201. | Tutorial 5: The GCT Chasm II | 1:22:00 | |
|
202. | Forecast Hedging, Calibration, And Game Equilibria | 1:21:40 | |
|
203. | Computational Optimal Transport | 1:21:35 | |
|
204. | Hybrid Classical-Quantum Algorithms | 1:21:27 | |
|
205. | Adversarial Bandits: Theory and Algorithms | 1:21:25 | |
|
206. | An Overview on Data Streams Algorithms | 1:21:24 | |
|
207. | Why Only Us: Language and Evolution | 1:21:19 | |
|
208. | Multicalibration: Towards Fair Decision Making | 1:21:05 | |
|
209. | Remarks on the Discrete Cube | 1:21:03 | |
|
210. | Geometry, Entropy and Complexity in Quantum Gravity (Part II) | 1:20:48 | | Quantum Gravity
|
211. | Tutorial: Implicit Bias I | 1:20:40 | Tutorial |
|
212. | Cortical Travelling Waves: Mechanisms and Computational Principles | 1:20:38 | |
|
213. | The Arrow of Time in Causal Networks | 1:20:35 | |
|
214. | Introduction to Regulatory Genomics and Epigenomics II: Motif Finding | 1:20:22 | |
|
215. | Game Theory Applied to Mining Pools, Token Offering, Dao, and Consensus Protocols | 1:20:12 | |
|
216. | Pseudo-Boolean Solving and Optimization 4 | 1:20:06 | |
|
217. | Algorithmic Opportunities in Matching Markets | 1:20:00 | |
|
218. | Verifiable Quantum Supremacy: What I Hope Will Be Done | 1:19:58 | |
|
219. | Fundamental Algorithms in Deep Sequencing II: Mapping/Alignment | 1:19:56 | |
|
220. | Finding and Certifying (Near-)Optimal Strategies in Black-Box Extensive-Form Imperfect-Information G | 1:19:56 | |
|
221. | An Introduction to Distributed, Massively Parallel, and Local Computation Algorithms | 1:19:51 | |
|
222. | Remarks on the Discrete Cube | 1:19:50 | |
|
223. | DP for Graphs and Social Networks | 1:19:30 | |
|
224. | Private Meta-Selection | 1:19:28 | |
|
225. | Gradient Flows and Optimal Transport in Discrete and Quantum Systems | 1:19:16 | |
|
226. | PACE Tech: Physics and Algorithms Coupled to Enhance Technology | 1:19:04 | |
|
227. | Tutorial on Efficient Coding for Interactive Communication via List Decoding | 1:18:48 | |
|
228. | Open Problem Session | 1:18:46 | |
|
229. | Introduction to Geometric Complexity Theory I | 1:18:44 | |
|
230. | (Part 1) Operationally Motivating IT Leakage Measures – A Path to Maximal Leakage | 1:18:39 | |
|
231. | Average-Case Complexity Theory (continued) | 1:18:36 | |
|
232. | Tutorial 2: Algorithmic Invariant Theory | 1:18:31 | |
|
233. | Aggregating Conflicting Forecasts | 1:18:31 | |
|
234. | Crash Course on Probabilistically Checkable Proofs (PCP)... | 1:18:27 | |
|
235. | Generalization III | 1:18:23 | |
|
236. | Mathematics of the COVID-19 Pandemics: Lessons Learned and How to Mitigate the Next One | 1:18:21 | Guide |
|
237. | Automated Reconstruction of Synaptic-Resolution Neural Wiring Diagrams Using... | 1:18:19 | |
|
238. | Quantum Random Walks | 1:18:16 | |
|
239. | Computer Vision after the Victory of Data | 1:18:06 | |
|
240. | Belief and Survey Propagation | 1:18:05 | |
|
241. | Can the Brain's Structure Reveal its Function, Theoretically Speaking? | 1:18:04 | |
|
242. | Computing Partition Functions, Part II - partial 1 | 1:18:03 | |
|
243. | Optimization I | 1:17:55 | |
|
244. | Gradient-Free Optimization With Applications to Power Systems | 1:17:55 | |
|
245. | Distribution Estimation and Applications II | 1:17:54 | |
|
246. | Statistical Physics and Computation in High Dimension | 1:17:48 | |
|
247. | Crypto and Privacy | 1:17:39 | |
|
248. | Mixed Functional Encryption: Applications to Traitor Tracing | 1:17:32 | |
|
249. | Distribution Testing: Hypothesis Testing from Very Little (or Very Private) Data | 1:17:29 | |
|
250. | Introduction to Quantum Hamiltonian Complexity | 1:17:25 | |
|
251. | Threshold Phenomena in Combinatorics | 1:17:16 | |
|
252. | Feedback Control Theory: Architectures and Tools for Real-Time Decision Making II | 1:17:14 | |
|
253. | Crash Course on Probabilistically Checkable Proofs (PCP): Optimal Inapproximability Results | 1:17:07 | |
|
254. | Planning and Markov Decision Processes Part 1 (reupload) | 1:17:07 | |
|
255. | Inapproximability of Constraint Satisfaction Problems III | 1:17:06 | |
|
256. | Lightning Talks | 1:17:04 | |
|
257. | Tutorial on Coding for Interactive Communication: Introduction and Overview | 1:17:03 | |
|
258. | Generalization I | 1:16:57 | |
|
259. | Phylogenetics | 1:16:53 | Vlog |
|
260. | Optimal Broadcast Encryption from Pairings and LWE | 1:16:52 | |
|
261. | Implicit Regularization I | 1:16:51 | |
|
262. | Inapproximability of Constraint Satisfaction Problems V | 1:16:44 | |
|
263. | Pedagogical Talk: Random Optimisation Problems | 1:16:40 | |
|
264. | Optimizing Robot Action Around and For People | 1:16:35 | |
|
265. | Online Reinforcement Learning and Regret | 1:16:35 | |
|
266. | Untrusted Quantum Devices | 1:16:28 | |
|
267. | Law and CS | 1:16:27 | |
|
268. | Decoding and Modeling the Brain’s Navigational Circuits | 1:16:11 | |
|
269. | Computational Views of Evolution II | 1:16:04 | |
|
270. | Shafi Goldwasser | 1:16:01 | |
|
271. | In Search of the Hard Instances | 1:16:01 | |
|
272. | How to Use Lattice Trapdoors: IBE, ABE and More | 1:15:52 | |
|
273. | Graphons and Graphexes as Models of Large Sparse Networks | 1:15:51 | |
|
274. | Solving Polynomials II | 1:15:48 | |
|
275. | Computational Aspects of Equilibria and Fixed Points | 1:15:40 | |
|
276. | ITCS 2022 Session 1 | 1:15:40 | |
|
277. | Multilinear Maps Over the Integers: From Design to Security | 1:15:40 | |
|
278. | Optimization: Interior Point Methods Part 1 | 1:15:37 | |
|
279. | Oblivious RAM I | 1:15:25 | |
|
280. | Finding Hay in Haystacks: The Power and Limits of Randomness | 1:15:22 | |
|
281. | Dissipative State Preparation and the Dissipative Quantum Eigensolver | 1:15:15 | |
|
282. | Bridging Stochastic and Adversarial Bandits | 1:15:10 | |
|
283. | Post-Quantum Multi-Party Computation in Constant Rounds | 1:15:05 | |
|
284. | Watermarking of Large Language Models | 1:15:04 | |
|
285. | Improved Machine Learning Algorithm for Predicting Ground State Properties | 1:15:04 | |
|
286. | Real Algebraic Geometry | 1:15:02 | |
|
287. | Remarks on the Discrete Cube | 1:14:59 | |
|
288. | The Journey Towards Program Obfuscation | 1:14:51 | |
|
289. | The Fine Line between Hard and Easy Inference Problems: The View from CSPs (continued) | 1:14:50 | |
|
290. | Algebraic Lattices and Ring Learning with Errors | 1:14:40 | |
|
291. | Bursts, Cascades, and Hot Spots: Algorithmic Models of Social Phenomena | 1:14:37 | |
|
292. | The Challenge of Understanding What Users Want: Inconsistent Preferences and Engagement Optimization | 1:14:35 | |
|
293. | Recent Developments in Over-parametrized Neural Networks, Part I | 1:14:29 | |
|
294. | Near-Optimal Equilibria I | 1:14:28 | |
|
295. | Epidemic Models with Manual and Digital Contact Tracing | 1:14:25 | Tutorial |
|
296. | Statistical Considerations in Reinforcement Learning (Part 1a):.. | 1:14:24 | |
|
297. | Verifiable Quantum Advantage Without Structure | Quantum Colloquium | 1:14:19 | |
|
298. | Writing Down Polynomials via Representation Theory I | 1:14:16 | |
|
299. | Recent Progress in High-Dimensional Learning | 1:14:15 | |
|
300. | Simons Institute Live StreamPerspective: Achieving Meaningful Privacy in Technology and Design | 1:14:11 | |
|