Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Nov
19
2024

Computer Science/Discrete Mathematics Seminar II

Quadratic Stability of the Brunn-Minkowski Inequality
10:30am|Simonyi 101 and Remote Access

The Brunn-Minkowski inequality is a fundamental result in convex geometry controlling the volume of  the sum of subsets of $\mathbb{R}^n$. It asserts that for  sets $A,B\subset \mathbb{R}^n$ of equal volume and a parameter $t\in(0,1)$, we have $|tA+...

Nov
26
2024

Computer Science/Discrete Mathematics Seminar II

Simple High Dimensional Expanders from Cayley Graphs
10:30am|Simonyi 101 and Remote Access

Expander graphs are a staple of theoretical computer science. These are graphs which are both sparse and well connected. They are simple to construct and modify. Therefore they are a central gadget in numerous applications in TCS and combinatorics...

Dec
03
2024

Computer Science/Discrete Mathematics Seminar II

A Review of the Notion of Graph Rigidity and Some Recent Developments
10:30am|Simonyi 101 and Remote Access

A d-dimensional framework is a pair $(G, \vec{p})$ consisting of a finite simple graph $G$ and an embedding $\vec{p}$ of its vertices in $\mathbb{R}^d$. A framework is called rigid if every continuous motion of the vertices in ${\mathbb R}^d$ that...

Dec
13
2024

Computer Science/Discrete Mathematics Seminar II

Grid-norm Regularity for Somewhat Dense Graphs, and Some Applications
10:30am|Simonyi 101 and Remote Access

In 2023, Raghu Meka and I proved a substantially improved bound on the size of the smallest set of integers in [N] which contains no 3-term arithmetic progression. Since then, it has become clear that the main new ideas from that work are in fact...

Dec
17
2024

Computer Science/Discrete Mathematics Seminar II

Problems in Extremal Combinatorics and Connections with Multiparty Communication Complexity
10:30am|Simonyi 101 and Remote Access

In this talk we will discuss some recent progress on some questions in extremal combinatorics and in multiparty communication complexity.

We will also discuss some general connections between the two fields, emphasizing how certain problems (e.g...

Jan
14
2025

Computer Science/Discrete Mathematics Seminar II

Random Matrices From $GL_n(q)$ Sampled by Words
10:30am|Simonyi Classroom (S-114) and Remote Access

Every word in a free group induces a probability distribution on every finite group by substituting the letters of w by uniformly random elements of the group. The connection between such distributions on the symmetric group and the poset of...

Jan
21
2025

Computer Science/Discrete Mathematics Seminar II

Explicit Codes Approaching the Generalized Singleton Bound Using Expanders
10:30am|Simonyi 101 and Remote Access

Error correcting codes are objects designed to withstand errors that may arise during communication. Originally intended for practical use, codes have come to be established as one of the central objects of study in theoretical computer science, due...

Jan
28
2025

Computer Science/Discrete Mathematics Seminar II

Spectral Algorithms from Induced Subgraphs of Cayley Graphs
10:30am|Simonyi 101 and Remote Access

In this talk, we present a new method to solve algorithmic and combinatorial problems by (1) reducing them to bounding the maximum, over x in {-1, 1}^n, of homogeneous degree-q multilinear polynomials, and then (2) bounding the maximum value...

Feb
04
2025

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Local Codes from Induced Subgraphs of Cayley Graphs
10:30am|Rubenstein Commons | Meeting Room 5

We present a new method to solve algorithmic and combinatorial problems by (1) reducing them to bounding the maximum, over x in {-1, 1}^n, of homogeneous degree-q multilinear polynomials, and then (2) bounding the maximum value attained by these...

Feb
11
2025

Computer Science/Discrete Mathematics Seminar II

Monochromatic Sums and Products over the Rationals
Maria-Romina Ivan
10:30am|Simonyi 101 and Remote Access

Hindman’s Theorem states that whenever the natural numbers are finitely coloured there exists an infinite sequence all of whose finite sums are the same colour. By considering just powers of 2, this immediately implies the corresponding result for...

Feb
18
2025

Computer Science/Discrete Mathematics Seminar II

“Sharp” Selector Processes
10:30am|Simonyi 101 and Remote Access

Positive selector processes are natural stochastic processes driven by sparse Bernoulli random variables. They play an important role in the study of suprema of general stochastic processes, and in particular, Talagrand posed the selector process...

Feb
25
2025

Computer Science/Discrete Mathematics Seminar II

Independent Sets in Random Cayley Graphs
10:30am|Simonyi 101 and Remote Access

Cayley graphs provide interesting bridges between graph theory, additive combinatorics and group theory. Fixing an ambient finite group, random Cayley graphs are constructed by choosing a generating set at random. These graphs reflect interesting...

Mar
04
2025

Computer Science/Discrete Mathematics Seminar II

A Theory of Generalized Boosting
10:30am|Simonyi 101 and Remote Access

Boosting is a fundamental and widely used method in machine learning, which determines that weak learnability of binary functions implies strong learnability. Traditionally, boosting theory has primarily focused on symmetric 0-1 loss functions...

Mar
11
2025

Computer Science/Discrete Mathematics Seminar II

On the Complexity of Isomorphism Problems for Tensors, Groups, Polynomials, and Algebras
10:30am|Simonyi 101 and Remote Access

Two matrices are called equivalent if one can be transformed into the other by multiplying with invertible matrices on the left and right. Extending this idea to 3-tensors, it is natural to define two 3-tensors as isomorphic if they can be...

Mar
25
2025

Computer Science/Discrete Mathematics Seminar II

Sylvester, Gallai and Friends: Discrete Geometry Meets Computational Complexity
10:30am|Simonyi 101 and Remote Access

For every finite set of points in the plane, if every line going through any two of them contains a third, then they all lie on a single line. This ``local-to-global" theorem (which you can play with proving)  has many generalizations, to higher...

Apr
01
2025

Computer Science/Discrete Mathematics Seminar II

Locally Testable Codes with the Multiplication Property from High-dimensional Expanders
10:30am|Simonyi 101 and Remote Access

A locally testable code (LTC) is an error-correcting code equipped with a tester T that, given an input string x, queries only a small number of positions and rejects x with probability proportional to its distance from the code. Classic examples of...

Apr
08
2025

Computer Science/Discrete Mathematics Seminar II

Cosystolic Expansion
10:30am|Simonyi 101 and Remote Access

High dimensional expansion comes in two flavors: spectral, which relates to random walks;  and cosystolic, which relates to chains of linear maps. The later is a more mysterious notion, which turns out related to a variety of applications such as...

May
27
2025

Computer Science/Discrete Mathematics Seminar II

Why Extension-Based Proofs Fail
Faith Ellen
10:30am|Simonyi Hall 101 and Remote Access

A valency argument is an elegant and well-known technique for proving impossibility results in distributed computing. It is an example of an extension-based proof, which is modelled as an interaction between a prover and a protocol. Even though...

Jun
17
2025

Computer Science/Discrete Mathematics Seminar II

Upper Bounds for Multicolour Ramsey Numbers
Marius Tiba
10:30am|Simonyi Hall 101 and Remote Access

The $r$-colour Ramsey number $R_r(k)$ is the minimum $n \in \mathbb{N}$ such that every $r$-colouring of the edges of the complete graph $K_n$ on $n$ vertices contains a monochromatic copy of $K_k$. We prove, for each fixed $r \ge 2$, that 

$$R_r(k)...

Sep
23
2025

Computer Science/Discrete Mathematics Seminar II

Simulating Time With Square-Root Space (And With Details)
10:30am|Rubenstein Commons | Meeting Room 5

We will go in-depth into the proof that for all functions $t(n) \geq n$, every multitape Turing machine running in time $t$ can be simulated in space only $O(\sqrt{t \log t})$. We will attempt to be completely self-contained. To that end, we will...

Sep
30
2025

Computer Science/Discrete Mathematics Seminar II

Approximate Covers and Cocycle Expansion
10:30am|Simonyi Hall 101 and Remote Access

I will talk about the well known relation between cocycles and covers.  Then, I will discuss the relation of cocycle expansion to approximate covers, and finally how these show up in low-soundness PCP agreement tests.

Oct
07
2025

Computer Science/Discrete Mathematics Seminar II

Algorithms for Solving Random and Semirandom Planted Constraint Satisfaction Problems
10:30am|Simonyi Hall 101 and Remote Access

In this talk, we will discuss new algorithms for solving instances of random and semirandom planted constraint satisfaction problems (CSPs). Random CSP are generated by first choosing a solution x and then sampling constraints so that x satisfies...

Oct
14
2025

Computer Science/Discrete Mathematics Seminar II

From PCPs to Parallel PCPs: Hardness of Approximation in Parameterized Complexity
Karthik C. S.
10:30am|Dilworth Room

In this talk, I will begin with a quick primer to parameterized complexity, present some key insights from recent hardness of approximation results in the area, and end with a proof sketch of the following result: Assuming the Exponential Time...

Oct
21
2025

Computer Science/Discrete Mathematics Seminar II

Aldous-type Spectral Gaps in Unitary Groups, Part I
10:30am|Simonyi 101 and Remote Access

Around 1992, Aldous made the following bold conjecture. Let A be any set of transpositions in the symmetric group Sym(N). Then the spectral gap of the Cayley graph Cay(Sym(N),A) is identical to that of a relatively tiny N-vertex graph defined by A...

Oct
28
2025

Computer Science/Discrete Mathematics Seminar II

Aldous-type Spectral Gaps in Unitary Groups, Part II
10:30am|Simonyi 101 and Remote Access

Around 1992, Aldous made the following bold conjecture. Let A be any set of transpositions in the symmetric group Sym(N). Then the spectral gap of the Cayley graph Cay(Sym(N),A) is identical to that of a relatively tiny N-vertex graph defined by A...

Nov
04
2025

Computer Science/Discrete Mathematics Seminar II

No Exponential Quantum Speedup for SIS^inf Anymore
10:30am|Simonyi 101 and Remote Access

Given linear equations over a finite field and under infinity norm, the Short-Integer-Solution (SIS^inf) problem asks to find a solution where each entry is a small number.

In 2021, Chen, Liu, and Zhandry presented an efficient quantum algorithm for...

Nov
11
2025

Computer Science/Discrete Mathematics Seminar II

Hard Functions from on High: Local List Decoding from HDX
10:30am|Simonyi 101 and Remote Access

Can we encode data in a way that it is recoverable even when 1) most data becomes corrupted, and 2) we can only read a sub-constant fraction of the database? This is the central question of local list decoding, a powerful tool from coding theory...

Nov
18
2025

Computer Science/Discrete Mathematics Seminar II

Local List Decoding from HDX II
10:30am|Simonyi 101 and Remote Access

In this talk we will construct (approximate) locally list decodable codes from high dimensional expanders (HDXs).

Last week we saw that locally list decoding is a powerful tool from coding theory. We also got a subspace-based construction of...

Nov
25
2025

Computer Science/Discrete Mathematics Seminar II

Linial-Meshulam Complexes
10:30am|Simonyi 101 and Remote Access

Inspired by the Erdos--Renyi model for random graphs, Linial and Meshulam devised in 2006 a model for random 2-dimensional simplicial complexes. The goal of this talk (and the next) is to present some nice results about the behavior of these random...

Dec
02
2025

Computer Science/Discrete Mathematics Seminar II

Linial-Meshulam Complexes 2
10:30am|Simonyi 101 and Remote Access

Last week we defined the Linial--Meshulam model for random 2 dimensional simplicial complexes and discussed two notions of connectivity for it: Vanishing of its 1st cohomology with F2 coefficients, and vanishing of its fundamental group. This time...

Dec
09
2025

Computer Science/Discrete Mathematics Seminar II

On Turán Numbers of Tight Cycles
10:30am|Simonyi 101 and Remote Access

The study of Turán numbers of graphs and hypergraphs is a rich problem in extremal combinatorics. The Turán problem asks, given a fixed forbidden (hyper)graph F, what is the maximum number of edges in an F-free (hyper)graph in terms of the number of...

Computer Science/Discrete Mathematics Seminar III

Mar
22
2005

Computer Science/Discrete Mathematics Seminar III

Information Theory and Probability Estimation
Alon Orlitsky
11:30am|S-101

Standard information-theoretic results show that data over small, typically binary, alphabets can be compressed to Shannon's entropy limit. Yet most practical sources, such as text, audio, or video, have essentially infinite support. Compressing...

May
06
2005

Computer Science/Discrete Mathematics Seminar III

An O(log n log log n) Space Algorithm for Undirected st-Connectivity
2:00pm|S-101

Undirected st-connectivity (USTCONN) is the problem of checking whether two given vertices of an undirected graph are connected by a path. Solving USTCONN in space O(log n), and even o(log2 n), is a challenging task. A randomized logspace algorithm...

Jun
01
2005

Computer Science/Discrete Mathematics Seminar III

Computing Equilibria
Christos Papadimitriou
11:15am|S-101

There has been some recent excitement and progress in the long-stalled topic of efficient algorithms for finding equilibria in games and other economic contexts. We discuss some of these developments.

Oct
28
2005

Computer Science/Discrete Mathematics Seminar III

Hyperbolic Polynomials and Van der Waerden/Schrijver-Valiant like Conjectures
2:00pm|S-101

The van der Waerden conjecture states that the permanent of N by N doubly stochastic matrix A satisfies the inequality Per(A) >= n! / n^n (VDW bound) and was finally proven (independently) by D.I. Falikman and G.P. Egorychev in 1981. It was for more...

Mar
16
2006

Computer Science/Discrete Mathematics Seminar III

Time-Space Trade-Offs for Predecessor Search
Mikkel Thorup
11:15am|S-101

We develop a new technique for proving cell-probe lower bounds for static data structures. Previous lower bounds used a reduction to communication games, which was known not to be tight by counting arguments. We give the first lower bound for an...

Dec
13
2006

Computer Science/Discrete Mathematics Seminar III

Permanents, Determinants and Non-Commutativity
Alistair Sinclair
11:15am|West Building Lecture Theatre

All known efficient algorithms for computing the determinant of a matrix rely on commutativity of the matrix entries. How important is this property, and could we make use of an algorithm that computes determinants without assuming commutativity? In...

May
16
2008

Computer Science/Discrete Mathematics Seminar III

Reconstruction of Depth-3 Arithmetic Circuits
Amir Shpilka
10:30am|West Bldg. Lecture Hall

Depth-3 arithmetic circuits compute polynomials that can be represented as sums of products of linear functions. In spite of their simple structure, we are far from understanding such circuits. In this talk we will focus on the reconstruction...

Condensed Learning Seminar

Sep
29
2023

Condensed Learning Seminar

Organizational Meeting
2:30pm|Princeton University, Fine Hall 314

This is the introductory talk for a semester-long learning seminar on the notion of solid modules and the resulting 6-functor formalism for coherent cohomology.

Oct
23
2023

Condensed Learning Seminar

Solid Modules and Six Functors for Quasi-Coherent Sheaves
3:30pm|Simonyi Hall 101 and Remote Access

Quasi-coherent sheaves cannot support a six-functor formalism in the same way that e.g. \ell-adic sheaves do. Clausen and Scholze have shown that this can be fixed by extending the category of quasi-coherent sheaves to `solid sheaves’. In this talk...

Nov
03
2023

Condensed Learning Seminar

Analytic Rings
2:30pm|Princeton University, Fine Hall 314

This talk is an introduction to analytic rings. Some examples and non-examples will be covered. Some nice properties of the module categories will be proved.