Default Cover Image

2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS)

Nov. 6 2023 to Nov. 9 2023

Santa Cruz, CA, USA

ISBN: 979-8-3503-1894-4

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-19
PrefaceFreely available from IEEE.pp. 20-20
OrganizersFreely available from IEEE.pp. 21-21
Program CommitteeFreely available from IEEE.pp. 22-23
Clique Is Hard on Average for Unary Sherali-AdamsFull-text access may be available. Sign in or learn about subscription options.pp. 12-25
On Lifting Integrality Gaps to SSEH Hardness for Globally Constrained CSPsFull-text access may be available. Sign in or learn about subscription options.pp. 26-36
On small-depth Frege proofs for PHPFull-text access may be available. Sign in or learn about subscription options.pp. 37-49
Thin Trees for Laminar FamiliesFull-text access may be available. Sign in or learn about subscription options.pp. 50-59
Optimal Fault-Tolerant Spanners in Euclidean and Doubling Metrics: Breaking the Ω (log n) Lightness BarrierFull-text access may be available. Sign in or learn about subscription options.pp. 77-97
Sub-quadratic (1+ϵ)-approximate Euclidean Spanners, with ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 98-112
Envy-Free Cake-Cutting for Four AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Convergence of Approximate and Packet Routing Equilibria to Nash Flows Over TimeFull-text access may be available. Sign in or learn about subscription options.pp. 123-133
Simultaneous Auctions are Approximately Revenue-Optimal for Subadditive BiddersFull-text access may be available. Sign in or learn about subscription options.pp. 134-147
Constant Approximation for Private Interdependent ValuationsFull-text access may be available. Sign in or learn about subscription options.pp. 148-163
Randomly Punctured Reed-Solomon Codes Achieve the List Decoding Capacity over Polynomial-Size AlphabetsFull-text access may be available. Sign in or learn about subscription options.pp. 164-176
A proof that Reed-Muller codes achieve Shannon capacity on symmetric channelsFull-text access may be available. Sign in or learn about subscription options.pp. 177-193
Gilbert and Varshamov Meet Johnson: List-Decoding Explicit Nearly-Optimal Binary CodesFull-text access may be available. Sign in or learn about subscription options.pp. 194-205
Optimal Testing of Generalized Reed-Muller Codes in Fewer QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 206-233
Separating MAX 2-AND, MAX DI-CUT and MAX CUTFull-text access may be available. Sign in or learn about subscription options.pp. 234-252
Triplet Reconstruction and all other Phylogenetic CSPs are Approximation ResistantFull-text access may be available. Sign in or learn about subscription options.pp. 253-284
Improved Hardness of Approximating k-Clique under ETHFull-text access may be available. Sign in or learn about subscription options.pp. 285-306
Efficient Algorithms for Semirandom Planted CSPs at the Refutation ThresholdFull-text access may be available. Sign in or learn about subscription options.pp. 307-327
The minimal canonical form of a tensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 328-362
Query-optimal estimation of unitary channels in diamond distanceFull-text access may be available. Sign in or learn about subscription options.pp. 363-390
When Does Adaptivity Help for Quantum State Learning?Full-text access may be available. Sign in or learn about subscription options.pp. 391-404
Exponential quantum speedup in simulating coupled classical oscillators*Full-text access may be available. Sign in or learn about subscription options.pp. 405-414
Attribute-Based Encryption for Circuits of Unbounded Depth from LatticesFull-text access may be available. Sign in or learn about subscription options.pp. 415-434
ABE for Circuits with poly (λ) -sized Keys from LWEFull-text access may be available. Sign in or learn about subscription options.pp. 435-446
Learning in Pessiland via Inductive InferenceFull-text access may be available. Sign in or learn about subscription options.pp. 447-457
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-AgreementFull-text access may be available. Sign in or learn about subscription options.pp. 458-483
A Randomized Algorithm for Single-Source Shortest Path on Undirected Real-Weighted GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 484-492
Faster High Accuracy Multi-Commodity Flow from Single-Commodity TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 493-502
Negative-Weight Single-Source Shortest Paths in Near-Linear Time: Now Faster!Full-text access may be available. Sign in or learn about subscription options.pp. 515-538
Advisor-Verifier-Prover Games and the Hardness of Information Theoretic CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 539-555
On Pseudolinear Codes for Correcting Adversarial ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 556-567
A New Approach to Post-Quantum Non-MalleabilityFull-text access may be available. Sign in or learn about subscription options.pp. 568-579
Towards Separating Computational and Statistical Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 580-599
Bridge Girth: A Unifying Notion in Network DesignFull-text access may be available. Sign in or learn about subscription options.pp. 600-648
Planar Disjoint Paths, Treewidth, and KernelsFull-text access may be available. Sign in or learn about subscription options.pp. 649-662
Flip-width: Cops and Robber on dense graphsFull-text access may be available. Sign in or learn about subscription options.pp. 663-700
Folklore Sampling is Optimal for Exact Hopsets: Confirming the √n BarrierFull-text access may be available. Sign in or learn about subscription options.pp. 701-720
Fourier Growth of Communication Protocols for XOR FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 721-732
SAT Reduces to the Minimum Circuit Size Problem with a Random OracleFull-text access may be available. Sign in or learn about subscription options.pp. 733-742
Doubley-Efficient Interactive Proofs for Distribution PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 743-751
IOPs with Inverse Polynomial Soundness ErrorFull-text access may be available. Sign in or learn about subscription options.pp. 752-761
Lipschitz Continuous Algorithms for Graph ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 762-797
Compressing CFI Graphs and Lower Bounds for the Weisfeiler-Leman RefinementsFull-text access may be available. Sign in or learn about subscription options.pp. 798-809
Strong Spatial Mixing for Colorings on Trees and its Algorithmic ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 810-845
Singular Value Approximation and Sparsifying Random Walks on Directed GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 846-854
Improved Streaming Algorithms for Maximum Directed Cut via Smoothed SnapshotsFull-text access may be available. Sign in or learn about subscription options.pp. 855-870
Streaming Lower Bounds and Asymmetric Set-DisjointnessFull-text access may be available. Sign in or learn about subscription options.pp. 871-882
Streaming Euclidean k-median and k-means with o(log n) SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 883-908
Hidden Permutations to the Rescue: Multi-Pass Streaming Lower Bounds for Approximate MatchingsFull-text access may be available. Sign in or learn about subscription options.pp. 909-932
Strong Bounds for 3-ProgressionsFull-text access may be available. Sign in or learn about subscription options.pp. 933-973
The Subspace Flatness Conjecture and Faster Integer ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 974-988
Certified Hardness vs. Randomness for Log-SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 989-1007
Derandomization vs Refutation: A Unified Framework for Characterizing DerandomizationFull-text access may be available. Sign in or learn about subscription options.pp. 1008-1047
Top-Down Lower Bounds for Depth-Four CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 1048-1055
Toward Better Depth Lower Bounds: A KRW-like theorem for Strong CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 1056-1081
Deterministic Clustering in High Dimensional Spaces: Sketches and ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 1105-1130
The Price of Explainability for ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1131-1148
Agnostic proper learning of monotone functions: beyond the black-box correction barrierFull-text access may be available. Sign in or learn about subscription options.pp. 1149-1170
Near Optimal Memory-Regret Tradeoff for Online LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1171-1194
Tight Time-Space Lower Bounds for Constant-Pass LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1195-1202
Optimal PAC Bounds without Uniform ConvergenceFull-text access may be available. Sign in or learn about subscription options.pp. 1203-1223
Weighted Pseudorandom Generators via Inverse Analysis of Random Walks and ShortcuttingFull-text access may be available. Sign in or learn about subscription options.pp. 1224-1239
Explicit orthogonal and unitary designsFull-text access may be available. Sign in or learn about subscription options.pp. 1240-1260
Polynomial-Time Pseudodeterministic Construction of PrimesFull-text access may be available. Sign in or learn about subscription options.pp. 1261-1270
Two Source Extractors for Asymptotically Optimal Entropy, and (Many) MoreFull-text access may be available. Sign in or learn about subscription options.pp. 1271-1281
Traversing combinatorial 0/1-polytopes via optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1282-1291
The Vector Balancing Constant for ZonotopesFull-text access may be available. Sign in or learn about subscription options.pp. 1292-1300
A deterministic near-linear time approximation scheme for geometric transportationFull-text access may be available. Sign in or learn about subscription options.pp. 1301-1315
Parallel Repetition for the GHZ Game: Exponential DecayFull-text access may be available. Sign in or learn about subscription options.pp. 1337-1341
Bounding the Quantum Value of Compiled Nonlocal Games: From CHSH to BQP VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 1342-1348
stateQIP = statePSPACEFull-text access may be available. Sign in or learn about subscription options.pp. 1349-1356
Improved Approximations for Vector Bin Packing via Iterative Randomized RoundingFull-text access may be available. Sign in or learn about subscription options.pp. 1366-1376
Memory-Query Tradeoffs for Randomized Convex OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1400-1413
Quartic Samples Suffice for Fourier InterpolationFull-text access may be available. Sign in or learn about subscription options.pp. 1414-1425
Fast Numerical Multivariate Multipoint EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 1426-1439
Locally Uniform HashingFull-text access may be available. Sign in or learn about subscription options.pp. 1440-1470
Generalizations of Matrix Multiplication can solve the Light Bulb ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 1471-1495
Tight Space Lower Bound for Pseudo-Deterministic Approximate CountingFull-text access may be available. Sign in or learn about subscription options.pp. 1496-1504
Extracting Randomness from Samplable Distributions, RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 1505-1514
Pseudorandom Hashing for Space-bounded Computation with Applications in StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 1515-1550
Work-Efficient Parallel Derandomization I: Chernoff-like Concentrations via Pairwise IndependenceFull-text access may be available. Sign in or learn about subscription options.pp. 1551-1562
Dynamic (1+ϵ)-Approximate Matching Size in Truly Sublinear Update TimeFull-text access may be available. Sign in or learn about subscription options.pp. 1563-1588
Super-Logarithmic Lower Bounds for Dynamic Graph ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 1589-1604
The Complexity of Dynamic Least-Squares RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 1605-1627
Approximating Edit Distance in the Fully Dynamic ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1628-1638
From Grassmannian to Simplicial High-Dimensional ExpandersFull-text access may be available. Sign in or learn about subscription options.pp. 1639-1648
Showing 100 out of 150