Seminars Sorted by Series

Computer Science/Discrete Mathematics Seminar II

Oct
22
2024

Computer Science/Discrete Mathematics Seminar II

Sheaves on Graphs, the Hanna Neumann Conjecture, and My Debt to Number Theory and Algebraic Geometry
Joel Friedman
10:30am|Rubenstein Commons | Meeting Room 5

I will discuss the Hanna Neumann conjecture of the 1950's and some tools in graph theory that I used to solve it.  The tools include sheaf theory on graphs, Galois theory for graphs, and the preservation of "local properties" under base change (for...

Nov
05
2024

Computer Science/Discrete Mathematics Seminar II

Fault Tolerant Routing Protocols on High-Dimensional Expanders
Mitali Bafna
10:30am|Simonyi 101 and Remote Access

In this talk, I will elaborate on the main technical component of our PCP—the construction of routing protocols on high-dimensional expanders (HDX) that can withstand a constant fraction of edge corruptions. We consider the following routing problem...

Nov
12
2024

Computer Science/Discrete Mathematics Seminar II

Linear Stability of the Brunn-Minkowski Inequality
10:30am|Simonyi 101 and Remote Access

The Brunn-Minkowski inequality is a fundamental result in convex geometry controlling the volume of  the sum of subsets of $\mathbb{R}^n$. It asserts that for  sets $A,B\subset \mathbb{R}^n$ of equal volume and a parameter $t\in(0,1)$, we have $|tA+...

Nov
19
2024

Computer Science/Discrete Mathematics Seminar II

Quadratic Stability of the Brunn-Minkowski Inequality
10:30am|Simonyi 101 and Remote Access

The Brunn-Minkowski inequality is a fundamental result in convex geometry controlling the volume of  the sum of subsets of $\mathbb{R}^n$. It asserts that for  sets $A,B\subset \mathbb{R}^n$ of equal volume and a parameter $t\in(0,1)$, we have $|tA+...

Nov
26
2024

Computer Science/Discrete Mathematics Seminar II

Simple High Dimensional Expanders from Cayley Graphs
10:30am|Simonyi 101 and Remote Access

Expander graphs are a staple of theoretical computer science. These are graphs which are both sparse and well connected. They are simple to construct and modify. Therefore they are a central gadget in numerous applications in TCS and combinatorics...

Dec
03
2024

Computer Science/Discrete Mathematics Seminar II

A Review of the Notion of Graph Rigidity and Some Recent Developments
10:30am|Simonyi 101 and Remote Access

A d-dimensional framework is a pair $(G, \vec{p})$ consisting of a finite simple graph $G$ and an embedding $\vec{p}$ of its vertices in $\mathbb{R}^d$. A framework is called rigid if every continuous motion of the vertices in ${\mathbb R}^d$ that...

Dec
13
2024

Computer Science/Discrete Mathematics Seminar II

Grid-norm Regularity for Somewhat Dense Graphs, and Some Applications
10:30am|Simonyi 101 and Remote Access

In 2023, Raghu Meka and I proved a substantially improved bound on the size of the smallest set of integers in [N] which contains no 3-term arithmetic progression. Since then, it has become clear that the main new ideas from that work are in fact...

Dec
17
2024

Computer Science/Discrete Mathematics Seminar II

Problems in Extremal Combinatorics and Connections with Multiparty Communication Complexity
10:30am|Simonyi 101 and Remote Access

In this talk we will discuss some recent progress on some questions in extremal combinatorics and in multiparty communication complexity.

We will also discuss some general connections between the two fields, emphasizing how certain problems (e.g...

Jan
14
2025

Computer Science/Discrete Mathematics Seminar II

Random Matrices From $GL_n(q)$ Sampled by Words
10:30am|Simonyi Classroom (S-114) and Remote Access

Every word in a free group induces a probability distribution on every finite group by substituting the letters of w by uniformly random elements of the group. The connection between such distributions on the symmetric group and the poset of...

Jan
21
2025

Computer Science/Discrete Mathematics Seminar II

Explicit Codes Approaching the Generalized Singleton Bound Using Expanders
10:30am|Simonyi 101 and Remote Access

Error correcting codes are objects designed to withstand errors that may arise during communication. Originally intended for practical use, codes have come to be established as one of the central objects of study in theoretical computer science, due...

Jan
28
2025

Computer Science/Discrete Mathematics Seminar II

Spectral Algorithms from Induced Subgraphs of Cayley Graphs
10:30am|Simonyi 101 and Remote Access

In this talk, we present a new method to solve algorithmic and combinatorial problems by (1) reducing them to bounding the maximum, over x in {-1, 1}^n, of homogeneous degree-q multilinear polynomials, and then (2) bounding the maximum value...

Feb
04
2025

Computer Science/Discrete Mathematics Seminar II

Lower Bounds for Local Codes from Induced Subgraphs of Cayley Graphs
10:30am|Rubenstein Commons | Meeting Room 5

We present a new method to solve algorithmic and combinatorial problems by (1) reducing them to bounding the maximum, over x in {-1, 1}^n, of homogeneous degree-q multilinear polynomials, and then (2) bounding the maximum value attained by these...

Feb
11
2025

Computer Science/Discrete Mathematics Seminar II

Monochromatic Sums and Products over the Rationals
Maria-Romina Ivan
10:30am|Simonyi 101 and Remote Access

Hindman’s Theorem states that whenever the natural numbers are finitely coloured there exists an infinite sequence all of whose finite sums are the same colour. By considering just powers of 2, this immediately implies the corresponding result for...

Feb
18
2025

Computer Science/Discrete Mathematics Seminar II

“Sharp” Selector Processes
10:30am|Simonyi 101 and Remote Access

Positive selector processes are natural stochastic processes driven by sparse Bernoulli random variables. They play an important role in the study of suprema of general stochastic processes, and in particular, Talagrand posed the selector process...

Feb
25
2025

Computer Science/Discrete Mathematics Seminar II

Independent Sets in Random Cayley Graphs
10:30am|Simonyi 101 and Remote Access

Cayley graphs provide interesting bridges between graph theory, additive combinatorics and group theory. Fixing an ambient finite group, random Cayley graphs are constructed by choosing a generating set at random. These graphs reflect interesting...

Mar
04
2025

Computer Science/Discrete Mathematics Seminar II

A Theory of Generalized Boosting
10:30am|Simonyi 101 and Remote Access

Boosting is a fundamental and widely used method in machine learning, which determines that weak learnability of binary functions implies strong learnability. Traditionally, boosting theory has primarily focused on symmetric 0-1 loss functions...

Mar
11
2025

Computer Science/Discrete Mathematics Seminar II

On the Complexity of Isomorphism Problems for Tensors, Groups, Polynomials, and Algebras
10:30am|Simonyi 101 and Remote Access

Two matrices are called equivalent if one can be transformed into the other by multiplying with invertible matrices on the left and right. Extending this idea to 3-tensors, it is natural to define two 3-tensors as isomorphic if they can be...

Mar
25
2025

Computer Science/Discrete Mathematics Seminar II

Sylvester, Gallai and Friends: Discrete Geometry Meets Computational Complexity
10:30am|Simonyi 101 and Remote Access

For every finite set of points in the plane, if every line going through any two of them contains a third, then they all lie on a single line. This ``local-to-global" theorem (which you can play with proving)  has many generalizations, to higher...

Apr
01
2025

Computer Science/Discrete Mathematics Seminar II

Locally Testable Codes with the Multiplication Property from High-dimensional Expanders
10:30am|Simonyi 101 and Remote Access

A locally testable code (LTC) is an error-correcting code equipped with a tester T that, given an input string x, queries only a small number of positions and rejects x with probability proportional to its distance from the code. Classic examples of...

Apr
08
2025

Computer Science/Discrete Mathematics Seminar II

Cosystolic Expansion
10:30am|Simonyi 101 and Remote Access

High dimensional expansion comes in two flavors: spectral, which relates to random walks;  and cosystolic, which relates to chains of linear maps. The later is a more mysterious notion, which turns out related to a variety of applications such as...

May
27
2025

Computer Science/Discrete Mathematics Seminar II

Why Extension-Based Proofs Fail
Faith Ellen
10:30am|Simonyi Hall 101 and Remote Access

A valency argument is an elegant and well-known technique for proving impossibility results in distributed computing. It is an example of an extension-based proof, which is modelled as an interaction between a prover and a protocol. Even though...

Jun
17
2025

Computer Science/Discrete Mathematics Seminar II

Upper Bounds for Multicolour Ramsey Numbers
Marius Tiba
10:30am|Simonyi Hall 101 and Remote Access

The $r$-colour Ramsey number $R_r(k)$ is the minimum $n \in \mathbb{N}$ such that every $r$-colouring of the edges of the complete graph $K_n$ on $n$ vertices contains a monochromatic copy of $K_k$. We prove, for each fixed $r \ge 2$, that 

$$R_r(k)...

Sep
23
2025

Computer Science/Discrete Mathematics Seminar II

Simulating Time With Square-Root Space (And With Details)
10:30am|Rubenstein Commons | Meeting Room 5

We will go in-depth into the proof that for all functions $t(n) \geq n$, every multitape Turing machine running in time $t$ can be simulated in space only $O(\sqrt{t \log t})$. We will attempt to be completely self-contained. To that end, we will...

Sep
30
2025

Computer Science/Discrete Mathematics Seminar II

Approximate Covers and Cocycle Expansion
10:30am|Simonyi Hall 101 and Remote Access

I will talk about the well known relation between cocycles and covers.  Then, I will discuss the relation of cocycle expansion to approximate covers, and finally how these show up in low-soundness PCP agreement tests.

Oct
07
2025

Computer Science/Discrete Mathematics Seminar II

Algorithms for Solving Random and Semirandom Planted Constraint Satisfaction Problems
10:30am|Simonyi Hall 101 and Remote Access

In this talk, we will discuss new algorithms for solving instances of random and semirandom planted constraint satisfaction problems (CSPs). Random CSP are generated by first choosing a solution x and then sampling constraints so that x satisfies...

Oct
14
2025

Computer Science/Discrete Mathematics Seminar II

From PCPs to Parallel PCPs: Hardness of Approximation in Parameterized Complexity
Karthik C. S.
10:30am|Dilworth Room

In this talk, I will begin with a quick primer to parameterized complexity, present some key insights from recent hardness of approximation results in the area, and end with a proof sketch of the following result: Assuming the Exponential Time...

Oct
21
2025

Computer Science/Discrete Mathematics Seminar II

Aldous-type Spectral Gaps in Unitary Groups, Part I
10:30am|Simonyi 101 and Remote Access

Around 1992, Aldous made the following bold conjecture. Let A be any set of transpositions in the symmetric group Sym(N). Then the spectral gap of the Cayley graph Cay(Sym(N),A) is identical to that of a relatively tiny N-vertex graph defined by A...

Oct
28
2025

Computer Science/Discrete Mathematics Seminar II

Aldous-type Spectral Gaps in Unitary Groups, Part II
10:30am|Simonyi 101 and Remote Access

Around 1992, Aldous made the following bold conjecture. Let A be any set of transpositions in the symmetric group Sym(N). Then the spectral gap of the Cayley graph Cay(Sym(N),A) is identical to that of a relatively tiny N-vertex graph defined by A...

Nov
04
2025

Computer Science/Discrete Mathematics Seminar II

No Exponential Quantum Speedup for SIS^inf Anymore
10:30am|Simonyi 101 and Remote Access

Given linear equations over a finite field and under infinity norm, the Short-Integer-Solution (SIS^inf) problem asks to find a solution where each entry is a small number.

In 2021, Chen, Liu, and Zhandry presented an efficient quantum algorithm for...

Nov
11
2025

Computer Science/Discrete Mathematics Seminar II

Hard Functions from on High: Local List Decoding from HDX
10:30am|Simonyi 101 and Remote Access

Can we encode data in a way that it is recoverable even when 1) most data becomes corrupted, and 2) we can only read a sub-constant fraction of the database? This is the central question of local list decoding, a powerful tool from coding theory...

Nov
18
2025

Computer Science/Discrete Mathematics Seminar II

Local List Decoding from HDX II
10:30am|Simonyi 101 and Remote Access

In this talk we will construct (approximate) locally list decodable codes from high dimensional expanders (HDXs).

Last week we saw that locally list decoding is a powerful tool from coding theory. We also got a subspace-based construction of...

Nov
25
2025

Computer Science/Discrete Mathematics Seminar II

Linial-Meshulam Complexes
10:30am|Simonyi 101 and Remote Access

Inspired by the Erdos--Renyi model for random graphs, Linial and Meshulam devised in 2006 a model for random 2-dimensional simplicial complexes. The goal of this talk (and the next) is to present some nice results about the behavior of these random...

Dec
02
2025

Computer Science/Discrete Mathematics Seminar II

Linial-Meshulam Complexes 2
10:30am|Simonyi 101 and Remote Access

Last week we defined the Linial--Meshulam model for random 2 dimensional simplicial complexes and discussed two notions of connectivity for it: Vanishing of its 1st cohomology with F2 coefficients, and vanishing of its fundamental group. This time...

Dec
09
2025

Computer Science/Discrete Mathematics Seminar II

On Turán Numbers of Tight Cycles
10:30am|Simonyi 101 and Remote Access

The study of Turán numbers of graphs and hypergraphs is a rich problem in extremal combinatorics. The Turán problem asks, given a fixed forbidden (hyper)graph F, what is the maximum number of edges in an F-free (hyper)graph in terms of the number of...

Jan
20
2026

Computer Science/Discrete Mathematics Seminar II

All-Pairs Min-Cut vs. All-Pairs Shortest-Path
Amir Abboud
10:30am|Simonyi 101 and Remote Access

The All-Pairs Min-Cut problem (APMC) asks to compute the minimum cut (or equivalently, the maximum flow) between all pairs of nodes in a graph.1 The naive solution of making n^2 calls to a single-pair min-cut algorithm was surpassed in 1961 by a...

Jan
20
2026

Computer Science/Discrete Mathematics Seminar II

Improving Algorithmic Efficiency Using Cryptography
Or Zamir
11:30am|Simonyi 101 and Remote Access

Cryptographic primitives have been used for various non-cryptographic objectives, such as eliminating or reducing randomness and interaction. We show how to use cryptography to improve the time complexity of solving computational problems...

Jan
27
2026

Computer Science/Discrete Mathematics Seminar II

The Orthogonal Vectors Conjecture and Nonuniform Circuit Lower Bounds
10:30am|Simonyi 101 and Remote Access

A line of work has shown how nontrivial uniform algorithms for analyzing circuits can be used to derive nonuniform circuit lower bounds. In this talk, I will show in depth how the nonexistence of nontrivial circuit-analysis algorithms can also imply...

Feb
03
2026

Computer Science/Discrete Mathematics Seminar II

The Communication Complexity of Distributed Estimation
Parikshit Gopalan
10:30am|Simonyi 101 and Remote Access

We propose an extension of Yao's standard two-party communication model, where Alice and Bob respectively hold probability distributions p and q over inputs to a function f, rather than singleton inputs. Their goal is to estimate E[f(x,y)] to within...

Feb
10
2026

Computer Science/Discrete Mathematics Seminar II

A Complexity Lower Bound on Algebra Isomorphisms
Jeongwan Haah
10:30am|Simonyi 101 and Remote Access

Two vector spaces of the same finite dimension are related by a linear isomorphism; that’s how the dimension is defined. Similarly, two simple subalgebras over complex numbers that are closed under conjugate transpose are related by a unitary...

Feb
17
2026

Computer Science/Discrete Mathematics Seminar II

Obfuscation is a Wheelbarrow: How to Build Long-Sought Cryptography Using Complexity Theory
10:30am|Simonyi 101 and Remote Access

Over the past 50 years, cryptographers have constructed a number of surprising and important primitives like public-key encryption, which allows strangers to communicate privately even if eavesdroppers hear everything they say. However, there are...

Feb
24
2026

Computer Science/Discrete Mathematics Seminar II

List Decoding: Algebraic and Combinatorial
10:30am|Simonyi 101 and Remote Access

In the theory of error-correcting codes, list decoding allows a decoder to output a list of candidates when attempting to remove noise from a corrupted input. The constructions and algorithms for such list decodable codes has had numerous...

Mar
03
2026

Computer Science/Discrete Mathematics Seminar II

VC Dimensions and Regularity
Yuval Wigderson
10:30am|Simonyi 101 and Remote Access

The regularity lemma says that every discrete object can be partitioned into a small number of random-like subobjects. But how small is small? And can we make small smaller if we assume that our given object is simple? And what does it mean for a...

Computer Science/Discrete Mathematics Seminar III

Mar
22
2005

Computer Science/Discrete Mathematics Seminar III

Information Theory and Probability Estimation
Alon Orlitsky
11:30am|S-101

Standard information-theoretic results show that data over small, typically binary, alphabets can be compressed to Shannon's entropy limit. Yet most practical sources, such as text, audio, or video, have essentially infinite support. Compressing...

May
06
2005

Computer Science/Discrete Mathematics Seminar III

An O(log n log log n) Space Algorithm for Undirected st-Connectivity
2:00pm|S-101

Undirected st-connectivity (USTCONN) is the problem of checking whether two given vertices of an undirected graph are connected by a path. Solving USTCONN in space O(log n), and even o(log2 n), is a challenging task. A randomized logspace algorithm...

Jun
01
2005

Computer Science/Discrete Mathematics Seminar III

Computing Equilibria
Christos Papadimitriou
11:15am|S-101

There has been some recent excitement and progress in the long-stalled topic of efficient algorithms for finding equilibria in games and other economic contexts. We discuss some of these developments.