BRICS Newsletter No 9

Total Page:16

File Type:pdf, Size:1020Kb

BRICS Newsletter No 9 BRICSNewsletter Basic Research in Computer Science No 9, September 1998 In this Issue BRICS. Further details can be obtained by con- tacting the addresses on the back page. Welcome 1 BRICS has had a busy summer, with an excit- Coming Events 2 ing range of activities. They began with the first Which π-Calculus are we Talking About? 2 APPSEM workshop in May, for which Olivier Biological Concepts for Adaptive and Danvy was a chief organiser; it was due to be Distributed Algorithms ......... 2 held at Aarhus under the auspices of BRICS but A Formal Calculus for Distributed Agents 3 because of widespread strikes in Denmark had Mobile Agents in Practise .......... 3 to be moved to G¨oteborg at the last minute. Modelling and Verifying Authentication In June, Peter D. Mosses arranged possibly the Protocols ................. 3 first of a series of short workshops on Appli- Summer School in Semantics ........ 4 cations of Formal Methods, aimed mainly at Reports on Events 4 Danish attendees. The exciting list of invited speakers and satellite meetings helped attract a New Researchers, Guests and PhDs 16 large attendance to ICALP ’98 in Aalborg, organ- Dissertation Abstracts 18 ised by BRICS with Kim Guldstrand Larsen as Reasoning about Reactive Systems .... 18 programme chair and Sven Skyum and Glynn Winskel as vice chairs. Another enjoyable event, New Reports 20 also in July, was the summer school on Cryp- Notes Series 21 tography and Data Security, arranged by Ivan B. Lecture Series 21 Damg˚ard. Lars Arge and Jeffrey S. Vitter held a meeting on Massive Datasets. The workshop News 22 PTAC (Proof Theory and Complexity), organised Folder with BRICS Profile ......... 22 by Carsten Butz, Ulrich Kohlenbach and Søren Robin Milner Honorary Doctorate ..... 22 Riis, capped the end of the summer. It attracted BigWig .................... 23 many big names of the field and gave a fasci- Continuation of AQIP ............ 26 nating and broad view of the state of the art in IFIP WG1.3 .................. 27 Mathematical Logic. CASL ..................... 27 Glynn Winskel is going ahead with plans for a Calendar of Events 28 May summer school on Semantics of Compu- BRICS Address and World Wide Web 28 tation, based around lectures from some of the chapters from the Handbook of Logic and Com- puter Science. Welcome You’ll find a description of these and other recent and future BRICS activities in this newsletter. Welcome to the ninth issue of the BRICS newslet- ter. Its purpose is to inform you of appointments, publications, courses and other activities within 1 Coming Events For details, see the BRICS Activities web page: from evolutionary computing and artificial neu- www.brics.dk/Activities. ral networks, there are surprisingly few stud- ies into potential applications of other biologi- cal ideas that might be useful to IT problems and Which π-Calculus are we Talking questions. About? In this mini-course we will discuss various as- pects of biology, which could be used for novel Late October, 1998, Aarhus. Paola Quaglia, adaptive and distributed algorithms and intro- BRICS, will give a mini-course of 4 double lec- duce some existing biological models already tures on the π-calculus and related calculi. used in in artificial intelligence (AI) and artificial life (ALife). The aim of the course is to raise in- The π-calculus is considered to be the prototypi- terest for these (yet) unused biological ideas and cal calculus for the description of distributed sys- to point at problems related to their identifica- tems with a dynamically changing interconnec- tion and application in computer science. tion topology. It was introduced by R. Milner, J. Parrow, and D. Walker in 1989, and over since it In particular, we will discuss: has proliferated in a family of calculi slightly de- parting from the original one in their view about • Introduction and overview (including gen- interaction. eral introduction and motivation, organi- This will be a self-contained course, meant to be sation and origin of life, and methods for a very basic introduction to π-calculus and π- identification of significant processes) calculi. We will present late and barbed seman- • Emergent properties and self-organisation tics, and touch on polyadicity, asynchrony, and (including concept of emergent properties, their encodings. ALife, chaos theory, and virtual robotics) • Adaptive and distributed information pro- cessing (including concepts and models of Biological Concepts for Adaptive and evolution and genetics) Distributed Algorithms • Means of interaction (including perception, communication, synchronisation, and de- November 9, 10, 11, 16, 17, 1998, Aarhus. Thiemo cision making) Krink, BRICS, will give a mini-course of 5 double • Models for complex interactions in natu- lectures on biological concepts for adaptive and ral and artificial systems (including opti- distributed algorithms. mal foraging theory, game theory, coevolu- Biological ideas can serve as sophisticated mod- tion, and organisation of social systems) els for problem-solving strategies and the de- sign and management of complex computing systems. This potential, found in biological sys- Information about the speaker tems, arises from Nature’s characteristic capabil- ity of parallel processing, self-organisation, effi- Thiemo Krink is currently enrolled as a research ciency and robustness, i.e., effective behaviour assistant professor (Forskningsadjunkt) at the under unpredictably changing conditions. In- BRICS PhD school. He was trained as a com- terestingly, there are various analogies between puter scientist at the Universities of Erlangen- complex systems in computer science and biol- N¨urnberg and Hamburg (Germany), with spe- ogy, as for instance competition for resources, di- cial focus on computer simulation, AI and object- vision of labour or concurrency. However, apart oriented programming. Within these areas he 2 had specific interests in interdisciplinary re- able to an agent at a location. Resources are search, which were stimulated by his medicine themselves equipped with capabilities, and thus studies and his free lance activity as a business an agent may be given permission to send data consultant. As an MSc student, he conducted along a channel at a particular location without two interdisciplinary projects on modelling of being granted permission to read data along the animal behaviour in collaboration with the bi- same channel. ologist prof. Fritz Vollrath at Oxford. In 1994, In the presence of potentially malicious agents he received his MSc degree in computer science we show that the integrity of local resources and continued his research at the Department can still be maintained by incorporating various of Zoology, Aarhus, where he was conferred his forms of type checking into the runtime seman- PhD degree (biology) in 1997. Most of his pa- tics. pers and conference talks were focused on the design and application of virtual robots for bi- ological research. Apart from his own activ- Mobile Agents in Practise ity as a scientific author, his research has been published by public media such as newspapers January, 1999, Aarhus. Vladimiro Sassone, Dept. (e.g., Berlingske Tidende), journals (New Scien- Computer Science, Queen Mary and Westfield tist), books (R. Dawkins: Climbing Mount Im- College, University of London, UK, will give a probable) and TV (e.g. Scientific American Fron- mini-course on Mobile Agents in practise. tiers). His current research interests are in the fields of (i) applications of biological concepts for The lectures will provide an overview of some computational ideas and (ii) theoretical biology of the existing mobile agents programming sys- concerning general models for coevolution and tems, illustrating their designs, features, and behavioural ecology. some implementation issues. We might also fo- cus on few formal calculi to serve as common languages to describe and compare things at an A Formal Calculus for Distributed essential level and, possibly, provide inspiration Agents for future developments. For further information on the lecturer, please re- Late November, 1998, Aarhus. Matthew Hen- fer to his profile on page 16. nessy, School of Cognitive and Computing Sci- ences, University of Sussex, UK, will give a mini-course on a formal calculus for distributed Modelling and Verifying Authentica- agents. tion Protocols The lectures will examine a formal language for describing widely distributed open systems January–February, 1999, Aarhus. Sanjiva Prasad, where mobile agents can move from site to site IIT (Indian Institute of Technology), Delhi, India, seeking resources and effecting computations. will give a mini-course on modelling and verify- We will principally be concerned with type sys- ing authentication protocols. tems for such agents which guarantee no misuse With the growth of the internet, and commu- of local resources, even in the presence of agents nication between distributed sites, security and which may harbour malicious intentions. privacy are “hot” topics. A class of protocols, The language, Dpi, is obtained by adding to the called authentication protocols, are used to es- the π-calculus new constructs for located pro- tablish (with cryptography) secure communica- cesses and process migration. The type system tion channels between distributed agents. We is based on the notion of a location type, which will study some approaches to specifying and describes the set of resources (channels) avail- modelling such protocols, and to establish their 3 correctness, assuming perfect cryptography. The As part of this programme Glynn Winskel is or- focus of our treatment will be on process calculus ganising a Summer School on Semantics, based approaches and general theorem-proving tech- principally on part 3 of the Handbook. The Sum- niques, as opposed to belief logics and logic pro- mer School will take place here in Aarhus over a gramming approaches. A working knowledge week in May 1999 (the precise time is to be fixed of the π-calculus will be assumed. shortly). For further information on the lecturer, please re- So far the following lectures are planned: fer to his profile on page 16.
Recommended publications
  • Efficient Algorithms with Asymmetric Read and Write Costs
    Efficient Algorithms with Asymmetric Read and Write Costs Guy E. Blelloch1, Jeremy T. Fineman2, Phillip B. Gibbons1, Yan Gu1, and Julian Shun3 1 Carnegie Mellon University 2 Georgetown University 3 University of California, Berkeley Abstract In several emerging technologies for computer memory (main memory), the cost of reading is significantly cheaper than the cost of writing. Such asymmetry in memory costs poses a fun- damentally different model from the RAM for algorithm design. In this paper we study lower and upper bounds for various problems under such asymmetric read and write costs. We con- sider both the case in which all but O(1) memory has asymmetric cost, and the case of a small cache of symmetric memory. We model both cases using the (M, ω)-ARAM, in which there is a small (symmetric) memory of size M and a large unbounded (asymmetric) memory, both random access, and where reading from the large memory has unit cost, but writing has cost ω 1. For FFT and sorting networks we show a lower bound cost of Ω(ωn logωM n), which indicates that it is not possible to achieve asymptotic improvements with cheaper reads when ω is bounded by a polynomial in M. Moreover, there is an asymptotic gap (of min(ω, log n)/ log(ωM)) between the cost of sorting networks and comparison sorting in the model. This contrasts with the RAM, and most other models, in which the asymptotic costs are the same. We also show a lower bound for computations on an n × n diamond DAG of Ω(ωn2/M) cost, which indicates no asymptotic improvement is achievable with fast reads.
    [Show full text]
  • Computational Learning Theory: New Models and Algorithms
    Computational Learning Theory: New Models and Algorithms by Robert Hal Sloan S.M. EECS, Massachusetts Institute of Technology (1986) B.S. Mathematics, Yale University (1983) Submitted to the Department- of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 1989 @ Robert Hal Sloan, 1989. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author Department of Electrical Engineering and Computer Science May 23, 1989 Certified by Ronald L. Rivest Professor of Computer Science Thesis Supervisor Accepted by Arthur C. Smith Chairman, Departmental Committee on Graduate Students Abstract In the past several years, there has been a surge of interest in computational learning theory-the formal (as opposed to empirical) study of learning algorithms. One major cause for this interest was the model of probably approximately correct learning, or pac learning, introduced by Valiant in 1984. This thesis begins by presenting a new learning algorithm for a particular problem within that model: learning submodules of the free Z-module Zk. We prove that this algorithm achieves probable approximate correctness, and indeed, that it is within a log log factor of optimal in a related, but more stringent model of learning, on-line mistake bounded learning. We then proceed to examine the influence of noisy data on pac learning algorithms in general. Previously it has been shown that it is possible to tolerate large amounts of random classification noise, but only a very small amount of a very malicious sort of noise.
    [Show full text]
  • A Networked Robotic System and Its Use in an Oil Spill Monitoring Exercise
    A Networked Robotic System and its Use in an Oil Spill Monitoring Exercise El´oiPereira∗† Co-authors: Pedro Silvay, Clemens Krainerz, Christoph Kirschz, Jos´eMorgadoy, and Raja Sengupta∗ cpcc.berkeley.edu, eloipereira.com [email protected] Swarm at the Edge of the Could - ESWeek'13, Montreal, Canada September 29, 2013 ∗ - Systems Engineering, UC Berkeley y - Research Center, Portuguese Air Force Academy z - Computer Science Dept., University of Salzburg Programming the Ubiquitous World • In networked mobile systems (e.g. teams of robots, smartphones, etc.) the location and connectivity of \machines" may vary during the execution of its \programs" (computation specifications) • We investigate models for bridging \programs" and \machines" with dynamic structure (location and connectivity) • BigActors [PKSBdS13, PPKS13, PS13] are actors [Agh86] hosted by entities of the physical structure denoted as bigraph nodes [Mil09] E. Pereira, C. M. Kirsch, R. Sengupta, and J. B. de Sousa, \Bigactors - A Model for Structure-aware Computation," in ACM/IEEE 4th International Conference on Cyber-Physical Systems, 2013, pp. 199-208. Case study: Oil spill monitoring scenario • \Bilge dumping" is an environmental problem of great relevance for countries with large area of jurisdictional waters • EC created the European Maritime Safety Agency to \...prevent and respond to pollution by ships within the EU" • How to use networked robotics to monitor and take evidences of \bilge dumping" Figure: Portuguese Jurisdiction waters and evidences of \Bilge dumping".
    [Show full text]
  • Four Results of Jon Kleinberg a Talk for St.Petersburg Mathematical Society
    Four Results of Jon Kleinberg A Talk for St.Petersburg Mathematical Society Yury Lifshits Steklov Institute of Mathematics at St.Petersburg May 2007 1 / 43 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 / 43 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 2 / 43 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 2 / 43 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 2 / 43 Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams 2 / 43 Part I History of Nevanlinna Prize Career of Jon Kleinberg 3 / 43 Nevanlinna Prize The Rolf Nevanlinna Prize is awarded once every 4 years at the International Congress of Mathematicians, for outstanding contributions in Mathematical Aspects of Information Sciences including: 1 All mathematical aspects of computer science, including complexity theory, logic of programming languages, analysis of algorithms, cryptography, computer vision, pattern recognition, information processing and modelling of intelligence.
    [Show full text]
  • Navigability of Small World Networks
    Navigability of Small World Networks Pierre Fraigniaud CNRS and University Paris Sud http://www.lri.fr/~pierre Introduction Interaction Networks • Communication networks – Internet – Ad hoc and sensor networks • Societal networks – The Web – P2P networks (the unstructured ones) • Social network – Acquaintance – Mail exchanges • Biology (Interactome network), linguistics, etc. Dec. 19, 2006 HiPC'06 3 Common statistical properties • Low density • “Small world” properties: – Average distance between two nodes is small, typically O(log n) – The probability p that two distinct neighbors u1 and u2 of a same node v are neighbors is large. p = clustering coefficient • “Scale free” properties: – Heavy tailed probability distributions (e.g., of the degrees) Dec. 19, 2006 HiPC'06 4 Gaussian vs. Heavy tail Example : human sizes Example : salaries µ Dec. 19, 2006 HiPC'06 5 Power law loglog ppk prob{prob{ X=kX=k }} ≈≈ kk-α loglog kk Dec. 19, 2006 HiPC'06 6 Random graphs vs. Interaction networks • Random graphs: prob{e exists} ≈ log(n)/n – low clustering coefficient – Gaussian distribution of the degrees • Interaction networks – High clustering coefficient – Heavy tailed distribution of the degrees Dec. 19, 2006 HiPC'06 7 New problematic • Why these networks share these properties? • What model for – Performance analysis of these networks – Algorithm design for these networks • Impact of the measures? • This lecture addresses navigability Dec. 19, 2006 HiPC'06 8 Navigability Milgram Experiment • Source person s (e.g., in Wichita) • Target person t (e.g., in Cambridge) – Name, professional occupation, city of living, etc. • Letter transmitted via a chain of individuals related on a personal basis • Result: “six degrees of separation” Dec.
    [Show full text]
  • The Space and Motion of Communicating Agents
    The space and motion of communicating agents Robin Milner December 1, 2008 ii to my family: Lucy, Barney, Chloe,¨ and in memory of Gabriel iv Contents Prologue vii Part I : Space 1 1 The idea of bigraphs 3 2 Defining bigraphs 15 2.1 Bigraphsandtheirassembly . 15 2.2 Mathematicalframework . 19 2.3 Bigraphicalcategories . 24 3 Algebra for bigraphs 27 3.1 Elementarybigraphsandnormalforms. 27 3.2 Derivedoperations ........................... 31 4 Relative and minimal bounds 37 5 Bigraphical structure 43 5.1 RPOsforbigraphs............................ 43 5.2 IPOsinbigraphs ............................ 48 5.3 AbstractbigraphslackRPOs . 53 6 Sorting 55 6.1 PlacesortingandCCS ......................... 55 6.2 Linksorting,arithmeticnetsandPetrinets . ..... 60 6.3 Theimpactofsorting .......................... 64 Part II : Motion 66 7 Reactions and transitions 67 7.1 Reactivesystems ............................ 68 7.2 Transitionsystems ........................... 71 7.3 Subtransitionsystems .. .... ... .... .... .... .... 76 v vi CONTENTS 7.4 Abstracttransitionsystems . 77 8 Bigraphical reactive systems 81 8.1 DynamicsforaBRS .......................... 82 8.2 DynamicsforaniceBRS.... ... .... .... .... ... .. 87 9 Behaviour in link graphs 93 9.1 Arithmeticnets ............................. 93 9.2 Condition-eventnets .. .... ... .... .... .... ... .. 95 10 Behavioural theory for CCS 103 10.1 SyntaxandreactionsforCCSinbigraphs . 103 10.2 TransitionsforCCSinbigraphs . 107 Part III : Development 113 11 Further topics 115 11.1Tracking................................
    [Show full text]
  • The Origins of Structural Operational Semantics
    The Origins of Structural Operational Semantics Gordon D. Plotkin Laboratory for Foundations of Computer Science, School of Informatics, University of Edinburgh, King’s Buildings, Edinburgh EH9 3JZ, Scotland I am delighted to see my Aarhus notes [59] on SOS, Structural Operational Semantics, published as part of this special issue. The notes already contain some historical remarks, but the reader may be interested to know more of the personal intellectual context in which they arose. I must straightaway admit that at this distance in time I do not claim total accuracy or completeness: what I write should rather be considered as a reconstruction, based on (possibly faulty) memory, papers, old notes and consultations with colleagues. As a postgraduate I learnt the untyped λ-calculus from Rod Burstall. I was further deeply impressed by the work of Peter Landin on the semantics of pro- gramming languages [34–37] which includes his abstract SECD machine. One should also single out John McCarthy’s contributions [45–48], which include his 1962 introduction of abstract syntax, an essential tool, then and since, for all approaches to the semantics of programming languages. The IBM Vienna school [42, 41] were interested in specifying real programming languages, and, in particular, worked on an abstract interpreting machine for PL/I using VDL, their Vienna Definition Language; they were influenced by the ideas of McCarthy, Landin and Elgot [18]. I remember attending a seminar at Edinburgh where the intricacies of their PL/I abstract machine were explained. The states of these machines are tuples of various kinds of complex trees and there is also a stack of environments; the transition rules involve much tree traversal to access syntactical control points, handle jumps, and to manage concurrency.
    [Show full text]
  • Curriculum Vitae Thomas A
    Curriculum Vitae Thomas A. Henzinger February 6, 2021 Address IST Austria (Institute of Science and Technology Austria) Phone: +43 2243 9000 1033 Am Campus 1 Fax: +43 2243 9000 2000 A-3400 Klosterneuburg Email: [email protected] Austria Web: pub.ist.ac.at/~tah Research Mathematical logic, automata and game theory, models of computation. Analysis of reactive, stochastic, real-time, and hybrid systems. Formal software and hardware verification, especially model checking. Design and implementation of concurrent and embedded software. Executable modeling of biological systems. Education September 1991 Ph.D., Computer Science Stanford University July 1987 Dipl.-Ing., Computer Science Kepler University, Linz August 1986 M.S., Computer and Information Sciences University of Delaware Employment September 2009 President IST Austria April 2004 to Adjunct Professor, University of California, June 2011 Electrical Engineering and Computer Sciences Berkeley April 2004 to Professor, EPFL August 2009 Computer and Communication Sciences January 1999 to Director Max-Planck Institute March 2000 for Computer Science, Saarbr¨ucken July 1998 to Professor, University of California, March 2004 Electrical Engineering and Computer Sciences Berkeley July 1997 to Associate Professor, University of California, June 1998 Electrical Engineering and Computer Sciences Berkeley January 1996 to Assistant Professor, University of California, June 1997 Electrical Engineering and Computer Sciences Berkeley January 1992 to Assistant Professor, Cornell University December 1996 Computer Science October 1991 to Postdoctoral Scientist, Universit´eJoseph Fourier, December 1991 IMAG Laboratory Grenoble 1 Honors Member, US National Academy of Sciences, 2020. Member, American Academy of Arts and Sciences, 2020. ESWEEK (Embedded Systems Week) Test-of-Time Award, 2020. LICS (Logic in Computer Science) Test-of-Time Award, 2020.
    [Show full text]
  • Purely Functional Data Structures
    Purely Functional Data Structures Chris Okasaki September 1996 CMU-CS-96-177 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Thesis Committee: Peter Lee, Chair Robert Harper Daniel Sleator Robert Tarjan, Princeton University Copyright c 1996 Chris Okasaki This research was sponsored by the Advanced Research Projects Agency (ARPA) under Contract No. F19628- 95-C-0050. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of ARPA or the U.S. Government. Keywords: functional programming, data structures, lazy evaluation, amortization For Maria Abstract When a C programmer needs an efficient data structure for a particular prob- lem, he or she can often simply look one up in any of a number of good text- books or handbooks. Unfortunately, programmers in functional languages such as Standard ML or Haskell do not have this luxury. Although some data struc- tures designed for imperative languages such as C can be quite easily adapted to a functional setting, most cannot, usually because they depend in crucial ways on as- signments, which are disallowed, or at least discouraged, in functional languages. To address this imbalance, we describe several techniques for designing functional data structures, and numerous original data structures based on these techniques, including multiple variations of lists, queues, double-ended queues, and heaps, many supporting more exotic features such as random access or efficient catena- tion. In addition, we expose the fundamental role of lazy evaluation in amortized functional data structures.
    [Show full text]
  • Insight, Inspiration and Collaboration
    Chapter 1 Insight, inspiration and collaboration C. B. Jones, A. W. Roscoe Abstract Tony Hoare's many contributions to computing science are marked by insight that was grounded in practical programming. Many of his papers have had a profound impact on the evolution of our field; they have moreover provided a source of inspiration to several generations of researchers. We examine the development of his work through a review of the development of some of his most influential pieces of work such as Hoare logic, CSP and Unifying Theories. 1.1 Introduction To many who know Tony Hoare only through his publications, they must often look like polished gems that come from a mind that rarely makes false steps, nor even perhaps has to work at their creation. As so often, this impres- sion is a further compliment to someone who actually adds to very hard work and many discarded attempts the final polish that makes complex ideas rel- atively easy for the reader to comprehend. As indicated on page xi of [HJ89], his ideas typically go through many revisions. The two authors of the current paper each had the honour of Tony Hoare supervising their doctoral studies in Oxford. They know at first hand his kind and generous style and will count it as an achievement if this paper can convey something of the working style of someone big enough to eschew competition and point scoring. Indeed it will be apparent from the following sections how often, having started some new way of thinking or exciting ideas, he happily leaves their exploration and development to others.
    [Show full text]
  • The EATCS Award 2020 Laudatio for Toniann (Toni)Pitassi
    The EATCS Award 2020 Laudatio for Toniann (Toni)Pitassi The EATCS Award 2021 is awarded to Toniann (Toni) Pitassi University of Toronto, as the recipient of the 2021 EATCS Award for her fun- damental and wide-ranging contributions to computational complexity, which in- cludes proving long-standing open problems, introducing new fundamental mod- els, developing novel techniques and establishing new connections between dif- ferent areas. Her work is very broad and has relevance in computational learning and optimisation, verification and SAT-solving, circuit complexity and communi- cation complexity, and their applications. The first notable contribution by Toni Pitassi was to develop lifting theorems: a way to transfer lower bounds from the (much simpler) decision tree model for any function f, to a lower bound, the much harder communication complexity model, for a simply related (2-party) function f’. This has completely transformed our state of knowledge regarding two fundamental computational models, query algorithms (decision trees) and communication complexity, as well as their rela- tionship and applicability to other areas of theoretical computer science. These powerful and flexible techniques resolved numerous open problems (e.g., the su- per quadratic gap between probabilistic and quantum communication complex- ity), many of which were central challenges for decades. Toni Pitassi has also had a remarkable impact in proof complexity. She in- troduced the fundamental algebraic Nullstellensatz and Ideal proof systems, and the geometric Stabbing Planes system. She gave the first nontrivial lower bounds on such long-standing problems as weak pigeon-hole principle and models like constant-depth Frege proof systems. She has developed new proof techniques for virtually all proof systems, and new SAT algorithms.
    [Show full text]
  • A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
    A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay It was my first trip to the US. It had not yet sunk in that I had been chosen by ACM India as one of two Ph.D. students from India to attend the big ACM Turing Centenary Celebration in San Francisco until I saw the familiar face of Stephen Cook enter a room in the hotel a short distance from mine; later, Moshe Vardi recognized me from his trip to IITB during FSTTCS, 2011. I recognized Nitin Saurabh from IMSc Chennai, the other student chosen by ACM-India; 11 ACM SIG©s had sponsored students and there were about 75 from all over the world. Registration started at 8am on 15th June, along with breakfast. Collecting my ©Student Scholar© badge and stuffing in some food, I entered a large hall with several hundred seats, a brightly lit podium with a large screen in the middle flanked by two others. The program began with a video giving a brief biography of Alan Turing from his boyhood to the dynamic young man who was to change the world forever. There were inaugural speeches by John White, CEO of ACM, and Vint Cerf, the 2004 Turing Award winner and incoming ACM President. The MC for the event, Paul Saffo, took over and the panel discussions and speeches commenced. A live Twitter feed made it possible for people in the audience and elsewhere to post questions/comments which were actually taken up in the discussions. Of the many sessions that took place in the next two days, I will describe three that I found most interesting.
    [Show full text]