Contents - Part II

Total Page:16

File Type:pdf, Size:1020Kb

Contents - Part II Contents - Part II Invited Talks Towards the Graph Minor Theorems for Directed Graphs 3 Ken-Ichi Kawarabayashi and Stephan Kreutzer Automated Synthesis of Distributed Controllers 11 Anca Muscholl Track B: Logic, Semantics, Automata and Theory of Programming Games for Dependent Types 31 Samson Abramsky, Radha Jagadeesan, and Matthijs Vakdr Short Proofs of the Kneser-Lovasz Coloring Principle 44 James Aisenberg, Maria Luisa Bonet, Sam Buss, Adrian Craciun, and Gabriel Istrate Provenance Circuits for Trees and Treelike Instances 56 Antoine Amarilli, Pierre Bourhis, and Pierre Senellart Language Emptiness of Continuous-Time Parametric Timed Automata 69 Nikola Benes, Peter Bezdek, Kim G. Larsen, and Jin Srba Analysis of Probabilistic Systems via Generating Functions and Pade Approximation 82 Michele Boreale On Reducing Linearizability to State Reachability 95 Ahmed Bouajjani, Michael Emmi, Constantin Enea, and Jad Hamza The Complexity of Synthesis from Probabilistic Components 108 Krishnendu Chatterjee, Laurent Doyen, and Moshe Y. Vardi Edit Distance for Pushdown Automata 121 Krishnendu Chatterjee, Thomas A. Henzinger, Rasmus Ibsen-Jensen, and Jan Otop Solution Sets for Equations over Free Groups Are EDTOL Languages 134 Laura Ciobanu, Volker Diekert, and Murray Elder Limited Set quantifiers over Countable Linear Orderings 146 Thomas Colcombet and A.V. Sreejith http://d-nb.info/1071249711 XXVM Contents - Part II Reachability Is in DynFO 159 Samir Datta, Raghav Kulkarni, Anish Mukherjee, Thomas Schwentick, and Thomas Zeume Natural Homology 171 Jeremy Dubut, Eric Goubault, and Jean Goubault-Larrecq Greatest Fixed Points of Probabilistic Min/Max Polynomial Equations, and Reachability for Branching Markov Decision Processes 184 Kousha Etessami, Alistair Stewart, and Mihalis Yannakakis Trading Bounds for Memory in Games with Counters 197 Nathanael Fijalkow, Florian Horn, Denis Kuperberg, and Michal Skrzypczak Decision Problems of Tree Transducers with Origin 209 Emmanuel Filiot, Sebastian Maneth, Pierre-Alain Reynier, and Jean-Marc Talbot Incompleteness Theorems, Large Cardinals, and Automata over Infinite Words 222 Olivier Finkel The Odds of Staying on Budget 234 Christoph Haase and Stefan Kiefer From Sequential Specifications to Eventual Consistency 247 Radha Jagadeesan and James Riely Fixed-Dimensional Energy Games Are in Pseudo-Polynomial Time 260 Marcin Jurdzinski, Ranko Lazic, and Sylvain Schmitz An Algebraic Geometric Approach to Nivat's Conjecture 273 Jarkko Kari and Michal Szabados Nominal Kleene Coalgebra 286 Dexter Kozen, Konstantinos Mamouras, Daniela Petri ^an, and Alexandra Silva On Determinisation of Good-for-Games Automata 299 Denis Kuperberg and Michal Skrzypczak Owicki-Gries Reasoning for Weak Memory Models 311 Ori Lahav and Viktor Vafeiadis On the Coverability Problem for Pushdown Vector Addition Systems in One Dimension 324 Jerome Leroux, Gregoire Sutre, and Patrick Totzke Contents - Part II XXIX Compressed Tree Canonization 337 Markus Lohrey, Sebastian Maneth, and Fabian Peternek Parsimonious Types and Non-uniform Computation 350 Damiano Mazza and Kazushige Terui Baire Category Quantifier in Monadic Second Order Logic 362 Henryk Michalewski and Matteo Mio Liveness of Parameterized Timed Networks 375 Benjamin Aminof, Sasha Rubin, Florian Zuleger, and Francesco Spegni Symmetric Strategy Improvement 388 Sven Schewe, Ashutosh Trivedi, and Thomas Varghese Effect Algebras, Presheaves, Non-locality and Contextuality 401 Sam Staton and Sander Uijlen On the Complexity of Intersecting Regular, Context-Free, and Tree Languages 414 Joseph Swernofsky and Michael Wehar Containment of Monadic Datalog Programs via Bounded Clique-Width .... 427 Mikolaj Bojanczyk, Filip Murlak, and Adam Witkowski An Approach to Computing Downward Closures 440 Georg Zetzsche How Much Lookahead Is Needed to Win Infinite Games? 452 Felix Klein and Martin Zimmermann Track C: Foundations of Networked Computation: Models, Algorithms and Information Management Symmetric Graph Properties Have Independent Edges 467 Dimitris Achlioptas and Paris Siminelakis Polylogarithmic-Time Leader Election in Population Protocols 479 Dan Alistarh and Rati Gelashvili Core Size and Densification in Preferential Attachment Networks 492 Chen Avin, Zvi Lotker, Yinon Nahum, and David Peleg Maintaining Near-Popular Matchings 504 Sayan Bhattacharya, Martin Hoefer, Chien-Chung Huang, Telikepalli Kavitha, and Lisa Wagner XXX Contents - Part II Ultra-Fast Load Balancing on Scale-Free Networks 516 Karl Bringmann, Tobias Friedrich, Martin Hoefer, Ralf Rothenberger, and Thomas Sauerwald Approximate Consensus in Highly Dynamic Networks: The Role of Averaging Algorithms 528 Bernadette Charron-Bost, Matthias Fiigger, and Thomas Nowak The Range of Topological Effects on Communication 540 Arkadev Chattopadhyay and Atri Rudra Secretary Markets with Local Information 552 Ning Chen, Martin Hoefer, Marvin Kiinnemann, Chengyu Lin, and Peihan Miao A Simple and Optimal Ancestry Labeling Scheme for Trees 564 S0ren Dahlgaard, Mathias Bcek Tejs Knudsen, and Noy Rotbart Interactive Communication with Unknown Noise Rate 575 Varsha Dani, Mahnush Movahedi, Jared Saia, and Maxwell Young Fixed Parameter Approximations for ^-Center Problems in Low Highway Dimension Graphs 588 Andreas Emil Feldmann A Unified Framework for Strong Price of Anarchy in Clustering Games. ... 601 Michal Feldman and Ophir Friedler On the Diameter of Hyperbolic Random Graphs 614 Tobias Friedrich and Anton Krohmer Tight Bounds for Cost-Sharing in Weighted Congestion Games 626 Martin Gairing, Konstantinos Kollias, and Grammateia Kotsialou Distributed Broadcast Revisited: Towards Universal Optimality 638 Mohsen Ghaffari Selling Two Goods Optimally 650 Yiannis Giannakopoulos and Elias Koutsoupias Adaptively Secure Coin-Flipping, Revisited 663 Shafi Goldwasser, Yael Tauman Kalai, and Sunoo Park Optimal Competitiveness for the Rectilinear Steiner Arborescence Problem 675 Erez Kantor and Shay Kutten Contents - Part II XXXI Normalization Phenomena in Asynchronous Networks 688 Amin Karbasi, Johannes Lengler, and Angelika Steger Broadcast from Minicast Secure Against General Adversaries 701 Pavel Raykov Author Index 713 Contents - Part I Track A: Algorithms, Complexity and Games Statistical Randomized Encodings: A Complexity Theoretic View 1 Shweta Agrawal, Yuval Ishai, Dakshita Khurana, and Anat Paskin-Cherniavsky Tighter Fourier Transform Lower Bounds 14 Nir Ailon Quantifying Competitiveness in Paging with Locality of Reference 26 Susanne Albers and Dario Frascaria Approximation Algorithms for Computing Maximin Share Allocations 39 Georgios Amanatidis, Evangelos Markakis, Afshin Nikzad, and Amin Saberi Envy-Free Pricing in Large Markets: Approximating Revenue and Welfare 52 Elliot Anshelevich, Koushik Kar, and Shreyas Sekar Batched Point Location in SINR Diagrams via Algebraic Tools 65 Boris Aronov and Matthew J. Katz On the Randomized Competitive Ratio of Reordering Buffer Management with Non-uniform Costs 78 Noa Avigdor-Elgrabli, Sungjin Im, Benjamin Moseley, and Yuval Rabani Serving in the Dark Should Be Done Non-uniformly 91 Yossi Azar and Ilan Reuven Cohen Finding the Median (Obliviously) with Bounded Space 103 Paul Beame, Vincent Liew, and Mihai Patra$cu Approximation Algorithms for Min-Sum ^-Clustering and Balanced A:-Median 116 Babak Behsaz, Zachary Friggstad, Mohammad R. Salavatipour, and Rohit Sivakumar Solving Linear Programming with Constraints Unknown 129 Xiaohui Bei, Ning Chen, and Shengyu Zhang XXXIV Contents - Part I Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources 143 Salman Beigi, Omid Etesami, and Amin Gohari Limitations of Algebraic Approaches to Graph Isomorphism Testing 155 Christoph Berkholz and Martin Grohe Fully Dynamic Matching in Bipartite Graphs 167 Aaron Bernstein and Cliff Stein Feasible Interpolation for QBF Resolution Calculi 180 Olaf Beyersdorff, Leroy Chew, Meena Mahajan, and Anil Shukla Simultaneous Approximation of Constraint Satisfaction Problems 193 Amey Bhangale, Swastik Kopparty, and Sushant Sachdeva Design of Dynamic Algorithms via Primal-Dual Method 206 Sayan Bhattacharya, Monika Henzinger, and Giuseppe F. Italiano What Percentage of Programs Halt? 219 Laurent Bienvenu, Damien Desfontaines, and Alexander Shen The Parity of Set Systems Under Random Restrictions with Applications to Exponential Time Problems 231 Andreas Bjdrklund, Holger Dell, and Thore Husfeldt Spotting Trees with Few Leaves 243 Andreas Bjdrklund, Vikram Kamat, Lukasz Kowalik, and Meirav Zehavi Constraint Satisfaction Problems over the Integers with Successor 256 Manuel Bodirsky, Barnaby Martin, and Antoine Mottet Hardness Amplification and the Approximate Degree of Constant-Depth Circuits 268 Mark Bun and Justin Thaler Algorithms and Complexity for Turaev-Viro Invariants 281 Benjamin A. Burton, Clement Maria, and Jonathan Spreer Big Data on the Rise? - Testing Monotonicity of Distributions 294 Clement L. Canonne Unit Interval Editing Is Fixed-Parameter Tractable 306 Yixin Cao Streaming Algorithms for Submodular Function Maximization 318 Chandra Chekuri, Shalmoli Gupta, and Kent Quanrud Contents - Part I XXXV Multilinear Pseudorandom Functions 331 Aloni Cohen and Justin Holmgren Zero-Fixing Extractors for Sub-Logarithmic Entropy 343 Gil Cohen and Igor Shinkar Interactive Proofs with Approximately Commuting Provers 355 Matthew Coudron and Thomas Vidick Popular Matchings with Two-Sided Preferences and One-Sided Ties 367 Agnes Cseh, Chien-Chung Huang, and Telikepalli Kavitha Block Interpolation:
Recommended publications
  • Resource-Competitive Algorithms1 1 Introduction
    Resource-Competitive Algorithms1 Michael A. Bender Varsha Dani Department of Computer Science Department of Computer Science Stony Brook University University of New Mexico Stony Brook, NY, USA Albuquerque, NM, USA [email protected] [email protected] Jeremy T. Fineman Seth Gilbert Department of Computer Science Department of Computer Science Georgetown University National University of Singapore Washington, DC, USA Singapore [email protected] [email protected] Mahnush Movahedi Seth Pettie Department of Computer Science Electrical Eng. and Computer Science Dept. University of New Mexico University of Michigan Albuquerque, NM, USA Ann Arbor, MI, USA [email protected] [email protected] Jared Saia Maxwell Young Department of Computer Science Computer Science and Engineering Dept. University of New Mexico Mississippi State University Albuquerque, NM, USA Starkville, MS, USA [email protected] [email protected] Abstract The point of adversarial analysis is to model the worst-case performance of an algorithm. Un- fortunately, this analysis may not always reflect performance in practice because the adversarial assumption can be overly pessimistic. In such cases, several techniques have been developed to provide a more refined understanding of how an algorithm performs e.g., competitive analysis, parameterized analysis, and the theory of approximation algorithms. Here, we describe an analogous technique called resource competitiveness, tailored for dis- tributed systems. Often there is an operational cost for adversarial behavior arising from band- width usage, computational power, energy limitations, etc. Modeling this cost provides some notion of how much disruption the adversary can inflict on the system. In parameterizing by this cost, we can design an algorithm with the following guarantee: if the adversary pays T , then the additional cost of the algorithm is some function of T .
    [Show full text]
  • A Polynomial-Time Approximation Algorithm for All-Terminal Network Reliability
    A Polynomial-Time Approximation Algorithm for All-Terminal Network Reliability Heng Guo School of Informatics, University of Edinburgh, Informatics Forum, Edinburgh, EH8 9AB, United Kingdom. [email protected] https://orcid.org/0000-0001-8199-5596 Mark Jerrum1 School of Mathematical Sciences, Queen Mary, University of London, Mile End Road, London, E1 4NS, United Kingdom. [email protected] https://orcid.org/0000-0003-0863-7279 Abstract We give a fully polynomial-time randomized approximation scheme (FPRAS) for the all-terminal network reliability problem, which is to determine the probability that, in a undirected graph, assuming each edge fails independently, the remaining graph is still connected. Our main contri- bution is to confirm a conjecture by Gorodezky and Pak (Random Struct. Algorithms, 2014), that the expected running time of the “cluster-popping” algorithm in bi-directed graphs is bounded by a polynomial in the size of the input. 2012 ACM Subject Classification Theory of computation → Generating random combinatorial structures Keywords and phrases Approximate counting, Network Reliability, Sampling, Markov chains Digital Object Identifier 10.4230/LIPIcs.ICALP.2018.68 Related Version Also available at https://arxiv.org/abs/1709.08561. Acknowledgements We thank Mark Huber for bringing reference [8] to our attention, Mark Walters for the coupling idea leading to Lemma 12, and Igor Pak for comments on an earlier version. We also thank the organizers of the “LMS – EPSRC Durham Symposium on Markov Processes, Mixing Times and Cutoff”, where part of the work is carried out. 1 Introduction Network reliability problems are extensively studied #P-hard problems [5] (see also [3, 22, 18, 2]).
    [Show full text]
  • Arxiv:1611.01647V4 [Cs.DS] 15 Jan 2019 Resample to Able of Are Class We Special Techniques, Our a with for Inst Extremal Solutions Answer
    UNIFORM SAMPLING THROUGH THE LOVASZ´ LOCAL LEMMA HENG GUO, MARK JERRUM, AND JINGCHENG LIU Abstract. We propose a new algorithmic framework, called “partial rejection sampling”, to draw samples exactly from a product distribution, conditioned on none of a number of bad events occurring. Our framework builds new connections between the variable framework of the Lov´asz Local Lemma and some classical sampling algorithms such as the “cycle-popping” algorithm for rooted spanning trees. Among other applications, we discover new algorithms to sample satisfying assignments of k-CNF formulas with bounded variable occurrences. 1. Introduction The Lov´asz Local Lemma [9] is a classical gem in combinatorics that guarantees the existence of a perfect object that avoids all events deemed to be “bad”. The original proof is non- constructive but there has been great progress in the algorithmic aspects of the local lemma. After a long line of research [3, 2, 30, 8, 34, 37], the celebrated result by Moser and Tardos [31] gives efficient algorithms to find such a perfect object under conditions that match the Lov´asz Local Lemma in the so-called variable framework. However, it is natural to ask whether, under the same condition, we can also sample a perfect object uniformly at random instead of merely finding one. Roughly speaking, the resampling algorithm by Moser and Tardos [31] works as follows. We initialize all variables randomly. If bad events occur, then we arbitrarily choose a bad event and resample all the involved variables. Unfortunately, it is not hard to see that this algorithm can produce biased samples.
    [Show full text]
  • On the Complexity of Partial Derivatives Ignacio Garcia-Marco, Pascal Koiran, Timothée Pecatte, Stéphan Thomassé
    On the complexity of partial derivatives Ignacio Garcia-Marco, Pascal Koiran, Timothée Pecatte, Stéphan Thomassé To cite this version: Ignacio Garcia-Marco, Pascal Koiran, Timothée Pecatte, Stéphan Thomassé. On the complexity of partial derivatives. 2016. ensl-01345746v2 HAL Id: ensl-01345746 https://hal-ens-lyon.archives-ouvertes.fr/ensl-01345746v2 Preprint submitted on 30 May 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. On the complexity of partial derivatives Ignacio Garcia-Marco, Pascal Koiran, Timothée Pecatte, Stéphan Thomassé LIP,∗ Ecole Normale Supérieure de Lyon, Université de Lyon. May 30, 2017 Abstract The method of partial derivatives is one of the most successful lower bound methods for arithmetic circuits. It uses as a complexity measure the dimension of the span of the partial derivatives of a polynomial. In this paper, we consider this complexity measure as a computational problem: for an input polynomial given as the sum of its nonzero monomials, what is the complexity of computing the dimension of its space of partial derivatives? We show that this problem is ♯P-hard and we ask whether it belongs to ♯P. We analyze the “trace method”, recently used in combinatorics and in algebraic complexity to lower bound the rank of certain matri- ces.
    [Show full text]
  • Interactions of Computational Complexity Theory and Mathematics
    Interactions of Computational Complexity Theory and Mathematics Avi Wigderson October 22, 2017 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, whose draft is available at https://www.math.ias.edu/avi/book]. We survey some concrete interaction areas between computational complexity theory and different fields of mathematics. We hope to demonstrate here that hardly any area of modern mathematics is untouched by the computational connection (which in some cases is completely natural and in others may seem quite surprising). In my view, the breadth, depth, beauty and novelty of these connections is inspiring, and speaks to a great potential of future interactions (which indeed, are quickly expanding). We aim for variety. We give short, simple descriptions (without proofs or much technical detail) of ideas, motivations, results and connections; this will hopefully entice the reader to dig deeper. Each vignette focuses only on a single topic within a large mathematical filed. We cover the following: • Number Theory: Primality testing • Combinatorial Geometry: Point-line incidences • Operator Theory: The Kadison-Singer problem • Metric Geometry: Distortion of embeddings • Group Theory: Generation and random generation • Statistical Physics: Monte-Carlo Markov chains • Analysis and Probability: Noise stability • Lattice Theory: Short vectors • Invariant Theory: Actions on matrix tuples 1 1 introduction The Theory of Computation (ToC) lays out the mathematical foundations of computer science. I am often asked if ToC is a branch of Mathematics, or of Computer Science. The answer is easy: it is clearly both (and in fact, much more). Ever since Turing's 1936 definition of the Turing machine, we have had a formal mathematical model of computation that enables the rigorous mathematical study of computational tasks, algorithms to solve them, and the resources these require.
    [Show full text]
  • Statistical Queries and Statistical Algorithms: Foundations and Applications∗
    Statistical Queries and Statistical Algorithms: Foundations and Applications∗ Lev Reyzin Department of Mathematics, Statistics, and Computer Science University of Illinois at Chicago [email protected] Abstract We give a survey of the foundations of statistical queries and their many applications to other areas. We introduce the model, give the main definitions, and we explore the fundamental theory statistical queries and how how it connects to various notions of learnability. We also give a detailed summary of some of the applications of statistical queries to other areas, including to optimization, to evolvability, and to differential privacy. 1 Introduction Over 20 years ago, Kearns [1998] introduced statistical queries as a framework for designing machine learning algorithms that are tolerant to noise. The statistical query model restricts a learning algorithm to ask certain types of queries to an oracle that responds with approximately correct answers. This framework has has proven useful, not only for designing noise-tolerant algorithms, but also for its connections to other noise models, for its ability to capture many of our current techniques, and for its explanatory power about the hardness of many important problems. Researchers have also found many connections between statistical queries and a variety of modern topics, including to evolvability, differential privacy, and adaptive data analysis. Statistical queries are now both an important tool and remain a foundational topic with many important questions. The aim of this survey is to illustrate these connections and bring researchers to the forefront of our understanding of this important area. We begin by formally introducing the model and giving the main definitions (Section 2), we then move to exploring the fundamental theory of learning statistical queries and how how it connects to other notions of arXiv:2004.00557v2 [cs.LG] 14 May 2020 learnability (Section 3).
    [Show full text]
  • The Trichotomy of HAVING Queries on a Probabilistic Database
    VLDBJ manuscript No. (will be inserted by the editor) The Trichotomy of HAVING Queries on a Probabilistic Database Christopher Re´ · Dan Suciu Received: date / Accepted: date Abstract We study the evaluation of positive conjunctive cant extension of a previous dichotomy result for Boolean queries with Boolean aggregate tests (similar to HAVING in conjunctive queries into safe and not safe. For each of the SQL) on probabilistic databases. More precisely, we study three classes we present novel techniques. For safe queries, conjunctive queries with predicate aggregates on probabilis- we describe an evaluation algorithm that uses random vari- tic databases where the aggregation function is one of MIN, ables over semirings. For apx-safe queries, we describe an MAX, EXISTS, COUNT, SUM, AVG, or COUNT(DISTINCT) and fptras that relies on a novel algorithm for generating a ran- the comparison function is one of =; ,; ≥; >; ≤, or < . The dom possible world satisfying a given condition. Finally, for complexity of evaluating a HAVING query depends on the ag- hazardous queries we give novel proofs of hardness of ap- gregation function, α, and the comparison function, θ. In this proximation. The results for safe queries were previously paper, we establish a set of trichotomy results for conjunc- announced [43], but all other results are new. tive queries with HAVING predicates parametrized by (α, θ). Keywords Probabilistic Databases · Query Evaluation · For such queries (without self joins), one of the following Sampling Algorithms · Semirings · Safe Plans three statements is true: (1) The exact evaluation problem has P-time data complexity. In this case, we call the query safe.
    [Show full text]
  • Download This PDF File
    T G¨ P 2012 C N Deadline: December 31, 2011 The Gödel Prize for outstanding papers in the area of theoretical computer sci- ence is sponsored jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery, Special Inter- est Group on Algorithms and Computation Theory (ACM-SIGACT). The award is presented annually, with the presentation taking place alternately at the Inter- national Colloquium on Automata, Languages, and Programming (ICALP) and the ACM Symposium on Theory of Computing (STOC). The 20th prize will be awarded at the 39th International Colloquium on Automata, Languages, and Pro- gramming to be held at the University of Warwick, UK, in July 2012. The Prize is named in honor of Kurt Gödel in recognition of his major contribu- tions to mathematical logic and of his interest, discovered in a letter he wrote to John von Neumann shortly before von Neumann’s death, in what has become the famous P versus NP question. The Prize includes an award of USD 5000. AWARD COMMITTEE: The winner of the Prize is selected by a committee of six members. The EATCS President and the SIGACT Chair each appoint three members to the committee, to serve staggered three-year terms. The committee is chaired alternately by representatives of EATCS and SIGACT. The 2012 Award Committee consists of Sanjeev Arora (Princeton University), Josep Díaz (Uni- versitat Politècnica de Catalunya), Giuseppe Italiano (Università a˘ di Roma Tor Vergata), Mogens Nielsen (University of Aarhus), Daniel Spielman (Yale Univer- sity), and Eli Upfal (Brown University). ELIGIBILITY: The rule for the 2011 Prize is given below and supersedes any di fferent interpretation of the parametric rule to be found on websites on both SIGACT and EATCS.
    [Show full text]
  • Edinburgh Research Explorer
    Edinburgh Research Explorer A Polynomial-Time Approximation Algorithm for All-Terminal Network Reliability Citation for published version: Guo, H & Jerrum, M 2018, A Polynomial-Time Approximation Algorithm for All-Terminal Network Reliability. in I Chatzigiannakis, C Kaklamanis, D Marx & D Sannella (eds), 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018). vol. 107, Leibniz International Proceedings in Informatics (LIPIcs), vol. 107, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Dagstuhl, Germany, pp. 68:1-68:12, 45th International Colloquium on Automata, Languages, and Programming, Prague, Czech Republic, 9/07/18. https://doi.org/10.4230/LIPIcs.ICALP.2018.68 Digital Object Identifier (DOI): 10.4230/LIPIcs.ICALP.2018.68 Link: Link to publication record in Edinburgh Research Explorer Document Version: Publisher's PDF, also known as Version of record Published In: 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018) Publisher Rights Statement: © Heng Guo and Mark Jerrum; licensed under Creative Commons License CC-BY General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 28.
    [Show full text]
  • Is the Space Complexity of Planted Clique Recovery the Same As That of Detection?
    Is the Space Complexity of Planted Clique Recovery the Same as That of Detection? Jay Mardia Department of Electrical Engineering, Stanford University, CA, USA [email protected] Abstract We study the planted clique problem in which a clique of size k is planted in an Erdős-Rényi graph 1 G(n, 2 ), and one is interested in either detecting or recovering this planted clique. This problem is interesting because it is widely believed to show a statistical-computational gap at clique size √ k = Θ( n), and has emerged as the prototypical problem with such a gap from which average-case hardness of other statistical problems can be deduced. It also displays a tight computational connection between the detection and recovery variants, unlike other problems of a similar nature. This wide investigation into the computational complexity of the planted clique problem has, however, mostly focused on its time complexity. To begin investigating the robustness of these statistical-computational phenomena to changes in our notion of computational efficiency, we ask- Do the statistical-computational phenomena that make the planted clique an interesting problem also hold when we use “space efficiency” as our notion of computational efficiency? It is relatively easy to show that a positive answer to this question depends on the existence of a √ O(log n) space algorithm that can recover planted cliques of size k = Ω( n). Our main result comes √ very close to designing such an algorithm. We show that for k = Ω( n), the recovery problem can ∗ ∗ √k be solved in O log n − log n · log n bits of space.
    [Show full text]
  • From the AMS Secretary
    From the AMS Secretary Society and delegate to such committees such powers as Bylaws of the may be necessary or convenient for the proper exercise American Mathematical of those powers. Agents appointed, or members of com- mittees designated, by the Board of Trustees need not be Society members of the Board. Nothing herein contained shall be construed to em- Article I power the Board of Trustees to divest itself of responsi- bility for, or legal control of, the investments, properties, Officers and contracts of the Society. Section 1. There shall be a president, a president elect (during the even-numbered years only), an immediate past Article III president (during the odd-numbered years only), three Committees vice presidents, a secretary, four associate secretaries, a Section 1. There shall be eight editorial committees as fol- treasurer, and an associate treasurer. lows: committees for the Bulletin, for the Proceedings, for Section 2. It shall be a duty of the president to deliver the Colloquium Publications, for the Journal, for Mathemat- an address before the Society at the close of the term of ical Surveys and Monographs, for Mathematical Reviews; office or within one year thereafter. a joint committee for the Transactions and the Memoirs; Article II and a committee for Mathematics of Computation. Section 2. The size of each committee shall be deter- Board of Trustees mined by the Council. Section 1. There shall be a Board of Trustees consisting of eight trustees, five trustees elected by the Society in Article IV accordance with Article VII, together with the president, the treasurer, and the associate treasurer of the Society Council ex officio.
    [Show full text]
  • On the Nature of the Theory of Computation (Toc)∗
    Electronic Colloquium on Computational Complexity, Report No. 72 (2018) On the nature of the Theory of Computation (ToC)∗ Avi Wigderson April 19, 2018 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, available at https://www.math.ias.edu/avi/book]. I attempt to give here a panoramic view of the Theory of Computation, that demonstrates its place as a revolutionary, disruptive science, and as a central, independent intellectual discipline. I discuss many aspects of the field, mainly academic but also cultural and social. The paper details of the rapid expansion of interactions ToC has with all sciences, mathematics and philosophy. I try to articulate how these connections naturally emanate from the intrinsic investigation of the notion of computation itself, and from the methodology of the field. These interactions follow the other, fundamental role that ToC played, and continues to play in the amazing developments of computer technology. I discuss some of the main intellectual goals and challenges of the field, which, together with the ubiquity of computation across human inquiry makes its study and understanding in the future at least as exciting and important as in the past. This fantastic growth in the scope of ToC brings significant challenges regarding its internal orga- nization, facilitating future interactions between its diverse parts and maintaining cohesion of the field around its core mission of understanding computation. Deliberate and thoughtful adaptation and growth of the field, and of the infrastructure of its community are surely required and such discussions are indeed underway.
    [Show full text]