ACM Symposium on Theory of Computing, STOC 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Beyond matroids: secretary problem and prophet inequality with general constraints

Aviad Rubinstein

Beyond matroids: secretary problem and prophet inequality with general constraints

Details
Discussion Comments: 0
Verification: Author has not verified information

Separations in query complexity based on pointer functions

Andris Ambainis, Kaspars Balodis, Aleksandrs Belovs, Troy Lee, Miklos Santha, Juris Smotrovs

Separations in query complexity based on pointer functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Repairing Reed-solomon codes

Venkatesan Guruswami, Mary Wootters

Repairing Reed-solomon codes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exact algorithms via monotone local search

Fedor V. Fomin, Serge Gaspers, Daniel Lokshtanov, Saket Saurabh

Exact algorithms via monotone local search

Details
Discussion Comments: 0
Verification: Authors have not verified information

Semidefinite programs on sparse random graphs and their application to community detection

Andrea Montanari, Subhabrata Sen

Semidefinite programs on sparse random graphs and their application to community detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constant-round interactive proofs for delegating computation

Omer Reingold, Guy N. Rothblum, Ron D. Rothblum

Constant-round interactive proofs for delegating computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Geometric median in nearly linear time

Michael B. Cohen, Yin Tat Lee, Gary L. Miller, Jakub Pachocki, Aaron Sidford

Geometric median in nearly linear time

Details
Discussion Comments: 0
Verification: Authors have not verified information

Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations

Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf

Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deterministic and probabilistic binary search in graphs

Ehsan Emamjomeh-Zadeh, David Kempe, Vikrant Singhal

Deterministic and probabilistic binary search in graphs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Fast spectral algorithms from sum-of-squares proofs: tensor decomposition and planted sparse vectors

Samuel B. Hopkins, Tselil Schramm, Jonathan Shi, David Steurer

Fast spectral algorithms from sum-of-squares proofs: tensor decomposition and planted sparse vectors

Details
Author Comments: None of the results claimed in the paper are backed by code. All contributions of the paper are backed by proofs, which are all included in the arXiv version of the paper. The paper includes formal descriptions of all contributed algorithms, at a level of detail sufficient to directly translate to any programming language that has a linear algebra package.
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Sparse fourier transform in any constant dimension with nearly-optimal sample complexity in sublinear time

Michael Kapralov

Sparse fourier transform in any constant dimension with nearly-optimal sample complexity in sublinear time

Details
Discussion Comments: 0
Verification: Author has not verified information

Graph isomorphism in quasipolynomial time [extended abstract]

László Babai

Graph isomorphism in quasipolynomial time [extended abstract]

Details
Discussion Comments: 0
Verification: Author has not verified information

Super-linear gate and super-quadratic wire lower bounds for depth-two and depth-three threshold circuits

Daniel M. Kane, Ryan Williams

Super-linear gate and super-quadratic wire lower bounds for depth-two and depth-three threshold circuits

Details
Discussion Comments: 0
Verification: Authors have not verified information

Routing under balance

Alina Ene, Gary L. Miller, Jakub Pachocki, Aaron Sidford

Routing under balance

Details
Discussion Comments: 0
Verification: Authors have not verified information

The fourier transform of poisson multinomial distributions and its algorithmic applications

Ilias Diakonikolas, Daniel M. Kane, Alistair Stewart

The fourier transform of poisson multinomial distributions and its algorithmic applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Contention resolution with log-logstar channel accesses

Michael A. Bender, Tsvi Kopelowitz, Seth Pettie, Maxwell Young

Contention resolution with log-logstar channel accesses

Details
Discussion Comments: 0
Verification: Authors have not verified information

How robust are reconstruction thresholds for community detection?

Ankur Moitra, William Perry, Alexander S. Wein

How robust are reconstruction thresholds for community detection?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Two-source dispersers for polylogarithmic entropy and improved ramsey graphs

Gil Cohen

Two-source dispersers for polylogarithmic entropy and improved ramsey graphs

Details
Discussion Comments: 0
Verification: Author has not verified information

Weighted low rank approximations with provable guarantees

Ilya P. Razenshteyn, Zhao Song, David P. Woodruff

Weighted low rank approximations with provable guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

The computational power of optimization in online learning

Elad Hazan, Tomer Koren

The computational power of optimization in online learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

A deterministic almost-tight distributed algorithm for approximating single-source shortest paths

Monika Henzinger, Sebastian Krinninger, Danupon Nanongkai

A deterministic almost-tight distributed algorithm for approximating single-source shortest paths

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enumerating parametric global minimum cuts by random interleaving

David R. Karger

Enumerating parametric global minimum cuts by random interleaving

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Author has verified information

Improved approximation for node-disjoint paths in planar graphs

Julia Chuzhoy, David H. K. Kim, Shi Li

Improved approximation for node-disjoint paths in planar graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity

Swastik Kopparty, Or Meir, Noga Ron-Zewi, Shubhangi Saraf

High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Maximizing determinants under partition constraints

Aleksandar Nikolov, Mohit Singh

Maximizing determinants under partition constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exponential separation of communication and external information

Anat Ganor, Gillat Kol, Ran Raz

Exponential separation of communication and external information

Details
Discussion Comments: 0
Verification: Authors have not verified information

Watch and learn: optimizing from revealed preferences feedback

Aaron Roth, Jonathan Ullman, Zhiwei Steven Wu

Watch and learn: optimizing from revealed preferences feedback

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ramanujan coverings of graphs

Chris Hall, Doron Puder, William F. Sawin

Ramanujan coverings of graphs

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

A (1+epsilon)-approximation for makespan scheduling with precedence constraints using LP hierarchies

Elaine Levey, Thomas Rothvoss

A (1+epsilon)-approximation for makespan scheduling with precedence constraints using LP hierarchies

Details
Discussion Comments: 0
Verification: Authors have not verified information

A cost function for similarity-based hierarchical clustering

Sanjoy Dasgupta

A cost function for similarity-based hierarchical clustering

Details
Discussion Comments: 0
Verification: Author has not verified information

The 4/3 additive spanner exponent is tight

Amir Abboud, Greg Bodwin

The 4/3 additive spanner exponent is tight

Details
Discussion Comments: 0
Verification: Authors have not verified information

Complexity theoretic limitations on learning halfspaces

Amit Daniely

Complexity theoretic limitations on learning halfspaces

Details
Discussion Comments: 0
Verification: Author has not verified information

Poly-logarithmic Frege depth lower bounds via an expander switching lemma

Toniann Pitassi, Benjamin Rossman, Rocco A. Servedio, Li-Yang Tan

Poly-logarithmic Frege depth lower bounds via an expander switching lemma

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximating connectivity domination in weighted bounded-genus graphs

Vincent Cohen-Addad, Éric Colin de Verdière, Philip N. Klein, Claire Mathieu, David Meierfrankenfeld

Approximating connectivity domination in weighted bounded-genus graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Watermarking cryptographic capabilities

Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs

Watermarking cryptographic capabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Explicit two-source extractors and resilient functions

Eshan Chattopadhyay, David Zuckerman

Explicit two-source extractors and resilient functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Separating subadditive euclidean functionals

Alan M. Frieze, Wesley Pegden

Separating subadditive euclidean functionals

Details
Discussion Comments: 0
Verification: Authors have not verified information

New deterministic approximation algorithms for fully dynamic matching

Sayan Bhattacharya, Monika Henzinger, Danupon Nanongkai

New deterministic approximation algorithms for fully dynamic matching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Candidate hard unique game

Subhash Khot, Dana Moshkovitz

Candidate hard unique game

Details
Discussion Comments: 0
Verification: Authors have not verified information

Base collapse of holographic algorithms

Mingji Xia

Base collapse of holographic algorithms

Details
Discussion Comments: 0
Verification: Author has not verified information

Separations in query complexity using cheat sheets

Scott Aaronson, Shalev Ben-David, Robin Kothari

Separations in query complexity using cheat sheets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Classical verification of quantum proofs

Zhengfeng Ji

Classical verification of quantum proofs

Details
Discussion Comments: 0
Verification: Author has not verified information

Breaking the logarithmic barrier for truthful combinatorial auctions with submodular bidders

Shahar Dobzinski

Breaking the logarithmic barrier for truthful combinatorial auctions with submodular bidders

Details
Discussion Comments: 0
Verification: Author has not verified information

Bipartite perfect matching is in quasi-NC

Stephen A. Fenner, Rohit Gurjar, Thomas Thierauf

Bipartite perfect matching is in quasi-NC

Details
Discussion Comments: 0
Verification: Authors have not verified information

Simulating branching programs with edit distance and friends: or: a polylog shaved is a lower bound made

Amir Abboud, Thomas Dueholm Hansen, Virginia Vassilevska Williams, Ryan Williams

Simulating branching programs with edit distance and friends: or: a polylog shaved is a lower bound made

Details
Discussion Comments: 0
Verification: Authors have not verified information

Textbook non-malleable commitments

Vipul Goyal, Omkant Pandey, Silas Richelson

Textbook non-malleable commitments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Streaming algorithms for embedding and computing edit distance in the low distance regime

Diptarka Chakraborty, Elazar Goldenberg, Michal Koucký

Streaming algorithms for embedding and computing edit distance in the low distance regime

Details
Discussion Comments: 0
Verification: Authors have not verified information

Extractors for sumset sources

Eshan Chattopadhyay, Xin Li

Extractors for sumset sources

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed (∆+1)-coloring in sublogarithmic rounds

David G. Harris, Johannes Schneider, Hsin-Hao Su

Distributed (∆+1)-coloring in sublogarithmic rounds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do prices coordinate markets?

Justin Hsu, Jamie Morgenstern, Ryan M. Rogers, Aaron Roth, Rakesh Vohra

Do prices coordinate markets?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deterministic decremental single source shortest paths: beyond the o(mn) bound

Aaron Bernstein, Shiri Chechik

Deterministic decremental single source shortest paths: beyond the o(mn) bound

Details
Discussion Comments: 0
Verification: Authors have not verified information

A discrete and bounded envy-free cake cutting protocol for four agents

Haris Aziz, Simon Mackenzie

A discrete and bounded envy-free cake cutting protocol for four agents

Details
Discussion Comments: 0
Verification: Authors have not verified information

The price of anarchy in large games

Michal Feldman, Nicole Immorlica, Brendan Lucier, Tim Roughgarden, Vasilis Syrgkanis

The price of anarchy in large games

Details
Discussion Comments: 0
Verification: Authors have not verified information

Algebraic attacks against random local functions and their countermeasures

Benny Applebaum, Shachar Lovett

Algebraic attacks against random local functions and their countermeasures

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Efficiently decoding Reed-Muller codes from random errors

Ramprasad Saptharishi, Amir Shpilka, Ben Lee Volk

Efficiently decoding Reed-Muller codes from random errors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sample-optimal tomography of quantum states

Jeongwan Haah, Aram Wettroth Harrow, Zheng-Feng Ji, Xiaodi Wu, Nengkun Yu

Sample-optimal tomography of quantum states

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Almost tight bounds for eliminating depth cycles in three dimensions

Boris Aronov, Micha Sharir

Almost tight bounds for eliminating depth cycles in three dimensions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient quantum tomography

Ryan O'Donnell, John Wright

Efficient quantum tomography

Details
Discussion Comments: 0
Verification: Authors have not verified information

A lower bound for the distributed Lovász local lemma

Sebastian Brandt, Orr Fischer, Juho Hirvonen, Barbara Keller, Tuomo Lempiäinen, Joel Rybicki, Jukka Suomela, Jara Uitto

A lower bound for the distributed Lovász local lemma

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sparsified Cholesky and multigrid solvers for connection laplacians

Rasmus Kyng, Yin Tat Lee, Richard Peng, Sushant Sachdeva, Daniel A. Spielman

Sparsified Cholesky and multigrid solvers for connection laplacians

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lift-and-round to improve weighted completion time on unrelated machines

Nikhil Bansal, Aravind Srinivasan, Ola Svensson

Lift-and-round to improve weighted completion time on unrelated machines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Instance optimal learning of discrete distributions

Gregory Valiant, Paul Valiant

Instance optimal learning of discrete distributions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constant-rate coding for multiparty interactive communication is impossible

Mark Braverman, Klim Efremenko, Ran Gelles, Bernhard Haeupler

Constant-rate coding for multiparty interactive communication is impossible

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tight bounds for single-pass streaming complexity of the set cover problem

Sepehr Assadi, Sanjeev Khanna, Yang Li

Tight bounds for single-pass streaming complexity of the set cover problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Entangled simultaneity versus classical interactivity in communication complexity

Dmitry Gavinsky

Entangled simultaneity versus classical interactivity in communication complexity

Details
Discussion Comments: 0
Verification: Author has not verified information

Online matching: haste makes waste!

Yuval Emek, Shay Kutten, Roger Wattenhofer

Online matching: haste makes waste!

Details
Discussion Comments: 0
Verification: Authors have not verified information

A size-free CLT for poisson multinomials and its applications

Constantinos Daskalakis, Anindya De, Gautam Kamath, Christos Tzamos

A size-free CLT for poisson multinomials and its applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Relating two property testing models for bounded degree directed graphs

Artur Czumaj, Pan Peng, Christian Sohler

Relating two property testing models for bounded degree directed graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cell-probe lower bounds for dynamic problems via a new communication model

Huacheng Yu

Cell-probe lower bounds for dynamic problems via a new communication model

Details
Discussion Comments: 0
Verification: Author has not verified information

Algorithmic Bayesian persuasion

Shaddin Dughmi, Haifeng Xu

Algorithmic Bayesian persuasion

Details
Discussion Comments: 0
Verification: Authors have not verified information

Matrix rigidity of random toeplitz matrices

Oded Goldreich, Avishay Tal

Matrix rigidity of random toeplitz matrices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal principal component analysis in distributed and streaming models

Christos Boutsidis, David P. Woodruff, Peilin Zhong

Optimal principal component analysis in distributed and streaming models

Details
Discussion Comments: 0
Verification: Authors have not verified information

A polynomial lower bound for testing monotonicity

Aleksandrs Belovs, Eric Blais

A polynomial lower bound for testing monotonicity

Details
Discussion Comments: 0
Verification: Authors have not verified information

On approximating functions of the singular values in a stream

Yi Li, David P. Woodruff

On approximating functions of the singular values in a stream

Details
Discussion Comments: 0
Verification: Authors have not verified information

A tight space bound for consensus

Leqi Zhu

A tight space bound for consensus

Details
Discussion Comments: 0
Verification: Author has not verified information

A PTAS for planar group Steiner tree via spanner bootstrapping and prize collecting

MohammadHossein Bateni, Erik D. Demaine, MohammadTaghi Hajiaghayi, Dániel Marx

A PTAS for planar group Steiner tree via spanner bootstrapping and prize collecting

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the size of homogeneous and of depth four formulas with low individual degree

Neeraj Kayal, Chandan Saha, Sébastien Tavenas

On the size of homogeneous and of depth four formulas with low individual degree

Details
Discussion Comments: 0
Verification: Authors have not verified information

Non-malleable extractors and codes, with their many tampered extensions

Eshan Chattopadhyay, Vipul Goyal, Xin Li

Non-malleable extractors and codes, with their many tampered extensions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fault tolerant subgraph for single source reachability: generic and optimal

Surender Baswana, Keerti Choudhary, Liam Roditty

Fault tolerant subgraph for single source reachability: generic and optimal

Details
Discussion Comments: 0
Verification: Authors have not verified information

Algorithmic stability for adaptive data analysis

Raef Bassily, Kobbi Nissim, Adam D. Smith, Thomas Steinke, Uri Stemmer, Jonathan Ullman

Algorithmic stability for adaptive data analysis

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Parallel algorithms for select and partition with noisy comparisons

Mark Braverman, Jieming Mao, S. Matthew Weinberg

Parallel algorithms for select and partition with noisy comparisons

Details
Discussion Comments: 0
Verification: Authors have not verified information

Communication lower bounds for statistical estimation problems via a distributed data processing inequality

Mark Braverman, Ankit Garg, Tengyu Ma, Huy L. Nguyen, David P. Woodruff

Communication lower bounds for statistical estimation problems via a distributed data processing inequality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reed-Muller codes achieve capacity on erasure channels

Shrinivas Kudekar, Santhosh Kumar, Marco Mondelli, Henry D. Pfister, Eren Sasoglu, Rüdiger L. Urbanke

Reed-Muller codes achieve capacity on erasure channels

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

The sample complexity of auctions with side information

Nikhil R. Devanur, Zhiyi Huang, Christos-Alexandros Psomas

The sample complexity of auctions with side information

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beating CountSketch for heavy hitters in insertion streams

Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, David P. Woodruff

Beating CountSketch for heavy hitters in insertion streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Near-optimal small-depth lower bounds for small distance connectivity

Xi Chen, Igor Carboni Oliveira, Rocco A. Servedio, Li-Yang Tan

Near-optimal small-depth lower bounds for small distance connectivity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Basis collapse for holographic algorithms over all domain sizes

Sitan Chen

Basis collapse for holographic algorithms over all domain sizes

Details
Discussion Comments: 0
Verification: Author has not verified information

Interactive compression for product distributions

Gillat Kol

Interactive compression for product distributions

Details
Discussion Comments: 0
Verification: Author has not verified information

Parallel exhaustive search without coordination

Pierre Fraigniaud, Amos Korman, Yoav Rodeh

Parallel exhaustive search without coordination

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bounded degree cosystolic expanders of every dimension

Shai Evra, Tali Kaufman

Bounded degree cosystolic expanders of every dimension

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the effect of randomness on planted 3-coloring models

Roee David, Uriel Feige

On the effect of randomness on planted 3-coloring models

Details
Discussion Comments: 0
Verification: Authors have not verified information

A duality based unified approach to Bayesian mechanism design

Yang Cai, Nikhil R. Devanur, S. Matthew Weinberg

A duality based unified approach to Bayesian mechanism design

Details
Discussion Comments: 0
Verification: Authors have not verified information