Accepted Papers.
- Time Hierarchies for Sampling Distributions
Thomas Watson (UC Berkeley)
- Learning Mixtures of Spherical Gaussians: Moment Methods and Spectral Decompositions
Daniel Hsu (Microsoft Research) and Sham M. Kakade (Microsoft Research)
- Low-Weight Halfspaces for Sparse Boolean Vectors
Philip M. Long (NEC Labs) and Rocco A. Servedio (Columbia)
- Learning and Incentives in User-Generated Content: Multi-Armed Bandits with Endogenous Arms
Arpita Ghosh (Cornell) and Patrick Hummel (Google Inc.)
- Adversary Lower Bound for the k-sum Problem
Aleksandrs Belovs (University of Latvia) and Robert Špalek (Google, Inc.)
- Space-Bounded Communication Complexity
Joshua Brody (Aarhus), Shiteng Chen (Tsinghua), Periklis Papakonstantinou (Tsinghua), Hao Song, (Tsinghua), and Xiaoming Sun (Chinese Academy of Sciences)
- Runtime Guarantees for Regression Problems
Hui Han Chin (CMU), Aleksander Mądry (EPFL), Gary Miller (CMU), and Richard Peng (CMU)
- Instance-Sensitive Robustness Guarantees for Sequencing with Unknown Packing and Covering Constraints
Nicole Megow (TU Berlin) and Julián Mestre (University of Sydney)
- On the Possibilities and Limitations of Pseudodeterministic Algorithms
Oded Goldreich (Weizmann Institute), Shafi Goldwasser (MIT and Weizmann Institute)
, and Dana Ron (Tel-Aviv University)
- H-wise Independence
Ishay Haviv (Academic College of Tel Aviv-Yaffo) and Michael Langberg (Open University of Israel)
- Is Privacy Compatible with Truthfulness?
David Xiao (LIAFA, CNRS, Université Paris 7)
- Parametric Digital Auctions
Pablo Daniel Azar (MIT) and Silvio Micali (MIT)
- Active Self-Assembly of Algorithmic Shapes and Patterns in Polylogarithmic Time
Damien Woods (Caltech), Ho-Lin Chen (National Taiwan University), Scott Goodfriend (Caltech), Nadine Dabby (Caltech), Erik Winfree (Caltech), and Peng Yin (Harvard Medical School)
- Massive Online Teaching to Bounded Learners
Brendan Juba (Harvard) and Ryan Williams (Stanford)
- Sparse Extractor Families for All the Entropy
Andrej Bogdanov (Chinese University of Hong Kong) and Siyao Guo (Chinese University of Hong Kong)
- On the Power of Conditional Samples in Distribution Testing
Sourav Chakraborty (Chennai Mathematical Institute), Eldar Fischer (Technion), Yonatan Goldhirsh (Technion), and Arie Matsliah (IBM Haifa Research Labs and Technion)
- New Affine-Invariant Codes from Lifting
Alan Guo (MIT), Swastik Kopparty (Rutgers), and Madhu Sudan (Microsoft Research)
- Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs (IBM Research)
- A Characterization of Approximation Resistance for Even k-Partite CSPs
Per Austrin (Aalto University and KTH Stockholm) and Subhash Khot (NYU and University of Chicago)
- Reachability in Graph Timelines
Jakub Łącki (University of Warsaw) and Piotr Sankowski (University of Warsaw)
- Evasiveness Through Circuit Lens
Raghav Kulkarni (Center for Quantum Technologies, Singapore)
- Competing Provers Protocols for Circuit Evaluation
Gillat Kol (Weizmann Institute) and Ran Raz (Weizmann Institute)
- Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson (Technion and MIT), Alessandro Chiesa (MIT), Daniel Genkin (Technion), and Eran Tromer (Tel Aviv University)
- Stronger Methods of Making Quantum Interactive Proofs Perfectly Complete
Hirotada Kobayashi (National Institute of Informatics), Francois Le Gall (The University of Tokyo), and Harumichi Nishimura (Nagoya University)
- Characterizing the Sample Complexity of Private Learners
Amos Beimel (Ben-Gurion University), Kobbi Nissim (Ben-Gurion University and Harvard), and Uri Stemmer (Ben-Gurion University)
- Pseudo-partitions, Transversality and Locality: A Combinatorial Characterization for the Space Measure in Algebraic Proof Systems
Ilario Bonacina (Università di Roma La Sapienza) and Nicola Galesi (Università di Roma La Sapienza)
- On the Power of Many One-Bit Provers
Per Austrin (Aalto University and KTH Stockholm), Johan Håstad (KTH Stockholm), and Rafael Pass (Cornell)
- Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay (AT&T Labs -- Research), David Johnson (AT&T Labs -- Research), Aggelos Kiayias (University of Athens), and Moti Yung (Google Inc.)
- The Garden-Hose Model
Harry Buhrman (CWI and University of Amsterdam), Serge Fehr (CWI), Christian Schaffner (University of Amsterdam and CWI), and Florian Speelman (CWI and University of Amsterdam)
- Sorting Noisy Data with Partial Information
Konstantin Makarychev (Microsoft Research), Yury Makarychev, (TTI-Chicago), and Aravindan Vijayaraghavan (CMU)
- Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms
Amos Fiat (Tel Aviv University), Anna Karlin (University of Washington), Elias Koutsoupias (University of Oxford and University of Athens), and Angelina Vidali (Duke)
- Towards An Optimal Query Efficient PCP?
Subhash Khot (NYU and University of Chicago), Muli Safra (Tel Aviv University), and Madhur Tulsiani (TTI-Chicago)
- Welfare Maximization and the Supermodular Degree
Uriel Feige (Weizmann Institute) and Rani Izsak (Weizmann Institute)
- Robust Optimization in the Presence of Uncertainty
Joachim M. Buhmann (ETH Zurich), Matúš Mihalák (ETH Zurich), Rastislav Šrámek (ETH Zurich), and Peter Widmayer (ETH Zurich)
- Learnability of DNF with Representation-Specific Queries
Liu Yang (CMU), Avrim Blum (CMW), and Jaime Carbonell (CMU)
- Catch Them If You Can: How to Serve Impatient Users
Marek Cygan (University of Warsaw), Matthias Englert (University of Warwick), Anupam Gupta (CMU), Marcin Mucha (University of Warsaw), and Piotr Sankowski (University of Warsaw)
- Noninteractive Timestamping and Publicly Verifiable Proofs of Work
Mohammad Mahmoody (Cornell), Tal Moran (IDC Herzliya), and Salil Vadhan (Harvard)
- On the Optimality of Relaxations for Average-Case and Generalized Constraint Satisfaction Problems
Boaz Barak (Microsoft Research), Guy Kindler (Hebrew University), and David Steurer (Cornell)
- Differentially Private Analysis of Social Networks via Restricted Sensitivity
Jeremiah Blocki (CMU), Avrim Blum (CMU), Anupam Datta (CMU), and Or Sheffet (CMU)
- An Energy Complexity Model for Algorithms
Swapnoneel Roy (University at Buffalo), Atri Rudra (University at Buffalo), and Akshat Verma (IBM Research)
- An Equational Approach to Secure Multi-Party Computation
Daniele Micciancio (UC San Diego) and Stefano Tessaro (MIT)
- Multiplicative Updates in Coordination Games and the Theory of Evolution
Erick Chastain (Rutgers), Adi Livnat (Virginia Tech), Christos Papadimitriou (UC Berkeley), and Umesh Vazirani (UC Berkeley)
- Can Theories Be Tested? A Cryptographic Treatment of Forecast Testing
Kai-Min Chung (Cornell), Edward Lui (Cornell), and Rafael Pass (Cornell)
- On the Convergence of the Hegselmann-Krause System
Arnab Bhattacharyya (DIMACS), Mark Braverman (Princeton), Bernard Chazelle (Princeton and Collège de France), and Huy L. Nguyen (Princeton)
- Streaming Computations With a Loquacious Prover
Hartmut Klauck (Center for Quantum Technologies, Singapore) and Ved Prakash (Center for Quantum Technologies, Singapore)
- Properties and Applications of Boolean Function Composition
Avishay Tal (Weizmann Institute)
- Making Evolution Rigorous - The Error Threshold
Nisheeth K. Vishnoi (Microsoft Research)
- A Classical Leash for a Quantum System: Command of Quantum Systems Via Rigidity of CHSH Games
Ben Reichardt (USC), Falk Unger (Knight Capital Group), and Umesh Vazirani (UC Berkeley)
- On the Power of Nonuniformity in Proofs of Security
Kai-Min Chung (Cornell), Huijia Lin (MIT and Boston University), Mohammad Mahmoody (Cornell), and Rafael Pass (Cornell)