default search action
11th ITCS 2020: Seattle, WA, USA
- Thomas Vidick:
11th Innovations in Theoretical Computer Science Conference, ITCS 2020, January 12-14, 2020, Seattle, Washington, USA. LIPIcs 151, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2020, ISBN 978-3-95977-134-4 - Front Matter, Table of Contents, Preface, Conference Organization. 0:1-0:16
- Elazar Goldenberg, Karthik C. S.:
Hardness Amplification of Optimization Problems. 1:1-1:13 - Orr Paradise:
Smooth and Strong PCPs. 2:1-2:41 - Ariel Schvartzman, S. Matthew Weinberg, Eitan Zlatin, Albert Zuo:
Approximately Strategyproof Tournament Rules: On Large Manipulating Sets and Cover-Consistence. 3:1-3:25 - Stacey Jeffery:
Span Programs and Quantum Space Complexity. 4:1-4:37 - Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf:
DEEP-FRI: Sampling Outside the Box Improves Soundness. 5:1-5:32 - Nir Bitansky, Idan Gerichter:
On the Cryptographic Hardness of Local Search. 6:1-6:29 - Klim Efremenko, Elad Haramaty, Yael Tauman Kalai:
Interactive Coding with Constant Round and Communication Blowup. 7:1-7:34 - Xiaohui Bei, Shiteng Chen, Ji Guan, Youming Qiao, Xiaoming Sun:
From Independent Sets and Vertex Colorings to Isotropic Spaces and Isotropic Decompositions: Another Bridge Between Graphs and Alternating Matrix Spaces. 8:1-8:48 - Omri Ben-Eliezer, Eldar Fischer, Amit Levi, Ron D. Rothblum:
Hard Properties with (Very) Short PCPPs and Their Applications. 9:1-9:27 - Austin Conner, Joseph M. Landsberg, Fulvio Gesmundo, Emanuele Ventura:
Kronecker Powers of Tensors and Strassen's Laser Method. 10:1-10:28 - Andrea Lincoln, Nikhil Vyas:
Algorithms and Lower Bounds for Cycles and Walks: Small Space and Sparse Graphs. 11:1-11:17 - Siqi Liu, Sidhanth Mohanty, Elizabeth Yang:
High-Dimensional Expanders from Expanders. 12:1-12:32 - Jeremiah Blocki, Seunghoon Lee, Samson Zhou:
Approximating Cumulative Pebbling Cost Is Unique Games Hard. 13:1-13:27 - Michael Mitzenmacher:
Scheduling with Predictions and the Price of Misprediction. 14:1-14:18 - Kira Goldner, Nicole Immorlica, Brendan Lucier:
Reducing Inefficiency in Carbon Auctions with Imperfect Competition. 15:1-15:21 - Michael P. Kim, Aleksandra Korolova, Guy N. Rothblum, Gal Yona:
Preference-Informed Fairness. 16:1-16:23 - Jin-Yi Cai, Artem Govorov:
On a Theorem of Lovász that hom(⋅, H) Determines the Isomorphism Type of H. 17:1-17:15 - Kousha Etessami, Christos H. Papadimitriou, Aviad Rubinstein, Mihalis Yannakakis:
Tarski's Theorem, Supermodular Games, and the Complexity of Equilibria. 18:1-18:19 - Fedor Part, Iddo Tzameret:
Resolution with Counting: Dag-Like Lower Bounds and Different Moduli. 19:1-19:37 - Ran Raz, Wei Zhan:
The Random-Query Model and the Memory-Bounded Coupon Collector. 20:1-20:11 - Greg Bodwin, Ofer Grossman:
Strategy-Stealing Is Non-Constructive. 21:1-21:12 - Noah Fleming, Yuichi Yoshida:
Distribution-Free Testing of Linear Functions on ℝⁿ. 22:1-22:19 - Yael Hitron, Nancy A. Lynch, Cameron Musco, Merav Parter:
Random Sketching, Clustering, and Short-Term Memory in Spiking Neural Networks. 23:1-23:31 - Georg Loho, László A. Végh:
Signed Tropical Convexity. 24:1-24:35 - András Gilyén, Tongyang Li:
Distributional Property Testing in a Quantum World. 25:1-25:19 - Alessandro Chiesa, Peter Manohar, Igor Shinkar:
On Local Testability in the Non-Signaling Setting. 26:1-26:37 - Amartya Shankha Biswas, Ronitt Rubinfeld, Anak Yodpinyanee:
Local Access to Huge Random Objects Through Partial Sampling. 27:1-27:65 - Ronitt Rubinfeld, Arsen Vasilyan:
Monotone Probability Distributions over the Boolean Cube Can Be Learned with Sublinear Samples. 28:1-28:34 - Gal Sadeh, Edith Cohen, Haim Kaplan:
Sample Complexity Bounds for Influence Maximization. 29:1-29:36 - Nir Bitansky, Nathan Geier:
On Oblivious Amplification of Coin-Tossing Protocols. 30:1-30:13 - Christopher Jung, Katrina Ligett, Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi, Moshe Shenfeld:
A New Analysis of Differential Privacy's Generalization Guarantees. 31:1-31:17 - Domagoj Bradac, Anupam Gupta, Sahil Singla, Goran Zuzic:
Robust Algorithms for the Secretary Problem. 32:1-32:26 - Nathaniel Harms:
Universal Communication, Universal Graphs, and Graph Labeling. 33:1-33:27 - Rahul Ilango:
Approaching MCSP from Above and Below: Hardness for a Conditional Variant and AC^0[p]. 34:1-34:26 - Sivaramakrishnan Natarajan Ramamoorthy, Cyrus Rashtchian:
Equivalence of Systematic Linear Data Structures and Matrix Rigidity. 35:1-35:20 - Mohammad Hassan Ameri, Jeremiah Blocki, Samson Zhou:
Computationally Data-Independent Memory Hard Functions. 36:1-36:28 - Andrej Bogdanov, Baoxiang Wang:
Learning and Testing Variable Partitions. 37:1-37:22 - Suman K. Bera, Noujan Pashanasangi, C. Seshadhri:
Linear Time Subgraph Counting, Graph Degeneracy, and the Chasm at Size Six. 38:1-38:20 - Fedor V. Fomin, Petr A. Golovach, Daniel Lokshtanov, Fahad Panolan, Saket Saurabh, Meirav Zehavi:
Parameterization Above a Multiplicative Guarantee. 39:1-39:13 - Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. 40:1-40:41 - Shuichi Hirahara:
Unexpected Power of Random Strings. 41:1-41:13 - Andrea Clementi, Luciano Gualà, Emanuele Natale, Francesco Pasquale, Giacomo Scornavacca, Luca Trevisan:
Consensus vs Broadcast, with and Without Noise (Extended Abstract). 42:1-42:13 - Lior Gishboliner, Asaf Shapira, Henrique Stagni:
Testing Linear Inequalities of Subgraph Statistics. 43:1-43:9 - Guy Blanc, Jane Lange, Li-Yang Tan:
Top-Down Induction of Decision Trees: Rigorous Guarantees and Inherent Limitations. 44:1-44:44 - Haotian Jiang, Jian Li, Daogao Liu, Sahil Singla:
Algorithms and Adaptivity Gaps for Stochastic k-TSP. 45:1-45:25 - Nils Bertschinger, Martin Hoefer, Daniel Schmand:
Strategic Payments in Financial Networks. 46:1-46:16 - William Lochet, Daniel Lokshtanov, Pranabendu Misra, Saket Saurabh, Roohani Sharma, Meirav Zehavi:
Fault Tolerant Subgraphs with Applications in Kernelization. 47:1-47:22 - Yael Hitron, Merav Parter, Gur Perri:
The Computational Cost of Asynchronous Neural Communication. 48:1-48:47 - Konstantin Makarychev, Yury Makarychev:
Certified Algorithms: Worst-Case Analysis and Beyond. 49:1-49:14 - Ruben Becker, Yuval Emek, Christoph Lenzen:
Low Diameter Graph Decompositions by Approximate Distance Computation. 50:1-50:29 - Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
Generalized List Decoding. 51:1-51:83 - Spyros Angelopoulos, Christoph Dürr, Shendan Jin, Shahin Kamali, Marc P. Renault:
Online Computation with Untrusted Advice. 52:1-52:15 - Andrea Lincoln, Adam Polak, Virginia Vassilevska Williams:
Monochromatic Triangles, Intermediate Matrix Products, and Convolutions. 53:1-53:18 - Nima Anari, Vijay V. Vazirani:
Matching Is as Easy as the Decision Problem, in the NC Model. 54:1-54:25 - Avrim Blum, Thodoris Lykouris:
Advancing Subgroup Fairness via Sleeping Experts. 55:1-55:24 - Tomer Grossman, Ilan Komargodski, Moni Naor:
Instance Complexity and Unlabeled Certificates in the Decision Tree Model. 56:1-56:38 - Alessandro Chiesa, Siqi Liu:
On the Impossibility of Probabilistic Proofs in Relativized Worlds. 57:1-57:30 - Anna Gál, Robert Robere:
Lower Bounds for (Non-Monotone) Comparator Circuits. 58:1-58:13 - Nathan Lindzey, Ansis Rosmanis:
A Tight Lower Bound For Non-Coherent Index Erasure. 59:1-59:37 - Aviad Rubinstein, Jack Z. Wang, S. Matthew Weinberg:
Optimal Single-Choice Prophet Inequalities from Samples. 60:1-60:10 - Linda Cai, Clayton Thomas, S. Matthew Weinberg:
Implementation in Advised Strategies: Welfare Guarantees from Posted-Price Mechanisms When Demand Queries Are NP-Hard. 61:1-61:32 - Erik D. Demaine, Dylan H. Hendrickson, Jayson Lynch:
Toward a General Complexity Theory of Motion Planning: Characterizing Which Gadgets Make Games Hard. 62:1-62:42 - Adam Bouland, Bill Fefferman, Umesh V. Vazirani:
Computational Pseudorandomness, the Wormhole Growth Paradox, and Constraints on the AdS/CFT Duality (Abstract). 63:1-63:2 - Andrei Graur, Tristan Pollner, Vidhya Ramaswamy, S. Matthew Weinberg:
New Query Lower Bounds for Submodular Function Minimization. 64:1-64:16 - Bernhard Haeupler, D. Ellis Hershkowitz, Anson Kahng, Ariel D. Procaccia:
Computation-Aware Data Aggregation. 65:1-65:38 - Francisco Maturana, K. V. Rashmi:
Convertible Codes: New Class of Codes for Efficient Conversion of Coded Data in Distributed Storage. 66:1-66:26 - Federico Echenique, Siddharth Prasad:
Incentive Compatible Active Learning. 67:1-67:20 - Rahul Santhanam:
Pseudorandomness and the Minimum Circuit Size Problem. 68:1-68:26 - Maryam Aliakbarpour, Sandeep Silwal:
Testing Properties of Multiple Distributions with Few Samples. 69:1-69:41 - Lijie Chen, Shuichi Hirahara, Igor C. Oliveira, Ján Pich, Ninad Rajgopal, Rahul Santhanam:
Beyond Natural Proofs: Hardness Magnification and Locality. 70:1-70:48 - Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan:
Separating Two-Round Secure Computation From Oblivious Transfer. 71:1-71:18 - Guillaume Lagarde, Jakob Nordström, Dmitry Sokolov, Joseph Swernofsky:
Trade-Offs Between Size and Degree in Polynomial Calculus. 72:1-72:16 - Shant Boodaghians, Rucha Kulkarni, Ruta Mehta:
Smoothed Efficient Algorithms and Reductions for Network Coordination Games. 73:1-73:15 - Tali Kaufman, David Mass:
Local-To-Global Agreement Expansion via the Variance Method. 74:1-74:14 - T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. 75:1-75:52 - Agelos Georgakopoulos, John Haslegrave, Thomas Sauerwald, John Sylvester:
Choice and Bias in Random Walks. 76:1-76:19 - Manuel Fernandez, David P. Woodruff, Taisuke Yasuda:
Graph Spanners in the Message-Passing Model. 77:1-77:18 - Afonso S. Bandeira, Dmitriy Kunisky, Alexander S. Wein:
Computational Hardness of Certifying Bounds on Constrained PCA Problems. 78:1-78:29 - Shafi Goldwasser, Ofer Grossman, Sidhanth Mohanty, David P. Woodruff:
Pseudo-Deterministic Streaming. 79:1-79:25 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Limits to Non-Malleability. 80:1-80:32 - Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. 81:1-81:27 - James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. 82:1-82:39 - Josh Alman, Virginia Vassilevska Williams:
OV Graphs Are (Probably) Hard Instances. 83:1-83:18 - Parikshit Gopalan, Roie Levin, Udi Wieder:
Finding Skewed Subcubes Under a Distribution. 84:1-84:30 - Arnab Bhattacharyya, L. Sunil Chandran, Suprovat Ghoshal:
Combinatorial Lower Bounds for 3-Query LDCs. 85:1-85:8 - Marshall Ball, Justin Holmgren, Yuval Ishai, Tianren Liu, Tal Malkin:
On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be? 86:1-86:22
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.