CINXE.COM
14th Innovations in Theoretical Computer Science Conference (ITCS 2023)
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta name="google" content="notranslate"> <meta http-equiv="Content-Language" content="en"> <meta name="viewport" content="width=device-width, initial-scale=1" /> <meta name="csrf-token" content="oNSyJ7toFYIyxGu02kh4jN41n17b0gyvEwCONUMP" /> <link rel="canonical" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251" /> <title>14th Innovations in Theoretical Computer Science Conference (ITCS 2023)</title> <link rel="icon" href="https://drops.dagstuhl.de/favicon.ico" /> <link rel="stylesheet" href="https://drops.dagstuhl.de/css/app.css?drops-core-2024-10-22" /> </head> <body> <nav class="navbar main fixed-top navbar-expand-lg navbar-light bg-light"> <div class="container-fluid"> <a class="navbar-brand" href="https://www.dagstuhl.de"> <img class="lzi-logo" src="https://drops.dagstuhl.de/images/LZI-Logo.jpg" width="84" height=62" alt="Schloss Dagstuhl - LZI - Logo" /> </a> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#navbarSupportedContent" aria-controls="navbarSupportedContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="navbarSupportedContent"> <ul class="navbar-nav me-auto mb-2 mb-lg-0"> <li class="nav-item" style="white-space: nowrap"> <a class="nav-link" href="https://drops.dagstuhl.de"> <i class="bi bi-house large-icon"></i> DROPS </a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownSeries" role="button" data-bs-toggle="dropdown" aria-expanded="false"> <i class="bi bi-journals large-icon"></i> Series </a> <ul class="dropdown-menu" aria-labelledby="navbarDropdown"> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/series/LIPIcs"> LIPIcs – Leibniz International Proceedings in Informatics </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/series/OASIcs"> OASIcs – Open Access Series in Informatics </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/series/DFU"> Dagstuhl Follow-Ups </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/series/DagAnnRep"> Schloss Dagstuhl Jahresbericht </a> </li> <li class="dropdown-divider"></li> <li> <a class="dropdown-item" href="/#discontinued-series">Discontinued Series</a> </li> </ul> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownJournals" role="button" data-bs-toggle="dropdown" aria-expanded="false"> <i class="bi bi-journal large-icon"></i> Journals </a> <ul class="dropdown-menu" aria-labelledby="navbarDropdown"> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/journal/DARTS"> DARTS – Dagstuhl Artifacts Series </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/journal/DagRep"> Dagstuhl Reports </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/journal/DagMan"> Dagstuhl Manifestos </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/journal/LITES"> LITES – Leibniz Transactions on Embedded Systems </a> </li> <li><a class="dropdown-item" href="https://drops.dagstuhl.de/entities/journal/TGDK"> TGDK – Transactions on Graph Data and Knowledge </a> </li> </ul> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownConferences" role="button" data-bs-toggle="dropdown" aria-expanded="false"> <i class="bi bi-people large-icon"></i> Conferences </a> <ul class="dropdown-menu conference-dropdown" aria-labelledby="navbarDropdown"> <div class="row"> <div class="col-sm-4 nav-conference-col"> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/AFT"> AFT </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/AIB"> AIB </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/AofA"> AofA </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/APPROX"> APPROX </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ATMOS"> ATMOS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CALCO"> CALCO </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CCC"> CCC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CONCUR"> CONCUR </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/COSIT"> COSIT </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CP"> CP </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CPM"> CPM </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/CSL"> CSL </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/DISC"> DISC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/DITAM"> DITAM </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/DNA"> DNA </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ECOOP"> ECOOP </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ECRTS"> ECRTS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ESA"> ESA </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FAB"> FAB </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FMBC"> FMBC </a> </li> </div> <div class="col-sm-4 nav-conference-col"> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FORC"> FORC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FSCD"> FSCD </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FSTTCS"> FSTTCS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/FUN"> FUN </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/GD"> GD </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/GIScience"> GIScience </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ICALP"> ICALP </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ICDT"> ICDT </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ICPEC"> ICPEC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/IPEC"> IPEC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/iPMVM"> iPMVM </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ISAAC"> ISAAC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ITC"> ITC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ITCS"> ITCS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/ITP"> ITP </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/LDK"> LDK </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/MFCS"> MFCS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/Microservices"> Microservices </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/NG-RES"> NG-RES </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/OPODIS"> OPODIS </a> </li> </div> <div class="col-sm-4 nav-conference-col"> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/PARMA"> PARMA </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/RANDOM"> RANDOM </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SAND"> SAND </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SAT"> SAT </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SEA"> SEA </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SLATE"> SLATE </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SNAPL"> SNAPL </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SoCG"> SoCG </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/STACS"> STACS </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/SWAT"> SWAT </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/TIME"> TIME </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/Tokenomics"> Tokenomics </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/TQC"> TQC </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/TYPES"> TYPES </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/WABI"> WABI </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/conference/WCET"> WCET </a> </li> </div> </div> </ul> </li> <li class="nav-item"> <a class="nav-link" href="https://drops.dagstuhl.de/docs/about" id="navbarAbout"> <i class="bi bi-info-circle large-icon"></i><span class="nav-text-about-drops"> About DROPS</span> </a> </li> </ul> <form class="navbar-search d-flex" action="https://drops.dagstuhl.de/search" method="post"> <input type="hidden" name="_token" value="oNSyJ7toFYIyxGu02kh4jN41n17b0gyvEwCONUMP" autocomplete="off"> <div class="input-group"> <input class="form-control" type="search" placeholder="Search" aria-label="Search" name="term" autocomplete="off" maxlength="600"> <button class="btn btn-outline-success" type="submit"> <i class="bi bi-search" style="color: #000"></i> </button> </div> </form> <ul class="navbar-nav nav-metadata"> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" id="navbarDropdownMetadata" role="button" data-bs-toggle="dropdown" aria-expanded="false"> <i class="bi bi-database-down large-icon"></i><span class="nav-text-metadata">Metadata Export</span> </a> <ul class="dropdown-menu dropdown-metadata" aria-labelledby="navbarDropdownMetadata"> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/metadata">Metadata Export</a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/oai?verb=Identify" target="_blank">OAI Interface</a> </li> </ul> </li> </ul> </div> </div> </nav> <div id="app" data-release="drops-core-2024-10-22" class="container "> <div id="_top-of-page"></div> <div class="fixed-search-button"><i class="bi bi-search"></i></div> <div class="volume-portal"> <br> <div class="entity-type volume"> <div> <span class="entity-type-name"> <i class="bi bi-book-half"></i> Volume </span> <span class="sharing-section"> <span class="sharing-buttons"> <span class="dropdown"> <a class="btn sharing-btn metadata dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"><i class="bi bi-download"></i></a> <ul class="dropdown-menu dropdown-menu-end"> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/xml"> Export XML </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/acm-xml"> Export ACM-XML </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/doaj-xml"> Export DOAJ-XML </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/schema-org"> Export Schema.org </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/bibtex"> Export BibTeX </a> </li> <li> <a class="dropdown-item" href="https://drops.dagstuhl.de/entities/volume/LIPIcs-volume-251/metadata/html"> Export HTML </a> </li> </ul> </span> </span> </span> </div> </div> <hr> <div> <h4>LIPIcs, Volume 251</h4> <h1>14th Innovations in Theoretical Computer Science Conference (ITCS 2023)</h1> </div> <section class="volume-issue-header mb-4"> <hr/> <section class="is-part-of"> <ul> <li> <span>Part of:</span> <span style="white-space: nowrap"> <i class="bi bi-journals"></i> Series: </span> <a href="https://drops.dagstuhl.de/entities/series/LIPIcs">Leibniz International Proceedings in Informatics (LIPIcs)</a> <br> <span style="visibility: hidden">Part of:</span> <span style="white-space: nowrap"> <i class="bi bi-people"></i> Conference: </span> <a href="https://drops.dagstuhl.de/entities/conference/ITCS">Innovations in Theoretical Computer Science Conference (ITCS)</a> </li> </ul> </section> <hr/> <div class="mt-5 row"> <div class="col-lg-3 mb-3"> <section class="thumbnail"> <img src="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/thumbnails/LIPIcs.ITCS.2023/LIPIcs.ITCS.2023.png" alt="Thumbnail PDF" /> </section> </div> <div class="col-lg-6"> <section class="mb-5"> <h4>Event</h4> <a href="http://itcs-conf.org/itcs23/itcs23-cfp.html"> ITCS 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, USA </a> </section> <section class="editors mb-5"> <h4>Editor</h4> <div class="author person-details"> <div> <span class="name"><b>Yael Tauman Kalai</b></span> <a href="mailto:yaelism@gmail.com"><i class="bi bi-envelope"></i></a> <a href="https://drops.dagstuhl.de/search/documents?author=Tauman Kalai, Yael"><small><i class="bi bi-search"></i></small></a> </div> <ul> <li class="affiliation">Microsoft Research New England, Cambridge, USA</li> </ul> </div> </section> </div> <div class="col-lg-3"> <section class="mb-5"> <h4>Publication Details</h4> <ul> <li>published at: 2023-02-01</li> <li>Publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik</li> <li>ISBN: 978-3-95977-263-1</li> <li>DBLP: <a href="https://dblp.org/db/conf/innovations/innovations2023"> db/conf/innovations/innovations2023 </a> </li> </ul> </section> <br> <section> <h4>Access Numbers</h4> <ul> <li> <a href="#" class="btn-statistics" data-entity="volume/LIPIcs-volume-251" data-title="14th Innovations in Theoretical Computer Science Conference (ITCS 2023)"> <i class="bi bi-graph-up"></i> Detailed Access Statistics available here </a> </li> <li> Total Document Accesses (updated on a weekly basis): <div class="stats-total"> <div class="stats total-downloads"> <div class="circle"> <div class="number" data-number="0">0</div> </div> <div class="label">PDF Downloads</div> </div> <div class="stats total-metadata-views"> <div class="circle"> <div class="number" data-number="0">0</div> </div> <div class="label">Metadata Views</div> </div> </div> <!-- must be externally available for the series/journal case --> </li> </ul> </section> </div> </div> <div id="end-of-header"></div> </section> <div class="row mt-2"> <div class="col-sm-9 mt-2"> <h2>Documents <span class="btn badge color-dark _filter-info"></span></h2> <div class="documents"> <div class="no-results alert alert-danger -hidden"> No documents found matching your filter selection. </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="category">Complete Volume</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023">DOI: 10.4230/LIPIcs.ITCS.2023</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023/LIPIcs.ITCS.2023.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17483" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17483" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023" data-bs-toggle="tooltip" data-title="LIPIcs, Volume 251, ITCS 2023, Complete Volume" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Tauman Kalai, Yael"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023"> LIPIcs, Volume 251, ITCS 2023, Complete Volume </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yael Tauman Kalai </p> <div class="row"> <div class="collapse" id="abstract-17483"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17483">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> LIPIcs, Volume 251, ITCS 2023, Complete Volume </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17483"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17483">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 1-2102, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17483-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@Proceedings{taumankalai:LIPIcs.ITCS.2023, title = {{LIPIcs, Volume 251, ITCS 2023, Complete Volume}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {1--2102}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023}, URN = {urn:nbn:de:0030-drops-175027}, doi = {10.4230/LIPIcs.ITCS.2023}, annote = {Keywords: LIPIcs, Volume 251, ITCS 2023, Complete Volume} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17483-input">@Proceedings{taumankalai:LIPIcs.ITCS.2023, title = {{LIPIcs, Volume 251, ITCS 2023, Complete Volume}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {1--2102}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023}, URN = {urn:nbn:de:0030-drops-175027}, doi = {10.4230/LIPIcs.ITCS.2023}, annote = {Keywords: LIPIcs, Volume 251, ITCS 2023, Complete Volume} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.0"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="category">Front Matter</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.0">DOI: 10.4230/LIPIcs.ITCS.2023.0</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.0/LIPIcs.ITCS.2023.0.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.0" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17484" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17484" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.0" data-bs-toggle="tooltip" data-title="Front Matter, Table of Contents, Preface, Conference Organization" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Tauman Kalai, Yael"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.0"> Front Matter, Table of Contents, Preface, Conference Organization </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yael Tauman Kalai </p> <div class="row"> <div class="collapse" id="abstract-17484"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17484">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Front Matter, Table of Contents, Preface, Conference Organization </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17484"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17484">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 0:i-0:xxii, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17484-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{taumankalai:LIPIcs.ITCS.2023.0, author = {Tauman Kalai, Yael}, title = {{Front Matter, Table of Contents, Preface, Conference Organization}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {0:i--0:xxii}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.0}, URN = {urn:nbn:de:0030-drops-175039}, doi = {10.4230/LIPIcs.ITCS.2023.0}, annote = {Keywords: Front Matter, Table of Contents, Preface, Conference Organization} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17484-input">@InProceedings{taumankalai:LIPIcs.ITCS.2023.0, author = {Tauman Kalai, Yael}, title = {{Front Matter, Table of Contents, Preface, Conference Organization}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {0:i--0:xxii}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.0}, URN = {urn:nbn:de:0030-drops-175039}, doi = {10.4230/LIPIcs.ITCS.2023.0}, annote = {Keywords: Front Matter, Table of Contents, Preface, Conference Organization} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.1"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.1">DOI: 10.4230/LIPIcs.ITCS.2023.1</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.1/LIPIcs.ITCS.2023.1.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.1" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17485" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17485" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.1" data-bs-toggle="tooltip" data-title="Worst-Case to Expander-Case Reductions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Abboud, Amir"></span> <span data-key="dagstuhl.contributor.author" data-value="Wallheimer, Nathan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.1"> Worst-Case to Expander-Case Reductions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Amir Abboud and Nathan Wallheimer </p> <div class="row"> <div class="collapse" id="abstract-17485"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17485">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In recent years, the expander decomposition method was used to develop many graph algorithms, resulting in major improvements to longstanding complexity barriers. This powerful hammer has led the community to (1) believe that most problems are as easy on worst-case graphs as they are on expanders, and (2) suspect that expander decompositions are the key to breaking the remaining longstanding barriers in fine-grained complexity. We set out to investigate the extent to which these two things are true (and for which problems). Towards this end, we put forth the concept of worst-case to expander-case self-reductions. We design a collection of such reductions for fundamental graph problems, verifying belief (1) for them. The list includes k-Clique, 4-Cycle, Maximum Cardinality Matching, Vertex-Cover, and Minimum Dominating Set. Interestingly, for most (but not all) of these problems the proof is via a simple gadget reduction, not via expander decompositions, showing that this hammer is effectively useless against the problem and contradicting (2). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17485"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17485">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Amir Abboud and Nathan Wallheimer. Worst-Case to Expander-Case Reductions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 1:1-1:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17485-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{abboud_et_al:LIPIcs.ITCS.2023.1, author = {Abboud, Amir and Wallheimer, Nathan}, title = {{Worst-Case to Expander-Case Reductions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {1:1--1:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.1}, URN = {urn:nbn:de:0030-drops-175044}, doi = {10.4230/LIPIcs.ITCS.2023.1}, annote = {Keywords: Fine-Grained Complexity, Expander Decomposition, Reductions, Exact and Parameterized Complexity, Expander Graphs, Triangle, Maximum Matching, Clique, 4-Cycle, Vertex Cover, Dominating Set} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17485-input">@InProceedings{abboud_et_al:LIPIcs.ITCS.2023.1, author = {Abboud, Amir and Wallheimer, Nathan}, title = {{Worst-Case to Expander-Case Reductions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {1:1--1:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.1}, URN = {urn:nbn:de:0030-drops-175044}, doi = {10.4230/LIPIcs.ITCS.2023.1}, annote = {Keywords: Fine-Grained Complexity, Expander Decomposition, Reductions, Exact and Parameterized Complexity, Expander Graphs, Triangle, Maximum Matching, Clique, 4-Cycle, Vertex Cover, Dominating Set} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.2"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.2">DOI: 10.4230/LIPIcs.ITCS.2023.2</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.2/LIPIcs.ITCS.2023.2.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.2" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17486" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17486" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.2" data-bs-toggle="tooltip" data-title="Matroid Partition Property and the Secretary Problem" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Abdolazimi, Dorna"></span> <span data-key="dagstuhl.contributor.author" data-value="Karlin, Anna R."></span> <span data-key="dagstuhl.contributor.author" data-value="Klein, Nathan"></span> <span data-key="dagstuhl.contributor.author" data-value="Oveis Gharan, Shayan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.2"> Matroid Partition Property and the Secretary Problem </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Dorna Abdolazimi, Anna R. Karlin, Nathan Klein, and Shayan Oveis Gharan </p> <div class="row"> <div class="collapse" id="abstract-17486"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17486">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A matroid M on a set E of elements has the α-partition property, for some α > 0, if it is possible to (randomly) construct a partition matroid 𝒫 on (a subset of) elements of M such that every independent set of 𝒫 is independent in M and for any weight function w:E → ℝ_{≥0}, the expected value of the optimum of the matroid secretary problem on 𝒫 is at least an α-fraction of the optimum on M. We show that the complete binary matroid, B_d on 𝔽₂^d does not satisfy the α-partition property for any constant α > 0 (independent of d). Furthermore, we refute a recent conjecture of [Kristóf Bérczi et al., 2021] by showing the same matroid is 2^d/d-colorable but cannot be reduced to an α 2^d/d-colorable partition matroid for any α that is sublinear in d. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17486"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17486">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Dorna Abdolazimi, Anna R. Karlin, Nathan Klein, and Shayan Oveis Gharan. Matroid Partition Property and the Secretary Problem. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 2:1-2:9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17486-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{abdolazimi_et_al:LIPIcs.ITCS.2023.2, author = {Abdolazimi, Dorna and Karlin, Anna R. and Klein, Nathan and Oveis Gharan, Shayan}, title = {{Matroid Partition Property and the Secretary Problem}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {2:1--2:9}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.2}, URN = {urn:nbn:de:0030-drops-175051}, doi = {10.4230/LIPIcs.ITCS.2023.2}, annote = {Keywords: Online algorithms, Matroids, Matroid secretary problem} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17486-input">@InProceedings{abdolazimi_et_al:LIPIcs.ITCS.2023.2, author = {Abdolazimi, Dorna and Karlin, Anna R. and Klein, Nathan and Oveis Gharan, Shayan}, title = {{Matroid Partition Property and the Secretary Problem}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {2:1--2:9}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.2}, URN = {urn:nbn:de:0030-drops-175051}, doi = {10.4230/LIPIcs.ITCS.2023.2}, annote = {Keywords: Online algorithms, Matroids, Matroid secretary problem} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.3"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.3">DOI: 10.4230/LIPIcs.ITCS.2023.3</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.3/LIPIcs.ITCS.2023.3.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.3" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17487" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17487" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.3" data-bs-toggle="tooltip" data-title="Kolmogorov Complexity Characterizes Statistical Zero Knowledge" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Allender, Eric"></span> <span data-key="dagstuhl.contributor.author" data-value="Hirahara, Shuichi"></span> <span data-key="dagstuhl.contributor.author" data-value="Tirumala, Harsha"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.3"> Kolmogorov Complexity Characterizes Statistical Zero Knowledge </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Eric Allender, Shuichi Hirahara, and Harsha Tirumala </p> <div class="row"> <div class="collapse" id="abstract-17487"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17487">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We show that a decidable promise problem has a non-interactive statistical zero-knowledge proof system if and only if it is randomly reducible via an honest polynomial-time reduction to a promise problem for Kolmogorov-random strings, with a superlogarithmic additive approximation term. This extends recent work by Saks and Santhanam (CCC 2022). We build on this to give new characterizations of Statistical Zero Knowledge SZK, as well as the related classes NISZK_L and SZK_L. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17487"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17487">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Eric Allender, Shuichi Hirahara, and Harsha Tirumala. Kolmogorov Complexity Characterizes Statistical Zero Knowledge. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 3:1-3:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17487-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{allender_et_al:LIPIcs.ITCS.2023.3, author = {Allender, Eric and Hirahara, Shuichi and Tirumala, Harsha}, title = {{Kolmogorov Complexity Characterizes Statistical Zero Knowledge}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {3:1--3:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.3}, URN = {urn:nbn:de:0030-drops-175063}, doi = {10.4230/LIPIcs.ITCS.2023.3}, annote = {Keywords: Kolmogorov Complexity, Interactive Proofs} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17487-input">@InProceedings{allender_et_al:LIPIcs.ITCS.2023.3, author = {Allender, Eric and Hirahara, Shuichi and Tirumala, Harsha}, title = {{Kolmogorov Complexity Characterizes Statistical Zero Knowledge}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {3:1--3:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.3}, URN = {urn:nbn:de:0030-drops-175063}, doi = {10.4230/LIPIcs.ITCS.2023.3}, annote = {Keywords: Kolmogorov Complexity, Interactive Proofs} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.4"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.4">DOI: 10.4230/LIPIcs.ITCS.2023.4</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.4/LIPIcs.ITCS.2023.4.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.4" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17488" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17488" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.4" data-bs-toggle="tooltip" data-title="Communication Complexity of Inner Product in Symmetric Normed Spaces" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Andoni, Alexandr"></span> <span data-key="dagstuhl.contributor.author" data-value="Błasiok, Jarosław"></span> <span data-key="dagstuhl.contributor.author" data-value="Filtser, Arnold"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.4"> Communication Complexity of Inner Product in Symmetric Normed Spaces </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Alexandr Andoni, Jarosław Błasiok, and Arnold Filtser </p> <div class="row"> <div class="collapse" id="abstract-17488"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17488">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We introduce and study the communication complexity of computing the inner product of two vectors, where the input is restricted w.r.t. a norm N on the space ℝⁿ. Here, Alice and Bob hold two vectors v,u such that ‖v‖_N ≤ 1 and ‖u‖_{N^*} ≤ 1, where N^* is the dual norm. The goal is to compute their inner product ⟨v,u⟩ up to an ε additive term. The problem is denoted by IP_N, and generalizes important previously studied problems, such as: (1) Computing the expectation 𝔼_{x∼𝒟}[f(x)] when Alice holds 𝒟 and Bob holds f is equivalent to IP_{𝓁₁}. (2) Computing v^TAv where Alice has a symmetric matrix with bounded operator norm (denoted S_∞) and Bob has a vector v where ‖v‖₂ = 1. This problem is complete for quantum communication complexity and is equivalent to IP_{S_∞}. We systematically study IP_N, showing the following results, near tight in most cases: 1) For any symmetric norm N, given ‖v‖_N ≤ 1 and ‖u‖_{N^*} ≤ 1 there is a randomized protocol using 𝒪̃(ε^{-6} log n) bits of communication that returns a value in ⟨u,v⟩±ε with probability 2/3 - we will denote this by ℛ_{ε,1/3}(IP_N) ≤ 𝒪̃(ε^{-6} log n). In a special case where N = 𝓁_p and N^* = 𝓁_q for p^{-1} + q^{-1} = 1, we obtain an improved bound ℛ_{ε,1/3}(IP_{𝓁_p}) ≤ 𝒪(ε^{-2} log n), nearly matching the lower bound ℛ_{ε, 1/3}(IP_{𝓁_p}) ≥ Ω(min(n, ε^{-2})). 2) One way communication complexity ℛ^{→}_{ε,δ}(IP_{𝓁_p}) ≤ 𝒪(ε^{-max(2,p)}⋅ log n/ε), and a nearly matching lower bound ℛ^{→}_{ε, 1/3}(IP_{𝓁_p}) ≥ Ω(ε^{-max(2,p)}) for ε^{-max(2,p)} ≪ n. 3) One way communication complexity ℛ^{→}_{ε,δ}(N) for a symmetric norm N is governed by the distortion of the embedding 𝓁_∞^k into N. Specifically, while a small distortion embedding easily implies a lower bound Ω(k), we show that, conversely, non-existence of such an embedding implies protocol with communication k^𝒪(log log k) log² n. 4) For arbitrary origin symmetric convex polytope P, we show ℛ_{ε,1/3}(IP_{N}) ≤ 𝒪(ε^{-2} log xc(P)), where N is the unique norm for which P is a unit ball, and xc(P) is the extension complexity of P (i.e. the smallest number of inequalities describing some polytope P' s.t. P is projection of P'). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17488"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17488">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Alexandr Andoni, Jarosław Błasiok, and Arnold Filtser. Communication Complexity of Inner Product in Symmetric Normed Spaces. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 4:1-4:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17488-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{andoni_et_al:LIPIcs.ITCS.2023.4, author = {Andoni, Alexandr and B{\l}asiok, Jaros{\l}aw and Filtser, Arnold}, title = {{Communication Complexity of Inner Product in Symmetric Normed Spaces}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {4:1--4:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.4}, URN = {urn:nbn:de:0030-drops-175077}, doi = {10.4230/LIPIcs.ITCS.2023.4}, annote = {Keywords: communication complexity, symmetric norms} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17488-input">@InProceedings{andoni_et_al:LIPIcs.ITCS.2023.4, author = {Andoni, Alexandr and B{\l}asiok, Jaros{\l}aw and Filtser, Arnold}, title = {{Communication Complexity of Inner Product in Symmetric Normed Spaces}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {4:1--4:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.4}, URN = {urn:nbn:de:0030-drops-175077}, doi = {10.4230/LIPIcs.ITCS.2023.4}, annote = {Keywords: communication complexity, symmetric norms} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.5"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.5">DOI: 10.4230/LIPIcs.ITCS.2023.5</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.5/LIPIcs.ITCS.2023.5.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.5" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17489" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17489" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.5" data-bs-toggle="tooltip" data-title="Concentration Bounds for Quantum States and Limitations on the QAOA from Polynomial Approximations" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Anshu, Anurag"></span> <span data-key="dagstuhl.contributor.author" data-value="Metger, Tony"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Approximation algorithms analysis"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.5"> Concentration Bounds for Quantum States and Limitations on the QAOA from Polynomial Approximations </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Anurag Anshu and Tony Metger </p> <div class="row"> <div class="collapse" id="abstract-17489"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17489">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We prove concentration bounds for the following classes of quantum states: (i) output states of shallow quantum circuits, answering an open question from [De Palma et al., 2022]; (ii) injective matrix product states; (iii) output states of dense Hamiltonian evolution, i.e. states of the form e^{ιH^{(p)}} ⋯ e^{ιH^{(1)}} |ψ₀⟩ for any n-qubit product state |ψ₀⟩, where each H^{(i)} can be any local commuting Hamiltonian satisfying a norm constraint, including dense Hamiltonians with interactions between any qubits. Our proofs use polynomial approximations to show that these states are close to local operators. This implies that the distribution of the Hamming weight of a computational basis measurement (and of other related observables) concentrates. An example of (iii) are the states produced by the quantum approximate optimisation algorithm (QAOA). Using our concentration results for these states, we show that for a random spin model, the QAOA can only succeed with negligible probability even at super-constant level p = o(log log n), assuming a strengthened version of the so-called overlap gap property. This gives the first limitations on the QAOA on dense instances at super-constant level, improving upon the recent result [Basso et al., 2022]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17489"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17489">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Anurag Anshu and Tony Metger. Concentration Bounds for Quantum States and Limitations on the QAOA from Polynomial Approximations. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 5:1-5:8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17489-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{anshu_et_al:LIPIcs.ITCS.2023.5, author = {Anshu, Anurag and Metger, Tony}, title = {{Concentration Bounds for Quantum States and Limitations on the QAOA from Polynomial Approximations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {5:1--5:8}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.5}, URN = {urn:nbn:de:0030-drops-175085}, doi = {10.4230/LIPIcs.ITCS.2023.5}, annote = {Keywords: quantum computing, polynomial approximation, quantum optimization algorithm, QAOA, overlap gap property} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17489-input">@InProceedings{anshu_et_al:LIPIcs.ITCS.2023.5, author = {Anshu, Anurag and Metger, Tony}, title = {{Concentration Bounds for Quantum States and Limitations on the QAOA from Polynomial Approximations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {5:1--5:8}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.5}, URN = {urn:nbn:de:0030-drops-175085}, doi = {10.4230/LIPIcs.ITCS.2023.5}, annote = {Keywords: quantum computing, polynomial approximation, quantum optimization algorithm, QAOA, overlap gap property} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.6"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.6">DOI: 10.4230/LIPIcs.ITCS.2023.6</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.6/LIPIcs.ITCS.2023.6.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.6" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17490" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17490" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.6" data-bs-toggle="tooltip" data-title="On Identity Testing and Noncommutative Rank Computation over the Free Skew Field" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Arvind, V."></span> <span data-key="dagstuhl.contributor.author" data-value="Chatterjee, Abhranil"></span> <span data-key="dagstuhl.contributor.author" data-value="Ghosal, Utsab"></span> <span data-key="dagstuhl.contributor.author" data-value="Mukhopadhyay, Partha"></span> <span data-key="dagstuhl.contributor.author" data-value="Ramya, C."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algebraic complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.6"> On Identity Testing and Noncommutative Rank Computation over the Free Skew Field </a> </h5> <p class="card-text small authors"> <b>Authors:</b> V. Arvind, Abhranil Chatterjee, Utsab Ghosal, Partha Mukhopadhyay, and C. Ramya </p> <div class="row"> <div class="collapse" id="abstract-17490"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17490">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> The identity testing of rational formulas (RIT) in the free skew field efficiently reduces to computing the rank of a matrix whose entries are linear polynomials in noncommuting variables [Hrubeš and Wigderson, 2015]. This rank computation problem has deterministic polynomial-time white-box algorithms [Ankit Garg et al., 2016; Ivanyos et al., 2018] and a randomized polynomial-time algorithm in the black-box setting [Harm Derksen and Visu Makam, 2017]. In this paper, we propose a new approach for efficient derandomization of black-box RIT. Additionally, we obtain results for matrix rank computation over the free skew field and construct efficient linear pencil representations for a new class of rational expressions. More precisely, we show: - Under the hardness assumption that the ABP (algebraic branching program) complexity of every polynomial identity for the k×k matrix algebra is 2^Ω(k) [Andrej Bogdanov and Hoeteck Wee, 2005], we obtain a subexponential-time black-box RIT algorithm for rational formulas of inversion height almost logarithmic in the size of the formula. This can be seen as the first "hardness implies derandomization" type theorem for rational formulas. - We show that the noncommutative rank of any matrix over the free skew field whose entries have small linear pencil representations can be computed in deterministic polynomial time. While an efficient rank computation was known for matrices with noncommutative formulas as entries [Ankit Garg et al., 2020], we obtain the first deterministic polynomial-time algorithms for rank computation of matrices whose entries are noncommutative ABPs or rational formulas. - Motivated by the definition given by Bergman [George M Bergman, 1976], we define a new class of rational functions where a rational function of inversion height at most h is defined as a composition of a noncommutative r-skewed circuit (equivalently an ABP) with inverses of rational functions of this class of inversion height at most h-1 which are also disjoint. We obtain a polynomial-size linear pencil representation for this class which gives a white-box deterministic polynomial-time identity testing algorithm for the class. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17490"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17490">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">V. Arvind, Abhranil Chatterjee, Utsab Ghosal, Partha Mukhopadhyay, and C. Ramya. On Identity Testing and Noncommutative Rank Computation over the Free Skew Field. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 6:1-6:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17490-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{arvind_et_al:LIPIcs.ITCS.2023.6, author = {Arvind, V. and Chatterjee, Abhranil and Ghosal, Utsab and Mukhopadhyay, Partha and Ramya, C.}, title = {{On Identity Testing and Noncommutative Rank Computation over the Free Skew Field}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {6:1--6:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.6}, URN = {urn:nbn:de:0030-drops-175093}, doi = {10.4230/LIPIcs.ITCS.2023.6}, annote = {Keywords: Algebraic Complexity, Identity Testing, Non-commutative rank} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17490-input">@InProceedings{arvind_et_al:LIPIcs.ITCS.2023.6, author = {Arvind, V. and Chatterjee, Abhranil and Ghosal, Utsab and Mukhopadhyay, Partha and Ramya, C.}, title = {{On Identity Testing and Noncommutative Rank Computation over the Free Skew Field}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {6:1--6:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.6}, URN = {urn:nbn:de:0030-drops-175093}, doi = {10.4230/LIPIcs.ITCS.2023.6}, annote = {Keywords: Algebraic Complexity, Identity Testing, Non-commutative rank} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.7"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.7">DOI: 10.4230/LIPIcs.ITCS.2023.7</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.7/LIPIcs.ITCS.2023.7.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.7" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17491" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17491" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.7" data-bs-toggle="tooltip" data-title="All-Norm Load Balancing in Graph Streams via the Multiplicative Weights Update Method" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Assadi, Sepehr"></span> <span data-key="dagstuhl.contributor.author" data-value="Bernstein, Aaron"></span> <span data-key="dagstuhl.contributor.author" data-value="Langley, Zachary"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.7"> All-Norm Load Balancing in Graph Streams via the Multiplicative Weights Update Method </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Sepehr Assadi, Aaron Bernstein, and Zachary Langley </p> <div class="row"> <div class="collapse" id="abstract-17491"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17491">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In the weighted load balancing problem, the input is an n-vertex bipartite graph between a set of clients and a set of servers, and each client comes with some nonnegative real weight. The output is an assignment that maps each client to one of its adjacent servers, and the load of a server is then the sum of the weights of the clients assigned to it. The goal is to find an assignment that is well-balanced, typically captured by (approximately) minimizing either the 𝓁_∞- or 𝓁₂-norm of the server loads. Generalizing both of these objectives, the all-norm load balancing problem asks for an assignment that approximately minimizes all 𝓁_p-norm objectives for p ≥ 1, including p = ∞, simultaneously. Our main result is a deterministic O(log n)-pass O(1)-approximation semi-streaming algorithm for the all-norm load balancing problem. Prior to our work, only an O(log n)-pass O(log n)-approximation algorithm for the 𝓁_∞-norm objective was known in the semi-streaming setting. Our algorithm uses a novel application of the multiplicative weights update method to a mixed covering/packing convex program for the all-norm load balancing problem involving an infinite number of constraints. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17491"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17491">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Sepehr Assadi, Aaron Bernstein, and Zachary Langley. All-Norm Load Balancing in Graph Streams via the Multiplicative Weights Update Method. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 7:1-7:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17491-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{assadi_et_al:LIPIcs.ITCS.2023.7, author = {Assadi, Sepehr and Bernstein, Aaron and Langley, Zachary}, title = {{All-Norm Load Balancing in Graph Streams via the Multiplicative Weights Update Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {7:1--7:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.7}, URN = {urn:nbn:de:0030-drops-175106}, doi = {10.4230/LIPIcs.ITCS.2023.7}, annote = {Keywords: Load Balancing, Semi-Streaming Algorithms, Semi-Matching} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17491-input">@InProceedings{assadi_et_al:LIPIcs.ITCS.2023.7, author = {Assadi, Sepehr and Bernstein, Aaron and Langley, Zachary}, title = {{All-Norm Load Balancing in Graph Streams via the Multiplicative Weights Update Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {7:1--7:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.7}, URN = {urn:nbn:de:0030-drops-175106}, doi = {10.4230/LIPIcs.ITCS.2023.7}, annote = {Keywords: Load Balancing, Semi-Streaming Algorithms, Semi-Matching} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.8"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.8">DOI: 10.4230/LIPIcs.ITCS.2023.8</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.8/LIPIcs.ITCS.2023.8.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.8" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17492" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17492" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.8" data-bs-toggle="tooltip" data-title="A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Attias, Idan"></span> <span data-key="dagstuhl.contributor.author" data-value="Cohen, Edith"></span> <span data-key="dagstuhl.contributor.author" data-value="Shechner, Moshe"></span> <span data-key="dagstuhl.contributor.author" data-value="Stemmer, Uri"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.8"> A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Idan Attias, Edith Cohen, Moshe Shechner, and Uri Stemmer </p> <div class="row"> <div class="collapse" id="abstract-17492"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17492">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing robust streaming algorithms that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. [NeurIPS 2020] and by Woodruff and Zhou [FOCS 2021]. These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the "best of both worlds", thereby solving a question left open by Woodruff and Zhou. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17492"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17492">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Idan Attias, Edith Cohen, Moshe Shechner, and Uri Stemmer. A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 8:1-8:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17492-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{attias_et_al:LIPIcs.ITCS.2023.8, author = {Attias, Idan and Cohen, Edith and Shechner, Moshe and Stemmer, Uri}, title = {{A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {8:1--8:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.8}, URN = {urn:nbn:de:0030-drops-175115}, doi = {10.4230/LIPIcs.ITCS.2023.8}, annote = {Keywords: Streaming, adversarial robustness, differential privacy} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17492-input">@InProceedings{attias_et_al:LIPIcs.ITCS.2023.8, author = {Attias, Idan and Cohen, Edith and Shechner, Moshe and Stemmer, Uri}, title = {{A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {8:1--8:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.8}, URN = {urn:nbn:de:0030-drops-175115}, doi = {10.4230/LIPIcs.ITCS.2023.8}, annote = {Keywords: Streaming, adversarial robustness, differential privacy} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.9"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.9">DOI: 10.4230/LIPIcs.ITCS.2023.9</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.9/LIPIcs.ITCS.2023.9.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.9" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17493" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17493" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.9" data-bs-toggle="tooltip" data-title="Making Auctions Robust to Aftermarkets" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Babaioff, Moshe"></span> <span data-key="dagstuhl.contributor.author" data-value="Immorlica, Nicole"></span> <span data-key="dagstuhl.contributor.author" data-value="Li, Yingkai"></span> <span data-key="dagstuhl.contributor.author" data-value="Lucier, Brendan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic mechanism design"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational pricing and auctions"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.9"> Making Auctions Robust to Aftermarkets </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Moshe Babaioff, Nicole Immorlica, Yingkai Li, and Brendan Lucier </p> <div class="row"> <div class="collapse" id="abstract-17493"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17493">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A prevalent assumption in auction theory is that the auctioneer has full control over the market and that the allocation she dictates is final. In practice, however, agents might be able to resell acquired items in an aftermarket. A prominent example is the market for carbon emission allowances. These allowances are commonly allocated by the government using uniform-price auctions, and firms can typically trade these allowances among themselves in an aftermarket that may not be fully under the auctioneer’s control. While the uniform-price auction is approximately efficient in isolation, we show that speculation and resale in aftermarkets might result in a significant welfare loss. Motivated by this issue, we consider three approaches, each ensuring high equilibrium welfare in the combined market. The first approach is to adopt smooth auctions such as discriminatory auctions. This approach is robust to correlated valuations and to participants acquiring information about others' types. However, discriminatory auctions have several downsides, notably that of charging bidders different prices for identical items, resulting in fairness concerns that make the format unpopular. Two other approaches we suggest are either using posted-pricing mechanisms, or using uniform-price auctions with anonymous reserves. We show that when using balanced prices, both these approaches ensure high equilibrium welfare in the combined market. The latter also inherits many of the benefits from uniform-price auctions such as price discovery, and can be introduced with a minor modification to auctions currently in use to sell carbon emission allowances. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17493"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17493">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Moshe Babaioff, Nicole Immorlica, Yingkai Li, and Brendan Lucier. Making Auctions Robust to Aftermarkets. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 9:1-9:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17493-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{babaioff_et_al:LIPIcs.ITCS.2023.9, author = {Babaioff, Moshe and Immorlica, Nicole and Li, Yingkai and Lucier, Brendan}, title = {{Making Auctions Robust to Aftermarkets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {9:1--9:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.9}, URN = {urn:nbn:de:0030-drops-175122}, doi = {10.4230/LIPIcs.ITCS.2023.9}, annote = {Keywords: carbon markets, aftermarkets, price of anarchy, multi-unit auctions, posted prices} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17493-input">@InProceedings{babaioff_et_al:LIPIcs.ITCS.2023.9, author = {Babaioff, Moshe and Immorlica, Nicole and Li, Yingkai and Lucier, Brendan}, title = {{Making Auctions Robust to Aftermarkets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {9:1--9:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.9}, URN = {urn:nbn:de:0030-drops-175122}, doi = {10.4230/LIPIcs.ITCS.2023.9}, annote = {Keywords: carbon markets, aftermarkets, price of anarchy, multi-unit auctions, posted prices} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.10"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.10">DOI: 10.4230/LIPIcs.ITCS.2023.10</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.10/LIPIcs.ITCS.2023.10.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.10" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17494" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17494" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.10" data-bs-toggle="tooltip" data-title="Efficiently Testable Circuits" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Baig, Mirza Ahad"></span> <span data-key="dagstuhl.contributor.author" data-value="Chakraborty, Suvradip"></span> <span data-key="dagstuhl.contributor.author" data-value="Dziembowski, Stefan"></span> <span data-key="dagstuhl.contributor.author" data-value="Gałązka, Małgorzata"></span> <span data-key="dagstuhl.contributor.author" data-value="Lizurej, Tomasz"></span> <span data-key="dagstuhl.contributor.author" data-value="Pietrzak, Krzysztof"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Tamper-proof and tamper-resistant designs"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.10"> Efficiently Testable Circuits </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak </p> <div class="row"> <div class="collapse" id="abstract-17494"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17494">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this work, we put forward the notion of "efficiently testable circuits" and provide circuit compilers that transform any circuit into an efficiently testable one. Informally, a circuit is testable if one can detect tampering with the circuit by evaluating it on a small number of inputs from some test set. Our technical contribution is a compiler that transforms any circuit C into a testable circuit (Ĉ,𝕋̂) for which we can detect arbitrary tampering with all wires in Ĉ. The notion of a testable circuit is weaker or incomparable to existing notions of tamper-resilience, which aim to detect or even correct for errors introduced by tampering during every query, but our new notion is interesting in several settings, and we achieve security against much more general tampering classes - like tampering with all wires - with very modest overhead. Concretely, starting from a circuit C of size n and depth d, for any L (think of L as a small constant, say L = 4), we get a testable (Ĉ,𝕋̂) where Ĉ is of size ≈ 12n and depth d+log(n)+L⋅ n^{1/L}. The test set 𝕋̂ is of size 4⋅ 2^L. The number of extra input and output wires (i.e., pins) we need to add for the testing is 3+L and 2^L, respectively. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17494"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17494">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak. Efficiently Testable Circuits. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 10:1-10:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17494-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{baig_et_al:LIPIcs.ITCS.2023.10, author = {Baig, Mirza Ahad and Chakraborty, Suvradip and Dziembowski, Stefan and Ga{\l}\k{a}zka, Ma{\l}gorzata and Lizurej, Tomasz and Pietrzak, Krzysztof}, title = {{Efficiently Testable Circuits}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {10:1--10:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.10}, URN = {urn:nbn:de:0030-drops-175130}, doi = {10.4230/LIPIcs.ITCS.2023.10}, annote = {Keywords: circuit compilers, circuit integrity, circuit testing} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17494-input">@InProceedings{baig_et_al:LIPIcs.ITCS.2023.10, author = {Baig, Mirza Ahad and Chakraborty, Suvradip and Dziembowski, Stefan and Ga{\l}\k{a}zka, Ma{\l}gorzata and Lizurej, Tomasz and Pietrzak, Krzysztof}, title = {{Efficiently Testable Circuits}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {10:1--10:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.10}, URN = {urn:nbn:de:0030-drops-175130}, doi = {10.4230/LIPIcs.ITCS.2023.10}, annote = {Keywords: circuit compilers, circuit integrity, circuit testing} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.11"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.11">DOI: 10.4230/LIPIcs.ITCS.2023.11</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.11/LIPIcs.ITCS.2023.11.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.11" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17495" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17495" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.11" data-bs-toggle="tooltip" data-title="Strategyproof Scheduling with Predictions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Balkanski, Eric"></span> <span data-key="dagstuhl.contributor.author" data-value="Gkatzelis, Vasilis"></span> <span data-key="dagstuhl.contributor.author" data-value="Tan, Xizhi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic mechanism design"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.11"> Strategyproof Scheduling with Predictions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Eric Balkanski, Vasilis Gkatzelis, and Xizhi Tan </p> <div class="row"> <div class="collapse" id="abstract-17495"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17495">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In their seminal paper that initiated the field of algorithmic mechanism design, Nisan and Ronen [Noam Nisan and Amir Ronen, 1999] studied the problem of designing strategyproof mechanisms for scheduling jobs on unrelated machines aiming to minimize the makespan. They provided a strategyproof mechanism that achieves an n-approximation and they made the bold conjecture that this is the best approximation achievable by any deterministic strategyproof scheduling mechanism. After more than two decades and several efforts, n remains the best known approximation and very recent work by Christodoulou et al. [George Christodoulou et al., 2021] has been able to prove an Ω(√n) approximation lower bound for all deterministic strategyproof mechanisms. This strong negative result, however, heavily depends on the fact that the performance of these mechanisms is evaluated using worst-case analysis. To overcome such overly pessimistic, and often uninformative, worst-case bounds, a surge of recent work has focused on the "learning-augmented framework", whose goal is to leverage machine-learned predictions to obtain improved approximations when these predictions are accurate (consistency), while also achieving near-optimal worst-case approximations even when the predictions are arbitrarily wrong (robustness). In this work, we study the classic strategic scheduling problem of Nisan and Ronen [Noam Nisan and Amir Ronen, 1999] using the learning-augmented framework and give a deterministic polynomial-time strategyproof mechanism that is 6-consistent and 2n-robust. We thus achieve the "best of both worlds": an O(1) consistency and an O(n) robustness that asymptotically matches the best-known approximation. We then extend this result to provide more general worst-case approximation guarantees as a function of the prediction error. Finally, we complement our positive results by showing that any 1-consistent deterministic strategyproof mechanism has unbounded robustness. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17495"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17495">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Eric Balkanski, Vasilis Gkatzelis, and Xizhi Tan. Strategyproof Scheduling with Predictions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 11:1-11:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17495-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{balkanski_et_al:LIPIcs.ITCS.2023.11, author = {Balkanski, Eric and Gkatzelis, Vasilis and Tan, Xizhi}, title = {{Strategyproof Scheduling with Predictions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {11:1--11:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.11}, URN = {urn:nbn:de:0030-drops-175143}, doi = {10.4230/LIPIcs.ITCS.2023.11}, annote = {Keywords: Mechanism Design with Predictions, Strategyproof Scheduling} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17495-input">@InProceedings{balkanski_et_al:LIPIcs.ITCS.2023.11, author = {Balkanski, Eric and Gkatzelis, Vasilis and Tan, Xizhi}, title = {{Strategyproof Scheduling with Predictions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {11:1--11:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.11}, URN = {urn:nbn:de:0030-drops-175143}, doi = {10.4230/LIPIcs.ITCS.2023.11}, annote = {Keywords: Mechanism Design with Predictions, Strategyproof Scheduling} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.12"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.12">DOI: 10.4230/LIPIcs.ITCS.2023.12</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.12/LIPIcs.ITCS.2023.12.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.12" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17496" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17496" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.12" data-bs-toggle="tooltip" data-title="Graph Searching with Predictions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Banerjee, Siddhartha"></span> <span data-key="dagstuhl.contributor.author" data-value="Cohen-Addad, Vincent"></span> <span data-key="dagstuhl.contributor.author" data-value="Gupta, Anupam"></span> <span data-key="dagstuhl.contributor.author" data-value="Li, Zhouzi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.12"> Graph Searching with Predictions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Siddhartha Banerjee, Vincent Cohen-Addad, Anupam Gupta, and Zhouzi Li </p> <div class="row"> <div class="collapse" id="abstract-17496"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17496">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Consider an agent exploring an unknown graph in search of some goal state. As it walks around the graph, it learns the nodes and their neighbors. The agent only knows where the goal state is when it reaches it. How do we reach this goal while moving only a small distance? This problem seems hopeless, even on trees of bounded degree, unless we give the agent some help. This setting with "help" often arises in exploring large search spaces (e.g., huge game trees) where we assume access to some score/quality function for each node, which we use to guide us towards the goal. In our case, we assume the help comes in the form of distance predictions: each node v provides a prediction f(v) of its distance to the goal vertex. Naturally if these predictions are correct, we can reach the goal along a shortest path. What if the predictions are unreliable and some of them are erroneous? Can we get an algorithm whose performance relates to the error of the predictions? In this work, we consider the problem on trees and give deterministic algorithms whose total movement cost is only O(OPT + Δ ⋅ ERR), where OPT is the distance from the start to the goal vertex, Δ the maximum degree, and the ERR is the total number of vertices whose predictions are erroneous. We show this guarantee is optimal. We then consider a "planning" version of the problem where the graph and predictions are known at the beginning, so the agent can use this global information to devise a search strategy of low cost. For this planning version, we go beyond trees and give an algorithms which gets good performance on (weighted) graphs with bounded doubling dimension. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17496"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17496">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Siddhartha Banerjee, Vincent Cohen-Addad, Anupam Gupta, and Zhouzi Li. Graph Searching with Predictions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 12:1-12:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17496-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{banerjee_et_al:LIPIcs.ITCS.2023.12, author = {Banerjee, Siddhartha and Cohen-Addad, Vincent and Gupta, Anupam and Li, Zhouzi}, title = {{Graph Searching with Predictions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {12:1--12:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.12}, URN = {urn:nbn:de:0030-drops-175158}, doi = {10.4230/LIPIcs.ITCS.2023.12}, annote = {Keywords: Algorithms with predictions, network algorithms, graph search} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17496-input">@InProceedings{banerjee_et_al:LIPIcs.ITCS.2023.12, author = {Banerjee, Siddhartha and Cohen-Addad, Vincent and Gupta, Anupam and Li, Zhouzi}, title = {{Graph Searching with Predictions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {12:1--12:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.12}, URN = {urn:nbn:de:0030-drops-175158}, doi = {10.4230/LIPIcs.ITCS.2023.12}, annote = {Keywords: Algorithms with predictions, network algorithms, graph search} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.13"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.13">DOI: 10.4230/LIPIcs.ITCS.2023.13</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.13/LIPIcs.ITCS.2023.13.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.13" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17497" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17497" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.13" data-bs-toggle="tooltip" data-title="On Computing Homological Hitting Sets" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bauer, Ulrich"></span> <span data-key="dagstuhl.contributor.author" data-value="Rathod, Abhishek"></span> <span data-key="dagstuhl.contributor.author" data-value="Zehavi, Meirav"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational geometry"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Algebraic topology"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.13"> On Computing Homological Hitting Sets </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Ulrich Bauer, Abhishek Rathod, and Meirav Zehavi </p> <div class="row"> <div class="collapse" id="abstract-17497"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17497">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Cut problems form one of the most fundamental classes of problems in algorithmic graph theory. In this paper, we initiate the algorithmic study of a high-dimensional cut problem. The problem we study, namely, Homological Hitting Set (HHS), is defined as follows: Given a nontrivial r-cycle z in a simplicial complex, find a set 𝒮 of r-dimensional simplices of minimum cardinality so that 𝒮 meets every cycle homologous to z. Our first result is that HHS admits a polynomial-time solution on triangulations of closed surfaces. Interestingly, the minimal solution is given in terms of the cocycles of the surface. Next, we provide an example of a 2-complex for which the (unique) minimal hitting set is not a cocycle. Furthermore, for general complexes, we show that HHS is W[1]-hard with respect to the solution size p. In contrast, on the positive side, we show that HHS admits an FPT algorithm with respect to p+Δ, where Δ is the maximum degree of the Hasse graph of the complex 𝖪. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17497"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17497">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Ulrich Bauer, Abhishek Rathod, and Meirav Zehavi. On Computing Homological Hitting Sets. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 13:1-13:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17497-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bauer_et_al:LIPIcs.ITCS.2023.13, author = {Bauer, Ulrich and Rathod, Abhishek and Zehavi, Meirav}, title = {{On Computing Homological Hitting Sets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {13:1--13:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.13}, URN = {urn:nbn:de:0030-drops-175169}, doi = {10.4230/LIPIcs.ITCS.2023.13}, annote = {Keywords: Algorithmic topology, Cut problems, Surfaces, Parameterized complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17497-input">@InProceedings{bauer_et_al:LIPIcs.ITCS.2023.13, author = {Bauer, Ulrich and Rathod, Abhishek and Zehavi, Meirav}, title = {{On Computing Homological Hitting Sets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {13:1--13:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.13}, URN = {urn:nbn:de:0030-drops-175169}, doi = {10.4230/LIPIcs.ITCS.2023.13}, annote = {Keywords: Algorithmic topology, Cut problems, Surfaces, Parameterized complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.14"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.14">DOI: 10.4230/LIPIcs.ITCS.2023.14</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.14/LIPIcs.ITCS.2023.14.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.14" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17498" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17498" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.14" data-bs-toggle="tooltip" data-title="On Disperser/Lifting Properties of the Index and Inner-Product Functions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Beame, Paul"></span> <span data-key="dagstuhl.contributor.author" data-value="Koroth, Sajin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Oracles and decision trees"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Proof complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.14"> On Disperser/Lifting Properties of the Index and Inner-Product Functions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Paul Beame and Sajin Koroth </p> <div class="row"> <div class="collapse" id="abstract-17498"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17498">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Query-to-communication lifting theorems, which connect the query complexity of a Boolean function to the communication complexity of an associated "lifted" function obtained by composing the function with many copies of another function known as a gadget, have been instrumental in resolving many open questions in computational complexity. A number of important complexity questions could be resolved if we could make substantial improvements in the input size required for lifting with the Index function, which is a universal gadget for lifting, from its current near-linear size down to polylogarithmic in the number of inputs N of the original function or, ideally, constant. The near-linear size bound was recently shown by Lovett, Meka, Mertz, Pitassi and Zhang [Shachar Lovett et al., 2022] using a recent breakthrough improvement on the Sunflower Lemma to show that a certain graph associated with an Index function of that size is a disperser. They also stated a conjecture about the Index function that is essential for further improvements in the size required for lifting with Index using current techniques. In this paper we prove the following; - The conjecture of Lovett et al. is false when the size of the Index gadget is less than logarithmic in N. - The same limitation applies to the Inner-Product function. More precisely, the Inner-Product function, which is known to satisfy the disperser property at size O(log N), also does not have this property when its size is less than log N. - Notwithstanding the above, we prove a lifting theorem that applies to Index gadgets of any size at least 4 and yields lower bounds for a restricted class of communication protocols in which one of the players is limited to sending parities of its inputs. - Using a modification of the same idea with improved lifting parameters we derive a strong lifting theorem from decision tree size to parity decision tree size. We use this, in turn, to derive a general lifting theorem in proof complexity from tree-resolution size to tree-like Res(⊕) refutation size, which yields many new exponential lower bounds on such proofs. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17498"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17498">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Paul Beame and Sajin Koroth. On Disperser/Lifting Properties of the Index and Inner-Product Functions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 14:1-14:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17498-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{beame_et_al:LIPIcs.ITCS.2023.14, author = {Beame, Paul and Koroth, Sajin}, title = {{On Disperser/Lifting Properties of the Index and Inner-Product Functions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {14:1--14:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.14}, URN = {urn:nbn:de:0030-drops-175172}, doi = {10.4230/LIPIcs.ITCS.2023.14}, annote = {Keywords: Decision trees, communication complexity, lifting theorems, proof complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17498-input">@InProceedings{beame_et_al:LIPIcs.ITCS.2023.14, author = {Beame, Paul and Koroth, Sajin}, title = {{On Disperser/Lifting Properties of the Index and Inner-Product Functions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {14:1--14:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.14}, URN = {urn:nbn:de:0030-drops-175172}, doi = {10.4230/LIPIcs.ITCS.2023.14}, annote = {Keywords: Decision trees, communication complexity, lifting theorems, proof complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.15"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.15">DOI: 10.4230/LIPIcs.ITCS.2023.15</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.15/LIPIcs.ITCS.2023.15.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.15" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17499" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17499" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.15" data-bs-toggle="tooltip" data-title="Is This Correct? Let’s Check!" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Ben-Eliezer, Omri"></span> <span data-key="dagstuhl.contributor.author" data-value="Mikulincer, Dan"></span> <span data-key="dagstuhl.contributor.author" data-value="Mossel, Elchanan"></span> <span data-key="dagstuhl.contributor.author" data-value="Sudan, Madhu"></span> <span data-key="dagstuhl.subject.classification" data-value="Networks → Error detection and error correction"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.15"> Is This Correct? Let’s Check! </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Omri Ben-Eliezer, Dan Mikulincer, Elchanan Mossel, and Madhu Sudan </p> <div class="row"> <div class="collapse" id="abstract-17499"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17499">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Societal accumulation of knowledge is a complex process. The correctness of new units of knowledge depends not only on the correctness of new reasoning, but also on the correctness of old units that the new one builds on. The errors in such accumulation processes are often remedied by error correction and detection heuristics. Motivating examples include the scientific process based on scientific publications, and software development based on libraries of code. Natural processes that aim to keep errors under control, such as peer review in scientific publications, and testing and debugging in software development, would typically check existing pieces of knowledge - both for the reasoning that generated them and the previous facts they rely on. In this work, we present a simple process that models such accumulation of knowledge and study the persistence (or lack thereof) of errors. We consider a simple probabilistic model for the generation of new units of knowledge based on the preferential attachment growth model, which additionally allows for errors. Furthermore, the process includes checks aimed at catching these errors. We investigate when effects of errors persist forever in the system (with positive probability) and when they get rooted out completely by the checking process. The two basic parameters associated with the checking process are the probability of conducting a check and the depth of the check. We show that errors are rooted out if checks are sufficiently frequent and sufficiently deep. In contrast, shallow or infrequent checks are insufficient to root out errors. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17499"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17499">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Omri Ben-Eliezer, Dan Mikulincer, Elchanan Mossel, and Madhu Sudan. Is This Correct? Let’s Check!. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 15:1-15:11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17499-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{beneliezer_et_al:LIPIcs.ITCS.2023.15, author = {Ben-Eliezer, Omri and Mikulincer, Dan and Mossel, Elchanan and Sudan, Madhu}, title = {{Is This Correct? Let’s Check!}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {15:1--15:11}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.15}, URN = {urn:nbn:de:0030-drops-175180}, doi = {10.4230/LIPIcs.ITCS.2023.15}, annote = {Keywords: Error Propagation, Preferential Attachment} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17499-input">@InProceedings{beneliezer_et_al:LIPIcs.ITCS.2023.15, author = {Ben-Eliezer, Omri and Mikulincer, Dan and Mossel, Elchanan and Sudan, Madhu}, title = {{Is This Correct? Let’s Check!}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {15:1--15:11}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.15}, URN = {urn:nbn:de:0030-drops-175180}, doi = {10.4230/LIPIcs.ITCS.2023.15}, annote = {Keywords: Error Propagation, Preferential Attachment} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.16"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.16">DOI: 10.4230/LIPIcs.ITCS.2023.16</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.16/LIPIcs.ITCS.2023.16.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.16" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17500" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17500" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.16" data-bs-toggle="tooltip" data-title="Online Learning and Bandits with Queried Hints" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bhaskara, Aditya"></span> <span data-key="dagstuhl.contributor.author" data-value="Gollapudi, Sreenivas"></span> <span data-key="dagstuhl.contributor.author" data-value="Im, Sungjin"></span> <span data-key="dagstuhl.contributor.author" data-value="Kollias, Kostas"></span> <span data-key="dagstuhl.contributor.author" data-value="Munagala, Kamesh"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online learning algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.16"> Online Learning and Bandits with Queried Hints </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Aditya Bhaskara, Sreenivas Gollapudi, Sungjin Im, Kostas Kollias, and Kamesh Munagala </p> <div class="row"> <div class="collapse" id="abstract-17500"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17500">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We consider the classic online learning and stochastic multi-armed bandit (MAB) problems, when at each step, the online policy can probe and find out which of a small number (k) of choices has better reward (or loss) before making its choice. In this model, we derive algorithms whose regret bounds have exponentially better dependence on the time horizon compared to the classic regret bounds. In particular, we show that probing with k = 2 suffices to achieve time-independent regret bounds for online linear and convex optimization. The same number of probes improve the regret bound of stochastic MAB with independent arms from O(√{nT}) to O(n² log T), where n is the number of arms and T is the horizon length. For stochastic MAB, we also consider a stronger model where a probe reveals the reward values of the probed arms, and show that in this case, k = 3 probes suffice to achieve parameter-independent constant regret, O(n²). Such regret bounds cannot be achieved even with full feedback after the play, showcasing the power of limited "advice" via probing before making the play. We also present extensions to the setting where the hints can be imperfect, and to the case of stochastic MAB where the rewards of the arms can be correlated. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17500"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17500">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Aditya Bhaskara, Sreenivas Gollapudi, Sungjin Im, Kostas Kollias, and Kamesh Munagala. Online Learning and Bandits with Queried Hints. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 16:1-16:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17500-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bhaskara_et_al:LIPIcs.ITCS.2023.16, author = {Bhaskara, Aditya and Gollapudi, Sreenivas and Im, Sungjin and Kollias, Kostas and Munagala, Kamesh}, title = {{Online Learning and Bandits with Queried Hints}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {16:1--16:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.16}, URN = {urn:nbn:de:0030-drops-175197}, doi = {10.4230/LIPIcs.ITCS.2023.16}, annote = {Keywords: Online learning, multi-armed bandits, regret} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17500-input">@InProceedings{bhaskara_et_al:LIPIcs.ITCS.2023.16, author = {Bhaskara, Aditya and Gollapudi, Sreenivas and Im, Sungjin and Kollias, Kostas and Munagala, Kamesh}, title = {{Online Learning and Bandits with Queried Hints}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {16:1--16:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.16}, URN = {urn:nbn:de:0030-drops-175197}, doi = {10.4230/LIPIcs.ITCS.2023.16}, annote = {Keywords: Online learning, multi-armed bandits, regret} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.17"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.17">DOI: 10.4230/LIPIcs.ITCS.2023.17</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.17/LIPIcs.ITCS.2023.17.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17501" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17501" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.17" data-bs-toggle="tooltip" data-title="Bootstrapping Homomorphic Encryption via Functional Encryption" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bitansky, Nir"></span> <span data-key="dagstuhl.contributor.author" data-value="Solomon, Tomer"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic protocols"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17"> Bootstrapping Homomorphic Encryption via Functional Encryption </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Nir Bitansky and Tomer Solomon </p> <div class="row"> <div class="collapse" id="abstract-17501"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17501">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Homomorphic encryption is a central object in modern cryptography, with far-reaching applications. Constructions supporting homomorphic evaluation of arbitrary Boolean circuits have been known for over a decade, based on standard lattice assumptions. However, these constructions are leveled, meaning that they only support circuits up to some a-priori bounded depth. These leveled constructions can be bootstrapped into fully homomorphic ones, but this requires additional circular security assumptions, which are construction-dependent, and where reductions to standard lattice assumptions are no longer known. Alternative constructions are known based on indistinguishability obfuscation, which has been recently constructed under standard assumptions. However, this alternative requires subexponential hardness of the underlying primitives. We prove a new bootstrapping theorem based on functional encryption, which is known based on standard polynomial hardness assumptions. As a result we obtain the first fully homomorphic encryption scheme that avoids both circular security assumptions and super-polynomial hardness assumptions. The construction is secure against uniform adversaries, and can be made non-uniformly secure assuming a generalization of the time-hierarchy theorem, which follows for example from non-uniform ETH. At the heart of the construction is a new proof technique based on cryptographic puzzles and decomposable obfuscation. Unlike most cryptographic reductions, our security reduction does not fully treat the adversary as a black box, but rather makes explicit use of its running time (or circuit size). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17501"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17501">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Nir Bitansky and Tomer Solomon. Bootstrapping Homomorphic Encryption via Functional Encryption. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 17:1-17:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17501-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bitansky_et_al:LIPIcs.ITCS.2023.17, author = {Bitansky, Nir and Solomon, Tomer}, title = {{Bootstrapping Homomorphic Encryption via Functional Encryption}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {17:1--17:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17}, URN = {urn:nbn:de:0030-drops-175200}, doi = {10.4230/LIPIcs.ITCS.2023.17}, annote = {Keywords: Fully Homomorphic Encryption, Polynomial Assumptions, Cryptographic Puzzles} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17501-input">@InProceedings{bitansky_et_al:LIPIcs.ITCS.2023.17, author = {Bitansky, Nir and Solomon, Tomer}, title = {{Bootstrapping Homomorphic Encryption via Functional Encryption}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {17:1--17:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17}, URN = {urn:nbn:de:0030-drops-175200}, doi = {10.4230/LIPIcs.ITCS.2023.17}, annote = {Keywords: Fully Homomorphic Encryption, Polynomial Assumptions, Cryptographic Puzzles} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.18"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.18">DOI: 10.4230/LIPIcs.ITCS.2023.18</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.18/LIPIcs.ITCS.2023.18.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.18" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17502" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17502" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.18" data-bs-toggle="tooltip" data-title="Certification with an NP Oracle" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Blanc, Guy"></span> <span data-key="dagstuhl.contributor.author" data-value="Koch, Caleb"></span> <span data-key="dagstuhl.contributor.author" data-value="Lange, Jane"></span> <span data-key="dagstuhl.contributor.author" data-value="Strassle, Carmen"></span> <span data-key="dagstuhl.contributor.author" data-value="Tan, Li-Yang"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.18"> Certification with an NP Oracle </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Guy Blanc, Caleb Koch, Jane Lange, Carmen Strassle, and Li-Yang Tan </p> <div class="row"> <div class="collapse" id="abstract-17502"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17502">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In the certification problem, the algorithm is given a function f with certificate complexity k and an input x^⋆, and the goal is to find a certificate of size ≤ poly(k) for f’s value at x^⋆. This problem is in NP^NP, and assuming 𝖯 ≠ NP, is not in 𝖯. Prior works, dating back to Valiant in 1984, have therefore sought to design efficient algorithms by imposing assumptions on f such as monotonicity. Our first result is a BPP^NP algorithm for the general problem. The key ingredient is a new notion of the balanced influence of variables, a natural variant of influence that corrects for the bias of the function. Balanced influences can be accurately estimated via uniform generation, and classic BPP^NP algorithms are known for the latter task. We then consider certification with stricter instance-wise guarantees: for each x^⋆, find a certificate whose size scales with that of the smallest certificate for x^⋆. In sharp contrast with our first result, we show that this problem is NP^NP-hard even to approximate. We obtain an optimal inapproximability ratio, adding to a small handful of problems in the higher levels of the polynomial hierarchy for which optimal inapproximability is known. Our proof involves the novel use of bit-fixing dispersers for gap amplification. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17502"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17502">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Guy Blanc, Caleb Koch, Jane Lange, Carmen Strassle, and Li-Yang Tan. Certification with an NP Oracle. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 18:1-18:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17502-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{blanc_et_al:LIPIcs.ITCS.2023.18, author = {Blanc, Guy and Koch, Caleb and Lange, Jane and Strassle, Carmen and Tan, Li-Yang}, title = {{Certification with an NP Oracle}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {18:1--18:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.18}, URN = {urn:nbn:de:0030-drops-175217}, doi = {10.4230/LIPIcs.ITCS.2023.18}, annote = {Keywords: Certificate complexity, Boolean functions, polynomial hierarchy, hardness of approximation} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17502-input">@InProceedings{blanc_et_al:LIPIcs.ITCS.2023.18, author = {Blanc, Guy and Koch, Caleb and Lange, Jane and Strassle, Carmen and Tan, Li-Yang}, title = {{Certification with an NP Oracle}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {18:1--18:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.18}, URN = {urn:nbn:de:0030-drops-175217}, doi = {10.4230/LIPIcs.ITCS.2023.18}, annote = {Keywords: Certificate complexity, Boolean functions, polynomial hierarchy, hardness of approximation} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.19"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.19">DOI: 10.4230/LIPIcs.ITCS.2023.19</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.19/LIPIcs.ITCS.2023.19.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.19" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17503" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17503" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.19" data-bs-toggle="tooltip" data-title="Matrix Multiplication via Matrix Groups" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Blasiak, Jonah"></span> <span data-key="dagstuhl.contributor.author" data-value="Cohn, Henry"></span> <span data-key="dagstuhl.contributor.author" data-value="Grochow, Joshua A."></span> <span data-key="dagstuhl.contributor.author" data-value="Pratt, Kevin"></span> <span data-key="dagstuhl.contributor.author" data-value="Umans, Chris"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algebraic complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.19"> Matrix Multiplication via Matrix Groups </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Jonah Blasiak, Henry Cohn, Joshua A. Grochow, Kevin Pratt, and Chris Umans </p> <div class="row"> <div class="collapse" id="abstract-17503"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17503">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In 2003, Cohn and Umans proposed a group-theoretic approach to bounding the exponent of matrix multiplication. Previous work within this approach ruled out certain families of groups as a route to obtaining ω = 2, while other families of groups remain potentially viable. In this paper we turn our attention to matrix groups, whose usefulness within this framework was relatively unexplored. We first show that groups of Lie type cannot prove ω = 2 within the group-theoretic approach. This is based on a representation-theoretic argument that identifies the second-smallest dimension of an irreducible representation of a group as a key parameter that determines its viability in this framework. Our proof builds on Gowers' result concerning product-free sets in quasirandom groups. We then give another barrier that rules out certain natural matrix group constructions that make use of subgroups that are far from being self-normalizing. Our barrier results leave open several natural paths to obtain ω = 2 via matrix groups. To explore these routes we propose working in the continuous setting of Lie groups, in which we develop an analogous theory. Obtaining the analogue of ω = 2 in this potentially easier setting is a key challenge that represents an intermediate goal short of actually proving ω = 2. We give two constructions in the continuous setting, each of which evades one of our two barriers. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17503"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17503">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Jonah Blasiak, Henry Cohn, Joshua A. Grochow, Kevin Pratt, and Chris Umans. Matrix Multiplication via Matrix Groups. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 19:1-19:16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17503-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{blasiak_et_al:LIPIcs.ITCS.2023.19, author = {Blasiak, Jonah and Cohn, Henry and Grochow, Joshua A. and Pratt, Kevin and Umans, Chris}, title = {{Matrix Multiplication via Matrix Groups}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {19:1--19:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.19}, URN = {urn:nbn:de:0030-drops-175226}, doi = {10.4230/LIPIcs.ITCS.2023.19}, annote = {Keywords: Fast matrix multiplication, representation theory, matrix groups} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17503-input">@InProceedings{blasiak_et_al:LIPIcs.ITCS.2023.19, author = {Blasiak, Jonah and Cohn, Henry and Grochow, Joshua A. and Pratt, Kevin and Umans, Chris}, title = {{Matrix Multiplication via Matrix Groups}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {19:1--19:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.19}, URN = {urn:nbn:de:0030-drops-175226}, doi = {10.4230/LIPIcs.ITCS.2023.19}, annote = {Keywords: Fast matrix multiplication, representation theory, matrix groups} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.20"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.20">DOI: 10.4230/LIPIcs.ITCS.2023.20</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.20/LIPIcs.ITCS.2023.20.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.20" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17504" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17504" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.20" data-bs-toggle="tooltip" data-title="Epic Fail: Emulators Can Tolerate Polynomially Many Edge Faults for Free" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bodwin, Greg"></span> <span data-key="dagstuhl.contributor.author" data-value="Dinitz, Michael"></span> <span data-key="dagstuhl.contributor.author" data-value="Nazari, Yasamin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sparsification and spanners"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.20"> Epic Fail: Emulators Can Tolerate Polynomially Many Edge Faults for Free </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Greg Bodwin, Michael Dinitz, and Yasamin Nazari </p> <div class="row"> <div class="collapse" id="abstract-17504"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17504">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A t-emulator of a graph G is a graph H that approximates its pairwise shortest path distances up to multiplicative t error. We study fault tolerant t-emulators, under the model recently introduced by Bodwin, Dinitz, and Nazari [ITCS 2022] for vertex failures. In this paper we consider the version for edge failures, and show that they exhibit surprisingly different behavior. In particular, our main result is that, for (2k-1)-emulators with k odd, we can tolerate a polynomial number of edge faults for free. For example: for any n-node input graph, we construct a 5-emulator (k = 3) on O(n^{4/3}) edges that is robust to f = O(n^{2/9}) edge faults. It is well known that Ω(n^{4/3}) edges are necessary even if the 5-emulator does not need to tolerate any faults. Thus we pay no extra cost in the size to gain this fault tolerance. We leave open the precise range of free fault tolerance for odd k, and whether a similar phenomenon can be proved for even k. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17504"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17504">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Greg Bodwin, Michael Dinitz, and Yasamin Nazari. Epic Fail: Emulators Can Tolerate Polynomially Many Edge Faults for Free. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 20:1-20:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17504-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bodwin_et_al:LIPIcs.ITCS.2023.20, author = {Bodwin, Greg and Dinitz, Michael and Nazari, Yasamin}, title = {{Epic Fail: Emulators Can Tolerate Polynomially Many Edge Faults for Free}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {20:1--20:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.20}, URN = {urn:nbn:de:0030-drops-175231}, doi = {10.4230/LIPIcs.ITCS.2023.20}, annote = {Keywords: Emulators, Fault Tolerance, Girth Conjecture} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17504-input">@InProceedings{bodwin_et_al:LIPIcs.ITCS.2023.20, author = {Bodwin, Greg and Dinitz, Michael and Nazari, Yasamin}, title = {{Epic Fail: Emulators Can Tolerate Polynomially Many Edge Faults for Free}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {20:1--20:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.20}, URN = {urn:nbn:de:0030-drops-175231}, doi = {10.4230/LIPIcs.ITCS.2023.20}, annote = {Keywords: Emulators, Fault Tolerance, Girth Conjecture} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.21"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.21">DOI: 10.4230/LIPIcs.ITCS.2023.21</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.21/LIPIcs.ITCS.2023.21.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.21" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17505" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17505" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.21" data-bs-toggle="tooltip" data-title="Opponent Indifference in Rating Systems: A Theoretical Case for Sonas" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bodwin, Greg"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhang, Forest"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic game theory and mechanism design"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.21"> Opponent Indifference in Rating Systems: A Theoretical Case for Sonas </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Greg Bodwin and Forest Zhang </p> <div class="row"> <div class="collapse" id="abstract-17505"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17505">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In competitive games, it is common to assign each player a real number rating signifying their skill level. A rating system is a procedure by which player ratings are adjusted upwards each time they win, or downwards each time they lose. Many matchmaking systems give players some control over their opponent’s rating; for example, a player might be able to selectively initiate games against opponents whose ratings are publicly visible, or abort a game without penalty before it begins but after glimpsing their opponent’s rating. It is natural to ask whether one can design a rating system that does not incentivize a rating-maximizing player to act strategically, seeking games against opponents of one rating over another. We show the following: - The full version of this "opponent indifference" property is unfortunately too strong to be feasible. Although it is satisfied by some rating systems, these systems lack certain desirable expressiveness properties, suggesting that they are not suitable to capture most games of interest. - However, there is a natural relaxation, roughly requiring indifference between any two opponents who are both "reasonably evenly matched" with the choosing player. We prove that this relaxed variant of opponent indifference, which we call P opponent indifference, is viable. In fact, a certain strong version of P opponent indifference precisely characterizes the rating system Sonas, which was originally proposed for its empirical predictive accuracy on the outcomes of high-level chess games. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17505"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17505">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Greg Bodwin and Forest Zhang. Opponent Indifference in Rating Systems: A Theoretical Case for Sonas. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 21:1-21:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17505-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bodwin_et_al:LIPIcs.ITCS.2023.21, author = {Bodwin, Greg and Zhang, Forest}, title = {{Opponent Indifference in Rating Systems: A Theoretical Case for Sonas}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {21:1--21:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.21}, URN = {urn:nbn:de:0030-drops-175242}, doi = {10.4230/LIPIcs.ITCS.2023.21}, annote = {Keywords: Rating systems, opponent indifference, incentive compatibility, mechanism design, game theory} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17505-input">@InProceedings{bodwin_et_al:LIPIcs.ITCS.2023.21, author = {Bodwin, Greg and Zhang, Forest}, title = {{Opponent Indifference in Rating Systems: A Theoretical Case for Sonas}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {21:1--21:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.21}, URN = {urn:nbn:de:0030-drops-175242}, doi = {10.4230/LIPIcs.ITCS.2023.21}, annote = {Keywords: Rating systems, opponent indifference, incentive compatibility, mechanism design, game theory} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.22"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.22">DOI: 10.4230/LIPIcs.ITCS.2023.22</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.22/LIPIcs.ITCS.2023.22.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.22" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17506" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17506" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.22" data-bs-toggle="tooltip" data-title="PPP-Completeness and Extremal Combinatorics" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bourneuf, Romain"></span> <span data-key="dagstuhl.contributor.author" data-value="Folwarczný, Lukáš"></span> <span data-key="dagstuhl.contributor.author" data-value="Hubáček, Pavel"></span> <span data-key="dagstuhl.contributor.author" data-value="Rosen, Alon"></span> <span data-key="dagstuhl.contributor.author" data-value="Schwartzbach, Nikolaj I."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.22"> PPP-Completeness and Extremal Combinatorics </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Romain Bourneuf, Lukáš Folwarczný, Pavel Hubáček, Alon Rosen, and Nikolaj I. Schwartzbach </p> <div class="row"> <div class="collapse" id="abstract-17506"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17506">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Many classical theorems in combinatorics establish the emergence of substructures within sufficiently large collections of objects. Well-known examples are Ramsey’s theorem on monochromatic subgraphs and the Erdős-Rado sunflower lemma. Implicit versions of the corresponding total search problems are known to be PWPP-hard under randomized reductions in the case of Ramsey’s theorem and PWPP-hard in the case of the sunflower lemma; here "implicit” means that the collection is represented by a poly-sized circuit inducing an exponentially large number of objects. We show that several other well-known theorems from extremal combinatorics - including Erdős-Ko-Rado, Sperner, and Cayley’s formula – give rise to complete problems for PWPP and PPP. This is in contrast to the Ramsey and Erdős-Rado problems, for which establishing inclusion in PWPP has remained elusive. Besides significantly expanding the set of problems that are complete for PWPP and PPP, our work identifies some key properties of combinatorial proofs of existence that can give rise to completeness for these classes. Our completeness results rely on efficient encodings for which finding collisions allows extracting the desired substructure. These encodings are made possible by the tightness of the bounds for the problems at hand (tighter than what is known for Ramsey’s theorem and the sunflower lemma). Previous techniques for proving bounds in TFNP invariably made use of structured algorithms. Such algorithms are not known to exist for the theorems considered in this work, as their proofs "from the book" are non-constructive. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17506"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17506">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Romain Bourneuf, Lukáš Folwarczný, Pavel Hubáček, Alon Rosen, and Nikolaj I. Schwartzbach. PPP-Completeness and Extremal Combinatorics. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 22:1-22:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17506-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bourneuf_et_al:LIPIcs.ITCS.2023.22, author = {Bourneuf, Romain and Folwarczn\'{y}, Luk\'{a}\v{s} and Hub\'{a}\v{c}ek, Pavel and Rosen, Alon and Schwartzbach, Nikolaj I.}, title = {{PPP-Completeness and Extremal Combinatorics}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {22:1--22:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.22}, URN = {urn:nbn:de:0030-drops-175255}, doi = {10.4230/LIPIcs.ITCS.2023.22}, annote = {Keywords: total search problems, extremal combinatorics, PPP-completeness} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17506-input">@InProceedings{bourneuf_et_al:LIPIcs.ITCS.2023.22, author = {Bourneuf, Romain and Folwarczn\'{y}, Luk\'{a}\v{s} and Hub\'{a}\v{c}ek, Pavel and Rosen, Alon and Schwartzbach, Nikolaj I.}, title = {{PPP-Completeness and Extremal Combinatorics}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {22:1--22:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.22}, URN = {urn:nbn:de:0030-drops-175255}, doi = {10.4230/LIPIcs.ITCS.2023.22}, annote = {Keywords: total search problems, extremal combinatorics, PPP-completeness} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.23"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.23">DOI: 10.4230/LIPIcs.ITCS.2023.23</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.23/LIPIcs.ITCS.2023.23.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.23" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17507" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17507" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.23" data-bs-toggle="tooltip" data-title="On Low-End Obfuscation and Learning" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Boyle, Elette"></span> <span data-key="dagstuhl.contributor.author" data-value="Ishai, Yuval"></span> <span data-key="dagstuhl.contributor.author" data-value="Meyer, Pierre"></span> <span data-key="dagstuhl.contributor.author" data-value="Robere, Robert"></span> <span data-key="dagstuhl.contributor.author" data-value="Yehuda, Gal"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.23"> On Low-End Obfuscation and Learning </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Elette Boyle, Yuval Ishai, Pierre Meyer, Robert Robere, and Gal Yehuda </p> <div class="row"> <div class="collapse" id="abstract-17507"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17507">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Most recent works on cryptographic obfuscation focus on the high-end regime of obfuscating general circuits while guaranteeing computational indistinguishability between functionally equivalent circuits. Motivated by the goals of simplicity and efficiency, we initiate a systematic study of "low-end" obfuscation, focusing on simpler representation models and information-theoretic notions of security. We obtain the following results. - Positive results via "white-box" learning. We present a general technique for obtaining perfect indistinguishability obfuscation from exact learning algorithms that are given restricted access to the representation of the input function. We demonstrate the usefulness of this approach by obtaining simple obfuscation for decision trees and multilinear read-k arithmetic formulas. - Negative results via PAC learning. A proper obfuscation scheme obfuscates programs from a class C by programs from the same class. Assuming the existence of one-way functions, we show that there is no proper indistinguishability obfuscation scheme for k-CNF formulas for any constant k ≥ 3; in fact, even obfuscating 3-CNF by k-CNF is impossible. This result applies even to computationally secure obfuscation, and makes an unexpected use of PAC learning in the context of negative results for obfuscation. - Separations. We study the relations between different information-theoretic notions of indistinguishability obfuscation, giving cryptographic evidence for separations between them. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17507"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17507">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Elette Boyle, Yuval Ishai, Pierre Meyer, Robert Robere, and Gal Yehuda. On Low-End Obfuscation and Learning. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 23:1-23:28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17507-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{boyle_et_al:LIPIcs.ITCS.2023.23, author = {Boyle, Elette and Ishai, Yuval and Meyer, Pierre and Robere, Robert and Yehuda, Gal}, title = {{On Low-End Obfuscation and Learning}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {23:1--23:28}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.23}, URN = {urn:nbn:de:0030-drops-175265}, doi = {10.4230/LIPIcs.ITCS.2023.23}, annote = {Keywords: Indistinguishability obfuscation, cryptography, learning} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17507-input">@InProceedings{boyle_et_al:LIPIcs.ITCS.2023.23, author = {Boyle, Elette and Ishai, Yuval and Meyer, Pierre and Robere, Robert and Yehuda, Gal}, title = {{On Low-End Obfuscation and Learning}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {23:1--23:28}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.23}, URN = {urn:nbn:de:0030-drops-175265}, doi = {10.4230/LIPIcs.ITCS.2023.23}, annote = {Keywords: Indistinguishability obfuscation, cryptography, learning} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.24"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.24">DOI: 10.4230/LIPIcs.ITCS.2023.24</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.24/LIPIcs.ITCS.2023.24.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.24" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17508" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17508" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.24" data-bs-toggle="tooltip" data-title="On the Computational Hardness Needed for Quantum Cryptography" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Brakerski, Zvika"></span> <span data-key="dagstuhl.contributor.author" data-value="Canetti, Ran"></span> <span data-key="dagstuhl.contributor.author" data-value="Qian, Luowen"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic protocols"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Mathematical foundations of cryptography"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.24"> On the Computational Hardness Needed for Quantum Cryptography </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Zvika Brakerski, Ran Canetti, and Luowen Qian </p> <div class="row"> <div class="collapse" id="abstract-17508"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17508">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In the classical model of computation, it is well established that one-way functions (OWF) are minimal for computational cryptography: They are essential for almost any cryptographic application that cannot be realized with respect to computationally unbounded adversaries. In the quantum setting, however, OWFs appear not to be essential (Kretschmer 2021; Ananth et al., Morimae and Yamakawa 2022), and the question of whether such a minimal primitive exists remains open. We consider EFI pairs - efficiently samplable, statistically far but computationally indistinguishable pairs of (mixed) quantum states. Building on the work of Yan (2022), which shows equivalence between EFI pairs and statistical commitment schemes, we show that EFI pairs are necessary for a large class of quantum-cryptographic applications. Specifically, we construct EFI pairs from minimalistic versions of commitments schemes, oblivious transfer, and general secure multiparty computation, as well as from QCZK proofs from essentially any non-trivial language. We also construct quantum computational zero knowledge (QCZK) proofs for all of QIP from any EFI pair. This suggests that, for much of quantum cryptography, EFI pairs play a similar role to that played by OWFs in the classical setting: they are simple to describe, essential, and also serve as a linchpin for demonstrating equivalence between primitives. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17508"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17508">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Zvika Brakerski, Ran Canetti, and Luowen Qian. On the Computational Hardness Needed for Quantum Cryptography. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 24:1-24:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17508-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{brakerski_et_al:LIPIcs.ITCS.2023.24, author = {Brakerski, Zvika and Canetti, Ran and Qian, Luowen}, title = {{On the Computational Hardness Needed for Quantum Cryptography}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {24:1--24:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.24}, URN = {urn:nbn:de:0030-drops-175278}, doi = {10.4230/LIPIcs.ITCS.2023.24}, annote = {Keywords: quantum cryptography, efi, commitment scheme, oblivious transfer, zero knowledge, secure multiparty computation} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17508-input">@InProceedings{brakerski_et_al:LIPIcs.ITCS.2023.24, author = {Brakerski, Zvika and Canetti, Ran and Qian, Luowen}, title = {{On the Computational Hardness Needed for Quantum Cryptography}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {24:1--24:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.24}, URN = {urn:nbn:de:0030-drops-175278}, doi = {10.4230/LIPIcs.ITCS.2023.24}, annote = {Keywords: quantum cryptography, efi, commitment scheme, oblivious transfer, zero knowledge, secure multiparty computation} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.25"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.25">DOI: 10.4230/LIPIcs.ITCS.2023.25</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.25/LIPIcs.ITCS.2023.25.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.25" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17509" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17509" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.25" data-bs-toggle="tooltip" data-title="Improved Monotonicity Testers via Hypercube Embeddings" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Braverman, Mark"></span> <span data-key="dagstuhl.contributor.author" data-value="Khot, Subhash"></span> <span data-key="dagstuhl.contributor.author" data-value="Kindler, Guy"></span> <span data-key="dagstuhl.contributor.author" data-value="Minzer, Dor"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Combinatorics"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.25"> Improved Monotonicity Testers via Hypercube Embeddings </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Mark Braverman, Subhash Khot, Guy Kindler, and Dor Minzer </p> <div class="row"> <div class="collapse" id="abstract-17509"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17509">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We show improved monotonicity testers for the Boolean hypercube under the p-biased measure, as well as over the hypergrid [m]ⁿ. Our results are: 1) For any p ∈ (0,1), for the p-biased hypercube we show a non-adaptive tester that makes Õ(√n/ε²) queries, accepts monotone functions with probability 1 and rejects functions that are ε-far from monotone with probability at least 2/3. 2) For all m ∈ ℕ, we show an Õ(√nm³/ε²) query monotonicity tester over [m]ⁿ. We also establish corresponding directed isoperimetric inequalities in these domains, analogous to the isoperimetric inequality in [Subhash Khot et al., 2018]. Previously, the best known tester due to Black, Chakrabarty and Seshadhri [Hadley Black et al., 2018] had Ω(n^{5/6}) query complexity. Our results are optimal up to poly-logarithmic factors and the dependency on m. Our proof uses a notion of monotone embeddings of measures into the Boolean hypercube that can be used to reduce the problem of monotonicity testing over an arbitrary product domains to the Boolean cube. The embedding maps a function over a product domain of dimension n into a function over a Boolean cube of a larger dimension n', while preserving its distance from being monotone; an embedding is considered efficient if n' is not much larger than n, and we show how to construct efficient embeddings in the above mentioned settings. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17509"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17509">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Mark Braverman, Subhash Khot, Guy Kindler, and Dor Minzer. Improved Monotonicity Testers via Hypercube Embeddings. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 25:1-25:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17509-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{braverman_et_al:LIPIcs.ITCS.2023.25, author = {Braverman, Mark and Khot, Subhash and Kindler, Guy and Minzer, Dor}, title = {{Improved Monotonicity Testers via Hypercube Embeddings}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {25:1--25:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.25}, URN = {urn:nbn:de:0030-drops-175285}, doi = {10.4230/LIPIcs.ITCS.2023.25}, annote = {Keywords: Property Testing, Monotonicity Testing, Isoperimetric Inequalities} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17509-input">@InProceedings{braverman_et_al:LIPIcs.ITCS.2023.25, author = {Braverman, Mark and Khot, Subhash and Kindler, Guy and Minzer, Dor}, title = {{Improved Monotonicity Testers via Hypercube Embeddings}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {25:1--25:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.25}, URN = {urn:nbn:de:0030-drops-175285}, doi = {10.4230/LIPIcs.ITCS.2023.25}, annote = {Keywords: Property Testing, Monotonicity Testing, Isoperimetric Inequalities} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.26"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.26">DOI: 10.4230/LIPIcs.ITCS.2023.26</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.26/LIPIcs.ITCS.2023.26.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.26" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17510" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17510" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.26" data-bs-toggle="tooltip" data-title="Rounding via Low Dimensional Embeddings" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Braverman, Mark"></span> <span data-key="dagstuhl.contributor.author" data-value="Minzer, Dor"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Discrete optimization"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.26"> Rounding via Low Dimensional Embeddings </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Mark Braverman and Dor Minzer </p> <div class="row"> <div class="collapse" id="abstract-17510"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17510">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A regular graph G = (V,E) is an (ε,γ) small-set expander if for any set of vertices of fractional size at most ε, at least γ of the edges that are adjacent to it go outside. In this paper, we give a unified approach to several known complexity-theoretic results on small-set expanders. In particular, we show: 1) Max-Cut: we show that if a regular graph G = (V,E) is an (ε,γ) small-set expander that contains a cut of fractional size at least 1-δ, then one can find in G a cut of fractional size at least 1-O(δ/(εγ⁶)) in polynomial time. 2) Improved spectral partitioning, Cheeger’s inequality and the parallel repetition theorem over small-set expanders. The general form of each one of these results involves square-root loss that comes from certain rounding procedure, and we show how this can be avoided over small set expanders. Our main idea is to project a high dimensional vector solution into a low-dimensional space while roughly maintaining 𝓁₂² distances, and then perform a pre-processing step using low-dimensional geometry and the properties of 𝓁₂² distances over it. This pre-processing leverages the small-set expansion property of the graph to transform a vector valued solution to a different vector valued solution with additional structural properties, which give rise to more efficient integral-solution rounding schemes. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17510"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17510">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Mark Braverman and Dor Minzer. Rounding via Low Dimensional Embeddings. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 26:1-26:30, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17510-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{braverman_et_al:LIPIcs.ITCS.2023.26, author = {Braverman, Mark and Minzer, Dor}, title = {{Rounding via Low Dimensional Embeddings}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {26:1--26:30}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.26}, URN = {urn:nbn:de:0030-drops-175291}, doi = {10.4230/LIPIcs.ITCS.2023.26}, annote = {Keywords: Parallel Repetition, Small Set Expanders, Semi-Definite Programs} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17510-input">@InProceedings{braverman_et_al:LIPIcs.ITCS.2023.26, author = {Braverman, Mark and Minzer, Dor}, title = {{Rounding via Low Dimensional Embeddings}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {26:1--26:30}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.26}, URN = {urn:nbn:de:0030-drops-175291}, doi = {10.4230/LIPIcs.ITCS.2023.26}, annote = {Keywords: Parallel Repetition, Small Set Expanders, Semi-Definite Programs} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.27"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.27">DOI: 10.4230/LIPIcs.ITCS.2023.27</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.27/LIPIcs.ITCS.2023.27.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.27" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17511" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17511" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.27" data-bs-toggle="tooltip" data-title="Counting Subgraphs in Somewhere Dense Graphs" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Bressan, Marco"></span> <span data-key="dagstuhl.contributor.author" data-value="Goldberg, Leslie Ann"></span> <span data-key="dagstuhl.contributor.author" data-value="Meeks, Kitty"></span> <span data-key="dagstuhl.contributor.author" data-value="Roth, Marc"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Graph theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.27"> Counting Subgraphs in Somewhere Dense Graphs </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Marco Bressan, Leslie Ann Goldberg, Kitty Meeks, and Marc Roth </p> <div class="row"> <div class="collapse" id="abstract-17511"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17511">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the problems of counting copies and induced copies of a small pattern graph H in a large host graph G. Recent work fully classified the complexity of those problems according to structural restrictions on the patterns H. In this work, we address the more challenging task of analysing the complexity for restricted patterns and restricted hosts. Specifically we ask which families of allowed patterns and hosts imply fixed-parameter tractability, i.e., the existence of an algorithm running in time f(H)⋅|G|^O(1) for some computable function f. Our main results present exhaustive and explicit complexity classifications for families that satisfy natural closure properties. Among others, we identify the problems of counting small matchings and independent sets in subgraph-closed graph classes 𝒢 as our central objects of study and establish the following crisp dichotomies as consequences of the Exponential Time Hypothesis: - Counting k-matchings in a graph G ∈ 𝒢 is fixed-parameter tractable if and only if 𝒢 is nowhere dense. - Counting k-independent sets in a graph G ∈ 𝒢 is fixed-parameter tractable if and only if 𝒢 is nowhere dense. Moreover, we obtain almost tight conditional lower bounds if 𝒢 is somewhere dense, i.e., not nowhere dense. These base cases of our classifications subsume a wide variety of previous results on the matching and independent set problem, such as counting k-matchings in bipartite graphs (Curticapean, Marx; FOCS 14), in F-colourable graphs (Roth, Wellnitz; SODA 20), and in degenerate graphs (Bressan, Roth; FOCS 21), as well as counting k-independent sets in bipartite graphs (Curticapean et al.; Algorithmica 19). At the same time our proofs are much simpler: using structural characterisations of somewhere dense graphs, we show that a colourful version of a recent breakthrough technique for analysing pattern counting problems (Curticapean, Dell, Marx; STOC 17) applies to any subgraph-closed somewhere dense class of graphs, yielding a unified view of our current understanding of the complexity of subgraph counting. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17511"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17511">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Marco Bressan, Leslie Ann Goldberg, Kitty Meeks, and Marc Roth. Counting Subgraphs in Somewhere Dense Graphs. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 27:1-27:14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17511-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{bressan_et_al:LIPIcs.ITCS.2023.27, author = {Bressan, Marco and Goldberg, Leslie Ann and Meeks, Kitty and Roth, Marc}, title = {{Counting Subgraphs in Somewhere Dense Graphs}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {27:1--27:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.27}, URN = {urn:nbn:de:0030-drops-175304}, doi = {10.4230/LIPIcs.ITCS.2023.27}, annote = {Keywords: counting problems, somewhere dense graphs, parameterised complexity theory} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17511-input">@InProceedings{bressan_et_al:LIPIcs.ITCS.2023.27, author = {Bressan, Marco and Goldberg, Leslie Ann and Meeks, Kitty and Roth, Marc}, title = {{Counting Subgraphs in Somewhere Dense Graphs}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {27:1--27:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.27}, URN = {urn:nbn:de:0030-drops-175304}, doi = {10.4230/LIPIcs.ITCS.2023.27}, annote = {Keywords: counting problems, somewhere dense graphs, parameterised complexity theory} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.28"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.28">DOI: 10.4230/LIPIcs.ITCS.2023.28</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.28/LIPIcs.ITCS.2023.28.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.28" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17512" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17512" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.28" data-bs-toggle="tooltip" data-title="Rigidity for Monogamy-Of-Entanglement Games" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Broadbent, Anne"></span> <span data-key="dagstuhl.contributor.author" data-value="Culf, Eric"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum computation theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Mathematical foundations of cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.28"> Rigidity for Monogamy-Of-Entanglement Games </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Anne Broadbent and Eric Culf </p> <div class="row"> <div class="collapse" id="abstract-17512"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17512">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In a monogamy-of-entanglement (MoE) game, two players who do not communicate try to simultaneously guess a referee’s measurement outcome on a shared quantum state they prepared. We study the prototypical example of a game where the referee measures in either the computational or Hadamard basis and informs the players of her choice. We show that this game satisfies a rigidity property similar to what is known for some nonlocal games. That is, in order to win optimally, the players' strategy must be of a specific form, namely a convex combination of four unentangled optimal strategies generated by the Breidbart state. We extend this to show that strategies that win near-optimally must also be near an optimal state of this form. We also show rigidity for multiple copies of the game played in parallel. We give three applications: (1) We construct for the first time a weak string erasure (WSE) scheme where the security does not rely on limitations on the parties' hardware. Instead, we add a prover, which enables security via the rigidity of this MoE game. (2) We show that the WSE scheme can be used to achieve bit commitment in a model where it is impossible classically. (3) We achieve everlasting-secure randomness expansion in the model of trusted but leaky measurement and untrusted preparation and measurements by two isolated devices, while relying only on the temporary assumption of pseudorandom functions. This achieves randomness expansion without the need for shared entanglement. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17512"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17512">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Anne Broadbent and Eric Culf. Rigidity for Monogamy-Of-Entanglement Games. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 28:1-28:29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17512-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{broadbent_et_al:LIPIcs.ITCS.2023.28, author = {Broadbent, Anne and Culf, Eric}, title = {{Rigidity for Monogamy-Of-Entanglement Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {28:1--28:29}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.28}, URN = {urn:nbn:de:0030-drops-175319}, doi = {10.4230/LIPIcs.ITCS.2023.28}, annote = {Keywords: Rigidity, Self-Testing Monogamy-of-Entanglement Games, Bit Commitment, Randomness Expansion} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17512-input">@InProceedings{broadbent_et_al:LIPIcs.ITCS.2023.28, author = {Broadbent, Anne and Culf, Eric}, title = {{Rigidity for Monogamy-Of-Entanglement Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {28:1--28:29}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.28}, URN = {urn:nbn:de:0030-drops-175319}, doi = {10.4230/LIPIcs.ITCS.2023.28}, annote = {Keywords: Rigidity, Self-Testing Monogamy-of-Entanglement Games, Bit Commitment, Randomness Expansion} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.29"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.29">DOI: 10.4230/LIPIcs.ITCS.2023.29</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.29/LIPIcs.ITCS.2023.29.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.29" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17513" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17513" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.29" data-bs-toggle="tooltip" data-title="Quantum Majority Vote" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Buhrman, Harry"></span> <span data-key="dagstuhl.contributor.author" data-value="Linden, Noah"></span> <span data-key="dagstuhl.contributor.author" data-value="Mančinska, Laura"></span> <span data-key="dagstuhl.contributor.author" data-value="Montanaro, Ashley"></span> <span data-key="dagstuhl.contributor.author" data-value="Ozols, Maris"></span> <span data-key="dagstuhl.subject.classification" data-value="Computer systems organization → Quantum computing"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.29"> Quantum Majority Vote </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Harry Buhrman, Noah Linden, Laura Mančinska, Ashley Montanaro, and Maris Ozols </p> <div class="row"> <div class="collapse" id="abstract-17513"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17513">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Majority vote is a basic method for amplifying correct outcomes that is widely used in computer science and beyond. While it can amplify the correctness of a quantum device with classical output, the analogous procedure for quantum output is not known. We introduce quantum majority vote as the following task: given a product state |ψ_1⟩ ⊗ … ⊗ |ψ_n⟩ where each qubit is in one of two orthogonal states |ψ⟩ or |ψ^⟂⟩, output the majority state. We show that an optimal algorithm for this problem achieves worst-case fidelity of 1/2 + Θ(1/√n). Under the promise that at least 2/3 of the input qubits are in the majority state, the fidelity increases to 1 - Θ(1/n) and approaches 1 as n increases. We also consider the more general problem of computing any symmetric and equivariant Boolean function f: {0,1}ⁿ → {0,1} in an unknown quantum basis, and show that a generalization of our quantum majority vote algorithm is optimal for this task. The optimal parameters for the generalized algorithm and its worst-case fidelity can be determined by a simple linear program of size O(n). The time complexity of the algorithm is O(n⁴ log n) where n is the number of input qubits. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17513"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17513">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Harry Buhrman, Noah Linden, Laura Mančinska, Ashley Montanaro, and Maris Ozols. Quantum Majority Vote. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, p. 29:1, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17513-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{buhrman_et_al:LIPIcs.ITCS.2023.29, author = {Buhrman, Harry and Linden, Noah and Man\v{c}inska, Laura and Montanaro, Ashley and Ozols, Maris}, title = {{Quantum Majority Vote}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {29:1--29:1}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.29}, URN = {urn:nbn:de:0030-drops-175321}, doi = {10.4230/LIPIcs.ITCS.2023.29}, annote = {Keywords: quantum algorithms, quantum majority vote, Schur-Weyl duality} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17513-input">@InProceedings{buhrman_et_al:LIPIcs.ITCS.2023.29, author = {Buhrman, Harry and Linden, Noah and Man\v{c}inska, Laura and Montanaro, Ashley and Ozols, Maris}, title = {{Quantum Majority Vote}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {29:1--29:1}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.29}, URN = {urn:nbn:de:0030-drops-175321}, doi = {10.4230/LIPIcs.ITCS.2023.29}, annote = {Keywords: quantum algorithms, quantum majority vote, Schur-Weyl duality} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.30"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.30">DOI: 10.4230/LIPIcs.ITCS.2023.30</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.30/LIPIcs.ITCS.2023.30.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.30" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17514" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17514" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.30" data-bs-toggle="tooltip" data-title="TFNP Characterizations of Proof Systems and Monotone Circuits" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Buss, Sam"></span> <span data-key="dagstuhl.contributor.author" data-value="Fleming, Noah"></span> <span data-key="dagstuhl.contributor.author" data-value="Impagliazzo, Russell"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Proof complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.30"> TFNP Characterizations of Proof Systems and Monotone Circuits </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Sam Buss, Noah Fleming, and Russell Impagliazzo </p> <div class="row"> <div class="collapse" id="abstract-17514"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17514">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Connections between proof complexity and circuit complexity have become major tools for obtaining lower bounds in both areas. These connections - which take the form of interpolation theorems and query-to-communication lifting theorems - translate efficient proofs into small circuits, and vice versa, allowing tools from one area to be applied to the other. Recently, the theory of TFNP has emerged as a unifying framework underlying these connections. For many of the proof systems which admit such a connection there is a TFNP problem which characterizes it: the class of problems which are reducible to this TFNP problem via query-efficient reductions is equivalent to the tautologies that can be efficiently proven in the system. Through this, proof complexity has become a major tool for proving separations in black-box TFNP. Similarly, for certain monotone circuit models, the class of functions that it can compute efficiently is equivalent to what can be reduced to a certain TFNP problem in a communication-efficient manner. When a TFNP problem has both a proof and circuit characterization, one can prove an interpolation theorem. Conversely, many lifting theorems can be viewed as relating the communication and query reductions to TFNP problems. This is exciting, as it suggests that TFNP provides a roadmap for the development of further interpolation theorems and lifting theorems. In this paper we begin to develop a more systematic understanding of when these connections to TFNP occur. We give exact conditions under which a proof system or circuit model admits a characterization by a TFNP problem. We show: - Every well-behaved proof system which can prove its own soundness (a reflection principle) is characterized by a TFNP problem. Conversely, every TFNP problem gives rise to a well-behaved proof system which proves its own soundness. - Every well-behaved monotone circuit model which admits a universal family of functions is characterized by a TFNP problem. Conversely, every TFNP problem gives rise to a well-behaved monotone circuit model with a universal problem. As an example, we provide a TFNP characterization of the Polynomial Calculus, answering a question from [Mika Göös et al., 2022], and show that it can prove its own soundness. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17514"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17514">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Sam Buss, Noah Fleming, and Russell Impagliazzo. TFNP Characterizations of Proof Systems and Monotone Circuits. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 30:1-30:40, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17514-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{buss_et_al:LIPIcs.ITCS.2023.30, author = {Buss, Sam and Fleming, Noah and Impagliazzo, Russell}, title = {{TFNP Characterizations of Proof Systems and Monotone Circuits}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {30:1--30:40}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.30}, URN = {urn:nbn:de:0030-drops-175332}, doi = {10.4230/LIPIcs.ITCS.2023.30}, annote = {Keywords: Proof Complexity, Circuit Complexity, TFNP} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17514-input">@InProceedings{buss_et_al:LIPIcs.ITCS.2023.30, author = {Buss, Sam and Fleming, Noah and Impagliazzo, Russell}, title = {{TFNP Characterizations of Proof Systems and Monotone Circuits}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {30:1--30:40}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.30}, URN = {urn:nbn:de:0030-drops-175332}, doi = {10.4230/LIPIcs.ITCS.2023.30}, annote = {Keywords: Proof Complexity, Circuit Complexity, TFNP} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.31"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.31">DOI: 10.4230/LIPIcs.ITCS.2023.31</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.31/LIPIcs.ITCS.2023.31.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.31" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17515" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17515" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.31" data-bs-toggle="tooltip" data-title="Clustering Permutations: New Techniques with Streaming Applications" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chakraborty, Diptarka"></span> <span data-key="dagstuhl.contributor.author" data-value="Das, Debarati"></span> <span data-key="dagstuhl.contributor.author" data-value="Krauthgamer, Robert"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Facility location and clustering"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.31"> Clustering Permutations: New Techniques with Streaming Applications </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Diptarka Chakraborty, Debarati Das, and Robert Krauthgamer </p> <div class="row"> <div class="collapse" id="abstract-17515"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17515">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the classical metric k-median clustering problem over a set of input rankings (i.e., permutations), which has myriad applications, from social-choice theory to web search and databases. A folklore algorithm provides a 2-approximate solution in polynomial time for all k = O(1), and works irrespective of the underlying distance measure, so long it is a metric; however, going below the 2-factor is a notorious challenge. We consider the Ulam distance, a variant of the well-known edit-distance metric, where strings are restricted to be permutations. For this metric, Chakraborty, Das, and Krauthgamer [SODA, 2021] provided a (2-δ)-approximation algorithm for k = 1, where δ≈ 2^{-40}. Our primary contribution is a new algorithmic framework for clustering a set of permutations. Our first result is a 1.999-approximation algorithm for the metric k-median problem under the Ulam metric, that runs in time (k log (nd))^{O(k)} nd³ for an input consisting of n permutations over [d]. In fact, our framework is powerful enough to extend this result to the streaming model (where the n input permutations arrive one by one) using only polylogarithmic (in n) space. Additionally, we show that similar results can be obtained even in the presence of outliers, which is presumably a more difficult problem. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17515"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17515">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Diptarka Chakraborty, Debarati Das, and Robert Krauthgamer. Clustering Permutations: New Techniques with Streaming Applications. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 31:1-31:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17515-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chakraborty_et_al:LIPIcs.ITCS.2023.31, author = {Chakraborty, Diptarka and Das, Debarati and Krauthgamer, Robert}, title = {{Clustering Permutations: New Techniques with Streaming Applications}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {31:1--31:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.31}, URN = {urn:nbn:de:0030-drops-175340}, doi = {10.4230/LIPIcs.ITCS.2023.31}, annote = {Keywords: Clustering, Approximation Algorithms, Ulam Distance, Rank Aggregation, Streaming} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17515-input">@InProceedings{chakraborty_et_al:LIPIcs.ITCS.2023.31, author = {Chakraborty, Diptarka and Das, Debarati and Krauthgamer, Robert}, title = {{Clustering Permutations: New Techniques with Streaming Applications}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {31:1--31:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.31}, URN = {urn:nbn:de:0030-drops-175340}, doi = {10.4230/LIPIcs.ITCS.2023.31}, annote = {Keywords: Clustering, Approximation Algorithms, Ulam Distance, Rank Aggregation, Streaming} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.32"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.32">DOI: 10.4230/LIPIcs.ITCS.2023.32</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.32/LIPIcs.ITCS.2023.32.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.32" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17516" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17516" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.32" data-bs-toggle="tooltip" data-title="Certificate Games" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chakraborty, Sourav"></span> <span data-key="dagstuhl.contributor.author" data-value="Gál, Anna"></span> <span data-key="dagstuhl.contributor.author" data-value="Laplante, Sophie"></span> <span data-key="dagstuhl.contributor.author" data-value="Mittal, Rajat"></span> <span data-key="dagstuhl.contributor.author" data-value="Sunny, Anupa"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum query complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.32"> Certificate Games </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Sourav Chakraborty, Anna Gál, Sophie Laplante, Rajat Mittal, and Anupa Sunny </p> <div class="row"> <div class="collapse" id="abstract-17516"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17516">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We introduce and study Certificate Game complexity, a measure of complexity based on the probability of winning a game where two players are given inputs with different function values and are asked to output some index i such that x_i≠ y_i, in a zero-communication setting. We give upper and lower bounds for private coin, public coin, shared entanglement and non-signaling strategies, and give some separations. We show that complexity in the public coin model is upper bounded by Randomized query and Certificate complexity. On the other hand, it is lower bounded by fractional and randomized certificate complexity, making it a good candidate to prove strong lower bounds on randomized query complexity. Complexity in the private coin model is bounded from below by zero-error randomized query complexity. The quantum measure highlights an interesting and surprising difference between classical and quantum query models. Whereas the public coin certificate game complexity is bounded from above by randomized query complexity, the quantum certificate game complexity can be quadratically larger than quantum query complexity. We use non-signaling, a notion from quantum information, to give a lower bound of n on the quantum certificate game complexity of the OR function, whose quantum query complexity is Θ(√n), then go on to show that this "non-signaling bottleneck" applies to all functions with high sensitivity, block sensitivity or fractional block sensitivity. We also consider the single-bit version of certificate games, where the inputs of the two players are restricted to having Hamming distance 1. We prove that the single-bit version of certificate game complexity with shared randomness is equal to sensitivity up to constant factors, thus giving a new characterization of sensitivity. On the other hand, the single-bit version of certificate game complexity with private randomness is equal to λ², where λ is the spectral sensitivity. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17516"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17516">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Sourav Chakraborty, Anna Gál, Sophie Laplante, Rajat Mittal, and Anupa Sunny. Certificate Games. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 32:1-32:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17516-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chakraborty_et_al:LIPIcs.ITCS.2023.32, author = {Chakraborty, Sourav and G\'{a}l, Anna and Laplante, Sophie and Mittal, Rajat and Sunny, Anupa}, title = {{Certificate Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {32:1--32:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.32}, URN = {urn:nbn:de:0030-drops-175353}, doi = {10.4230/LIPIcs.ITCS.2023.32}, annote = {Keywords: block sensitivity, boolean function complexity, certificate complexity, query complexity, sensitivity, zero-communication two-player games} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17516-input">@InProceedings{chakraborty_et_al:LIPIcs.ITCS.2023.32, author = {Chakraborty, Sourav and G\'{a}l, Anna and Laplante, Sophie and Mittal, Rajat and Sunny, Anupa}, title = {{Certificate Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {32:1--32:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.32}, URN = {urn:nbn:de:0030-drops-175353}, doi = {10.4230/LIPIcs.ITCS.2023.32}, annote = {Keywords: block sensitivity, boolean function complexity, certificate complexity, query complexity, sensitivity, zero-communication two-player games} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.33"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.33">DOI: 10.4230/LIPIcs.ITCS.2023.33</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.33/LIPIcs.ITCS.2023.33.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.33" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17517" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17517" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.33" data-bs-toggle="tooltip" data-title="Lifting to Parity Decision Trees via Stifling" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chattopadhyay, Arkadev"></span> <span data-key="dagstuhl.contributor.author" data-value="Mande, Nikhil S."></span> <span data-key="dagstuhl.contributor.author" data-value="Sanyal, Swagato"></span> <span data-key="dagstuhl.contributor.author" data-value="Sherif, Suhail"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Oracles and decision trees"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.33"> Lifting to Parity Decision Trees via Stifling </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Arkadev Chattopadhyay, Nikhil S. Mande, Swagato Sanyal, and Suhail Sherif </p> <div class="row"> <div class="collapse" id="abstract-17517"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17517">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We show that the deterministic decision tree complexity of a (partial) function or relation f lifts to the deterministic parity decision tree (PDT) size complexity of the composed function/relation f∘g as long as the gadget g satisfies a property that we call stifling. We observe that several simple gadgets of constant size, like Indexing on 3 input bits, Inner Product on 4 input bits, Majority on 3 input bits and random functions, satisfy this property. It can be shown that existing randomized communication lifting theorems ([Göös, Pitassi, Watson. SICOMP'20], [Chattopadhyay et al. SICOMP'21]) imply PDT-size lifting. However there are two shortcomings of this approach: first they lift randomized decision tree complexity of f, which could be exponentially smaller than its deterministic counterpart when either f is a partial function or even a total search problem. Second, the size of the gadgets in such lifting theorems are as large as logarithmic in the size of the input to f. Reducing the gadget size to a constant is an important open problem at the frontier of current research. Our result shows that even a random constant-size gadget does enable lifting to PDT size. Further, it also yields the first systematic way of turning lower bounds on the width of tree-like resolution proofs of the unsatisfiability of constant-width CNF formulas to lower bounds on the size of tree-like proofs in the resolution with parity system, i.e., Res(⊕), of the unsatisfiability of closely related constant-width CNF formulas. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17517"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17517">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Arkadev Chattopadhyay, Nikhil S. Mande, Swagato Sanyal, and Suhail Sherif. Lifting to Parity Decision Trees via Stifling. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 33:1-33:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17517-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chattopadhyay_et_al:LIPIcs.ITCS.2023.33, author = {Chattopadhyay, Arkadev and Mande, Nikhil S. and Sanyal, Swagato and Sherif, Suhail}, title = {{Lifting to Parity Decision Trees via Stifling}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {33:1--33:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.33}, URN = {urn:nbn:de:0030-drops-175362}, doi = {10.4230/LIPIcs.ITCS.2023.33}, annote = {Keywords: Decision trees, parity decision trees, lifting theorems} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17517-input">@InProceedings{chattopadhyay_et_al:LIPIcs.ITCS.2023.33, author = {Chattopadhyay, Arkadev and Mande, Nikhil S. and Sanyal, Swagato and Sherif, Suhail}, title = {{Lifting to Parity Decision Trees via Stifling}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {33:1--33:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.33}, URN = {urn:nbn:de:0030-drops-175362}, doi = {10.4230/LIPIcs.ITCS.2023.33}, annote = {Keywords: Decision trees, parity decision trees, lifting theorems} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.34"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.34">DOI: 10.4230/LIPIcs.ITCS.2023.34</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.34/LIPIcs.ITCS.2023.34.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.34" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17518" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17518" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.34" data-bs-toggle="tooltip" data-title="New Lower Bounds and Derandomization for ACC, and a Derandomization-Centric View on the Algorithmic Method" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chen, Lijie"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.34"> New Lower Bounds and Derandomization for ACC, and a Derandomization-Centric View on the Algorithmic Method </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Lijie Chen </p> <div class="row"> <div class="collapse" id="abstract-17518"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17518">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this paper, we obtain several new results on lower bounds and derandomization for ACC⁰ circuits (constant-depth circuits consisting of AND/OR/MOD_m gates for a fixed constant m, a frontier class in circuit complexity): 1) We prove that any polynomial-time Merlin-Arthur proof system with an ACC⁰ verifier (denoted by MA_{ACC⁰}) can be simulated by a nondeterministic proof system with quasi-polynomial running time and polynomial proof length, on infinitely many input lengths. This improves the previous simulation by [Chen, Lyu, and Williams, FOCS 2020], which requires both quasi-polynomial running time and proof length. 2) We show that MA_{ACC⁰} cannot be computed by fixed-polynomial-size ACC⁰ circuits, and our hard languages are hard on a sufficiently dense set of input lengths. 3) We show that NEXP (nondeterministic exponential-time) does not have ACC⁰ circuits of sub-half-exponential size, improving the previous sub-third-exponential size lower bound for NEXP against ACC⁰ by [Williams, J. ACM 2014]. Combining our first and second results gives a conceptually simpler and derandomization-centric proof of the recent breakthrough result NQP := NTIME[2^polylog(n)] ̸ ⊂ ACC⁰ by [Murray and Williams, SICOMP 2020]: Instead of going through an easy witness lemma as they did, we first prove an ACC⁰ lower bound for a subclass of MA, and then derandomize that subclass into NQP, while retaining its hardness against ACC⁰. Moreover, since our derandomization of MA_{ACC⁰} achieves a polynomial proof length, we indeed prove that nondeterministic quasi-polynomial-time with n^ω(1) nondeterminism bits (denoted as NTIMEGUESS[2^polylog(n), n^ω(1)]) has no poly(n)-size ACC⁰ circuits, giving a new proof of a result by Vyas. Combining with a win-win argument based on randomized encodings from [Chen and Ren, STOC 2020], we also prove that NTIMEGUESS[2^polylog(n), n^ω(1)] cannot be 1/2+1/poly(n)-approximated by poly(n)-size ACC⁰ circuits, improving the recent strongly average-case lower bounds for NQP against ACC⁰ by [Chen and Ren, STOC 2020]. One interesting technical ingredient behind our second result is the construction of a PSPACE-complete language that is paddable, downward self-reducible, same-length checkable, and weakly error correctable. Moreover, all its reducibility properties have corresponding AC⁰[2] non-adaptive oracle circuits. Our construction builds and improves upon similar constructions from [Trevisan and Vadhan, Complexity 2007] and [Chen, FOCS 2019], which all require at least TC⁰ oracle circuits for implementing these properties. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17518"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17518">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Lijie Chen. New Lower Bounds and Derandomization for ACC, and a Derandomization-Centric View on the Algorithmic Method. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 34:1-34:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17518-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chen:LIPIcs.ITCS.2023.34, author = {Chen, Lijie}, title = {{New Lower Bounds and Derandomization for ACC, and a Derandomization-Centric View on the Algorithmic Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {34:1--34:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.34}, URN = {urn:nbn:de:0030-drops-175373}, doi = {10.4230/LIPIcs.ITCS.2023.34}, annote = {Keywords: Circuit Lower Bounds, Derandomization, Algorithmic Method, ACC} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17518-input">@InProceedings{chen:LIPIcs.ITCS.2023.34, author = {Chen, Lijie}, title = {{New Lower Bounds and Derandomization for ACC, and a Derandomization-Centric View on the Algorithmic Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {34:1--34:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.34}, URN = {urn:nbn:de:0030-drops-175373}, doi = {10.4230/LIPIcs.ITCS.2023.34}, annote = {Keywords: Circuit Lower Bounds, Derandomization, Algorithmic Method, ACC} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.35"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.35">DOI: 10.4230/LIPIcs.ITCS.2023.35</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.35/LIPIcs.ITCS.2023.35.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.35" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17519" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17519" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.35" data-bs-toggle="tooltip" data-title="Black-Box Constructive Proofs Are Unavoidable" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chen, Lijie"></span> <span data-key="dagstuhl.contributor.author" data-value="Williams, Ryan"></span> <span data-key="dagstuhl.contributor.author" data-value="Yang, Tianqi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.35"> Black-Box Constructive Proofs Are Unavoidable </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Lijie Chen, Ryan Williams, and Tianqi Yang </p> <div class="row"> <div class="collapse" id="abstract-17519"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17519">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Following Razborov and Rudich, a "natural property" for proving a circuit lower bound satisfies three axioms: constructivity, largeness, and usefulness. In 2013, Williams proved that for any reasonable circuit class C, NEXP ⊂ C is equivalent to the existence of a constructive property useful against C. Here, a property is constructive if it can be decided in poly(N) time, where N = 2ⁿ is the length of the truth-table of the given n-input function. Recently, Fan, Li, and Yang initiated the study of black-box natural properties, which require a much stronger notion of constructivity, called black-box constructivity: the property should be decidable in randomized polylog(N) time, given oracle access to the n-input function. They showed that most proofs based on random restrictions yield black-box natural properties, and demonstrated limitations on what black-box natural properties can prove. In this paper, perhaps surprisingly, we prove that the equivalence of Williams holds even with this stronger notion of black-box constructivity: for any reasonable circuit class C, NEXP ⊂ C is equivalent to the existence of a black-box constructive property useful against C. The main technical ingredient in proving this equivalence is a smooth, strong, and locally-decodable probabilistically checkable proof (PCP), which we construct based on a recent work by Paradise. As a by-product, we show that average-case witness lower bounds for PCP verifiers follow from NEXP lower bounds. We also show that randomness is essential in the definition of black-box constructivity: we unconditionally prove that there is no deterministic polylog(N)-time constructive property that is useful against even polynomial-size AC⁰ circuits. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17519"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17519">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Lijie Chen, Ryan Williams, and Tianqi Yang. Black-Box Constructive Proofs Are Unavoidable. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 35:1-35:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17519-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chen_et_al:LIPIcs.ITCS.2023.35, author = {Chen, Lijie and Williams, Ryan and Yang, Tianqi}, title = {{Black-Box Constructive Proofs Are Unavoidable}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {35:1--35:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.35}, URN = {urn:nbn:de:0030-drops-175380}, doi = {10.4230/LIPIcs.ITCS.2023.35}, annote = {Keywords: Circuit lower bounds, natural proofs, probabilistic checkable proofs} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17519-input">@InProceedings{chen_et_al:LIPIcs.ITCS.2023.35, author = {Chen, Lijie and Williams, Ryan and Yang, Tianqi}, title = {{Black-Box Constructive Proofs Are Unavoidable}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {35:1--35:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.35}, URN = {urn:nbn:de:0030-drops-175380}, doi = {10.4230/LIPIcs.ITCS.2023.35}, annote = {Keywords: Circuit lower bounds, natural proofs, probabilistic checkable proofs} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.36"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.36">DOI: 10.4230/LIPIcs.ITCS.2023.36</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.36/LIPIcs.ITCS.2023.36.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.36" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17520" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17520" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.36" data-bs-toggle="tooltip" data-title="Necessary Conditions in Multi-Server Differential Privacy" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Cheu, Albert"></span> <span data-key="dagstuhl.contributor.author" data-value="Yan, Chao"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Information-theoretic techniques"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Probabilistic algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sample complexity and generalization bounds"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Privacy protections"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.36"> Necessary Conditions in Multi-Server Differential Privacy </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Albert Cheu and Chao Yan </p> <div class="row"> <div class="collapse" id="abstract-17520"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17520">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We consider protocols where users communicate with multiple servers to perform a computation on the users' data. An adversary exerts semi-honest control over many of the parties but its view is differentially private with respect to honest users. Prior work described protocols that required multiple rounds of interaction or offered privacy against a computationally bounded adversary. Our work presents limitations of non-interactive protocols that offer privacy against unbounded adversaries. We prove that these protocols require exponentially more samples than centrally private counterparts to solve some learning, testing, and estimation tasks. This means sample-efficiency demands interactivity or computational differential privacy, or both. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17520"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17520">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Albert Cheu and Chao Yan. Necessary Conditions in Multi-Server Differential Privacy. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 36:1-36:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17520-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{cheu_et_al:LIPIcs.ITCS.2023.36, author = {Cheu, Albert and Yan, Chao}, title = {{Necessary Conditions in Multi-Server Differential Privacy}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {36:1--36:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.36}, URN = {urn:nbn:de:0030-drops-175395}, doi = {10.4230/LIPIcs.ITCS.2023.36}, annote = {Keywords: Differential Privacy, Parity Learning, Multi-server} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17520-input">@InProceedings{cheu_et_al:LIPIcs.ITCS.2023.36, author = {Cheu, Albert and Yan, Chao}, title = {{Necessary Conditions in Multi-Server Differential Privacy}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {36:1--36:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.36}, URN = {urn:nbn:de:0030-drops-175395}, doi = {10.4230/LIPIcs.ITCS.2023.36}, annote = {Keywords: Differential Privacy, Parity Learning, Multi-server} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.37"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.37">DOI: 10.4230/LIPIcs.ITCS.2023.37</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.37/LIPIcs.ITCS.2023.37.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.37" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17521" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17521" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.37" data-bs-toggle="tooltip" data-title="Quantum Algorithms and the Power of Forgetting" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Childs, Andrew M."></span> <span data-key="dagstuhl.contributor.author" data-value="Coudron, Matthew"></span> <span data-key="dagstuhl.contributor.author" data-value="Gilani, Amin Shiraz"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum computation theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.37"> Quantum Algorithms and the Power of Forgetting </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Andrew M. Childs, Matthew Coudron, and Amin Shiraz Gilani </p> <div class="row"> <div class="collapse" id="abstract-17521"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17521">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> The so-called welded tree problem provides an example of a black-box problem that can be solved exponentially faster by a quantum walk than by any classical algorithm [Andrew M. Childs et al., 2003]. Given the name of a special entrance vertex, a quantum walk can find another distinguished exit vertex using polynomially many queries, though without finding any particular path from entrance to exit. It has been an open problem for twenty years whether there is an efficient quantum algorithm for finding such a path, or if the path-finding problem is hard even for quantum computers. We show that a natural class of efficient quantum algorithms provably cannot find a path from entrance to exit. Specifically, we consider algorithms that, within each branch of their superposition, always store a set of vertex labels that form a connected subgraph including the entrance, and that only provide these vertex labels as inputs to the oracle. While this does not rule out the possibility of a quantum algorithm that efficiently finds a path, it is unclear how an algorithm could benefit by deviating from this behavior. Our no-go result suggests that, for some problems, quantum algorithms must necessarily forget the path they take to reach a solution in order to outperform classical computation. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17521"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17521">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Andrew M. Childs, Matthew Coudron, and Amin Shiraz Gilani. Quantum Algorithms and the Power of Forgetting. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 37:1-37:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17521-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{childs_et_al:LIPIcs.ITCS.2023.37, author = {Childs, Andrew M. and Coudron, Matthew and Gilani, Amin Shiraz}, title = {{Quantum Algorithms and the Power of Forgetting}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {37:1--37:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.37}, URN = {urn:nbn:de:0030-drops-175408}, doi = {10.4230/LIPIcs.ITCS.2023.37}, annote = {Keywords: Quantum algorithms, quantum query complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17521-input">@InProceedings{childs_et_al:LIPIcs.ITCS.2023.37, author = {Childs, Andrew M. and Coudron, Matthew and Gilani, Amin Shiraz}, title = {{Quantum Algorithms and the Power of Forgetting}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {37:1--37:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.37}, URN = {urn:nbn:de:0030-drops-175408}, doi = {10.4230/LIPIcs.ITCS.2023.37}, annote = {Keywords: Quantum algorithms, quantum query complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.38"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.38">DOI: 10.4230/LIPIcs.ITCS.2023.38</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.38/LIPIcs.ITCS.2023.38.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.38" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17522" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17522" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.38" data-bs-toggle="tooltip" data-title="A New Conjecture on Hardness of 2-CSP’s with Implications to Hardness of Densest k-Subgraph and Other Problems" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Chuzhoy, Julia"></span> <span data-key="dagstuhl.contributor.author" data-value="Dalirrooyfard, Mina"></span> <span data-key="dagstuhl.contributor.author" data-value="Grinberg, Vadim"></span> <span data-key="dagstuhl.contributor.author" data-value="Tan, Zihan"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Approximation algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.38"> A New Conjecture on Hardness of 2-CSP’s with Implications to Hardness of Densest k-Subgraph and Other Problems </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Julia Chuzhoy, Mina Dalirrooyfard, Vadim Grinberg, and Zihan Tan </p> <div class="row"> <div class="collapse" id="abstract-17522"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17522">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We propose a new conjecture on hardness of 2-CSP’s, and show that new hardness of approximation results for Densest k-Subgraph and several other problems, including a graph partitioning problem, and a variation of the Graph Crossing Number problem, follow from this conjecture. The conjecture can be viewed as occupying a middle ground between the d-to-1 conjecture, and hardness results for 2-CSP’s that can be obtained via standard techniques, such as Parallel Repetition combined with standard 2-prover protocols for the 3SAT problem. We hope that this work will motivate further exploration of hardness of 2-CSP’s in the regimes arising from the conjecture. We believe that a positive resolution of the conjecture will provide a good starting point for other hardness of approximation proofs. Another contribution of our work is proving that the problems that we consider are roughly equivalent from the approximation perspective. Some of these problems arose in previous work, from which it appeared that they may be related to each other. We formalize this relationship in this work. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17522"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17522">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Julia Chuzhoy, Mina Dalirrooyfard, Vadim Grinberg, and Zihan Tan. A New Conjecture on Hardness of 2-CSP’s with Implications to Hardness of Densest k-Subgraph and Other Problems. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 38:1-38:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17522-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{chuzhoy_et_al:LIPIcs.ITCS.2023.38, author = {Chuzhoy, Julia and Dalirrooyfard, Mina and Grinberg, Vadim and Tan, Zihan}, title = {{A New Conjecture on Hardness of 2-CSP’s with Implications to Hardness of Densest k-Subgraph and Other Problems}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {38:1--38:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.38}, URN = {urn:nbn:de:0030-drops-175411}, doi = {10.4230/LIPIcs.ITCS.2023.38}, annote = {Keywords: Hardness of Approximation, Densest k-Subgraph} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17522-input">@InProceedings{chuzhoy_et_al:LIPIcs.ITCS.2023.38, author = {Chuzhoy, Julia and Dalirrooyfard, Mina and Grinberg, Vadim and Tan, Zihan}, title = {{A New Conjecture on Hardness of 2-CSP’s with Implications to Hardness of Densest k-Subgraph and Other Problems}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {38:1--38:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.38}, URN = {urn:nbn:de:0030-drops-175411}, doi = {10.4230/LIPIcs.ITCS.2023.38}, annote = {Keywords: Hardness of Approximation, Densest k-Subgraph} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.39"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.39">DOI: 10.4230/LIPIcs.ITCS.2023.39</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.39/LIPIcs.ITCS.2023.39.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.39" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17523" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17523" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.39" data-bs-toggle="tooltip" data-title="Generalized Private Selection and Testing with High Confidence" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Cohen, Edith"></span> <span data-key="dagstuhl.contributor.author" data-value="Lyu, Xin"></span> <span data-key="dagstuhl.contributor.author" data-value="Nelson, Jelani"></span> <span data-key="dagstuhl.contributor.author" data-value="Sarlós, Tamás"></span> <span data-key="dagstuhl.contributor.author" data-value="Stemmer, Uri"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.39"> Generalized Private Selection and Testing with High Confidence </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, and Uri Stemmer </p> <div class="row"> <div class="collapse" id="abstract-17523"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17523">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Composition theorems are general and powerful tools that facilitate privacy accounting across multiple data accesses from per-access privacy bounds. However they often result in weaker bounds compared with end-to-end analysis. Two popular tools that mitigate that are the exponential mechanism (or report noisy max) and the sparse vector technique, generalized in a recent private selection framework by Liu and Talwar (STOC 2019). In this work, we propose a flexible framework of private selection and testing that generalizes the one proposed by Liu and Talwar, supporting a wide range of applications. We apply our framework to solve several fundamental tasks, including query releasing, top-k selection, and stable selection, with improved confidence-accuracy tradeoffs. Additionally, for online settings, we apply our private testing to design a mechanism for adaptive query releasing, which improves the sample complexity dependence on the confidence parameter for the celebrated private multiplicative weights algorithm of Hardt and Rothblum (FOCS 2010). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17523"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17523">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, and Uri Stemmer. Generalized Private Selection and Testing with High Confidence. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 39:1-39:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17523-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{cohen_et_al:LIPIcs.ITCS.2023.39, author = {Cohen, Edith and Lyu, Xin and Nelson, Jelani and Sarl\'{o}s, Tam\'{a}s and Stemmer, Uri}, title = {{Generalized Private Selection and Testing with High Confidence}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {39:1--39:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.39}, URN = {urn:nbn:de:0030-drops-175426}, doi = {10.4230/LIPIcs.ITCS.2023.39}, annote = {Keywords: differential privacy, sparse vector technique, adaptive data analysis} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17523-input">@InProceedings{cohen_et_al:LIPIcs.ITCS.2023.39, author = {Cohen, Edith and Lyu, Xin and Nelson, Jelani and Sarl\'{o}s, Tam\'{a}s and Stemmer, Uri}, title = {{Generalized Private Selection and Testing with High Confidence}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {39:1--39:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.39}, URN = {urn:nbn:de:0030-drops-175426}, doi = {10.4230/LIPIcs.ITCS.2023.39}, annote = {Keywords: differential privacy, sparse vector technique, adaptive data analysis} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.40"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.40">DOI: 10.4230/LIPIcs.ITCS.2023.40</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.40/LIPIcs.ITCS.2023.40.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.40" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17524" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17524" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.40" data-bs-toggle="tooltip" data-title="Exact Completeness of LP Hierarchies for Linear Codes" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Coregliano, Leonardo Nagami"></span> <span data-key="dagstuhl.contributor.author" data-value="Jeronimo, Fernando Granha"></span> <span data-key="dagstuhl.contributor.author" data-value="Jones, Chris"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Coding theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Combinatorial optimization"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.40"> Exact Completeness of LP Hierarchies for Linear Codes </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Leonardo Nagami Coregliano, Fernando Granha Jeronimo, and Chris Jones </p> <div class="row"> <div class="collapse" id="abstract-17524"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17524">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Determining the maximum size A₂(n,d) of a binary code of blocklength n and distance d remains an elusive open question even when restricted to the important class of linear codes. Recently, two linear programming hierarchies extending Delsarte’s LP were independently proposed to upper bound A₂^{Lin}(n,d) (the analogue of A₂(n,d) for linear codes). One of these hierarchies, by the authors, was shown to be approximately complete in the sense that the hierarchy converges to A₂^{Lin}(n,d) as the level grows beyond n². Despite some structural similarities, not even approximate completeness was known for the other hierarchy by Loyfer and Linial. In this work, we prove that both hierarchies recover the exact value of A₂^{Lin}(n,d) at level n. We also prove that at this level the polytope of Loyfer and Linial is integral. Even though these hierarchies seem less powerful than general hierarchies such as Sum-of-Squares, we show that they have enough structure to yield exact completeness via pseudoprobabilities. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17524"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17524">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Leonardo Nagami Coregliano, Fernando Granha Jeronimo, and Chris Jones. Exact Completeness of LP Hierarchies for Linear Codes. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 40:1-40:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17524-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{coregliano_et_al:LIPIcs.ITCS.2023.40, author = {Coregliano, Leonardo Nagami and Jeronimo, Fernando Granha and Jones, Chris}, title = {{Exact Completeness of LP Hierarchies for Linear Codes}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {40:1--40:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.40}, URN = {urn:nbn:de:0030-drops-175433}, doi = {10.4230/LIPIcs.ITCS.2023.40}, annote = {Keywords: LP bound, linear codes, Delsarte’s LP, combinatorial polytopes, pseudoexpectation} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17524-input">@InProceedings{coregliano_et_al:LIPIcs.ITCS.2023.40, author = {Coregliano, Leonardo Nagami and Jeronimo, Fernando Granha and Jones, Chris}, title = {{Exact Completeness of LP Hierarchies for Linear Codes}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {40:1--40:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.40}, URN = {urn:nbn:de:0030-drops-175433}, doi = {10.4230/LIPIcs.ITCS.2023.40}, annote = {Keywords: LP bound, linear codes, Delsarte’s LP, combinatorial polytopes, pseudoexpectation} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.41"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.41">DOI: 10.4230/LIPIcs.ITCS.2023.41</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.41/LIPIcs.ITCS.2023.41.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.41" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17525" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17525" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.41" data-bs-toggle="tooltip" data-title="HappyMap : A Generalized Multicalibration Method" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Deng, Zhun"></span> <span data-key="dagstuhl.contributor.author" data-value="Dwork, Cynthia"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhang, Linjun"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory and algorithms for application domains"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.41"> HappyMap : A Generalized Multicalibration Method </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Zhun Deng, Cynthia Dwork, and Linjun Zhang </p> <div class="row"> <div class="collapse" id="abstract-17525"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17525">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Multicalibration is a powerful and evolving concept originating in the field of algorithmic fairness. For a predictor f that estimates the outcome y given covariates x, and for a function class C, multi-calibration requires that the predictor f(x) and outcome y are indistinguishable under the class of auditors in C. Fairness is captured by incorporating demographic subgroups into the class of functions C. Recent work has shown that, by enriching the class C to incorporate appropriate propensity re-weighting functions, multi-calibration also yields target-independent learning, wherein a model trained on a source domain performs well on unseen, future, target domains {(approximately) captured by the re-weightings.} Formally, multicalibration with respect to C bounds |𝔼_{(x,y)∼D}[c(f(x),x)⋅(f(x)-y)]| for all c ∈ C. In this work, we view the term (f(x)-y) as just one specific mapping, and explore the power of an enriched class of mappings. We propose s-Happy Multicalibration, a generalization of multi-calibration, which yields a wide range of new applications, including a new fairness notion for uncertainty quantification, a novel technique for conformal prediction under covariate shift, and a different approach to analyzing missing data, while also yielding a unified understanding of several existing seemingly disparate algorithmic fairness notions and target-independent learning approaches. We give a single HappyMap meta-algorithm that captures all these results, together with a sufficiency condition for its success. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17525"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17525">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Zhun Deng, Cynthia Dwork, and Linjun Zhang. HappyMap : A Generalized Multicalibration Method. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 41:1-41:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17525-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{deng_et_al:LIPIcs.ITCS.2023.41, author = {Deng, Zhun and Dwork, Cynthia and Zhang, Linjun}, title = {{HappyMap : A Generalized Multicalibration Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {41:1--41:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.41}, URN = {urn:nbn:de:0030-drops-175449}, doi = {10.4230/LIPIcs.ITCS.2023.41}, annote = {Keywords: algorithmic fairness, target-independent learning, transfer learning} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17525-input">@InProceedings{deng_et_al:LIPIcs.ITCS.2023.41, author = {Deng, Zhun and Dwork, Cynthia and Zhang, Linjun}, title = {{HappyMap : A Generalized Multicalibration Method}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {41:1--41:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.41}, URN = {urn:nbn:de:0030-drops-175449}, doi = {10.4230/LIPIcs.ITCS.2023.41}, annote = {Keywords: algorithmic fairness, target-independent learning, transfer learning} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.42"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.42">DOI: 10.4230/LIPIcs.ITCS.2023.42</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.42/LIPIcs.ITCS.2023.42.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.42" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17526" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17526" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.42" data-bs-toggle="tooltip" data-title="Bit Complexity of Jordan Normal Form and Polynomial Spectral Factorization" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Dey, Papri"></span> <span data-key="dagstuhl.contributor.author" data-value="Kannan, Ravi"></span> <span data-key="dagstuhl.contributor.author" data-value="Ryder, Nick"></span> <span data-key="dagstuhl.contributor.author" data-value="Srivastava, Nikhil"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Numerical analysis"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.42"> Bit Complexity of Jordan Normal Form and Polynomial Spectral Factorization </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Papri Dey, Ravi Kannan, Nick Ryder, and Nikhil Srivastava </p> <div class="row"> <div class="collapse" id="abstract-17526"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17526">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the bit complexity of two related fundamental computational problems in linear algebra and control theory. Our results are: (1) An Õ(n^{ω+3}a+n⁴a²+n^ωlog(1/ε)) time algorithm for finding an ε-approximation to the Jordan Normal form of an integer matrix with a-bit entries, where ω is the exponent of matrix multiplication. (2) An Õ(n⁶d⁶a+n⁴d⁴a²+n³d³log(1/ε)) time algorithm for ε-approximately computing the spectral factorization P(x) = Q^*(x)Q(x) of a given monic n× n rational matrix polynomial of degree 2d with rational a-bit coefficients having a-bit common denominators, which satisfies P(x)⪰0 for all real x. The first algorithm is used as a subroutine in the second one. Despite its being of central importance, polynomial complexity bounds were not previously known for spectral factorization, and for Jordan form the best previous best running time was an unspecified polynomial in n of degree at least twelve [Cai, 1994]. Our algorithms are simple and judiciously combine techniques from numerical and symbolic computation, yielding significant advantages over either approach by itself. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17526"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17526">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Papri Dey, Ravi Kannan, Nick Ryder, and Nikhil Srivastava. Bit Complexity of Jordan Normal Form and Polynomial Spectral Factorization. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 42:1-42:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17526-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{dey_et_al:LIPIcs.ITCS.2023.42, author = {Dey, Papri and Kannan, Ravi and Ryder, Nick and Srivastava, Nikhil}, title = {{Bit Complexity of Jordan Normal Form and Polynomial Spectral Factorization}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {42:1--42:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.42}, URN = {urn:nbn:de:0030-drops-175450}, doi = {10.4230/LIPIcs.ITCS.2023.42}, annote = {Keywords: Symbolic algorithms, numerical algorithms, linear algebra} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17526-input">@InProceedings{dey_et_al:LIPIcs.ITCS.2023.42, author = {Dey, Papri and Kannan, Ravi and Ryder, Nick and Srivastava, Nikhil}, title = {{Bit Complexity of Jordan Normal Form and Polynomial Spectral Factorization}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {42:1--42:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.42}, URN = {urn:nbn:de:0030-drops-175450}, doi = {10.4230/LIPIcs.ITCS.2023.42}, annote = {Keywords: Symbolic algorithms, numerical algorithms, linear algebra} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.43"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.43">DOI: 10.4230/LIPIcs.ITCS.2023.43</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.43/LIPIcs.ITCS.2023.43.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.43" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17527" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17527" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.43" data-bs-toggle="tooltip" data-title="Constant-Depth Sorting Networks" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Dobrokhotova-Maikova, Natalia"></span> <span data-key="dagstuhl.contributor.author" data-value="Kozachinskiy, Alexander"></span> <span data-key="dagstuhl.contributor.author" data-value="Podolskii, Vladimir"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Models of computation"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.43"> Constant-Depth Sorting Networks </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Natalia Dobrokhotova-Maikova, Alexander Kozachinskiy, and Vladimir Podolskii </p> <div class="row"> <div class="collapse" id="abstract-17527"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17527">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this paper, we address sorting networks that are constructed from comparators of arity k > 2. I.e., in our setting the arity of the comparators - or, in other words, the number of inputs that can be sorted at the unit cost - is a parameter. We study its relationship with two other parameters - n, the number of inputs, and d, the depth. This model received considerable attention. Partly, its motivation is to better understand the structure of sorting networks. In particular, sorting networks with large arity are related to recursive constructions of ordinary sorting networks. Additionally, studies of this model have natural correspondence with a recent line of work on constructing circuits for majority functions from majority gates of lower fan-in. Motivated by these questions, we initiate the studies of lower bounds for constant-depth sorting networks. More precisely, we consider sorting networks of constant depth d and estimate the minimal k for which there is such a network with comparators of arity k. We prove tight lower bounds for d ≤ 4. More precisely, for depths d = 1,2 we observe that k = n. For d = 3 we show that k = ⌈n/2⌉. As our main result, we show that for d = 4 the minimal arity becomes sublinear: k = Θ(n^{2/3}). This contrasts with the case of majority circuits, in which k = O(n^{2/3}) is achievable already for depth d = 3. To prove these results, we develop a new combinatorial technique based on the notion of access to cells of a sorting network. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17527"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17527">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Natalia Dobrokhotova-Maikova, Alexander Kozachinskiy, and Vladimir Podolskii. Constant-Depth Sorting Networks. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 43:1-43:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17527-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{dobrokhotovamaikova_et_al:LIPIcs.ITCS.2023.43, author = {Dobrokhotova-Maikova, Natalia and Kozachinskiy, Alexander and Podolskii, Vladimir}, title = {{Constant-Depth Sorting Networks}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {43:1--43:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.43}, URN = {urn:nbn:de:0030-drops-175468}, doi = {10.4230/LIPIcs.ITCS.2023.43}, annote = {Keywords: Sorting networks, constant depth, lower bounds, threshold circuits} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17527-input">@InProceedings{dobrokhotovamaikova_et_al:LIPIcs.ITCS.2023.43, author = {Dobrokhotova-Maikova, Natalia and Kozachinskiy, Alexander and Podolskii, Vladimir}, title = {{Constant-Depth Sorting Networks}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {43:1--43:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.43}, URN = {urn:nbn:de:0030-drops-175468}, doi = {10.4230/LIPIcs.ITCS.2023.43}, annote = {Keywords: Sorting networks, constant depth, lower bounds, threshold circuits} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.44"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.44">DOI: 10.4230/LIPIcs.ITCS.2023.44</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.44/LIPIcs.ITCS.2023.44.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.44" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17528" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17528" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.44" data-bs-toggle="tooltip" data-title="Rigidity in Mechanism Design and Its Applications" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Dobzinski, Shahar"></span> <span data-key="dagstuhl.contributor.author" data-value="Shaulker, Ariel"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic game theory and mechanism design"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.44"> Rigidity in Mechanism Design and Its Applications </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Shahar Dobzinski and Ariel Shaulker </p> <div class="row"> <div class="collapse" id="abstract-17528"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17528">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We introduce the notion of rigidity in auction design and use it to analyze some fundamental aspects of mechanism design. We focus on the setting of a single-item auction where the values of the bidders are drawn from some (possibly correlated) distribution F. Let f be the allocation function of an optimal mechanism for F. Informally, S is (linearly) rigid in F if for every mechanism M' with an allocation function f' where f and f' agree on the allocation of at most x-fraction of the instances of S, it holds that the expected revenue of M' is at most an x fraction of the optimal revenue. We start with using rigidity to explain the singular success of Cremer and McLean’s auction assuming interim individual rationality. Recall that the revenue of Cremer and McLean’s auction is the optimal welfare if the distribution obeys a certain "full rank" conditions, but no analogous constructions are known if this condition does not hold. We show that the allocation function of the Cremer and McLean auction has logarithmic (in the size of the support) Kolmogorov complexity, whereas we use rigidity to show that there exist distributions that do not obey the full rank condition for which the allocation function of every mechanism that provides a constant approximation is almost linear. We further investigate rigidity assuming different notions of individual rationality. Assuming ex-post individual rationality, if there exists a rigid set then the structure of the optimal mechanism is relatively simple: the player with the highest value "usually" wins the item and contributes most of the revenue. In contrast, assuming interim individual rationality, there are distributions with a rigid set S where the optimal mechanism has no obvious allocation pattern (in the sense that its Kolmogorov complexity is high). Since the existence of rigid sets essentially implies that the hands of the designer are tied, our results help explain why we have little hope of developing good, simple and generic approximation mechanisms in the interim individual rationality world. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17528"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17528">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Shahar Dobzinski and Ariel Shaulker. Rigidity in Mechanism Design and Its Applications. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 44:1-44:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17528-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{dobzinski_et_al:LIPIcs.ITCS.2023.44, author = {Dobzinski, Shahar and Shaulker, Ariel}, title = {{Rigidity in Mechanism Design and Its Applications}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {44:1--44:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.44}, URN = {urn:nbn:de:0030-drops-175479}, doi = {10.4230/LIPIcs.ITCS.2023.44}, annote = {Keywords: Revenue Maximization, Auctions} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17528-input">@InProceedings{dobzinski_et_al:LIPIcs.ITCS.2023.44, author = {Dobzinski, Shahar and Shaulker, Ariel}, title = {{Rigidity in Mechanism Design and Its Applications}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {44:1--44:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.44}, URN = {urn:nbn:de:0030-drops-175479}, doi = {10.4230/LIPIcs.ITCS.2023.44}, annote = {Keywords: Revenue Maximization, Auctions} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.45"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.45">DOI: 10.4230/LIPIcs.ITCS.2023.45</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.45/LIPIcs.ITCS.2023.45.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.45" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17529" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17529" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.45" data-bs-toggle="tooltip" data-title="Beeping Shortest Paths via Hypergraph Bipartite Decomposition" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Dufoulon, Fabien"></span> <span data-key="dagstuhl.contributor.author" data-value="Emek, Yuval"></span> <span data-key="dagstuhl.contributor.author" data-value="Gelles, Ran"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.45"> Beeping Shortest Paths via Hypergraph Bipartite Decomposition </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Fabien Dufoulon, Yuval Emek, and Ran Gelles </p> <div class="row"> <div class="collapse" id="abstract-17529"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17529">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Constructing a shortest path between two network nodes is a fundamental task in distributed computing. This work develops schemes for the construction of shortest paths in randomized beeping networks between a predetermined source node and an arbitrary set of destination nodes. Our first scheme constructs a (single) shortest path to an arbitrary destination in O(D log log n + log³ n) rounds with high probability. Our second scheme constructs multiple shortest paths, one per each destination, in O(D log² n + log³ n) rounds with high probability. Our schemes are based on a reduction of the above shortest path construction tasks to a decomposition of hypergraphs into bipartite hypergraphs: We develop a beeping procedure that partitions the hyperedge set of a hypergraph H = (V_H, E_H) into k = Θ (log² n) disjoint subsets F₁ ∪ ⋯ ∪ F_k = E_H such that the (sub-)hypergraph (V_H, F_i) is bipartite in the sense that there exists a vertex subset U ⊆ V such that |U ∩ e| = 1 for every e ∈ F_i. This procedure turns out to be instrumental in speeding up shortest path constructions under the beeping model. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17529"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17529">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Fabien Dufoulon, Yuval Emek, and Ran Gelles. Beeping Shortest Paths via Hypergraph Bipartite Decomposition. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 45:1-45:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17529-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{dufoulon_et_al:LIPIcs.ITCS.2023.45, author = {Dufoulon, Fabien and Emek, Yuval and Gelles, Ran}, title = {{Beeping Shortest Paths via Hypergraph Bipartite Decomposition}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {45:1--45:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.45}, URN = {urn:nbn:de:0030-drops-175485}, doi = {10.4230/LIPIcs.ITCS.2023.45}, annote = {Keywords: Beeping Networks, Shortest Paths, Hypergraph Bipartite Decomposition} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17529-input">@InProceedings{dufoulon_et_al:LIPIcs.ITCS.2023.45, author = {Dufoulon, Fabien and Emek, Yuval and Gelles, Ran}, title = {{Beeping Shortest Paths via Hypergraph Bipartite Decomposition}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {45:1--45:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.45}, URN = {urn:nbn:de:0030-drops-175485}, doi = {10.4230/LIPIcs.ITCS.2023.45}, annote = {Keywords: Beeping Networks, Shortest Paths, Hypergraph Bipartite Decomposition} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.46"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.46">DOI: 10.4230/LIPIcs.ITCS.2023.46</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.46/LIPIcs.ITCS.2023.46.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.46" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17530" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17530" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.46" data-bs-toggle="tooltip" data-title="Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Efremenko, Klim"></span> <span data-key="dagstuhl.contributor.author" data-value="Kol, Gillat"></span> <span data-key="dagstuhl.contributor.author" data-value="Paramonov, Dmitry"></span> <span data-key="dagstuhl.contributor.author" data-value="Saxena, Raghuvansh R."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.46"> Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Klim Efremenko, Gillat Kol, Dmitry Paramonov, and Raghuvansh R. Saxena </p> <div class="row"> <div class="collapse" id="abstract-17530"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17530">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f-channels: In every round of the f-channel, each of its n parties decides to either broadcast or not, and the channel outputs f(m), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel, where f is the threshold-1 function, is not stronger than any other f-channel. To this end, we design a protocol over the f-channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a "local" relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f-channel with f(m) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n). We mention that the Ω(log n) overhead in both our results is tight. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17530"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17530">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Klim Efremenko, Gillat Kol, Dmitry Paramonov, and Raghuvansh R. Saxena. Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 46:1-46:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17530-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{efremenko_et_al:LIPIcs.ITCS.2023.46, author = {Efremenko, Klim and Kol, Gillat and Paramonov, Dmitry and Saxena, Raghuvansh R.}, title = {{Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {46:1--46:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.46}, URN = {urn:nbn:de:0030-drops-175499}, doi = {10.4230/LIPIcs.ITCS.2023.46}, annote = {Keywords: Beeping Model, Radio Networks} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17530-input">@InProceedings{efremenko_et_al:LIPIcs.ITCS.2023.46, author = {Efremenko, Klim and Kol, Gillat and Paramonov, Dmitry and Saxena, Raghuvansh R.}, title = {{Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {46:1--46:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.46}, URN = {urn:nbn:de:0030-drops-175499}, doi = {10.4230/LIPIcs.ITCS.2023.46}, annote = {Keywords: Beeping Model, Radio Networks} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.47"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.47">DOI: 10.4230/LIPIcs.ITCS.2023.47</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.47/LIPIcs.ITCS.2023.47.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.47" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17531" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17531" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.47" data-bs-toggle="tooltip" data-title="Asymptotically Tight Bounds on the Time Complexity of Broadcast and Its Variants in Dynamic Networks" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="El-Hayek, Antoine"></span> <span data-key="dagstuhl.contributor.author" data-value="Henzinger, Monika"></span> <span data-key="dagstuhl.contributor.author" data-value="Schmid, Stefan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Networks → Network algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.47"> Asymptotically Tight Bounds on the Time Complexity of Broadcast and Its Variants in Dynamic Networks </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Antoine El-Hayek, Monika Henzinger, and Stefan Schmid </p> <div class="row"> <div class="collapse" id="abstract-17531"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17531">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Data dissemination is a fundamental task in distributed computing. This paper studies broadcast problems in various innovative models where the communication network connecting n processes is dynamic (e.g., due to mobility or failures) and controlled by an adversary. In the first model, the processes transitively communicate their ids in synchronous rounds along a rooted tree given in each round by the adversary whose goal is to maximize the number of rounds until at least one id is known by all processes. Previous research has shown a ⌈(3n-1)/2⌉-2 lower bound and an O(nlog log n) upper bound. We show the first linear upper bound for this problem, namely ⌈(1+√2) n-1⌉ ≈ 2.4n. We extend these results to the setting where the adversary gives in each round k-disjoint forests and their goal is to maximize the number of rounds until there is a set of k ids such that each process knows of at least one of them. We give a ⌈3(n-k)/2⌉-1 lower bound and a (π²+6)/6 n+1 ≈ 2.6n upper bound for this problem. Finally, we study the setting where the adversary gives in each round a directed graph with k roots and their goal is to maximize the number of rounds until there exist k ids that are known by all processes. We give a ⌈3(n-3k)/2⌉+2 lower bound and a ⌈(1+√2)n⌉+k-1 ≈ 2.4n+k upper bound for this problem. For the two latter problems no upper or lower bounds were previously known. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17531"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17531">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Antoine El-Hayek, Monika Henzinger, and Stefan Schmid. Asymptotically Tight Bounds on the Time Complexity of Broadcast and Its Variants in Dynamic Networks. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 47:1-47:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17531-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{elhayek_et_al:LIPIcs.ITCS.2023.47, author = {El-Hayek, Antoine and Henzinger, Monika and Schmid, Stefan}, title = {{Asymptotically Tight Bounds on the Time Complexity of Broadcast and Its Variants in Dynamic Networks}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {47:1--47:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.47}, URN = {urn:nbn:de:0030-drops-175502}, doi = {10.4230/LIPIcs.ITCS.2023.47}, annote = {Keywords: broadcast, cover, k-broadcast, dynamic radius, dynamic graphs, oblivious message adversary, time complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17531-input">@InProceedings{elhayek_et_al:LIPIcs.ITCS.2023.47, author = {El-Hayek, Antoine and Henzinger, Monika and Schmid, Stefan}, title = {{Asymptotically Tight Bounds on the Time Complexity of Broadcast and Its Variants in Dynamic Networks}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {47:1--47:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.47}, URN = {urn:nbn:de:0030-drops-175502}, doi = {10.4230/LIPIcs.ITCS.2023.47}, annote = {Keywords: broadcast, cover, k-broadcast, dynamic radius, dynamic graphs, oblivious message adversary, time complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.48"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.48">DOI: 10.4230/LIPIcs.ITCS.2023.48</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.48/LIPIcs.ITCS.2023.48.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.48" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17532" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17532" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.48" data-bs-toggle="tooltip" data-title="Differentially Private Continual Releases of Streaming Frequency Moment Estimations" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Epasto, Alessandro"></span> <span data-key="dagstuhl.contributor.author" data-value="Mao, Jieming"></span> <span data-key="dagstuhl.contributor.author" data-value="Medina, Andres Munoz"></span> <span data-key="dagstuhl.contributor.author" data-value="Mirrokni, Vahab"></span> <span data-key="dagstuhl.contributor.author" data-value="Vassilvitskii, Sergei"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhong, Peilin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.48"> Differentially Private Continual Releases of Streaming Frequency Moment Estimations </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Alessandro Epasto, Jieming Mao, Andres Munoz Medina, Vahab Mirrokni, Sergei Vassilvitskii, and Peilin Zhong </p> <div class="row"> <div class="collapse" id="abstract-17532"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17532">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> The streaming model of computation is a popular approach for working with large-scale data. In this setting, there is a stream of items and the goal is to compute the desired quantities (usually data statistics) while making a single pass through the stream and using as little space as possible. Motivated by the importance of data privacy, we develop differentially private streaming algorithms under the continual release setting, where the union of outputs of the algorithm at every timestamp must be differentially private. Specifically, we study the fundamental 𝓁_p (p ∈ [0,+∞)) frequency moment estimation problem under this setting, and give an ε-DP algorithm that achieves (1+η)-relative approximation (∀ η ∈ (0,1)) with polylog(Tn) additive error and uses polylog(Tn)⋅ max(1, n^{1-2/p}) space, where T is the length of the stream and n is the size of the universe of elements. Our space is near optimal up to poly-logarithmic factors even in the non-private setting. To obtain our results, we first reduce several primitives under the differentially private continual release model, such as counting distinct elements, heavy hitters and counting low frequency elements, to the simpler, counting/summing problems in the same setting. Based on these primitives, we develop a differentially private continual release level set estimation approach to address the 𝓁_p frequency moment estimation problem. We also provide a simple extension of our results to the harder sliding window model, where the statistics must be maintained over the past W data items. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17532"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17532">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Alessandro Epasto, Jieming Mao, Andres Munoz Medina, Vahab Mirrokni, Sergei Vassilvitskii, and Peilin Zhong. Differentially Private Continual Releases of Streaming Frequency Moment Estimations. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 48:1-48:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17532-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{epasto_et_al:LIPIcs.ITCS.2023.48, author = {Epasto, Alessandro and Mao, Jieming and Medina, Andres Munoz and Mirrokni, Vahab and Vassilvitskii, Sergei and Zhong, Peilin}, title = {{Differentially Private Continual Releases of Streaming Frequency Moment Estimations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {48:1--48:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.48}, URN = {urn:nbn:de:0030-drops-175513}, doi = {10.4230/LIPIcs.ITCS.2023.48}, annote = {Keywords: Differential Privacy, Continual Release, Sliding Window, Streaming Algorithms, Distinct Elements, Frequency Moment Estimation} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17532-input">@InProceedings{epasto_et_al:LIPIcs.ITCS.2023.48, author = {Epasto, Alessandro and Mao, Jieming and Medina, Andres Munoz and Mirrokni, Vahab and Vassilvitskii, Sergei and Zhong, Peilin}, title = {{Differentially Private Continual Releases of Streaming Frequency Moment Estimations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {48:1--48:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.48}, URN = {urn:nbn:de:0030-drops-175513}, doi = {10.4230/LIPIcs.ITCS.2023.48}, annote = {Keywords: Differential Privacy, Continual Release, Sliding Window, Streaming Algorithms, Distinct Elements, Frequency Moment Estimation} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.49"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.49">DOI: 10.4230/LIPIcs.ITCS.2023.49</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.49/LIPIcs.ITCS.2023.49.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.49" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17533" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17533" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.49" data-bs-toggle="tooltip" data-title="A Subpolynomial-Time Algorithm for the Free Energy of One-Dimensional Quantum Systems in the Thermodynamic Limit" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Fawzi, Hamza"></span> <span data-key="dagstuhl.contributor.author" data-value="Fawzi, Omar"></span> <span data-key="dagstuhl.contributor.author" data-value="Scalet, Samuel O."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum information theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.49"> A Subpolynomial-Time Algorithm for the Free Energy of One-Dimensional Quantum Systems in the Thermodynamic Limit </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Hamza Fawzi, Omar Fawzi, and Samuel O. Scalet </p> <div class="row"> <div class="collapse" id="abstract-17533"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17533">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We introduce a classical algorithm to approximate the free energy of local, translation-invariant, one-dimensional quantum systems in the thermodynamic limit of infinite chain size. While the ground state problem (i.e., the free energy at temperature T = 0) for these systems is expected to be computationally hard even for quantum computers, our algorithm runs for any fixed temperature T > 0 in subpolynomial time, i.e., in time O((1/ε)^c) for any constant c > 0 where ε is the additive approximation error. Previously, the best known algorithm had a runtime that is polynomial in 1/ε where the degree of the polynomial is exponential in the inverse temperature 1/T. Our algorithm is also particularly simple as it reduces to the computation of the spectral radius of a linear map. This linear map has an interpretation as a noncommutative transfer matrix and has been studied previously to prove results on the analyticity of the free energy and the decay of correlations. We also show that the corresponding eigenvector of this map gives an approximation of the marginal of the Gibbs state and thereby allows for the computation of various thermodynamic properties of the quantum system. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17533"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17533">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Hamza Fawzi, Omar Fawzi, and Samuel O. Scalet. A Subpolynomial-Time Algorithm for the Free Energy of One-Dimensional Quantum Systems in the Thermodynamic Limit. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 49:1-49:6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17533-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{fawzi_et_al:LIPIcs.ITCS.2023.49, author = {Fawzi, Hamza and Fawzi, Omar and Scalet, Samuel O.}, title = {{A Subpolynomial-Time Algorithm for the Free Energy of One-Dimensional Quantum Systems in the Thermodynamic Limit}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {49:1--49:6}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.49}, URN = {urn:nbn:de:0030-drops-175520}, doi = {10.4230/LIPIcs.ITCS.2023.49}, annote = {Keywords: One-dimensional quantum systems, Free energy} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17533-input">@InProceedings{fawzi_et_al:LIPIcs.ITCS.2023.49, author = {Fawzi, Hamza and Fawzi, Omar and Scalet, Samuel O.}, title = {{A Subpolynomial-Time Algorithm for the Free Energy of One-Dimensional Quantum Systems in the Thermodynamic Limit}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {49:1--49:6}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.49}, URN = {urn:nbn:de:0030-drops-175520}, doi = {10.4230/LIPIcs.ITCS.2023.49}, annote = {Keywords: One-dimensional quantum systems, Free energy} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.50"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.50">DOI: 10.4230/LIPIcs.ITCS.2023.50</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.50/LIPIcs.ITCS.2023.50.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.50" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17534" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17534" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.50" data-bs-toggle="tooltip" data-title="Expander Decomposition in Dynamic Streams" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Filtser, Arnold"></span> <span data-key="dagstuhl.contributor.author" data-value="Kapralov, Michael"></span> <span data-key="dagstuhl.contributor.author" data-value="Makarov, Mikhail"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming models"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Graph algorithms analysis"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sketching and sampling"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.50"> Expander Decomposition in Dynamic Streams </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Arnold Filtser, Michael Kapralov, and Mikhail Makarov </p> <div class="row"> <div class="collapse" id="abstract-17534"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17534">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this paper we initiate the study of expander decompositions of a graph G = (V, E) in the streaming model of computation. The goal is to find a partitioning 𝒞 of vertices V such that the subgraphs of G induced by the clusters C ∈ 𝒞 are good expanders, while the number of intercluster edges is small. Expander decompositions are classically constructed by a recursively applying balanced sparse cuts to the input graph. In this paper we give the first implementation of such a recursive sparsest cut process using small space in the dynamic streaming model. Our main algorithmic tool is a new type of cut sparsifier that we refer to as a power cut sparsifier - it preserves cuts in any given vertex induced subgraph (or, any cluster in a fixed partition of V) to within a (δ, ε)-multiplicative/additive error with high probability. The power cut sparsifier uses Õ(n/εδ) space and edges, which we show is asymptotically tight up to polylogarithmic factors in n for constant δ. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17534"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17534">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Arnold Filtser, Michael Kapralov, and Mikhail Makarov. Expander Decomposition in Dynamic Streams. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 50:1-50:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17534-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{filtser_et_al:LIPIcs.ITCS.2023.50, author = {Filtser, Arnold and Kapralov, Michael and Makarov, Mikhail}, title = {{Expander Decomposition in Dynamic Streams}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {50:1--50:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.50}, URN = {urn:nbn:de:0030-drops-175534}, doi = {10.4230/LIPIcs.ITCS.2023.50}, annote = {Keywords: Streaming, expander decomposition, graph sparsifiers} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17534-input">@InProceedings{filtser_et_al:LIPIcs.ITCS.2023.50, author = {Filtser, Arnold and Kapralov, Michael and Makarov, Mikhail}, title = {{Expander Decomposition in Dynamic Streams}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {50:1--50:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.50}, URN = {urn:nbn:de:0030-drops-175534}, doi = {10.4230/LIPIcs.ITCS.2023.50}, annote = {Keywords: Streaming, expander decomposition, graph sparsifiers} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.51"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.51">DOI: 10.4230/LIPIcs.ITCS.2023.51</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.51/LIPIcs.ITCS.2023.51.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.51" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17535" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17535" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.51" data-bs-toggle="tooltip" data-title="On Flipping the Fréchet Distance" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Filtser, Omrit"></span> <span data-key="dagstuhl.contributor.author" data-value="Goswami, Mayank"></span> <span data-key="dagstuhl.contributor.author" data-value="Mitchell, Joseph S. B."></span> <span data-key="dagstuhl.contributor.author" data-value="Polishchuk, Valentin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational geometry"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.51"> On Flipping the Fréchet Distance </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, and Valentin Polishchuk </p> <div class="row"> <div class="collapse" id="abstract-17535"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17535">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> The classical and extensively-studied Fréchet distance between two curves is defined as an inf max, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a "flipped" Fréchet measure defined by a sup min - the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of "social distance" between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear time algorithms. Finally, we consider this measure on graphs. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17535"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17535">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, and Valentin Polishchuk. On Flipping the Fréchet Distance. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 51:1-51:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17535-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{filtser_et_al:LIPIcs.ITCS.2023.51, author = {Filtser, Omrit and Goswami, Mayank and Mitchell, Joseph S. B. and Polishchuk, Valentin}, title = {{On Flipping the Fr\'{e}chet Distance}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {51:1--51:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.51}, URN = {urn:nbn:de:0030-drops-175548}, doi = {10.4230/LIPIcs.ITCS.2023.51}, annote = {Keywords: curves, polygons, distancing measure} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17535-input">@InProceedings{filtser_et_al:LIPIcs.ITCS.2023.51, author = {Filtser, Omrit and Goswami, Mayank and Mitchell, Joseph S. B. and Polishchuk, Valentin}, title = {{On Flipping the Fr\'{e}chet Distance}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {51:1--51:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.51}, URN = {urn:nbn:de:0030-drops-175548}, doi = {10.4230/LIPIcs.ITCS.2023.51}, annote = {Keywords: curves, polygons, distancing measure} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.52"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.52">DOI: 10.4230/LIPIcs.ITCS.2023.52</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.52/LIPIcs.ITCS.2023.52.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.52" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17536" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17536" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.52" data-bs-toggle="tooltip" data-title="Budget Pacing in Repeated Auctions: Regret and Efficiency Without Convergence" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Gaitonde, Jason"></span> <span data-key="dagstuhl.contributor.author" data-value="Li, Yingkai"></span> <span data-key="dagstuhl.contributor.author" data-value="Light, Bar"></span> <span data-key="dagstuhl.contributor.author" data-value="Lucier, Brendan"></span> <span data-key="dagstuhl.contributor.author" data-value="Slivkins, Aleksandrs"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quality of equilibria"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Convergence and learning in games"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.52"> Budget Pacing in Repeated Auctions: Regret and Efficiency Without Convergence </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Jason Gaitonde, Yingkai Li, Bar Light, Brendan Lucier, and Aleksandrs Slivkins </p> <div class="row"> <div class="collapse" id="abstract-17536"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17536">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Online advertising via auctions increasingly dominates the marketing landscape. A typical advertiser may participate in thousands of auctions each day with bids tailored to a variety of signals about user demographics and intent. These auctions are strategically linked through a global budget constraint. To help address the difficulty of bidding, many major online platforms now provide automated budget management via a flexible approach called budget pacing: rather than bidding directly, an advertiser specifies a global budget target and a maximum willingness-to-pay for different types of advertising opportunities. The specified maximums are then scaled down (or "paced") by a multiplier so that the realized total spend matches the target budget. These automated bidders are now near-universally adopted across all mature advertising platforms, raising pressing questions about market outcomes that arise when advertisers use budget pacing simultaneously. In this paper we study the aggregate welfare and individual regret guarantees of dynamic pacing algorithms in repeated auctions with budgets. We show that when agents simultaneously use a natural form of gradient-based pacing, the liquid welfare obtained over the course of the dynamics is at least half the optimal liquid welfare obtainable by any allocation rule, matching the best possible bound for static auctions even in pure Nash equilibria [Aggarwal et al., WINE 2019; Babaioff et al., ITCS 2021]. In contrast to prior work, these results hold without requiring convergence of the dynamics, circumventing known computational obstacles of finding equilibria [Chen et al., EC 2021]. Our result is robust to the correlation structure among agents' valuations and holds for any core auction, a broad class that includes first-price, second-price, and GSP auctions. We complement the aggregate guarantees by showing that an agent using such pacing algorithms achieves an O(T^{3/4}) regret relative to the value obtained by the best fixed pacing multiplier in hindsight in stochastic bidding environments. Compared to past work, this result applies to more general auctions and extends to adversarial settings with respect to dynamic regret. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17536"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17536">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Jason Gaitonde, Yingkai Li, Bar Light, Brendan Lucier, and Aleksandrs Slivkins. Budget Pacing in Repeated Auctions: Regret and Efficiency Without Convergence. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, p. 52:1, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17536-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{gaitonde_et_al:LIPIcs.ITCS.2023.52, author = {Gaitonde, Jason and Li, Yingkai and Light, Bar and Lucier, Brendan and Slivkins, Aleksandrs}, title = {{Budget Pacing in Repeated Auctions: Regret and Efficiency Without Convergence}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {52:1--52:1}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.52}, URN = {urn:nbn:de:0030-drops-175557}, doi = {10.4230/LIPIcs.ITCS.2023.52}, annote = {Keywords: repeated auctions with budgets, pacing, learning in auctions} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17536-input">@InProceedings{gaitonde_et_al:LIPIcs.ITCS.2023.52, author = {Gaitonde, Jason and Li, Yingkai and Light, Bar and Lucier, Brendan and Slivkins, Aleksandrs}, title = {{Budget Pacing in Repeated Auctions: Regret and Efficiency Without Convergence}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {52:1--52:1}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.52}, URN = {urn:nbn:de:0030-drops-175557}, doi = {10.4230/LIPIcs.ITCS.2023.52}, annote = {Keywords: repeated auctions with budgets, pacing, learning in auctions} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.53"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.53">DOI: 10.4230/LIPIcs.ITCS.2023.53</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.53/LIPIcs.ITCS.2023.53.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.53" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17537" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17537" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.53" data-bs-toggle="tooltip" data-title="Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Gharibian, Sevag"></span> <span data-key="dagstuhl.contributor.author" data-value="Rudolph, Dorian"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.53"> Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Sevag Gharibian and Dorian Rudolph </p> <div class="row"> <div class="collapse" id="abstract-17537"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17537">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A celebrated result in classical complexity theory is Savitch’s theorem, which states that non-deterministic polynomial-space computations (NPSPACE) can be simulated by deterministic poly-space computations (PSPACE). In this work, we initiate the study of a quantum analogue of NPSPACE, denoted Streaming-QCMASPACE (SQCMASPACE), in which an exponentially long classical proof is streamed to a poly-space quantum verifier. We first show that a quantum analogue of Savitch’s theorem is unlikely to hold, in that SQCMASPACE = NEXP. For completeness, we also introduce the companion class Streaming-QMASPACE (SQMASPACE) with an exponentially long streamed quantum proof, and show SQMASPACE = QMAEXP (the quantum analogue of NEXP). Our primary focus, however, is on the study of exponentially long streaming classical proofs, where we next show the following two main results. The first result shows that, in strong contrast to the classical setting, the solution space of a quantum constraint satisfaction problem (i.e. a local Hamiltonian) is always connected when exponentially long proofs are permitted. For this, we show how to simulate any Lipschitz continuous path on the unit hypersphere via a sequence of local unitary gates, at the expense of blowing up the circuit size. This shows that quantum error-correcting codes can be unable to detect one codeword erroneously evolving to another if the evolution happens sufficiently slowly, and answers an open question of [Gharibian, Sikora, ICALP 2015] regarding the Ground State Connectivity problem. Our second main result is that any SQCMASPACE computation can be embedded into "unentanglement", i.e. into a quantum constraint satisfaction problem with unentangled provers. Formally, we show how to embed SQCMASPACE into the Sparse Separable Hamiltonian problem of [Chailloux, Sattath, CCC 2012] (QMA(2)-complete for 1/poly promise gap), at the expense of scaling the promise gap with the streamed proof size. As a corollary, we obtain the first systematic construction for obtaining QMA(2)-type upper bounds on arbitrary multi-prover interactive proof systems, where the QMA(2) promise gap scales exponentially with the number of bits of communication in the interactive proof. Our construction uses a new technique for exploiting unentanglement to simulate quadratic Boolean functions, which in some sense allows history states to encode the future. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17537"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17537">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Sevag Gharibian and Dorian Rudolph. Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 53:1-53:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17537-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{gharibian_et_al:LIPIcs.ITCS.2023.53, author = {Gharibian, Sevag and Rudolph, Dorian}, title = {{Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {53:1--53:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.53}, URN = {urn:nbn:de:0030-drops-175564}, doi = {10.4230/LIPIcs.ITCS.2023.53}, annote = {Keywords: quantum complexity theory, Quantum Merlin Arthur (QMA), QMA(2), ground state connectivity (GSCON), quantum error correction} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17537-input">@InProceedings{gharibian_et_al:LIPIcs.ITCS.2023.53, author = {Gharibian, Sevag and Rudolph, Dorian}, title = {{Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {53:1--53:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.53}, URN = {urn:nbn:de:0030-drops-175564}, doi = {10.4230/LIPIcs.ITCS.2023.53}, annote = {Keywords: quantum complexity theory, Quantum Merlin Arthur (QMA), QMA(2), ground state connectivity (GSCON), quantum error correction} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.54"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.54">DOI: 10.4230/LIPIcs.ITCS.2023.54</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.54/LIPIcs.ITCS.2023.54.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.54" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17538" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17538" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.54" data-bs-toggle="tooltip" data-title="Algorithms with More Granular Differential Privacy Guarantees" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Ghazi, Badih"></span> <span data-key="dagstuhl.contributor.author" data-value="Kumar, Ravi"></span> <span data-key="dagstuhl.contributor.author" data-value="Manurangsi, Pasin"></span> <span data-key="dagstuhl.contributor.author" data-value="Steinke, Thomas"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory of database privacy and security"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.54"> Algorithms with More Granular Differential Privacy Guarantees </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Badih Ghazi, Ravi Kumar, Pasin Manurangsi, and Thomas Steinke </p> <div class="row"> <div class="collapse" id="abstract-17538"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17538">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Differential privacy is often applied with a privacy parameter that is larger than the theory suggests is ideal; various informal justifications for tolerating large privacy parameters have been proposed. In this work, we consider partial differential privacy (DP), which allows quantifying the privacy guarantee on a per-attribute basis. We study several basic data analysis and learning tasks in this framework, and design algorithms whose per-attribute privacy parameter is smaller that the best possible privacy parameter for the entire record of a person (i.e., all the attributes). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17538"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17538">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Badih Ghazi, Ravi Kumar, Pasin Manurangsi, and Thomas Steinke. Algorithms with More Granular Differential Privacy Guarantees. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 54:1-54:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17538-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{ghazi_et_al:LIPIcs.ITCS.2023.54, author = {Ghazi, Badih and Kumar, Ravi and Manurangsi, Pasin and Steinke, Thomas}, title = {{Algorithms with More Granular Differential Privacy Guarantees}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {54:1--54:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.54}, URN = {urn:nbn:de:0030-drops-175574}, doi = {10.4230/LIPIcs.ITCS.2023.54}, annote = {Keywords: Differential Privacy, Algorithms, Per-Attribute Privacy} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17538-input">@InProceedings{ghazi_et_al:LIPIcs.ITCS.2023.54, author = {Ghazi, Badih and Kumar, Ravi and Manurangsi, Pasin and Steinke, Thomas}, title = {{Algorithms with More Granular Differential Privacy Guarantees}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {54:1--54:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.54}, URN = {urn:nbn:de:0030-drops-175574}, doi = {10.4230/LIPIcs.ITCS.2023.54}, annote = {Keywords: Differential Privacy, Algorithms, Per-Attribute Privacy} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.55"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.55">DOI: 10.4230/LIPIcs.ITCS.2023.55</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.55/LIPIcs.ITCS.2023.55.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.55" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17539" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17539" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.55" data-bs-toggle="tooltip" data-title="Private Counting of Distinct and k-Occurring Items in Time Windows" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Ghazi, Badih"></span> <span data-key="dagstuhl.contributor.author" data-value="Kumar, Ravi"></span> <span data-key="dagstuhl.contributor.author" data-value="Nelson, Jelani"></span> <span data-key="dagstuhl.contributor.author" data-value="Manurangsi, Pasin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory of database privacy and security"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.55"> Private Counting of Distinct and k-Occurring Items in Time Windows </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Badih Ghazi, Ravi Kumar, Jelani Nelson, and Pasin Manurangsi </p> <div class="row"> <div class="collapse" id="abstract-17539"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17539">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this work, we study the task of estimating the numbers of distinct and k-occurring items in a time window under the constraint of differential privacy (DP). We consider several variants depending on whether the queries are on general time windows (between times t₁ and t₂), or are restricted to being cumulative (between times 1 and t₂), and depending on whether the DP neighboring relation is event-level or the more stringent item-level. We obtain nearly tight upper and lower bounds on the errors of DP algorithms for these problems. En route, we obtain an event-level DP algorithm for estimating, at each time step, the number of distinct items seen over the last W updates with error polylogarithmic in W; this answers an open question of Bolot et al. (ICDT 2013). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17539"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17539">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Badih Ghazi, Ravi Kumar, Jelani Nelson, and Pasin Manurangsi. Private Counting of Distinct and k-Occurring Items in Time Windows. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 55:1-55:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17539-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{ghazi_et_al:LIPIcs.ITCS.2023.55, author = {Ghazi, Badih and Kumar, Ravi and Nelson, Jelani and Manurangsi, Pasin}, title = {{Private Counting of Distinct and k-Occurring Items in Time Windows}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {55:1--55:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.55}, URN = {urn:nbn:de:0030-drops-175580}, doi = {10.4230/LIPIcs.ITCS.2023.55}, annote = {Keywords: Differential Privacy, Algorithms, Distinct Elements, Time Windows} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17539-input">@InProceedings{ghazi_et_al:LIPIcs.ITCS.2023.55, author = {Ghazi, Badih and Kumar, Ravi and Nelson, Jelani and Manurangsi, Pasin}, title = {{Private Counting of Distinct and k-Occurring Items in Time Windows}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {55:1--55:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.55}, URN = {urn:nbn:de:0030-drops-175580}, doi = {10.4230/LIPIcs.ITCS.2023.55}, annote = {Keywords: Differential Privacy, Algorithms, Distinct Elements, Time Windows} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.56"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.56">DOI: 10.4230/LIPIcs.ITCS.2023.56</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.56/LIPIcs.ITCS.2023.56.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.56" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17540" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17540" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.56" data-bs-toggle="tooltip" data-title="Is Untrusted Randomness Helpful?" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Girish, Uma"></span> <span data-key="dagstuhl.contributor.author" data-value="Raz, Ran"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhan, Wei"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Interactive proof systems"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Pseudorandomness and derandomization"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.56"> Is Untrusted Randomness Helpful? </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Uma Girish, Ran Raz, and Wei Zhan </p> <div class="row"> <div class="collapse" id="abstract-17540"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17540">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Randomized algorithms and protocols assume the availability of a perfect source of randomness. In real life, however, perfect randomness is rare and is almost never guaranteed. The gap between these two facts motivated much of the work on randomness and derandomization in theoretical computer science. In this work, we define a new type of randomized algorithms (and protocols), that we call robustly-randomized algorithms (protocols). Such algorithms have access to two separate (read-once) random strings. The first string is trusted to be perfectly random, but its length is bounded by some parameter k = k(n) (where n is the length of the input). We think of k as relatively small, say sub-linear or poly-logarithmic in n. The second string is of unbounded length and is assumed to be random, but its randomness is not trusted. The output of the algorithm is either an output in the set of possible outputs of the problem, or a special symbol, interpreted as do not know and denoted by ⊥. On every input for the algorithm, the output of the algorithm must satisfy the following two requirements: 1) If the second random string is perfectly random then the algorithm must output the correct answer with high probability. 2) If the second random string is an arbitrary string, even adversarially chosen after seeing the input, the algorithm must output with high probability either the correct answer or the special symbol ⊥. We discuss relations of this new definition to several previously studied notions in randomness and derandomization. For example, when considering polynomial-time algorithms, if k is logarithmic we get the complexity class ZPP, while if k is unbounded we get the complexity class BPP, and for a general k, the algorithm can be viewed as an interactive proof with a probabilistic polynomial-time prover and a probabilistic polynomial-time verifier, where the prover is allowed an unlimited number of random bits and the verifier is limited to at most k random bits. Every previously-studied class of randomized algorithms or protocols, and more generally, every previous use of randomness in theoretical computer science, can be revisited and redefined in light of our new definition, by replacing each random string with a pair of random strings, the first is trusted to be perfectly random but is relatively short and the second is of unlimited length but its randomness is not trusted. The main question that we ask is: In which settings and for which problems is the untrusted random string helpful? Our main technical observation is that every problem in the class BPL (of problems solvable by bounded-error randomized logspace algorithms) can be solved by a robustly-randomized logspace algorithm with k = O(log n), that is with just a logarithmic number of trusted random bits. We also give query complexity separations that show cases where the untrusted random string is provenly helpful. Specifically, we show that there are promise problems that can be solved by robustly-randomized protocols with only one query and just a logarithmic number of trusted random bits, whereas any randomized protocol requires either a linear number of random bits or an exponential number of queries, and any zero-error randomized protocol requires a polynomial number of queries. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17540"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17540">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Uma Girish, Ran Raz, and Wei Zhan. Is Untrusted Randomness Helpful?. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 56:1-56:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17540-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{girish_et_al:LIPIcs.ITCS.2023.56, author = {Girish, Uma and Raz, Ran and Zhan, Wei}, title = {{Is Untrusted Randomness Helpful?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {56:1--56:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.56}, URN = {urn:nbn:de:0030-drops-175593}, doi = {10.4230/LIPIcs.ITCS.2023.56}, annote = {Keywords: Untrusted, Randomness, Verifiable, ZPL, BPL, ZPP, BPP} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17540-input">@InProceedings{girish_et_al:LIPIcs.ITCS.2023.56, author = {Girish, Uma and Raz, Ran and Zhan, Wei}, title = {{Is Untrusted Randomness Helpful?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {56:1--56:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.56}, URN = {urn:nbn:de:0030-drops-175593}, doi = {10.4230/LIPIcs.ITCS.2023.56}, annote = {Keywords: Untrusted, Randomness, Verifiable, ZPL, BPL, ZPP, BPP} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.57"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.57">DOI: 10.4230/LIPIcs.ITCS.2023.57</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.57/LIPIcs.ITCS.2023.57.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.57" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17541" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17541" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.57" data-bs-toggle="tooltip" data-title="Consensus Division in an Arbitrary Ratio" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Goldberg, Paul"></span> <span data-key="dagstuhl.contributor.author" data-value="Li, Jiawei"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.57"> Consensus Division in an Arbitrary Ratio </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Paul Goldberg and Jiawei Li </p> <div class="row"> <div class="collapse" id="abstract-17541"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17541">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We consider the problem of partitioning a line segment into two subsets, so that n finite measures all have the same ratio of values for the subsets. Letting α ∈ [0,1] denote the desired ratio, this generalises the PPA-complete consensus-halving problem, in which α = 1/2. Stromquist and Woodall [Stromquist and Woodall, 1985] showed that for any α, there exists a solution using 2n cuts of the segment. They also showed that if α is irrational, that upper bound is almost optimal. In this work, we elaborate the bounds for rational values α. For α = 𝓁/k, we show a lower bound of (k-1)/k ⋅ 2n - O(1) cuts; we also obtain almost matching upper bounds for a large subset of rational α. On the computational side, we explore its dependence on the number of cuts available. More specifically, 1) when using the minimal number of cuts for each instance is required, the problem is NP-hard for any α; 2) for a large subset of rational α = 𝓁/k, when (k-1)/k ⋅ 2n cuts are available, the problem is in PPA-k under Turing reduction; 3) when 2n cuts are allowed, the problem belongs to PPA for any α; more generally, the problem belong to PPA-p for any prime p if 2(p-1)⋅⌈p/2⌉/⌊p/2⌋ ⋅ n cuts are available. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17541"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17541">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Paul Goldberg and Jiawei Li. Consensus Division in an Arbitrary Ratio. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 57:1-57:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17541-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{goldberg_et_al:LIPIcs.ITCS.2023.57, author = {Goldberg, Paul and Li, Jiawei}, title = {{Consensus Division in an Arbitrary Ratio}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {57:1--57:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.57}, URN = {urn:nbn:de:0030-drops-175606}, doi = {10.4230/LIPIcs.ITCS.2023.57}, annote = {Keywords: Consensus Halving, TFNP, PPA-k, Necklace Splitting} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17541-input">@InProceedings{goldberg_et_al:LIPIcs.ITCS.2023.57, author = {Goldberg, Paul and Li, Jiawei}, title = {{Consensus Division in an Arbitrary Ratio}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {57:1--57:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.57}, URN = {urn:nbn:de:0030-drops-175606}, doi = {10.4230/LIPIcs.ITCS.2023.57}, annote = {Keywords: Consensus Halving, TFNP, PPA-k, Necklace Splitting} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.58"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.58">DOI: 10.4230/LIPIcs.ITCS.2023.58</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.58/LIPIcs.ITCS.2023.58.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.58" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17542" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17542" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.58" data-bs-toggle="tooltip" data-title="An Algorithmic Bridge Between Hamming and Levenshtein Distances" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Goldenberg, Elazar"></span> <span data-key="dagstuhl.contributor.author" data-value="Kociumaka, Tomasz"></span> <span data-key="dagstuhl.contributor.author" data-value="Krauthgamer, Robert"></span> <span data-key="dagstuhl.contributor.author" data-value="Saha, Barna"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Pattern matching"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.58"> An Algorithmic Bridge Between Hamming and Levenshtein Distances </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Elazar Goldenberg, Tomasz Kociumaka, Robert Krauthgamer, and Barna Saha </p> <div class="row"> <div class="collapse" id="abstract-17542"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17542">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> The edit distance between strings classically assigns unit cost to every character insertion, deletion, and substitution, whereas the Hamming distance only allows substitutions. In many real-life scenarios, insertions and deletions (abbreviated indels) appear frequently but significantly less so than substitutions. To model this, we consider substitutions being cheaper than indels, with cost 1/a for a parameter a ≥ 1. This basic variant, denoted ED_a, bridges classical edit distance (a = 1) with Hamming distance (a → ∞), leading to interesting algorithmic challenges: Does the time complexity of computing ED_a interpolate between that of Hamming distance (linear time) and edit distance (quadratic time)? What about approximating ED_a? We first present a simple deterministic exact algorithm for ED_a and further prove that it is near-optimal assuming the Orthogonal Vectors Conjecture. Our main result is a randomized algorithm computing a (1+ε)-approximation of ED_a(X,Y), given strings X,Y of total length n and a bound k ≥ ED_a(X,Y). For simplicity, let us focus on k ≥ 1 and a constant ε > 0; then, our algorithm takes Õ(n/a + ak³) time. Unless a = Õ(1), in which case ED_a resembles the standard edit distance, and for the most interesting regime of small enough k, this running time is sublinear in n. We also consider a very natural version that asks to find a (k_I, k_S)-alignment, i.e., an alignment with at most k_I indels and k_S substitutions. In this setting, we give an exact algorithm and, more importantly, an Õ((nk_I)/k_S + k_S k_I³)-time (1,1+ε)-bicriteria approximation algorithm. The latter solution is based on the techniques we develop for ED_a for a = Θ(k_S/k_I), and its running time is again sublinear in n whenever k_I ≪ k_S and the overall distance is small enough. These bounds are in stark contrast to unit-cost edit distance, where state-of-the-art algorithms are far from achieving (1+ε)-approximation in sublinear time, even for a favorable choice of k. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17542"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17542">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Elazar Goldenberg, Tomasz Kociumaka, Robert Krauthgamer, and Barna Saha. An Algorithmic Bridge Between Hamming and Levenshtein Distances. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 58:1-58:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17542-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{goldenberg_et_al:LIPIcs.ITCS.2023.58, author = {Goldenberg, Elazar and Kociumaka, Tomasz and Krauthgamer, Robert and Saha, Barna}, title = {{An Algorithmic Bridge Between Hamming and Levenshtein Distances}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {58:1--58:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.58}, URN = {urn:nbn:de:0030-drops-175615}, doi = {10.4230/LIPIcs.ITCS.2023.58}, annote = {Keywords: edit distance, Hamming distance, Longest Common Extension queries} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17542-input">@InProceedings{goldenberg_et_al:LIPIcs.ITCS.2023.58, author = {Goldenberg, Elazar and Kociumaka, Tomasz and Krauthgamer, Robert and Saha, Barna}, title = {{An Algorithmic Bridge Between Hamming and Levenshtein Distances}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {58:1--58:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.58}, URN = {urn:nbn:de:0030-drops-175615}, doi = {10.4230/LIPIcs.ITCS.2023.58}, annote = {Keywords: edit distance, Hamming distance, Longest Common Extension queries} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.59"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.59">DOI: 10.4230/LIPIcs.ITCS.2023.59</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.59/LIPIcs.ITCS.2023.59.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.59" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17543" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17543" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.59" data-bs-toggle="tooltip" data-title="On Interactive Proofs of Proximity with Proof-Oblivious Queries" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Goldreich, Oded"></span> <span data-key="dagstuhl.contributor.author" data-value="Rothblum, Guy N."></span> <span data-key="dagstuhl.contributor.author" data-value="Skverer, Tal"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Interactive proof systems"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.59"> On Interactive Proofs of Proximity with Proof-Oblivious Queries </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Oded Goldreich, Guy N. Rothblum, and Tal Skverer </p> <div class="row"> <div class="collapse" id="abstract-17543"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17543">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Interactive proofs of proximity (IPPs) offer ultra-fast approximate verification of assertions regarding their input, where ultra-fast means that only a small portion of the input is read and approximate verification is analogous to the notion of approximate decision that underlies property testing. Specifically, in an IPP, the prover can make the verifier accept each input in the property, but cannot fool the verifier into accepting an input that is far from the property (except for with small probability). The verifier in an IPP system engages in two very different types of activities: interacting with an untrusted prover, and querying its input. The definition allows for arbitrary coordination between these two activities, but keeping them separate is both conceptually interesting and necessary for important applications such as addressing temporal considerations (i.e., at what time is each of the services available) and facilitating the construction of zero-knowledge schemes. In this work we embark on a systematic study of IPPs with proof-oblivious queries, where the queries should not be affected by the interaction with the prover. We assign the query and interaction activities to separate modules, and consider different limitations on their coordination. The most strict limitation requires these activities to be totally isolated from one another; they just feed their views to a separate deciding module. We show that such systems can be efficiently emulated by standard testers. Going to the other extreme, we only disallow information to flow from the interacting module to the querying module, but allow free information flow in the other direction. We show that extremely efficient one-round (i.e., two-message) systems of such type can be used to verify properties that are extremely hard to test (without the help of a prover). That is, the complexity of verifying can be polylogarithmic in the complexity of testing. This stands in contrast the MAPs (viewed as 1/2-round systems) in which proof-oblivious queries are as limited as our isolated model. Our focus is on an intermediate model that allows shared randomness between the querying and interacting modules but no information flow between them. In this case we show that 1-round systems are efficiently emulated by standard testers but 3/2-round systems of extremely low complexity exist for properties that are extremely hard to test. One additional result about this model is that it can efficiently emulate any IPP for any property of low-degree polynomials. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17543"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17543">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Oded Goldreich, Guy N. Rothblum, and Tal Skverer. On Interactive Proofs of Proximity with Proof-Oblivious Queries. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 59:1-59:16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17543-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{goldreich_et_al:LIPIcs.ITCS.2023.59, author = {Goldreich, Oded and Rothblum, Guy N. and Skverer, Tal}, title = {{On Interactive Proofs of Proximity with Proof-Oblivious Queries}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {59:1--59:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.59}, URN = {urn:nbn:de:0030-drops-175625}, doi = {10.4230/LIPIcs.ITCS.2023.59}, annote = {Keywords: Complexity Theory, Property Testing, Interactive Proofs, Interactive Proofs of Proximity, Proof-Oblivious Queries} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17543-input">@InProceedings{goldreich_et_al:LIPIcs.ITCS.2023.59, author = {Goldreich, Oded and Rothblum, Guy N. and Skverer, Tal}, title = {{On Interactive Proofs of Proximity with Proof-Oblivious Queries}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {59:1--59:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.59}, URN = {urn:nbn:de:0030-drops-175625}, doi = {10.4230/LIPIcs.ITCS.2023.59}, annote = {Keywords: Complexity Theory, Property Testing, Interactive Proofs, Interactive Proofs of Proximity, Proof-Oblivious Queries} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.60"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.60">DOI: 10.4230/LIPIcs.ITCS.2023.60</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.60/LIPIcs.ITCS.2023.60.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.60" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17544" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17544" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.60" data-bs-toggle="tooltip" data-title="Loss Minimization Through the Lens Of Outcome Indistinguishability" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Gopalan, Parikshit"></span> <span data-key="dagstuhl.contributor.author" data-value="Hu, Lunjia"></span> <span data-key="dagstuhl.contributor.author" data-value="Kim, Michael P."></span> <span data-key="dagstuhl.contributor.author" data-value="Reingold, Omer"></span> <span data-key="dagstuhl.contributor.author" data-value="Wieder, Udi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory and algorithms for application domains"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.60"> Loss Minimization Through the Lens Of Outcome Indistinguishability </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Parikshit Gopalan, Lunjia Hu, Michael P. Kim, Omer Reingold, and Udi Wieder </p> <div class="row"> <div class="collapse" id="abstract-17544"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17544">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We present a new perspective on loss minimization and the recent notion of Omniprediction through the lens of Outcome Indistingusihability. For a collection of losses and hypothesis class, omniprediction requires that a predictor provide a loss-minimization guarantee simultaneously for every loss in the collection compared to the best (loss-specific) hypothesis in the class. We present a generic template to learn predictors satisfying a guarantee we call Loss Outcome Indistinguishability. For a set of statistical tests - based on a collection of losses and hypothesis class - a predictor is Loss OI if it is indistinguishable (according to the tests) from Nature’s true probabilities over outcomes. By design, Loss OI implies omniprediction in a direct and intuitive manner. We simplify Loss OI further, decomposing it into a calibration condition plus multiaccuracy for a class of functions derived from the loss and hypothesis classes. By careful analysis of this class, we give efficient constructions of omnipredictors for interesting classes of loss functions, including non-convex losses. This decomposition highlights the utility of a new multi-group fairness notion that we call calibrated multiaccuracy, which lies in between multiaccuracy and multicalibration. We show that calibrated multiaccuracy implies Loss OI for the important set of convex losses arising from Generalized Linear Models, without requiring full multicalibration. For such losses, we show an equivalence between our computational notion of Loss OI and a geometric notion of indistinguishability, formulated as Pythagorean theorems in the associated Bregman divergence. We give an efficient algorithm for calibrated multiaccuracy with computational complexity comparable to that of multiaccuracy. In all, calibrated multiaccuracy offers an interesting tradeoff point between efficiency and generality in the omniprediction landscape. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17544"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17544">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Parikshit Gopalan, Lunjia Hu, Michael P. Kim, Omer Reingold, and Udi Wieder. Loss Minimization Through the Lens Of Outcome Indistinguishability. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 60:1-60:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17544-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{gopalan_et_al:LIPIcs.ITCS.2023.60, author = {Gopalan, Parikshit and Hu, Lunjia and Kim, Michael P. and Reingold, Omer and Wieder, Udi}, title = {{Loss Minimization Through the Lens Of Outcome Indistinguishability}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {60:1--60:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.60}, URN = {urn:nbn:de:0030-drops-175635}, doi = {10.4230/LIPIcs.ITCS.2023.60}, annote = {Keywords: Loss Minimization, Indistinguishability} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17544-input">@InProceedings{gopalan_et_al:LIPIcs.ITCS.2023.60, author = {Gopalan, Parikshit and Hu, Lunjia and Kim, Michael P. and Reingold, Omer and Wieder, Udi}, title = {{Loss Minimization Through the Lens Of Outcome Indistinguishability}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {60:1--60:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.60}, URN = {urn:nbn:de:0030-drops-175635}, doi = {10.4230/LIPIcs.ITCS.2023.60}, annote = {Keywords: Loss Minimization, Indistinguishability} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.61"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.61">DOI: 10.4230/LIPIcs.ITCS.2023.61</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.61/LIPIcs.ITCS.2023.61.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.61" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17545" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17545" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.61" data-bs-toggle="tooltip" data-title="List Agreement Expansion from Coboundary Expansion" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Gotlib, Roy"></span> <span data-key="dagstuhl.contributor.author" data-value="Kaufman, Tali"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.61"> List Agreement Expansion from Coboundary Expansion </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Roy Gotlib and Tali Kaufman </p> <div class="row"> <div class="collapse" id="abstract-17545"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17545">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> One of the key components in PCP constructions are agreement tests. In agreement test the tester is given access to subsets of fixed size of some set, each equipped with an assignment. The tester is then tasked with testing whether these local assignments agree with some global assignment over the entire set. One natural generalization of this concept is the case where, instead of a single assignment to each local view, the tester is given access to l different assignments for every subset. The tester is then tasked with testing whether there exist l global functions that agree with all of the assignments of all of the local views. In this work we present sufficient condition for a set system to exhibit this generalized definition of list agreement expansion. This is, to our knowledge, the first work to consider this natural generalization of agreement testing. Despite initially appearing very similar to agreement expansion in definition, proving that a set system exhibits list agreement expansion seem to require a different set of techniques. This is due to the fact that the natural extension of agreement testing (i.e. that there exists a pairing of the lists such that each pair agrees with each other) does not suffice when testing for list agreement as list agreement crucially relies on a global structure. It follows that if a local assignments satisfy list agreement they must not only agree locally but also exhibit some additional structure. In order to test for the existence of this additional structure we use the connection between covering spaces of a high dimensional complex and its coboundaries. Specifically, we use this connection as a form of "decoupling". Moreover, we show that any set system that exhibits list agreement expansion also supports direct sum testing. This is the first scheme for direct sum testing that works regardless of the parity of the sizes of the local sets. Prior to our work the schemes for direct sum testing were based on the parity of the sizes of the local tests. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17545"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17545">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Roy Gotlib and Tali Kaufman. List Agreement Expansion from Coboundary Expansion. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 61:1-61:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17545-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{gotlib_et_al:LIPIcs.ITCS.2023.61, author = {Gotlib, Roy and Kaufman, Tali}, title = {{List Agreement Expansion from Coboundary Expansion}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {61:1--61:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.61}, URN = {urn:nbn:de:0030-drops-175647}, doi = {10.4230/LIPIcs.ITCS.2023.61}, annote = {Keywords: High dimensional Expanders, Property Testing, Agreement Testing} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17545-input">@InProceedings{gotlib_et_al:LIPIcs.ITCS.2023.61, author = {Gotlib, Roy and Kaufman, Tali}, title = {{List Agreement Expansion from Coboundary Expansion}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {61:1--61:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.61}, URN = {urn:nbn:de:0030-drops-175647}, doi = {10.4230/LIPIcs.ITCS.2023.61}, annote = {Keywords: High dimensional Expanders, Property Testing, Agreement Testing} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.62"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.62">DOI: 10.4230/LIPIcs.ITCS.2023.62</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.62/LIPIcs.ITCS.2023.62.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.62" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17546" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17546" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.62" data-bs-toggle="tooltip" data-title="Asynchronous Multi-Party Quantum Computation" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Goyal, Vipul"></span> <span data-key="dagstuhl.contributor.author" data-value="Liu-Zhang, Chen-Da"></span> <span data-key="dagstuhl.contributor.author" data-value="Raizes, Justin"></span> <span data-key="dagstuhl.contributor.author" data-value="Ribeiro, João"></span> <span data-key="dagstuhl.subject.classification" data-value="Hardware → Quantum communication and cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.62"> Asynchronous Multi-Party Quantum Computation </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, and João Ribeiro </p> <div class="row"> <div class="collapse" id="abstract-17546"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17546">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Multi-party quantum computation (MPQC) allows a set of parties to securely compute a quantum circuit over private quantum data. Current MPQC protocols rely on the fact that the network is synchronous, i.e., messages sent are guaranteed to be delivered within a known fixed delay upper bound, and unfortunately completely break down even when only a single message arrives late. Motivated by real-world networks, the seminal work of Ben-Or, Canetti and Goldreich (STOC'93) initiated the study of multi-party computation for classical circuits over asynchronous networks, where the network delay can be arbitrary. In this work, we begin the study of asynchronous multi-party quantum computation (AMPQC) protocols, where the circuit to compute is quantum. Our results completely characterize the optimal achievable corruption threshold: we present an n-party AMPQC protocol secure up to t < n/4 corruptions, and an impossibility result when t ≥ n/4 parties are corrupted. Remarkably, this characterization differs from the analogous classical setting, where the optimal corruption threshold is t < n/3. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17546"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17546">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, and João Ribeiro. Asynchronous Multi-Party Quantum Computation. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 62:1-62:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17546-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{goyal_et_al:LIPIcs.ITCS.2023.62, author = {Goyal, Vipul and Liu-Zhang, Chen-Da and Raizes, Justin and Ribeiro, Jo\~{a}o}, title = {{Asynchronous Multi-Party Quantum Computation}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {62:1--62:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.62}, URN = {urn:nbn:de:0030-drops-175655}, doi = {10.4230/LIPIcs.ITCS.2023.62}, annote = {Keywords: Quantum Cryptography, Multiparty Computation, Asynchronous} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17546-input">@InProceedings{goyal_et_al:LIPIcs.ITCS.2023.62, author = {Goyal, Vipul and Liu-Zhang, Chen-Da and Raizes, Justin and Ribeiro, Jo\~{a}o}, title = {{Asynchronous Multi-Party Quantum Computation}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {62:1--62:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.62}, URN = {urn:nbn:de:0030-drops-175655}, doi = {10.4230/LIPIcs.ITCS.2023.62}, annote = {Keywords: Quantum Cryptography, Multiparty Computation, Asynchronous} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.63"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.63">DOI: 10.4230/LIPIcs.ITCS.2023.63</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.63/LIPIcs.ITCS.2023.63.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.63" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17547" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17547" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.63" data-bs-toggle="tooltip" data-title="Unsplittable Euclidean Capacitated Vehicle Routing: A (2+ε)-Approximation Algorithm" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Grandoni, Fabrizio"></span> <span data-key="dagstuhl.contributor.author" data-value="Mathieu, Claire"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhou, Hang"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Approximation algorithms analysis"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.63"> Unsplittable Euclidean Capacitated Vehicle Routing: A (2+ε)-Approximation Algorithm </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Fabrizio Grandoni, Claire Mathieu, and Hang Zhou </p> <div class="row"> <div class="collapse" id="abstract-17547"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17547">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In the unsplittable capacitated vehicle routing problem, we are given a metric space with a vertex called depot and a set of vertices called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the depot such that the demand of each terminal is covered by a single tour (i.e., the demand cannot be split), and the total demand of the terminals in each tour does not exceed the capacity of 1. Our main result is a polynomial-time (2+ε)-approximation algorithm for this problem in the two-dimensional Euclidean plane, i.e., for the special case where the terminals and the depot are associated with points in the Euclidean plane and their distances are defined accordingly. This improves on recent work by Blauth, Traub, and Vygen [IPCO'21] and Friggstad, Mousavi, Rahgoshay, and Salavatipour [IPCO'22]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17547"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17547">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Fabrizio Grandoni, Claire Mathieu, and Hang Zhou. Unsplittable Euclidean Capacitated Vehicle Routing: A (2+ε)-Approximation Algorithm. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 63:1-63:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17547-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{grandoni_et_al:LIPIcs.ITCS.2023.63, author = {Grandoni, Fabrizio and Mathieu, Claire and Zhou, Hang}, title = {{Unsplittable Euclidean Capacitated Vehicle Routing: A (2+\epsilon)-Approximation Algorithm}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {63:1--63:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.63}, URN = {urn:nbn:de:0030-drops-175660}, doi = {10.4230/LIPIcs.ITCS.2023.63}, annote = {Keywords: capacitated vehicle routing, approximation algorithms, Euclidean plane} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17547-input">@InProceedings{grandoni_et_al:LIPIcs.ITCS.2023.63, author = {Grandoni, Fabrizio and Mathieu, Claire and Zhou, Hang}, title = {{Unsplittable Euclidean Capacitated Vehicle Routing: A (2+\epsilon)-Approximation Algorithm}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {63:1--63:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.63}, URN = {urn:nbn:de:0030-drops-175660}, doi = {10.4230/LIPIcs.ITCS.2023.63}, annote = {Keywords: capacitated vehicle routing, approximation algorithms, Euclidean plane} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.64"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.64">DOI: 10.4230/LIPIcs.ITCS.2023.64</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.64/LIPIcs.ITCS.2023.64.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.64" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17548" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17548" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.64" data-bs-toggle="tooltip" data-title="Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Grewal, Sabee"></span> <span data-key="dagstuhl.contributor.author" data-value="Iyer, Vishnu"></span> <span data-key="dagstuhl.contributor.author" data-value="Kretschmer, William"></span> <span data-key="dagstuhl.contributor.author" data-value="Liang, Daniel"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.64"> Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Sabee Grewal, Vishnu Iyer, William Kretschmer, and Daniel Liang </p> <div class="row"> <div class="collapse" id="abstract-17548"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17548">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We show that quantum states with "low stabilizer complexity" can be efficiently distinguished from Haar-random. Specifically, given an n-qubit pure state |ψ⟩, we give an efficient algorithm that distinguishes whether |ψ⟩ is (i) Haar-random or (ii) a state with stabilizer fidelity at least 1/k (i.e., has fidelity at least 1/k with some stabilizer state), promised that one of these is the case. With black-box access to |ψ⟩, our algorithm uses O(k^{12} log(1/δ)) copies of |ψ⟩ and O(n k^{12} log(1/δ)) time to succeed with probability at least 1-δ, and, with access to a state preparation unitary for |ψ⟩ (and its inverse), O(k³ log(1/δ)) queries and O(n k³ log(1/δ)) time suffice. As a corollary, we prove that ω(log(n)) T-gates are necessary for any Clifford+T circuit to prepare computationally pseudorandom quantum states, a first-of-its-kind lower bound. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17548"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17548">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Sabee Grewal, Vishnu Iyer, William Kretschmer, and Daniel Liang. Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 64:1-64:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17548-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{grewal_et_al:LIPIcs.ITCS.2023.64, author = {Grewal, Sabee and Iyer, Vishnu and Kretschmer, William and Liang, Daniel}, title = {{Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {64:1--64:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.64}, URN = {urn:nbn:de:0030-drops-175670}, doi = {10.4230/LIPIcs.ITCS.2023.64}, annote = {Keywords: Pseudorandom quantum states, Clifford + T, Haar random, Bell sampling, stabilizer formalism, stabilizer extent, stabilizer fidelity, learning theory, complexity theory} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17548-input">@InProceedings{grewal_et_al:LIPIcs.ITCS.2023.64, author = {Grewal, Sabee and Iyer, Vishnu and Kretschmer, William and Liang, Daniel}, title = {{Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {64:1--64:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.64}, URN = {urn:nbn:de:0030-drops-175670}, doi = {10.4230/LIPIcs.ITCS.2023.64}, annote = {Keywords: Pseudorandom quantum states, Clifford + T, Haar random, Bell sampling, stabilizer formalism, stabilizer extent, stabilizer fidelity, learning theory, complexity theory} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.65"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.65">DOI: 10.4230/LIPIcs.ITCS.2023.65</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.65/LIPIcs.ITCS.2023.65.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.65" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17549" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17549" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.65" data-bs-toggle="tooltip" data-title="Look Before, Before You Leap: Online Vector Load Balancing with Few Reassignments" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Gupta, Varun"></span> <span data-key="dagstuhl.contributor.author" data-value="Krishnaswamy, Ravishankar"></span> <span data-key="dagstuhl.contributor.author" data-value="Sandeep, Sai"></span> <span data-key="dagstuhl.contributor.author" data-value="Sundaresan, Janani"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Scheduling algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.65"> Look Before, Before You Leap: Online Vector Load Balancing with Few Reassignments </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Varun Gupta, Ravishankar Krishnaswamy, Sai Sandeep, and Janani Sundaresan </p> <div class="row"> <div class="collapse" id="abstract-17549"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17549">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this paper we study two fully-dynamic multi-dimensional vector load balancing problems with recourse. The adversary presents a stream of n job insertions and deletions, where each job j is a vector in ℝ^d_{≥ 0}. In the vector scheduling problem, the algorithm must maintain an assignment of the active jobs to m identical machines to minimize the makespan (maximum load on any dimension on any machine). In the vector bin packing problem, the algorithm must maintain an assignment of active jobs into a number of bins of unit capacity in all dimensions, to minimize the number of bins currently used. In both problems, the goal is to maintain solutions that are competitive against the optimal solution for the active set of jobs, at every time instant. The algorithm is allowed to change the assignment from time to time, with the secondary objective of minimizing the amortized recourse, which is the average cardinality of the change of the assignment per update to the instance. For the vector scheduling problem, we present two simple algorithms. The first is a randomized algorithm with an O(1) amortized recourse and an O(log d/log log d) competitive ratio against oblivious adversaries. The second algorithm is a deterministic algorithm that is competitive against adaptive adversaries but with a slightly higher competitive ratio of O(log d) and a per-job recourse guarantee bounded by Õ(log n + log d log OPT). We also prove a sharper instance-dependent recourse guarantee for the deterministic algorithm. For the vector bin packing problem, we make the so-called small jobs assumption that the size of all jobs in all the coordinates is O(1/log d) and present a simple O(1)-competitive algorithm with O(log n) recourse against oblivious adversaries. For both problems, the main challenge is to determine when and how to migrate jobs to maintain competitive solutions. Our central idea is that for each job, we make these decisions based only on the active set of jobs that are "earlier" than this job in some ordering ≺ of the jobs. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17549"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17549">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Varun Gupta, Ravishankar Krishnaswamy, Sai Sandeep, and Janani Sundaresan. Look Before, Before You Leap: Online Vector Load Balancing with Few Reassignments. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 65:1-65:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17549-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{gupta_et_al:LIPIcs.ITCS.2023.65, author = {Gupta, Varun and Krishnaswamy, Ravishankar and Sandeep, Sai and Sundaresan, Janani}, title = {{Look Before, Before You Leap: Online Vector Load Balancing with Few Reassignments}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {65:1--65:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.65}, URN = {urn:nbn:de:0030-drops-175685}, doi = {10.4230/LIPIcs.ITCS.2023.65}, annote = {Keywords: Vector Scheduling, Vector Load Balancing} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17549-input">@InProceedings{gupta_et_al:LIPIcs.ITCS.2023.65, author = {Gupta, Varun and Krishnaswamy, Ravishankar and Sandeep, Sai and Sundaresan, Janani}, title = {{Look Before, Before You Leap: Online Vector Load Balancing with Few Reassignments}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {65:1--65:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.65}, URN = {urn:nbn:de:0030-drops-175685}, doi = {10.4230/LIPIcs.ITCS.2023.65}, annote = {Keywords: Vector Scheduling, Vector Load Balancing} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.66"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.66">DOI: 10.4230/LIPIcs.ITCS.2023.66</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.66/LIPIcs.ITCS.2023.66.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.66" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17550" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17550" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.66" data-bs-toggle="tooltip" data-title="Incompressiblity and Next-Block Pseudoentropy" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Haitner, Iftach"></span> <span data-key="dagstuhl.contributor.author" data-value="Mazor, Noam"></span> <span data-key="dagstuhl.contributor.author" data-value="Silbak, Jad"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.66"> Incompressiblity and Next-Block Pseudoentropy </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Iftach Haitner, Noam Mazor, and Jad Silbak </p> <div class="row"> <div class="collapse" id="abstract-17550"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17550">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A distribution is k-incompressible, Yao [FOCS '82], if no efficient compression scheme compresses it to less than k bits. While being a natural measure, its relation to other computational analogs of entropy such as pseudoentropy, Hastad, Impagliazzo, Levin, and Luby [SICOMP '99], and to other cryptographic hardness assumptions, was unclear. We advance towards a better understating of this notion, showing that a k-incompressible distribution has (k-2) bits of next-block pseudoentropy, a refinement of pseudoentropy introduced by Haitner, Reingold, and Vadhan [SICOMP '13]. We deduce that a samplable distribution X that is (H(X)+2)-incompressible, implies the existence of one-way functions. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17550"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17550">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Iftach Haitner, Noam Mazor, and Jad Silbak. Incompressiblity and Next-Block Pseudoentropy. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 66:1-66:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17550-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{haitner_et_al:LIPIcs.ITCS.2023.66, author = {Haitner, Iftach and Mazor, Noam and Silbak, Jad}, title = {{Incompressiblity and Next-Block Pseudoentropy}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {66:1--66:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.66}, URN = {urn:nbn:de:0030-drops-175697}, doi = {10.4230/LIPIcs.ITCS.2023.66}, annote = {Keywords: incompressibility, next-block pseudoentropy, sparse languages} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17550-input">@InProceedings{haitner_et_al:LIPIcs.ITCS.2023.66, author = {Haitner, Iftach and Mazor, Noam and Silbak, Jad}, title = {{Incompressiblity and Next-Block Pseudoentropy}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {66:1--66:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.66}, URN = {urn:nbn:de:0030-drops-175697}, doi = {10.4230/LIPIcs.ITCS.2023.66}, annote = {Keywords: incompressibility, next-block pseudoentropy, sparse languages} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.67"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.67">DOI: 10.4230/LIPIcs.ITCS.2023.67</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.67/LIPIcs.ITCS.2023.67.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.67" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17551" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17551" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.67" data-bs-toggle="tooltip" data-title="Downward Self-Reducibility in TFNP" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Harsha, Prahladh"></span> <span data-key="dagstuhl.contributor.author" data-value="Mitropolsky, Daniel"></span> <span data-key="dagstuhl.contributor.author" data-value="Rosen, Alon"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.67"> Downward Self-Reducibility in TFNP </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Prahladh Harsha, Daniel Mitropolsky, and Alon Rosen </p> <div class="row"> <div class="collapse" id="abstract-17551"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17551">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A problem is downward self-reducible if it can be solved efficiently given an oracle that returns solutions for strictly smaller instances. In the decisional landscape, downward self-reducibility is well studied and it is known that all downward self-reducible problems are in PSPACE. In this paper, we initiate the study of downward self-reducible search problems which are guaranteed to have a solution - that is, the downward self-reducible problems in TFNP. We show that most natural PLS-complete problems are downward self-reducible and any downward self-reducible problem in TFNP is contained in PLS. Furthermore, if the downward self-reducible problem is in TFUP (i.e. it has a unique solution), then it is actually contained in UEOPL, a subclass of CLS. This implies that if integer factoring is downward self-reducible then it is in fact in UEOPL, suggesting that no efficient factoring algorithm exists using the factorization of smaller numbers. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17551"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17551">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Prahladh Harsha, Daniel Mitropolsky, and Alon Rosen. Downward Self-Reducibility in TFNP. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 67:1-67:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17551-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{harsha_et_al:LIPIcs.ITCS.2023.67, author = {Harsha, Prahladh and Mitropolsky, Daniel and Rosen, Alon}, title = {{Downward Self-Reducibility in TFNP}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {67:1--67:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.67}, URN = {urn:nbn:de:0030-drops-175700}, doi = {10.4230/LIPIcs.ITCS.2023.67}, annote = {Keywords: downward self-reducibility, TFNP, TFUP, factoring, PLS, CLS} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17551-input">@InProceedings{harsha_et_al:LIPIcs.ITCS.2023.67, author = {Harsha, Prahladh and Mitropolsky, Daniel and Rosen, Alon}, title = {{Downward Self-Reducibility in TFNP}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {67:1--67:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.67}, URN = {urn:nbn:de:0030-drops-175700}, doi = {10.4230/LIPIcs.ITCS.2023.67}, annote = {Keywords: downward self-reducibility, TFNP, TFUP, factoring, PLS, CLS} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.68"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.68">DOI: 10.4230/LIPIcs.ITCS.2023.68</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.68/LIPIcs.ITCS.2023.68.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.68" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17552" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17552" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.68" data-bs-toggle="tooltip" data-title="Symmetric Formulas for Products of Permutations" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="He, William"></span> <span data-key="dagstuhl.contributor.author" data-value="Rossman, Benjamin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity theory and logic"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.68"> Symmetric Formulas for Products of Permutations </a> </h5> <p class="card-text small authors"> <b>Authors:</b> William He and Benjamin Rossman </p> <div class="row"> <div class="collapse" id="abstract-17552"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17552">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the formula complexity of the word problem Word_{S_n,k} : {0,1}^{kn²} → {0,1}: given n-by-n permutation matrices M₁,… ,M_k, compute the (1,1)-entry of the matrix product M₁⋯ M_k. An important feature of this function is that it is invariant under action of S_n^{k-1} given by (π₁,… ,π_{k-1})(M₁,… ,M_k) = (M₁π₁^{-1},π₁M₂π₂^{-1},… ,π_{k-2}M_{k-1}π_{k-1}^{-1},π_{k-1}M_k). This symmetry is also exhibited in the smallest known unbounded fan-in {and,or,not}-formulas for Word_{S_n,k}, which have size n^O(log k). In this paper we prove a matching n^{Ω(log k)} lower bound for S_n^{k-1}-invariant formulas computing Word_{S_n,k}. This result is motivated by the fact that a similar lower bound for unrestricted (non-invariant) formulas would separate complexity classes NC¹ and Logspace. Our more general main theorem gives a nearly tight n^d(k^{1/d}-1) lower bound on the G^{k-1}-invariant depth-d {maj,and,or,not}-formula size of Word_{G,k} for any finite simple group G whose minimum permutation representation has degree n. We also give nearly tight lower bounds on the G^{k-1}-invariant depth-d {and,or,not}-formula size in the case where G is an abelian group. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17552"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17552">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">William He and Benjamin Rossman. Symmetric Formulas for Products of Permutations. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 68:1-68:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17552-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{he_et_al:LIPIcs.ITCS.2023.68, author = {He, William and Rossman, Benjamin}, title = {{Symmetric Formulas for Products of Permutations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {68:1--68:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.68}, URN = {urn:nbn:de:0030-drops-175717}, doi = {10.4230/LIPIcs.ITCS.2023.68}, annote = {Keywords: circuit complexity, group-invariant formulas} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17552-input">@InProceedings{he_et_al:LIPIcs.ITCS.2023.68, author = {He, William and Rossman, Benjamin}, title = {{Symmetric Formulas for Products of Permutations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {68:1--68:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.68}, URN = {urn:nbn:de:0030-drops-175717}, doi = {10.4230/LIPIcs.ITCS.2023.68}, annote = {Keywords: circuit complexity, group-invariant formulas} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.69"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.69">DOI: 10.4230/LIPIcs.ITCS.2023.69</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.69/LIPIcs.ITCS.2023.69.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.69" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17553" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17553" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.69" data-bs-toggle="tooltip" data-title="A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Henzinger, Monika"></span> <span data-key="dagstuhl.contributor.author" data-value="Jin, Billy"></span> <span data-key="dagstuhl.contributor.author" data-value="Peng, Richard"></span> <span data-key="dagstuhl.contributor.author" data-value="Williamson, David P."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Network flows"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.69"> A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Monika Henzinger, Billy Jin, Richard Peng, and David P. Williamson </p> <div class="row"> <div class="collapse" id="abstract-17553"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17553">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Over the last two decades, a significant line of work in theoretical algorithms has made progress in solving linear systems of the form 𝐋𝐱 = 𝐛, where 𝐋 is the Laplacian matrix of a weighted graph with weights w(i,j) > 0 on the edges. The solution 𝐱 of the linear system can be interpreted as the potentials of an electrical flow in which the resistance on edge (i,j) is 1/w(i,j). Kelner, Orrechia, Sidford, and Zhu [Kelner et al., 2013] give a combinatorial, near-linear time algorithm that maintains the Kirchoff Current Law, and gradually enforces the Kirchoff Potential Law by updating flows around cycles (cycle toggling). In this paper, we consider a dual version of the algorithm that maintains the Kirchoff Potential Law, and gradually enforces the Kirchoff Current Law by cut toggling: each iteration updates all potentials on one side of a fundamental cut of a spanning tree by the same amount. We prove that this dual algorithm also runs in a near-linear number of iterations. We show, however, that if we abstract cut toggling as a natural data structure problem, this problem can be reduced to the online vector-matrix-vector problem (OMv), which has been conjectured to be difficult for dynamic algorithms [Henzinger et al., 2015]. The conjecture implies that the data structure does not have an O(n^{1-ε}) time algorithm for any ε > 0, and thus a straightforward implementation of the cut-toggling algorithm requires essentially linear time per iteration. To circumvent the lower bound, we batch update steps, and perform them simultaneously instead of sequentially. An appropriate choice of batching leads to an Õ(m^{1.5}) time cut-toggling algorithm for solving Laplacian systems. Furthermore, we show that if we sparsify the graph and call our algorithm recursively on the Laplacian system implied by batching and sparsifying, we can reduce the running time to O(m^{1 + ε}) for any ε > 0. Thus, the dual cut-toggling algorithm can achieve (almost) the same running time as its primal cycle-toggling counterpart. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17553"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17553">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Monika Henzinger, Billy Jin, Richard Peng, and David P. Williamson. A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 69:1-69:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17553-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{henzinger_et_al:LIPIcs.ITCS.2023.69, author = {Henzinger, Monika and Jin, Billy and Peng, Richard and Williamson, David P.}, title = {{A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {69:1--69:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.69}, URN = {urn:nbn:de:0030-drops-175720}, doi = {10.4230/LIPIcs.ITCS.2023.69}, annote = {Keywords: Laplacian solver, electrical flow, data structure} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17553-input">@InProceedings{henzinger_et_al:LIPIcs.ITCS.2023.69, author = {Henzinger, Monika and Jin, Billy and Peng, Richard and Williamson, David P.}, title = {{A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {69:1--69:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.69}, URN = {urn:nbn:de:0030-drops-175720}, doi = {10.4230/LIPIcs.ITCS.2023.69}, annote = {Keywords: Laplacian solver, electrical flow, data structure} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.70"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.70">DOI: 10.4230/LIPIcs.ITCS.2023.70</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.70/LIPIcs.ITCS.2023.70.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.70" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17554" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17554" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.70" data-bs-toggle="tooltip" data-title="Learning Versus Pseudorandom Generators in Constant Parallel Time" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Hirahara, Shuichi"></span> <span data-key="dagstuhl.contributor.author" data-value="Nanashima, Mikito"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Boolean function learning"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.70"> Learning Versus Pseudorandom Generators in Constant Parallel Time </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Shuichi Hirahara and Mikito Nanashima </p> <div class="row"> <div class="collapse" id="abstract-17554"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17554">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A polynomial-stretch pseudorandom generator (PPRG) in NC⁰ (i.e., constant parallel time) is one of the most important cryptographic primitives, especially for constructing highly efficient cryptography and indistinguishability obfuscation. The celebrated work (Applebaum, Ishai, and Kushilevitz, SIAM Journal on Computing, 2006) on randomized encodings yields the characterization of sublinear-stretch pseudorandom generators in NC⁰ by the existence of logspace-computable one-way functions, but characterizing PPRGs in NC⁰ seems out of reach at present. Therefore, it is natural to ask which sort of hardness notion is essential for constructing PPRGs in NC⁰. Particularly, to the best of our knowledge, all the previously known candidates for PPRGs in NC⁰ follow only one framework based on Goldreich’s one-way function. In this paper, we present a new learning-theoretic characterization for PPRGs in NC⁰ and related classes. Specifically, we consider the average-case hardness of learning for well-studied classes in parameterized settings, where the number of samples is restricted to fixed-parameter tractable (FPT), and show that the following are equivalent: - The existence of (a collection of) PPRGs in NC⁰. - The average-case hardness of learning sparse 𝔽₂-polynomials on a sparse example distribution and an NC⁰-samplable target distribution (i.e., a distribution on target functions). - The average-case hardness of learning Fourier-sparse functions on a sparse example distribution and an NC⁰-samplable target distribution. - The average-case hardness of learning constant-depth parity decision trees on a sparse example distribution and an NC⁰-samplable target distribution. Furthermore, we characterize a (single) PPRG in parity-NC⁰ by the average-case hardness of learning constant-degree 𝔽₂-polynomials on a uniform example distribution with FPT samples. Based on our results, we propose new candidates for PPRGs in NC⁰ and related classes under a hardness assumption on a natural learning problem. An important property of PPRGs in NC⁰ constructed in our framework is that the output bits are computed by various predicates; thus, it seems to resist an attack that depends on a specific property of one fixed predicate. Conceptually, the main contribution of this study is to formalize a theory of FPT dualization of concept classes, which yields a meta-theorem for the first result. For the second result on PPRGs in parity-NC⁰, we use a different technique of pseudorandom 𝔽₂-polynomials. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17554"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17554">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Shuichi Hirahara and Mikito Nanashima. Learning Versus Pseudorandom Generators in Constant Parallel Time. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 70:1-70:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17554-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{hirahara_et_al:LIPIcs.ITCS.2023.70, author = {Hirahara, Shuichi and Nanashima, Mikito}, title = {{Learning Versus Pseudorandom Generators in Constant Parallel Time}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {70:1--70:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.70}, URN = {urn:nbn:de:0030-drops-175736}, doi = {10.4230/LIPIcs.ITCS.2023.70}, annote = {Keywords: Parallel cryptography, polynomial-stretch pseudorandom generators in NC⁰, PAC learning, average-case complexity, fixed-parameter tractability} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17554-input">@InProceedings{hirahara_et_al:LIPIcs.ITCS.2023.70, author = {Hirahara, Shuichi and Nanashima, Mikito}, title = {{Learning Versus Pseudorandom Generators in Constant Parallel Time}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {70:1--70:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.70}, URN = {urn:nbn:de:0030-drops-175736}, doi = {10.4230/LIPIcs.ITCS.2023.70}, annote = {Keywords: Parallel cryptography, polynomial-stretch pseudorandom generators in NC⁰, PAC learning, average-case complexity, fixed-parameter tractability} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.71"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.71">DOI: 10.4230/LIPIcs.ITCS.2023.71</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.71/LIPIcs.ITCS.2023.71.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.71" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17555" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17555" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.71" data-bs-toggle="tooltip" data-title="Secure Distributed Network Optimization Against Eavesdroppers" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Hitron, Yael"></span> <span data-key="dagstuhl.contributor.author" data-value="Parter, Merav"></span> <span data-key="dagstuhl.contributor.author" data-value="Yogev, Eylon"></span> <span data-key="dagstuhl.subject.classification" data-value="Networks → Network algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.71"> Secure Distributed Network Optimization Against Eavesdroppers </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yael Hitron, Merav Parter, and Eylon Yogev </p> <div class="row"> <div class="collapse" id="abstract-17555"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17555">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We present a new algorithmic framework for distributed network optimization in the presence of eavesdropper adversaries, also known as passive wiretappers. In this setting, the adversary is listening to the traffic exchanged over a fixed set of edges in the graph, trying to extract information on the private input and output of the vertices. A distributed algorithm is denoted as f-secure, if it guarantees that the adversary learns nothing on the input and output for the vertices, provided that it controls at most f graph edges. Recent work has presented general simulation results for f-secure algorithms, with a round overhead of D^Θ(f), where D is the diameter of the graph. In this paper, we present a completely different white-box, and yet quite general, approach for obtaining f-secure algorithms for fundamental network optimization tasks. Specifically, for n-vertex D-diameter graphs with (unweighted) edge-connectivity Ω(f), there are f-secure congest algorithms for computing MST, partwise aggregation, and (1+ε) (weighted) minimum cut approximation, within Õ(D+f √n) congest rounds, hence nearly tight for f = Õ(1). Our algorithms are based on designing a secure algorithmic-toolkit that leverages the special structure of congest algorithms for global optimization graph problems. One of these tools is a general secure compiler that simulates light-weight distributed algorithms in a congestion-sensitive manner. We believe that these tools set the ground for designing additional secure solutions in the congest model and beyond. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17555"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17555">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Yael Hitron, Merav Parter, and Eylon Yogev. Secure Distributed Network Optimization Against Eavesdroppers. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 71:1-71:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17555-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{hitron_et_al:LIPIcs.ITCS.2023.71, author = {Hitron, Yael and Parter, Merav and Yogev, Eylon}, title = {{Secure Distributed Network Optimization Against Eavesdroppers}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {71:1--71:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.71}, URN = {urn:nbn:de:0030-drops-175746}, doi = {10.4230/LIPIcs.ITCS.2023.71}, annote = {Keywords: congest, secure computation, network optimization} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17555-input">@InProceedings{hitron_et_al:LIPIcs.ITCS.2023.71, author = {Hitron, Yael and Parter, Merav and Yogev, Eylon}, title = {{Secure Distributed Network Optimization Against Eavesdroppers}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {71:1--71:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.71}, URN = {urn:nbn:de:0030-drops-175746}, doi = {10.4230/LIPIcs.ITCS.2023.71}, annote = {Keywords: congest, secure computation, network optimization} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.72"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.72">DOI: 10.4230/LIPIcs.ITCS.2023.72</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.72/LIPIcs.ITCS.2023.72.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.72" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17556" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17556" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.72" data-bs-toggle="tooltip" data-title="Comparative Learning: A Sample Complexity Theory for Two Hypothesis Classes" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Hu, Lunjia"></span> <span data-key="dagstuhl.contributor.author" data-value="Peale, Charlotte"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Machine learning theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sample complexity and generalization bounds"></span> <span data-key="dagstuhl.subject.classification" data-value="Computing methodologies → Learning settings"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.72"> Comparative Learning: A Sample Complexity Theory for Two Hypothesis Classes </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Lunjia Hu and Charlotte Peale </p> <div class="row"> <div class="collapse" id="abstract-17556"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17556">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In many learning theory problems, a central role is played by a hypothesis class: we might assume that the data is labeled according to a hypothesis in the class (usually referred to as the realizable setting), or we might evaluate the learned model by comparing it with the best hypothesis in the class (the agnostic setting). Taking a step beyond these classic setups that involve only a single hypothesis class, we study a variety of problems that involve two hypothesis classes simultaneously. We introduce comparative learning as a combination of the realizable and agnostic settings in PAC learning: given two binary hypothesis classes S and B, we assume that the data is labeled according to a hypothesis in the source class S and require the learned model to achieve an accuracy comparable to the best hypothesis in the benchmark class B. Even when both S and B have infinite VC dimensions, comparative learning can still have a small sample complexity. We show that the sample complexity of comparative learning is characterized by the mutual VC dimension VC(S,B) which we define to be the maximum size of a subset shattered by both S and B. We also show a similar result in the online setting, where we give a regret characterization in terms of the analogous mutual Littlestone dimension Ldim(S,B). These results also hold for partial hypotheses. We additionally show that the insights necessary to characterize the sample complexity of comparative learning can be applied to other tasks involving two hypothesis classes. In particular, we characterize the sample complexity of realizable multiaccuracy and multicalibration using the mutual fat-shattering dimension, an analogue of the mutual VC dimension for real-valued hypotheses. This not only solves an open problem proposed by Hu, Peale, Reingold (2022), but also leads to independently interesting results extending classic ones about regression, boosting, and covering number to our two-hypothesis-class setting. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17556"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17556">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Lunjia Hu and Charlotte Peale. Comparative Learning: A Sample Complexity Theory for Two Hypothesis Classes. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 72:1-72:30, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17556-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{hu_et_al:LIPIcs.ITCS.2023.72, author = {Hu, Lunjia and Peale, Charlotte}, title = {{Comparative Learning: A Sample Complexity Theory for Two Hypothesis Classes}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {72:1--72:30}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.72}, URN = {urn:nbn:de:0030-drops-175752}, doi = {10.4230/LIPIcs.ITCS.2023.72}, annote = {Keywords: Comparative learning, mutual VC dimension, realizable multiaccuracy and multicalibration, sample complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17556-input">@InProceedings{hu_et_al:LIPIcs.ITCS.2023.72, author = {Hu, Lunjia and Peale, Charlotte}, title = {{Comparative Learning: A Sample Complexity Theory for Two Hypothesis Classes}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {72:1--72:30}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.72}, URN = {urn:nbn:de:0030-drops-175752}, doi = {10.4230/LIPIcs.ITCS.2023.72}, annote = {Keywords: Comparative learning, mutual VC dimension, realizable multiaccuracy and multicalibration, sample complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.73"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.73">DOI: 10.4230/LIPIcs.ITCS.2023.73</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.73/LIPIcs.ITCS.2023.73.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.73" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17557" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17557" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.73" data-bs-toggle="tooltip" data-title="Recovery from Non-Decomposable Distance Oracles" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Hu, Zhuangfei"></span> <span data-key="dagstuhl.contributor.author" data-value="Li, Xinda"></span> <span data-key="dagstuhl.contributor.author" data-value="Woodruff, David P."></span> <span data-key="dagstuhl.contributor.author" data-value="Zhang, Hongyang"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhang, Shufan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Lower bounds and information complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Parameterized complexity and exact algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithm design techniques"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.73"> Recovery from Non-Decomposable Distance Oracles </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Zhuangfei Hu, Xinda Li, David P. Woodruff, Hongyang Zhang, and Shufan Zhang </p> <div class="row"> <div class="collapse" id="abstract-17557"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17557">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A line of work has looked at the problem of recovering an input from distance queries. In this setting, there is an unknown sequence s ∈ {0,1}^{≤ n}, and one chooses a set of queries y ∈ {0,1}^𝒪(n) and receives d(s,y) for a distance function d. The goal is to make as few queries as possible to recover s. Although this problem is well-studied for decomposable distances, i.e., distances of the form d(s,y) = ∑_{i=1}^n f(s_i, y_i) for some function f, which includes the important cases of Hamming distance, 𝓁_p-norms, and M-estimators, to the best of our knowledge this problem has not been studied for non-decomposable distances, for which there are important special cases such as edit distance, dynamic time warping (DTW), Fréchet distance, earth mover’s distance, and so on. We initiate the study and develop a general framework for such distances. Interestingly, for some distances such as DTW or Fréchet, exact recovery of the sequence s is provably impossible, and so we show by allowing the characters in y to be drawn from a slightly larger alphabet this then becomes possible. In a number of cases we obtain optimal or near-optimal query complexity. We also study the role of adaptivity for a number of different distance functions. One motivation for understanding non-adaptivity is that the query sequence can be fixed and the distances of the input to the queries provide a non-linear embedding of the input, which can be used in downstream applications involving, e.g., neural networks for natural language processing. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17557"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17557">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Zhuangfei Hu, Xinda Li, David P. Woodruff, Hongyang Zhang, and Shufan Zhang. Recovery from Non-Decomposable Distance Oracles. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 73:1-73:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17557-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{hu_et_al:LIPIcs.ITCS.2023.73, author = {Hu, Zhuangfei and Li, Xinda and Woodruff, David P. and Zhang, Hongyang and Zhang, Shufan}, title = {{Recovery from Non-Decomposable Distance Oracles}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {73:1--73:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.73}, URN = {urn:nbn:de:0030-drops-175767}, doi = {10.4230/LIPIcs.ITCS.2023.73}, annote = {Keywords: Sequence Recovery, Edit Distance, DTW Distance, Fr\'{e}chet Distance} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17557-input">@InProceedings{hu_et_al:LIPIcs.ITCS.2023.73, author = {Hu, Zhuangfei and Li, Xinda and Woodruff, David P. and Zhang, Hongyang and Zhang, Shufan}, title = {{Recovery from Non-Decomposable Distance Oracles}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {73:1--73:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.73}, URN = {urn:nbn:de:0030-drops-175767}, doi = {10.4230/LIPIcs.ITCS.2023.73}, annote = {Keywords: Sequence Recovery, Edit Distance, DTW Distance, Fr\'{e}chet Distance} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.74"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.74">DOI: 10.4230/LIPIcs.ITCS.2023.74</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.74/LIPIcs.ITCS.2023.74.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.74" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17558" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17558" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.74" data-bs-toggle="tooltip" data-title="Karchmer-Wigderson Games for Hazard-Free Computation" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Ikenmeyer, Christian"></span> <span data-key="dagstuhl.contributor.author" data-value="Komarath, Balagopal"></span> <span data-key="dagstuhl.contributor.author" data-value="Saurabh, Nitin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Concurrency"></span> <span data-key="dagstuhl.subject.classification" data-value="Hardware → Combinational circuits"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.74"> Karchmer-Wigderson Games for Hazard-Free Computation </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Christian Ikenmeyer, Balagopal Komarath, and Nitin Saurabh </p> <div class="row"> <div class="collapse" id="abstract-17558"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17558">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We present a Karchmer-Wigderson game to study the complexity of hazard-free formulas. This new game is both a generalization of the monotone Karchmer-Wigderson game and an analog of the classical Boolean Karchmer-Wigderson game. Therefore, it acts as a bridge between the existing monotone and general games. Using this game, we prove hazard-free formula size and depth lower bounds that are provably stronger than those possible by the standard technique of transferring results from monotone complexity in a black-box fashion. For the multiplexer function we give (1) a hazard-free formula of optimal size and (2) an improved low-depth hazard-free formula of almost optimal size and (3) a hazard-free formula with alternation depth 2 that has optimal depth. We then use our optimal constructions to obtain an improved universal worst-case hazard-free formula size upper bound. We see our results as a step towards establishing hazard-free computation as an independent missing link between Boolean complexity and monotone complexity. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17558"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17558">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Christian Ikenmeyer, Balagopal Komarath, and Nitin Saurabh. Karchmer-Wigderson Games for Hazard-Free Computation. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 74:1-74:25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17558-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{ikenmeyer_et_al:LIPIcs.ITCS.2023.74, author = {Ikenmeyer, Christian and Komarath, Balagopal and Saurabh, Nitin}, title = {{Karchmer-Wigderson Games for Hazard-Free Computation}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {74:1--74:25}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.74}, URN = {urn:nbn:de:0030-drops-175775}, doi = {10.4230/LIPIcs.ITCS.2023.74}, annote = {Keywords: Hazard-free computation, monotone computation, Karchmer-Wigderson games, communication complexity, lower bounds} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17558-input">@InProceedings{ikenmeyer_et_al:LIPIcs.ITCS.2023.74, author = {Ikenmeyer, Christian and Komarath, Balagopal and Saurabh, Nitin}, title = {{Karchmer-Wigderson Games for Hazard-Free Computation}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {74:1--74:25}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.74}, URN = {urn:nbn:de:0030-drops-175775}, doi = {10.4230/LIPIcs.ITCS.2023.74}, annote = {Keywords: Hazard-free computation, monotone computation, Karchmer-Wigderson games, communication complexity, lower bounds} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.75"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.75">DOI: 10.4230/LIPIcs.ITCS.2023.75</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.75/LIPIcs.ITCS.2023.75.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.75" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17559" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17559" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.75" data-bs-toggle="tooltip" data-title="Learning Reserve Prices in Second-Price Auctions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Jin, Yaonan"></span> <span data-key="dagstuhl.contributor.author" data-value="Lu, Pinyan"></span> <span data-key="dagstuhl.contributor.author" data-value="Xiao, Tao"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic mechanism design"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational pricing and auctions"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sample complexity and generalization bounds"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Bayesian analysis"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.75"> Learning Reserve Prices in Second-Price Auctions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yaonan Jin, Pinyan Lu, and Tao Xiao </p> <div class="row"> <div class="collapse" id="abstract-17559"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17559">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> This paper proves the tight sample complexity of Second-Price Auction with Anonymous Reserve, up to a logarithmic factor, for each of all the value distribution families studied in the literature: [0,1]-bounded, [1,H]-bounded, regular, and monotone hazard rate (MHR). Remarkably, the setting-specific tight sample complexity poly(ε^{-1}) depends on the precision ε ∈ (0, 1), but not on the number of bidders n ≥ 1. Further, in the two bounded-support settings, our learning algorithm allows correlated value distributions. In contrast, the tight sample complexity Θ̃(n) ⋅ poly(ε^{-1}) of Myerson Auction proved by Guo, Huang and Zhang (STOC 2019) has a nearly-linear dependence on n ≥ 1, and holds only for independent value distributions in every setting. We follow a similar framework as the Guo-Huang-Zhang work, but replace their information theoretical arguments with a direct proof. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17559"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17559">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Yaonan Jin, Pinyan Lu, and Tao Xiao. Learning Reserve Prices in Second-Price Auctions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 75:1-75:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17559-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{jin_et_al:LIPIcs.ITCS.2023.75, author = {Jin, Yaonan and Lu, Pinyan and Xiao, Tao}, title = {{Learning Reserve Prices in Second-Price Auctions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {75:1--75:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.75}, URN = {urn:nbn:de:0030-drops-175780}, doi = {10.4230/LIPIcs.ITCS.2023.75}, annote = {Keywords: Revenue Maximization, Sample Complexity, Anonymous Reserve} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17559-input">@InProceedings{jin_et_al:LIPIcs.ITCS.2023.75, author = {Jin, Yaonan and Lu, Pinyan and Xiao, Tao}, title = {{Learning Reserve Prices in Second-Price Auctions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {75:1--75:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.75}, URN = {urn:nbn:de:0030-drops-175780}, doi = {10.4230/LIPIcs.ITCS.2023.75}, annote = {Keywords: Revenue Maximization, Sample Complexity, Anonymous Reserve} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.76"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.76">DOI: 10.4230/LIPIcs.ITCS.2023.76</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.76/LIPIcs.ITCS.2023.76.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.76" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17560" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17560" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.76" data-bs-toggle="tooltip" data-title="The Complexity of Infinite-Horizon General-Sum Stochastic Games" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Jin, Yujia"></span> <span data-key="dagstuhl.contributor.author" data-value="Muthukumar, Vidya"></span> <span data-key="dagstuhl.contributor.author" data-value="Sidford, Aaron"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.76"> The Complexity of Infinite-Horizon General-Sum Stochastic Games </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yujia Jin, Vidya Muthukumar, and Aaron Sidford </p> <div class="row"> <div class="collapse" id="abstract-17560"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17560">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the complexity of computing stationary Nash equilibrium (NE) in n-player infinite-horizon general-sum stochastic games. We focus on the problem of computing NE in such stochastic games when each player is restricted to choosing a stationary policy and rewards are discounted. First, we prove that computing such NE is in PPAD (in addition to clearly being PPAD-hard). Second, we consider turn-based specializations of such games where at each state there is at most a single player that can take actions and show that these (seemingly-simpler) games remain PPAD-hard. Third, we show that under further structural assumptions on the rewards computing NE in such turn-based games is possible in polynomial time. Towards achieving these results we establish structural facts about stochastic games of broader utility, including monotonicity of utilities under single-state single-action changes and reductions to settings where each player controls a single state. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17560"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17560">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Yujia Jin, Vidya Muthukumar, and Aaron Sidford. The Complexity of Infinite-Horizon General-Sum Stochastic Games. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 76:1-76:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17560-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{jin_et_al:LIPIcs.ITCS.2023.76, author = {Jin, Yujia and Muthukumar, Vidya and Sidford, Aaron}, title = {{The Complexity of Infinite-Horizon General-Sum Stochastic Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {76:1--76:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.76}, URN = {urn:nbn:de:0030-drops-175791}, doi = {10.4230/LIPIcs.ITCS.2023.76}, annote = {Keywords: complexity, stochastic games, general-sum games, Nash equilibrium} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17560-input">@InProceedings{jin_et_al:LIPIcs.ITCS.2023.76, author = {Jin, Yujia and Muthukumar, Vidya and Sidford, Aaron}, title = {{The Complexity of Infinite-Horizon General-Sum Stochastic Games}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {76:1--76:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.76}, URN = {urn:nbn:de:0030-drops-175791}, doi = {10.4230/LIPIcs.ITCS.2023.76}, annote = {Keywords: complexity, stochastic games, general-sum games, Nash equilibrium} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.77"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.77">DOI: 10.4230/LIPIcs.ITCS.2023.77</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.77/LIPIcs.ITCS.2023.77.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.77" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17561" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17561" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.77" data-bs-toggle="tooltip" data-title="Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Jones, Chris"></span> <span data-key="dagstuhl.contributor.author" data-value="Marwaha, Kunal"></span> <span data-key="dagstuhl.contributor.author" data-value="Sandhu, Juspreet Singh"></span> <span data-key="dagstuhl.contributor.author" data-value="Shi, Jonathan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Probability and statistics"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.77"> Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Chris Jones, Kunal Marwaha, Juspreet Singh Sandhu, and Jonathan Shi </p> <div class="row"> <div class="collapse" id="abstract-17561"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17561">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study random constraint satisfaction problems (CSPs) at large clause density. We relate the structure of near-optimal solutions for any Boolean Max-CSP to that for an associated spin glass on the hypercube, using the Guerra-Toninelli interpolation from statistical physics. The noise stability polynomial of the CSP’s predicate is, up to a constant, the mixture polynomial of the associated spin glass. We show two main consequences: 1) We prove that the maximum fraction of constraints that can be satisfied in a random Max-CSP at large clause density is determined by the ground state energy density of the corresponding spin glass. Since the latter value can be computed with the Parisi formula [Parisi, 1980; Talagrand, 2006; Auffinger and Chen, 2017], we provide numerical values for some popular CSPs. 2) We prove that a Max-CSP at large clause density possesses generalized versions of the overlap gap property if and only if the same holds for the corresponding spin glass. We transfer results from [Huang and Sellke, 2021] to obstruct algorithms with overlap concentration on a large class of Max-CSPs. This immediately includes local classical and local quantum algorithms [Chou et al., 2022]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17561"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17561">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Chris Jones, Kunal Marwaha, Juspreet Singh Sandhu, and Jonathan Shi. Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 77:1-77:26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17561-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{jones_et_al:LIPIcs.ITCS.2023.77, author = {Jones, Chris and Marwaha, Kunal and Sandhu, Juspreet Singh and Shi, Jonathan}, title = {{Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {77:1--77:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.77}, URN = {urn:nbn:de:0030-drops-175804}, doi = {10.4230/LIPIcs.ITCS.2023.77}, annote = {Keywords: spin glass, overlap gap property, constraint satisfaction problem, Guerra-Toninelli interpolation} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17561-input">@InProceedings{jones_et_al:LIPIcs.ITCS.2023.77, author = {Jones, Chris and Marwaha, Kunal and Sandhu, Juspreet Singh and Shi, Jonathan}, title = {{Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {77:1--77:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.77}, URN = {urn:nbn:de:0030-drops-175804}, doi = {10.4230/LIPIcs.ITCS.2023.77}, annote = {Keywords: spin glass, overlap gap property, constraint satisfaction problem, Guerra-Toninelli interpolation} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.78"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.78">DOI: 10.4230/LIPIcs.ITCS.2023.78</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.78/LIPIcs.ITCS.2023.78.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.78" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17562" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17562" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.78" data-bs-toggle="tooltip" data-title="Garland’s Technique for Posets and High Dimensional Grassmannian Expanders" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Kaufman, Tali"></span> <span data-key="dagstuhl.contributor.author" data-value="Tessler, Ran J."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.78"> Garland’s Technique for Posets and High Dimensional Grassmannian Expanders </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Tali Kaufman and Ran J. Tessler </p> <div class="row"> <div class="collapse" id="abstract-17562"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17562">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Local to global machinery plays an important role in the study of simplicial complexes, since the seminal work of Garland [Garland, 1973] to our days. In this work we develop a local to global machinery for general posets. We show that the high dimensional expansion notions and many recent expansion results have a generalization to posets. Examples are fast convergence of high dimensional random walks generalizing [Kaufman et al., 2020], [Alev and Lau, 2020], an equivalence with a global random walk definition, generalizing [Dikstein et al., 2018] and a trickling down theorem, generalizing [Oppenheim, 2018]. In particular, we show that some posets, such as the Grassmannian poset, exhibit qualitatively stronger trickling down effect than simplicial complexes. Using these methods, and the novel idea of posetification to Ramanujan complexes [Lubotzky et al., 2005a], [Lubotzky et al., 2005b], we construct a constant degree expanding Grassmannian poset, and analyze its expansion. This it the first construction of such object, whose existence was conjectured in [Dikstein et al., 2018]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17562"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17562">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Tali Kaufman and Ran J. Tessler. Garland’s Technique for Posets and High Dimensional Grassmannian Expanders. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 78:1-78:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17562-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{kaufman_et_al:LIPIcs.ITCS.2023.78, author = {Kaufman, Tali and Tessler, Ran J.}, title = {{Garland’s Technique for Posets and High Dimensional Grassmannian Expanders}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {78:1--78:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.78}, URN = {urn:nbn:de:0030-drops-175819}, doi = {10.4230/LIPIcs.ITCS.2023.78}, annote = {Keywords: High dimensional Expanders, Posets, Grassmannian, Garland Method} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17562-input">@InProceedings{kaufman_et_al:LIPIcs.ITCS.2023.78, author = {Kaufman, Tali and Tessler, Ran J.}, title = {{Garland’s Technique for Posets and High Dimensional Grassmannian Expanders}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {78:1--78:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.78}, URN = {urn:nbn:de:0030-drops-175819}, doi = {10.4230/LIPIcs.ITCS.2023.78}, annote = {Keywords: High dimensional Expanders, Posets, Grassmannian, Garland Method} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.79"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.79">DOI: 10.4230/LIPIcs.ITCS.2023.79</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.79/LIPIcs.ITCS.2023.79.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.79" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17563" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17563" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.79" data-bs-toggle="tooltip" data-title="Making Decisions Under Outcome Performativity" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Kim, Michael P."></span> <span data-key="dagstuhl.contributor.author" data-value="Perdomo, Juan C."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory and algorithms for application domains"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.79"> Making Decisions Under Outcome Performativity </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Michael P. Kim and Juan C. Perdomo </p> <div class="row"> <div class="collapse" id="abstract-17563"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17563">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Decision-makers often act in response to data-driven predictions, with the goal of achieving favorable outcomes. In such settings, predictions don’t passively forecast the future; instead, predictions actively shape the distribution of outcomes they are meant to predict. This performative prediction setting [Brown et al., 2022] raises new challenges for learning "optimal" decision rules. In particular, existing solution concepts do not address the apparent tension between the goals of forecasting outcomes accurately and steering individuals to achieve desirable outcomes. To contend with this concern, we introduce a new optimality concept - performative omniprediction - adapted from the supervised (non-performative) learning setting [Gopalan et al., 2022]. A performative omnipredictor is a single predictor that simultaneously encodes the optimal decision rule with respect to many possibly-competing objectives. Our main result demonstrates that efficient performative omnipredictors exist, under a natural restriction of performative prediction, which we call outcome performativity. On a technical level, our results follow by carefully generalizing the notion of outcome indistinguishability [Cynthia Dwork et al., 2021] to the outcome performative setting. From an appropriate notion of Performative OI, we recover many consequences known to hold in the supervised setting, such as omniprediction and universal adaptability [Kim et al., 2022]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17563"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17563">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Michael P. Kim and Juan C. Perdomo. Making Decisions Under Outcome Performativity. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 79:1-79:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17563-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{kim_et_al:LIPIcs.ITCS.2023.79, author = {Kim, Michael P. and Perdomo, Juan C.}, title = {{Making Decisions Under Outcome Performativity}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {79:1--79:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.79}, URN = {urn:nbn:de:0030-drops-175824}, doi = {10.4230/LIPIcs.ITCS.2023.79}, annote = {Keywords: performative prediction, outcome indistinguishability} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17563-input">@InProceedings{kim_et_al:LIPIcs.ITCS.2023.79, author = {Kim, Michael P. and Perdomo, Juan C.}, title = {{Making Decisions Under Outcome Performativity}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {79:1--79:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.79}, URN = {urn:nbn:de:0030-drops-175824}, doi = {10.4230/LIPIcs.ITCS.2023.79}, annote = {Keywords: performative prediction, outcome indistinguishability} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.80"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.80">DOI: 10.4230/LIPIcs.ITCS.2023.80</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.80/LIPIcs.ITCS.2023.80.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.80" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17564" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17564" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.80" data-bs-toggle="tooltip" data-title="Characterizing the Multi-Pass Streaming Complexity for Solving Boolean CSPs Exactly" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Kol, Gillat"></span> <span data-key="dagstuhl.contributor.author" data-value="Paramonov, Dmitry"></span> <span data-key="dagstuhl.contributor.author" data-value="Saxena, Raghuvansh R."></span> <span data-key="dagstuhl.contributor.author" data-value="Yu, Huacheng"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming models"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.80"> Characterizing the Multi-Pass Streaming Complexity for Solving Boolean CSPs Exactly </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, and Huacheng Yu </p> <div class="row"> <div class="collapse" id="abstract-17564"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17564">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study boolean constraint satisfaction problems (CSPs) Max-CSP^f_n for all predicates f: {0,1}^k → {0,1}. In these problems, given an integer v and a list of constraints over n boolean variables, each obtained by applying f to a sequence of literals, we wish to decide if there is an assignment to the variables that satisfies at least v constraints. We consider these problems in the streaming model, where the algorithm makes a small number of passes over the list of constraints. Our first and main result is the following complete characterization: For every predicate f, the streaming space complexity of the Max-CSP^f_n problem is Θ̃(n^deg(f)), where deg(f) is the degree of f when viewed as a multilinear polynomial. While the upper bound is obtained by a (very simple) one-pass streaming algorithm, our lower bound shows that a better space complexity is impossible even with constant-pass streaming algorithms. Building on our techniques, we are also able to get an optimal Ω(n²) lower bound on the space complexity of constant-pass streaming algorithms for the well studied Max-CUT problem, even though it is not technically a Max-CSP^f_n problem as, e.g., negations of variables and repeated constraints are not allowed. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17564"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17564">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, and Huacheng Yu. Characterizing the Multi-Pass Streaming Complexity for Solving Boolean CSPs Exactly. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 80:1-80:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17564-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{kol_et_al:LIPIcs.ITCS.2023.80, author = {Kol, Gillat and Paramonov, Dmitry and Saxena, Raghuvansh R. and Yu, Huacheng}, title = {{Characterizing the Multi-Pass Streaming Complexity for Solving Boolean CSPs Exactly}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {80:1--80:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.80}, URN = {urn:nbn:de:0030-drops-175837}, doi = {10.4230/LIPIcs.ITCS.2023.80}, annote = {Keywords: Streaming algorithms, Constraint Satisfaction Problems} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17564-input">@InProceedings{kol_et_al:LIPIcs.ITCS.2023.80, author = {Kol, Gillat and Paramonov, Dmitry and Saxena, Raghuvansh R. and Yu, Huacheng}, title = {{Characterizing the Multi-Pass Streaming Complexity for Solving Boolean CSPs Exactly}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {80:1--80:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.80}, URN = {urn:nbn:de:0030-drops-175837}, doi = {10.4230/LIPIcs.ITCS.2023.80}, annote = {Keywords: Streaming algorithms, Constraint Satisfaction Problems} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.81"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.81">DOI: 10.4230/LIPIcs.ITCS.2023.81</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.81/LIPIcs.ITCS.2023.81.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.81" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17565" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17565" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.81" data-bs-toggle="tooltip" data-title="False Consensus, Information Theory, and Prediction Markets" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Kong, Yuqing"></span> <span data-key="dagstuhl.contributor.author" data-value="Schoenebeck, Grant"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic game theory and mechanism design"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.81"> False Consensus, Information Theory, and Prediction Markets </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yuqing Kong and Grant Schoenebeck </p> <div class="row"> <div class="collapse" id="abstract-17565"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17565">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study a setting where Bayesian agents with a common prior have private information related to an event’s outcome and sequentially make public announcements relating to their information. Our main result shows that when agents' private information is independent conditioning on the event’s outcome whenever agents have similar beliefs about the outcome, their information is aggregated. That is, there is no false consensus. Our main result has a short proof based on a natural information-theoretic framework. A key ingredient of the framework is the equivalence between the sign of the "interaction information" and a super/sub-additive property of the value of people’s information. This provides an intuitive interpretation and an interesting application of the interaction information, which measures the amount of information shared by three random variables. We illustrate the power of this information-theoretic framework by reproving two additional results within it: 1) that agents quickly agree when announcing (summaries of) beliefs in round-robin fashion [Aaronson 2005], and 2) results from [Chen et al 2010] on when prediction market agents should release information to maximize their payment. We also interpret the information-theoretic framework and the above results in prediction markets by proving that the expected reward of revealing information is the conditional mutual information of the information revealed. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17565"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17565">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Yuqing Kong and Grant Schoenebeck. False Consensus, Information Theory, and Prediction Markets. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 81:1-81:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17565-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{kong_et_al:LIPIcs.ITCS.2023.81, author = {Kong, Yuqing and Schoenebeck, Grant}, title = {{False Consensus, Information Theory, and Prediction Markets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {81:1--81:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.81}, URN = {urn:nbn:de:0030-drops-175844}, doi = {10.4230/LIPIcs.ITCS.2023.81}, annote = {Keywords: Agreeing to disagree, false consensus, information theory, prediction market} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17565-input">@InProceedings{kong_et_al:LIPIcs.ITCS.2023.81, author = {Kong, Yuqing and Schoenebeck, Grant}, title = {{False Consensus, Information Theory, and Prediction Markets}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {81:1--81:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.81}, URN = {urn:nbn:de:0030-drops-175844}, doi = {10.4230/LIPIcs.ITCS.2023.81}, annote = {Keywords: Agreeing to disagree, false consensus, information theory, prediction market} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.82"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.82">DOI: 10.4230/LIPIcs.ITCS.2023.82</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.82/LIPIcs.ITCS.2023.82.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.82" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17566" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17566" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.82" data-bs-toggle="tooltip" data-title="Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Liu, Qipeng"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic protocols"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Authorization"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Public key (asymmetric) techniques"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.82"> Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Qipeng Liu </p> <div class="row"> <div class="collapse" id="abstract-17566"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17566">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> With the power of quantum information, we can achieve exciting and classically impossible cryptographic primitives. However, almost all quantum cryptography faces extreme difficulties with the near-term intermediate-scale quantum technology (NISQ technology); namely, the short lifespan of quantum states and limited sequential computation. At the same time, considering only limited quantum adversaries may still enable us to achieve never-before-possible tasks. In this work, we consider quantum cryptographic primitives against limited quantum adversaries - depth-bounded adversaries. We introduce a model for (depth-bounded) NISQ computers, which are classical circuits interleaved with shallow quantum circuits. Then, we show one-time memory can be achieved against any depth-bounded quantum adversaries introduced in the work, with their depth being any pre-fixed polynomial. Therefore we obtain applications like one-time programs and one-time proofs. Finally, we show our one-time memory has correctness even against constant-rate errors. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17566"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17566">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Qipeng Liu. Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 82:1-82:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17566-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{liu:LIPIcs.ITCS.2023.82, author = {Liu, Qipeng}, title = {{Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {82:1--82:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.82}, URN = {urn:nbn:de:0030-drops-175859}, doi = {10.4230/LIPIcs.ITCS.2023.82}, annote = {Keywords: cryptographic protocol, one-time memory, quantum cryptography} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17566-input">@InProceedings{liu:LIPIcs.ITCS.2023.82, author = {Liu, Qipeng}, title = {{Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {82:1--82:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.82}, URN = {urn:nbn:de:0030-drops-175859}, doi = {10.4230/LIPIcs.ITCS.2023.82}, annote = {Keywords: cryptographic protocol, one-time memory, quantum cryptography} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.83"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.83">DOI: 10.4230/LIPIcs.ITCS.2023.83</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.83/LIPIcs.ITCS.2023.83.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.83" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17567" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17567" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.83" data-bs-toggle="tooltip" data-title="Vertex Sparsification for Edge Connectivity in Polynomial Time" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Liu, Yang P."></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Paths and connectivity problems"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.83"> Vertex Sparsification for Edge Connectivity in Polynomial Time </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Yang P. Liu </p> <div class="row"> <div class="collapse" id="abstract-17567"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17567">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> An important open question in the area of vertex sparsification is whether (1+ε)-approximate cut-preserving vertex sparsifiers with size close to the number of terminals exist. The work [Parinya Chalermsook et al., 2021] (SODA 2021) introduced a relaxation called connectivity-c mimicking networks, which asks to construct a vertex sparsifier which preserves connectivity among k terminals exactly up to the value of c, and showed applications to dynamic connectivity data structures and survivable network design. We show that connectivity-c mimicking networks with Õ(kc³) edges exist and can be constructed in polynomial time in n and c, improving over the results of [Parinya Chalermsook et al., 2021] for any c ≥ log n, whose runtimes depended exponentially on c. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17567"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17567">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Yang P. Liu. Vertex Sparsification for Edge Connectivity in Polynomial Time. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 83:1-83:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17567-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{liu:LIPIcs.ITCS.2023.83, author = {Liu, Yang P.}, title = {{Vertex Sparsification for Edge Connectivity in Polynomial Time}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {83:1--83:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.83}, URN = {urn:nbn:de:0030-drops-175863}, doi = {10.4230/LIPIcs.ITCS.2023.83}, annote = {Keywords: Vertex-sparsification, edge-connectivity, Gammoids} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17567-input">@InProceedings{liu:LIPIcs.ITCS.2023.83, author = {Liu, Yang P.}, title = {{Vertex Sparsification for Edge Connectivity in Polynomial Time}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {83:1--83:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.83}, URN = {urn:nbn:de:0030-drops-175863}, doi = {10.4230/LIPIcs.ITCS.2023.83}, annote = {Keywords: Vertex-sparsification, edge-connectivity, Gammoids} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.84"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.84">DOI: 10.4230/LIPIcs.ITCS.2023.84</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.84/LIPIcs.ITCS.2023.84.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.84" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17568" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17568" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.84" data-bs-toggle="tooltip" data-title="Fractional Certificates for Bounded Functions" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Lovett, Shachar"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhang, Jiapeng"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Discrete mathematics"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.84"> Fractional Certificates for Bounded Functions </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Shachar Lovett and Jiapeng Zhang </p> <div class="row"> <div class="collapse" id="abstract-17568"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17568">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> A folklore conjecture in quantum computing is that the acceptance probability of a quantum query algorithm can be approximated by a classical decision tree, with only a polynomial increase in the number of queries. Motivated by this conjecture, Aaronson and Ambainis (Theory of Computing, 2014) conjectured that this should hold more generally for any bounded function computed by a low degree polynomial. In this work we prove two new results towards establishing this conjecture: first, that any such polynomial has a small fractional certificate complexity; and second, that many inputs have a small sensitive block. We show that these would imply the Aaronson and Ambainis conjecture, assuming a conjectured extension of Talagrand’s concentration inequality. On the technical side, many classical techniques used in the analysis of Boolean functions seem to fail when applied to bounded functions. Here, we develop a new technique, based on a mix of combinatorics, analysis and geometry, and which in part extends a recent technique of Knop et al. (STOC 2021) to bounded functions. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17568"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17568">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Shachar Lovett and Jiapeng Zhang. Fractional Certificates for Bounded Functions. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 84:1-84:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17568-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{lovett_et_al:LIPIcs.ITCS.2023.84, author = {Lovett, Shachar and Zhang, Jiapeng}, title = {{Fractional Certificates for Bounded Functions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {84:1--84:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.84}, URN = {urn:nbn:de:0030-drops-175871}, doi = {10.4230/LIPIcs.ITCS.2023.84}, annote = {Keywords: Aaronson-Ambainis conjecture, fractional block sensitivity, Talagrand inequality} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17568-input">@InProceedings{lovett_et_al:LIPIcs.ITCS.2023.84, author = {Lovett, Shachar and Zhang, Jiapeng}, title = {{Fractional Certificates for Bounded Functions}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {84:1--84:13}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.84}, URN = {urn:nbn:de:0030-drops-175871}, doi = {10.4230/LIPIcs.ITCS.2023.84}, annote = {Keywords: Aaronson-Ambainis conjecture, fractional block sensitivity, Talagrand inequality} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.85"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.85">DOI: 10.4230/LIPIcs.ITCS.2023.85</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.85/LIPIcs.ITCS.2023.85.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.85" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17569" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17569" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.85" data-bs-toggle="tooltip" data-title="Improved Inapproximability of VC Dimension and Littlestone’s Dimension via (Unbalanced) Biclique" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Manurangsi, Pasin"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.85"> Improved Inapproximability of VC Dimension and Littlestone’s Dimension via (Unbalanced) Biclique </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Pasin Manurangsi </p> <div class="row"> <div class="collapse" id="abstract-17569"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17569">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the complexity of computing (and approximating) VC Dimension and Littlestone’s Dimension when we are given the concept class explicitly. We give a simple reduction from Maximum (Unbalanced) Biclique problem to approximating VC Dimension and Littlestone’s Dimension. With this connection, we derive a range of hardness of approximation results and running time lower bounds. For example, under the (randomized) Gap-Exponential Time Hypothesis or the Strongish Planted Clique Hypothesis, we show a tight inapproximability result: both dimensions are hard to approximate to within a factor of o(log n) in polynomial-time. These improve upon constant-factor inapproximability results from [Pasin Manurangsi and Aviad Rubinstein, 2017]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17569"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17569">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Pasin Manurangsi. Improved Inapproximability of VC Dimension and Littlestone’s Dimension via (Unbalanced) Biclique. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 85:1-85:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17569-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{manurangsi:LIPIcs.ITCS.2023.85, author = {Manurangsi, Pasin}, title = {{Improved Inapproximability of VC Dimension and Littlestone’s Dimension via (Unbalanced) Biclique}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {85:1--85:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.85}, URN = {urn:nbn:de:0030-drops-175884}, doi = {10.4230/LIPIcs.ITCS.2023.85}, annote = {Keywords: VC Dimension, Littlestone’s Dimension, Maximum Biclique, Hardness of Approximation, Fine-Grained Complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17569-input">@InProceedings{manurangsi:LIPIcs.ITCS.2023.85, author = {Manurangsi, Pasin}, title = {{Improved Inapproximability of VC Dimension and Littlestone’s Dimension via (Unbalanced) Biclique}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {85:1--85:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.85}, URN = {urn:nbn:de:0030-drops-175884}, doi = {10.4230/LIPIcs.ITCS.2023.85}, annote = {Keywords: VC Dimension, Littlestone’s Dimension, Maximum Biclique, Hardness of Approximation, Fine-Grained Complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.86"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.86">DOI: 10.4230/LIPIcs.ITCS.2023.86</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.86/LIPIcs.ITCS.2023.86.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.86" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17570" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17570" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.86" data-bs-toggle="tooltip" data-title="Resilience of 3-Majority Dynamics to Non-Uniform Schedulers" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Meir, Uri"></span> <span data-key="dagstuhl.contributor.author" data-value="Oshman, Rotem"></span> <span data-key="dagstuhl.contributor.author" data-value="Shayevitz, Ofer"></span> <span data-key="dagstuhl.contributor.author" data-value="Volkov, Yuval"></span> <span data-key="dagstuhl.subject.classification" data-value="Computing methodologies → Distributed algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Applied computing → Biological networks"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.86"> Resilience of 3-Majority Dynamics to Non-Uniform Schedulers </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Uri Meir, Rotem Oshman, Ofer Shayevitz, and Yuval Volkov </p> <div class="row"> <div class="collapse" id="abstract-17570"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17570">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In recent years there has been great interest in networks of passive, computationally-weak nodes, whose interactions are controlled by the outside environment; examples include population protocols, chemical reactions networks (CRNs), DNA computing, and more. Such networks are usually studied under one of two extreme regimes: the schedule of interactions is either assumed to be adversarial, or it is assumed to be chosen uniformly at random. In this paper we study an intermediate regime, where the interaction at each step is chosen from some not-necessarily-uniform distribution: we introduce the definition of a (p,ε)-scheduler, where the distribution that the scheduler chooses at every round can be arbitrary, but it must have 𝓁_p-distance at most ε from the uniform distribution. We ask how far from uniform we can get before the dynamics of the model break down. For simplicity, we focus on the 3-majority dynamics, a type of chemical reaction network where the nodes of the network interact in triplets. Each node initially has an opinion of either 𝖷 or 𝖸, and when a triplet of nodes interact, all three nodes change their opinion to the majority of their three opinions. It is known that under a uniformly random scheduler, if we have an initial gap of Ω(√{n log n}) in favor of one value, then w.h.p. all nodes converge to the majority value within O(n log n) steps. For the 3-majority dynamics, we prove that among all non-uniform schedulers with a given 𝓁_1- or 𝓁_∞-distance to the uniform scheduler, the worst case is a scheduler that creates a partition in the network, disconnecting some nodes from the rest: under any (p,ε)-close scheduler, if the scheduler’s distance from uniform only suffices to disconnect a set of size at most S nodes and we start from a configuration with a gap of Ω(S+√{n log n}) in favor of one value, then we are guaranteed that all but O(S) nodes will convert to the majority value. We also show that creating a partition is not necessary to cause the system to converge to the wrong value, or to fail to converge at all. We believe that our work can serve as a first step towards understanding the resilience of chemical reaction networks and population protocols under non-uniform schedulers. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17570"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17570">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Uri Meir, Rotem Oshman, Ofer Shayevitz, and Yuval Volkov. Resilience of 3-Majority Dynamics to Non-Uniform Schedulers. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 86:1-86:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17570-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{meir_et_al:LIPIcs.ITCS.2023.86, author = {Meir, Uri and Oshman, Rotem and Shayevitz, Ofer and Volkov, Yuval}, title = {{Resilience of 3-Majority Dynamics to Non-Uniform Schedulers}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {86:1--86:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.86}, URN = {urn:nbn:de:0030-drops-175895}, doi = {10.4230/LIPIcs.ITCS.2023.86}, annote = {Keywords: chemical reaction networks, population protocols, randomized scheduler} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17570-input">@InProceedings{meir_et_al:LIPIcs.ITCS.2023.86, author = {Meir, Uri and Oshman, Rotem and Shayevitz, Ofer and Volkov, Yuval}, title = {{Resilience of 3-Majority Dynamics to Non-Uniform Schedulers}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {86:1--86:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.86}, URN = {urn:nbn:de:0030-drops-175895}, doi = {10.4230/LIPIcs.ITCS.2023.86}, annote = {Keywords: chemical reaction networks, population protocols, randomized scheduler} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.87"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.87">DOI: 10.4230/LIPIcs.ITCS.2023.87</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.87/LIPIcs.ITCS.2023.87.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.87" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17571" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17571" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.87" data-bs-toggle="tooltip" data-title="Proofs of Quantumness from Trapdoor Permutations" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Morimae, Tomoyuki"></span> <span data-key="dagstuhl.contributor.author" data-value="Yamakawa, Takashi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.87"> Proofs of Quantumness from Trapdoor Permutations </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Tomoyuki Morimae and Takashi Yamakawa </p> <div class="row"> <div class="collapse" id="abstract-17571"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17571">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Assume that Alice can do only classical probabilistic polynomial-time computing while Bob can do quantum polynomial-time computing. Alice and Bob communicate over only classical channels, and finally Bob gets a state |x₀⟩+|x₁⟩ with some bit strings x₀ and x₁. Is it possible that Alice can know {x₀,x₁} but Bob cannot? Such a task, called remote state preparations, is indeed possible under some complexity assumptions, and is bases of many quantum cryptographic primitives such as proofs of quantumness, (classical-client) blind quantum computing, (classical) verifications of quantum computing, and quantum money. A typical technique to realize remote state preparations is to use 2-to-1 trapdoor collision resistant hash functions: Alice sends a 2-to-1 trapdoor collision resistant hash function f to Bob, and Bob evaluates it coherently, i.e., Bob generates ∑_x|x⟩|f(x)⟩. Bob measures the second register to get the measurement result y, and sends y to Alice. Bob’s post-measurement state is |x₀⟩+|x₁⟩, where f(x₀) = f(x₁) = y. With the trapdoor, Alice can learn {x₀,x₁} from y, but due to the collision resistance, Bob cannot. This Alice’s advantage can be leveraged to realize the quantum cryptographic primitives listed above. It seems that the collision resistance is essential here. In this paper, surprisingly, we show that the collision resistance is not necessary for a restricted case: we show that (non-verifiable) remote state preparations of |x₀⟩+|x₁⟩ secure against classical probabilistic polynomial-time Bob can be constructed from classically-secure (full-domain) trapdoor permutations. Trapdoor permutations are not likely to imply the collision resistance, because black-box reductions from collision-resistant hash functions to trapdoor permutations are known to be impossible. As an application of our result, we construct proofs of quantumness from classically-secure (full-domain) trapdoor permutations. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17571"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17571">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Tomoyuki Morimae and Takashi Yamakawa. Proofs of Quantumness from Trapdoor Permutations. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 87:1-87:14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17571-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{morimae_et_al:LIPIcs.ITCS.2023.87, author = {Morimae, Tomoyuki and Yamakawa, Takashi}, title = {{Proofs of Quantumness from Trapdoor Permutations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {87:1--87:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.87}, URN = {urn:nbn:de:0030-drops-175900}, doi = {10.4230/LIPIcs.ITCS.2023.87}, annote = {Keywords: Quantum cryptography, Proofs of quantumness, Trapdoor permutations} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17571-input">@InProceedings{morimae_et_al:LIPIcs.ITCS.2023.87, author = {Morimae, Tomoyuki and Yamakawa, Takashi}, title = {{Proofs of Quantumness from Trapdoor Permutations}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {87:1--87:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.87}, URN = {urn:nbn:de:0030-drops-175900}, doi = {10.4230/LIPIcs.ITCS.2023.87}, annote = {Keywords: Quantum cryptography, Proofs of quantumness, Trapdoor permutations} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.88"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.88">DOI: 10.4230/LIPIcs.ITCS.2023.88</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.88/LIPIcs.ITCS.2023.88.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.88" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17572" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17572" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.88" data-bs-toggle="tooltip" data-title="Extremal Combinatorics, Iterated Pigeonhole Arguments and Generalizations of PPP" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Pasarkar, Amol"></span> <span data-key="dagstuhl.contributor.author" data-value="Papadimitriou, Christos"></span> <span data-key="dagstuhl.contributor.author" data-value="Yannakakis, Mihalis"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.88"> Extremal Combinatorics, Iterated Pigeonhole Arguments and Generalizations of PPP </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Amol Pasarkar, Christos Papadimitriou, and Mihalis Yannakakis </p> <div class="row"> <div class="collapse" id="abstract-17572"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17572">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the complexity of computational problems arising from existence theorems in extremal combinatorics. For some of these problems, a solution is guaranteed to exist based on an iterated application of the Pigeonhole Principle. This results in the definition of a new complexity class within TFNP, which we call PLC (for "polynomial long choice"). PLC includes all of PPP, as well as numerous previously unclassified total problems, including search problems related to Ramsey’s theorem, the Sunflower theorem, the Erdős-Ko-Rado lemma, and König’s lemma. Whether the first two of these four problems are PLC-complete is an important open question which we pursue; in contrast, we show that the latter two are PPP-complete. Finally, we reframe PPP as an optimization problem, and define a hierarchy of such problems related to Turàn’s theorem. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17572"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17572">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Amol Pasarkar, Christos Papadimitriou, and Mihalis Yannakakis. Extremal Combinatorics, Iterated Pigeonhole Arguments and Generalizations of PPP. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 88:1-88:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17572-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{pasarkar_et_al:LIPIcs.ITCS.2023.88, author = {Pasarkar, Amol and Papadimitriou, Christos and Yannakakis, Mihalis}, title = {{Extremal Combinatorics, Iterated Pigeonhole Arguments and Generalizations of PPP}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {88:1--88:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.88}, URN = {urn:nbn:de:0030-drops-175913}, doi = {10.4230/LIPIcs.ITCS.2023.88}, annote = {Keywords: Total Complexity, Extremal Combinatorics, Pigeonhole Principle} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17572-input">@InProceedings{pasarkar_et_al:LIPIcs.ITCS.2023.88, author = {Pasarkar, Amol and Papadimitriou, Christos and Yannakakis, Mihalis}, title = {{Extremal Combinatorics, Iterated Pigeonhole Arguments and Generalizations of PPP}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {88:1--88:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.88}, URN = {urn:nbn:de:0030-drops-175913}, doi = {10.4230/LIPIcs.ITCS.2023.88}, annote = {Keywords: Total Complexity, Extremal Combinatorics, Pigeonhole Principle} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.89"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.89">DOI: 10.4230/LIPIcs.ITCS.2023.89</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.89/LIPIcs.ITCS.2023.89.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.89" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17573" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17573" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.89" data-bs-toggle="tooltip" data-title="The Strength of Equality Oracles in Communication" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Pitassi, Toniann"></span> <span data-key="dagstuhl.contributor.author" data-value="Shirley, Morgan"></span> <span data-key="dagstuhl.contributor.author" data-value="Shraibman, Adi"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.89"> The Strength of Equality Oracles in Communication </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Toniann Pitassi, Morgan Shirley, and Adi Shraibman </p> <div class="row"> <div class="collapse" id="abstract-17573"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17573">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> It is well-known that randomized communication protocols are more powerful than deterministic protocols. In particular the Equality function requires Ω(n) deterministic communication complexity but has efficient randomized protocols. Previous work of Chattopadhyay, Lovett and Vinyals shows that randomized communication is strictly stronger than what can be solved by deterministic protocols equipped with an Equality oracle. Despite this separation, we are far from understanding the exact strength of Equality oracles in the context of communication complexity. In this work we focus on nondeterminisic communication equipped with an Equality oracle, which is a subclass of Merlin-Arthur communication. We show that this inclusion is strict by proving that the previously-studied Integer Inner Product function, which can be efficiently computed even with bounded-error randomness, cannot be computed using sublinear communication in the nondeterministic Equality model. To prove this we give a new matrix-theoretic characterization of the nondeterministic Equality model: specifically, there is a tight connection between this model and a covering number based on the blocky matrices of Hambardzumyan, Hatami, and Hatami, as well as a natural variant of the Gamma-2 factorization norm. Similar equivalences are shown for the unambiguous nondeterministic model with Equality oracles. A bonus result arises from these proofs: for the studied communication models, a single Equality oracle call suffices without loss of generality. Our results allow us to prove a separation between deterministic and unambiguous nondeterminism in the presence of Equality oracles. This stands in contrast to the result of Yannakakis which shows that these models are polynomially-related without oracles. We suggest a number of intriguing open questions along this direction of inquiry, as well as others that arise from our work. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17573"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17573">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Toniann Pitassi, Morgan Shirley, and Adi Shraibman. The Strength of Equality Oracles in Communication. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 89:1-89:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17573-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{pitassi_et_al:LIPIcs.ITCS.2023.89, author = {Pitassi, Toniann and Shirley, Morgan and Shraibman, Adi}, title = {{The Strength of Equality Oracles in Communication}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {89:1--89:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.89}, URN = {urn:nbn:de:0030-drops-175927}, doi = {10.4230/LIPIcs.ITCS.2023.89}, annote = {Keywords: Factorization norm, blocky rank, Merlin-Arthur} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17573-input">@InProceedings{pitassi_et_al:LIPIcs.ITCS.2023.89, author = {Pitassi, Toniann and Shirley, Morgan and Shraibman, Adi}, title = {{The Strength of Equality Oracles in Communication}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {89:1--89:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.89}, URN = {urn:nbn:de:0030-drops-175927}, doi = {10.4230/LIPIcs.ITCS.2023.89}, annote = {Keywords: Factorization norm, blocky rank, Merlin-Arthur} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.90"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.90">DOI: 10.4230/LIPIcs.ITCS.2023.90</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.90/LIPIcs.ITCS.2023.90.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.90" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17574" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17574" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.90" data-bs-toggle="tooltip" data-title="Quantum Proofs of Deletion for Learning with Errors" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Poremba, Alexander"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.90"> Quantum Proofs of Deletion for Learning with Errors </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Alexander Poremba </p> <div class="row"> <div class="collapse" id="abstract-17574"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17574">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Quantum information has the property that measurement is an inherently destructive process. This feature is most apparent in the principle of complementarity, which states that mutually incompatible observables cannot be measured at the same time. Recent work by Broadbent and Islam (TCC 2020) builds on this aspect of quantum mechanics to realize a cryptographic notion called certified deletion. While this remarkable notion enables a classical verifier to be convinced that a (private-key) quantum ciphertext has been deleted by an untrusted party, it offers no additional layer of functionality. In this work, we augment the proof-of-deletion paradigm with fully homomorphic encryption (FHE). We construct the first fully homomorphic encryption scheme with certified deletion - an interactive protocol which enables an untrusted quantum server to compute on encrypted data and, if requested, to simultaneously prove data deletion to a client. Our scheme has the desirable property that verification of a deletion certificate is public; meaning anyone can verify that deletion has taken place. Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors (LWE) distribution in the form of a quantum state was deleted. As an application of our protocol, we construct a Dual-Regev public-key encryption scheme with certified deletion, which we then extend towards a (leveled) FHE scheme of the same type. We introduce the notion of Gaussian-collapsing hash functions - a special case of collapsing hash functions defined by Unruh (Eurocrypt 2016) - and we prove the security of our schemes under the assumption that the Ajtai hash function satisfies a certain strong Gaussian-collapsing property in the presence of leakage. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17574"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17574">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Alexander Poremba. Quantum Proofs of Deletion for Learning with Errors. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 90:1-90:14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17574-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{poremba:LIPIcs.ITCS.2023.90, author = {Poremba, Alexander}, title = {{Quantum Proofs of Deletion for Learning with Errors}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {90:1--90:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.90}, URN = {urn:nbn:de:0030-drops-175934}, doi = {10.4230/LIPIcs.ITCS.2023.90}, annote = {Keywords: Learning with errors, certified deletion, fully homomorphic encryption} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17574-input">@InProceedings{poremba:LIPIcs.ITCS.2023.90, author = {Poremba, Alexander}, title = {{Quantum Proofs of Deletion for Learning with Errors}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {90:1--90:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.90}, URN = {urn:nbn:de:0030-drops-175934}, doi = {10.4230/LIPIcs.ITCS.2023.90}, annote = {Keywords: Learning with errors, certified deletion, fully homomorphic encryption} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.91"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.91">DOI: 10.4230/LIPIcs.ITCS.2023.91</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.91/LIPIcs.ITCS.2023.91.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.91" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17575" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17575" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.91" data-bs-toggle="tooltip" data-title="Online Pen Testing" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Qiao, Mingda"></span> <span data-key="dagstuhl.contributor.author" data-value="Valiant, Gregory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online algorithms"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.91"> Online Pen Testing </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Mingda Qiao and Gregory Valiant </p> <div class="row"> <div class="collapse" id="abstract-17575"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17575">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study a "pen testing" problem, in which we are given n pens with unknown amounts of ink X₁, X₂, …, X_n, and we want to choose a pen with the maximum amount of remaining ink in it. The challenge is that we cannot access each X_i directly; we only get to write with the i-th pen until either a certain amount of ink is used, or the pen runs out of ink. In both cases, this testing reduces the remaining ink in the pen and thus the utility of selecting it. Despite this significant lack of information, we show that it is possible to approximately maximize our utility up to an O(log n) factor. Formally, we consider two different setups: the "prophet" setting, in which each X_i is independently drawn from some distribution 𝒟_i, and the "secretary" setting, in which (X_i)_{i=1}^n is a random permutation of arbitrary a₁, a₂, …, a_n. We derive the optimal competitive ratios in both settings up to constant factors. Our algorithms are surprisingly robust: (1) In the prophet setting, we only require one sample from each 𝒟_i, rather than a full description of the distribution; (2) In the secretary setting, the algorithm also succeeds under an arbitrary permutation, if an estimate of the maximum a_i is given. Our techniques include a non-trivial online sampling scheme from a sequence with an unknown length, as well as the construction of a hard, non-uniform distribution over permutations. Both might be of independent interest. We also highlight some immediate open problems and discuss several directions for future research. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17575"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17575">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Mingda Qiao and Gregory Valiant. Online Pen Testing. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 91:1-91:26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17575-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{qiao_et_al:LIPIcs.ITCS.2023.91, author = {Qiao, Mingda and Valiant, Gregory}, title = {{Online Pen Testing}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {91:1--91:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.91}, URN = {urn:nbn:de:0030-drops-175940}, doi = {10.4230/LIPIcs.ITCS.2023.91}, annote = {Keywords: Optimal stopping, online algorithm} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17575-input">@InProceedings{qiao_et_al:LIPIcs.ITCS.2023.91, author = {Qiao, Mingda and Valiant, Gregory}, title = {{Online Pen Testing}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {91:1--91:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.91}, URN = {urn:nbn:de:0030-drops-175940}, doi = {10.4230/LIPIcs.ITCS.2023.91}, annote = {Keywords: Optimal stopping, online algorithm} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.92"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.92">DOI: 10.4230/LIPIcs.ITCS.2023.92</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.92/LIPIcs.ITCS.2023.92.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.92" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17576" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17576" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.92" data-bs-toggle="tooltip" data-title="Decision-Making Under Miscalibration" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Rothblum, Guy N."></span> <span data-key="dagstuhl.contributor.author" data-value="Yona, Gal"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Models of learning"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.92"> Decision-Making Under Miscalibration </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Guy N. Rothblum and Gal Yona </p> <div class="row"> <div class="collapse" id="abstract-17576"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17576">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> How should we use ML-based predictions (e.g., risk of heart attack) to inform downstream binary classification decisions (e.g., undergoing a medical procedure)? When the risk estimates are perfectly calibrated, the answer is well understood: a classification problem’s cost structure induces an optimal treatment threshold j^⋆. In practice, however, predictors are often miscalibrated, and this can lead to harmful decisions. This raises a fundamental question: how should one use potentially miscalibrated predictions to inform binary decisions? In this work, we study this question from the perspective of algorithmic fairness. Specifically, we focus on the impact of decisions on protected demographic subgroups, when we are only given a bound on the predictor’s anticipated degree of subgroup-miscalibration. We formalize a natural (distribution-free) solution concept for translating predictions into decisions: given anticipated miscalibration of α, we propose using the threshold j that minimizes the worst-case regret over all α-miscalibrated predictors, where the regret is the difference in clinical utility between using the threshold in question and using the optimal threshold in hindsight. We provide closed form expressions for j when miscalibration is measured using both expected and maximum calibration error which reveal that it indeed differs from j^⋆ (the optimal threshold under perfect calibration). </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17576"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17576">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Guy N. Rothblum and Gal Yona. Decision-Making Under Miscalibration. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 92:1-92:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17576-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{rothblum_et_al:LIPIcs.ITCS.2023.92, author = {Rothblum, Guy N. and Yona, Gal}, title = {{Decision-Making Under Miscalibration}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {92:1--92:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.92}, URN = {urn:nbn:de:0030-drops-175951}, doi = {10.4230/LIPIcs.ITCS.2023.92}, annote = {Keywords: risk prediction, calibration, algorithmic fairness, multi-group fairness} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17576-input">@InProceedings{rothblum_et_al:LIPIcs.ITCS.2023.92, author = {Rothblum, Guy N. and Yona, Gal}, title = {{Decision-Making Under Miscalibration}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {92:1--92:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.92}, URN = {urn:nbn:de:0030-drops-175951}, doi = {10.4230/LIPIcs.ITCS.2023.92}, annote = {Keywords: risk prediction, calibration, algorithmic fairness, multi-group fairness} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.93"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.93">DOI: 10.4230/LIPIcs.ITCS.2023.93</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.93/LIPIcs.ITCS.2023.93.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.93" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17577" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17577" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.93" data-bs-toggle="tooltip" data-title="Beyond Worst-Case Budget-Feasible Mechanism Design" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Rubinstein, Aviad"></span> <span data-key="dagstuhl.contributor.author" data-value="Zhao, Junyao"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational pricing and auctions"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.93"> Beyond Worst-Case Budget-Feasible Mechanism Design </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Aviad Rubinstein and Junyao Zhao </p> <div class="row"> <div class="collapse" id="abstract-17577"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17577">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Motivated by large-market applications such as crowdsourcing, we revisit the problem of budget-feasible mechanism design under a "small-bidder assumption". Anari, Goel, and Nikzad (2018) gave a mechanism that has optimal competitive ratio 1-1/e on worst-case instances. However, we observe that on many realistic instances, their mechanism is significantly outperformed by a simpler open clock auction by Ensthaler and Giebe (2014), although the open clock auction only achieves competitive ratio 1/2 in the worst case. Is there a mechanism that gets the best of both worlds, i.e., a mechanism that is worst-case optimal and performs favorably on realistic instances? To answer this question, we initiate the study of beyond worst-case budget-feasible mechanism design. Our first main result is the design and the analysis of a natural mechanism that gives an affirmative answer to our question above: - We prove that on every instance, our mechanism performs at least as good as all uniform mechanisms, including Anari, Goel, and Nikzad’s and Ensthaler and Giebe’s mechanisms. - Moreover, we empirically evaluate our mechanism on various realistic instances and observe that it beats the worst-case 1-1/e competitive ratio by a large margin and compares favorably to both mechanisms mentioned above. Our second main result is more interesting in theory: We show that in the semi-adversarial model of budget-smoothed analysis, where the adversary designs a single worst-case market for a distribution of budgets, our mechanism is optimal among all (including non-uniform) mechanisms; furthermore our mechanism guarantees a strictly better-than-(1-1/e) expected competitive ratio for any non-trivial budget distribution regardless of the market. (In contrast, given any bounded range of budgets, we can construct a single market where Anari, Goel, and Nikzad’s mechanism achieves only 1-1/e competitive ratio for every budget in this range.) We complement the positive result with a characterization of the worst-case markets for any given budget distribution and prove a fairly robust hardness result that holds against any budget distribution and any mechanism. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17577"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17577">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Aviad Rubinstein and Junyao Zhao. Beyond Worst-Case Budget-Feasible Mechanism Design. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 93:1-93:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17577-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{rubinstein_et_al:LIPIcs.ITCS.2023.93, author = {Rubinstein, Aviad and Zhao, Junyao}, title = {{Beyond Worst-Case Budget-Feasible Mechanism Design}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {93:1--93:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.93}, URN = {urn:nbn:de:0030-drops-175969}, doi = {10.4230/LIPIcs.ITCS.2023.93}, annote = {Keywords: Procurement auctions, Mechanism design, Beyond worst-case analysis} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17577-input">@InProceedings{rubinstein_et_al:LIPIcs.ITCS.2023.93, author = {Rubinstein, Aviad and Zhao, Junyao}, title = {{Beyond Worst-Case Budget-Feasible Mechanism Design}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {93:1--93:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.93}, URN = {urn:nbn:de:0030-drops-175969}, doi = {10.4230/LIPIcs.ITCS.2023.93}, annote = {Keywords: Procurement auctions, Mechanism design, Beyond worst-case analysis} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.94"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.94">DOI: 10.4230/LIPIcs.ITCS.2023.94</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.94/LIPIcs.ITCS.2023.94.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.94" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17578" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17578" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.94" data-bs-toggle="tooltip" data-title="Is It Easier to Count Communities Than Find Them?" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Rush, Cynthia"></span> <span data-key="dagstuhl.contributor.author" data-value="Skerman, Fiona"></span> <span data-key="dagstuhl.contributor.author" data-value="Wein, Alexander S."></span> <span data-key="dagstuhl.contributor.author" data-value="Yang, Dana"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Random network models"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.94"> Is It Easier to Count Communities Than Find Them? </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Cynthia Rush, Fiona Skerman, Alexander S. Wein, and Dana Yang </p> <div class="row"> <div class="collapse" id="abstract-17578"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17578">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Random graph models with community structure have been studied extensively in the literature. For both the problems of detecting and recovering community structure, an interesting landscape of statistical and computational phase transitions has emerged. A natural unanswered question is: might it be possible to infer properties of the community structure (for instance, the number and sizes of communities) even in situations where actually finding those communities is believed to be computationally hard? We show the answer is no. In particular, we consider certain hypothesis testing problems between models with different community structures, and we show (in the low-degree polynomial framework) that testing between two options is as hard as finding the communities. In addition, our methods give the first computational lower bounds for testing between two different "planted" distributions, whereas previous results have considered testing between a planted distribution and an i.i.d. "null" distribution. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17578"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17578">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Cynthia Rush, Fiona Skerman, Alexander S. Wein, and Dana Yang. Is It Easier to Count Communities Than Find Them?. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 94:1-94:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17578-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{rush_et_al:LIPIcs.ITCS.2023.94, author = {Rush, Cynthia and Skerman, Fiona and Wein, Alexander S. and Yang, Dana}, title = {{Is It Easier to Count Communities Than Find Them?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {94:1--94:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.94}, URN = {urn:nbn:de:0030-drops-175970}, doi = {10.4230/LIPIcs.ITCS.2023.94}, annote = {Keywords: Community detection, Hypothesis testing, Low-degree polynomials} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17578-input">@InProceedings{rush_et_al:LIPIcs.ITCS.2023.94, author = {Rush, Cynthia and Skerman, Fiona and Wein, Alexander S. and Yang, Dana}, title = {{Is It Easier to Count Communities Than Find Them?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {94:1--94:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.94}, URN = {urn:nbn:de:0030-drops-175970}, doi = {10.4230/LIPIcs.ITCS.2023.94}, annote = {Keywords: Community detection, Hypothesis testing, Low-degree polynomials} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.95"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.95">DOI: 10.4230/LIPIcs.ITCS.2023.95</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.95/LIPIcs.ITCS.2023.95.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.95" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17579" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17579" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.95" data-bs-toggle="tooltip" data-title="An Improved Lower Bound for Matroid Intersection Prophet Inequalities" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Saxena, Raghuvansh R."></span> <span data-key="dagstuhl.contributor.author" data-value="Velusamy, Santhoshini"></span> <span data-key="dagstuhl.contributor.author" data-value="Weinberg, S. Matthew"></span> <span data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Discrete mathematics"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.95"> An Improved Lower Bound for Matroid Intersection Prophet Inequalities </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Raghuvansh R. Saxena, Santhoshini Velusamy, and S. Matthew Weinberg </p> <div class="row"> <div class="collapse" id="abstract-17579"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17579">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We consider prophet inequalities subject to feasibility constraints that are the intersection of q matroids. The best-known algorithms achieve a Θ(q)-approximation, even when restricted to instances that are the intersection of q partition matroids, and with i.i.d. Bernoulli random variables [José R. Correa et al., 2022; Moran Feldman et al., 2016; Marek Adamczyk and Michal Wlodarczyk, 2018]. The previous best-known lower bound is Θ(√q) due to a simple construction of [Robert Kleinberg and S. Matthew Weinberg, 2012] (which uses i.i.d. Bernoulli random variables, and writes the construction as the intersection of partition matroids). We establish an improved lower bound of q^{1/2+Ω(1/log log q)} by writing the construction of [Robert Kleinberg and S. Matthew Weinberg, 2012] as the intersection of asymptotically fewer partition matroids. We accomplish this via an improved upper bound on the product dimension of a graph with p^p disjoint cliques of size p, using recent techniques developed in [Noga Alon and Ryan Alweiss, 2020]. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17579"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17579">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Raghuvansh R. Saxena, Santhoshini Velusamy, and S. Matthew Weinberg. An Improved Lower Bound for Matroid Intersection Prophet Inequalities. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 95:1-95:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17579-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{saxena_et_al:LIPIcs.ITCS.2023.95, author = {Saxena, Raghuvansh R. and Velusamy, Santhoshini and Weinberg, S. Matthew}, title = {{An Improved Lower Bound for Matroid Intersection Prophet Inequalities}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {95:1--95:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.95}, URN = {urn:nbn:de:0030-drops-175986}, doi = {10.4230/LIPIcs.ITCS.2023.95}, annote = {Keywords: Prophet Inequalities, Intersection of Matroids} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17579-input">@InProceedings{saxena_et_al:LIPIcs.ITCS.2023.95, author = {Saxena, Raghuvansh R. and Velusamy, Santhoshini and Weinberg, S. Matthew}, title = {{An Improved Lower Bound for Matroid Intersection Prophet Inequalities}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {95:1--95:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.95}, URN = {urn:nbn:de:0030-drops-175986}, doi = {10.4230/LIPIcs.ITCS.2023.95}, annote = {Keywords: Prophet Inequalities, Intersection of Matroids} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.96"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.96">DOI: 10.4230/LIPIcs.ITCS.2023.96</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.96/LIPIcs.ITCS.2023.96.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.96" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17580" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17580" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.96" data-bs-toggle="tooltip" data-title="Unitary Property Testing Lower Bounds by Polynomials" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="She, Adrian"></span> <span data-key="dagstuhl.contributor.author" data-value="Yuen, Henry"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.96"> Unitary Property Testing Lower Bounds by Polynomials </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Adrian She and Henry Yuen </p> <div class="row"> <div class="collapse" id="abstract-17580"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17580">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study unitary property testing, where a quantum algorithm is given query access to a black-box unitary and has to decide whether it satisfies some property. In addition to containing the standard quantum query complexity model (where the unitary encodes a binary string) as a special case, this model contains "inherently quantum" problems that have no classical analogue. Characterizing the query complexity of these problems requires new algorithmic techniques and lower bound methods. Our main contribution is a generalized polynomial method for unitary property testing problems. By leveraging connections with invariant theory, we apply this method to obtain lower bounds on problems such as determining recurrence times of unitaries, approximating the dimension of a marked subspace, and approximating the entanglement entropy of a marked state. We also present a unitary property testing-based approach towards an oracle separation between QMA and QMA(2), a long standing question in quantum complexity theory. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17580"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17580">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Adrian She and Henry Yuen. Unitary Property Testing Lower Bounds by Polynomials. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 96:1-96:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17580-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{she_et_al:LIPIcs.ITCS.2023.96, author = {She, Adrian and Yuen, Henry}, title = {{Unitary Property Testing Lower Bounds by Polynomials}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {96:1--96:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.96}, URN = {urn:nbn:de:0030-drops-175995}, doi = {10.4230/LIPIcs.ITCS.2023.96}, annote = {Keywords: Quantum query complexity, polynomial method, unitary property testing, quantum proofs, invariant theory, quantum recurrence time, entanglement entropy, BQP, QMA, QMA(2)} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17580-input">@InProceedings{she_et_al:LIPIcs.ITCS.2023.96, author = {She, Adrian and Yuen, Henry}, title = {{Unitary Property Testing Lower Bounds by Polynomials}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {96:1--96:17}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.96}, URN = {urn:nbn:de:0030-drops-175995}, doi = {10.4230/LIPIcs.ITCS.2023.96}, annote = {Keywords: Quantum query complexity, polynomial method, unitary property testing, quantum proofs, invariant theory, quantum recurrence time, entanglement entropy, BQP, QMA, QMA(2)} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.97"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.97">DOI: 10.4230/LIPIcs.ITCS.2023.97</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.97/LIPIcs.ITCS.2023.97.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.97" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17581" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17581" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.97" data-bs-toggle="tooltip" data-title="What Can Cryptography Do for Decentralized Mechanism Design?" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Shi, Elaine"></span> <span data-key="dagstuhl.contributor.author" data-value="Chung, Hao"></span> <span data-key="dagstuhl.contributor.author" data-value="Wu, Ke"></span> <span data-key="dagstuhl.subject.classification" data-value="Security and privacy → Cryptography"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.97"> What Can Cryptography Do for Decentralized Mechanism Design? </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Elaine Shi, Hao Chung, and Ke Wu </p> <div class="row"> <div class="collapse" id="abstract-17581"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17581">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> Recent works of Roughgarden (EC'21) and Chung and Shi (SODA'23) initiate the study of a new decentralized mechanism design problem called transaction fee mechanism design (TFM). Unlike the classical mechanism design literature, in the decentralized environment, even the auctioneer (i.e., the miner) can be a strategic player, and it can even collude with a subset of the users facilitated by binding side contracts. Chung and Shi showed two main impossibility results that rule out the existence of a dream TFM. First, any TFM that provides incentive compatibility for individual users and miner-user coalitions must always have zero miner revenue, no matter whether the block size is finite or infinite. Second, assuming finite block size, no non-trivial TFM can simultaneously provide incentive compatibility for any individual user and for any miner-user coalition. In this work, we explore what new models and meaningful relaxations can allow us to circumvent the impossibility results of Chung and Shi. Besides today’s model that does not employ cryptography, we introduce a new MPC-assisted model where the TFM is implemented by a joint multi-party computation (MPC) protocol among the miners. We prove several feasibility and infeasibility results for achieving strict and approximate incentive compatibility, respectively, in the plain model as well as the MPC-assisted model. We show that while cryptography is not a panacea, it indeed allows us to overcome some impossibility results pertaining to the plain model, leading to non-trivial mechanisms with useful guarantees that are otherwise impossible in the plain model. Our work is also the first to characterize the mathematical landscape of transaction fee mechanism design under approximate incentive compatibility, as well as in a cryptography-assisted model. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17581"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17581">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Elaine Shi, Hao Chung, and Ke Wu. What Can Cryptography Do for Decentralized Mechanism Design?. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 97:1-97:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17581-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{shi_et_al:LIPIcs.ITCS.2023.97, author = {Shi, Elaine and Chung, Hao and Wu, Ke}, title = {{What Can Cryptography Do for Decentralized Mechanism Design?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {97:1--97:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.97}, URN = {urn:nbn:de:0030-drops-176005}, doi = {10.4230/LIPIcs.ITCS.2023.97}, annote = {Keywords: Transaction Fee Mechanism Design} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17581-input">@InProceedings{shi_et_al:LIPIcs.ITCS.2023.97, author = {Shi, Elaine and Chung, Hao and Wu, Ke}, title = {{What Can Cryptography Do for Decentralized Mechanism Design?}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {97:1--97:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.97}, URN = {urn:nbn:de:0030-drops-176005}, doi = {10.4230/LIPIcs.ITCS.2023.97}, annote = {Keywords: Transaction Fee Mechanism Design} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.98"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.98">DOI: 10.4230/LIPIcs.ITCS.2023.98</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.98/LIPIcs.ITCS.2023.98.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.98" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17582" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17582" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.98" data-bs-toggle="tooltip" data-title="Efficient Algorithms for Certifying Lower Bounds on the Discrepancy of Random Matrices" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Venkat, Prayaag"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.98"> Efficient Algorithms for Certifying Lower Bounds on the Discrepancy of Random Matrices </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Prayaag Venkat </p> <div class="row"> <div class="collapse" id="abstract-17582"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17582">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> In this paper, we initiate the study of the algorithmic problem of certifying lower bounds on the discrepancy of random matrices: given an input matrix A ∈ ℝ^{m × n}, output a value that is a lower bound on disc(A) = min_{x ∈ {± 1}ⁿ} ‖Ax‖_∞ for every A, but is close to the typical value of disc(A) with high probability over the choice of a random A. This problem is important because of its connections to conjecturally-hard average-case problems such as negatively-spiked PCA [Afonso S. Bandeira et al., 2020], the number-balancing problem [Gamarnik and Kızıldağ, 2021] and refuting random constraint satisfaction problems [Prasad Raghavendra et al., 2017]. We give the first polynomial-time algorithms with non-trivial guarantees for two main settings. First, when the entries of A are i.i.d. standard Gaussians, it is known that disc(A) = Θ (√n2^{-n/m}) with high probability [Karthekeyan Chandrasekaran and Santosh S. Vempala, 2014; Aubin et al., 2019; Paxton Turner et al., 2020] and that super-constant levels of the Sum-of-Squares SDP hierarchy fail to certify anything better than disc(A) ≥ 0 when m < n - o(n) [Mrinalkanti Ghosh et al., 2020]. In contrast, our algorithm certifies that disc(A) ≥ exp(-O(n²/m)) with high probability. As an application, this formally refutes a conjecture of Bandeira, Kunisky, and Wein [Afonso S. Bandeira et al., 2020] on the computational hardness of the detection problem in the negatively-spiked Wishart model. Second, we consider the integer partitioning problem: given n uniformly random b-bit integers a₁, …, a_n, certify the non-existence of a perfect partition, i.e. certify that disc(A) ≥ 1 for A = (a₁, …, a_n). Under the scaling b = α n, it is known that the probability of the existence of a perfect partition undergoes a phase transition from 1 to 0 at α = 1 [Christian Borgs et al., 2001]; our algorithm certifies the non-existence of perfect partitions for some α = O(n). We also give efficient non-deterministic algorithms with significantly improved guarantees, raising the possibility that the landscape of these certification problems closely resembles that of e.g. the problem of refuting random 3SAT formulas in the unsatisfiable regime. Our algorithms involve a reduction to the Shortest Vector Problem and employ the Lenstra-Lenstra-Lovász algorithm. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17582"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17582">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Prayaag Venkat. Efficient Algorithms for Certifying Lower Bounds on the Discrepancy of Random Matrices. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 98:1-98:12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17582-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{venkat:LIPIcs.ITCS.2023.98, author = {Venkat, Prayaag}, title = {{Efficient Algorithms for Certifying Lower Bounds on the Discrepancy of Random Matrices}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {98:1--98:12}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.98}, URN = {urn:nbn:de:0030-drops-176015}, doi = {10.4230/LIPIcs.ITCS.2023.98}, annote = {Keywords: Average-case discrepancy theory, lattices, shortest vector problem} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17582-input">@InProceedings{venkat:LIPIcs.ITCS.2023.98, author = {Venkat, Prayaag}, title = {{Efficient Algorithms for Certifying Lower Bounds on the Discrepancy of Random Matrices}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {98:1--98:12}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.98}, URN = {urn:nbn:de:0030-drops-176015}, doi = {10.4230/LIPIcs.ITCS.2023.98}, annote = {Keywords: Average-case discrepancy theory, lattices, shortest vector problem} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.99"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.99">DOI: 10.4230/LIPIcs.ITCS.2023.99</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.99/LIPIcs.ITCS.2023.99.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.99" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17583" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17583" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.99" data-bs-toggle="tooltip" data-title="On Oracles and Algorithmic Methods for Proving Lower Bounds" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Vyas, Nikhil"></span> <span data-key="dagstuhl.contributor.author" data-value="Williams, Ryan"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.99"> On Oracles and Algorithmic Methods for Proving Lower Bounds </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Nikhil Vyas and Ryan Williams </p> <div class="row"> <div class="collapse" id="abstract-17583"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17583">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> This paper studies the interaction of oracles with algorithmic approaches to proving circuit complexity lower bounds, establishing new results on two different kinds of questions. 1) We revisit some prominent open questions in circuit lower bounds, and provide a clean way of viewing them as circuit upper bound questions. Let Missing-String be the (total) search problem of producing a string that does not appear in a given list L containing M bit-strings of length N, where M < 2ⁿ. We show in a generic way how algorithms and uniform circuits (from restricted classes) for Missing-String imply complexity lower bounds (and in some cases, the converse holds as well). We give a local algorithm for Missing-String, which can compute any desired output bit making very few probes into the input, when the number of strings M is small enough. We apply this to prove a new nearly-optimal (up to oracles) time hierarchy theorem with advice. We show that the problem of constructing restricted uniform circuits for Missing-String is essentially equivalent to constructing functions without small non-uniform circuits, in a relativizing way. For example, we prove that small uniform depth-3 circuits for Missing-String would imply exponential circuit lower bounds for Σ₂ EXP, and depth-3 lower bounds for Missing-String would imply non-trivial circuits (relative to an oracle) for Σ₂ EXP problems. Both conclusions are longstanding open problems in circuit complexity. 2) It has been known since Impagliazzo, Kabanets, and Wigderson [JCSS 2002] that generic derandomizations improving subexponentially over exhaustive search would imply lower bounds such as NEXP ̸ ⊂ 𝖯/poly. Williams [SICOMP 2013] showed that Circuit-SAT algorithms running barely faster than exhaustive search would imply similar lower bounds. The known proofs of such results do not relativize (they use techniques from interactive proofs/PCPs). However, it has remained open whether there is an oracle under which the generic implications from circuit-analysis algorithms to circuit lower bounds fail. Building on an oracle of Fortnow, we construct an oracle relative to which the circuit approximation probability problem (CAPP) is in 𝖯, yet EXP^{NP} has polynomial-size circuits. We construct an oracle relative to which SAT can be solved in "half-exponential" time, yet exponential time (EXP) has polynomial-size circuits. Improving EXP to NEXP would give an oracle relative to which Σ₂ 𝖤 has "half-exponential" size circuits, which is open. (Recall it is known that Σ₂ 𝖤 is not in "sub-half-exponential" size, and the proof relativizes.) Moreover, the running time of the SAT algorithm cannot be improved: relative to all oracles, if SAT is in "sub-half-exponential" time then EXP does not have polynomial-size circuits. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17583"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17583">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Nikhil Vyas and Ryan Williams. On Oracles and Algorithmic Methods for Proving Lower Bounds. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 99:1-99:26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17583-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{vyas_et_al:LIPIcs.ITCS.2023.99, author = {Vyas, Nikhil and Williams, Ryan}, title = {{On Oracles and Algorithmic Methods for Proving Lower Bounds}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {99:1--99:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.99}, URN = {urn:nbn:de:0030-drops-176021}, doi = {10.4230/LIPIcs.ITCS.2023.99}, annote = {Keywords: oracles, relativization, circuit complexity, missing string, exponential hierarchy} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17583-input">@InProceedings{vyas_et_al:LIPIcs.ITCS.2023.99, author = {Vyas, Nikhil and Williams, Ryan}, title = {{On Oracles and Algorithmic Methods for Proving Lower Bounds}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {99:1--99:26}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.99}, URN = {urn:nbn:de:0030-drops-176021}, doi = {10.4230/LIPIcs.ITCS.2023.99}, annote = {Keywords: oracles, relativization, circuit complexity, missing string, exponential hierarchy} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.100"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.100">DOI: 10.4230/LIPIcs.ITCS.2023.100</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.100/LIPIcs.ITCS.2023.100.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.100" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17584" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17584" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.100" data-bs-toggle="tooltip" data-title="The Time Complexity of Consensus Under Oblivious Message Adversaries" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Winkler, Kyrill"></span> <span data-key="dagstuhl.contributor.author" data-value="Paz, Ami"></span> <span data-key="dagstuhl.contributor.author" data-value="Rincon Galeana, Hugo"></span> <span data-key="dagstuhl.contributor.author" data-value="Schmid, Stefan"></span> <span data-key="dagstuhl.contributor.author" data-value="Schmid, Ulrich"></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms"></span> <span data-key="dagstuhl.subject.classification" data-value="Networks"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.100"> The Time Complexity of Consensus Under Oblivious Message Adversaries </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, and Ulrich Schmid </p> <div class="row"> <div class="collapse" id="abstract-17584"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17584">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs 𝐃 arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set 𝐃, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17584"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17584">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, and Ulrich Schmid. The Time Complexity of Consensus Under Oblivious Message Adversaries. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 100:1-100:28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17584-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{winkler_et_al:LIPIcs.ITCS.2023.100, author = {Winkler, Kyrill and Paz, Ami and Rincon Galeana, Hugo and Schmid, Stefan and Schmid, Ulrich}, title = {{The Time Complexity of Consensus Under Oblivious Message Adversaries}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {100:1--100:28}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.100}, URN = {urn:nbn:de:0030-drops-176030}, doi = {10.4230/LIPIcs.ITCS.2023.100}, annote = {Keywords: dynamic networks, oblivious message adversaries, consensus, time complexity} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17584-input">@InProceedings{winkler_et_al:LIPIcs.ITCS.2023.100, author = {Winkler, Kyrill and Paz, Ami and Rincon Galeana, Hugo and Schmid, Stefan and Schmid, Ulrich}, title = {{The Time Complexity of Consensus Under Oblivious Message Adversaries}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {100:1--100:28}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.100}, URN = {urn:nbn:de:0030-drops-176030}, doi = {10.4230/LIPIcs.ITCS.2023.100}, annote = {Keywords: dynamic networks, oblivious message adversaries, consensus, time complexity} }</textarea> </div> </div> </div> </div> <div class="entity-list-item document card m-3" data-show="1" data-permanent-id="document/10.4230/LIPIcs.ITCS.2023.101"> <div class="entity-type"><i class="bi bi-file-earmark"></i> Document</div> <div class="doi"><a href="https://doi.org/10.4230/LIPIcs.ITCS.2023.101">DOI: 10.4230/LIPIcs.ITCS.2023.101</a></div> <aside> <a class="icon-btn" style="color: red" href="https://drops.dagstuhl.de/storage/00lipics/lipics-vol251-itcs2023/LIPIcs.ITCS.2023.101/LIPIcs.ITCS.2023.101.pdf" data-bs-toggle="tooltip" title="View PDF"><i class="bi bi-file-earmark-pdf-fill"></i></a><!-- --><a class="icon-btn" style="color: #0d6efd!important;" href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.101" data-bs-toggle="tooltip" title="View Detailed Metadata"><i class="bi bi-info-circle"></i></a><br/> <a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#abstract-17585" aria-expanded="false" aria-controls="collapseAbstract" title="Show Abstract"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show Abstract"><i class="bi bi-card-text"></i></span></a><!-- --><a class="icon-btn investigation" href="#" data-bs-toggle="collapse" data-bs-target="#bibtex-17585" aria-expanded="false" aria-controls="collapseBibtex" title="Show BibTex"><span class="tooltip-wrapper" data-bs-toggle="tooltip" title="Show BibTex"><i class="bi bi-chat-left-quote"></i></a><br/><a class="icon-btn btn-statistics" data-entity="document/10.4230/LIPIcs.ITCS.2023.101" data-bs-toggle="tooltip" data-title="Exponential Separations Using Guarded Extension Variables" href="#" title="Access Statistics"><i class="bi bi-graph-up"></i></a> </aside> <div class="selectors"> <span data-key="dagstuhl.contributor.author" data-value="Yolcu, Emre"></span> <span data-key="dagstuhl.contributor.author" data-value="Heule, Marijn J. H."></span> <span data-key="dagstuhl.subject.classification" data-value="Theory of computation → Proof complexity"></span> </div> <div class="card-body"> <h5 class="card-title"> <a href="https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.101"> Exponential Separations Using Guarded Extension Variables </a> </h5> <p class="card-text small authors"> <b>Authors:</b> Emre Yolcu and Marijn J. H. Heule </p> <div class="row"> <div class="collapse" id="abstract-17585"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#abstract-17585">Abstract <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <div class="abstract monospace"> We study the complexity of proof systems augmenting resolution with inference rules that allow, given a formula Γ in conjunctive normal form, deriving clauses that are not necessarily logically implied by Γ but whose addition to Γ preserves satisfiability. When the derived clauses are allowed to introduce variables not occurring in Γ, the systems we consider become equivalent to extended resolution. We are concerned with the versions of these systems without new variables. They are called BC⁻, RAT⁻, SBC⁻, and GER⁻, denoting respectively blocked clauses, resolution asymmetric tautologies, set-blocked clauses, and generalized extended resolution. Each of these systems formalizes some restricted version of the ability to make assumptions that hold "without loss of generality," which is commonly used informally to simplify or shorten proofs. Except for SBC⁻, these systems are known to be exponentially weaker than extended resolution. They are, however, all equivalent to it under a relaxed notion of simulation that allows the translation of the formula along with the proof when moving between proof systems. By taking advantage of this fact, we construct formulas that separate RAT⁻ from GER⁻ and vice versa. With the same strategy, we also separate SBC⁻ from RAT⁻. Additionally, we give polynomial-size SBC⁻ proofs of the pigeonhole principle, which separates SBC⁻ from GER⁻ by a previously known lower bound. These results also separate the three systems from BC⁻ since they all simulate it. We thus give an almost complete picture of their relative strengths. </div> </div> </div> <div class="row"> <div class="collapse" id="bibtex-17585"> <hr/> <h5 data-bs-toggle="collapse" data-bs-target="#bibtex-17585">Cite as <span style="float: right; cursor: pointer"><i class="bi bi-chevron-up"></i></span></h5> <p class="small">Emre Yolcu and Marijn J. H. Heule. Exponential Separations Using Guarded Extension Variables. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 251, pp. 101:1-101:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)</p> <hr/> <a href="#" class="btn btn-primary btn-xs copy-to-clipboard" title="Copy to clipboard" data-selector="bibtex-17585-input"><i class="bi bi-clipboard"></i> Copy BibTex To Clipboard<span class="bi bi-check -hidden" style="padding-left: 1em; font-weight: bold"></span></a><br/><br/> <pre class="bibtex">@InProceedings{yolcu_et_al:LIPIcs.ITCS.2023.101, author = {Yolcu, Emre and Heule, Marijn J. H.}, title = {{Exponential Separations Using Guarded Extension Variables}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {101:1--101:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.101}, URN = {urn:nbn:de:0030-drops-176043}, doi = {10.4230/LIPIcs.ITCS.2023.101}, annote = {Keywords: proof complexity, separations, resolution, extended resolution, blocked clauses} }</pre> <textarea style="position: absolute; top: 200vh" id="bibtex-17585-input">@InProceedings{yolcu_et_al:LIPIcs.ITCS.2023.101, author = {Yolcu, Emre and Heule, Marijn J. H.}, title = {{Exponential Separations Using Guarded Extension Variables}}, booktitle = {14th Innovations in Theoretical Computer Science Conference (ITCS 2023)}, pages = {101:1--101:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-263-1}, ISSN = {1868-8969}, year = {2023}, volume = {251}, editor = {Tauman Kalai, Yael}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.101}, URN = {urn:nbn:de:0030-drops-176043}, doi = {10.4230/LIPIcs.ITCS.2023.101}, annote = {Keywords: proof complexity, separations, resolution, extended resolution, blocked clauses} }</textarea> </div> </div> </div> </div> </div> </div> <div class="col-sm-3 mt-2"> <h2>Filters</h2> <div class="free-text-filter mb-4"> <div class="input-group"> <input class="form-control no-outline" type="search" placeholder="Free Text Filter" aria-label="Free Text Filter" id="free-text-filter" maxlength="300"> </div> </div> <div class="grouped-metadata-filter" data-filter-key="dagstuhl.contributor.author"> <ul class="list-group"> <li class="list-group-item filter-headline list-group-item-dark"> <b><span class="count"></span> Authors</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item filter-item pinned -hidden" data-value="" data-key=""> <i class="bi bi-pin-angle-fill"></i> <span class="value"></span> <span class="action"><i><i class="bi bi-x-circle"></i></i></span> </li> <li class="list-group-item details buttons"> <span class="btn-group" role="group" aria-label="Show-All/Collapse"> <button type="button" class="btn btn-primary">Show All</button> <button type="button" class="btn btn-secondary">Collapse</button> </span> </li> <li class="list-group-item details show-all -hidden"> <button type="button" class="btn btn-primary">Show All</button> </li> <li class="list-group-item details filter-group-headline -expanded " data-group-selector="dagstuhl.contributor.author.A"> <b>A</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Abboud, Amir" data-group-selector="dagstuhl.contributor.author.A"> Abboud, Amir <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Abdolazimi, Dorna" data-group-selector="dagstuhl.contributor.author.A"> Abdolazimi, Dorna <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Allender, Eric" data-group-selector="dagstuhl.contributor.author.A"> Allender, Eric <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Andoni, Alexandr" data-group-selector="dagstuhl.contributor.author.A"> Andoni, Alexandr <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Anshu, Anurag" data-group-selector="dagstuhl.contributor.author.A"> Anshu, Anurag <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Arvind, V." data-group-selector="dagstuhl.contributor.author.A"> Arvind, V. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Assadi, Sepehr" data-group-selector="dagstuhl.contributor.author.A"> Assadi, Sepehr <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.contributor.author" data-value="Attias, Idan" data-group-selector="dagstuhl.contributor.author.A"> Attias, Idan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.B"> <b>B</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Babaioff, Moshe" data-group-selector="dagstuhl.contributor.author.B"> Babaioff, Moshe <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Baig, Mirza Ahad" data-group-selector="dagstuhl.contributor.author.B"> Baig, Mirza Ahad <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Balkanski, Eric" data-group-selector="dagstuhl.contributor.author.B"> Balkanski, Eric <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Banerjee, Siddhartha" data-group-selector="dagstuhl.contributor.author.B"> Banerjee, Siddhartha <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bauer, Ulrich" data-group-selector="dagstuhl.contributor.author.B"> Bauer, Ulrich <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Beame, Paul" data-group-selector="dagstuhl.contributor.author.B"> Beame, Paul <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ben-Eliezer, Omri" data-group-selector="dagstuhl.contributor.author.B"> Ben-Eliezer, Omri <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bernstein, Aaron" data-group-selector="dagstuhl.contributor.author.B"> Bernstein, Aaron <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bhaskara, Aditya" data-group-selector="dagstuhl.contributor.author.B"> Bhaskara, Aditya <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bitansky, Nir" data-group-selector="dagstuhl.contributor.author.B"> Bitansky, Nir <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Blanc, Guy" data-group-selector="dagstuhl.contributor.author.B"> Blanc, Guy <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Blasiak, Jonah" data-group-selector="dagstuhl.contributor.author.B"> Blasiak, Jonah <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Błasiok, Jarosław" data-group-selector="dagstuhl.contributor.author.B"> Błasiok, Jarosław <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bodwin, Greg" data-group-selector="dagstuhl.contributor.author.B"> Bodwin, Greg <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bourneuf, Romain" data-group-selector="dagstuhl.contributor.author.B"> Bourneuf, Romain <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Boyle, Elette" data-group-selector="dagstuhl.contributor.author.B"> Boyle, Elette <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Brakerski, Zvika" data-group-selector="dagstuhl.contributor.author.B"> Brakerski, Zvika <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Braverman, Mark" data-group-selector="dagstuhl.contributor.author.B"> Braverman, Mark <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Bressan, Marco" data-group-selector="dagstuhl.contributor.author.B"> Bressan, Marco <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Broadbent, Anne" data-group-selector="dagstuhl.contributor.author.B"> Broadbent, Anne <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Buhrman, Harry" data-group-selector="dagstuhl.contributor.author.B"> Buhrman, Harry <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Buss, Sam" data-group-selector="dagstuhl.contributor.author.B"> Buss, Sam <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.C"> <b>C</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Canetti, Ran" data-group-selector="dagstuhl.contributor.author.C"> Canetti, Ran <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chakraborty, Diptarka" data-group-selector="dagstuhl.contributor.author.C"> Chakraborty, Diptarka <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chakraborty, Sourav" data-group-selector="dagstuhl.contributor.author.C"> Chakraborty, Sourav <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chakraborty, Suvradip" data-group-selector="dagstuhl.contributor.author.C"> Chakraborty, Suvradip <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chatterjee, Abhranil" data-group-selector="dagstuhl.contributor.author.C"> Chatterjee, Abhranil <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chattopadhyay, Arkadev" data-group-selector="dagstuhl.contributor.author.C"> Chattopadhyay, Arkadev <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chen, Lijie" data-group-selector="dagstuhl.contributor.author.C"> Chen, Lijie <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Cheu, Albert" data-group-selector="dagstuhl.contributor.author.C"> Cheu, Albert <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Childs, Andrew M." data-group-selector="dagstuhl.contributor.author.C"> Childs, Andrew M. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chung, Hao" data-group-selector="dagstuhl.contributor.author.C"> Chung, Hao <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Chuzhoy, Julia" data-group-selector="dagstuhl.contributor.author.C"> Chuzhoy, Julia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Cohen-Addad, Vincent" data-group-selector="dagstuhl.contributor.author.C"> Cohen-Addad, Vincent <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Cohen, Edith" data-group-selector="dagstuhl.contributor.author.C"> Cohen, Edith <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Cohn, Henry" data-group-selector="dagstuhl.contributor.author.C"> Cohn, Henry <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Coregliano, Leonardo Nagami" data-group-selector="dagstuhl.contributor.author.C"> Coregliano, Leonardo Nagami <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Coudron, Matthew" data-group-selector="dagstuhl.contributor.author.C"> Coudron, Matthew <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Culf, Eric" data-group-selector="dagstuhl.contributor.author.C"> Culf, Eric <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.D"> <b>D</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dalirrooyfard, Mina" data-group-selector="dagstuhl.contributor.author.D"> Dalirrooyfard, Mina <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Das, Debarati" data-group-selector="dagstuhl.contributor.author.D"> Das, Debarati <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Deng, Zhun" data-group-selector="dagstuhl.contributor.author.D"> Deng, Zhun <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dey, Papri" data-group-selector="dagstuhl.contributor.author.D"> Dey, Papri <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dinitz, Michael" data-group-selector="dagstuhl.contributor.author.D"> Dinitz, Michael <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dobrokhotova-Maikova, Natalia" data-group-selector="dagstuhl.contributor.author.D"> Dobrokhotova-Maikova, Natalia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dobzinski, Shahar" data-group-selector="dagstuhl.contributor.author.D"> Dobzinski, Shahar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dufoulon, Fabien" data-group-selector="dagstuhl.contributor.author.D"> Dufoulon, Fabien <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dwork, Cynthia" data-group-selector="dagstuhl.contributor.author.D"> Dwork, Cynthia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Dziembowski, Stefan" data-group-selector="dagstuhl.contributor.author.D"> Dziembowski, Stefan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.E"> <b>E</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Efremenko, Klim" data-group-selector="dagstuhl.contributor.author.E"> Efremenko, Klim <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="El-Hayek, Antoine" data-group-selector="dagstuhl.contributor.author.E"> El-Hayek, Antoine <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Emek, Yuval" data-group-selector="dagstuhl.contributor.author.E"> Emek, Yuval <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Epasto, Alessandro" data-group-selector="dagstuhl.contributor.author.E"> Epasto, Alessandro <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.F"> <b>F</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Fawzi, Hamza" data-group-selector="dagstuhl.contributor.author.F"> Fawzi, Hamza <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Fawzi, Omar" data-group-selector="dagstuhl.contributor.author.F"> Fawzi, Omar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Filtser, Arnold" data-group-selector="dagstuhl.contributor.author.F"> Filtser, Arnold <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Filtser, Omrit" data-group-selector="dagstuhl.contributor.author.F"> Filtser, Omrit <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Fleming, Noah" data-group-selector="dagstuhl.contributor.author.F"> Fleming, Noah <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Folwarczný, Lukáš" data-group-selector="dagstuhl.contributor.author.F"> Folwarczný, Lukáš <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.G"> <b>G</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gaitonde, Jason" data-group-selector="dagstuhl.contributor.author.G"> Gaitonde, Jason <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gál, Anna" data-group-selector="dagstuhl.contributor.author.G"> Gál, Anna <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gałązka, Małgorzata" data-group-selector="dagstuhl.contributor.author.G"> Gałązka, Małgorzata <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gelles, Ran" data-group-selector="dagstuhl.contributor.author.G"> Gelles, Ran <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gharibian, Sevag" data-group-selector="dagstuhl.contributor.author.G"> Gharibian, Sevag <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ghazi, Badih" data-group-selector="dagstuhl.contributor.author.G"> Ghazi, Badih <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ghosal, Utsab" data-group-selector="dagstuhl.contributor.author.G"> Ghosal, Utsab <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gilani, Amin Shiraz" data-group-selector="dagstuhl.contributor.author.G"> Gilani, Amin Shiraz <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Girish, Uma" data-group-selector="dagstuhl.contributor.author.G"> Girish, Uma <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gkatzelis, Vasilis" data-group-selector="dagstuhl.contributor.author.G"> Gkatzelis, Vasilis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goldberg, Leslie Ann" data-group-selector="dagstuhl.contributor.author.G"> Goldberg, Leslie Ann <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goldberg, Paul" data-group-selector="dagstuhl.contributor.author.G"> Goldberg, Paul <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goldenberg, Elazar" data-group-selector="dagstuhl.contributor.author.G"> Goldenberg, Elazar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goldreich, Oded" data-group-selector="dagstuhl.contributor.author.G"> Goldreich, Oded <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gollapudi, Sreenivas" data-group-selector="dagstuhl.contributor.author.G"> Gollapudi, Sreenivas <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gopalan, Parikshit" data-group-selector="dagstuhl.contributor.author.G"> Gopalan, Parikshit <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goswami, Mayank" data-group-selector="dagstuhl.contributor.author.G"> Goswami, Mayank <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gotlib, Roy" data-group-selector="dagstuhl.contributor.author.G"> Gotlib, Roy <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Goyal, Vipul" data-group-selector="dagstuhl.contributor.author.G"> Goyal, Vipul <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Grandoni, Fabrizio" data-group-selector="dagstuhl.contributor.author.G"> Grandoni, Fabrizio <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Grewal, Sabee" data-group-selector="dagstuhl.contributor.author.G"> Grewal, Sabee <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Grinberg, Vadim" data-group-selector="dagstuhl.contributor.author.G"> Grinberg, Vadim <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Grochow, Joshua A." data-group-selector="dagstuhl.contributor.author.G"> Grochow, Joshua A. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gupta, Anupam" data-group-selector="dagstuhl.contributor.author.G"> Gupta, Anupam <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Gupta, Varun" data-group-selector="dagstuhl.contributor.author.G"> Gupta, Varun <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.H"> <b>H</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Haitner, Iftach" data-group-selector="dagstuhl.contributor.author.H"> Haitner, Iftach <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Harsha, Prahladh" data-group-selector="dagstuhl.contributor.author.H"> Harsha, Prahladh <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="He, William" data-group-selector="dagstuhl.contributor.author.H"> He, William <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Henzinger, Monika" data-group-selector="dagstuhl.contributor.author.H"> Henzinger, Monika <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Heule, Marijn J. H." data-group-selector="dagstuhl.contributor.author.H"> Heule, Marijn J. H. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Hirahara, Shuichi" data-group-selector="dagstuhl.contributor.author.H"> Hirahara, Shuichi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Hitron, Yael" data-group-selector="dagstuhl.contributor.author.H"> Hitron, Yael <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Hu, Lunjia" data-group-selector="dagstuhl.contributor.author.H"> Hu, Lunjia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Hu, Zhuangfei" data-group-selector="dagstuhl.contributor.author.H"> Hu, Zhuangfei <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Hubáček, Pavel" data-group-selector="dagstuhl.contributor.author.H"> Hubáček, Pavel <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.I"> <b>I</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ikenmeyer, Christian" data-group-selector="dagstuhl.contributor.author.I"> Ikenmeyer, Christian <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Im, Sungjin" data-group-selector="dagstuhl.contributor.author.I"> Im, Sungjin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Immorlica, Nicole" data-group-selector="dagstuhl.contributor.author.I"> Immorlica, Nicole <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Impagliazzo, Russell" data-group-selector="dagstuhl.contributor.author.I"> Impagliazzo, Russell <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ishai, Yuval" data-group-selector="dagstuhl.contributor.author.I"> Ishai, Yuval <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Iyer, Vishnu" data-group-selector="dagstuhl.contributor.author.I"> Iyer, Vishnu <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.J"> <b>J</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Jeronimo, Fernando Granha" data-group-selector="dagstuhl.contributor.author.J"> Jeronimo, Fernando Granha <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Jin, Billy" data-group-selector="dagstuhl.contributor.author.J"> Jin, Billy <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Jin, Yaonan" data-group-selector="dagstuhl.contributor.author.J"> Jin, Yaonan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Jin, Yujia" data-group-selector="dagstuhl.contributor.author.J"> Jin, Yujia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Jones, Chris" data-group-selector="dagstuhl.contributor.author.J"> Jones, Chris <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.K"> <b>K</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kannan, Ravi" data-group-selector="dagstuhl.contributor.author.K"> Kannan, Ravi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kapralov, Michael" data-group-selector="dagstuhl.contributor.author.K"> Kapralov, Michael <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Karlin, Anna R." data-group-selector="dagstuhl.contributor.author.K"> Karlin, Anna R. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kaufman, Tali" data-group-selector="dagstuhl.contributor.author.K"> Kaufman, Tali <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Khot, Subhash" data-group-selector="dagstuhl.contributor.author.K"> Khot, Subhash <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kim, Michael P." data-group-selector="dagstuhl.contributor.author.K"> Kim, Michael P. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kindler, Guy" data-group-selector="dagstuhl.contributor.author.K"> Kindler, Guy <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Klein, Nathan" data-group-selector="dagstuhl.contributor.author.K"> Klein, Nathan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Koch, Caleb" data-group-selector="dagstuhl.contributor.author.K"> Koch, Caleb <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kociumaka, Tomasz" data-group-selector="dagstuhl.contributor.author.K"> Kociumaka, Tomasz <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kol, Gillat" data-group-selector="dagstuhl.contributor.author.K"> Kol, Gillat <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kollias, Kostas" data-group-selector="dagstuhl.contributor.author.K"> Kollias, Kostas <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Komarath, Balagopal" data-group-selector="dagstuhl.contributor.author.K"> Komarath, Balagopal <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kong, Yuqing" data-group-selector="dagstuhl.contributor.author.K"> Kong, Yuqing <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Koroth, Sajin" data-group-selector="dagstuhl.contributor.author.K"> Koroth, Sajin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kozachinskiy, Alexander" data-group-selector="dagstuhl.contributor.author.K"> Kozachinskiy, Alexander <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Krauthgamer, Robert" data-group-selector="dagstuhl.contributor.author.K"> Krauthgamer, Robert <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kretschmer, William" data-group-selector="dagstuhl.contributor.author.K"> Kretschmer, William <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Krishnaswamy, Ravishankar" data-group-selector="dagstuhl.contributor.author.K"> Krishnaswamy, Ravishankar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Kumar, Ravi" data-group-selector="dagstuhl.contributor.author.K"> Kumar, Ravi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.L"> <b>L</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lange, Jane" data-group-selector="dagstuhl.contributor.author.L"> Lange, Jane <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Langley, Zachary" data-group-selector="dagstuhl.contributor.author.L"> Langley, Zachary <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Laplante, Sophie" data-group-selector="dagstuhl.contributor.author.L"> Laplante, Sophie <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Li, Jiawei" data-group-selector="dagstuhl.contributor.author.L"> Li, Jiawei <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Li, Xinda" data-group-selector="dagstuhl.contributor.author.L"> Li, Xinda <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Li, Yingkai" data-group-selector="dagstuhl.contributor.author.L"> Li, Yingkai <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Li, Zhouzi" data-group-selector="dagstuhl.contributor.author.L"> Li, Zhouzi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Liang, Daniel" data-group-selector="dagstuhl.contributor.author.L"> Liang, Daniel <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Light, Bar" data-group-selector="dagstuhl.contributor.author.L"> Light, Bar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Linden, Noah" data-group-selector="dagstuhl.contributor.author.L"> Linden, Noah <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Liu-Zhang, Chen-Da" data-group-selector="dagstuhl.contributor.author.L"> Liu-Zhang, Chen-Da <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Liu, Qipeng" data-group-selector="dagstuhl.contributor.author.L"> Liu, Qipeng <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Liu, Yang P." data-group-selector="dagstuhl.contributor.author.L"> Liu, Yang P. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lizurej, Tomasz" data-group-selector="dagstuhl.contributor.author.L"> Lizurej, Tomasz <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lovett, Shachar" data-group-selector="dagstuhl.contributor.author.L"> Lovett, Shachar <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lu, Pinyan" data-group-selector="dagstuhl.contributor.author.L"> Lu, Pinyan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lucier, Brendan" data-group-selector="dagstuhl.contributor.author.L"> Lucier, Brendan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Lyu, Xin" data-group-selector="dagstuhl.contributor.author.L"> Lyu, Xin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.M"> <b>M</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Makarov, Mikhail" data-group-selector="dagstuhl.contributor.author.M"> Makarov, Mikhail <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mančinska, Laura" data-group-selector="dagstuhl.contributor.author.M"> Mančinska, Laura <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mande, Nikhil S." data-group-selector="dagstuhl.contributor.author.M"> Mande, Nikhil S. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Manurangsi, Pasin" data-group-selector="dagstuhl.contributor.author.M"> Manurangsi, Pasin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mao, Jieming" data-group-selector="dagstuhl.contributor.author.M"> Mao, Jieming <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Marwaha, Kunal" data-group-selector="dagstuhl.contributor.author.M"> Marwaha, Kunal <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mathieu, Claire" data-group-selector="dagstuhl.contributor.author.M"> Mathieu, Claire <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mazor, Noam" data-group-selector="dagstuhl.contributor.author.M"> Mazor, Noam <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Medina, Andres Munoz" data-group-selector="dagstuhl.contributor.author.M"> Medina, Andres Munoz <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Meeks, Kitty" data-group-selector="dagstuhl.contributor.author.M"> Meeks, Kitty <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Meir, Uri" data-group-selector="dagstuhl.contributor.author.M"> Meir, Uri <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Metger, Tony" data-group-selector="dagstuhl.contributor.author.M"> Metger, Tony <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Meyer, Pierre" data-group-selector="dagstuhl.contributor.author.M"> Meyer, Pierre <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mikulincer, Dan" data-group-selector="dagstuhl.contributor.author.M"> Mikulincer, Dan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Minzer, Dor" data-group-selector="dagstuhl.contributor.author.M"> Minzer, Dor <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mirrokni, Vahab" data-group-selector="dagstuhl.contributor.author.M"> Mirrokni, Vahab <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mitchell, Joseph S. B." data-group-selector="dagstuhl.contributor.author.M"> Mitchell, Joseph S. B. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mitropolsky, Daniel" data-group-selector="dagstuhl.contributor.author.M"> Mitropolsky, Daniel <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mittal, Rajat" data-group-selector="dagstuhl.contributor.author.M"> Mittal, Rajat <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Montanaro, Ashley" data-group-selector="dagstuhl.contributor.author.M"> Montanaro, Ashley <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Morimae, Tomoyuki" data-group-selector="dagstuhl.contributor.author.M"> Morimae, Tomoyuki <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mossel, Elchanan" data-group-selector="dagstuhl.contributor.author.M"> Mossel, Elchanan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Mukhopadhyay, Partha" data-group-selector="dagstuhl.contributor.author.M"> Mukhopadhyay, Partha <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Munagala, Kamesh" data-group-selector="dagstuhl.contributor.author.M"> Munagala, Kamesh <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Muthukumar, Vidya" data-group-selector="dagstuhl.contributor.author.M"> Muthukumar, Vidya <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.N"> <b>N</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Nanashima, Mikito" data-group-selector="dagstuhl.contributor.author.N"> Nanashima, Mikito <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Nazari, Yasamin" data-group-selector="dagstuhl.contributor.author.N"> Nazari, Yasamin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Nelson, Jelani" data-group-selector="dagstuhl.contributor.author.N"> Nelson, Jelani <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.O"> <b>O</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Oshman, Rotem" data-group-selector="dagstuhl.contributor.author.O"> Oshman, Rotem <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Oveis Gharan, Shayan" data-group-selector="dagstuhl.contributor.author.O"> Oveis Gharan, Shayan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ozols, Maris" data-group-selector="dagstuhl.contributor.author.O"> Ozols, Maris <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.P"> <b>P</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Papadimitriou, Christos" data-group-selector="dagstuhl.contributor.author.P"> Papadimitriou, Christos <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Paramonov, Dmitry" data-group-selector="dagstuhl.contributor.author.P"> Paramonov, Dmitry <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Parter, Merav" data-group-selector="dagstuhl.contributor.author.P"> Parter, Merav <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Pasarkar, Amol" data-group-selector="dagstuhl.contributor.author.P"> Pasarkar, Amol <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Paz, Ami" data-group-selector="dagstuhl.contributor.author.P"> Paz, Ami <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Peale, Charlotte" data-group-selector="dagstuhl.contributor.author.P"> Peale, Charlotte <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Peng, Richard" data-group-selector="dagstuhl.contributor.author.P"> Peng, Richard <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Perdomo, Juan C." data-group-selector="dagstuhl.contributor.author.P"> Perdomo, Juan C. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Pietrzak, Krzysztof" data-group-selector="dagstuhl.contributor.author.P"> Pietrzak, Krzysztof <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Pitassi, Toniann" data-group-selector="dagstuhl.contributor.author.P"> Pitassi, Toniann <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Podolskii, Vladimir" data-group-selector="dagstuhl.contributor.author.P"> Podolskii, Vladimir <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Polishchuk, Valentin" data-group-selector="dagstuhl.contributor.author.P"> Polishchuk, Valentin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Poremba, Alexander" data-group-selector="dagstuhl.contributor.author.P"> Poremba, Alexander <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Pratt, Kevin" data-group-selector="dagstuhl.contributor.author.P"> Pratt, Kevin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.Q"> <b>Q</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Qian, Luowen" data-group-selector="dagstuhl.contributor.author.Q"> Qian, Luowen <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Qiao, Mingda" data-group-selector="dagstuhl.contributor.author.Q"> Qiao, Mingda <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.R"> <b>R</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Raizes, Justin" data-group-selector="dagstuhl.contributor.author.R"> Raizes, Justin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ramya, C." data-group-selector="dagstuhl.contributor.author.R"> Ramya, C. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rathod, Abhishek" data-group-selector="dagstuhl.contributor.author.R"> Rathod, Abhishek <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Raz, Ran" data-group-selector="dagstuhl.contributor.author.R"> Raz, Ran <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Reingold, Omer" data-group-selector="dagstuhl.contributor.author.R"> Reingold, Omer <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ribeiro, João" data-group-selector="dagstuhl.contributor.author.R"> Ribeiro, João <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rincon Galeana, Hugo" data-group-selector="dagstuhl.contributor.author.R"> Rincon Galeana, Hugo <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Robere, Robert" data-group-selector="dagstuhl.contributor.author.R"> Robere, Robert <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rosen, Alon" data-group-selector="dagstuhl.contributor.author.R"> Rosen, Alon <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rossman, Benjamin" data-group-selector="dagstuhl.contributor.author.R"> Rossman, Benjamin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Roth, Marc" data-group-selector="dagstuhl.contributor.author.R"> Roth, Marc <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rothblum, Guy N." data-group-selector="dagstuhl.contributor.author.R"> Rothblum, Guy N. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rubinstein, Aviad" data-group-selector="dagstuhl.contributor.author.R"> Rubinstein, Aviad <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rudolph, Dorian" data-group-selector="dagstuhl.contributor.author.R"> Rudolph, Dorian <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Rush, Cynthia" data-group-selector="dagstuhl.contributor.author.R"> Rush, Cynthia <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Ryder, Nick" data-group-selector="dagstuhl.contributor.author.R"> Ryder, Nick <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.S"> <b>S</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Saha, Barna" data-group-selector="dagstuhl.contributor.author.S"> Saha, Barna <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sandeep, Sai" data-group-selector="dagstuhl.contributor.author.S"> Sandeep, Sai <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sandhu, Juspreet Singh" data-group-selector="dagstuhl.contributor.author.S"> Sandhu, Juspreet Singh <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sanyal, Swagato" data-group-selector="dagstuhl.contributor.author.S"> Sanyal, Swagato <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sarlós, Tamás" data-group-selector="dagstuhl.contributor.author.S"> Sarlós, Tamás <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Saurabh, Nitin" data-group-selector="dagstuhl.contributor.author.S"> Saurabh, Nitin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Saxena, Raghuvansh R." data-group-selector="dagstuhl.contributor.author.S"> Saxena, Raghuvansh R. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Scalet, Samuel O." data-group-selector="dagstuhl.contributor.author.S"> Scalet, Samuel O. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Schmid, Stefan" data-group-selector="dagstuhl.contributor.author.S"> Schmid, Stefan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Schmid, Ulrich" data-group-selector="dagstuhl.contributor.author.S"> Schmid, Ulrich <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Schoenebeck, Grant" data-group-selector="dagstuhl.contributor.author.S"> Schoenebeck, Grant <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Schwartzbach, Nikolaj I." data-group-selector="dagstuhl.contributor.author.S"> Schwartzbach, Nikolaj I. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shaulker, Ariel" data-group-selector="dagstuhl.contributor.author.S"> Shaulker, Ariel <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shayevitz, Ofer" data-group-selector="dagstuhl.contributor.author.S"> Shayevitz, Ofer <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="She, Adrian" data-group-selector="dagstuhl.contributor.author.S"> She, Adrian <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shechner, Moshe" data-group-selector="dagstuhl.contributor.author.S"> Shechner, Moshe <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sherif, Suhail" data-group-selector="dagstuhl.contributor.author.S"> Sherif, Suhail <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shi, Elaine" data-group-selector="dagstuhl.contributor.author.S"> Shi, Elaine <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shi, Jonathan" data-group-selector="dagstuhl.contributor.author.S"> Shi, Jonathan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shirley, Morgan" data-group-selector="dagstuhl.contributor.author.S"> Shirley, Morgan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Shraibman, Adi" data-group-selector="dagstuhl.contributor.author.S"> Shraibman, Adi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sidford, Aaron" data-group-selector="dagstuhl.contributor.author.S"> Sidford, Aaron <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Silbak, Jad" data-group-selector="dagstuhl.contributor.author.S"> Silbak, Jad <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Skerman, Fiona" data-group-selector="dagstuhl.contributor.author.S"> Skerman, Fiona <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Skverer, Tal" data-group-selector="dagstuhl.contributor.author.S"> Skverer, Tal <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Slivkins, Aleksandrs" data-group-selector="dagstuhl.contributor.author.S"> Slivkins, Aleksandrs <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Solomon, Tomer" data-group-selector="dagstuhl.contributor.author.S"> Solomon, Tomer <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Srivastava, Nikhil" data-group-selector="dagstuhl.contributor.author.S"> Srivastava, Nikhil <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Steinke, Thomas" data-group-selector="dagstuhl.contributor.author.S"> Steinke, Thomas <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Stemmer, Uri" data-group-selector="dagstuhl.contributor.author.S"> Stemmer, Uri <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Strassle, Carmen" data-group-selector="dagstuhl.contributor.author.S"> Strassle, Carmen <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sudan, Madhu" data-group-selector="dagstuhl.contributor.author.S"> Sudan, Madhu <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sundaresan, Janani" data-group-selector="dagstuhl.contributor.author.S"> Sundaresan, Janani <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Sunny, Anupa" data-group-selector="dagstuhl.contributor.author.S"> Sunny, Anupa <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.T"> <b>T</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tan, Li-Yang" data-group-selector="dagstuhl.contributor.author.T"> Tan, Li-Yang <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tan, Xizhi" data-group-selector="dagstuhl.contributor.author.T"> Tan, Xizhi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tan, Zihan" data-group-selector="dagstuhl.contributor.author.T"> Tan, Zihan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tauman Kalai, Yael" data-group-selector="dagstuhl.contributor.author.T"> Tauman Kalai, Yael <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tessler, Ran J." data-group-selector="dagstuhl.contributor.author.T"> Tessler, Ran J. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Tirumala, Harsha" data-group-selector="dagstuhl.contributor.author.T"> Tirumala, Harsha <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.U"> <b>U</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Umans, Chris" data-group-selector="dagstuhl.contributor.author.U"> Umans, Chris <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.V"> <b>V</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Valiant, Gregory" data-group-selector="dagstuhl.contributor.author.V"> Valiant, Gregory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Vassilvitskii, Sergei" data-group-selector="dagstuhl.contributor.author.V"> Vassilvitskii, Sergei <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Velusamy, Santhoshini" data-group-selector="dagstuhl.contributor.author.V"> Velusamy, Santhoshini <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Venkat, Prayaag" data-group-selector="dagstuhl.contributor.author.V"> Venkat, Prayaag <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Volkov, Yuval" data-group-selector="dagstuhl.contributor.author.V"> Volkov, Yuval <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Vyas, Nikhil" data-group-selector="dagstuhl.contributor.author.V"> Vyas, Nikhil <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.W"> <b>W</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Wallheimer, Nathan" data-group-selector="dagstuhl.contributor.author.W"> Wallheimer, Nathan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Wein, Alexander S." data-group-selector="dagstuhl.contributor.author.W"> Wein, Alexander S. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Weinberg, S. Matthew" data-group-selector="dagstuhl.contributor.author.W"> Weinberg, S. Matthew <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Wieder, Udi" data-group-selector="dagstuhl.contributor.author.W"> Wieder, Udi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Williams, Ryan" data-group-selector="dagstuhl.contributor.author.W"> Williams, Ryan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Williamson, David P." data-group-selector="dagstuhl.contributor.author.W"> Williamson, David P. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Winkler, Kyrill" data-group-selector="dagstuhl.contributor.author.W"> Winkler, Kyrill <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Woodruff, David P." data-group-selector="dagstuhl.contributor.author.W"> Woodruff, David P. <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Wu, Ke" data-group-selector="dagstuhl.contributor.author.W"> Wu, Ke <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.X"> <b>X</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Xiao, Tao" data-group-selector="dagstuhl.contributor.author.X"> Xiao, Tao <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.Y"> <b>Y</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yamakawa, Takashi" data-group-selector="dagstuhl.contributor.author.Y"> Yamakawa, Takashi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yan, Chao" data-group-selector="dagstuhl.contributor.author.Y"> Yan, Chao <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yang, Dana" data-group-selector="dagstuhl.contributor.author.Y"> Yang, Dana <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yang, Tianqi" data-group-selector="dagstuhl.contributor.author.Y"> Yang, Tianqi <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yannakakis, Mihalis" data-group-selector="dagstuhl.contributor.author.Y"> Yannakakis, Mihalis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yehuda, Gal" data-group-selector="dagstuhl.contributor.author.Y"> Yehuda, Gal <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yogev, Eylon" data-group-selector="dagstuhl.contributor.author.Y"> Yogev, Eylon <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yolcu, Emre" data-group-selector="dagstuhl.contributor.author.Y"> Yolcu, Emre <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yona, Gal" data-group-selector="dagstuhl.contributor.author.Y"> Yona, Gal <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yu, Huacheng" data-group-selector="dagstuhl.contributor.author.Y"> Yu, Huacheng <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Yuen, Henry" data-group-selector="dagstuhl.contributor.author.Y"> Yuen, Henry <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.contributor.author.Z"> <b>Z</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zehavi, Meirav" data-group-selector="dagstuhl.contributor.author.Z"> Zehavi, Meirav <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhan, Wei" data-group-selector="dagstuhl.contributor.author.Z"> Zhan, Wei <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhang, Forest" data-group-selector="dagstuhl.contributor.author.Z"> Zhang, Forest <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhang, Hongyang" data-group-selector="dagstuhl.contributor.author.Z"> Zhang, Hongyang <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhang, Jiapeng" data-group-selector="dagstuhl.contributor.author.Z"> Zhang, Jiapeng <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhang, Linjun" data-group-selector="dagstuhl.contributor.author.Z"> Zhang, Linjun <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhang, Shufan" data-group-selector="dagstuhl.contributor.author.Z"> Zhang, Shufan <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhao, Junyao" data-group-selector="dagstuhl.contributor.author.Z"> Zhao, Junyao <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhong, Peilin" data-group-selector="dagstuhl.contributor.author.Z"> Zhong, Peilin <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.contributor.author" data-value="Zhou, Hang" data-group-selector="dagstuhl.contributor.author.Z"> Zhou, Hang <span class="action"><i class="bi bi-plus-circle"></i></span> </li> </ul> </div> <br /> <div class="grouped-metadata-filter" data-filter-key="dagstuhl.subject.classification"> <ul class="list-group"> <li class="list-group-item filter-headline list-group-item-dark"> <b><span class="count"></span> Subjects</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item filter-item pinned -hidden" data-value="" data-key=""> <i class="bi bi-pin-angle-fill"></i> <span class="value"></span> <span class="action"><i><i class="bi bi-x-circle"></i></i></span> </li> <li class="list-group-item details buttons"> <span class="btn-group" role="group" aria-label="Show-All/Collapse"> <button type="button" class="btn btn-primary">Show All</button> <button type="button" class="btn btn-secondary">Collapse</button> </span> </li> <li class="list-group-item details show-all -hidden"> <button type="button" class="btn btn-primary">Show All</button> </li> <li class="list-group-item details filter-group-headline -expanded " data-group-selector="dagstuhl.subject.classification.Applied computing"> <b>Applied computing</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value " data-key="dagstuhl.subject.classification" data-value="Applied computing → Biological networks" data-group-selector="dagstuhl.subject.classification.Applied computing"> Applied computing → Biological networks <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Computer systems organization"> <b>Computer systems organization</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Computer systems organization → Quantum computing" data-group-selector="dagstuhl.subject.classification.Computer systems organization"> Computer systems organization → Quantum computing <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Computing methodologies"> <b>Computing methodologies</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Computing methodologies → Distributed algorithms" data-group-selector="dagstuhl.subject.classification.Computing methodologies"> Computing methodologies → Distributed algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Computing methodologies → Learning settings" data-group-selector="dagstuhl.subject.classification.Computing methodologies"> Computing methodologies → Learning settings <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Hardware"> <b>Hardware</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Hardware → Combinational circuits" data-group-selector="dagstuhl.subject.classification.Hardware"> Hardware → Combinational circuits <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Hardware → Quantum communication and cryptography" data-group-selector="dagstuhl.subject.classification.Hardware"> Hardware → Quantum communication and cryptography <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> <b>Mathematics of computing</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Algebraic topology" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Algebraic topology <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Approximation algorithms" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Approximation algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Coding theory" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Coding theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Combinatorial optimization" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Combinatorial optimization <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Combinatorics" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Combinatorics <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Discrete mathematics" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Discrete mathematics <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Graph theory" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Graph theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Numerical analysis" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Numerical analysis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Paths and connectivity problems" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Paths and connectivity problems <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Probabilistic algorithms" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Probabilistic algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Mathematics of computing → Probability and statistics" data-group-selector="dagstuhl.subject.classification.Mathematics of computing"> Mathematics of computing → Probability and statistics <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Networks"> <b>Networks</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Networks" data-group-selector="dagstuhl.subject.classification.Networks"> Networks <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Networks → Error detection and error correction" data-group-selector="dagstuhl.subject.classification.Networks"> Networks → Error detection and error correction <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Networks → Network algorithms" data-group-selector="dagstuhl.subject.classification.Networks"> Networks → Network algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Security and privacy"> <b>Security and privacy</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Authorization" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Authorization <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Cryptography" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Cryptography <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Information-theoretic techniques" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Information-theoretic techniques <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Mathematical foundations of cryptography" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Mathematical foundations of cryptography <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Privacy protections" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Privacy protections <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Public key (asymmetric) techniques" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Public key (asymmetric) techniques <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Security and privacy → Tamper-proof and tamper-resistant designs" data-group-selector="dagstuhl.subject.classification.Security and privacy"> Security and privacy → Tamper-proof and tamper-resistant designs <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-group-headline " data-group-selector="dagstuhl.subject.classification.Theory of computation"> <b>Theory of computation</b> <span style="float: right;"><i class="bi bi-chevron-down"></i><i class="bi bi-chevron-up"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algebraic complexity theory" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Algebraic complexity theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithm design techniques" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Algorithm design techniques <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic game theory and mechanism design" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Algorithmic game theory and mechanism design <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Algorithmic mechanism design" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Algorithmic mechanism design <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Approximation algorithms analysis" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Approximation algorithms analysis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Bayesian analysis" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Bayesian analysis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Boolean function learning" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Boolean function learning <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Circuit complexity" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Circuit complexity <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Communication complexity" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Communication complexity <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity classes" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Complexity classes <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Complexity theory and logic" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Complexity theory and logic <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational complexity and cryptography" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Computational complexity and cryptography <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational geometry" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Computational geometry <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Computational pricing and auctions" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Computational pricing and auctions <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Concurrency" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Concurrency <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Convergence and learning in games" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Convergence and learning in games <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic primitives" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Cryptographic primitives <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Cryptographic protocols" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Cryptographic protocols <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Design and analysis of algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Design and analysis of algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Discrete optimization" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Discrete optimization <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Distributed algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Distributed algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Facility location and clustering" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Facility location and clustering <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Graph algorithms analysis" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Graph algorithms analysis <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Interactive proof systems" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Interactive proof systems <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Lower bounds and information complexity" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Lower bounds and information complexity <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Machine learning theory" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Machine learning theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Models of computation" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Models of computation <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Models of learning" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Models of learning <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Network flows" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Network flows <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Online algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Online learning algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Online learning algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Oracles and decision trees" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Oracles and decision trees <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Parameterized complexity and exact algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Parameterized complexity and exact algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Pattern matching" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Pattern matching <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Problems, reductions and completeness" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Problems, reductions and completeness <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Proof complexity" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Proof complexity <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Pseudorandomness and derandomization" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Pseudorandomness and derandomization <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quality of equilibria" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Quality of equilibria <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum complexity theory" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Quantum complexity theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum computation theory" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Quantum computation theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum information theory" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Quantum information theory <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Quantum query complexity" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Quantum query complexity <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Random network models" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Random network models <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Randomness, geometry and discrete structures" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Randomness, geometry and discrete structures <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sample complexity and generalization bounds" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Sample complexity and generalization bounds <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Scheduling algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Scheduling algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sketching and sampling" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Sketching and sampling <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Sparsification and spanners" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Sparsification and spanners <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming models" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Streaming models <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Streaming, sublinear and near linear time algorithms" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Streaming, sublinear and near linear time algorithms <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory and algorithms for application domains" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Theory and algorithms for application domains <span class="action"><i class="bi bi-plus-circle"></i></span> </li> <li class="list-group-item details filter-item value -hidden " data-key="dagstuhl.subject.classification" data-value="Theory of computation → Theory of database privacy and security" data-group-selector="dagstuhl.subject.classification.Theory of computation"> Theory of computation → Theory of database privacy and security <span class="action"><i class="bi bi-plus-circle"></i></span> </li> </ul> </div> </div> </div> <div class="offcanvas offcanvas-bottom" tabindex="-1" id="statistics-offcanvas" aria-labelledby="statistics-offcanvas"> <div class="offcanvas-header"> <h5 class="offcanvas-title"></h5> <button type="button" class="btn-close text-reset" data-bs-dismiss="offcanvas" aria-label="Close"></button> </div> <div class="offcanvas-body small" data-context="14th Innovations in Theoretical Computer Science Conference (ITCS 2023)"> <div style="margin-top: 20vh" class="centered-loader"><div class="loader"></div></div> <iframe class="-hidden"></iframe> </div> </div> </div> </div> <span class="_feedback-button"> <i class="bi bi-question-circle"></i> <span class="text">Questions / Remarks / Feedback</span> </span> <div class="_feedback-form -hidden"> <span class="_feedback-close">X</span> <p>Feedback for Dagstuhl Publishing</p> <div> <textarea class="form-control" name="_feedback"></textarea> <input class="form-control" type="text" name="name" autocomplete="off" placeholder="Name (optional)" maxlength="60" /> <input class="form-control" type="email" name="email" autocomplete="off" placeholder="Email (optional)" maxlength="60" /> <br/> <button class="btn btn-sm btn-default">Send</button> </div> </div> <div class="alert alert-success _feedback-success -hidden"> <span class="glyphicon glyphicon-ok"></span> <h3>Thanks for your feedback!</h3> <div>Feedback submitted</div> <button class="btn btn-white _feedback-done">OK</button> </div> <div class="alert alert-danger _feedback-error -hidden"> <span class="glyphicon glyphicon-remove"></span> <h3>Could not send message</h3> <div>Please try again later or send an <a href="mailto:publishing@dagstuhl.de">E-mail</a></div> <button class="btn btn-white _feedback-done">OK</button> </div> <a class="scroll-up-button -hidden" href="#_top-of-page"> <i class="bi bi-arrow-up-circle"></i> </a> <footer class="page-footer dark"> <div class="container"> <h5>About DROPS</h5> <p>Schloss Dagstuhl - Leibniz Center for Informatics has been operating the Dagstuhl Research Online Publication Server (short: DROPS) since 2004. DROPS enables publication of the latest research findings in a fast, uncomplicated manner, in addition to providing unimpeded, open access to them. All the requisite metadata on each publication is administered in accordance with general guidelines pertaining to online publications (cf. Dublin Core). This enables the online publications to be authorized for citation and made accessible to a wide readership on a permanent basis. Access is free of charge for readers following the open access idea which fosters unimpeded access to scientific publications. </p> </div> <div class="container"> <div class="row"> <div class="col-lg-6"> <h5>Instructions for Authors</h5> <div class="row"> <div class="col-sm-6"> <b>Dagstuhl Series</b><br> <ul> <li><a href="https://submission.dagstuhl.de/series/details/lipics#author">LIPIcs</a></li> <li><a href="https://submission.dagstuhl.de/series/details/oasics#author">OASIcs</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dfu#author">Dagstuhl Follow-Ups</a></li> </ul> </div> <div class="col-sm-6"> <b>Dagstuhl Journals</b><br> <ul> <li><a href="https://submission.dagstuhl.de/series/details/darts#author">DARTS – Dagstuhl Artifacts Series</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dagrep#author">Dagstuhl Reports</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dagman#author">Dagstuhl Manifestos</a></li> <li><a href="https://submission.dagstuhl.de/series/details/lites#author">LITES</a></li> <li><a href="https://submission.dagstuhl.de/series/details/tgdk#author">TGDK – Transactions on Graph Data and Knowledge</a></li> </ul> </div> </div> </div> <div class="col-lg-6"> <h5>Instructions for Editors</h5> <div class="row"> <div class="col-sm-6"> <b>Dagstuhl Series</b><br> <ul> <li><a href="https://submission.dagstuhl.de/series/details/lipics#editor">LIPIcs</a></li> <li><a href="https://submission.dagstuhl.de/series/details/oasics#editor">OASIcs</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dfu#editor">Dagstuhl Follow-Ups</a></li> </ul> </div> <div class="col-sm-6"> <b>Dagstuhl Journals</b><br> <ul> <li><a href="https://submission.dagstuhl.de/series/details/darts#editor">DARTS – Dagstuhl Artifacts Series</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dagrep#editor">Dagstuhl Reports</a></li> <li><a href="https://submission.dagstuhl.de/series/details/dagman#editor">Dagstuhl Manifestos</a></li> <li><a href="https://submission.dagstuhl.de/series/details/lites#editor">LITES</a></li> <li><a href="https://submission.dagstuhl.de/series/details/tgdk#editor">TGDK – Transactions on Graph Data and Knowledge</a></li> </ul> </div> </div> </div> </div> </div> </footer> <div class="copyright"> © 2023-2024 <a href="https://www.dagstuhl.de">Schloss Dagstuhl – LZI GmbH</a> <a href="https://drops.dagstuhl.de/docs/imprint">Imprint</a> <a href="https://drops.dagstuhl.de/docs/privacy">Privacy</a> <a href="https://www.dagstuhl.de/en/publishing/team">Contact</a> </div> <script type="text/javascript" src="https://drops.dagstuhl.de/js/jquery-3.6.0.min.js"></script> <script type="text/javascript" src="https://drops.dagstuhl.de/js/app.js?drops-core-2024-10-22"></script> <script type="text/javascript" src="https://drops.dagstuhl.de/js/popper.min.js"></script> <script type="text/javascript" src="https://drops.dagstuhl.de/js/circle-progress.js"></script> <script type="text/javascript"> $(document).ready(function() { const view = { statsServer: 'https://drops-stats.dagstuhl.de', animationStarted: false, isScrolledIntoView: function (elem) { const rect = elem.getBoundingClientRect(); const elemTop = rect.top; //const elemBottom = rect.bottom; // const elemHeight = rect.height; return (elemTop >= 0) && (elemTop <= window.innerHeight); }, progressCircle: function ($el) { $el.find('.circle').circleProgress({ value: 1, size: 80, fill: { color: '#555' }, animation: { duration: 1200 } }); }, countUp: function($el) { $el.find('.number').each(function() { const $this = $(this); const number = parseInt($this.attr('data-number')); let suffix = ''; if (number > 90000) { $this.text(Math.ceil(number/1000)+' k'); suffix = ' k'; } else if (number > 90000000) { $this.text(Math.ceil(number/1000000)+' m'); suffix = ' m'; } else { $this.text(Math.ceil(number)) } $({ Counter: 0 }).animate({ Counter: $this.text().replace(suffix, '').replace(',', '') }, { duration: 1000, easing: 'swing', step: function() { $this.text(Math.ceil(this.Counter).toString().replace(/\B(?=(\d{3})+(?!\d))/g, ",") + suffix); } }); }); }, checkVisibility: function() { const $container = $('.stats-total'); if (view.isScrolledIntoView($container[0])) { if (!view.animationStarted) { view.animationStarted = true; view.progressCircle($container); setTimeout(function() { view.countUp($container) }, 200); } } }, initialize: function() { $.ajax({ type: 'get', url: view.statsServer + '/api/external/drops2/volume/LIPIcs-volume-251/-/stats', success: function (result) { $('.total-downloads .number').attr('data-number', result.total.downloads); $('.total-metadata-views .number').attr('data-number', result.total.clicks); window.addEventListener('scroll', view.checkVisibility); view.checkVisibility(); }, error: function () { $('.total-downloads .number').text(0); $('.total-metadata-views .number').text(0); window.addEventListener('scroll', view.checkVisibility); view.checkVisibility(); } }); } }; view.initialize(); }); </script> <script type="text/javascript"> $(document).ready(function() { const view = { trackInvestigation: function(e) { const $entity = $(e.currentTarget).parent().parent(); const permanentId = $entity.attr('data-permanent-id'); $.ajax({ url: '/entities/' + permanentId + '/_investigation', type: 'get', }); }, initialize: function() { $('a.investigation').on('click', view.trackInvestigation); } }; view.initialize(); }); </script> <script type="text/javascript"> $(document).ready(function() { const view = { $el: { root: $('.grouped-metadata-filter'), freeTextFilter: $('#free-text-filter') }, appliedFilters: { freeText: [] }, methods: { toggleDetails: function(e) { var $current = $(e.currentTarget); var $parent = $current.parent(); $parent.toggleClass('-expanded'); }, toggleGroup: function(e) { var $current = $(e.currentTarget); var selector = $current.attr('data-group-selector'); $current.toggleClass('-expanded'); $('.filter-item[data-group-selector="' + selector + '"]').toggleClass('-hidden'); }, toggleFilter: function(e) { var $current = $(e.currentTarget); var key = $current.attr('data-key'); var value = $current.attr('data-value'); if (view.appliedFilters[key] === undefined) { view.appliedFilters[key] = []; } var index = view.appliedFilters[key].indexOf(value); if (index !== -1) { view.appliedFilters[key].splice(index, 1); $('.grouped-metadata-filter[data-filter-key="'+key+'"]').find('.pinned[data-value="'+value+'"]').remove(); } else { view.appliedFilters[key].push(value); var $template = $('.grouped-metadata-filter[data-filter-key="'+key+'"]').find('.pinned.-hidden'); var $filter = $template.clone(); $filter.find('.value').html(value); $filter.attr('data-value', value) .attr('data-key', key) .removeClass('-hidden') .insertAfter($template) .on('click', view.methods.toggleFilter); } var event = (index !== -1) ? 'removeFilter' : 'addFilter'; var filterCount = 0; for(var filterKey in view.appliedFilters) { filterCount += view.appliedFilters[filterKey].length; } $(document).trigger('grouped-metadata-filter:' + event, { key: key, value: value, appliedFilters: view.appliedFilters, filterCount: filterCount }); }, setFreeTextFilter: function(e) { var $current = $(e.currentTarget); var value = $current.val().trim(); if (value === '') { view.appliedFilters.freeText = [] } else { view.appliedFilters.freeText = [ value ]; } var filterCount = 0; for(var filterKey in view.appliedFilters) { filterCount += view.appliedFilters[filterKey].length; } $(document).trigger('grouped-metadata-filter:addFilter', { key: 'free-text', value: value, appliedFilters: view.appliedFilters, filterCount: filterCount }); }, dropAllFilters: function() { $('.grouped-metadata-filter').find('.filter-item.pinned:not(.-hidden)').click(); $('#free-text-filter').val('').trigger('keyup'); }, expandAllGroups: function(e) { var $current = $(e.currentTarget); $current.parent().parent().parent().find('.filter-group-headline:not(.-expanded)').click(); }, collapseAllGroups: function(e) { var $current = $(e.currentTarget); var $filter = $current.parent().parent().parent(); $filter.find('.filter-group-headline.-expanded').click(); $filter.find('.filter-headline').click(); $filter.find('.filter-headline').click(); } }, initialize: function() { view.$el.root.each(function() { var count = $(this).find('.filter-item.value').length; $(this).find('.filter-headline .count').text(count); }); view.$el.root.find('.filter-group-headline').on('click', view.methods.toggleGroup); view.$el.root.find('.filter-item').on('click', view.methods.toggleFilter); view.$el.root.find('.filter-headline').on('click', view.methods.toggleDetails); view.$el.root.find('.buttons .btn-primary').on('click', view.methods.expandAllGroups); view.$el.root.find('.buttons .btn-secondary').on('click', view.methods.collapseAllGroups); view.$el.freeTextFilter.on('keyup', view.methods.setFreeTextFilter); view.$el.freeTextFilter.on('search', view.methods.setFreeTextFilter); $(document).on('grouped-metadata-filter:dropAllFilters', view.methods.dropAllFilters); } }; view.initialize(); }); </script> <script type="text/javascript"> $(document).ready(function() { const view = { normalize: function(string) { return string.normalize('NFD').replace(/[\u0300-\u036f]/g, ""); }, applyFilters: function(e, data) { var $documents = $('.document'); var $noResults = $('.no-results'); $documents.each(function() { var $document = $(this); var matches = 0; for(var filterKey in data.appliedFilters) { var values = data.appliedFilters[filterKey]; if (filterKey === 'freeText' && values[0] !== undefined && values[0] !== '') { var regex = new RegExp(view.normalize(values[0].toLowerCase()), 'i'); matches += view.normalize($document.html()).match(regex) ? 1 : 0; } else { values.forEach(function (value) { matches += $document.find('.selectors').find('[data-key="' + filterKey + '"][data-value="' + value + '"]').length }); } } if (matches === data.filterCount) { $document.removeClass('-hidden'); } else { $document.addClass('-hidden') } }); if ($documents.parent().find('.document:not(.-hidden').length === 0) { $noResults.removeClass('-hidden'); } else { $noResults.addClass('-hidden'); } document.getElementById('end-of-header').scrollIntoView(); var filterInfo = ''; if (data.filterCount === 1) { filterInfo = '1 filter applied ×'; } else if (data.filterCount > 1) { filterInfo = data.filterCount + ' filters applied ×'; } $('._filter-info').html(filterInfo); if (data.appliedFilters.freeText[0] !== undefined && data.appliedFilters.freeText[0] !== '') { $('#free-text-filter').addClass('-active'); } else { $('#free-text-filter').removeClass('-active'); } }, initialize: function() { $(document).on('grouped-metadata-filter:addFilter', view.applyFilters); $(document).on('grouped-metadata-filter:removeFilter', view.applyFilters); } }; view.initialize(); }); </script> <script type="text/javascript"> function _enableFeedback() { var $feedbackButton = $('._feedback-button, .fixed-beta-button'); var $feedbackClose = $('._feedback-close'); var $feedbackForm = $('._feedback-form'); var $feedbackSubmit = $('._feedback-form button'); var $textarea = $feedbackForm.find('textarea'); var $feedbackSuccess = $('._feedback-success'); var $feedbackError = $('._feedback-error'); var $feedbackDoneButton = $('._feedback-done'); $feedbackButton.addClass('_show'); $feedbackButton.on('click', function () { $feedbackButton.addClass('-hidden'); $feedbackForm.removeClass('-hidden'); $textarea.focus(); }); $feedbackClose.on('click', function () { $feedbackSuccess.addClass('-hidden'); $feedbackForm.addClass('-hidden'); $feedbackButton.removeClass('-hidden'); }); $feedbackDoneButton.on('click', function () { $feedbackError.addClass('-hidden'); $feedbackSuccess.addClass('-hidden'); $feedbackForm.addClass('-hidden'); $feedbackButton.removeClass('-hidden'); }); $feedbackSubmit.on('click', function () { var message = $textarea.val(); if (message === undefined) { message = ''; } if (message.trim() !== '') { $.ajax({ url: '/api/v1/feedback', type: 'post', data: { content: message, context: window.location.href, name: $('input[name="name"]').val(), email: $('input[name="email"]').val(), }, success: function (result) { if (result === 'success') { $textarea.val(''); $feedbackSuccess.removeClass('-hidden'); } else { $feedbackError.removeClass('-hidden'); } }, error: function () { $feedbackError.removeClass('-hidden'); } }); } }); } var _defer_counter = 0; function _defer(method) { if (window.jQuery) { method(); } else { if (_defer_counter < 20) { setTimeout(function () { _defer(method); console.log(_defer_counter); _defer_counter++; }, 500); } } } setTimeout(function() { _defer(_enableFeedback); }, 1000); </script> <script type="text/javascript"> $(document).ready(function() { $('._filter-info').on('click', function() { $(document).trigger('grouped-metadata-filter:dropAllFilters'); }); }); </script> <script type="text/javascript"> $(document).ready(function() { const statistics = { statsServer: 'https://drops-stats.dagstuhl.de', showStatistics: function(e) { e.preventDefault(); const $offCanvas = $('#statistics-offcanvas'); const $iframe = $offCanvas.find('iframe'); const $loader = $offCanvas.find('.centered-loader'); $iframe.addClass('-hidden'); $loader.removeClass('-hidden'); $iframe[0].onload = function () { $iframe.removeClass('-hidden'); $loader.addClass('-hidden'); }.bind(this); const modeParameter = ''; const $target = $(e.currentTarget); const entityId = $target.attr('data-entity'); const title = $target.attr('data-title'); const embedUrl = statistics.statsServer + '/embed/external/drops2/' + entityId + modeParameter; let context = $offCanvas.find('.offcanvas-body').attr('data-context'); if (context === title) { context = ''; } if (context !== '') { context += '<br>'; } $offCanvas.find('.offcanvas-title').html(context + '<h2 style="font-weight: bold">' + title + '</h2>'); $offCanvas.offcanvas('show'); $offCanvas.find('iframe').attr('src', embedUrl); return false; }, initialize: function() { $('.btn-statistics').on('click', this.showStatistics); } }; statistics.initialize(); }); </script> <script type="text/javascript"> $(document).ready(function() { const app = { maxScrollPos: window.innerWidth < 500 ? 100 // mobile : 400, // desktop $el : { navbarSearch: $('nav .navbar-search'), fixedSearchButton: $('.fixed-search-button'), copyToClipboard: $('.copy-to-clipboard') }, methods: { hideMenuOnScroll: function(scrollPos) { const $menu = $('nav.navbar.main'); const $stickySearch = $('.search.sticky'); const $banner = $('#_banner'); const $fixedSearchButton = $('.fixed-search-button'); if (scrollPos > app.maxScrollPos) { $menu.addClass('-hide'); $banner.addClass('-hide'); $stickySearch.addClass('-top'); $fixedSearchButton.addClass('-show'); } else { app.methods.showMenu(null, false); } }, showMenu: function(e, focus) { const $menu = $('nav.navbar.main'); const $stickySearch = $('.search.sticky'); const $banner = $('#_banner'); const $fixedSearchButton = $('.fixed-search-button'); $menu.removeClass('-hide'); $banner.removeClass('-hide'); $stickySearch.removeClass('-top'); $fixedSearchButton.removeClass('-show'); if (focus !== false) { $('.navbar-search').find('input[name="term"]').focus(); } }, showUpLinkOnScroll: function(scrollPos) { const $upLink = $('.scroll-up-button'); if (scrollPos > app.maxScrollPos) { $upLink.removeClass('-hidden'); } else { $upLink.addClass('-hidden'); } }, scrollHandler: function() { const scrollPos = $(document).scrollTop(); app.methods.hideMenuOnScroll(scrollPos); app.methods.showUpLinkOnScroll(scrollPos); }, copyToClipboard: function(e) { e.preventDefault(); const $current = $(e.currentTarget); // console.log($current.attr('data-selector')); const element = $('#'+$current.attr('data-selector'))[0]; console.log(element); element.select(); document.execCommand("copy"); const $success = $current.find('.bi-check'); $success.removeClass('-hidden'); setTimeout(function() { $success.addClass('-hidden'); }, 1000); }, initTooltips: function() { const tooltipTriggerList = [].slice.call(document.querySelectorAll('[data-bs-toggle="tooltip"]')) const tooltipList = tooltipTriggerList.map(function (tooltipTriggerEl) { return new bootstrap.Tooltip(tooltipTriggerEl) }); }, expandSearch: function() { app.$el.navbarSearch.addClass('expanded'); }, collapseSearch: function(e) { if (!$(e.currentTarget).is('button.btn-outline-success')) { app.$el.navbarSearch.removeClass('expanded'); } }, initDeepLinksTabs: function() { const innerAnchors = [ 'resource-articles', 'cfp-si-resources', 'cfp-si-autonomous-systems-and-knowledge-graphs' ]; let anchors = []; $('a[role="tab"]').each(function() { anchors.push($(this).attr('aria-controls')); }); innerAnchors.forEach(function(anchor) { if ($('#'+anchor).length > 0) { anchors.push(anchor); } }); if (anchors.length === 0) { return; } let selectedAnchor = window.location.hash.substring(1); if (anchors.indexOf(selectedAnchor) === -1) { $('#publications-tab').tab('show'); window.scrollTo(0,0); return; } if (selectedAnchor !== 'publications') { const innerAnchorIndex = innerAnchors.indexOf(selectedAnchor); // anchor sits inside tab -> open the tab first, then scroll to anchor if (innerAnchorIndex > -1) { const $tab = $('#'+selectedAnchor).closest('.tab-pane'); console.log($tab); try { $('#'+$tab.attr('id')+'-tab').tab('show'); } catch (e) { } setTimeout(function () { $('#' + selectedAnchor)[0].scrollIntoView(); }, 800); } else { try { $('#' + selectedAnchor + '-tab').tab('show'); } catch (e) { } window.scrollTo(0, 0); } } $('[data-tab-link]').on('click', function(e) { const $target = $(e.currentTarget); let href = $target.attr('href'); let scrollLink = null; if (href === '#cfp-si-list') { scrollLink = href; href = '#cfp'; } try { console.log(href); $(href+'-tab').tab('show'); } catch(e) { } console.log(scrollLink); if (scrollLink !== null) { setTimeout(function() { $(scrollLink)[0].scrollIntoView(); }, 200); } else { setTimeout(function() { window.scrollTo(0,0); }, 200); } }); } }, initialize: function() { $(window).on('scroll', app.methods.scrollHandler); $(window).on('scroll-to-top', function() { window.scrollTo(0,0) }); $(document).trigger('scroll'); // set correct status for scroll-related parts (navbar/back-to-top) on page reload app.$el.copyToClipboard.on('click', app.methods.copyToClipboard); app.$el.fixedSearchButton.on('click', app.methods.showMenu); app.$el.navbarSearch.find('input').on('click', app.methods.expandSearch) app.$el.navbarSearch.find('input').on('blur', app.methods.collapseSearch); app.methods.initTooltips(); app.methods.initDeepLinksTabs(); } }; app.initialize(); }); </script> </body> </html>