Happy towel day

Tomorrow, Wednesday May 25, is the international Towel Day in honor of Douglas Adams, author of the 5-book trilogy "The hitchhiker's Guide to the Galaxy". In his book (and his prior 1978 radio series) Adams gave a nice illustration of computational complexity and non uniform computation in his story about the "deep thought" computer who took 7.5 million … Continue reading Happy towel day

Highlights of Algorithms registration

Aleksander Madry asks me to announce that registration for the Highlights of Algorithms conference he posted about is open. The registration link is http://highlightsofalgorithms.org/registration/. (Early registration is due April 30.) Also, the preliminary program is available at http://highlightsofalgorithms.org/program/. The program is packed with 28 invited talks and with even a larger number of short contributions. Those interested in attending … Continue reading Highlights of Algorithms registration

Bayesianism, frequentism, and the planted clique, or do algorithms believe in unicorns?

(See also pdf version , and these lecture notes) The divide between frequentists and Bayesians in statistics is one of those interesting cases where questions of philosophical outlook have actual practical implications. At the heart of the debate is Bayes’ theorem: $latex \Pr[A|B] = \Pr[A \cap B ]/\Pr[B]\;.$ Both sides agree that it is correct, but they disagree … Continue reading Bayesianism, frequentism, and the planted clique, or do algorithms believe in unicorns?

Chaining methods continued (guest post by Jelani Nelson)

[This is the sequel to Jelani's previous post on chaining method; for more, see the post STOC workshop on this topic --Boaz] 1. A case study: (sub)gaussian processes To give an introduction to chaining, I will focus our attention on a concrete scenario. Suppose we have a bounded (but possibly infinite) collection of vectors $latex {T\subset \mathbb{R}^n}&fg=000000$. … Continue reading Chaining methods continued (guest post by Jelani Nelson)

Hopes, Fears, and Software Obfuscation

Following the exciting paper of Garg, Gentry, Halevi, Raykova, Sahai and Waters, the world of cryptography has been ablaze with "obfuscation fever" with many  longstanding questions succumbing to obfuscation-based constructions. At the same time, our understanding of the computational assumptions required for these constructions is still very much incomplete (e.g., see these two recent works  and the … Continue reading Hopes, Fears, and Software Obfuscation

Workshop on Chaining Methods (guest post by Jelani Nelson)

[Jelani Nelson is organizing a post-STOC workshop on  Chaining Methods and their applications, and agreed to write a 2-post series about these methods here. --Boaz] 1. Workshop details Assaf Naor and I (Jelani Nelson) are organizing a two-day workshop ``Chaining Methods and their Applications to Computer Science (CMACS)'' June 22--23, 2016, immediately after STOC 2016. It … Continue reading Workshop on Chaining Methods (guest post by Jelani Nelson)