tag:blogger.com,1999:blog-27705661Sun, 13 Jul 2014 07:53:35 +0000Process Algebra DiaryPapers I find interesting---mostly, but not solely, in Process Algebra---, and some fun stuff in Mathematics and Computer Science at large and on general issues related to research, teaching and academic life.http://processalgebra.blogspot.com/noreply@blogger.com (Luca Aceto)Blogger499125tag:blogger.com,1999:blog-27705661.post-7121051006193277360Sun, 13 Jul 2014 07:53:00 +00002014-07-13T07:53:35.575ZDay 4 and Recap of ICALP 2014 (guest post by Andrew Winslow)<i>Here is the last guest post by <a href="http://www.eecs.tufts.edu/%7Eawinslow/" target="_blank">Andrew Winslow </a> from ICALP 2014. Enjoy it! Thanks to Andrew for his conference reports. </i><br /><br />This [Friday, 11 July 2014] is the last day of ICALP! <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_72">George Mertzios, Sotiris Nikoletseas, Christoforos Raptopoulos and Paul Spirakis. Determining Majority in Networks with Local Interactions and very Small Local Memory</a></h3>This talk focused on a problem in distributed computing on a graph with stateful nodes. Given a graph with nodes colored red and blue, a <i>population protocol</i> is a set of rules that define how the colors of a pair of endpoints of an edge can be transformed. For instance, a population protocol might include a rule to turn the colors of a pair of red nodes sharing to both be blue. One is also allowed to add additional colors not found in inputs, and the total number of colors that appear in the input and population protocol is the number of <i>states</i> of the protocol. <br />A population protocol for the <i>majority problem</i> transforms the colors of all (or all but a (1-ε) fraction) of the nodes into the color appearing most frequently in the input graph. In may be possible at any point during the execution of the protocol that more than one rule can be applied to the endpoints of more than one edge, and it is assumed that either the rules are chosen randomly (a <i>randomized scheduler</i>) or advesarially subject to some basic requirements, like that any rule that can be applied is applied after a finite amount of time (a <i>fair scheduler</i>). One can also ask about the amount of time (i.e. the number of rule applications) needed for a majority to be reached.<br /><br />It was previously known that a 3-state protocol for majority exists in the case that both the graph is a clique and the ratio of the occurrence counts of most common color over least common color is ω(sqrt(n)log(n))[1]. In this work, Mertzios, Nikoletseas, Christoforos, and Spirakis constructed a four-state protocol that correct computes majority with probability 1 on any graph and with any difference between the number of occurrences of the two colors, assuming a fair scheduler. They also prove that the 3-state protocol described in [1] is strictly worse, failing to converge to the correct majority with high probability for an infinite family of graphs (graphs consisting of a clique at the end of a chain), even with a probabilistic scheduler.<br /><br />[1] D. Angluin, J. Aspnes, and D. Eisenstat. A simple population protocol for fast robust approximate majority. Distributed Computing, 21(2): 87-102, 2008. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_21">Karl Bringmann, Fabian Kuhn, Konstantinos Panagiotou, Ueli Peter and Henning Thomas. Internal DLA: Efficient Simulation of a Physical Growth Model.</a></h3>Karl gave the talk. This work is about improving the speed of sampling the results of the following process, called <i>internal diffuse limited aggregation</i> or <i>IDLA</i>: <br /><ol><li>Place a particle at origin in the square lattice. </li><li>Take a random walk with this particle until a lattice location not containing another particle is found. </li><li>Place this particle at the empty location. </li></ol>As one might expect, the resulting shape of the particle locations is usually roundish. The roundness can be captured by considering the ratio of the radii of the smallest containing and largest contained circles for the shape, centered at the origin. It is known that the expected difference in the ratios of these circles is O(log(n)), i.e. that the shape is usually quite round. <br />The IDLA process comes from statistical physics, and natural problems in this area related to understanding the distribution of shapes generated by this process. The naive approach to randomly sample the result of the IDLA process takes O(n^2) time, since the expected radius is Theta(n^0.5), a randomly walk from the origin takes Theta(n) expected time to reach an empty location (usually on the boundary), and n particles must be simulated. <br />Bringmann, Kuhn, Panagiotou, Peter, and Thomas improve this to O(nlog^2(n)) expected time and O(n^0.5*log(n)) expected space with high probability. The idea of the algorithm is to efficiently carry out the random walk by making large <i>jumps</i>, carrying out a significant portion of the walk in O(1) expected time. An upper bound on the number of jumps can then be obtained by computing the time expected to leave the region containing previous points (with radius O(sqrt(n)*log(n))). <br /><h3>Recap</h3>This was my first time attending ICALP, and overall had a great experience. The conference was well-organized and the work presented was consistently very high quality and also had a great diversity to it; every session had a fairly distinct theme. One of the more unique aspects of the conference are the three topical tracks, and the mixing and interaction between "Track-A people" and "Track-B people" (and don't forget Track-C people...) led to some great discussions. http://processalgebra.blogspot.com/2014/07/day-4-and-recap-of-icalp-2014-guest.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-8478509124949143196Fri, 11 Jul 2014 10:05:00 +00002014-07-11T10:05:08.277ZJuly 9, 2014 - July 10, 2014 ICALP (guest post by Clément Canonne)<div class="flushleft"><i>Here is the second guest post from ICALP 2014 kindly written by <a href="http://www.cs.columbia.edu/%7Eccanonne/" target="_blank">Clément Canonne</a>. Enjoy it! (This post is also available in <a href="http://www.ru.is/%7Eluca/ICALP2014/Canonne2.pdf" target="_blank">PDF</a>. Any typo or typesetting issue with the HTML version is my responsibility.)</i><br /> </div><h4 class="likesubsectionHead"><a href="https://www.blogger.com/null" id="x1-1000" name="x1-1000"></a>Fast Algorithms for Constructing Maximum Entropy Summary Trees (Howard Karloff)</h4>This talk <a href="http://dx.doi.org/10.1007/978-3-662-43948-7_28">[1]</a> revolved around a question. A simple question, really. <em>“How to draw a rooted tree?”</em> Not <em>any</em>tree, though: a big one. A huge, gigantic n-node tree T, with n » ⌊2<sup>22.891112</sup>⌋ [2], on a tiny sheet of paper (or a screen, for that matter). Most of the time, the approach is either to<br /> <ul class="itemize1"><li class="itemize">draw the whole thing, get a binocular and hope something can be seen at all;</li><li class="itemize">go for interaction, and draw/zoom on parts of the graph on-the-fly.</li></ul>Here, none of this: T is T, magnificent n-node weighted tree; and we are given a parameter k ≥ n, to be though of as k « n; the task is to draw a k-node tree T<sup>′</sup>, the “best summary” of T. (At this point – <a href="http://www2.research.att.com/%7Ekshirley/summarytrees/summarytrees_gauss.pdf">a demo</a>! From the Mathematical Genealogy Project: the tree being made of the academic descendants of a obscure mathematician, someone named Gauss. That’s a hell of a tree.)<br /> The key of their approach is <em>not</em> to draw only k carefully chosen nodes of T, and dismiss the others; but instead to allow T<sup>′</sup> to combine subsets of T’s nodes into a big, meta-node named “others” (†).<br /> Sure. But what is a “good summary” anyway? Quite naturally, the authors went for entropy – a tree is <em>good</em> if, assigning weights to nodes in the straightforward fashion (for v ∈ T<sup>′</sup>, ω<sub>v</sub> ∝ the total weight of original nodes of T in the subtree of T<sup>′</sup> rooted at v), the entropy<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-T2CJihKylMo/U7-2XsS8nAI/AAAAAAAAQW4/Uus6VJxumJY/s1600/icalp-0707-0710-hkarloff-rmdoliveira0x.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-T2CJihKylMo/U7-2XsS8nAI/AAAAAAAAQW4/Uus6VJxumJY/s1600/icalp-0707-0710-hkarloff-rmdoliveira0x.png" /></a></div><br />is big. That is, if T<sup>′</sup> is as balanced as possible, or phrased differently remains very <em>informative</em>.<br /><br /><span class="paragraphHead"><a href="https://www.blogger.com/null" id="x1-2000" name="x1-2000"></a>So, what’s the problem?</span> The problem is exactly (†), when it comes to computing such an optimal k-node summary tree. Indeed, if we allow an algorithm to combine an arbitrary subset of a node v into a metanode others<sub>v</sub> (and we do!), there is the slight problem of having exponentially many possibilities – and that could turn out pretty bad. An intuitive idea [3] would be to sort v’s children by non-decreasing weights, and combine together a <em>prefix</em> (the first, say, ℓ of them) – they shouldn’t be too important anyway. Sadly, it does not work – there are counter examples, even for n = 7 and k = 4.<br /><br /> In a previous work <a href="http://www.research.att.com/techdocs/TD_100908.pdf">[4]</a>, <a href="http://www.research.att.com/people/Shirley_Kenneth_E/index.html">Kenneth Shirley</a> and <a href="http://www.research.att.com/archive/people/Karloff_Howard_J/index.html">Howard Karloff</a> managed to give a <em>pseudo</em>polynomial algorithm (polynomial in the total weight), and a polynomial-time (additive) approximation one. This works came for the kill, removing the “pseudo” to give<br /> <ul class="itemize1"><li class="itemize">a O(k<sup>2</sup>n + nlog n)-time algorithm for computing an optimal k-node summary tree;</li><li class="itemize">a (better) O(n + poly(k,1∕ε))-time approximation algorithm</li></ul>as well as a faster (albeit non-provably optimal) greedy algorithm. The crux of the approach? Prefixes don’t work, alright. But <em>extended prefixes</em> do! Instead of (after sorting a node v’s children) merging the nodes {1,…,ℓ}, it is sufficient to merge the {1,…,ℓ,ℓ<sup>′</sup>} for some ℓ<sup>′</sup> ≥ ℓ + 1 (yes, it is surprising to me too).<br /> And <em>voilà</em>! Polynomial time.<br /> <h4 class="likesubsectionHead"><a href="https://www.blogger.com/null" id="x1-3000" name="x1-3000"></a>Testing Equivalence of Polynomials under Shifts (Rafael Mendes de Oliveira)</h4>And now, some testing <a href="http://www.cs.princeton.edu/%7Ezdvir/papers/DOS13.pdf">[5]</a>! <a href="http://www.cs.princeton.edu/%7Ermo/">Rafael</a> has a device: a blackbox computing a n-variate polynomial P ∈ F[X<sub>1</sub>,…,X<sub>n</sub>] (for some fixed field F). And another one – computing Q ∈ F[X<sub>1</sub>,…,X<sub>n</sub>]. On inputs x ∈ F<sup>n</sup>, these two devices allow him to compute P(x), Q(x) in constant time.<br /><br class="newline" />Rafael also has two coauthors, <a href="http://www.cs.princeton.edu/%7Ezdvir/">Zeev Dvir</a> and <a href="http://www.cs.technion.ac.il/%7Eshpilka/">Amir Shpilka</a>, and a question:<br /> <div class="newtheorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-3001r1" name="x1-3001r1"></a> <strong>Question</strong> (Shift Equivalence Testing (SET)).</span> Given a bound on their degree, decide if P and Q are <em>morally</em> the same polynomial. That is, if there is a shift vector a such that P(⋅ + a) = Q(⋅) (and if so, please, find one.)<br /> </div>This is arguably a natural generalization of the infamous Polynomial Identity Testing (PIT) problem, where the goal is to decide whether P is the all-zero polynomial or not. PIT does not have any known efficient deterministic algorithm, but a very simple polynomial-time randomized one; and the task of improving this state of affairs has ramifications in many areas.<br /> So SET must be difficult, since it not only generalizes the question, but also asks for an explicit witness – this vector a. After giving some background on what is known about related questions (is P “shift-equivalent” to a polynomial that can be represented with very few non-zero coefficients, for instance), Rafael gave the main result of their paper:<br /> <div class="newtheorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-3002r1" name="x1-3002r1"></a> <strong>Theorem.</strong></span> There is an efficient (randomized) algorithm for SET. Furthermore, the only randomized part comes from solving instances of PIT.<br /> </div>In other words, in spite of what it seems, SET is not much harder than PIT; and any improvement on the use of randomness for PIT directly translates to the corresponding improvement for SET!<br /> Roughly speaking, the idea of the proof is to try to find a “one step at a time”, by successively coming up with candidates a<sub>d</sub>, a<sub>d-1</sub>, …, a<sub>1</sub>. How? Find a<sub>d</sub> that matches the degree-d part of P(⋅ + a) and Q(⋅) – this is just a linear system to solve, along with a call to a randomized subroutine for PIT. Then find a<sub>d-1</sub> that matches both the degree-d and degree-(d - 1) parts of P(⋅ + a) and Q(⋅) – this no longer linear, alas. But, and that’s the trick, one can plug the known value of a<sub>d</sub> in the quadratic system to make it collapse to a linear system, which has the same solutions as the quadratic one!<br /> And so on, and so forth: after computing a<sub>k+1</sub>, one just has to solve a linear system to get a<sub>k</sub>, using the nice properties of a<sub>k+1</sub> (simplifications “trickles down”), before calling PIT to make sure the result is correct so far. And at the end of the day, either a<sub>1</sub> is a good shift-vector, or there is none – and a final call the PIT subroutine lets us know which of the two cases hold.<br /> Hop.<br /> <ul><li class="itemize">[1] <em>Fast Algorithms for Constructing Maximum Entropy Summary Trees</em>, R. Cole and H. Karloff. ICALP, 2014.</li><li class="itemize">[2] This is a prime number. Check it out.</li><li class="itemize">[3] Rule of thumb: when I write “intuitive”, it is a trap.</li><li class="itemize">[4] <em>Maximum Entropy Summary Trees</em>, K. Shirley and H. Karloff, Computer Graphics Forum. 2013.</li><li class="itemize">[5] <em>Testing Equivalence of Polynomials under Shifts</em>, Z. Dvir, R.M de Oliveira, and A. Shpilka. ICALP, 2014.</li></ul>http://processalgebra.blogspot.com/2014/07/july-9-2014-july-10-2014-icalp-guest.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-2386707031459231620Thu, 10 Jul 2014 20:08:00 +00002014-07-10T20:08:29.907ZDay 3 of ICALP 2014 (guest post by Andrew Winslow)<i>Here is the third guest post by <a href="http://www.eecs.tufts.edu/%7Eawinslow/" target="_blank">Andrew Winslow </a> from ICALP 2014. Enjoy it! </i><br /><h3>Invited Talk: Sanjeev Arora</h3><a href="http://www.cs.princeton.edu/%7Earora/" target="_blank">Sanjeev</a> gave a survey of recent work by himself and others in working to develop provable bounds on the performance of many problems across unsupervised learning. The talk itself was entitled "Overcoming Intractability for Unsupervised Learning", where the "unsupervised" refers (loosely) to being given a pile of raw data and asked to extra some relevant statistical data, e.g. given a collection of newspaper articles, what topics do they cover. The foothold for these problems is assuming that the data comes from some (unknown) distribution, and many fo the problems relate to learning something about the distribution.<br /><br />Almost all of the problems covered are NP-hard, and the first part of the talk was an explanation of how this is overcome. In Sanjeev's words, "NP-hardness is not the right way to think about this". He explained that the starting point is determining if the set of interesting/realistic/natural instances lie in a tractable subset by looking for realistic assumptions that lead to tractable instances. <br />As an example, he described the topic modelling problem, where one is given a corpus of text (e.g. all New York Times articles) and the goal is to describe each article as a linear combination of topics, where the topics are <i>not</i> given in advance (i.e. unsupervised learning). A geometric view of this problem is being given a set of points in a convex polytope (articles) and being asked to find the vertices of the polytope (topics). The problem is NP-hard in general, but can be made tractable by assuming that the data is separable: the vertices are included in the set of points given. Then a polynomial time algorithm have be obtained: for each point, test if it's contained on the convex hull, if not, it can be removed, and otherwise it must be a vertex.<br /><br />He also spoke about making process on other machine learning techniques, including dictionary learning (given complex objects built from a small, simple dictionary, compute the dictionary) and approaches like deep learning (many-level neutral networks). Dictionary learning and deep learning are both thought to take place in the human visual cortex, giving good evidence that their worst-case intractability is not a barrier to their effective use. For the case of deep learning, Sanjeev pointed out that learning the network is effectively trying to learn a <a href="http://en.wikipedia.org/wiki/TC0" target="_blank">TC^0</a> (ouch!) and yet they have been used successfully by machine learning people to achieve high accuracy rates on large corpora. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_4" target="_blank">Amir Abboud, Virginia Vassilevska Williams and Oren Weimann. Consequences of Faster Alignment of Sequences.</a></h3>Amir gave this talk on conditional lower bounds on local matching a pair of strings: given a function defining a score for every pair of symbols, find a pair substrings from the input string that maximizes the score. Like other string problems, including longest common subsequence, the best known algorithm for local alignment takes quadratic time and has resisted improvements in the exponent to, say, O(n^1.99). <br />Amir was quick to point out local alignment is hugely important in genomic sequence analysis (heuristics like <a href="http://en.wikipedia.org/wiki/BLAST" target="_blank">BLAST</a> are hugely popular) and that quadratic is too slow in these cases, since n can be several billion. Abboud, Williams, and Weimann prove that a O(n^{2-ε})-time algorithm for local alignment implies the following results: <br /><ul><li>3SUM solved in O(n^{2-δ}) time for some δ, refuting the weak form of the 3SUM conjecture. </li><li>CNF-SAT solvable in O((2-δ)^n) time, refuting the strong exponential time hypothesis. </li><li>Max-4-Clique solvable in O(n^{4-δ}) time for some δ, resolving a long-standing opening problem of improving the best-known algorithm for Max-4-Clique. </li></ul>They also prove similar results for other problems, including edit distance with gap penalties, and longest commen subsequence with wildcards (input strings are allowed to have wildcard characters that match any character). The proofs follow the usual approach of using a O(n^{2-ε})-time local alignment algorithm to produce faster algorithms for the other problems and those that Amir showed were very clean. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_10" target="_blank">Amihood Amir, Timothy M. Chan, Moshe Lewenstein and Noa Lewenstein. On Hardness of Jumbled Indexing.</a></h3>This work has a similar flavor to the Abboud, Williams, Weimann paper, using the 3SUM conjecture to develop lower bounds for string problems. <i>Unlike</i> that paper, this work gives lower bounds for data structures answering queries. The main problem considered is of jumbled, a.k.a. histogram indexing: given a string T with alphabet of size k, preprocess T to answer queries of the form "what substrings of T have character occurrence counts ", i.e. what substrings have the given histogram. For many pattern matching problems on strings, suffix trees/arrays are used to achieve linear-time queries. <br />For histogram indexing, naive approaches yield either O(1) preprocessing and O(n) query time (scanning the string using a window whose size is the sum of the entries in the histogram) or O(kn^2) preprocessing time and O(1) query time (precompute the histograms of all substrings and look up the answer). The contribution of Amir, Chan, Lewenstein, and Lewenstein is to prove that, assuming the 3SUM conjecture, these results are the best possible. <br />For a fixed alphabet of size k at least 3, they prove that achieving O(n^{2-2/k}) preprocessing and O(n^{1-1/k}) query time simultaneously is 3SUM-hard. For alphabets of non-constant size, they prove that achieving O(n^{2-ε}) preprocessing and O(n^{1-δ}) query time is 3SUM-hard. He also mentioned that unpublished work with Timothy Chan achieves a positive result in the form of a data structure that achieves O(n^{2 - 2/k + O(1)}) preprocessing and O(n^{1 - 1/k + O(1)}) query time simultaneously for fixed alphabets. <br /><a href="http://u.cs.biu.ac.il/%7Emoshe/" target="_blank">Moshe</a> did a good job of mixing the problems, motivation, and technical details in a way that kept the talk interesting. Related to the reductions in this work, which use a reduction from convolution 3SUM (testing whether there exist two indices i, j, of the input array such that A[i] + A[j] = A[i+j]), he also recommended that people read Patrascu's <a href="http://www.ccs.neu.edu/home/viola/classes/papers/PatrascuTowards.pdf" target="_blank">paper</a> that proves this special form of 3SUM is 3SUM-hard. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_53" target="_blank">John Iacono and Özgür Özkan. Why Some Heaps Support Constant-Amortized-Time Decrease-Key Operations, and Others Do Not</a></h3><a href="http://john.poly.edu/" target="_blank">John</a>'s hand-drawn slides caught the <a href="https://twitter.com/njlarsson/statuses/487240180848676865" target="_blank">attention</a> of some people from the very beginning, and combined with his deadpan delivery and promise to "keep it light" left the audience quiet chuckling through the talk. The talk started with a chat about heaps. All good heaps have O(log(n))-time insert and extract-min operations. Decrease-key is also an operation of heaps; some heaps are better at it. There are three families of heaps with three different running times for decrease-key: <br /><ul><li>Fibonacci and "improvements" that achieve O(1) time. </li><li>Pairing heaps that achieve O(2^{2^{sqrt{loglog(n)}}}) time. </li><li>Elmasry/sort heaps that achieve O(loglog(n)) time. </li></ul>All decrease-key operations of these trees pair small trees into bigger trees. What distingushes them is how they do this: <br /><ul><li>Pairing heaps: repeatedly pair trees recursively. Repeat until one tree remains. </li><li>Elmasry/sort heaps: break roots into blocks of size log(n), chain all roots of a block together. </li><li>For Fibonacci heaps: pair heaps whose roots have the same number of children. </li></ul>Note that the Fibonacci pair based on tree size, <i>not</i> key value, and use an augmentation of loglog(n) bits in each root. Seems like you augmented bits = fast? Fredman considered this in 1999, proving O(1) decrease-key implies Omega(loglog(n)) bits for some classes of heaps, namely pairing heaps. But lower bound requires assumption that every time a pair of roots have their values compared, their heaps are combined. <br />This contribution of Iacono and Özkan is a new lower bound without such the requirement that trees are combined when compared, but with a new restriction: must pay pointer model costs. This result yields lower bound of Omega(loglog(n)) for pairing and sort heaps, but says nothing about Fibonacci heaps because they cheat: they do not pay pointer model costs. A pointer model version would build a tree above the array, which would have height loglog(n) and give decrease-key a similar running time. The actual proof is adversarial, and considers a whole family of distinct Fibonacci heaps that must grow larger than the total number of possible heaps, a contradiction. http://processalgebra.blogspot.com/2014/07/day-3-of-icalp-2014-guest-post-by.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-2843701412868630710Thu, 10 Jul 2014 06:36:00 +00002014-07-10T06:36:52.248ZICALP Day 2 (guest post by Andrew Winslow)<i><a href="http://www.eecs.tufts.edu/%7Eawinslow/" target="_blank">Andrew Winslow </a>was one of the colleagues who kindly answered my call for guest bloggers from ICALP 2014. Here is guest post on the second conference day. Enjoy it! </i><br /><br /> <h3>Invited Talk: Victor Kuncak</h3><a href="http://lara.epfl.ch/%7Ekuncak/">Victor</a> gave a talk entitled "Verifying and Synthesizing Software with Recursive Functions" about work with his students, including <a href="http://www.mpi-sws.org/%7Episkac/">Ruzica Piskac</a>, Phillipe Suter, <a href="http://people.epfl.ch/eva.darulova">Eva Darulova</a>, <a href="http://www.croustillant.ch/">Ettienne Kneuss</a>, and <a href="http://people.epfl.ch/andrej.spielmann">Andrej Spielmann</a>. The work focused on a number of problems in the area of turning a specification into a program that meets it. He did a great job of breaking out four types of problems they're working on: <br /> <table border="1"> <tbody><tr align="center"><td> </td><td> Run-time </td><td> Compile-time</td></tr><tr align="center"><td> Have specification C and program P</td><td> Assertion checking <br /> (Check P meets C) </td><td> Prove correctness <br /> (Prove P always meets C) </td></tr><tr align="center"><td> Have specification C </td><td> Constraint programming <br /> (Carry out execution according to C) </td><td> Program synthesis <br /> (Create P meeting C) </td></tr></tbody></table>Their work is done in Scala and implemented in the <a href="http://leon.epfl.ch/">Leon</a> system. Out of the four types of problems, Victor indicated that the first two (first row of the table) are easier. Of course, easier doesn't mean easy, and he briefly covered a few of the ideas (induction, arithmetic/algebraic reasoning, SAT solvers, integer linear programs) used to achieve good empirical performance -- a few seconds to prove correctness programs of 100 lines of code or more, and counterexamples in the case of incorrect code. <br /> Constraint programming was next, and he gave the example of programming red-black tress via constraints: using as constraints the <a href="http://en.wikipedia.org/wiki/Red%C3%A2%E2%82%AC%E2%80%9Cblack_tree#Properties">five properties</a> a red-black tree must have. Insertion, for instance, would be encoded as a combination of the five properties, plus the fact that the new tree must have the elements of the old tree plus the inserted item. Although the performance was not great, he stressed that the applications of constraint programming are more along the lines of prototyping new data structures, test case generation, etc. One cool trick was using the fact that a solution is a counterexample of the negation of the constraints...reducing the problem to one in program verification. <br /> Finally, he covered most extreme problem: writing code based on a specification. Here he had some really nice examples, generating code for converting dates and times, simple data structures like sorted lists, etc. in just a few seconds. Many ideas were used, but I was especially impressed by his mention of their work on floating point representations, synthesizing programs that avoided rounding errors. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_18">Andreas Björklund and Thore Husfeldt, Shortest Two Disjoint Paths in Polynomial Time</a></h3><a href="http://cs.lth.se/english/contact/andreas-bjorklund">Andreas</a> gave the talk for this Best Paper award winner in Track A. The problem considered is a very simple one: given an undirected graph and two pairs of vertices (s1, t1) and (s2, t2), find a pair of disjoint paths whose total length is minimized. Several problems near to this one are NP-hard (e.g. minimizing the maximum of the two path lengths), so placing the problem into P is the major thrust of the paper -- the algorithms given run in O(n^11) and O(n^22) time for vertex- and edge-disjoint paths, respectively. <br /> The approach of the algorithm is almost entirely matrix-based, focusing on solving a cycle cover problem on the input graph with self-loops added to each vertex...except that doesn't quite work. Andreas did a great job of leading us on a journey where obstacle after obstacle to the approach was eliminated. Many of the issues relate to the complexity of computing permanent...indeed one of the major technical contributions is proving that computing the permanent of a matrix over a certain type of ring is in P. In the end, the necessary permanent computation is replaced with a polynomial number of determinant computations, giving the large (but polynomial) running time. <br /> In perhaps the most natural course of events, someone asked after the talk whether the technique might work for the shortest three disjoint paths. So natural was the question that a followup slide for the question was already prepared. The conclusion was "probably not", but Andreas posed a first problem to try in this direction: given an undireced graph, compute the parity of the number of cycle covers having c cycles, with c divisible by 4. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_63">Mitsuru Kusumoto and Yuichi Yoshida, Testing Forest-Isomorphism in the Adjacency List Model</a></h3>Mitsuru started by introducing the notion of <i>property testing</i> on graphs: computing whether the graph has a given property, answering correctly at least 2/3rds of the time while using only a small number of queries on the graph. In this setting, even the representation of a graph as an adjacency matrix or list matters, as checking whether a given edge is present takes too long with an adjacent list repesentation. <br /> Kusumoto and Yoshida considered the problem of testing whether two forests are isomorphic. It was known that in general graphs this problem requires Omega(sqrt(n)) queries to the graphs, and only O(1) if the graphs have bounded degree. For forests, they achieve an algorithm that uses only O(polylog(n)) queries and prove Omega(sqrt(log(n)) are needed. The algorithm works by first performing a special type of partitioning of the input graph, then testing whether each subgraph is isomorphic. The partitioning is done in a way that ensures that if the two input graphs are significantly far away from being isomorphic, then some pair of their subgraphs in their partitions are too. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43951-7_33">Rom Aschner, Matthew J. Katz, Bounded-Angle Spanning Tree: Modeling Networks with Angular Constraints</a></h3><a href="http://www.cs.bgu.ac.il/%7Eromas/">Rom</a> gave a nicely visual talk about a problem in wireless network design in the plane. The input is a set of points, and the output is a (Euclidean) minimum spanning tree (MST) with an additional constraint: the smallest angle spanning all of the edges is at most some fixed constant b (a b-MST). Another way to think about this constraint is that the largest angle between any pair of adjacent incoming edges must be at least 2*π - b. <br /> For b < π / 3, a b-MST may not even exist: three points at the vertices of an equilateral triangle require at least one of the points to have two incoming edges with interior angle π / 3. For b >= 8 π / 5, the b-MST is simply the minimum spanning tree, as the upper degree bound of 5 on every node in an MST ensures the smallest angle spanning all of the edges is at least 2 * π - 2 π / 5 = 8 π / 5. Finally, for b < 1/2, there exists a simple family of examples (n-1 points placed collinearly ε distance apart and a final point distance 1 from the shared line) that causes the b-MST to have total weight ε * (n - 1) + 1 and b-MST to have total weight 1 * (n - 1) = n - 1. So the non-trivial b are those in the interval [1/2, 8/5*pi). <br /> For these, Aschner and Katz prove both NP-hardness and approximation results. They prove that finding the b-MST for b = π and b = 2 π / 3 are both NP-hard, using a reduction from Hamiltonian path in square and hexagonal grid graphs, respectively. They also achieve constant-factor approximation algorithms for b = π, 2 π / 3, π / 2. The approximation algorithms use a common sequence of steps: <br /><ol><li>Compute the MST. </li><li>Turn the MST into a Hamiltonian cycle via a tour around the boundary of the MST. </li><li>Decompose the points into consecutive groups along the cycle. </li><li>For each group, compute a set of edges connecting the points and minimizing total edge length. </li><li>Connect adjacent groups using the shortest edge possible. </li></ol>Step 4 requires a careful selection of group sizes, as larger groups give greater potential for shorter collections of edges, but for large enough b, actually connecting the points may not be possible. The resulting approximation ratios are 16 and lower, and can further be reduced by a neat pigeonhole argument regarding shofting the groupings along the tour. <h3>Canal Tour and Conference Dinner</h3>The day concluded with a tour through the canals of Copenhagen and dinner at the Odd Fellow Palace. The <a href="http://www.eatcs.org/index.php/component/content/article/1-news/1908-goedel-prize-2014-">2014 Gödel Prize</a> was awarded to <a href="http://researcher.watson.ibm.com/researcher/view.php?person=us-fagin">Ronald Fagin</a>, <a href="http://il.linkedin.com/pub/amnon-lotem/1/226/3a3">Amnon Lotem</a>, and <a href="http://www.wisdom.weizmann.ac.il/%7Enaor/">Moni Naor</a>. Moni gave a great historical and technical talk on the <a href="http://researcher.watson.ibm.com/researcher/files/us-fagin/jcss03.pdf">work</a> for which they received the award, including the threshold algorithm. Ronald Fagin also spoke briefly about Michael Franklin, the "missing fourth author" of the work, and his role in facilitating the successful collaboration. <br />http://processalgebra.blogspot.com/2014/07/icalp-day-2-guest-post-by-andrew-winslow.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-1835328607225973344Wed, 09 Jul 2014 21:44:00 +00002014-07-10T07:43:08.400ZJuly 8, 2014 — ICALP Review (guest post by Clément Canonne)<i>Here is a first guest post from ICALP 2014 kindly written by <a href="http://www.cs.columbia.edu/~ccanonne/" target="_blank">Clément Canonne</a>. Enjoy it! (This post is also available in <a href="http://www.ru.is/~luca/ICALP2014/Canonne1.pdf" target="_blank">PDF</a>. Any typo or typesetting issue with the HTML version is my responsibility.)</i><br /><h3> </h3><h3>On DNF approximators for monotone Boolean functions (Eric Blais)</h3>In this talk, <a href="http://people.csail.mit.edu/eblais/">Eric Blais</a> presented joint work with <a href="http://www.nada.kth.se/%7Ejohanh/">Johan Håstad</a>, <a href="http://www.cs.columbia.edu/%7Erocco/">Rocco Servedio</a> and <a href="http://www.cs.columbia.edu/%7Eliyang/">Li-Yang Tan</a>, concerned with Boolean functions. More precisely, "the simplest representations of functions": DNF (Disjunctive Normal Form) formulas.<br />For a little bit of background, recall that a Boolean function f : {0,1}<sup>n</sup> →{0,1} defined on the hypercube [2] is a DNF if it can be written as<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-6kys58dzkY8/U72yGuoSW-I/AAAAAAAAQWI/RCIr_h_vmoI/s1600/icalp-0706-ericblais-ondnfapproximators0x.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-6kys58dzkY8/U72yGuoSW-I/AAAAAAAAQWI/RCIr_h_vmoI/s1600/icalp-0706-ericblais-ondnfapproximators0x.png" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"></div><center class="math-display"></center>that is as an OR of AND’s. One can also see such functions as being eactly those taking value 1 on an "union of subcubes" (if One prefers. I will not argue with One).<br /><br />A nice property of DNF formulas is that they are arguably amongst the simplest of all representations of Boolean functions; while formulas of depth ≥ 3 are a nightmare, DNFs have been extensively studied, and by now "Everything is known about them". Well, <i>almost</i> everything.<br /><br />Indeed, amidst other facts, we have that<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-2r1" name="x1-2r1"></a> <b>Theorem 1</b> (Folklore).</span> Every Boolean function can be computed by a DNF of size 2<sup>n-1</sup>.<br /><br /></div><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-3r2" name="x1-3r2"></a> <b>Theorem 2</b> (Lupanov ’61).</span> This is tight (PARITY<sub>n</sub> needs that much).<br /><br /></div><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-4r3" name="x1-4r3"></a> <b>Theorem 3</b> (Korshunov '81, Kuznetsov '83).</span> A random Boolean function can be computed by DNFs of size Θ(2<sup>n</sup>∕log n) (and requires that much).<br /><br /></div>So... are we done yet? The mere presence of Eric in the auditorium was a clear hint that all was not settled. And as it turns out, if the picture is well understood for <i>exact</i> computation of Boolean functions by DNFs, what about <i>approximate</i> representation of a function? That is, what about the size required to approximate a Boolean function by a DNF, if one allows error ε (as a fraction of the inputs).<br /><br />This leads to the notion of <b>DNF approximator complexity</b>; and here again some results – much more recent results:<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-5r4" name="x1-5r4"></a> <b>Theorem 4</b> (Blais–Tan ’13).</span> Every Boolean function can be approximated by a DNF of size O(2<sup>n</sup>∕log n). Furthermore, our all friend PARITY<sub>n</sub> only needs DNF size O(2<sup>(1-2ε)n</sup>).<br /><br /></div>That’s <i>way</i> better than 2<sup>n-1</sup>. So, again – are we done here? And, again... not quite. This brings us to the main point of the paper, namely: what about <i>monotone</i> functions? Can they be computed more efficiently? Approximated more efficiently? (Recall that a Boolean function f is monotone if x ≼ y implies f(x) ≤ f(y), where ≼ is the coordinate-wise partial order on bit-strings.)<br />As a starter: no.<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="1/2</sup>sup>x1-6r5" name="x1-6r5"></a> <b>Theorem 5</b> (Folklore</span>) Every monotone Boolean function can be computed by a DNF of size O(2<sup>n</sup>∕n<sup>1/2</sup>) (using subcubes rooted on each min-term); and again, this is tight for PARITY.</div>Furthermore, and quite intuitively, using negations does not buy you anything to compute a monotone function (and why should it, indeed?):<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-7r6" name="x1-7r6"></a> <b>Theorem 6</b> (Quine ’54).</span> To compute monotone Boolean functions, monotone DNFs are the best amongst DNFs.</div>Not surprising, I suppose? Well... it’s a whole new game when one (one, again!) asks only for approximations; and that’s the gist of the paper presented here. First of all, drastic savings in the size of the formulas!<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-8r7" name="x1-8r7"></a> <b>Theorem 7</b> (Blais–Hastad–Servedio–Tan ’14).</span> Every monotone Boolean function can be approximated by a DNF of size O(2<sup>n</sup>∕2<sup>Ω(n<sup>1/2</sup>)</sup> ).</div>Eric gave a high-level view of the proof: again, it works by considering the subcubes rooted on each min-term, but in two steps:<br /><ul><li>Regularity lemma: the world would be much simpler if all subcubes were rooted on the same level of the hypercube; so first, reduce it to this case (writing f = f<sub>1</sub> + .....+ f<sub>k</sub>, each f<sub>i</sub> has this property)</li><li>then, approximate independently each f<sub>i</sub>, using a probabilistic argument (via random sampling), to prove there exists a good approximator for all f<sub>i</sub>’s, and then stitching them together.</li></ul>And they also show it is tight: this time with the majority function MAJ<sub>n</sub>. The proof goes by a counting argument and concentration of measure on the hypercube (every or almost every input is on the middle "belt" of the hypercube; but each subcube thus has to be rooted there, and each cannot cover too much... so many are needed)<br /><br />So, approximation <i>does</i> buy us a lot. But clearly, using negations shouldn’t, should it? Why would allowing non-monotone DNF’s to approximate monotone functions <i>ever</i>help? (<b>Hint:</b> it does.) (Yep.)<br /><br /><div class="theorem"><span class="head"><a href="https://www.blogger.com/null" id="x1-9r8" name="x1-9r8"></a> <b>Theorem 8</b> (Blais–Hastad–Servedio–Tan ’14).</span> For every n, there exists ε<sub>n</sub> and f : {0,1}<sup>6n</sup> →{0,1} such that<br /><ul><li>f can be ε<sub>n</sub>-approximated by DNFs of size O(n);</li><li>any <i>monotone</i> DNF ε<sub>n</sub>-approximating f must have size Ω(n<sup>2</sup>).</li></ul></div>(Take that, intuition!)<br /><br /><b>The upshot:</b> <i>exact</i> computation and <i>approximate</i> computation have intrinsically <b>very</b> different properties!<br /><br />Eric then concluded with an open question: namely, how to improve/better understand the gap between approximating functions with monotone DNF vs. approximating them with general DNF’s (the currently known gap in the size being quite huge – almost exponential). Additionally, how to get a separation as in the mind-boggling theorem above, but changing the quantifiers – that is, for a constant ε independent of n?<br /><br />Also, can someone fix my intuition? I think it’s broken.<br /><div align="right"><br /></div><ul style="list-style-type: none; margin: 0; padding: 0;"><li>[1] <a href="http://www.cs.columbia.edu/%7Erocco/papers/icalp14.html">http://www.cs.columbia.edu/~rocco/papers/icalp14.html</a></li><li>[2] Not <a href="http://en.wikipedia.org/wiki/Cube_2:_Hypercube">this one</a>.</li></ul>http://processalgebra.blogspot.com/2014/07/july-8-2014-icalp-review-guest-post-by.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-7626788732971949847Wed, 09 Jul 2014 08:51:00 +00002014-07-09T08:51:25.906ZDay 1 of ICALP 2014 (guest post by Andrew Winslow)<br /><i><a href="http://www.eecs.tufts.edu/~awinslow/" target="_blank">Andrew Winslow </a>was one of the colleagues who kindly answered my call for guest bloggers from ICALP 2014. Here is guest post on the first conference day. Enjoy it! </i><h3>Conference Welcome</h3>Local organizing committee chair Thore Husfeldt kicked off ICALP by mentioning a few stats about IT University of Copenhagen (ITU), where the conference is located: <ul><li>Started in 1999(!) </li><li>2000 students. </li><li>10 theory CS faculty (mostly working in "track B" areas in ICALP parlance) </li><li>1 building. </li></ul>He also noted that ITU is separate from two other universities in Copenhagen hosting TCS conferences this month: Copenhagen University (hosting <a href="http://www.diku.dk/sea2014/">SEA</a> last week) and Technical University of Denmark (hosting <a href="http://algolog.compute.dtu.dk/swat2014/">SWAT</a> last week). <h3>Invited Talk: Claire Matthieu</h3>Claire presented work entitled "Homophily and the Emergence of a Glass Ceiling Effect in Social Networks", joint work with Chen Avin, Zvi Lotker, Barbara Keller, David Peleg, and Yvonne-Ann Pignolet. She started the talk by asking why there's only one female Danish scientist (<a href="http://en.wikipedia.org/wiki/Inge_Lehmann">Inge Lehmann</a>) listed on the <a href="http://en.wikipedia.org/wiki/Category:Danish_scientists">Wikipedia page</a> for famous Danish scientists out of about 60 entries -- why so rare? Looking at the <a href="http://www.informatik.uni-trier.de/%7Eley/db/">DBLP</a> database data as a social network with co-authorship edges gives similarly bleak results: the induced subgraphs of men and women in the top 1000 nodes shows a large, well-connected graph and a disconnected, sparse graph, respectively. <br /> Claire and co-authors developed a formal model of growing co-authorship social networks, including assumptions about what a "glass ceiling effect" means for these networks, and proved that three properties are minimal sufficient set of properties to imply the effect. These properties are: <br /><ul><li>Preferential attachment: a "rich get richer" effect where incoming students choose to work an advisor with probability proportional to the number of co-authors the advisor has. </li><li>Minority: an incoming student is female with probability r < 0.5. </li><li>Homophily: students stick with an advisor of the same gender with probability 1, otherwise find a new advisor with probability p < 1. </li></ul>Incoming students are iteratively added to the graph to form growing random graphs, repeatedly chosing new advisors according to homophily and preferential attachment. The glass ceiling effect is defined by looking at all nodes with degree k, where k = k(n) chosen so that the number of such nodes goes to infinity with n, and examining the ratio of women to men in this set. If the expected ratio of female over male nodes goes to 0 as the number of nodes goes to infinity, then the system is said to have a glass ceiling effect for the parameters r, p chosen. They are able to prove that the above three properties imply the class ceiling effect, and removing any one of them does not. The model was also verified experimentally using the DBLP database. <br /> As a final twist, Claire considered modifying the model to account to capture the "men are intrinsically better" hypothesis, giving new male students two advisors rather than one. This was proven <i>not</i> to cause the glass ceiling effect. I was really struck by the meta-ness of the talk and how natural the problem seems. In the formal study of (social) networks, isn't the most natural network of study the one that directly impacts our ability to formally study networks? <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_36">György Dósa and Jiří Sgall. Optimal Analysis of Best Fit Bin Packing.</a></h3>Dösa and Sgall complete the analysis of two classic (online) algorithms for the standard bin packing problem: given a collection of items specified by numbers in [0, 1], assign these items to the fewest number of bins where each bin has an item total of at most 1. The two algorithms, first-fit and best-fit, process the items one-by-one, placing each item permanently into an existing bin if possible, otherwise placing the item into a newly created bin. First-fit and best-fit differ only in the criteria by which they place item into existing bins, using the oldest bin (first-fit) or bin that would have the least remaining room after the item is placed into it (best-fit). It was previously shown that for every instance with optimal solution using OPT bins, first-fit and best-fit use ceil(1.7*OPT) bins and there exist instances where both use 1.7*OPT bins. Dösa and Sgall improved the upper bound to 1.7*OPT bins, dropping the ceiling and completing the analysis of the competitive ratio of these algorithms. Jiří commented that he felt that such classic algorithms deserved a complete analysis and I agree; the talk had an air of finality, having put the 40-year-old gap to rest. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_39">Hossein Esfandiari, Mohammadtaghi Hajiaghayi, Reza Khani, Vahid Liaghat, Hamid Mahini and Harald Räcke. Online Stochastic Reordering Buffer Scheduling.</a></h3>Vahid Liaghat gave this talk on a scheduling problem where items have types from a fixed universe and enter into a buffer of sized size k. One can then process all items of a type, flushing them from a buffer and causing new items to take their place. The cost of processing a sequence of items is either the number of processing steps used (block operation model) or number of times the type processed changes (standard model). It was known that a O(loglog(k))-competitive algorithm is possible for the adversarial/worst-case. This work studies the sitation where the input is not adversarial, but is randomly sampled from some set. Esfandiari et al. achieve an average-case O(1)-competitive algorithm for both the block operation and standard models for the case where an adversary designs an input that is then randomly permuted. The analysis uses several lemmas regarding the optimal solutions of various buffer sizes as well as threshold algorithms: algorithms that process each type as soon as a specific number of occurrences of a type is exceeded. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_32">Erik D. Demaine, Yamming Huang, Chung-Shou Liao and Kunihiko Sadakane. Canadians Should Travel Randomly.</a></h3>This paper attracted <a href="https://plus.google.com/+SureshVenkatasubramanian/posts/1VPq3AbuQda">a few comments</a> related to the curious title. The title comes from the "canandian traveler problem" of study, introduced by Papadimitriou and Yannakakis in 1991. The problem is a shortest path problem with partial information : some of the edges of the path are blocked (by intense canadian snowfall) and cannot be traversed, but this is only known after a traveler has visited an endpoint of the blocked edge. The parameterized version of the problem has k blocked edges, and the goal is find an algorithm with good competitive ratio compared to the shortest path that avoids all blocked edges. For deterministic algorithms, tight 2k+1 upper and lower bounds on the ratio are known, while for randomized algorithms, only a lower bound of k+1 (and implied upper bound of 2k+1) were known. <br /> Demaine, Huang, Liao, and Sadakane improve the best-known randomized algorithm in two ways, giving a polynomial-time algorithm that achieves a ratio of (2 - o(1))k + 1, and a pseudo-polynomial-time algorithm (parameterized by k, the number of blocked edges) that achieves a (1 + sqrt(2)/2)k + 1 ratio. The ideas for both algorithms are to repeatedly compute a collection of nearly shortest paths, traverse them each until blocked, and repeating the process with the new information if none of the paths lead to reaching the destination. A careful selection of the number of paths used then yields the bound. The main difference between the two algorithms is exactly what short paths are used; the pseudo-polynomial-time algorithm uses a list of shortest paths, whereas the polynomial-time algorithm only finds paths within a constant factor of the shortest. <br /><h3><a href="http://link.springer.com/chapter/10.1007/978-3-662-43948-7_43">Dmitry Gavinsky and Shachar Lovett. En Route to the log-rank Conjecture: New Reductions and Equivalent Formulations.</a></h3>Dmitry started by reviewing two-party communication problems, where the goal is to compute a combined Boolean function f of inputs x and y held by the two parties while passing the fewest number of bits between the parties. One can consider the matrix defined by the two inputs, with an entry for every (x, y) pair, called the Boolean matrix. The rank of this matrix (and Boolean function f) is the minimum number of rectangles found in some partition of the matrix into rectangular blocks of entries with the same value. It is known that if a c-bit communication protocol is possible, then rank of the matrix is at most 2^c, i.e. the communication complexity (in bits) is bounded from below by log(rank(f)). The log-rank conjecture is that polylog(rank(f)) is an upper bound on the communication complexity of computing f. <br /> Part of this work by Gavinsky and Lovett is to provide a number of equivalent versions of the problem that may provide a way to make progress on the log-rank conjecture. For instance, they show that proving the log-rank conjecture for the randomized communication complexity on low-rank functions implies the log-rank conjecture for the deterministic version, as does proving the conjecture for the information cost of f, the minimum amount of information given by each party the other party in the worst-case. <br /><h3>EATCS General Assembly</h3>The day ended with the EATCS general assembly led by Luca Aceto and appearances by the many people involved in ICALP and EATCS. ICALP 2015 will be in Kyoto, Japan, and some information about travel, accomodations, and Kyoto were presented by Kazuo Iwama, and ICALP 2016 will be in Rome, Italy. Some statistics about ICALP 2014 were given by Elias Koutsoupias -- the number of submissions is up from previous years, acceptance rate is about steady at 30%, and the vast bulk of the submissions were to to Track A. <br /> As one final thought from the day, the organization of the conference so far has been top-notch. Many of the talks are online (including <a href="https://www.youtube.com/watch?v=XyewnrPciqw">Claire Matthieu's</a>), the sessions start and end on time, sound and projection issues are non-existent, and the food/drink is tasty (and rotates every break...). http://processalgebra.blogspot.com/2014/07/day-1-of-icalp-2014-guest-post-by.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-3696694863057547650Mon, 07 Jul 2014 19:00:00 +00002014-07-07T19:00:42.500ZIn Copenhagen for ICALP 2014It is good to be back in lovely Copenhagen and breathe the atmosphere of the Danish capital city.<br /><br />One of the first things I saw when arriving in Kongens Nytorv was a smiling guy showing a sign to cyclists and car drivers that read "Husk; du er smuk" (Remember; you are beautiful).<br /><br />The <a href="http://www.carstendahl.dk/" target="_blank">Carsten Dahl </a>Trio opened the <a href="http://www.jazz.dk/" target="_blank">Copenhagen Jazz Festival </a>events at the legendary <a href="http://www.jazzhusmontmartre.dk/" target="_blank">Jazzhus Montmartre</a> (which can host 150 people) with a lunch concert to launch <a href="https://www.youtube.com/watch?v=wG2pNJvMTNc" target="_blank">their new recording</a>. <br /><br />The ICALP welcome reception was an opportunity to meet colleagues, thank the organizing committee for all the work they have done in preparing the conference and to enjoy the band <a href="http://www.degraed.dk/">De Græd</a>, which created a jazzy and relaxed ambience.<br /><br />The conference kicks off tomorrow at 6:30am GMT with the invited talk <em>Homophily and the Glass Ceiling Effect in Social Networks </em>by <a href="http://www.di.ens.fr/ClaireMathieu.html">Claire Mathieu</a> (ENS Paris). The talk will be <a href="https://www.youtube.com/watch?feature=player_embedded&v=XyewnrPciqw" target="_blank">streamed live</a> as will all the other <a href="http://icalp2014.itu.dk/en/Events-and-Attractions/~/link.aspx?_id=A05D2ACCF114459EB1768AEA678F732A&_z=z" target="_blank">invited talks</a> and most of the other <a href="http://icalp2014.itu.dk/en/Events-and-Attractions/Video" target="_blank">plenary events</a>. <br /><br />Watch this space for some reports on ICALP 2014. http://processalgebra.blogspot.com/2014/07/in-copenhagen-for-icalp-2014.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-1259090727798045664Fri, 04 Jul 2014 10:04:00 +00002014-07-04T10:04:08.797ZMusic composed for the ICALP 2014 Gödel Prize ceremony gets coverage in Nature! The piece of music composed for the ICALP 2014 Gödel Prize ceremony gets coverage in <a href="http://www.nature.com/news/enigmatic-foundations-of-maths-put-to-music-1.15502" target="_blank">Nature</a>! See also the video presenting the composition (in Danish, but with English sub-titles).<br /><br /><div class="separator" style="clear: both; text-align: center;"><object width="320" height="266" class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="https://ytimg.googleusercontent.com/vi/7W_SJ8rUdIQ/0.jpg"><param name="movie" value="https://youtube.googleapis.com/v/7W_SJ8rUdIQ&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="320" height="266" src="https://youtube.googleapis.com/v/7W_SJ8rUdIQ&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div><br /><br />Thanks to Thore Husfeldt for adding this further twist to the award ceremony for the Gödel Prize! I am looking forward to the event very much. <a class="link customisable" data-expanded-url="http://www.nature.com/news/enigmatic-foundations-of-maths-put-to-music-1.15502" data-scribe="element:url" dir="ltr" href="http://t.co/AZAGu3sulJ" rel="nofollow" target="_blank" title="http://www.nature.com/news/enigmatic-foundations-of-maths-put-to-music-1.15502"><span class="tco-ellipsis"></span></a>http://processalgebra.blogspot.com/2014/07/music-composed-for-icalp-2014-godel.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-3314106519634156567Sun, 29 Jun 2014 15:56:00 +00002014-07-01T11:53:06.443ZIssue 113 of the Bulletin of the EATCS is outIssue 113 of the Bulletin of the EATCS is now available <a href="http://www.eatcs.org/beatcs/index.php/beatcs/issue/view/15" target="_blank">on line</a> abd be downloaded as a <a href="http://www.eatcs.org/images/bulletin/beatcs113.pdf" target="_blank">single PDF file</a>. As usual, the bulletin is freely accessible for everyone.<br /><br />In the current issue, you will find very interesting survey articles on, for instance, the <a href="http://www.eatcs.org/beatcs/index.php/beatcs/article/view/266/249" target="_blank">complexity of valued constraint satisfaction</a>, <a href="http://www.eatcs.org/beatcs/index.php/beatcs/article/view/285/267" target="_blank">kernelization</a> and <a href="http://www.eatcs.org/beatcs/index.php/beatcs/article/view/286/268" target="_blank">contextual semantics</a>. I strongly recommend the first installment of the Concurrency Column edited by Nobuko Yoshida on <a href="http://www.eatcs.org/beatcs/index.php/beatcs/article/view/269/251" target="_blank">recreational formal methods</a>. The piece by Frits Vaandrager and Freek Verbeek tells us how to design vacuum cleaning trajectories using Uppaal, SAT solvers and theorem provers.<br /><br />I hope that you will enjoy this issue of the BEATCS. At the <a href="http://icalp2014.itu.dk/en/Events-and-Attractions/~/link.aspx?_id=0C3438C886FF4AE3A817ADED0B5BB675&_z=z" target="_blank">EATCS general assembly</a>, which will be held at ICALP 2014 in Copenhagen, we will discuss the developments of the BEATCS. Your input to the discussion is very valuable. <br /><br /><br />http://processalgebra.blogspot.com/2014/06/issue-113-of-bulletin-of-eatcs-is-out.htmlnoreply@blogger.com (Luca Aceto)3tag:blogger.com,1999:blog-27705661.post-8120934170533719898Sun, 15 Jun 2014 12:52:00 +00002014-06-16T17:27:15.713ZSad news: Berthold Vöcking passed away<a href="http://algo.rwth-aachen.de/~voecking/" target="_blank">Berthold Vöcking</a>, who was a professor for Algorithms and Complexity at RWTH Aachen, passed away on 11th June after a long illness. He was only 47.<br /><br />Berthold was a leading figure in algorithmics research in Europe, was an invited speaker at ICALP 2012 and was one of the authors of the best paper for Track C at this year's ICALP, where we will remember him during the award session.<br /><br />Our thoughts go to his family.<br /><br />Addendum: For some information on Berthold's work, do read <a class="entryheader" href="http://mybiasedcoin.blogspot.com/2014/06/sad-news-berthold-vocking.html">Sad News: Berthold Vöcking</a> by <a class="entryheader" href="http://mybiasedcoin.blogspot.com/" title="My Biased Coin">Michael Mitzenmacher's blog</a>. http://processalgebra.blogspot.com/2014/06/sad-news-berthold-vocking-passed-away.htmlnoreply@blogger.com (Luca Aceto)5tag:blogger.com,1999:blog-27705661.post-1313925714632781272Mon, 09 Jun 2014 10:45:00 +00002014-06-09T10:45:00.950ZAnother computer scientist becomes rector of an Italian universityI just heard that <a href="http://www.dsi.unive.it/~michele/" target="_blank">Michele Bugliesi</a> has been elected as the new rector of the Universita' Ca' Foscari in Venice. (Italian speaking readers may wish to look <a href="http://www.michelebugliesi2014.it/" target="_blank">here</a> for details.) Michele is yet another (theoretical) computer scientist who becomes rector of an Italian university. This is a sign of recognition for our discipline as a whole, as well as for the Italian computer science community.<br /><br />I am sure that Michele will do a great job and I wish him the best of luck in his new, and challenging, role. http://processalgebra.blogspot.com/2014/06/another-computer-scientist-becomes.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-3720815079262448211Wed, 04 Jun 2014 10:31:00 +00002014-06-04T10:31:14.861ZCall for guest posts from ICALP 2014If you are going to ICALP 2014 and you are willing to contribute guests posts on that conference on this blog, drop me a line. It would be good to have reports on the three tracks, on the invited talks and on the award-related events, as well as on the conference as a whole.<br /><br /><br />http://processalgebra.blogspot.com/2014/06/call-for-guest-posts-from-icalp-2014.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-7416815054580557593Tue, 03 Jun 2014 20:41:00 +00002014-06-03T20:41:20.962ZHelga Guðmundsdóttir lands one of Google’s 2014 Anita Borg ScholarshipsMy colleagues and I at the <a href="http://en.ru.is/CS/" target="_blank">School of Computer Science at Reykjavik University</a> are thrilled by the recent news that <a href="https://www.linkedin.com/pub/helga-gudmundsdottir/57/413/410" target="_blank">Helga Guðmundsdóttir</a>, one of our master students and one of the very best BSc students we have ever had, has been selected as one of <a href="https://www.google.com/anitaborg/emea/winners.html" target="_blank">Google’s 2014 Anita Borg Scholarship recipients</a>. Congratulations to Helga for this achievement! <br /><br />Apart from being an outstanding student, who has already done <a href="http://arxiv.org/abs/1401.1723" target="_blank">some research in algorithms for wireless networks</a> and has had successful internships at the Fraunhofer Center for Experimental Software Engineering (University of Maryland) and Cornell University, Helga is also a role model for our female students and fantastic ambassador for computer science. She is one of the founders of <a href="http://www.sky.is/index.php/item/1692-sys-tur" target="_blank">/sys/tur</a>, the association of female computer scientists at Reykjavik University. I was amazed by how active the association is in promoting computer science at all our outreach events. <br /><br />I don't need to look at my crystal ball to forecast a bright future for Helga and that she will go from strength to strength whatever she decides to do. <br /><table summary="Overview for Helga Gudmundsdottir"><tbody><tr id="overview-summary-current"><th scope="row"><br /></th><td><br /></td></tr><tr id="overview-summary-past"><th scope="row"><br /></th><td><br /></td></tr></tbody></table>http://processalgebra.blogspot.com/2014/06/helga-gumundsdottir-lands-one-of.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-5977461907289004903Sat, 31 May 2014 22:18:00 +00002014-05-31T22:18:23.390ZPhD positions in Computer Science at IMT Lucca (Italy)<div align="justify" style="line-height: 100%;"><style type="text/css">p { margin-bottom: 0in; direction: ltr; line-height: 150%; text-align: justify; widows: 2; orphans: 2; }p.western { font-family: "Times New Roman",serif; font-size: 12pt; }p.cjk { font-family: "Times New Roman"; font-size: 12pt; }p.ctl { font-size: 12pt; }a:link { color: rgb(0, 0, 255); }</style><i><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">As readers of this blog might <a href="http://processalgebra.blogspot.com/2012/06/phd-positions-at-imt-lucca.html" target="_blank">have noticed already</a>, <a href="http://www.imtlucca.it/" target="_blank">IMT Lucca</a> is one of the institutions in Italy that is close to my heart. I am therefore happy to advertise their ongoing call for applications for their PhD positions in Computer Science. Do encourage your students to apply: the terms of employment for PhD students are excellent and so are the facilities. The town of Lucca is lovely and has a very high quality of life. IMT is still relatively small, but it is a very ambitious graduate school. </span></span></span></span></span></i></div><div align="justify" style="line-height: 100%;"><i><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US"><br /></span></span></span></span></span></i></div><div align="justify" style="line-height: 100%;"><i><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">If your students or you are interested, IMT will be holding a <a href="http://connect.physicsworld.com/research-and-consultancy/phd-webinar-in-computer-science-and-engineering/2001645.article" target="_blank">(free) interactive webinar</a> on June 11 for any students interested in the program. </span></span></span></span></span></i></div><div align="justify" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">=========================================================</span></span></span></span></span></div><div align="left" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">PhD positions in Computer Science at IMT Lucca (Italy)</span></span></span></span></span></div><div align="left" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">- Deadline July 14, 2014 -</span></span></span></span></span></div><div align="left" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">=========================================================</span></span></span></span></span></div><div align="left" lang="en-US" style="line-height: 100%;"><br /></div><div align="left" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">The Institute for Advanced Studies IMT Lucca - Italy</span></span></span></span></span></div><div align="left" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">( announces multiple PhD scholarships (appx. </span></span></span><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">€13,600/year),</span></span></span><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">that also include accommodation and full board.</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">Deadline for application is July 14th, 2014 at 18:00 Italian time.</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">IMT Lucca (Italy) is a research university within the Italian public higher education system. IMT's mission is to establish itself as a research center that promotes cutting-edge research in key areas, structuring its PhD program in close connection with research, to attract top students, researchers and scholars through competitive international selections, and to contribute to technological innovation, economic growth and social development.</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">The three year doctoral program, which is taught entirely in English, is articulated in curricula. The 8 curricula currently offered are field-specific, although in many instances they share a common scientific background. </span></span></span><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">The curriculum in Computer Science is coordinated by Rocco De Nicola and focuses on key aspects of current research in the theory and applications of informatics, such as open-endedness, autonomy, security, concurrency, cost-effectiveness, quality of services, and dependability.</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">The main goal of the curriculum is to develop models, algorithms, and verification methods for modern distributed systems. The doctoral students enrolled in this curriculum will carry out cutting-edge research on the fundamentals and applications of architectures and languages for modern distributed systems, including global and cloud computing systems, web systems and services, and mobile systems. They will also acquire professional skills in the application of computer technologies to massively distributed systems, working in close collaboration with the SysMA research unit of IMT (<a href="http://sysma.lab.imtlucca.it/">http://sysma.lab.imtlucca.it/</a>). Graduates from the curriculum are qualified to work in universities, public and industrial research centers, and to take on professional roles and high-profile tasks and responsibilities in both private companies and public institutions.</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" class="western" style="line-height: 100%;"><span style="font-family: MgOpen Cosmetica, serif;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">PhD students, besides receiving a research scholarship, are offered on-campus housing on a newly restored and fully integrated San Francesco Complex in the historical center of the beautiful Tuscan city of Lucca, and daily access to the canteen. Students also get the opportunity to spend research periods abroad during the program, </span></span></span><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">with the possibility of receiving additional financing through the Erasmus+ program.</span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">Please note that students who are expected to obtain the required degree by October 31, 2014 will also be considered; they must still apply by July 14. Further details, along with online the application form, can be found at:</span></span></span></span></span></div><div align="justify" lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" style="line-height: 100%;"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US"><a href="http://phd.imtlucca.it/">http://phd.imtlucca.it</a></span></span></span></span></span></div><div lang="en-US" style="line-height: 100%;"><br /></div><div align="justify" class="western" style="line-height: 100%;"><span style="font-family: MgOpen Cosmetica, serif;"><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">Be sure to sign up for our free interactive webinar (<a href="http://brightrecruits.com/webinars/">http://brightrecruits.com/webinars/</a>) scheduled for June 11</span></span></span><sup><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">th</span></span></span></sup><span style="font-family: Tahoma, serif;"><span style="font-size: x-small;"><span lang="en-US">2014.</span></span></span></span></div><div lang="en-US" style="line-height: 100%;"><br /></div><div align="left" class="western" style="line-height: 100%;"><br /></div>http://processalgebra.blogspot.com/2014/05/phd-positions-in-computer-science-at.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-2166616290369649944Thu, 08 May 2014 11:06:00 +00002014-05-09T10:02:23.691ZBest paper awards at ICALP 2014The EATCS is proud to announce that the program committees of the three tracks of <a href="http://icalp2014.itu.dk/" target="_blank">ICALP 2014</a> have selected the following papers for the best paper awards: <br /><br /><div><div><br /></div><div><b>Track A:</b></div><div>Andreas Björklund and Thore Husfeldt,<span style="white-space: pre-wrap;"> </span><a href="http://thorehusfeldt.files.wordpress.com/2010/08/spdp-e5d5661.pdf" target="_blank"><i>Shortest Two Disjoint Paths in Polynomial Time</i></a></div><div><b>Track B:</b></div><div>Joel Ouaknine and James Worrell. <a href="http://arxiv.org/abs/1309.1914" target="_blank"><i>Ultimate Positivity is Decidable for Simple Linear Recurrence Sequences</i></a></div><div><b>Track C:</b></div><div>Oliver Göbel, Martin Hoefer, Thomas Kesselheim, Thomas Schleiden and Berthold Voecking, <a href="http://arxiv.org/abs/1307.3192" target="_blank"><i>Online Independent Set Beyond the Worst-Case: Secretaries, Prophets, and Periods</i></a></div><div><br /></div>The best student paper awards are given to papers that are solely authored by students. This year these awards will go to: </div><div><div><br /></div><div><b>Track A:</b></div><div>Sune K. Jakobsen,<span style="white-space: pre-wrap;"> </span><a href="http://arxiv.org/abs/1402.3125" target="_blank"><i>Information Theoretical Cryptogenography</i></a></div><div><b>Track B:</b></div><div>Michael Wehar, <a href="http://www.acsu.buffalo.edu/~mwehar/documents/mwehar_INE_2_15_14.pdf" target="_blank"><i>Hardness Results for Intersection Non-Emptiness</i></a><b><br /></b></div><div><b>Track C:</b></div><div>Mohsen Ghaffari, <a href="http://arxiv.org/abs/1404.7559" target="_blank"><i>Near-Optimal Distributed Approximation of Minimum-Weight Connected Dominating Set </i></a><i></i><br /><i><br /></i></div></div>Congratulations to the award recipients and many thanks to the <a href="http://icalp2014.itu.dk/en/Conference/Program-Committees" target="_blank">PC chairs and their PCs</a> for their sterling work!<br /><br />It is interesting to see that the best papers for 2014 are all from Europe, whereas two of the three best student papers are from the US. Having worked in Northern Europe for the best part of 20 years, I am happy to see that the best papers for Track A have Scandinavian authors. <br /><br />I hope that you will enjoy reading the award-receiving papers. <br /><br />http://processalgebra.blogspot.com/2014/05/best-paper-awards-at-icalp-2014.htmlnoreply@blogger.com (Luca Aceto)1tag:blogger.com,1999:blog-27705661.post-8332058855111387849Mon, 05 May 2014 12:24:00 +00002014-05-05T12:24:40.781ZCCC: request for volunteers, sponsoring & organizational meeting<i><span class="gD" name="Dieter van Melkebeek">Dieter van Melkebeek asked me to post the following message. See also <a href="http://computationalcomplexity.org/forum/request-for-volunteers" target="_blank">here</a></span> I encourage the members of the CCC community to reply by May 8. </i><br /><br />As you may know, after a discussion period and a recent poll (see <a href="http://computationalcomplexity.org/forum" target="_blank">http://<wbr></wbr>computationalcomplexity.org/<wbr></wbr>forum</a>), the steering committee of the Conference on Computational Complexity (CCC) is seriously considering the option of becoming an independent conference. This will only be possible if<br /> (i) enough people are willing to make a commitment and help with this endeavor, and<br /> (ii) we can gather the required startup funds.<br /> <br /> VOLUNTEERING<br /> <br /> Among other things we need volunteers for the following:<br /> - setting up the conference: creating a non-profit organization, other potential legal issues, insurance, banking, sponsoring, proceedings, registration, record keeping;<br /> - serving on the executive committee of the independent conference;<br /> - local organization for conferences in the near future.<br /> If you are willing to help, please let us know and be as specific as possible.<br /> <br /> START-UP FUNDS<br /> <br /> We'd like to get an idea of how much funding we'd be able to collect. We're considering two types:<br /> - Funds that would be used to bootstrap the conference and are intended to be returned within three years. If you would be willing to contribute to this fund, please tell us how much.<br /> - Permanent donations. If you know of contacts for possible donors (labs, institutions), please let us know.<br /> <br /> ORGANIZATIONAL MEETING<br /> <br /> If we decide to become independent, we'd set up an organizational meeting the day before and/or after CCC'14 in Vancouver, i.e., Tuesday 6/10 and/or Saturday 6/14. If you are volunteering as above, please include in your response the following:<br /> - Would you be able to attend on Tuesday 6/10: Y/N<br /> - Would you be able to attend on Saturday 6/14: Y/N<br /> <br /> Please send your response by May 8 to <a href="mailto:dieter@cs.wisc.edu" target="_blank">dieter@cs.wisc.edu</a>.<br /> <br /> Thanks for your consideration!<span><span style="color: #888888;"><br /> </span></span>http://processalgebra.blogspot.com/2014/05/ccc-request-for-volunteers-sponsoring.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-8294431471883231629Mon, 05 May 2014 07:43:00 +00002014-05-05T07:43:35.633ZPhD Scholarships at the Gran Sasso Science InstituteThe <a href="http://www.gssi.infn.it/index.php/en/" target="_blank">Gran Sasso Science Institute</a> is a new international PhD school and a centre for advanced studies in physics, mathematics, computer science and social sciences. It is located in <a href="http://en.wikipedia.org/wiki/L%27Aquila" target="_blank">L'Aquila</a> (Abruzzo, Italy) and enrolled its first bunch of PhD students this autumn. The first group of PhD students includes eight students in computer science and eight in mathematics. The institute has just advertised ten PhD fellowships, which might be of interest to your students or you. Please advertise them as you see fit. <br /><br />The institute's organization mirrors the one of other international PhD schools in Italy and has strong ties with IMT Lucca. In particular, PhD students at GSSI receive a PhD stipend, free lodging and food vouchers and pay no tuition fees. <br /><br />I arrived here on Thursday night to deliver a course. My first impression is positive: the staff at the institute are friendly and ready to assist guest professors and students, and the facilities seem good. I will try to write more on GSSI at a later time.<br /><br />As an expat from Abruzzo myself (albeit from Pescara, a <a href="http://www.abruzzoweb.it/contenuti/laquilaquarantanni-dai-moti-fu-rivoluzione-del-dolore/20054-4/" target="_blank">rival city</a> of L'Aquila since it became the prominent centre in the region), I am happy to give my tiny contribution to the development of the GSSI, which I hope will become a permanent institute after the ministerial evaluation in three years' time.<br /><br />------------ CALL for PhD Applications ----------------------------<br /><br /><div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;"><b>10 </b>fellowships at GSSI L'AQUILA Italy, for the PhD program in<br /> </span> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><span style="font-size: 12pt; font-weight: 700;"> Computer Science<br /> </span></span><span style="font-family: Helvetica, Arial, sans-serif;">In collaboration with<b> </b>IMT - Institute for Advanced Studies - Lucca</span><br /> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><a href="http://www.gssi.infn.it/phd/docs/call_english_14-15.pdf" target="_blank">http://www.imtlucca.it</a><br /> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><span style="font-weight: 700;"><br /> </span></span></div><span style="font-family: Helvetica, Arial, sans-serif;"><span style="font-size: 12pt;"></span></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><br /> </span> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;">Core Topics: <br /> - Foundations of (Modern) Networks, <br /> - Specification and Analysis of Concurrent Reactive Systems, <br /> - Software Systems and Services. </span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><br /> </span> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;"><b>Download the</b> <b>call for applications</b> at</span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><a href="http://www.gssi.infn.it/phd/docs/call_english_14-15.pdf" target="_blank">http://www.gssi.infn.it/phd/<wbr></wbr>docs/call_english_14-15.pdf</a><br /> </span> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><span style="font-weight: 700;"><br /> </span></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"> <div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;"><b>Online applications </b></span></div><div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif; font-size: medium;"><a href="http://www.gssi.infn.it/phd/" target="_blank">http://www.gssi.infn.it/phd/</a></span><span style="font-family: Helvetica, Arial, sans-serif;"><br /> </span><br /> </div><div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"> <b> Deadline June 22, 2014<br /> <br /> <br /> </b></span></div><span style="font-family: Helvetica, Arial, sans-serif;"><b>S</b><span style="font-weight: 700;">cholarships</span></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;">GSSI awards scholarships for<b> 3 years. </b></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;">The yearly amount of the scholarship is of<span style="font-weight: 700;"> </span><span style="font-weight: 700;">€ </span><span style="font-weight: 700;">16.159,91 </span>gross </span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><br /> </span> </div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><span style="font-weight: 700;">Facilities and benefits</span></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;">All PhD students <b>will receive free</b> accommodation, tuition fees waived, free luncheon vouchers.</span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif;"><b><br /> </b></span></div><span style="font-family: Helvetica, Arial, sans-serif;"> </span> <div class="gmail_default" style="font-size: 13px;"> <div class="gmail_default" style="font-size: 13px;"> <span style="font-family: Helvetica, Arial, sans-serif;"><b>Further Informations </b></span></div><div class="gmail_default" style="font-size: 13px;"><span style="font-family: Helvetica, Arial, sans-serif; font-size: medium;"><a href="http://www.gssi.infn.it/phd/" target="_blank">http://www.gssi.infn.it/</a></span><span style="font-family: Helvetica, Arial, sans-serif;"><br /> </span> </div><br /> <span style="font-family: Helvetica, Arial, sans-serif;"><b>For additional informations </b>please contact: <a href="mailto:info@gssi.infn.it" target="_blank">i<wbr></wbr>nfo@gssi.infn.it</a></span></div>http://processalgebra.blogspot.com/2014/05/phd-scholarships-at-gran-sasso-science.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-802607888957177196Fri, 02 May 2014 08:37:00 +00002014-05-02T08:37:47.123ZGödel Prize 2014 to Ronald Fagin, Amnon Lotem, and Moni Naor for Optimal Aggregation Algorithms for Middleware<span style="font-family: arial,helvetica,sans-serif;">Ronald Fagin, Amnon Lotem, and Moni Naor will receive the 2014 Gödel Prize<span lang="en"> </span>for their paper <em>Optimal Aggregation Algorithms for Middleware</em> (<a href="http://researcher.watson.ibm.com/researcher/files/us-fagin/jcss03.pdf">http://researcher.watson.ibm.com/researcher/files/us-fagin/jcss03.pdf</a>), which introduced the powerful “threshold algorithm” that is widely used in applications and systems that demand optimal results for gathering multi-sourced information. The award, which recognizes outstanding papers in theoretical computer science, is presented by the European Association for Theoretical Computer Science (EATCS) and ACM’s Special Interest Group on Algorithms and Computation Theory (SIGACT). The ceremony takes place at the International Colloquium on Automata, Languages, and Programming (ICALP) <a href="http://icalp2014.itu.dk/">http://icalp2014.itu.dk/</a> July 7-11, in Copenhagen, Denmark.</span><br /><div style="margin-bottom: 0.14in;"><span style="font-family: arial,helvetica,sans-serif;"> </span></div><span style="font-family: arial,helvetica,sans-serif;"> </span><br /> <div style="margin-bottom: 0.14in;"><span style="font-family: arial,helvetica,sans-serif;"> The prize-winning paper provides a framework to design and analyze algorithms where aggregation of information from multiple data sources is needed, such as in information retrieval and machine learning. In these situations, the threshold algorithm offers a very efficient method for producing a single unified list of the “top k” results from the combined data sources. The threshold algorithm’s elegant mathematical properties and simplicity are particularly suitable for use in middleware, software that is often used to augment computer operating systems that support complex, distributed applications. The authors also introduced the notion of instance optimality, an extremely strong guarantee of performance, and showed that the threshold algorithm is instance optimal. The paper’s groundbreaking results have built a foundation for much follow-on research. </span></div><div style="margin-bottom: 0.14in;"><span style="font-family: arial,helvetica,sans-serif;">Congratulations to the award recipients and many thanks to the Gödel Prize Committee for this year!</span></div>http://processalgebra.blogspot.com/2014/05/godel-prize-2014-to-ronald-fagin-amnon.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-8543231391367135212Sat, 19 Apr 2014 18:48:00 +00002014-04-19T18:48:46.002ZACM SIGLOG charteredAfter a journey of many years, ACM SIGLOG is now officially chartered and will play an important role in spreading the gospel of the intimate connections between logic and computation and in their further developments. Congratulations to all the people who worked very hard over the last seven years to make this happen!<br /><br /><a href="http://www.cs.mcgill.ca/~prakash/" target="_blank">Prakash Panangaden</a> is the first SIGLOG chair and together with his team is working on getting the web site up and running and the SIGLOG Newsletter in shape for the first issue. <br /><br />As a member of the research community and as current president of the European Association for Theoretical Computer Science, I wish SIGLOG the best of luck and look forward to a fruitful cooperation between the EATCS and SIGLOG. <br /><br />For the moment I would like to encourage my readers to join SIGLOG officially.<br /><br />The link is:<br /><br /> <a href="https://campus.acm.org/public/qj/gensigqj/siglist/gensigqj_siglist.cfm" target="_blank">https://campus.acm.org/<wbr></wbr>public/qj/gensigqj/siglist/<wbr></wbr>gensigqj_siglist.cfm</a><br /><br /><br />One can join SIGLOG without joining the ACM. <br />http://processalgebra.blogspot.com/2014/04/acm-siglog-chartered.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-4628101056346093931Wed, 16 Apr 2014 15:39:00 +00002014-04-16T16:17:39.712ZAccepted papers for ICALP 2014The list of accepted papers for <a href="http://icalp2014.itu.dk/" target="_blank">ICALP 2014</a> is now available <a href="http://icalp2014.itu.dk/en/Conference/Accepted-Papers" target="_blank">here</a>. The PC chairs told me that the quality of the submissions was very good and the scientific programme for the conference looks mouth-watering. Apart from the contributed papers and the <a href="http://icalp2014.itu.dk/en/Conference/Invited%20Speakers" target="_blank">excellent invited speakers</a>, there will also be <a href="http://icalp2014.itu.dk/en/Conference/Awards" target="_blank">three award presentations</a>. The <a href="http://icalp2014.itu.dk/en/Events-and-Attractions/Conference-Dinner" target="_blank">conference dinner </a>also promises to be a cultural highlight and the <a href="http://www.jazz.dk/en/copenhagen-jazz-festival-2014/" target="_blank">Copenhagen Jazz Festival</a> will be in full swing. <br /><br />There is going to be <a href="http://icalp2014.itu.dk/en/Events-and-Attractions/Other-Attractions" target="_blank">a lot going on in Copenhagen</a> for TCS buffs this summer, which makes it one of the two places to be. (The other is <a href="http://vsl2014.at/" target="_blank">Vienna</a>.) <br /><br />I hope to see many of you at what will be a memorable ICALP. Thanks to Thore Husfeldt and his team for all the sterling work they are doing!http://processalgebra.blogspot.com/2014/04/accepted-papers-for-icalp-2014.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-7906939588062894313Mon, 14 Apr 2014 14:12:00 +00002014-04-14T14:13:20.178ZFirst EATCS Young Researcher School on Automata, Logic and Games<br />In the year 2013, the European Association for Theoretical Computer Science (EATCS) established a series of Young Researcher Schools on TCS topics. The first such school is devoted Automata, Logic and Games, and it will be held in Telc, Czech Republic, from July 27 to August 1, 2014.<br /><div class="a3s" id=":1l1"></div><div class="a3s" id=":1l1">The programme consists of five Basic Tutorials (four hours each) devoted to fundamental subjects, and eight Advanced Lectures (2 hours each) focussed on recent results and specific topics. <br /><br />Basic Tutorials<br />---------------<br /><br />- Probabilistic Model-Checking<br /> Christel Baier (Dresden)<br /><br />- Logic and Databases<br /> Phokion G. Kolaitis (Santa Cruz)<br /><br />- Games and Synthesis<br /> Nir Piterman (Leicester)<br /><br />- Logic and Automata<br /> Wolfgang Thomas (Aachen)<br /><br />- Timed Automata<br /> Wang Yi (Uppsala)<br /><br /><br />Advanced Lectures<br />-----------------<br /><br />- The Unbounding Quantifier<br /> Mikolaj Bojanczyk (Warsaw)<br /><br />- Robustness in Timed Systems<br /> Patricia Bouyer-Decitre (Cachan)<br /><br />- A Logic-Based Approach to Cloud Computing<br /> Jan Van den Bussche (Hasselt)<br /><br />- Regular Automata and Monadic Theory<br /> Didier Caucal (Paris)<br /><br />- Stochastic model checking - A continuous time perspective<br /> Holger Hermanns (Saarbruecken)<br /><br />- Synthesis of Recursive Programs<br /> Martin Lange (Kassel)<br /><br />- Infinite-State Probabilistic Systems<br /> Richard Mayr (Edinburgh)<br /><br />- Prophetic Automata<br /> Thomas Wilke (Kiel)<br /></div><div class="a3s" id=":1l1"></div><div class="a3s" id=":1l1">See <a href="http://eatcs-school.fi.muni.cz/" target="_blank">http://eatcs-school.fi.muni.<wbr></wbr>cz/ </a> for further details. </div>http://processalgebra.blogspot.com/2014/04/first-eatcs-young-researcher-school-on.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-1370148272739556547Fri, 11 Apr 2014 08:30:00 +00002014-04-11T08:30:25.266ZAdam W. Marcus, Daniel A. Spielman and Nikhil Srivastava to receive the Pólya Prize 2014According to the <a href="http://www.siam.org/prizes/sponsored/polya.php" target="_blank">web site for the prize</a>, Adam W. Marcus, Daniel A. Spielman and Nikhil Srivastava will receive the Pólya Prize 2014. <br /><br />The George Pólya Prize, established in 1969, is given every two years, alternately in two categories: (1) for a notable application of combinatorial theory; (2) for a notable contribution in another area of interest to George Pólya such as approximation theory, complex analysis, number theory, orthogonal polynomials, probability theory, or mathematical discovery and learning.<br /><br />There does not seem to be a press release on the SIAM web site, but this should not prevent us from congratulating Adam, Dan and Nikhil for receiving this award. Congrats!http://processalgebra.blogspot.com/2014/04/adam-w-marcus-daniel-spielman-and.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-6400132250343596629Sun, 23 Mar 2014 11:48:00 +00002014-03-23T11:48:26.294ZContemplate LtdThese are days in which one of the outcomes of the work academics do, and one of the measures of its impact, is commercial exploitation of research and development carried out within the four walls of the "Ivory Tower". Universities the world over have different approaches towards commercial exploitation of research funding and IP rights and mine is no exception, apart from being a bit late in this game.<br /><br />A discussion of IP policy issues might be the topic for a future post. Here I will just limit myself to pointing out an excellent example of a spin-off company from the University of Edinburgh, <a href="http://www.contemplateltd.com/" target="_blank">Contemplate Ltd</a>, whose CTO and founder is <a href="http://homepages.inf.ed.ac.uk/dts/" target="_blank">Don Sannella</a>. (Disclaimer: I have absolutely no connection with Contemplate myself!)<br /><br />Contemplate was founded to commercialise research on <a href="http://en.wikipedia.org/wiki/Static_program_analysis" target="_blank">static analysis</a> done at the University of Edinburgh. Its product, <a href="http://www.contemplateltd.com/threadsafe" target="_blank">ThreadSafe</a>, pinpoints and helps to diagnose the most common and pernicious Java concurrency bugs. Concurrency is essential for high performance and low latency, but concurrent programming is hard to do right and therefore the use of automatic analysis tools should play an important role in the development of parallel software.<br /><br />ThreadSafe is available as an easy-to-use Eclipse plug-in, which relates bug reports directly to the source code, and also as a SonarQube plugin (for team working). Also, by the end of March, as a command-line tool which generates an HTML report (for use with build tools).<br /><br /><a href="http://www.infoq.com/articles/Java-Concurrency-Static-Analysis-with-ThreadSafe" target="_blank">This InfoQ article</a> shows ThreadSafe in action finding concurrency errors in open source applications including Apache JMeter and K9Mail that are not caught by any other Java static analysis tool. <br /><br />Free two-week trials are available from <a href="http://www.contemplateltd.com/threadsafe" target="_blank">www.contemplateltd.com/<wbr></wbr>threadsafe</a>. Moreover, I understand that the tool will soon be offered with monthly and annual subscriptions.<br /><br />If you develop concurrent software with Java, I encourage you to try the tool.<br /><br />http://processalgebra.blogspot.com/2014/03/contemplate-ltd.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-6911842330374679606Sat, 15 Mar 2014 13:35:00 +00002014-03-15T13:35:42.784ZEATCS-IPEC Nerode Prize 2014The EATCS and IPEC are proud to announce that the <a href="http://www.eatcs.org/index.php/nerode-prize">Nerode Prize 2014</a> for outstanding papers in the area of multivariate algorithmics will be awarded to the following two papers: <br /><ul style="text-align: justify;"><li> "<strong>On problems without polynomial kernels</strong>", Hans L. Bodlaender, Rodney G. Downey, Michael R. Fellows, Danny Hermelin, Journal of Computer and System Sciences, 2009 and</li><li>"<strong>Infeasibility of instance compression and succinct PCPs for NP</strong>", Lance Fortnow, Rahul Santhanam, Journal of Computer and System Sciences, 2011. </li></ul><div style="text-align: justify;">Congratulations to all the award recipients!</div><div style="text-align: justify;"> </div><div style="text-align: justify;">The presentation of the prize will take place at IPEC 2014, which this year will be organized as part of ALGO 2014 (Wroclaw, Poland, 10-12 September 2014).<br /><br />The Prize is named in honour of Anil Nerode, in recognition of his major contributions to mathematical logic, theory of automata, computability and complexity theory. <br /><br />The Nerode Prize 2014 Committee consists of Georg Gottlob (University of Oxford, UK), Jan Arne Telle (University of Bergen, Norway), and Peter Widmayer (ETH Zurich, Switzerland; chair).</div>http://processalgebra.blogspot.com/2014/03/eatcs-ipec-nerode-prize-2014.htmlnoreply@blogger.com (Luca Aceto)0tag:blogger.com,1999:blog-27705661.post-2561189625618023583Thu, 13 Mar 2014 17:58:00 +00002014-03-13T17:58:49.106ZACM TALG Editor-in-Chief Search: Call for Nominations<i>Anne Condon asked me to distribute this call. Do consider nominating colleagues for this prestigious position. </i><br /><br />Nominations are now open for the next editor-in-chief of the ACM Transactions on Algorithms. ACM TALG (web page: http://talg.acm.org/) publishes original research of the highest quality dealing with algorithms. It is a peer-reviewed journal, appearing quarterly. Specific areas of computation covered by the journal are listed at http://talg.acm.org/Aims.html.<br /><br />We are looking for a well-established person with a strong record of research achievements and service, and with a vision for the future of the field. The term of appointment is three years, to begin late summer 2014, with the possibility of renewal for a second term. The editor-in-chief is responsible for faithfully executing the editorial charter of the journal yet should be proactive in<br />adapting the journal and its charter to changes in the field. A description of the duties of the EiC and evaluation criteria can be found at h ttp://www.acm.org/publications/policies/evaluation.<br /><br />Professor Valerie King of the University of Victoria, Victoria, BC, Canada is Chair of the Search Committee. All nominees, including self-nominees, should send a CV and a Vision Statement for TALG (at least one page), with subject header “EiC nomination” to: val@uvic.ca<br /><br />The deadline for nominations is <b>Friday, May 16, 2014 at 11:59 p.m. (PST).</b>http://processalgebra.blogspot.com/2014/03/acm-talg-editor-in-chief-search-call.htmlnoreply@blogger.com (Luca Aceto)0