Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Apr
10
2007

Computer Science/Discrete Mathematics Seminar II

Aggregating Inconsistent Information: Ranking and Clustering
10:30am|S-101

In the past 2 years there has been considerable progress in the algorithmic problem of combining rankings (permutations on a ground set of "candidates") into a consensus ranking. This problem dates back to the 18th century, when the French...

Apr
17
2007

Computer Science/Discrete Mathematics Seminar II

Expanders in Number Theory
11:00am|S-101

Originally number theoretic methods were used to construct optimal (explicit) expanders. Recently combinatorial methods have been utalized in proving that certain number theoretic graphs are expanders. We will explain some uses of such expanders in...

Apr
24
2007

Computer Science/Discrete Mathematics Seminar II

Consensus Clustering, Hieraracical Clustering and Phylogeny
10:30am|S-101

Consensus clustering is the problem of aggregating a list of clusterings of ground data into one clustering. I will present new approximation algorithms for this problem, building on techniques used for ranking problems (described in my previous...

May
01
2007

Computer Science/Discrete Mathematics Seminar II

One-Way Multi-Party Communication Lower Bound for Pointer Jumping with Applications
10:30am|S-101

In this talk we study the one-way multi-party communication model, in which each of the k parties speaks exactly once in its turn. For every fixed k, we prove a tight lower bound of Omega(n^(1/(k-1))) on the probabilistic communication complexity of...

May
08
2007

Computer Science/Discrete Mathematics Seminar II

An Exponential Time/Space Speedup for Resolution
10:30am|S-101

This is joint work with Philipp Hertel Satisfiability algorithms have become one of the most practical and successful approaches for solving a variety of real-world problems, including hardware verification, experimental design, planning and...

May
17
2007

Computer Science/Discrete Mathematics Seminar II

Proof of the Parallel Repetition Theorem
10:45am|West Building Lecture Theatre, IAS

I will present Holenstein's (STOC 07) simplification of Raz's (STOC '95) proof of the parallel repetition theorem for two prover games. This theorem is a crucial component in many PCP constructions leading to tight hardness of approximation results...

Sep
25
2007

Computer Science/Discrete Mathematics Seminar II

Hardness of Solving Sparse Overdetermined Linear Systems
10:30am|S-101

Solving a system of linear equations is a fundamental algorithmic task arising in numerous applications. It is possible to tell in polynomial time, by Gaussian elimination, if a given system admits a solution, and if so to find one. But what if the...

Oct
02
2007

Computer Science/Discrete Mathematics Seminar II

Unbounded-Error Communication Complexity of Symmetric Functions
Alexander Sherstov
10:30am|S-101

The sign-rank of a real matrix M is the least rank of a matrix R in which every entry has the same sign as the Corresponding entry of M. We determine the sign-rank of every matrix of the form M=[ D(|x AND y|) ]_{x,y}, where D:{0,1,...,n}->{-1,+1} is...

Oct
16
2007

Computer Science/Discrete Mathematics Seminar II

Sparse Random Linear Codes are Locally Decodable and Testable
10:30am|S-101

We show that random sparse binary linear codes are locally testable and locally decodable (under any linear encoding) with constant queries (with probability tending to one). By sparse, we mean that the code should have only polynomially many...

Oct
30
2007

Computer Science/Discrete Mathematics Seminar II

Balancing Gaussian Vectors
Kevin Costello
10:30am|S-101

Let ||.|| be any norm on R^d. We consider the question of estimating the minimum over all possible sign sequences e_i=+/-1 of ||e_1 x_1 + e_2 x_2 + ... + e_n x_n||, where the x_i are independent Gaussian vectors on R^d (here d is viewed as fixed and...

Nov
06
2007

Computer Science/Discrete Mathematics Seminar II

Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
10:30am|S-101

A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of...

Nov
13
2007

Computer Science/Discrete Mathematics Seminar II

Applications of the Removal Lemma
10:30am|S-101

An extension of Szemeredi's Regularity Lemma for hypergraphs, was proved in 2005 by Gowers and independently by Rodl, Schacht, Skokan, and Nagle. More recently, Tao gave another proof for the lemma. A special case, the Removal Lemma is an important...

Nov
20
2007

Computer Science/Discrete Mathematics Seminar II

Density Theorems for Bipartite Graphs and Related Ramsey-Type Results
Benny Sudakov
10:30am|S-101

In this talk, we discuss a new technique which shows how to find a copy of a sparse bipartite graph in a graph of positive density. Our results imply several new bounds for classical problems in Ramsey theory and improve and generalize earlier...

Nov
27
2007

Computer Science/Discrete Mathematics Seminar II

The Approximation Complexity of Win-Lose Games
10:30am|West Building Lecture Theatre

The computation of Nash equilibria has been a problem that spanned half a century that has attracted Economists, Operations Researchers, and most Recently, Computer Scientists. Intuitively, the complexity of a game grows along a few axes: the number...

Dec
04
2007

Computer Science/Discrete Mathematics Seminar II

Optimal Phylogenetic Reconstruction
Konstantinos Daskalakis
10:30am|S-101

An important task in systematic biology is the reconstruction of phylogenies: The evolutionary history of a family of organisms, represented by an evolutionary tree, needs to be reconstructed from the genetic data of the extant species, which...

Jan
22
2008

Computer Science/Discrete Mathematics Seminar II

A Study of Multiplication Codes
10:30am|S-101

Error correcting codes encode messages in a way that allows recovery of the original message even in the presence of noise. We study Multiplication codes (Akavia-Goldwasser-Safra FOCS'03), extending them in different ways to allow polynomial...

Jan
29
2008

Computer Science/Discrete Mathematics Seminar II

Arithmetic Complexity -- The Power of Partial Derivatives
Avi Wigderson, IAS
10:30am|S-101

I plan to survey a number of results, some very old and some very new, mainly proving lower bounds on arithmetic circuits. Common to all is the (often surprising, at least till you get used to it) demonstration of the power of partial derivatives.

Feb
12
2008

Computer Science/Discrete Mathematics Seminar II

Efficient Algorithms for Some Algebraic Problems
10:30am|S-101

In this talk we will examine some computational problems related to polynomials, namely: (i) Given a polynomial, can we make a linear transformation on the variables and write it as the sum of two independent polynomials. (ii) Is a given set of...

Feb
19
2008

Computer Science/Discrete Mathematics Seminar II

New Results and Open Problems in Computing Nash Equilibria
Christos Papadimitriou
10:30am|S-101

In the past few years there has been much excitement, and many positive and negative results, regarding the computation of equilibria in games. The problem of finding Nash equilibria in games was shown intractable, there is an on-going race of...

Feb
26
2008

Computer Science/Discrete Mathematics Seminar II

Sound 3-Query PCPPs Are Long
Arie Matsliah
10:30am|S-101

We present a tradeoff between the length of a 3-query probabilistically checkable proof of proximity (PCPP) and the best possible soundness obtained by querying it. Consider the task of distinguishing between "good" inputs w \in {0,1}^n that are...

Mar
04
2008

Computer Science/Discrete Mathematics Seminar II

The Sign-Rank of AC^0
10:30am|S-101

The sign-rank of a real matrix M is the smallest rank of any real matrix whose entries have the same sign as the entries of M . We exhibit a 2^n x 2^n matrix computable by depth 2 circuits of polynomial size whose sign-rank is exponential in n . Our...

Mar
25
2008

Computer Science/Discrete Mathematics Seminar II

Expander Cryptography -- Cryptography With Constant Computational Overhead
Amit Sahai
10:30am|S-101

Current constructions of cryptographic primitives typically involve a large multiplicative computational overhead that grows with the desired level of security. We explore the possibility of implementing cryptographic primitives (such as encryption...

Apr
01
2008

Computer Science/Discrete Mathematics Seminar II

The Distribution of Polynomials Over Finite Fields
10:30am|S-101

I will present a recent result of Green and Tao showing the following. Let P:F^n --> F be a polynomial in n variables over F of degree at most d . We say that P is "equidistributed" if it takes on each of its |F| values close to equally often. We...

Apr
08
2008

Computer Science/Discrete Mathematics Seminar II

Spherical Cubes, or Coordinated Random Choices in High Dimensions
10:30am|S-101

We give a probabilistic protocol that allows any two points in R^d to agree on a nearby integer lattice point in Z^d . The protocol uses shared randomness, but no communication. If the distance between the two points is delta, the probability of...

Apr
15
2008

Computer Science/Discrete Mathematics Seminar II

Nearly Diagonally Dominant Matrices and Their Applications
10:30am|S-101

I will describe a lower bound for the rank of any real matrix in which all diagonal entries are significantly larger in absolute value than all other entries. This simple result has a surprising number of applications in Geometry, Coding Theory...

Apr
29
2008

Computer Science/Discrete Mathematics Seminar II

Optimal Monotone Encodings
Rani Hod
10:30am|S-101

Moran, Naor and Segev have asked what is the minimal r = r(n, k) for which there exists an (n,k)-monotone encoding of length r , i.e., a monotone injective function from subsets of size up to k of {1, 2,...,n} to r bits. Monotone encodings are...

May
13
2008

Computer Science/Discrete Mathematics Seminar II

A Dirac-Type Theorem for 3-Uniform Hypergraphs
10:30am|West Bldg. Lecture Hall

A 3-uniform hypergraph is hamiltonian if for some cyclic ordering of its vertex set, every 3 consecutive vertices form an edge. In 1952 Dirac proved that if the minimum degree in an n-vertex graph is at least n/2 then the graph is hamiltonian. We...

May
27
2008

Computer Science/Discrete Mathematics Seminar II

Approximating Functions in Logarithmic Space and Time: A "Plug & Play" Approach
10:30am|S-101

We consider several natural problems related to the design of approximation algorithms and the analysis of their error bounds. We define a set of sufficient conditions on a function $f:D --> R^+$ and its domain $D$ , so that we can construct good...

Jun
10
2008

Computer Science/Discrete Mathematics Seminar II

Computability and Complexity of Julia sets
10:30am|S-101

Abstract: Studying dynamical systems is key to understanding a wide range of phenomena ranging from planets' movement to climate patterns to market dynamics. Various numerical tools have been developed to address specific questions about dynamical...

Sep
09
2008

Computer Science/Discrete Mathematics Seminar II

A Simple Proof of Bazzi's Theorem
10:30am|S-101

Pseudo-random generators that are secure against constant depth polynomial size circuits have been known since the seminal paper by Ajtai and Wigderson (1985). All available constructions of such generators, however, appear to be somewhat special...

Sep
16
2008

Computer Science/Discrete Mathematics Seminar II

Multilinear Computation
10:30am|S-101

Nisan and Wigderson defined the model of multilinear circuits as a natural model for computing multilinear polynomials (such as matrix product and the Permanent). We will go over several results regarding such circuits -- a few structural results...

Sep
23
2008

Computer Science/Discrete Mathematics Seminar II

Multilinear Computation
10:30am|S-101

Nisan and Wigderson defined the model of multilinear circuits as a natural model for computing multilinear polynomials (such as matrix product and the Permanent). We will go over several results regarding such circuits -- a few structural results...

Sep
30
2008

Computer Science/Discrete Mathematics Seminar II

A Survey of Time Lower Bounds by Algorithmic Arguments
10:30am|S-101

One natural strategy for proving a time lower bound for a problem is proof-by-contradiction: assume that there is a great algorithm for the problem, and apply this algorithm as a subroutine to solve other problems until the algorithms get so great...

Oct
07
2008

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Circuits with MOD_m Gates
10:30am|S-101

A celebrated theorem of Razborov/Smolensky says that constant depth circuits comprising AND/OR/MOD_{p^k} gates of unbounded fan-in, require exponential size to compute the MAJORITY function if p is a fixed prime and k is a fixed integer. Extending...

Oct
14
2008

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Circuits with MOD_m Gates
10:30am|S-101

A celebrated theorem of Razborov/Smolensky says that constant depth circuits comprising AND/OR/MOD_{p^k} gates of unbounded fan-in, require exponential size to compute the MAJORITY function if p is a fixed prime and k is a fixed integer. Extending...

Oct
21
2008

Computer Science/Discrete Mathematics Seminar II

Group Representation Patterns in Digital Processing
Shamgar Gurevich and Ronny Hadani
10:30am|S-101

In the lecture we will explain how various fundamental structures from group representation theory appear naturally in the context of discrete harmonic analysis and can be applied to solve concrete problems from digital signal processing. We will...

Nov
04
2008

Computer Science/Discrete Mathematics Seminar II

Dichotomy Conjecture for Constraint Satisfaction Problems
10:30am|S-101

The dichotomy conjecture asks if every Constraint Satisfaction Problem is either in P or NP-complete. We will study the basic algorithms and reductions for such problems. We will see many (equivalent) stronger versions of this conjecture actually...

Nov
11
2008

Computer Science/Discrete Mathematics Seminar II

Dichotomy Conjecture for Constraint Satisfaction Problems
10:30am|S-101

The dichotomy conjecture asks if every Constraint Satisfaction Problem is either in P or NP-complete. We will study the basic algorithms and reductions for such problems. We will see many (equivalent) stronger versions of this conjecture actually...

Nov
18
2008

Computer Science/Discrete Mathematics Seminar II

Complexity of Equational Proof Systems
10:30am|S-101

I will outline the general area of proof complexity, and its traditional problems. I will focus on less traditional ones, namely the complexity of proving identities over certain algebraic structures. The paradigmatic example is a system intended to...

Nov
25
2008

Computer Science/Discrete Mathematics Seminar II

Complexity of Equational Proof Systems
10:30am|S-101

I will outline the general area of proof complexity, and its traditional problems. I will focus on less traditional ones, namely the complexity of proving identities over certain algebraic structures. The paradigmatic example is a system intended to...

Dec
02
2008

Computer Science/Discrete Mathematics Seminar II

Combinatorial Reasoning in Information Theory
10:30am|S-101

Combinatorial arguments have played a crucial role in the investigation of several surprising phenomena in Information Theory. After a brief discussion of some of these results I will describe a recent example, based on joint work with Hassidim...