Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Mar
23
2009

Computer Science/Discrete Mathematics Seminar I

Symmetry and Approximability of Submodular Maximization Problems
11:15am|S-101

A number of recent results on optimization problems involving submodular functions have made use of the "multilinear relaxation" of the problem. I will show a general approach to deriving inapproximability results in the value oracle model, based on...

Apr
06
2009

Computer Science/Discrete Mathematics Seminar I

Public Key Cryptography from Different Assumptions
Benny Applebaum
11:15am|S-101

This work attempts to broaden the foundations of public-key cryptography. We construct a new public key encryption based on two “hardness on average” assumptions: (1) it is hard to “learn parity with noise” for random sparse equations; and (2) it is...

Apr
13
2009

Computer Science/Discrete Mathematics Seminar I

Bounded Independence Fools Halfspaces
11:15am|S-101

A halfspace (a.k.a. threshold) is a boolean function h : {-1,1}^n --> {-1,1} of the form h(x) = sign(w_0 + w_1 x_1 + ... + w_n x_n), where the weights w_i are arbitrary real numbers. Halfspaces are studied extensively in the theories of complexity...

Apr
20
2009

Computer Science/Discrete Mathematics Seminar I

The Constant-Depth Complexity of k-Clique
Ben Rossman
11:15am|S-101

I will discuss a lower bound of $\omega(n^(k/4))$ on the size of constant-depth $(AC_0)$ circuits solving the k-clique problem on n-vertex graphs. This bound follows from a stronger result that $AC_0$ circuits of size $O(n^(k/4))$ almost surely fail...

Apr
27
2009

Computer Science/Discrete Mathematics Seminar I

Values and Patterns
Alon Orlitsky
11:15am|S-101

Via four applications: distribution modeling, probability estimation, data compression, and classification, we argue that when learning from data, discrete values should be ignored except for just their appearance-order pattern. Along the way, we...

May
04
2009

Computer Science/Discrete Mathematics Seminar I

Lower Bounds for Randomized Communication Complexity
Mike Saks
11:15am|S-101

We prove lower bounds on the randomized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula F is a propositional formula in which each variable appears exactly once. Such a formula...

May
11
2009

Computer Science/Discrete Mathematics Seminar I

SDP Integrality Gaps with Local L1-Embeddability
11:15am|S-101

I will present a construction of an n-point negative type metric such that every t-point sub-metric is isometrically L1-embeddable, but embedding the whole metric into L1 incurs distortion at least k, where both t and k are (\log\log\log n)^{\Omega...

May
18
2009

Computer Science/Discrete Mathematics Seminar I

The Density Hales-Jewett Theorem and Open-Source Mathematics
11:15am|S-101

On Feb. 1, in his blog, Tim Gowers proposed an open collaboration on a math problem. Specifically, he suggested working on a combinatorial proof of the Density Hales-Jewett Theorem. This theorem states that for every delta > 0, if n is sufficiently...

May
26
2009

Computer Science/Discrete Mathematics Seminar I

On the Complexity of Boolean Functions in Different Characteristics
Amir Shpilka
2:00pm|S-101

Every Boolean function on n variables can be expressed as a unique multivariate polynomial modulo p for every prime p. In this work, we study how the degree of a function in one characteristic affects its complexity in other characteristics. We...

Jun
08
2009

Computer Science/Discrete Mathematics Seminar I

Quasi-One-Way Functions
11:15am|S-101

Ideally, one would want to base the security of standard cryptographic primitives (such as pseudorandom generators) on widely believed worst-case complexity assumptions like P does not equal NP. However, it is currently not known if this is possible...

Sep
14
2009

Computer Science/Discrete Mathematics Seminar I

Blackbox Polynomial Identity Testing for Depth 3 Circuits
11:15am|S-101

I will talk about a recent work describing a deterministic polynomial time algorithm for blackbox identity testing for depth three circuits with bounded top fanin over the field of rational numbers. This resolves a question posed by Klivans and...

Oct
05
2009

Computer Science/Discrete Mathematics Seminar I

The Detectability Lemma and Quantum Gap Amplification
Itai Arad
11:15am|S-101

Constraint Satisfaction Problems appear everywhere. The study of their quantum analogues (in which the constraints no longer commute), has become a lively area of study, and various recent results provide interesting insights into quantum physics...

Oct
19
2009

Computer Science/Discrete Mathematics Seminar I

PCPs of Sub-Constant Error Via Derandomized Direct Product
11:15am|S-101

A PCP is a proof system in which the proofs that can be verified by a verifier that reads only a very small part of the proof. One line of research concerning PCPs is trying to reduce their soundness error (i.e., the probability of accepting false...

Nov
02
2009

Computer Science/Discrete Mathematics Seminar I

Grothendieck Inequalities, XOR Games, and Communication Complexity
Troy Lee
11:15am|S-101

An XOR game is a very simple model of evaluating a distributed function f(x,y) . With probability p(x,y) a Verifier sends questions x, y to Alice and Bob, respectively. Without communicating, Alice and Bob then output a, b in {-1,+1} in the hope...

Nov
09
2009

Computer Science/Discrete Mathematics Seminar I

Why Sex?
Adi Livnat
11:15am|S-101

Sex has been called "the queen of problems in evolutionary biology" since it is pervasive in nature yet its functional significance has not been known. It has often been assumed that the shuffling of genes due to sex is an adaptation that...

Nov
23
2009

Computer Science/Discrete Mathematics Seminar I

Privacy of Dynamic Data: Continual Observation and Pan Privacy
Moni Naor
11:15am|S-101

Research in the area of privacy of data analysis has been flourishing recently, with a rigorous notion such as differential privacy regarding the desired level of privacy and sanitizing algorithms matching the definition for many problems. Most of...

Dec
07
2009

Computer Science/Discrete Mathematics Seminar I

The NOF Communication Complexity of Multiparty Pointer Jumping
Joshua Brody
11:15am|S-101

We give new results on the number-on-the-forhead (NOF) communication complexity of the multiparty pointer jumping problem. The origional motivation for this problem comes from circuit complexity. Specifically, there is no explicit function known to...

Dec
14
2009

Computer Science/Discrete Mathematics Seminar I

A Parallel Repetition Theorem for Any Interactive Argument
Iftach Ilan Haitner
11:15am|S-101

The question whether or not parallel repetition reduces the soundness error is a fundamental question in the theory of protocols. While parallel repetition reduces (at an exponential rate) the error in interactive proofs and (at a weak exponential...

Jan
25
2010

Computer Science/Discrete Mathematics Seminar I

Expanders and Communication-Avoiding Algorithms
Oded Schwartz
11:15am|S-101

Algorithms spend time on performing arithmetic computations, but often more on moving data, between the levels of a memory hierarchy and between parallel computing entities. Judging by the hardware evolution of the last few decades, the fraction of...

Feb
08
2010

Computer Science/Discrete Mathematics Seminar I

Interpreting Polynomial Structure Analytically
11:15am|S-101

I will be describing recent joint efforts with Tim Gowers to decompose a bounded function into a sum of polynomially structured phases and a uniform error, based on the recent inverse theorem for the U^k norms on F_p^n by Bergelson, Tao and Ziegler...

Feb
15
2010

Computer Science/Discrete Mathematics Seminar I

Graph Expansion and the Unique Games Conjecture
11:15am|S-101

The Unique Games Conjecture (Khot, 2002) is a central open question about hardness of approximation. In recent years, a sequence of works showed that the truth of this conjecture would have profound implications: If the conjecture is true, then...

Feb
22
2010

Computer Science/Discrete Mathematics Seminar I

Average Sensitivity of Polynomial Threshold Functions
Rocco Servedio
11:15am|S-101

How many edges of the n-dimensional Boolean hypercube can be sliced by a degree-d polynomial surface? This question can be equivalently stated as "What is the maximum average sensitivity of any degree-d polynomial threshold function?" In 1994...

Mar
01
2010

Computer Science/Discrete Mathematics Seminar I

A Theory of Cryptographic Complexity
Manoj M. Prabhakaran
11:15am|S-101

In this talk, I shall describe an ongoing project to develop a complexity theory for cryptographic (multi-party computations. Different kinds of cryptographic computations involve different constraints on how information is accessed. Our goal is to...

Mar
08
2010

Computer Science/Discrete Mathematics Seminar I

Behavioral Experiments in Strategic Networks
Michael Kearns
11:15am|S-101

For four years now, we have been conducting "medium-scale" experiments in how human subjects behave in strategic and economic settings mediated by an underlying network structure. We have explored a wide range of networks inspired by generative...

Mar
15
2010

Computer Science/Discrete Mathematics Seminar I

Extremal Problems for Convex Lattice Polytopes
Imre Barany
11:15am|West Bldg. Lecture Hall

In this survey I will present several extremal problems, and some solutions, concerning convex lattice polytopes. A typical example is to determine the smallest area that a convex lattice polygon can have if it has exactly n vertices.

Mar
22
2010

Computer Science/Discrete Mathematics Seminar I

Product Rules in Semidefinite Programming
Rajat Mittal
11:15am|S-101

Semidefinite programming bounds are widely used in combinatorial optimization, quantum computing and complexity theory. The first semidefinite programming bound to gain fame is the so-called theta number developed by Lov\'asz to compute the Shannon...

Apr
05
2010

Computer Science/Discrete Mathematics Seminar I

Compressing Bounded-Round Communication
11:15am|S-101

In this talk we will present a near-optimal compression scheme for bounded-round randomized 2-party communication protocols. Previously, such a scheme was only known for protocols where the inputs to the parties are independent. The results yield a...

Apr
12
2010

Computer Science/Discrete Mathematics Seminar I

Cover Times, Blanket Times, and Majorizing Measures
11:15am|S-101

The cover time of a graph is one of the most basic and well-studied properties of the simple random walk, and yet a number of fundamental questions concerning cover times have remained open. We show that there is a deep connection between cover...

Apr
19
2010

Computer Science/Discrete Mathematics Seminar I

Can Complexity Theory Ratify the Invisible Hand of the Market?
Vijay Vazirani
11:15am|S-101

*It is not from the benevolence of the butcher, the brewer, or the baker, that we expect our dinner, but from their regard for their own interest. Each participant in a competitive economy is led by an invisible hand to promote an end which was no...

May
24
2010

Computer Science/Discrete Mathematics Seminar I

Subsampling Mathematical Relaxations and Average-case Complexity
11:15am|S-101

We consider the following two questions: 1) Is the MAX-CUT problem hard on random geometric graphs of the type considered by Feige and Schechtman (2002)? 2) Is the value of a mathematical relaxation such as semi- definite programming (SDP) for a...

Sep
20
2010

Computer Science/Discrete Mathematics Seminar I

Dependent Random Choice and Approximate Sidorenko's Conjecture
Benny Sudakov
11:15am|S-101

A beautiful conjecture of Erd\H{o}s-Simonovits and Sidorenko states that if $H$ is a bipartite graph, then the random graph with edge density $p$ has in expectation asymptotically the minimum number of copies of $H$ over all graphs of the same order...

Sep
27
2010

Computer Science/Discrete Mathematics Seminar I

The Condition Number of a Random Matrix: From von Neumann-Goldstine to Spielman-Teng
11:15am|S-101

The condition number of a matrix is at the heart of numerical linear algebra. In the 1940s von-Neumann and Goldstine, motivated by the problem of inverting, posed the following question: (1) What is the condition number of a random matrix ? During...

Oct
04
2010

Computer Science/Discrete Mathematics Seminar I

Super-uniformity of the typical billiard path (proof included)
Jozsef Beck
11:15am|S-101

I will describe the proof of the following surprising result: the typical billiard paths form the family of the most uniformly distributed curves in the unit square. I will justify this vague claim with a precise statement. As a byproduct, we obtain...

Oct
11
2010

Computer Science/Discrete Mathematics Seminar I

The Complexity of the Non-commutative Determinant
11:15am|S-101

I will talk about the computational complexity of computing the noncommutative determinant. In contrast to the case of commutative algebras, we know of (virtually) no efficient algorithms to compute the determinant over non-commutative domains. Our...

Oct
18
2010

Computer Science/Discrete Mathematics Seminar I

A Unified Framework for Testing Linear-Invariant Properties
Arnab Bhattacharyya
11:15am|S-101

In a sequence of recent papers, Sudan and coauthors have investigated the relation between testability of properties of Boolean functions and the invariance of the properties with respect to transformations of the domain. Linear-invariance is...

Nov
01
2010

Computer Science/Discrete Mathematics Seminar I

On the Structure of Cubic and Quartic Polynomials
Elad Haramaty
11:15am|S-101

In our work we study the structure of polynomials of degree three and four that have high bias or high Gowers norm, over arbitrary prime fields. In particular we obtain the following results. 1. We give a canonical representation for degree three or...

Nov
08
2010

Computer Science/Discrete Mathematics Seminar I

The Graph Removal Lemma
Jacob Fox
11:15am|S-101

Let H be a fixed graph with h vertices. The graph removal lemma states that every graph on n vertices with o(n^h) copies of H can be made H-free by removing o(n^2) edges. We give a new proof which avoids Szemeredi's regularity lemma and gives a...