Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Nov
29
2005

Computer Science/Discrete Mathematics Seminar II

Szemeredi's Regularity Lemma in Analysis
10:30am|S-101

We give three different analytic interpretations of Szemeredi's famous Regularity Lemma. The first one is a general statement about Hilbert spaces. The second one presents the Regularity Lemma as the compactness of a certain metric space. The third...

Dec
06
2005

Computer Science/Discrete Mathematics Seminar II

Coding Theory: Survey of Recent Progress and Open Questions
Madhu Sudan
10:30am|S-101

Coding theory emerged in the late 1940's, thanks to the works of Shannon and Hamming, as the theory supporting "reliable transmission of information (in the presence (fear?) of noise)". More than fifty years since, enormous progress has been made...

Dec
13
2005

Computer Science/Discrete Mathematics Seminar II

Dependent Random Choice and Extremal Problems
Benny Sudakov
10:30am|S-101

The Probabilistic Method is a powerful tool in tackling many problems in Combinatorics and it belongs to those areas of mathematical research that have experienced a most impressive growth in recent years. One of the parts of discrete mathematics...

Jan
17
2006

Computer Science/Discrete Mathematics Seminar II

Szemeredi's Regularity Lemma and Compactness
10:30am|S-101

We introduce a metric space which is the closure of the isomorphism classes of graphs in a natural topology. It turns out that the regularity lemma is equivalent with the compactness of this space. We present applications, open questions, and...

Jan
24
2006

Computer Science/Discrete Mathematics Seminar II

Random Discrete Matrices: A Survey
10:30am|S-101

Random matrices is a large area in mathematics, with connections to many other areas, such as mathematical physics, combinatorics, and theoretical computer sience, to mention a few. There are, by and large, two kinds of random matrices. The first...

Jan
31
2006

Computer Science/Discrete Mathematics Seminar II

Cryptography and the P vs NP Question
10:30am|S-101

A fundamental question in cryptography is whether the existence of hard on average problems can be based solely on the assumption that P not equal to NP (more precisely, NP not in BPP). The commonly held belief that average-case hardness requires...

Feb
14
2006

Computer Science/Discrete Mathematics Seminar II

Quantum Computing and Finite Permutation Groups
Aner Shalev
10:30am|S-101

We shall discuss Quantum Computing, and the so called Hidden Subgroup Problem, which in the abelian case was the basis for Shor's celebrated factorization algorithm. The solution for non-abelian groups, and symmetric groups in particular, is one of...

Feb
28
2006

Computer Science/Discrete Mathematics Seminar II

Independent Transversals in Locally Sparse Graphs
Po-Shen Loh
10:30am|S-101

Let $G$ be a graph with maximum degree $\Delta$ whose vertex set is partitioned into $r$ parts $V(G)=V_1 \cup \ldots \cup V_r$. An independent transversal is an independent set in $G$ which contains exactly one vertex from each $V_i$. The problem of...

Mar
07
2006

Computer Science/Discrete Mathematics Seminar II

Strong Approximation in Random Towers of Graphs
10:30am|S-101

Random covers of graphs, and random group actions on rooted trees, are different languages, that describe the same phenomenon. The former were studied by Amit, Linial. Matousek, Bilu. The latter were studied by Abert and Virag. Let T(n) be a binary...

Mar
14
2006

Computer Science/Discrete Mathematics Seminar II

Group Theoretic Algorithms For Fast matrix Multiplication
Balazs Szedgedy
10:30am|S-101

In 1969 Strassen discovered the surprising fact that it is possible to multiply two 2x2 matrices by using only 7 multiplications. This leads to an algorithm which multiplies two nxn matrices with n^(2.81+o(1)) field operations. Coppersmith and...

Mar
28
2006

Computer Science/Discrete Mathematics Seminar II

The Grothendieck Constant of an Expander
10:30am|S-101

The Grothendieck constant of a graph is an invariant whose study, which is motivated by algorithmic applications, leads to several extensions of a classical inequality of Grothendieck. This invariant was introduced in a joint paper with Makarychev...

Apr
04
2006

Computer Science/Discrete Mathematics Seminar II

Periodic Orbits and Extractors
10:30am|S-101

We consider periodic orbits of multiparameter diagonalizable actions. A simple example of such an action is the action generated by the maps x -> 2x mod 1 and x -> 3x mod 1 on R/Z. There are strong parallels between the study of these orbits and...

Apr
11
2006

Computer Science/Discrete Mathematics Seminar II

New Techniques in Online Game Playing
Elad Hazan
10:30am|S-101

We introduce a new algorithm and a new analysis technique that is applicable to a variety of online optimization scenarios, including regret minimization for Lipschitz regret functions, universal portfolio management, online convex optimization and...

Apr
18
2006

Computer Science/Discrete Mathematics Seminar II

Black Boxes, Inc.
10:30am|S-101

I will survey a number of settings withing theoretical computer sceince in which certain computations are abstracted by "black boxes", namely devices for which we can observe the input-output behavior, but not the actual "guts" of the computation. I...

May
02
2006

Computer Science/Discrete Mathematics Seminar II

On the Minimal Density of Triangles in Graphs
10:30am|S-101

Given the edge density $\rho$ of an undirected graph, what is the minimal possible density $g(\rho)$ of triangles in this graph? This is the quantitative version of the classical Turan theorem (41) that in the asymptotical form can be re-stated as...

May
09
2006

Computer Science/Discrete Mathematics Seminar II

On the Minimal Density of Triangles in Graphs (continued)
10:30am|S-101

Given the edge density $\rho$ of an undirected graph, what is the minimal possible density $g(\rho)$ of triangles in this graph? This is the quantitative version of the classical Turan theorem (41) that in the asymptotical form can be re-stated as...

May
16
2006

Computer Science/Discrete Mathematics Seminar II

Randomness Reduction in Some Results of Asympotic Geometric Analysis
Shiri Artstein
10:30am|Dilworth Room

I will describe some recent results joint with V. Milman in which we take the computer science approach to derandomization and apply it in questions from asymptotic geometric analysis. The special type of questions requires an adaptation of the...

Sep
19
2006

Computer Science/Discrete Mathematics Seminar II

The Sum-Product Theorem and Applications
10:30am|S-101

About two years ago Bourgain, Katz and Tao proved that in every finite field, a set which does not grow "much" when we add all pairs of elements, and when we multiply all pairs of elements, must be very "close" to a subfield. This theorem revealed...

Sep
26
2006

Computer Science/Discrete Mathematics Seminar II

Sum-Product Theorem in Finite Fields (Continued)
10:30am|S-101

While a continuation of last week's lecture, I'll try to make it self contained. I will describe some of the ideas and tools used in the proof of the Sum-Product theorem. I will describe a statistical version, and its use in extractor construction.

Oct
03
2006

Computer Science/Discrete Mathematics Seminar II

A Randomized Polynomial-Time Simplex Algorithm for Linear Programming
10:30am|S-101

In this talk, I shall present the first randomized polynomial-time simplex algorithm for linear programming. Like the other known polynomial-time algorithms for linear programming, its running time depends polynomially on the number of bits used to...

Oct
10
2006

Computer Science/Discrete Mathematics Seminar II

An Invitation to Combinatorial Games
10:30am|West Building Lecture Theatre

Combinatorial game theory is the study of combinations of two-player games with no hidden information and no chance elements. The subject has its roots in recreational mathematics, but in its modern form involves a rich interplay of ideas borrowed...

Oct
17
2006

Computer Science/Discrete Mathematics Seminar II

An Invitation to Combinatorial Games
10:30am|S-101

Combinatorial game theory is the study of combinations of two-player games with no hidden information and no chance elements. The subject has its roots in recreational mathematics, but in its modern form involves a rich interplay of ideas borrowed...

Oct
31
2006

Computer Science/Discrete Mathematics Seminar II

2-Source Dispersers for Sub-Polynomial Min-Entropy and Ramsey Graphs Beating the Frankl Wilson Construction
10:30am|S-101

The main result of this work is an explicit disperser for two independent sources on $n$ bits, each of entropy $k=n^{o(1)}$. Put differently, setting $N=2^n$ and $K=2^k$, we construct explicit $N \times N$ Boolean matrices for which no $K \times K$...

Nov
07
2006

Computer Science/Discrete Mathematics Seminar II

Solvability of Polynomial Equations over Finite Fields
10:30am|S-101

We investigate the complexity of the following polynomial solvability problem---given a finite field $\mathbb F_q$ and a set of polynomials $f_1, f_2, \dotsc, f_m \in \mathbb F_q[x_1, x_2, \dotsc, x_n]$ of total degree at most $d$, determine the...

Nov
14
2006

Computer Science/Discrete Mathematics Seminar II

Cut Problems in Graphs: Algorithms and Complexity
10:30am|S-101

Cut problems are fundamental to combinatorial optimization, and they naturally arise as intermediate problems in algorithm design. The study of cut problems is inherently connected to the dual notion of flows. In particular, starting with the...

Nov
28
2006

Computer Science/Discrete Mathematics Seminar II

New Correlation Bounds for GF(2) Polynomials Using the Gowers Norm
10:30am|S-101

In this work we study the correlation between low-degree GF(2) polynomials and explicit functions, where the correlation between two functions f,p : {0,1}^n -> {+1,-1} is defined as Correlation(p,f) := | E_x [f(x) p(x)] | = | P_x[f(x) = p(x)] - P_x...

Dec
05
2006

Computer Science/Discrete Mathematics Seminar II

On the Correlation Between Parity and Modular Polynomials
10:30am|S-101

We consider the problem of bounding the absolute value of the correlation between parity and low-degree polynomials modulo q, for odd q >= 3. The boolean function corresponding to the polynomial is 0 on an input iff the polynomial evaluates to 0...

Dec
12
2006

Computer Science/Discrete Mathematics Seminar II

Cycles and Cliques Minors in Expanders
Benny Sudakov
10:30am|S-101

Let $G$ be a graph which contains no subgraphs isomorphic to fixed bipartite graph $H$. Using well known results from Extremal Graph theory, one can show that such $G$ has certain expansion properties, i.e., all small subsets of $G$ have large...

Dec
19
2006

Computer Science/Discrete Mathematics Seminar II

Sum-Product Estimates, Expanders, and Sieving
Alex Gamburd
10:30am|S-101

We prove that Cayley graphs of SL_2(Z/qZ) are expanders with respect to the projection of any fixed elements in SL_2(Z) generating a non-elementary subgroup. This expansion property plays crucial role in establishing almost prime version of "SL_2(Z)...

Jan
16
2007

Computer Science/Discrete Mathematics Seminar II

An Elementary Construction of Constant-Degree Expanders
Oded Schwartz
10:30am|S-101

We describe a short and easy-to-analyze construction of constant-degree expanders. The construction relies on the replacement product, applied by Reingold et. al. [2002] to give an iterative construction of bounded-degree expanders. Here we give a...

Jan
23
2007

Computer Science/Discrete Mathematics Seminar II

The Polynomial Identity Testing Problem
10:30am|West Building Lecture Theatre

Polynomial Identity Testing is the following problem: given an arithmetic circuit C, determine if the polynomial computed by it is the identically zero polynomial. This problem admits a randomized polynomial-time algorithm but no efficient...

Jan
30
2007

Computer Science/Discrete Mathematics Seminar II

On Approximate Majority and Probabilistic Time
10:30am|S-101

Sipser and Gács, and independently Lautemann, proved in '83 that probabilistic polynomial time is contained in the second level of the polynomial-time hierarchy, i.e. BPP is in \Sigma_2 P. This is essentially the only non-trivial upper bound that we...

Feb
06
2007

Computer Science/Discrete Mathematics Seminar II

Algebraic Property Testing
10:30am|S-101

A Property P of functions is said to be testable if there exists a probabilistic algorithm that makes few (constant) queries for the value of f and accepts those satisfying P while rejecting functions that are far from any function satisfying P. In...

Feb
13
2007

Computer Science/Discrete Mathematics Seminar II

Fast Johnson-Lindenstrauss Transform(s)
10:30am|S-101

A classic functional analytic result by Johnson and Lindenstrauss from 1984 implies that any Euclidean metric on n points can be represented using only k=(log n)/epsilon^2 dimensions with distortion epsilon. In computer science, this result has been...

Feb
20
2007

Computer Science/Discrete Mathematics Seminar II

Algebraic Property Testing - Part II
10:30am|S-101

A Property P of functions is said to be locally testable if there exists a probabilistic algorithm that makes few (constant) queries for the value of f and accepts those satisfying P while rejecting functions that are far from any function...

Mar
06
2007

Computer Science/Discrete Mathematics Seminar II

A Product Theorem in Free Groups (Continued)
10:30am|S-101

We will continue the proof of the following result: if A is a finite subset of a free group with at least two non-commuting elements then |AAA| is almost quadratic in |A|. Last week we reduced the problem to obtaining lower bounds on |ABC| when...

Mar
13
2007

Computer Science/Discrete Mathematics Seminar II

The Design and Analysis of Simple Algorithms (for Search and Optimization)
11:30am|S-101

The "Design and Analysis of Algorithms" or "Introduction to Algorithms" is a basic undergraduate course in CS. In such courses, the organizational theme is often in terms of "basic algorithmic paradigms" such as greedy algorithms, dynamic...

Mar
20
2007

Computer Science/Discrete Mathematics Seminar II

The Design and Analysis of Simple Algorithms: Part II
11:30am|S-101

In part I of this talk, we began a discussion of "simple algorithms" and restricted our attention to the priority algorithm model which models ``greedy-like'' algorithms. In Part II of this talk, we will extend the priority algorithm framework to...

Mar
27
2007

Computer Science/Discrete Mathematics Seminar II

Pseudo-Random Number Generation by Algebraic Means
11:30am|West Building Lecture Theatre

Linear feedback shift registers (or, equivalently, linear recurrences) have been studied in one form or another for at least 75 years. They have found a Myriad of applications in communications, cryptography, random number generation, and other...

Apr
03
2007

Computer Science/Discrete Mathematics Seminar II

Pseudo-Random Number Generation by Algebraic Means (continued)
10:30am|S-101

In the first talk I reviewed the basic properties of linear feedback shift registers and their analysis using generating functions and trace functions. I then defined feedback with carry shift registers (FCSRs) and began their analysis by N-adic...

Apr
10
2007

Computer Science/Discrete Mathematics Seminar II

Aggregating Inconsistent Information: Ranking and Clustering
10:30am|S-101

In the past 2 years there has been considerable progress in the algorithmic problem of combining rankings (permutations on a ground set of "candidates") into a consensus ranking. This problem dates back to the 18th century, when the French...

Apr
17
2007

Computer Science/Discrete Mathematics Seminar II

Expanders in Number Theory
11:00am|S-101

Originally number theoretic methods were used to construct optimal (explicit) expanders. Recently combinatorial methods have been utalized in proving that certain number theoretic graphs are expanders. We will explain some uses of such expanders in...

Apr
24
2007

Computer Science/Discrete Mathematics Seminar II

Consensus Clustering, Hieraracical Clustering and Phylogeny
10:30am|S-101

Consensus clustering is the problem of aggregating a list of clusterings of ground data into one clustering. I will present new approximation algorithms for this problem, building on techniques used for ranking problems (described in my previous...

May
01
2007

Computer Science/Discrete Mathematics Seminar II

One-Way Multi-Party Communication Lower Bound for Pointer Jumping with Applications
10:30am|S-101

In this talk we study the one-way multi-party communication model, in which each of the k parties speaks exactly once in its turn. For every fixed k, we prove a tight lower bound of Omega(n^(1/(k-1))) on the probabilistic communication complexity of...

May
08
2007

Computer Science/Discrete Mathematics Seminar II

An Exponential Time/Space Speedup for Resolution
10:30am|S-101

This is joint work with Philipp Hertel Satisfiability algorithms have become one of the most practical and successful approaches for solving a variety of real-world problems, including hardware verification, experimental design, planning and...

May
17
2007

Computer Science/Discrete Mathematics Seminar II

Proof of the Parallel Repetition Theorem
10:45am|West Building Lecture Theatre, IAS

I will present Holenstein's (STOC 07) simplification of Raz's (STOC '95) proof of the parallel repetition theorem for two prover games. This theorem is a crucial component in many PCP constructions leading to tight hardness of approximation results...