Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Nov
03
2015

Computer Science/Discrete Mathematics Seminar II

Two-source dispersers for polylogarithmic entropy and improved Ramsey graphs II
10:30am|S-101

In his 1947 paper that inaugurated the probabilistic method, Erdős proved the existence of $2 \log(n)$-Ramsey graphs on $n$ vertices. Matching Erdős' result with a constructive proof is a central problem in combinatorics that has gained a...

Nov
10
2015

Computer Science/Discrete Mathematics Seminar II

Exponential separation of communication and external information
10:30am|S-101

We show an exponential gap between communication complexity and external information complexity, by analyzing a communication task suggested as a candidate by Braverman [Bra13]. Previously, only a separation of communication complexity and internal...

Nov
17
2015

Computer Science/Discrete Mathematics Seminar II

Cohomology for computer science
Alex Lubotzky
10:30am|S-101

We will start with presenting the basic notions of (co)homomology of simplical complexes (which requires only basic linear algebra over the field of order 2) and then we will indicate its relevance for several topics in computer science and...

Nov
24
2015

Computer Science/Discrete Mathematics Seminar II

General systems of linear forms: equidistribution and true complexity
10:30am|S-101

Higher-order Fourier analysis is a powerful tool that can be used to analyse the densities of linear systems (such as arithmetic progressions) in subsets of Abelian groups. We are interested in the group $\mathbb{F}_p^n$, for fixed $p$ and large $n$...

Dec
01
2015

Computer Science/Discrete Mathematics Seminar II

Rigidity of random Toeplitz matrices with an application to depth three circuits
10:30am|S-101

Joint work with Oded Goldreich. We prove that random $n$-by-$n$ Toeplitz matrices over $GF(2)$ have rigidity $\Omega(n^3/(r^2 \log n))$ for rank $r > \sqrt{n}$, with high probability. This improves, for $r = o(n / \log n \log\log n)$, over the $...

Dec
08
2015

Computer Science/Discrete Mathematics Seminar II

Ramanujan coverings of graphs
10:30am|West Bldg. Lect. Hall

Ramanujan graphs are optimal expander graphs, and their existence and construction have been the focus of much research during the last three decades. We prove that every bipartite Ramanujan graph has a $d$-covering which is also Ramanujan. This...

Jan
12
2016

Computer Science/Discrete Mathematics Seminar II

Anti-concentration: results and applications
Hoi Nguyen
10:30am|S-101

I will survey some characterization results on random walks which stick to a small region unusually long. In application we give a description of unitary matrices of large permanent.

Jan
19
2016

Computer Science/Discrete Mathematics Seminar II

Proof Complexity Lower Bounds from Algebraic Circuit Complexity
10:30am|S-101

Proof complexity studies the complexity of mathematical proofs, with the aim of exhibiting (true) statements whose proofs are always necessarily long. One well-known proof system is Hilbert's Nullstellensatz, which shows that if the family $F=\{f_1...

Feb
02
2016

Computer Science/Discrete Mathematics Seminar II

Constant-round interactive-proofs for delegating computations (continued)
Ron Rothblum
10:30am|S-101

We will continue Monday's talk on constant-round interactive proofs, going into more details of the full construction and its proof. We will also briefly recap Monday's talk so that it will be beneficial to those who cannot attend on Monday.

Feb
09
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem is determining if a given such matrix is invertible or singular (over the appropriate field of...

Feb
16
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

While this lecture is a continuation of the lecture from last Tuesday, I will make it self contained. The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem...

Feb
23
2016

Computer Science/Discrete Mathematics Seminar II

Minkowski sums, mixed faces and combinatorial isoperimetry
Karim Adiprasito
10:30am|S-101

I want to sketch some algebraic and geometric tools to solve a variety of extremal problems surrounding Minkowski sums of polytopes and colorful simplicial depth.

Mar
01
2016

Computer Science/Discrete Mathematics Seminar II

Graph isomorphism in quasipolynomial time II
László Babai
10:30am|S-101

The algorithm indicated in the title builds on Luks's classical framework and introduces new group theoretic and combinatorial tools. In the first talk we outline the algorithm and state the core group theoretic and algorithmic ingredients. Some of...

Mar
08
2016

Computer Science/Discrete Mathematics Seminar II

Fast learning requires good memory: a time-space lower bound for parity learning
10:30am|S-101

We prove that any algorithm for learning parities requires either a memory of quadratic size or an exponential number of samples. This proves a recent conjecture of Steinhardt, Valiant and Wager and shows that for some learning problems a large...

Mar
15
2016

Computer Science/Discrete Mathematics Seminar II

Proof complexity - an introduction
10:30am|S-101

Proof systems pervade all areas of mathematics (often in disguise: e.g. Reidemeister moves is a sound and complete proof system for proving the equivalence of knots given by their diagrams). Proof complexity seeks to to understand the minimal...

Mar
22
2016

Computer Science/Discrete Mathematics Seminar II

The Resolution proof system
10:30am|S-101

The Resolution proof system is perhaps the simplest and most universally used in verification system and automated theorem proving. It was introduced by Davis and Putnam in 1960. The study of its efficiency, both in terms of proof length of natural...

Apr
05
2016

Computer Science/Discrete Mathematics Seminar II

An average-case depth hierarchy theorem for Boolean circuits II
Li-Yang Tan
10:30am|S-101

We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of AND, OR, and NOT gates. Our hierarchy theorem says that for every $d \geq 2$, there is an explicit $n$-variable Boolean function $f$, computed by a...

Apr
19
2016

Computer Science/Discrete Mathematics Seminar II

A characterization of functions with vanishing averages over products of disjoint sets
10:30am|S-101

We characterize all complex-valued (Lebesgue) integrable functions $f$ on $[0,1]^m$ such that $f$ vanishes when integrated over the product of $m$ measurable sets which partition $[0,1]$ and have prescribed Lebesgue measures $\\alpha_1,\\ldots,\...

Apr
26
2016

Computer Science/Discrete Mathematics Seminar II

Reed-Muller codes for random erasures and errors
Amir Shpilka
10:30am|S-101

Reed-Muller codes encode an $m$-variate polynomial of degree $r$ by evaluating it on all points in $\{0,1\}^m$. Its distance is $2^{m-r}$ and so it cannot correct more than that many errors/erasures in the worst case. For random errors one may hope...

May
03
2016

Computer Science/Discrete Mathematics Seminar II

Fourier tails for Boolean functions and their applications
10:30am|S-101

The discrete Fourier transform is a widely used tool in the analysis of Boolean functions. One can view the Fourier transform of a Boolean function $f:\{0,1\}^n \to \{0,1\}$ as a distribution over sets $S \subseteq [n]$. The Fourier-tail at level $k...

Sep
20
2016

Computer Science/Discrete Mathematics Seminar II

Algebraic geometric codes and their applications
10:30am|S-101

In 1975 Goppa suggested a general method for constructing error correcting codes based on algebraic geometry. In a long line of research such codes were constructed, constituting as a precious example of a construction that beats the probabilistic...

Oct
18
2016

Computer Science/Discrete Mathematics Seminar II

Real rooted polynomials and multivariate extensions
10:30am|S-101

I will introduce two notions that generalize the idea of real rootedness to multivariate polynomials: real stability and hyperbolicity. I will then show two applications of these types of polynomials that will (hopefully) be of interest to the CS...

Oct
25
2016

Computer Science/Discrete Mathematics Seminar II

Sum of squares, quantum entanglement, and log rank
10:30am|S-101

The sum-of-squares (SOS) method is a conceptually simple algorithmic technique for polynomial optimization that---quite surprisingly---captures and generalizes the best known efficient algorithms for a wide range of NP-hard optimization problems...

Nov
01
2016

Computer Science/Discrete Mathematics Seminar II

Settling the complexity of computing approximate two-player Nash equilibria
Aviad Rubinstein
10:30am|West Building Lecture Hall

We prove that there exists a constant $\epsilon > 0$ such that, assuming the Exponential Time Hypothesis for PPAD, computing an $\epsilon$-approximate Nash equilibrium in a two-player ($n \times n$) game requires quasi-polynomial time, $n^{\log^{1-o...

Nov
08
2016

Computer Science/Discrete Mathematics Seminar II

Exact tensor completion via sum of squares
10:30am|S-101

In the matrix completion problem, we have a matrix $M$ where we are only given a small number of its entries and our goal is to fill in the rest of the entries. While this problem is impossible to solve for general matrices, it can be solved if $M$...

Nov
15
2016

Computer Science/Discrete Mathematics Seminar II

Non-malleable extractors for constant depth circuits, and affine functions
10:30am|S-101

Seeded and seedless non-malleable extractors are non-trivial generalizations of the more commonly studied seeded and seedless extractors. The original motivation for constructing such non-malleable extractors are from applications to cryptography...

Nov
22
2016

Computer Science/Discrete Mathematics Seminar II

Theory of accelerated methods
10:30am|S-101

In this talk I will show how to derive the fastest coordinate descent method [1] and the fastest stochastic gradient descent method [2], both from the linear-coupling framework [3]. I will relate them to linear system solving, conjugate gradient...

Nov
29
2016

Computer Science/Discrete Mathematics Seminar II

Combinatorial rigidity of graphs embedded in $\mathbb{R}^2$
Orit Raz
10:30am|S-101

In this talk I will review some of the classical (and fundamental) results in the theory of graph rigidity.

Dec
06
2016

Computer Science/Discrete Mathematics Seminar II

Approximate constraint satisfaction requires sub-exponential size linear programs
10:30am|S-101

We show that for constraint satisfaction problems (CSPs), sub-exponential size linear programming relaxations are as powerful as $n^{\Omega(1)}$-rounds of the Sherali-Adams linear programming hierarchy. As a corollary, we obtain sub-exponential size...

Dec
13
2016

Computer Science/Discrete Mathematics Seminar II

Sum of squares lower bounds for refuting any CSP
10:30am|S-101

Let $P:\{0,1\}^k \to \{0,1\}$ be a $k$-ary predicate. A random instance of a constraint satisfaction problem (CSP(P)) where each of the $\Delta n$ constraints is $P$ applied to $k$ literals on $n$ variables chosen at random is unsatisfiable with...

Jan
17
2017

Computer Science/Discrete Mathematics Seminar II

The polynomial method: more results and open questions
Jordan Ellenberg
11:35am|S-101

This will be a bit of a "grab bag" talk where I discuss some results and open questions in combinatorial geometry which are either approachable by the polynomial method or which I hope are approachable by the polynomial method! I will talk about...

Jan
24
2017

Computer Science/Discrete Mathematics Seminar II

Robust sensitivity
10:30am

The sensitivity conjecture is a famous open problem in the theory of boolean functions. Let $f$ be a boolean function defined on the hypercube. The sensitivity of a node $x$ is the number of its neighbours in the hypercube, for which $f$ give the...

Jan
31
2017

Computer Science/Discrete Mathematics Seminar II

Sketching and embedding are equivalent for norms
Alex Andoni
10:30am

Sketching for distance estimation is the problem where we need to design a possibly randomized function $F$ from a metric space to short strings, such that for any points $x,y$ from the metric space, the "sketches" $F(x)$ and $F(y)$ are sufficient...

Feb
07
2017

Computer Science/Discrete Mathematics Seminar II

Optimization in dynamical systems
Amir Ali Ahmadi
10:30am

In recent years, there has been a surge of exciting research activity at the interface of optimization (in particular polynomial, semidefinite, and sum of squares optimization) and the theory of dynamical systems. In this talk, we focus on two...

Feb
14
2017

Computer Science/Discrete Mathematics Seminar II

A unified duality-based approach to Bayesian mechanism design
Matt Weinberg
10:30am

We provide a duality framework for Bayesian Mechanism Design. Specifically, we show that the dual problem to revenue maximization is a search over virtual transformations. This approach yields a unified view of several recent breakthroughs in...

Feb
21
2017

Computer Science/Discrete Mathematics Seminar II

Program obfuscation: outside the black box
Omer Paneth
10:30am

This talk will survey recent progress on program obfuscation from feasibility results to applications in cryptography and complexity theory. We will also describe a simple obfuscation construction based on cryptographic multi-linear maps and give a...

Feb
28
2017

Computer Science/Discrete Mathematics Seminar II

Structural and computational aspects of Brascamp-Lieb inequalities
10:30am

The celebrated Brascamp-Lieb (BL) inequalities are an important mathematical tool, unifying and generalizing numerous inequalities in analysis, convex geometry and information theory, with many used in computer science. I will survey the well...

Mar
07
2017

Computer Science/Discrete Mathematics Seminar II

Some basic problems and results from Invariant Theory
10:30am

Invariant theory deals with properties of symmetries - actions of groups on sets of objects.It has been slower to join its sibling mathematical theories in the computer science party, but we now see it more and more in studies of computational...

Mar
13
2017

Computer Science/Discrete Mathematics Seminar II

Indistinguishability obfuscation from 5-linear maps: a reduction from flying pigs to jumping pigs
Nir Bitansky
2:00pm

Indistinguishability obfuscation has turned out to be an outstanding notion with strong implications not only to cryptography, but also other areas such as complexity theory, and differential privacy. Nevertheless, our understanding of how to...

Mar
28
2017

Computer Science/Discrete Mathematics Seminar II

Applications of monotone constraint satisfaction
10:30am

Recently, a certain "monotone" version of the constraint satisfaction problem has proved an extremely useful tool for attacking problems in circuit, communication, and proof complexity theory. In this talk we discuss this version of the constraint...

Apr
04
2017

Computer Science/Discrete Mathematics Seminar II

Computability and complexity in analysis and dynamics
10:30am

We will give a high-level overview of computable analysis---an area studying the computational properties of continuous objects such as functions and measures on $\mathbb R^d$. We will then discuss some applications to the computability and...

Apr
11
2017

Computer Science/Discrete Mathematics Seminar II

Noncommutative probability for computer scientists
10:30am

I will give an introduction to computational techniques in noncommutative probability for people (like myself) that are less interested in the details of the theory and more interested using results in the theory to help understand the behavior of...

Apr
18
2017

Computer Science/Discrete Mathematics Seminar II

Bounds on roots of polynomials (and applications)
10:30am

I will discuss methods for deriving bounds on the roots of polynomials, and how one can use such bounds to assert the existence of combinatorial structures with certain spectral properties. This will include introducing the "method of interlacing...

Sep
26
2017

Computer Science/Discrete Mathematics Seminar II

Lifting theorems in communication complexity and applications
10:30am

Communication complexity studies the minimal amount of information two parties need to exchange to compute a joint function of their inputs. Results, especially lower bounds in this basic model found applications in many other areas of computer...

Oct
03
2017

Computer Science/Discrete Mathematics Seminar II

Elementary open problems in Algebra (with consequences in computational complexity)
10:30am

I will survey some elementary (to state!) problems on groups, matrices, and tensors, and discuss their motivations arising from several major problems in computational complexity theory. On each problem there was some exciting recent progress which...

Oct
10
2017

Computer Science/Discrete Mathematics Seminar II

Structural aspects of the null-cone problem in invariant theory
Ankit Garg
10:30am

Invariant theory studies the actions of groups on vector spaces and what polynomial functions remain invariant under these actions. An important object related to a group action is the null cone, which is the set of common zeroes of all homogeneous...

Oct
24
2017

Computer Science/Discrete Mathematics Seminar II

On the strength of comparison queries
10:30am

Joint work with Daniel Kane (UCSD) and Shachar Lovett (UCSD)We construct near optimal linear decision trees for a variety of decision problems in combinatorics and discrete geometry.For example, for any constant $k$, we construct linear decision...