401. | Optimization and Sampling Under Symmetry: Part 1 -- Examples | 1:10:36 | |
|
402. | The Partition Function, Sampling and Equilibration in Physics | 1:10:35 | |
|
403. | Pseudorandomness | 1:10:35 | |
|
404. | Quantum Coupon Collector | 1:10:33 | |
|
405. | Algorand: The Truly Distributed Ledger | 1:10:27 | |
|
406. | Why are Many-Body Problems in Physics so Difficult? | 1:10:26 | |
|
407. | Optimization II | 1:10:26 | |
|
408. | Sketching High-Dimensional Data | 1:10:20 | |
|
409. | Sketching High-Dimensional Data | 1:10:18 | |
|
410. | An Introduction to Hamiltonian Monte Carlo Method for Sampling | 1:10:16 | |
|
411. | In Praise of Game Dynamics | 1:10:16 | |
|
412. | Functional Law of Large Numbers and PDEs for Spatial Epidemic Models with... | 1:10:15 | |
|
413. | Provenance for Database Transformations | 1:10:13 | |
|
414. | Quantum Secure Commitments and Collapsing Hash Functions | 1:10:12 | |
|
415. | Classifying the Complexity of SAT and CSP: Are we there yet? | 1:10:11 | |
|
416. | MIP* = RE Part 1: The Quantum Low-Degree Test | 1:10:10 | |
|
417. | Proof of NEXP Not in ACC | 1:10:07 | |
|
418. | Interior Point Methods 3 | 1:10:07 | |
|
419. | Recent Advances in Zero-Knowledge Proofs in the Quantum Setting | 1:10:06 | |
|
420. | The Barrier Method and the Kadison-Singer Problem - A | 1:10:06 | |
|
421. | PDE on Graphs and Their Continuum Limits | 1:10:05 | |
|
422. | How to do Fiat-Shamir in the Standard Model | 1:10:01 | |
|
423. | Quantum Expanders | 1:10:00 | |
|
424. | Fiat-Shamir in the QROM | 1:09:59 | |
|
425. | TUTORIAL: Recent Development in Selective Inference I | 1:09:57 | Tutorial |
|
426. | Analysis and Design of Optimization Algorithms via Integral Quadratic Constraints | 1:09:56 | |
|
427. | The No Club: Putting a Stop to Women’s Dead-End Work | 1:09:55 | |
|
428. | Multi-Dimensional and Non-Linear Mechanism Design and Approximation II | 1:09:55 | |
|
429. | The Social Survey Statistician's Perspective | 1:09:55 | |
|
430. | Query Optimization and Evaluation 4: Instance Optimality | 1:09:51 | |
|
431. | Learning from Quantum Experiments | 1:09:50 | |
|
432. | On Algorithmic Game Theory II | 1:09:49 | |
|
433. | Non-Malleable Codes in the Split-State Model | 1:09:47 | |
|
434. | Finite and Algorithmic Model Theory IV | 1:09:46 | |
|
435. | A Roadmap for the Next Phase of SAT Research | 1:09:46 | |
|
436. | Machine Learning for Healthcare Data | 1:09:46 | |
|
437. | Cryptography via Burnside Groups | 1:09:46 | |
|
438. | Earthquake Early Warning: MyShake - Building a Global Seismic Network Using Your Smartphones | 1:09:45 | |
|
439. | Nakamoto’s Consensus: Foundations of Blockchain Security (Part II) | 1:09:44 | |
|
440. | Intro to Quantum Codes | 1:09:44 | |
|
441. | Is There Evidence of Exponential Quantum Advantage in Quantum Chemistry? | Quantum Colloquium | 1:09:41 | |
|
442. | Wrap Session part 2 | 1:09:40 | |
|
443. | Distribution Estimation and Applications I | 1:09:38 | |
|
444. | Quantum Advantage with Shallow Clifford Circuits | 1:09:35 | |
|
445. | Sketching for Linear Algebra: Basics of Dimensionality Reduction and CountSketch II | 1:09:35 | |
|
446. | Research Challenges in Designing the US Incentive Auction | 1:09:34 | |
|
447. | A Taxonomy of Fixed Point Computation Problems for Algebraically-Defined Functions, and their Comput | 1:09:34 | |
|
448. | Complexity and Algorithmic Game Theory II | 1:09:33 | |
|
449. | Consequences of ETH: Tight Bounds for Various Problems | 1:09:33 | |
|
450. | Differential Privacy: Fundamentals to Forefront II | 1:09:32 | |
|
451. | Secure Multiparty Computation II | 1:09:31 | |
|
452. | Panel Discussion: Beyond Worst-Case Analysis | 1:09:31 | Discussion |
|
453. | When Cryptography Meets Modern Channel Coding | 1:09:29 | |
|
454. | Exact Holographic Mapping and Emergent Space-time Geometry | 1:09:29 | |
|
455. | QEC in AdS/CFT | 1:09:26 | |
|
456. | Geometry of Symmetric Bivariate Tensors of Fixed Typical Rank | 1:09:26 | |
|
457. | Practical Lattice-based Cryptography in PALISADE | 1:09:25 | |
|
458. | Learning in Games I | 1:09:25 | |
|
459. | TUTORIAL: Recent Development in Selective Inference II | 1:09:24 | Tutorial |
|
460. | From Stability to Differential Privacy | 1:09:23 | |
|
461. | Assumptions of Computer Science Interacting with Assumptions of Text-driven Normativities | 1:09:22 | |
|
462. | Sketching High-Dimensional Data | 1:09:22 | |
|
463. | New Developments in Multilinear Maps: Zeroizing Attacks, Defenses, and Post-Zeroizing Obfuscation | 1:09:17 | |
|
464. | Unsupervised Representation Learning | 1:09:16 | |
|
465. | The Transfer Performance of Economic Models | 1:09:16 | |
|
466. | Tensor Decomposition I | 1:09:15 | |
|
467. | Sieving in practice: The Generalized Sieve Kernel (G6K) | 1:09:11 | |
|
468. | Stochastic Bandits: Foundations and Current Perspectives | 1:09:10 | |
|
469. | Platforms and Marketplaces: Past Lessons and Future Possibilities | 1:09:08 | |
|
470. | Stochastic Programming Approach to Optimization Under Uncertainty (Part 2) | 1:09:07 | |
|
471. | Min-Max Optimization (Part II) | 1:09:05 | |
|
472. | Communicating with Anecdotes | 1:09:05 | |
|
473. | Alert Streams in the LSST Era: Challenges and Opportunities | 1:09:03 | |
|
474. | Recent Progress in Quantum Advantage | 1:09:01 | |
|
475. | Introduction to Data Structures and Optimization for Fast Algorithms | 1:09:00 | |
|
476. | Dynamical Systems and Learning in Games (Part IV) | 1:09:00 | |
|
477. | Information Theory in Computational Complexity IV | 1:08:59 | Guide |
|
478. | Identification Analysis In Models With Set Valued Predictions | 1:08:56 | |
|
479. | A Matrix Chernoff Bound for Strongly Rayleigh Distributions and Spectral Sparsifiers... | 1:08:55 | |
|
480. | Polar Codes I | 1:08:53 | |
|
481. | Communicating Algorithmic Science to the Public | Theoretically Speaking | 1:08:52 | |
|
482. | Circuit Analysis Algorithms | 1:08:52 | |
|
483. | Tsunami Forecast: Connecting Science with Warning Operations | 1:08:51 | |
|
484. | Classical Shadows of Quantum States | Quantum Colloquium | 1:08:50 | |
|
485. | Noisy Connections: A Survey of Interactive Coding and Its Borders with Other Topics | 1:08:48 | |
|
486. | Electrical Flows Primitive and Fast Graph Algorithms | 1:08:48 | |
|
487. | Recent Results on RL With Gradient Free Optimization | 1:08:48 | |
|
488. | The Seeds of Stories | 1:08:46 | |
|
489. | Accessing Answers to Unions of Conjunctive Queries with Ideal Time Guarantees: I | 1:08:41 | |
|
490. | In Search of New Algorithms Part I: Neural Networks | 1:08:40 | |
|
491. | An Introduction to Potential Outcomes, DAGs and Single-World Intervention Graphs | 1:08:40 | |
|
492. | Computing and Data Science for Human Welfare and Social Justice | 1:08:40 | |
|
493. | Equivariant RL | 1:08:40 | |
|
494. | Optimization and Sampling Under Symmetry: Part 2 -- Lie Theory | 1:08:36 | |
|
495. | Arithmetic Applications of Pseudorandomness III | 1:08:35 | |
|
496. | Approximation Algorithms for Stochastic Optimization I | 1:08:35 | |
|
497. | An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicom... | 1:08:34 | |
|
498. | ITCS 2022 Session 12 | 1:08:34 | |
|
499. | Expansion from a Cohomological Viewpoint | 1:08:30 | Vlog |
|
500. | Interior Point Methods 4 | 1:08:29 | |
|