Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Sep
25
2007

Computer Science/Discrete Mathematics Seminar II

Hardness of Solving Sparse Overdetermined Linear Systems
10:30am|S-101

Solving a system of linear equations is a fundamental algorithmic task arising in numerous applications. It is possible to tell in polynomial time, by Gaussian elimination, if a given system admits a solution, and if so to find one. But what if the...

Oct
02
2007

Computer Science/Discrete Mathematics Seminar II

Unbounded-Error Communication Complexity of Symmetric Functions
Alexander Sherstov
10:30am|S-101

The sign-rank of a real matrix M is the least rank of a matrix R in which every entry has the same sign as the Corresponding entry of M. We determine the sign-rank of every matrix of the form M=[ D(|x AND y|) ]_{x,y}, where D:{0,1,...,n}->{-1,+1} is...

Oct
16
2007

Computer Science/Discrete Mathematics Seminar II

Sparse Random Linear Codes are Locally Decodable and Testable
10:30am|S-101

We show that random sparse binary linear codes are locally testable and locally decodable (under any linear encoding) with constant queries (with probability tending to one). By sparse, we mean that the code should have only polynomially many...

Oct
30
2007

Computer Science/Discrete Mathematics Seminar II

Balancing Gaussian Vectors
Kevin Costello
10:30am|S-101

Let ||.|| be any norm on R^d. We consider the question of estimating the minimum over all possible sign sequences e_i=+/-1 of ||e_1 x_1 + e_2 x_2 + ... + e_n x_n||, where the x_i are independent Gaussian vectors on R^d (here d is viewed as fixed and...

Nov
06
2007

Computer Science/Discrete Mathematics Seminar II

Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
10:30am|S-101

A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of...

Nov
13
2007

Computer Science/Discrete Mathematics Seminar II

Applications of the Removal Lemma
10:30am|S-101

An extension of Szemeredi's Regularity Lemma for hypergraphs, was proved in 2005 by Gowers and independently by Rodl, Schacht, Skokan, and Nagle. More recently, Tao gave another proof for the lemma. A special case, the Removal Lemma is an important...

Nov
20
2007

Computer Science/Discrete Mathematics Seminar II

Density Theorems for Bipartite Graphs and Related Ramsey-Type Results
Benny Sudakov
10:30am|S-101

In this talk, we discuss a new technique which shows how to find a copy of a sparse bipartite graph in a graph of positive density. Our results imply several new bounds for classical problems in Ramsey theory and improve and generalize earlier...

Nov
27
2007

Computer Science/Discrete Mathematics Seminar II

The Approximation Complexity of Win-Lose Games
10:30am|West Building Lecture Theatre

The computation of Nash equilibria has been a problem that spanned half a century that has attracted Economists, Operations Researchers, and most Recently, Computer Scientists. Intuitively, the complexity of a game grows along a few axes: the number...

Dec
04
2007

Computer Science/Discrete Mathematics Seminar II

Optimal Phylogenetic Reconstruction
Konstantinos Daskalakis
10:30am|S-101

An important task in systematic biology is the reconstruction of phylogenies: The evolutionary history of a family of organisms, represented by an evolutionary tree, needs to be reconstructed from the genetic data of the extant species, which...

Jan
22
2008

Computer Science/Discrete Mathematics Seminar II

A Study of Multiplication Codes
10:30am|S-101

Error correcting codes encode messages in a way that allows recovery of the original message even in the presence of noise. We study Multiplication codes (Akavia-Goldwasser-Safra FOCS'03), extending them in different ways to allow polynomial...

Jan
29
2008

Computer Science/Discrete Mathematics Seminar II

Arithmetic Complexity -- The Power of Partial Derivatives
Avi Wigderson, IAS
10:30am|S-101

I plan to survey a number of results, some very old and some very new, mainly proving lower bounds on arithmetic circuits. Common to all is the (often surprising, at least till you get used to it) demonstration of the power of partial derivatives.

Feb
12
2008

Computer Science/Discrete Mathematics Seminar II

Efficient Algorithms for Some Algebraic Problems
10:30am|S-101

In this talk we will examine some computational problems related to polynomials, namely: (i) Given a polynomial, can we make a linear transformation on the variables and write it as the sum of two independent polynomials. (ii) Is a given set of...

Feb
19
2008

Computer Science/Discrete Mathematics Seminar II

New Results and Open Problems in Computing Nash Equilibria
Christos Papadimitriou
10:30am|S-101

In the past few years there has been much excitement, and many positive and negative results, regarding the computation of equilibria in games. The problem of finding Nash equilibria in games was shown intractable, there is an on-going race of...

Feb
26
2008

Computer Science/Discrete Mathematics Seminar II

Sound 3-Query PCPPs Are Long
Arie Matsliah
10:30am|S-101

We present a tradeoff between the length of a 3-query probabilistically checkable proof of proximity (PCPP) and the best possible soundness obtained by querying it. Consider the task of distinguishing between "good" inputs w \in {0,1}^n that are...

Mar
04
2008

Computer Science/Discrete Mathematics Seminar II

The Sign-Rank of AC^0
10:30am|S-101

The sign-rank of a real matrix M is the smallest rank of any real matrix whose entries have the same sign as the entries of M . We exhibit a 2^n x 2^n matrix computable by depth 2 circuits of polynomial size whose sign-rank is exponential in n . Our...

Mar
25
2008

Computer Science/Discrete Mathematics Seminar II

Expander Cryptography -- Cryptography With Constant Computational Overhead
Amit Sahai
10:30am|S-101

Current constructions of cryptographic primitives typically involve a large multiplicative computational overhead that grows with the desired level of security. We explore the possibility of implementing cryptographic primitives (such as encryption...

Apr
01
2008

Computer Science/Discrete Mathematics Seminar II

The Distribution of Polynomials Over Finite Fields
10:30am|S-101

I will present a recent result of Green and Tao showing the following. Let P:F^n --> F be a polynomial in n variables over F of degree at most d . We say that P is "equidistributed" if it takes on each of its |F| values close to equally often. We...

Apr
08
2008

Computer Science/Discrete Mathematics Seminar II

Spherical Cubes, or Coordinated Random Choices in High Dimensions
10:30am|S-101

We give a probabilistic protocol that allows any two points in R^d to agree on a nearby integer lattice point in Z^d . The protocol uses shared randomness, but no communication. If the distance between the two points is delta, the probability of...

Apr
15
2008

Computer Science/Discrete Mathematics Seminar II

Nearly Diagonally Dominant Matrices and Their Applications
10:30am|S-101

I will describe a lower bound for the rank of any real matrix in which all diagonal entries are significantly larger in absolute value than all other entries. This simple result has a surprising number of applications in Geometry, Coding Theory...

Apr
29
2008

Computer Science/Discrete Mathematics Seminar II

Optimal Monotone Encodings
Rani Hod
10:30am|S-101

Moran, Naor and Segev have asked what is the minimal r = r(n, k) for which there exists an (n,k)-monotone encoding of length r , i.e., a monotone injective function from subsets of size up to k of {1, 2,...,n} to r bits. Monotone encodings are...

May
13
2008

Computer Science/Discrete Mathematics Seminar II

A Dirac-Type Theorem for 3-Uniform Hypergraphs
10:30am|West Bldg. Lecture Hall

A 3-uniform hypergraph is hamiltonian if for some cyclic ordering of its vertex set, every 3 consecutive vertices form an edge. In 1952 Dirac proved that if the minimum degree in an n-vertex graph is at least n/2 then the graph is hamiltonian. We...

May
27
2008

Computer Science/Discrete Mathematics Seminar II

Approximating Functions in Logarithmic Space and Time: A "Plug & Play" Approach
10:30am|S-101

We consider several natural problems related to the design of approximation algorithms and the analysis of their error bounds. We define a set of sufficient conditions on a function $f:D --> R^+$ and its domain $D$ , so that we can construct good...

Jun
10
2008

Computer Science/Discrete Mathematics Seminar II

Computability and Complexity of Julia sets
10:30am|S-101

Abstract: Studying dynamical systems is key to understanding a wide range of phenomena ranging from planets' movement to climate patterns to market dynamics. Various numerical tools have been developed to address specific questions about dynamical...

Sep
09
2008

Computer Science/Discrete Mathematics Seminar II

A Simple Proof of Bazzi's Theorem
10:30am|S-101

Pseudo-random generators that are secure against constant depth polynomial size circuits have been known since the seminal paper by Ajtai and Wigderson (1985). All available constructions of such generators, however, appear to be somewhat special...

Sep
16
2008

Computer Science/Discrete Mathematics Seminar II

Multilinear Computation
10:30am|S-101

Nisan and Wigderson defined the model of multilinear circuits as a natural model for computing multilinear polynomials (such as matrix product and the Permanent). We will go over several results regarding such circuits -- a few structural results...

Sep
23
2008

Computer Science/Discrete Mathematics Seminar II

Multilinear Computation
10:30am|S-101

Nisan and Wigderson defined the model of multilinear circuits as a natural model for computing multilinear polynomials (such as matrix product and the Permanent). We will go over several results regarding such circuits -- a few structural results...

Sep
30
2008

Computer Science/Discrete Mathematics Seminar II

A Survey of Time Lower Bounds by Algorithmic Arguments
10:30am|S-101

One natural strategy for proving a time lower bound for a problem is proof-by-contradiction: assume that there is a great algorithm for the problem, and apply this algorithm as a subroutine to solve other problems until the algorithms get so great...

Oct
07
2008

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Circuits with MOD_m Gates
10:30am|S-101

A celebrated theorem of Razborov/Smolensky says that constant depth circuits comprising AND/OR/MOD_{p^k} gates of unbounded fan-in, require exponential size to compute the MAJORITY function if p is a fixed prime and k is a fixed integer. Extending...

Oct
14
2008

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Circuits with MOD_m Gates
10:30am|S-101

A celebrated theorem of Razborov/Smolensky says that constant depth circuits comprising AND/OR/MOD_{p^k} gates of unbounded fan-in, require exponential size to compute the MAJORITY function if p is a fixed prime and k is a fixed integer. Extending...

Oct
21
2008

Computer Science/Discrete Mathematics Seminar II

Group Representation Patterns in Digital Processing
Shamgar Gurevich and Ronny Hadani
10:30am|S-101

In the lecture we will explain how various fundamental structures from group representation theory appear naturally in the context of discrete harmonic analysis and can be applied to solve concrete problems from digital signal processing. We will...

Nov
04
2008

Computer Science/Discrete Mathematics Seminar II

Dichotomy Conjecture for Constraint Satisfaction Problems
10:30am|S-101

The dichotomy conjecture asks if every Constraint Satisfaction Problem is either in P or NP-complete. We will study the basic algorithms and reductions for such problems. We will see many (equivalent) stronger versions of this conjecture actually...

Nov
11
2008

Computer Science/Discrete Mathematics Seminar II

Dichotomy Conjecture for Constraint Satisfaction Problems
10:30am|S-101

The dichotomy conjecture asks if every Constraint Satisfaction Problem is either in P or NP-complete. We will study the basic algorithms and reductions for such problems. We will see many (equivalent) stronger versions of this conjecture actually...

Nov
18
2008

Computer Science/Discrete Mathematics Seminar II

Complexity of Equational Proof Systems
10:30am|S-101

I will outline the general area of proof complexity, and its traditional problems. I will focus on less traditional ones, namely the complexity of proving identities over certain algebraic structures. The paradigmatic example is a system intended to...

Nov
25
2008

Computer Science/Discrete Mathematics Seminar II

Complexity of Equational Proof Systems
10:30am|S-101

I will outline the general area of proof complexity, and its traditional problems. I will focus on less traditional ones, namely the complexity of proving identities over certain algebraic structures. The paradigmatic example is a system intended to...

Dec
02
2008

Computer Science/Discrete Mathematics Seminar II

Combinatorial Reasoning in Information Theory
10:30am|S-101

Combinatorial arguments have played a crucial role in the investigation of several surprising phenomena in Information Theory. After a brief discussion of some of these results I will describe a recent example, based on joint work with Hassidim...

Dec
09
2008

Computer Science/Discrete Mathematics Seminar II

Extractors for Varieties
10:30am|S-101

In this work we study the task of randomness extraction from sources which are distributed uniformly on an unknown algebraic variety. In other words, we are interested in constructing a function (an extractor) whose output is close to uniform even...

Dec
16
2008

Computer Science/Discrete Mathematics Seminar II

Extractors for Varieties
10:30am|S-101

In this work we study the task of randomness extraction from sources which are distributed uniformly on an unknown algebraic variety. In other words, we are interested in constructing a function (an extractor) whose output is close to uniform even...

Jan
20
2009

Computer Science/Discrete Mathematics Seminar II

Resilient and Equilibrium-Less Mechanism Design
Silvio Micali and Paul Valiant
10:30am|S-101

Mechanism design is not robust. It traditionally guarantees a desired property "at equilibrium", but an equilibrium is by definition very fragile: it only guarantees that no INDIVIDUAL player can profitably deviate from his envisaged strategy. Two...

Jan
27
2009

Computer Science/Discrete Mathematics Seminar II

The XOR Lemma -- A Quarter Century of Proofs
10:30am|S-101

Amplifying the difficulty of a somewhat hard function is a central technique in complexity, cryptography and pseudorandomness. By far the most common method of amplification is by repetition - asking to compute the original function in many...

Feb
03
2009

Computer Science/Discrete Mathematics Seminar II

Poly-logarithmic Independence Fools ACO Circuits
10:30am|S-101

We will describe the recent proof of the 1990 Linial-Nisan conjecture. The conjecture states that bounded-depth boolean circuits cannot distinguish poly-logarithmically independent distributions from the uniform one. The talk will be almost...