Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Sep
30
2014

Computer Science/Discrete Mathematics Seminar II

Uniform words are primitive (cont'd)
10:30am|S-101

Let \(G\) be a finite group, and let \(a\), \(b\), \(c\),... be independent random elements of \(G\), chosen at uniform distribution. What is the distribution of the element obtained by a fixed word in the letters \(a\), \(b\), \(c\),..., such as \...

Oct
07
2014

Computer Science/Discrete Mathematics Seminar II

Monotone submodular maximization over a matroid
10:30am|S-101

Monotone submodular maximization over a matroid (MSMM) is a fundamental optimization problem generalizing Maximum Coverage and MAX-SAT. Maximum Coverage is NP-hard to approximate better than \(1-1/e\), an approximation ratio obtained by the greedy...

Oct
14
2014

Computer Science/Discrete Mathematics Seminar II

Sampling-based proof of the quasipolynomial Bogolyubov-Ruzsa theorem and algorithmic applications
10:30am|West Bldg. Lect. Hall

The polynomial Bogolyubov-Ruzsa conjecture which aims to quantify the amount of additive structure in dense subsets of abelian groups is one of the central conjectures in additive combinatorics which has recently been shown to have various...

Oct
28
2014

Computer Science/Discrete Mathematics Seminar II

Exponential separation of information and communication
10:30am|S-101

In profoundly influential works, Shannon and Huffman show that if Alice wants to send a message \(X\) to Bob, it's sufficient for her to send roughly \(H(X)\) bits (in expectation), where \(H\) denotes Shannon's entropy function. In other words, the...

Nov
04
2014

Computer Science/Discrete Mathematics Seminar II

Sign rank, spectral gap and VC dimension
10:30am|S-101

The signrank of an \(N \times N\) matrix \(A\) of signs is the minimum possible rank of a real matrix \(B\) in which every entry has the same sign as the corresponding entry of \(A\). The VC-dimension of \(A\) is the maximum cardinality of a set of...

Nov
11
2014

Computer Science/Discrete Mathematics Seminar II

Asymptotic expansions of the central limit theorem and its applications
10:30am|S-101

In its simplest form, the central limit theorem states that a sum of n independent random variables can be approximated with error \(O(n^{-1/2})\) by a Gaussian with matching mean and second moment (given these variables are not too dissimilar). We...

Nov
18
2014

Computer Science/Discrete Mathematics Seminar II

Toric origami manifolds and origami templates
10:30am|S-101

A folded symplectic form on a manifold is a closed 2-form with the mildest possible degeneracy along a hypersurface. A special class of folded symplectic manifolds are the origami manifolds. In the classical case, toric symplectic manifolds can...

Nov
25
2014

Computer Science/Discrete Mathematics Seminar II

Sum-of-squares lower bounds for the planted clique problem
10:30am|S-101

Finding large cliques in random graphs and the closely related "planted" clique variant, where a clique of size \(k\) is planted in a random \(G(n,1/2)\) graph, have been the focus of substantial study in algorithm design. Despite much effort, the...

Dec
02
2014

Computer Science/Discrete Mathematics Seminar II

Taming the hydra: the Word Problem, Dehn functions, and extreme integer compression
10:30am|S-101

For a finitely presented group, the Word Problem asks for an algorithm which declares whether or not words on the generators represent the identity. The Dehn function is the time-complexity of a direct attack on the Word Problem by applying the...

Dec
09
2014

Computer Science/Discrete Mathematics Seminar II

More on sum-of-squares proofs for planted clique
10:30am|S-101

While this talk is a continuation of the one I gave on Tue Nov 25, it will be planned as an independent one. I will not assume knowledge from that talk, and will reintroduce that is needed. (That first lecture gave plenty of background material, and...

Jan
20
2015

Computer Science/Discrete Mathematics Seminar II

Small value parallel repetition for general games
Ankit Garg
10:30am|S-101

We prove a parallel repetition theorem for general games with value tending to 0. Previously Dinur and Steurer proved such a theorem for the special case of projection games. Our proofs also extend to the high value regime (value close to 1) and...

Feb
03
2015

Computer Science/Discrete Mathematics Seminar II

Dimension expanders via rank condensers
10:30am|S-101

Expander graphs are sparse graphs with good connectivity properties and they have become ubiquitous in theoretical computer science. Dimension expanders are a linear-algebraic variant where we ask for a constant number of linear maps that expand...

Feb
10
2015

Computer Science/Discrete Mathematics Seminar II

How to round subspaces: a new spectral clustering algorithm
10:30am|S-101

Given a $k$-dimensional linear subspace, consider the problem of approximating it (with respect to the spectral norm) in terms of another subspace spanned by the indicators of a $k$-partition of the coordinates. This is known as the spectral...

Feb
17
2015

Computer Science/Discrete Mathematics Seminar II

The log-concavity conjecture and the tropical Laplacian
10:30am|S-101

The log-concavity conjecture predicts that the coefficients of the chromatic (characteristic) polynomial of a matroid form a log-concave sequence. The known proof for realizable matroids uses algebraic geometry in an essential way, and the...

Feb
24
2015

Computer Science/Discrete Mathematics Seminar II

Computing inverses
Louis Rowen
10:30am|S-101

We compare methods of computing inverses of matrices over division rings. The most direct way is via Cohn's theory of full matrices, which was improved by Malcolmson, Schofield, and Westreich. But it is simpler to work with finite dimensional...

Mar
03
2015

Computer Science/Discrete Mathematics Seminar II

Whitney numbers via measure concentration in representation varieties
Karim Adiprasito
10:30am|S-101

We provide a simple proof of the Rota--Heron--Welsh conjecture for matroids realizable as c-arrangements in the sense of Goresky--MacPherson: we prove that the coefficients of the characteristic polynomial of the associated matroids form log-concave...

Mar
10
2015

Computer Science/Discrete Mathematics Seminar II

Chernoff bounds for expander walks
10:30am|West Bldg. Lect. Hall

Expander walk sampling is an important tool for derandomization. For any bounded function, sampling inputs from a random walk on an expander graph yields a sample average which is quite close to the true mean, and moreover the deviations obtained...

Mar
17
2015

Computer Science/Discrete Mathematics Seminar II

Average-case lower bounds for formula size
10:30am|S-101

We give an explicit example for a Boolean function $f : \{0,1\}^n \to \{0,1\}$, such that every Boolean formula of size at most $n^{2.999}$, with gates AND, OR and NOT, computes $f$ correctly on at most $1/2 + \epsilon$ fraction of the inputs, where...

Mar
24
2015

Computer Science/Discrete Mathematics Seminar II

Tractability as compressibility
Dimitris Achlioptas
10:30am|S-101

Given a collection of constraints over a collection of variables consider the following generic constraint satisfaction algorithm: start with a random assignment of values to the variables; while violated constraints exist, select a random such...

Mar
31
2015

Computer Science/Discrete Mathematics Seminar II

Kolmogorov width of discrete linear spaces: an approach to matrix rigidity
10:30am|S-101

A square matrix $V$ is called rigid if every matrix obtained by altering a small number of entries of $V$ has sufficiently high rank. While random matrices are rigid with high probability, no explicit constructions of rigid matrices are known to...

Apr
07
2015

Computer Science/Discrete Mathematics Seminar II

Interleaved products in special linear groups: mixing and communication complexity
10:30am|S-101

Let $S$ and $T$ be two dense subsets of $G^n$, where $G$ is the special linear group $\mathrm{SL}(2,q)$ for a prime power $q$. If you sample uniformly a tuple $(s_1,\ldots,s_n)$ from $S$ and a tuple $(t_1,\ldots,t_n)$ from $T$ then their interleaved...

Sep
22
2015

Computer Science/Discrete Mathematics Seminar II

Explicit two-source extractors and resilient functions II
10:30am|S-101

We explicitly construct an extractor for two independent sources on $n$ bits, each with min-entropy at least $\log^C n$ for a large enough constant $C$. Our extractor outputs one bit and has error $n^{-\Omega(1)}$. The best previous extractor, by...

Oct
06
2015

Computer Science/Discrete Mathematics Seminar II

Invariants of random knots
Chaim Even Zohar
10:30am|West Bldg. Lect. Hall

A knot is a closed curve embedded in the three-dimensional space, like a rope whose two ends are joined together. As usual in Topology, two knots are equivalent if one can be deformed into the other by continuous moves, where stretching and...

Oct
13
2015

Computer Science/Discrete Mathematics Seminar II

Non-constructive combinatorics
10:30am|S-101

I will describe several old and new applications of topological and algebraic methods in the derivation of combinatorial results. In all of them the proofs provide no efficient solutions for the corresponding algorithmic problems. Finding such...

Oct
27
2015

Computer Science/Discrete Mathematics Seminar II

Algorithmic proof of the Lovasz Local Lemma via resampling oracles
10:30am|S-101

For a collection of events on a probability space with specified dependencies, the Lovasz Local Lemma ("LLL") gives a sufficient condition for the existence of a point avoiding all the events. Following Moser's discovery of an efficient algorithm...

Nov
03
2015

Computer Science/Discrete Mathematics Seminar II

Two-source dispersers for polylogarithmic entropy and improved Ramsey graphs II
10:30am|S-101

In his 1947 paper that inaugurated the probabilistic method, Erdős proved the existence of $2 \log(n)$-Ramsey graphs on $n$ vertices. Matching Erdős' result with a constructive proof is a central problem in combinatorics that has gained a...

Nov
10
2015

Computer Science/Discrete Mathematics Seminar II

Exponential separation of communication and external information
10:30am|S-101

We show an exponential gap between communication complexity and external information complexity, by analyzing a communication task suggested as a candidate by Braverman [Bra13]. Previously, only a separation of communication complexity and internal...

Nov
17
2015

Computer Science/Discrete Mathematics Seminar II

Cohomology for computer science
Alex Lubotzky
10:30am|S-101

We will start with presenting the basic notions of (co)homomology of simplical complexes (which requires only basic linear algebra over the field of order 2) and then we will indicate its relevance for several topics in computer science and...

Nov
24
2015

Computer Science/Discrete Mathematics Seminar II

General systems of linear forms: equidistribution and true complexity
10:30am|S-101

Higher-order Fourier analysis is a powerful tool that can be used to analyse the densities of linear systems (such as arithmetic progressions) in subsets of Abelian groups. We are interested in the group $\mathbb{F}_p^n$, for fixed $p$ and large $n$...

Dec
01
2015

Computer Science/Discrete Mathematics Seminar II

Rigidity of random Toeplitz matrices with an application to depth three circuits
10:30am|S-101

Joint work with Oded Goldreich. We prove that random $n$-by-$n$ Toeplitz matrices over $GF(2)$ have rigidity $\Omega(n^3/(r^2 \log n))$ for rank $r > \sqrt{n}$, with high probability. This improves, for $r = o(n / \log n \log\log n)$, over the $...

Dec
08
2015

Computer Science/Discrete Mathematics Seminar II

Ramanujan coverings of graphs
10:30am|West Bldg. Lect. Hall

Ramanujan graphs are optimal expander graphs, and their existence and construction have been the focus of much research during the last three decades. We prove that every bipartite Ramanujan graph has a $d$-covering which is also Ramanujan. This...

Jan
12
2016

Computer Science/Discrete Mathematics Seminar II

Anti-concentration: results and applications
Hoi Nguyen
10:30am|S-101

I will survey some characterization results on random walks which stick to a small region unusually long. In application we give a description of unitary matrices of large permanent.

Jan
19
2016

Computer Science/Discrete Mathematics Seminar II

Proof Complexity Lower Bounds from Algebraic Circuit Complexity
10:30am|S-101

Proof complexity studies the complexity of mathematical proofs, with the aim of exhibiting (true) statements whose proofs are always necessarily long. One well-known proof system is Hilbert's Nullstellensatz, which shows that if the family $F=\{f_1...

Feb
02
2016

Computer Science/Discrete Mathematics Seminar II

Constant-round interactive-proofs for delegating computations (continued)
Ron Rothblum
10:30am|S-101

We will continue Monday's talk on constant-round interactive proofs, going into more details of the full construction and its proof. We will also briefly recap Monday's talk so that it will be beneficial to those who cannot attend on Monday.

Feb
09
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem is determining if a given such matrix is invertible or singular (over the appropriate field of...

Feb
16
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

While this lecture is a continuation of the lecture from last Tuesday, I will make it self contained. The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem...

Feb
23
2016

Computer Science/Discrete Mathematics Seminar II

Minkowski sums, mixed faces and combinatorial isoperimetry
Karim Adiprasito
10:30am|S-101

I want to sketch some algebraic and geometric tools to solve a variety of extremal problems surrounding Minkowski sums of polytopes and colorful simplicial depth.

Mar
01
2016

Computer Science/Discrete Mathematics Seminar II

Graph isomorphism in quasipolynomial time II
László Babai
10:30am|S-101

The algorithm indicated in the title builds on Luks's classical framework and introduces new group theoretic and combinatorial tools. In the first talk we outline the algorithm and state the core group theoretic and algorithmic ingredients. Some of...

Mar
08
2016

Computer Science/Discrete Mathematics Seminar II

Fast learning requires good memory: a time-space lower bound for parity learning
10:30am|S-101

We prove that any algorithm for learning parities requires either a memory of quadratic size or an exponential number of samples. This proves a recent conjecture of Steinhardt, Valiant and Wager and shows that for some learning problems a large...

Mar
15
2016

Computer Science/Discrete Mathematics Seminar II

Proof complexity - an introduction
10:30am|S-101

Proof systems pervade all areas of mathematics (often in disguise: e.g. Reidemeister moves is a sound and complete proof system for proving the equivalence of knots given by their diagrams). Proof complexity seeks to to understand the minimal...

Mar
22
2016

Computer Science/Discrete Mathematics Seminar II

The Resolution proof system
10:30am|S-101

The Resolution proof system is perhaps the simplest and most universally used in verification system and automated theorem proving. It was introduced by Davis and Putnam in 1960. The study of its efficiency, both in terms of proof length of natural...

Apr
05
2016

Computer Science/Discrete Mathematics Seminar II

An average-case depth hierarchy theorem for Boolean circuits II
Li-Yang Tan
10:30am|S-101

We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of AND, OR, and NOT gates. Our hierarchy theorem says that for every $d \geq 2$, there is an explicit $n$-variable Boolean function $f$, computed by a...

Apr
19
2016

Computer Science/Discrete Mathematics Seminar II

A characterization of functions with vanishing averages over products of disjoint sets
10:30am|S-101

We characterize all complex-valued (Lebesgue) integrable functions $f$ on $[0,1]^m$ such that $f$ vanishes when integrated over the product of $m$ measurable sets which partition $[0,1]$ and have prescribed Lebesgue measures $\\alpha_1,\\ldots,\...

Apr
26
2016

Computer Science/Discrete Mathematics Seminar II

Reed-Muller codes for random erasures and errors
Amir Shpilka
10:30am|S-101

Reed-Muller codes encode an $m$-variate polynomial of degree $r$ by evaluating it on all points in $\{0,1\}^m$. Its distance is $2^{m-r}$ and so it cannot correct more than that many errors/erasures in the worst case. For random errors one may hope...

May
03
2016

Computer Science/Discrete Mathematics Seminar II

Fourier tails for Boolean functions and their applications
10:30am|S-101

The discrete Fourier transform is a widely used tool in the analysis of Boolean functions. One can view the Fourier transform of a Boolean function $f:\{0,1\}^n \to \{0,1\}$ as a distribution over sets $S \subseteq [n]$. The Fourier-tail at level $k...