| Date |
Topic |
Speaker |
| Sep 7 |
Online Matching with Stochastic Rewards
Abstract:
The online matching problem has received significant attention in recent years because of its connections to allocation problems in Internet advertising, crowd-sourcing, etc. In these real-world applications, the typical goal is not to maximize the number of allocations; rather it is to maximize the number of “successful” allocations, where success of an allocation is governed by a stochastic process which follows the allocation. Such applications motivate us to introduce stochastic rewards in the online matching problem. The bulk of the talk will focus on a deterministic algorithm for this problem whose competitive ratio converges to (approximately) 0.567 for uniform and vanishing success probabilities. If time permits, I will also talk about a randomized algorithm and an upper bound on the competitive ratio for this problem. The talk will be self-contained and is based on joint work with Aranyak Mehta.
Hosted by: Pankaj Agarwal
http://www.cs.duke.edu/events/?id=00000001539
|
Debmalya Panigrahi |
| Sep 17 |
Preemptive and Non-Preemptive Generalized Min Sum Set Cover
Abstract:
In the Preemptive Generalized Min Sum Set Cover Problem, we are given
n ground elements and a collection of sets {S_1, S_2, ..., S_m} where
each subset S_i of ground elements has a positive requirement k_i that
has to be fulfilled. We would like to preemptively order (schedule)
all elements to minimize the total cover time of all sets S_i. The
cover time of set S_i is defined as the first time when k_i amount of
elements in S_i are scheduled. We give a 2-approximation for this
problem, which is tight under a certain complexity assumption. We also
show that any preemptive solution can be transformed into a
non-preemptive one by losing a factor of 6.2 in the objective
function. As a byproduct, we obtain an improved 12.4-approximation for
the non-preemptive version of this problem. A key technical ingredient
of our results is a novel linear programming relaxation which is
completely different from [Bansal-Gupta-Krishnaswamy 10],
[Skutella-Williamson 11].
Joint-work with Maxim Sviridenko and Ruben van der Zwaan
|
Sungjin Im |
| Sep 24 |
Open Issues in Data Privacy -- Correlations, Utility and Personalization
Abstract:
Tremendous amounts of personal data about individuals are being collected and shared online. In many cases, adversaries can infer sensitive information about individuals (from such data) by utilizing auxiliary knowledge about the individuals in the data. Recent research, culminating in the development of a powerful notion called differential privacy, have transformed the field of data privacy from a black art into a rigorous mathematical discipline. One of the attractive features of differential privacy is that it is purportedly agnostic to the auxiliary information an adversary can use to breach privacy of individuals.
In this talk I will present Pufferfish, an alternate rigorous semantic approach to defining privacy which explicitly defines which information is kept secret, what adversaries (and auxiliary information) are tolerated, and bounds the information disclosed about each secret to each adversary. This framework provides a complete characterization of the privacy protection guaranteed by differential privacy. This framework highlights three important shortcomings of differential privacy that make it unsuitable for many real world applications -- it can't protect against adversaries who know about correlations in the data (like in social networks), there are fundamental limits on the utility of the data output by differentially private mechanisms, and it does not allow different levels of privacy protection for different individuals. I will present some initial ideas towards overcoming these limitations of differential privacy.
|
Ashwin Machanavajjhala |
| Oct 1 |
Evolving voter model
Abstract:
In the evolving voter model we choose oriented edges (x,y) at random. If the two individuals have the same opinion, nothing happens. If not, x imitates y with probability 1-alpha, and otherwise severs the connection with y and picks a new neighbor at random
(i) from the graph, or (ii) from those with the same opinion as x.
One model has a discontinuous transition, the other a continuous one.
Joint work with James Gleeson, Alun Lloyd, Peter Mucha, Feng Shi, David Sivakoff, and Chris Varghese. Proc. Nat'l. Acad. Sci. 109 (2012), 3682-3687
|
Rick Durrett |
| Oct 15 |
Fall Break
Abstract:
October 12 Friday. 7:00 p.m. Fall break begins
October 17 Wednesday. 8:30 a.m. Classes resume
|
Academic Calendar |
| Oct 19 |
Algebraic Cryptanalysis and Gröbner Bases
Time: 3 - 4pm, Oct 19, Friday
Place: D344, LSRC, Duke
Abstract:
Last years a new kind of cryptanalysis has made its entrance in
cryptography: the so-called algebraic cryptanalysis. The cryptanalysis of
several modern ciphers reduces to the fundamental problem of finding all
the common zeroes of m quadratic polynomials in n unknowns over F2 where n
is large (say > 100).
Up to now, the best complexity bound was reached by an exhaustive search
in 4log2(n)2^n operations. Using Gröbner Bases we can break this 2^n
barrier and we present an algorithm of expected complexity O(2^(0.79n))
when m=n. When m>n we can decrease the complexity even more; for instance
when m=5n the complexity drops to O(2^(0.31n)).
If time permits, we will also present new upper bounds for the complexity
of solving bilinear systems and determinantal ideals which are also
related to crypto applications. A consequence is that many new families of
polynomial systems can be solved in polynomial time.
|
Jean-Charles Faugere |
| Oct 22 |
Auctions and Allocations with Positive Network Externalities
Abstract:
With the advent of social networks such as Facebook, Twitter, and LinkedIn, and online offers/deals web sites, network externalties raise the possibility of marketing and advertising to users based on influence they derive from their neighbors in such networks. Indeed, a user’s valuation for a product is changed by his knowledge of which of his neighbors likes or owns the product. Designing allocation schemes and auctions in the presence of network externalities is not very well understood, and poses many challenges that are hard to address with traditional techniques. We show that even in very simple settings, optimal auction design becomes APX-Hard, and pricing schemes may not admit to Nash equilibria in buyer behavior. On the positive side, we present approximation algorithms for welfare and revenue maximization in both single item and multi-item settings via interesting linear programming relaxations.
Joint work with Anand Bhalgat and Sreenivas Gollapudi (EC 2012); and with Nima Haghpanah, Nicole Immorlica, and Vahab Mirrokni (EC 2011).
|
Kamesh Munagala |
| Oct 29 |
Not Scheduled
Abstract:
Not Scheduled
|
Not Scheduled |
| Nov 5 |
TBD
Abstract:
TBD
|
Scott C. Schmidler |
| Nov 12 |
Computing the Distance between Piecewise-Linear Bivariate Functions
Abstract:
We consider the problem of computing the distance between two
piecewise-linear bivariate functions F and G defined over a
common domain M, induced by the L_2-norm, that is
||F-G||=sqrt(integral(F-G)^2). If F is defined by linear
interpolation over a triangulation of M with N triangles,
while G is defined over another such triangulation, the
obvious naive algorithm requires Theta(N^2) arithmetic
operations to compute this distance. We show that it is
possible to compute it in O(N\log^4 N\log\log N)$ arithmetic
operations, by reducing the problem to multi-point evaluation
of a certain type of polynomials.
We also present an application to terrain matching and discuss
several generalizations and extensions.
This is joint work with Guillaume Moroz from INRIA Grand-Est, Nancy, France.
|
Boris Aronov |
| Nov 19 |
Algebraic Topology of Geometric Complexes
Abstract:
The field of `Applied Algebraic Topology' focuses on applying algebraic topology methods to study features of surfaces and functions arising in engineering scenarios, as well as for data analysis and manifold learning. This field has generated considerable interest over the past few years. However, despite the fact that many of the problems in this area involve random data collection, its probabilistic foundations are still at a very preliminary stage. This study is part of a general effort to supply applied topology methods with probabilistic statements.
A simplicial complex is a collection of vertices, edges, triangles, and simplexes of higher dimension, and one can think of it as a generalization of a graph. In a geometric complex, the presence of simplexes is determined by geometric properties of the vertices. Thus, choosing vertices at random yields a random topological space with many interesting features. We focus on the limiting behavior of the Betti numbers of such complexes (i.e. the number of k-dimensional 'holes'), as the number of vertices goes to infinity. We study different ways to construct a geometric complex, each resulting in a completely different structure.
|
Omer Bobrowski |
| Nov 26 |
TBD
Abstract:
TBD
|
TBD |