Jeffrey Walraven

IEEE FOCS 2019

Date: | Category: Conference Tags: IEEE, Computer Science, Conference

Overview

The IEEE Foundations of Computer Science Conference is a yearly gathering of Computer science researchers to present the best of their research. The primary format is a single presenter breaking down or giving an overview of a research paper that they authored or co-authored. This year there was a lot of focus on machine learning, graph theory, auction game theory, algorithm complexity analysis, and quantum computation. I personally found the sections on cryptography the most engaging. As a Software Engineer, my hope was to gain a better understanding of what is occurring in the Computer Science research realm, challenge myself academically, and improve my understanding the Computer Science community.

Key Takeaways

Here are a few personal takeaways from the conference:

Favorite Presentations

Presentation Notes

Distribution-Free Models

Presented by Tim Roughgarden

Overview

This discussed graph models in which analysis could take place on algorithms to find “correctness” as well as performance.

Notes

Part 1

Part 2

BWCA In Algorithmic Game Theory

Presented by Inbal Falgam-Cohen

Overview

Applying practical analysis to game theory - specifically the auction / contract design theories.

Notes

Certified Algorithms

Presented by Yury Makarychev and Konstantin Mkarychev

Overview

Focused on a pattern for defining algorithms in a specific class of performance not defined by worst-case/average case complexity. This was named “Certified”.

Notes

Random Shortest Path Metrics

Presented by Bodo Manthey

Overview

Proposes a method for analyzing shortest path algorithms. Specifically focuses on the case of the traveling Salesman Problem (TSP).

Notes

How to hide a clique?

Presented by Uriel Feige

Notes

Context in Communication

Presented by Madhu Sauan

Overview

Provided insight into the history and new research in the area of unbounded communication. Concluded that we need to provide better context for proofs or they grow exponentially. Context for proofs should be given in the form of axioms. I.e. instead of trying to solve everything in one go, break it into smaller “learnable” pieces.

Program Obfuscation

Presented by Huijia (Rachel) Lin

Overview

Provided insight into recent research + implementations in the area of program obfuscation. There is new light at the end of the tunnel regarding program obfuscation securely and without crypto leaks.

Data Driven Algorithm Design

Presented by Maria-Florina Balcan

Overview

Use algorithmic learning to drive algorithm design.

Notes

Local (Sequential) Computation Algorithms

Presented by Ronitt Rubinfield

Overview

Provided a tutorial on using local computation algorithms for efficient low-knowledge distributed computing.

Notes

How to Use Heuristics for Differential Privacy

By Seth Neel, Aaron Roth, Zhiwei Steven Wu; Presented by Seth Neel

Notes

The Role of Interactivity in Local Differential Privacy

By Matthew Joseph, Jieming Mao, Seth Neel, Aaron Roth; Presented by Matthew Joseph

Overview

Providing privacy for data against ML algorithms.

Notes

Learning from Outcomes: Evidence-Consistent Rankings

By Cynthia Dwork, Michael P Kim, Omer Reingold, Guy N. Rothblum, Gal yona; Presented by Michael P. Kim

Overview

Many ranking algorithms end up with bias do to errors. How do we remove those errors and observer whether the ranking is “correct”?

Notes

Collaborative Learning with Limited Interaction: Tight Bounds for Distributed Exploration in Multi-Armed Bandits

By Chao Tao, Qin Zhang, Yuan Zhou; Presented by Qin Zhang

Overview

To scale machine learning, you must use some sort of collaborative agents that stay in communication. This communication introduces difficulties and needs to be bounded.

Notes

Adversarial Bandits with Knapsacks

By Nicole Immorlica, Karthik Abinav Sankararaman, Robert Schapire, Aleksandrs Slivkins; Presented by Karthik Abinav Sankararaman

Notes

Approximation Schemes for a Buyer with Independent Items via Symmetries

By Pravesh Kothari, Divyarthi Mohan, Ariel Schvartzman, Sahil Singla, S. Matthew Weinberg; Presented by Divyarthi Mohan

Notes

Improved Truthful Mechanisms for Combinatorial Auctions with Submodular Bidders

By Sepehr Assadi, Sahil Singla; Presented by Sahil Singla

Notes

Settling the Communication Complexity of Combinatorial Auctions with Two Subadditive Bidders

By Tomer Ezra, Michal Feldman, Eric Neyman, Inbal Talgam-Cohen, S. Matthew Weinberg; Presented by Eric Neyman

Notes

Reed-Muller codes polarize

By Emmanuel Abbe, Min Ye; Presented by Min Ye

Notes

SETH-hardness of Coding Problems

By Noah Stephens-Davidowitz, Vinod Vaikuntanathan; Presented by Noah Stephens-Davidowitz

Notes

Quasilinear time list-decodable codes for space bounded channels

By Swastik Kopparty, Ronen Shaltiel, Jad Silbak; Presented by Jad Silbak

Notes

An Optimal Document Exchange Protocol

By Bernhard Haeupler; Presented by Bernhard Haeupler

Notes

Radio Network Coding Requires Logarithmic Overhead

By Klim Efremenko, Killat Kol, Raghuvansh R. Saxena; Presented by Raghuvansh R. Saxena

Notes

Lower bounds for maximal matchings and maximal independent sets

By Alkida Balliu, Sebastian Brandt, Juho Hirvonen, Dennis Olivetti, Mikael Rabië, Jukka Suomela; Presented by Sebastian Brandt

Notes

Automating Resolution is NP-Hard*

By Albert Atserias, Moritz Müller; Presented by Albert Atserias

Notes

NEEXP $\subseteq$ MIP*

By Anand Natarajan, John Wright; Presented by Anand Natarajan

Notes

Perfect zero knowledge for quantum multiprover interactive proofs

By Alex B. Grilo, William Slofstra, Henry Yuen; Presented by Alex B. Grilo

Notes

Leakage-Resilient Secret Sharing Against Colluding Parties

By Ashutosh Kumar, Raghu Meka, Amit Sahai; Presnted by Ashutosh Kumar

Notes

Laconic Conditional Disclosure of Secrets and Applications

By Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta; Presented by Giulio Malavolta

Notes

Non-Malleable Commitments using Goldreich-Levin List Decoding

By Vipul Goyal, Silas Richelson; Presented by Sila Richelson

Notes

Fast generalized DFTs for all finite groups

By Chris Umans; Presented by Chris Umans

Notes

Waring Rank, Parameterized and Exact Algorithms

By Kevin Pratt; Presented by Kevin Pratt

Notes

More barriers for rank methods, via a “numeric to symbolic” transfer

By Ankit Garg, Visu Makam, Rafael Oliveira, Avi Wigderson; Presented by Visu Makam

Notes

Towards a theory of non-commutative optimization

By Peter Bürgisser, Cole Franks, Ankit Garg, Rafael Oliveira, Michael Walter, Avi Wigderson; Presented by Cole Franks

Notes

A Quantum Query Complexity Trichotomy for Regular Languages

By Scott Aaronson, Daniel Grier, Luke Scaeffer; Presented by Luke Schaeffer

Notes

Exponential Separation between Quantum Communication and Logarithm of Approximate Rank

By Makrand Sinha, Ronald de Wolf; Presented by Makrand Sinha

Notes

Quantum advantage with noisy shallow circuits in 3D

By Sergy Bravyi, David Gosset, Robert Konig, Marco Tomamichel; Presented by Sergy Bravyi

Notes

Stoquastic PCP vs. Randomness

By Dorit Aharonov, Alex B. Grilo; Presented by Alex B. Grilo

Notes

Computationally-secure and composable remote state preparation

By Alexandru Gheorghiu, Thomas Vidick; Presented by Alexandru Gheorghiu

Notes

Efficient Construction of Rigid Matrices Using an NP Oracle

By Josh Alman, Lijie Chen; Presented by Lijie Chen

Notes

Faster Minimum k-cut of a Simple Graph

By Jason Li; Presented by Jason Li

Notes

Truly Optimal Euclidean Spanners

By Hung Le, Shay Solomon; Presented by Shay Solomon

Notes