Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Apr
19
2011

Computer Science/Discrete Mathematics Seminar II

New Tools for Graph Coloring
10:30am|S-101

How to color $3$ colorable graphs with few colors is a problem of longstanding interest. The best polynomial-time algorithm uses $n^{0.2130}$ colors. We explore the possibility that more levels of Lasserre Hierarchy can give improvements over...

Apr
26
2011

Computer Science/Discrete Mathematics Seminar II

Quadratic Goldreich-Levin Theorems
10:30am|S-101

Decompositions in theorems in classical Fourier analysis which decompose a function into large Fourier coefficients and a part that is pseudorandom with respect to (has small correlation with) linear functions. The Goldreich-Levin theorem [GL89] can...

Sep
20
2011

Computer Science/Discrete Mathematics Seminar II

Existence of Small Families of t-wise Independent Permutations and t-Designs Via Local Limit Theorems
10:30am|S-101

We show existence of rigid combinatorial objects that previously were not known to exist. Specifically, we consider two families of objects: 1. A family of permutations on n elements is t-wise independent if it acts uniformly on tuples of t elements...

Sep
27
2011

Computer Science/Discrete Mathematics Seminar II

Tight Lower Bounds for 2-query LCCs Over Finite fields
10:30am|S-101

A locally correctable code (LCC) is an error correcting code mapping d symbols to n symbols, such that for every codeword c and every received word r that is \delta-close to c, we can recover any coordinate of c (with high probability) by only...

Oct
04
2011

Computer Science/Discrete Mathematics Seminar II

Limit Theories and Higher Order Fourier Analysis
10:30am|S-101

We present a unified approach to various topics in mathematics including: Ergodic theory, graph limit theory, hypergraph regularity, and Higher order Fourier analysis. The main theme is that very large complicated structures can be treated as...

Oct
11
2011

Computer Science/Discrete Mathematics Seminar II

Limit Theories and Higher Order Fourier Analysis
10:30am|S-101

We present a unified approach to various topics in mathematics including: Ergodic theory, graph limit theory, hypergraph regularity, and Higher order Fourier analysis. The main theme is that very large complicated structures can be treated as...

Oct
18
2011

Computer Science/Discrete Mathematics Seminar II

Rigidity of 3-Colorings of the d-Dimensional Discrete Torus
Ohad Feldheim
10:30am|S-101

We prove that a uniformly chosen proper coloring of Z_{2n}^d with 3 colors has a very rigid structure when the dimension d is sufficiently high. The coloring takes one color on almost all of either the even or the odd sub-lattice. In particular, one...

Nov
08
2011

Computer Science/Discrete Mathematics Seminar II

Vertex Sparsification: An Introduction, Connections and Applications
10:30am|S-101

The notion of exactly (or approximately) representing certain combinatorial properties of a graph $G$ on a simpler graph is ubiquitous in combinatorial optimization. In this talk, I will introduce the notion of vertex sparsification. Here we are...

Nov
15
2011

Computer Science/Discrete Mathematics Seminar II

Vertex Sparsification: An Introduction, Connections and Applications
10:30am|S-101

The notion of exactly (or approximately) representing certain combinatorial properties of a graph $G$ on a simpler graph is ubiquitous in combinatorial optimization. In this talk, I will introduce the notion of vertex sparsification. Here we are...

Nov
22
2011

Computer Science/Discrete Mathematics Seminar II

Shorter Long Code and Applications to Unique Games
10:30am|S-101

The long code is a central tool in hardness of approximation, especially in questions related to the unique games conjecture. Many hardness reductions and constructions of integrality gap instances use the long code as a core gadget. However, this...

Nov
29
2011

Computer Science/Discrete Mathematics Seminar II

Shorter Long Code and Applications to Unique Games
10:30am|S-101

The long code is a central tool in hardness of approximation, especially in questions related to the unique games conjecture. Many hardness reductions and constructions of integrality gap instances use the long code as a core gadget. However, this...

Dec
13
2011

Computer Science/Discrete Mathematics Seminar II

Time-Space Tradeoffs in Resolution: Superpolynomial Lower Bounds for Superlinear Space
10:30am|S-101

For modern SAT solvers based on DPLL with clause learning, the two major bottlenecks are the time and memory used by the algorithm. This raises the question of whether this memory bottleneck is inherent to Resolution based approaches, or an artifact...

Jan
24
2012

Computer Science/Discrete Mathematics Seminar II

A Tutorial on the Likely Worst-Case Complexities of NP-Complete Problems
10:30am|S-101

The P vs. NP problem has sometimes been unofficially paraphrased as asking whether it is possible to improve on exhaustive search for such problems as Satisfiability, Clique, Graph Coloring, etc. However, known algorithms for each of these problems...

Jan
31
2012

Computer Science/Discrete Mathematics Seminar II

A Survey of Lower Bounds for the Resolution Proof System
10:30am|S-101

The Resolution proof system is among the most basic and popular for proving propositional tautologies, and underlies many of the automated theorem proving systems in use today. I'll start by defining the Resolution system, and its place in the proof...

Feb
07
2012

Computer Science/Discrete Mathematics Seminar II

Randomness Extraction: A Survey
10:30am|S-101

A randomness extractor is an efficient algorithm which extracts high-quality randomness from a low-quality random source. Randomness extractors have important applications in a wide variety of areas, including pseudorandomness, cryptography...

Feb
14
2012

Computer Science/Discrete Mathematics Seminar II

On the Colored Tverberg Problem
10:30am|S-101

In this talk I will present a colored version of Tverberg's theorem about partitioning finite point sets in R^d into rainbow groups whose convex hulls intersect. This settles the famous Bárány-Larman conjecture (1992) for primes minus one, and...

Mar
06
2012

Computer Science/Discrete Mathematics Seminar II

Applications of FT-Mollification
10:30am|S-101

In FT-mollification, one smooths a function while maintaining good quantitative control on high-order derivatives. I will describe this approach and show how it can be used to show that bounded independence fools polynomial threshold functions over...

Mar
13
2012

Computer Science/Discrete Mathematics Seminar II

Applications of FT-Mollification II
10:30am|West Bldg. Lecture Hall

In FT-mollification, one smooths a function while maintaining good quantitative control on high-order derivatives. This is a continuation of my talk from last week, and I will continue to describe this approach and show how it can be used to show...

Mar
20
2012

Computer Science/Discrete Mathematics Seminar II

The Quasi-Polynomial Freiman-Ruzsa Theorem of Sanders
10:30am|S-101

The polynomial Freiman-Ruzsa conjecture is one of the important open problems in additive combinatorics. In computer science, it already has several diverse applications: explicit constructions of two-source extractors; improved bounds for the log...

Mar
27
2012

Computer Science/Discrete Mathematics Seminar II

Higher-Order Cheeger Inequalities
10:30am|S-101

A basic fact of algebraic graph theory is that the number of connected components in an undirected graph is equal to the multiplicity of the eigenvalue zero in the Laplacian matrix of the graph. In particular, the graph is disconnected if and only...

Apr
03
2012

Computer Science/Discrete Mathematics Seminar II

Better Pseudorandom Generators from Milder Pseudorandom Restrictions
Parikshit Gopalan
10:30am|S-101

We present an iterative approach to constructing pseudorandom generators, based on the repeated application of mild pseudorandom restrictions. We use this template to construct pseudorandom generators for combinatorial rectangles and read-once CNFs...

Apr
10
2012

Computer Science/Discrete Mathematics Seminar II

List-Decoding Multiplicity Codes
10:30am|S-101

We study the list-decodability of multiplicity codes. These codes, which are based on evaluations of high-degree polynomials and their derivatives, have rate approaching 1 while simultaneously allowing for sublinear-time error-correction. In this...

Apr
17
2012

Computer Science/Discrete Mathematics Seminar II

Nondeterministic Property Testing
10:30am|S-101

A property of finite graphs is called nondeterministically testable if it has a "certificate'' such that once the certificate is specified, its correctness can be verified by random local testing. In this talk we consider certificates that consist...

Apr
24
2012

Computer Science/Discrete Mathematics Seminar II

Pseudorandom Generators for Read-Once ACC^0
10:30am|S-101

We consider the problem of constructing pseudorandom generators for read-once circuits. We give an explicit construction of a pseudorandom generator for the class of read-once constant depth circuits with unbounded fan-in AND, OR, NOT and...

May
01
2012

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Matching Vector Codes
Abhishek Bhowmick
10:30am|S-101

We prove new lower bounds on the encoding length of Matching Vector (MV) codes. These recently discovered families of Locally Decodable Codes (LDCs) originate in the works of Yekhanin and Efremenko and are the only known families of LDCs with a...

May
08
2012

Computer Science/Discrete Mathematics Seminar II

Pseudorandomness from Shrinkage
10:30am|S-101

One powerful theme in complexity theory and pseudorandomness in the past few decades has been the use of lower bounds to give pseudorandom generators (PRGs). However, the general results using this hardness vs. randomness paradigm suffer a...

May
15
2012

Computer Science/Discrete Mathematics Seminar II

From Irreducible Representations to Locally Decodable Codes
10:30am|West Bldg. Lecture Hall

A $q$-query Locally Decodable Code (LDC) is an error-correcting code that allows to read any particular symbol of the message by reading only $q$ symbols of the code word. In this talk we present a new approach for the construction of LDCs from the...

Sep
25
2012

Computer Science/Discrete Mathematics Seminar II

Koiran + Geometric Topology implies "Knottedness is in NP"
Greg Kuperberg
10:30am|S-101

In this seminar I will discuss the details of the result that knottedness is in NP assuming the generalized Riemann hypothesis. The main part of the work is to properly understand Koiran's construction that solvability of a system of algebraic...

Oct
02
2012

Computer Science/Discrete Mathematics Seminar II

Plug your ears! Graph isomorphism, siren of the algebraic seas, calls to your quantum helmsman.
Alex Russell
10:30am|S-101

Shor's algorithm, the hallmark quantum algorithmic breakthrough, has been successfully generalized to address a variety of related algebraic problems. Generalizations to nonabelian settings could have striking consequences, but such efforts have...

Oct
09
2012

Computer Science/Discrete Mathematics Seminar II

On the Conjectures of Nonnegative $k$-Sum and Hypergraph Matching
10:30am|S-101

A twenty-year old conjecture by Manickam, Mikl\'os, and Singhi asked whether for any integers $n, k$ satisfying $n \ge 4k$, every set of $n$ real numbers with nonnegative sum always has at least $\binom{n-1}{k-1}$ $k$-element subsets whose sum is...

Oct
16
2012

Computer Science/Discrete Mathematics Seminar II

On the AND- and OR-Conjectures: Limits to Efficient Preprocessing
10:30am|S-101

One of the major insights of the ``fixed-parameter tractability’’ (FPT) approach to algorithm design is that, for many NP-hard problems, it is possible to efficiently *shrink* instances which have some underlying simplicity. This preprocessing can...

Nov
06
2012

Computer Science/Discrete Mathematics Seminar II

Games, Solution Concepts, and Mechanism Design: A Very Short Introduction
10:30am|S-101

I present some of the very fundamental notions in game theory, with emphasis on their role in the theory of mechanism design and implementation. Examples include (1) normal-form games: Nash equilibrium and full implementation, dominant strategy...

Nov
20
2012

Computer Science/Discrete Mathematics Seminar II

On the Complexity of Matrix Multiplication and Other Tensors
Joseph Landsberg
10:30am|S-101

Many problems from complexity theory can be phrased in terms of tensors. I will begin by reviewing basic properties of tensors and discussing several measures of the complexity of a tensor. I'll then focus on the complexity of matrix multiplication...

Nov
27
2012

Computer Science/Discrete Mathematics Seminar II

Computational Complexity in Mechanism Design
10:30am|S-101

Some important mechanisms considered in game theory require solving optimization problems that are computationally hard. Solving these problems approximately may not help, as it may change the players’ rational behavior in the original mechanisms...

Dec
11
2012

Computer Science/Discrete Mathematics Seminar II

Combinatorial PCPs with Short Proofs
10:30am|S-101

The PCP theorem (Arora et. al., J. ACM 45(1,3)) asserts the existence of proofs that can be verified by reading a very small part of the proof. Since the discovery of the theorem, there has been a considerable work on improving the theorem in terms...

Dec
18
2012

Computer Science/Discrete Mathematics Seminar II

The SOS (aka Lassere/Positivestellensatz/Sum-of-Squares) System
(1) Raghu Meka and (2) Avi Wigderson
10:30am|S-101

We will give an overview of this system, which has been at the center of recent algorithmic and proof complexity developments. We will give the definitions of the system (as a proof system for polynomial inequalities, and as an SDP-based algorithm)...

Jan
15
2013

Computer Science/Discrete Mathematics Seminar II

OSNAP: Faster Numerical Linear Algebra Algorithms Via Sparser Subspace Embeddings
10:30am|S-101

An “oblivious subspace embedding” (OSE) is a distribution over matrices S such that for any low-dimensional subspace $V$, with high probability over the choice of $S$, $\|Sx\|_2$ approximately equals $\|x\|_2$ (up to $1 + \epsilon$ multiplicative...

Jan
22
2013

Computer Science/Discrete Mathematics Seminar II

Sparsity Lower Bounds for Dimensionality Reducing Maps
10:30am|S-101

Abstract: We give near-tight lower bounds for the sparsity required in several dimensionality reducing linear maps. In particular, we show: (1) The sparsity achieved by [Kane-Nelson, SODA 2012] in the sparse Johnson-Lindenstrauss lemma is optimal up...

Jan
29
2013

Computer Science/Discrete Mathematics Seminar II

The Ribe Program
10:30am|S-101

A linear property of Banach spaces is called "local" if it depends on finite number of vectors and is invariant under renorming (i.e., distorting the norm by a finite factor). A famous theorem of Ribe states that local properties are invariant under...

Feb
05
2013

Computer Science/Discrete Mathematics Seminar II

Ramsey Theory for Metric Spaces
10:30am|S-101

Ultrametrics are special metrics satisfying a strong form of the triangle inequality: For every $x, y, z$, $d(x, z) \impliedby \max\{d(x, y), d(y, z)\}$. We consider Ramsey-type problems for metric spaces of the following flavor:

Every metric space...