Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar I

May
01
2006

Computer Science/Discrete Mathematics Seminar I

Many Hamiltonian Cycles
Jeff Kahn
11:15am|S-101

We'll begin with the following theorem, which proves a conjecture of S\'ark\"ozy, Selkow and Szemer\'edi, and try to use it as an excuse to talk about other things (perhaps including Br\'egman's Theorem, entropy, the ``incremental random method,"...

May
08
2006

Computer Science/Discrete Mathematics Seminar I

Universal Graphs
11:15am|S-101

Let $F$ be a family of graphs. A graph $H$ is *$F$-universal* if every $G\in F$ is isomorphic to a subgraph of $H$. Besides being of theoretical interest, universal graphs have applications in chip design and network simulation. For any two positive...

May
15
2006

Computer Science/Discrete Mathematics Seminar I

New Connections Between Derandomization, Worst-Case Complexity and Average-Case Complexity
Danny Gutfreund
11:15am|Dilworth Room

We show new connections between derandomization, worst-case hardness and average-case hardness. Specifically, we show that a mild derandomization assumption together with the worst-case hardness of NP implies the average-case hardness of a language...

Sep
25
2006

Computer Science/Discrete Mathematics Seminar I

Minimum Bounded-Degree Spanning Trees Through Matroid Intersection
Michel Goemans
11:15am|S-101

Consider the minimum cost spanning tree problem under the restriction that all degrees must be at most a given value $k$. The main result I will present is that one can efficiently find a spanning tree of maximum degree at most $k+2$ whose cost is...

Oct
09
2006

Computer Science/Discrete Mathematics Seminar I

Languages with Bounded Multiparty Communication Complexity
11:15am|West Building Lecture Theatre

We uncover the structure of those languages that have bounded (by a constant) k-party communication complexity in the input on the forehead model, no matter how we partition the input bits into k disjoint sets. This generalizes an earlier result of...

Oct
16
2006

Computer Science/Discrete Mathematics Seminar I

Randomness-Efficient Sampling Within NC^1
Alex Healy
11:15am|S-101

It is now well-known that a random walk on an expander graph is a very good "sampler", and this has been used to prove a variety of important results in complexity theory, cryptography and algorithms. On the surface, however, taking a walk on an...

Oct
30
2006

Computer Science/Discrete Mathematics Seminar I

2-Source Dispersers for n^{o(1)} Entropy, and Ramsey Graphs Beating theFrankl-Wilson Construction
11:15am|S-101

The main result of this work is an explicit disperser for two independent sources on n bits, each of entropy k=n^{o(1)}. Put differently, setting N=2^n and K=2^k, we construct explicit N by N Boolean matrices for which no K by K submatrix is...

Nov
06
2006

Computer Science/Discrete Mathematics Seminar I

Towards Harmful Low-Rate Noise Models for Quantum Computers
11:15am|S-101

We propose and discuss two conjectures on the nature of errors in highly correlated noisy physical stochastic systems. The first asserts that errors for a pair of substantially correlated elements are themselves substantially correlated. The second...

Nov
13
2006

Computer Science/Discrete Mathematics Seminar I

Coupon Go
Elwyn Berlekamp
11:15am|S-101

Decomposition and modularity are fundamental issues in many fields, including mathematics, biology, engineering, and management. How can large systems be broken into subsystems which interact enough to meet the overall system goals, but not so much...

Nov
27
2006

Computer Science/Discrete Mathematics Seminar I

New Locally Decodable Codes and Private Information Retrieval Schemes
11:15am|S-101

A q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only q bits of the codeword C(x), even after some constant fraction of...

Dec
04
2006

Computer Science/Discrete Mathematics Seminar I

Transparent Achievement of Correlated Equilibrium
Silvio Micali
11:15am|S-101

Achieving correlated equilibrium is a problem at the intersection of game theory, cryptography and efficient algorithms. Thus far, however, perfectly rational solutions have been lacking, and the problem has been formulated with somewhat limited...

Dec
11
2006

Computer Science/Discrete Mathematics Seminar I

Approximation Algorithms for Combinatorial Allocation Problems
11:15am|S-101

In combinatorial allocation, m items are to be assigned to n players so that their total utility is maximized. This problem has many variants depending on the utility functions involved and possible additional constraints. We consider two variants...

Dec
18
2006

Computer Science/Discrete Mathematics Seminar I

On the Computation and Approximation of Two-Player Nash Equilibria
11:15am|S-101

In 1950, Nash showed that every non-cooperative game has an equilibrium. Before his work, the result was known only for two-player zero-sum games. While von Neumann's minimax theorem was the mathematical foundation of the two-player zero-sum game...

Jan
15
2007

Computer Science/Discrete Mathematics Seminar I

How to Rank with Few Errors: A PTAS for Weighted Feedback Arc Set on Tournaments
Warren Schudy
11:15am|S-101

Suppose you ran a chess tournament, everybody played everybody, and you wanted to use the results to rank everybody. Unless you were really lucky, the results would not be acyclic, so you could not just sort the players by who beat whom. A natural...

Jan
22
2007

Computer Science/Discrete Mathematics Seminar I

On the Condition Number of a Randomly Perturbed Matrix
11:15am|West Building Lecture Theatre

Let $M$ be an arbitrary $n$ by $n$ matrix. We study the condition number a random perturbation $M+N_n$ of $M$, where $N_n$ is a random matrix, motivated by a problem raised by Spielman and Teng. It is shown that, under very general conditions on $M$...

Jan
29
2007

Computer Science/Discrete Mathematics Seminar I

Secure Multipary Quantum Computation
Michael Ben-Or
11:15am|S-101

Suppose we have n players who wish to jointly perform a quantum computation, but some of them are faulty and are trying to learn privileged information and/or sabotage the computation. How many cheaters can we tolerate and still have a secure...

Feb
12
2007

Computer Science/Discrete Mathematics Seminar I

Biased Positional Games and Thin Hypergraphs with Large Covers
11:15am|S-101

We consider biased positional games, played on the edge set of a complete graph Kn on n vertices. These games are played by two players, called Maker and Breaker, who take turns in claiming previously unoccupied edges of Kn. Maker claims a single...

Feb
19
2007

Computer Science/Discrete Mathematics Seminar I

Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes
11:15am|S-101

We give an improved explicit construction of highly unbalanced bipartite expander graphs with expansion arbitrarily close to the degree (which is polylogarithmic in the number of vertices). Both the degree and the number of right-hand vertices are...

Feb
26
2007

Computer Science/Discrete Mathematics Seminar I

Hardness Amplification for Errorless Heuristics
11:15am|S-101

We say a problem is tractable on average if it can be solved on a "good" fraction of instances by an efficient algorithm. To make this definition precise, we need to make two choices: First, what is a "good" fraction of instances - is it 1%, 51%, 99...

Mar
05
2007

Computer Science/Discrete Mathematics Seminar I

Efficient Algorithms Using the Multiplicative Weights Update Method
Satyen Kale
11:15am|S-101

Algorithms based on convex optimization, especially linear and semidefinite programming, are ubiquitous in Computer Science. While there are polynomial time algorithms known to solve such problems, quite often the running time of these algorithms is...

Mar
12
2007

Computer Science/Discrete Mathematics Seminar I

Disjoint Paths in Networks
Sanjeev Khanna
12:15pm|S-101

A fundamental problem in combinatorial optimization is the edge-disjoint paths problem (EDP). We are given a network and a collection of source-destination pairs in the network. The goal is to maximize the number of pairs that can be connected by...

Mar
19
2007

Computer Science/Discrete Mathematics Seminar I

A Cryptographic Study of Secure Internet Measurement
David Xiao
12:15pm|S-101

The Internet is an indispensable part of our information society, and yet its basic foundations remain vulnerable to simple attacks, and one area that remains especially susceptible to attack is routing. There have been increasing efforts in the...

Mar
26
2007

Computer Science/Discrete Mathematics Seminar I

Near-Optimal Algorithms for Maximum Constraint Satisfaction
Konstantin Makarychev
12:15pm|West Building Lecture Theatre

We present approximation algorithms for the maximum constraint satisfaction problem with k variables in each constraint (MAX k-CSP). Given a (1-epsilon) satisfiable 2CSP our first algorithm finds an assignment of variables satisfying a 1 - O(sqrt...

Apr
02
2007

Computer Science/Discrete Mathematics Seminar I

Data-Powered Computing
11:15am|S-101

Traditional algorithm design is being challenged by the remarkable technological advances in data acquisition of recent years. Today's algorithms must often cope with data that is massive, noisy, uncertain, high-dimensional, nonuniformly priced...

Apr
09
2007

Computer Science/Discrete Mathematics Seminar I

The Complexity of Nash Equilibria
Christos Papadimitriou
11:15am|S-101

In 1951 Nash proved that every game has a Nash equilibrium. The proof is non-constructive, reducing the existence of Nash equilibria to that of Brouwer fixpoints. Whether Nash equilibria can be computed efficiently had remained open. I shall outline...

Apr
16
2007

Computer Science/Discrete Mathematics Seminar I

Fully Polynomial Time Approximation Schemes for Stochastic Dynamic Programs
11:15am|S-101

We develop a framework for obtaining (deterministic) Fully Polynomial Time Approximation Schemes (FPTASs) for stochastic univariate dynamic problems with either convex or monotone single-period cost functions. Using our framework, we give the first...

Apr
23
2007

Computer Science/Discrete Mathematics Seminar I

Disigning Efficient Program Checkers by Delegating Their Work
11:15am|S-101

Program checking, program self-correcting and program self-testing were pioneered by [Blum and Kannan] and [Blum, Luby and Rubinfeld] in the mid eighties as a new way to gain confidence in software, by considering program correctness on an input by...

Apr
30
2007

Computer Science/Discrete Mathematics Seminar I

History of the Theory of Error-Correcting Codes
Elwyn Berlekamp
11:15am|S-101

This subject began in the late 1940s with the opus of Shannon [1948] and the short papers of Hamming [1950] and Golay [1949], followed a decade later by the powerful constructions of Bose-Chaudhuri-Hocquenghem and Reed-Solomon. A variety of...

May
07
2007

Computer Science/Discrete Mathematics Seminar I

Reachability Problems: An Update
Eric Allender
11:15am|S-101

We study the complexity of restricted versions of st-connectivity, which is the standard complete problem for NL. Grid graphs are a useful tool in this regard, since * reachability on grid graphs is logspace-equivalent to reachability in general...

May
14
2007

Computer Science/Discrete Mathematics Seminar I

Approximation Algorithms for Buy-at-Bulk Nework Design
Chandra Chekuri
11:15am|S-101

Buy-at-bulk network design problems arise in telecommunication networks and related fields where economies of scale result in concave cost functions for purchasing bandwidth. A basic problem in this area is the following. We are given a graph G=(V,E...

May
22
2007

Computer Science/Discrete Mathematics Seminar I

Expander Codes and Somewhat Euclidean Expllicit Sections
10:30am|West Building Lecture Theatre

This talk is devoted to linear subspaces of $R^N$ on which $\ell_1$ and $\ell_2$-norms are closed to each other (up to the obvious normalizing factor $N^{1/2}$). Such ``sections'' are important e.g. in the theory of metric embeddings, and for many...

Jun
05
2007

Computer Science/Discrete Mathematics Seminar I

Fast Dimension Reduction Using Rademacher Series on Dual BCH Codes
10:30am|S-101

The Fast Johnson-Lindenstrauss Transorm was recently discovered by Ailon and Chazelle as a technique for performing fast dimension reduction from $\ell_2^d$ to $\ell_2^k$ in time $O(\max\{d\log d, k^3\})$, where $k$ is the target lower dimension...

Sep
17
2007

Computer Science/Discrete Mathematics Seminar I

Algebrization: A New Barrier in Complexity Theory
11:15am|S-101

Any proof of P!=NP will have to overcome two barriers: relativization and natural proofs. Yet over the last decade, we have seen circuit lower bounds (for example, that PP does not have linear-size circuits) that overcome both barriers...

Sep
24
2007

Computer Science/Discrete Mathematics Seminar I

Towards Universal Semantic Communiction
Madhu Sudan
11:15am|S-101

Is it possible for two intelligent players to communicate meaningfully with each other, without any prior common background? What does it even mean for the two players to understand each other? In addition to being an intriguing question in its own...

Oct
01
2007

Computer Science/Discrete Mathematics Seminar I

The Pattern Matrix Method for Lower Bounds on Quantum Communication
Alexander Sherstov
11:15am|S-101

In a breakthrough result, Razborov (2003) gave optimal lower bounds on the communication complexity of every function f of the form f(x,y)=D(|x AND y|) for some D:{0,1,...,n}->{0,1}, in the bounded-error quantum model with and without prior...

Oct
08
2007

Computer Science/Discrete Mathematics Seminar I

Erdos-Renyi Phase Transition
11:15am|S-101

In their great 1960 paper "On the Evolution of Random Graphs" Paul Erdos and Alfred Renyi expresses a special interest in the behavior of the random graph G(n,p) when np was near one. Today we view it through the prism of Percolation Theory. Write c...

Oct
15
2007

Computer Science/Discrete Mathematics Seminar I

Extractors and Rank Extractors for Polynomial Sources
11:15am|S-101

In this work we construct explicit deterministic extractors from polynomial sources, namely from distributions sampled by low degree multivariate polynomials over finite fields. This naturally generalizes previous work on extraction from affine...

Oct
29
2007

Computer Science/Discrete Mathematics Seminar I

Dense Subsets of Pseudorandom Objects
11:15am|S-101

A theorem of Green, Tao and Ziegler can be stated (roughly) as follows: if R is a pseudorandom set, and X is a dense subset of R, then there is a "model" Y for X such that Y is a dense set and X and Y are indistinguishable. (The precise statement...

Nov
05
2007

Computer Science/Discrete Mathematics Seminar I

Markets and the Primal-Dual Paradigm
Vijay Vazirani
11:15am|S-101

The notion of a ``market'' has undergone a paradigm shift with the Internet -- totally new and highly successful markets have been defined and launched by companies such as Google, Yahoo!, Amazon, MSN and Ebay. These markets are computationally...

Nov
12
2007

Computer Science/Discrete Mathematics Seminar I

Developments in Holographic Algorithms
Jin-Yi Cai
11:15am|S-101

Valiant's theory of holographic algorithms is a new design method to produce polynomial time algorithms. Information is represented in a superposition of linear vectors in a holographic mix. This mixture creates the possibility for exponential sized...

Nov
19
2007

Computer Science/Discrete Mathematics Seminar I

On a Network Creation Game
Yishay Mansour
11:15am|S-101

A network creation game abstracts a network construction by selfish agent who build a network by buying links to each other. Each player pays a fixed cost per link, and suffers an additional communication cost (which is the sum of distances to the...

Nov
26
2007

Computer Science/Discrete Mathematics Seminar I

On Hardness of Learning Intersection of Two Halfspaces
11:15am|West Building Lecture Theatre

I will present a result that shows hardness of weak PAC-learning intersection of two halfspaces using a hypothesis which is an intersection of k halfspaces for any (fixed) integer k. Specifically, for every integer k and an arbitrarily small...

Dec
03
2007

Computer Science/Discrete Mathematics Seminar I

Expander Flows, Graph Spectra and Graph Separators
Umesh Vazirani
11:15am|S-101

A graph separator is a set of edges whose deletion partitions the graph into two (or more) pieces. Finding small graph separators is a fundamental combinatorial problem with numerous applications. Interest in it also derives from its theoretical...

Jan
21
2008

Computer Science/Discrete Mathematics Seminar I

Noisy Binary Search and Applications
Avinatan Hassidim
11:15am|S-101

We use a Bayesian approach to optimally solve problems in noisy binary search. We deal with two variants: 1. Each comparison can be erroneous with some probability 1 - p. 2. At each stage k comparisons can be performed in parallel and a noisy answer...

Jan
28
2008

Computer Science/Discrete Mathematics Seminar I

Hardness Amplification Proofs Require Majority
11:15am|S-101

Hardness amplification is a major line of research that mainly seeks to transform a given lower bound (e.g. a function that has correlation at most 99% with small circuits) into a strongly average-case one (i.e. a function that has negligible...