Harvard TGINF
TGINF ("Theory Graduate students and INdian Food") is a seminar for students and postdocs in the Theory of Computation group at Harvard. Our weekly meetings consist of one-hour talks given by theory group members, and dinner is provided!
Please add this to your calendar and email Cassandra at cmarcussen@g.harvard.edu if you want to join the mailing list!
Fall 2024
September 9
Meeting: We'll discuss the plans for the semester and have dinner.
Time: 4:30 - 6pm
Food: Dig Inn
Location: SEC Level 3 NW Terrace
September 16
Speaker: Zach
Title: Timing-Private Differential Privacy
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Tacos
Abstract: I will discuss a model of differential privacy (DP) where both the algorithm's output and runtime are observable to an adversary. I'll present recent results from Ben Dov, David, Naor, and Tzalik (FORC '23), highlighting the conditions under which privacy can be achieved in this model. If time permits, I'll also discuss recent progress on achieving "pure" timing privacy in the unbounded DP model.
September 23
Speaker: Yeongwoo
Title: The Pursuit of Uniqueness
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Sushi
Abstract: In this talk I'll discuss a result by Valiant and Vazirani, who show that (under randomized reductions), one can reduce NP to the class unique NP, the set of languages which have a unique witness in the YES case. This result has connections to the complexity of approximate counting and in areas such as average case complexity. A natural question is whether the Valiant-Vazirani result can be de-randomized; this has several obstacles, the first being an oracle separation between Unique NP and NP. If time permits, I'll also discuss some interesting recent works on defining quantum versions of these classes, and related results.
September 30
Speaker: Alvan
Title: Monsky's Theorem
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Sushi
Abstract: In 1965, Fred Richman wrote a problem for the final exam of his graduate class: prove/disprove the existence of odd equidissections of the square. Realizing its difficulty, Richman posted to AMS Monthly, and after five years of failed attempts by geometers, Paul Monsky proved the result in 1970. Today, Monsky's Theorem, and its generalizations, demonstrate the powerful connection between p-adic evaluations, Sperner's Lemma, and Euclidean geometry.
October 7
Speaker: Cassandra
Title: Distinguishing Between Distributions
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Dig
Abstract: Given a sequence of samples promised to be drawn from one of two distributions X_0, X_1, how many samples (k) are needed to determine which distribution you’re sampling from? This is well-understood from an information-theoretic perspective. However, when moving from information-theoretic bounds to efficient distinguishers, bounding the number of samples needed becomes more complicated. I’ll discuss this problem and highlight new perspectives.
October 21
Meeting: Open Problem Session
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: We will be splitting into several groups, each of which will learn about and work on an open problem. The main purpose of the open problem session is to let people get to know each other's research interests. It is totally fine and normal if in the end more new problems are proposed than those that are solved!
October 28
Speaker: Unai Fischer Abaigar (LMU Munich)
Title: Algorithmic Decision-Making in the Public Sector
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: In this talk, I’ll explore the promises and pitfalls of algorithmic decision-making (ADM) in the public sector. I'll discuss types of automation, motivations, and real-world case studies that highlight the challenge of aligning machine learning (ML) models with the complex realities of public sector decision-making.
November 4
Speaker: Jamie
Title: Floating bodies
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Pizza
Abstract: I will explain what the image below is. I will then state a really cool theorem about it that is not very well-known and more people should know about. As an application, I will present an FPRAS algorithm for optimal cake-cutting.
November 11
Speaker: Dashiell
Title: Knowledge with Errors
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: Given a process representing evolving graphs of knowledge flow with errors, what can we determine about the effect of local error checking? In the special case of trees of knowledge, nice properties of monotonicity allow us to throw out the structure of a graph entirely and instead formulate the problem as the convergence of an operator over a high dimensional space, giving some stronger bounds on when error can be controlled.
November 18
Speaker: Prashanth
Title: The polynomial method
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Dig
Abstract: I will talk about a method to solve problems such as the following (maybe more or less depending on time): Given L lines in 3-D space, how many joints can they form (where a joint is a point lying on three non-coplanar lines)? Given a collection of polynomials with a common root, is there always one more common root? How many lines do you need to cover all points of a n x n grid of uniformly spaced points, except one point? I will highlight some key facts about polynomials while discussing the solutions to the above problems.
November 25
Speaker: Jake
Title: The Rank and Slice Rank Methods
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
Food: Dig
Abstract: I will introduce two general methods for solving combinatorial problems known as the rank and slice rank methods. As an application I'll discuss the breakthrough of Ellenberg and Gijswit (2017) on the cap-set problem.
December 2
Speaker: Annabelle
Time: 4:30 - 6pm
Location: SEC 3rd floor common area
December 9
Speaker: Elbert
Time: 4:30pm - 6pm
Location: SEC 3rd floor common area
Spring 2024
February 1
Speaker: Jamie
Title: Random Spanning Forests of Grids
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Pizza
Abstract: I will prove the following theorem: For any fixed constant k, at least a 1/(poly(n)) fraction of the set of k-component spanning forests on an n x n grid graph have exactly equal numbers of vertices in each component (for n divisible by k). I will also explain how this result establishes the first provably polynomial-time algorithm for sampling grid graph partitions from the "spanning tree distribution," a well-studied distribution in the literature on algorithms for political redistricting. I will also briefly discuss extensions to other families of grid-like graphs. Based on the following paper: https://arxiv.org/abs/2310.15152
February 8
Speaker: Juanky
Title: Performative Prediction
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: When predictions are used to inform decisions, they don't just forecast the future: They actively shape it. This idea has recently been formalized in context of machine learning by PZMH20 through the framework of performative prediction. In this talk, I will give a brief overview of the main ideas and results in this line of work.
February 22
Speaker: Eran
Title: Transformers are better than state space models at copying
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: Transformers are the dominant architecture for sequence modeling, but there is growing interest in state space models (SSMs) that use a fixed-size latent state that does not depend on the sequence length. We show that while SSMs are promising in terms of inference-time efficiency, they are limited compared to transformer models on tasks that require copying from the input context. We start with a theoretical analysis of the simple task of string copying and prove that a two layer transformer can copy strings of exponential length while SSMs are fundamentally limited by their fixed-size latent state. Empirically, we find that transformers outperform GSSMs in terms of efficiency and generalization on synthetic tasks that require copying the context. Finally, we evaluate pretrained large language models and find that transformer models dramatically outperform state space models at copying and retrieving information from context.
February 29
Speaker: Sahil
Title: Connectivity in Tournaments
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Thai
Abstract: I will show the following (perhaps surprising) result: given nothing but the degrees of the vertices in a tournament graph, one can determine whether there is a path from an arbitrary vertex s to an arbitrary vertex t. To do so, I will show that the degree information is sufficient to determine the SCC graph of a tournament.
March 7
Speaker: Ted
Title: The Power of Staring at Yao's Lemma
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Chinese
Abstract: Yao's Lemma (the one that relates distinguishers to predictors) implies nice proofs of some classic results (that I found relatively opaque in CS221).
March 21
Speaker: Rana
Title: When to Invest in Predictions for Scheduling
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: In light of recent work on scheduling with predicted job sizes, we consider the effect of the cost of predictions in queueing systems, removing the assumption in prior research that predictions are external to the system’s resources and/or cost-free. In particular, we introduce a novel approach to utilizing predictions, SkipPredict, designed to address their inherent cost. Rather than uniformly applying predictions to all jobs, we propose a tailored approach that categorizes jobs based on their prediction requirements. We examine the effect of this cost for two distinct models. In the external cost model, predictions are generated by some external method without impacting job service times but incur a cost. In the server time cost model, predictions themselves require server processing time, and are scheduled on the same server as the jobs.
March 28
Speaker: Cassandra
Title: Finding the root in random growing trees
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Dig Inn
Abstract: Suppose one person starts a rumor, which is slowly communicated to many individuals in a population. At each time step, a new person hears the rumor from somebody who has already heard the rumor. Suppose you have access to the communication network for the rumor (“who talked to who” as undirected edges) after T people have heard the rumor, but have no further information (e.g. you don’t know when each person joined the communication network). Can you detect who started the rumor? More precisely, can you return a short list (independent of the size T of the network, but dependent on the error probability) that includes the person who started the rumor with high probability as T goes to infinity?
This is the type of question that is addressed in papers studying root-finding in randomly growing trees. In this talk, I will introduce the problem of root-finding and present upper and lower bounds on the list size for uniform attachment trees and preferential attachment trees (as well as corresponding proofs). Most of the talk will be based on the paper “Finding Adam in random growing trees” by Bubeck, Devroye, and Lugosi.
April 11
Meeting: Open Problem Session
Time: 4:30pm - 6pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: We will be splitting into several groups, each of which will learn about and work on an open problem. The main purpose of the open problem session is to let people get to know each other's research interests. It is totally fine and normal if in the end more new problems are proposed than those that are solved!
April 18
Speaker: Louie
Title: Random Contractions
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: Karger first introduced the notion of random contractions in a seminal 1993 paper for computing minimum cuts in RNC, and ever since it has been an important staple in algorithm design. We will re-derive this method in graphs, seeing how it can be used to compute minimum cuts and more generally, counting bounds for the number of small cuts in any graph. If time permits, we will see how this yields cut-sparsifiers for graphs as well as certain linear algebraic generalizations of the contraction procedure for error-correcting codes.
April 25
Speaker: Elbert
Title: Debiasing Functions of Private Statistics in Postprocessing
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Chinese
Abstract: In this work we will introduce the deconvolution method used for unbiased estimation in the statistical literature and adapt it to be used for differential privacy. Additionally, we will apply this method to derive unbiased estimators of polynomials when the noise is drawn from a Laplace distribution, a novel result. Finally, we present an idea for which a small modification may generalize to unbiased estimation for all continuous functions with bounded domain.
Fall 2023
September 14
Speaker: Prashanth
Title: Low-degree testing over grids
Time: 4pm - 5:30pm
Location: Level 3 NW Terrace for food and 3rd floor common area for talk.
Food: Honeygrow
Abstract: I will talk about a very fast algorithm to test if a given black-box is a low-degree polynomial. I will introduce the low-degree testing problem as it has been classically studied and talk about a generalization of it. I will also discuss a lower bound on the number of queries one needs to make to the black-box.
September 21
Speaker: Sahil
Title: Graph streaming: Minimum FAS on tournaments
Time: 4:30pm - 6pm
Location: Level 3 NW Terrace for food and 3rd floor common area for talk.
Food: Indian
Abstract: I will discuss approximation algorithms for the minimum feedback arc set (FAS) problem on tournaments in the streaming setting. I will start by introducing the streaming model, after which I will explain the simple 5-approximation single-pass algorithm given by https://cse.buffalo.edu/faculty/atri/papers/algos/FAS-journal-final.pdf. I will then discuss a (1+\eps)-approximation single-pass algorithm given by https://arxiv.org/pdf/2105.08215.pdf, with the trade-off of exponential time. Finally, if time permits, I will introduce some of the multi-pass algorithms and lower bounds.
September 28
Speaker: Pranay
Title: Private High-Dimensional Statistics
Time: 4:30pm - 6pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: In this talk, I will survey one recent line of work on differentially private (DP) high-dimensional statistics. Focusing on the problem of high-dimensional mean estimation under pure DP, I will present and analyze some of the basic algorithmic techniques that arise in the literature, such as the "clip-and-noise" framework, private histograms, and outlier-robust estimators. Time permitting, we will also touch on the topic of private and robust covariance estimation under stronger distributional assumptions (https://arxiv.org/abs/2212.08018).
October 5
Speaker: Cassandra
Title: Combinative Cumulative Knowledge Processes
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Thai
Abstract: Societal knowledge accumulation is a complex process in which new units of knowledge are generated from old units of knowledge by applying reasoning. Without checking mechanisms in place, errors in societal knowledge can result in the development of future erroneous knowledge and slow-downs in the knowledge accumulation process. In this talk, I will present results regarding when and how errors can be eliminated in networks of knowledge accumulation, as well as impossibility results about when errors cannot be eliminated (https://arxiv.org/abs/2309.05638).
October 12
Speaker: Elbert
Title: Private Probit Regression
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Sushi
Abstract: Probit Regression is a parametric form of regression in which the dependent variable is assumed to be a function of the independent variables and gaussian noise. We take advantage of this assumption to show that in the same model, adding gaussian noise for privacy results in a computable likelihood function which we can optimize to obtain good asymptotic results. In this talk, I will compare this result to existing results in the synthetic data regime and general private optimization.
October 19
Meeting: Open Problem Session
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Moldovan
About: We will be splitting into several groups, each of which will learn about and work on an open problem. The main purpose of the open problem session is to let people get to know each other's research interests. We stress the importance of having a friendly and respectful environment, and it is totally fine and normal if in the end more new problems are proposed than those that are solved!
October 26
Speaker: David
Title: Evolutionary graph theory
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Thai
Abstract: Evolution occurs in populations of reproducing individuals. The structure of a population can affect evolutionary trajectories. Evolutionary graph theory is a framework for modeling evolutionary dynamics with population structure. In this framework, individuals occupy vertices and edges denote possible interactions. During this survey talk, I will discuss key quantities in evolutionary dynamics such as fixation probability and fixation time, describe how certain graph families affect these quantities, and classify the computational complexity of approximating such quantities in various scenarios.
November 2
Speaker: Sid Devic (USC)
Title: Regularization and Optimal Multiclass Learning
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Indian
Abstract: Joint with Julian Asilis, Shaddin Dughmi, Vatsal Sharan, and Shang-Hua Teng. The quintessential learning algorithm of empirical risk minimization (ERM) is known to fail in various settings for which uniform convergence does not characterize learning. It is therefore unsurprising that the practice of machine learning is rife with considerably richer algorithmic techniques for successfully controlling model capacity. Perhaps the most notable such technique is "regularization," which trades off empirical risk with some measure of hypothesis complexity, though the term is applied liberally to a variety of explicit and implicit approaches with similar effect. Nevertheless, no such algorithmic technique or principle has broken away from the pack to characterize optimal learning in these more general settings.
The purpose of this work is to precisely characterize the role of regularization in perhaps the simplest setting for which ERM fails: multiclass learning with arbitrary label sets. Using one-inclusion graphs (OIGs), we exhibit optimal learning algorithms that dovetail with tried-and-true algorithmic principles: Occam's Razor as embodied by structural risk minimization (SRM), the principle of maximum entropy, and Bayesian reasoning. Most notably, we introduce an optimal learner which relaxes structural risk minimization on two dimensions: it allows the regularization function to be "local" to datapoints, and uses an unsupervised learning stage to learn this regularizer at the outset. We justify these relaxations by showing that they are necessary: removing either dimension fails to yield a near-optimal learner. We also extract from OIGs a combinatorial sequence we term the Hall complexity, which is the first to characterize a problem's transductive error rate exactly.
Lastly, we introduce a generalization of OIGs and the transductive learning setting to the agnostic case, where we show that optimal orientations of Hamming graphs --- judged using nodes' outdegrees minus a system of node-dependent credits --- characterize optimal learners exactly. We demonstrate that an agnostic version of the Hall complexity again characterizes error rates exactly, and exhibit an optimal learner using maximum entropy programs.
November 9
Speaker: Louie
Title: Code Sparsification
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Tacos
Abstract: We introduce a notion of code sparsification that generalizes the notion of cut sparsification in graphs. For a (linear) code $\mathcal{C} \subseteq \mathbb{F}_q^n$ of dimension $k$ a $(1 \pm \epsilon)$-sparsification of size $s$ is given by a weighted set $S \subseteq [n]$ with $|S| \leq s$ such that for every codeword $c \in \mathcal{C}$ the projection $c|_S$ of $c$ to the set $S$ has (weighted) hamming weight which is a $(1 \pm \epsilon)$ approximation of the hamming weight of $c$. We show that for every code there exists a $(1 \pm \epsilon)$-sparsification of size $s = \widetilde{O}(k \log (q) / \epsilon^2)$. This immediately implies known results on graph and hypergraph cut sparsification up to polylogarithmic factors (with a simple unified proof).
One application of our result is near-linear size sparsifiers for constraint satisfaction problems (CSPs) over $\mathbb{F}_p$-valued variables whose unsatisfying assignments can be expressed as the zeros of a linear equation modulo a prime $p$. Building on this, we obtain a complete characterization of ternary Boolean CSPs that admit near-linear size sparsification. Finally, by connections between the eigenvalues of the Laplacians of Cayley graphs over $\mathbb{F}_2^k$ to the weights of codewords, we also give the first proof of the existence of spectral Cayley graph sparsifiers over $\mathbb{F}_2^k$ by Cayley graphs, i.e., where we sparsify the set of generators to nearly-optimal size.
November 16
Speaker: Jessie
Title: An introduction to property elicitation for supervised machine learning
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Pizza
Abstract: We often use machine learning algorithms to make predictions about some outcome distribution. Realistically, though, we often can't learn an entire (nonparametric) outcome distribution, nor do we want to. Instead, we focus on the choice of certain summary statistics, such as the mean, median, variance, etc. We can learn these statistics by using a smarter choice of loss function. This talk will motivate why we use some of our favorite losses, develop some geometric intuition for thinking about these summary statistics, and introduce some cool (IMHO) open problems involving how to learn various statistics.
November 30
Speaker: Jake
Title: Triangles and Equations
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Sushi
Abstract: In an attempt to prove Fermat's Last Theorem (FLT), mathematicians tried reducing it to the finite field setting. In 1909 Dickson proved this is impossible by showing FLT is false over finite fields using a tedious combinatorial and number theoretic argument. In 1916, Schur gave a much simpler combinatorial proof. Showing that this seemingly number theoretic problem is actually a combinatorial problem in disguise. The goal of this talk is to cover Schur's proof and introduce the connection between extremal graph theory and additive combinatorics.
December 7
Speaker: Quynh
Title: Quantum NP
Time: 4pm - 5:30pm
Location: SEC 3rd floor common area
Food: Vietnamese
Abstract: I will describe the canonical quantum generalization of NP: Quantum Merlin-Arthur (QMA) and Alexei Kitaev’s proof of the QMA-completeness of quantum constraint satisfaction problem (QCSP), also known in condensed matter physics as the local Hamiltonian ground state problem. If there is interest and time permits, I will describe 4 other reasonable quantum generalizations of NP, and where people think these 5 quantum NP classes lie (relative to each other) in the complexity landscape.
Spring 2023
January 26
Meeting: We'll discuss the plans for the semester and have dinner.
Time: 5:30 - 7pm
Food: Thai
Location: SEC Level 3 NW Terrace
February 2
Speaker: Jamie
Title: Pseudorandom Graphs for Logical Adversaries
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Pizza
Abstract: I will present my recent work (with Jan Dreier at TU Wien) on explicitly constructing graphs (and hypergraphs) that are pseudorandom in the sense that they are indistinguishable from Erdős–Rényi graphs by testing for properties that are expressible in a primitive logic. For first order logic, this amounts to constructing existentially-closed graphs, a notoriously difficult problem from graph theory. I will explain what these graphs are, mention some interesting open questions about them, and briefly describe our new technique based on existing theorems in the derandomization literature. I will then talk about how to implement such constructions for hypergraphs by applying simple transformations of random graphs, where these transformations must themselves be definable in a primitive logic as well. This amounts to an interesting analog of pseudorandom generators that becomes equivalent to the standard model in cryptography when we consider an extension of first order logic called fixed point logic with parity.
February 13
Speaker: Prayaag
Title: Fitting ellipsoids to random points
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Pizza
Abstract: Given independent standard Gaussian points $v_1, \ldots, v_n$ in dimension $d$, for what values of $(n, d)$ does there exist with high probability an origin-symmetric ellipsoid that simultaneously passes through all of the points? This basic problem of fitting an ellipsoid to random points has connections to low-rank matrix decompositions, independent component analysis, and principal component analysis. Based on strong numerical evidence, it is conjectured that the ellipsoid fitting problem transitions from feasible to infeasible as the number of points $n$ increases, with a sharp threshold at $n \sim d^2/4$. In this talk, I will discuss recent progress on this conjecture based on joint work with Aaron Potechin, Paxton Turner and Alex Wein.
February 21
Speaker: Yeongwoo
Title: Max Cut and Hardness of Approximation
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Ethiopian
Abstract: I'll be talking about a series of works which showed that the Goemans-Williamson algorithm for Max-Cut is in fact the optimal algorithm under the Unique Games Conjecture. This will include a discussion on the GW algorithm itself, integrality gaps, and the result of Khot-Kindler-Mossel-O'Donnell which establishes the matching hardness results. If there is time, I'll also introduce the Quantum variant of Max-Cut as well as my collaborators' and my result on its hardness.
February 27
Speaker: Yihui
Title: The true hardness of quantum error mitigation
Time: 4:30 - 6pm
Location: SEC Room 1.412
Food: Thai
Abstract: Quantum error mitigation has been proposed as a `near-term’ surrogate to quantum error correction. Requiring no or few additional quantum resources, the premise of quantum error mitigation is that you can remove quantum noise from the result of a calculation using only classical post-processing. Algorithms for this are being intensely developed as we speak, but there are heuristic signs that they don’t scale, often requiring exorbitant sample complexities. We put these observations on solid theoretical ground by constructing rapidly mixing quantum circuits that show that exponential-in-system-size sample complexities are needed for error mitigation. Our results imply that, while improvements in quantum hardware will push noise levels down, if error mitigation is used for certain near-term applications, ultimately this can only lead to an exponential time algorithm with a better exponent when compared with classical algorithms, putting up a strong obstruction to the hope for exponential quantum speedups in this setting.
March 6
Speaker: Zach
Title: Techniques for private resource allocation
Time: 4:30 - 6pm
Location: SEC Room 1.412
Food: Tacos
Abstract: I will discuss a cryptographic primitive called a private resource allocator (PRA). PRAs can allocate resources to a set of clients without revealing to those clients whether anyone else received a share of the resources. I'll show some constructions of PRAs that provide guarantees ranging from information-theoretic to differential privacy, and discuss how they can be used to prevent a new class of attacks that we call allocation-based side-channel attacks. These attacks can be used, for example, to break the privacy guarantees of anonymous messaging systems that were designed specifically to defend against side-channels and traffic analysis. This was joint work with Sebastian Angel and Sampath Kannan.
March 20
Speaker: Ted
Title: Making Sense of Directed Graphs
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Chinese
Abstract: An undirected graph looks like this: [1 -1 \\ -1 1]. A directed graph looks like this: [1 0 \\ -1 0]. Even worse, the symmetrization of a directed graph can look like this: [1 -1/2 \\ -1/2 0]. I'll discuss why the third matrix is bad, and a surprising reduction (that forms a key component of the exciting line of work on the "directed Laplacian paradigm") that allows us to avoid it.
March 27
Meeting: Open Problem Session
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Dig Inn
About: We will be splitting into several groups, each of which will learn about and work on an open problem. The main purpose of the open problem session is to let people get to know each other's research interests. We stress the importance of having a friendly and respectful environment, and it is totally fine and normal if in the end more new problems are proposed than those that are solved!
April 3
Speakers: Jonathan Shi (UCSD) and Juspreet
Title: Sum-of-Squares Thermodynamics I: Spherical Spin Glasses.
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Sushi
Abstract: “Casual” talk on recent work [dSS23, In Submission] that gives a (non-standard) Semi-Definite Optimization algorithm for computing the maximum of random low-degree polynomials on the sphere. We will mainly spend time introducing the problem and discussing the semi-definite program (and interpreting it) in the context of how it “embeds” a key mathematical object (with delicate probabilistic and geometric structure) in the mathematical theory developed to study these objects.
April 17
Speaker: Wei-Kai Lin (NEU)
Title: Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Thai
Abstract: Can we design a private variant of "Google search" that would enable users to search the Internet privately without revealing their queries to Google? Fully homomorphic encryption gives a solution to this problem, where users would send their search queries to Google encrypted in a way that allows Google to compute the encrypted search results, without learning anything about the query itself. However, this solution would require Google to run a huge computation that touches the entire content of the Internet to answer each encrypted search query, making it realistically infeasible! Is there a way for Google to preprocess the Internet content into a special data structure that would allow it to answer any encrypted query efficiently by only accessing some small number of locations in the data structure? We give a solution to this problem as a special case of our work.
Concretely, we construct the first schemes for "doubly efficient private information retrieval" and "fully homomorphic encryption in the RAM model" under standard cryptographic hardness assumptions (Ring Learning with Errors). Previously we only had heuristic candidate constructions that only satisfied relaxed variants of these primitives. Our new solutions combine tools from cryptography together with data structures for fast polynomial evaluation (Kedlaya and Umans '08).
Joint work with Ethan Mook and Daniel Wichs.
April 24
Speaker: Sidhant Saraogi (Georgetown)
Title: The evolving landscape of Range Avoidance
Time: 4:30 - 6pm
Location: SEC Level 3 NW Terrace
Food: Indian
Abstract: Range Avoidance (AVOID) is a total search problem where, given a Boolean circuit C:{0, 1}^n -> {0,1}^m (m > n), the task is to find a y in {0, 1}^m outside the range of C. In the first part of my talk, I will try to motivate the problem which can be used to solve explicit construction problems, for e.g. finding functions of high circuit complexity. I will also try to survey the various positive and negative results on this problem over the last couple of years.
In the second part of the talk, I will talk about a special case of AVOID, NC0-AVOID, where each output bit of C depends on only a constant number of input bits. We will see what kind of explicit construction problems can be reduced to solving NC0-AVOID and also see some algorithms for NC0-AVOID (albeit for easier stretch m).
Based on work with Karthik Gajulapalli, Alexander Golovnev, Satyajeet Nagargoje.
May 1
Thesis defense: Chi-Ning Chou
Title: The Computational Lens: from Quantum Physics to Neuroscience
Time: 3:30 - 5pm
Location: SEC 1.413
Fall 2022
September 8
Speaker: Chi-Ning
Title: Are Matrices the Same as Vectors? Spencer's Theorem and Matrix Spencer Conjecture
Time: 5:30 - 7pm
Food: Indian
Location: SEC Level 3 NW Terrace for food and 3rd floor common area for talk.
Abstract: Spencer's theorem is a classic result in discrepancy theory where a cute existential proof (using entropy argument!) beats the probabilistic method. However, the same idea doesn't extend to the "matrix" version of Spencer's theorem (which is in a "vector" setting) and whether one can still beat the probabilistic method in the matrix case is then know as the "Matrix Spencer Conjecture".
In this talk, I will first talk about Spencer's theorem: its setup, its motivations, and the cute proof using entropy. In the second half of the talk, I'll talk about several recent progresses on proving Matrix Spencer Conjecture and my personal thought on it. Basic familiarity with discrete probability should be a sufficient background to follow the talk.
September 15
Speaker: Juspreet
Title: Random Max-CSPs inherit Algorithmic Hardness from Mixed Spin Glasses
Time: 5:30 - 7pm
Food: Thai
Location: SEC Level 3 NW Terrace for food and 3rd floor common area for talk.
Abstract: In this brief talk, we will give a story-like overview of a recent result (and some ongoing work) where we:
1) [Result 1] Connect any random Max-CSP to a corresponding "Spin Glass".
2) [Result 2] Show that the support of the distribution of "overlaps" of solutions are the same for both objects. Correspondingly, all families of algorithms that are "stable under noise" are obstructed on typical instances of many Max-CSPs.
3) [WIP] Obstruct a powerful family of algorithms called 'low-degree polynomials' on typical instances of many Max-CSPs using global hypercontractivity and martingales.
September 22
Speaker: Chin Ho
Title: The total influence of k-CNFs
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Pakistani
Abstract: I will introduce the important concept of total influence of a Boolean function, and give a simple randomized algorithm for SAT. Then I will show how it leads to a short proof that shows every width-w DNF has total influence at most w.
September 29
Speaker: Kai
Title: Regret bound in restless (state-dependent) multi-armed bandits
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Malaysian
Abstract: Upper confidence bound (UCB) style algorithm is commonly used in proving regret bounds in multi-armed bandits. One important assumption is that we can find the optimal arm (or combination) to pull within the confidence bounds. However, when arms' reward and transitions depend on the states, finding the optimal arms is computationally intractable. I will talk about how this computation issue affects the regret analysis in state-dependent multi-armed bandits, including comparison of UCB algorithms with Thompson sampling algorithms, frequentist regret v.s. Bayesian regret, and how Lagrangian relaxation can be used in state-dependent multi-armed bandits.
October 6
Meeting: Open Problem Session
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Indian
About: We will be splitting into 2 or 3 groups, each of which will learn about and work on an open problem related to theory/ML theory/EconCS. The main purpose of the open problem session is to let people get to know each other's research interests. We stress the importance of having a friendly and respectful environment, and it is totally fine and normal if in the end more new problems are proposed than those that are solved! We can discuss more logistics from 5:30 to 6 pm today.
October 13
Speaker: Jamie
Title: Descriptive Complexity
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Pizza
Abstract: I will give a gentle introduction to descriptive complexity theory, which measures complexity not by the resources required by a Turing machine to solve a given problem, but by the logical operators needed to formally define the problem. The theory gives a very interesting alternative perspective on what computation is, and illuminates some subtle distinctions that ordinary complexity theory is too coarse to capture. I'll introduce a handful of well-studied logics and talk about what resources they represent from a computational perspective, and how it is possible prove lower bounds against them. I'll explain two of the biggest results in descriptive complexity, namely, Fagin's Theorem and the Cai-Furer-Immerman construction. Finally, I'll discuss what is arguably the most important open problem: finding a logic that exactly captures polynomial time over unordered structures.
October 27
Speaker: Prashanth
Title: Recent progress on the VP vs VNP problem
Time: 5:30 - 7pm
Location: SEC 1.402
Food: Indian
Abstract: Is every polynomial that is easy to describe also easy to compute? I will begin this talk by giving a brief introduction to algebraic complexity theory and the VP vs VNP problem. Then we will discuss a recent result that gives superpolynomial lower bounds against constant-depth algebraic circuits (FOCS '21 best paper). This is analogous to the AC^0 lower bound of Hastad, but the proof approach is quite different (and simpler!). I will first present the lower bound for a toy model of depth-3 circuits and then make some modifications to get lower bounds for depth-5 (or in fact, any constant-depth) circuits. Link to the paper: https://eccc.weizmann.ac.il/report/2021/081/revision/1/download/
November 3
Speaker: Cassandra
Title: Testing properties of distributions
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Tacos
Abstract: Distribution testing is an area of research at the intersection of statistics and theoretical computer science that is concerned with testing properties of distributions using a small number of samples. Many applications today rely on a huge amount of data that is supported over a large domain. This motivates the design of sample-efficient algorithms to test specific properties of distributions, since standard algorithms from learning theory or statistics may be too costly in this setting. An example of a specific property someone may want to test is if their data is uniformly distributed.
In this talk, I will first introduce distribution testing, including the model, its relationship to learning, and how it compares to the general property testing framework. After this, I will introduce an algorithm for testing equality to the uniform distribution. I will present a proof that the uniform distribution is complete with respect to testing equality to a fixed distribution, which gives sample complexity bounds for testing equality to any fixed distribution. This talk includes content from Chapter 11 of “Introduction to Property Testing” by Goldreich.
November 10
Speaker: Jake
Title: Multicolor Ramsey Numbers for Double Stars
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Mediterranean
Abstract: The core idea of Ramsey theory is that complete disorder is impossible. Given a large structure, no matter how complex it is, we can always find a smaller substructure that has some sort of order. Despite active research for decades, very little is known about Ramsey numbers of graphs. This is especially true for when the number of colors is at least 3, also known as multicolor Ramsey numbers. In this talk, I will introduce Ramsey theory and discuss some classic results. I'll present a simple proof from one of my papers where we determine the k-color Ramsey number for the double star graph S(n,m) when n is sufficiently large compared to m,k and k is odd.
November 17
Speaker: Noah Singer
Title: A tale of two streaming CSPs
Time: 5:30 - 7pm
Location: SEC 1.402
Food: Chinese
Abstract: I’ll discuss recent progress on understanding the space complexity of approximating constraint satisfaction problems (CSPs) in various streaming models through the lens of the two simplest CSPs, Max-CUT and Max-DICUT.
I’ll first walk through several prior results in the setting of o(sqrt n)-space algorithms with worst-case input ordering. First, for Max-CUT, I’ll show how natural streaming-to-communication reductions rule out all nontrivial approximations (Kapralov-Khanna-Sudan’15). On the other hand, for Max-DICUT, I’ll discuss a quantity called “total bias”, which can be measured using well-known “norm sketching” algorithms in O(log n) space, and in turn yields a provably optimal 4/9-approximation algorithm (Chou-Golovnev-Velusamy’20, with subsequent simplifications). This highlights the difference between Max-CUT’s inherent “symmetry”, which makes it amenable to strong hardness results, and Max-DICUT’s “asymmetry”, which leaves room for interesting algorithms.
Finally, we’ll think about extending hardness results beyond the above setting. I’ll argue that, in comparison to Max-CUT, the proof of the Max-DICUT lower bound is seemingly “brittle”, and I’ll sketch how our recent works confirm this by giving improved approximations for Max-DICUT when either (i) the input stream is randomly ordered or (ii) we’re given slightly more than o(sqrt n) space.
Based on joint works with Joanna Boyland, Michael Hwang, Tarun Prasad, Raghuvansh R. Saxena, Madhu Sudan, and Santhoshini Velusamy.
November 21
Title: Open problem session
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Japanese
November 29
Speaker: Miryam Mi-Ying Huang
Title: Public verifiability in the quantum setting
Time: 5:45 - 7:15pm
Location: SEC Level 3 NW Terrace
Food: Thai
Abstract: In this talk, I will discuss some theoretical interests of public variability by starting with a classical toy example, called delivery man problem. Then, I will transform the delivery man problem into a quantum message transmission problem and then discuss the difficulty of doing this in the quantum world. Finally, I will present a cryptographic primitive Auditable Quantum Authentication (AQA) to deal with the quantum-version delivery man problem.
December 1
Speaker: David
Title: Derandomization using Random Strings
Time: 5:45 - 7:15pm
Location: SEC Level 3 NW Terrace
Food: Vegan
Abstract: Many algorithms use randomness. The process of showing that a problem with a fast randomized algorithm has a fast deterministic algorithm is a type of "derandomization": a complete reduction of its randomness complexity without noticeably disturbing its time complexity. Results of this flavor are satisfying for various philosophical reasons. Attempts to derandomize broad classes of problems typically start by cleverly constructing some deterministic object that acts like a random object under a smaller probability distribution. In this TGINF talk, I will present a derandomization result from Buhrman et. al (2005) and Allender et. al (2006) that uses "pseudorandom" objects but makes no reference to a distribution. In particular, the proof exploits different meanings of the term "random": something that happens by chance versus something without a concise theory.
December 8
Speaker: Aaron Berger
Title: What's so great about triangle removal?
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Indian
Abstract: Triangles hate him! Mathematician reveals one weird trick to remove all triangles from graphs that didn't even have many triangles to begin with. In this talk I'll discuss graph regularity and the triangle removal lemma, two foundational results in the field of analytic combinatorics. We'll see some cool applications (property testing, 3-term arithmetic progressions, counting triangle-free graphs) time permitting. Rudimentary knowledge of graph theory encouraged. Epsilons and deltas will be provided free of charge.
December 15
Meeting: TCS Trivia Night
Time: 5:30 - 7pm
Location: SEC Level 3 NW Terrace
Food: Thai
Previous semesters
Information about talks from previous semesters can be found on the previous TGINF website.