Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

Apr
15
2013

Computer Science/Discrete Mathematics Seminar I

Analytical Approach to Parallel Repetition
Irit Dinur
11:15am|S-101

We propose an “analytical” framework for studying parallel repetitions of one-round two-prover games. We define a new relaxation of the value of a game, val+, and prove that it is both multiplicative and a good approximation for the true value of...

Apr
22
2013

Computer Science/Discrete Mathematics Seminar I

Diffuse Decompositions of Polynomials
Daniel Kane
11:15am|S-101

We study some problems relating to polynomials evaluated either at random Gaussian or random Bernoulli inputs. We present some new work on a structure theorem for degree-d polynomials with Gaussian inputs. In particular, if p is a given degree-d...

Apr
29
2013

Computer Science/Discrete Mathematics Seminar I

Cryptography and Preventing Collusion in Second Price (Vickery) Auctions
Michael Rabin
11:15am|S-101

We present practically efficient methods for proving correctness of announced results of a computation while keeping input and intermediate values information theoretically secret. These methods are applied to solve the long standing problem of...

May
06
2013

Computer Science/Discrete Mathematics Seminar I

Tight Bounds for Set Disjointness in the Message-Passing Model
Rotem Oshman
11:15am|S-101

In many distributed systems, the cost of computation is dominated by the cost of communication between the machines participating in the computation. Communication complexity is therefore a very useful tool in understanding distributed computation...

May
13
2013

Computer Science/Discrete Mathematics Seminar I

Nondeterministic Direct Product Reductions and the Success Probability of SAT Solvers
10:30am|S-101

In this talk I will describe nondeterministic reductions which yield new direct product theorems (DPTs) for Boolean circuits. In our theorems one assumes that a function F is "mildly hard" against *nondeterministic* circuits of some size s(n) , and...

May
13
2013

Computer Science/Discrete Mathematics Seminar I

Association Schemes, Non-Commutative Polynomials and Lasserre Lower Bounds for Planted Clique
1:30pm|S-101

Finding cliques in random graphs and the closely related "planted" clique variant, where a clique of size k is planted in a random G(n,1/2) graph, have been the focus of substantial study in algorithm design. Despite much effort, the best known...

Sep
23
2013

Computer Science/Discrete Mathematics Seminar I

Using the DFS Algorithm for Finding Long Paths in Random and Pseudo-Random Graphs
11:15am|S-101

The Depth First Search (DFS) algorithm is one of the most standard graph exploration algorithms, used normally to find the connected components of an input graph. Though perhaps less popular than its sister algorithm, Breadth First Search (BFS), the...

Sep
30
2013

Computer Science/Discrete Mathematics Seminar I

Some provable bounds for deep learning
11:15am|S-101

Deep learning, a modern version of neural nets, is increasingly seen as a promising way to implement AI tasks such as speech recognition and image recognition. Most current algorithms are heuristic and have no provable guarantees. This talk will...

Oct
07
2013

Computer Science/Discrete Mathematics Seminar I

Stanley-Wilf limits are typically exponential
Jacob Fox
11:15am|S-101

For a permutation \(p\), let \(S_n(p)\) be the number of permutations on \(n\) letters avoiding \(p\). Stanley and Wilf conjectured that, for each permutation \(p\), \(S_n(p)^{1/n}\) tends to a finite limit \(L(p)\). Marcus and Tardos proved the...

Oct
14
2013

Computer Science/Discrete Mathematics Seminar I

Obfuscating Programs Against Algebraic Attacks
Yael Tauman-Kalai
11:15am|S-101

The goal of (general-purpose) program obfuscation is to make an arbitrary computer program "unintelligible" while preserving its functionality. The problem of program obfuscation is well studied both in theory and in practice. Though despite its...

Oct
21
2013

Computer Science/Discrete Mathematics Seminar I

Fractional covering numbers, with an application to the Levi-Hadwiger conjecture for convex bodies
Boaz Slomka
11:15am|S-101

Let \(K\) and \(T\) be convex bodies in the \(n\)-dimensional Euclidean space. The covering number of \(K\) by \(T\) is the minimal number of translates of \(T\) required to cover \(K\) entirely. One open question regarding this classical notion is...

Nov
04
2013

Computer Science/Discrete Mathematics Seminar I

Approximating large frequency moments with pick-and-drop sampling
Vladimir Braverman
11:15am|West Bldg. Lect. Hall

Given data stream \(D = \{p_1,p_2,...,p_m\}\) of size \(m\) of numbers from \(\{1,..., n\}\), the frequency of \(i\) is defined as \(f_i = |\{j: p_j = i\}|\). The \(k\)-th frequency moment of \(D\) is defined as \(F_k = \sum_{i=1}^n f_i^k\). We...

Nov
11
2013

Computer Science/Discrete Mathematics Seminar I

Communication Lower Bounds via Block Sensitivity
Toni Pitassi
11:15am|S-101

We use critical block sensitivity, a new complexity measure introduced by Huynh and Nordstrom (STOC 2012) to study the communication complexity of search problems. Our main result is a simple proof that if \(S\) is a search problem with high...

Nov
18
2013

Computer Science/Discrete Mathematics Seminar I

Efficient reasoning in PAC semantics
Brendan Juba
11:15am|S-101

Machine learning is often employed as one step in a larger application, serving to perform information extraction or data mining for example. The rules obtained by such learning are then used as inputs to a further analysis. As a consequence of the...

Nov
25
2013

Computer Science/Discrete Mathematics Seminar I

Geometry and matrix multiplication
Joseph Landsberg
11:15am|S-101

Algebraic geometry and representation theory have played an important role in obtaining lower bounds in algebraic complexity theory. After giving an overview of the general set-up, I will present very recent results that indicate a possible role for...

Dec
02
2013

Computer Science/Discrete Mathematics Seminar I

A solution to Weaver's \(KS_2\)
11:15am|S-101

We will outline the proof that gives a positive solution of to Weaver's conjecture \(KS_2\). That is, we will show that any isotropic collection of vectors whose outer products sum to twice the identity can be partitioned into two parts such that...

Dec
09
2013

Computer Science/Discrete Mathematics Seminar I

How Cryptosystems Are REALLY Broken
Adi Shamir
11:15am|S-101

Most of the cryptosystems we currently use are highly secure, and cannot be broken with reasonable complexity by mathematical cryptanalysis. However, over the last fifteen years researchers have developed many types of physical attacks on their...

Dec
16
2013

Computer Science/Discrete Mathematics Seminar I

Bi-Lipschitz Bijection between the Boolean Cube and the Hamming Ball
11:15am|S-101

We construct a bi-Lipschitz bijection from the Boolean cube to the Hamming ball of equal volume. More precisely, we show that for all even \(n\), there exists an explicit bijection \(f\) from the \(n\)-dimensional Boolean cube to the Hamming ball of...

Jan
27
2014

Computer Science/Discrete Mathematics Seminar I

Unique games, the Lasserre hierarchy and monogamy of entanglement
Aram Harrow
11:15am|S-101

In this talk, I'll describe connections between the unique games conjecture (or more precisely, the closely relatedly problem of small-set expansion) and the quantum separability problem. Remarkably, not only are the problems related, but the...

Feb
03
2014

Computer Science/Discrete Mathematics Seminar I

Local Correctability of Expander Codes
Brett Hemenway
11:15am|S-101

An error-correcting code is called locally decodable if there exists a decoding algorithm that can recover any symbol of the message with high probability by reading only a small number of symbols of the corrupted codeword. There is a fundamental...

Feb
10
2014

Computer Science/Discrete Mathematics Seminar I

Polynomial Bounds for the Grid-Minor Theorem
11:15am|S-101

One of the key results in Robertson and Seymour's seminal work on graph minors is the Grid-Minor Theorem (also known as the Excluded Grid Theorem). The theorem states that any graph of treewidth at least \(k\) contains a grid minor of size \(f(k)\)...

Feb
17
2014

Computer Science/Discrete Mathematics Seminar I

Unifying known lower bounds via geometric complexity theory
Joshua Grochow
11:15am|S-101

The Geometric Complexity Theory (GCT) Program is an approach towards P versus NP and other lower bounds using algebraic geometry and representation theory. In this talk, we discuss how essentially all known algebraic circuit lower bounds and...

Feb
24
2014

Computer Science/Discrete Mathematics Seminar I

An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommodity Generalizations
11:15am|S-101

In this talk, I will describe a new framework for approximately solving flow problems in capacitated, undirected graphs, and I will apply it to find approximately maximum s-t flows in almost-linear time, improving on the best previous bound of \(...

Mar
03
2014

Computer Science/Discrete Mathematics Seminar I

The Green-Tao theorem and a relative Szemeredi theorem
Yufei Zhao
11:15am|S-101

The celebrated Green-Tao theorem states that there are arbitrarily long arithmetic progressions in the primes. In this talk, I will explain the ideas of the proof and discuss our recent simplifications. One of the main ingredients in the proof is a...

Mar
10
2014

Computer Science/Discrete Mathematics Seminar I

Two Structural Results for Low Degree Polynomials and Applications
11:15am|S-101

In this talk we will present two structural results concerning low degree polynomials over \(GF(2)\). The first states that for any degree d polynomial \(f\) in \(n\) variables over \(GF(2)\), there exists a subspace of \(GF(2)^n\) with dimension \(...

Mar
17
2014

Computer Science/Discrete Mathematics Seminar I

The matching polytope has exponential extension complexity
Thomas Rothvoss
11:15am|S-101

A popular method in combinatorial optimization is to express polytopes \(P\), which may potentially have exponentially many facets, as solutions of linear programs that use few extra variables to reduce the number of constraints down to a polynomial...

Mar
24
2014

Computer Science/Discrete Mathematics Seminar I

List decodability of randomly punctured codes
Mary Wootters
11:15am|S-101

We consider the problem of the list-decodability of error correcting codes. The well-known Johnson bound implies that any code with good distance has good list-decodability, but we do not know many structural conditions on a code which guarantee...

Mar
31
2014

Computer Science/Discrete Mathematics Seminar I

A polynomial lower bound for monotonicity testing of Boolean functions over hypercube and hypergrid domains
Rocco Servedio
11:15am|West Bldg. Lect. Hall

We prove a \(\tilde{\Omega}(n^{1/5})\) lower bound on the query complexity of any non-adaptive two-sided error algorithm for testing whether an unknown n-variable Boolean function is monotone versus constant-far from monotone. This gives an...

Apr
07
2014

Computer Science/Discrete Mathematics Seminar I

Progress on algorithmic versions of the Lovasz Local Lemma
11:15am|S-101

There has been substantial progress on algorithmic versions and generalizations of the Lovasz Local Lemma recently, with some of the main ideas getting simplified as well. I will survey some of the main ideas of Moser & Tardos, Pegden, and David...

Apr
14
2014

Computer Science/Discrete Mathematics Seminar I

Local Correctability of Expander Codes
Brett Hemenway
11:15am|S-101

An error-correcting code is called locally decodable if there exists a decoding algorithm that can recover any symbol of the message with high probability by reading only a small number of symbols of the corrupted codeword. There is a fundamental...

Apr
21
2014

Computer Science/Discrete Mathematics Seminar I

True Randomness: Its Origin and Expansion
Yaoyun Shi
11:15am|S-101

How can we produce randomness of almost perfect quality, in large quantities, and under minimal assumptions? This question is fundamental not only to modern day information processing but also to physics. Yet a satisfactory answer is still elusive...

Apr
28
2014

Computer Science/Discrete Mathematics Seminar I

Search games and Optimal Kakeya Sets
Yuval Peres
11:15am|S-101

A planar set that contains a unit segment in every direction is called a Kakeya set. These sets have been studied intensively in geometric measure theory and harmonic analysis since the work of Besicovich (1919); we find a new connection to game...

Sep
22
2014

Computer Science/Discrete Mathematics Seminar I

Colouring graphs with no odd holes
Paul Seymour
11:15am|S-101

The chromatic number \(k(G)\) of a graph \(G\) is always at least the size of its largest clique (denoted by \(w(G)\)), and there are graphs with \(w(G)=2\) and \(k(G)\) arbitrarily large. On the other hand, the perfect graph theorem asserts that if...

Sep
29
2014

Computer Science/Discrete Mathematics Seminar I

Breaking \(e^n\) barrier for deterministic poly-time approximation of the permanent and settling Friedland's conjecture on the Monomer-Dimer Entropy
11:15am|S-101

Two important breakthroughs on the permanent had been accomplished in 1998: A. Schrijver proved Schrijver-Valiant Conjecture on the minimal exponential growth of the number of perfect matchings in k-regular bipartite graphs with multiple edges; N...

Oct
06
2014

Computer Science/Discrete Mathematics Seminar I

The communication complexity of distributed subgraph detection
Rotem Oshman
11:15am|S-101

In distributed systems, communication between the participants in the computation is usually the most expensive part of the computation. Theoretical models of distributed systems usually reflect this by neglecting the cost of local computation, and...

Oct
13
2014

Computer Science/Discrete Mathematics Seminar I

Cool with a Gaussian: an \(O^*(n^3)\) volume algorithm
Santosh Vempala
11:15am|West Bldg. Lect. Hall

Computing the volume of a convex body in n-dimensional space is an ancient, basic and difficult problem (#P-hard for explicit polytopes and exponential lower bounds for deterministic algorithms in the oracle model). We present a new algorithm, whose...

Oct
27
2014

Computer Science/Discrete Mathematics Seminar I

Discretization and quantitative differentiation
11:15am|S-101

Geometric questions for discrete objects (e.g. isoperimetry, integrality gaps, embeddings) are often easier to understand by first considering an appropriate continuous analogue, using additional structure that is available in the continuous setting...

Nov
03
2014

Computer Science/Discrete Mathematics Seminar I

Information percolation for the Ising model
Eyal Lubetzky
11:15am|S-101

We introduce a new method of obtaining sharp estimates on mixing for Glauber dynamics for the Ising model, which, in particular, establishes cutoff in three dimensions up to criticality. The new framework, which considers ``information percolation''...

Nov
10
2014

Computer Science/Discrete Mathematics Seminar I

Talagrand's convolution conjecture and geometry via coupling
11:15am|S-101

Consider an image with two colors--black and white--and where only 1% of the pixels are white. If we apply a Gaussian blur, can it be that the non-black pixels of the (now greyscale) image are largely concentrated on a single shade of grey? Sure, if...

Nov
17
2014

Computer Science/Discrete Mathematics Seminar I

Mutation as a computational event
Adi Livnat
11:15am|S-101

The computational worldview is relevant to multiple fields of investigation beyond computer science, including evolutionary theory. Evolution is a creative process that generates organisms as well as behavioral programs, which can be thought of as...

Nov
24
2014

Computer Science/Discrete Mathematics Seminar I

Computational fair division
Ariel Procaccia
11:15am|S-101

I will present an exciting new interaction between computer science and fair division theory, with the goal of giving the audience a taste of different fair division challenges and the role computational thinking plays in addressing them. Among...

Dec
01
2014

Computer Science/Discrete Mathematics Seminar I

Parallel Repetition From Fortification
11:15am|S-101

The Parallel Repetition Theorem upper-bounds the value of a repeated (tensored) two prover game in terms of the value of the base game and the number of repetitions. In this work we give a simple transformation on games -- "fortification" -- and...

Dec
08
2014

Computer Science/Discrete Mathematics Seminar I

Area Laws and the complexity of quantum states
Umesh Vazirani
11:15am|S-101

One of the great challenges posed by the laws of quantum mechanics is that the number of parameters required to describe a quantum state in general grows exponentially in the number of particles. This complexity is directly related to the phenomenon...

Dec
08
2014

Computer Science/Discrete Mathematics Seminar I

Area Laws and the Complexity of Quantum States
Umesh Vazirani
11:15am|Simonyi Hall, Room 101

One of the great challenges posed by the laws of quantum mechanics is that the number of parameters required to describe a quantum state in general grows exponentially in the number of particles. This complexity is directly related to the phenomenon...

Jan
26
2015

Computer Science/Discrete Mathematics Seminar I

Publicly-verifiable non-interactive arguments for delegating computation
11:15am|S-101

We construct publicly verifiable non-interactive arguments that can be used to delegate polynomial time computations. These computationally sound proof systems are completely non-interactive in the common reference string model. The verifier’s...

Feb
02
2015

Computer Science/Discrete Mathematics Seminar I

On monotonicity testing and boolean isoperimetric type theorems
11:15am|S-101

We show a directed and robust analogue of a boolean isoperimetric type theorem of Talagrand. As an application, we give a monotonicity testing algorithm that makes $\tilde{O}(\sqrt{n}/\epsilon^2)$ non-adaptive queries to a function $f:\{0,1\}^n...

Feb
09
2015

Computer Science/Discrete Mathematics Seminar I

Quantum computing with noninteracting particles
Alex Arkhipov
11:15am|S-101

We introduce an abstract model of computation corresponding to an experiment in which identical, non-interacting bosons are sent through a non-adaptive linear circuit before being measured. We show that despite the very limited nature of the model...

Feb
09
2015

Computer Science/Discrete Mathematics Seminar I

Quantum Computing with Noninteracting Particles
Alex Arkhipov
11:15am|Simonyi Hall, Room 101

We introduce an abstract model of computation corresponding to an experiment in which identical, non-interacting bosons are sent through a non-adaptive linear circuit before being measured. We show that despite the very limited nature of the model...