MWF, 14:00-14:50. Obrian 109 (map)

Instructor: Hung Q. Ngo

- Mon Nov 28. Obrian 109.
- Wed Nov 30. Obrian 109.
- Fri Dec 02. Obrian 109.
- Mon Dec 05. Obrian 109.
- Tue Dec 06. Obrian 109.
- Wed Dec 07. Obrian 109.
- Thu Dec 08. Obrian 109.
- Fri Dec 09. Obrian 109.

- Student presentations are in the last 2 weeks (Nov 28 to Dec 09). We will likely have to find another room for some of the presentations because there are more than 6 presentations.
- Requirements:
- Please prepare slides.
- It is preferable if you use LaTeX Beamer. PPT is ok but it looks
very ugly when there's heavy math formulas. Here is a
set of slides from my first lecture
prepared using Beamer, which you should make use of as a template.
Note the following:
- Type
`make`

will produce`main.pdf`

which could be viewed with`acroread`

,`xpdf`

in Linux or`preview`

under MacOSX. In Linux,`xpdf`

is preferred because it refreshes automatically. - To produce the final slides, do
`make`

twice in a row, or`pdflatex main`

twice in a row. This makes sure the the table of content and cross-references are correctly constructed and - If you do include graphics, use the
`includegraphics`

command as in the template. Most graphic types are ok: pdf, jpeg, png, etc., except for eps/ps which you'll have to convert to pdf before inclusion.

- Type
- Please follow roughly the following outline in the presentation:
- What's the problem
- What are the related works to date (of the paper)
- What's the main line of attack, i.e. outline the key lemmas and theorems (before proving them)
- Try to explain in English the main ideas behind the lemmas and theorems
- Finally, prove some of them as time allows. Skip calculus or elementary details.
- Let us know what you think might be next in terms of open problems, things you might try, etc.

The following list of presentation choices will be updated.

- Foata, Dominique; Zeilberger, Doron The collector's brotherhood problem using the Newman-Shepp symbolic method. Dedicated to the memory of Gian-Carlo Rota. Algebra Universalis 49 (2003), no. 4, 387–395.
- D. Newman and L. Shepp, (1960) The Double Dixie Cup Problem, Amer. Math. Monthly, 67 (1960), pp. 58–61.
- Adler, I., Oren, S., and Ross, S. (2003). The Coupon Collector's Problem Revisited, J. Appl. Probab., 40, no. 2, 513-518.

- Yossi Azar, Andrei Z. Broder, Anna R. Karlin, Eli Upfal: Balanced Allocations. SIAM J. Comput. 29(1): 180-200 (1999)
- Petra Berenbrink, Artur Czumaj, Angelika Steger, Berthold Vöcking: Balanced Allocations: The Heavily Loaded Case. SIAM J. Comput. 35(6): 1350-1385 (2006) [ pdf ]
- B. Vöcking, How asymetry helps load balancing, J. ACM, 50 (2003), pp. 568–589. [ pdf ]
- Kunal Talwar, Udi Wieder Balanced allocations: the weighted case. STOC'07—Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 256–265, ACM, New York, 2007

- Micah Adler. 2005. Trade-offs in probabilistic packet marking for IP traceback. J. ACM 52, 2 (March 2005), 217-244.
- Masoud Sharif, Babak Hassibi: Delay Considerations for Opportunistic Scheduling in Broadcast Fading Channels. IEEE Transactions on Wireless Communications 6(9): 3353-3363 (2007)

- [Hung will discuss]A. Pagh and F. Rodler. Cuckoo hashing. Journal of Algorithms, 51(2):122-144, 2004. [ pdf ]
- Yuriy Arbitman, Moni Naor, and Gil Segev. 2009. De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I (ICALP '09) [ pdf ]
- M. Mitzenmacher and S. Vadhan. Why simple hash functions work: exploiting the entropy in a data stream. In Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 746-755, 2008 [ pdf ]
- Michael Mitzenmacher, Some Open Questions Related to Cuckoo Hashing

- Robin A. Moser and Gábor Tardos. 2010. A constructive proof of the general lovász local lemma. J. ACM 57, 2, Article 11 (February 2010), 15 pages. (Best paper award at STOC 2009)

- Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas: Tracing traitors. IEEE Transactions on Information Theory 46(3): 893-910 (2000)
- Gábor Tardos: Optimal probabilistic fingerprint codes. J. ACM 55(2): (2008)
- Dalit Naor, Moni Naor, Jeffery Lotspiech: Revocation and Tracing Schemes for Stateless Receivers. CRYPTO 2001: 41-62

- Sanjoy Dasgupta. Learning mixtures of Gaussians. Fortieth Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1999. (See also these slides for historical facts.)

- Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum, Sergey Yekhanin: Pan-Private Streaming Algorithms. ICS 2010: 66-80 [ pdf ]
- N. Alon, Y. Matias and M. Szegedy, "The space complexity of approximating the frequency moments." In JCSS 99 (prelim. version STOC 96 --
*the*classic paper in data stream). - A. Chakrabarti, G. Cormode and A. Mcgregor, "A Near-Optimal Algorithm for Computing the Entropy of a Stream." In SODA 07.

- Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum: Differential privacy under continual observation. STOC 2010: 715-724 [ pdf ]
- Cynthia Dwork: Differential Privacy in New Settings. SODA 2010: 174-183. [ pdf ]
- Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan: Boosting and Differential Privacy. FOCS 2010: 51-60 [ pdf ]
- Cynthia Dwork: Differential Privacy: A Survey of Results. TAMC 2008: 1-19 [ pdf ]
- Michael T. Goodrich Randomized Shellsort: A Simple Oblivious Sorting Algorithm. 1262-1277 2010 SODA [ pdf ]

- Florin Rusu, Alin Dobra: Sketches for size of join estimation. ACM Trans. Database Syst. 33(3): (2008)
- Florin Rusu, Alin Dobra: Sketching Sampled Data Streams. ICDE 2009: 381-392