Default Cover Image

2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS)

Oct. 17 2015 to Oct. 20 2015

Berkeley, CA, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xi
PrefaceFreely available from IEEE.pp. xii-xii
Organizing Committee and SponsorsFreely available from IEEE.pp. xiii-xiii
Program CommitteeFreely available from IEEE.pp. xiv-xiv
External ReviewersFreely available from IEEE.pp. xv-xx
AwardsFreely available from IEEE.pp. xxi-xxi
Approximating ATSP by Relaxing ConnectivityFull-text access may be available. Sign in or learn about subscription options.pp. 1-19
Effective-Resistance-Reducing Flows, Spectrally Thin Trees, and Asymmetric TSPFull-text access may be available. Sign in or learn about subscription options.pp. 20-39
Compressing and Teaching for Low VC-DimensionFull-text access may be available. Sign in or learn about subscription options.pp. 40-51
On Monotonicity Testing and Boolean Isoperimetric Type TheoremsFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Tight Hardness Results for LCS and Other Sequence Similarity MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 59-78
Quadratic Conditional Lower Bounds for String Problems and Dynamic Time WarpingFull-text access may be available. Sign in or learn about subscription options.pp. 79-97
If the Current Clique Algorithms are Optimal, So is Valiant's ParserFull-text access may be available. Sign in or learn about subscription options.pp. 98-117
Probabilistic Polynomials and Hamming Nearest NeighborsFull-text access may be available. Sign in or learn about subscription options.pp. 136-150
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 151-170
Indistinguishability Obfuscation from Functional EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 171-190
Limits on the Power of Indistinguishability Obfuscation and Functional EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 191-209
Black-Box Garbled RAMFull-text access may be available. Sign in or learn about subscription options.pp. 210-229
Efficient Inverse Maintenance and Faster Algorithms for Linear ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 230-249
Constructing Linear-Sized Spectral Sparsification in Almost-Linear TimeFull-text access may be available. Sign in or learn about subscription options.pp. 250-269
Guaranteed Matrix Completion via Nonconvex FactorizationFull-text access may be available. Sign in or learn about subscription options.pp. 270-289
Heavy-Tailed Independent Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 290-309
Input Sparsity and Hardness for Robust Subspace ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 310-329
The Minimum Principle of SINR: A Useful Discretization Tool for Wireless CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 330-349
Enabling Robust and Efficient Distributed Computation in Dynamic Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 350-369
Planar Reachability in Linear Space and Constant TimeFull-text access may be available. Sign in or learn about subscription options.pp. 370-389
Towards an Optimal Method for Dynamic Planar Point LocationFull-text access may be available. Sign in or learn about subscription options.pp. 390-409
Pattern-Avoiding Access in Binary Search TreesFull-text access may be available. Sign in or learn about subscription options.pp. 410-423
The Average Sensitivity of Bounded-Depth FormulasFull-text access may be available. Sign in or learn about subscription options.pp. 424-430
The Power of Asymmetry in Constant-Depth CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 431-450
Deterministic Divisibility Testing via Shifted Partial DerivativesFull-text access may be available. Sign in or learn about subscription options.pp. 451-465
Hardness of Approximation in PSPACE and Separation Results for Pebble GamesFull-text access may be available. Sign in or learn about subscription options.pp. 466-485
The Submodular Secretary Problem Goes LinearFull-text access may be available. Sign in or learn about subscription options.pp. 486-505
Competitive Flow Time Algorithms for Polyhedral SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 506-524
Tight Bounds for Online Vector SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 525-544
Online Buy-at-Bulk Network DesignFull-text access may be available. Sign in or learn about subscription options.pp. 545-562
Solving the Closest Vector Problem in 2^n Time -- The Discrete Gaussian Strikes Again!Full-text access may be available. Sign in or learn about subscription options.pp. 563-582
A Robust Sparse Fourier Transform in the Continuous SettingFull-text access may be available. Sign in or learn about subscription options.pp. 583-600
Breaking the Variance: Approximating the Hamming Distance in 1/ε Time Per AlignmentFull-text access may be available. Sign in or learn about subscription options.pp. 601-613
Approximately Counting Triangles in Sublinear TimeFull-text access may be available. Sign in or learn about subscription options.pp. 614-633
Differentially Private Release and Learning of Threshold FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 634-649
Robust Traceability from Trace AmountsFull-text access may be available. Sign in or learn about subscription options.pp. 650-669
Community Detection in General Stochastic Block models: Fundamental Limits and Efficient Algorithms for RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 670-688
How to Refute a Random CSPFull-text access may be available. Sign in or learn about subscription options.pp. 689-708
An O(1)-Approximation for Minimum Spanning Tree InterdictionFull-text access may be available. Sign in or learn about subscription options.pp. 709-728
Reality Distortion: Exact and Approximate Algorithms for Embedding into the LineFull-text access may be available. Sign in or learn about subscription options.pp. 729-747
Polylogarithmic Approximations for the Capacitated Single-Sink Confluent Flow ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 748-758
A Light Metric SpannerFull-text access may be available. Sign in or learn about subscription options.pp. 759-772
Near-Optimal Bounds on Bounded-Round Quantum Communication Complexity of DisjointnessFull-text access may be available. Sign in or learn about subscription options.pp. 773-791
Hamiltonian Simulation with Nearly Optimal Dependence on all ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 792-809
Quantum Expander CodesFull-text access may be available. Sign in or learn about subscription options.pp. 810-824
Robust Testing of Lifted Codes with Applications to Low-Degree TestingFull-text access may be available. Sign in or learn about subscription options.pp. 825-844
Local Correlation Breakers and Applications to Three-Source Extractors and MergersFull-text access may be available. Sign in or learn about subscription options.pp. 845-862
Three-Source Extractors for Polylogarithmic Min-EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 863-882
Beyond the Central Limit theorem: Asymptotic Expansions and Pseudorandomness for Combinatorial SumsFull-text access may be available. Sign in or learn about subscription options.pp. 883-902
Pseudorandomness via the Discrete Fourier TransformFull-text access may be available. Sign in or learn about subscription options.pp. 903-922
Tight Bounds on Low-Degree Spectral Concentration of Submodular and XOS FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 923-942
Equivalence of Deterministic Top-Down Tree-to-String Transducers is DecidableFull-text access may be available. Sign in or learn about subscription options.pp. 943-962
FO Model Checking on Posets of Bounded WidthFull-text access may be available. Sign in or learn about subscription options.pp. 963-974
Satisfiability of Ordering CSPs above Average is Fixed-Parameter TractableFull-text access may be available. Sign in or learn about subscription options.pp. 975-993
Parameterizing the Permanent: Genus, Apices, Minors, Evaluation Mod 2kFull-text access may be available. Sign in or learn about subscription options.pp. 994-1009
Isomorphism Testing for Graphs of Bounded Rank WidthFull-text access may be available. Sign in or learn about subscription options.pp. 1010-1029
An Average-Case Depth Hierarchy Theorem for Boolean CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 1030-1048
A Faster Cutting Plane Method and its Implications for Combinatorial and Convex OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1049-1065
Lower Bounds for Clique vs. Independent SetFull-text access may be available. Sign in or learn about subscription options.pp. 1066-1076
Deterministic Communication vs. Partition NumberFull-text access may be available. Sign in or learn about subscription options.pp. 1077-1088
New Unconditional Hardness Results for Dynamic and Online ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 1089-1107
Tight Hardness of the Non-commutative Grothendieck ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 1108-1122
No Small Linear Program Approximates Vertex Cover within a Factor 2 -- eFull-text access may be available. Sign in or learn about subscription options.pp. 1123-1142
Approximate ModularityFull-text access may be available. Sign in or learn about subscription options.pp. 1143-1162
Trading Query Complexity for Sample-Based Testing and Multi-testing ScalabilityFull-text access may be available. Sign in or learn about subscription options.pp. 1163-1182
Optimal Algorithms and Lower Bounds for Testing Closeness of Structured DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 1183-1202
On the Structure, Covering, and Learning of Poisson Multinomial DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 1203-1217
Uniform Generation of Random Regular GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 1218-1230
Symbolic Integration and the Complexity of Computing AveragesFull-text access may be available. Sign in or learn about subscription options.pp. 1231-1245
The Complexity of General-Valued CSPsFull-text access may be available. Sign in or learn about subscription options.pp. 1246-1258
A Holant Dichotomy: Is the FKT Algorithm Universal?Full-text access may be available. Sign in or learn about subscription options.pp. 1259-1276
Sample (x) = (a*x<=t) is a Distinguisher with Probability 1/8Full-text access may be available. Sign in or learn about subscription options.pp. 1277-1291
Hashing for Statistics over K-PartitionsFull-text access may be available. Sign in or learn about subscription options.pp. 1292-1310
Optimal Induced Universal Graphs and Adjacency Labeling for TreesFull-text access may be available. Sign in or learn about subscription options.pp. 1311-1326
An Algorithmic Proof of the Lovasz Local Lemma via Resampling OraclesFull-text access may be available. Sign in or learn about subscription options.pp. 1327-1346
Non-backtracking Spectrum of Random Graphs: Community Detection and Non-regular Ramanujan GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 1347-1357
Interlacing Families IV: Bipartite Ramanujan Graphs of All SizesFull-text access may be available. Sign in or learn about subscription options.pp. 1358-1377
Incidences between Points and Lines in R^4Full-text access may be available. Sign in or learn about subscription options.pp. 1378-1394
Talagrand's Convolution Conjecture on Gaussian SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 1395-1408
Random Matrices: l1 Concentration and Dictionary Learning with Few SamplesFull-text access may be available. Sign in or learn about subscription options.pp. 1409-1425
Mixture Selection, Mechanism Design, and SignalingFull-text access may be available. Sign in or learn about subscription options.pp. 1426-1445
Optimal Auctions vs. Anonymous PricingFull-text access may be available. Sign in or learn about subscription options.pp. 1446-1463
On the Complexity of Optimal Lottery Pricing and Randomized MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 1464-1479
On the Cryptographic Hardness of Finding a Nash EquilibriumFull-text access may be available. Sign in or learn about subscription options.pp. 1480-1498
Welfare Maximization with Limited InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 1499-1512
Author indexFreely available from IEEE.pp. 1513-1515
[Publisher's information]Freely available from IEEE.pp. 1516-1516
Showing 97 out of 97