Date and Time  Speaker and Title  Abstract  Reference 

Summer  Summer break 
Date and Time  Speaker and Title  Abstract  Reference 

26 April 2023 14:15 (Helsinki time) Online 
Goran Zuzic
: Universal optimality in distributed computing and its connections to diverse areas of theoretical computer science 
The modern computation and information processing systems shaping our world have become massively distributed, and a fundamental understanding of distributed algorithmics has never been more important. At the same time, despite 40 years of intense study, we often do not have an adequate understanding of the fundamental barriers that rule out the existence of ultrafast distributed algorithms. This is true even for the most wellstudied problems in computer scienceincluding the shortest path, minimum spanning tree, minimum cut, and many other wellknown tasks.
In this talk, I will present a highlevel overview of a sequence of papers that give a nearcomplete answer to the above question. Its culmination is the following pieinthesky result called universal optimality: for all of the tasks mentioned, there exists a single distributed algorithm that, when run on any communication network G, is provably competitive with the fastest algorithm on G. The pursuit of universal optimality has led to the development of many new connections between distributed computing and other seemingly unrelated areas of theoretical computer science. Curiously, these connections have been mutuallybeneficial and have already led to many breakthroughs not only in distributed computing, but also in the theory of metric embedding, information theory, and oblivious packet routing. I will briefly explore these connections. Location: Virtual ( Zoom link ). Join us in A140 (T4) to watch it together. 
Arxiv 
19 April 2023 14:15 (Helsinki time) Location: A140 (T4) 
Rustam Latypov
: Optimal Deterministic Massively Parallel Connectivity on Forests 
We show fast deterministic algorithms for fundamental problems on forests in the challenging lowspace regime of the wellknown Massive Parallel Computation (MPC) model. A recent breakthrough result by Coy and Czumaj [STOC'22] shows that, in this setting, it is possible to deterministically identify connected components on graphs in O(log D + log log n) rounds, where D is the diameter of the graph and n the number of nodes. The authors left open a major question: is it possible to get rid of the additive log log n factor and deterministically identify connected components in a runtime that is completely independent of n?
We answer the above question in the affirmative in the case of forests. We give an algorithm that identifies connected components in O(log D) deterministic rounds. The total memory required is O(n + m) words, where m is the number of edges in the input graph, which is optimal as it is only enough to store the input graph. We complement our upper bound results by showing that Ω(log D) time is necessary even for componentunstable algorithms, conditioned on the widely believed 1 vs. 2 cycles conjecture. Our techniques also yield a deterministic forestrooting algorithm with the same runtime and memory bounds. Location: A140 (T4) 

12 April 2023 14:15 (Helsinki time) Location: A140 (T4) 
Parinya Chalermsook
: Algorithms, Extremal Combinatorics, and Rectangles 
In this talk, I will give an overview of the interplay between extremal combinatorics and algorithms in the context of computing maximum independent set in a graph. At some point, we will shift the attention to specific things like rectangle graphs.
Location: A140 (T4) 

5 April 2023 14:15 (Helsinki time) Online 
Ming Ding: A Hardness Result for 1Laplacians and Fast 1Laplacian Solvers 
1Laplacians or higherdimensional Laplacians generalize graph Laplacians to higherdimensional simplicial complexes and are crucial in computational topology and topological data analysis. It is known that nearlylinear time solvers exist for graph Laplacians. However, nearlylinear time solvers for 1Laplacians are only known for restricted classes of complexes.
In this talk, I will present 1Laplacians in two aspects. In the aspect of the lower bound, a hardness result for 1Laplacians shows that linear equations in 1Laplacians are as hard to solve as general linear equations. More precisely, for any constant c ≥ 1, if we can solve linear equations in 1Laplacians up to high accuracy in time O˜((# of nonzero coefficients)^c), then we can solve general linear equations with polynomially bounded integer coefficients and condition numbers up to high accuracy in time O˜((# of nonzero coefficients)^c). In the aspect of the upper bound, we generalize existing collapsingbased 1Laplacian solvers to less restricted classes of complexes. Specifically, we can approximately solve 1Laplacian systems of a wellshaped simplicial complex with $n$ simplexes up to high precision in time $\tilde{O}(n^{3/2})$. Our solvers are inspired by the Incomplete Nested Dissection designed by Kyng et al. [STOC’2018] for stiffness matrices of wellshaped trusses. Based on joint work with Peng Zhang, Rasmus Kyng, Maximilian Probst Gutenberg. Location: Virtual (Zoom). Join us at A140 (T4) to watch together 
Arxiv 
29 March 2023 14:15 (Helsinki time) Location: A140 (T4) 
Mélanie Cambus
: A Parallel Algorithm for (3 + ε)Approximate Correlation Clustering 
Grouping together similar elements in datasets is a common task in data mining and machine learning. In this talk, we present parallel algorithms for correlation clustering, where each pair of items is labeled either similar or dissimilar. The task is to partition the elements and the objective is to minimize disagreements, that is, the number of dissimilar elements grouped together and similar elements grouped separately.
Our main contribution is a parallel algorithm that achieves a (3 + ε)approximation to the minimum number of disagreements. Our algorithm builds on the analysis of the PIVOT algorithm by Ailon, Charikar, and Newman that obtains a 3approximation in the centralized setting. Our design allows us to sparsify the input graph by ignoring a large portion of the nodes and edges without a large extra cost as compared to the analysis of PIVOT. This sparsification makes our technique applicable on several models of massive graph processing, such as Massively Parallel Computing (MPC) and graph streaming, where sparse graphs can typically be handled much more efficiently.
We focus on the linear memory MPC model, where our approach yields an O(1) time algorithm where the runtime is independent of ε, which only appears in the memory demand.
Location: A140 (T4) Zoom 
Arxiv 
22 March 2023 14:15 (Helsinki time) Location: A140 (T4) 
Russell W. F. Lai
: Efficient Laconic Cryptography from Learning With Errors 
Laconic cryptography is an emerging paradigm that enables cryptographic
primitives with sublinear communication complexity in just two messages.
In particular, a twomessage protocol between Alice and Bob is called
laconic if its communication and computation complexity are essentially
independent of the size of Alice's input. This can be thought of as a
dual notion of fullyhomomorphic encryption, as it enables
``Boboptimized'' protocols. This paradigm has led to tremendous
progress in recent years. However, all existing constructions of laconic
primitives are considered only of theoretical interest: They all rely on
nonblackbox cryptographic techniques, which are highly impractical.
This work shows that nonblackbox techniques are not necessary for
basic laconic cryptography primitives. We propose a completely algebraic
construction of laconic encryption, a notion that we introduce in this
work, which serves as the cornerstone of our framework. We prove that
the scheme is secure under the standard Learning With Errors assumption
(with polynomial modulustonoise ratio). We provide proofofconcept
implementations for the first time for laconic primitives, demonstrating
the construction is indeed practical: For a database size of 2^50,
encryption and decryption are in the order of single digit milliseconds.
Laconic encryption can be used as a black box to construct other laconic
primitives. Specifically, we show how to construct:
 Laconic oblivious transfer
 Registrationbased encryption scheme
 Laconic privateset intersection protocol
All of the above have essentially optimal parameters and similar
practical efficiency.
Furthermore, our laconic encryption can be preprocessed such that the
online encryption step is entirely combinatorial and therefore much more
efficient.
Using similar techniques, we also obtain identitybased encryption with
an unbounded identity space and tight security proof (in the standard
model).
Location: A140 (T4) 

15 March 2023 14:15 (Helsinki time) Location: A140 (T4) 
Augusto Modanese
: Embedding arbitrary Boolean circuits into fungal automata 
Fungal automata are a variation of the twodimensional sandpile automaton of
Bak, Tang and Wiesenfeld (Phys.~Rev.~Lett., 1987).
In each step toppling cells emit grains only to \emph{some} of their
neighbors chosen according to a specific update sequence.
We show how to embed any Boolean circuit into the initial configuration of a
fungal automaton with update sequence $HV$.
In particular we give a constructor that, given the description $B$ of a
circuit, computes the states of all cells in the finite support of the
embedding configuration in $O(\log B)$ space.
As a consequence the prediction problem for fungal automata with
update sequence $HV$ is $P$complete.
This solves an open problem of Goles et al.~(Phys.~Lett.~A, 2020).
This is joint work with Thomas Worsch. Location: A140 (T4) Zoom link 
Arxiv 
8 March 2023 14:15 (Helsinki time) Location: A140 (T4) 
Shreyas Pai
: Message Complexity of Distributed Algorithms 
In this talk we will look at the communication cost (or message complexity) of fundamental problems in the distributed CONGEST model. We will address the following question in this talk: can we solve problems using sublinear, i.e., $o(m)$ communication, and if so under what conditions?
In a classical result, Awerbuch, Goldreich, Peleg, and Vainish [JACM 1990] showed that fundamental global problems such as broadcast and spanning tree construction require at least $\Omega(m)$ messages in the KT1 CONGEST model (i.e., CONGEST model in which nodes have initial knowledge of the neighbors' IDs) when algorithms are restricted to be comparisonbased (i.e., algorithms in which node IDs can only be compared). Thirty five years after this result, King, Kutten, and Thorup [PODC 2015] showed that one can solve the above problems using $\tilde{O}(n)$ messages ($n$ is the number of nodes in the graph) in $\tilde{O}(n)$ rounds in the KT1 CONGEST model if noncomparisonbased algorithms are permitted. An important implication of this result is that one can use the synchronous nature of the KT1 CONGEST model, using silence to convey information, and solve any graph problem using noncomparisonbased algorithms with $\tilde{O}(n)$ messages, but this takes an exponential number of rounds. In contrast, much less is known about the message complexity of local symmetry breaking problems such as coloring and MIS. We will look at the following results in this talk: Lower bound: In the KT1 CONGEST model, any comparisonbased algorithm, even a randomized MonteCarlo algorithm with constant success probability, requires $\Omega(n^2)$ messages in the worst case to solve either $(\Delta+1)$coloring, regardless of the number of rounds. Upper bound: In the KT1 CONGEST model, we present the following randomized noncomparisonbased $(\Delta+1)$coloring algorithm that uses $\tilde{O}(n^{1.5})$ messages, while running in $\tilde{O}(D+\sqrt{n})$ rounds, where $D$ is the graph diameter. If time permits, we can also look at some more recent work on message complexity of optimization problems. Based on joint work with Fabien Douflon, Gopal Pandurangan, Sriram V. Pemmaraju, and Peter Robinson. Location: A140 (T4) 

1st of March 2023 14:15 (Helsinki time) Location: A140 (T4) 
Andreas Grigorjew
: Width Helps and Hinders Splitting Flows 
Minimum flow decomposition (MFD) is the NPhard problem of finding a smallest decomposition of a network flow $X$ on directed graph $G$ into weighted sourcetosink paths whose superposition equals $X$. We focus on a common formulation of the problem where the path weights must be nonnegative integers and also on a new variant where these weights can be negative.
We show that, for acyclic graphs, considering the \emph{width} of the graph (the minimum number of $s$$t$ paths needed to cover all of its edges) yields advances in our understanding of its approximability.
For the nonnegative version, we show that a popular heuristic is a $O( \log X)$approximation ($X$ being the total flow of $X$) on graphs satisfying two properties related to the width (satisfied by e.g., seriesparallel graphs),
and strengthen its worstcase approximation ratio from $\Omega(\sqrt{m})$ to $\Omega(m / \log m)$ for sparse graphs, where $m$ is the number of edges in the graph.
For the negative version, we give a $(\lceil \log \Vert X \Vert \rceil +1)$approximation ($\Vert X \Vert$
being the maximum absolute value of $X$ on any edge) using a poweroftwo approach, combined with parity fixing arguments and a decomposition of unitary flows ($\Vert X \Vert \leq 1$) into
at most width paths.
We also disprove a conjecture about the linear independence of minimum (nonnegative) flow decompositions posed by Kloster et al.
[ALENEX 2018], but show that its useful implication (polynomialtime assignments of weights to a given
set of paths to decompose a flow) holds for the negative version.
Joint work with Manuel Cáceres, Massimo Cairo, Shahbaz Khan, Brendan Mumey, Romeo Rizzi, Alexandru I. Tomescu, Lucia Williams Location: A140 (T4) Zoom link 
Arxiv 
22nd of February 2023 14:15 (Helsinki time) Location: A133 (T5) 
Schiewe Philine: Algorithms and Hardness for NonPoolBased Line Planning 
Line planning, i.e., choosing paths which are operated by one vehicle endtoend, is an important aspect of public transport planning and can be considered as a discrete optimization problem. The goal is to determine a multiset of paths such that each edge of a given graph is covered according to predefined bounds and the costs are minimzed. While there exist heuristic procedures for generating lines from scratch, most theoretical observations consider the problem of choosing lines from a predefined line pool, i.e., restricting the solution space by defining a superset of paths to choose from. In this talk, we consider the complexity of the line planning problem when all simple paths can be used as lines. Depending on the cost structure, we show that the problem can be NPhard even for paths and stars, and that no polynomial time approximation of sublinear performance is possible. Additionally, we identify polynomially solvable cases and present a pseudopolynomial solution approach for trees.
Joint work with Irene Heinrich (TU Darmstadt) and Constantin Seebach (RPTU Kaiserslautern Landau). Location: A133 (T5) (Note: a different room from the usual room) 
Paper 
15th of February 2023 14:15 (Helsinki time) Online 
Karol Węgrzycki: Parameterized Approximation for Maximum Weight Independent Set of Rectangles and Segments 
In the Maximum Weight Independent Set of Rectangles problem (MWISR) we are given a weighted set of $n$ axisparallel rectangles in the plane. The task is to find a subset of pairwise nonoverlapping rectangles with the maximum possible total weight. This problem is NPhard and the bestknown polynomialtime approximation algorithm, due to by Chalermsook and Walczak (SODA 2021), achieves approximation factor $\mathcal{O}(\log\log(n))$. While in the unweighted setting, constant factor approximation algorithms are known, due to Mitchell (FOCS 2021) and to Gálvez et al. (SODA 2022), it remains open to extend these techniques to the weighted setting.
In this paper, we consider MWISR through the lens of parameterized approximation. Grandoni et~al. (ESA 2019) gave $(1\eps)$approximation algorithm with running time $k^{\mathcal{O}(k/\eps^8)} n^{\mathcal{O}(1/\eps^8)}$ time, where $k$ is the number of rectangles in optimum solution. Unfortunately, their algorithm only works in the unweighted setting and they left it as an open problem to give a parameterized approximation scheme in the weighted setting. Our contribution is a partial answer to the open question of Grandoni et al. (ESA 2019). We give a parameterized approximation algorithm for MWISR that given a parameter $k$, finds a set of nonoverlapping rectangles of weight at least $(1\eps) \omega(\mathrm{opt}_k)$ in $2^{\mathcal{O}(k \log(k/\eps))} n^{\mathcal{O}(1/\eps)}$ time, where $\omega(\mathrm{opt}_k)$ is the maximum weight of solution of cardinality at most $k$. Note that thus, our algorithm may return a solution consisting of more than $k$ rectangles. To complement this apparent weakness, we also propose a parameterized approximation scheme that outputs a solution with cardinality at most $k$ and total weight at least $(1\eps)\omega(\mathrm{opt}_k)$ for the special case of axisparallel segments. Joint work with Jana Cslovjecsek and Michał Pilipczuk Location: Virtual (Zoom). Join us in A140 (T4) to watch it together. Zoom link 
Arxiv 
8th of February 2023 14:15 (Helsinki time) Location: A140 (T4) 
Nidia Obscura Acosta: Improved PatternAvoidance Bounds for Greedy BSTs via Matrix Decomposition 
Greedy BST (or simply Greedy) is an online selfadjusting binary search tree defined in the geometric view ([Lucas, 1988; Munro, 2000; Demaine, Harmon, Iacono, Kane, Patrascu, SODA 2009). Along with Splay trees (Sleator, Tarjan 1985), Greedy is considered the most promising candidate for being dynamically optimal, i.e., starting with any initial tree, their access costs on any sequence is conjectured to be within $O(1)$ factor of the offline optimal. However, in the past four decades, the question has remained elusive even for highly restricted input.
In this paper, we prove new bounds on the cost of Greedy in the ''pattern avoidance'' regime. Our new results include: The (preorder) traversal conjecture for Greedy holds up to a factor of $O(2^{\alpha(n)})$, improving upon the bound of $2^{\alpha(n)^{O(1)}}$ in (Chalermsook et al., FOCS 2015). This is the best known bound obtained by any online BSTs. We settle the postorder traversal conjecture for Greedy. The deque conjecture for Greedy holds up to a factor of $O(\alpha(n))$, improving upon the bound $O(2^{\alpha(n)})$ in (Chalermsook, et al., WADS 2015). The split conjecture holds for Greedy up to a factor of $O(2^{\alpha(n)})$. Key to all these results is to partition (based on the input structures) the execution log of Greedy into several simplertoanalyze subsets for which classical forbidden submatrix bounds can be leveraged. This is joint work with Parinya Chalermsook, Manoj Gupta, Wanchote Jiamjitrak, Akash Pareek, and Sorrachai Yingchareonthawornchai. Location: A140 (T4) 
Arxiv 
1st of February 2023 14:15 (Helsinki time) Location: A140 (T4) 
Oumarou Oumarou: Accelerating Quantum Computations of Chemistry Through Regularized Compressed Double Factorization 
We propose the regularized compressed double factorization (RCDF) method to classically compute compressed representations of molecular Hamiltonians that enable efficient simulation with noisy intermediate scale (NISQ) and error corrected quantum algorithms. We find that already for small systems with 12 to 20 qubits, the resulting NISQ measurement scheme reduces the number of measurement bases by roughly a factor of three and the shot count to reach chemical accuracy by a factor of three to six compared to truncated double factorization (DF) and we see order of magnitude improvements over Pauli grouping schemes. We demonstrate the scalability of our approach by performing RCDF on the Cpd I species of cytochrome P450 with 58 orbitals and find that using the resulting compressed Hamiltonian cuts the run time of qubitization and truncated DF based error corrected algorithms almost in half and even outperforms the lambda parameters achievable with tensor hypercontraction (THC) while at the same time reducing the CCSD(T) energy error heuristic by an order of magnitude.
Joint work with Maximilian Scheurer, Robert M. Parrish, Edward G. Hohenstein and Christian Gogolin. Location: A140 (T4) 
Arxiv 
18th of January 2023 14:15 (Helsinki time) Location: A140 (T4) 
Manuel Cáceres: Minimum Path Cover in Parameterized Linear Time 
A minimum path cover (MPC) of a directed acyclic graph (DAG) $G = (V,E)$ is a minimumsize set of paths that together cover all the vertices of the DAG. Computing an MPC is a basic polynomial problem, dating back to Dilworth's and Fulkerson's results in the 1950s. Since the size $k$ of an MPC (also known as the \emph{width}) can be small in practical applications, research has also studied algorithms whose running time is parameterized on $k$.
We obtain a new MPC parameterized algorithm for DAGs running in time $O(k^2V + E)$. Our algorithm is the first solving the problem in parameterized linear time. Additionally, we obtain an edge sparsification algorithm preserving the width of a DAG but reducing $E$ to less than $2V$. This algorithm runs in time $O(k^2V)$ and requires an MPC of a DAG as input, thus its total running time is the same as the running time of our MPC algorithm. Location: A140 (T4) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Arxiv 
25th of January 2023 
Break  SODA 2023  
11th of January 2023 14:15 (Helsinki time) 
Michael Klooß: Short relaxed range proofs 
We give a brief overview of the relaxed range proofs by Couteau et al.
[CKLR21](https://eprint.iacr.org/2021/540) and
[CGKR22](https://eprint.iacr.org/2022/1153), which are based on square
decomposition. Our focus is on the (batch) proof of shortness and its
relaxed soundness notion ("short rationals") in the latter. The abstract
of [CGKR22] is cited below.
We provide optimized range proofs, called Sharp, in discrete logarithm and hidden order groups, based on square decomposition. In the former setting, we build on the paradigm of Couteau et al. (Eurocrypt ’21) and optimize their range proof (from now on, CKLR) in several ways: (1) We introduce batching via vector commitments and an adapted Σprotocol. (2) We introduce a new group switching strategy to reduce communication. (3) As repetitions are necessary to instantiate CKLR in standard groups, we provide a novel batch shortness test that allows for cheaper repetitions. The analysis of our test is nontrivial and forms a core technical contribution of our work. For example, for λ = 128 bit security and B = 64 bit ranges for N = 1 (resp. N = 8) proof(s), we reduce the proof size by 34% (resp. 75%) in arbitrary groups, and by 66% (resp. 88%) in groups of order 256bit, compared to CKLR. As Sharp and CKLR proofs satisfy a “relaxed” notion of security, we show how to enhance their security with one additional hidden order group element. In RSA groups, this reduces the size of state of the art range proofs (Couteau et al., Eurocrypt ’17) by 77% (λ = 128, B = 64, N = 1). Finally, we implement our most optimized range proof. Compared to the state of the art Bulletproofs (Bünz et al., S&P 2018), our benchmarks show a very significant runtime improvement. Eventually, we sketch some applications of our new range proofs. Location: A140 (T4) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 
14th of December 14:15 (Helsinki time) 
Tuukka Korhonen: An Improved Parameterized Algorithm for Treewidth 
Treewidth is a graph parameter that, informally, characterizes how treelike a graph is. Treewidth plays an important role in many areas of computer science and graph theory, in particular generalizing results on trees to graphs of small treewidth.
We give a $2^{O(k^2)} n^{O(1)}$ time algorithm for determining if the treewidth of a given $n$vertex graph is at most $k$ and outputting the corresponding tree decomposition. This resolves the longstanding open problem of whether there is a $2^{o(k^3)} n^{O(1)}$ time algorithm for treewidth. In particular, this is the first improvement on the dependency on $k$ in fixedparameter algorithms for treewidth since the $2^{O(k^3)} n^{O(1)}$ time algorithm given in 1991 by Bodlaender and Kloks, and independently, by Lagergren and Arnborg. We also give a $k^{O(k/\varepsilon)} n^{O(1)}$ time ($1+\varepsilon$)approximation algorithm for treewidth. Prior to our work, no approximation algorithms with approximation ratio less than 2 other than the exact algorithms were known.
This is joint work with Daniel Lokshtanov. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
ArXiv 
7th of December 14:15 (Helsinki time) 
Vikas Garg: Provably powerful temporal graph networks 
Temporal graph networks (TGNs) have gained prominence as models for embedding dynamic interactions, but little is known about their theoretical underpinnings. I’ll give an overview of our recent work on the representational power and limits of the two main categories of TGNs: those that aggregate temporal walks (WATGNs), and those that augment local message passing with recurrent memory modules (MPTGNs). Specifically, novel constructions reveal the inadequacy of MPTGNs and WATGNs, proving that neither category subsumes the other. The most powerful MPTGNs must use injective memory modules and message passing updates, in which case they become as powerful as a natural temporal extension of 1WL. Interestingly, it turns out that sufficiently deep MPTGNs cannot benefit from memory. Our investigations lead to PINT, which provably more expressive than both MPTGNs and WATGNs.
Based on joint work with Amauri Souza, Diego Mesquita, and Samuel Kaski. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 
30th of November 14:15 (Helsinki time) 
Madhav Krishnan Vijayan: Compilation of algorithmspecific graph states for quantum circuits 
We present a quantum circuit compiler that prepares an algorithmspecific graph state from quantum circuits described in high level languages, such as Cirq and Q#. The computation can then be implemented using a series of nonPauli measurements on this graph state. By compiling the graph state directly instead of starting with a standard lattice cluster state and preparing it over the course of the computation, we are able to better understand the resource costs involved and eliminate wasteful Pauli measurements on the actual quantum device. Access to this algorithmspecific graph state also allows for optimisation over locally equivalent graph states to implement the same quantum circuit. The compiler presented here finds ready application in measurement based quantum computing, NISQ devices and logical level compilation for fault tolereant implementations.
Location: Virtual (Zoom). Join us in A133 (T5) to view it together. Zoom link 
ArXiv 
23rd of November 14:15 (Helsinki time) 
Hung Le: Low Treewidth Embeddings of Planar Graphs 
Traditional metric embedding focuses on finding an embedding with small multiplicative distortion. However, the search for this kind of embedding for planar graphs has not been very fruitful. Indeed, most known results for multiplicative embeddings of planar graphs are negative. In this talk, I will describe an embedding with additive distortion into low treewidth graphs, a new type of embedding for planar graphs. I will also discuss several algorithmic applications of this embedding and conclude the talk with several open problems.
Location: Virtual (Zoom). Join us in A133 (T5) to view it together. Zoom link 
ArXiv 
16th of November 14:15 (Helsinki time) 
Akira Takahashi: Tworound Multiparty Signing from Lattices 
Multiparty signatures comprise a class of protocols that allow a group of signers to jointly produce a single signature on the same message. In recent years, a number of such protocols following the FiatShamir paradigm have been proposed in the discretelog setting, e.g., MuSig2, DWMS, and FROST.
In this talk, I will first go over existing techniques realizing roundefficient FiatShamir multiparty signing. I will then discuss new approaches to constructing latticebased instantiations, by highlighting the main technical challenges as well as new proof techniques enabled by lattice trapdoors. Our protocols are provably secure in the (classical) random oracle model under the standard latticebased hardness assumptions, such as SIS and LWE, while retaining only two rounds of interaction during the signing protocol as in the stateoftheart Schnorrbased constructions. This talk is based on joint work with Cecilia Boschini, Ivan Damgård, Claudio Orlandi, and Mehdi Tibouchi. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 1, Paper 2 
9th of November 14:15 (Helsinki time) 
Tillmann Miltzow: Training Neural Networks is $\exists\mathbb{R}$complete 
Given a neural network, training data, and a threshold, it was known that it is NPhard to find weights for the neural network such that the total error is below the threshold. We determine the algorithmic complexity of this fundamental problem precisely, by showing that it is $\exists\mathbb{R}$complete. This means that the problem is equivalent, up to polynomialtime reductions, to deciding whether a system of polynomial equations and inequalities with integer coefficients and real unknowns has a solution. If, as widely expected, $\exists\mathbb{R}$ is strictly larger than NP, our work implies that the problem of training neural networks is not even in NP.
Neural networks are usually trained using some variation of backpropagation. The result of this paper offers an explanation of why techniques commonly used to solve big instances of NPcomplete problems seem not to be of use for this task. Examples of such techniques are SAT solvers, IP solvers, local search, and dynamic programming, to name a few general ones.
Location: Virtual (Zoom). Join us in A133 (T5) to view it together. Zoom link 
ArXiv 
2nd of November 14:15 (Helsinki time) 
Mikkel Abrahamsen: Online Sorting and Translational Packing of Convex Polygons 
We investigate various online packing problems in which convex polygons arrive one by one and have to be placed irrevocably into a container before the next piece is revealed; the pieces must not be rotated, but only translated. The aim is to minimize the used space depending on the specific problem at hand, e.g., the strip length in strip packing, the number of bins in bin packing, etc. We draw interesting connections to the following online sorting problem OnlineSorting$[\gamma,n]$: We receive a stream of real numbers $s_1,…,s_n,\; s_i \in [0,1]$, one by one. Each real must be placed in an array $A$ with $\gamma n$ initially empty cells without knowing the subsequent reals. The goal is to minimize the sum of differences of consecutive reals in $A$. The offline optimum is to place the reals in sorted order so the cost is at most 1. We show that for any $\Delta$competitive online algorithm of OnlineSorting$[\gamma,n]$, it holds that $\gamma\Delta \in \Omega(\log n/\log\log n)$. We use this lower bound to prove the nonexistence of competitive algorithms for various online translational packing problems of convex polygons, among them strip packing, bin packing and perimeter packing. This also implies that there exists no online algorithm that can pack all streams of pieces of diameter and total area at most $\delta$ into the unit square. These results are in contrast to the case when the pieces are restricted to rectangles, for which competitive algorithms are known. Likewise, the offline versions of packing convex polygons have constant factor approximation algorithms. On the positive side, we present an algorithm with competitive ratio $O(n^{0.59})$ for online translational strip packing of convex polygons. In the case of OnlineSorting$[C,n]$ for any constant $C>1$, we present an $2^{O(\sqrt{\log n \log\log n})})$competitive algorithm. Location: Virtual (Zoom). Join us in A133 (T5) to view it together. Zoom link 
ArXiv 
26th of October 14:15 (Helsinki time) 
Kirthivaasan Puniamurthy: Pebbling for proving adaptive security: Yao's garbling scheme 
Secure multiparty computation (MPC) allows several parties to compute a function $f$ on their secret data $x_1,...,x_n$ without any party learning anything except for the output $y = f(x_1,...,x_n)$. Yao's garbling scheme is one of the key techniques in MPC. Informally, garbling enables one to transform a circuit/input pair $(C, x)$ into a "garbled" circuit/input pair $\tilde{C}, \tilde{x}$ while preserving the output, i.e. $C(x) = \tilde{C}(\tilde{x})$.
Roughly speaking, a garbling scheme is secure if there exists an efficient simulator which is only given $y = C(x)$ (and the topology of $C$) and can generate $\tilde{C}, \tilde{x}$ that are indistinguishable from the real garbled pair $\tilde{C}, \tilde{x}$. We refer to this notion of security as selective simulation security. It is selective because $(C, x)$ are garbled simultaneously.
One may instead consider an adaptive setting, where an adversary first obtains the garbled circuit, and only then selects an input to be garbled. Since the input may now depend on the garbled circuit, a proof for selective simulation does not carry over to the adaptive setting. To fix this, we require new proof techniques (and/or new constructions) for proving adaptive security. In this talk we look at a proof technique that involves guessing, which can then be formulated within the language of so called pebbling, a combinatorial game played on graphs.
Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 

19th of October 14:15 (Helsinki time) 
Pekka Orponen: Algorithmic Design of 3D Wireframe RNA Polyhedra 
We address the problem of de novo design and synthesis of nucleic acid nanostructures, a challenge that has been considered in the area of DNA nanotechnology since the 1980s and more recently in the area of RNA nanotechnology. Toward this goal, we introduce a general algorithmic design process and software pipeline for rendering 3D wireframe polyhedral nanostructures in singlestranded RNA. To initiate the pipeline, the user creates a model of the desired polyhedron using standard 3D graphic design software. As its output, the pipeline produces an RNA nucleotide sequence whose corresponding RNA primary structure can be transcribed from a DNA template and folded in the laboratory. As case examples, we have designed and characterised experimentally three 3D RNA nanostructures: a tetrahedron, a triangular bipyramid, and a triangular prism.
Joint work with Antti Elonen, Ashwin Natarajan, Ibuki Kawamata, Lukas Oesinghaus, Abdulmelik Mohammed, Jani Seitsonen, Yuki Suzuki, Friedrich Simmel and Anton Kuzyk. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 
12th of October 14:15 (Helsinki time) 
Valerio Cini: LatticeBased SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable 
In this talk, we present the first publicly verifiable latticebased
succinct noninteractive argument of knowledge (SNARK). The construction
stems from a general technical toolkit that we develop to translate
pairingbased schemes to latticebased ones, and that allows us to
construct the primitive which is at the heart of our SNARK construction:
a new latticebased vector commitment (VC) scheme supporting openings to
constantdegree multivariate polynomial maps. The security is based on a
new family of latticebased computational assumptions, that we call
$k$RingInhomogenous Short Integer Solution (or $k$RISIS for short),
which naturally generalizes the standard Short Integer Solution (SIS)
assumption.
Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 
5th of October 14:15 (Helsinki time) 
Sorrachai Yingchareonthawornchai: Deterministic Small Vertex Connectivity in Almost Linear Time 
In the vertex connectivity problem, given an undirected nvertex
medge graph, we need to compute the minimum number of vertices
that can disconnect the graph after removing them. This problem is one
of the most wellstudied graph problems. From 2019, a new line of
work [Nanongkai et al. STOC'19;SODA'20;STOC'21] has used
randomized techniques to break the quadratictime barrier and, very
recently, culminated in an almostlinear time algorithm via the recently
announced maxflow algorithm by Chen et al. In contrast, all known deterministic algorithms are much slower. The fastest algorithm [Gabow
FOCS'00] takes $O(m(n+\min\{c^{5/2},cn^{3/4}\}))$ time where $c$
is the vertex connectivity. It remains open whether there exists a subquadratictime deterministic algorithm for any constant
$c>3$. In this talk, we present the first deterministic almostlinear time vertex connectivity algorithm for all constants c. Our running time is $m^{1+o(1)}2^{O(c^{2})}$ time, which is almostlinear for all $c=o(\sqrt{\log n})$. This is the first deterministic algorithm that breaks the $O(n^{2})$time bound on sparse graphs where $m=O(n)$, which is known for more than 50 years ago [Kleitman'69]. Towards our result, we give a new reduction framework to vertex expanders which in turn exploits our new almostlinear time construction of mimicking network for vertex connectivity. The previous construction by Kratsch and Wahlström [FOCS'12] requires large polynomial time and is randomized. An interesting aspect that allows our overall algorithm to be efficient is to ``lift'' several graph problems to hypergraphs and work directly on hypergraphs. This is joint work with Thatchaphol Saranurak. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 

28th of September 14:15 (Helsinki time) 
Juha Harviainen: Trustworthy Monte Carlo 
Monte Carlo integration is a key technique for designing randomized approximation schemes for counting problems, with applications, e.g., in machine learning and statistical physics. The technique typically enables massively parallel computation, however, with the risk that some of the delegated computations contain spontaneous or adversarial errors. We present an orchestration of the computations such that the outcome is accompanied with a proof of correctness. Specifically, we adopt an algebraic proof system developed in computational complexity theory, in which the proof is represented by a polynomial; evaluating the polynomial at a random point amounts to a verification of the proof with probabilistic guarantees. We give examples of known Monte Carlo estimators that admit verifiable extensions with moderate computational overhead: for the permanent of zeroone matrices, for the model count of disjunctive normal form formulas, and for the gradient of logistic regression models. We also discuss the prospects and challenges of engineering efficient verifiable approximation schemes more generally.
Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 

21st of September 14:15 (Helsinki time) 
Francesco d'Amore: On the multidimensional random subset sum problem 
In the Random Subset Sum Problem, given $n$ i.i.d. random variables $X_1,\dots,X_n$, we wish to approximate any point $z\in [−1,1]$ as the sum of a suitable subset $X_{i_1}(z),\dots,X_{i_s}(z)$ of them, up to error $\varepsilon$. Despite its simple statement, this problem is of fundamental interest to both theoretical computer science and statistical mechanics. More recently, it gained renewed attention for its implications in the theory of Artificial Neural Networks. An obvious multidimensional generalisation of the problem is to consider $n$ i.i.d. $d$dimensional random vectors, with the objective of approximating every point $z\in [−1,1]^d$. Rather surprisingly, after Lueker's 1998 proof that, in the onedimensional setting, $n=O(\log 1/\varepsilon)$ samples guarantee the approximation property with high probability, little progress has been made on achieving the above generalisation. In this work, we prove that, in $d$ dimensions, $n=O(d^3 \log 1/\varepsilon \cdot (\log 1/\varepsilon+\log d))$ samples suffice for the approximation property to hold with high probability. Location: A133 (T5) You can also join via Zoom, but there are no guarantees regarding the audio/video quality. Zoom link 
Paper 
24th of August 14:15 (Helsinki time) 
Mikäel Rabie: Distributed Recoloring 
In Graph Theory, a recoloring problem is as follows: given two colorings of a graph, can we go from the first one to the second by changing the color of a node one after another, while keeping the coloring proper?
In 2018, we introduced the Distributed Recoloring question: what happens if we allow an independent set of nodes to be recolored at each step? Can we find a recoloring schedule in an efficient way in the Distributed LOCAL model? This question appears to be hard in the general settings. However, different results were found in some specific cases. In this presentation, I will show results from different papers on that topic: Recoloring on Trees, Interval Graphs and Chordal Graphs, with the use of some extra colors. I will also show how to produce a constant length schedule in bounded degree graphs with Delta+1 colors, without using any extra color, when the colorings follow some nice properties. This last result allows improving the recoloring schedule in the centralized settings (from quadratic to linear). Those works are the result of collaborations with Marthe Bonamy, Nicolas Bousquet, Laurent Feuilloley, March Heinrich, Paul Ouvrard, Jara Uitto and Jukka Suomela 
ArXiv 
10th of August 14:15 (Helsinki time) 
Tuukka Korhonen: FixedParameter Tractability of Maximum Colored Path and Beyond 
We introduce a general method for obtaining fixedparameter algorithms for problems about finding paths in undirected graphs, where the length of the path could be unbounded in the parameter. The first application of our method is as follows. We give a randomized algorithm, that given a colored $n$vertex undirected graph, vertices $s$ and $t$, and an integer $k$, finds an $(s,t)$path containing at least $k$ different colors in time $2^k n^{O(1)}$. This is the first FPT algorithm for this problem, and it generalizes the algorithm of Björklund, Husfeldt, and Taslaman [SODA 2012] on finding a path through $k$ specified vertices. It also implies the first $2^k n^{O(1)}$ time algorithm for finding an $(s,t)$path of length at least $k$. Our method yields FPT algorithms for even more general problems. For example, we consider the problem where the input consists of an $n$vertex undirected graph $G$, a matroid $M$ whose elements correspond to the vertices of $G$ and which is represented over a finite field of order $q$, a positive integer weight function on the vertices of $G$, two sets of vertices $S,T \subseteq V(G)$, and integers $p,k,w$, and the task is to find $p$ vertexdisjoint paths from $S$ to $T$ so that the union of the vertices of these paths contains an independent set of $M$ of cardinality $k$ and weight $w$, while minimizing the sum of the lengths of the paths. We give a $2^{p+O(k^2 \log (q+k))} n^{O(1)} w$ time randomized algorithm for this problem.  ArXiv 
15th of June 14:15 (Helsinki time) 
Yan Xia: Inferring Multilayer Diffusion Networks in Online Social Media 
Information on social media spreads through an underlying diffusion network that connects people of common interests and opinions. This diffusion network often comprises multiple layers, each capturing the spreading dynamics of a certain type of information characterized by, for example, topic, language, or attitude. Researchers have previously proposed method for inferring these underlying multilayer diffusion networks from observed spreading patterns, but little is known about how well it performs across the range of realistic spreading data. We introduce an implementation of the multilayer diffusion network inference method that outperforms previous implementations in accuracy, and conduct an extensive series of synthetic data experiments to systematically analyze the performance of the inference method, under varied network structure (e.g. density, number of layers) and information diffusion settings (e.g. cascade size, layer mixing) that are designed to mimic realworld spreading on social media. Our results show extreme performance variation of the inference method: notably, it fails to decompose the diffusion network correctly when most cascades in the data reach a limited audience, or when the groundtruth diffusion network is sparse. Based on the analysis of the current method, we pose challenges toward further understanding and improving multilayer diffusion network inference from both theoretical and applicational perspectives.  Paper 
1st of June 14:15 (Helsinki time) 
Sándor KisfaludiBak: Approximations for the Euclidean traveling salesman 
In the Euclidean traveling salesman problem (Euclidean TSP) we are given a set of n points in ddimensional Euclidean space, and the goal is to find the shortest round trip containing all of these points. In this talk we will get on overview of the algorithmic techniques for Euclidean TSP, starting with Arora's approximation scheme. We will then briefly discuss geometric (light) spanners that brought the first round of improvements to the problem, and in the end we will look at the newest approximation scheme that achieves an optimal tradeoff between running time and accuracy under reasonable complexitytheoretic assumptions.  ArXiv 
25th of May 14:15 (Helsinki time) 
Darya Melnyk: Online Algorithms with Lookaround 
In this talk, I will introduce a new model of computing model that was presented in “Online Algorithms with Lookaround”, called the onlineLOCAL. In this model, the adversary reveals the nodes of the input graph one by one, in the same way as in classical online algorithms, but for each new node the algorithm can also inspect its radiusT neighborhood before choosing the output. Instead of looking ahead in time, we have the power of looking around in space. This model gives a unifying view of locality in four settings: LOCAL model of distributed computing, its sequential counterpart SLOCAL, dynamic algorithms, and online algorithms. We show that for LCL problems in paths, cycles, and rooted trees, all four models are roughly equivalent: the locality of any LCL problem falls in the same broad class  $O(\log^* n)$, $\Theta(\log n)$, or $n^{\Theta(1)}$  in all four models. In particular, prior work on the LOCAL model directly generalizes to all four models. Second, we show that this equivalence does not hold in twodimensional grids. We show that the locality of the 3coloring problem is $O(\log n)$ in the onlineLOCAL model, while it is known to be $\Omega(\sqrt{n})$ in the LOCAL model. 
ArXiv 
11th of May 14:15 (Helsinki time) 
Andrei Voicu Tomut: Enhanced Quantum Autoencoders for Anomaly Detection 
We present an extensive study of Quantum Auto Encoders (QAE) from the theoretical and application perspectives. This is a novel approach to building a quantum autoencoder that makes use of quantum entanglement as a resource to add an extra source of correlation between the compression and decompression process. We develop various conceptually different ideas: we let the encoder and decoder share Bell pairs, we entangle encoder and decoder qubits directly and we test what happens if we allow for both the encoder and decoder training contrary to the standard approach. So far, we have encountered an architecture that would provide a statistically significant advantage. We investigate how QAE can be used in the task of anomaly detection for two datasets: breast cancer and credit card transactions. We train QAEs architectures solely on the nonanomalous data. Then, given an anomaly datapoint coming from a different than learnt distribution, QAE provides nonfaithful reconstruction, hence indicating an anomaly appearance. We judge the reconstruction quality using either the fidelity test (suitable for simulations) and SWAP test (suitable for both simulations and QPU hardware). We extend previous work on anomaly detection using QAEs by employing for this task for the first time the enhanced autoencoder and the patch autoencoder. Results show in some cases up to 91% accuracy in identifying breast cancer and 88% in fraudulent transaction identification. The present method won at Qhack2022 [2] in the following categories: Hybrid Algorithms Challenge, Amazon Braket Challenge (Best Open Hackathon experiment on Bracket Simulators), Quantum Finance Challenge (third place). [1] https://github.com/XanaduAI/QHack/issues/129 [2] https://medium.com/xanaduai/qhack2022cb5ad92573e2 

27th of April 14:15 (Helsinki time) 
Stepháne Deny: Addressing the Topological Defects of Disentanglement via Distributed Operators 
A core challenge in Machine Learning is to learn to disentangle natural factors of variation in data (e.g. object shape vs. pose). A popular approach to disentanglement consists in learning to map each of these factors to distinct subspaces of a model's latent representation. However, this approach has shown limited empirical success to date. Here, we show that, for a broad family of transformations acting on imagesencompassing simple affine transformations such as rotations and translationsthis approach to disentanglement introduces topological defects (i.e. discontinuities in the encoder). Motivated by classical results from group representation theory, we study an alternative, more flexible approach to disentanglement which relies on distributed latent operators, potentially acting on the entire latent space. We theoretically and empirically demonstrate the effectiveness of this approach to disentangle affine transformations. Our work lays a theoretical foundation for the recent success of a new generation of models using distributed operators for disentanglement. Joint work with Diane Bouchacourt and Mark Ibrahim.  
20th of April 14:15 (Helsinki time) 
Janne Korhonen: Distributed matrix multiplication  an overview 
In this review talk, we give an overview of distributed matrix multiplication algorithms in fully connected communication models, from 60's classics to more contemporary work on sparse matrix multiplication. We will then briefly touch on some remaining challenges in the field, and discuss our recent work on uniformly sparse matrix multiplication.  
6th of April 14:15 (Helsinki time) 
Mika Göös: Collapses, separations, and characterisations 
We discuss a range of results for total NP search problem classes (TFNP) that includes new collapses of classes, blackbox separations, and characterisations using propositional proof systems. We will focus on a surprising collapse result, EoPL = PLS ∩ PPAD, and see its full proof. Joint work with Alexandros Hollender, Siddhartha Jain, Gilbert Maystre, William Pires, Robert Robere, and Ran Tao.  
30th of March 14:15 (Helsinki time) 
Petteri Kaski: The Shortest Even Cycle Problem is Tractable 
Given a directed graph, we show how to efficiently find a shortest (directed, simple) cycle on an even number of vertices. As far as we know, no polynomialtime algorithm was previously known for this problem. In fact, finding any even cycle in a directed graph in polynomial time was open for more than two decades until Robertson, Seymour, and Thomas (Ann. of Math. (2) 1999) and, independently, McCuaig (Electron. J. Combin. 2004; announced jointly at STOC 1997) gave an efficiently testable structural characterisation of evencyclefree directed graphs. Methodologically, our algorithm relies on algebraic fingerprinting and randomized polynomial identity testing over a finite field, and uses a generating polynomial implicit in Vazirani and Yannakakis ( Discrete Appl. Math. 1989) that enumerates weighted cycle covers as a difference of a permanent and a determinant polynomial. The need to work with the permanent is where our main technical contribution occurs. We design a family of finite commutative rings of characteristic 4 that simultaneously (i) give a nondegenerate representation for the generating polynomial identity via the permanent and the determinant, (ii) support efficient permanent computations, and (iii) enable emulation of finitefield arithmetic in characteristic 2. Here our work is foreshadowed by that of Björklund and Husfeldt (SIAM J. Comput. 2019), who used a considerably less efficient ring design to obtain a polynomialtime algorithm for the shortest two disjoint paths problem. Building on work of Gilbert and Tarjan (Numer. Math. 1978) as well as Alon and Yuster (J. ACM 2013), we also show how ideas from the nested dissection technique for solving linear equation systems leads to faster algorithm designs when we have control on the separator structure of the input graph; for example, this happens when the input has bounded genus. Joint work with Andreas Björklund (Lund, Sweden) and Thore Husfeldt (Lund University and Basic Algorithms Research Copenhagen, ITU Copenhagen). 
ArXiv 
23rd of March 14:15 (Helsinki time) 
Fabricio Oliveira: Decision programming: multistage optimization under uncertainty 
Multistage decision problems under uncertainty can be represented as influence diagrams that are converted into decision trees. These trees can then be solved using dynamic programming, if the optimal strategy within a given branch do not depend on the decisions in other nonoverlapping branches. To address these shortfalls, we propose the Decision Programming approach, which can efficiently address this ‘no forgetting’ assumption and retain outcome distribution information. In this, we convert problems into equivalent mixedinteger linear programs that can be efficiently solved, including in the presence of multiple objectives, endogenous uncertainty, and other dependency conditions.  ArXiv Paper Code Repository 
16th of March 14:15 (Helsinki time) 
Silvio Lattanzi: Efficient Online and Parallel Correlation Clustering 
Correlation clustering is a central topic in unsupervised learning, with many applications in ML and data mining. In correlation clustering, one receives as input a signed graph and the goal is to partition it to minimize the number of disagreements. In this talk we analyze the correlation clustering problem in the online and the massively parallel computation (MPC) settings. In the online setting we show that the celebrated Pivot algorithm performs well when given access to a small number of random samples from the input. For the MPC setting, we propose a new algorithm that uses machines with memory sublinear in the number of nodes in the graph and returns a constant approximation while running only for a constant number of rounds. To the best of our knowledge, our algorithm is the first that can provably approximate a clustering problem on graphs using only a constant number of MPC rounds in the sublinear memory regime. We complement our analysis with an experimental analysis of our techniques.  ArXiv 
Two Talks 2nd of March 14:15 (Helsinki time) 
Evan E. Dobbs: Constructing Quantum Circuits by Tiling in 3D and LDPC Decoding for Quantum Error Correction using Stochastic Circuit Elements 
We take advantage of the regular layout common in quantum circuits to express them as 3D objects composed of tiles, where each tile is a 3D nearestneighbor implementation of the Toffoli gate. Using this scheme, we implement the quantum multiplier proposed by MunozCoreas and Thapliyal and demonstrate improvements in the number and depth of SWAP gates necessary for nearestneighbor implementations of this multiplier when compared with automatic routing methods. This scheme is applied prior to compilation and can be used as an intermediate step for both NISQ and error corrected circuits which use the surface code. We also discuss ongoing work on the implementation of a belief propagation decoder for LDPC codes with stochastic circuit elements, using the surface code as an example.


George Watkins: Lattice Surgery Quantum Error Correction Compiler 
We developed a state of the art, high performance compiler for surface code quantum error correction. Our compiler translates any quantum circuit to a faulttolerant one error corrected one that follows Lattice Surgery (LS) instructions. We offer our compiler publicly through a web interface, a web service, and as an open sourced Python package. In this talk, we will demonstrate the operation of our compiler and the web visualizer for the conversion of a sample quantum circuit. We will also discuss our results on compiling thousands of qubits, and on verifying the correctness of the compiler output. Generally, verifying the correctness is an intractable problem. An example of this will be showcased during our talk. With respect to future work, we will present our preliminary results on implementing massively parallel compilation of very large scale circuits.


23rd of February 14:15 (Helsinki time) 
Thaha Mohammed: Sparse Matrix Vector Multiplication (SpMVM) on Graphical processing units 
Sparse linear algebra is vital to many fields of science and engineering. The matrix sparsity structures vary widely based on the application domains and this poses major challenges in obtaining consistent high performance from sparse iterative solvers on GPUs. These challenges include coalesced memory access and load balancing. Due to the sparsity of the matrices there is no single storage/algorithmic technique that is suitable for all sparse matrix structures. In this talk we survey basic techniques and recent developments in SpMV computations on GPUs.  Paper 
2nd of February 14:15 (Helsinki time) 
Michal Dory: FaultTolerant Labeling and Compact Routing Schemes 
Assume that you have a huge graph, where edges and vertices may fail, and you want to answer questions about this graph quickly, without inspecting the whole graph. A faulttolerant labeling scheme allows us to do just that. It is a distributed data structure, in which each vertex and edge is assigned a short label, such that given the labels of a pair of vertices $s,t$, and a set of failures $F$, you can answer questions about $s$ and $t$ in $G \setminus F$. For example, determine if $s$ and $t$ are connected in $G \setminus F$, just by looking at their labels. I will discuss a recent work where we show the first faulttolerant connectivity labeling schemes for general graphs. I will also show applications for faulttolerant routing. Here the goal is to provide each vertex a small routing table, such that given these tables we can efficiently route messages in the network, even in the presence of failures. Based on a joint work with Merav Parter. 
ArXiv 
19th of January 14:15 (Helsinki time) 
Michael Kapralov: Streaming (Lower Bounds) 
Given a large dataset as a stream of updates, how can we approximate its properties using a very small memory footprint? And what are the limitations imposed by the memory constraints? In this talk we will survey basic techniques and recent developments in graph streaming, with a focus on lower bounds.  
1st of December Nonstandard time 17:15 (Helsinki time) 
Nathan Klein: A (Slightly) Improved Approximation Algorithm for Metric TSP 
I will describe work in which we obtain a randomized $3/2\epsilon$ approximation algorithm for metric TSP, for some $\epsilon>10^{36}$. This slightly improves over the classical 3/2 approximation algorithm due to Christofides [1976] and Serdyukov [1978]. Following the approach of Oveis Gharan, Saberi, and Singh [2010], we analyze an algorithm which is a small modification of ChristofidesSerdyukov: we obtain a TSP tour by adding a matching to a random spanning tree instead of one of minimum cost. The talk will focus on giving an overview of the key ideas involved to analyze the approximation factor of this algorithm, such as properties of random spanning trees and the structure of near minimum cuts. I will also discuss a recent extension in which we show a $3/2\epsilon$ bound on the integrality gap of the subtour elimination polytope. This is joint work with Anna Karlin and Shayan Oveis Gharan. 
ArXiv 
24th of November 14:15 (Helsinki time) 
Roie Levin: Random Order Set Cover is as Easy as Offline 
We give a polynomial time algorithm for Online Set Cover with a competitive ratio of $O(\log mn)$ when the elements are revealed in random order, essentially matching the best possible offline bound of $O(\log n)$ and circumventing the $O(\log m \log n)$ lower bound known in adversarial order. We also extend the result to solving pure covering IPs when constraints arrive in random order. The algorithm is a multiplicativeweightsbased roundandsolve approach we call LearnOrCover. We maintain a coarse fractional solution that is neither feasible nor monotone increasing, but can nevertheless be rounded online to achieve the claimed guarantee (in the random order model). This gives a new offline algorithm for Set Cover that performs a single pass through the elements, which may be of independent interest. This is joint work with Anupam Gupta and Gregory Kehne. 

17th of November 14:15 (Helsinki time) 
Kamyar Khodamoradi: Local Search for (Stable) $k$Means 
In the classic (discrete) $k$Median/Means problem, we are given a set of $n$ points in a metric alongside the parameter $k$, and our task is to choose $k$ of these points as centres such that the cost of connecting all the points to them is minimized. For $k$Median, the cost of connecting a point to a set of centres is just the distance of the point to the closest centre in the set, and for $k$Means, this cost is the square of the distance. In this talk, I will focus on a "promise'' variation of $k$Median/Means where, 1) the metric is a Euclidean plane of constant dimensions, and 2) the instances of the problem are guaranteed to satisfy some stability constraint. Stable optimization is a relatively young subfield of optimization and approximation theory (introduced by Bilu and Linial in 2010), and can be seen as a "beyond the worstcase'' type of analysis. In the context of $k$Means, an important notion of stability is that of perturbation resilience. An instance is called $\alpha$perturbation resilient if there is a promise of a unique optimum solution which remains optimum even if the distances are (potentially nonuniformly) stretched by a factor of at most $\alpha$. Stable clustering instances have been studied to explain why heuristics such as Lloyd’s algorithm perform well in practice. In this talk, I will show how $(1 + \varepsilon)$stable instances of $k$Means in boundeddimension Euclidean metrics can be solved in polynomial time, using a simple local search algorithm. To give some background about the work, I will first roughly sketch how local search was applied to the (not necessarily stable) Euclidean instances of the problem (Friggstad et al., FOCS 2016) to obtain a $(1 + \varepsilon)$approximation. 

10th of November 14:15 (Helsinki time) 
Oren Louidor: A Scaling limit for the Cover Time of the Binary Tree 
We consider a continuous time random walk on the rooted binary tree of depth $n$ with all transition rates equal to one and study its cover time, namely the time until all vertices of the tree have been visited. We prove that, normalized by $2^{n+1} n$ and then centered by $(\log 2) n  \log n$, the cover time admits a weak limit as the depth of the tree tends to infinity. The limiting distribution is identified as that of a Gumbel random variable with rate one, shifted randomly by the logarithm of the sum of the limits of the derivative martingales associated with two negatively correlated discrete Gaussian free fields on the infinite version of the tree. The existence of the limit and its overall form were conjectured in the literature. Our approach is quite different from those taken in earlier works on this subject and relies in great part on a comparison with the extremal landscape of the discrete Gaussian free field on the tree. Joint work with Aser Cortines and Santiago Saglietti. 
ArXiv 
27th of October 14:15 (Helsinki time) 
Rustam Latypov: Memory Efficient Massively Parallel Algorithms for LCL Problems on Trees 
We pioneer the lowspace Massively Parallel Computation (MPC) complexity landscape for a family of fundamental graph problems on trees. We give a general method that solves most locally checkable labeling (LCL) problems exponentially faster in the lowspace MPC model than in the LOCAL message passing model. In particular, we show that all solvable LCL problems on trees can be solved in $O(\log n)$ time (highcomplexity regime) and that all LCL problems on trees with deterministic complexity $n^{o(1)}$ in the LOCAL model can be solved in $O(\log \log n)$ time (midcomplexity regime). We emphasize that we solve LCL problems on constant degree trees, our algorithms are deterministic, and they work in the lowspace MPC model, where local memory is $O(n^\delta)$ for $\delta \in (0,1)$ and global memory is $O(m)$. For the highcomplexity regime, their are two key ingredients. One is a novel $O(\log n)$ time tree rooting algorithm, which may be of independent interest. The other ingredient is a novel pointerchain technique and analysis that allows us to solve any solvable LCL problem on trees in $O(\log n)$ time. For the midcomplexity regime, we adapt the approach by Chang and Pettie [FOCS'17], who gave a canonical LOCAL algorithm for solving LCL problems on trees. For the special case of 3coloring trees, which is a natural LCL problem with LOCAL time complexity $n^{o(1)}$, we show that our analysis is tight, as it matches the conditional $\Omega(\log \log n)$ lower bound for componentstable algorithms. 

13th of October 14:15 (Helsinki time) 
Sándor KisfaludiBak: The traveling salesman and the Steiner tree with flat neighborhoods 
In the classic Euclidean traveling salesman problem, we are given n points in the Euclidean plane, and the goal is to find the shortest round trip that visits all the points. The Steiner tree asks for the shortest tree that can connect these points. An interesting variant of these problems is when instead of visiting points, we are asked to visit n "neighborhoods". A neighborhood could be any sort of geometric object; the goal is then to visit at least one point in each object. For example, we could be given a set of affine subspaces (often called flats) in $d$dimensional Euclidean space, and the goal is to find the shortest round trip or tree that intersects each subspace. We will see how the 2dimensional problems with line neighborhoods can be tackled, and see how the optimum tour for hyperplane neighborhoods ($(d1)$dimensional flats) can be efficiently approximated in higher dimensions. It turns out that these neighborhood problems have a different computational complexity than the classic problems with points: they require a novel approach for the hyperplane case, while the case of lowerdimensional flats remain largely mysterious.  
6th of October Nonstandard time 17:15 (Helsinki time) 
Yakov Nekrich: Dynamic Point Location in Optimal Time. 
In the dynamic point location problem we maintain a planar subdivision under insertions and deletions of segments so that for any query point $q$ the polygon containing $q$ can be found efficiently. In the dynamic vertical ray shooting problem we maintain a set of nonintersecting segments on a plane, so that for an arbitrary query point $q$ the highest segment immediately below $q$ can be found efficiently, where the segment immediately below $q$ is the first segment hit by a downward vertical ray from $q$. Vertical ray shooting and point location are closely connected problems: a data structure for vertical ray shooting can be transformed into a data structure for planar point location. In this talk we present a fullydynamic data structure that supports point location queries in a connected planar subdivision with $n$ edges. Our data structure uses $O(n)$ space, answers queries in $O(\log n)$ time, and supports updates in $O(\log n)$ time. Our solution is based on a data structure for vertical ray shooting queries that supports queries and updates in $O(\log n)$ time.  Paper 
29th of September 14:15 (Helsinki time) 
Noam Touitou: Flow Time Scheduling with Uncertain Processing Time 
We consider the problem of online scheduling on a single machine in order to minimize weighted flow time. The existing algorithms for this problem (STOC '01, SODA '03, FOCS '18) all require exact knowledge of the processing time of each job. This assumption is crucial, as even a slight perturbation of the processing time would lead to polynomial competitive ratio. However, this assumption very rarely holds in reallife scenarios. In this paper, we present the first algorithm for weighted flow time which do not require exact knowledge of the processing times of jobs. Specifically, we introduce the Scheduling with Predicted Processing Time (SPPT) problem, where the algorithm is given a prediction for the processing time of each job, instead of its real processing time. For the case of a constant factor distortion between the predictions and the real processing time, our algorithms match all the best known competitiveness bounds for weighted flow time  namely $O(\log P)$, $O(\log D)$ and $O(\log W)$, where $P, D, W$ are the maximum ratios of processing times, densities, and weights, respectively. For larger errors, the competitiveness of our algorithms degrades gracefully. 
ArXiv 
22nd of September 14:15 (Helsinki time) 
Chetan Gupta: Derandomizing Isolation Lemma for Special Classes of Graphs 
Isolation lemma states that if we randomly assign polynomially large weights to the elements of a set $S$ then for any family $F$ of subsets of $S$, the minimum weight subset in F will be unique with high probability. Isolation lemma has found numerous applications in complexity theory since its introduction. In this talk, I will talk about its application in the two fundamental problems in complexity theory, perfect matching and directed graph reachability. In the perfect matching problem, we want to find out whether a given graph has a perfect matching or not. Perfect matching problem is known to have a polynomialtime sequential algorithm. In complexity theory, most often, for every problem that has a polynomialtime sequential algorithm, people try to find an efficient parallel algorithm (NC algorithm) for the same in order to make progress towards P vs NC question. But the question whether there exists an efficient parallel algorithm for perfect matching or not has been elusive so far. Efforts to find an efficient parallel algorithm for perfect matching spurred powerful tools like isolation lemma. It was shown that if we can derandomize the isolation lemma for perfect matchings, that is, if we can efficiently construct polynomialsize weights for the edges of a graph such that minimum weight perfect matching in the graph is unique then the perfect matching problem can be solved in SPL, which is a small subclass of NC. In the graph reachability problem, given a directed graph and two vertices, we are asked whether there exists a path from one vertex to another or not. Reachability is a complete problem for complexity class NL, which is a class of problems that can be solved by nondeterministic Turing machines in logspace. The question whether reachability can be solved by an unambiguous logspace Turing machine (UL) or not is still open. It was shown that if we can derandomize the isolation lemma for paths, then reachability can be solved by a UL machine. This talk will explain how we can derandomize the isolation lemma for $O(\log n)$ genus graphs and singlecrossing minor free graphs to obtain an SPL bound for bipartite perfect matching and UL bound for reachabilty, in these two classes. 
Slides ArXiv MFCS 
15th of September 14:15 (Helsinki time) 
Laurent Feuilloley: The Secretary Problem with Independent Sampling 
The secretary problem is a classic online decision problem. In this problem,
an adversary first chooses some n numbers, then these numbers are shuffled at
random and presented to the player one by one. For each number, the player has
two options: discard the number and continue, or keep the number and stop the
game. The player wins if she kept the highest number of the whole set. It is
clearly not possible to win all the time: when one decides to stop there might be
a higher number in the rest of the sequence, and when one discards a number,
it might actually be the highest of the sequence. But surprisingly one can win
with probability $1/e$. An issue with the secretary problem is that it assumes that the player has absolutely no information about the numbers, which reduces its applicability. A recent research direction is to understand what happens when one knows a distribution or samples etc. We study a simple such setting for which we prove tight results. Interestingly, some of the lower bound techniques we use are inspired by ideas from distributed graph algorithms. 
ArXiv 
8th of September Nonstandard time 17:00 (Helsinki time) 
Jan van den Brand: Unifying Matrix Data Structures  Simplifying and Speeding up Iterative Algorithms 
Many algorithms use data structures that maintain properties of matrices undergoing some changes. The applications are wideranging and include for example matchings, shortest paths, linear programming, semidefinite programming, convex hull and volume computation. Given the wide range of applications, the exact property these data structures must maintain varies from one application to another, forcing algorithm designers to invent them from scratch or modify existing ones. Thus it is not surprising that these data structures and their proofs are usually tailormade for their specific application and that maintaining more complicated properties results in more complicated proofs. In this talk, I present a unifying framework that captures a wide range of these data structures. The simplicity of this framework allows us to give short proofs for many existing data structures regardless of how complicated the to be maintained property is. We also show how the framework can be used to speed up existing iterative algorithms, such as the simplex algorithm.  ArXiv 
21st of July 14:15 (Helsinki time) 
Iftach Haitner: A Tight Lower Bound on Adaptively Secure FullInformation Coin Flip 
In a distributed coinflipping protocol, Blum [ACM Transactions on Computer Systems '83], the parties try to output a common (close to) uniform bit, even when some adversarially chosen parties try to bias the common output. In an adaptively secure fullinformation coin flip, BenOr and Linial [FOCS '85], the parties communicate over a broadcast channel and a computationally unbounded adversary can choose which parties to corrupt during the protocol execution. BenOr and Linial proved that the nparty majority protocol is resilient to $O(\sqrt{n})$ corruptions (ignoring polylogarithmic factors), and conjectured this is a tight upper bound for any nparty protocol (of any round complexity). Their conjecture was proved to be correct for limited variant of singleturn (each party sends a single message) singlebit (a message is one bit) protocols, Lichtenstein, Linial, and Saks [Combinatorica '89], symmetric protocols Goldwasser, Kalai, and Park [ICALP '15], and recently for (arbitrary message length) singleturn protocols Kalai, Komargodski, and Raz [DISC '18]. Yet, the question for manyturn (even singlebit) protocols was left completely open. In this work we close the above gap, proving that no nparty protocol (of any round complexity) is resilient to $\omega(\sqrt{n})$ (adaptive) corruptions. That is, up to polylog factors, the singlebit, singlemessage majority protocol is the optimal protocol against adaptive corruptions. Joint work with Yonatan KaridiHeller. 
ArXiv 
30th of June 14:15 (Helsinki time) 
Bernhard Haeupler: The Quest for UniversallyOptimal Distributed Algorithms 
Many distributed optimization algorithms achieve an existentiallyoptimal round complexity of ($\tilde{O}(\sqrt{n} + D)$, i.e., there exists some pathological worstcase topology on which no algorithm can be faster. However, most networks of interest allow for exponentially faster algorithms. This motivates two questions: (1) What network topology parameters determine the complexity of distributed optimization? (2) Are there universallyoptimal algorithms that are as fast as possible on every single topology? This talk provides an overview over the freshlycompleted 6year program that affirmatively resolves these 25yearold open problems for a wide class of global network optimization problems including MST, $(1+\epsilon)$min cut, various approximate shortest path problems, subgraph connectivity, etc.. In particular, we provide several equivalent graph parameters that are tight universal lower bounds for the above problems, fully characterizing their inherent complexity. We also give the first universallyoptimal algorithms approximately achieving this complexity on every topology. The quest for universallyoptimal distributed algorithms required novel techniques that also answer fundamental (open) questions in seemingly unrelated fields, such as, network information theory, approximation algorithms, (oblivious) packet routing, (algorithmic & topological) graph theory, and metric embeddings. Generally, the problems addressed in these fields explicitly or implicitly ask to jointly optimize $\ell_\infty$ & $\ell_1$ parameters such as congestion & dilation, communication rate & delay, capacities & diameters of subnetworks, or the makespan of packet routings. In particular, results obtained on the way include the following firsts: (Congestion+Dilation)Competitive Oblivious Routing, Network Coding Gaps for CompletionTimes, HopConstrained Expanders & Expander Decompositions, BiCriteria (Online / DemandRobust) Approximation Algorithms for many DiameterConstrained Network Design Problems (e.g., (Group) Steiner Tree/Forest), MakespanCompetitive (Compact and Distributed) Routing Tables, and (Probabilistic) Tree Embeddings for HopConstrained Distances. (joint work with Mohsen Ghaffari, Goran Zuzic, Ellis D. Hershkowitz, David Wajc, Jason Li, Harald Raecke, Taisuke Izumi) 
ArXiv 
16th of June 14:15 (Helsinki time) 
Yael Hitron: Distributed CONGEST Algorithms Against Adversarial Edges 
In this talk, I will present broadcast algorithms in the adversarial CONGEST model. In this model, there is an adaptive byzantine adversary that controls some edges (or vertices) $F$ in the input communication graph. The adversary sees the entire communication graph, as well as the random coins of the nodes, while maliciously manipulating the messages sent through the $F$ edges (unknown to the nodes). The communication occurs as in the standard CONGEST model
Our two key results for $n$node graphs of diameter $D$ are as follows: 1. For $F=1$, there is a deterministic broadcast algorithm that runs in $\widetilde{O}(D^2)$ rounds, provided that the graph is $3$ edgeconnected (which is necessary). This round complexity beats the natural barrier of $O(D^3)$ rounds, the existentially lower bound on the maximal length of $3$ edgedisjoint paths between a given pair of nodes in $G$. This algorithm can be extended to a $\widetilde{O}(D^{O(t)})$round algorithm against $F=t$ adversarial edges in $(2t+1)$ edgeconnected graphs. 2. For expander graphs with edgeconnectivity $t=\Omega(\log n)$, we provide a considerably improved broadcast algorithm with $O(t' \log ^2 n)$ rounds, provided that the adversary controls at most $t'=O(\sqrt{t/\log n})$ edges. I will also present some concrete open problems. This is joint work with Merav Parter. 

9th of June 14:15 (Helsinki time) 
Krzysztof Nowicki: A Deterministic Algorithm for the MST Problem in Constant Rounds of Congested Clique 
In this talk I'll present a simple deterministic algorithm for the MST problem that needs only $O(1)$ rounds of Congested Clique. The algorithm can be also applied in the MPC model, as long as the local memory of a single machine is $O(n)$.The key technical contribution is an algorithm for the maximal (in the sense of inclusion) spanning forest that does not rely on any randomized techniques (e.g., graph sketches, 1out sampling, uniform sampling) used to obtain all previous $o(\log \log n)$ round algorithms.  ArXiv 
19th of May 14:15 (Helsinki time) 
Anton Bernshteyn: Distributed algorithms and continuous combinatorics 
The topic of this talk is a recently discovered connection between two seemingly disparate fields: distributed computing and descriptive combinatorics. Distributed computing is the area of computer science concerned with problems that can be solved efficiently by a (finite) decentralized network of processors. Descriptive combinatorics, on the other hand, studies combinatorial problems on infinite graphs under additional topological or measuretheoretic regularity constraints and is largely motivated by questions in logic and ergodic theory. It turns out that these two areas are closely related to each other, and there are formal ways of translating results from one context to the other one. In particular  and this is the main focus of this talk  a local coloring problem can be solved by an efficient deterministic distributed algorithm if and only if it admits a continuous solution.  ArXiv 
12th of May 14:15 (Helsinki time) 
Joel Rybicki: Fast Population Protocols on Graphs 
In the stochastic population protocol model, a collection of indistinguishable, resourcelimited nodes reside on a graph and collectively solve tasks via pairwise interactions. In each interaction, two randomly chosen neighbours first read each other's states, and then update their local states. A recent line of research has established tradeoffs between time and space complexity for various fundamental tasks, such as majority and leader election, when the underlying interaction graph is a clique. In this talk, we consider the more general setting of arbitrary interaction graphs and introduce a technique for simulating protocols designed for fullyconnected networks in any connected regular graph. The technique allows us to automatically transfer synchronous algorithms designed for the clique into the asynchronous setting on regular graphs. As an application of this result, we obtain fast and spaceefficient population protocols for leader election and exact majority on graphs with good expansion properties. The talk is based on joint work with Dan Alistarh and Rati Gelashvili. 
ArXiv 
5th of May 14:15 (Helsinki time) 
Tuomas Hakoniemi: Feasible interpolation for algebraic proof systems 
Feasible interpolation is a framework introduced by Krajíček in 90's for extracting computational content from proofs in formal proof systems. Although originally conceived as a means to prove lower bounds on size of proofs from lower bounds on different computational models, the framework finds also nontrivial applications in the opposite direction. In this talk we consider two algebraic proof systems, Polynomial Calculus and SumsofSquares, and give a form of feasible interpolation for these systems. These systems can be used to show the infeasibility of a set of polynomial constraints, and with a suitable encoding of clauses into polynomial constraints, the systems can be used as refutation systems for CNFs. Our results do not yield any new unconditional lower bounds for the proof systems. However, as a consequence for feasible interpolation for SumsofSquares, we obtain a novel polynomial time algorithm for separating $(k1)$colorable graphs from those containing a $k$clique.  Paper 
28th of April 14:15 (Helsinki time) 
Christoph Grunau: A gap in the Randomized Local Computation Complexity Landscape 
The Local Computation Algorithm (LCA) model is a popular model in the field of sublineartime algorithms that measures the complexity of an algorithm by the number of probes the algorithm makes in the neighborhood of one node to determine that node’s output. In this talk, I show that every randomized LCA algorithm for a locally checkable problem with a probe complexity of $o(\sqrt{\log n})$ can be turned into a deterministic LCA algorithm with a probe complexity of $O(\log^* n)$. I also show how additional ideas lead to an $\Omega(log n)$ lower bound for the Lovasz Local Lemma (LLL) on constant degree graphs. This talk is based on joint work with Sebastian Brandt and Vasek Rozhon.  ArXiv 
21th of April 14:15 (Helsinki time) 
Sorrachai Yingchareonthawornchai: Vertex Connectivity in Polylogarithmic Maxflows 
The vertex connectivity of an $m$edge $n$vertex undirected graph is the smallest number of vertices whose removal disconnects the graph, or leaves only a singleton vertex. In this paper, we give a reduction from the vertex connectivity problem to a set of maxflow instances. Using this reduction, we can solve vertex connectivity in $\widetilde{O}(m^α)$ time for any $\alpha \geq 1$, if there is a $m^α$time maxflow algorithm. Using the current best maxflow algorithm that runs in $m^{4/3+o(1)}$ time (Kathuria, Liu and Sidford, FOCS 2020), this yields an $m^{4/3+o(1)}$time vertex connectivity algorithm. This is the first improvement in the running time of the vertex connectivity problem in over 20 years, the previous best being an $\widetilde{O}(mn)$time algorithm due to Henzinger, Rao, and Gabow (FOCS 1996). Indeed, no algorithm with an $o(mn)$ running time was known before our work, even if we assume an $\widetilde{O}(m)$time maxflow algorithm. 
ArXiv 
14th of April 14:15 (Helsinki time) 
Yuval Gil: TwentyTwo New Approximate Proof Labeling Schemes 
Introduced by Korman, Kutten, and Peleg (Distributed Computing 2005), a proof labeling scheme
(PLS) is a system dedicated to verifying that a given configuration graph satisfies a certain property.
It is composed of a centralized prover, whose role is to generate a proof for yesinstances in the
form of an assignment of labels to the nodes, and a distributed verifier, whose role is to verify the
validity of the proof by local means and accept it if and only if the property is satisfied. To overcome
lower bounds on the label size of PLSs for certain graph properties, CensorHillel, Paz, and Perry
(SIROCCO 2017) introduced the notion of an approximate proof labeling scheme (APLS) that allows
the verifier to accept also some noinstances as long as they are not "too far" from satisfying the
property. The goal of the current paper is to advance our understanding of the power and limitations of APLSs. To this end, we formulate the notion of APLSs in terms of distributed graph optimization problems (OptDGPs) and develop two generic methods for the design of APLSs. These methods are then applied to various classic OptDGPs, obtaining twentytwo new APLSs. An appealing characteristic of our APLSs is that they are all sequentially efficient in the sense that both the prover and the verifier are required to run in (sequential) polynomial time. On the negative side, we establish “combinatorial” lower bounds on the label size for some of the aforementioned OptDGPs that demonstrate the optimality of our corresponding APLSs. For other OptDGPs, we establish conditional lower bounds that exploit the sequential efficiency of the verifier alone (under the assumption that NP ≠ coNP) or that of both the verifier and the prover (under the assumption that P ≠ NP, with and without the unique games conjecture). 
ArXiv 
7th of April 14:15 (Helsinki time) 
Václav Rozhoň: The ID Graph Trick and its Applications to Lower Bounds in the LOCAL and LCA Model 
We will talk about the socalled ID graph: this is a new trick useful for proving lower bounds in distributed models of computation.
We will show how it can be used to simplify the famous lower bound for the Lovász Local Lemma in the distributed LOCAL model and then we will discuss how it can be used to prove a lower bound for the same problem in the Local Computation Algorithm model. We also discuss the original usage of the trick: to translate results from the field of descriptive combinatorics to distributed algorithms. Joint work with Sebastian Brandt, Jan Grebík, Christoph Grunau 
ArXiv 
31st of March 14:15 (Helsinki time) 
Juho Hirvonen: Classifying Convergence Complexity of Nash Equilibria in Graphical Games Using Distributed Computing Theory 
Graphical games are a framework for modelling games where an underlying graph determines how the actions of players affect each other. The utility of each player depends only on its own strategy and the strategy of its neighbours. In this context many fundamental equilibrium concepts are localised: for example, the strategies of the players form a Nash equilibrium if and only if no player can unilaterally improve its current strategy with respect to its neighbours. Systems modelled as graphical games can also be naturally seen as distributed systems. Assuming that a system is converging to a Nash equilibrium, it is implicitly solving the corresponding computational task of finding a Nash equilibrium. Since Nash equilibria of graphical games are localised, finding one is a locally verifiable task. This family of problems has been studied widely in the theory of distributed graph algorithms, and it is therefore possible to use distributed complexity theory to understand and classify the equilibria of graphical games. I will present our work formalising this connection. We give examples of basic graphical games and show how theory of distributed computing can be used to understand them. 
Paper 
17th of March 14:15 (Helsinki time) 
Andras Papp: Computational Aspects of Financial Networks 
We study financial networks with debt contracts and credit default swaps between specific pairs of banks. Given such a financial system, we want to decide which of the banks are in default, and how much of their liabilities can these defaulting banks pay. There can easily be multiple different solutions to this problem, leading to a situation of default ambiguity and a range of possible solutions to implement for a financial authority. We first study these financial networks from a gametheory perspective, analyzing the incentives of banks, and some simple operations they could execute in order to influence the outcome to their advantage. We show that if multiple banks try to execute these operations simultaneously, then this can easily result in classical game theoretic situations like the prisoner's dilemma or the dollar auction game. We then analyze these financial networks in a sequential model where banks announce their default one at a time, and the system evolves in a stepbystep manner. We show that such a dynamic process can go on indefinitely, or last for an exponential number of steps before an eventual stabilization. We also study how the ordering of announcements affects the final outcome, and show that even for a single bank, finding the best time to announce a default is already an NPhard problem. 
Paper Paper 
10th of March 14:15 (Helsinki time) 
Petteri Kaski: ErrorCorrecting and Verifiable Parallel Inference in Graphical Models 
We present a novel framework for parallel exact inference in graphical models. Our framework supports errorcorrection during inference and enables fast verification that the result of inference is correct, with probabilistic soundness. The computational complexity of inference essentially matches the cost of wcutset conditioning, a known generalization of Pearl's classical loopcutset conditioning for inference. Verifying the result for correctness can be done with as little as essentially the square root of the cost of inference. Our main technical contribution amounts to designing a lowdegree polynomial extension of the cutset approach, and then reducing to a univariate polynomial employing techniques recently developed for noninteractive probabilistic proof systems. This is joint work with Negin Karimi (Aalto University) and Mikko Koivisto (University of Helsinki).  Paper 
24th of February 14:15 (Helsinki time) 
Michele Scquizzato: Tight Bounds for Parallel Paging and Green Paging 
In the parallel paging problem, there are p
processors that share a cache of size \(k\). The goal is to partition
the cache among the processors over time in order to minimize their
average completion time. For this longstanding open problem, we give
tight upper and lower bounds of Θ(log p) on the competitive
ratio with O(1) resource augmentation. A key idea in both our algorithms and lower bounds is to relate the problem of parallel paging to the seemingly unrelated problem of green paging. In green paging, there is an energyoptimized processor that can temporarily turn off one or more of its cache banks (thereby reducing power consumption), so that the cache size varies between a maximum size k and a minimum size k/p. The goal is to minimize the total energy consumed by the computation, which is proportional to the integral of the cache size over time. We show that any efficient solution to green paging can be converted into an efficient solution to parallel paging, and that any lower bound for green paging can be converted into a lower bound for parallel paging, in both cases in a blackbox fashion. We then show that, with O(1) resource augmentation, the optimal competitive ratio for deterministic online green paging is Θ(log p), which, in turn, implies the same bounds for deterministic online parallel paging. 
Paper 
17th of February 14:15 (Helsinki time) 
Faour Salwa: Approximating Bipartite Minimum Vertex Cover in the CONGEST Model 
In this talk, I present how one can achieve efficient distributed algorithms for the minimum vertex cover problem in bipartite graphs in the CONGEST model for both the randomized and deterministic setting. This is based on a joint work with Fabian Kuhn (University of Freiburg). From Kőnig’s theorem, it is well known that in bipartite graphs the size of a minimum vertex cover is equal to the size of a maximum matching. First, we show that together with an existing \( O ( n \log n )\)round algorithm for computing a maximum matching, the constructive proof of Kőnig's theorem directly leads to a deterministic \( O ( n \log n )\)round CONGEST algorithm for computing a minimum vertex cover. We then show that by adapting the construction, we can also convert an approximate maximum matching into an approximate minimum vertex cover. Given a \((1\delta)\)approximate matching for some \( \delta > 1\), we show that a \((1+O(\delta))\)approximate vertex cover can be computed in time \(O(D+\poly (\frac{\log n}{\delta}))\), where D is the diameter of the graph. Finally when combining with known graph clustering techniques, for any \(\eps \in (0,1]\), this leads to a \(\poly(\frac{\log n}{\eps})\)time deterministic and also to a slightly faster and simpler randomized \(O(\frac{\log n}{\eps^3})\)round CONGEST algorithm for computing a $(1+\eps)$approximate vertex cover in bipartite graphs. For constant \(\eps\), the randomized time complexity matches the \(\Omega(\log n)\) lower bound (Göös, Suomela 2014) for computing a \((1+\eps)\)approximate vertex cover in bipartite graphs even in the LOCAL model. Our results are also in contrast to the situation in general graphs, where it is known that computing an optimal vertex cover requires \(\tilde{\Omega}(n^2)\) rounds in the CONGEST model and where it is not even known how to compute any \((2\eps)\)approximation in time \(o(n^2)\). 
Paper 
3rd of February 14:15 (Helsinki time) 
Orr Fischer: A Distributed Algorithm for Directed MinimumWeight Spanning Tree 
In the directed minimum spanning tree problem (DMST, also called minimum weight arborescence), the network is given a root node $r$, and needs to construct a minimumweight directed spanning tree, rooted at $r$ and oriented outwards. In this paper we present the first subquadratic DMST algorithms in the distributed CONGEST network model, where the messages exchanged between the network nodes are bounded in size. We consider three versions: a model where the communication links are bidirectional but can have different weights in the two directions; a model where communication is unidirectional; and the Congested Clique model, where all nodes can communicate directly with each other. Our algorithm is based on a variant of Lovasz' DMST algorithm for the PRAM model, and uses a distributed singlesource shortestpath (SSSP) algorithm for directed graphs as a black box. In the bidirectional CONGEST model, our algorithm has roughly the same running time as the SSSP algorithm; using the stateoftheart SSSP algorithm, we obtain a running time of $\widetilde{O}(n^{1/2}D^{1/4} + D))$ rounds for the bidirectional communication case. For the unidirectional communication model we give an $\widetilde{O}(n)$ algorithm, and show that it is nearly optimal. And finally, for the Congested Clique, our algorithm again matches the best known SSSP algorithm: it runs in $\widetilde{O}(n^{1/3})$ rounds. On the negative side, we adapt an observation of Chechik in the sequential setting to show that in all three models, the DMST problem is at least as hard as the $(s,t)$shortest path problem. Thus, in terms of round complexity, distributed DMST lies between singlesource shortest path and $(s,t)$shortest path. 
Paper 
20th of January 14:15 (Helsinki time) 
Vanni Noferini: Walk this way 
In complex network analysis, centrality measures are nonnegative valued functions defined on the nodes of a graph that measure the relative importance of each node. Applications include, for instance, singling out the most influential users of a social network, or identifying potential superspreaders within the context of a disease epidemic.
Due to the existence of efficient computational algorithms based on numerical linear algebra, centrality measures based on walks are particularly popular. However, in certain applications it is desirable to refine the underlying combinatorics, by neglecting certain types of walks, in order to obtain more significant results. After a gentle introduction including some classical results in this research area, I will discuss some recently proposed definitions of centrality measures that only count walks that do not backtrack, or more generally do not include cycles of length $\leq k$. I will focus both on theoretical properties of these measures and on computational issues. The talk is based on collaborative work with F. Arrigo (Strathclyde), P. Grindrod (Oxford) and D. Higham (Edinburgh). 

13th of January 14:15 (Helsinki time) 
Jonni Virtema: Descriptive complexity of real computation and probabilistic team semantics 
In this talk I survey my recent joint work with Miika Hannula (Helsinki), Juha Kontinen (Helsinki), and Jan Van den Bussche (Hasselt) on logics and complexity in a setting that incorporates real numbers as firstclass citizens. Background: Metafinite model theory (Grädel & Gurevich 1998) generalizes the approach of finite model theory by shifting to twosorted structures that extend finite structures with another (often infinite) domain with some arithmetic (such as the reals with multiplication and addition), and weight functions bridging the two sorts. Finite structures enriched with real arithmetic are called Rstructures. BlumShubSmale machines (Blum, Shub & Smale 1989), BSS machine for short, are essentially random access machines with registers that can store real numbers and which can compute arithmetic operations on reals in a single time step. In addition for recognizing languages over the reals, BSS machines can also be used to recognize languages on the Boolean alphabeth {0,1}; e.g. Boolean languages recognizable by BSSmachiness in nondeterminitic polynomial time coincides with the complexity class existsR (problems PTIME reducible to the existential theory of the reals) which lies somewhere between NP and PSPACE (defined with Turing machines). NP on BSS machines was logically captured by a variant of existential secondorder logic over Rstructures in (Grädel & Meer 1995). Our contribution: We study descriptive complexity of logics in the setting of probabilistic team semantics. This is a family of logics builtup from atomic expressions stating quantitative notions of dependence between random variables. E.g., probabilistic independence logic is built around an atomic statement that declares conditional probabilistic independence between tuples of random variables. Formulae, in this setting, describe properties of realweighted distributions over firstorder assignments. Hence, it turns out, that the descriptive complexity of related logics lie in the realm of BSSmachines. For pinpointing the exact complexity of logics in the probabilistic team semantics setting, we introduced a novel restricted variant of BSS machines, coined "separatebranching BSSmachines" or SBSSmachines. This led to various connections between logics using probabilistic team semantics, complexity classes defined via SBSSmachines, complexity classes defined via Turing machines, and restrictions of the variant of existential secondorder logic of Grädel and Meer. 
Paper ArXiv 
16th of December 14:15 (Helsinki time) 
Merav Parter: An Algorithmic Perspective for Spiking Neural Networks 
Understanding how the brain works, as a computational device, is a
central challenge of modern neuroscience and artificial intelligence.
Different research communities approach this challenge in different
ways, including studies that examine neural network structure as a
clue to computational function, functional imaging that studies neural
activation patterns, theoretical work using simplified models of
neural computation, and engineering of complex neuralinspired machine
learning architectures. The talk will be devoted to a line of works that
approaches this problem using techniques from distributed computing theory and other branches of
theoretical computer science. We will present a scientific perspective on the area,
modeling neural networks as computational platforms and studying
computability and costs within these models. We will focus on a collection of abstract problems inspired by problems that are solved in actual brains, such as problems of focus, time estimation, recognition, and memory. The goal is to design efficient algorithms (networks) for solving these problems, and analyze them in terms of static costs such as network size and dynamic costs such as the time to converge to a correct solution. The talk will also discuss the barriers of asynchronous neural computation from an algorithmic perspective, and the role of randomness in neural computation. If time allows, we will mention some interesting relations to the area of streaming algorithms. Based on several joint works with Yael Hitron, Nancy Lynch, Cameron Musco and Gur Perry. 

9th of December 14:15 (Helsinki time) 
William Moses Jr.: Singularly Optimal Randomized Leader Election 
This paper concerns designing distributed algorithms that are singularly optimal, i.e., algorithms that are simultaneously time and message optimal, for the fundamental leader election problem in networks. Our main result is a randomized distributed leader election algorithm for asynchronous complete networks that is essentially (up to a polylogarithmic factor) singularly optimal. Our algorithm uses O(n) messages with high probability and runs in O(\log^2 n) time (with high probability) to elect a unique leader. The O(n) message complexity should be contrasted with the \Omega(n \log n) lower bounds for the deterministic message complexity of leader election algorithms (regardless of time), proven by Korach, Moran, and Zaks (TCS, 1989) for asynchronous algorithms and by Afek and Gafni (SIAM J. Comput., 1991) for synchronous networks. Hence, our result also separates the message complexities of randomized and deterministic leader election. More importantly, our (randomized) time complexity of O(\log^2 n) for obtaining the optimal O(n) message complexity is significantly smaller than the longstanding \tilde{\Theta}(n) time complexity obtained by Afek and Gafni and by Singh (SIAM J. Comput., 1997) for message optimal (deterministic) election in asynchronous networks. Afek and Gafni also conjectured that \tilde{\Theta}(n) time would be optimal for messageoptimal asynchronous algorithms. Our result shows that randomized algorithms are significantly faster. Turning to synchronous complete networks, Afek and Gafni showed an essentially singularly optimal deterministic algorithm with O(\log n) time and O(n \log n) messages. Ramanathan et al. (Distrib. Comput. 2007) used randomization to improve the message complexity, and showed a randomized algorithm with O(n) messages but still with O(\log n) time (with failure probability O(1 / \log^{\Omega(1)}n)). Our second result shows that synchronous complete networks admit a tightly singularly optimal randomized algorithm, with O(1) time and O(n) messages (both bounds are optimal). Moreover, our algorithm's time bound holds with certainty, and its message bound holds with high probability, i.e., 11/n^c for constant c. Our results demonstrate that leader election can be solved in a simultaneously message and timeefficient manner in asynchronous complete networks using randomization. It is open whether this is possible in asynchronous general networks. This talk is based on joint work with Shay Kutten, Gopal Pandurangan, and David Peleg which was published at DISC 2020. 
Paper 
2nd of December 14:15 (Helsinki time) 
Shreyas Pai: SampleandGather: Fast Ruling Set Algorithms in the LowMemory MPC Model 
Motivated by recent progress on symmetry breaking problems such as maximal independent set (MIS) and maximal matching in the lowmemory Massively Parallel Computation (MPC) model (e.g., Behnezhad et al. PODC 2019; GhaffariUitto SODA 2019), we investigate the complexity of ruling set problems in this model. The MPC model has become very popular as a model for largescale distributed computing and it comes with the constraint that the memorypermachine is strongly sublinear in the input size. For graph problems, extremely fast MPC algorithms have been designed assuming Õ(n) memorypermachine, where n is the number of nodes in the graph (e.g., the O(log log n) MIS algorithm of Ghaffari et al., PODC 2018). However, it has proven much more difficult to design fast MPC algorithms for graph problems in the lowmemory MPC model, where the memorypermachine is restricted to being strongly sublinear in the number of nodes, i.e., O(n^ε) for constant 0 < ε < 1. In this paper, we present an algorithm for the 2ruling set problem, running in Õ(log^{1/6} Δ) rounds whp, in the lowmemory MPC model. Here Δ is the maximum degree of the graph. We extend this result to βruling sets for any integer β > 1. Specifically, we show that a βruling set can be computed in the lowmemory MPC model with O(nε) memorypermachine in Õ(β ⋅ log^{1/(2β+12)} Δ) rounds, whp. From this it immediately follows that a βruling set for β = Ω(logloglog Δ)ruling set can be computed in just O(β log log n) rounds whp. The above results assume a total memory of Õ(m + n^{1+ε}). We also present algorithms for βruling sets in the lowmemory MPC model assuming that the total memory over all machines is restricted to Õ(m). For β > 1, these algorithms are all substantially faster than the GhaffariUitto Õ(√log Δ)round MIS algorithm in the lowmemory MPC model. All our results follow from a SampleandGather Simulation Theorem that shows how randomsamplingbased Congest algorithms can be efficiently simulated in the lowmemory MPC model. We expect this simulation theorem to be of independent interest beyond the ruling set algorithms derived here. Joint work with Kishore Kothapalli and Sriram Pemmaraju to appear in FSTTCS 2020. 
ArXiv 
25th of November 14:15 (Helsinki time) 
Shaofeng Jiang: Streaming Algorithms for Geometric Steiner Forest 
We consider a natural generalization of the Steiner tree problem, the Steiner forest problem, in the Euclidean plane: the input is a multiset X ⊂ R^2, partitioned into k color classes C_1, C_2, ..., C_k X. The goal is to find a minimumcost Euclidean graph G such that every color class C_i is connected in G.
We study this Steiner forest problem in the streaming setting, where the stream consists of insertions and deletions of points to X. Each input point x\in X arrives with its in [k],
and as usual for dynamic geometric streams, the input points are restricted to the discrete grid {0, ..., Δ}^2. We design a singlepass streaming algorithm that uses poly(k log Δ) space and time, and estimates the cost of an optimal Steiner forest solution within ratio arbitrarily close to the famous Euclidean Steiner ratio alpha_2 (currently 1.1547 < \alpha_2 < 1.214). Our approach relies on a novel combination of streaming techniques, like sampling and linear sketching, with the classical dynamicprogramming framework for geometric optimization problems, which usually requires large memory and has so far not been applied in the streaming setting. Joint work with Artur Czumaj, Robert Krauthgamer and Pavel Veselý. 
ArXiv 
11th of November One hour later that usual: 15:15 (Helsinki time) 
Przemek Uznański: Cardinality estimation using Gumbel distribution 
Cardinality estimation is the task of approximating the number of distinct elements in a large dataset with possibly repeating elements. LogLog and HyperLogLog (c.f. Durand and Flajolet [ESA 2003], Flajolet et al. [Discrete Math Theor. 2007]) are small space sketching schemes for cardinality estimation, which have both strong theoretical guarantees of performance and are highly effective in practice. This makes them a highly popular solution with many implementations in bigdata systems (e.g. Algebird, Apache DataSketches, BigQuery, Presto and Redis). However, despite having simple and elegant formulation, both the analysis of LogLog and HyperLogLog are extremely involved  spanning over tens of pages of analytic combinatorics and complex function analysis. We propose a modification to both LogLog and HyperLogLog that replaces discrete geometric distribution with a continuous Gumbel distribution. This leads to a very short, simple and elementary analysis of estimation guarantees, and smoother behavior of the estimator. 
ArXiv 
28th of October 2020 14:15 (Helsinki time) 
Philipp Schneider: Shortest Paths in the HYBRID Network Model 
The HYBRID model, introduced in [Augustine et al., SODA '20], provides a theoretical foundation for networks that allow multiple communication modes. The model follows the principles of synchronous message passing, where nodes are allowed to use two fundamentally different communication modes. First, a local mode where nodes may exchange arbitrary information per round over edges of a local communication graph G (akin to the LOCAL model). Second, a global mode where every node may exchange log n messages of size O(log n) bits per round with arbitrary nodes in the network. The HYBRID model intends to reflect the conditions of many real hybrid networks, where highbandwidth but inherently local communication is combined with highly flexible global communication with restricted bandwidth. We explore the power and limitations of the HYBRID model by investigating the complexity of computing shortest paths of the local communication graph G. The aim of the talk is to give an overview of the known techniques for information dissemination in the HYBRID model. Subsequently, we will look into how these techniques can be used to obtain algorithmic upper bounds for various shortest paths problems and how these compare to the known lower bounds. As a sideffect we will also learn how the HYBRID model is related to other models of computation. 
ArXiv 
21th of October 2020 14:15 (Helsinki time) 
Darya Melnyk: Online Problems with Delays in the Uniform Metric Space 
We present tight bounds for the kserver problem with delays in the
uniform metric space. The problem is defined on n + k nodes in the
uniform metric space which can issue requests over time. These requests
can be served directly or with some delay using k servers, by moving a
server to the corresponding node with an open request. The task is to
find an online algorithm that can serve the requests while minimizing
the total moving and delay costs. We first provide a lower bound by
showing that the competitive ratio of any deterministic online algorithm
cannot be better than (2k + 1) in the clairvoyant setting. We will then
show that conservative algorithms (without delay) can be equipped with
an accumulative delay function such that all such algorithms become (2k
+ 1)competitive in the nonclairvoyant setting. Together, the two
bounds establish a tight result for both, the clairvoyant and the
nonclairvoyant settings. We further study a special case of the online MinimumCost Perfect Matching with Delays (MPMD) problem introduced by Emek et al. [STOC 2016]. In this problem, a metric space is given and requests arrive at different times at points in this space. The algorithm is allowed to delay the matching of these requests, with the objective to both minimize the sum of distances between matched pairs and the time that passes until a request is matched. We consider the special case of uniform metric spaces with a unit distance between any two points. Our results include a deterministic 3competitive online algorithm for a uniform metric space consisting of four or fewer points as well as a deterministic 3.5competitive online algorithm for uniform metric spaces with an arbitrary number of points. 
Paper 
7th of October 2020 14:15 (Helsinki time) 
Aleksander Łukasiewicz: AllPairs LCA in DAGs: Breaking through the O(n^2.5) barrier 
Let G=(V,E) be an nvertex directed acyclic graph (DAG). A lowest common ancestor (LCA) of two vertices u and v is a common ancestor w of u and v such that no descendant of w has the same property. In this paper, we consider the problem of computing an LCA, if any, for all pairs of vertices in a DAG. The fastest known algorithms for this problem exploit fast matrix multiplication subroutines and have running times ranging from O(n^2.687) [Bender et al. SODA'01] down to O(n^2.615) [Kowaluk and Lingas~ICALP'05] and O(n^2.569) [Czumaj et al. TCS'07]. Somewhat surprisingly, all those bounds would still be Ω(n^2.5) even if matrix multiplication could be solved optimally (i.e., ω=2). This appears to be an inherent barrier for all the currently known approaches, which raises the natural question on whether one could break through the O(n^2.5) barrier for this problem. In this paper, we answer this question affirmatively: in particular, we present an O(n^2.447) (O(n^7/3) for ω=2) algorithm for finding an LCA for all pairs of vertices in a DAG, which represents the first improvement on the running times for this problem in the last 13 years. A key tool in our approach is a fast algorithm to partition the vertex set of the transitive closure of G into a collection of O(ℓ) chains and O(n/ℓ) antichains, for a given parameter ℓ. As usual, a chain is a path while an antichain is an independent set. We then find, for all pairs of vertices, a candidate} LCA among the chain and antichain vertices, separately. The first set is obtained via a reduction to minmax matrix multiplication. The computation of the second set can be reduced to Boolean matrix multiplication similarly to previous results on this problem. We finally combine the two solutions together in a careful (nonobvious) manner. To appear in SODA 2021. 
ArXiv 
30th September 2020 14:15 (Helsinki time) 
Julian Portmann: Tight Bounds for Deterministic HighDimensional Grid Exploration 
We study the problem of exploring an oriented grid with autonomous agents governed by finite automata. In the case of a 2dimensional grid, the question how many agents are required to explore the grid, or equivalently, find a hidden treasure in the grid, is fully understood in both the synchronous and the semisynchronous setting. For higher dimensions, Dobrev, Narayanan, Opatrny, and Pankratov [ICALP'19] showed very recently that, surprisingly, a (small) constant number of agents suffices to find the treasure, independent of the number of dimensions, thereby disproving a conjecture by Cohen, Emek, Louidor, and Uitto [SODA'17]. Dobrev et al. left as an open question whether their bounds on the number of agents can be improved. We answer this question in the affirmative for deterministic finite automata: we show that 3 synchronous and 4 semisynchronous agents suffice to explore an ndimensional grid for any constant n. The bounds are optimal and notably, the matching lower bounds already hold in the 2dimensional case. Our techniques can also be used to make progress on other open questions asked by Dobrev et al.: we prove that 4 synchronous and 5 semisynchronous agents suffice for polynomialtime exploration, and we show that, under a natural assumption, 3 synchronous and 4 semisynchronous agents suffice to explore unoriented grids of arbitrary dimension (which, again, is tight). 
ArXiv 
16th September 2020 14:15 (Helsinki time) 
Janne Korhonen: Inputdynamic distributed graph algorithms for congested networks 
Consider a distributed system, where the topology of the communication network remains fixed, but local inputs given to nodes may change over time. In this work, we explore the following question: if some of the local inputs change, can an existing solution be updated efficiently, in a dynamic and distributed manner?
To address this question, we define the batch dynamic CONGEST model, where the communication network G=(V,E) remains fixed and a dynamic edge labelling defines the problem input. The task is to maintain a solution to a graph problem on the labeled graph under batch changes. We investigate, when a batch of α
edge label changes arrive, — how much time as a function of α we need to update an existing solution, and — how much information the nodes have to keep in local memory between batches in order to update the solution quickly. We give a general picture of the complexity landscape in this model, including a general framework for lower bounds. In particular, we prove nontrivial upper bounds for two selected, contrasting problems: maintaining a minimum spanning tree and detecting cliques. 
ArXiv 
9nd September 2020 14:15 (Helsinki time) 
Yannic Maus: Distributed Graph Coloring: Linial for Lists 
Linial's famous color reduction algorithm reduces a given mcoloring of a graph with maximum degree Δ to a O(Δ² log m)coloring, in a single round in the LOCAL model. We show a similar result when nodes are restricted to choose their color from a list of allowed colors: given an mcoloring in a directed graph of maximum outdegree β, if every node has a list of size Ω(β² (log β + log log m + log log C)) from a color space C then they can select a color in two rounds in the LOCAL model. Moreover, the communication of a node essentially consists of sending its list to the neighbors. This is obtained as part of a framework that also contains Linial's color reduction (with an alternative proof) as a special case. Our result also leads to a defective list coloring algorithm. As a corollary, we improve the stateoftheart truly local (deg+1)list coloring algorithm from Barenboim et al. [PODC'18] by slightly reducing the runtime to O(sqrt(Δ log Δ) + log* n) and significantly reducing the message size (from huge to roughly Δ). Our techniques are inspired by the local conflict coloring framework of Fraigniaud et al. [FOCS'16].  ArXiv 
26th August 2020 14:15 (Helsinki time) 
Ebrahim Ghorbani: Spectral gap of regular graphs and a conjecture by AldousFill on the relaxation time of the random walk 
Aldous and Fill conjectured that the maximum relaxation time for the random walk on a connected regular graph with n vertices is (1+o(1)) \frac{3n^2}{2\pi^2}. This conjecture can be rephrased in terms of the spectral gap as follows: the spectral gap (algebraic connectivity) of a connected kregular graph on n vertices is at least (1+o(1))\frac{2k\pi^2}{3n^2}, and the bound is attained for at least one value of k. Brand, Guiduli, and Imrich determined the structure of connected cubic graphs on n vertices with minimum spectral gap. We investigate the structure of quartic (i.e.~4regular) graphs with the minimum spectral gap among all connected quartic graphs. We show that they must have a pathlike structure built from specific blocks. Based on these results, we prove the AldousFill conjecture follows for k=3 and 4. This talk is based on joint works with M. Abdi and W. Imrich.  
19th August 2020 14:15 (Helsinki time) 
KlausTycho Förster: On the Feasibility of Perfect Resilience with Local Fast Failover 
In order to provide a high resilience and to react quickly to link failures, modern computer networks support fully decentralized flow rerouting, also known as local fast failover. In a nutshell, the task of a local fast failover algorithm is to predefine fast failover rules for each node using locally available information only. These rules determine for each incoming link from which a packet may arrive and the set of local link failures (i.e., the failed links incident to a node), on which outgoing link a packet should be forwarded. Ideally, such a local fast failover algorithm provides a perfect resilience deterministically: a packet emitted from any source can reach any target, as long as the underlying network remains connected. Feigenbaum et al. showed that it is not always possible to provide perfect resilience and showed how to tolerate a single failure in any network. Interestingly, not much more is known currently about the feasibility of perfect resilience. This paper revisits perfect resilience with local fast failover, both in a model where the source can and cannot be used for forwarding decisions. We first derive several fairly general impossibility results: By establishing a connection between graph minors and resilience, we prove that it is impossible to achieve perfect resilience on any nonplanar graph; furthermore, while planarity is necessary, it is also not sufficient for perfect resilience. On the positive side, we show that graph families which are closed under the subdivision of links, can allow for simple and efficient failover algorithms which simply skip failed links. We demonstrate this technique by deriving perfect resilience for outerplanar graphs and related scenarios, as well as for scenarios where the source and target are topologically close after failures. 
Paper 
12th August 2020 14:15 (Helsinki time) 
Chris Brzuska: On Building FineGrained OneWay Functions from Strong AverageCase Hardness 
Constructing oneway function from averagecase hardness is a longstanding open problem
A positive result would exclude Pessiland (Impagliazzo '95) and establish a highly desirable winwin situation: Either (symmetric) cryptography exists unconditionally, enabling many of the important primitives which are used to secure our communications, or all NP problems can be solved efficiently on average, which would be a revolution in algorithms. Motivated by the interest of establishing such a winwin result and the lack of progress on this seemingly very hard question, we initiate the investigation of weaker yet meaningful candidate winwin results. Specifically, we study the following type of winwin results: either there are finegrained oneway functions (FGOWF), which relax the standard notion of a oneway function by requiring only a fixed polynomial gap (as opposed to superpolynomial) between the running time of the function and the running time of an inverter, or nontrivial speedups can be obtained for all NP problems on average. We obtain three main results:  We introduce the random language model (RLM), which captures idealized averagecase hard languages, analogous to how the random oracle model captures idealized oneway functions. We provide a construction of a FGOWF (with quadratic hardness gap) and prove its security in the RLM. This rules out an idealized version of Pessiland, where ideally hard languages would exist yet even weak forms of cryptography would fail.  On the negative side, we prove a strong oracle separation: we show that there is no blackbox proof that either FGOWF exist, or nontrivial speedup can be obtained for all NP languages on average (i.e., there is no exponentially averagecase hard NP languages).  We provide a second strong negative result for an even weaker candidate winwin result: there is no blackbox proof that either FGOWF exist, or nontrivial speedups can be obtained for all NP languages on average when amortizing over many instances (i.e., there is no exponentially averagecase hard NP languages whose hardness amplifies optimally through parallel repetitions). This separation forms the core technical contribution of our work. Our results lay the foundations for a program towards building finegrained oneway functions from strong forms of averagecase hardness, following the template of constructions in the random language model. We provide a preliminary investigation of this program, showing blackbox barriers toward instantiating our idealized constructions from natural hardness properties. Joint work with Geoffroy Couteau. 

29th July 2020 14:15 (Helsinki time) 
Davin Choo: kmeans++: few more steps yield constant approximation 
The kmeans++ algorithm of Arthur and Vassilvitskii (SODA 2007) is a stateoftheart algorithm for solving the kmeans clustering problem and is known to give an O(log k)approximation in expectation. Recently, Lattanzi and Sohler (ICML 2019) proposed augmenting kmeans++ with O(k log log k) local search steps to yield a constant approximation (in expectation) to the kmeans clustering problem. In this paper, we improve their analysis to show that, for any arbitrarily small constant $\eps > 0$, with only $\eps k$ additional local search steps, one can achieve a constant approximation guarantee (with high probability in k), resolving an open problem in their paper.  Paper 
22nd July 2020 14:15 (Helsinki time) 
Yuval Efron: Beyond Alice and Bob: Improved Inapproximability for Maximum Independent Set in CONGEST 
By far the most fruitful technique for showing lower bounds for the CONGEST model is reductions to twoparty communication complexity. This technique has yielded nearly tight results for various fundamental problems such as distance computations, minimum spanning tree, minimum vertex cover, and more.
In this work, we take this technique a step further, and we introduce a framework of reductions to tparty communication complexity, for every t≥2. Our framework enables us to show improved hardness results for maximum independent set. Recently, Bachrach et al.[PODC 2019] used the twoparty framework to show hardness of approximation for maximum independent set. They show that finding a (5/6+ϵ)approximation requires Ω(n/log6n) rounds, and finding a (7/8+ϵ)approximation requires Ω(n2/log7n) rounds, in the CONGEST model where n in the number of nodes in the network.
We improve the results of Bachrach et al. by using reductions to multiparty communication complexity. Our results: (1) Any algorithm that finds a (1/2+ϵ)approximation for maximum independent set in the CONGEST model requires Ω(n/log3n) rounds. (2) Any algorithm that finds a (3/4+ϵ)approximation for maximum independent set in the CONGEST model requires Ω(n2/log3n) rounds. 
Paper 
15th July 2020 14:15 (Helsinki time) 
YiJun Chang: Simple Contention Resolution via Multiplicative Weight Updates 
We consider the classic contention resolution problem, in which devices conspire to share some common resource, for which they each need temporary and exclusive access. To ground the discussion, suppose (identical) devices wake up at various times, and must send a single packet over a shared multipleaccess channel. In each time step they may attempt to send their packet; they receive ternary feedback {0,1,2^+} from the channel, 0 indicating silence (no one attempted transmission), 1 indicating success (one device successfully transmitted), and 2^+ indicating noise. We prove that a simple strategy suffices to achieve a channel utilization rate of 1/eO(epsilon), for any epsilon > 0. In each step, device i attempts to send its packet with probability p_i, then applies a rudimentary multiplicative weighttype update to p_i. p_i ← { p_i * e^{epsilon} upon hearing silence (0), p_i upon hearing success (1), p_i * e^{epsilon/(e2)} upon hearing noise (2^+) }. This scheme works well even if the introduction of devices/packets is adversarial, and even if the adversary can jam time slots (make noise) at will. We prove that if the adversary jams J time slots, then this scheme will achieve channel utilization 1/eepsilon, excluding O(J) wasted slots. Results similar to these (Bender, Fineman, Gilbert, Young, SODA 2016) were already achieved, but with a lower constant efficiency (less than 0.05) and a more complex algorithm.  Paper 
8th July 2020 14:15 (Helsinki time) 
Diksha Gupta: Sybil Defense in the Presence of Churn Using Resource Burning 
In this talk, I will begin by discussing a recent result for defending against Sybil attacks in dynamic permissionless systems, in the presence of a computationally bounded adversary  TOtal Good COMputation (ToGCom). This technique guarantees a majority of honest identities (IDs) at all times, at a computational cost to the protocol that is comparable to that of the attacker. Next, I will talk about the concept of resource burning  the verifiable consumption of resources. This resource does not necessarily need to be computational power, but can also be communication capacity, computer memory, and human effort, subject to some constraints. Using this insight, I will conclude with a generalizing of our Sybil defense techniques to a variety of systems with churn, in the presence of a resourcebounded adversary.  
1st July 2020 14:15 (Helsinki time) 
Sebastian Brandt: Lower Bounds for Ruling Sets in the LOCAL Model 
Given a graph G = (V,E), an (a,b)ruling set is a subset S of V such
that the distance between any two vertices in S is at least a, and the
distance between any vertex in V and the closest vertex in S is at most
b. Ruling sets are a generalization of maximal independent sets (which
are (2,1)ruling sets) and constitute an important building block of
many distributed algorithms. The recent breakthrough on network
decompositions by Rozhon and Ghaffari [STOC'20] implies that, in the
distributed LOCAL model, ruling sets can be computed deterministically
in polylogarithmic time, for a wide range of parameters a, b. In this talk, we present polylogarithmic lower bounds for the deterministic computation of ruling sets, and Omega(poly(log log n)) lower bounds for the randomized computation of ruling sets, both in the LOCAL model, improving on the previously best known lower bounds of Omega(log*n)) by Linial [FOCS'87] and Naor [J.Disc.Math.'91]. In the special case of maximal independent sets, such lower bounds were already known; however, our lower bounds are the first (beyond Omega(log*n)) that are also applicable on trees. 
Paper 
17th June 2020 14:15 (Helsinki time) 
Frederik MallmanTrenn: Finding the best papers with noisy reviews 
Say you are tasked to find the best 150 papers among more than 550 papers.
You can ask people to review a given paper by either asking 1) Is paper A better than paper B or 2) What’s the score of paper A? The problem is that each review returns an incorrect response with a small probability, say 2/3. How can you assign reviews so that you the total number of queries is small and the number of review rounds is small? 
Paper 
10th June 2020 14:15 (Helsinki time) 
Joachim Spoerhase: Approximation Algorithms for some Submodular and Graphbased Optimization Problems 
In this talk, I will give an overview over three recent results on approximation algorithms for discrete optimization problems.
The first result concerns optimizing a monotone submodular function with respect to an arbitrary (constant) number of packing and covering constraints. We give a randomized polynomialtime approximation algorithm that is essentially tight with respect to approximation ratio, running time, and constraint violation. The algorithm is based on rounding a multilinear relaxation of the problem. We also discuss special cases where we can give *deterministic* algorithms based on a novel combinatorial approach.
The second set of results concerns optimization problems for graphs. We will briefly look at a polynomialtime approximation scheme (PTAS) for Steiner tree on map graphs, which generalizes a known PTAS planar (edgeweighted) Steiner tree, and which is motivated by the study of planar nodeweighted Steiner trees. We will also touch upon a result for the sparsest cut problem in treewidth bounded graphs. REMARK: This talk is given as a memorial for Sumedha Uniyal who was a postdoc at Aalto for 3 years until she passed away on February 19, 2020. I will give an overview over our three joint results. Additional contributors include Jaroslaw Byrka (Wroclaw), Parinya Chalermsook (Aalto), Mateusz Lewandowski (Wroclaw), Syed Mohammad Meesum (Wroclaw), Eyal Mizrachi (Technion), Matthias Mnich (TU Hamburg) Roy Schwartz (Technion), Daniel Vaz (TU Munich) 

3rd June 2020 14:15 (Helsinki time) 
Parinya Chalermsook: Some New Algorithmic MinMax Relations via Local Search 
The study of minmax relations has been a cornerstone in combinatorial optimization. Classic examples include, for instance, LP duality relations, TutteBerge formula, and the notion of perfect graphs. These relations have yielded many groundbreaking algorithmic results. Algorithmic uses of these bounds often involve two steps: (1) Prove a nonconstructive bound and (2) Use another technique (e.g. convex programs) to turn the first step algorithmic. In this talk, I will report our recent use of local search arguments to derive two new algorithmic minmax relations in one go. In these results, a bound is proved by showing that a locally optimal solution must satisfy such bound, therefore yielding immediately an efficient algorithm.
REMARK: This talk is given as a memorial for Sumedha Uniyal who was a postdoc at Aalto for 3 years until she passed away on February 19, 2020. She played a central role in this project. Additional contributors include Samir Khuller (Northwestern), Andreas Schmid (Aalto), and Pattara Sukprasert (Northwestern). 

27th May 2020 14:15 (Helsinki time) 
Krzysztof Nowicki: Faster Algorithms for Edge Connectivity via Random 2Out Contractions 
We provide a simple new randomized contraction approach to the global minimum cut problem for simple undirected graphs. The contractions exploit 2out edge sampling from each vertex rather than the standard uniform edge sampling. Our new approach yields better algorithms for sequential, distributed, and parallel models of computation.  Paper 
20th May 2020 15:15 (Helsinki time, one hour later than usually!) 
Jan Studený: On the Hardness of Classifying Distributed Complexity of Graph Problems on Paths, Cycles, and Trees 
Given the description of a locally checkable graph problem Π for paths or cycles or trees, find out how hard is to determine what the distributed complexity of solving Π in the usual LOCAL model of distributed computing. In this talk I will present our results on answering this question for paths and cycles and discuss the case of trees.  Paper 
13th May 2020 14:15 (Helsinki time) 
Manuela Fischer: Local Glauber Dynamics 
Sampling constitutes an important tool in a variety of areas: from machine learning and combinatorial optimization to computational physics and biology. A central class of sampling algorithms is the Markov Chain Monte Carlo method, based on the construction of a Markov chain with the desired sampling distribution as its stationary distribution. Many of the traditional Markov chains, such as the Glauber dynamics, do not scale well with increasing dimension. To address this shortcoming, we propose a simple local update rule based on the Glauber dynamics that leads to efficient parallel and distributed algorithms for sampling from Gibbs distributions. Concretely, we present a Markov chain that mixes in O(logn) rounds when Dobrushin's condition for the Gibbs distribution is satisfied. This improves over the LubyGlauber algorithm by Feng, Sun, and Yin [PODC'17], which needs O(Δ log n) rounds, and their LocalMetropolis algorithm, which converges in O(log n) rounds but requires a considerably stronger mixing condition. Here, n denotes the number of nodes in the graphical model inducing the Gibbs distribution, and Δ its maximum degree. In particular, our method can sample a uniform proper coloring with α Δ colors in O(log n) rounds for any α > 2, which almost matches the threshold of the sequential Glauber dynamics and improves on the α > 2+sqrt(2) threshold of Feng et al.  Paper 
6th May 2020 14:15 (Helsinki time) 
Jesper Nederlof: Bipartite TSP in O(1.9999^n) Time, Assuming Quadratic Time Matrix Multiplication 
The symmetric traveling salesman problem (TSP) is the problem of
finding the shortest Hamiltonian cycle in an edgeweighted undirected
graph. In 1962 Bellman, and independently Held and Karp, showed that
TSP instances with n cities can be solved in O(n^2*2^n) time. Since
then it has been a notorious problem to improve the runtime to
O((2eps)^n) for some constant eps >0. In this work we establish the
following progress: If (s x s)matrices can be multiplied in
s^{2+o(1)} time, than all instances of TSP in bipartite graphs can be
solved in O(1.9999^n) time by a randomized algorithm with constant
error probability. We also indicate how our methods may be useful to
solve TSP in nonbipartite graphs. On a high level, our approach is via a new problem called the MINHAMPAIR problem: Given two families of weighted perfect matchings, find a combination of minimum weight that forms a Hamiltonian cycle. As our main technical contribution, we give a fast algorithm for MINHAMPAIR based on a new sparse cutbased factorization of the `matchings connectivity matrix', introduced by Cygan et al. [JACM'18]. 

29th April 2020 14:15 (Helsinki time) 
Sorrachai Yingchareonthawornchai: Computing and Testing Small Connectivity in NearLinear Time and Queries via Fast Local Cut Algorithms 
Consider the following "local" cutdetection problem in a directed graph: We are given a seed vertex x and need to remove at most k edges so that at most ν edges can be reached from x (a "local" cut) or output ⊥ to indicate that no such cut exists. If we are given query access to the input graph, then this problem can in principle be solved without reading the whole graph and with query complexity depending on k and ν. In this talk, I will present a simple randomized algorithm spending O(νk^2) time and O(kν) queries for the slight variant of the above problem, improving in particular a previous time bound of O(k^O(k) ν) by Chechik et al. [SODA '17]. I will then present two key applications of the local cut algorithm. The first application is a fast randomized algorithm for the classic kvertex connectivity problem that takes nearlinear time when k = O(polylog(n)). Second is property testing algorithms for kedge and vertex connectivity with query complexities that are nearlinear in k, exponentially improving the stateoftheart. This resolves two open problems, one by Goldreich and Ron [STOC '97] and one by Orenstein and Ron [Theor. Comput Sci. '11].  Paper 
22th April 2020 15:15 (Helsinki time 
Václav Rozhoň: PolylogarithmicTime Deterministic Network Decomposition and Distributed Derandomization 
We present a simple polylogarithmictime deterministic distributed algorithm for network decomposition. This improves on a celebrated 2^O(sqrt(log n))time algorithm of Panconesi and Srinivasan [STOC'92] and settles a longstanding question in distributed graph algorithms. It also leads to the first polylogarithmictime deterministic distributed algorithms for numerous other problems, hence resolving several wellknown open problems, including Linial's question about the deterministic complexity of maximal independent set [FOCS'87; SICOMP'92]. By known connections, our result leads also to substantially faster randomized distributed algorithms for a number of wellstudied problems including (Delta+1)coloring, maximal independent set, and Lovász Local Lemma, as well as massively parallel algorithms for (Delta+1)coloring.  Paper 
15th April 2020 14:15 (Helsinki time 
Przemek Uznański: Hardness of Exact Distance Queries in Sparse Graphs Through Hub Labeling 
A distance labeling scheme is an assignment of bitlabels to the vertices of an undirected, unweighted graph such that the distance between any pair of vertices can be decoded solely from their labels. An important class of distance labeling schemes is that of hub labelings, where a node v∈G stores its distance to the socalled hubs S(v)⊆V, chosen so that for any u,v∈V there is w∈S(u)∩S(v) belonging to some shortest uv path. Notice that for most existing graph classes, the best distance labelling constructions existing use at some point a hub labeling scheme at least as a key building block. Our interest lies in hub labelings of sparse graphs, i.e., those with E(G)=O(n), for which we show a lowerbound of n/2^O(√logn) for the average size of the hubsets. Additionally, we show a hublabeling construction for sparse graphs of average size O(n/RS(n)^c) for some 0 < c < 1, where RS(n) is the socalled RuzsaSzemerédi function, linked to structure of induced matchings in dense graphs. This implies that further improving the lower bound on hub labeling size to n/2^(logn)^o(1) would require a breakthrough in the study of lower bounds on RS(n), which have resisted substantial improvement in the last 70 years. For general distance labeling of sparse graphs, we show a lowerbound of 1/2O(√logn) * SumIndex(n), where SumIndex(n) is the communication complexity of the SumIndex problem over Z_n. Our results suggest that the best achievable hublabel size and distancelabel size in sparse graphs may be Θ(n/2^(log n)^c) for some 0 < c < 1.  Paper 
8th April 2020 14:15 (Helsinki time 
Alex Jung: On the Duality between Network Flows and Network Lasso 
Many applications generate data with an intrinsic network structure such as time series data, image data or social network data. The network Lasso (nLasso) has been proposed recently as a method for joint clustering and optimization of machine learning models for networked data. The nLasso extends the Lasso from sparse linear models to clustered graph signals. This paper explores the duality of nLasso and network flow optimization. We show that, in a very precise sense, nLasso is equivalent to a minimumcost flow problem on the data network structure. Our main technical result is a concise characterization of nLasso solutions via existence of certain network flows. The main conceptual result is a useful link between nLasso methods and basic graph algorithms such as clustering or maximum flow.  Paper 
1st April 2020 14:15 (Helsinki time) 
Petteri Kaski: Probabilistic Tensors and Opportunistic Boolean Matrix Multiplication 
We introduce probabilistic extensions of classical deterministic measures of algebraic complexity of a tensor, such as the rank and the border rank. We show that these probabilistic extensions satisfy various natural and algorithmically serendipitous properties, such as submultiplicativity under taking of Kronecker products. Furthermore, the probabilistic extensions enable strictly lower rank over their deterministic counterparts for specific tensors of interest, starting from the tensor <2,2,2> that represents 2by2 matrix multiplication. By submultiplicativity, this leads immediately to novel randomized algorithm designs, such as algorithms for Boolean matrix multiplication as well as detecting and estimating the number of triangles and other subgraphs in graphs.  Paper 
25th March 2020 14:15 (Helsinki time) 
Jukka Suomela: Foundations of Distributed Computing in the 2020s 
In this talk I will review some major advances in the theory of distributed computing in the past decade and discuss key research challenges for the 2020s, with the main focus on distributed graph algorithms. I will present promising new approaches for doing research in the field, and I will also highlight examples of seemingly elementary questions that are still beyond the reach of our current techniques.  Slides 