Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Mar
06
2012

Computer Science/Discrete Mathematics Seminar II

Applications of FT-Mollification
10:30am|S-101

In FT-mollification, one smooths a function while maintaining good quantitative control on high-order derivatives. I will describe this approach and show how it can be used to show that bounded independence fools polynomial threshold functions over...

Mar
13
2012

Computer Science/Discrete Mathematics Seminar II

Applications of FT-Mollification II
10:30am|West Bldg. Lecture Hall

In FT-mollification, one smooths a function while maintaining good quantitative control on high-order derivatives. This is a continuation of my talk from last week, and I will continue to describe this approach and show how it can be used to show...

Mar
20
2012

Computer Science/Discrete Mathematics Seminar II

The Quasi-Polynomial Freiman-Ruzsa Theorem of Sanders
10:30am|S-101

The polynomial Freiman-Ruzsa conjecture is one of the important open problems in additive combinatorics. In computer science, it already has several diverse applications: explicit constructions of two-source extractors; improved bounds for the log...

Mar
27
2012

Computer Science/Discrete Mathematics Seminar II

Higher-Order Cheeger Inequalities
10:30am|S-101

A basic fact of algebraic graph theory is that the number of connected components in an undirected graph is equal to the multiplicity of the eigenvalue zero in the Laplacian matrix of the graph. In particular, the graph is disconnected if and only...

Apr
03
2012

Computer Science/Discrete Mathematics Seminar II

Better Pseudorandom Generators from Milder Pseudorandom Restrictions
Parikshit Gopalan
10:30am|S-101

We present an iterative approach to constructing pseudorandom generators, based on the repeated application of mild pseudorandom restrictions. We use this template to construct pseudorandom generators for combinatorial rectangles and read-once CNFs...

Apr
10
2012

Computer Science/Discrete Mathematics Seminar II

List-Decoding Multiplicity Codes
10:30am|S-101

We study the list-decodability of multiplicity codes. These codes, which are based on evaluations of high-degree polynomials and their derivatives, have rate approaching 1 while simultaneously allowing for sublinear-time error-correction. In this...

Apr
17
2012

Computer Science/Discrete Mathematics Seminar II

Nondeterministic Property Testing
10:30am|S-101

A property of finite graphs is called nondeterministically testable if it has a "certificate'' such that once the certificate is specified, its correctness can be verified by random local testing. In this talk we consider certificates that consist...

Apr
24
2012

Computer Science/Discrete Mathematics Seminar II

Pseudorandom Generators for Read-Once ACC^0
10:30am|S-101

We consider the problem of constructing pseudorandom generators for read-once circuits. We give an explicit construction of a pseudorandom generator for the class of read-once constant depth circuits with unbounded fan-in AND, OR, NOT and...

May
01
2012

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Matching Vector Codes
Abhishek Bhowmick
10:30am|S-101

We prove new lower bounds on the encoding length of Matching Vector (MV) codes. These recently discovered families of Locally Decodable Codes (LDCs) originate in the works of Yekhanin and Efremenko and are the only known families of LDCs with a...

May
08
2012

Computer Science/Discrete Mathematics Seminar II

Pseudorandomness from Shrinkage
10:30am|S-101

One powerful theme in complexity theory and pseudorandomness in the past few decades has been the use of lower bounds to give pseudorandom generators (PRGs). However, the general results using this hardness vs. randomness paradigm suffer a...

May
15
2012

Computer Science/Discrete Mathematics Seminar II

From Irreducible Representations to Locally Decodable Codes
10:30am|West Bldg. Lecture Hall

A $q$-query Locally Decodable Code (LDC) is an error-correcting code that allows to read any particular symbol of the message by reading only $q$ symbols of the code word. In this talk we present a new approach for the construction of LDCs from the...

Sep
25
2012

Computer Science/Discrete Mathematics Seminar II

Koiran + Geometric Topology implies "Knottedness is in NP"
Greg Kuperberg
10:30am|S-101

In this seminar I will discuss the details of the result that knottedness is in NP assuming the generalized Riemann hypothesis. The main part of the work is to properly understand Koiran's construction that solvability of a system of algebraic...

Oct
02
2012

Computer Science/Discrete Mathematics Seminar II

Plug your ears! Graph isomorphism, siren of the algebraic seas, calls to your quantum helmsman.
Alex Russell
10:30am|S-101

Shor's algorithm, the hallmark quantum algorithmic breakthrough, has been successfully generalized to address a variety of related algebraic problems. Generalizations to nonabelian settings could have striking consequences, but such efforts have...

Oct
09
2012

Computer Science/Discrete Mathematics Seminar II

On the Conjectures of Nonnegative $k$-Sum and Hypergraph Matching
10:30am|S-101

A twenty-year old conjecture by Manickam, Mikl\'os, and Singhi asked whether for any integers $n, k$ satisfying $n \ge 4k$, every set of $n$ real numbers with nonnegative sum always has at least $\binom{n-1}{k-1}$ $k$-element subsets whose sum is...

Oct
16
2012

Computer Science/Discrete Mathematics Seminar II

On the AND- and OR-Conjectures: Limits to Efficient Preprocessing
10:30am|S-101

One of the major insights of the ``fixed-parameter tractability’’ (FPT) approach to algorithm design is that, for many NP-hard problems, it is possible to efficiently *shrink* instances which have some underlying simplicity. This preprocessing can...

Nov
06
2012

Computer Science/Discrete Mathematics Seminar II

Games, Solution Concepts, and Mechanism Design: A Very Short Introduction
10:30am|S-101

I present some of the very fundamental notions in game theory, with emphasis on their role in the theory of mechanism design and implementation. Examples include (1) normal-form games: Nash equilibrium and full implementation, dominant strategy...

Nov
20
2012

Computer Science/Discrete Mathematics Seminar II

On the Complexity of Matrix Multiplication and Other Tensors
Joseph Landsberg
10:30am|S-101

Many problems from complexity theory can be phrased in terms of tensors. I will begin by reviewing basic properties of tensors and discussing several measures of the complexity of a tensor. I'll then focus on the complexity of matrix multiplication...

Nov
27
2012

Computer Science/Discrete Mathematics Seminar II

Computational Complexity in Mechanism Design
10:30am|S-101

Some important mechanisms considered in game theory require solving optimization problems that are computationally hard. Solving these problems approximately may not help, as it may change the players’ rational behavior in the original mechanisms...

Dec
11
2012

Computer Science/Discrete Mathematics Seminar II

Combinatorial PCPs with Short Proofs
10:30am|S-101

The PCP theorem (Arora et. al., J. ACM 45(1,3)) asserts the existence of proofs that can be verified by reading a very small part of the proof. Since the discovery of the theorem, there has been a considerable work on improving the theorem in terms...

Dec
18
2012

Computer Science/Discrete Mathematics Seminar II

The SOS (aka Lassere/Positivestellensatz/Sum-of-Squares) System
(1) Raghu Meka and (2) Avi Wigderson
10:30am|S-101

We will give an overview of this system, which has been at the center of recent algorithmic and proof complexity developments. We will give the definitions of the system (as a proof system for polynomial inequalities, and as an SDP-based algorithm)...

Jan
15
2013

Computer Science/Discrete Mathematics Seminar II

OSNAP: Faster Numerical Linear Algebra Algorithms Via Sparser Subspace Embeddings
10:30am|S-101

An “oblivious subspace embedding” (OSE) is a distribution over matrices S such that for any low-dimensional subspace $V$, with high probability over the choice of $S$, $\|Sx\|_2$ approximately equals $\|x\|_2$ (up to $1 + \epsilon$ multiplicative...

Jan
22
2013

Computer Science/Discrete Mathematics Seminar II

Sparsity Lower Bounds for Dimensionality Reducing Maps
10:30am|S-101

Abstract: We give near-tight lower bounds for the sparsity required in several dimensionality reducing linear maps. In particular, we show: (1) The sparsity achieved by [Kane-Nelson, SODA 2012] in the sparse Johnson-Lindenstrauss lemma is optimal up...

Jan
29
2013

Computer Science/Discrete Mathematics Seminar II

The Ribe Program
10:30am|S-101

A linear property of Banach spaces is called "local" if it depends on finite number of vectors and is invariant under renorming (i.e., distorting the norm by a finite factor). A famous theorem of Ribe states that local properties are invariant under...

Feb
05
2013

Computer Science/Discrete Mathematics Seminar II

Ramsey Theory for Metric Spaces
10:30am|S-101

Ultrametrics are special metrics satisfying a strong form of the triangle inequality: For every $x, y, z$, $d(x, z) \impliedby \max\{d(x, y), d(y, z)\}$. We consider Ramsey-type problems for metric spaces of the following flavor:

Every metric space...

Feb
12
2013

Computer Science/Discrete Mathematics Seminar II

High Dimensional Expanders and Ramanujan Complexes
Alex Lubotzky
10:30am|S-101

Expander graphs, in general, and Ramanujan graphs, in particular, have been objects of intensive research in the last four decades. Many application came out, initially to computer science and combinatorics and more recently also to pure mathematics...

Feb
19
2013

Computer Science/Discrete Mathematics Seminar II

The Chasm at Depth 3
10:30am|S-101

I will describe the very recent breakthrough result by Gupta, Kamath, Kayal and Saptharishi which shows that every polynomial P in n variables, of degree d which is polynomial in n, and which can be computed by a polynomial sized arithmetic circuit...

Feb
26
2013

Computer Science/Discrete Mathematics Seminar II

Derandomizing BPL?
10:30am|S-101

I will survey some of the basic approaches to derandomizing Probabilistic Logspace computations, including the "classical" Nisan, Impagliazzo-Nisan-Widgerson and Reingold-Raz generators, the Saks-Zhou algorithm and some more recent approaches. We'll...

Mar
05
2013

Computer Science/Discrete Mathematics Seminar II

Derandomization of Probabilistic Logspace (The Nisan Variations)
10:30am|S-101

I will continue the exposition of different derandmization techniques for probabilistic logspace algorithms. The material of this talk will assume only little knowledge from the first talk.

Mar
12
2013

Computer Science/Discrete Mathematics Seminar II

Sensitivity Versus Block Sensitivity, I
10:30am|S-101

There are two important measures of the complexity of a boolean function: the sensitivity and block sensitivity. Whether or not they are polynomial related remains a major open question. In this talk I will survey some known results on this...

Mar
19
2013

Computer Science/Discrete Mathematics Seminar II

Sensitivity Versus Block Sensitivity, II
10:30am|S-101

There are two important measures of the complexity of a boolean function: the sensitivity and block sensitivity. Whether or not they are polynomial related remains a major open question. In this talk I will survey some known results on this...

Apr
02
2013

Computer Science/Discrete Mathematics Seminar II

An Arithmetic Analogue of Fox's Improved Triangle Removal Lemma
10:30am|S-101

We give an arithmetic version of the recent proof of the improved triangle removal lemma by Fox [Fox11], for the group F_2^n. A triangle in F_2^n is a tuple (x,y,z) such that x+y+z = 0. The triangle removal lemma for F_2^n states that for every \eps...

Apr
09
2013

Computer Science/Discrete Mathematics Seminar II

"What is Geometric Entropy, and Does it Really Increase?"
Jozsef Beck
10:30am|S-101

We all know Shannon's entropy of a discrete probability distribution. Physicists define entropy in thermodynamics and in statistical mechanics (there are several competing schools), and want to prove the Second Law, but they didn't succeed yet (very...

Apr
23
2013

Computer Science/Discrete Mathematics Seminar II

Uncertainty Principle
10:30am|S-101

Informally, uncertainty principle says that function and its Fourier transform can not be both concentrated. Uncertainty principle has a lot of applications in areas like compressed sensing, error correcting codes, number theory and many others. In...

Apr
30
2013

Computer Science/Discrete Mathematics Seminar II

Combinatorial Walrasian Equilibrium
Michal Feldman
10:30am|S-101

We study algorithms for combinatorial market design problems, where a collection of objects are priced and sold to potential buyers subject to equilibrium constraints. We introduce the notion of a combinatorial Walrasian equilibium (CWE) as a...

Sep
24
2013

Computer Science/Discrete Mathematics Seminar II

Finite Field Restriction Estimates
10:30am|S-101

The Kakeya and restriction conjectures are two of the central open problems in Euclidean Fourier analysis (with the second logically implying the first, and progress on the first typically implying progress on the second). Both of these have...

Oct
01
2013

Computer Science/Discrete Mathematics Seminar II

Small set expander flows
10:30am|S-101

A common way for lower bounding the expansion of a graph is by looking the second smallest eigenvalue of its Laplacian matrix. Also known as the easy direction of Cheeger's inequality, this bound becomes too weak when the expansion is \(o(1)\). In...

Oct
08
2013

Computer Science/Discrete Mathematics Seminar II

Rounding Moment Based SDP Relaxations by Column Selection
Ali Sinop
10:30am|S-101

In this lecture, I will talk about moment based SDP hierarchies (which are duals of SOS relaxations for polynomial optimization) in the context of graph partitioning. The focus will be on a certain way of rounding such hierarchies, whose quality is...

Oct
15
2013

Computer Science/Discrete Mathematics Seminar II

Minimal majority sequences
10:30am|S-101

Motivated by questions in Social Choice Theory I will consider the following extremal problem in Combinatorial Geometry. Call a sequence of vectors of length \(n\) with \(-1\), \(1\) entries feasible if it contains a subset whose sum is positive in...

Oct
22
2013

Computer Science/Discrete Mathematics Seminar II

Matrix perturbation with random noise and matrix recovery problems
10:30am|S-101

Classical matrix perturbation bounds, such as Weyl (for eigenvalues) and David-Kahan (for eigenvectors) have, for a long time, been playing an important role in various areas: numerical analysis, combinatorics, theoretical computer science...

Nov
05
2013

Computer Science/Discrete Mathematics Seminar II

Learning from positive examples
10:30am|West Bldg. Lect. Hall

We introduce and study a new type of learning problem for probability distributions over the Boolean hypercube \(\{-1,1\}^n\). As in the standard PAC learning model, a learning problem in our framework is defined by a class \(C\) of Boolean...

Nov
12
2013

Computer Science/Discrete Mathematics Seminar II

Hypermatrix Algebra, their spectral decomposition and applications
10:30am|S-101

In this talk we will present an overview of the hypermatrix generalization of matrix algebra proposed by Mesner and Bhattacharya in 1990. We will discuss a spectral theorem for hypermatrices deduced from this algebra as well as connections with...