Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Nov
19
2013

Computer Science/Discrete Mathematics Seminar II

Interactive Channel Capacity
10:30am|S-101

In a profoundly influential 1948 paper, Claude Shannon defined the entropy function \(H\), and showed that the capacity of a symmetric binary channel with noise rate (bit flip rate) \(\mathrm{eps}\) is \(1-H(\mathrm{eps})\). This means that one can...

Nov
26
2013

Computer Science/Discrete Mathematics Seminar II

Toward Better Formula Lower Bounds: An Information Complexity Approach to the KRW Composition Conjecture
10:30am|S-101

One of the major open problems in complexity theory is proving super-polynomial lower bounds for circuits with logarithmic depth (i.e.,\(P \not\subseteq NC_1\) ). This problem is interesting both because it is tightly related to understanding the...

Dec
03
2013

Computer Science/Discrete Mathematics Seminar II

Multi-party Interactive Coding
10:30am|S-101

We will discuss interactive coding in the setting where there are n parties attempting to compute a joint function of their inputs using error-prone pairwise communication channels. We will present a general protocol that allows one to achieve only...

Dec
10
2013

Computer Science/Discrete Mathematics Seminar II

Simplicial complexes as expanders
10:30am|S-101

Expanders are highly connected sparse graphs. Simplicial complexes are a natural generalization of graphs to higher dimension, and the notions of connectedness and expansion turn out to have interesting analogues, which relate to the homology and...

Jan
21
2014

Computer Science/Discrete Mathematics Seminar II

Deeper Combinatorial Lower Bounds
Siu Man Chan
10:30am|S-101

We will discuss space and parallel complexity, ranging from some classical results which motivated the study, to some recent results concerning combinatorial lower bounds in restricted settings. We will highlight some of their connections to boolean...

Jan
28
2014

Computer Science/Discrete Mathematics Seminar II

Simplicial complexes as expanders
10:30am|S-101

Expanders are highly connected sparse graphs. Simplicial complexes are a natural generalization of graphs to higher dimension, and the notions of connectedness and expansion turn out to have interesting analogues, which relate to the homology and...

Feb
04
2014

Computer Science/Discrete Mathematics Seminar II

Simplicial complexes as expanders
10:30am|S-101

Expanders are highly connected sparse graphs. Simplicial complexes are a natural generalization of graphs to higher dimension, and the notions of connectedness and expansion turn out to have interesting analogues, which relate to the homology and...

Feb
11
2014

Computer Science/Discrete Mathematics Seminar II

Non-commutative arithmetic computation
10:30am|S-101

I will survey what is known about the complexity of arithmetic circuits computing polynomials and rational functions with non-commuting variables, focusing on recent results and open problems. Strangely enough, some elementary questions in...

Feb
18
2014

Computer Science/Discrete Mathematics Seminar II

Non-commutative arithmetic computation
10:30am|S-101

I will continue last week's discussion of this model, this time giving sketches of proofs of some of the theorems. No technical background is necessary for this lecture, but for motivation and background it is good to consult the Tue Feb 11 talk...

Feb
25
2014

Computer Science/Discrete Mathematics Seminar II

Fast matrix multiplication
10:30am|S-101

How many arithmetic operations does it take to multiply two square matrices? This question has captured the imagination of computer scientists ever since Strassen showed in 1969 that \(O(n^{2.81})\) operations suffice. We survey the classical theory...

Mar
04
2014

Computer Science/Discrete Mathematics Seminar II

Fast matrix multiplication
10:30am|S-101

How many arithmetic operations does it take to multiply two square matrices? This question has captured the imagination of computer scientists ever since Strassen showed in 1969 that \(O(n^{2.81})\) operations suffice. We survey the classical theory...

Mar
11
2014

Computer Science/Discrete Mathematics Seminar II

How to Delegate Computations: The Power of No-Signaling
10:30am|S-101

The Martians built an amazingly fast computer and they run it to answer the great question of life, the universe and everything. They claim that the answer is 42. Will they be able to convince us that this is the right answer, assuming that we do...

Mar
18
2014

Computer Science/Discrete Mathematics Seminar II

Graph expansion and communication complexity of algorithms
10:30am|S-101

In joint work with Ballard, Demmel, and Schwartz, we showed the communication cost of algorithms (also known as I/O-complexity) to be closely related to the small-set expansion properties of the corresponding computation graphs. This graph expansion...

Mar
25
2014

Computer Science/Discrete Mathematics Seminar II

Circular Encryption in Formal and Computational Cryptography
10:30am|S-101

The goal of computationally sound symbolic security is to create formal systems of cryptography which have a sound interpretation with respect to complexity-based notions of security. While there has been much progress in the development of such...

Apr
01
2014

Computer Science/Discrete Mathematics Seminar II

Byzantine Agreement in Expected Polynomial Time
10:30am|West Bldg. Lect. Hall

Byzantine agreement is a fundamental problem of distributed computing which involves coordination of players when a constant fraction are controlled by a malicious adversary. Each player starts with a bit, and the goal is for all good players to...

Apr
08
2014

Computer Science/Discrete Mathematics Seminar II

Do NP-Hard Problems Require Exponential Time?
10:30am|S-101

The P != NP conjecture doesn't tell us what runtime is needed to solve NP-hard problems like 3-SAT and Hamiltonian Path. While some clever algorithms are known, they all require exponential time, and some researchers suspect that this is unavoidable...

Apr
15
2014

Computer Science/Discrete Mathematics Seminar II

IP = PSPACE via error correcting codes
10:30am|S-101

The IP theorem, which asserts that IP = PSPACE (Lund et. al., and Shamir, in J. ACM 39(4)), is one of the major achievements of complexity theory. The known proofs of the theorem are based on the arithmetization technique, which transforms a...

Apr
22
2014

Computer Science/Discrete Mathematics Seminar II

Results and open problems in theory of quantum complexity
10:30am|S-101

I will survey recent results and open problems in several areas of quantum complexity theory, with emphasis on open problems which can be phrased in terms of classical complexity theory or mathematics but have implications for quantum computing: 1...

Apr
29
2014

Computer Science/Discrete Mathematics Seminar II

A central limit theorem for Gaussian polynomials and deterministic approximate counting for polynomial threshold functions
10:30am|S-101

In the last few years, there has been a lot of activity in the area of structural analysis and derandomization of polynomial threshold functions. Tools from analysis and probability have played a significant role in many of these works. The focus of...

May
13
2014

Computer Science/Discrete Mathematics Seminar II

A central limit theorem for Gaussian polynomials and deterministic approximate counting for polynomial threshold functions
10:30am|West Bldg. Lect. Hall

In this talk, we will continue, the proof of the Central Limit theorem from my last talk. We will show that that the law of "eigenregular" Gaussian polynomials is close to a Gaussian. The proof will be based on Stein's method and will be dependent...

Sep
23
2014

Computer Science/Discrete Mathematics Seminar II

Uniform words are primitive
10:30am|S-101

Let \(G\) be a finite group, and let \(a\), \(b\), \(c\),... be independent random elements of \(G\), chosen at uniform distribution. What is the distribution of the element obtained by a fixed word in the letters \(a\), \(b\), \(c\),..., such as \...

Sep
30
2014

Computer Science/Discrete Mathematics Seminar II

Uniform words are primitive (cont'd)
10:30am|S-101

Let \(G\) be a finite group, and let \(a\), \(b\), \(c\),... be independent random elements of \(G\), chosen at uniform distribution. What is the distribution of the element obtained by a fixed word in the letters \(a\), \(b\), \(c\),..., such as \...

Oct
07
2014

Computer Science/Discrete Mathematics Seminar II

Monotone submodular maximization over a matroid
10:30am|S-101

Monotone submodular maximization over a matroid (MSMM) is a fundamental optimization problem generalizing Maximum Coverage and MAX-SAT. Maximum Coverage is NP-hard to approximate better than \(1-1/e\), an approximation ratio obtained by the greedy...

Oct
14
2014

Computer Science/Discrete Mathematics Seminar II

Sampling-based proof of the quasipolynomial Bogolyubov-Ruzsa theorem and algorithmic applications
10:30am|West Bldg. Lect. Hall

The polynomial Bogolyubov-Ruzsa conjecture which aims to quantify the amount of additive structure in dense subsets of abelian groups is one of the central conjectures in additive combinatorics which has recently been shown to have various...

Oct
28
2014

Computer Science/Discrete Mathematics Seminar II

Exponential separation of information and communication
10:30am|S-101

In profoundly influential works, Shannon and Huffman show that if Alice wants to send a message \(X\) to Bob, it's sufficient for her to send roughly \(H(X)\) bits (in expectation), where \(H\) denotes Shannon's entropy function. In other words, the...

Nov
04
2014

Computer Science/Discrete Mathematics Seminar II

Sign rank, spectral gap and VC dimension
10:30am|S-101

The signrank of an \(N \times N\) matrix \(A\) of signs is the minimum possible rank of a real matrix \(B\) in which every entry has the same sign as the corresponding entry of \(A\). The VC-dimension of \(A\) is the maximum cardinality of a set of...

Nov
11
2014

Computer Science/Discrete Mathematics Seminar II

Asymptotic expansions of the central limit theorem and its applications
10:30am|S-101

In its simplest form, the central limit theorem states that a sum of n independent random variables can be approximated with error \(O(n^{-1/2})\) by a Gaussian with matching mean and second moment (given these variables are not too dissimilar). We...

Nov
18
2014

Computer Science/Discrete Mathematics Seminar II

Toric origami manifolds and origami templates
10:30am|S-101

A folded symplectic form on a manifold is a closed 2-form with the mildest possible degeneracy along a hypersurface. A special class of folded symplectic manifolds are the origami manifolds. In the classical case, toric symplectic manifolds can...

Nov
25
2014

Computer Science/Discrete Mathematics Seminar II

Sum-of-squares lower bounds for the planted clique problem
10:30am|S-101

Finding large cliques in random graphs and the closely related "planted" clique variant, where a clique of size \(k\) is planted in a random \(G(n,1/2)\) graph, have been the focus of substantial study in algorithm design. Despite much effort, the...

Dec
02
2014

Computer Science/Discrete Mathematics Seminar II

Taming the hydra: the Word Problem, Dehn functions, and extreme integer compression
10:30am|S-101

For a finitely presented group, the Word Problem asks for an algorithm which declares whether or not words on the generators represent the identity. The Dehn function is the time-complexity of a direct attack on the Word Problem by applying the...

Dec
09
2014

Computer Science/Discrete Mathematics Seminar II

More on sum-of-squares proofs for planted clique
10:30am|S-101

While this talk is a continuation of the one I gave on Tue Nov 25, it will be planned as an independent one. I will not assume knowledge from that talk, and will reintroduce that is needed. (That first lecture gave plenty of background material, and...

Jan
20
2015

Computer Science/Discrete Mathematics Seminar II

Small value parallel repetition for general games
Ankit Garg
10:30am|S-101

We prove a parallel repetition theorem for general games with value tending to 0. Previously Dinur and Steurer proved such a theorem for the special case of projection games. Our proofs also extend to the high value regime (value close to 1) and...

Feb
03
2015

Computer Science/Discrete Mathematics Seminar II

Dimension expanders via rank condensers
10:30am|S-101

Expander graphs are sparse graphs with good connectivity properties and they have become ubiquitous in theoretical computer science. Dimension expanders are a linear-algebraic variant where we ask for a constant number of linear maps that expand...

Feb
10
2015

Computer Science/Discrete Mathematics Seminar II

How to round subspaces: a new spectral clustering algorithm
10:30am|S-101

Given a $k$-dimensional linear subspace, consider the problem of approximating it (with respect to the spectral norm) in terms of another subspace spanned by the indicators of a $k$-partition of the coordinates. This is known as the spectral...

Feb
17
2015

Computer Science/Discrete Mathematics Seminar II

The log-concavity conjecture and the tropical Laplacian
10:30am|S-101

The log-concavity conjecture predicts that the coefficients of the chromatic (characteristic) polynomial of a matroid form a log-concave sequence. The known proof for realizable matroids uses algebraic geometry in an essential way, and the...

Feb
24
2015

Computer Science/Discrete Mathematics Seminar II

Computing inverses
Louis Rowen
10:30am|S-101

We compare methods of computing inverses of matrices over division rings. The most direct way is via Cohn's theory of full matrices, which was improved by Malcolmson, Schofield, and Westreich. But it is simpler to work with finite dimensional...

Mar
03
2015

Computer Science/Discrete Mathematics Seminar II

Whitney numbers via measure concentration in representation varieties
Karim Adiprasito
10:30am|S-101

We provide a simple proof of the Rota--Heron--Welsh conjecture for matroids realizable as c-arrangements in the sense of Goresky--MacPherson: we prove that the coefficients of the characteristic polynomial of the associated matroids form log-concave...

Mar
10
2015

Computer Science/Discrete Mathematics Seminar II

Chernoff bounds for expander walks
10:30am|West Bldg. Lect. Hall

Expander walk sampling is an important tool for derandomization. For any bounded function, sampling inputs from a random walk on an expander graph yields a sample average which is quite close to the true mean, and moreover the deviations obtained...

Mar
17
2015

Computer Science/Discrete Mathematics Seminar II

Average-case lower bounds for formula size
10:30am|S-101

We give an explicit example for a Boolean function $f : \{0,1\}^n \to \{0,1\}$, such that every Boolean formula of size at most $n^{2.999}$, with gates AND, OR and NOT, computes $f$ correctly on at most $1/2 + \epsilon$ fraction of the inputs, where...

Mar
24
2015

Computer Science/Discrete Mathematics Seminar II

Tractability as compressibility
Dimitris Achlioptas
10:30am|S-101

Given a collection of constraints over a collection of variables consider the following generic constraint satisfaction algorithm: start with a random assignment of values to the variables; while violated constraints exist, select a random such...

Mar
31
2015

Computer Science/Discrete Mathematics Seminar II

Kolmogorov width of discrete linear spaces: an approach to matrix rigidity
10:30am|S-101

A square matrix $V$ is called rigid if every matrix obtained by altering a small number of entries of $V$ has sufficiently high rank. While random matrices are rigid with high probability, no explicit constructions of rigid matrices are known to...

Apr
07
2015

Computer Science/Discrete Mathematics Seminar II

Interleaved products in special linear groups: mixing and communication complexity
10:30am|S-101

Let $S$ and $T$ be two dense subsets of $G^n$, where $G$ is the special linear group $\mathrm{SL}(2,q)$ for a prime power $q$. If you sample uniformly a tuple $(s_1,\ldots,s_n)$ from $S$ and a tuple $(t_1,\ldots,t_n)$ from $T$ then their interleaved...

Sep
22
2015

Computer Science/Discrete Mathematics Seminar II

Explicit two-source extractors and resilient functions II
10:30am|S-101

We explicitly construct an extractor for two independent sources on $n$ bits, each with min-entropy at least $\log^C n$ for a large enough constant $C$. Our extractor outputs one bit and has error $n^{-\Omega(1)}$. The best previous extractor, by...

Oct
06
2015

Computer Science/Discrete Mathematics Seminar II

Invariants of random knots
Chaim Even Zohar
10:30am|West Bldg. Lect. Hall

A knot is a closed curve embedded in the three-dimensional space, like a rope whose two ends are joined together. As usual in Topology, two knots are equivalent if one can be deformed into the other by continuous moves, where stretching and...

Oct
13
2015

Computer Science/Discrete Mathematics Seminar II

Non-constructive combinatorics
10:30am|S-101

I will describe several old and new applications of topological and algebraic methods in the derivation of combinatorial results. In all of them the proofs provide no efficient solutions for the corresponding algorithmic problems. Finding such...

Oct
27
2015

Computer Science/Discrete Mathematics Seminar II

Algorithmic proof of the Lovasz Local Lemma via resampling oracles
10:30am|S-101

For a collection of events on a probability space with specified dependencies, the Lovasz Local Lemma ("LLL") gives a sufficient condition for the existence of a point avoiding all the events. Following Moser's discovery of an efficient algorithm...