Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Oct
31
2011

Computer Science/Discrete Mathematics Seminar I

Mantel's Theorem for Random Graphs
Jeff Kahn
11:15am|S-101

For a graph $G$, let $t(G)$ (resp. $b(G)$) denote the maximum size of a triangle-free (resp. bipartite) subgraph of $G$. Of course $t(G) \geq b(G)$ for any $G$, and a classic result of Mantel from 1907 (the first case of Turan’s Theorem) says $t(K_n...

Nov
07
2011

Computer Science/Discrete Mathematics Seminar I

How Bad is Forming Your Own Opinion
Sigal Oren
11:15am|S-101

A long-standing line of work in economic theory has studied models by which a group of people in a social network, each holding a numerical opinion, can arrive at a shared opinion through repeated averaging with their neighbors in the network...

Nov
14
2011

Computer Science/Discrete Mathematics Seminar I

Polynomial Time Algorithms for Multi-Type Branching Processes and Stochastic Context-Free Grammars
Mihalis Yannakakis
11:15am|S-101

We show that one can approximate the least fixed point solution for a multivariate system of monotone probabilistic polynomial equations in time polynomial in both the encoding size of the system of equations and in log(1/epsilon), where epsilon > 0...

Nov
21
2011

Computer Science/Discrete Mathematics Seminar I

An Isoperimetric Inequality for the Hamming Cube and Integrality Gaps in Bounded-Degree Graphs
Siavosh Benabbas
11:15am|S-101

In 1970s Paul Erdos asked the following question: Consider all the boolean strings of length n. Assume that one has chosen a subset S of the strings such that no two chosen strings are different in precisely n/4 (or its closest even integer)...

Nov
28
2011

Computer Science/Discrete Mathematics Seminar I

Entropy-Based Bounds on Dimension Reduction in L_1
11:15am|S-101

We show that there exists an $N$-point subset of $L_1$ such that for every $D > 1$, embedding it into $\ell^d_1$ with distortion $D$ requires dimension $d$ at least $N^{\Omega(1/D^2)}$, and that for every $\epsilon > 0$ there exists an $N$-point...

Dec
05
2011

Computer Science/Discrete Mathematics Seminar I

Towards Coding for Maximum Errors in Interactive Communication
11:15am|S-101

We show that it is possible to encode any communication protocol between two parties so that the protocol succeeds even if a (1/4-epsilon) fraction of all symbols transmitted by the parties are corrupted adversarially, at a cost of increasing the...

Dec
12
2011

Computer Science/Discrete Mathematics Seminar I

Monotone Unification Problems
11:15am|S-101

Given two monotone polynomials f,g, their unifier is a pair of monotone polynomials u,v such that f=cu+v and g=u+cv, for some c>0. The problem I will discuss is: can we have monotone polynomials f,g which have a unifier, they can be computed by a...

Jan
23
2012

Computer Science/Discrete Mathematics Seminar I

An Optimal Lower Bound for File Maintenance
11:15am|S-101

In the file maintenance problem, n integer items from the set {1,....,r} are to be stored in an array of size m>=n . The items are presented sequentially in an arbitrary order and must be stored in the array in sorted order (but not necessarily in...

Jan
30
2012

Computer Science/Discrete Mathematics Seminar I

Nearly Optimal Deterministic Algorithms Via M-Ellipsoids
Santosh Vempala
11:15am|S-101

Milman's ellipsoids play an important role in modern convex geometry. Here we show that their proofs of existence can be turned into efficient algorithms, and these in turn lead to improved deterministic algorithms for volume estimation of convex...

Feb
06
2012

Computer Science/Discrete Mathematics Seminar I

Graphlets: A Spectral Perspective for Graph Limits
Fan Chung
11:15am|S-101

To examine the limiting behavior of graph sequences, many discrete methods meet their continuous counterparts, leading to numerous theoretical and applicable advancements. For dense graph sequences, the graph limits have recently been well developed...

Feb
13
2012

Computer Science/Discrete Mathematics Seminar I

High-Confidence Predictions under Adversarial Uncertainty
11:15am|S-101

We study the setting in which the bits of an unknown infinite binary sequence x are revealed sequentially to an observer. We show that very limited assumptions about x allow one to make successful predictions about unseen bits of x . Our main focus...

Feb
20
2012

Computer Science/Discrete Mathematics Seminar I

Lasserre Hierarchy, Higher Eigenvalues, and Graph Partitioning
Venkat Guruswami
11:15am|S-101

Partitioning the vertices of a graph into two (roughly) equal parts to minimize the weight of edges cut is a fundamental optimization problem, arising in diverse applications. Despite intense research, there remains a huge gap in our understanding...

Feb
27
2012

Computer Science/Discrete Mathematics Seminar I

An Additive Combinatorics Approach to the Log-Rank Conjecture in Communication Complexity
Noga Zewi
11:15am|S-101

For a {0,1}-valued matrix M let CC(M) denote he deterministic communication complexity of the boolean function associated with M. The log-rank conjecture of Lovasz and Saks [FOCS 1988] states that CC(M) <= log^c(rank(M)) for some absolute constant c where rank(M) denotes the rank of M over the field of real numbers. We show that CC(M) <= c rank(M)/logrank(M) for some absolute constant c, assuming a well-known conjecture from additive combinatorics, known as the Polynomial Freiman-Ruzsa (PFR) conjecture. Our proof is based on the study of the "approximate duality conjecture" which was recently suggested by Ben-Sasson and Zewi [STOC 2011] and studied there in connection to the PFR conjecture. First we improve the bounds on approximate duality assuming the PFR conjecture. Then we use the approximate duality conjecture (with improved bounds) to get the aforementioned upper bound on the communication complexity of low-rank martices, and this part uses the methodology suggested by Nisan and Wigderson [Combinatorica 1995]. This is joint work with Eli Ben-Sasson and Shachar Lovett.

Mar
05
2012

Computer Science/Discrete Mathematics Seminar I

The Complexity of Distributions
11:15am|S-101

Complexity theory, with some notable exceptions, typically studies the complexity of computing a function h(x) of a *given* input x. We advocate the study of the complexity of generating -- or sampling -- the output distribution h(x) for random x...

Mar
12
2012

Computer Science/Discrete Mathematics Seminar I

Computational Aspects in the Braid Group and Applications to Cryptography
11:15am|West Bldg. Lecture Hall

The braid group on n strands may be viewed as an infinite analog of the symmetric group on n elements with additional topological phenomena. It appears in several areas of mathematics, physics and computer sciences, including knot theory, algebraic...

Mar
19
2012

Computer Science/Discrete Mathematics Seminar I

Optimal Estimators for Entropy, Support Size, and Related Properties
Gregory Valiant
11:15am|S-101

In joint work with Paul Valiant, we consider the tasks of estimating a broad class of statistical properties, which includes support size, entropy, and various distance metrics between pairs of distributions. Our estimators are the first proposed...

Mar
26
2012

Computer Science/Discrete Mathematics Seminar I

Hardness of Randomized Truthful Mechanisms for Combinatorial Auctions
11:15am|S-101

The problem of combinatorial auctions is one of the basic questions in algorithmic mechanism design: how can we allocate/sell m items to n agents with private valuations of different combinations of items, so that the agents are motivated to reveal...

Apr
02
2012

Computer Science/Discrete Mathematics Seminar I

Rational Proofs
Pablo Azar
11:15am|S-101

We study a new type of proof system, where an unbounded prover and a polynomial time verifier interact, on inputs a string $x$ and a function $f$, so that the Verifier may learn $f(x)$. The novelty of our setting is that there no longer are ``good"...

Apr
16
2012

Computer Science/Discrete Mathematics Seminar I

Near-Linear Time Approximation Algorithm for Balanced Separator
11:15am|S-101

The goal of the Balanced Separator problem is to find a balanced cut in a given graph G(V,E), while minimizing the number of edges that cross the cut. It is a fundamental problem with applications in clustering, image segmentation, community...

Apr
23
2012

Computer Science/Discrete Mathematics Seminar I

Computational Entropy
11:15am|S-101

Shannon's notion of entropy measures the amount of "randomness" in a process. However, to an algorithm with bounded resources, the amount of randomness can appear to be very different from the Shannon entropy. Indeed, various measures of...

Apr
30
2012

Computer Science/Discrete Mathematics Seminar I

Randomized Greedy Algorithms for the Maximum Matching Problem with New Analysis
11:15am|S-101

It is a long-standing problem to lower bound the performance of randomized greedy algorithms for maximum matching. Aronson, Dyer, Frieze and Suen in1995 studied the modified randomized greedy (MRG) algorithm and proved that it approximates the...

May
07
2012

Computer Science/Discrete Mathematics Seminar I

Topology of Norms Defined by Systems of Linear forms
11:15am|S-101

Gowers' uniformity norms are defined by average of a function over specific sets of linear forms. We study norms that are similarly defined by a system of linear forms. We prove that for bounded complex functions over $F_p^n$, each such norm is...

May
14
2012

Computer Science/Discrete Mathematics Seminar I

Are Lattice Based Cryptosystems Secure Enough?
Nisheeth Vishnoi
11:15am|S-101

The security of several cryptosystems is based on our apparent inability to solve the following computational problem: given as input a basis B for a lattice and a target vector t , find the lattice point closest to t. This problem, referred to as...

Sep
24
2012

Computer Science/Discrete Mathematics Seminar I

The Computational Complexity of Geometric Topology Problems
Greg Kuperberg
11:15am|S-101

This talk will be a partial survey of the first questions in the complexity theory of geometric topology problems. What is the complexity, or what are known complexity bounds, for distinguishing n-manifolds for various n? For distinguishing knots...

Oct
01
2012

Computer Science/Discrete Mathematics Seminar I

Random Vectors, Random Matrices, Permuted Products, Permanents, and Diagrammatic Fun
Cris Moore
11:15am|S-101

If $x$, $y$, and $z$ are random vectors, what is the expectation of the product of their inner products, $\langle x,y \rangle$, $\langle y, z \rangle$, $\langle z, x\rangle$? If $U$ and $V$ are random unitary matrices, what is the expected trace of...

Oct
08
2012

Computer Science/Discrete Mathematics Seminar I

Identity Testing of Tensors, Low Rank Recovery and Compressed Sensing
Amir Shpilka
11:15am|S-101

A matrix A naturally defines a quadratic form x^tAy. If A is of rank <=r, then the rank<=r decomposition of A corresponds naturally to a size ~2nr circuit for computing the quadratic form. It is clear how to perform "white box" polynomial identity testing for such circuits, and the motivating question for this work is to explore black-box identity testing. The probabilistic method shows that there is a size ~2nr hitting set for such polynomials. In this work we match this bound (over large fields), which is optimal up to constant factors. Further, we explore how A can be reconstructed from the evaluations of the quadratic form. Similar probabilistic constructions show that there exist ~4nr evaluations which determine any such matrix A. Again, we match this bound (over large fields) with an explicit construction, and furthermore give a polynomial-time algorithm to reconstruct A from such evaluations. More generally, we show an efficient reduction from (exact) low-rank matrix reconstruction to (exact) sparse recovery. This reduction is novel in the compressed-sensing realm as it is field independent and unrelated to convex optimization. Finally, using matrices as a base case we also derive a quasi-polynomial hitting set for higher-order tensors. Joint work with Michael Forbes.

Oct
15
2012

Computer Science/Discrete Mathematics Seminar I

A Multi-Prover Interactive proof for NEXP Sound Against Entangled Provers
Tsuyoshi Ito
11:15am|S-101

We prove a strong limitation on the ability of entangled provers to collude in a multiplayer game. Our main result is the first nontrivial lower bound on the class MIP* of languages having multi-prover interactive proofs with entangled provers...

Oct
29
2012

Computer Science/Discrete Mathematics Seminar I

Combinatorial Walrasian Equilibrium
Michal Feldman
11:15am|S-101

We study algorithms for combinatorial market design problems, where a collection of objects are priced and sold to potential buyers subject to equilibrium constraints. We introduce the notion of a combinatorial Walrasian equilibrium (CWE) as a...

Nov
19
2012

Computer Science/Discrete Mathematics Seminar I

A Complete Dichotomy Rises from the Capture of Vanishing Signatures
Jin-Yi Cai
11:15am|S-101

Holant Problems are a broad framework to describe counting problems. The framework generalizes counting Constraint Satisfaction Problems and partition functions of Graph Homomorphisms. We prove a complexity dichotomy theorem for Holant problems over...

Nov
26
2012

Computer Science/Discrete Mathematics Seminar I

Polynomial Identity Testing of Read-Once Oblivious Algebraic Branching Progress
11:15am|S-101

Polynomial Identity Testing (PIT) is the problem of identifying whether a given algebraic circuit computes the identically zero polynomial. It is well-known that this problem can be solved with small error probability by testing whether the circuit...

Dec
03
2012

Computer Science/Discrete Mathematics Seminar I

Information Complexity and Exact Communication Bounds
11:15am|S-101

In this talk we will discuss information complexity -- a measure of the amount of information Alice and Bob need to exchange to solve a problem over distributed inputs. We will present an information-theoretically optimal protocol for computing the...

Dec
10
2012

Computer Science/Discrete Mathematics Seminar I

Matching: A New Proof for an Ancient Algorithm
Vijay Vazirani
11:15am|S-101

For all practical purposes, the Micali-Vazirani algorithm, discovered in 1980, is still the most efficient known maximum matching algorithm (for very dense graphs, slight asymptotic improvement can be obtained using fast matrix multiplication)...

Jan
14
2013

Computer Science/Discrete Mathematics Seminar I

On Bilinear Complexity
11:15am|S-101

For a set of polynomials F, we define their bilinear complexity as the smallest k so that F lies in an ideal generated by k bilinear polynomials. The main open problem is to estimate the bilinear complexity of the single polynomial $\sum_{i,j}x_i^2...

Jan
21
2013

Computer Science/Discrete Mathematics Seminar I

Clique Number of Random Geometric Graphs in High Dimension
Sebastien Bubeck
11:15am|S-101

In small dimension a random geometric graph behaves very differently from a standard Erdös-Rényi random graph. On the other hand, when the dimension tends to infinity (with the number of vertices being fixed) both models coincide. In this talk we...

Jan
28
2013

Computer Science/Discrete Mathematics Seminar I

New Independent Source Extractors with Exponential Improvement
Xin Li
11:15am|S-101

We study the problem of constructing extractors for independent weak random sources. The probabilistic method shows that such an extractor exists for two sources on n bits with min-entropy k >= 2 log n. On the other hand, explicit constructions are...

Feb
04
2013

Computer Science/Discrete Mathematics Seminar I

Influences, Traces, Tribes, and Perhaps Also Thresholds
11:15am|S-101

I will describe some recent results and problems regarding influence of sets of variables on Boolean functions: In 1989 Benny Chor conjectured that a balanced Boolean function with n variables has a subset S of size 0.4n with influence (1-c^n) where...

Feb
11
2013

Computer Science/Discrete Mathematics Seminar I

Mathematical Theories of Interaction with Oracles: Active Property Testing and New Models for Learning Boolean Functions
Liu Yang
11:15am|S-101

With the notion of interaction with oracles as a unifying theme of much of my dissertation work, I discuss novel models and results for property testing and computational learning, with the use of Fourier analytic and probabilistic methods. One...

Feb
25
2013

Computer Science/Discrete Mathematics Seminar I

Polar Codes and Randomness Extraction for Structured Sources
11:15am|S-101

Polar codes have recently emerged as a new class of low-complexity codes achieving Shannon capacity. This talk introduces polar codes with emphasis on the probabilistic phenomenon underlying the code construction. New results and connections to...

Mar
04
2013

Computer Science/Discrete Mathematics Seminar I

Quasirandom Hypergraphs
Dhruv Mubayi
11:15am|S-101

Since the foundational results of Thomason and Chung-Graham-Wilson on quasirandom graphs over 20 years ago, there has been a lot of effort by many researchers to extend the theory to hypergraphs. I will present some of this history, and then...

Mar
11
2013

Computer Science/Discrete Mathematics Seminar I

Intractability in Algorithmic Game Theory
Tim Roughgarden
11:15am|S-101

We discuss three areas of algorithmic game theory that have grappled with intractability. The first is the complexity of computing game-theoretic equilibria, like Nash equilibria. There is an urgent need for new ideas on this topic, to enable...

Mar
18
2013

Computer Science/Discrete Mathematics Seminar I

Constant Rate PCPs for Circuit-SAT with Sublinear Query Complexity
11:15am|S-101

The PCP theorem (Arora et. al., J. ACM 45(1,3)) says that every NP-proof can be encoded to another proof, namely, a probabilistically checkable proof (PCP), which can be tested by a verifier that queries only a small part of the PCP. A natural...

Mar
25
2013

Computer Science/Discrete Mathematics Seminar I

New Locally Decodable Codes from Lifting
Madhu Sudan
11:15am|S-101

Locally decodable codes (LDCs) are error-correcting codes that allow for highly-efficient recovery of "pieces" of information even after arbitrary corruption of a codeword. Locally testable codes (LTCs) are those that allow for highly-efficient...

Apr
01
2013

Computer Science/Discrete Mathematics Seminar I

Device Independence: A New Paradigm for Randomness Manipulation?
Thomas Vidick
11:15am|S-101

A trusted source of independent and uniform random bits is a basic resource in many computational tasks, such as cryptography, game theoretic protocols, algorithms and physical simulations. Implementing such a source presents an immediate challenge...