BEGIN:VCALENDAR
PRODID:-//Campus Event Calendar//EN
X-WR-CALNAME: Campus Event Calendar
X-WR-TIMEZONE:(UTC+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
VERSION:2.0
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Europe/Berlin
X-LIC-LOCATION:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:19700329T020000
RRULE:FREQ=YEARLY;INTERVAL=1;BYDAY=-1SU;BYMONTH=3
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:19701025T030000
RRULE:FREQ=YEARLY;INTERVAL=1;BYDAY=-1SU;BYMONTH=10
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170724T150000
DURATION:PT0H30M0S
UID:B4BAD93E0DAE425CC125816400477A76
DTSTAMP:20170721T150044
SUMMARY:Pierre-Louis Giscard (University of York) talks about "The Theor
y of Walks"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Karl Bringmann
DESCRIPTION:Networks\, that is collections of nodes together with sets o
f edges linking some \nof these nodes\, naturally encode relations (the
edges) between entities (the \nnodes). The trajectories on a network (su
ccessions of contiguous edges)\, called \nwalks\, represent the dynamica
l processes of the system of entities. Networks \nand walks nowadays pla
y a ubiquitous role across many domains\, where graphical \nmodels are e
ssential tools to master the interactions and dynamics of complex \nsyst
ems. We will show how walks on graphs actually obey a non-commutative \n
extension of number-theory\, complete with its primes\, algebraic functi
ons\, \ncontinued fractions and more. Concrete applications of this theo
ry in \nalgorithmics\, machine learning and network analysis will be pre
sented\, \nincluding the best general purpose algorithm for counting sim
ple cycles\, \nalgorithms for exact belief propagation on Gaussian graph
ical models and the \ncalculation of matrix functions\, novel state-of-t
he-art kernels for the \nautomatic classifications of graphs\, the resol
ution of an old question on large \nsocial networks and how a non-commut
ative Brun sieve changes our perception of \nboth plant-pathogen interac
tions and the impact of the Dodd-Frank act in one \ngo.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170724-1500-0
24
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170725T103000
DURATION:PT1H30M0S
UID:BC6D95583E2853C6C12581640045415A
DTSTAMP:20170721T143627
SUMMARY:Alexandra Chouldechova (CMU) talks about "Fairer and more accura
te, but for whom?"
LOCATION:Saarbrücken building E1 5, room 005 / simultaneous videocast to
Kaiserslautern building G26, room 111
CATEGORIES:SWS Colloquium [AG Audience]
CONTACT:Annika Meiser\, Phone: 93039105
DESCRIPTION:Complex statistical models are increasingly being used or co
nsidered for use in \nhigh-stakes decision-making pipelines in domains s
uch as financial services\, \nhealth care\, criminal justice and human s
ervices. These models are often \ninvestigated as possible improvements
over more classical tools such as \nregression models or human judgement
. While the modeling approach may be new\, \nthe practice of using some
form of risk assessment to inform decisions is not. \nWhen determining
whether a new model should be adopted\, it is essential to be \nable to
compare the proposed model to the existing approach across a range of \n
task-relevant accuracy and fairness metrics. In this talk I will describ
e a \nsubgroup analysis approach for characterizing how models differ in
terms of \nfairness-related quantities such as racial or gender dispari
ties. I will also \ntalk about an ongoing collaboration with the Alleghe
ny County Department of \nHealth and Human Services on developing and im
plementing a risk assessment tool \nfor use in child welfare referral sc
reening.\n\nhttps://arxiv.org/abs/1707.00046\n\nhttp://www.post-gazette.
com/local/region/2017/04/09/Allegheny-County-using-algor\nithm-to-assist
-in-child-welfare-screening/stories/201701290002
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170725-1030-0
05
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170725T110000
DURATION:PT1H30M0S
UID:724F2A38AB1260ECC125816400243739
DTSTAMP:20170721T083534
SUMMARY:Nils Ole Tippenhauer (Singapore University of Technology and Des
ign (SUTD)) talks about "Physical-Layer Security Aspects of ICS and IoT"
LOCATION:Saarbrücken building E9 1, room Lecture Hall
CATEGORIES:CISPA Distinguished Lecture Series [Public Audience]
CONTACT:Sabine Nermerich\, Phone: 302-71911
DESCRIPTION:Physical processes that are sensed and actuated play an impo
rtant role in the \ngeneral Internet of Things (IoT)\, and in particular
in Industrial Control \nSystems (ICS). From a security perspective\, t
he physical layer allows for novel \ninteractions of the (local) attacke
r with the system\, and manipulating the \nphysical process itself could
be the target of the attacker. In addition\, \nphysical processes could
also be leveraged for attack detection\, and laws of \nphysics constra
in even strong attackers. As result\, research in that area needs \nto b
e interdisciplinary and connect traditional engineering domains such as
\nwireless communications\, systems engineering\, and information securi
ty. In this \ntalk\, a number of physical-layer security aspects relatin
g to wireless \ncommunications\, IoT\, and ICS are discussed. In particu
lar\, focus will be on \nattacks and detection mechanisms for ICS\, and
time-of-arrival-based \nlocalization used in GPS and distance bounding.\
n
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170725-1100-L
ectureHall
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170725T130000
DURATION:PT0H30M0S
UID:ACA77751F849B058C12581640047F607
DTSTAMP:20170721T150600
SUMMARY:Karl Bringmann (MPI-INF - D1) talks about "Improved Algorithms f
or Computing the Cycle of Minimum Cost-to-Time Ratio in Directed Graphs"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Karl Bringmann
DESCRIPTION:We study the problem of finding the cycle of minimum cost-to
-time ratio in a \ndirected graph with n nodes and m edges. This problem
has a long history in \ncombinatorial optimization and has recently see
n interesting applications in \nthe context of quantitative verification
. We focus on strongly polynomial \nalgorithms to cover the use-case whe
re the weights are relatively large \ncompared to the size of the graph.
Our main result is an algorithm with running \ntime O ̃(m^0.75 n^1.5)\,
which gives the first improvement over Megiddo’s O ̃\n(n^3) algorithm f
or sparse graphs. To obtain our main result\, we develop a \nparallel al
gorithm for negative cycle detection and single-source shortest \npaths
that might be of independent interest.\n\nThis is the extended version o
f a talk at ICALP'17 (Track B)
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170725-1300-0
24
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170727T130000
DURATION:PT0H30M0S
UID:3B08061FF2135A48C12581640030D8C4
DTSTAMP:20170721T105332
SUMMARY:Seri Khoury (Technion) talks about "TBD"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Moti Medina
DESCRIPTION:Bla
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170727-1300-0
24
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170808T130000
DURATION:PT0H30M0S
UID:1EEF843D106C5F00C1258167002BF57F
DTSTAMP:20170724T100008
SUMMARY:Andreas Schmid (MPI-INF - D1) talks about "Computing Tutte Paths
"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Andreas Schmid
DESCRIPTION:Tutte paths are one of the most successful tools for attacki
ng Hamiltonicity \nproblems in planar graphs. Unfortunately\, results ba
sed on them are \nnon-constructive\, as their proofs inherently use an i
nduction on overlapping \nsubgraphs and these overlaps hinder to bound t
he running time to a polynomial.\n\nFor special cases however\, computat
ional results of Tutte paths are known: For \n4-connected planar graphs\
, Tutte paths are in fact Hamiltonian paths and Chiba \nand Nishizeki sh
owed how to compute such paths in linear time. For 3-connected \nplanar
graphs\, Tutte paths have a more complicated structure\, and it has only
\nrecently been shown that they can be computed in polynomial time.\n\n
However\, Tutte paths are defined for general 2-connected planar graphs
and this \nis what most applications need. Unfortunately\, no computatio
nal results are \nknown. We give the first efficient algorithm that comp
utes a Tutte path (for \nthe general case of 2-connected planar graphs).
One of the strongest existence \nresults about such Tutte paths is due
to Sanders\, which allows to prescribe the \nend vertices and an interme
diate edge of the desired path. Encompassing and \nstrengthening all pre
vious computational results on Tutte paths\, we show how to \ncompute th
is special Tutte path efficiently (in quadratic time). Our method \nrefi
nes both\, the results of Thomassen and Sanders\, and avoids overlapping
\nsubgraphs by using a novel iterative decomposition along 2-separators
.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170808-1300-0
24
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170810T130000
DURATION:PT0H30M0S
UID:94F7241B98C079B5C1258144004C0E8E
DTSTAMP:20170619T155044
SUMMARY:Krzysztof Fleszar (MPI-INF - D1) talks about "Maximum Disjoint P
aths: New Algorithms based on Tree-Likeness"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Antonios Antoniadis
DESCRIPTION:Maximum Edge Disjoint Paths is a classical NP-hard problem o
f finding a \nmaximum-size subset from a given set of k terminal pairs t
hat can be routed via \nedge-disjoint paths. One of the big open problem
s in approximation algorithms \nis to close the gap between the best kno
wn approximation upper and lower bound.\n\nIn this talk\, I introduce th
e problem and present new approximation algorithms \n(ESA 2016) that str
engthen best-known results. They provide new bounds \nformulated in term
s of the feedback vertex set number r of a graph\, which \nmeasures its
vertex deletion distance to a forest.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170810-1300-0
24
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170817T140000
DURATION:PT1H30M0S
UID:1E105538CEE8CC76C125816700276D1A
DTSTAMP:20170724T091038
SUMMARY:Thomas Schneider (TU Darmstadt) talks about "Engineering Privacy
-Preserving Cryptographic Protocols"
LOCATION:Saarbrücken building E9 1, room Lecture Hall
CATEGORIES:CISPA Distinguished Lecture Series [Public Audience]
CONTACT:Sabine Nermerich\, Phone: 302-71911
DESCRIPTION:As today’s world gets more and more connected\, actors with
different and \npotentially conflicting interests want to interact in ma
ny application \nscenarios. Examples are citizens and governments (face
recognition)\, patients \nand health insurances (e-health services)\, or
companies (cloud computing). In \nthis context\, it is of foremost impo
rtance that the underlying IT systems and \nalgorithms can fulfill the d
iverse security and privacy requirements of the \ninvolved parties. In p
articular\, if sensitive (e.g.\, medical or personal) data \nis processe
d by not fully trusted service providers (e.g.\, "in the cloud")\, \nthi
s data should be protected against misuse. \nPrivacy-preserving cryptogr
aphic protocols allow to process such sensitive data \nunder encryption
in a provably secure way. In our work we design\, optimize and \nprototy
pically implement highly efficient privacy-preserving cryptographic \npr
otocols. Moreover\, we build tools to automatically generate such protoc
ols. \nIn this talk\, I give an overview on our past\, present\, and fut
ure research in \nthe area of engineering privacy-preserving cryptograph
ic protocols. We are \nworking in three main areas: In the first area we
consider highly efficient \nprotocols for specific functionalities such
as private set intersection for \nwhich current applications like Faceb
ook\, WhatsApp or Secret still use insecure \nsolutions. The second area
deals with generic protocols that can securely \nevaluate arbitrary fun
ctionalities where we show for example how to securely \nevaluate privat
e functions. The third area are collaborations with other \ndisciplines
such as a recent collaboration that shows how to benefit from \nexisting
hardware synthesis tools. In the future we are planning to improve \nse
curity and scalability of the protocols with the overall goal of enablin
g \nfurther real-world privacy-preserving applications.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170817-1400-L
ectureHall
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170818T110000
DURATION:PT1H30M0S
UID:E06B47DC6ED88B08C125816700272286
DTSTAMP:20170724T090727
SUMMARY:Martin Ochoa (Singapore University of Technology and Design) tal
ks about "Securing Cyber-Physical Systems: Challenges and the road ahead
"
LOCATION:Saarbrücken building E9 1, room Lecture Hall
CATEGORIES:CISPA Distinguished Lecture Series [Public Audience]
CONTACT:Sabine Nermerich\, Phone: 302-71911
DESCRIPTION:With the proliferation of highly connected "smart things"\,
such as home and \nindustrial automation systems\, there has been also a
corresponding rise in \nattacks and concerns regarding their security.
On the one hand\, many of these \nsystems were not designed with securit
y considerations in mind\, due to \nhistorical reasons (in the case of l
egacy Industrial Control Systems) and \nrush-to-market constraints (for
some Internet-of-Things devices). Moreover\, \nthere are other inherent
constraints that conflict with security\, such as \ncomputational limita
tions\, real-time deadlines and the difficulty to perform \ntraditional
testing and patching\, among others. In this talk we discuss some of \nt
hese challenges and report on recent results and work in progress being
\nperformed on realistic CPS testbeds (water\, smart-grid and IoT) at SU
TD. Such \nefforts include: authenticating communications and enforcing
memory safety in \nICS\, reasoning on integrity violating information fl
ows in CPS and building \nscalable highly-interactive honeypots.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170818-1100-L
ectureHall
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20170824T130000
DURATION:PT0H30M0S
UID:952BE02D66C476CCC12581600024B4DE
DTSTAMP:20170717T084055
SUMMARY:Aruni Choudhary (MPI-INF - D1) talks about "Improved Approximate
Rips Filtrations with Shifted Integer Lattices"
LOCATION:Saarbrücken building E1 4, room 024
CATEGORIES:AG1 Mittagsseminar (own work) [AG Audience]
CONTACT:Aruni Choudhary
DESCRIPTION:Rips complexes are important structures for analyzing topolo
gical features of \nmetric spaces. Unfortunately\, generating these comp
lexes constitutes an \nexpensive task\nbecause of a combinatorial explos
ion in the complex size. For $n$ points in \n$\mathbb{R}^d$\, we present
a scheme to construct a $3\sqrt{2}$-approximation of \nthe\nmulti-scale
filtration of the $L_\infty$-Rips complex\, which extends to a \n$O(d^{
0.25})$-approximation of the Rips filtration for the Euclidean case. The
\n$k$-skeleton of the resulting approximation has a total size of $n2^{
O(d\log \nk)}$. The scheme is based on the integer lattice and on the ba
rycentric \nsubdivision of the $d$-cube.
TRANSP:OPAQUE
CLASS:PUBLIC
URL:http://domino.mpi-inf.mpg.de/internet/events.nsf/all/20170824-1300-0
24
END:VEVENT
END:VCALENDAR