Open problems are of course very valuable for setting research directions and pointing out current or grand challenges. I would like to point out two more recent lists of open problems that are "closer to home" for me at least.sublinear.info is a wikified List of Open Problems in Sublinear Algorithms. This one is actually a few … Continue reading Lists of Open Problems
Month: March 2013
Research Life-Stories: Bobby Kleinberg
Our project continues with Bobby Kleinberg. ------------------------------------------------------------ As an undergraduate I majored in mathematics and took only one computer science course. In fact quite a few of the mathematicians who influenced me were openly dismissive of computer science. Of course, throughout this period my brother Jon would continually talk to me about TCS — a … Continue reading Research Life-Stories: Bobby Kleinberg
FOCS 2013 – Submission Server is Open
The FOCS 2013 submission server is open, the main site is up and submission deadline is in two weeks! Please read the call for papers before submitting your paper especially as it has changed since last year. In essence, we are experimenting with less regulation on our part (as far as formatting) and more responsibility on … Continue reading FOCS 2013 – Submission Server is Open
2012 Turing to Goldwasser and Micali
Shafi Goldwasser (MIT and Weizmann) and Silvio Micali (MIT) were announced as the 2012 Turing Award winners. I am so excited! On a personal note, my first research paper was a follow-up on their work (joint with Oded Goldreich on pseudorandom functions) and they kept on inspiring my research ever since (and I’m hardly alone … Continue reading 2012 Turing to Goldwasser and Micali
Challenges in Outsourcing Computation
As applications move to cloud computing platforms, ensuring data confidentiality and integrity becomes a serious concern. Users want to ensure that even if untrustworthy systems handle their confidential data, their data cannot be disclosed. In addition, users want to ensure that computations done by the (untrusted) systems are correct.The latter problem is known as the … Continue reading Challenges in Outsourcing Computation