Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Sep
15
2009

Computer Science/Discrete Mathematics Seminar II

Affine Dispersers from Subspace Polynomials
10:30am|S-101

An affine disperser over F_2^n for sources of dimension d is a function f: F_2^n --> F_2 such that for any affine subspace S in F_2^n of dimension at least d, we have {f(s) : s in S} = F_2 . Affine dispersers have been considered in the context of...

Sep
22
2009

Computer Science/Discrete Mathematics Seminar II

The Completeness of the Permanent
10:30am|S-101

In his seminal work, Valiant defined algebraic analogs for the classes P and NP, which are known today as VP and VNP. He also showed that the permanent is VNP-complete (that is, the permanent is in VNP and any problem in VNP is reducible to it). We...

Sep
29
2009

Computer Science/Discrete Mathematics Seminar II

Span Programs and Quantum Query Algorithms
Ben Reichardt
10:30am|S-101

The general adversary bound is a lower bound on the number of input queries required for a quantum algorithm to evaluate a boolean function. We show that this lower bound is in fact tight, up to a logarithmic factor. The proof is based on span...

Oct
06
2009

Computer Science/Discrete Mathematics Seminar II

The Completeness of the Permanent
10:30am|S-101

In his seminal work, Valiant defined algebraic analogs for the classes P and NP, which are known today as VP and VNP. He also showed that the permanent is VNP-complete (that is, the permanent is in VNP and any problem in VNP is reducible to it). We...

Oct
13
2009

Computer Science/Discrete Mathematics Seminar II

Using Local Conductance to Give Improved Algorithms for Unique Games
William Matthews
10:30am|S-101

We present two new approximation algorithms for Unique Games. The first generalizes the results of Arora et al. who give polynomial time approximation algorithms for graphs with high conductance. We give a polynomial time algorithm assuming only...

Oct
20
2009

Computer Science/Discrete Mathematics Seminar II

Hardness of Projection Games
10:30am|S-101

The PCP Theorem shows that any mathematical proof can be efficiently converted into a form that can be checked probabilistically by making only *two* queries to the proof, and performing a "projection test" on the answers. This means that the answer...

Nov
03
2009

Computer Science/Discrete Mathematics Seminar II

Constructions of Expanders Using Group Theory
10:30am|S-101

I will survey some constructions of expander graphs using variants of Kazhdan property T . First, I describe an approach to property T using bounded generation and then I will describe a recent method based on the geometric properties of...

Nov
10
2009

Computer Science/Discrete Mathematics Seminar II

Graph and Subgraph Sparsification and its Implications to Linear System Solving and Transforming Graphs into Expanders
10:30am|S-101

I will first give an overview of several constructions of graph sparsifiers and their properties. I will then present a method of sparsifying a subgraph W of a graph G with optimal number of edges and talk about the implications of subgraph...

Nov
24
2009

Computer Science/Discrete Mathematics Seminar II

Arithmetic Progressions in Primes
Madhur Tulsiani
10:30am|S-101

I will discuss the Green-Tao proof for existence of arbitrarily long arithmetic progressions in the primes. The focus will primarily be on the parts of the proof which are related to notions in complexity theory. In particular, I will try to...

Dec
01
2009

Computer Science/Discrete Mathematics Seminar II

Algorithmic Dense Model Theorems, Decompositions, and Regularity Theorems
10:30am|S-101

Green and Tao used the existence of a dense subset indistinguishable from the primes under certain tests from a certain class to prove the existence of arbitrarily long prime arithmetic progressions. Reingold, Trevisan, Tulsiani and Vadhan, and...

Dec
08
2009

Computer Science/Discrete Mathematics Seminar II

Algorithmic Dense Model Theorems, Decompositions, and Regularity Theorems
10:30am|S-101

Green and Tao used the existence of a dense subset indistinguishable from the primes under certain tests from a certain class to prove the existence of arbitrarily long prime arithmetic progressions. Reingold, Trevisan, Tulsiani and Vadhan, and...

Dec
15
2009

Computer Science/Discrete Mathematics Seminar II

An Algorithmic Proof of Forster's Lower Bound
Moritz Hardt
10:30am|S-101

We give an algorithmic proof of Forster's Theorem, a fundamental result in communication complexity. Our proof is based on a geometric notion we call radial isotropic position which is related to the well-known isotropic position of a set of vectors...

Jan
19
2010

Computer Science/Discrete Mathematics Seminar II

Limits of Randomly Grown Graph Sequences
10:30am|S-101

Motivated in part by various sequences of graphs growing under random rules (like internet models), convergent sequences of dense graphs and their limits were introduced by Borgs, Chayes, Lovasz, Sos and Vesztergombi and by Lovasz and Szegedy. In...

Jan
26
2010

Computer Science/Discrete Mathematics Seminar II

Representation Theory and Expansion in Groups
10:30am|S-101

In this survey lecture (which will continue on Tue Feb 2) I plan to explain basic aspects of the representation theory of finite groups, and how these are applied to various questions regarding expansion and random walks on groups. These...

Feb
02
2010

Computer Science/Discrete Mathematics Seminar II

Representation Theory and Expansion in Groups
10:30am|S-101

In this survey lecture (which will continue on Tue., Feb 2) I plan to explain basic aspects of the representation theory of finite groups, and how these are applied to various questions regarding expansion and random walks on groups. These...

Feb
09
2010

Computer Science/Discrete Mathematics Seminar II

Representation Theory and Expansion in Groups
10:30am|S-101

In this survey lecture (which will be continued), I plan to explain basic aspects of the representation theory of finite groups, and how these are applied to various questions regarding expansion and random walks on groups. These applications...

Feb
16
2010

Computer Science/Discrete Mathematics Seminar II

Complexity of Constraint Satisfaction problems: Exact and Approximate
Prasad Raghavendra
10:30am|S-101

Is there a common explanation for 2SAT being solvable polynomial time, and Max2SAT being approximable to a 0.91 factor? More generally, it is natural to wonder what characterizes the complexity of exact constraint satisfaction problems (CSP) like...

Feb
23
2010

Computer Science/Discrete Mathematics Seminar II

Testing Correlations and Inverse Theorems
10:30am|S-101

The uniformity norms are defined in different contexts in order to distinguish the ``typical'' random functions, from the functions that contain certain structures. A typical random function has small uniformity norms, while a function with a non...

Mar
02
2010

Computer Science/Discrete Mathematics Seminar II

Computational Complexity and Information Asymmetry in Financial Products
10:30am|S-101

Collateralized Default Obligations (CDOs) and related financial derivatives have been at the center of the last financial crisis and subject of ongoing regulatory overhaul. Despite their demonstrable benefits in economic theory, derivatives suffer...

Mar
09
2010

Computer Science/Discrete Mathematics Seminar II

Algorithms vs. Hardness
Nisheeth Vishnoi
10:30am|S-101

This talk will be concerned with how well can we approximate NP-hard problems. One of the most successful algorithmic strategies, from an upper bound perspective, is to write a polynomial time computable relaxation for an NP-hard problem and present...

Mar
16
2010

Computer Science/Discrete Mathematics Seminar II

Pseudorandom Generators for Regular Branching Programs
10:30am|West Bldg. Lecture Hall

We shall discuss new pseudorandom generators for regular read-once branching programs of small width. A branching program is regular if the in-degree of every vertex in it is (either 0 or) 2. For every width d and length n, the pseudorandom...

Apr
13
2010

Computer Science/Discrete Mathematics Seminar II

Critical Slowdown for the Ising Model on the Two-Dimensional Lattice
Eyal Lubetzky
10:30am|S-101

Intensive study throughout the last three decades has yielded a rigorous understanding of the spectral-gap of the Glauber dynamics for the Ising model on $Z^2$ everywhere except at criticality. While the critical behavior of the Ising model has long...

Apr
20
2010

Computer Science/Discrete Mathematics Seminar II

Matching Vector Codes
10:30am|S-101

A locally decodable code (LDC) is an error correcting code that allows for probabilistic decoding of a single message bit by reading a corrupted encoding in a small number of locations. Until recently, the only LDC constructions known where based on...

Apr
27
2010

Computer Science/Discrete Mathematics Seminar II

Hardness of Approximately Solving Linear Equations Over Reals
10:30am|S-101

We consider the problem of approximately solving a system of homogeneous linear equations over reals, where each equation contains at most three variables. Since the all-zero assignment always satisfies all the equations exactly, we restrict the...

May
04
2010

Computer Science/Discrete Mathematics Seminar II

Explicit Construction of RIP Matrices, Matrices With Small Coherence, and Related Problems
10:30am|S-101

Sparse recovery problems arise in many applications. Suppose v is an unknown N-dimensional signal with at most k nonzero components. We call such signals k-sparse. Suppose we are able to collect n \ll N linear measurements of v , and wish to...

May
11
2010

Computer Science/Discrete Mathematics Seminar II

Small-Bias Sets
10:30am|S-101

An epsilon-biased set X in {0,1}^n is a set so that for every non-empty set T in [n] the following holds. The random bit B(T) obtained by selecting at random a vector x in X, and computing the mod-2 sum of its T-coordinates, has bias at most epsilon...

May
18
2010

Computer Science/Discrete Mathematics Seminar II

Reductions Between Expansion Problems
10:30am|West Bldg. Lecture Hall

The small-set expansion conjecture introduced by Raghavendra and Steuerer is a natural hardness assumption concerning the problem of approximating edge expansion of small sets (of size $\delta n$) in graphs. It was shown to be intimately connected...

May
25
2010

Computer Science/Discrete Mathematics Seminar II

The Stepanov Method
10:30am|West Bldg. Lecture Hall

The Stepanov method is an elementary method for proving bounds on the number of roots of polynomials. At its core is the following idea. To upper bound the number of roots of a polynomial f(x) in a field, one sets up an auxiliary polynomial F(x)...

Sep
21
2010

Computer Science/Discrete Mathematics Seminar II

Invariance Principles in Theoretical Computer Science
10:30am|S-101

In this talk I will insult your intelligence by showing a non-original proof of the Central Limit Theorem, with not-particularly-good error bounds. However, the proof is very simple and flexible, allowing generalizations to multidimensional and...

Sep
28
2010

Computer Science/Discrete Mathematics Seminar II

High-Rate Codes with Sublinear Time Decoding
10:30am|S-101

Locally decodable codes are error-correcting codes that admit efficient decoding algorithms, that can recover any bit of the original message by looking at only a small number of locations of a corrupted codeword. The tradeoff between the rate of a...

Oct
05
2010

Computer Science/Discrete Mathematics Seminar II

Pseudorandom Generators for CCO[p] and the Fourier Spectrum of Low-Degree Polynomials Over Finite Fields
10:30am|S-101

We give a pseudorandom generator, with seed length O(log n), for CC0[p], the class of constant-depth circuits with unbounded fan-in MODp gates, for prime p. More accurately, the seed length of our generator is O(log n) for any constant error epsilon...

Oct
12
2010

Computer Science/Discrete Mathematics Seminar II

Approximating the Longest Increasing Subsequence in Polylogarithmic Time
10:30am|S-101

Finding the longest increasing subsequence (LIS) is a classic algorithmic problem. Simple O(n log n) algorithms, based on dynamic programming, are known for solving this problem exactly on arrays of length n. In this talk I'll discuss recent work of...

Oct
19
2010

Computer Science/Discrete Mathematics Seminar II

Rank Bounds for Design Matrices with Applications to Combinatorial Geometry and Locally Correctable Codes
10:30am|S-101

A (q,k,t)-design matrix is an m x n matrix whose pattern of zeros/non-zeros satisfies the following design-like condition: each row has at most q non-zeros, each column has at least k non-zeros and the supports of every two columns intersect in at...

Nov
02
2010

Computer Science/Discrete Mathematics Seminar II

Fourier Spectrum of Polynomials Over Finite Fields
10:30am|S-101

Let f(x_1,...,x_n) be a low degree polynomial over F_p. I will prove that there always exists a small set S of variables, such that `most` Fourier coefficients of f contain some variable from the set S. As an application, we will get a derandomized...

Nov
02
2010

Computer Science/Discrete Mathematics Seminar II

3/2 Firefighters Are Not Enough
Rani Hod
11:30am|S-101

The firefighter problem is a monotone dynamic process in graphs that can be viewed as modeling the use of a limited supply of vaccinations to stop the spread of an epidemic. In more detail, a fire spreads through a graph, from burning vertices to...

Nov
09
2010

Computer Science/Discrete Mathematics Seminar II

An Elementary Proof of the Restricted Invertibility Theorem
10:30am|S-101

We give an elementary proof of a generalization of Bourgain and Tzafriri's Restricted Invertibility Theorem, which says roughly that any matrix with columns of unit length and bounded operator norm has a large coordinate subspace on which it is well...

Nov
16
2010

Computer Science/Discrete Mathematics Seminar II

Planar Convexity, Infinite Perfect Graphs and Lipschitz Continuity
10:30am|S-101

Infinite continuous graphs emerge naturally in the geometric analysis of closed planar sets which cannot be presented as countable union of convex sets. The classification of such graphs leads in turn to properties of large classes of real functions...

Nov
23
2010

Computer Science/Discrete Mathematics Seminar II

Counting Pattern Avoiding Permutations Via Integral Operators
10:30am|S-101

A permutation pi=(pi_{1},...,pi_{n}) is consecutive 123-avoiding if there is no sequence of the form pi_i pi_{i+1} pi_{i+2}. More generally, for S a collection of permutations on m+1 elements, this definition extends to define consecutive S...

Nov
30
2010

Computer Science/Discrete Mathematics Seminar II

Hardness Escalation and the Rank of Polynomial Threshold Proofs
10:30am|S-101

A hardness escalation method applies a simple transformation that increases the complexity of a computational problem. Using multiparty communication complexity we present a generic hardness escalation method that converts any family of...

Dec
14
2010

Computer Science/Discrete Mathematics Seminar II

Erdos Distinct distance Problem in the Plane
10:30am|S-101

Erdos conjectured that N points in the plane determine at least c N (log N)^{-1/2} different distances. Building on work of Elekes-Sharir, Nets Katz and I showed that the number of distances is at least c N (log N)^{-1} . (Previous estimates had...

Jan
18
2011

Computer Science/Discrete Mathematics Seminar II

Efficiently Learning Mixtures of Gaussians
10:30am|S-101

Given data drawn from a mixture of multivariate Gaussians, a basic problem is to accurately estimate the mixture parameters. We provide a polynomial-time algorithm for this problem for any fixed number ($k$) of Gaussians in $n$ dimensions (even if...

Jan
25
2011

Computer Science/Discrete Mathematics Seminar II

Learning with Boolean Threshold Functions, a Statistical Physics Perspective
R\'emi Monasson
10:30am|S-101

Boolean Threshold Functions (BTF) arise in many contexts, ranging from computer science and learning theory to theoretical neurobiology. In this talk, I will present non-rigorous approaches developed in the statistical physics of disordered systems...

Feb
01
2011

Computer Science/Discrete Mathematics Seminar II

On The Complexity of Computing Roots and Residuosity Over Finite Fields
10:30am|S-101

We study the complexity of computing some basic arithmetic operations over GF(2^n), namely computing q-th root and q-th residuosity, by constant depth arithmetic circuits over GF(2) (also known as AC^0(parity)). Our main result is that these...