Introduction to Length-Constrained Expanders and Expander Decompositions

Subscribers:
348,000
Published on ● Video Link: https://www.youtube.com/watch?v=pawzx9AEOis



Duration: 55:21
305 views
1


A Google TechTalk, presented by Bernhard Haeupler, 2023-04-12
Abstract: Expander Decompositions have become one of the most ubiquitous, elegant, and versatile tools for fast graph and network optimization algorithms. Length-Constrained Expanders are a recent powerful generalization of expanders. They capture not just (\ell^\infty-quantities like) flows, congestion, and cuts but simultaneously also control (\ell ^{1}-quantities like) lengths and costs. Length-Constrained Expanders majorly extend the problems expanders and expander decompositions can be used for. This talk gives an introduction to expanders and hop-constrained expanders, their expander decompositions, and some applications.

Bio: Bernhard Haeupler is neurodiverse (ADHD & Dyslexia), a postprof at ETH Zurich, and an Adjunct Professor at Carnegie Mellon University, where they were an Assistant and Associate Professor of Computer Science from 2014 to 2022. They received their Ph.D. and M.Sc. in Computer Science from MIT, and a B.Sc., M.Sc. and Diploma in (Applied) Mathematics from the Technical University of Munich. Dr. Haeupler's research interests lie in the intersection of algorithm design, distributed and parallel computing, network optimization algorithms, and (network) coding theory. Their research, spanning over 100 articles, was recognized with several awards, including the ACM-EATCS Doctoral Dissertation Award of Distributed Computing, the George Sprowls Dissertation Award at MIT, and various best (student) paper awards. Their research has been funded by multiple prestigious grants, including a Sloan Research Fellowship, the NSF CAREER Award, and an ERC Award.

A Google Talk Series on Algorithms, Theory, and Optimization




Other Videos By Google TechTalks


2023-05-30Differentially Private Online to Batch
2023-05-30Differentially Private Diffusion Models Generate Useful Synthetic Images
2023-05-30Improving the Privacy Utility Tradeoff in Differentially Private Machine Learning with Public Data
2023-05-30Randomized Approach for Tight Privacy Accounting
2023-05-30Almost Tight Error Bounds on Differentially Private Continual Counting
2023-05-30EIFFeL: Ensuring Integrity for Federated Learning
2023-05-30Differentially Private Diffusion Models
2023-05-15Damian Grimling | Sentistocks | Sentimenti | web3 talks | March 9th 2023 | MC: Blake DeBenon
2023-04-21Branimir Rakic | CTO & Co-Founder of OriginTrail | web3 talks | Feb 27th 2023 | MC: Alex Ticamera
2023-04-15A Nearly Tight Analysis of Greedy k-means++
2023-04-15Introduction to Length-Constrained Expanders and Expander Decompositions
2023-04-07Improved Feature Importance Computation for Tree Models Based on the Banzhaf Value
2023-04-07A Unifying Theory of Distance to Calibration
2023-04-07Dynamic Graph Sketching: To Infinity And Beyond
2023-03-20Sergey Nazarov | Co-Founder Chainlink | web3 talks | Mar 16 2023 | MC: Marlon Ruiz
2023-03-09Evan Shapiro | CEO Mina Foundation | web3 talks | Feb 16th 2023 | MC: Marlon Ruiz
2023-03-07Zürich Go Meetup: Zero-effort Type-safe Parsing of JSON and XML
2023-03-07Zürich Go Meetup: Let’s Build a Game with Go
2023-03-07Zürich Go Meetup: Run Go programs on your Raspberry Pi with gokrazy!
2023-03-03Online Covering: Secretaries, Prophets and Universal Maps
2023-03-03Auto-bidding in Online Advertising: Campaign Management and Fairness