2006-2007 seminars

Feb
06
2007

Computer Science/Discrete Mathematics Seminar II

Algebraic Property Testing
10:30am|S-101

A Property P of functions is said to be testable if there exists a probabilistic algorithm that makes few (constant) queries for the value of f and accepts those satisfying P while rejecting functions that are far from any function satisfying P. In...

Jan
30
2007

Computer Science/Discrete Mathematics Seminar II

On Approximate Majority and Probabilistic Time
10:30am|S-101

Sipser and Gács, and independently Lautemann, proved in '83 that probabilistic polynomial time is contained in the second level of the polynomial-time hierarchy, i.e. BPP is in \Sigma_2 P. This is essentially the only non-trivial upper bound that we...

Jan
29
2007

Computer Science/Discrete Mathematics Seminar I

Secure Multipary Quantum Computation
Michael Ben-Or
11:15am|S-101

Suppose we have n players who wish to jointly perform a quantum computation, but some of them are faulty and are trying to learn privileged information and/or sabotage the computation. How many cheaters can we tolerate and still have a secure...

Jan
23
2007

Computer Science/Discrete Mathematics Seminar II

The Polynomial Identity Testing Problem
10:30am|West Building Lecture Theatre

Polynomial Identity Testing is the following problem: given an arithmetic circuit C, determine if the polynomial computed by it is the identically zero polynomial. This problem admits a randomized polynomial-time algorithm but no efficient...

Jan
22
2007

Computer Science/Discrete Mathematics Seminar I

On the Condition Number of a Randomly Perturbed Matrix
11:15am|West Building Lecture Theatre

Let $M$ be an arbitrary $n$ by $n$ matrix. We study the condition number a random perturbation $M+N_n$ of $M$, where $N_n$ is a random matrix, motivated by a problem raised by Spielman and Teng. It is shown that, under very general conditions on $M$...

Jan
16
2007

Computer Science/Discrete Mathematics Seminar II

An Elementary Construction of Constant-Degree Expanders
Oded Schwartz
10:30am|S-101

We describe a short and easy-to-analyze construction of constant-degree expanders. The construction relies on the replacement product, applied by Reingold et. al. [2002] to give an iterative construction of bounded-degree expanders. Here we give a...

Jan
15
2007

Computer Science/Discrete Mathematics Seminar I

How to Rank with Few Errors: A PTAS for Weighted Feedback Arc Set on Tournaments
Warren Schudy
11:15am|S-101

Suppose you ran a chess tournament, everybody played everybody, and you wanted to use the results to rank everybody. Unless you were really lucky, the results would not be acyclic, so you could not just sort the players by who beat whom. A natural...

Dec
19
2006

Computer Science/Discrete Mathematics Seminar II

Sum-Product Estimates, Expanders, and Sieving
Alex Gamburd
10:30am|S-101

We prove that Cayley graphs of SL_2(Z/qZ) are expanders with respect to the projection of any fixed elements in SL_2(Z) generating a non-elementary subgroup. This expansion property plays crucial role in establishing almost prime version of "SL_2(Z)...

Dec
18
2006

Computer Science/Discrete Mathematics Seminar I

On the Computation and Approximation of Two-Player Nash Equilibria
11:15am|S-101

In 1950, Nash showed that every non-cooperative game has an equilibrium. Before his work, the result was known only for two-player zero-sum games. While von Neumann's minimax theorem was the mathematical foundation of the two-player zero-sum game...