ADYNSeminar
2024:
August 12th, Virtual
Speakers:
 tba:
tba  tba:
tba
Show abstracts
tba (tba)
tba
tba (tba)
tba
June 3rd, Virtual
Speakers:
 Ioannis Caragiannis, Aarhus University:
Two Stories about Distortion in Social Choice [VIDEO]  Lisa Wilhelmi, Goethe University Frankfurt:
Algorithms for Claims Trading [VIDEO]
Show abstracts
Two Stories about Distortion in Social Choice (Caragiannis)
The notion of distortion has received much attention in recent years by the computational social choice community. In general, distortion quantifies how the lack of complete information affects the quality of the social choice outcome. Ideally, a distortion of 1 means that the social choice outcome is the most efficient one.
In the talk, we will consider two related scenarios. The first one is inspired by voting under the impartial culture assumption. We assume that agents have random values for the alternatives, drawn from a probability distribution independently for every agentalternative pair. We explore voting rules that use a limited number of queries per agent in addition to the agent's ordinal information. For simple distributions, we present rules that always select an alternative of social welfare that is only a constant factor away from the optimal social welfare (i.e., rules of constant distortion).
The second scenario is motivated by the practice of sortition. Here, we assume that agents correspond to points on a metric space. Our objective is to select, in a fair manner, a subset of the agents (corresponding to a citizens' assembly) so that for every election with alternatives from the same metric space, the most preferred alternative of the citizens' assembly has a social cost that is very close to that of the optimal alternative for the whole agent population. Our positive results indicate that assemblies of size logarithmic in the number of alternatives are sufficient to get constant distortion in this model.
The talk is based on two papers that are joint works with Karl Fehrs, and with Evi Micha and Jannik Peters, respectively.
Algorithms for Claims Trading (Wilhelmi)
The recent banking crisis has again emphasized the importance of understanding and mitigating systemic risk in financial networks. In this paper, we study a marketdriven approach to rescue a bank in distress based on the idea of claims trading, a notion defined in Chapter 11 of the U.S. Bankruptcy Code. We formalize the idea in the context of the seminal model of financial networks by Eisenberg and Noe. For two given banks v and w, we consider the operation that w takes over some claims of v and in return gives liquidity to v (or creditors of v) to ultimately rescue v (or mitigate contagion effects). We study the structural properties and computational complexity of decision and optimization problems for several variants of claims trading.
When trading incoming edges of v (i.e., claims for which v is the creditor), we show that there is no trade in which both banks v and w strictly improve their assets. We therefore consider creditorpositive trades, in which v profits strictly and w remains indifferent. For a given set C of incoming edges of v, we provide an efficient algorithm to compute payments by w that result in a creditorpositive trade and maximal assets of v. When the set C must also be chosen, the problem becomes weakly NPhard. Our main result here is a bicriteria FPTAS to compute an approximate trade, which allows for slightly increased payments by w. The approximate trade results in nearly the optimal amount of assets of v in any exact trade. Our results extend to the case in which banks use general monotone payment functions to settle their debt and the emerging clearing state can be computed efficiently.
May 6th, Virtual (17:15)
Speakers:
 Davide Mottin, Aarhus University:
Robust Graph Alignment: Evaluation and Enhancements [VIDEO]  Daniel Allendorf, Goethe University Frankfurt:
Uniform Generation of Temporal Graphs with Given Degrees
Show abstracts
Robust Graph Alignment: Evaluation and Enhancements (Mottin)
In this talk, we shed some light on the generalization abilities of graph neural networks (GNNs) in various settings. First, we establish a tight connection between the 1dimensional WeisfeilerLeman algorithm and the VC dimension of GNNs. Graph alignment is the problem of establishing correspondences among the nodes of two graphs. This problem finds applications across divers domains, such as egonetwork analysis, protein alignment, and social networks. Despite its apparent simplicity, achieving robust and accurate alignments remains a challenge, particularly in the presence of noise.
In this talk, I present a comprehensive evaluation of graph alignment methods, shedding light on the efficacy of existing approaches and the conditions under which they perform well. Our evaluation reveals that many methods are susceptible to even modest levels of noise, prompting the need for more robust solutions. Surprisingly, our findings demonstrate that simple baseline methods, when appropriately tuned, can yield competitive and sometimes superior results compared to more complex algorithms.
Building upon these insights, we introduce novel contributions aimed at enhancing the robustness of graph alignment methodologies. First, we propose leveraging spectral methods to filter out noise from the adjacency matrix, thereby improving the signaltonoise ratio and enhancing alignment accuracy. Second, we tease on the effectiveness of regularization techniques in refining alignment objectives, mitigating the impact of noise and uncertainties in the alignment process. By amalgamating empirical evaluations with innovative enhancements, this talk offers a roadmap towards achieving robust graph alignments and paves the way to possible new collaborations between theory and practice.
Uniform Generation of Temporal Graphs with Given Degrees (Allendorf)
Uniform sampling from the set G(d) of graphs with a given degreesequence d = (d_1, ..., d_n) is a classical problem in the study of random graphs. We consider an analogue for temporal graphs in which the edges are labeled with integer timestamps The input to this generation problem is a tuple D = (d, T) and the task is to output a uniform random sample from the set G(D) of temporal graphs with degreesequence d and timestamps in the interval [1, T]. By allowing repeated edges with distinct timestamps, G(D) can be nonempty even if G(d) is, and as a consequence, existing algorithms are difficult to apply.
We describe an algorithm for this generation problem which runs in expected linear time O(M) if Delta^{2+eps} = O(M) for some constant eps > 0 and T  \Delta = Omega(T) where M = sum_i d_i and Delta = max_i d_i. Our algorithm applies the switching method of McKay and Wormald to temporal graphs: we first generate a random temporal multigraph and then remove selfloops and duplicated edges with switching operations which rewire the edges in a degreepreserving manner.
April 22th, Virtual (16:30)
Speakers:
 Christoph Lenzen, CISPA Helmholtz Center for Information Security:
Low Diameter Graph Decompositions by Approximate Distance Computation [VIDEO]  Malin Rau, Hamburg University:
A Tight (3/2 + ε)Approximation Algorithm For Demand Strip Packing [VIDEO]
Show abstracts
Low Diameter Graph Decompositions by Approximate Distance Computation (Lenzen)
In many models for largescale computation, decomposition of the problem is key to efficient algorithms. For distancerelated graph problems, it is often crucial that such a decomposition results in clusters of small diameter, while the probability that an edge is cut by the decomposition scales linearly with the length of the edge. Previous techniques heavily building on single source shortest paths (SSSP) computations, which constitute a complexity bottleneck in many models of computation. Therefore, it is desirable to replace exact SSSP computations with approximate ones. However this imposes a fundamental challenge, since prior constructions inherently rely on the SSSP computation to be exact.
We overcome this obstacle by developing a technique termed blurry ball growing, which allows us to replace exact SSSP computations by (a small number of) approximate ones. The utility of our approach is showcased by deriving efficient algorithms that work in the Congest, PRAM, and semistreaming models of computation. As an application, we obtain metric tree embedding algorithms in the vein of Bartal (FOCS 96) whose computational complexities in these models are optimal up to polylogarithmic factors. Our embeddings have the additional useful property that the tree can be mapped back to the original graph such that each edge is "used" only O(log n) times, which is of interest for capacitated problems and simulating Congest algorithms on the tree into which the graph is embedded.
A Tight (3/2 + ε)Approximation Algorithm For Demand Strip Packing (Rau)
We consider the Demand Strip Packing problem (DSP), in which we are given a set of jobs, each specified by a processing time and a demand. The task is to schedule all jobs such that they are finished before some deadline D while minimizing the peak demand, i.e., the maximum total demand of tasks executed at any point in time. DSP is closely related to the Strip Packing problem (SP), in which we are given a set of axisaligned rectangles that must be packed into a strip of fixed width while minimizing the maximum height. DSP and SP are known to be NPhard to approximate to within a factor smaller than 3/2.
We present a tight (3/2 + ε)approximation algorithm for DSP that runs in polynomial time for every constant ε > 0, improving upon the previous best approximation ratio of 5/3 +ε. For achieving this best possible approximation guarantee, we prove a global structural result about all optimal solutions: either all jobs with demand greater than OPT/2 are sorted by this parameter and are scheduled one after the other, or the schedule can fit one extra job with demand OPT and width D/50 while maintaining a peak demand of at most (3/2+ε)OPT.
March 18th, Virtual
Speakers:
 Christopher Morris, RWTH Aachen:
WL meet VC: Generalization abilities of graph neural networks [VIDEO]  Emily Jin, University of Oxford
Homomorphism Counts for Graph Neural Networks: All About That Basis [VIDEO]
Show abstracts
WL meet VC: Generalization abilities of graph neural networks (Morris)
In this talk, we shed some light on the generalization abilities of graph neural networks (GNNs) in various settings. First, we establish a tight connection between the 1dimensional WeisfeilerLeman algorithm and the VC dimension of GNNs. Secondly, we use the data margin as a parameter to provide insights into when more expressive variants of GNNs provably generalize.
Homomorphism Counts for Graph Neural Networks: All About That Basis (Jin)
In our recent work, we study the expressivity of graph neural networks (GNNs) with respect to injecting graph motif parameters. Specifically, we show that using the homomorphsim basis of a parameter instead of the parameter itself yields a more finegrained approach that results in more expressive architectures. We see that this holds at both the graph and nodelevel, and it also applies to higherorder GNNs.
February 5th, Virtual
Speakers:
 Pavel Zakharov, TU Dortmund:
Fractional Colorings of Random Hypergraphs [VIDEO]  Heiko Röglin, Universität Bonn:
Connected kCenter and kDiameter Clustering [VIDEO]
Show abstracts
Fractional Colorings of Random Hypergraphs (Zakharov)
The work deals with estimating the (4:2)colorability threshold for a random kuniform hypergraph in the binomial model H(n, k, p). We consider the sparse case, when the expected number of edges is a linear function of n, i.e. p {n \choose k} = cn, and c > 0, k \geq 3 are some fixed constants. We show that the threshold constant can be expressed as log 6 \cdot 2^{k2}  {\log 6 \over 2} + g(k), where g(k) is exponentially small.
Connected kCenter and kDiameter Clustering (Röglin)
Motivated by an application from geodesy, we study the connected kcenter problem and the connected kdiameter problem. These problems arise from the classical kcenter and kdiameter problems by adding a side constraint. For the side constraint, we are given an undirected connectivity graph G on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in G. Our main result is an O(1)approximation algorithm for the connected kcenter and kdiameter problem for Euclidean spaces of low dimension (constant d) and for metrics with constant doubling dimension. For general metrics, we get an O(log^2(k))approximation. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.
Based on joint work with Lukas Drexler, Jan Eube, Kelin Luo, Melanie Schmidt, and Julian Wargalla.
January 8th, Virtual
Speakers:
 Argyrios Deligkas, Royal Holloway:
Tight Inapproximability for Graphical Games [VIDEO]  Pascal Lenzner, HPI Potsdam:
The Impact of Cooperation in Bilateral Network Creation [VIDEO]
Show abstracts
Tight Inapproximability for Graphical Games (Deligkas)
In this paper, we provide a complete characterization for the computational complexity of finding approximate equilibria in twoaction graphical games. We consider the two most wellstudied approximation notions: εNash equilibria (εNE) and εwellsupported Nash equilibria (εWSNE), where ε is in [0,1]. We prove that computing an εNE is PPADcomplete for any constant ε smaller than 1/2, while a very simple algorithm (namely, letting all players mix uniformly between their two actions) yields a 1/2NE. On the other hand, we show that computing an εWSNE is PPADcomplete for any constant ε smaller than 1, while a 1WSNE is trivial to achieve, because any strategy profile is a 1WSNE. All of our lower bounds immediately also apply to graphical games with more than two actions per player.
The Impact of Cooperation in Bilateral Network Creation (Lenzner)
Many realworld networks, like the Internet or social networks, are not the result of central design but instead the outcome of the interaction of local agents that selfishly optimize their individual utility. The wellknown Network Creation Game by Fabrikant, Luthra, Maneva, Papadimitriou, and Shenker (PODC'03) models this. There, agents corresponding to network nodes buy incident edges towards other agents for a price of alpha > 0 and simultaneously try to minimize their buying cost and their total hop distance. Since in many realworld networks, e.g., social networks, consent from both sides is required to establish and maintain a connection, Corbo and Parkes (PODC'05) proposed a bilateral version of the Network Creation Game, in which mutual consent and payment are required in order to create edges. It is known that this cooperative version has a significantly higher Price of Anarchy compared to the unilateral version. On the first glance this is counterintuitive, since cooperation should help to avoid socially bad states. However, in the bilateral version only a very restrictive form of cooperation is considered. We investigate this tradeoff between the amount of cooperation and the Price of Anarchy by analyzing the bilateral version with respect to various degrees of cooperation among the agents. With this, we provide insights into what kind of cooperation is needed to ensure that socially good networks are created. As a first step in this direction, we focus on tree networks and present a collection of asymptotically tight bounds on the Price of Anarchy that precisely map the impact of cooperation. Most strikingly, we find that weak forms of cooperation already yield a significantly improved Price of Anarchy. In particular, the cooperation of coalitions of size 3 is enough to achieve constant bounds. Moreover, for general networks we show that enhanced cooperation yields close to optimal networks for a wide range of edge prices.
2023:
December 4th, Virtual
Speakers:
 Sigal Oren, Ben Gurion University:
Optimal Stopping with Behaviorally Biased Agents: The Role of Loss Aversion and Changing Reference Points [VIDEO]
Show abstracts
Optimal Stopping with Behaviorally Biased Agents (Oren)
People are often reluctant to sell a house, or shares of stock, below the price at which they originally bought it. While this is generally not consistent with rational utility maximization, it does reflect two strong empirical regularities that are central to the behavioral science of human decisionmaking: a tendency to evaluate outcomes relative to a reference point determined by context (in this case the original purchase price), and the phenomenon of loss aversion in which people are particularly prone to avoid outcomes below the reference point. Here we explore the implications of reference points and loss aversion in optimal stopping problems, where people evaluate a sequence of options in one pass, either accepting the option and stopping the search or giving up on the option forver. The best option seen so far sets a reference point that shifts as the search progresses, and a biased decisionmaker's utility incurs an additional penalty when they accept a later option that is below this reference point.
Based on joint work with Jon Kleinberg and Bobby Kleinberg.
November 6th, Virtual
Speakers:
 Clara Stegehuis, Twente University:
Networks and epidemics [VIDEO]
Show abstracts
Networks and epidemics (Stegehuis)
In realworld networks, nodes often cluster into groups, also called communities. But what is the influence of these local structures on the speed at which an epidemic spreads? Interestingly, we show that community structures can both enforce as well as inhibit epidemic processes, but that many effects that have previously been claimed on the influence of clusters on epidemics may in fact be attributed to the network degrees rather than their clustered structures. We then investigate to what extent contact tracing can reduce the final size of an epidemic, which strongly depends on the network structure. In contrast to previous findings, contact tracing is not necessarily more effective on networks with heterogeneous degrees. We also show that network clustering influences the effectiveness of the tracing process in a nontrivial way: depending on the infectiousness parameter, contact tracing on clustered networks may either be more, or less efficient than on networks without clustering.
October 2nd, Virtual
Speakers:
 Frederik MallmannTrenn, King's College London:
Local averaging in distributed networks and hoping for the best [VIDEO]  Malin Rau, Hamburg University:
On the Hierachy of Distributed Majority Protocols
Show abstracts
Local averaging in distributed networks and hoping for the best (MallmannTrenn)
In this talk we look at the setting where nodes in a network have an initial value and in every time step pick one random neighbour and average. We consider how the average changes over time when the averaging is done unidirectionally (only one node updates its value) and how it changes when some noise is added to every value sent.
On the Hierachy of Distributed Majority Protocols (Rau)
We study the consensus problem among n agents, defined as follows. Initially, each agent holds one of two possible opinions. The goal is to reach a consensus configuration in which every agent shares the same opinion. To this end, agents randomly sample other agents and update their opinion according to a simple update function depending on the sampled opinions. We consider two communication models: the gossip model and a variant of the population model. In the gossip model, agents are activated in parallel, synchronous rounds. In the population model, one agent is activated after the other in a sequence of discrete time steps. For both models we analyze the following natural family of majority processes called $j$Majority: when activated, every agent samples $j$ other agents uniformly at random (with replacement) and adopts the majority opinion among the sample (breaking ties uniformly at random). As our main result we show a hierarchy among majority protocols: (j+1)Majority (for j > 1) converges stochastically faster than jMajority for any initial opinion configuration. In our analysis we use Strassen's Theorem to prove the existence of a coupling.
September 4th, Virtual
Speakers:
 Kitty Meeks, University of Glasgow:
In search of useful temporal graph parameters
Show abstracts
In search of useful temporal graph parameters (Meeks)
A highly successful approach for tackling NPhard problems on graphs is the paradigm of parameterised complexity: the running time of algorithms is analysed in terms of a secondary measure, or parameter, in addition to the total input size, and the goal is to restrict the combinatorial explosion to the parameter (which is hopefully, in instances of interest, much smaller than the total input size). Many widely used parameters capture structural properties of the input graph, for example the edit distance to some class on which the problem is tractable, or the ease with which the graph can be decomposed according to specific rules. In recent years, there have been numerous attempts to apply the parameterised approach to algorithmic problems on temporal graphs, in which the edgeset changes over time. However, this has led to efficient parameterised algorithms in only a few cases: for many natural problems (including some that are polynomialtime solvable on static graphs) the additional complexity introduced by encoding temporal information in the graph renders the temporal versions intractable even when the underlying graph has very simple structure (e.g. when it is a tree or even a path). This motivates the search for new parameters, specifically designed for temporal graphs, which capture properties of the temporal information in addition to the structure of the underlying graph. In this talk I will survey recent progress in the development of such parameters and highlight a large number of remaining challenges.
August 10th, In person/Virtual
Speakers:
 Mihyun Kang, TU Graz:
Supercritical percolation on highdimensional product graphs
Show abstracts
Supercritical percolation on highdimensional product graphs (Kang)
We consider a random subgraph obtained by bond percolation on highdimensional product graphs in the supercritical regime. We derive expansion properties of its giant component from isoperimetric properties of the underlying product graphs. As a consequence we obtain upper bounds on the diameter of the giant component and the mixing time of the lazy simple random walk on the giant component. This talk is based on joint work with Sahar Diskin, Joshua Erde, and Michael Krivelevich.
July 3rd, Virtual
Speakers:
 Elias Pitschmann, University of Bremen:
Prophet Inequalities over Time [VIDEO]  TigerLily Goldsmith, Royal Holloway University of London:
Being an Influencer is Hard: The Complexity of Influence Maximization in Temporal Graphs with Fixed Source [VIDEO]
Show abstracts
Prophet Inequalities over Time (Pitschmann)
We introduce an overtime variant of the wellknown prophet inequality with i.i.d. random variables. Instead of stopping with one realized value at some point in the process, we decide for each step how long we select the value. Then we cannot select another value until this period is over. The goal is to maximize the expectation of the sum of selected values. We describe the structure of the optimal stopping rule and give upper and lower bounds on the prophet inequality. In online algorithms terminology, this corresponds to bounds on the competitive ratio of an online algorithm.
We give a surprisingly simple algorithm with a single threshold that results in a prophet inequality of approx. 0.396 for all input lengths n. Additionally, as our main result, we present a more advanced algorithm resulting in a prophet inequality of approx. 0.598 when the number of steps tends to infinity. We complement our results by an upper bound that shows that the best possible prophet inequality is at most the inverse of the golden ratio, which is approx. 0.618.
Being an Influencer is Hard (Goldsmith)
We consider the influence maximization problem over a temporal graph, where there is a single fixed source. We deviate from the standard model of influence maximization, where the goal is to choose the set of most influential vertices. Instead, in our model we are given a fixed vertex, or source, and the goal is to find the best time steps to transmit so that the influence of this vertex is maximized. We frame this problem as a spreading process that follows a variant of the susceptibleinfectedsusceptible (SIS) model and we focus on four objective functions. In the first objective, the goal is to maximize the total number of vertices that get infected at least once. In the second objective, the goal is to maximize the number of vertices that are infected at the same time step. In the third objective, the goal is to maximize the number of vertices that are infected at a given time step. Finally, in the fourth objective, the goal is to maximize the total number of vertices that get infected every d time steps. We perform a thorough complexity theoretic analysis for these four objectives over three different scenarios: (1) the unconstrained setting where the source can transmit whenever it wants; (2) the windowconstrained setting where the source has to transmit at either a predetermined, or a shifting window; (3) the periodic setting where the temporal graph has a small period. We prove that all of these problems, with the exception of the first objective for periodic graphs, are intractable even for very simple underlying graphs.
June 12th, Virtual
Speakers:
 Paul Duetting, Google Research:
MultiAgent Contracts [VIDEO]  Tim Koglin, Goethe University Frankfurt:
Information Design for Congestion Games with Unknown Demand [VIDEO]
Show abstracts
MultiAgent Contracts (Duetting)
We study a natural combinatorial singleprincipal multiagent contract design problem, in which a principal motivates a team of agents to exert effort toward a given task. At the heart of our model is a reward function, which maps the agent efforts to an expected reward of the principal. We seek to design computationally efficient algorithms for finding optimal (or nearoptimal) linear contracts for reward functions that belong to the complementfree hierarchy.
Our first main result gives constantfactor approximation algorithms for submodular and XOS reward functions, with value and demand oracles, respectively. It relies on an unconventional use of ``prices'' and (approximate) demand queries for selecting the set of agents that the principal should contract with, and exploits a novel scaling property of XOS functions and their marginals, which may be of independent interest.
Our second main result is an $\Omega(\sqrt{n})$ impossibility for settings with n agents and subadditive reward functions, even with demand oracle access. A striking feature of this impossibility is that it applies to subadditive functions that are constantfactor close to submodular. This presents a surprising departure from previous literature, e.g., on combinatorial auctions.
Preprint: https://arxiv.org/abs/2211.05434 (to appear in STOC 2023)
Information Design for Congestion Games with Unknown Demand (Koglin)
We consider nonatomic congestion games with affine costs and a single commodity whose demand is unknown to the players of the game, but can be observed by a principal. Prior to observing the demand, the principal commits to a public signaling scheme that governs to which extend (if at all) the information about the realized demand is communicated to the players. Upon receiving the signal, the players update their beliefs about the demand and respond by playing a Wardrop equilibrium for the resulting cost functions. We study the question of how to compute the signaling scheme that minimizes the total cost of the induced Wardrop equilibrium.
First, we devise a fully polynomialtime approximation scheme (FPTAS) for the case that the demand can only take two values. The FPTAS relies on several structural properties of the cost of the induced Wardrop equilibrium as a function of the updated belief of the distribution of demands. We show that this function is piecewise linear for any number of demands, and monotonic for two demands. Second, we give a complete characterization of the graph structures where it is optimal for the principal to fully reveal the information about the realized demand to the players. Specifically, we show that this signaling scheme is optimal for all cost functions and probability distributions over demands if and only if the graph is seriesparallel. Third, we propose an algorithm that computes the optimal signaling scheme for any number of demands whose time complexity is polynomial in the number of supports that occur in a Wardrop equilibrium for some demand. Finally, we conduct a computational study that tests this algorithm on realworld instances.
Joint work with Svenja M. Griesbach, Martin Hoefer and Max Klimm.
May 8th, Virtual
Speakers:
 Ulrik Brandes, ETH Zürich:
Computational Study of Collective Behavior: The Case of Association Football (Soccer) [VIDEO]  Hung Tran, Goethe University Frankfurt:
Certifying Induced Subgraphs in Large Graphs [VIDEO]
Show abstracts
Computational Study of Collective Behavior: The Case of Association Football (Soccer) (Brandes)
I will present team sports analytics as an opportunity to teach and develop computational methods for the study of collective behavior and applied data science more generally.
Football is the most popular sport in the world, in part because its fluidity and randomness allow for many alternative interpretations of the same events or, in other words, accommodate millions of pundits relying on experience and anecdotal evidence. The discussions around datainformed or even datadriven decision making illustrate nicely the conflict between naive eagerness to apply, and ignorant dismissal of, soccer analytics.
Using examples from our ongoing research I will discuss opportunities and pitfalls in the (un)critical application of computational methods.
Given that so many seem to know so much about the subject, I expect a great deal of willingness to question any choice of representation or datasuggested conclusion. Why, then, should similar methods be more applicable in unregulated social environments?
Certifying Induced Subgraphs in Large Graphs (Tran)
We introduce I/Oefficient certifying algorithms for bipartite graphs, as well as for the classes of split, threshold, bipartite chain, and trivially perfect graphs. When the input graph is a member of the respective class, the certifying algorithm returns a certificate that characterizes this class. Otherwise, it returns a forbidden induced subgraph as a certificate for nonmembership. On a graph with n vertices and m edges, our algorithms take O(Sort(n + m)) I/Os in the worst case for split, threshold and trivially perfect graphs. In the same complexity bipartite and bipartite chain graphs can be certified with high probability. We provide implementations for split and threshold graphs and provide a preliminary experimental evaluation.
April 24th, Virtual
Speakers:
 Andrea W. Richa, Arizona State University:
Algorithmic Programmable Matter: From Local Markov Chains to “Dumb” Robots [VIDEO]  Lukas Rasmus Hintze, Hamburg University:
Dynamic Averaging Load Balancing on Arbitrary Graphs [VIDEO]
Show abstracts
Algorithmic Programmable Matter: From Local Markov Chains to “Dumb” Robots (Richa)
Many programmable matter systems have been developed, including modular and swarm robotics, synthetic biology, DNA tiling, and smart materials. We describe programmable matter as an abstract collection of simple computational elements (particles) with limited memory that each execute distributed, local algorithms to selforganize and solve systemwide problems, such as movement, reconfiguration, and coordination. Selforganizing particle systems (SOPS) have many interesting potential applications like coating objects for monitoring and repair purposes, and forming nanoscale devices for surgery and molecularscale electronic structures. We describe some of our work on the algorithmic foundations of programmable matter, investigating how macroscale system behaviors can naturally emerge from local microbehaviors by individual particles: We utilize tools from statistical physics and Markov chain analysis to translate Markov chains defined at a system level into distributed, local algorithms for SOPS that drive the desired emergent collective behavior for the problems of compression, separation, and foraging, among others. We further establish the notion of algorithmic matter, where we leverage standard binary computation, as well as physical characteristics of the robots and interactions with the environment in order to implement our microlevel algorithms in actual testbeds composed of robots that are not capable of any standard computation. We conclude by addressing full concurrency and asynchrony in SOPS.
Dynamic Averaging Load Balancing on Arbitrary Graphs (Hintze)
March 13th, Virtual
Speakers:
 Catherine Greenhill, UNSW Sydney:
Triangle Switches, Reconstruction and Mixing [VIDEO]
Show abstracts
Triangle Switches, Reconstruction and Mixing (Greenhill)
February 6th, Virtual
Speakers:
 Noela Müller, Eindhoven University of Technology:
The Hitting Time of Clique Factors [VIDEO]  Maximilian HahnKlimroth, TU Dortmund:
The Cut Metric for Probability Distributions [VIDEO]
Show abstracts
The Hitting Time of Clique Factors (Müller)
In 2022, Jeff Kahn gave the strongest possible, affirmative, answer to Shamir's problem, which had been open since the late 1970s: Let r be an integer larger than two and n divisible by r. Then, in the runiform random hypergraph process on n vertices, as soon as the last isolated vertex disappears, a perfect matching emerges. We transfer this hitting time result to the setting of clique factors in the random graph process: at the time that the last vertex joins a copy of the complete graph on r vertices K_r, the random graph process contains a K_rfactor. Our proof draws on a novel sequence of couplings, extending techniques of Riordan and Annika Heckel. Moreover, we prove an analogous result for clique factors in the suniform hypergraph process (where s is at least 3).
This talk is based on joint work with Annika Heckel, Marc Kaufmann and Matija Pasch.
The Cut Metric for Probability Distributions (HahnKlimroth)
Guided by the theory of graph limits, we investigate a variant of the cut metric for limit objects of sequences of discrete probability measures.
January 9th, Virtual
Speakers:
 Vittorio Bilò, University of Salento:
Hedonic Games with FixedSize Coalitions [VIDEO]  Michelle Luise Döring, HPI Potsdam:
Margin of Victory for Weighted Tournament Solutions [VIDEO]
Show abstracts
Hedonic Games with FixedSize Coalitions (Bilò)
In hedonic games, a set of n agents, having preferences over all possible coalition structures, needs to agree on a stable outcome. In this work, we initiate the study of hedonic games with fixedsize coalitions, where the set of possible coalition structures is restricted as follows: there are k coalitions, each coalition has a fixed size, and the sum of the sizes of all coalitions equals n. We focus on the basic model of additively separable hedonic games with symmetric valuations, where an agent's preference is captured by a utility function which sums up a contribution due to any other agent in the same coalition. In this setting, an outcome is stable if no pair of agents can exchange coalitions and improve their utilities. Conditioned on the definition of improvement, three stability notions arise: swap stability under transferable utilities, in which no swap can improve the sum of the utilities of both agents, strict swap stability, in which no swap can improve the utility of one agent without decreasing the utility of the other one, and swap stability, in which no swap can improve the utilities of both agents simultaneously. We analyse the fundamental questions of existence, complexity and efficiency of stable outcomes, and that of complexity of a social optimum.
Margin of Victory for Weighted Tournament Solutions (Döring)
Determining how close a winner of an election is to becoming a loser, or distinguishing between different possible winners of an election, are major problems in Computational Social Choice. We tackle these problems for socalled weighted tournaments by generalizing the notion of Margin of Victory (MoV) for unweighted tournament solutions by Brill et al. to weighted tournament solutions. For these, the MoV of a winner (resp. loser) is the total weight that needs to be changed in the tournament to make them a loser (resp. winner). We study three weighted tournament solutions: Borda's rule, the weighted Uncovered Set, and Split Cycle. For all three rules, we analyse the complexity of computing the MoV, and provide structural insight into the MoV by investigating three properties: monotonicity, consistency regarding the weighted covering relation, and consistency regarding the degree of alternatives. Lastly, we provide upper and lower bounds on the MoV and analyse the expressiveness of the MoV values for each of the three tournament solutions using experimental results on tournaments of varying sizes.
2022:
December 5th, Virtual
Speakers:
 Nick Gravin, Shanghai University of Finance and Economics:
Online Stochastic Optimization [VIDEO]  Giovanna Varricchio, Goethe University Frankfurt:
New Fairness Notions for Resource Allocation [VIDEO]
Show abstracts
Online Stochastic Optimization (Gravin)
There is a growing number of interesting stochastic models complementing traditional for the area of online algorithms worstcase analysis. Two popular stochastic frameworks are the random arrival model and Bayesian optimization framework. I will introduce these two frameworks on the examples of Secretary problem and Prophet inequality and discuss a few of their combinatorial extensions. A special attention will be given to various online matching models, a central setting for online algorithms due to its many applications in online advertisement, ridesharing, and online marketplaces. I will give an overview of different models and open research directions. No background knowledge is required, although some familiarity with online algorithms and stochastic optimization might be useful.
Based on a series of papers with Tomer Ezra, Michal Feldman, Enze Sun, Zhihao Tang, Hongao Wang, and Kangning Wang
New Fairness Notions for Resource Allocation (Varricchio)
We consider the fundamental problem in resource allocation that entails fairly dividing a set of indivisible goods among agents. The notion of envyfreeness up to any good (EFX) is the most compelling notion of fairness in this line of work. We say an allocation is EFX if every agent (weakly) prefers her own bundle over any other agent bundle after removing her least preferred good from this latter. Despite significant efforts over the past few years, the existence of EFX allocations is not known, even for additive valuations. Therefore, there has been a lot of work focusing on relaxations and approximations of EFX.
In our work, we propose two natural fairness notions that are inspired by EFX. The first notion is the one of epistemic EFX (EEFX), which ensures every agent is EFXsatisfied upon a redistribution of the other agents' goods. The second is the minimum EFX value (MXS) which is a thresholdbased criteria defined using EFX allocations. Interestingly, we show that both EEFX and MXS allocations are always guaranteed to exist, for additive valuations, and can be computed in polynomial time.
Joint work with Ioannis Caragiannis, Jugal Garg, Nidhi Rathi, and Eklavya Sharma
November 14th, Virtual
Speakers:
 Christian Scheideler, Paderborn University:
Towards Rapidly Transforming Programmable Matter  Dominik Schallmoser, TU Hamburg:
On the Hierarchy of Distributed Majority Protocols
Show abstracts
Towards Rapidly Transforming Programmable Matter (Scheideler)
The Amoebot model is a model for programmable matter that has found increased interest in recent years. However, many important issues are not captured in the basic form of this model, including rapid shape transformation. I propose a reconfigurable circuit extension that allows many central problems like leader election, compass alignment, and symmetry checks to be solved significantly faster than in the basic model. This provides the base for synchronization and energy distribution that can then be used for rapid shape transformation.
On the Hierarchy of Distributed Majority Protocols (Schallmoser)
We study the Consensus problem among n agents, defined as follows. Initially, each agent holds one of two possible opinions. The goal is to reach a consensus configuration in which every agent shares the same opinion. To this end, agents randomly sample other agents and update their opinion according to a simple update function depending on the sampled opinions. We consider two communication models: the gossip model and a variant of the population model. In the gossip model, agents are activated in parallel, synchronous rounds. In the population model, one agent is activated after the other in a sequence of discrete time steps. For both models we analyze the following natural family of majority processes called jMajority: when activated, every agent samples j other agents uniformly at random (with replacement) and adopts the majority opinion among the sample (breaking ties uniformly at random). As our main result we show a hierarchy among majority protocols: (j + 1)Majority (for j > 1) converges stochastically faster than jMajority for any initial opinion configuration. In our analysis we use Strassen’s Theorem to prove the existence of a coupling. This gives an affirmative answer for the case of two opinions to an open question asked by Berenbrink et al. [2017]
October 10th, Virtual
Speakers:
 Nicole Megow, University of Bremen:
Online Routing and Network Design with Predictions  Daniel Allendorf, Goethe University Frankfurt:
Algorithms for NonLinear Preferential Attachment [VIDEO]
Show abstracts
Online Routing and Network Design with Predictions (Megow)
Online optimization refers to solving problems where an initially unknown input is revealed incrementally, and irrevocable decisions must be made not knowing future requests. The assumption of not having any prior knowledge about future requests seems overly pessimistic. Given the success of machinelearning methods and datadriven applications, one may expect to have access to predictions about future requests. However, simply trusting them might lead to very poor solutions as these predictions come with no quality guarantee. In this talk we present recent developments in the young line of research that integrates such errorprone predictions into algorithm design to break through worst case barriers. We discuss algorithmic challenges with a focus on online routing and network design and present algorithms with performance guarantees depending on a novel error metric.
Joint work with Giulia Bernardini, Alexander Lindermayr, Alberto MarchettiSpaccamela, Leen Stougie, and Michelle Sweering.
Algorithms for NonLinear Preferential Attachment (Allendorf)
Preferential attachment lies at the heart of many network models aiming to replicate features of real world networks. To simulate the attachment process, conduct statistical tests, or obtain input data for benchmarks, efficient algorithms are required that are capable of generating large graphs according to these models.
Existing graph generators are optimized for the most simple model, where new nodes that arrive in the network are connected to earlier nodes with a probability $P(h) \propto d$ that depends linearly on the degree $d$ of the earlier node $h$. Yet, some networks are better explained by a more general attachment probability $P(h) \propto f(d)$ for some function $f \colon \mathbb N~\to~\mathbb R$.
Here, the polynomial case $f(d) = d^\alpha$ where $\alpha \in \mathbb R_{>0}$ is of the greatest interest.
In this paper, we present efficient algorithms that generate graphs according to the more general models.
To this end, we design a new method for maintaining a discrete distribution which leads to a simple yet optimal algorithm for the polynomial model. We parallelize the algorithm by identifying batches of samples that can be drawn independently and obtain a nearoptimal speedup when adding many nodes.
In addition, we present an I/Oefficient algorithm for use in external memory that can even be used for the fully general model.
To showcase the efficiency and scalability of our algorithms, we conduct an experimental study and compare their performance to existing solutions for the linear case.
September 19th, Virtual
Speakers:
 Stavros Ioannidis (King's College of London) :
Strong Approximations and Irrationality in Financial Networks with Derivatives  Maurice Rolvien (TU Dortmund):
The Full Rank Condition for Sparse Random Matrices [VIDEO]
Show abstracts
Strong Approximations and Irrationality in Financial Networks with Derivatives (Ioannidis)
Financial networks model a set of financial institutions (firms) interconnected by obligations. Recent work has introduced to this model a class of obligations called credit default swaps, a certain kind of financial derivatives. The main computational challenge for such systems is known as the clearing problem, which is to determine which firms are in default and to compute their exposure to systemic risk, technically known as their recovery rates. It is known that the recovery rates form the set of fixed points of a simple function, and that these fixed points can be irrational. We further study the clearing problem from the point of view of irrationality and approximation strength. Firstly, we observe that weakly approximate solutions may contain misleading information regarding the actual financial state of an institution, thus making them hard to justify. On this basis, we study the complexity of finding a strongly (or "near") approximate solution, and show FIXPcompleteness. We then study the structural properties required for irrationality, and we give necessary conditions for irrational solutions to emerge: The presence of certain types of cycles in a financial network forces the recovery rates to take the form of roots of nonlinear second or higherdegree polynomials. In the absence of a large subclass of such cycles, we study the complexity of finding an exact fixed point, which we show to be a problem close to, albeit outside of PPAD.
The Full Rank Condition for Sparse Random Matrices (Rolvien)
We derive a sufficient condition for a sparse random matrix with given numbers of nonzero entries in the
rows and columns having full row rank. The result covers both matrices over finite fields with independent nonzero entries and {0, 1}matrices over the rationals. The sufficient condition is generally necessary as well.
September 12th, Virtual
Speakers:
 Frank Krauss, Durham University:
Introducing JUNE  an opensource epidemiological simulation [VIDEO]  Jan Hązła, EPFL:
Initial alignment in neural networks and its necessity for learning by gradient descent
Show abstracts
Introducing JUNE  an opensource epidemiological simulation (Krauss)
We constructed a detailed digital twin of the UK population, with supreme social and geographical granularity, representing 55 million residents in England and Wales and tracing their daily movements and activities. The infection is propagated through the virtual population through simulated social contacts, and the progress of the disease in infected individuals and their trajectory through the healthcare system is then described, based on public health data. Various concurrent strains and pharmaceutical (vaccines) and nonpharmaceutial interventions (e.g. social distancing) are implemented. JUNE resolves the spatiotemporal development of the disease spread through the population in great detail and is able to find nontrivial correlations of infection and fatality rares with a variety of societal factors. Our model has been proven in the midst of the current crisis and is currently being used by NHSEngland’s COVID19 response team to inform their strategic and operational planning. As a sideproduct, we collaborate with WHO and UN Global Pulse and roll out the model also to one of the world's largest refugee settlements.
Initial alignment in neural networks and its necessity for learning by gradient descent (Hązła)
We study the question which boolean functions can be efficiently learned by neural networks using gradient descent (GD) algorithm. We introduce the notion of "initial alignment" (INAL) between a randomly initialized neural network and its target function. We then show that if the INAL value is not noticeably large, then a fully connected neural network with iid initialization will not learn the function with noisy GD in polynomial time. The result is based on analyzing the relation of INAL to the boolean Fourier expansion and the notion of crosspredictability of a class of functions.
Joint work with Emmanuel Abbe, Elisabetta Cornacchia and Christopher Marquis.
July 11th, Virtual
Speakers:
 Davide Bilò, University of L'Aquila:
Singlesource Shortest pdisjoint Paths: Fast Computation and Sparse Preservers  Philipp Fischbeck, HPI Potsdam:
On the External Validity of AverageCase Analyses of Graph Algorithms
Show abstracts
Singlesource Shortest pdisjoint Paths: Fast Computation and Sparse Preservers (Bilò)
On the External Validity of AverageCase Analyses of Graph Algorithms (Fischbeck)
The number one criticism of averagecase analysis is that we do not actually know the probability distribution of realworld inputs. Thus, analyzing an algorithm on some random model has no implications for practical performance. At its core, this criticism doubts the existence of external validity, i.e., it assumes that algorithmic behavior on the somewhat simple and clean models does not translate beyond the models to practical performance realworld input.
With this paper, we provide a first step towards studying the question of external validity systematically. To this end, we evaluate the performance of six graph algorithms on a collection of 2751 sparse realworld networks depending on two properties; the heterogeneity (variance in the degree distribution) and locality (tendency of edges to connect vertices that are already close). We compare this with the performance on generated networks with varying locality and heterogeneity. We find that the performance in the idealized setting of network models translates surprisingly well to realworld networks. Moreover, heterogeneity and locality appear to be the core properties impacting the performance of many graph algorithms.
June 13th, Virtual
Speakers:
 Ruta Mehta, University of Illinois at UrbanaChampaign:
Competitive Divison of Goods, Bads, and Mixed  Tim Koglin, Goethe University Frankfurt:
Public Signals in Network Congestion Games
Show abstracts
Competitive Divison of Goods, Bads, and Mixed (Mehta)
Fair division is the problem of allocating a set of items among agents in a fair and efficient manner. This ageold problem, mentioned even in the Bible, arises naturally in a wide range of reallife settings, for example, school seat assignments, partnership dissolution, sharing of satellites, and dividing costs for climate resilience. Division based on competitive equilibrium (CE) has emerged as one of the best mechanisms for this problem. The existence and computability of CE have been extensively studied when all items are disposable goods, while the problem is less explored when some of them are nondisposable chores (bads). In this talk, I will discuss recent algorithmic advances on the computation of CE when each item may be a good, a chore, or both (mixed).
I will first consider the case of additive valuations, where when all items are goods, the CE set is wellknown to be captured by convex programming formulations and thereby forms a convex set. In sharp contrast, with chores, the CE set may be nonconvex and disconnected. I will discuss how to handle this nonconvexity through a new exteriorpoint method to find an approximate CE in polynomial time (FPTAS). This method seems general enough to work with any mathematical formulation that optimizes a coordinatewise monotone function over linear constraints. Finally, I will discuss recent developments on the exchange setting (barter system).
Based on joint works with Shant Boodaghians, Bhaskar Ray Chaudhury, Jugal Garg, and Peter McGlaughlin.
Public Signals in Network Congestion Games (Koglin)
We consider a largely untapped potential for the improvement of traffic networks that is rooted in the inherent uncertainty of travel times. Travel times are subject to stochastic uncertainty resulting from various parameters such as weather condition, occurrences of road works, or traffic accidents. Large mobility services have an informational advantage over single network users as they are able to learn traffic conditions from data. A benevolent mobility service may use this informational advantage in order to steer the traffic equilibrium into a favorable direction. The resulting optimization problem is a task commonly referred to as signaling or Bayesian persuasion. Previous work has shown that the underlying signaling problem can be NPhard to approximate within any nontrivial bounds, even for affine cost functions with stochastic offsets. In contrast, we show that in this case, the signaling problem is easy for many networks. We tightly characterize the class of singlecommodity networks, in which full information revelation is always an optimal signaling strategy. Moreover, we construct a reduction from optimal signaling to computing an optimal collection of support vectors for the Wardrop equilibrium. For two states, this insight can be used to compute an optimal signaling scheme. The algorithm runs in polynomial time whenever the number of different supports resulting from any signal distribution is bounded to a polynomial in the input size. Using a cell decomposition technique, we extend the approach to a polynomialtime algorithm for multicommodity parallel link networks with a constant number of commodities, even when we have a constant number of different states of nature.
This is joint work with Svenja Marie Griesbach, Martin Hoefer and Max Klimm.
May 23rd (originally April 11th), Virtual
Speakers:
 Matthias Mnich, TU Hamburg:
Similaritybased hierarchical Clustering in TreeLike Networks  Daniel Allendorf, Goethe University Frankfurt:
Engineering Uniform Sampling of Graphs with a Prescribed Powerlaw DegreeSequence
Show abstracts
Similaritybased hierarchical Clustering in TreeLike Networks (Mnich)
Hierarchical clustering of networks is a fundamental task with important applications in phylogenetics, network security analysis, and software engineering, which groups together data points that are similar to each other, and separates data points which are different. Compared to flat clustering, which requires to guess or search the "optimal" number of groups or clusters in advance, hierarchical clustering does not have such a requirement. Moreover, hierarchical clustering can detect the hidden cluster structure at all levels of granularity simultaneously.
This concept of hierarchical clustering was formulized by Dasgupta (STOC 2016), who proposed algorithms based on sparsest cut computations to identify the similarity and dissimilarities in large networks. For treelike networks of treewidth t and size n, Chlamtáč et al. (APPROX 2010) presented an algorithm that yields an exp(exp(t))approximation to the optimal sparsest cut in in time exp(t) * poly(n). Gupta et al. (STOC 2013) showed how to obtain an O(1)approximation with a blownup run time of n^{O(k)}. An intriguing open question is whether one can simultaneously achieve the best out of the aforementioned results, that is, an O(1)approximation in time exp(k) * poly(n). We achieve this goal, via the following results: (i) An O(k^2)approximation that runs in time exp(k) * poly(n), simultaneously improving both the approximation factor and the run time of the result by Chlamtáč et al. (ii) For any \varepsilon>0, an O(1/\varepsilon^2)approximation in time 2^{O(k^{1+\varepsilon}/\varepsilon)} * poly(n), implying an O(1)approximation whose run time is almost exp(k) * poly(n) and a O(\log^2 k)approximation in time k^{O(k)} * poly(n). Key to our results is a novel measure of "combinatorial diameter" for treelike networks, that we introduce here and which may be of independent interest.
(Joint work with Parinya Chalermsook, Matthias Kaul, Joachim Spoerhase and Daniel Váz).
Engineering Uniform Sampling of Graphs with a Prescribed Powerlaw DegreeSequence (Allendorf)
We consider the following common network analysis problem: given a degree sequence d = (d_1, ..., d_n) in N^n return a uniform sample from the ensemble of all simple graphs with matching degrees. In practice, the problem is typically solved using Markov Chain Monte Carlo approaches, such as EdgeSwitching or Curveball, even if no practical useful rigorous bounds are known on their mixing times.In contrast, Arman et a. sketch IncPowerlaw, a novel and much more involved algorithm capable of generating graphs for powerlaw bounded degree sequences with gamma > 2.88 in expected linear time. For the first time, we give a complete description of the algorithm and add novel switchings. To the best of our knowledge, our opensource implementation of IncPowerlaw is the first practical generator with rigorous uniformity guarantees for the aforementioned degree sequences. In an empirical investigation, we find that for small averagedegrees IncPowerlaw is very efficient and generates graphs with one million nodes in less than a second. For larger averagedegrees, parallelism can partially mitigate the increased runningtime.
May 9th, Virtual
Speakers:
 Emanuele Natale and Francesco D'Amore, Université Côte d’Azur:
Dynamics for MultiAgent System Coordination in Noisy and Stochastic Environments  Dominik Schallmoser, Hamburg University:
Population Protocols for Exact Plurality Consensus: How a small chance of failure helps to eliminate insignificant opinions
Show abstracts
Dynamics for MultiAgent System Coordination in Noisy and Stochastic Environments (Natale & D'Amore)
In recent years, there has been a surge of interest in the study of abstract systems composed of simple interacting agents. In particular, some computer scientists have focused their attention on algorithms that attempt to capture aspects of biological systems, i.e., natural algorithms. Here, we consider two distributed computing tasks that affect many biological systems: the consensus problem and the ANTS problem. When trying to reach consensus, real entities may be affected by some form of communication noise rather than adversarial failures. In this framework, we study two wellknown opinion dynamics (the UndecidedState dynamic and the 3Majority dynamic), which are known to converge quickly to agreement in noisefree environments, to which we add a uniform communication noise feature: we show that both dynamics exhibit similar phase transitions. In the ANTS (Ants Nearby Treasure Search) problem, on the other hand, a system of independent agents in the twodimensional lattice must find a given (unknown) target as fast as possible. We consider Lévy walks, special random walks that have been shown to model many animal movement patterns, and show that they can provide a nearoptimal solution to the ANTS problem. These results are based on the works [d'Amore et al., SIROCCO 2020], [Clementi et al., PODC 2021], and [d'Amore et Ziccardi, SIROCCO 2022], wich are joint work with A. Clementi, G. Giakkoupis, E. Natale, and I. Ziccardi.
Population Protocols for Exact Plurality Consensus: How a small chance of failure helps to eliminate insignificant opinions
(Schallmoser)
Joint work with Petra Berenbrink, Felix Biermeier, Robert Elsässer, Hamed Hosseinpour, and Peter Kling
March 7th, Virtual
Speakers:

Danupon Nanongkai, University of Copenhagen:
New Perspectives on Classic Questions in the Theory of Graph Algorithms
Show abstracts
New Perspectives on Classic Questions in the Theory of Graph Algorithms (Nanongkai)
The theory of graph algorithms is a research field that develops mathematical techniques with provable guarantees to eventually make computing devices process graph (network) data with fewer resources such as time, energy, and hardware. Despite its pivotal role in computer science over many decades, the theory of graph algorithms research still lacks techniques for designing efficient algorithms for some of the most basic tasks, and for exploiting technological advances from the last few decades: On the one hand, the everincreasing data volumes call for nearlylinear time algorithms which are still elusive for many basic problems. On the other hand, to exploit advances in computer architecture and largescale systems, we need algorithms that are efficient in models of computation beyond the classic sequential setting.
In this talk, I will discuss some recent progress towards efficient algorithms across many computational models such as dynamic graphs, distributed networks, and streaming algorithms. Basic graph problems that will be discussed include cut, matching, and shortest paths. No background is required, although familiarity with basic graph terminologies and algorithms will be useful.
February 14th, Virtual
Speakers:
 Dan Vilenchik, BenGurion University of the Negev:
SemiDefinite Programming meets Stance Classification  how to turn theory into good practice  Joon Lee, TU Dortmund:
The sparse parity matrix
Show abstracts
SemiDefinite Programming meets Stance Classification  how to turn theory into good practice (Vilenchik)
Stance detection is an important task, supporting many downstream tasks such as discourse parsing and modeling the propagation of fake news, rumors, and science denial. In this talk we describe a novel framework for stance detection. Our framework is unsupervised and domainindependent. Given a claim and a multiparticipant discussion  we construct the interaction network from which we derive topological embeddings for each speaker. These speaker embeddings enjoy the following property: speakers with the same stance tend to be represented by similar vectors, while antipodal vectors represent speakers with opposing stances. These embeddings are then used to divide the speakers into stancepartitions. Our embedding is derived from the SemiDefinite Programming (SDP) solution to the maxcut problem on the interaction network. In this talk we shall explain how the success of our method is rooted in theoretical results of SDP integrality for random kcolorable graphs. We evaluated our method on three different datasets from different platforms. Our method outperforms or is comparable with supervised models, including Neural Network based approaches. Joint work with: Ron Korenblum Pick, Vladyslav Kozhukhov, and Oren Tsur Paper was accepted to AAAI 2022: https://arxiv.org/abs/2112.00712 .
A sparse parity matrix (Lee)
We study a square matrix with every entry having a Bernoulli distribution p=d/n. We show that this matrix defies the usual zeroone law behavior when d>e such that the fraction of the variables that take the same value in the kernel of the matrix vacillates between two values with equal probability 1/2.
2021:
December 6th, Virtual
Speakers:
 Vijay Ganesh, University of Waterloo:
On The Unreasonable Effectiveness of SAT Solvers  Ralf Rothenberger, HPI Potsdam:
The Impact of Heterogeneity and Geometry on the Proof Complexity of Random Satisfiability
Show abstracts
On The Unreasonable Effectiveness of SAT Solvers (Ganesh)
Over the last two decades, software engineering (broadly construed to include testing, analysis, synthesis, verification, and security) has witnessed a silent revolution in the form of Boolean SAT and SMT solvers. These solvers are now integral to many testing, analysis, synthesis, and verification approaches. This is largely due to a dramatic improvement in the scalability of these solvers visavis large realworld formulas. What is surprising is that the Boolean satisfiability problem is NPcomplete, believed to be intractable, and yet these solvers easily solve industrial instances containing millions of variables and clauses in them. How can that be? In my talk, I will address this question of why SAT solvers are so efficient through the lens of machine learning (ML) as well as ideas from (parameterized) proof complexity. While the focus of my talk is almost entirely empirical, I will show how can we leverage theoretical ideas to not only deepen our understanding but also to build better SAT solvers. I will argue that SAT solvers are best viewed as proof systems, composed of two kinds of subroutines, ones that implement proof rules and others that are prediction engines that optimize some metric correlated with solver running time. These prediction engines can be built using ML techniques, whose aim is to structure solver proofs in an optimal way. Thus, two major paradigms of AI, namely machine learning and logical deduction, are brought together in a principled way in order to design efficient SAT solvers. A result of my research is the MapleSAT solver, that has been the winner of several recent international SAT competitions and is widely used in industry and academia.
The Impact of Heterogeneity and Geometry on the Proof Complexity of Random Satisfiability (Rothenberger)
Satisfiability is considered the canonical NPcomplete problem and is used as a starting point for hardness reductions in theory, while in practice heuristic SAT solving algorithms can solve largescale industrial SAT instances very efficiently. This disparity between theory and practice is believed to be a result of inherent properties of industrial SAT instances that make them tractable. Two characteristic properties seem to be prevalent in the majority of realworld SAT instances, heterogeneous degree distribution and locality. To understand the impact of these two properties on SAT, we study the proof complexity of random kSAT models that allow to control heterogeneity and locality. Our findings show that heterogeneity alone does not make SAT easy as heterogeneous random kSAT instances have superpolynomial resolution size. This implies intractability of these instances for modern SATsolvers. On the other hand, modeling locality with an underlying geometry leads to small unsatisfiable subformulas, which can be found within polynomial time. A key ingredient for the result on geometric random kSAT can be found in the complexity of higherorder Voronoi diagrams. As an additional technical contribution, we show an upper bound on the number of nonempty Voronoi regions, that holds for points with random positions in a very general setting. In particular, it covers arbitrary pnorms, higher dimensions, and weights affecting the area of influence of each point multiplicatively. Our bound is linear in the total weight. This is in stark contrast to quadratic lower bounds for the worst case.
November 1st, Virtual
Speakers:
 Inbal TalgamCohen, Technion (Israel Institute of Technology):
Incomplete Information VCG Contracts for Common Agency  Niklas Hahn, Goethe University Frankfurt:
Delegated Online Search
Show abstracts
Incomplete Information VCG Contracts for Common Agency (TalgamCohen)
We study contract design for welfare maximization in the wellknown “common agency” model of Bernheim and Whinston [1986]. This model combines the challenges of coordinating multiple principals with the fundamental challenge of contract design: that principals have incomplete information of the agent’s choice of action. Motivated by the significant social inefficiency of standard contracts for such settings (which we formally quantify using a price of anarchy/stability analysis), we investigate whether and how a recent toolbox developed for the first set of challenges under a completeinformation assumption  VCG contracts [Lavi and Shamash, 2019]  can be extended to incomplete information. This is joint work with Tal Alon, Ron Lavi and Elisheva Shamash.
Delegated Online Search (Hahn)
In a delegation problem, a principal with commitment power tries to pick one out of n options. Each option is drawn independently from a known distribution. Instead of inspecting the options herself, the principal delegates the information acquisition to a rational and selfinterested agent. After inspection, the agent proposes one of the options, and the principal can accept or reject.
We study a natural online variant of delegation, in which the agent searches through the options in an online fashion. For each option, he has to irrevocably decide if he wants to propose the current option or discard it, before seeing information on the next option(s). How can we design algorithms for the principal that approximate the utility of her best option in hindsight?
October 4th, Virtual
Speakers:
 Thomas R. Erlebach, Durham University:
Temporal Graph Exploration  Christopher Hahn, Hamburg University:
A loosely selfstabilizing leaderless phase clock
Show abstracts
Temporal Graph Exploration (Erlebach)
A temporal graph is a sequence of static graphs that all have the same vertex set, but the edge set in each step can be different. An agent can in each step either stay at its current vertex or move over an incident edge that is present in that step. The goal is to let the agent visit all vertices of the temporal graph as quickly as possible. While it is easy to visit all vertices of a static graph with n vertices in O(n) steps (e.g., by using depthfirst search), the exploration of temporal graphs may require a much larger number of steps: We show that even if the temporal graph is a connected graph in each step and the dynamics are fully known in advance, exploration may require a quadratic number of steps. We also present upper and lower bounds on the worstcase exploration time of temporal graphs for various restricted cases (e.g., restrictions on the underlying graph or on the maximum degree of the graph in each step), outlining the main techniques that have been used to obtain these bounds and highlighting the many cases with large gaps between the known upper and lower bounds. (The talk is based on joint work with Michael Hoffmann, Frank Kammer, Kelin Luo, Andrej Sajenko, and Jakob Spooner.)
A loosely selfstabilizing leaderless phase clock (Hahn)
We present a selfstabilizing phase clock for population protocols. In the population model we are given a system of n identical agents which interact in a sequence of randomly chosen pairs. Our phase clock is leaderless and it requires O(log n) states. It runs forever and is, at any point of time, in a synchronous state w.h.p. When started in an arbitrary configuration, it recovers rapidly and enters a synchronous configuration within O(log n) parallel time w.h.p. Once the clock is synchronized, it stays in a synchronous configuration for at least poly n parallel time w.h.p.
August 30th, Virtual
Speakers:
 Deepak Ajwani, University College Dublin:
Learning to prune instances of combinatorial optimisation problems  Hung Tran, Goethe University Frankfurt:
An Experimental Study of External Memory Algorithms for Connected Components
Show abstracts
Learning to prune instances of combinatorial optimisation problems (Ajwani)
In a large number of industrial applications, combinatorial optimisation problems are repeatedly solved with datasets from similar distribution. In recent years, machine learning techniques have been shown to be quite effective in speeding up such computations. However, blackbox endtoend machine learning approaches suffer from poor interpretability and the requirement for a large amount of labelled data. In this talk, I will present a simple and highly effective machine learning framework that incorporates the insights from the algorithmic and optimization literature to speedup the solutions of these problems. We look at the kind of quantities the approximation algorithms employ and use these to derive useful features for training a classifier that helps quickly reduce the problem size by identifying the difficult core of the problem and pruning the remainder. The difficult core is then solved using an ILP solver. A prime advantage of using such features is that we do not require much data to train the classifier.
I will present results on a range of combinatorial optimisation problems: maximum clique enumeration, kmedian, facility location, set cover, maximum coverage, minimum steiner tree, travelling salesman problem, capacitated vehicle routing problem and nurse rostering problem. I will show that in all of these problems, the learningtoprune framework is able to reduce the computation time drastically while still obtaining a close to optimal solution.
An Experimental Study of External Memory Algorithms for Connected Components (Tran)
We empirically investigate algorithms for solving Connected Components in the external memory model. In particular, we study whether the randomized O(Sort(E)) algorithm by Karger, Klein, and Tarjan can be implemented to compete with practically promising and simpler algorithms having only slightly worse theoretical cost, namely Borůvka’s algorithm and the algorithm by Sibeyn and collaborators. For all algorithms, we develop and test a number of tuning options. Our experiments are executed on a large set of different graph classes including random graphs, grids, geometric graphs, and hyperbolic graphs. Among our findings are: The Sibeyn algorithm is a very strong contender due to its simplicity and due to an added degree of freedom in its internal workings when used in the Connected Components setting. With the right tunings, the KargerKleinTarjan algorithm can be implemented to be competitive in many cases. Higher graph density seems to benefit KargerKleinTarjan relative to Sibeyn. Borůvka’s algorithm is not competitive with the two others.
August 10th, Virtual
Speakers:
 John Lapinskas, University of Bristol:
Spreading Processes on Spatial Contact Networks
Show abstracts
Spreading Processes on Spatial Contact Networks (Lapinskas)
We study the spread of information (or an epidemic) through a random graph intended to model a realworld social network. A decade ago, it was a longstanding open problem to find any such random graph model which maintained enough independence between vertices and edges to be pleasant to work with. Now, a closelyrelated family of such models has been developed. We study two models in this family, geometric inhomogeneous random graphs (GIRGs) and scalefree percolation (SFP). GIRGs include as a subfamily arguably the most famous such model: hyperbolic random graphs. The talk will not assume any prior background in the area, and it will begin with an introduction to GIRGs and SFP and to the properties of social networks in general.
From prior work by Komjathy and Lodewijks, we know that if we consider a standard SI spreading model on any GIRG or SFP graph whose parameters give rise to a giant component, then for most reasonable choices of transmission parameters the process will “explode” with nonzero probability (covering a constant proportion of vertices in constant time). This is unrealistic in many situations, which suggests it may be the wrong model for those situations. We show that by adding a small transmission penalty to highdegree vertices, we can recover the expected behaviour of a phase transition to explosion, and we locate this phase transition. We will also discuss unpublished future work in which we determine many of the transitions between explosion, exponential spread, and even polynomial spread. The idea of polynomial spread is surprising, but true to life; some epidemics do spread at polynomial rates, such as ebola in west Africa, and understanding the cause of this phenomenon is an open problem.
July 5th, Virtual
Speakers:
 Jan Hazla, École Polytechnique Fédérale de Lausanne (EPFL):
On codes decoding errors on the BEC and BSC  Jean Bernoulli Ravelomanana, Goethe University Frankfurt:
Warning Propagation on Random Graphs
Show abstracts
On codes decoding error on the BEC and BSC (Hazla)
I will talk about how to use a recent inequality on Boolean functions by Samorodnitsky to obtain a result in coding theory. Namely, assume that a linear code successfully corrects errors on the binary erasure channel (BEC) under optimal (maximum a posteriori, or MAP) decoding. Then, this code is also successful on a range of other channels with somewhat smaller capacities, including binary symmetric channel (BSC). One previously unknown consequence is that constantrate ReedMuller codes correct errors on BSC(p) for some constant p > 0.
Warning Propagation on Random Graphs (Ravelomanana)
Warning Propagation is a combinatorial message passing algorithm that unifies and generalises a wide variety of recursive combinatorial procedures. Special cases include the Unit Clause Propagation and Pure Literal algorithms for satisfiability as well as the peeling process for identifying the kcore of a random graph. Here we analyse Warning Propagation in full generality on the binomial random graph. We prove that under a mild stability assumption Warning Propagation converges rapidly. In effect, the analysis of the fixed point of the message passing process on a random graph reduces to analysing the process on a GaltonWatson tree. This result corroborates and generalises a heuristic first put forward by Pittel, Spencer and Wormald in their seminal kcore paper (JCTB 1996).
June 7th, Virtual
Speakers:
 Zach Feinstein, Stevens Institute of Technology:
Networked Contingent Convertible Obligations and Financial Stability  Yannick Gerstorfer, Frankfurt Institute of Advanced Studies (FIAS):
Stochastical Models for Bipartite Random Graph Models
Show abstracts
Networked Contingent Convertible Obligations and Financial Stability (Feinstein)
In this talk we investigate whether a financial system can be made more stable if financial institutions share risk by exchanging contingent convertible (CoCo) debt obligations. The question is framed in a financial network with debt and equity interlinkages with the addition of CoCos that convert continuously when a bank's debtequity ratio drops to a trigger level. We characterize the clearing problem for the interbank debt and equity at the maturity of the obligations. We then introduce stylized networks to study when introducing CoCo bonds improves financial stability, as well as specific networks for which CoCo bonds do not uniformly provide improved system performance. To return to the main question, we examine the EU financial network at the time of the 2011 EBA stress test to do comparative statics to study the implications of CoCo debt on financial stability. It is found that by replacing all unsecured interbank debt by standardized CoCo interbank debt securities, systemic risk in the EU will decrease and bank shareholder value will increase. This is joint work with T.R. Hurd (McMaster University).
Stochastical Models for Bipartite Random Graph Models (Gerstorfer)
We study the embedding of bipartite random graph models using Bayesian stochastical models. Given a list of bipartite edges, we use Variational Inference algorithms to estimate the optimal parameters for a generative network model, so that the input network will be a typical outcome of the generative model. In this talk, I will present the methods we use for our models and explain the main concepts of our approach.
May 3rd, Virtual
Speakers:
 Thomas Bläsius, KIT Karlsruhe:
Theoretical Algorithm Analysis meets Practical Data  Philipp Fischbeck, HPI Potsdam:
Eventually Exponential Contagion via Local and Global Contacts
Show abstracts
Theoretical Algorithm Analysis meets Practical Data (Bläsius)
A theoretical running time analysis is a great tool for predicting the performance of algorithms, saving programmers from implementing and evaluating alternatives that are "obviously" worse. Though this works very well in many cases, there are situations where the predictions do not match practical observations. This often comes from the fact that practical problem instances have certain properties that make them wellbehaved. In this talk, I formalize these properties using probabilistic models and discuss theoretical results based on these formalizations. In the course of this, I will discuss advantages and
limitations of this modelbased approach.
Eventually Exponential Contagion via Local and Global Contacts (Fischbeck)
Bootstrap percolation is a classical model for the spread of information in a network. In the roundbased version, nodes of an undirected graph become active once at least r neighbors were active in the previous round. We propose the perturbed percolation process, a superposition of two percolation processes on the same node set. One process acts on a base graph with activation threshold 1, while the other acts on a random graph with threshold r (representing local and global contacts, respectively). We consider a class of gridlike base graphs, in which the bootstrap percolation process only spreads polynomially fast. As random graph, we consider Erdős–Rényi graphs. For r=1, the perturbed percolation process percolates exponentially fast, as the diameter is known to be low. For r>=2 however, we prove that the process initially spreads polynomially fast, with no activations via the random graph, and eventually the activation rate becomes exponential, driven only by the random graph. We complement our theoretical results by empirical analyses of this process. In addition, we discuss future work on the inclusion of recovery into this process.
April 12th, Virtual
Speakers:
 Roger Wattenhofer, ETH Zürich:
The Next Economic Crisis? It's the Network!  Lisa Wilhelmi, Goethe University Frankfurt:
Fire Sale Games
Show abstracts
The Next Economic Crisis? It's the Network! (Wattenhofer)
The world's financial system is a network, where financial institutions such as banks are connected via various kinds of financial contracts. If some financial institutions go bankrupt, then others might suffer as well; the financial network might experience a ripple effect. In other words, the next big financial crisis should be understood with the network in mind. In this talk I will present some analytical results on financial networks. For instance, can we build a financial network that is more robust to failures? How can we clean up after a crisis? Who should be bailed out?
Fire Sale Games (Wilhelmi)
We study a financial network consisting of n players, each write liabilities and hold unmarketable assets as well as a set of marketable assets called securities. Every player is obligated to fulfill a given leverage constraint and is forced to sell a share of its securities for discount prices whenever it violates the constraint. We study fire sales from a gametheoretical view where players sell securities strategically to minimize losses due to decreasing prices. We consider different combinations of price functions and their impact on sales revenue. For a wide range of games, we show monotonic sales of players. Furthermore, we prove existence of equilibria and convergence to the best equilibrium of the bestresponse dynamic.
March 1st, Virtual
Speakers:
 George Giakkoupis, IRISA/INRIA Rennes:
SelfStabilizing Clock Synchronization with 1Bit Messages  Malin Rau, Hamburg University:
Using an Oracle for Scheduling Unknown Independent Tasks
Show abstracts
SelfStabilizing Clock Synchronization with 1Bit Messages (Giakkoupis)
I will talk about some recent results we showed for the problem of distributed clock synchronization. The model we consider is a synchronous fullyconnected network of n agents, where each agent has a local clock, that is, a counter increasing by one modulo T in each round. The clocks have arbitrary values initially, and they must all indicate the same time eventually. We assume a gossipbased pull communication model, where in every round each agent receives an ℓbit message from a random agent. We devised several fast synchronization algorithms that use small messages and are selfstabilizing, that is, the complete initial state of each agent (not just its clock value) can be arbitrary. Our main contribution is an algorithm that synchronizes a general modulo T clock in polylogarithmic time (in n and T), using just 1bit messages. This is a join work with Paul Bastide and Hayk Saribekyan.
Using an Oracle for Scheduling Unknown Independent Tasks (Rau)
We are studying a nonclairvoyant problem for scheduling independent tasks where the processing times of the tasks are unknown. However, the scheduler can use an external resource (oracle) that delivers an answer to a query on the processing time. This query for the processing time of a task takes some time and the schedule has to wait until it is answered. Aiming to minimize the total completion time of the given tasks, we study different strategies for which tasks the oracle should be questioned. If this strategy has to be fixed before the first task is queried or scheduled, we present the strategy that provably generates a schedule with the smallest expected total completion time. However, we prove that this strategy is not the best when aiming to minimize the worst case.
February 8th, Virtual
Speakers:
 Henning Meyerhenke, HU Berlin:
Approximation of the Diagonal of a Laplacian's Pseudoinverse for Complex Network Analysis  Manuel Penschuck, Goethe University Frankfurt:
Simulating Population Protocols in SubConstant Time per Interaction
Show abstracts
Approximation of the Diagonal of a Laplacian's Pseudoinverse for Complex Network Analysis (Meyerhenke)
The ubiquity of massive graph data sets in numerous applications requires fast algorithms for extracting knowledge from these data. We are motivated here by three electrical measures for the analysis of large smallworld graphs G = (V, E)  i. e., graphs with diameter in O(log V), which are abundant in complex network analysis. From a computational point of view, the three measures have in common that their crucial component is the diagonal of the graph Laplacian’s pseudoinverse, L^+. Computing diag(L^+) exactly by pseudoinversion, however, is as expensive as dense matrix multiplication  and the standard tools in practice even require cubic time. Moreover, the pseudoinverse requires quadratic space  hardly feasible for large graphs. Resorting to approximation by, e. g., using the JohnsonLindenstrauss transform, requires the solution of O(log V /ε²) Laplacian linear systems to guarantee a relative error, which is still very expensive for large inputs. In this paper, we present a novel approximation algorithm that requires the solution of only one Laplacian linear system. The remaining parts are purely combinatorial  mainly sampling uniform spanning trees, which we relate to diag(L^+) via effective resistances. For smallworld networks, our algorithm obtains a ± εapproximation with high probability, in a time that is nearlylinear in E and quadratic in 1 / ε. Another positive aspect of our algorithm is its parallel nature due to independent sampling. We thus provide two parallel implementations of our algorithm: one using OpenMP, one MPI + OpenMP. In our experiments against the state of the art, our algorithm (i) yields more accurate approximation results for diag(L^+), (ii) is much faster and more memoryefficient, and (iii) obtains good parallel speedups, in particular in the distributed setting. Finally, we sketch some extensions of our techniques to related problems, in particular to (group) forest closeness centrality.
Simulating Population Protocols in SubConstant Time per Interaction (Penschuck)
We consider the efficient simulation of population protocols. In the population model, we are given a system of n agents modeled as identical finitestate machines. In each step, two agents are selected uniformly at random to interact by updating their states according to a common transition function. We empirically and analytically analyze two classes of simulators for this model. First, we consider sequential simulators executing one interaction after the other. Key to the
performance of these simulators is the data structure storing the agents' states. For our analysis, we consider plain arrays, binary search trees, and a novel Dynamic Alias Table data structure. Secondly, we consider batch processing to efficiently update the states of multiple independent agents in one step. For many protocols considered in literature, our simulator requires amortized subconstant time per interaction and is fast in practice: given a fixed time budget, the
implementation of our batched simulator is able to simulate population protocols several orders of magnitude larger compared to the sequential competitors, and can carry out 2^50 interactions among the same number of agents in less than 400s.
January 11th, Virtual
Speakers:
 Jonathan Scarlett, National University of Singapore:
Beyond Sparsity: Compressive Sensing with (Deep) Generative Modeling Assumptions  Max HahnKlimroth, Goethe University Frankfurt:
Inference under restrictions  sparsity constrained group testing
Show abstracts
Beyond Sparsity: Compressive Sensing with (Deep) Generative Modeling Assumptions (Scarlett)
The problem of estimating an unknown vector from linear measurements has a long history in statistics, machine learning, and signal processing. Classical studies focus on the "n >> p" regime (#measurements >> #parameters), and more recent studies handle the "n << p" regime by exploiting lowdimensional structure such as sparsity or lowrankness. Such variants are commonly known as compressive sensing.
In this talk, I will overview recent methods that move beyond these simple notions of structure, and instead assume that the underlying vector is wellmodeled by a generative model (e.g., produced by deep learning methods such as GANs). I will highlight algorithmic works that demonstrated up to 510x savings in the number of measurements over sparsitybased methods, and then move on to our theoretical work characterizing the orderoptimal sample complexity in terms of quantities such as (i) the Lipschitz constant of the model, or (ii) the depth/width in a neural network model. I will also briefly overview some recent results on nonlinear observation models.
Inference under restrictions  sparsity constrained group testing (HahnKlimroth)
While nonadaptive group testing itself was recently fully understood to be easy in the sense that there is a polynomial time algorithm achieving inference at a universal informationtheoretic lower bound, it comes with the flaw that within optimal designs each individual gets tested log(n) times and each test contains polynomially many individuals. Such testing schemes may not be applicable due to restrictions in laboratories.
In this talk, we will tackle the problem by analysing the sparsityconstrained group testing problem. Building up on first results by Gandikota et al. (2016), we provide a full understanding of the group testing problem if the testsize needs to be constant and achieve almost optimal results if the testsperindividual are restricted to o(log n).