Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Nov
18
2014

Computer Science/Discrete Mathematics Seminar II

Toric origami manifolds and origami templates
10:30am|S-101

A folded symplectic form on a manifold is a closed 2-form with the mildest possible degeneracy along a hypersurface. A special class of folded symplectic manifolds are the origami manifolds. In the classical case, toric symplectic manifolds can...

Nov
25
2014

Computer Science/Discrete Mathematics Seminar II

Sum-of-squares lower bounds for the planted clique problem
10:30am|S-101

Finding large cliques in random graphs and the closely related "planted" clique variant, where a clique of size \(k\) is planted in a random \(G(n,1/2)\) graph, have been the focus of substantial study in algorithm design. Despite much effort, the...

Dec
02
2014

Computer Science/Discrete Mathematics Seminar II

Taming the hydra: the Word Problem, Dehn functions, and extreme integer compression
10:30am|S-101

For a finitely presented group, the Word Problem asks for an algorithm which declares whether or not words on the generators represent the identity. The Dehn function is the time-complexity of a direct attack on the Word Problem by applying the...

Dec
09
2014

Computer Science/Discrete Mathematics Seminar II

More on sum-of-squares proofs for planted clique
10:30am|S-101

While this talk is a continuation of the one I gave on Tue Nov 25, it will be planned as an independent one. I will not assume knowledge from that talk, and will reintroduce that is needed. (That first lecture gave plenty of background material, and...

Jan
20
2015

Computer Science/Discrete Mathematics Seminar II

Small value parallel repetition for general games
Ankit Garg
10:30am|S-101

We prove a parallel repetition theorem for general games with value tending to 0. Previously Dinur and Steurer proved such a theorem for the special case of projection games. Our proofs also extend to the high value regime (value close to 1) and...

Feb
03
2015

Computer Science/Discrete Mathematics Seminar II

Dimension expanders via rank condensers
10:30am|S-101

Expander graphs are sparse graphs with good connectivity properties and they have become ubiquitous in theoretical computer science. Dimension expanders are a linear-algebraic variant where we ask for a constant number of linear maps that expand...

Feb
10
2015

Computer Science/Discrete Mathematics Seminar II

How to round subspaces: a new spectral clustering algorithm
10:30am|S-101

Given a $k$-dimensional linear subspace, consider the problem of approximating it (with respect to the spectral norm) in terms of another subspace spanned by the indicators of a $k$-partition of the coordinates. This is known as the spectral...

Feb
17
2015

Computer Science/Discrete Mathematics Seminar II

The log-concavity conjecture and the tropical Laplacian
10:30am|S-101

The log-concavity conjecture predicts that the coefficients of the chromatic (characteristic) polynomial of a matroid form a log-concave sequence. The known proof for realizable matroids uses algebraic geometry in an essential way, and the...

Feb
24
2015

Computer Science/Discrete Mathematics Seminar II

Computing inverses
Louis Rowen
10:30am|S-101

We compare methods of computing inverses of matrices over division rings. The most direct way is via Cohn's theory of full matrices, which was improved by Malcolmson, Schofield, and Westreich. But it is simpler to work with finite dimensional...

Mar
03
2015

Computer Science/Discrete Mathematics Seminar II

Whitney numbers via measure concentration in representation varieties
Karim Adiprasito
10:30am|S-101

We provide a simple proof of the Rota--Heron--Welsh conjecture for matroids realizable as c-arrangements in the sense of Goresky--MacPherson: we prove that the coefficients of the characteristic polynomial of the associated matroids form log-concave...

Mar
10
2015

Computer Science/Discrete Mathematics Seminar II

Chernoff bounds for expander walks
10:30am|West Bldg. Lect. Hall

Expander walk sampling is an important tool for derandomization. For any bounded function, sampling inputs from a random walk on an expander graph yields a sample average which is quite close to the true mean, and moreover the deviations obtained...

Mar
17
2015

Computer Science/Discrete Mathematics Seminar II

Average-case lower bounds for formula size
10:30am|S-101

We give an explicit example for a Boolean function $f : \{0,1\}^n \to \{0,1\}$, such that every Boolean formula of size at most $n^{2.999}$, with gates AND, OR and NOT, computes $f$ correctly on at most $1/2 + \epsilon$ fraction of the inputs, where...

Mar
24
2015

Computer Science/Discrete Mathematics Seminar II

Tractability as compressibility
Dimitris Achlioptas
10:30am|S-101

Given a collection of constraints over a collection of variables consider the following generic constraint satisfaction algorithm: start with a random assignment of values to the variables; while violated constraints exist, select a random such...

Mar
31
2015

Computer Science/Discrete Mathematics Seminar II

Kolmogorov width of discrete linear spaces: an approach to matrix rigidity
10:30am|S-101

A square matrix $V$ is called rigid if every matrix obtained by altering a small number of entries of $V$ has sufficiently high rank. While random matrices are rigid with high probability, no explicit constructions of rigid matrices are known to...

Apr
07
2015

Computer Science/Discrete Mathematics Seminar II

Interleaved products in special linear groups: mixing and communication complexity
10:30am|S-101

Let $S$ and $T$ be two dense subsets of $G^n$, where $G$ is the special linear group $\mathrm{SL}(2,q)$ for a prime power $q$. If you sample uniformly a tuple $(s_1,\ldots,s_n)$ from $S$ and a tuple $(t_1,\ldots,t_n)$ from $T$ then their interleaved...

Sep
22
2015

Computer Science/Discrete Mathematics Seminar II

Explicit two-source extractors and resilient functions II
10:30am|S-101

We explicitly construct an extractor for two independent sources on $n$ bits, each with min-entropy at least $\log^C n$ for a large enough constant $C$. Our extractor outputs one bit and has error $n^{-\Omega(1)}$. The best previous extractor, by...

Oct
06
2015

Computer Science/Discrete Mathematics Seminar II

Invariants of random knots
Chaim Even Zohar
10:30am|West Bldg. Lect. Hall

A knot is a closed curve embedded in the three-dimensional space, like a rope whose two ends are joined together. As usual in Topology, two knots are equivalent if one can be deformed into the other by continuous moves, where stretching and...

Oct
13
2015

Computer Science/Discrete Mathematics Seminar II

Non-constructive combinatorics
10:30am|S-101

I will describe several old and new applications of topological and algebraic methods in the derivation of combinatorial results. In all of them the proofs provide no efficient solutions for the corresponding algorithmic problems. Finding such...

Oct
27
2015

Computer Science/Discrete Mathematics Seminar II

Algorithmic proof of the Lovasz Local Lemma via resampling oracles
10:30am|S-101

For a collection of events on a probability space with specified dependencies, the Lovasz Local Lemma ("LLL") gives a sufficient condition for the existence of a point avoiding all the events. Following Moser's discovery of an efficient algorithm...

Nov
03
2015

Computer Science/Discrete Mathematics Seminar II

Two-source dispersers for polylogarithmic entropy and improved Ramsey graphs II
10:30am|S-101

In his 1947 paper that inaugurated the probabilistic method, Erdős proved the existence of $2 \log(n)$-Ramsey graphs on $n$ vertices. Matching Erdős' result with a constructive proof is a central problem in combinatorics that has gained a...

Nov
10
2015

Computer Science/Discrete Mathematics Seminar II

Exponential separation of communication and external information
10:30am|S-101

We show an exponential gap between communication complexity and external information complexity, by analyzing a communication task suggested as a candidate by Braverman [Bra13]. Previously, only a separation of communication complexity and internal...

Nov
17
2015

Computer Science/Discrete Mathematics Seminar II

Cohomology for computer science
Alex Lubotzky
10:30am|S-101

We will start with presenting the basic notions of (co)homomology of simplical complexes (which requires only basic linear algebra over the field of order 2) and then we will indicate its relevance for several topics in computer science and...

Nov
24
2015

Computer Science/Discrete Mathematics Seminar II

General systems of linear forms: equidistribution and true complexity
10:30am|S-101

Higher-order Fourier analysis is a powerful tool that can be used to analyse the densities of linear systems (such as arithmetic progressions) in subsets of Abelian groups. We are interested in the group $\mathbb{F}_p^n$, for fixed $p$ and large $n$...

Dec
01
2015

Computer Science/Discrete Mathematics Seminar II

Rigidity of random Toeplitz matrices with an application to depth three circuits
10:30am|S-101

Joint work with Oded Goldreich. We prove that random $n$-by-$n$ Toeplitz matrices over $GF(2)$ have rigidity $\Omega(n^3/(r^2 \log n))$ for rank $r > \sqrt{n}$, with high probability. This improves, for $r = o(n / \log n \log\log n)$, over the $...

Dec
08
2015

Computer Science/Discrete Mathematics Seminar II

Ramanujan coverings of graphs
10:30am|West Bldg. Lect. Hall

Ramanujan graphs are optimal expander graphs, and their existence and construction have been the focus of much research during the last three decades. We prove that every bipartite Ramanujan graph has a $d$-covering which is also Ramanujan. This...

Jan
12
2016

Computer Science/Discrete Mathematics Seminar II

Anti-concentration: results and applications
Hoi Nguyen
10:30am|S-101

I will survey some characterization results on random walks which stick to a small region unusually long. In application we give a description of unitary matrices of large permanent.

Jan
19
2016

Computer Science/Discrete Mathematics Seminar II

Proof Complexity Lower Bounds from Algebraic Circuit Complexity
10:30am|S-101

Proof complexity studies the complexity of mathematical proofs, with the aim of exhibiting (true) statements whose proofs are always necessarily long. One well-known proof system is Hilbert's Nullstellensatz, which shows that if the family $F=\{f_1...

Feb
02
2016

Computer Science/Discrete Mathematics Seminar II

Constant-round interactive-proofs for delegating computations (continued)
Ron Rothblum
10:30am|S-101

We will continue Monday's talk on constant-round interactive proofs, going into more details of the full construction and its proof. We will also briefly recap Monday's talk so that it will be beneficial to those who cannot attend on Monday.

Feb
09
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem is determining if a given such matrix is invertible or singular (over the appropriate field of...

Feb
16
2016

Computer Science/Discrete Mathematics Seminar II

The singularity of symbolic matrices
10:30am|S-101

While this lecture is a continuation of the lecture from last Tuesday, I will make it self contained. The main object of study of this talk are matrices whose entries are linear forms in a set of formal variables (over some field). The main problem...

Feb
23
2016

Computer Science/Discrete Mathematics Seminar II

Minkowski sums, mixed faces and combinatorial isoperimetry
Karim Adiprasito
10:30am|S-101

I want to sketch some algebraic and geometric tools to solve a variety of extremal problems surrounding Minkowski sums of polytopes and colorful simplicial depth.

Mar
01
2016

Computer Science/Discrete Mathematics Seminar II

Graph isomorphism in quasipolynomial time II
László Babai
10:30am|S-101

The algorithm indicated in the title builds on Luks's classical framework and introduces new group theoretic and combinatorial tools. In the first talk we outline the algorithm and state the core group theoretic and algorithmic ingredients. Some of...

Mar
08
2016

Computer Science/Discrete Mathematics Seminar II

Fast learning requires good memory: a time-space lower bound for parity learning
10:30am|S-101

We prove that any algorithm for learning parities requires either a memory of quadratic size or an exponential number of samples. This proves a recent conjecture of Steinhardt, Valiant and Wager and shows that for some learning problems a large...

Mar
15
2016

Computer Science/Discrete Mathematics Seminar II

Proof complexity - an introduction
10:30am|S-101

Proof systems pervade all areas of mathematics (often in disguise: e.g. Reidemeister moves is a sound and complete proof system for proving the equivalence of knots given by their diagrams). Proof complexity seeks to to understand the minimal...

Mar
22
2016

Computer Science/Discrete Mathematics Seminar II

The Resolution proof system
10:30am|S-101

The Resolution proof system is perhaps the simplest and most universally used in verification system and automated theorem proving. It was introduced by Davis and Putnam in 1960. The study of its efficiency, both in terms of proof length of natural...

Apr
05
2016

Computer Science/Discrete Mathematics Seminar II

An average-case depth hierarchy theorem for Boolean circuits II
Li-Yang Tan
10:30am|S-101

We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of AND, OR, and NOT gates. Our hierarchy theorem says that for every $d \geq 2$, there is an explicit $n$-variable Boolean function $f$, computed by a...

Apr
19
2016

Computer Science/Discrete Mathematics Seminar II

A characterization of functions with vanishing averages over products of disjoint sets
10:30am|S-101

We characterize all complex-valued (Lebesgue) integrable functions $f$ on $[0,1]^m$ such that $f$ vanishes when integrated over the product of $m$ measurable sets which partition $[0,1]$ and have prescribed Lebesgue measures $\\alpha_1,\\ldots,\...

Apr
26
2016

Computer Science/Discrete Mathematics Seminar II

Reed-Muller codes for random erasures and errors
Amir Shpilka
10:30am|S-101

Reed-Muller codes encode an $m$-variate polynomial of degree $r$ by evaluating it on all points in $\{0,1\}^m$. Its distance is $2^{m-r}$ and so it cannot correct more than that many errors/erasures in the worst case. For random errors one may hope...

May
03
2016

Computer Science/Discrete Mathematics Seminar II

Fourier tails for Boolean functions and their applications
10:30am|S-101

The discrete Fourier transform is a widely used tool in the analysis of Boolean functions. One can view the Fourier transform of a Boolean function $f:\{0,1\}^n \to \{0,1\}$ as a distribution over sets $S \subseteq [n]$. The Fourier-tail at level $k...

Sep
20
2016

Computer Science/Discrete Mathematics Seminar II

Algebraic geometric codes and their applications
10:30am|S-101

In 1975 Goppa suggested a general method for constructing error correcting codes based on algebraic geometry. In a long line of research such codes were constructed, constituting as a precious example of a construction that beats the probabilistic...

Oct
18
2016

Computer Science/Discrete Mathematics Seminar II

Real rooted polynomials and multivariate extensions
10:30am|S-101

I will introduce two notions that generalize the idea of real rootedness to multivariate polynomials: real stability and hyperbolicity. I will then show two applications of these types of polynomials that will (hopefully) be of interest to the CS...

Oct
25
2016

Computer Science/Discrete Mathematics Seminar II

Sum of squares, quantum entanglement, and log rank
10:30am|S-101

The sum-of-squares (SOS) method is a conceptually simple algorithmic technique for polynomial optimization that---quite surprisingly---captures and generalizes the best known efficient algorithms for a wide range of NP-hard optimization problems...

Nov
01
2016

Computer Science/Discrete Mathematics Seminar II

Settling the complexity of computing approximate two-player Nash equilibria
Aviad Rubinstein
10:30am|West Building Lecture Hall

We prove that there exists a constant $\epsilon > 0$ such that, assuming the Exponential Time Hypothesis for PPAD, computing an $\epsilon$-approximate Nash equilibrium in a two-player ($n \times n$) game requires quasi-polynomial time, $n^{\log^{1-o...

Nov
08
2016

Computer Science/Discrete Mathematics Seminar II

Exact tensor completion via sum of squares
10:30am|S-101

In the matrix completion problem, we have a matrix $M$ where we are only given a small number of its entries and our goal is to fill in the rest of the entries. While this problem is impossible to solve for general matrices, it can be solved if $M$...

Nov
15
2016

Computer Science/Discrete Mathematics Seminar II

Non-malleable extractors for constant depth circuits, and affine functions
10:30am|S-101

Seeded and seedless non-malleable extractors are non-trivial generalizations of the more commonly studied seeded and seedless extractors. The original motivation for constructing such non-malleable extractors are from applications to cryptography...