skip to main content
10.1145/2591796acmconferencesBook PagePublication PagesstocConference Proceedingsconference-collections
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computing
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
STOC '14: Symposium on Theory of Computing New York New York 31 May 2014- 3 June 2014
ISBN:
978-1-4503-2710-7
Published:
31 May 2014
Sponsors:
Next Conference
June 24 - 28, 2024
Vancouver , BC , Canada
Bibliometrics
Skip Abstract Section
Abstract

The papers in this volume were presented at the Forty-Sixth Annual ACM Symposium on Theory of Computing (STOC 2014), held in New York, New York, June 1-3, 2014. The Symposium was sponsored by the ACM Special Interest Group on Algorithms and Computation Theory (SIGACT). On May 31, the day before STOC, there was a program of workshops organized by Kunal Talwar and Chris Umans; the workshops were on Recent Advances on the "Lovasz Local Lemma", "Efficient Distribution Estimation", and "Coping with Intractability in Unsupervised Learning". The conference was also the site for the Turing Award Lectures of Shafi Goldwasser and Silvio Micali.

research-article
Fingerprinting codes and the price of approximate differential privacy

We show new lower bounds on the sample complexity of (ε, δ)-differentially private algorithms that accurately answer large sets of counting queries. A counting query on a database D ∈ ({0, 1}d)n has the form "What fraction of the individual records in ...

research-article
Analyze gauss: optimal bounds for privacy-preserving principal component analysis

We consider the problem of privately releasing a low dimensional approximation to a set of data records, represented as a matrix A in which each row corresponds to an individual and each column to an attribute. Our goal is to compute a subspace that ...

research-article
Private matchings and allocations

We consider a private variant of the classical allocation problem: given k goods and n agents with individual, private valuation functions over bundles of goods, how can we partition the goods amongst the agents to maximize social welfare? An important ...

research-article
Rounding sum-of-squares relaxations

We present a general approach to rounding semidefinite programming relaxations obtained by the Sum-of-Squares method (Lasserre hierarchy). Our approach is based on using the connection between these relaxations and the Sum-of-Squares proof system to ...

research-article
Constant factor approximation for balanced cut in the PIE model

We propose and study a new semi-random semi-adversarial model for Balanced Cut, a planted model with permutation invariant random edges (PIE). Our model is much more general than planted models considered previously. Consider a set of vertices V ...

research-article
Entropy, optimization and counting

We study the problem of computing max-entropy distributions over a discrete set of objects subject to observed marginals. There has been a tremendous amount of interest in such distributions due to their applicability in areas such as statistical ...

research-article
Polynomial bounds for the grid-minor theorem

One of the key results in Robertson and Seymour's seminal work on graph minors is the Grid-Minor Theorem (also called the Excluded Grid Theorem). The theorem states that for every fixed-size grid H, every graph whose treewidth is large enough, contains ...

research-article
An excluded half-integral grid theorem for digraphs and the directed disjoint paths problem

The excluded grid theorem, originally proved by Robertson and Seymour in Graph Minors V, is one of the most central results in the study of graph minors. It has found numerous applications in algorithmic graph structure theory, for instance as the basis ...

research-article
Cops, robbers, and threatening skeletons: padded decomposition for minor-free graphs

We prove that any graph excluding Kr as a minor has can be partitioned into clusters of diameter at most Δ while removing at most O(r/Δ) fraction of the edges. This improves over the results of Fakcharoenphol and Talwar, who building on the work of ...

research-article
Deciding first-order properties of nowhere dense graphs

Nowhere dense graph classes, introduced by Nešetřil and Ossona de Mendez [30], form a large variety of classes of "sparse graphs" including the class of planar graphs, actually all classes with excluded minors, and also bounded degree graphs and graph ...

research-article
Pseudorandom generators with optimal seed length for non-boolean poly-size circuits

A sampling procedure for a distribution P over {0, 1}, is a function C: {0, 1}n → {0, 1} such that the distribution C(Un) (obtained by applying C on the uniform distribution Un) is the "desired distribution" P. Let n > r = nΩ(1). An nb-PRG (...

research-article
On derandomizing algorithms that err extremely rarely

Does derandomization of probabilistic algorithms become easier when the number of "bad" random inputs is extremely small?

In relation to the above question, we put forward the following quantified derandomization challenge: For a class of circuits C (...

research-article
Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas

We show that any depth-4 homogeneous arithmetic formula computing the Iterated Matrix Multiplication polynomial IMMn,d -- the (1, 1)-th entry of the product of d generic n × n matrices -- has size nΩ(log n), if d = Ω (log2 n). More-over, any depth-4 ...

research-article
Lower bounds for depth 4 formulas computing iterated matrix multiplication

We study the arithmetic complexity of iterated matrix multiplication. We show that any multilinear homogeneous depth 4 arithmetic formula computing the product of d generic matrices of size n × n, IMMn,d, has size nΩ(√d) as long as d = nO(1). This ...

research-article
The limits of depth reduction for arithmetic formulas: it's all about the top fan-in

In recent years, a very exciting and promising method for proving lower bounds for arithmetic circuits has been proposed. This method combines the method of depth reduction developed in the works of Agrawal and Vinay[1], Koiran [11] and Tavenas [16], ...

research-article
A super-polynomial lower bound for regular arithmetic formulas

We consider arithmetic formulas consisting of alternating layers of addition (+) and multiplication (×) gates such that the fanin of all the gates in any fixed layer is the same. Such a formula Φ which additionally has the property that its formal/...

research-article
A characterization of locally testable affine-invariant properties via decomposition theorems

Let P be a property of function Fnp → {0, 1} for a fixed prime p. An algorithm is called a tester for P if, given a query access to the input function f, with high probability, it accepts when f satisfies P and rejects when f is "far" from satisfying P. ...

research-article
Lp-testing

We initiate a systematic study of sublinear algorithms for approximately testing properties of real-valued data with respect to Lp distances for p = 1, 2. Such algorithms distinguish datasets which either have (or are close to having) a certain property ...

research-article
Turnstile streaming algorithms might as well be linear sketches

In the turnstile model of data streams, an underlying vector x ∈ {--m,--m+1,..., m--1,m}n is presented as a long sequence of positive and negative integer updates to its coordinates. A randomized algorithm seeks to approximate a function f(x) with ...

research-article
Linear time construction of compressed text indices in compact space

We show that the compressed suffix array and the compressed suffix tree for a string of length n over an integer alphabet of size σn can both be built in O(n) (randomized) time using only O(n log σ) bits of working space. The previously fastest ...

research-article
New algorithms and lower bounds for circuits with linear threshold gates

Let ACC o THR be the class of constant-depth circuits comprised of AND, OR, and MODm gates (for some constant m > 1), with a bottom layer of gates computing arbitrary linear threshold functions. This class of circuits can be seen as a "midpoint" between ...

research-article
Formulas vs. circuits for small distance connectivity

We give the first super-polynomial separation in the power of bounded-depth boolean formulas vs. circuits. Specifically, we consider the problem Distance k(n) Connectivity, which asks whether two specified nodes in a graph of size n are connected by a ...

research-article
Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture

One of the major open problems in complexity theory is proving super-logarithmic lower bounds on the depth of circuits (i.e., P ⊈ NC1). This problem is interesting for two reasons: first, it is tightly related to understanding the power of parallel ...

research-article
Breaking the minsky-papert barrier for constant-depth circuits

The threshold degree of a Boolean function f is the minimum degree of a real polynomial p that represents f in sign: f(x) ≡ sgn p(x). In a seminal 1969 monograph, Minsky and Papert constructed a polynomial-size constant-depth {∧, ∨)-circuit in n ...

research-article
Economic efficiency requires interaction

We study the necessity of interaction between individuals for obtaining approximately efficient economic allocations. We view this as a formalization of Hayek's classic point of view that focuses on the information transfer advantages that markets have ...

research-article
The sample complexity of revenue maximization

In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal of this paper is to understand ...

research-article
Optimal competitive auctions

We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic ...

research-article
The matching polytope has exponential extension complexity

A popular method in combinatorial optimization is to express polytopes P, which may potentially have exponentially many facets, as solutions of linear programs that use few extra variables to reduce the number of constraints down to a polynomial. After ...

research-article
Homological product codes

Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor ...

research-article
Exponential improvement in precision for simulating sparse Hamiltonians

We provide a quantum algorithm for simulating the dynamics of sparse Hamiltonians with complexity sublogarithmic in the inverse error, an exponential improvement over previous methods. Specifically, we show that a d-sparse Hamiltonian H on n qubits can ...

Contributors
  • Cornell University

Recommendations

Acceptance Rates

STOC '14 Paper Acceptance Rate91of319submissions,29%Overall Acceptance Rate1,469of4,586submissions,32%
YearSubmittedAcceptedRate
STOC '153479327%
STOC '143199129%
STOC '1336010028%
STOC '113048428%
STOC '083258025%
STOC '032708030%
STOC '022879132%
STOC '012308336%
STOC '001828547%
STOC '981697544%
STOC '972117536%
STOC '962017437%
STOC '891965629%
STOC '881925328%
STOC '871655030%
STOC '801254738%
STOC '791113733%
STOC '781203832%
STOC '77873136%
STOC '76833036%
STOC '75873136%
STOC '74953537%
STOC '71502346%
STOC '70702739%
Overall4,5861,46932%