathematics Seminar I

Large Induced Trees in $K_r$-Free Graphs
Jacob Fox
11:15am|S-101

For a graph G , let t(G) denote the maximum number of vertices in an induced subgraph of G that is a tree. We study the problem of bounding t(G) for graphs which do not contain a complete graph K_r on r vertices. This problem was posed twenty years...

Dec
01
2008

Computer Science/Discrete Mathematics Seminar I

Derandomizing Algorithms on Product Distributions
Avinatan Hassidim
11:15am|S-101

Getting the deterministic complexity closer to the best known randomized complexity is an important goal in algorithms and communication protocols. In this work, we investigate the case where instead of one input, the algorithm/protocol is given...

Dec
08
2008

Computer Science/Discrete Mathematics Seminar I

Convergent Sequences of Sparse Graphs
Bela Bollobas
11:15am|S-101

Recently, Borgs, Chayes, Lovasz, Sos, Szegedy and Vesztergombi introduced a natural metric on the space of dense graphs, and identified the completion of the metric space that arises. Independently and simultaneously, Janson, Riordan and I defined a...

Dec
15
2008

Computer Science/Discrete Mathematics Seminar I

Direct-Product Testing, and a New 2-Query PCPs
11:15am|S-101

The ``direct product code'' of a function $f$ gives its values on all $k$-tuples $(f(x_1),\dots,f(x_k))$. This basic construct underlies “hardness amplification” in cryptography, circuit complexity and PCPs. A recent breakthrough by Dinur and...

Jan
19
2009

Computer Science/Discrete Mathematics Seminar I

Noise-Resilient Group Testing: Limitations and Constructions
Mahdi Cheraghchi
11:15am|S-101

We study combinatorial group testing schemes for learning d-sparse boolean vectors using highly unreliable disjunctive measurements. We consider an adversarial noise model that only limits the number of false observations, and show that any noise...

Jan
26
2009

Computer Science/Discrete Mathematics Seminar I

The Limits of Advice
11:15am|S-101

Since the work of Karp and Lipton in the 1980s, complexity theorists know and love the /poly operator, which adds a polynomial-sized advice string to any complexity class. But it's interesting to consider much more general kinds of "advice objects"...

Feb
09
2009

Computer Science/Discrete Mathematics Seminar I

On P vs NP, Geometric Complexity Theory, and the Riemann Hypothesis
Ketan Mulmuley
11:15am|S-101

This series of three talks will give a nontechnical, high level overview of geometric complexity theory (GCT), which is an approach to the P vs. NP problem via algebraic geometry, representation theory, and the theory of a new class of quantum...

Feb
16
2009

Computer Science/Discrete Mathematics Seminar I

Approximating Submodular Functions Everywhere
Nick Harvey
11:15am|S-101

Submodular functions are a key concept in combinatorial optimization. Algorithms that involve submodular functions usually assume that they are given by a (value) oracle. Many interesting problems involving submodular functions can be solved using...

Feb
23
2009

Computer Science/Discrete Mathematics Seminar I

The Convergence of Bird Flocking
11:15am|West Bldg. Lecture Hall

We bound the time it takes for a group of birds to reach steady state in a standard flocking model. We prove that (i) within single exponential time fragmentation ceases and each bird settles on a fixed flying direction; (ii) the flocking network...

Mar
02
2009

Computer Science/Discrete Mathematics Seminar I

Finding Sparse Cuts Locally Using Evolving Sets
Yuval Peres
11:15am|S-101

A local graph partitioning algorithm finds a set of vertices with small conductance (i.e. a sparse cut) by adaptively exploring part of a large graph $G$, starting from a specified vertex. For the algorithm to be local, its complexity must be...

Mar
09
2009

Computer Science/Discrete Mathematics Seminar I

NP and MA Do Not Contain coNP in Multiparty Communication Complexity
Dmitry Gavinsky
11:15am|S-101

We prove that NP is different from coNP and coNP is not a subset of MA in the number-on-forehead model of multiparty communication complexity for up to k=(1 - e)log(n) players, where e>0 is any constant. Prior to our work, the problem was open even...

Mar
16
2009

Computer Science/Discrete Mathematics Seminar I

Simple Algorithms for Sequential k-Independent Graphs
11:15am|S-101

The local ratio framework introduced by Bar Yehuda and Evan in 1981 provides a unified framework for many approximation algorithms. Recently, the local ratio technique has been used to provide efficient approximation algorithms for a number of...

Mar
23
2009

Computer Science/Discrete Mathematics Seminar I

Symmetry and Approximability of Submodular Maximization Problems
11:15am|S-101

A number of recent results on optimization problems involving submodular functions have made use of the "multilinear relaxation" of the problem. I will show a general approach to deriving inapproximability results in the value oracle model, based on...