Theoretical CS Reading Group
The reading group meets once a week
usually, Monday 1:30-2:30pm to discuss
a particular paper or topic.
Please join our mailing list to get notifications about the weekly meetings and discussions. You might also be interested in the Theory Seminar. |
Spring 2019 Fall 2018 Spring 2018 Fall 2017 Spring 2017 Fall 2016 Spring & Summer 2016 Fall 2015 Spring & Summer 2015 Fall 2014 Spring 2014 Summer & Fall 2013 |
Fall 2015
Thursday, 17th Sept 2015 —
O. Goldreich, D. Ron,
"Sample based testing of Graph Properties"
Presenter: Akash Kumar
Monday, 21st Sept 2015 —
Theory Seminar - Prof. Elena Grigorescu, Purdue University
Local Testing of Lattices
Monday, 28th Sept 2015 —
Counting Types of Markov Fields
Presenter: Abram Magner
Monday, 5th Oct 2015 —
Theory Seminar - Prof. David Gleich, Purdue University
Network Clustering with Higher-Order Structures
We'll discuss a new generalization of the Cheeger inequality to higher-order structures in networks including network motifs. This is easy to implement and seemlessly generalizes spectral clustering to directed, signed, and many other types of complex networks. In particular, our generalization allow us to re-use the large history of existing ideas in spectral clustering including local methods, overlapping methods, and relationships with kernel k-means.
Friday, 16th Oct 2015—
M. Crouch, D. Stubbs,
"Improved Streaming Algorithms for Weighted Matching, via Unweighted Matching"
Presenter: Samson Zhou
Monday, 19th Oct 2015 —
Theory Seminar - Prof. Hemanta Maji, Purdue University
Secure Computation using Imperfect Building Blocks
Secure multi-party computation enables mutually distrusting parties to compute over their private data. Such secure computation protocols leverage the security of atomic "building blocks" to perform complex computations privately. The security of these protocols crucially hinges on the assumption that these underlying building blocks have perfect security. Even minor imperfections in these building blocks can violate the security of these protocols.
This raises the following important question: "Can secure computation be based on imperfect building blocks?"
In this talk, I will present algorithmic solutions that resolve this question in the affirmative
Monday, 26th Oct 2015—
Chitnis, et.al,
"Kernelization via Sampling with Applications to Dynamic Graph Streams"
Presenter: Negin Karisani
Monday, 23rd Nov 2015— Bridging Computation on Lattices and Codes Presenter: GV
Monday, 30th Nov 2015—
Scarf's Lemma and Its Application
Presenter:Young-San Lin
Thursday, 12th Dec 2015 —
Theory Seminar - Prof. Edinah Gnang, Purdue University
On the spectra of direct sums and Kronecker products of side length 2 hypermatrices and related algorithmic problems in data science
We present elementary method for obtaining the spectral decomposition of hypermatrices generated by arbitrary combinations of Kronecker products and direct sums of cubic hypermatrices having side length 2. The method is based on a generalization of Parseval's identity. We use the general formulation of Parseval's identity to introduce hypermatrix Fourier transforms and discrete Fourier hypermatrices. We extend to hypermatrices orthogonalization procedures and Sylvester's classical Hadamard matrix construction. We conclude the talk with illustrations of spectral decompositions of adjacency hypermatrices of finite groups and a proof of a hypermatrix Rayleigh quotient inequality. This is a joint work with Yuval Filmus.