| FOCS 2010 Proceedings |
|
|
|
|
|
|
|
Compressed Zip File |
|
|
Foreword |
|
|
Organizing Committee |
|
|
Program-Committee |
|
|
Reviewers |
|
|
Table of Contents |
|
|
|
|
Saturday,
October 23 |
|
11:00 |
-12:30 |
Tutorial 1:
Ketan Mulmuley.
Geometric Complexity Theory (GCT).
|
12:30 |
- 1:45 |
Lunch (On your
own) |
1:45 |
- 3:15 |
Tutorial 2:
Mihai Pătraşcu.
How to Grow Your Lower Bounds.
|
3:30 |
- 5:00 |
Tutorial 3: Tim
Roughgarden.
How To Think About Mechanism Design.
|
6:00 |
- 9:00 |
Welcoming Reception |
|
|
|
|
Sunday,
October 24 |
|
8:00 |
- 8:45 |
Continental
Breakfast |
|
|
Session 1A |
Session 1B |
8:45 |
- 9:05 |
Constructive Algorithms for Discrepancy Minimization |
Boosting and Differential Privacy |
|
|
Nikhil Bansal |
Cynthia Dwork and Guy
Rothblum and Salil Vadhan |
9:10 |
- 9:30 |
Bounded Independence Fools Degree-2 Threshold Functions |
A Multiplicative Weights Mechanism for
Privacy-Preserving Data Analysis |
|
|
Ilias Diakonikolas and
Daniel M. Kane and Jelani Nelson |
Moritz Hardt and Guy
Rothblum |
9:35 |
- 9:55 |
From Sylvester-Gallai
Configurations to Rank Bounds: Improved Black-box Identity Test for Depth-3
Circuits |
Impossibility of
Differentially Private Universally Optimal Mechanisms |
|
|
Nitin Saxena and C.
Seshadhri |
Hai Brenner and Kobbi
Nissim |
10:00 |
- 10:20 |
The Coin Problem, and
Pseudorandomness for Branching Programs / Pseudorandom Generators for Regular
Branching Programs |
The Limits of Two-Party
Differential Privacy |
|
|
Joshua Brody and Elad
Verbin /
Mark Braverman and Anup Rao and Ran Raz and Amir Yehudayoff |
Andrew McGregor and Ilya
Mironov and Toniann Pitassi and Omer Reingold and Kunal Talwar and Salil
Vadhan |
10:20 |
-10:50 |
Coffee Break |
|
|
Session 2A |
Session 2B |
10:50 |
- 11:10 |
Settling the Polynomial
Learnability of Mixtures of Gaussians |
Deciding first-order
properties for sparse graphs |
|
|
Ankur Moitra and Gregory
Valiant |
Zdenek Dvorak and Daniel
Kral and Robin Thomas |
11:15 |
- 11:35 |
Polynomial Learning of
Distribution Families |
Logspace Versions of the
Theorems of Bodlaender and Courcelle |
|
|
Mikhail Belkin and Kaushik
Sinha |
Michael Elberfeld and
Andreas Jakoby and Till Tantau |
11:40 |
- 12:00 |
Agnostically learning under
permutation invariant distributions |
A separator theorem in
minor-closed classes |
|
|
Karl Wimmer |
Ken-ichi Kawarabayashi and
Bruce Reed |
12:05 |
- 12:25 |
Learning Convex Concepts
from Gaussian Distributions with PCA |
Optimal stochastic
planarization |
|
|
Santosh Vempala |
Anastasios Sidiropoulos |
12:30 |
- 1:45 |
Lunch |
|
|
Session 3A |
Session 3B |
2:00 |
- 2:20 |
Determinant Sums for
Undirected Hamiltonicity |
Solving linear systems
through nested dissection |
|
|
Andreas Björklund |
Noga Alon and Raphael
Yuster |
2:25 |
- 2:45 |
Fighting Perebor: New and
Improved Algorithms for Formula and QBF Satisfiability |
Approaching optimality for
solving SDD linear systems |
|
|
Rahul Santhanam |
Iannis Koutis and Gary L.
Miller and Richard Peng |
2:50 |
- 3:10 |
The Monotone Complexity of
k-CLIQUE on Random Graphs |
Fast approximation
algorithms for cut-based graph problems |
|
|
Benjamin Rossman |
Aleksander Madry |
3:15 |
- 3:35 |
The Complexity of
Distributions |
Metric Extension Operators,
Vertex Sparsifiers and Lipschitz Extendability |
|
|
Emanuele Viola |
Konstantin Makarychev and
Yury Makarychev |
3:40 |
- 4:00 |
Hardness of Finding
Independent Sets in Almost 3-Colorable Graphs |
Vertex Sparsifiers and
Abstract Rounding Algorithms |
|
|
Irit Dinur and Subhash Khot
and Will Perkins and Muli Safra |
Moses Charikar and Tom
Leighton and Shi Li and Ankur Moitra |
4:00 |
- 4:30 |
Coffee Break |
|
|
Session 4 |
4:30 |
- 4:50 |
Approximation
Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions |
|
|
Matthew Andrews |
|
4:55 |
- 5:15 |
Computational
Transition at the Uniqueness Threshold |
|
|
Allan Sly |
|
5:20 |
- 6:20 |
Avner Magen
Memorial Talk |
|
|
Toni Pitassi |
|
9:00 |
- |
Business Meeting |
|
|
|
|
Monday,
October 25 |
|
8:00 |
- 8:45 |
Continental
Breakfast |
|
|
Session 5A |
Session 5B |
8:45 |
- 9:05 |
Clustering with Spectral
Norm and the k-means Algorithm |
A non-linear lower bound
for planar epsilon-nets |
|
|
Amit Kumar and Ravindran
Kannan |
Noga Alon |
9:10 |
- 9:30 |
Stability yields a PTAS for
k-Median and k-Means Clustering |
The sub-exponential upper
bound for on-line chain partitioning |
|
|
Pranjal Awasthi and Avrim
Blum and Or Sheffet |
Bartłomiej Bosek
and Tomasz Krawczyk |
9:35 |
- 9:55 |
The Geometry of
Manipulation -- a Quantitative Proof of the Gibbard-Satterthwaite Theorem |
Improved Bounds for
Geometric Permutations |
|
|
Marcus Isaksson and Guy
Kindler and Elchanan Mossel |
Natan Rubin and Haim Kaplan
and Micha Sharir |
10:00 |
- 10:20 |
Efficient volume sampling
for row/column subset selection |
On the Queue Number of
Planar Graphs |
|
|
Amit Deshpande and Luis
Rademacher |
Giuseppe Di Battista and
Fabrizio Frati and János Pach |
10:20 |
-10:50 |
Coffee Break |
|
|
Session 6A |
Session 6B |
10:50 |
- 11:10 |
Polylogarithmic
Approximation for Edit Distance and the Asymmetric Query Complexity |
Strong Fault-Tolerance for
Self-Assembly with Fuzzy Temperature |
|
|
Alexandr Andoni and Robert
Krauthgamer and Krzysztof Onak |
David Doty and Matthew J.
Patitz and Dustin Reishus and Robert T. Schweller and Scott M. Summers |
11:15 |
- 11:35 |
Information Cost Tradeoffs
for Augmented Index and Streaming Language Recognition |
Holographic Algorithms with
Matchgates Capture Precisely Tractable Planar #CSP |
|
|
Amit Chakrabarti and Graham
Cormode and Ranganath Kondapally and Andrew McGregor |
Jin-Yi Cai and Pinyan Lu
and Mingji Xia |
11:40 |
- 12:00 |
New Constructive Aspects of
the Lovasz Local Lemma |
A Decidable Dichotomy
Theorem on Directed Graph Homomorphisms with Non-negative Weights |
|
|
Bernhard Haeupler and Barna
Saha and Aravind Srinivasan |
Jin-Yi Cai and Xi Chen |
12:05 |
- 12:25 |
The Geometry of Scheduling |
|
|
|
Nikhil Bansal and Kirk
Pruhs |
|
12:30 |
- 1:45 |
Lunch |
|
|
Session 7A |
Session 7B |
2:00 |
- 2:20 |
Sublinear Time Optimization
for Machine Learning |
Overcoming the Hole In The Bucket:
Public-Key Cryptography Resilient to Continual Memory Leakage |
|
|
Kenneth L. Clarkson and
Elad Hazan and David P. Woodruff |
Zvika Brakerski and Yael
Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan |
2:25 |
- 2:45 |
Estimating the longest
increasing sequence in sublinear time |
Cryptography Against
Continuous Memory Attacks |
|
|
Michael Saks and C.
Seshadhri |
Yevgeniy Dodis and
Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs |
2:50 |
- 3:10 |
Testing Properties of
Sparse Images |
On the Insecurity of
Parallel Repetition for Leakage Resilience |
|
|
Dana Ron and Gilad Tsur |
Allison Lewko and Brent
Waters |
3:15 |
- 3:35 |
A Unified Framework for
Testing Linear-Invariant Properties |
Black-Box, Round-Efficient
Secure Computation via Non-Malleability Assumption |
|
|
Arnab Bhattacharyya and
Elena Grigorescu and Asaf Shapira |
Hoeteck Wee |
3:40 |
- 4:00 |
Optimal Testing of
Reed-Muller Codes |
Adaptive
Hardness and Composable Security in the Plain Model from Standard Assumptions |
|
|
Arnab Bhattacharyya and
Swastik Kopparty and Grant Schoenebeck and Madhu Sudan and David Zuckerman |
Ran Canetti and Huijia Lin
and Rafael Pass |
4:00 |
- 4:30 |
Coffee Break |
|
|
Session 8 |
4:30 |
- 4:50 |
Bounds on
Monotone Switching Networks for Directed Connectivity |
|
|
Aaron Potechin |
|
4:55 |
- 5:15 |
Subexponential
Algorithms for Unique Games and Related problems |
|
|
Sanjeev Arora and Boaz
Barak and David Steurer |
|
5:20 |
- 6:20 |
Nevanlinna Prize
Talk.
Laplacian Gems
|
|
|
Dan Spielman |
|
|
|
|
|
Tuesday,
October 26 |
|
8:00 |
- 8:45 |
Continental
Breakfast |
|
|
Session 9A |
Session 9B |
8:45 |
- 9:05 |
Dependent Randomized
Rounding via Exchange Properties of Combinatorial Structures |
On the Computational
Complexity of Coin Flipping
|
|
|
Chandra Chekuri and Jan
Vondrak and Rico Zenklusen |
Hemanta K. Maji and Manoj
Prabhakaran and Amit Sahai and Dan Schreiber |
9:10 |
- 9:30 |
Minimum-Cost Network Design
with (Dis)economies of Scale |
Sequential Rationality in
Cryptographic Protocols |
|
|
Matthew Andrews and
Spyridon Antonakopoulos and Lisa Zhang |
Ronen Gradwohl and Noam
Livne and Alon Rosen |
9:35 |
- 9:55 |
One Tree Suffices: A
Simultaneous O(1)-Approximation for Single-Sink Buy-at-Bulk |
An efficient test for
product states, with applications to quantum Merlin-Arthur games |
|
|
Ashish Goel and Ian Post |
Aram W. Harrow and Ashley
Montanaro |
10:00 |
- 10:20 |
Min st-Cut Oracle for
Planar Graphs with Near-Linear Preprocessing Time |
|
|
|
Glencora Borradaile and
Piotr Sankowski and Christian Wulff-Nilsen |
|
10:20 |
-10:50 |
Coffee Break |
|
|
Session 10A |
Session 10B |
10:50 |
- 11:10 |
Subcubic Equivalences
Between Path, Matrix, and Triangle Problems |
A Fourier-analytic approach
to Reed-Muller decoding |
|
|
Virginia Vassilevska
Williams and Ryan Williams |
Parikshit Gopalan |
11:15 |
- 11:35 |
Replacement Paths via Fast
Matrix Multiplication |
Pseudorandom generators for
CC0[p]
and the Fourier spectrum of low-degree polynomials over finite fields |
|
|
Oren Weimann and Raphael
Yuster |
Shachar Lovett and Partha
Mukhopadhyay and Amir Shpilka |
11:40 |
- 12:00 |
All-Pairs Shortest Paths in
O(n2) Time With High Probability |
Matching Vector Codes /
Local list decoding with a constant number of queries |
|
|
Yuval Peres and Dmitry
Sotnikov and Benny Sudakov ad Uri Zwick |
Zeev Dvir and Parikshit
Gopalan and Sergey Yekhanin /
Avraham Ben-Aroya and Klim Efremenko and Amnon Ta-Shma |
12:05 |
- 12:25 |
Approximating Maximum Weight Matching in Near-linear Time |
Codes for Computationally
Simple Channels: Explicit Constructions with Optimal Rate |
|
|
Ran Duan and Seth Pettie |
Venkatesan Guruswami and
Adam Smith |
12:30 |
- 1:45 |
Lunch |
|
|
Session 11A |
Session 11B |
2:00 |
- 2:20 |
Pure and Bayes-Nash Price
of Anarchy for Generalized Second Price Auction |
Backyard Cuckoo Hashing:
Constant Worst-Case Operations with a Succinct Representation |
|
|
Renato Paes Leme and Eva
Tardos |
Yuriy Arbitman and Moni
Naor and Gil Segev |
2:25 |
- 2:45 |
Frugal and Truthful
Auctions for Vertex Covers, Flows, and Cuts / Frugal Mechanism Design via
Spectral Techniques |
A lower bound for dynamic
approximate membership data structures |
|
|
David Kempe and Mahyar
Salek and Cristopher Moore /
Ning Chen and Edith Elkind and Nick Gravin and Fedor Petrov |
Shachar Lovett and Ely
Porat |
2:50 |
- 3:10 |
Budget Feasible Mechanisms |
Lower Bounds for Near
Neighbor Search via Metric Expansion |
|
|
Yaron Singer |
Rina Panigrahy and Kunal
Talwar and Udi Wieder |
3:15 |
- 3:35 |
Black-Box Randomized
Reductions in Algorithmic Mechanism Design |
Distance Oracles Beyond the
Thorup–Zwick Bound |
|
|
Shaddin Dughmi and Tim
Roughgarden |
Mihai Pătraşcu
and Liam Roditty |
|
|
|
|
|
|
|
|
|
|
Corrigendum: A Random Sampling Algorithm for Learning an Intersection of Halfspaces |